text
stringlengths
2.85k
2.55M
label
class label
11 classes
SIR Coverage Analysis in Cellular Networks with Temporal Traffic: A Stochastic Geometry Approach arXiv:1801.09888v1 [cs.IT] 30 Jan 2018 Howard H. Yang, Member, IEEE, and Tony Q. S. Quek, Fellow, IEEE Abstract—The bloom in mobile applications not just bring in enjoyment to daily life, but also imposes more complicated traffic situation on wireless network. A complete understanding of the impact from traffic profile is thus essential for network operators to respond adequately to the surge in data traffic. In this paper, based on stochastic geometry and queuing theory, we develop a mathematical framework that captures the interplay between the spatial location of base stations (BSs), which determines the magnitude of mutual interference, and their temporal traffic dynamic. We derive a tractable expression for the SIR distribution, and verify its accuracy via simulations. Based on our analysis, we find that i) under the same configuration, when traffic condition changes from light to heavy, the corresponding SIR requirement can differ by more than 10 dB for the network to maintain coverage, ii) the SIR coverage probability varies largely with traffic fluctuation in the sub-medium load regime, whereas in scenario with very light traffic load, the SIR outage probability increases linearly with the packet arrival rate, iii) the mean delay, as well as coverage probability of cell edge user equipments (UEs) are vulnerable to the traffic fluctuation, thus confirms its appeal for traffic-aware communication technology. Index Terms—Poisson point process, cellular networks, random packet arrival, interacting queues, stochastic geometry, mean delay. I. I NTRODUCTION The rapid evolution of mobile applications imposes more complicated traffic condition on wireless networks, where not only the data demand grows exponentially [1], but more importantly, the the content is largely changing from mobile voice to multimedia [2]. To give an adequate response to the surge in mobile data traffic, network operators need a complete understanding on the impact of temporal traffic. In this article, we aim to evaluate how the traffic statistic affects the wireless networks, and to find those aspects that are most vulnerable. A. Background and Related Work Due to the broadcast nature of wireless channel, transmitters in space sharing a common spectrum will interact with each other through the interference they cause. To characterize the performance of such networks, stochastic geometry has been recently introduced as a way to assess performance of wireless links in large-scale networks [3]–[8]. The intrinsic elegance in modeling and analysis has popularized its application in evaluating performance among various wireless systems, including ad-hoc networks [3], cellular networks [9], or more advanced heterogeneous networks [10], even with H. H. Yang and T. Q. S. Quek are with the Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore (e-mail: howard [email protected], [email protected]). device-to-device (D2D) communication [11] and multipleinput multiple-output (MIMO) technology [12], [13]. However, the main drawback of these models is that they heavily rely on the full buffer assumption, i.e., every link always has a packet to transmit, and do not allow one to represent random traffic. While the additional dimension of randomness in temporal domain increases the complexity in analysis, it is nevertheless a crucial factor in understanding network performance, especially for the next generation wireless system that faces more voliated traffic conditions [14], [15]. The main difficulty with queuing in wireless network comes from the interdependency among the evolution of different queues, which is usually referred to as interacting queues [16]. Because of interference, the queue status of one transmitter can affect, and also be affected by, the queue status of its neighbors, hence making the analysis very difficult. Conventionally, the queuing interaction through wireless medium is studied using simple collision models [16]–[19]. In such models, discrete time ALOHA protocol is usually employed, where each of the N terminals initiates a transmission attempt at every slot: If more than two terminals transmit simultaneously, a collision occurs and all the terminals retransmit their packets in next slot with the same probability [17]. Analytical results about system stability can be obtained via exact form in scenarios with few (two or three) transmitters [16], or through approximations in asymptotic regime with infinitely many transmitters [20]. However, these models over simplify the wireless channel and lack the ability to tract the interference, which differs according to distance as well as channel gains, thus do not capture the information-theoretic interactions precisely. Recent attempts to address this issue are made in [21]–[25], where queuing theory is combined with stochastic geometry to model the dynamic from both temporal and spatial domains. The results provide the necessary and sufficient conditions for network to be stable [24], and different performance metrics, including success transmission probability [22], delay [21], and packet throughput [23] have been subsequently derived. While giving more refined analysis, these results either provide only bounds that are not necessary tight [21], [24], or are only appliable to networks with light traffic [23]. The most related work is from [22], where the authors applied Geo/PH/1 queuing model to account for the interference-based queues among UEs and analyzed the SIR performance under three different transmission schemes. However, the requirement for full channel inversion limits its generalization, and the restricted stable region constrains its application to relatively low traffic condition with small SIR detection threshold, and thus prevents one to take a complete treatment on traffic statistic. To 2 this end, a mathematical framework that captures the spatial– temporal dynamic of the network, and adapts to scenarios with different traffic conditions is of necessity to be explored. TABLE I N OTATION S UMMARY Notation B. Approach and Summary of Contributions In this paper, we model the BS deployment and UE locations as independent Poisson point processes (PPPs), where each BS maintains an infinite capacity buffer to store the incoming packets. The queuing dynamic is modelled via a descrete time system, where we consider the arrival of packets at each BS to be independent Bernoulli process. By combining stochastic geometry with queuing theory, we obtain a tractable expression for the SIR coverage probability. With the developed framework, we can explicitly characterize the SIR variation due to change of traffic condition, and its consequential impact on system stability, as well as delay distribution. Our main contributions are summarized below. • We develope a mathematical framework that captures the interplay between the spatial geometry of wireless links and their temporal traffic dynamic. Our analysis is tractable, and takes into account all the key features of a cellular network, including traffic profile, smallscale fading and path loss, random network topology, and queuing interaction. • Unlike [22], our result not only provides the standard SIR coverage probability, but also gives a more precise description about the fraction of UEs achieving SIR at different levels. For instance, the SIR coverage probability of cell-edge UEs can be easily derived via our result. • We discuss the sufficient and necessary conditions for the network to be stable, and provide an approximation for the stable region. We also derive the mean delay distribution, by accounting for both queuing and transmission delay. • Using the developed analysis, we find that under the same network configuration, there is more than 10 dB SIR difference between light and heavy traffic conditions. Moreover, in the very light traffic regime, the network SIR outage probability is shown to increase linearly with packet arrival rate. The result also reveals that the mean delay, as well as cell-edge UE rate, are vulnerable to the variation of traffic condition, hence urging advanced solution to adapt with traffic profile. The remainder of the paper is organized as follows. We introduce the system model in Section II. In Section III, we detail the analysis of SIR distribution in cellular networks with temporal traffic. We show the simulation and numerical results in Section IV, that confirm the accuracy of our analysis, and provide insights about the impact of traffic profile on network performance. We conclude the paper in Section V. II. S YSTEM M ODEL In this section, we provide a general introduction to the network topology, the traffic profile, as well as the propagation and failure retransmission model. The main notations used throughout the paper are summarized in Table I. Φb ; λb Φu ; λu Pmt ; α Sε ξ; ξc,ε γx0 ,t ; θ µΦ x0 ,t Definition PPP modeling the location of base stations (BSs); BS deployment density PPP modeling the location of UEs; UE deployment density BS transmit power; path loss exponent ε-stable region of wireless network, under which the fraction of unstable queues is less than ε Packet arrival rate; critical arrival rate for εstability Received SIR of typical UE at time slot t; SIR decoding threshold Conditional SIR coverage probability at time slot t A. Network Topology and Traffic Model We consider the downlink of a cellular network, as depicted in Fig. 1, that consists of randomly deployed BSs whose spatial locations follow independent Poisson point process (PPP) Φb with spatial densities λb .1 The location of UEs is modelled as another independent PPP Φu with spatial density λu , where each UE associates with its closest BS for transmission. We assume the UE density is high enough that every BS has at least one UE associates with it.2 In this network, all BSs and UEs are assumed to be equipped with single antenna, and each BS transmits with constant power Pmt . In light of its spectral efficiency, we employ universal frequency reuse throughout the network, i.e., every BS transmits in the same spectrum. We use a discrete time queuing system to model the random traffic profile. In particular, the time axis is segmented into a sequence of equal time intervals, referred to as time slots. We further assume all queuing activities, i.e., arrivals and departures, take place around the slot boundaries. Specifically, at the mth time slot, a potential packet departure may occur in the interval (m− , m), and a potential packet arrival can happen in the interval (m, m+ ). In other words, departures occur at the moment immediately before the slot boundaries while arrivals occur at the moment immediately after the slot boundaries. For a generic UE located in the cell of xi ∈ Φb , we model its packet arrival as a Bernoulli process with rate ξ ∈ [0, 1], which represents the probability of a new arrival occurs in a slot. We further assume that each BS accumulates all the incoming packets in an infinite-size buffer for further transmission purpose. In order to investigate the evolution of queuing dynamic, we limit the mobility of transceivers by considering a static network, i.e., the locations of the BSs and UEs are generated once at (0− , 0), and remained unchanged in all the following 1 PPPs serve as a good model for the planned deployment of macro cell BSs, as verified by both empirical evidence [8], [26] and theoretical analysis [27]. 2 The one UE per cell set up is mainly for the sake of notational simplicity. By adopting a similar approach as [23], the analysis in this paper can be easily extended to consider more realistic scenario where multiple UEs in each cell share the same wireless channel. 3 Transmission link Interference link BS 1 UE 1 BS 2 UE 2 BS 1 UE 1 BS 2 UE 2 Fig. 1. A snapshot of the Poisson cellular network with temperal traffic. The coverage area of different BSs form the Voronoi cells, whereas each BS may be active or inactive, depending on its buffer status. Fig. 2. Example of interacting queues with two BSs sharing the wireless channel. Due to impact from mutual interference, the service rates of BS 1 and BS 2 are different, and dynamically change with their queuing status. time slots.3 the origin, with its tagged BS located at x0 . Given the UE is receiving data at time slot t, the received SIR can be written as B. Propagation Channel and Failure Retransmission In this network, we adopt a block-fading propagation model, where the channels between any pair of antennas are assumed independent and identically distributed (i.i.d.) and quasi-static, i.e., the channel is constant during one transmission slot, and varies independently from slot to slot. We consider all propagation channels are narrowband and affected by two attenuation components, namely small-scale Rayleigh fading with unit mean power, and large-scale path loss that follows power law.4 Affected by the random channel fading and aggregated interference, the process of packet departure does not possess a constant rate and can lead to failure packet deliverty. Retransmission is thus necessary to guarantee the packet can be correctly received. By enabling retransmission, the transmission model at each BS becomes: During each time slot, every node with a non-empty buffer sends out a packet from the head of its queue. If the received SIR exceeds a predefined threshold, the transmission is successful and the packet can be removed from the queue; otherwise, the transmission fails and the packet remains in the buffer. We assume the feedback of each transmission, either success or fail, can be instantaneously awared by the BSs such that they are able to schedule transmission at next time slot. Moreover, for the BSs with empty buffer, they mute the transmissions to reduce power consumption and inter-cell interference. C. Signal-to-interference ratio (SIR) By applying Slivnyak’s theorem [5] to the stationary PPP of BS, it is sufficient to focus on the SIR of a typical UE at 3 Note that most of the pratical networks can be approximately regarded as static, since the locations of any end device cannot change drastically in a relatively short period [24]. 4 The analysis in this paper is not necessary constrained to simple propagation model, it can be further extended to incorporate more realistic setups that include multi-slope path loss [28], [29] and complicated fading environment [30], [31]. γx0 ,t = P h kx k−α P mt x0 0 , Pmt ζx,t hx kxk−α (1) x∈Φb \x0 where hx ∼ exp(1) denotes the small scale Rayleigh fading from BS x to the origin, k·k is the Euclidean distance, α stands for the path loss exponent, and ζx,t ∈ {0, 1} is an indicator showing whether a node located at x ∈ Φb is transmitting at time slot t (ζx,t = 1) or not (ζx,t = 0). It is important to note that since the spectrum is shared among BSs, the queuing status of each BS is coupled with other transmitters and hence results in interacting queue. As such, the BS active state, ζx,t , is both spatial and temperal dependent, since the location affects the pathloss and further the aggregated interference, and the time changes the queue length at each node. To better illustrate this concept, Fig. 2 gives a simple example of queuing interaction between two BSs. Note that compared to UE 1, UE 2 has an advantage location and hence enjoys better path loss and fewer interference. Consequently, BS 2 can quickly empty its queue, and the disparity between their communication conditions results in BS 2 activates less frequently than BS 1. Moreover, depending on whether packets appear at both BSs or not, the corresponding active durations are also different: If both transmitters have packets to send, the mutual interference will reduce the service rate and prolong the active duration of each BS individually. On the other hand, when one transmitter becomes silent, the other one can benefit from the reduced cross-talk and speed up its queue flushing process, hence also decreases the active period. Extending this concept to a large-scale network, we find that as the realization of PPP is irregular, there are always some BSs experience poor transmission environment, e.g., their UEs are located at the cell edge, and some others having good communication condition, e.g., their UEs are around the cell centers. In this regard, even the packet arrival rate is the same for all transmitters, the queuing status and active state 4 F Φ (u) = 1 1 − 2 π Z ∞ 0   1 Im u−jω  ω " #−1    Z 1 k ∞   X jω ξ Φ F (dt) Z(k, δ, θ) dω 1+δ F Φ (ξ) + k  k ξ t can varies largely from BS to BS, and the characterization of SIR in such network is very challenging. III. A NALYSIS We now present the main technical results of the paper. In particular, we first detail the definition of conditional SIR coverage probability, and the analysis on its distribution. Then we discuss the conditions for the queuing network to be stable. After that, we give moments as well as a computationally efficient approximation for the conditional SIR coverage probability. Finally, we derive the distribution of mean delay, which involves both queuing and transmission delay. A. Conditional SIR Coverage Probability Since both the received signal strength and the interference at a given UE are governed by a number of stochastic processes, e.g., random spatial distribution of transmitting/receiving nodes, random packet arrivals, and queuing dynamics, the SIR in (1) is a random variable and can only be characterized via distribution. In this regard, conditioning on the realization of the point process Φ , Φb ∪ Φu , we define the conditional SIR coverage probability as follows [24], [32]. Definition 1: Given the typical UE is receiving data at time slot t,, its conditional SIR coverage probability is defined as µΦ x0 ,t = P (γx0 ,t ≥ θ|Φ)   = Eexp−θkx0 k α X   hx   Φ . ζx,t kxkα x∈Φb \x0 (4) k=1 be negligible on the employed system model [19].5 Motivated by this fact, we make the following assumption. Assumption 1: The temporal interference correlation has a negligible effect on the transmission SIR coverage probability. Hence, we assume the typical UE sees almost independent interference at each time slot. It is now safe to assume that all UEs experience i.i.d. steady state queue distributions, and each BS activates independently, whereas the active probability depends on the specific service rate, or equivalently, the SIR coverage probability. To faciliate analysis in the following, we introduce a simple result from queuing theory as a preliminary, which describes the active probability of a transmitter under fixed arrival and departure rates. Lemma 1: Given the arrival rate being ξ, the service rate µ, the active probability at a generic BS is  1, if µ ≤ ξ, a η = (3) ξ/µ, if µ > ξ. Proof: The result is a standard conclusion from Geo/Geo/1 queue, which can be found in [36]. After all the above preparason, we are now ready to derive our main result of this paper, i.e., distribution of the conditional SIR coverage probability. Theorem 1: The cumulative distribution function of the conditional SIR coverage probability is given by the fixedpoint equation (4) on top of this page, which can be iterative solved as follows F Φ (u) = lim FnΦ (u) (2) Note that the conditional SIR coverage probability µΦ x0 ,t is still a random variable (as we condition on the realization of Φ), which contains all the information about the UE SIR (and therefore achievable rate) distribution across the network. Moreover, the interaction of queues is also captured by (2) via the accumulated interference. In order to analyze the distribution of µΦ x0 ,t , we need to address two issues: i) due to random packet arrival and retransmission of failed deliveries, the active state, i.e., ζx,t = 1, at each transmitter varies over time, and ii) there may exist common interferencing BSs seen by the same UE from one time slot to another, which introduces temporal correlation for the SIR coverage probability [33]–[35]. The dynamically changing active state of BSs, together with the temperal correlation, involve memory to the queues and highly complicates the analysis. Fortunately, when the number of transmitters asymptotically approaches infinity, a mean field property starts to emerge in the evolution of queues, i.e., the interaction between queues become “weak” and “global”, and the impact from aforementioned temperal and spatial correlation tends to n→∞ (5) where FnΦ (u) is given by (  Z ∞  h X jω (k) 1 1 ∞1 Φ ηn−1 Im x−jω 1 + δ Fn (x) = − 2 π 0 ω k k=1 i−1  × Z(k, δ, θ) dω (6) whereas δ = 2/α, Im{·} denotes the imaginary part of a complex number, and Z(k, δ, θ) has the form as (−1)k+1 θk 2 F1 (k, k − δ; k − δ + 1, −θ), (7) k−δ with 2 F1 (a, b; c, d) being the hypergeometry function [37], and (k) ηn−1 is given as Z 1 k ξ Φ (k) Φ F (dt). (8) ηn−1 = Fn−1 (ξ) + k n−1 ξ t Z(k, δ, θ) = (k) In particular, when n = 1, we have η0 = ξ k , ∀k ∈ N. 5 The mean field effect appears because of the cellular infrastruture, where interference is bounded away from the tagged transmitter. In Poisson bipolar networks, where the interaction is “strong” and “local”, such approximation may not hold. 5 1 Average active probability, η(ξ) 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 θ = 0 dB θ = 5 dB θ = 10 dB 0.1 0 0 0.2 0.4 0.6 0.8 1 Packet arrival rate, ξ Fig. 3. Average active probability versus packet arrival rate, under different SIR detection thresholds. for the trivial case of ξ = 0). Recall our discussion in Section II, the random locations of both BS and UE always result in some UEs located at poor coverage area, e.g., the cell edge, and having unbounded queue length. In this regard, instead of requiring all the queues to be stable, a more meaningful alternative will be to maintain the fraction of unstable queues to be below certain level. To this end, we introduce the εstable region [24], which gives the conditions for a network to be operated with less than ε portion of saturated queues. Following [24], a formal definition is in the sequel. Definition 2: For any ε ∈ [0, 1], the ε - stable region Sε and the critical arrival rate ξc are defined respectively as ) ) ( ( T X 1 ≤ε (10) µΦ Sε = ξ ∈ R+ : P lim xo ≤ ξ T →∞ T t=1 and ξc = sup Sε . Proof: See Appendix A. The expression in (4) not only quantifies how all the key features of a cellular network, i.e., deployment strategy, interference, and traffic profile, affect the distribution of SIR, but also illustrates how the interacting queues are affecting the SIR coverage via a fixed-point functional equation. The function F Φ (u) can be interpreted from two aspects: If we regard a typical cell as a queuing system, equation (4) describes the distribution of the random service rate; if we look at (4) in the view of network performance, then the CCDF, i.e., 1−F Φ (u), gives the level of certainty that at least u fraction of UEs in the network can attain SIR threshold θ. Several numerical results based on (4) will be shown in Section IV to provide more practical insights. In the following, we discuss the stable region, moments of the conditional SIR coverage probability, and approximation for the CDF. Remark 1: We introduce an auxiliary function as Z 1 ξ Φ Φ F (dt) (9) η(ξ) = F (ξ) + ξ t which can be regarded as “average” active probability. Note that as ξ grows from 0 to 1, while the value of η(ξ) also variates accordingly, the trend is very different. As depicted in Fig. 3, we can see that, with failed packet retransmissions, the average active probability goes up on a fast-and-then-slow basis with respect to the packet arrival rate ξ, and this effect is especially significant in networks with high SIR detection threshold. B. Stable Region The primal consideration in queuing systems is about stability, i.e., the critical conditions under which all the queues can remain finite length and do not explode. For an isolated system, even with random arrival and departure process, the stable region can be explicitly determined to be when average service rate is larger than the average arrival rate (Loynes theorem [38]). However, such condition cannot be directly generalized to large-scale queuing networks, as the strict stability, i.e., all queues are finite-length, is not achievable (except (11) The network is ε-stable if and only if ξ ≤ ξc . The critical arrival rate gives an explicit stable boundary, beyond which there are more queues transfering from finite size to infinite length and the requirement of less than ε portion of unstable queues cannot be guaranteed. While an exact expression for the critical arrival rate is not available, we can nevertheless obtain explicit conditions for the network to be ε-stable. Theorem 2: The sufficient condition for the network to be ε-stable is ( (  Z ∞  h X jω 1 ∞1 + 1 Sc Im x−jω 1+δ ξ ≤ ξε = sup ξ ∈ R : − 2 π 0 ω k  k=1 i−1  × Z(k, δ, θ) dω ≤ ε , (12) and the necessary condition for the network to be ε-stable is ( (  Z ∞  h X 1 ∞1 jω Nc + 1 ξ ≤ ξε = sup ξ ∈ R : − Im x−jω 1+δ 2 π 0 ω k  k=1 i−1  × ξ k Z(k, δ, θ) dω ≤ ε . (13) Proof: For the sufficient condition, we consider a dominant system, where all the nodes keep transmitting irrespect of their buffer status (for a node with empty buffer, it transmits “dummy” packets). As such, the interference in dominant system is larger than the actual ones, and the result can be attained via having ξ = 1 in (4). For the necessary condition, we consider a favorable system, where each node transmits without retransmission, i.e., even there is transmission failure, the transmitter simplily ignores the failure and withdraw the failed packets. In this scenario, the interference is smaller than that of the actual one, whereas we can obtain the result as making ηk = ξ k . From the above results, we note that the actual value of the critical arrival rate falls in the interval of [ξ Sc , ξ Nc ]. Using the ergodic property of PPP, an approximation for the ε-stable region is given in the sequel. 6 Corollary 1: The ε-stable region of the network is approximated as follows  A ξ ≤ ξc,ε = sup ξ ∈ R+ : F Φ (ξ) ≤ ε . (14) Proof: Note that due to stationary and ergodicity, the ensemble average obtained by averaging over the point process equals the spatial averages obtained by averaging an arbitrary realization of PPP over a large region, i.e., ! T 1X Φ x0 lim P µx0 ,t ≤ ξ = F Φ (ξ), (15) T →∞ T t=1 and the result follows according to the definition. Remark 2: With the notion of stability, the function η(ξ) defined in (9) can be interpreted as: On average, there are F Φ (ξ) portion of UEs in the network with infinity queue size and keep transmitting, while the rest 1 − F Φ (ξ) portion of UEs maintain R 1 stable queues, and active independently with probability ξ ξ/tF Φ (dt). C. Moments Based on the CDF of the conditional SIR coverage probability, in this part we give the corresponding moments, which can faciliate the assessment of network performance. Theorem 3: The m-th moment of the conditional SIR coverage probability is given by 1  Pm , (16) Mm = (k) 1 + δ k=1 m k η Z(k, δ, θ) where η (k) is given as η (k) = F Φ (ξ) + Z ξ 1  k ξ F Φ (dt) t P(γx0 > θ) = Proof: See Appendix B. Because of its important role in network performance assessment, we further provide bounds as well as an approximation for the SIR coverage probability to attain better insights. Corollary 2: The SIR coverage probability can be respectively bounded by the following 1 1 < P(γx0 > θ) < (19) 1 + δZ(1, δ, θ) 1 + δξZ(1, δ, θ) and when ξ ≪ 1, the SIR coverage probability can be approximated as follows (20) Proof: The upper and lower bounds can be obtained via similar approach as in the proof of Theorem 2, i.e., by considering a favorable system without retransmission and a dominant system that keeps transmitting, respectively. For the approximation, we notice that F Φ (ξ) → 0 as ξ → 0. Hence, we assume all the queues are stable in the regime with 1 1+ δξ P(γx0 >θ) Z(1, δ, θ) . (21) Remark 3: Note that the gap between the upper and lower bounds decreases with the increment of the packet arrival rate ξ, which is consistent with the conclusion in [21]. Furthermore, in the light traffic regime, the outage probability, 1 − P(γx0 > θ), increases linearly with respect to the packet arrival rate ξ, which demonstrates the significant impact of traffic profile on the system performance. D. Approximation Motivated by the fact that F Φ (u) is supported on the interval [0, 1], we content ourselves in this part by approximating the function F Φ (u) via a Beta distribution to reduce the computational complexity [32]. A formal operation is stated in the sequel. Corollary 3: The probability distribution function (pdf) of FnΦ (x) in Theorem 1 can be tightly approximated via the following µn (βn +1)−1 x 1−µn (1 − x)βn −1 fXn (x) = B(µn βn /(1 − µn ), βn ) (22) where B(a, b) denotes the Beta function, µn and βn are respectively given as (17) with F Φ (u) giving in (4). In particular, when m = 1, we have the standard SIR coverage probability given as 1 P (γx0 > θ) = . (18) 1 + δηZ(1, δ, θ) P(γx0 > θ) ≈ 1 − ξδZ(1, δ, θ) √ √ (α=4) = 1 − ξδ θ arctan( θ). very light traffic load, and approximate the active probability using the mean, i.e., ξ/P(γx0 > θ) [23]. The result then follows from solving the following equation (n) µn = M 1 , βn = (23) (n) (µn − M2 )(1 − (n) M2 − µ2n µn ) (24) (n) where Mm can be written as (n) Mm = 1+δ (k) with η̂n−1 being (k) η̂n−1 = Z Pm m k=1 k ξ fXn−1 (t)dt + 1 ,  (k) η̂n−1Z(k, δ, θ) Z ξ 0 (25) 1 k ξ fX (t)dt. tk n−1 (26) (k) When n = 1, we have η̂0 = ξ k , ∀k ∈ N. Proof: At each step of the iteration in Theorem 1, the function FnΦ (u) is supported on [0, 1]. As such, by respectively matching the mean and variance to a Beta distribution B(an , bn ), it yields an (n) = M1 , (27) an + b n i h 2 an b n (n) (n) (28) = M2 − M1 2 (an + bn ) (an + bn + 1) and the result follows by solving the above system equations. The accuracy of Corollary 3 will be verified in Fig. 6. 7 Packet arrival Packet departure 12 3 4 5 2 0 4 8 6 D1=2 D2=4 D3=3 ... ... Fig. 4. Illustration of delay in queuing system. The number of required slots to deliver each packet varies due to different queuing and retransmission results. E. Mean Delay and Analysis In the context of wireless networks, delay is an important factor that determines the Quality of Service (QoS) [14], [21]. As shown in Fig. 4, the random arrival of packets and interference-limited channel will inevitably incur waiting and retransmission in the packet delivery process, thus induce multiple slots for one successful delivery. Besides, since the number of required time slots differs among each packet, we can only quantify the delay in average manner. In its accordance, the following definition formalizes the notion of mean day. Definition 3: Let Ax (T ) be the number of packets arrived at a typical transmitter x within period [0, T ], and Di,x be the number of time slots between the arrival of the i-th packet and its successful delivery. The mean delay is defined as PAx (T ) Di,x i=1 DΦ , lim . (29) x T →∞ Ax (T ) Note that Di,x in (29) represents the number of time slots required to successfully deliver the i-th packet, and its value is affected by: (i) queueing delay, caused by other accumulated unsent packets, and (ii) transmission, or equivalently local, delay, due to link failure and retransmission [39]–[41]. By averaging over all time slots, (29) provides information on the average number of slots to successfully deliver a packet. Furthermore, using results from queuing theory and stochastic geometry, we can characterize its distribution with the following expression. Theorem 4: The CDF of mean delay at a typical UE is given as    1−ξ Φ + ξ ≤ T = 1 − F P DΦ x0 T µn (βn +1)−1 Z 1 x 1−µn (1 − x)βn −1 ≈ lim dx n→∞ ξ+ 1−ξ B(µn βn /(1 − µn ), βn ) T (30) where F Φ (u) is given by (4), and µn and βn are respectively given in (23) and (24). Proof: Without loss of generality, we focus on the typical UE. Given the service rate, i.e., the conditional success probability, µΦ x0 , we have the conditional mean delay being [21]  1−ξ Φ   µΦx −ξ , if µx0 > ξ, 0 Φ Dx0 = (31)   +∞, Φ if µx0 ≤ ξ. The distribution of mean delay can then be computed as  (a)   Φ Φ Φ P DΦ x0 ≤ T = P Dx0 ≤ T |µx > ξ P µx > ξ   Φ Φ + P DΦ x0 ≤ T |µx ≤ ξ P µx ≤ ξ  (b) Φ = P DΦ x0 ≤ T, µx > ξ   1−ξ Φ (32) + ξ ≤ µx =P T where (a) is by the law of total probability, and (b) follows by Φ noticing P(DΦ x0 ≤ T |µx ≤ ξ) = 0. We then obtain the result by using (4) and Corollary 3 to the above. The accuracy of Theorem 4 will be verified in Fig. 10. Moreover, two observations immediately follows from (30). Observation 1: When T = 1, we have P DΦ x0 ≤ T = 0, which states that the UEs who are able to success without retransmission form a probabilistic null set in large queuing networks. Observation 2: As T ≫ 1, the CCDF of mean delay Φ can be approximated as, P(DΦ x0 > T ) ≈ F (ξ) + 1/T , which implies the distribution is heavy tail. In addition, when T → ∞, we have the delay outage, i.e., 1 − P(DΦ x0 ≤ T ) converges to F Φ (ξ), which represents the fraction of UEs that are experiencing unstable queues, and it is in line with our discussion in Section-III-B. IV. N UMERICAL R ESULTS AND S IMULATIONS In this section, we validate the accuracy of our analysis through simulations, and explore the impact of traffic condition on network performance from several aspects. During each simulation run, the BSs and UEs are realized over a 100 km2 area via independent PPPs. Packets arrive at each node according to independent Bernoulli process. We average over 10,000 realizations and collect the statistic from each cell to finally calculate the SIR coverage probability. Unless differently specified, we use the following parameters for path loss exponent, BS density, and packet arrival rate, respectively: α = 3.8, λb = 10−4 BS/km2 , and ξ = 0.3 packet/slot. In Fig. 5, we compare the simulated CDF of conditional SIR coverage probability to the analysis proposed in Theorem 1, for various values of SIR detection threshold θ and packet arrival rate ξ. First, the results show a close match for all values of θ and ξ, which validate the our mathematical framework. Next, note that from Fig. 5(a) we can quantify the level of confidence about how much fraction of UEs are able to achieve the targeted SIR at different thresholds, it is also coined as the reliability of the network [32]. For instance, when ξ = 0.3, the probability that 80% of UEs in the network can attain -5 dB SIR is 0.85, showing that with high possibility the majority of UEs can have their packets correctly decoded 8 1 Simulations Analysis 0.9 Cumulative distribution function, FΦ(u) Cumulative Distribution Function, FΦ(u) 1 0.8 0.7 0.6 0.5 0.4 θ = 0 dB 0.3 0.2 0.1 0 0 0.2 0.4 0.6 Conditional SIR coverage probability, 0.8 1 Simulations Analysis 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 ξ = 0.10 0.1 0 0 0.2 Φ µx 0.4 0.6 0.8 1 Φ Conditonal SIR coverage probability, µx (a) (b) Fig. 5. Simulation versus analysis: CDF of conditional success probability. In Fig. (a), we fix the packet arrival rate to be ξ = 0.3, and varies the SIR threshold as θ = −10, −5, 0, 5, 10, 15 dB. In Fig. (b), we fix the SIR threshold to be θ = 0 dB, and varies the arrival rate as ξ = 0.05, 0.1, 0.3, 0.5, 0.8. Taking a closer look between Fig. 5(a) and Fig. 5(b), we notice that under the same cellular configuration, the conditional SIR coverage probability with θ = 0 dB is larger than that with θ = 5 dB, even their respective packet arrival rates are ξ = 0.8 and ξ = 0.3. This observation indicates that packets with smaller detection threshold, i.e., short packets, are more preferable to the network. The reason comes from the fact that higher SIR threshold not merely increases the possibility of failure in decoding process, but triggers more retransmissions thus prolong the active period of interferers, which further reduces the coverage probability. Fig. 6 compares the CDF of conditional SIR coverage 1 Cumulative distribution function, FΦ(u) without retransmission. Such probability can drop to 0.08 if the SIR detection threshold increases to 5 dB, indicating that in large-scale queuing networks, it is very unlikely to maintain the majority of UEs at high SIR. On the other hand, from Fig. 5(b) we observe that the conditional SIR coverage probability monotonically decreases with the growth of packet arrival rate, due to the fact that more and more BSs are activated because of their non-empty buffers and thus impose additional inter-cell interference. It is also worthwhile to note that the increment of traffic load defects the network SIR coverage in a non-linear manner, whereas the degradation of SIR coverage is more severe as traffic load goes from light (ξ = 0.05) to medium (ξ = 0.3), and the decreasing trend slows down as the network load further increases to heavy traffic regime (ξ = 0.8). The reason comes from the composite effect of temporal traffic. In light traffic condition, as packet arrival rate goes up, the increased traffic load not only wakes up more BSs, but also brings in more accumulated packets at the buffer. Together with the reduced service rate, the active duration of transmitters is extended, which in turns defect the SIR across the network. In the heavy traffic regime, as most of the queues are already saturated, the additional active cells cannot largely change the interference, and thus the SIR coverage probability descent is leveled off. Such explanation also goes to the observation in Remark 1. Approximation: Corollary 3 Analysis: Theorem 1 0.9 0.8 0.7 α=3 0.6 0.5 0.4 0.3 α=4 0.2 α = 3.5 0.1 0 0 0.2 0.4 0.6 0.8 1 Conditional SIR coverage probability, µΦ x Fig. 6. CDF of conditional SIR coverage probability (Theorem 1) and the approximation (Corollary 3). Parameters are set as: SIR detection threshold θ = 0 dB, and packet arrival rate ξ = 0.3. probability to its approximation in Corollary 3. We can see that the approximation matches well with the analysis under different path loss exponents, thus confirms its accuracy. We further observe that smaller path loss exponent reduces the SIR coverage, which is due to the fact that while smaller α enhances the received signal power, it nevertheless also results in higher inter-cell interference, and the latter subpass the power gain and hence defacts the SIR. Fig. 7 plots the maximum arrival rates per sufficient and necessary conditions as functions of ε. The figure shows a large difference between the necessary and sufficient conditions, while the approximation locates in between, hence confirms the necessity for better SIR characterization in traffic network. It also reveals that a slight change of arrival rate can largely impact the stable region, i.e., the network stability is vulnerable to traffic condition. Fig. 8 depicts the standard SIR coverage probability as a 9 0.6 Cell-dege coverage probability, 1-F Φ(0.95) 0.5 Maximum arrival rate, ξ 1 Necessary condition Approximation Sufficient condition 0.4 0.3 0.2 0.1 0 0 0.05 0.1 0.15 0.2 0.25 0.3 ǫ 0.8 0 SIR coverage probability, P(γ x > θ) 0.9 ξ = 0.50 0.7 ξ = 0.05 0.6 0.5 0.4 0.3 0 -15 Upper bounds Lower bounds Simulations Analysis -10 -5 0 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.2 0.4 0.6 0.8 1 Fig. 9. 95%-likely rate versus packet arrival rate ξ, for various SIR thresholds θ = −10, −5, 0, 5, 10 dB. 1 0.1 0.8 Packet arrival rate, ξ [Packets/slot] Fig. 7. Comparison of necessary and sufficient conditions. 0.2 0.9 5 10 15 SIR threshold, θ [dB] Fig. 8. Success probability versus SIR threshold θ. function of SIR detection threshold θ, under different packet arrival rates. We first note the close match between the analysis and the simulation, which validates the accuracy of Theorem 3. More importantly, the figure confirms that the traffic profile plays a crucial role in the SIR coverage probability. For instance, to maintain a 90% coverage probability, the required SIR detection threshold can differ more than 10 dB in light traffic (ξ = 0.05) and heavy traffic (ξ = 0.5) regimes, and this gap will be larger as the packet arrival rate keeps increasing. Fig. 8 also reveals that the upper and lower bounds are not tight, whereas even in heavy traffic regime the difference between the two bounds is around 5 dB, and this gap increases dramatically in light traffic condition. Moreover, the bounds fail to capture the trend of coverage probability variates according to the detection threshold θ. As what we have discussed in Remark 1, both ξ and θ significantly affect the active probability, hence, simply approximating the transmitting BSs to a thinned point process cannot provide desire results and hence validate the importance of the trafficaware analysis. In Fig. 9 we plot the cell-edge coverage probability, i.e., 1 − F Φ (0.95), as a function of packet arrival rate ξ. This quantity represents the performance of the “5% UEs”, i.e., the UEs in the bottom 5th percentile in terms of performance, and is particularly interested to operators [15], [32]. We can see that the cell-edge coverage probability is vulnerable to traffic fluctuation. Even in the case with very small SIR detection threshold, e.g., θ = −10 dB, the cell-edge coverage probability can drop by half as the packet arrival rate changes from low to high, and this defection is more severe in scenarios with high SIR thresholds. As such, it is critical to employ more advanced technology to boost up the SIR performance at the cell edge [13]. Fig. 10 compares the CDF of mean delay given in Theorem 4 to the values obtained from simulations. The figure shows that simulation results agree well with the analytical values. Moreover, Fig. 10 confirms the observation in Section III by showing a heavy tail behavior in the distribution of mean delay. Fig. 10 also reveals that the mean delay is very sensitive to the variation of traffic load, e.g., the delay outage is round 0.01 when ξ = 0.2, but this value climbs to around 0.25 when the packet arrival rate doubles, i.e., ξ = 0.4. It is becuase higher the traffic load, on one hand incurs more retransmissions via increased interference, on the other, also prolongs waiting time of each packet since the additional incomings quickly occupy all available buffers. This composite effect significantly affects the mean delay. V. C ONCLUSION In this paper, we introduced an analytical toolset to evaluate the impact of temporal traffic on the performance of cellular networks. We used a general model that accounts for key features from both spatial and temporal domain, including the channel fading, path loss, network topology, traffic profile, and queuing evolution. By exploiting queuing theory and stochastic geometry, we obtain the SIR distribution through a fixed-point functional equation, and validated its accuracy by simulation. Our results confirmed that temporal traffic profile can largely affect the network SIR performance. In particular, 10 following 1 0.9 x CDF of mean delay, P(D Φ < T) ξ = 0.2 ξ = 0.3 0.8 0.7 ξ = 0.4 0.6 Simulations Analysis 0.5 2 4 6 8 10 12 14 16 18 20 Φ Delay, D x [Time slots] Fig. 10. Simulation versus analysis: Mean delay distribution. it showed that under the same configuration, when traffic condition changes from light to heavy, the corresponding SIR requirement can differ by more than 10 dB for the network to maintain coverage. Moreover, the SIR coverage probability varies largely with traffic fluctuation in the submedium load regime, whereas in scenario with very light traffic load, the SIR outage probability increases linearly with the packet arrival rate. In addition, the mean delay, as well as coverage probability of cell-edge UEs are vulnerable to the traffic fluctuation, thus confirms its appeal for traffic-aware communication technologies. The derivation of SIR distribution as a tractable form of system parameters opens various areas to gain further design insights. On one hand, the framework can be extended to adopt more sophisticated point process, e.g., the Poisson cluster point process [42], or determinantal point processes [43]. On the other hand, the analysis can be applied to investigate the design of different wireless technologies. For example, the traffic scheduling problem in large-scale wireless networks [21], or the resource allocation problem in Dynamic TDD system [44]. Analyzing impact of temporal traffic on the performance of Massive-MIMO system is also a concrete direction to investigate in the future. A PPENDIX A. Proof of Theorem 1   Φ Φ (s) = E exp sY MYx,0 x,0   s Y  ξ +1−ξ  = E 1 + θkxkα /kzkα z∈Φ\x s  !   Z ∞ ξ (a) +1−ξ dx = exp −λb 1− 1+θkx0kα /kxkα B c (0,kxk) Z ∞  (b) = 2πλb r exp −λb πr2 0 k ! Z ∞ ∞   X s ξ 2 k+1 × exp −2πλb r (−1) vdv dr k 1+v α/2 /θ 1 k=1  ∞  h i−1 X jω k (c) = 1+δ ξ Z(k, δ, θ) (33) k k=1 where (a) follows from the probability generating functional of PPP, (b) comes from polar coordinate transform and deconditioning kxk with its pdf, which follows a Rayleigh distribution 2 as fR (r) = 2πλb re−λb πr , and (c) is by algebraic operation. By the Gil-Pelaez theorem [45], we have the CDF of µΦ x,0 given as  Φ F0Φ (u) = P (P (γx,0 > θ|Φ) < u) = P Yx,0 < ln u Z n o 1 ∞ 1 1 Im u−jω MYx,0 Φ (jω) dω. (34) = − 2 π 0 ω Next, consider all the queues have evolved to time t = n, Φ and we have obtained the CDF of µΦ x,n−1 as P(µx,n−1 < Φ Φ u) = Fn−1 (u), the moment generating function of Yx,n can be calculated as s MYx,n Φ (s) = E [P (γx,n > θ|Φ) ]    = E E P (γx,n > θ|Φ)s Fn−1    s Y qz,n Fn−1  +1−qz,n = EE 1+θkxkα/kzkα z∈Φ\x ∞   X  s 2πλb r exp −λb πr2 exp −2πλb r2 (−1)k+1 k 0 k=1 "Z  #! k ∞ qx,n ×E dr vdv Fn−1 α/2 /θ 1+v 1 ∞   i−1 h X   k s E qx,n |Fn−1 Z(k, δ, θ) = 1+δ . (35) k = Z ∞ k=1 To faciliate the presentation, we denote Fn as the σ-algebra that contains all the information about queuing status of every Φ node x ∈ Φb up to time t = n. We further introduce Yx,n and Φ Φ qx,n to denote Yx,n = ln P(γx,n > θ|Φ) and qx,n = P(ζx,n = 1), respectively. As such, the σ-algebra {Fn }∞ n=0 forms a filtration, where Fn−1 ⊂ Fn . At slot t = 0, every transmitter has one packet arrival with probability ξ, and actives with probability ξ, i.e., qx,0 = ξ, ∀x ∈ Φb . We can thus compute the moment Φ generation function of Yx,0 at a generic BS x ∈ Φb , via the Leveraging Lemma 1, we have # " k   k  ξ χ{µΦx,n >ξ} |Fn−1 E qx,n |Fn−1 = E χ{µΦx,n ≤ξ} + µΦ x,n Z 1 k ξ Φ Φ F (dt) (36) = Fn−1 (ξ) + k n−1 ξ t where χ{·} is the indicator function. By substituting (36) back into (35), and using the the Gil-Pelaez theorem for another 11 time, we have the CDF of µΦ x,n given as Φ Fx,n (u) Φ Yx,n = P (P (γx,n > θ|Φ) < u) = P < ln u Z ∞ n o 1 1 1 = − Im u−jω MYx,n Φ (jω) dω. 2 π 0 ω  (37) Noet that FnΦ (u) appears on the left hand side of (37), Φ and Fn−1 (u) appears on the right hand side. As FnΦ (u) ≤ Φ F0 (u), ∀u ∈ [0, 1], n ∈ N, by the Dominant Convergence Theorem [46], we have FnΦ (u) → F Φ (u), as n → ∞, and the result follows. B. Proof of Theorem 3 We denote F = ∪n Fn to be the σ-algebra of all the queuing status at the steady state, and qx the corresponding active probability at a generic node x. As such, the m-moment of the conditional success probability can be computed as i h m E lim P (γx,n > θ|Φ) n→∞   m Y E[qz |Fn ] +1−E[qz |Fn ]  = E lim n→∞ 1+θkxkα /kzkα z∈Φ\x m   h i−1 X   m = 1+δ E qxk |F Z(k, δ, θ) , (38) k k=1 and the result follows by using Lemma 1 and (4) to the above equation. R EFERENCES [1] D. López-Pérez, M. Ding, H. Claussen, and A. H. Jafari, “Towards 1 Gbps/UE in cellular systems: Understanding ultra-dense small cell deployments,” IEEE Commun. Surveys & Tuts., vol. 17, no. 4, pp. 2078– 2101, 4th Quart., 2015. [2] Z. Niu, “TANGO: Traffic-aware network planning and green operation,” ”IEEE Wireless Commun.”, vol. 18, no. 5, Oct. 2011. [3] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry and random graphs for the analysis and design of wireless networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029–1046, Sep. 2009. [4] M. Haenggi, Stochastic geometry for wireless networks. Cambridge University Press, 2012. [5] F. Baccelli and B. Blaszczyszyn, Stochastic Geometry and Wireless Networks. Volumn I: Theory. Now Publishers, 2009. [6] H. ElSawy, E. Hossain, and M. Haenggi, “Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey,” IEEE Commun. Surveys & Tuts., vol. 15, no. 3, pp. 996–1019, Jun. 2013. [7] H. ElSawy, A. Sultan-Salem, M.-S. Alouini, and M. Z. Win, “Modeling and analysis of cellular networks using stochastic geometry: A tutorial,” IEEE Commun. Surveys & Tuts., vol. 19, no. 1, pp. 167–203, 1st Quart., 2017. [8] M. Di Renzo, W. Lu, and P. Guan, “The intensity matching approach: A tractable stochastic geometry approximation to system-level analysis of cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 9, pp. 5963–5983, Sep. 2016. [9] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [10] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of k-tier downlink heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550–560, Apr. 2012. [11] H. H. Yang, J. Lee, and T. Q. S. Quek, “Heterogeneous cellular network with energy harvesting-based D2D communication,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1406–1419, Feb. 2016. [12] H. H. Yang, G. Geraci, and T. Q. S. Quek, “Energy-efficient design of MIMO heterogeneous networks with wireless backhaul,” IEEE Trans. Wireless Commun., vol. 5, no. 7, pp. 4914–4927, July 2016. [13] H. H. Yang, G. Geraci, T. Q. S. Quek, and J. G. Andrews, “Cell-edgeaware precoding for downlink massive MIMO cellular networks,” IEEE Trans. Signal Process., vol. 65, no. 13, pp. 3344–3358, Jul. 2017. [14] Y. Zhong, M. Haenggi, F.-C. Zheng, W. Zhang, T. Q. S. Quek, and W. Nie, “Towards a tractable delay analysis in large wireless networks,” arXiv preprint arXiv:1612.01276, 2016. [15] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?” IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014. [16] R. R. Rao and A. Ephremides, “On the stability of interacting queues in a multiple-access system,” IEEE Trans. Inf. Theory, vol. 34, no. 5, pp. 918–930, Sep. 1988. [17] D. P. Bertsekas, R. G. Gallager, and P. Humblet, Data networks. Prentice-Hall International New Jersey, 1992, vol. 2. [18] W. Luo and A. Ephremides, “Stability of N interacting queues in random-access systems,” IEEE Trans. Inf. Theory, vol. 45, no. 5, pp. 1579–1587, Jul. 1999. [19] C. Bordenave, D. McDonald, and A. Proutiere, “Asymptotic stability region of slotted aloha,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5841–5855, Sep. 2012. [20] ——, “Asymptotic stability region of slotted aloha,” IEEE Trans. Inf. Theory, vol. 58, no. 9, pp. 5841–5855, Sep. 2012. [21] Y. Zhong, T. Q. S. Quek, and X. Ge, “Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling,” IEEE J. Sel. Areas Commun., vol. 35, no. 6, pp. 1373–1386, Jun. 2017. [22] M. Gharbieh, H. ElSawy, A. Bader, and M.-S. Alouini, “Spatiotemporal stochastic modeling of IoT enabled cellular networks: Scalability and stability analysis,” IEEE Trans. Commun., vol. 65, no. 9, pp. 3585–3600, Aug. 2017. [23] H. H. Yang, G. Geraci, Y. Zhong, and T. Q. S. Quek, “Packet throughput analysis of static and dynamic TDD in small cell networks,” IEEE Wireless Commun. Lett., vol. 6, no. 6, pp. 742–745, Dec. 2017. [24] Y. Zhong, M. Haenggi, T. Q. Quek, and W. Zhang, “On the stability of static poisson networks under random access,” IEEE Trans. Commun., vol. 64, no. 7, pp. 2985–2998, Jul. 2016. [25] A. George, T. Spyropoulos, and F. Kaltenberger, “An analytical model for flow-level performance in heterogeneous wireless networks,” IEEE Trans. Wireless Commun., 2017. [26] D. B. Taylor, H. S. Dhillon, T. D. Novlan, and J. G. Andrews, “Pairwise interaction processes for modeling cellular network topology,” in Proc. IEEE Global Telecomm. Conf., Anaheim, CA, Dec. 2012, pp. 4524– 4529. [27] B. Blaszczyszyn, M. K. Karray, and H. P. Keeler, “Using Poisson processes to model lattice cellular networks,” in Proc. IEEE Conf. on Computer Commun. IEEE, Apr. 2013, pp. 773–781. [28] M. Ding, P. Wang, D. López-Pérez, G. Mao, and Z. Lin, “Performance impact of LoS and NLoS transmissions in dense cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 3, pp. 2365–2380, Mar. 2016. [29] J. G. Andrews, X. Zhang, G. D. Durgin, and A. K. Gupta, “Are we approaching the fundamental limits of wireless network densification?” IEEE Commun. Mag., vol. 54, no. 10, pp. 184–190, Oct. 2016. [30] Y. J. Chun, S. L. Cotton, H. S. Dhillon, F. J. Lopez-Martinez, J. F. Paris, and S. K. Yoo, “A comprehensive analysis of 5G heterogeneous cellular systems operating over κ–µ shadowed fading channels,” IEEE Trans. Wireless Commun., vol. 16, no. 11, pp. 6995–7010, Nov. 2017. [31] I. Trigui, S. Affes, and B. Liang, “Unified stochastic geometry modeling and analysis of cellular networks in LOS/NLOS and shadowed fading,” IEEE Transactions on Communications, vol. 65, no. 12, pp. 5470–5486, Dec. 2017. [32] M. Haenggi, “The meta distribution of the SIR in poisson bipolar and cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 4, pp. 2577–2589, Apr. 2016. [33] U. Schilcher, C. Bettstetter, and G. Brandner, “Temporal correlation of interference in wireless networks with rayleigh block fading,” IEEE Trans. Mobile Comput., vol. 11, no. 12, pp. 2109–2120, Dec. 2012. [34] Y. Zhong, W. Zhang, and M. Haenggi, “Managing interference correlation through random medium access,” IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 928–941, Feb. 2014. [35] R. K. Ganti and M. Haenggi, “Spatial and temporal correlation of the interference in aloha ad hoc networks,” IEEE Wireless Commun. Lett., vol. 13, no. 9, Sep. 2009. [36] I. Atencia and P. Moreno, “A discrete-time Geo/G/1 retrial queue with general retrial times,” Queueing Systems, vol. 48, no. 1-2, pp. 5–21, 2004. [37] G. E. Andrews, R. Askey, and R. Roy, Special functions. Cambridge University Press, Cambridge, 2000. 12 [38] R. M. Loynes, “The stability of a queue with non-independent interarrival and service times,” in Math. Proc. Cambridge Philos. Soc., vol. 58, no. 3. Cambridge University Press, 1962, pp. 497–520. [39] M. Haenggi, “The local delay in poisson networks,” IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1788–1802, Mar. 2013. [40] G. Zhang, T. Q. S. Quek, A. Huang, and H. Shan, “Delay and reliability tradeoffs in heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 15, no. 2, pp. 1101–1113, Feb. 2016. [41] G. Zhang, T. Q. S. Quek, M. Kountouris, A. Huang, and H. Shan, “Fundamentals of heterogeneous backhaul designanalysis and optimization,” IEEE Trans. Commun., vol. 64, no. 2, pp. 876–889, Feb. 2016. [42] R. K. Ganti and M. Haenggi, “Interference and outage in clustered wireless ad hoc networks,” IEEE Trans. Inf. Theory, vol. 55, no. 9, pp. 4067–4086, Sep. 2009. [43] Y. Li, F. Baccelli, H. S. Dhillon, and J. G. Andrews, “Statistical modeling and probabilistic analysis of cellular networks with determinantal point processes,” IEEE Trans. Commun., vol. 63, no. 9, pp. 3405–3422, Sep. 2015. [44] Z. Shen, A. Khoryaev, E. Eriksson, and X. Pan, “Dynamic uplinkdownlink configuration and interference management in TD-LTE,” IEEE Commun. Mag., vol. 50, no. 11, pp. 51–59, Nov. 2012. [45] J. Gil-Pelaez, “Note on the inversion theorem,” Biometrika, vol. 38, no. 3-4, pp. 481–482, Dec. 1951. [46] P. Billingsley, Probability and measure. John Wiley & Sons, 2008.
7cs.IT
MAXIMALLY STRETCHED LAMINATIONS ON GEOMETRICALLY FINITE HYPERBOLIC MANIFOLDS arXiv:1307.0250v2 [math.GT] 11 Jan 2017 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Abstract. Let Γ0 be a discrete group. For a pair (j, ρ) of representations of Γ0 into PO(n, 1) = Isom(Hn ) with j geometrically finite, we study the set of (j, ρ)-equivariant Lipschitz maps from the real hyperbolic space Hn to itself that have minimal Lipschitz constant. Our main result is the existence of a geodesic lamination that is “maximally stretched” by all such maps when the minimal constant is at least 1. As an application, we generalize two-dimensional results and constructions of Thurston and extend his asymmetric metric on Teichmüller space to a geometrically finite setting and to higher dimension. Another application is to actions of discrete subgroups Γ of PO(n, 1) × PO(n, 1) on PO(n, 1) by right and left multiplication: we give a double properness criterion for such actions, and prove that for a large class of groups Γ the action remains properly discontinuous after any small deformation of Γ inside PO(n, 1) × PO(n, 1). Contents 1. Introduction 2 2. Preliminary results 10 3. An equivariant Kirszbraun–Valentine theorem for amenable groups 18 4. The relative stretch locus 23 5. An optimized, equivariant Kirszbraun–Valentine theorem 40 6. Continuity of the minimal Lipschitz constant 52 7. Application to properly discontinuous actions on G = PO(n, 1) 66 8. A generalization of the Thurston metric on Teichmüller space 76 9. The stretch locus in dimension 2 80 10. Examples and counterexamples 90 Appendix A. Some hyperbolic trigonometry 104 Appendix B. Converging fundamental domains 108 Appendix C. Open questions 117 References 118 The authors were partially supported by the Agence Nationale de la Recherche under the grants ANR-11-BS01-013: DiscGroup (“Facettes des groupes discrets”) and ANR-09BLAN-0116-01: ETTT (“Extension des théories de Teichmüller–Thurston”), and through the Labex CEMPI (ANR-11-LABX-0007-01). 1 2 FRANÇOIS GUÉRITAUD AND FANNY KASSEL 1. Introduction For n ≥ 2, let G be the group PO(n, 1) = O(n, 1)/{±1} of isometries of the real hyperbolic space Hn . In this paper we consider pairs (j, ρ) of representations of a discrete group Γ0 into G with j injective, discrete, and j(Γ0 )\Hn geometrically finite, and we investigate the set of (j, ρ)-equivariant Lipschitz maps Hn → Hn with minimal Lipschitz constant. We develop applications, both to properly discontinuous actions on G and to the geometry of some generalized Teichmüller spaces (via a generalization of Thurston’s asymmetric metric). Some of our main results, in particular Theorems 1.8 and 1.11, Corollary 1.12, and Theorem 7.1, were initially obtained in [Ka1, Chap. 5] in the case n = 2 with j convex cocompact. 1.1. Equivariant maps of Hn with minimal Lipschitz constant. Let Γ0 be a discrete group. We say that a representation j ∈ Hom(Γ0 , G) of Γ0 in G = PO(n, 1) is convex cocompact (resp. geometrically finite) if it is injective with a discrete image j(Γ0 ) ⊂ G and if the convex core of the hyperbolic orbifold M := j(Γ0 )\Hn is compact (resp. has finite m-volume, where m ≤ n is its dimension). In this case, the group Γ0 identifies with the (orbifold) fundamental group of M . Parabolic elements in j(Γ0 ) correspond to cusps in M ; they do not exist if j is convex cocompact. We refer to Section 2.1 for full definitions. Let j ∈ Hom(Γ0 , G) be geometrically finite and let ρ ∈ Hom(Γ0 , G) be another representation, not necessarily injective or discrete. In this paper we examine (j, ρ)-equivariant Lipschitz maps of Hn , i.e. Lipschitz maps f : Hn → Hn such that Hn . f (j(γ) · x) = ρ(γ) · f (x) for all γ ∈ Γ0 and x ∈ A constant that naturally appears is the infimum of all possible Lipschitz constants of such maps:  (1.1) C(j, ρ) := inf Lip(f ) | f : Hn → Hn (j, ρ)-equivariant . A basic fact (Section 4.2) is that C(j, ρ) < +∞ unless there is an obvious obstruction, namely an element γ ∈ Γ0 with j(γ) parabolic and ρ(γ) hyperbolic. Here we use the usual terminology: a nontrivial element of G is elliptic if it fixes a point in Hn , parabolic if it fixes exactly one point on the boundary at infinity of Hn , and hyperbolic otherwise (in which case it preserves a unique geodesic line in Hn ). To make the statements of our theorems simpler, we include the identity element of G among the elliptic elements. We shall always assume C(j, ρ) < +∞. Then there exists a (j, ρ)-equivariant map f : Hn → Hn with minimal constant C(j, ρ), except possibly if the group ρ(Γ0 ) has a unique fixed point on the boundary at infinity ∂∞ Hn of Hn (see Section 4.4, as well as Sections 10.2 and 10.3 for examples). We fix once and for all a geometrically finite representation j0 ∈ Hom(Γ0 , G). Dealing with cusps is a substantial aspect of the paper; we make the following definitions, which are relevant only when j is not convex cocompact. Definition 1.1. We say that j ∈ Hom(Γ0 , G) has the cusp type of j0 if for any γ ∈ Γ0 , the element j(γ) is parabolic if and only if j0 (γ) is parabolic. We say that ρ ∈ Hom(Γ0 , G) is cusp-deteriorating with respect to j (or that MAXIMALLY STRETCHED LAMINATIONS 3 the pair (j, ρ) is cusp-deteriorating) if for any γ ∈ Γ0 with j(γ) parabolic, the element ρ(γ) is elliptic. In the sequel, we will always assume that j has the cusp type of the fixed representation j0 . Therefore, we will often just use the phrase “ρ cuspdeteriorating”, leaving j implied. Of course, this is an empty condition when j is convex cocompact. 1.2. The stretch locus. The main point of the paper is to initiate a systematic study of the stretch locus of equivariant maps of Hn with minimal Lipschitz constant. Definition 1.2. Let f : Hn → Hn be a (j, ρ)-equivariant map realizing the minimal Lipschitz constant C(j, ρ). The stretch locus Ef of f is the (j(Γ0 )-invariant) set of points x ∈ Hn such that the restriction of f to any neighborhood of x in Hn has Lipschitz constant C(j, ρ) (and no smaller). It follows from our study that the geometry of the stretch locus depends on the value of C(j, ρ). We prove the following. Theorem 1.3. Let (j, ρ) ∈ Hom(Γ0 , G)2 be a pair of representations with j geometrically finite and C(j, ρ) < +∞. Assume that there exists a (j, ρ)equivariant map f : Hn → Hn with minimal Lipschitz constant C(j, ρ), and let E(j, ρ) be the intersection of the stretch loci of all such maps. Then • E(j, ρ) is nonempty, except possibly if C(j, ρ) = 1 and ρ is not cuspdeteriorating (see Section 10.8 for an example); • there exists an “optimal” (j, ρ)-equivariant, C(j, ρ)-Lipschitz map f0 : Hn → Hn whose stretch locus is exactly E(j, ρ); • if C(j, ρ) > 1 (resp. if C(j, ρ) = 1 and ρ is cusp-deteriorating), then E(j, ρ) is a geodesic lamination (resp. contains a k-dimensional geodesic lamination for some k ≥ 1) with the following properties: – the lamination is “maximally stretched” by any (j, ρ)-equivariant map f : Hn → Hn with minimal Lipschitz constant C(j, ρ), in the sense that f multiplies all distances by C(j, ρ) on every leaf of the lamination; – the projection to j(Γ0 )\Hn of the lamination is compact and contained in the convex core. By a geodesic lamination (resp. a k-dimensional geodesic lamination) of Hn we mean a nonempty disjoint union L of geodesic lines (resp. k-planes) of Hn , called leaves, that is closed in the space of geodesic lines (resp. kplanes) of Hn . The image in j(Γ0 )\Hn of a j(Γ0 )-invariant geodesic lamination of Hn is a geodesic lamination in the usual sense. We note that an “optimal” map f0 is usually not unique since it can be slightly perturbed outside of the stretch locus E(j, ρ). In Section 9.1 we explain how, in the case that n = 2 and that j and ρ are both injective and discrete with finite covolume, Theorem 1.3 follows from Thurston’s theory [T2] of the asymmetric metric on Teichmüller space. More precise results in the case C(j, ρ) = 1 are given (for arbitrary n) in Section 5, leading to a reasonable understanding of the stretch locus when C(j, ρ) ≥ 1. On the other hand, for C(j, ρ) < 1 the stretch locus is more mysterious; we make the following conjecture. 4 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Conjecture 1.4. For n = 2, let (j, ρ) ∈ Hom(Γ0 , G)2 be a pair of representations with j geometrically finite and let E(j, ρ) be the intersection of the stretch loci of all (j, ρ)-equivariant maps with minimal Lipschitz constant C(j, ρ) ∈ (0, 1). Then E(j, ρ) is the lift to H2 of a gramination (contraction of “graph” and “lamination”) of M := j(Γ0 )\H2 , by which we mean the union of a finite set F and of a lamination in M r F with finitely many leaves terminating on F . We discuss this conjecture and provide evidence for it in Section 9.4. We also examine the behavior of the minimal Lipschitz constant C(j, ρ) and of the stretch locus E(j, ρ) under small deformations of j and ρ. We prove that the constant C(j, ρ) behaves well for convex cocompact j. Proposition 1.5. The map (j, ρ) 7→ C(j, ρ) is continuous on the set of pairs (j, ρ) ∈ Hom(Γ0 , G)2 with j convex cocompact. Here Hom(Γ0 , G) is endowed with the natural topology (see Section 6). For j geometrically finite but not convex cocompact, the constant C(j, ρ) behaves in a more chaotic way. For n ≤ 3, we prove that continuity holds when C(j, ρ) > 1 and that the condition C(j, ρ) < 1 is open on the set of pairs (j, ρ) with j geometrically finite of fixed cusp type and ρ cuspdeteriorating (Proposition 6.1). However, semicontinuity (both upper and lower) fails when C(j, ρ) ≤ 1 (see Sections 10.6 and 10.7). For n ≥ 4, the condition C(j, ρ) < 1 is not open and upper semicontinuity fails for any value of C(j, ρ) (see Sections 10.10 and 10.11). This is related to the fact that geometrical finiteness itself is not an open condition when n ≥ 4, even under fixed cusp type. We refer to Section 6 for a more thorough discussion. It is natural to hope that when the function (j, ρ) 7→ C(j, ρ) is continuous the map (j, ρ) 7→ E(j, ρ) should be at least upper semicontinuous with respect to the Hausdorff topology. We prove this semicontinuity in dimension n = 2 when C(j, ρ) > 1 and ρ(Γ0 ) does not have a unique fixed point at infinity (Proposition 9.5), generalizing a result of Thurston [T2]. 1.3. Extension of Lipschitz maps in Hn . In order to prove Theorem 1.3, following the approach of [Ka1], we develop the extension theory of Lipschitz maps in Hn and, more precisely, refine an old theorem of Kirszbraun [Kir] and Valentine [V], which states that any Lipschitz map from a compact subset of Hn to Hn with Lipschitz constant ≥ 1 can be extended to a map from Hn to itself with the same Lipschitz constant. We prove the following. Theorem 1.6. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations of Γ0 in G with j geometrically finite. (1) For any j(Γ0 )-invariant subset K 6= ∅ of Hn and any (j, ρ)-equivariant map ϕ : K → Hn with Lipschitz constant C0 ≥ 1, there exists a (j, ρ)equivariant extension f : Hn → Hn of ϕ with Lipschitz constant C0 . (2) For any j(Γ0 )-invariant subset K 6= ∅ of Hn whose image in j(Γ0 )\Hn is bounded and for any (j, ρ)-equivariant map ϕ : K → Hn with Lipschitz constant C0 < 1, there exists a (j, ρ)-equivariant extension f : Hn → Hn of ϕ with Lipschitz constant < 1. The point of Theorem 1.6 is that we can extend ϕ in an equivariant way, without increasing the Lipschitz constant C0 if it is ≥ 1, and still keeping it MAXIMALLY STRETCHED LAMINATIONS 5 < 1 if it was originally < 1. Moreover, we control the local Lipschitz constant when C0 ≥ 1 (Theorem 5.1). Intuitively (at least when C0 > 1), the idea is that one should be able to choose an f whose stretch locus consists of stretch segments with endpoints in K, moved apart by a factor C0 under ϕ. We believe (see Appendix C.1) that in Theorem 1.6.(2) the best Lipschitz constant of an equivariant extension f could be bounded away from 1 in terms of C0 alone. This would allow to remove the assumption that K has a bounded image in j(Γ0 )\Hn , using the Arzelà–Ascoli theorem (see Section 5.4). In Theorem 5.1 below we refine Theorem 1.6 and actually allow K to be the empty set. (In this case we define C0 to be the supremum of ratios λ(ρ(γ))/λ(j(γ)) for γ ∈ Γ0 with j(γ) hyperbolic, where (1.2) λ(g) := infn d(x, g · x) x∈H Hn is the translation length of g in if g ∈ G is hyperbolic, and 0 if g is parabolic or elliptic.) Theorem 1.3 is equivalent to the case K = ∅ in Theorem 5.1. Theorem 1.6 and its refinements such as Theorem 5.1 should be compared to a number of recent results in the theory of extension of Lipschitz maps: see Lang–Schröder [LS], Lang–Pavlović–Schröder [LPS], Buyalo–Schröder [BuS], Lee–Naor [LN], etc. We also point to [DGK] for an infinitesimal version. 1.4. An application to the study of complete manifolds locally modeled on G = PO(n, 1). One important motivation for examining equivariant Lipschitz maps of minimal Lipschitz constant is the link with certain manifolds locally modeled on G, namely quotients of G by discrete subgroups of G × G acting properly discontinuously and freely on G by right and left multiplication: (g1 , g2 ) · g = g2 gg1−1 . This link was first noticed in [Sa], then developed in [Ka1]. For n = 2, the manifolds locally modeled on PO(2, 1)0 ∼ = PSL2 (R) are the anti-de Sitter 3-manifolds, or Lorentzian 3-manifolds of constant negative curvature, which are Lorentzian analogues of the hyperbolic 3-manifolds. For n = 3, the manifolds locally modeled on PO(3, 1)0 ∼ = PSL2 (C) are the 3-dimensional complex holomorphic-Riemannian manifolds of constant nonzero curvature, which can be considered as complex analogues of the hyperbolic 3-manifolds (see [DZ] for details). For n = 2, all compact manifolds locally modeled on G are quotients of G by discrete subgroups of G × G, up to a finite covering [Kl, KR]; for n = 3, a similar property has been conjectured in [DZ] (see Section 7.8). Recall that the quotient of G by a discrete group Γ is Hausdorff (resp. is a manifold) if and only if the action of Γ on G is properly discontinuous (resp. properly discontinuous and free). Let Γ be a discrete subgroup of G × G acting properly discontinuously on G by right and left multiplication. The key point here is that if Γ is torsion-free, then it is a graph of the form (1.3) Γj,ρ 0 = {(j(γ), ρ(γ)) | γ ∈ Γ0 } where Γ0 is a discrete group and j, ρ ∈ Hom(Γ0 , G) are representations with j injective and discrete (up to switching the two factors): this was proved in [KR] for n = 2, and in [Ka2] (strengthening partial results of [Ko2]) for general rank-one groups G. The group Γ is thus isomorphic to the fundamental 6 FRANÇOIS GUÉRITAUD AND FANNY KASSEL group of the hyperbolic n-manifold M := j(Γ0 )\Hn , and the quotient of G by Γ = Γj,ρ 0 is compact if and only if M is compact (by a classical cohomological argument, see Section 7.7). In general, if Γ is finitely generated, the Selberg lemma [Se, Lem. 8] ensures the existence of a finite-index subgroup ρ,j of Γ that is torsion-free, hence of the form Γj,ρ 0 or Γ0 as above. As before, we set λ(g) := inf x∈Hn d(x, g · x) for any g ∈ G. The following terminology is partly adopted from Salein [Sa]. Definition 1.7. A pair (j, ρ) ∈ Hom(Γ0 , G)2 is called admissible if the action of Γj,ρ 0 on G by right and left multiplication is properly discontinuous. It is called left (resp. right ) admissible if, in addition, there exists γ ∈ Γ0 such that λ(j(γ)) > λ(ρ(γ)) (resp. λ(j(γ)) < λ(ρ(γ))). By [Sa] (for n = 2) and [Ka2] (for general n), an admissible pair (j, ρ) is either left admissible or right admissible; it cannot be both. Without loss of generality, we may restrict to left admissible pairs. For a pair (j, ρ) ∈ Hom(Γ0 , G)2 with j injective and discrete, we set (1.4) C ′ (j, ρ) := sup γ∈Γ0 with j(γ) hyperbolic λ(ρ(γ)) λ(j(γ)) if the group j(Γ0 ) contains hyperbolic elements, and C ′ (j, ρ) := C(j, ρ) otherwise (case of an elementary group fixing a point in Hn or a unique point in ∂∞ Hn ). With this notation, a consequence of Theorem 1.3 is the following (double) left admissibility criterion, which was first established in [Ka1, Chap. 5] for n = 2 and convex cocompact j. Theorem 1.8. Let Γ0 be a discrete group. A pair (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite is left admissible if and only if (1) the infimum C(j, ρ) of Lipschitz constants of (j, ρ)-equivariant Lipschitz maps f : Hn → Hn is < 1. This is equivalent to the condition that (2) the supremum C ′ (j, ρ) of ratios of translation lengths λ(ρ(γ))/λ(j(γ)) for γ ∈ Γ0 with j(γ) hyperbolic is < 1, except possibly in the degenerate case where ρ(Γ0 ) has a unique fixed point in ∂∞ Hn and ρ is not cusp-deteriorating. In particular, left admissibility is always equivalent to (1) and to (2) if j is convex cocompact. In other words, Theorem 1.8 states that (j, ρ) is left admissible if and only if “ρ is uniformly contracting with respect to j”; this uniform contraction can be expressed in two equivalent ways: in terms of Lipschitz maps (condition (1)) and in terms of ratios of lengths (condition (2)). Note that the inequality C ′ (j, ρ) ≤ C(j, ρ) is always true (see (4.1)). It can occur quite generically that C ′ (j, ρ) < C(j, ρ) below 1, even when j and ρ are both convex cocompact (see Sections 10.4 and 10.5). In the degenerate case where ρ(Γ0 ) has a unique fixed point in ∂∞ Hn and ρ is not cusp-deteriorating, it can also happen that C ′ (j, ρ) < C(j, ρ) = 1 (see Section 10.9). However, when we are not in this degenerate case, it follows from Theorem 1.3 that C(j, ρ) ≥ 1 implies C ′ (j, ρ) = C(j, ρ) (Corollary 1.12); in particular, C ′ (j, ρ) < 1 implies C(j, ρ) < 1. MAXIMALLY STRETCHED LAMINATIONS 7 In Theorem 1.8, the fact that if C(j, ρ) < 1 then (j, ρ) is left admissible easily follows from the general properness criterion of Benoist [Be1] and Kobayashi [Ko3] (see Section 7.3); this was first observed by Salein [Sa]. Conversely, suppose that (j, ρ) is left admissible. Then C ′ (j, ρ) ≤ 1 (because (j, ρ) cannot be simultaneously left and right admissible, as mentioned above); the point is to prove that C ′ (j, ρ) = 1 is impossible. This is done in Section 7.5, following the strategy of [Ka1]: we use Theorem 1.3 to establish that C ′ (j, ρ) = 1 implies, not only that C(j, ρ) = 1 (Corollary 1.12), but also that the stretch locus E(j, ρ) contains a geodesic line of Hn ; it is then easy to find a sequence of elements of Γ0 contradicting proper discontinuity by following this geodesic line. We note that in Theorem 1.8 it is necessary for Γ0 to be finitely generated: indeed, for infinitely generated Γ0 there exist left admissible pairs (j, ρ) ∈ Hom(Γ0 , G)2 of injective and discrete representations that satisfy C(j, ρ) = C ′ (j, ρ) = 1 (see Section 10.1). It would be interesting to know whether Theorem 1.8 still holds for finitely generated but geometrically infinite j (Appendix C.2). Here is a consequence of Proposition 1.5 and Theorem 1.8. Theorem 1.9. Let G = PO(n, 1) and let Γ be a discrete subgroup of G × G acting properly discontinuously, freely, and cocompactly on G by right and left multiplication. There is a neighborhood U ⊂ Hom(Γ, G × G) of the natural inclusion such that for any ϕ ∈ U , the group ϕ(Γ) is discrete in G × G and acts properly discontinuously, freely, and cocompactly on G. A particular case of Theorem 1.9 was proved by Kobayashi [Ko4], namely the so-called “special standard” case (terminology of [Z]) where Γ is contained in G × {1}; for n = 3, this was initially proved by Ghys [Gh]. The general case for n = 2 follows from the completeness of compact anti-de Sitter manifolds, due to Klingler [Kl], and from the Ehresmann–Thurston principle on the deformation of holonomies of (G, X)-structures on compact manifolds. An interpretation of Theorem 1.9 in terms of (G, X)-structures is given in Section 7.8. We extend Theorem 1.9 to proper actions on G that are not necessarily cocompact, using the following terminology. Definition 1.10. We say that a quotient of G by a discrete subgroup Γ of G × G is convex cocompact (resp. geometrically finite) if, up to switching the two factors and to passing to a finite-index subgroup, Γ is of the form Γj,ρ 0 as in (1.3) with j convex cocompact (resp. geometrically finite) and (j, ρ) left admissible. This terminology is justified by the fact that convex cocompact (resp. geometrically finite) quotients of PO(n, 1) fiber, with compact fiber O(n), over convex cocompact (resp. geometrically finite) hyperbolic manifolds, up to a finite covering (see Proposition 7.2 or [DGK, Th. 1.2]). We prove the following extension of Theorem 1.9 (see also [Ka3] for a p-adic analogue). Theorem 1.11. Let G = PO(n, 1) and let Γ be a discrete subgroup of G × G acting properly discontinuously on G, with a convex cocompact quotient. There is a neighborhood U ⊂ Hom(Γ, G × G) of the natural inclusion 8 FRANÇOIS GUÉRITAUD AND FANNY KASSEL such that for any ϕ ∈ U , the group ϕ(Γ) is discrete in G × G and acts properly discontinuously on G, with a convex cocompact quotient. Moreover, if the quotient of G by Γ is compact, then so is the quotient of G by ϕ(Γ) for ϕ ∈ U . If the quotient of G by Γ is a manifold, then so is the quotient of G by ϕ(Γ) for ϕ ∈ U close enough to the natural inclusion. Note that Theorem 1.11 is not true if we replace “convex cocompact” with “geometrically finite”: for a given j with cusps, the constant representation ρ = 1 may have small deformations ρ′ that are not cusp-deteriorating, hence for which (j, ρ′ ) cannot be admissible. However, we prove that Theorem 1.11 is true in dimension n = 2 or 3 if we restrict to deformations of Γ of the form Γj,ρ 0 with geometrically finite j and cusp-deteriorating ρ (Theorem 7.7); a similar statement is not true for n > 3 (see Section 10.11). Theorem 1.8 implies that any geometrically finite quotient of G is sharp in the sense of [KK]; moreover, by Theorem 1.11, if the quotient is convex cocompact, then it remains sharp after any small deformation of the discrete group Γ inside G × G (see Section 7.7). This implies the existence of an infinite discrete spectrum for the (pseudo-Riemannian) Laplacian on any geometrically finite quotient of G: see [KK]. 1.5. A generalization of Thurston’s asymmetric metric on Teichmüller space. Let S be a hyperbolic surface of finite volume. The Teichmüller space T (S) of S can be defined as the space of conjugacy classes of geometrically finite representations of Γ0 := π1 (S) into PO(2, 1) ∼ = PGL2 (R) corresponding to finite-volume hyperbolic surfaces homeomorphic to S. Thurston [T2] proved that C(j, ρ) = C ′ (j, ρ) ≥ 1 for all j, ρ ∈ T (S); the function dTh := log C = log C ′ : T (S) × T (S) −→ R+ is the Thurston metric on T (S), which was introduced and extensively studied in [T2]. It is an “asymmetric metric”, in the sense that dTh (j, ρ) ≥ 0 for all j, ρ ∈ T (S), that dTh (j, ρ) = 0 if and only if j = ρ in T (S), that dTh (j1 , j3 ) ≤ dTh (j1 , j2 ) + dTh (j2 , j3 ) for all ji ∈ T (S), but that in general dTh (j, ρ) 6= dTh (ρ, j). We generalize Thurston’s result that C(j, ρ) = C ′ (j, ρ) to any dimension n ≥ 2, to geometrically finite representations j that are not necessarily of finite covolume, and to representations ρ that are not necessarily injective or discrete: as a consequence of Theorem 1.3, we obtain the following. Corollary 1.12. For G = PO(n, 1), let (j, ρ) ∈ Hom(Γ0 , G)2 be a pair of representations with j geometrically finite. If C(j, ρ) ≥ 1, then (1.5) C(j, ρ) = C ′ (j, ρ), except possibly in the degenerate case where C(j, ρ) = 1, where ρ(Γ0 ) has a unique fixed point in ∂∞ Hn , and where ρ is not cusp-deteriorating. In particular, C(j, ρ) ≥ 1 always implies (1.5) if j is convex cocompact, and C ′ (j, ρ) ≥ 1 always implies (1.5) without any assumption on j. In order to generalize the Thurston metric, we consider a nonelementary hyperbolic manifold M of any dimension n ≥ 2 and let T (M ) be the set of conjugacy classes of geometrically finite representations of Γ0 := π1 (M ) into G = PO(n, 1) with the homeomorphism type and cusp type of M . We allow MAXIMALLY STRETCHED LAMINATIONS 9 M to have infinite volume, otherwise T (M ) is trivial for n > 2 by Mostow rigidity. We set   δ(ρ) (1.6) dTh (j, ρ) := log C(j, ρ) δ(j) for all j, ρ ∈ T (M ), where δ : T (M ) → (0, n − 1] is the critical exponent (see (8.1)) giving the exponential growth rate of orbits in Hn or, equivalently in this setting, the Hausdorff dimension of the limit set [S1, S2]. It easily follows from the definition of δ that dTh (j, ρ) ≥ 0 for all j, ρ ∈ T (M ) (Lemma 8.3). Let T (M )Zs be the subset of T (M ) consisting of elements j such that the Zariski closure of j(Γ0 ) in G is simple (for instance equal to G itself). We prove the following. Proposition 1.13. The function dTh defines an asymmetric metric on T (M )Zs . The point of Proposition 1.13 is that dTh (j, ρ) = 0 implies j = ρ on T (M )Zs . On the other hand, for convex cocompact M , it follows from work of Burger [Bu, Th. 1] (see also [BCLS]) that   δ(ρ) ′ ′ dTh (j, ρ) := log C (j, ρ) δ(j) defines an asymmetric metric on T (M )Zs . Kim [Kim, Cor. 3] also proved that if log C ′ (j, ρ) = 0 and δ(j) = δ(ρ), then j = ρ in T (M )Zs . By Corollary 1.12, the asymmetric metrics dTh and d′Th are equal on the set   (j, ρ) ∈ T (M )2Zs | C(j, ρ) ≥ 1 = (j, ρ) ∈ T (M )2Zs | C ′ (j, ρ) ≥ 1 . However, they differ in general (see Sections 10.4 and 10.5). It would be interesting to compare them. In dimension n ≤ 3 the asymmetric metric dTh is always continuous, and in dimension n ≥ 4 it is continuous when M is convex cocompact (Lemma 8.1). 1.6. Organization of the paper. Section 2 contains reminders and basic facts on geometrical finiteness, Lipschitz maps, and convex interpolation in the real hyperbolic space Hn . In Section 3 we recall the classical Kirszbraun– Valentine theorem and establish an equivariant version of it for amenable groups. We then derive general properties of the stretch locus in Section 4. In Section 5 we prove an optimized, equivariant Kirszbraun–Valentine theorem for geometrically finite representations of discrete groups; this yields in particular Theorems 1.3 and 1.6, as well as Corollary 1.12. In Section 6 we examine the continuity properties of the minimal Lipschitz constant C(j, ρ); in particular, we prove Proposition 1.5. In Section 7 we apply the theory to properly discontinuous actions on G = PO(n, 1) (proving Theorems 1.8, 1.9, and 1.11), and in Section 8 we generalize Thurston’s asymmetric metric on Teichmüller space (proving Proposition 1.13). In Section 9 we focus on the case n = 2: we recover and extend results of Thurston for C(j, ρ) > 1, and discuss the nature of the stretch locus for C(j, ρ) < 1. Finally, in Section 10 we give a number of examples and counterexamples designed to make the theory more concrete while pointing out some subtleties. We collect useful 10 FRANÇOIS GUÉRITAUD AND FANNY KASSEL formulas in Appendix A, technical facts on geometrically finite representations in Appendix B, and open questions in Appendix C. Note. We have tried, inside each section, to clearly separate the arguments needed for the convex cocompact case from the ones specific to the cusps. Skipping the latter should decrease the length of the paper substantially. Acknowledgements. We are grateful to Maxime Wolff for his comments on a preliminary version of this paper, to Jeff Danciger for numerous discussions on related topics, and to Samuel Tapie for his indications on the Bowen–Margulis–Sullivan measure. We are indebted to Marc Burger for the idea of introducing the correcting factor δ(ρ)/δ(j) in the definition of dTh (in an earlier version of this paper we had to restrict to the case δ(j) = δ(ρ)). We would like to thank him for interesting discussions on the two possible generalizations dTh and d′Th of the Thurston metric. We are grateful to an anonymous referee for carefully reading the manuscript and making many valuable suggestions. Finally, we thank the University of Chicago for its support and the Institut CNRS-Pauli (UMI 2842) in Vienna for its hospitality. 2. Preliminary results In this section we recall a few well-known facts and definitions on geometrically finite hyperbolic orbifolds, on Lipschitz constants, and on barycenters in the real hyperbolic space Hn . We also expand on the notion of cuspdeterioration introduced in Definition 1.1. In the whole paper, G is the full group PO(n, 1) = O(n, 1)/{±1} of isometries of Hn . If n is even, then G identifies with SO(n, 1). 2.1. Geometrical finiteness. Let j ∈ Hom(Γ0 , G) be an injective representation of a discrete group Γ0 , with j(Γ0 ) discrete. The quotient M := j(Γ0 )\Hn is a smooth, n-dimensional orbifold; it is a manifold if and only if Γ0 is torsion-free. The convex core of M is the smallest closed convex subset of M containing all closed geodesics; its preimage in Hn is the convex hull of the limit set Λj(Γ0 ) ⊂ ∂∞ Hn of j(Γ0 ). (The convex hull is empty only in the degenerate case where the group j(Γ0 ) has a fixed point in Hn or a unique fixed point in ∂∞ Hn ; we do not exclude this case.) Following [Bo1], we will say that the injective and discrete representation j is geometrically finite if Γ0 is finitely generated and if for any ε > 0, the ε-neighborhood of the convex core of M has finite volume. In dimension n = 2, any injective and discrete representation in G of a finitely generated group is geometrically finite. In general, j is geometrically finite if and only if the convex core of M is contained in the union of a compact set and of finitely many disjoint cusps, whose boundaries have compact intersection with the convex core. We now explain what we mean by cusp, following [Bo1]. Let B be a horoball of Hn , centered at a point ξ ∈ ∂∞ Hn , and let S ⊂ Γ0 be the stabilizer of B under j. The group j(S) is discrete (possibly trivial) and consists of nonhyperbolic elements. It preserves the horosphere ∂B ≃ Rn−1 and acts on it by affine Euclidean isometries. By the first Bieberbach theorem (see [Bo1, Th. 2.2.5]), there is a finite-index normal subgroup S ′ of S that is isomorphic to Zm for some 0 ≤ m < n, and whose index in S is bounded by some ν(n) ∈ N depending only on the dimension n; we have m ≥ 1 if MAXIMALLY STRETCHED LAMINATIONS 11 and only if S contains a parabolic element. The group j(S) preserves and acts cocompactly on some m-dimensional affine subspace V of ∂B ≃ Rn−1 , unique up to translation; the subgroup j(S ′ ) acts on V by translation. Let HV be the closed (m + 1)-dimensional hyperbolic subspace of Hn containing ξ in its boundary such that HV ∩ ∂B = V, and let π : Hn → HV be the closest-point projection (see Figure 1). The group j(S) preserves the convex set C := π −1 (HV ∩ B) ⊂ Hn . Following [Bo1], we say that the image of C in M is a cusp if m ≥ 1 and C ∩ j(γ) · C = ∅ for all γ ∈ Γ0 r S. The cusp is then isometric to j(S)\C; its intersection with the convex core of M is contained in j(S)\B ′ for some horoball B ′ ⊃ B. The integer m is called the rank of the cusp. (ξ = ∞) j(S ′ ) HV B ∂B V C ∂∞ H3 Figure 1. A rank-one cusp centered at ξ = ∞ in the upper half-space model of H3 . The limit set is contained in {ξ} ∪ ∂∞ (H3 r C). When the convex core of M is nonempty, we may assume that it contains the image of V, after possibly replacing B by some smaller horoball and V by some translate. We shall use the following description. Fact 2.1. If j is geometrically finite, then M = j(Γ0 )\Hn is the union of a closed subset M ′ and of finitely many disjoint quotients j(Si )\Bi , where Bi is a horoball of Hn and j(Si ) a discrete group of isometries of Bi containing a parabolic element, such that • the intersection of M ′ with the convex core of M is compact; • for any i we have M ′ ∩ (j(Si )\Bi ) = j(Si )\∂Bi ; in particular, the intersection of j(Si )\∂Bi with the convex core of M is compact; • for any i the intersection in Hn of Bi with the preimage N of the convex core of M is the convex hull of ∂Bi ∩ N , and j(Si )\(∂Bi ∩ N ) is compact. Definition 2.2. We shall call the intersections of the sets j(Si )\Bi with the convex core of M standard cusp regions. 12 FRANÇOIS GUÉRITAUD AND FANNY KASSEL If j is geometrically finite, then the complement of the convex core of M has finitely many connected components, called the funnels of M . By definition, j is convex cocompact if it is geometrically finite with no cusp; when Γ0 is infinite, this is equivalent to the convex core being nonempty and compact. The set of convex cocompact representations is open in Hom(Γ0 , G) (see [Bo2, Prop. 4.1] or Proposition B.1). In Sections 4 and 5, we shall consider a j(Γ0 )-invariant subset K of Hn whose image in M is compact. We shall then use the following notation. Notation 2.3. In the rest of the paper, Conv(K) ⊂ Hn denotes: • the convex hull of K if K is nonempty, • the preimage in Hn of the convex core of M = j(Γ0 )\Hn if K is empty and the convex core is nonempty (leaving j implicit), • any nonempty j(Γ0 )-invariant convex subset of Hn if K and the convex core of M = j(Γ0 )\Hn are both empty (case when j(Γ0 ) is an elementary group fixing a point in Hn or a unique point in ∂∞ Hn ). In all three cases the set Conv(K) is nonempty and contains the preimage in Hn of the convex core of M . In Fact 2.1, we can take M ′ and the Bi with the following properties: • M ′ contains the (compact) image of K in M ; • the intersection of M ′ with the image of Conv(K) in M is compact; • for any i the set Bi ∩ Conv(K) is the convex hull of ∂Bi ∩ Conv(K), and j(Si )\(∂Bi ∩ Conv(K)) is compact. 2.2. Cusp deterioration. Let j ∈ Hom(Γ0 , G) be a geometrically finite representation and let B1 , . . . , Bc be horoballs of Hn whose projections j(Si )\Bi to M = j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions representing all the cusps, as in Section 2.1. Consider ρ ∈ Hom(Γ0 , G). Definition 2.4. For 1 ≤ i ≤ c, we say that ρ is deteriorating in Bi if ρ(Si ) contains only elliptic elements. Thus ρ is cusp-deteriorating in the sense of Definition 1.1 if and only if it is deteriorating in Bi for all 1 ≤ i ≤ c. Depending on whether ρ is deteriorating in Bi or not, we shall use the following classical fact with Γ′ = ρ(Si ). Fact 2.5 (see [Par, Th. III.3.1]). Let Γ′ be a finitely generated subgroup of G. (1) If all elements of Γ′ are elliptic, then Γ′ has a fixed point in Hn . (2) If all elements of Γ′ are elliptic or parabolic and if Γ′ contains at least one parabolic element, then Γ′ has a unique fixed point in the boundary at infinity ∂∞ Hn of Hn . Lemma 2.6. Let Γ′ be as in Fact 2.5.(2) and let wl : Γ′ → N be the word length function with respect to some fixed finite generating subset F ′ of Γ′ . Fix p ∈ Hn . • There exists R > 0 such that for all γ ′ ∈ Γ′ ,  d(p, γ ′ · p) ≤ 2 log 1 + wl(γ ′ ) + R. • If Γ′ is discrete in G, then there exists R′ > 0 such that for all γ ′ ∈ Γ′ ,  d(p, γ ′ · p) ≥ 2 log 1 + wl(γ ′ ) − R′ . MAXIMALLY STRETCHED LAMINATIONS 13 Proof. Let ξ ∈ ∂∞ Hn be the fixed point of Γ′ and let ∂B be the horosphere through p centered at ξ. For any q, q ′ ∈ ∂B, let d∂B (q, q ′ ) be the length of the shortest path from q to q ′ that is contained in ∂B. Then d∂B is a Euclidean metric on ∂B ≃ Rn−1 and   d∂B (q, q ′ ) ′ (2.1) d(q, q ) = 2 arcsinh 2 for all q, q ′ ∈ ∂B (see (A.3)). In particular, |d − 2 log(1 + d∂B )| is bounded on ∂B × ∂B. By the triangle inequality,   ′ d (p, f · p) · wl(γ ′ ) d∂B (p, γ ′ · p) ≤ max ∂B ′ ′ f ∈F γ′ Γ′ , for all ∈ which implies the first statement of the lemma. If Γ′ is discrete in G, then it acts properly discontinuously on ∂B and has a finite-index subgroup isomorphic to Zm (for some 0 < m < n), acting as a lattice of translations on some m-dimensional affine subspace V of the Euclidean space ∂B ≃ Rn−1 (see Section 2.1). In a Euclidean lattice, the norm of a vector is estimated, up to a bounded multiplicative factor, by its word length in any given finite generating set: therefore there exist c, Q > 0 such that d∂B (p, γ ′ · p) ≥ c wl(γ ′ ) − Q for all γ ′ ∈ Γ′ . The second statement of the lemma follows by using (2.1) and the properness of the function wl on Γ′ .  Here is a consequence of Lemma 2.6, explaining why the notion of cuspdeterioration naturally appears in our setting. Lemma 2.7. Let ρ ∈ Hom(Γ0 , G). If there exists a (j, ρ)-equivariant map f : Hn → Hn with Lipschitz constant < 1, then ρ is cusp-deteriorating with respect to j. Proof. Let f : Hn → Hn be a (j, ρ)-equivariant map. Suppose that ρ is not cusp-deteriorating. Then there is an element γ ∈ Γ0 such that j(γ) is parabolic and ρ(γ) is either parabolic or hyperbolic. Fix a point p ∈ Hn . By Lemma 2.6, we have d(p, j(γ k ) · p) ∼ 2 log k as k → +∞. If ρ(γ) is parabolic, then similarly d(f (p), ρ(γ k ) · f (p)) ∼ 2 log k, and if ρ(γ) is hyperbolic, then |d(f (p), ρ(γ k ) · f (p)) − k λ(ρ(γ))| is uniformly bounded (for instance by twice the distance from f (p) to the translation axis of ρ(γ) in Hn ). In both cases, we see that  d f (p), ρ(γ k ) · f (p) ≥ 1, lim sup d(p, j(γ k ) · p) k→+∞ hence the (j, ρ)-equivariant map f cannot have Lipschitz constant < 1.  2.3. Lipschitz constants. For any subset X of Hn and any map f from X to some metric space (Z, dZ ) (in practice, Hn or R), we denote by Lip(f ) = sup x,x′ ∈X, x6=x′ dZ (f (x), f (x′ )) d(x, x′ ) the Lipschitz constant of f . For any Y ⊂ X and any x ∈ X, we set LipY (f ) = Lip(f |Y ), Lipx (f ) = inf LipBx (r) (f ), r>0 14 FRANÇOIS GUÉRITAUD AND FANNY KASSEL where Bx (r) is the closed ball of radius r centered at x in Hn . We call Lipx (f ) the local Lipschitz constant of f at x. Remarks 2.8. (1) Let f be a C-Lipschitz map from a geodesic segment [x, x′ ] of Hn to Hn . If d(f (x), f (x′ )) = Cd(x, x′ ), then f “stretches maximally” [x, x′ ], in the sense that d(f (y), f (y ′ )) = Cd(y, y ′ ) for all y, y ′ ∈ [x, x′ ]. (2) Let X be a convex subset of Hn , covered by a collection of open sets Ut , t ∈ T . For any map f : X → Hn , Lip(f ) = sup LipX∩Ut (f ). t∈T (3) For any rectifiable path C in some subset X of Hn and for any map f : X → Hn , length(f (C )) ≤ sup Lipx (f ) · length(C ). x∈C Indeed, (1) follows from the fact that if the points x, y, y ′ , x′ lie in this order, then d(x, x′ ) = d(x, y) + d(y, y ′ ) + d(y ′ , x′ ) while d(f (x), f (x′ )) ≤ d(f (x), f (y)) + d(f (y), f (y ′ )) + d(f (y ′ ), f (x′ )) by the triangle inequality. To prove (2), we just need to check that the right-hand side is an upper bound for Lip(f ) (it is also clearly a lower bound). Any geodesic segment [p, q] ⊂ X can be divided into finitely many subsegments, each contained in one of the open sets Ut ; we use again the additivity of distances at the source and the subadditivity of distances at the target. Finally, (3) follows from the definition of the length of a path (obtained by summing up the distances between points of smaller and smaller subdivisions and taking a limit) and from the definition of the local Lipschitz constant. Lemma 2.9. The local Lipschitz constant function x 7→ Lipx (f ) is upper semicontinuous: for any converging sequence xk → x, Lipx (f ) ≥ lim sup Lipxk (f ). k→+∞ In particular, for any compact subset K of X, the supremum of Lipx (f ) for x ∈ K is achieved on some nonempty closed subset of K. Moreover, if X is convex, then (2.2) Lip(f ) = sup Lipx (f ). x∈X Proof. Upper semicontinuity follows from an easy diagonal extraction argument. The inequality Lip(f ) ≥ supx∈X Lipx (f ) is clear. The converse inequality for convex X follows from Remark 2.8.(3) where C is any geodesic segment [p, q] ⊂ X.  Note that the convexity of X is required for (2.2) to hold: for instance, an arclength-preserving map taking a horocycle X to a straight line is not even Lipschitz, although its local Lipschitz constant is everywhere 1. As a consequence of Lemma 2.9, the stretch locus of any Lipschitz map f : X → Hn is closed in X for the induced topology. Here we use the following terminology, which agrees with Definition 1.2. Definition 2.10. For any subset X of Hn and any Lipschitz map f : X → Hn , the stretch locus Ef of f is the set of points x ∈ X such that MAXIMALLY STRETCHED LAMINATIONS 15 ef of f is the union of Lipx (f ) = Lip(f ). The enhanced stretch locus E {(x, x) ∈ X × X | x ∈ Ef } and  (x, x′ ) ∈ X ×X | x 6= x′ and d(f (x), f (x′ )) = Lip(f ) d(x, x′ ) . ef to X are equal to Ef , but By Remark 2.8.(1), both projections of E ef records a little extra information, namely the positions of the maximally E stretched segments between points of the stretch locus Ef . 2.4. Barycenters in Hn . For any index set I equal to {1, 2, . . . , k} for some k ≥ 1 or to N∗ , and for any tuple α = (αi )i∈I of nonnegative reals summing up to 1, we set   X n I 2 n I (H )α := (pi ) ∈ (H ) αi d(p1 , pi ) < +∞ . i∈I This set contains at least all bounded sequences (pi ) ∈ (Hn )I , and it is just the direct product (Hn )k if k < +∞. The following result is classical, and actually holds in any CAT(0) space. Lemma 2.11. For any index set I equal to {1, 2, . . . , k} for some k ≥ 1 or to N∗ and for any tuple α = (αi )i∈I of nonnegative reals summing up to 1, the map mα : (Hn )Iα −→ Hn P taking (pi )i∈I to the minimizer of i∈I αi d( · , pi )2 is well defined and αi Lipschitz in its i-th entry: for any (pi ), (qi ) ∈ (Hn )Iα ,  X αi d(pi , qi ). (2.3) d mα (p1 , p2 , . . . ), mα (q1 , q2 , . . . ) ≤ i∈I Proof. Fix I and α = (αi )i∈I , and consider an element (pi ) ∈ (Hn )Iα . For any x ∈ Hn , X X 2 Φ(x) := αi d(x, pi )2 ≤ αi d(x, p1 ) + d(p1 , pi ) i∈I i∈I ≤ 2 Hn X i∈I  αi d(x, p1 )2 + d(p1 , pi )2 < +∞. The function Φ : → R thus defined is proper on Hn since it is bounded from below by any proper function αi d(·, pi )2 with αi > 0, and it achieves its minimum on the convex hull of the pi . Moreover, Φ is analytic: to see this on any ball B of Hn , note that the unweighted summands d(·, pi )2 for pi in a 1-neighborhood of B are analytic with derivatives (of any nonnegative order) bounded independently of i, while the other summands can be written φ2i + 2φi d(p1 , pi )+d(p1 , pi )2 , where φi := d(·, pi )−d(p1 , pi ) again is analytic on B, and φi and φ2i have their derivatives (of any nonnegative order) bounded independently of i. d2 2 On any unit-speed geodesic (xt )t∈R of Hn , we have dt 2 t=0 d(xt , pi ) ≥ 2. Indeed, let logx0 : Hn → Tx0 Hn be the inverse of the exponential map at x0 . Standard CAT(0) comparison inequalities with the Euclidean metric dEucl yield dEucl (logx0 (xt ), log x0 (pi ))2 ≤ d(xt , pi )2 16 FRANÇOIS GUÉRITAUD AND FANNY KASSEL for all t ∈ R; both sides are equal at t = 0, the first derivatives are equal at t = 0, and the left-hand side has second P derivative ≡ 2. It follows that t 7→ Φ(xt ) has second derivative at least 2 I αi = 2 everywhere. While mα (p1 , p2 , . . . ) is the minimizer of Φ, the point mα (q1 , q2 , . . . ) is the minimizer of Φ + Ψ, where X  −d(x, pi )2 + d(x, qi )2 αi . Ψ(x) := i∈I We claim that ψi : x 7→ −d(x, pi )2 + d(x, qi )2 is 2d(pi , qi )-Lipschitz: indeed, with (xt )t∈R as above, d dt t=0 ψi (xt ) 2d(x0 , pi ) cos p\ i x0 x1 − 2d(x0 , qi ) cos q\ i x0 x1  = 2dEucl πℓ (logx0 pi ), πℓ (logx0 qi ) ≤ 2d(pi , qi ), = where ℓ ⊂ Tx0 Hn is the tangent line to (xt )t∈R at t = 0, and πℓ : Tx0 Hn → ℓ isP the closest-point projection. Therefore, Ψ is Lipschitz with constant L := 2 i∈I αi d(pi , qi ). Thus, for any unit-speed geodesic ray (xt )t≥0 starting d Φ(xt ) > L, hence from x0 = mα (p1 , p2 , . . . ), as soon as t > L/2 we have dt d dt (Φ + Ψ)(xt ) > 0. The minimizer of Φ + Ψ is within L/2 from x0 , as promised.  Note that the map mα is G-equivariant: (2.4) mα (g · p1 , g · p2 , . . . ) = g · mα (p1 , p2 , . . . ) for all g ∈ G and (pi ) ∈ (Hn )Iα . It is also diagonal: (2.5) mα (p, p, . . . ) = p for all p ∈ Hn . If σ is a permutation of I, then (2.6) m(ασ(1) ,ασ(2) ,... ) (pσ(1) , pσ(2) , . . . ) = m(α1 ,α2 ,... ) (p1 , p2 , . . . ) 1 1 for all (pi ) ∈ (Hn )Iα ; in particular, mk := m( k ,..., k ) is symmetric in its k entries. Unlike barycenters in vector spaces however, m has only weak associativity properties: the best one can get is associativity over equal entries, i.e. if p1 = · · · = pk = p then m(α1 ,...,αk+1 ,... ) (p1 , . . . , pk+1 , . . . ) = m(α1 +···+αk ,αk+1 ,... ) (p, pk+1 , . . . ) . P We will often write i∈I αi pi for mα (p1 , p2 , . . . ). While (2.3) controls the displacement of a barycenter under a change of points, the following lemma deals with a change of weights. Lemma 2.12. Let I = {1, 2, . . . , k} for some k ≥ 1 or N∗ and let α = (αi )i∈I and β = (βi )i∈I be two nonnegative sequences, each summing up to 1. Consider points (pi )i∈I of Hn , all within distance R of some p ∈ Hn (in particular (pi ) ∈ (Hn )Iα ∩ (Hn )Iβ ). Then X  d mα (p1 , p2 , . . . ), mβ (p1 , p2 , . . . ) ≤ R |αi − βi |. i∈I Proof. For any i ∈ I, we set δi := αi − βi . The basic observation is that if for example δ1 > 0, then we can transfer δ1 units of weight from p1 to p, at the moderate cost of moving the barycenter by ≤ Rδ1 : by Lemma 2.11, the MAXIMALLY STRETCHED LAMINATIONS 17 point m := m(α1 ,α2 ,α3 ,... ) (p1 , p2 , p3 , . . . ) = m(δ1 ,β1,α2 ,α3 ,... ) (p1 , p1 , p2 , p3 , . . . ) lies at distance ≤ Rδ1 from m(δ1 ,β1 ,α2 ,α3 ,... ) (p, p1 , p2 , p3 , . . . ). Repeating this procedure for all indices i ≥ 1 such that δi > 0, we find that m lies at distance ≤ Rδ from m(δ,min{α1 ,β1 },min{α2 ,β2},min{α3 ,β3 },... ) (p, p1 , p2 , p3 , . . . ), P where we set δ := δi >0 δi . This expression is symmetric in α and β, so m P lies at distance ≤ 2Rδ = R |αi − βi | from m(β1 ,β2,... ) (p1 , p2 , . . . ).  2.5. Barycenters of Lipschitz maps and partitions of unity. Here is an easy consequence of Lemma 2.11. Lemma 2.13. Let I = {1, 2, . . . , k} for some k ≥ 1 or N∗ and let α = (αi )i∈I be a nonnegative sequence summing up to 1. Consider p ∈ X ⊂ Hn and a sequence of Lipschitz maps fi : X → Hn with (fi (p)) ∈ (Hn )Iα and with (Lip(fi ))i∈I bounded. Then the map X f= αi fi : x 7−→ mα (f1 (x), f2 (x), . . . ) i∈I is well defined on X and satisfies X Lipx (f ) ≤ αi Lipx (fi ) and i∈I LipY (f ) ≤ X αi LipY (fi ) i∈I for all x ∈ Y ⊂ X. In particular, if Lip(fi ) = C = Lip(f ) for all i ∈ I, then the (enhanced) stretch locus of f (Definition 2.10) is contained in the intersection of the (enhanced) stretch loci of the maps fi . Proof. We first note that (fi (x)) ∈ (Hn )Iα for any x ∈ Hn . Indeed, using the triangle inequality and the general inequality (a + b + c)2 ≤ 3 (a2 + b2 + c2 ) for a, b, c ≥ 0, we have X 2 αi d f1 (x), fi (x) i∈I ≤ 3 X i∈I  2 2 2  , αi d f1 (x), f1 (p) + d f1 (p), fi (p) + d fi (p), fi (x) which is finite since (fi (p)) ∈ (Hn )Iα and (Lip(fi ))i∈I is bounded. By Lemma 2.11, the map f is well defined and for any x, y ∈ Hn ,  X  d f (x), f (y) ≤ αi d fi (x), fi (y) , i∈I which implies Lemma 2.13.  We also consider barycenters of maps with variable coefficients. The following result, which combines Lemmas 2.12 and 2.13 in an equivariant setting, is one of our main technical tools; it will be used extensively throughout Sections 4 and 6. Lemma 2.14. Let Γ0 be a discrete group, (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j injective and discrete, and B1 , . . . , Br open subsets of Hn . For 1 ≤ i ≤ r, let fi : j(Γ0 ) · Bi → Hn be a (j, ρ)-equivariant map 18 FRANÇOIS GUÉRITAUD AND FANNY KASSEL that is Lipschitz on Bi . For p ∈ Hn , let Ip denote the set of indices 1 ≤ i ≤ r such that p ∈ j(Γ0 ) · Bi , and define Rp := diam{fi (p) | i ∈ Ip } < +∞. For 1 ≤ i ≤ r, let also ψi : Hn → [0, 1] be a j(Γ0 )-invariant Lipschitz map supported in j(Γ0 ) · Bi . Assume that ψS1 , . . . , ψr induce a partition of unity on a j(Γ0 )-invariant open subset B of ri=1 j(Γ0 ) · Bi . Then the map P f = i∈I ψi fi : B −→ P Hn p 7−→ i∈Ip ψi (p)fi (p) is (j, ρ)-equivariant and for any p ∈ B, the following “Leibniz rule” holds: X  (2.7) Lipp (f ) ≤ Lipp (ψi ) Rp + ψi (p) Lipp (fi ) . i∈Ip Proof. The map f is (j, ρ)-equivariant because the barycentric construction is, see (2.4). Fix p ∈ B and ε > 0. By definition of Ip , continuity of ψi and fi , and upper semicontinuity of the local Lipschitz constant (Lemma 2.9), there is a neighborhood U of p in B such that for all x ∈ U , • • • • • ψi |U = 0 for all i ∈ / Ip , ψi (x) ≤ ψi (p) + ε for all i ∈ Ip , Rx ≤ Rp + ε, LipU (ψi ) ≤ Lipp (ψi ) + ε for all i ∈ Ip , LipU (fi ) ≤ Lipp (fi ) + ε for all i ∈ Ip . By the triangle inequality, for any x, y ∈ U ,  X X ψi (y)fi (y) ψi (x)fi (x), d(f (x), f (y)) = d i∈Ip i∈Ip i∈Ip i∈Ip  X X ψi (y)fi (x) ψi (x)fi (x), ≤ d  X X ψi (y)fi (y) . ψi (y) fi (x), +d i∈Ip i∈Ip Using Lemma 2.12, we see that the first term of the right-hand side is bounded by  X X  (Lipp (ψi ) + ε) (Rp + ε) ; LipU (ψi ) d(x, y) Rx ≤ d(x, y) i∈Ip i∈Ip and using Lemma 2.13, that the second term is bounded by X X (ψi (p) + ε)(Lipp (fi ) + ε) . ψi (y)LipU (fi ) ≤ d(x, y) d(x, y) i∈Ip i∈Ip The bound (2.7) follows by letting ε go to 0.  3. An equivariant Kirszbraun–Valentine theorem for amenable groups One of the goals of this paper is to refine the classical Kirszbraun–Valentine theorem [Kir, V], which states that any Lipschitz map from a compact subset of Hn to Hn with Lipschitz constant ≥ 1 can be extended to a map from MAXIMALLY STRETCHED LAMINATIONS 19 Hn to itself with the same Lipschitz constant. We shall in particular extend this theorem to an equivariant setting, for two actions j, ρ ∈ Hom(Γ0 , G) of a discrete group Γ0 on Hn , with j geometrically finite (Theorem 1.6). Before we prove Theorem 1.6, we shall • reprove the classical Kirszbraun–Valentine theorem (Section 3.1), both for the reader’s convenience and because the main technical step (Lemma 3.2) will be useful later to control the local Lipschitz constant; • examine the case when the Lipschitz constant is < 1 (Section 3.2); • extend the classical Kirszbraun–Valentine theorem to an equivariant setting for two actions j, ρ ∈ Hom(S, G) of an amenable group S (Section 3.3). We shall use this as a technical tool to extend maps in cusps when dealing with geometrically finite representations j ∈ Hom(Γ0 , G) that are not convex cocompact. 3.1. The classical Kirszbraun–Valentine theorem. We first give a proof of the classical Kirszbraun–Valentine theorem [Kir, V]. Proposition 3.1. Let K 6= ∅ be a compact subset of Hn . Any Lipschitz map ϕ : K → Hn with Lip(ϕ) ≥ 1 admits an extension f : Hn → Hn with the same Lipschitz constant. The following is an important technical step in the proof of Proposition 3.1. It will also be used in the proofs of Lemmas 3.8, 5.2, and 5.4 below. Lemma 3.2. Let K 6= ∅ be a compact subset of Hn and ϕ : K → Hn a nonconstant Lipschitz map. For any p ∈ Hn r K, the function Hn −→ R+ d(q ′ , ϕ(k)) k∈K d(p, k) n admits a minimum Cq at a point q ∈ H , and q belongs to the convex hull of ϕ(K′ ) where   d(q, ϕ(k)) = Cq . K′ := k ∈ K d(p, k) Moreover, \ • either there exist k1 , k2 ∈ K′ such that 0 ≤ k\ 1 pk2 < ϕ(k1 )qϕ(k2 ) ≤ π, ′ ′ \ • or k\ 1 pk2 = ϕ(k1 )qϕ(k2 ) for (ν × ν)-almost all (k1 , k2 ) ∈ K × K , ′ where ν is some probability measure on K such that q belongs to the convex hull of the support of ϕ∗ ν. q′ 7−→ Cq′ := max c ∈ [0, π] the angle at b between three points a, b, c ∈ Hn . Here we denote by abc Proof of Lemma 3.2. The function q ′ 7→ Cq′ is proper and convex, hence admits a minimum Cq at some point q ∈ Hn . We have Cq > 0 since ϕ is nonconstant. Suppose by contradiction that q does not belong to the convex hull of ϕ(K′ ), and let q ′ be the projection of q to this convex hull. If q ′′ is a ′′ ,ϕ(k)) is point of the geodesic segment [q, q ′ ], close enough to q, then d(qd(p,k) uniformly < Cq for k ∈ K: indeed, for k ∈ K in a small neighborhood of K′ this follows from the inequality d(q ′′ , ϕ(k)) < d(q, ϕ(k)); for k ∈ K away 20 FRANÇOIS GUÉRITAUD AND FANNY KASSEL from K′ it follows from the fact that d(q,ϕ(k)) d(p,k) is itself bounded away from Cq by continuity and compactness of K. Thus Cq′′ < Cq , a contradiction. It follows that q belongs to the convex hull of ϕ(K′ ). Let K′log ⊂ Tp Hn (resp. Llog ⊂ Tq Hn ) be the (compact) set of vectors whose image by the exponential map expp : Tp Hn → Hn (resp. expq : Tq Hn → Hn ) lies in K′ (resp. in ϕ(K′ )). Let ′ ϕlog := exp−1 q ◦ ϕ ◦ expp : Klog −→ Llog be the map induced by ϕ. The fact that q belongs to the convex hull of ϕ(K′ ) implies that 0 belongs to the convex hull of Llog = ϕlog (K′log ). Therefore, there exists a probability measure νlog on K′log such that Z ϕlog (x) dνlog (x) = 0 ∈ Tq Hn . ′ kϕ (x)k Klog log (The division is legitimate since kϕlog (x)k = d(q, ϕ(expq (x))) ≥ Cq d(p, K) > 0 for all x ∈ K′log .) We set ν := (expp )∗ νlog , so that q belongs to the convex hull of the support of ϕ∗ ν. We then have ZZ   \ cos k\ 1 pk2 − cos ϕ(k1 )qϕ(k2 ) d(ν × ν)(k1 , k2 ) ′ ′ Z ZK ×K   ϕlog (x2 ) ϕlog (x1 ) x1 x2 = d(νlog × νlog )(x1 , x2 ) − kx1 k kx2 k kϕ (x1 )k kϕ (x2 )k log K′log ×K′log = Z K′log 2 x dνlog (x) − kxk Z K′log log ϕlog (x) dνlog (x) kϕlog (x)k 2 ≥ 0. \ If the function (k1 , k2 ) 7→ cos k\ 1 pk2 − cos ϕ(k1 )qϕ(k2 ) takes a positive value \ at some pair (k1 , k2 ) ∈ K′ × K′ , then we have 0 ≤ k\ 1 pk2 < ϕ(k1 )qϕ(k2 ) ≤ π. Otherwise, the function takes only nonpositive values, hence is zero (ν × ν)almost everywhere since its integral is nonnegative; in other words, k\ 1 pk2 = ′ ′ \ ϕ(k1 )qϕ(k2 ) for (ν × ν)-almost all (k1 , k2 ) ∈ K × K .  The other main ingredient in the proof of Proposition 3.1 is the following consequence of Toponogov’s theorem, a comparison theorem expressing the divergence of geodesics in negative curvature (see [BH, Lem. II.1.13]). Lemma 3.3. In the setting of Lemma 3.2, we have Cq ≤ max(Lip(ϕ), 1). Proof. We may assume Cq ≥ 1, otherwise there is nothing to prove. By \ Lemma 3.2, there exist k1 , k2 ∈ K′ such that k\ 1 pk2 ≤ ϕ(k1 )qϕ(k2 ) 6= 0. Since d(q, ϕ(k1 )) d(q, ϕ(k2 )) = = Cq ≥ 1, d(p, k1 ) d(p, k2 ) Toponogov’s theorem implies d(ϕ(k1 ), ϕ(k2 )) ≥ Cq d(k1 , k2 ). On the other hand, we have d(ϕ(k1 ), ϕ(k2 )) ≤ Lip(ϕ) d(k1 , k2 ) by definition of Lip(ϕ), hence Cq ≤ Lip(ϕ).  Proof of Proposition 3.1. It is enough to prove that for any point p ∈ Hn rK we can extend ϕ to K ∪ {p} keeping the same Lipschitz constant C0 := Lip(ϕ). Indeed, if this is proved, then we can consider a dense sequence MAXIMALLY STRETCHED LAMINATIONS 21 (pi )i∈N of points of Hn r K, construct by induction a C0 -Lipschitz extension of ϕ to K ∪ {pi | i ∈ N}, and finally extend it to Hn by continuity. Let p ∈ Hn r K. If ϕ is constant, then the constant extension of ϕ to K ∪ {p} still has the same Lipschitz constant. Otherwise we apply Lemmas 3.2 and 3.3 with (K, ϕ) := (K, ϕ).  Remark 3.4. The proof actually shows that for C ≥ 1, any map ϕ : K → Hn with Lip(ϕ) ≤ C admits an extension f : Hn → Hn with Lip(f ) ≤ C. Remark 3.5. The same proof shows that if K is a nonempty compact subset of Rn , then any Lipschitz map ϕ : K → Rn admits an extension f : Rn → Rn with the same Lipschitz constant. There is no constraint on the Lipschitz constant for Rn since the Euclidean analogue of Toponogov’s theorem holds for any C ≥ 0. This Euclidean extension result is the one originally proved by Kirszbraun [Kir], by a different approach based on Helly’s theorem. The hyperbolic version is due to Valentine [V]. Remark 3.6. Proposition 3.1 actually holds for any subset K of Hn , not necessarily compact. Indeed, we can always extend ϕ to the closure K of K by continuity, with the same Lipschitz constant, and view K as an increasing union of compact sets Ki , i ∈ N. Proposition 3.1 gives extensions fi : Hn → Hn of ϕ|Ki with Lip(fi ) ≤ Lip(ϕ), and by the Arzelà–Ascoli theorem we can extract a pointwise limit f from the fi , extending ϕ with Lip(f ) = Lip(ϕ). 3.2. A weaker version when the Lipschitz constant is < 1. Proposition 3.1 does not hold when the Lipschitz constant is < 1: see Example 9.6. However, we prove the following strengthening of Remark 3.4 with C = 1. Proposition 3.7. Let K 6= ∅ be a compact subset of Hn . Any Lipschitz map ϕ : K → Hn with Lip(ϕ) < 1 admits an extension f : Hn → Hn with Lip(f ) < 1. It is not clear whether the analogue of Remark 3.6 holds for Lip(ϕ) < 1: see Appendix C.1. Here is the main technical step in the proof of Proposition 3.7. Lemma 3.8. Let K 6= ∅ be a compact subset of Hn with convex hull Conv(K) in Hn , and let ϕ : K → Hn be a Lipschitz map with Lip(ϕ) < 1. For any p ∈ Conv(K), there is a neighborhood Up of p in Hn and a 1-Lipschitz extension fp : K ∪ Up → Hn of ϕ such that LipUp (fp ) < 1. Proof. We first extend ϕ to a map h : K ∪ {p} → Hn with Lip(h) < 1. For this we may assume p ∈ / K. By Lemma 3.2 with (K, ϕ) := (K, ϕ), we can find points q ∈ Hn and k1 , k2 ∈ K such that Cq := maxk∈K d(q, ϕ(k))/d(p, k) is minimal and such that d(q, ϕ(ki )) = Cq d(p, ki ) for i ∈ {1, 2} and k\ 1 pk2 ≤ \ ϕ(k1 )qϕ(k2 ) 6= 0. We cannot have Cq = 1, otherwise we would have d(ϕ(k1 ), ϕ(k2 )) ≥ d(k1 , k2 ) by basic trigonometry, contradicting Lip(ϕ) < 1. Therefore Cq < 1 by Lemma 3.3. We can then take h : K ∪ {p} → Hn to be the extension of ϕ sending p to q. Next, choose a small ε > 0 such that Lip(h)(1+ ε)4 < 1. Let us prove that there is a ball B of radius r > 0 centered at p and an extension h′ : B → Hn 22 FRANÇOIS GUÉRITAUD AND FANNY KASSEL of h|K∩B such that LipB (h′ ) ≤ Lip(h)(1 + ε)4 < 1. If p ∈ / K, we just ′ take B to be disjoint from K and h (B) = {q}. If p ∈ K, we remark that there is a constant r > 0 such that for any x ∈ Hn , the exponential map expx : Tx Hn → Hn and its inverse logx : Hn → Tx Hn are both (1 + ε)Lipschitz when restricted to the ball Bx (r) ⊂ Hn of radius r centered at x and to its image logx Bx (r) ⊂ Tx Hn . We set B := Bp (r). Consider the map logq ◦ h ◦ expp : logp (K) −→ Tq Hn . Its restriction to logp (K ∩ B) ⊂ Tp Hn is Lip(h)(1 + ε)2 -Lipschitz. By Remark 3.5, this restriction admits an extension ψ : logp B → Tq Hn with the same Lipschitz constant. Then h′ := expq ◦ ψ ◦ logp : B −→ Hn is an extension of h|K∩B with LipB (h′ ) ≤ Lip(h)(1 + ε)4 < 1. Let B ′ ⊂ B be another ball centered at p, of radius r ′ > 0 small enough so that Lip(h)r + Lip(h′ )r ′ < r − r ′ . We claim that we may take Up := B ′ and fp : K ∪ Up → Hn to be the map that coincides with ϕ on K and with h′ on Up . Indeed, for any distinct points (x, y) ∈ K × B ′ , if x ∈ B then Lip{x,y} (fp ) ≤ Lip(h′ ) < 1, and otherwise (3.1) d(fp (x), fp (y)) d(x, y) ≤ ≤ d(fp (x), fp (p)) + d(fp (p), fp (y)) d(x, p) − d(p, y) Lip(h) d(x, p) + Lip(h′ ) r ′ < 1, d(x, p) − r ′ where the last inequality uses the fact that d(x, p) ≥ r and the monotonicity of real Möbius maps t 7→ (t + a)/(t − b) for a, b ≥ 0.  Proof of Proposition 3.7. It is sufficient to prove that any Lipschitz map ϕ : K → Hn with C0 := Lip(ϕ) < 1 admits an extension f : Conv(K) → Hn with Lip(f ) < 1, because we can always precompose with the closest-point projection π : Hn → Conv(K), which is 1-Lipschitz. By Lemma 3.8, for any p ∈ Conv(K) we can find a neighborhood Up of p in Hn and a 1-Lipschitz extension fp : K ∪ Up → Hn of ϕ such that LipUp (fp ) < 1. By compactness of Conv(K), we can find finitely many points S p1 , . . . , pm ∈ Conv(K) such that Conv(K) ⊂ m i=1 Upi . For any 1 ≤ i ≤ m, using Remark 3.4, we extend fpi to a 1-Lipschitz map on Conv(K) ∪ Upi , still denoted by fpi . By (2.2) and Lemma 2.13, the symmetric barycenter f := m X 1 fp | : Conv(K) −→ Hn , m i Conv(K) i=1 which extends ϕ, satisfies Lip(f ) ≤ max 1≤i≤m LipUp (fpi ) + (m − 1) i m < 1.  3.3. An equivariant Kirszbraun–Valentine theorem for amenable groups. We now extend Proposition 3.1 to an equivariant setting with respect to two actions of an amenable group. Recall that a discrete group S is said to be amenable if there exists a sequence (Fi )i∈N of finite subsets of S MAXIMALLY STRETCHED LAMINATIONS 23 (called a Følner sequence) such that for any g ∈ S, #(gFi △ Fi ) −→ 0, i→+∞ #Fi where △ denotes the symmetric difference. For instance, any group which is abelian or solvable up to finite index is amenable. The following proposition will be used throughout Section 4 to extend Lipschitz maps in horoballs of Hn corresponding to cusps of the geometrically finite manifold j(Γ0 )\Hn , taking S to be a cusp stabilizer. Proposition 3.9. Let S be an amenable discrete group, (j, ρ) ⊂ Hom(S, G)2 a pair of representations with j injective and j(S) discrete in G, and K 6= ∅ a j(S)-invariant subset of Hn whose image in j(S)\Hn is compact. Any (j, ρ)-equivariant Lipschitz map ϕ : K → Hn with Lip(ϕ) ≥ 1 admits a (j, ρ)-equivariant extension f : Hn → Hn with the same Lipschitz constant. Proof. Set C0 := Lip(ϕ) ≥ 1. By Proposition 3.1 and Remark 3.6, we can find an extension f ′ : Hn → Hn of ϕ with Lip(f ′ ) = C0 , but f ′ is not equivariant a priori. We shall modify it into a (j, ρ)-equivariant map. For any γ ∈ S, the C0 -Lipschitz map fγ := ρ(γ) ◦ f ′ ◦ j(γ)−1 : Hn −→ Hn extends ϕ. For all γ, γ ′ ∈ S and all p ∈ Hn , since fγ and fγ ′ agree on K, the triangle inequality gives  (3.2) d fγ (p), fγ ′ (p) ≤ 2C0 · d(p, K). Fix a finite generating subset A of S. Using a Følner sequence of S, we see that for any ε > 0 there is a finite subset F of S such that #(γF △ F ) ≤ ε #F for all γ ∈ A. Write F = {γ1 , . . . , γk } where k = #F , and set (3.3) f ε (p) := mk (fγ1 (p), . . . , fγk (p)) 1 1 for all p ∈ Hn , where mk = m( k ,..., k ) is the averaging map of Lemma 2.11. By (2.5), the map f ε still coincides with ϕ on K. Moreover, as a barycenter of C0 -Lipschitz maps, f ε is C0 -Lipschitz (Lemma 2.13). Note, using (2.4), that (3.4) ρ(γ) ◦ f ε ◦ j(γ)−1 (p) = mk (fγγ1 (p), . . . , fγγk (p)) for all γ ∈ S and p ∈ Hn . Since #(γF △ F ) ≤ ε #F for all γ ∈ A, all but ≤ εk of the k entries of mk in (3.4) are the same as in (3.3) up to order, hence  d ρ(γ) ◦ f ε ◦ j(γ)−1 (p), f ε (p) ≤ 2C0 · d(p, K) · ε for all p ∈ Hn by (2.6), Lemma 2.11, and (3.2). We conclude by letting ε go to 0 and extracting a pointwise limit f from the f ε : such a map f : Hn → Hn is C0 -Lipschitz, extends ϕ, and is equivariant under the action of any element γ of A, hence of S.  4. The relative stretch locus We now fix a discrete group Γ0 , a pair (j, ρ) ∈ Hom(Γ0 , G)2 of representations of Γ0 in G with j geometrically finite, a j(Γ0 )-invariant subset K of Hn whose image in M := j(Γ0 )\Hn is compact (possibly empty), and a 24 FRANÇOIS GUÉRITAUD AND FANNY KASSEL (j, ρ)-equivariant Lipschitz map ϕ : K → Hn . We shall use the following terminology and notation. Definition 4.1. • The relative minimal Lipschitz constant CK,ϕ (j, ρ) is the infimum of Lipschitz constants Lip(f ) of (j, ρ)-equivariant maps f : Hn → Hn with f |K = ϕ. j,ρ the set of (j, ρ)-equivariant maps f : Hn → Hn • We denote by FK,ϕ with f |K = ϕ that have minimal Lipschitz constant CK,ϕ (j, ρ). j,ρ • If FK,ϕ 6= ∅, the relative stretch locus EK,ϕ (j, ρ) ⊂ Hn is the inter- j,ρ section of the stretch loci Ef (Definition 2.10) of all maps f ∈ FK,ϕ . n 2 e • Similarly, the enhanced relative stretch locus EK,ϕ (j, ρ) ⊂ (H ) is ef (Definition 2.10) of the intersection of the enhanced stretch loci E j,ρ . all maps f ∈ FK,ϕ Note that EK,ϕ (j, ρ) is always j(Γ0 )-invariant and closed in Hn , because j,ρ eK,ϕ (j, ρ) is always j(Γ0 )Ef is for each f ∈ FK,ϕ (Lemma 2.9). Similarly, E n invariant (for the diagonal action of j(Γ0 ) on (H )2 ) and closed in (Hn )2 . If K is empty, then CK,ϕ (j, ρ) is the minimal Lipschitz constant C(j, ρ) of (1.1) and EK,ϕ (j, ρ) is the intersection of stretch loci E(j, ρ) of Theorem 1.3, which we shall simply call the stretch locus of (j, ρ). For empty K we shall j,ρ sometimes write F j,ρ instead of FK,ϕ . 4.1. Elementary properties of the (relative) minimal Lipschitz constant and the (relative) stretch locus. We start with an easy observation for empty K. Remark 4.2. If all elements of ρ(Γ0 ) are elliptic, then C(j, ρ) = 0 and F j,ρ is the set of constant maps with image a fixed point of ρ(Γ0 ) in Hn (such a fixed point exists by Fact 2.5); in particular, E(j, ρ) = Hn . Here are now some elementary properties of CK,ϕ (j, ρ) and EK,ϕ (j, ρ) for general K. Remark 4.3. Conjugating by elements of G leaves the relative minimal Lipj,ρ schitz constant invariant and modifies the relative stretch locus (if FK,ϕ 6= ∅) by a translation: for any j, ρ ∈ Hom(Γ0 , G) and g, h ∈ G, we have  Cg·K, h◦ϕ◦g−1 (j g , ρh ) = CK,ϕ (j, ρ), Eg·K, h◦ϕ◦g−1 (j g , ρh ) = g · EK,ϕ (j, ρ), where j g := gj(·)g −1 and ρh = hρ(·)h−1 . Indeed, for any (j, ρ)-equivariant Lipschitz map f : Hn → Hn extending ϕ, the map h ◦ f ◦ g−1 : Hn → Hn extends h ◦ ϕ ◦ g−1 , is (j g , ρh )-equivariant with the same Lipschitz constant, and Lipg·p (h ◦ f ◦ g−1 ) = Lipp (f ) for all p ∈ Hn . Lemma 4.4. For any finite-index subgroup Γ′0 of Γ0 , if we set j ′ := j|Γ′0 and ρ′ := ρ|Γ′0 , then • CK,ϕ (j, ρ) = CK,ϕ (j ′ , ρ′ ); j,ρ j ′ ,ρ′ j,ρ j ′ ,ρ′ 6= ∅; , and FK,ϕ 6= ∅ if and only if FK,ϕ • FK,ϕ ⊂ FK,ϕ MAXIMALLY STRETCHED LAMINATIONS 25 • in this case, EK,ϕ (j, ρ) = EK,ϕ (j ′ , ρ′ ). By Lemma 4.4, we may always assume that • the finitely generated group Γ0 is torsion-free (using the Selberg lemma [Se, Lem. 8]); • j and ρ take values in the group G0 = PO(n, 1)0 ≃ SO(n, 1)0 of orientation-preserving isometries of Hn . This will sometimes be used in the proofs without further notice. Proof of Lemma 4.4. The inequality CK,ϕ (j ′ , ρ′ ) ≤ CK,ϕ (j, ρ) holds because any (j, ρ)-equivariant map is (j ′ , ρ′ )-equivariant. We now prove the converse inequality. Write Γ0 as a disjoint union of cosets α1 Γ′0 , . . . , αr Γ′0 where αi ∈ Γ0 . Let f ′ be a (j ′ , ρ′ )-equivariant Lipschitz extension of ϕ. For γ ∈ Γ0 , the map fγ := ρ(γ) ◦ f ′ ◦ j(γ)−1 only on the coset γΓ′0 . By (2.6), Pdepends r 1 the symmetric barycenter f := i=1 r fαi satisfies, for any γ ∈ Γ0 , −1 ρ(γ) ◦ f ◦ j(γ) γαi Γ′0 αi Γ′0 r X 1 fγαi = f, = r i=1 because the cosets are the up to order. This means that f is (j, ρ)equivariant. By Lemma 2.13, we have Lip(f ) ≤ Lip(f ′ ), hence CK,ϕ (j, ρ) ≤ CK,ϕ (j ′ , ρ′ ) by minimizing Lip(f ′ ). j,ρ Since CK,ϕ (j, ρ) = CK,ϕ (j ′ , ρ′ ), it follows from the definitions that FK,ϕ ⊂ ′ ′ j ,ρ and that, if these are nonempty, then EK,ϕ (j, ρ) ⊃ EK,ϕ (j ′ , ρ′ ). In fact, FK,ϕ ′ ′ j,ρ j ,ρ is nonempty, then so is FK,ϕ , and EK,ϕ (j, ρ) = EK,ϕ (j ′ , ρ′ ). Indeed, if FK,ϕ Pr 1 ′ ′ j ,ρ , the symmetric barycenter f = for any f ′ ∈ FK,ϕ i=1 r fαi introduced j,ρ above belongs to FK,ϕ , and the stretch locus of f is contained in that of f ′ by Lemma 2.13.  Lemma 4.5. The inequalities (4.1) C ′ (j, ρ) ≤ C(j, ρ) ≤ CK,ϕ (j, ρ), always hold, where C ′ (j, ρ) is given by (1.4). Proof. The right-hand inequality follows from the definitions. For the lefthand inequality, we observe that for any γ ∈ Γ0 with j(γ) hyperbolic and any p ∈ Hn on the translation axis of j(γ), if f : Hn → Hn is (j, ρ)-equivariant and Lipschitz, then   λ(ρ(γ)) ≤ d f (p), ρ(γ) · f (p) = d f (p), f (j(γ) · p) ≤ Lip(f ) d(p, j(γ) · p) = Lip(f ) λ(j(γ)), and we conclude by letting Lip(f ) tend to C(j, ρ).  Here is a sufficient condition for the left inequality of (4.1) to be an equality. We shall see in Theorem 5.1 that for C(j, ρ) ≥ 1 this sufficient condition j,ρ is also necessary, at least when FK,ϕ and EK,ϕ (j, ρ) are nonempty. Lemma 4.6. Let ℓ be a geodesic ray in Hn whose image in j(Γ0 )\Hn is bounded. If ℓ is maximally stretched by some (j, ρ)-equivariant Lipschitz map f : Hn → Hn , in the sense that f multiplies all distances on ℓ by Lip(f ), 26 then FRANÇOIS GUÉRITAUD AND FANNY KASSEL C ′ (j, ρ) = C(j, ρ) = Lip(f ). Proof. By (4.1) it is enough to prove that C ′ (j, ρ) ≥ Lip(f ). Parametrize ℓ by arc length as (pt )t≥0 . Since the image of ℓ in j(Γ0 )\Hn is bounded, for any ε > 0 we can find γ ∈ Γ0 and 0 < s < t with t − s ≥ 1 such that the oriented segments j(γ) · [ps , ps+1 ] and [pt , pt+1 ] of Hn are ε-close in the C 1 sense. By the closing lemma (Lemma A.1), this implies λ(j(γ)) − (t − s) ≤ 2ε. The images under f of the unit segments above are also εLip(f )-close geodesic segments. By the closing lemma again and the (j, ρ)-equivariance of f , λ(ρ(γ)) − (t − s)Lip(f ) ≤ 2ε Lip(f ). Taking ε very small, we see that λ(ρ(γ))/λ(j(γ)) takes values arbitrarily close to Lip(f ) for γ ∈ Γ0 with j(γ) hyperbolic, hence C ′ (j, ρ) ≥ Lip(f ).  4.2. Finiteness of the (relative) minimal Lipschitz constant. Lemma 4.7. (1) If j is convex cocompact, then CK,ϕ (j, ρ) < +∞. (2) In general, if j is geometrically finite, then CK,ϕ (j, ρ) < +∞ unless there exists an element γ ∈ Γ0 such that j(γ) is parabolic and ρ(γ) hyperbolic. The following proof uses Lemma 2.14 applied to an appropriate partition of unity. A similar proof scheme will be used again throughout Section 6. Proof of Lemma 4.7.(1) (Convex cocompact case). Recall Notation 2.3 for Conv(K). If j is convex cocompact, then Conv(K) is compact modulo j(Γ0 ), hence we can find open balls B1 , . . . , Br of Hn , projecting injectively to j(Γ0 )\Hn , such that Conv(K) is contained in the union of the j(Γ0 ) · Bi . For any i, let fi : Bi → Hn be a Lipschitz extension of ϕ|Bi ∩K (such an extension exists by Proposition 3.1). We extend fi to j(Γ0 ) · Bi in a (j, ρ)equivariant way (with no control on the global Lipschitz constant a priori). The function  p 7−→ Rp := diam fi (p) | 1 ≤ i ≤ r and p ∈ j(Γ0 ) · Bi is locally bounded above and j(Γ0 )-invariant, hence uniformly bounded on S i j(Γ0 )·Bi . Let (ψi )1≤i≤r be a partition of unity on Conv(K), subordinated to the covering (j(Γ0 ) · Bi )1≤i≤r , with ψi Lipschitz and j(Γ0 )-invariant for all i. Lemma 2.14 gives a (j, ρ)-equivariant map r X ψi fi : Conv(K) −→ Hn f := i=1 with Lipp (f ) bounded by some constant L independent of p ∈ Conv(K). Then LipConv(K) (f ) ≤ L by (2.2). By precomposing f with the closest-point projection π : Hn → Conv(K), which is 1-Lipschitz and (j, j)-equivariant, we obtain a (j, ρ)-equivariant Lipschitz extension of ϕ to Hn .  Proof of Lemma 4.7.(2) (General geometrically finite case). Suppose that for any γ ∈ Γ0 with j(γ) parabolic, the element ρ(γ) is not hyperbolic. The idea is the same as in the convex cocompact case, but we need to deal with the MAXIMALLY STRETCHED LAMINATIONS 27 presence of cusps, which make Conv(K) noncompact modulo j(Γ0 ). We shall apply Proposition 3.9 (the equivariant version of Proposition 3.1 for amenable groups) to the stabilizers of the cusps. Let B1 , . . . , Bc be open horoballs of Hn , disjoint from K, whose images in j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions (Definition 2.2), representing all the cusps. Let Bc+1 , . . . , Br be open balls of Hn that project injectively to j(Γ0 )\Hn , such that the union of the j(Γ0 ) · Bi for 1 ≤ i ≤ r covers Conv(K). For c + 1 ≤ i ≤ r, we construct a (j, ρ)-equivariant Lipschitz map fi : j(Γ0 ) · Bi → Hn as in the convex cocompact case. For 1 ≤ i ≤ c, we now explain how to construct a (j, ρ)-equivariant Lipschitz map fi : j(Γ0 ) · Bi → Hn . Let Si be the stabilizer of Bi in Γ0 for the j-action. We claim that there exists a (j|Si , ρ|Si )-equivariant Lipschitz map fi : Bi → Hn . Indeed, choose p ∈ Bi , not fixed by any element of j(Si ), and q ∈ Hn . Set fi (j(γ) · p) := ρ(γ) · q for all γ ∈ Si . Let wl : Si → N be the word length with respect to some fixed finite generating set of Si . By Lemma 2.6, there exists R′ > 0 such that  d(p, j(γ) · p) ≥ 2 log 1 + wl(γ) − R′ for all γ ∈ Si . On the other hand, there exists R > 0 such that  d(q, ρ(γ) · q) ≤ 2 log 1 + wl(γ) + R for all γ ∈ Si : if ρ(γ) is elliptic for all γ ∈ Si , this follows from the fact that the group ρ(Si ) admits a fixed point in Hn (Fact 2.5), hence d(q, ρ(γ) · q) is bounded for γ ∈ Si ; otherwise this follows from Lemma 2.6. Since the function wl is proper, we see that lim supγ∈Si d(q,ρ(γ)·q) d(p,j(γ)·p) ≤ 1, hence d(q, ρ(γ) · q) < +∞. γ∈Si r{1} d(p, j(γ) · p) sup In other words, fi is Lipschitz on j(Si ) · p. We then use Proposition 3.9 to extend fi to a (j|Si , ρ|Si )-equivariant Lipschitz map fi : Bi → Hn . Let us extend fi to j(Γ0 ) · Bi in a (j, ρ)-equivariant way (with no control on the global Lipschitz constant a priori). We claim that Rp := diam{fi (p) | 1 ≤ i ≤ r and p ∈ j(Γ0 ) · Bi } is uniformly bounded on Conv(K). Indeed, j(Γ0 ) · Bi ∩ j(Γ0 ) · Bk = ∅ for all 1 ≤ i 6= k ≤ c by definition of standard cusp regions. Therefore, if p ∈ Hn belongs to j(Γ0 )·Bi for 1 ≤ i ≤ r, then it belongs to the  one index S S more than “thick” part j(Γ0 ) · c<i≤r Bi is bounded and p 7→ Rp is c<i≤r Bi . But locally bounded above and j(Γ0 )-invariant, hence Rp is uniformly bounded on Conv(K). We conclude as in the convex cocompact case.  The converse to Lemma 4.7 is clear: if there exists an element γ ∈ Γ0 such that j(γ) is parabolic and ρ(γ) hyperbolic, then CK,ϕ (j, ρ) = +∞. Indeed, for any p, q ∈ Hn , the distance d(p, j(γ k ) · p) grows logarithmically in k (Lemma 2.6) whereas d(q, ρ(γ k ) · q) grows linearly. 28 FRANÇOIS GUÉRITAUD AND FANNY KASSEL In the rest of the paper, we shall assume CK,ϕ (j, ρ) < +∞ whenever we discuss a fixed pair (j, ρ). We shall allow C(j, ρ) = +∞ only in Section 6 and Proposition 9.5, where we discuss semicontinuity properties of the maps (j, ρ) 7→ C(j, ρ) and (j, ρ) 7→ E(j, ρ), for empty K. 4.3. Projecting onto the convex core. In the proof of Lemma 4.7, we used the closest-point projection π : Hn → Conv(K), which is 1-Lipschitz and (j, j)-equivariant. This projection will be used many times in Sections 4, 5, and 6, with the following more precise properties. j,ρ Lemma 4.8. Suppose FK,ϕ 6= ∅ and let π : Hn → Conv(K) be the closestj,ρ point projection. For any f ∈ FK,ϕ , j,ρ (1) Lip(f ◦ π) = Lip(f |Conv(K) ) = Lip(f ) = CK,ϕ (j, ρ) and f ◦ π ∈ FK,ϕ ; (2) if CK,ϕ (j, ρ) > 0, then the stretch loci and enhanced stretch loci (Definition 2.10) satisfy ( Ef ◦π = Ef |Conv(K) ⊂ Ef ∩ Conv(K),  ef ◦π = E ef | ef ∩ Conv(K) × Conv(K) . E ⊂E Conv(K) In particular, if CK,ϕ (j, ρ) > 0, then the relative stretch locus EK,ϕ (j, ρ) is always contained in Conv(K). (This is not true if CK,ϕ (j, ρ) = 0: see Remark 4.2.) j,ρ Proof. For any f ∈ FK,ϕ we have Lip(f ◦ π) = Lip(f |Conv(K) ) ≤ Lip(f ) since j,ρ π : Hn → Conv(K) is 1-Lipschitz. Equality holds and f ◦ π ∈ FK,ϕ since π is (j, j)-equivariant and Lip(f ) = CK,ϕ (j, ρ) is minimal. This proves (1). e ⊂ Hn × Hn , For (2), it is enough to consider the enhanced stretch locus E e to either of the Hn factors. since the stretch locus E is the projection of E Note that ef | ef ◦π ⊂ Conv(K) × Conv(K), E ⊂E Conv(K) because π is the identity on Conv(K) and is contracting outside Conv(K). ef ◦π ⊂ E ef | ef ◦π . By defLet us prove that E . Consider a pair (x, x′ ) ∈ E Conv(K) inition, there are sequences (xk )k∈N converging to x and (x′k )k∈N converging to x′ such that xk 6= x′k and d(f ◦ π(xk ), f ◦ π(x′k )) −→ CK,ϕ (j, ρ). k→+∞ d(xk , x′k ) By continuity of π we have π(xk ) → π(x) = x and π(x′k ) → π(x′ ) = x′ . Since d(f ◦ π(xk ), f ◦ π(x′k )) d(f ◦ π(xk ), f ◦ π(x′k )) ≤ ≤ CK,ϕ (j, ρ), d(xk , x′k ) d(π(xk ), π(x′k )) the middle term also tends to CK,ϕ (j, ρ), which shows that (π(x), π(x′ )) = ef | ef ◦π = E ef | ef . (x, x′ ) belongs to E . Thus E ⊂E  Conv(K) Conv(K) 4.4. Equivariant extensions with minimal Lipschitz constant. We shall use the following terminology. MAXIMALLY STRETCHED LAMINATIONS 29 Definition 4.9. A representation ρ ∈ Hom(Γ0 , G) is reductive if the Zariski closure of ρ(Γ0 ) in G is reductive, or equivalently if the number of fixed points of the group ρ(Γ0 ) in the boundary at infinity ∂∞ Hn of Hn is different from 1. j,ρ Lemma 4.10. The set FK,ϕ of Definition 4.1 is nonempty as soon as either K 6= ∅ or ρ is reductive. When K = ∅ and ρ is nonreductive, there may or may not exist a (j, ρ)equivariant map f : Hn → Hn with minimal constant C(j, ρ) = CK,ϕ (j, ρ): see examples in Sections 10.2 and 10.3. Proof of Lemma 4.10. The idea is to apply the Arzelà–Ascoli theorem. Set C := CK,ϕ (j, ρ) and let (fk )k∈N be a sequence of (j, ρ)-equivariant Lipschitz maps with fk |K = ϕ and C + 1 ≥ Lip(fk ) → C. The sequence (fk ) is equicontinuous. We first assume that K 6= ∅, and fix q ∈ K. For any k ∈ N and any p ∈ Hn ,  (4.2) d fk (p), ϕ(q) ≤ (C + 1) d(p, q). Therefore, for any compact subset C of Hn , the sets fk (C ) for k ∈ N all lie in some common compact subset of Hn . The Arzelà–Ascoli theorem applies, yielding a subsequence with a C-Lipschitz limit; this limit necessarily belongs j,ρ to FK,ϕ . We now assume that K = ∅ and ρ is reductive. H2 Aρ(γ1 ) Aρ(γ2 ) Figure 2. Uniform neighborhoods of lines in Hn with disjoint endpoints have a compact intersection. • If the group ρ(Γ0 ) has no fixed point in Hn and does not preserve any geodesic line of Hn (this is the generic case), then ρ(Γ0 ) contains two hyperbolic elements ρ(γ1 ), ρ(γ2 ) whose translation axes have no common endpoint in ∂∞ Hn . Fix a point p ∈ Hn . For any k ∈ N and i ∈ {1, 2},  d fk (p), ρ(γi ) · fk (p) ≤ (C + 1) d(p, j(γi ) · p). 30 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Therefore, the points fk (p) for k ∈ N belong to some uniform neighborhood of the translation axis Aρ(γi ) of ρ(γi ) for i ∈ {1, 2}. Since Aρ(γ1 ) and Aρ(γ2 ) have no common endpoint at infinity, the points fk (p) belong to some compact subset of Hn (see Figure 2). Since Lip(fk ) stays bounded, we obtain that for any compact subset C of Hn , the sets fk (C ) for k ∈ N all lie inside some common compact subset of Hn , and we conclude as above using the Arzelà–Ascoli theorem. • If the group ρ(Γ0 ) preserves a geodesic line A of Hn , then it commutes with any hyperbolic element of G acting as a pure translation along A. For any k ∈ N and any such hyperbolic element gk , the map gk ◦ fk is still (j, ρ)-equivariant, with Lip(gk ◦ fk ) = Lip(fk ). Fix p ∈ Hn . By the previous paragraph, the points fk (p) for k ∈ N belong to some uniform neighborhood of A. Therefore, after replacing (fk )k∈N by (gk ◦ fk )k∈N for some appropriate sequence (gk )k∈N , we may assume that the points fk (p) for k ∈ N all belong to some compact subset of Hn , and we conclude as above. • If the group ρ(Γ0 ) has a fixed point in Hn , we use Remark 4.2.  4.5. The stretch locus of an equivariant extension with minimal Lipschitz constant. Lemma 4.11. (1) If j is convex cocompact, then the stretch locus Ef of j,ρ any f ∈ FK,ϕ is nonempty. j,ρ (2) In general, the stretch locus of any f ∈ FK,ϕ is nonempty except possibly if CK,ϕ (j, ρ) = 1 and ρ is not cusp-deteriorating. Recall from Definition 1.1 that “ρ is not cusp-deteriorating” means there is an element γ ∈ Γ0 such that j(γ) and ρ(γ) are both parabolic. When CK,ϕ (j, ρ) = 1, there exist examples of pairs (j, ρ) with ρ non-cusp-deterioraj,ρ ting such that the stretch locus Ef is empty for some maps f ∈ FK,ϕ (see Sections 10.8 and 10.9, as well as Corollary 4.18 for elementary Γ0 ). Proof of Lemma 4.11.(1) (Convex cocompact case). By Lemma 4.8, it is sufficient to prove that the stretch locus of f |Conv(K) is nonempty. The function x 7→ Lipx (f |Conv(K) ) is upper semicontinuous (Lemma 2.9) and j(Γ0 )invariant. If j is convex cocompact, then Conv(K) is compact modulo j(Γ0 ), and so x 7→ Lipx (f |Conv(K) ) achieves its maximum on Conv(K), at a point that belongs to the stretch locus of f |Conv(K) .  Proof of Lemma 4.11.(2) (General geometrically finite case). Assume either that C 6= 1, or that C = 1 and ρ is cusp-deteriorating, where we set j,ρ C := CK,ϕ (j, ρ). Consider f ∈ FK,ϕ . As in the convex cocompact case, it is sufficient to prove that the stretch locus of f |Conv(K) is nonempty. Suppose by contradiction that it is empty: this means (Lemma 2.9) that LipK ′ (f ) < C for any compact subset K ′ of Conv(K), or equivalently that the j(Γ0 )-invariant function x 7→ Lipx (f ) only approaches C asymptotically (from below) in some cusps. Let B1 , . . . , Bc be open horoballs of Hn , disjoint from K, whose images in j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions (Definition 2.2), representing all the cusps. Our MAXIMALLY STRETCHED LAMINATIONS 31 strategy is, for each Bi on which x 7→ Lipx (f ) approaches C asymptotically, to modify f |Conv(K) on Conv(K) ∩ j(Γ0 ) · Bi in a (j, ρ)-equivariant way so as to decrease the Lipschitz constant on Conv(K) ∩ Bi . By (2.2), this will yield a new (j, ρ)-equivariant extension of ϕ to Conv(K) with a smaller Lipschitz constant than f |Conv(K) , which will contradict the minimality of Lip(f |Conv(K) ) = Lip(f ). Let us now explain the details. Let B = Bi be an open horoball as above, on which x 7→ Lipx (f ) approaches C asymptotically, and let S be the stabilizer of B in Γ0 for the j-action. The group j(S) is discrete and contains only parabolic and elliptic elements. Since CK,ϕ (j, ρ) < +∞ by assumption, the group ρ(S) also contains only parabolic and elliptic elements (Lemma 4.7). First we assume that ρ(S) contains a parabolic element, i.e. ρ is not deteriorating in B (Definition 2.4). In particular, ρ is not cusp-deteriorating, hence C ≥ 1 by Lemma 2.7 and so C > 1 by the assumption made at the beginning of the proof. Since S is amenable, in order to decrease the Lipschitz constant on Conv(K) ∩ B it is enough to prove that LipConv(K)∩∂B (f ) < C, because we can then apply Proposition 3.9. By geometrical finiteness and the assumption that the image of K in j(Γ0 )\Hn is compact (see Fact 2.1 and the remarks after Notation 2.3), we can find a compact fundamental domain D of Conv(K) ∩ j(Γ0 ) · ∂B for the action of j(Γ0 ). Fix p ∈ D. By Lemma 2.6, there exist R, R′ > 0 such that (4.3) and (4.4) d(p, j(γ) · p) ≥ 2 log(1 + wl(γ)) − R′   d f (p), f (j(γ) · p) = d f (p), ρ(γ) · f (p) ≤ 2 log(1 + wl(γ)) + R for all γ ∈ S, where wl : S → N denotes the word length with respect to some fixed finite generating set of S. Consider q, q ′ ∈ Conv(K) ∩ ∂B with q ∈ D; there is an element γ ∈ Γ0 such that d(j(γ) · p, q ′ ) ≤ ∆, where ∆ > 0 is the diameter of D. By the triangle inequality, (4.3), and (4.4), we have d(q, q ′ ) ≥ d(p, j(γ) · p) − d(p, q) − d(j(γ) · p, q ′ ) ≥ 2 log(1 + wl(γ)) − (R′ + 2∆) and, using Lip(f ) = C,  d(f (q), f (q ′ )) ≤ d f (p), f (j(γ) · p) + d(f (p), f (q)) + d(f (j(γ) · p), f (q ′ )) ≤ 2 log(1 + wl(γ)) + (R + 2C∆). Since C > 1, this implies 1+C d(f (q), f (q ′ )) ≤ <C ′ d(q, q ) 2 as soon as wl(γ) is large enough, or equivalently as soon as d(q, q ′ ) is large enough. However, this ratio is also bounded away from C when d(q, q ′ ) is bounded, because the segment [q, q ′ ] then stays in a compact part of j(Γ0 )\Conv(K). Therefore there is a constant C ′′ < C such that ′ ′′ d(f (q), f (q )) ≤ C d(q, q ′ ) for all q, q ′ ∈ Conv(K) ∩ ∂B with q ∈ D, hence LipConv(K)∩∂B (f ) ≤ C ′′ < C by equivariance. By Proposition 3.9, we can redefine f inside Conv(K)∩B so that LipConv(K)∩B (f ) < C. We then extend f to Conv(K) ∩ j(Γ0 ) · B in a (j, ρ)-equivariant way. 32 FRANÇOIS GUÉRITAUD AND FANNY KASSEL We now assume that ρ(S) consists entirely of elliptic elements, i.e. ρ is deteriorating in B (Definition 2.4). Then ρ(S) admits a fixed point q in Hn by Fact 2.5. Let f1 : j(Γ0 ) · B → Hn be the (j, ρ)-equivariant map that is constant equal to q on B, and let ψ1 : Hn → [0, 1] be the j(Γ0 )-invariant function supported on j(Γ0 ) · B given by  ψ1 (p) = ε ψ d(p, ∂B) for all p ∈ B, where ψ : R+ → [0, 1] is the 3-Lipschitz function with ψ|[0,1/3] = 0 and ψ|[2/3,+∞) = 1, and ε > 0 is a small parameter to be adjusted later. Let f2 := f , and let ψ2 := 1 − ψ1 . The (j, ρ)-equivariant map f0 := ψ1 f1 + ψ2 f2 : Hn −→ Hn coincides with f on Conv(K) ∩ ∂B. Let us prove that if ε is small enough, then Lipp (f0 ) is bounded by some uniform constant < C for p ∈ Conv(K)∩B. Let p ∈ Conv(K) ∩ B. Since Lipp (f1 ) = 0, since f1 (p) = q, and since f2 = f , Lemma 2.14 yields  Lipp (f0 ) ≤ Lipp (ψ1 ) + Lipp (ψ2 ) d(q, f (p)) + ψ2 (p) Lipp (f ). Let B ′ be a horoball contained in B, at distance 1 from ∂B. If p ∈ Conv(K)∩B ′ , then Lipp (ψ1 ) = Lipp (ψ2 ) = 0 and ψ2 (p) = 1 − ε, hence Lipp (f0 ) ≤ (1 − ε) Lipp (f ) ≤ (1 − ε) C. If p ∈ Conv(K) ∩ (B r B ′ ), then Lipp (ψ1 ), Lipp (ψ2 ) ≤ 3ε and ψ2 (p) ≤ 1, hence Lipp (f0 ) ≤ 6ε d(q, f (p)) + sup Lipx (f ) . x∈Conv(K)∩(BrB ′ ) Conv(K)∩(B rB ′ ) Note that the set is compact modulo j(S), which implies, on the one hand that the j(S)-invariant, continuous function p 7→ d(q, f (p)) is bounded on Conv(K) ∩ (B r B ′ ), on the other hand that the j(S)invariant, upper semicontinuous function x 7→ Lipx (f ) is bounded away from C on Conv(K) ∩ (B r B ′ ) (recall that the stretch locus of f |Conv(K) is empty by assumption). Therefore, if ε is small enough, then Lipp (f0 ) is bounded by some uniform constant < C for p ∈ Conv(K) ∩ B, which implies LipConv(K)∩B (f0 ) < C by (2.2). We can redefine f to be f0 on Conv(K) ∩ B. We then extend f to Conv(K) ∩ j(Γ0 ) · B in a (j, ρ)-equivariant way. After redefining f as above in each cusp where the local Lipschitz constant x 7→ Lipx (f ) approaches C asymptotically, we obtain a (j, ρ)-equivariant map on Conv(K) with Lipschitz constant < C, which contradicts the minimality of C.  4.6. Optimal extensions with minimal Lipschitz constant. j,ρ Definition 4.12. An element f0 ∈ FK,ϕ (Definition 4.1) is called optimal if e its enhanced stretch locus Ef0 (Definition 2.10) is minimal, equal to \ eK,ϕ (j, ρ) = ef . E E j,ρ f ∈FK,ϕ This means that T the ordinary stretch locus Ef0 of f0 is minimal, equal to EK,ϕ (j, ρ) = f ∈F j,ρ Ef , and that the set of maximally stretched segK,ϕ ments of f0 is minimal (using Remark 2.8.(1)). This last condition will be MAXIMALLY STRETCHED LAMINATIONS 33 relevant only when CK,ϕ (j, ρ) = 1, in the proof of Lemma 5.4: indeed, when j,ρ CK,ϕ (j, ρ) > 1, Theorem 5.1 shows that f0 ∈ FK,ϕ is optimal if and only if its ordinary stretch locus Ef0 is minimal. As mentioned in the introduction, in general an optimal map f0 is by no means unique, since it may be perturbed away from EK,ϕ (j, ρ). j,ρ j,ρ Lemma 4.13. If FK,ϕ 6= ∅, then there exists an optimal element f0 ∈ FK,ϕ . j,ρ ef is closed in Hn × Hn , the enhanced stretch locus E Proof. For any f ∈ FK,ϕ (Lemma 2.9 and Remark 2.8.(1)) and j(Γ0 )-invariant for the diagonal action. eK,ϕ (j, ρ) is also closed and j(Γ0 )-invariant. By definition, for any Therefore E eK,ϕ (j, ρ) (possibly with p = q), we can find a x = (p, q) ∈ (Hn × Hn ) r E j,ρ n , and neighborhood Ux of x in H × Hn , a (j, ρ)-equivariant map fx ∈ FK,ϕ a constant δx > 0 such that d(fx (p′ ), fx (q ′ )) = CK,ϕ (j, ρ) − δx < CK,ϕ (j, ρ). sup d(p′ , q ′ ) (p′ ,q ′ )∈Ux p′ 6=q ′ eK,ϕ (j, ρ) is exhausted by countably many compact sets, Since (Hn × Hn ) r E we can write +∞ [ n n e Ux i (H × H ) r EK,ϕ (j, ρ) = i=1 Hn ) eK,ϕ (j, ρ). Choose a for some sequence (xi )i≥1 of points of × rE n point p ∈ H and let α = (αi )i≥1 be a sequence of positive reals summing up to 1 and decreasing fast enough so that (Hn +∞ X αi d(fx1 (p), fxi (p))2 < +∞ . i=1 By Lemma 2.13, the map f0 := sup (p,q)∈Uxi p6=q P∞ i=1 αi fxi is well defined and satisfies d(f0 (p), f0 (q)) ≤ CK,ϕ (j, ρ) − αi δxi < CK,ϕ (j, ρ) d(p, q) ef ∩ Ux = ∅, which means that E ef = E eK,ϕ (j, ρ). for all i, hence E 0 i 0  Here is an immediate consequence of Lemmas 4.11 and 4.13. j,ρ Corollary 4.14. If FK,ϕ 6= ∅, then the relative stretch locus EK,ϕ (j, ρ) • is nonempty for convex cocompact j; • is nonempty for geometrically finite j in general, except possibly if CK,ϕ (j, ρ) = 1 and ρ is not cusp-deteriorating. In fact, the following holds. j,ρ Lemma 4.15. If FK,ϕ 6= ∅, then for any p ∈ Hn r (EK,ϕ (j, ρ) ∪ K) there j,ρ exists an optimal element f0 ∈ FK,ϕ that is constant on a neighborhood of p. j,ρ j,ρ Proof. Assume that FK,ϕ 6= ∅ and let f ∈ FK,ϕ be optimal (given by Lemma 4.13). Fix p ∈ Hn r (EK,ϕ (j, ρ) ∪ K). Let B ⊂ Hn be a closed 34 FRANÇOIS GUÉRITAUD AND FANNY KASSEL ball centered at p, with small radius r > 0, such that B does not meet K ∪ EK,ϕ (j, ρ) and projects injectively to j(Γ0 )\Hn . By Lemma 2.9, C ∗ := LipB (f ) < C := CK,ϕ (j, ρ). For any small enough ball B ′ ⊂ B of radius r ′ centered at p, the map ιp : ∂B ∪ B ′ −→ Hn that coincides with the identity on ∂B and is constant with image {p} on B ′ , r ∗ satisfies 1 < Lip(ιp ) = r−r ′ < C/C . Proposition 3.1 enables us to extend ιp to a map ι′p : B → Hn fixing ∂B pointwise with Lip(ι′p ) < C/C ∗ . We may moreover assume ι′p (B) ⊂ B up to postcomposing with the closestpoint projection onto B. The (j, j)-equivariant map Jp : Hn → Hn that coincides with ι′p on B and with the identity on Hn r j(Γ0 ) · B satisfies Lipx (Jp ) ≤ Lip(ι′p ) < C/C ∗ if x ∈ j(Γ0 ) · B and Lipx (Jp ) = 1 otherwise. Thus, by (2.2), we see that the (j, ρ)-equivariant map f0 := f ◦ Jp satisfies Lipx (f0 ) ≤ C ∗ Lip(ι′p ) < C if x ∈ j(Γ0 )·B and Lipx (f0 ) = Lipx (f ) otherwise. In particular, f0 is C-Lipschitz, constant on B ′ , extends ϕ, and its (enhanced) stretch locus is contained in that of the optimal map f . Therefore f0 is optimal.  4.7. Behavior in the cusps for (almost) optimal Lipschitz maps. In this section we consider representations j that are geometrically finite but j,ρ not convex cocompact. We show that when FK,ϕ is nonempty, we can find j,ρ optimal maps f0 ∈ FK,ϕ (in the sense of Definition 4.12) that “show no bad behavior” in the cusps. To express this, we consider open horoballs B1 , . . . , Bc of Hn whose images in M := j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions (Definition 2.2), representing all the cusps. We take them small enough so that K ∩ j(Γ0 ) · Bi = ∅ for all i. Then the following holds. Proposition 4.16. Consider C ∗ < +∞ such that there exists a C ∗ -Lipschitz, (j, ρ)-equivariant extension f : Hn → Hn of ϕ. (1) If C ∗ ≥ 1, then we can find a C ∗ -Lipschitz, (j, ρ)-equivariant extension f0 : Hn → Hn of ϕ and horoballs Bi′ ⊂ Bi such that LipBi′ (f0 ) = 0 for all deteriorating Bi and LipBi′ (f0 ) = 1 for all non-deteriorating Bi . (2) If C ∗ < 1, then we can find a C ∗ -Lipschitz, (j, ρ)-equivariant extension f0 : Hn → Hn of ϕ that converges to a point pi in any Bi (i.e. the sets f0 (Bi′ ) converge to {pi } for smaller and smaller horoballs Bi′ ⊂ Bi ). (3) If C ∗ < 1, then for any ε > 0 we can find a (C ∗ + ε)-Lipschitz, (j, ρ)equivariant extension f0 : Hn → Hn of ϕ and horoballs Bi′ ⊂ Bi such that LipBi′ (f0 ) = 0 for all i. Moreover, if C ∗ = CK,ϕ (j, ρ), then in (1) and (2) we can choose f0 such that its enhanced stretch locus is contained in that of f . In particular, f0 is optimal if f is. By “Bi deteriorating” we mean that ρ is deteriorating in Bi in the sense of Definition 2.4. Recall that all Bi are deteriorating when C ∗ < 1 (Lemma 2.7). MAXIMALLY STRETCHED LAMINATIONS 35 If Bi is not deteriorating, then any (j, ρ)-equivariant map has Lipschitz constant ≥ 1 in Bi (see Lemma 2.6), hence the property LipBi′ (f0 ) = 1 in (1) cannot be improved. We believe that the condition C ∗ ≥ 1 could be dropped in (1), which would then supersede both (2) and (3) (see Appendix C.4). Note that if f0 converges to a point pi in Bi , then pi must be a fixed point of the group ρ(Si ), where Si ⊂ Γ0 is the stabilizer of Bi under j. Here is an immediate consequence of Proposition 4.16.(1), of Lemma 4.8, and of the fact that the complement of the cusp regions in Conv(K) is j,ρ compact (Fact 2.1). Recall that FK,ϕ is nonempty as soon as K 6= ∅ or ρ is reductive (Lemma 4.10). j,ρ 6= ∅. If Corollary 4.17. Suppose FK,ϕ • CK,ϕ (j, ρ) > 1, or • CK,ϕ (j, ρ) = 1 and ρ is cusp-deteriorating, then the image of the relative stretch locus EK,ϕ (j, ρ) in j(Γ0 )\Hn is compact. Here is another consequence of Proposition 4.16 and Lemma 4.8, in the case when the group j(Γ0 ) is virtually Zm for some m < n. Corollary 4.18. If the groups j(Γ0 ) and ρ(Γ0 ) both have a unique fixed point in ∂∞ Hn , then C(j, ρ) = 1 and F j,ρ 6= ∅ and E(j, ρ) = ∅. Proof of Corollary 4.18. If j(Γ0 ) and ρ(Γ0 ) both have a unique fixed point in ∂∞ Hn , then ρ is not cusp-deteriorating with respect to j, and so C(j, ρ) ≥ 1 by Lemma 2.7. By Proposition 4.16.(1) we can find a (j, ρ)-equivariant map f : Hn → Hn and a j(Γ0 )-invariant horoball B of Hn such that LipB (f ) = 1. If we denote by πB : Hn → B the closest-point projection, then f ◦πB : Hn → Hn is (j, ρ)-equivariant and 1-Lipschitz. Thus C(j, ρ) = 1 and f ∈ F j,ρ . Lemma 4.8 shows that Ef is contained in any j(Γ0 )-invariant horoball B ′ ⊂ B, hence it is empty. In particular, E(j, ρ) = ∅.  Proof of Proposition 4.16. For any 1 ≤ i ≤ c we explain how f |Conv(K) can be modified on j(Γ0 ) · Bi ∩ Conv(K) to obtain a new (j, ρ)-equivariant Lipschitz extension f0 : Conv(K) → Hn of ϕ such that f0 (precomposed as per Lemma 4.8 with the closest-point projection πConv(K) onto Conv(K)) has the desired properties, namely (A)–(B)–(C)–(D) below. More precisely, the implications will be (A) ⇒ (2), (B) ⇒ (3), and (C)–(D) ⇒ (1). We denote by Si the stabilizer of Bi in Γ0 under j. • (A) Convergence in deteriorating cusps. We first consider the case where Bi is deteriorating and prove that there is a C ∗ -Lipschitz, (j, ρ)-equivariant extension f0 : Conv(K) → Hn of ϕ such that f0 converges to a point on Bi ∩ Conv(K), agrees with f on Conv(K) r j(Γ0 ) · Bi , and satisfies d(f0 (p), f0 (q)) ≤ d(f (p), f (q)) for all p, q ∈ Conv(K). If C ∗ = CK,ϕ (j, ρ), then this last condition implies that the enhanced stretch locus of f0 is contained in that of f . It is sufficient to prove that for any δ > 0 there is a C ∗ -Lipschitz, (j, ρ)equivariant extension fδ : Conv(K) → Hn of ϕ such that fδ agrees with f on Conv(K) r j(Γ0 ) · Bi , satisfies d(fδ (p), fδ (q)) ≤ d(f (p), f (q)) for all p, q ∈ Bi ∩Conv(K), and for some horoball Bi′ ⊂ Bi , the set fδ (Bi′ ∩Conv(K)) is contained in the intersection of the convex hull of f (Bi′ ∩ Conv(K)) with a 36 FRANÇOIS GUÉRITAUD AND FANNY KASSEL ball of radius δ. Indeed, if this is proved, then we can apply the process to f and δ = 1 to construct a map f(1) , and then inductively to f(i) and δ = 1/2i for any i ≥ 1 to construct a map f(i+1) ; extracting a pointwise limit, we obtain a map f0 satisfying the required properties. Fix δ > 0 and let us construct fδ as above. Choose a generating subset {s1 , . . . , sm } of Si , a compact fundamental domain D of ∂Bi ∩ Conv(K) for the action of j(Si ) (use Fact 2.1), and a point p ∈ D. For t ≥ 0, the closestpoint projection πt from Bi onto the closed horoball at distance t of ∂Bi inside Bi commutes with the action of j(Si ). Set pt := πt (p); by (A.5), the number max1≤k≤m d(pt , j(sk ) · pt ) goes to 0 as t → +∞. We can also find fundamental domains Dt of πt (∂Bi ) ∩ Conv(K), containing pt , whose diameters go to 0 as t → +∞. Since f is Lipschitz and (j, ρ)-equivariant, the diameter of f (Dt ) and the function t 7→ max1≤k≤m d(f (pt ), ρ(sk ) · f (pt )) also tend to 0 as t → +∞. Let Fi ⊂ Hn be the fixed set of ρ(Si ) (a single point or a copy of Hd , for some d ≤ n). There exists η > 0 such that for any x ∈ Hn , if max1≤k≤m d(x, ρ(sk ) · x) < η, then d(x, Fi ) < δ/2. Applying this to x = f (pt ), we see that for large enough t there is a point qt ∈ Fi such that d(f (pt ), qt ) < δ/2 and the diameter of f (Dt ) is < δ/2, which implies that the ρ(Si )-invariant set f (Conv(K) ∩ πt (∂Bi )) is contained in the ball Ω := Bqt (δ) of radius δ centered at qt . Let πΩ : Hn → Ω be the closest-point projection onto Ω (see Figure 3). The (j, ρ)-equivariant map fδ : Conv(K) → Hn that agrees with f on Conv(K) r j(Γ0 ) · πt (Bi ) and with πΩ ◦ f on Conv(K) ∩ πt (Bi ) satisfies the required properties. • (B) Constant maps with a slightly larger Lipschitz constant in deteriorating cusps. We still consider the case when Bi is deteriorating. For ε > 0, we prove that there is a (C ∗ + ε)-Lipschitz, (j, ρ)-equivariant extension f0 : Hn → Hn of ϕ that is constant on some horoball Bi′ ⊂ Bi and that agrees with f on Hn r j(Γ0 ) · Bi . Fix ε > 0. By (A), we may assume that f converges to a point pi on Bi , hence there is a horoball Bi′′ ⊂ Bi such that f (Bi′′ ) is contained in the ball of diameter ε/2 centered at pi . Let fi : j(Γ0 )·Bi′′ → Hn be the (j, ρ)-equivariant map that extends the constant map Bi′′ → {pi }, and let ψ : Hn → [0, 1] be a j(Γ0 )-invariant, 1-Lipschitz function equal to 1 on a neighborhood of Hn r j(Γ0 ) · Bi′′ and vanishing far inside Bi′′ . The map f0 := ψf + (1 − ψ)fi is a (j, ρ)-equivariant extension of ϕ that is constant on some horoball Bi′ ⊂ Bi and that agrees with f on Hn r j(Γ0 ) · Bi . By Lemma 2.14, Lipp (f0 ) ≤ Lipp (f ) ≤ C ∗ for all p ∈ Hn r j(Γ0 ) · Bi′′ , and Lipp (f0 ) ≤ Lipp (f ) + ε ≤ C ∗ + ε for all p ∈ j(Γ0 ) · Bi′′ , hence f0 is (C ∗ + ε)-Lipschitz by (2.2). • (C) Constant maps in deteriorating cusps when C ∗ ≥ 1. We now consider the case when Bi is deteriorating and C ∗ ≥ 1. We construct a C ∗ -Lipschitz, (j, ρ)-equivariant extension f0 : Conv(K) → Hn of ϕ that is constant on Bi′ ∩ Conv(K) for some horoball Bi′ ⊂ Bi and agrees with f on Conv(K) r j(Γ0 ) · Bi . We also prove that if C ∗ = CK,ϕ (j, ρ), then the MAXIMALLY STRETCHED LAMINATIONS Hn Bi 37 πt (Bi ) πt (D) D f πΩ Bqt (δ) = Ω f (D) Bqt (δ) = Ω f (D) Fi = Fix (ρ(Si )) Fi = Fix (ρ(Si )) Figure 3. Step (A): Postcomposition with the closest-point projection onto the small, ρ(Si )-invariant ball Ω. enhanced stretch locus of f0 (hence of f0 ◦πConv(K) by Lemma 4.8) is included in that of f . By (A), we may assume that f converges to a point pi on Bi . Let Bi′ be a horoball strictly contained in Bi . Since the set ∂Bi ∩ Conv(K) is compact modulo j(Si ) (Fact 2.1), its image under f lies within bounded distance from pi . Therefore, if Bi′ is far enough from ∂Bi , then the map from (Conv(K) r j(Γ0 ) · Bi ) ∪ (Bi′ ∩ Conv(K)) to Hn that agrees with f on Conv(K) r j(Γ0 ) · Bi and that is constant equal to pi on Bi′ ∩ Conv(K) is C ∗ Lipschitz. By Proposition 3.9, we can extend it to a C ∗ -Lipschitz, (j|Si , ρ|Si )equivariant map from (Conv(K)rj(Γ0 )·Bi )∪(Bi ∩Conv(K)) to Hn . Finally we extend this map to a (j, ρ)-equivariant map f (1) : Conv(K) → Hn . Then f (1) is C ∗ -Lipschitz, agrees with f on Conv(K) r j(Γ0 ) · Bi , and is constant on Bi′ ∩ Conv(K). Suppose that C ∗ = CK,ϕ (j, ρ). Then Lip(f (1) ) = C ∗ (and no smaller). The stretch locus (and maximally stretched segments) of f (1) are included in those of f , except possibly between ∂Bi and ∂Bi′ . To deal with this issue, we consider two horoballs Bi′′′ ( Bi′′ strictly contained in Bi′ and, similarly, construct a C ∗ -Lipschitz, (j, ρ)-equivariant map f (2) : Conv(K) → Hn that agrees with f on Conv(K) r j(Γ0 ) · Bi′′ and is constant on Bi′′′ ∩ Conv(K). 38 FRANÇOIS GUÉRITAUD AND FANNY KASSEL The (j, ρ)-equivariant map 1 1 f0 := f (1) + f (2) 2 2 still agrees with f on Conv(K)rj(Γ0 )·Bi and is constant on Bi′′′ ∩Conv(K). By Lemma 2.13, its (enhanced) stretch locus is included in that of f . • (D) Lipschitz constant 1 in non-deteriorating cusps. We now consider the case when Bi is not deteriorating; in particular, C ∗ ≥ 1 by Lemma 2.7. We construct a C ∗ -Lipschitz, (j, ρ)-equivariant extension f0 : Conv(K) → Hn of ϕ such that LipBi′ ∩Conv(K) (f0 ) = 1 for some horoball Bi′ ⊂ Bi and f0 agrees with f on Conv(K) r j(Γ0 ) · Bi . We also prove that if C ∗ = CK,ϕ (j, ρ) then the enhanced stretch locus of f0 (hence of f0 ◦πConv(K) ) is included in that of f . We assume C ∗ > 1 (otherwise we may take f0 = f ). It is sufficient to construct a 1-Lipschitz, (j|Si , ρ|Si )-equivariant map fi : Bi′ ∩Conv(K) → Hn , for some horoball Bi′ ⊂ Bi , such that the (j|Si , ρ|Si )-equivariant map  f (1) : Conv(K) r j(Γ0 ) · Bi ∪ (Bi′ ∩ Conv(K)) −→ Hn that agrees with f on Conv(K) r j(Γ0 ) · Bi and with fi on Bi′ ∩ Conv(K) satisfies Lip(f (1) ) ≤ C ∗ . Indeed, we can then extend f (1) to a C ∗ -Lipschitz, (j, ρ)-equivariant map Conv(K) → Hn using Proposition 3.9, as in step (C). Proceeding with two other horoballs Bi′′′ ( Bi′′ to get a map f (2) and averaging as in step (C), we obtain a map f0 with the required properties. To construct fi , we use explicit coordinates: in the upper half-space model Rn−1 × R∗+ of Hn , we may assume (using Remark 4.3) that j(Si ) and ρ(Si ) both fix the point at infinity, that the horosphere ∂Bi is Rn−1 ×{1}, and that f fixes the point (0, 1) ∈ Rn−1 × R∗+ . Let Wi be the orthogonal projection to Rn−1 of Conv(K) ⊂ Rn ; the group j(Si ) preserves and acts cocompactly on any set Wi × {b} with b ∈ R∗+ (use Fact 2.1). The restriction of f to Wi × {1} may be written as  f (a, 1) = f ′ (a), f ′′ (a) for all a ∈ Wi , where f ′ : Wi → Rn−1 and f ′′ : Wi → R∗+ . Let  L := max 1, Lip(f ′ ) , where Lip(f ′ ) is measured with respect to the Euclidean metric dsRn−1 of Rn−1 , and let Bi′ ⊂ Bi be a horoball Rn−1 × [b0 , +∞), with large b0 > L to be adjusted later. The map fi : Wi × [b0 , +∞) → Hn given by  fi (a, b) := f ′ (a), Lb is (j|Si , ρ|Si )-equivariant, since f is and the groups j(Si ) and ρ(Si ) both preserve the horospheres Rn−1 × {b} (see Figure 4). Moreover, fi is 1-Lipschitz, since by construction it preserves the directions of Rn−1 (horizontal) and R∗+ (vertical) and it stretches by a factor ≤ 1 in the Rn−1 -direction and 1 in the R∗+ -direction, for the hyperbolic metric ds2Rn−1 + db2 . b2 Let Di ⊂ Wi × {1} be a compact fundamental domain for the action of j(Γ0 ) on ∂Bi ∩ Conv(K), and let R := maxx∈Di d((0, 1), x) > 0. ds2 = MAXIMALLY STRETCHED LAMINATIONS 39 fi (x′ ) Bi′ x′ = (a, b) Lb0 fi b0 f (x) (0, 1) x (0, 1) ∂Bi f (∂Bi ) ∂∞ H n ∂∞ H n Figure 4. Definition of a 1-Lipschitz extension fi in the cusp in Step (D). Recall (see (A.2)) that for any (a, b) ∈ Rn−1 × R∗+ ,    kak2 + b2 + 1 d (0, 1), (a, b) = arccosh . 2b In particular,    kak2 +b ≤1 d (0, 1), (a, b) − log b as soon as b exceeds some constant, which we shall assume from now on. Therefore, for any x ∈ Di and x′ = (a, b) ∈ Bi′ ∩ Conv(K),   kak2 ′ + b − 1 − R, (4.5) d(x, x ) ≥ log b and (using the expression of fi , and the fact that f fixes (0, 1) and f ′ is L-Lipschitz)    d f (x), fi (x′ ) ≤ d f (x), f (0, 1) + d f (0, 1), fi (x′ ) (4.6)   kLak2 + Lb + 1 + C ∗ R ≤ log Lb   kak2 + b + log(L) + 1 + C ∗ R. = log b In particular, if Bi′ is far enough from ∂Bi (i.e. b0 > 0 is large enough), then the log term dominates in (4.5) and (4.6) (where b ≥ b0 ), and so d(f (x), fi (x′ )) ≤ C ∗ d(x, x′ ) 40 FRANÇOIS GUÉRITAUD AND FANNY KASSEL for all x ∈ Di and x′ ∈ Bi′ ∩ Conv(K) (recall C ∗ > 1). Therefore, the (j|Si , ρ|Si )-equivariant map  f (1) : Conv(K) r j(Γ0 ) · Bi ∪ (Bi′ ∩ Conv(K)) −→ Hn that agrees with f on Conv(K) r j(Γ0 ) · Bi and with fi on Bi′ ∩ Conv(K) satisfies Lip(f (1) ) ≤ C ∗ . This completes the proof of (D), hence of Proposition 4.16.  5. An optimized, equivariant Kirszbraun–Valentine theorem The goal of this section is to prove the following analogue and extension of Proposition 3.9. We refer to Definitions 2.10 and 4.1 for the notion of stretch locus. We denote by Λj(Γ0 ) ⊂ ∂∞ Hn the limit set of j(Γ0 ). Recall j,ρ that for geometrically finite j, the sets FK,ϕ and EK,ϕ (j, ρ) of Definition 4.1 are nonempty as soon as K is nonempty or ρ is reductive, except possibly if CK,ϕ (j, ρ) = 1 and ρ is not cusp-deteriorating (Lemma 4.10 and Corollary 4.14). Theorem 5.1. Let Γ0 be a discrete group, (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations of Γ0 in G with j geometrically finite, K a j(Γ0 )-invariant subset of Hn whose image in j(Γ0 )\Hn is compact, and ϕ : K → Hn a (j, ρ)j,ρ equivariant Lipschitz map. Suppose that FK,ϕ and EK,ϕ (j, ρ) are nonempty. Set  Lip(ϕ) if K 6= ∅, C0 := C ′ (j, ρ) if K = ∅, where C ′ (j, ρ) is given by (1.4). • If C0 ≥ 1, then there exists a (j, ρ)-equivariant extension f : Hn → Hn of ϕ with Lipschitz constant C0 , optimal in the sense of Definition 4.12, whose stretch locus is the union of the stretch locus Eϕ of ϕ (defined to be empty if K = ∅) and of a closed set E ′ such that: – if C0 > 1, then E ′ is equal to the closure of a geodesic lamination of Hn r K that is maximally stretched by f , and j(Γ0 )\E ′ is compact; – if C0 = 1, then E ′ is a union of convex sets, each isometrically preserved by f , with extremal points only in the union of K and of the limit set Λj(Γ0 ) ⊂ ∂∞ Hn ; moreover, j(Γ0 )\E ′ is compact provided that ρ is cusp-deteriorating. In particular, in these two cases CK,ϕ (j, ρ) = C0 and EK,ϕ (j, ρ) = Eϕ ∪ E ′ . • If C0 < 1 then CK,ϕ (j, ρ) < 1. By a geodesic lamination of Hn rK we mean a nonempty disjoint union L of geodesic intervals of Hn r K (called leaves), with no endpoint in Hn r K, such that L is closed for the C 1 topology (i.e. any Hausdorff limit of segments of leaves of L is a segment of a leaf of L ). By “maximally stretched by f ” we mean that f multiplies all distances by C0 on any leaf of the lamination. For Γ0 = {1} and K 6= ∅, Theorem 5.1 improves the classical Kirszbraun– Valentine theorem (Proposition 3.1) by adding a control on the local Lipschitz constant of the extension (through a description of its stretch locus). We shall give a proof of Theorem 5.1 in Sections 5.1 to 5.3, and then a proof of Theorem 1.6, as well as Corollary 1.12 under the extra assumption MAXIMALLY STRETCHED LAMINATIONS 41 E(j, ρ) 6= ∅, in Section 5.4 (this extra assumption will be removed in Section 7.5). For K = ∅, we shall finally examine how far the stretch locus E(j, ρ) goes in the cusps in Section 5.6. 5.1. The stretch locus when CK,ϕ (j, ρ) > 1. We now fix (j, ρ) and (K, ϕ) as in Theorem 5.1. To simplify notation, we set C := CK,ϕ (j, ρ) (5.1) E := EK,ϕ (j, ρ) e := E eK,ϕ (j, ρ) E ≥ C0 , ⊂ Hn , ⊂ Hn × Hn e ⊂ Conv(K)×Conv(K) (see Definition 4.1). Recall that E ⊂ Conv(K) and E as soon as C > 0 (Lemma 4.8). In order to prove Theorem 5.1, we first establish the following. Lemma 5.2. In the setting of Theorem 5.1, if C > 1, then E r K is a j,ρ geodesic lamination of Hn r K, and any f ∈ FK,ϕ multiplies arc length by C on the leaves of this lamination. Note that the projection of E to j(Γ0 )\Hn is compact (even in the presence of cusps) by Corollary 4.17. The proof is a refinement of the classical Kirszbraun–Valentine theorem (Proposition 3.1). j,ρ Proof of Lemma 5.2. By Lemma 4.13, there exists an optimal f ∈ FK,ϕ , whose stretch locus is exactly E. Fix p ∈ E r K and consider a small closed ball B ⊂ Hn r K, of radius r > 0, centered at p, which projects injectively to j(Γ0 )\Hn . By Lemma 3.2 with (K, ϕ) := (∂B, f |∂B ), we can find points q ∈ Hn and k1 , k2 ∈ ∂B such that Cq := maxk∈∂B d(q, f (k))/d(p, k) is minimal and such that d(q, f (ki )) = Cq d(p, ki ) for i ∈ {1, 2} and k\ 1 pk2 ≤ \ f (k1 )qf (k2 ) 6= 0. By minimality of Cq , we have Cq ≤ Cf (p) ≤ Lip(f ) = C. We claim that Cq = C. Indeed, suppose by contradiction that Cq < C. Let B ′ ⊂ B be another ball centered at p, of radius r ′ ∈ (0, r) small enough so that Cq r/(r −r ′ ) ≤ C. Then, as in the proof of Lemma 4.15, the extension of f |∂B to ∂B ∪ B ′ which is constant equal to q on B ′ is still C-Lipschitz. Using Proposition 3.1 (see also Remark 3.4), we extend it to a C-Lipschitz j,ρ map f ′ : B → Hn . Working by equivariance, we obtain an element of FK,ϕ , n agreeing with f on H r j(Γ0 ) · B, which is constant on a neighborhood of p, contradicting p ∈ E. Thus Cq = C. We claim that k1 , k2 ∈ ∂B are diametrically opposite, that the geodesic segment [k1 , k2 ] is maximally stretched by f , that f (p) = q, and that the set K′ of points k ∈ ∂B such that d(q, f (k)) = C d(p, k) is reduced to {k1 , k2 }. Indeed, since f is C-Lipschitz, we have d(q, f (k1 )) d(q, f (k2 )) d(f (k1 ), f (k2 )) ≤C= = , d(k1 , k2 ) d(p, k1 ) d(p, k2 ) and since C > 1, Toponogov’s theorem [BH, Lem. II.1.13] implies that \ d(f (k1 ), f (k2 )) = C d(k1 , k2 ) and k\ 1 pk2 = π (the case k1 pk2 = 0 is ruled out since k1 , k2 ∈ ∂B are distinct). In particular, the geodesic segment [k1 , k2 ] has midpoint p and is maximally stretched by f , and f (p) = q 42 FRANÇOIS GUÉRITAUD AND FANNY KASSEL \ by Remark 2.8.(1). For any k ∈ K′ we have k[ 1 pk ≤ f (k1 )qf (k) 6= 0 or \ \ \ [2 ≤ f (k)qf [ kpk (k2 ) 6= 0 (since k[ 1 pk + kpk2 = f (k1 )qf (k) + f (k)qf (k2 ) = π), and so the above reasoning shows that k ∈ {k1 , k2 }. Taking B arbitrarily small, we see that there are exactly two germs of geodesic rays through p in E that are maximally stretched by f , and they are diametrically opposite. Let ℓ be the largest geodesic interval in E r K through p that is maximally stretched by f , corresponding to these two germs. We claim that ℓ terminates on the union of K and of the limit set Λj(Γ0 ) . Indeed, any infinite end of ℓ terminates on Λj(Γ0 ) since ℓ ⊂ Eϕ,K (j, ρ) ⊂ Conv(K) by Lemma 4.8; moreover, ℓ cannot terminate on a point p′ ∈ ErK since there are exactly two germs of geodesic rays through p′ in E that are maximally stretched by f and they are diametrically opposite. This implies that E r K is a geodesic lamination of Hn r K, maximally stretched by f .  It is possible for a point p ∈ K to belong to the stretch locus E without being an endpoint of a leaf of E, or even without belonging to any closed C-stretched segment of f at all (for instance if x 7→ Lipx (ϕ) immediately drops away from p). However, the following holds. Lemma 5.3. In the setting of Theorem 5.1, if C > 1, then any p ∈ E ∩ K lies either in the closure of E r K or in Eϕ′ := {k ∈ K | Lipk (ϕ) = C}. (Note that we have not yet proved that the inequality C0 := Lip(ϕ) ≤ C is an equality; this will be done in Proposition 5.8, and will imply by definition that Eϕ′ is the stretch locus Eϕ of ϕ.) Proof. Suppose C > 1 and consider p ∈ E ∩ K. Assuming p ∈ / Eϕ′ , we shall prove that p lies in the closure of E rK. Since p ∈ / Eϕ′ , there is a small closed ball B of radius r > 0 centered at p, projecting injectively to j(Γ0 )\Hn , such that LipB (ϕ) < C (Lemma 2.9). By Proposition 3.1 and Remark 3.4, the map ϕ|B∩K admits an extension ϕ to B with LipB (ϕ) < C. Consider an j,ρ optimal f ∈ FK,ϕ , whose stretch locus is exactly E (Lemma 4.13), and let C ∗ := sup q∈(K∩B)∪∂B C∗ d(ϕ(p), f (q)) ≤C. d(p, q) We claim that = C. Indeed, suppose by contradiction that C ∗ < C. ′ For any ball B ⊂ B centered at p, with radius r ′ > 0 small enough, the map f ′ : K ∪ ∂B ∪ B ′ → Hn that coincides with f on K ∪ ∂B and with ϕ on B ′ is still C-Lipschitz. Indeed, for any x ∈ K ∪ ∂B and y ∈ B ′ , if x lies in the interior of B then Lip{x,y} (f ′ ) = Lip{x,y} (ϕ) < C, and otherwise the triangle inequality gives C ∗ r + Lip(ϕ)r ′ d(f ′ (x), f ′ (y)) ≤ d(x, y) r − r′ ′ as in (3.1), which is ≤ C if r is small enough. Therefore f ′ admits a CLipschitz extension to B by Remark 3.4; working by equivariance, we obtain j,ρ an element f ′ ∈ FK,ϕ agreeing with f on Hn rj(Γ0 )·B, such that Lipp (f ′ ) ≤ Lip(ϕ) < C, contradicting p ∈ E. Thus C ∗ = C. If the upper bound C ∗ is approached by a sequence (qi )i∈N of (K ∩B)∪∂B with qi → p, then qi ∈ K for all large enough i and p ∈ Eϕ′ , contradicting MAXIMALLY STRETCHED LAMINATIONS 43 the assumption. Therefore (qi )i∈N has an accumulation point q 6= p. The geodesic segment [p, q] is maximally stretched by f (Remark 2.8.(1)), hence [p, q] r K ⊂ E r K and any accumulation point of [p, q] ∩ K lies in Eϕ′ . Since  p∈ / Eϕ′ , we obtain that p lies in the closure of E r K. e as in 5.2. The stretch locus when CK,ϕ (j, ρ) = 1. We define C, E, E (5.1). When C = 1, the stretch locus E may contain pieces larger than j,ρ lines that are isometrically preserved by all elements of FK,ϕ . Here is the counterpart of Lemma 5.2 in this case. Lemma 5.4. In the setting of Theorem 5.1, if C = 1, then there is a canonical family (Ωp )p∈E of closed convex subsets of Hn , of varying dimensions, with the following properties: (i) any p ∈ E lies in the interior of the corresponding Ωp (where we see Ωp as a subset of its own affine span — in particular, a point is equal to its own interior); (ii) the interiors of Ωp and Ωq are either equal or disjoint for p, q ∈ E; j,ρ (iii) the restriction to Ωp of any f ∈ FK,ϕ is an isometry; n (iv) whenever two points x 6= y in H satisfy d(f (x), f (y)) = d(x, y) for j,ρ some (hence any) optimal f ∈ FK,ϕ (Definition 4.12), the geodesic segment [x, y] (called a 1-stretched segment) is contained in some Ωp ; (v) all extremal points of Ωp lie in the union of K and of the limit set Λj(Γ0 ) of j(Γ0 ); (vi) the intersection of Ωp with any supporting hyperplane is an Ωq ; S (vii) E = p∈ErK Ωp ∪ Eϕ′ where Eϕ′ = {k ∈ K | Lipk (ϕ) = 1}. Properties (i)–(vii) are reminiscent of the stratification of the boundary of a convex object, with 1-stretched segments of E replacing segments contained in the boundary of the convex object; we shall call the interiors of the sets Ωp strata of E, and the sets Ωp closed strata. Remark 5.5. In dimension n ≥ 3, the connected components of E = EK,ϕ (j, ρ) can be nonconvex. Indeed, take n = 3. Let Γ0 be the fundamental group of a closed surface, let j ∈ Hom(Γ0 , G) be geometrically finite, obtained by bending slightly a geodesic copy of H2 inside H3 along some geodesic lamination L , and let ρ ∈ Hom(Γ0 , G) be obtained by bending even a little more along the same lamination L . Then E is the first bent copy of H2 , which can be nonconvex (though connected). j,ρ Proof of Lemma 5.4. Consider an optimal f ∈ FK,ϕ (Lemma 4.13): by definition, the stretch locus Ef = E is minimal, and so is the enhanced stretch ef = E. e locus E For p ∈ E, let Wp ⊂ P(Tp Hn ) be the set of directions of 1-stretched segments containing p in their interior. This set is independent of f because ef = E. e (It is for this independence property that we use the enhanced E e here.) Since f is 1-Lipschitz, the convex hull of any two stretch locus E such 1-stretched segments is isometrically preserved by f . Therefore the set Wp is a full projective subspace (possibly empty), equal to the projectivization of a vector subspace Vp ⊂ Tp Hn . Moreover, there is a neighborhood of p in expp (Vp ) on which f coincides with an isometric embedding 44 FRANÇOIS GUÉRITAUD AND FANNY KASSEL ψp : expp (Vp ) → Hn , and the closed set  Ωp := x ∈ expp (Vp ) | f (x) = ψp (x) ⊂ E is convex and contains p in its interior. The isometric embedding ψp may depend on f , but the set Ωp depends only on the data (j, ρ, K, ϕ), because so e We shall denote by dp ≥ 0 the dimension does the enhanced stretch locus E. of Vp . Conditions (i) and (iii) are satisfied by construction, and so is (iv) by taking p in the interior of the given 1-stretched segment [x, y]. (Note that Ωp may contain points of K in its interior, even when p ∈ / K.) For any x belonging to the interior of Ωp in expp (Vp ), we have Vx = Tx Ωp . Indeed, Vx ⊃ Tx Ωp is clear since f |Int(Ωp ) is an isometry; and if x were in the interior of any 1-stretched segment s not contained in expp (Vp ), then f would be isometric on the (dp +1)-dimensional convex hull of Ωp ∪s, which contains p in its interior: this would violate the definition of Vp . From Vx = Tx Ωp we deduce in particular ψx = ψp and Ωx = Ωp . It follows that given q ∈ E, if the interiors of Ωp and Ωq intersect at a point x, then ψp = ψx = ψq and Ωp = Ωq : thus (ii) holds. Any 1-stretched segment s = [x, y] with an interior point q in Ωp is cond′ and yqp d′ for p′ ∈ Ωp , tained in Ωp . Indeed, f must preserve all angles xqp hence f is an isometry on the convex hull of s ∪ Ωp , which contains p in its interior: therefore s ⊂ expp (Vp ) by definition of dp and s ⊂ Ωp by definition of Ωp . In expp (Vp ), the intersection of Ωp with any supporting hyperplane Π at a point of ∂Ωp is the closure of an open convex subset Q of some Hd , where 0 ≤ d < dp (with H0 being a point). Consider a point q ∈ Q. By the previous paragraph, any open 1-stretched segment through q is in Ωp , hence in Π, hence in Q (see Figure 5). Therefore, d = dq and ψq = ψp |expq (Vq ) . It follows that Ωq is the closure of Q. This gives (vi). Ωp p Π q Q Figure 5. A 3-dimensional convex stratum Ωp with a supporting plane Π. By (vi), extremal points q ∈ Ωp inHn satisfy Ωq = {q}, hence q ∈ K by Lemma 5.6 below; this gives (v). MAXIMALLY STRETCHED LAMINATIONS 45 We obtain (vii) by replacing C by 1 and the call to Proposition 3.1 by Proposition 3.7 in the proof of Lemma 5.3.  Lemma 5.6. Any p ∈ E r K is contained in the interior of a 1-stretched segment. j,ρ Proof. Consider an optimal f ∈ FK,ϕ (Lemma 4.13), whose stretch locus is exactly E. Fix p ∈ E r K and consider a small closed ball B ⊂ Hn rK, centered at p, which projects injectively to j(Γ0 )\Hn . By Lemma 3.2 with (K, ϕ) := (∂B, f |∂B ), we can find a point q ∈ Hn such that Cq := maxk∈∂B d(q, f (k))/d(p, k) is minimal. In particular, Cq ≤ Cf (p) ≤ Lip(f ) = 1. In fact Cq = 1: otherwise, using Proposition 3.1 as in the proofs of Lemmas j,ρ 4.15 and 5.2, we could construct an element of FK,ϕ that would be locally constant near p, contradicting the fact that p ∈ E. In particular, there cannot exist k1 , k2 ∈ ∂B such that d(q, f (ki )) = \ Cq d(p, ki ) for i ∈ {1, 2} and 0 ≤ k\ 1 pk2 < f (k1 )qf (k2 ) ≤ π: otherwise we would have d(f (k1 ), f (k2 )) > d(k1 , k2 ) by basic trigonometry, contradicting Lip(f ) = 1. Therefore, Lemma 3.2 implies the existence of a probability measure ν on K′ := {k ∈ ∂B | d(q, f (k)) = d(p, k)} such that q belongs to the convex hull \ of the support of f∗ ν and such that k\ 1 pk2 = f (k1 )qf (k2 ) for (ν × ν)-almost ′ ′ all (k1 , k2 ) ∈ K × K . This means that the continuous map f : Hn → Hn is an isometry on the support of ν (which is contained in ∂B), hence has a unique 1-Lipschitz extension (the isometric one, with which f must agree) to the convex hull X of this support. Since f (X) contains q, we have f (p) = q and there is a 1-stretched segment through p. This completes the proof of Lemma 5.6, hence of Lemma 5.4.  Remark 5.7. When K = ∅, the closed strata Ωp of the lowest dimension (say k ≥ 1) are always complete copies of Hk : otherwise, they would by Lemma 5.4.(vi) admit supporting planes giving rise to closed strata of lower dimension. In particular, the union of these closed strata is a k-dimensional geodesic lamination in the sense of Section 1.2. In dimension n = 2, we must have k = 1 (unless j and ρ are conjugate); this implies that the stretch locus is the union of a geodesic lamination and (possibly) certain connected components of its complement. 5.3. Proof of Theorem 5.1. Theorem 5.1 is an immediate consequence of Corollary 4.17, of Lemmas 5.2 and 5.4, and of the following proposition. Proposition 5.8. In the setting of Theorem 5.1, if CK,ϕ (j, ρ) ≥ 1, then CK,ϕ (j, ρ) = C0 . In particular, C0 < 1 implies CK,ϕ (j, ρ) < 1. Proof. Recall that C0 ≤ C := CK,ϕ (j, ρ) (see (5.1)). Let us prove the converse inequality when C ≥ 1. In the particular situation where C := CK,ϕ (j, ρ) = 1 and ρ is not cuspdeteriorating, we have C0 ≥ 1 by Lemma 2.7. We now assume that we are not in this particular situation. By Corollary 4.14, the set E := EK,ϕ (j, ρ) is nonempty. Suppose E ⊂ K. By Lemma 5.3 or Lemma 5.4.(vii), for any p ∈ E ⊂ K we have Lipp (ϕ) = C, and so C0 = Lip(ϕ) ≥ C. 46 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Suppose E 6⊂ K. By Lemma 5.2 or Lemma 5.4.(iii)–(v), any point p ∈ E r K belongs, either to the convex hull of a subset of K on which f multiplies all distances by C, or to a maximally stretched geodesic ray with an endpoint in Λj(Γ0 ) whose image in the quotient j(Γ0 )\Hn is bounded (Proposition 4.16.(1)). In the first case, C0 = Lip(ϕ) ≥ C since f coincides with ϕ on K. In the second case, Lemma 4.6 yields C0 ≥ C.  Theorem 1.3 is contained in Lemmas 4.10 and 4.13, Corollary 4.14, Theorem 5.1, and Remark 5.7. 5.4. Some easy consequences of Theorem 5.1. We first prove Theorem 1.6, which concerns the case where K is nonempty and possibly noncompact modulo j(Γ0 ). Proof of Theorem 1.6. Let K 6= ∅ be a j(Γ0 )-invariant subset of Hn . We can always extend ϕ to the closure K of K by continuity, with the same Lipschitz constant C0 . Suppose the image of K in j(Γ0 )\Hn is compact. If C0 ≥ 1, then Theorem 1.6 is contained in Theorem 5.1. If C0 < 1, then C(j, ρ) < 1 by Theorem 5.1, which implies Theorem 1.6 since F j,ρ 6= ∅ (Lemma 4.10). Now, for C0 ≥ 1, consider the general case where the image of K in j(Γ0 )\Hn is not necessarily compact. Let (Ck )k∈N be a sequence of j(Γ0 )-invariant subsets of Hn whose images in j(Γ0 )\Hn are compact, S with Ck ⊂ Ck+1 and k∈N Ck = Hn . For any k, Theorem 5.1 gives a (j, ρ)equivariant extension fk : Hn → Hn of ϕ|K∩Ck with Lip(fk ) = C0 , and we conclude using the Arzelà–Ascoli theorem as in Remark 3.6.  We then turn to Corollary 1.12, for which K is empty. Corollary 1.12 for E(j, ρ) 6= ∅ is an immediate consequence of Lemma 4.6 and Theorem 5.1. For E(j, ρ) = ∅, we shall prove Corollary 1.12 in Section 7.5 (Lemma 7.4), using a Cartan projection µ of G. Recall however from Corollary 4.14 that E(j, ρ) = ∅ may only happen if C(j, ρ) = 1 and ρ is not cusp-deteriorating; in that case, a direct proof of Corollary 1.12 could also be obtained by considering a sequence of closed geodesics of j(Γ0 )\Hn that spend more and more time in a cusp whose stabilizer contains an element γ ∈ Γ0 with both j(γ) and ρ(γ) parabolic. In dimension n = 2, for torsion-free Γ0 , let Cs′ (j, ρ) be the supremum of λ(ρ(γ))/λ(j(γ)) over all elements γ ∈ Γ0 corresponding to simple closed curves in the hyperbolic surface j(Γ0 )\H2 . (As for C ′ (j, ρ), we define Cs′ (j, ρ) to be C(j, ρ) in the degenerate case when j(Γ0 )\H2 has no essential closed curve.) Then Cs′ (j, ρ) ≤ C ′ (j, ρ) ≤ C(j, ρ) (see (4.1)). Here is another consequence of Theorem 5.1. Lemma 5.9 (n = 2, torsion-free Γ0 ). Suppose E(j, ρ) 6= ∅. If Cs′ (j, ρ) < 1, then C ′ (j, ρ) < 1. Proof. If C(j, ρ) ≥ 1, then (5.2) Cs′ (j, ρ) = C ′ (j, ρ) = C(j, ρ). Indeed, by Theorem 5.1 and Remark 5.7, the image of E(j, ρ) in j(Γ0 )\Hn contains a nonempty geodesic lamination L with compact image. If L contains a simple closed curve, then (5.2) is clear; otherwise we can argue as MAXIMALLY STRETCHED LAMINATIONS 47 in the proof of Lemma 4.6, but with the axis of j(γ) projecting to a simple closed geodesic nearly carried by L .  Note that if E(j, ρ) = ∅, then it is possible to have Cs′ (j, ρ) < 1 = = C(j, ρ): see Section 10.8. C ′ (j, ρ) 5.5. The recurrent set of maximally stretched laminations. For empty K, Theorem 5.1 states that the stretch locus E(j, ρ) contains a maximally stretched k-dimensional geodesic lamination with compact (nonempty) imj,ρ and EK,ϕ (j, ρ) are nonempty and C ′ (j, ρ) ≥ 1. age in j(Γ0 )\Hn as soon as FK,ϕ Conversely, we make the following observation. Lemma 5.10. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite. Let L be a j(Γ0 )-invariant kdimensional geodesic lamination of Hn with a compact image in j(Γ0 )\Hn . If L is maximally stretched by some (j, ρ)-equivariant Lipschitz map f : Hn → Hn , then the recurrent set of L is contained in the stretch locus E(j, ρ). By recurrent set of L , we mean the projection to j(Γ0 )\Hn of the recurrent set of the geodesic flow (Φt )t∈R restricted to vectors tangent to L . By compactness, this recurrent set is nonempty. Recall that in this setting we have C ′ (j, ρ) = C(j, ρ) = Lip(f ) by Lemma 4.6. Proof. Set C := C(j, ρ) = Lip(f ). In order to prove that the recurrent set of L is contained in E(j, ρ), it is sufficient to prove that for any geodesic line (pt )t∈R of Hn contained in L and projecting to a geodesic which is recurrent in j(Γ0 )\Hn , we have d(f ′ (p0 ), f ′ (p1 )) = C = C d(p0 , p1 ) for all f ′ ∈ F j,ρ (hence [p0 , p1 ] ⊂ E(j, ρ)). Fix ε > 0. By recurrence, we can find γ ∈ Γ0 and t > 1 with [j(γ) · p0 , j(γ) · p1 ] arbitrarily close to [pt , pt+1 ], so that by the closing lemma (Lemma A.1) the translation axis of j(γ) passes within ε of the four points p0 , p1 , pt , pt+1 and the axis of ρ(γ) within Cε of their four images under f . Choose q0 , q1 ∈ Hn within ε of p0 , p1 , respectively, on the axis of j(γ). For any f ′ ∈ F j,ρ ,   d(f ′ (q0 ), f ′ (q1 )) ≥ d f ′ (q0 ), ρ(γ) · f ′ (q0 ) − d ρ(γ) · f ′ (q0 ), f ′ (q1 )  ≥ λ(ρ(γ)) − d f ′ (j(γ) · q0 ), f ′ (q1 )  ≥ C · (λ(j(γ)) − 4ε) − Lip(f ′ ) · λ(j(γ)) − d(q0 , q1 ) = C · (d(q0 , q1 ) − 4ε) since Lip(f ′ ) = C. But p0 , p1 are ε-close to q0 , q1 ; therefore d(f ′ (p0 ), f ′ (p1 )) ≥ ≥ ≥ ≥ d(f ′ (q0 ), f ′ (q1 )) − d(f ′ (p0 ), f ′ (q0 )) − d(f ′ (p1 ), f ′ (q1 )) C · (d(q0 , q1 ) − 4ε) − 2 Lip(f ′ ) ε C · (d(p0 , p1 ) − d(p0 , q0 ) − d(p1 , q1 ) − 4ε) − 2Cε C · (1 − 8ε). This holds for any ε > 0, hence d(f ′ (p0 ), f ′ (p1 )) = C.  48 FRANÇOIS GUÉRITAUD AND FANNY KASSEL 5.6. How far the stretch locus goes into the cusps. Suppose that j is geometrically finite but not convex cocompact. For empty K, we can control how far the stretch locus EK,ϕ (j, ρ) = E(j, ρ) goes into the cusps. Proposition 5.11. There is a nondecreasing function Ψ : (1, +∞) → R∗+ such that for any discrete group Γ0 , any pair (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite and C(j, ρ) > 1, and any x ∈ E(j, ρ) whose image in j(Γ0 )\Hn belongs to a standard cusp region of the convex core (Definition 2.2), the cusp thickness at x is ≥ Ψ(C(j, ρ)). Here we use the following terminology, where N ⊂ Hn is the preimage of the convex core of j(Γ0 )\Hn . Definition 5.12. Let B be a horoball of Hn such that B ∩ N projects to a standard cusp region of j(Γ0 )\Hn . Given a point x ∈ B, let ∂Bx denote the horosphere concentric to B running through x. The cusp thickness of j(Γ0 )\Hn at x is the Euclidean diameter in j(Stab(B))\∂Bx of the orthogonal projection of N to ∂Bx . By Euclidean diameter we mean the diameter for the metric induced by the intrinsic, Euclidean metric of ∂Bx ; it varies exponentially with the depth of x in the cusp region (see (A.3) for conversion to a hyperbolic distance). Note that the orthogonal projection of N is convex inside the Euclidean space ∂Bx ≃ Rn−1 . We believe that an analogue of Proposition 5.11 should also hold for C(j, ρ) < 1, see Appendix C.4. It is false for C(j, ρ) = 1 (take j = ρ). Proposition 5.11 will be a consequence of the following lemma, which applies to C = C(j, ρ) and to leaves ℓ0 , ℓ1 of the geodesic lamination E(j, ρ). It implies that any two leaves of E(j, ρ) coming close to each other must be nearly parallel. This is always the behavior of simple closed curves and geodesic laminations in dimension n = 2. Lemma 5.13. For any C > 1, there exists δ0 > 0 with the following property. Let ℓ0 , ℓ1 be disjoint geodesic lines of Hn . Suppose there exists a C-Lipschitz map f : ℓ0 ∪ ℓ1 → Hn multiplying all distances by C on ℓ0 and on ℓ1 . If ℓ0 and ℓ1 pass within δ ≤ δ0 of each other near some point x ∈ Hn , then they stay within distance 1 of each other on a length ≥ | log δ| − 10 before and after x. (The constant 10 is of course far from optimal.) Proof. We can restrict to dimension n = 3 because the geodesic span of two lines has dimension at most 3. Fix C > 1 and let ℓ0 , ℓ1 , and f be as above. The images ℓ′0 := f (ℓ0 ) and ℓ′1 := f (ℓ1 ) are geodesic lines of H3 . Fix orientations on ℓ0 , ℓ1 , ℓ′0 , ℓ′1 so that f is orientation-preserving. For i ∈ {0, 1}, let xi be a point of ℓi closest to ℓ1−i , so that the geodesic segment [x0 , x1 ] is orthogonal to both ℓ0 and ℓ1 ; let σ be the rotational symmetry of H3 around the line (x0 , x1 ). Similarly, let x′i ∈ ℓ′i be closest to ℓ′1−i , so that the segment [x′0 , x′1 ] is orthogonal to ℓ′0 and ℓ′1 ; let σ ′ be the rotational symmetry of H3 around (x′0 , x′1 ). Up to replacing f by 1 1 f + σ ′ ◦ f ◦ σ, 2 2 MAXIMALLY STRETCHED LAMINATIONS 49 which is still C-Lipschitz (Lemma 2.13), which preserves the orientations of ℓ0 , ℓ1 , ℓ′0 , ℓ′1 , and which multiplies all distances by C on ℓ0 and on ℓ1 , we may assume that f (x0 ) = x′0 and f (x1 ) = x′1 . Let η (resp. η ′ ) be the length of [x0 , x1 ] (resp. of [x′0 , x′1 ]), and θ (resp. θ ′ ) the angle between the positive directions of ℓ0 and ℓ1 (resp. of ℓ′0 and ℓ′1 ), measured by projecting orthogonally to a plane perpendicular to [x0 , x1 ] (resp. to [x′0 , x′1 ] if η ′ > 0). We claim that (∗) there exists ∆0 > 0, depending only on C, such that if η ≤ ∆0 , then min{θ, π − θ} ≤ 1.005 η. Indeed, for i ∈ {0, 1}, let ti > 0 be the linear coordinate of a point pi ∈ ℓi , measured from xi with the chosen orientation. By (A.7), (5.3) cosh d(p0 , p1 ) = cosh η · cosh t0 cosh t1 − cos θ · sinh t0 sinh t1 . Therefore, using cosh t ∼ et /2, we obtain that for t0 , t1 → +∞,   cosh η − cos θ d(p0 , p1 ) = t0 + t1 + log + o(1). 2 Similarly, since f stretches ℓ0 and ℓ1 by a factor of C and f (xi ) = x′i ,    cosh η ′ − cos θ ′ + o(1). d f (p0 ), f (p1 ) = Ct0 + Ct1 + log 2 Since f is C-Lipschitz, we must have     cosh η ′ − cos θ ′ cosh η − cos θ log ≤ C log . 2 2 Note that this must also hold if we replace θ, θ ′ with their complements to π, because we can reverse the orientations of ℓ1 and ℓ′1 . We thus obtain   cosh η ± cos θ C cosh η ′ ± cos θ ′ ≤ . 2 2 Since cosh η ′ ≥ 1, adding the two inequalities yields     cosh η + cos θ C cosh η − cos θ C (5.4) + ≥ 1. 2 2 Inequality (5.4) means that (cos θ, cosh η) lies in R2 outside of a π4 -rotated √ and 2-scaled copy of the unit ball of R2 for the LC -norm. (See also (A.10) for an interpretation of (5.4) in terms of the cross-ratio of the endpoints of ℓ0 , ℓ1 .) Since cos θ ∈ [−1, 1] and cosh η ≥ 1, we obtain that (cos θ, cosh η) lies above some concave curve through the points (−1, 1) and (1, 1), with respective slopes 1 and −1 at these points (recall that C > 1). In particular, if cosh η is very close to 1, then | cos θ| must be about as close (or closer) to 1 (see Figure 6). We obtain (∗) by using the Taylor expansions of cosh and cos (of course 1.005 can be replaced by any number > 1). To deduce the lemma from (∗), we can minimize (5.3) in t1 alone to find sinh2 d(p0 , ℓ1 ) = sinh2 η + (sinh2 η + sin2 θ) sinh2 t0 . By (∗), for small enough η we have η 2 ≤ sinh2 η + sin2 θ ≤ 2.004 η 2 , 50 FRANÇOIS GUÉRITAUD AND FANNY KASSEL p1 ℓ1 x1 η x0 ℓ0 θ p0 Figure 6. At distance d(p0 , x0 ) = t0 < | log η| from a point of closest approach of the two lines ℓ0 , ℓ1 , their angular drift ≈ θet0 cannot much exceed their height drift ≈ ηet0 . hence (5.5) sinh2 η + η 2 sinh2 t0 ≤ sinh2 d(p0 , ℓ1 ) ≤ sinh2 η + 2.004 η 2 sinh2 t0 . If t0 ∈ [0, | log η|] (for small η), we have sinh2 η sinh2 t0 2.004 + 2.004 ≤ 1.005 + = 1.506, 2 2t 2t 0 0 η e e 4 hence, on the upper side of (5.5), √  1.506 ηet0 (5.6) sinh2 η + 2.004 η 2 sinh2 t0 ≤ 1.506 η 2 e2t0 ≤ sinh2 2 2t0 and using the inequality x ≤ sinh x for x ∈ R . by multiplying + √ by η e Note that 1.506 ≤ 1.23. On the other hand, using again sinh x ≥ x, sinh2 η sinh2 t0 cosh2 t0 1 + ≥ ≥ , 2 2t 2t 2t 0 0 0 η e e e 4 hence, on the lower side of (5.5), (5.7) sinh2 η + η 2 sinh2 t0 ≥ (ηet0 sinh 0.48)2 ≥ sinh2 (0.48 η et0 ) by multiplying by η 2 e2t0 and using the inequality sinh2 0.48 < 1/4 and the convexity of sinh (recall ηet0 ≤ 1). From (5.5), (5.6), and (5.7), it follows that for η smaller than some δ0 ∈ (0, 1) (depending only on C), 0.48 η e|t0 | ≤ d(p0 , ℓ1 ) ≤ 1.23 η e|t0 | as soon as |t0 | ≤ | log η|. This two-sided exponential bound means that p0 7→ log d(p0 , ℓ1 ) is essentially a 1-Lipschitz function of p0 (plus a bounded correction), which easily implies the lemma.  Proof of Proposition 5.11. Let Γ0 be a discrete group, (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite, and B an open horoball of Hn whose image in j(Γ0 )\Hn intersects the convex core in a standard cusp region. The stabilizer S ⊂ Γ0 of B under j has a normal subgroup S ′ isomorphic to Zm for some 0 < m < n, and of index ≤ ν(n) in S, where ν(n) < +∞ depends only on n (see Section 2.1). In the upper half-space model Rn−1 × R∗+ of Hn , where ∂∞ Hn identifies with Rn−1 ∪ {∞}, we may assume that B is centered at ∞. Let Ω be the convex hull of Λj(Γ0 ) r {∞} in Rn−1 , where Λj(Γ0 ) is the limit set of j(Γ0 ). The ratio of the Euclidean diameter of j(S ′ )\Ω to that of j(S)\Ω is bounded by 2ν(n). We renormalize the metric on Rn−1 so that j(S ′ )\Ω has Euclidean diameter 1: then, by MAXIMALLY STRETCHED LAMINATIONS 51 definition of cusp thickness, it is sufficient to prove that the height of points of E(j, ρ) in Rn−1 × R∗+ is bounded in terms of C(j, ρ) alone. There is an m-dimensional affine subspace V ⊂ Ω of Rn−1 which is preserved by j(S ′ ) and on which j(S ′ ) acts as a lattice of translations (see Section 2.1). Any point of Ω lies within distance 1 of V . If C(j, ρ) > 1, then by Theorem 5.1 the stretch locus E(j, ρ) is a disjoint union of geodesic lines of Hn . Let ℓ ⊂ E(j, ρ) be such a line, reaching a height h in the upper half-space model. We must bound h. The endpoints ξ, η ∈ Ω of ℓ are 2h apart in Rn−1 . Let ξ ′ , η ′ ∈ V be within distance 1 from ′ ′ ξ, η respectively. There exists γ ∈ S ′ such that dRn−1 (j(γ) · ξ ′ , ξ +η 2 ) ≤ 1. Since ξ ′ , η ′ and their images under j(γ) form a parallelogram, we also have ′ ′ ′ dRn−1 (j(γ) · ξ +η 2 , η ) ≤ 1. By the triangle inequality,     ξ+η ξ +η , η ≤ 3. dRn−1 j(γ) · ξ , ≤ 3 and dRn−1 j(γ) · 2 2 and j(γ) · 3ξ+η are at Euclidean Adding up, it follows that the points ξ+3η 4 4 distance ≤ 3 from √ each other. But the leaves ℓ and j(γ) · ℓ of E(j, ρ) contain √ points at height h 3/2 above these two points, and are therefore ≤ 2 3/h apart in the hyperbolic metric. However, ℓ and j(γ) · ℓ form an angle close to π/3 (see Figure 7): by Lemma 5.13 (or (∗) in its proof), this places an upper bound on h (depending only on C(j, ρ)).  j(γ) · ℓ ℓ h ξ j(γ) · ξ ′ Cusp group j(S ) η V Ω j(γ) · η ∂∞ Hn Figure 7. Two leaves ℓ and j(γ) · ℓ which nearly intersect, at an angle close to π/3 (in the upper half-space model of Hn ). In Section 6.4, in order to prove the upper semicontinuity of (j, ρ) 7→ C(j, ρ) where C ≥ 1 when all the cusps of j have rank ≥ n − 2, we shall need the following consequence of Proposition 5.11. Corollary 5.14. Let Γ0 be a discrete group and (jk , ρk )k∈N∗ a sequence of elements of Hom(Γ0 , G)2 converging to some (j, ρ) ∈ Hom(Γ0 , G)2 , where • j and the jk are all geometrically finite, of the same cusp type, with all cusps of rank ≥ n − 2, • there exists C ∗ > 1 such that C(jk , ρk ) ≥ C ∗ for all k ∈ N∗ , • the stretch loci E(jk , ρk ) are nonempty (this is the case for instance if ρk is reductive, see Lemma 4.10 and Corollary 4.14). Then for any k ∈ N∗ we can find a fundamental domain Ek of E(jk , ρk ) for the action of jk (Γ0 ) so that all the Ek are contained in some compact subset of Hn independent of k. 52 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Proof. By Proposition B.3, there exist a compact set C ⊂ Hn and, for any large enough k ∈ N∗ , horoballs H1k , . . . , Hck of Hn , such that the union G of all geodesic rays from C to the centers of H1k , . . . , Hck contains a fundamental n domain of the convex core of S jk (Γ0 )\Hk . In particular, the cusp thickness of n jk (Γ0 )\H at any point of 1≤i≤c ∂Hi is uniformly bounded from above by some constant independent of k. On the other hand, by Proposition 5.11, the cusp thickness of jk (Γ0 )\Hn at any point of E(jk , ρk ) is uniformly bounded from below by some constant independent of k. Since cusp thickness decreases uniformly to 0 in all cusps (at exponential rate), this means that E(jk , ρk ) ∩ G (which contains a fundamental domain of E(jk , ρk ) for the action of jk (Γ0 )) remains in some compact subset of Hn independent of k.  6. Continuity of the minimal Lipschitz constant In this section we examine the continuity of the function (j, ρ) 7→ C(j, ρ) for geometrically finite j (the set K of Sections 4 and 5 is empty). We endow Hom(Γ0 , G) with its natural topology: a sequence (jk , ρk ) converges to (j, ρ) if and only if jk (γ) → j(γ) and ρk (γ) → ρ(γ) for all γ in some (hence any) finite generating subset of Γ0 . We first prove Proposition 1.5, which states the continuity of (j, ρ) 7→ C(j, ρ) for convex cocompact j. When j is not convex cocompact, continuity, and even semicontinuity, fail in any dimension n ≥ 2: see Sections 10.6 and 10.7 for counterexamples. However, we will prove the following. Proposition 6.1. Let Γ0 be a discrete group and j0 ∈ Hom(Γ0 , G) a geometrically finite representation. If all the cusps of j0 have rank ≥ n − 2 (for instance if we are in dimension n ≤ 3), then (1) the set of pairs (j, ρ) with C(j, ρ) < 1 is open in Homj0 (Γ0 , G) × Homj0 -det (Γ0 , G), (2) the set of pairs (j, ρ) with 1 < C(j, ρ) is open in Homj0 (Γ0 , G) × Hom(Γ0 , G), (3) the map (j, ρ) 7→ C(j, ρ) is continuous on the set of pairs (j, ρ) ∈ Homj0 (Γ0 , G) × Hom(Γ0 , G) with 1 ≤ C(j, ρ) < +∞. If the cusps of j0 have arbitrary ranks, then condition (2) holds, as well as: (1’) the set of ρ with C(j0 , ρ) < 1 is open in Homj0 -det (Γ0 , G), (3’) the map (j, ρ) 7→ C(j, ρ) is lower semicontinuous on the set of pairs (j, ρ) ∈ Homj0 (Γ0 , G) × Hom(Γ0 , G) with 1 ≤ C(j, ρ): C(j, ρ) ≤ lim inf C(jk , ρk ) k for any sequence (jk , ρk ) of such pairs converging to such a pair (j, ρ), (3”) the map ρ 7→ C(j0 , ρ) is upper semicontinuous on the set of representations ρ ∈ Hom(Γ0 , G) with 1 ≤ C(j0 , ρ) < +∞: C(j0 , ρ) ≥ lim sup C(j0 , ρk ) k for any sequence (ρk ) of such representations converging to such a representation ρ. Here we denote by MAXIMALLY STRETCHED LAMINATIONS 53 • Homj0 (Γ0 , G) the space of geometrically finite representations of Γ0 in G with the same cusp type as the fixed representation j0 ; • Homj0 -det (Γ0 , G) the space of representations that are cusp-deteriorating with respect to j0 , in the sense of Definition 1.1. These two sets are endowed with the induced topology from Hom(Γ0 , G). In (3)–(3’)–(3”), we endow the set of pairs (j, ρ) satisfying 1 ≤ C(j, ρ) < +∞ or 1 ≤ C(j, ρ) with the induced topology from Hom(Γ0 , G)2 . Note that Homj0 -det (Γ0 , G) is a semi-algebraic subset of Hom(Γ0 , G); it is equal to Hom(Γ0 , G) if and only if j0 is convex cocompact. When j0 is not convex cocompact, the condition C(j, ρ) < 1 is not open in Homj0 (Γ0 , G)×Hom(Γ0 , G) or even in {j0 }×Hom(Γ0 , G), since the constant representation ρ (for which C(j, ρ) = 0) may be approached by non-cuspdeteriorating representations ρ (for which C(j, ρ) ≥ 1); see also Section 10.6 for a related example. This is why we need to restrict to cusp-deteriorating ρ in Proposition 6.1.(1). In dimension n ≥ 4, when j0 has cusps of rank < n − 2, conditions (1) and (3) of Proposition 6.1 do not hold: see Sections 10.10 and 10.11 for counterexamples. The reason, in a sense, is that the convex core of a small geometrically finite deformation of j can be “much larger” than that of j, due to the presence of parabolic elements that are not unipotent. (Such discontinuous behavior of the convex core also explains why being geometrically finite is not an open condition in the presence of cusps of rank < n − 2, even among representations of a given cusp type [Bo2, § 5].) Note finally that C(j, ρ) = +∞ must be ruled out in (3) and (3”) due to Lemma 4.7: parabolic elements can be approached by hyperbolic ones. Proposition 1.5 is proved in Section 6.1 using a partition-of-unity argument based on Lemma 2.14, together with a control on fundamental domains for converging convex cocompact representations (see Appendix B). Proposition 6.1.(1)–(1’) is proved in Section 6.2 following the same approach but using also a comparison between distances in horospheres and spheres of Hn (Lemma 6.4). Proposition 6.1.(2) and (3)–(3’)–(3”) are proved in Section 6.4; for reductive ρ, they are a consequence of the existence of a maximally stretched lamination when C(j, ρ) ≥ 1 (Theorem 1.3). The case of nonreductive ρ follows from the reductive case by using again a partition-of-unity argument, as we explain in Section 6.3. 6.1. Continuity in the convex cocompact case. In this section we prove Proposition 1.5. We fix a pair of representations (j, ρ) ∈ Hom(Γ0 , G)2 with j convex cocompact and a sequence (jk , ρk )k∈N∗ of elements of Hom(Γ0 , G)2 converging to (j, ρ). We may and shall assume that Γ0 is torsion-free, using Lemma 4.4 and the Selberg lemma [Se, Lem. 8]. 6.1.1. Upper semicontinuity. We first prove that C(j, ρ) ≥ lim sup C(jk , ρk ). k→+∞ Hn Hn Fix ε > 0 and let f : → be a (j, ρ)-equivariant, (C(j, ρ) + ε)-Lipschitz map. We explain how for any large enough k we can modify f into a (jk , ρk )equivariant map fk with Lip(fk ) ≤ Lip(f ) + ε. By Lemma 4.8, we only need 54 FRANÇOIS GUÉRITAUD AND FANNY KASSEL to define fk on the preimage Nk ⊂ Hn of the convex core of jk (Γ0 )\Hn . In order to build fk , we will paste together shifted “pieces” of f using Lemma 2.14. Let N ⊂ Hn be the preimage of the convex core of j(Γ0 )\Hn . By Proposition B.1, there exists a compact set C ⊂ Hn such that N ⊂ j(Γ0 ) · C and Nk ⊂ jk (Γ0 ) · C for all large enough k ∈ N∗ , and the injectivity radius of j(Γ0 )\Hn and jk (Γ0 )\Hn is bounded from below by some constant δ > 0 independent of k. Let B1 , . . . , Br be open balls of Hn covering C, of radius < δ. For any 1 ≤ i ≤ r, let ψi : Hn → [0, 1] be a Lipschitz, j(Γ0 )-equivariant function supported on j(Γ0 ) · Bi , such that (ψi )1≤i≤r restricts to a partition of unity on j(Γ0 )·C, subordinated to the covering (j(Γ0 )·(Bi ∩C))1≤i≤r . For 1 ≤ i ≤ r and k ∈ N∗ , let Ψi,k ψi,k := Pr , i′ =1 Ψi′ ,k where Ψi,k : Hn → [0, 1] is the jk (Γ0 )-invariant function supported on jk (Γ0 ) · Bi that coincides with ψi on Bi . Then, for k ∈ N∗ large enough, (ψi,k )1≤i≤r induces a jk (Γ0 )-equivariant partition of unity on jk (Γ0 ) · C, subordinated to the covering (jk (Γ0 ) · (Bi ∩ C))1≤i≤r . Note that there is a constant L > 0 such that ψi,k is L-Lipschitz on jk (Γ0 )P · C for all 1 ≤ i ≤ r and large k ∈ N∗ ;P indeed, the jk (Γ0 )-invariant function i′ Ψi′ ,k is Lipschitz with constant ≤ i′ Lip(ψi′ ) and it converges uniformly to 1 on each Bi ∩ C as k → +∞, by compactness. For 1 ≤ i ≤ r and k ∈ N∗ , let fi,k : jk (Γ0 ) · Bi −→ Hn be the (jk , ρk )-equivariant map that coincides with f on Bi . For k ∈ N∗ and p ∈ jk (Γ0 )·C , let Ip,k be the set of indices 1 ≤ i ≤ r such that p ∈ jk (Γ0 )·Bi . The function p 7−→ Rp,k := diam{fi,k (p) | i ∈ Ip,k }, defined on jk (Γ0 ) · C, is jk (Γ0 )-invariant and converges uniformly to 0 on C as k → +∞. By Lemma 2.14, the (jk , ρk )-equivariant map r X ψi,k fi,k : jk (Γ0 ) · C −→ Hn fk := i=1 satisfies Lipp (fk ) ≤ r X i=1  LRp,k + ψi,k (p) Lipp (fi,k )   ≤ rL sup Rp′ ,k + Lip(f ) p′ ∈C for all p ∈ C, hence for all p ∈ Nk ⊂ jk (Γ0 ) · C by equivariance. We have seen that supp′ ∈C Rp′ ,k → 0 as k → +∞. Therefore, for large enough k, the (jk , ρk )-equivariant map Hn → Hn obtained by precomposing fk with the closest-point projection onto Nk has Lipschitz constant ≤ supp∈Nk Lipp (fk ) ≤ Lip(f ) + ε by Lemma 2.9. This shows that C(jk , ρk ) ≤ C(j, ρ) + 2ε, and we conclude by taking the lim sup over k and letting ε tend to 0. MAXIMALLY STRETCHED LAMINATIONS 55 6.1.2. Lower semicontinuity. Let us now prove that C(j, ρ) ≤ lim inf C(jk , ρk ). k→+∞ If ρ(Γ0 ) has a fixed point p in Hn , then C(j, ρ) = 0 (Remark 4.2) and there is nothing to prove. We thus assume that ρ(Γ0 ) has no fixed point in Hn . • Generic case. Consider the case where ρ(Γ0 ) has no fixed point in ∂∞ Hn and does not preserve any geodesic line of Hn . Then ρ(Γ0 ) contains two hyperbolic elements ρ(γ1 ), ρ(γ2 ) whose translation axes have no common endpoint in ∂∞ Hn . For large enough k, the elements ρk (γ1 ), ρk (γ2 ) ∈ ρk (Γ0 ) are hyperbolic too and their translation axes converge to the respective axes of ρ(γ1 ), ρ(γ2 ). For any k ∈ N∗ , let fk : Hn → Hn be a (jk , ρk )-equivariant, (C(jk , ρk ) + 2−k )-Lipschitz map. The same argument as in the proof of Lemma 4.10 shows that for any compact subset C of Hn , the sets fk (C ) all lie inside some common compact subset of Hn . By the Arzelà–Ascoli theorem, some subsequence of (fk )k∈N∗ converges to a (j, ρ)-equivariant map f : Hn → Hn . (Here we use that (C(jk , ρk ))k∈N∗ is bounded, a consequence of the upper semicontinuity proved in Section 6.1.1.) This implies C(j, ρ) ≤ lim inf k C(jk , ρk ). • Degenerate reductive case. Consider the case where ρ(Γ0 ) preserves a geodesic line A of Hn . The following observation is interesting in its own right. Lemma 6.2. If the group ρ(Γ0 ) preserves a geodesic line A ⊂ Hn without fixing any point in Hn , then the stretch locus E(j, ρ) is a geodesic lamination whose projection to j(Γ0 )\Hn is compact, contained in the convex core, and whose leaves are maximally stretched. Proof. After passing to a subgroup of index two (which does not change the stretch locus by Lemma 4.4), we may assume that ρ(Γ0 ) fixes both endpoints of A in ∂∞ Hn : in other words, ρ(Γ0 ) is contained in M A, where M is the subgroup of G that (pointwise) fixes A and A is the group of pure translations along A. The groups M and A commute and have a trivial intersection; let π A : M A → A be the natural projection. We claim that ρA := π A ◦ρ satisfies C(j, ρA ) = C(j, ρ) and E(j, ρA ) = E(j, ρ). remains in F j,ρ (resp. in F j,ρA ) Indeed, any element of (resp. of after postcomposing with the closest-point projection onto A, and for a map Hn → A it is equivalent to be (j, ρ)-equivariant or (j, ρA )-equivariant. Since ρA (Γ0 ) ⊂ A is commutative, for any m ∈ Z we can consider the representam tion ρm A : γ 7→ ρA (γ) . We claim that for m ≥ 1, F j,ρ C(j, ρm A ) = m C(j, ρA ) F j,ρA ) and E(j, ρm A ) = E(j, ρA ). Indeed, let hm be an orientation-preserving homeomorphism of A ≃ R such that d(hm (p), hm (q)) = m d(p, q) for all p, q ∈ A; for any C > 0, the postcomposition with hm realizes a bijection between the (j, ρA )-equivariant, C-Lipschitz maps and the (j, ρm A )equivariant, mC-Lipschitz maps from Hn to A, which preserves the stretch locus. Since C(j, ρA ) > 0 (because ρ(Γ0 ) has no fixed point in Hn ), we have 56 FRANÇOIS GUÉRITAUD AND FANNY KASSEL C(j, ρm A ) > 1 for large enough m, hence we can apply Theorem 1.3 to the stretch locus E(j, ρm  A ) = E(j, ρA ). Suppose the group ρ(Γ0 ) preserves a geodesic line of Hn without fixing any point in Hn . By Lemmas 4.6 and 6.2, for any ε > 0 there exists γ ∈ Γ0 with j(γ) hyperbolic such that (6.1) λ(ρ(γ)) ≥ C(j, ρ) − ε. λ(j(γ)) It follows that jk (γ) is hyperbolic and λ(ρk (γ)) ≥ C(j, ρ) − 2ε λ(jk (γ)) for all large enough k. We conclude by taking the lim inf over k and letting ε tend to 0. • Nonreductive case. Finally, we consider the case where the group ρ(Γ0 ) has a unique fixed point ξ in ∂∞ Hn , i.e. ρ is nonreductive (Definition 4.9). Choose an oriented geodesic line A of Hn with endpoint ξ. For any γ ∈ Γ0 we can write in a unique way ρ(γ) = gu where g ∈ G preserves A (i.e. belongs to M A with the notation above) and u is unipotent; setting ρred (γ) := g defines a representation ρred ∈ Hom(Γ0 , G) which is reductive (with image in M A). Note that changing the line A only modifies ρred by conjugating it; this does not change the constant C(j, ρred ) by Remark 4.3. When ρ is reductive, we set ρred := ρ. Then the following holds. (6.2) C(jk , ρk ) ≥ Lemma 6.3. For any pair of representations (j, ρ) ∈ Hom(Γ0 , G)2 with j convex cocompact, C(j, ρred ) = C(j, ρ). Proof. We may assume that ρ is nonreductive. Let ξ and A be as above and let pr : Hn → A be the “horocyclic projection” collapsing each horosphere centered at ξ to its intersection point with A; it is 1-Lipschitz. For any (j, ρ)equivariant Lipschitz map f : Hn → Hn , the map pr◦f is (j, ρred )-equivariant with Lip(pr ◦ f ) ≤ Lip(f ), hence C(j, ρred ) ≤ C(j, ρ). Let a ∈ G be a hyperbolic element acting as a pure translation along A, with repelling fixed point ξ at infinity. Then ρ(i) := ai ρ(·)a−i → ρred as i → +∞. By Remark 4.3, we have C(j, ρ(i) ) = C(j, ρ) for all i ∈ N. By upper semicontinuity (proved in Section 6.1.1), C(j, ρred ) ≥ lim sup C(j, ρ(i) ) = C(j, ρ). i→+∞  We now go back to our sequence (jk , ρk )k∈N∗ converging to (j, ρ). Since ρk → ρ and ρ has conjugates converging to ρred (see above), a diagonal argument shows that there are conjugates ρ′k of ρk such that ρ′k → ρred . By the reductive case above, lim inf k C(jk , ρ′k ) ≥ C(j, ρred ), and we conclude using Remark 4.3 and Lemma 6.3. This completes the proof of Proposition 1.5. 6.2. Openness of the condition C < 1 on cusp-deteriorating pairs. In this section we prove Proposition 6.1.(1)–(1’). The strategy is analogous MAXIMALLY STRETCHED LAMINATIONS 57 to the proof of upper semicontinuity in Section 6.1.1. The partition-of-unity argument in that proof fails in the presence of cusps, since the convex core (when nonempty) is not compact anymore. However, we shall see that the argument can be adapted as long as convex cores deform continuously. Such continuous behavior is ensured under the assumptions of Prop. 6.1.(1’) (constant convex core) or Prop. 6.1.(1) (all cusps of rank ≥ n − 2, see Proposition B.3). Consider a pair (j, ρ) ∈ Homj0 (Γ0 , G)×Homj0 -det (Γ0 , G) with C(j, ρ) < 1, and a sequence (jk , ρk )k∈N∗ of elements of Homj0 (Γ0 , G) × Homj0 -det (Γ0 , G) converging to (j, ρ). If j0 has a cusp of rank < n − 2, we assume that jk = j for all k ∈ N∗ . We shall prove that C(jk , ρk ) < 1 for all large enough k. We can and shall assume that Γ0 is torsion-free (using Lemma 4.4 and the Selberg lemma [Se, Lem. 8]). We can also always assume that the convex core of jk (Γ0 )\Hn is nonempty: otherwise the group jk (Γ0 ) is elementary with a fixed point in Hn or a unique fixed point in ∂∞ Hn , and C(jk , ρk ) = 0 by Remark 4.2. Therefore the convex core of M := j(Γ0 )\Hn is nonempty too (because j and the jk have the same cusp type). Let f : Hn → Hn be a (j, ρ)-equivariant map with 0 < Lip(f ) < 1. We shall modify f into a (jk , ρk )-equivariant map fk with Lip(fk ) < 1 for all large enough k. As usual, by Lemma 4.8 we only need to define fk on the preimage Nk ⊂ Hn of the convex core of jk (Γ0 )\Hn . In order to build fk , we shall proceed as in Section 6.1.1 and paste together shifted “pieces” of f using Lemma 2.14. By Proposition 4.16.(3) we may assume that f is constant on neighborhoods of some horoballs H1 , . . . , Hc of Hn whose images in M = j(Γ0 )\Hn are disjoint and intersect the convex core of M in standard cusp regions (Definition 2.2), representing all the cusps. For 1 ≤ ℓ ≤ c, let Sℓ ⊂ Γ0 be the stabilizer of Hℓ under the j-action. Let N ⊂ Hn be the preimage of the convex core of j(Γ0 )\Hn . By Proposition B.3, if the horoballs H1 , . . . , Hc are small enough, then there exist a compact set C ⊂ Hn and, for any k ∈ N∗ , horoballs H1k , . . . , Hck of Hn , such that • the images of H1k , . . . , Hck in jk (Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions, for all large enough k ∈ N∗ ; • the stabilizer in Γ0 of Hℓk under jk is Sℓ ; • the horoballs Hℓk S converge to Hℓ for all 1 ≤ ℓ ≤ c; • N ⊂ j(Γ0 ) · (C ∪ 1≤ℓ≤c Hℓ ) and, for all large enough k ∈ N∗ ,   [ k (6.3) Nk ⊂ jk (Γ0 ) · C ∪ Hℓ ; 1≤ℓ≤c • the cusp thickness (Definition 5.12) of jk (Γ0 )\Hn at any point of ∂Hℓk is uniformly bounded by some constant Θ > 0 independent of k;  S • the injectivity radius of jk (Γ0 )\ Hn r kℓ=1 jk (Γ0 ) · Hℓk is bounded from below by some constant δ > 0 independent of k. (If j0 has a cusp of rank < n − 2, then jk = j and we take Hℓk = Hℓ for all k ∈ N∗ .) For any 1 ≤ ℓ ≤ c, by convergence of the horoballs Hℓk , the map f is constant on some neighborhood of ∂Hℓk ∩ C for large enough k, which 58 FRANÇOIS GUÉRITAUD AND FANNY KASSEL implies (6.4) sup p∈∂Hℓk ∩C Lipp (f ) = 0. Let B1 , . . . , Br be open balls of Hn covering C, of radius < δ. For any 1 ≤ i ≤ r, let ψi : Hn → [0, 1] be a Lipschitz, j(Γ0 )-equivariant function supported on j(Γ0 ) · Bi , such that (ψi )1≤i≤r restricts to a partition of unity on j(Γ0 ) · C, subordinated to the covering (j(Γ0 ) · (Bi ∩ C))1≤i≤r . As in Section 6.1.1, for large enough k we can perturb the ψi to a jk (Γ0 )equivariant partition of unity (ψi,k )1≤i≤r of jk (Γ0 ) · C, subordinated to the covering (jk (Γ0 ) · Bi )1≤i≤r , such that all the functions ψi,k are L-Lipschitz for some constant L > 0 independent of i and k. For 1 ≤ i ≤ r and k ∈ N∗ , let fi,k : jk (Γ0 ) · Bi −→ Hn be the (jk , ρk )-equivariant map that coincides with f on Bi . As in Section 6.1.1, it follows from Lemma 2.14 that the (jk , ρk )-equivariant map r X ψi,k fi,k : jk (Γ0 ) · C −→ Hn fk′ := i=1 satisfies (6.5) Lipp (fk′ ) ≤ rLRp,k + Lipp (f ) for all p ∈ jk (Γ0 )·C, where p 7→ Rp,k is a jk (Γ0 )-invariant function converging uniformly to 0 on C as k → +∞. By equivariance, lim sup sup k→+∞ p∈jk (Γ0 )·C Lipp (fk′ ) ≤ Lip(f ) < 1. It only remains to prove that for any 1 ≤ ℓ ≤ c we can extend fk′ |∂H k ∩Nk ℓ to Hℓk ∩ Nk in a (jk |Sℓ , ρk |Sℓ )-equivariant way with Lipschitz constant < 1. Indeed, then we can extend fk′ to the orbit jk (Γ0 ) · (Hℓk ∩ Nk ) in a (jk , ρk )equivariant way; piecing together these maps for varying ℓ, and taking fk′ on S the complement of cℓ=1 jk (Γ0 ) · Hℓk in Nk (which is contained in jk (Γ0 ) · C), we will obtain a (jk , ρk )-equivariant map fk : Nk → Hn with Lip(fk ) < 1 for all large enough k, which will complete the proof. Fix 1 ≤ ℓ ≤ c. By Theorem 1.6, in order to prove that fk′ |∂H k ∩Nk extends ℓ to Hℓk ∩ Nk in a (jk |Sℓ , ρk |Sℓ )-equivariant way with Lipschitz constant < 1, it is sufficient to prove that Lip∂H k ∩Nk (fk′ ) < 1. By (6.4) and (6.5), for any ℓ ε > 0 we have (6.6) sup p∈∂Hℓk ∩Nk Lipp (fk′ ) ≤ ε for all large enough k, since ∂Hℓk ∩ Nk ⊂ jk (Γ0 ) · C and the jk (Γ0 )-invariant functions p 7→ Rp,k converge uniformly to 0 on C as k → +∞. Note that (6.6) does not immediately give a bound on the global constant Lip∂H k ∩Nk (fk′ ), ℓ since the subset of horosphere ∂Hℓk ∩ Nk is not convex for the hyperbolic metric. However, such a bound follows from Lemmas 6.4 and 6.5 below, which are based on a comparison between the intrinsic metrics of horospheres and spheres in Hn . MAXIMALLY STRETCHED LAMINATIONS 59 The idea of Lemma 6.4 is that (6.6) controls the Lipschitz constant at short range, while the fixed point of ρk (Sℓ ) implies control at long range. The difficulty is that there can be an arbitrarily large “medium range” to handle inbetween, since the fixed point of ρk (Sℓ ) can lie arbitrarily far out. In dimension n ≥ 4 this is compounded by the fact that generally ∂Hℓk ∩Nk is not even convex for the Euclidean metric of the horosphere ∂Hℓk ; Lemma 6.5 deals with that issue. For t ≥ 1, we say that a subset X of a Euclidean space is t-subconvex if for any x, y ∈ X there exists a path from x to y in X whose length is at most t times the Euclidean distance from x to y. Lemma 6.4. Let S be a discrete group. For any R > 0, there exists ε > 0 with the following property: if (j, ρ) ∈ Hom(S, G)2 is a pair of representations with j injective such that • the group j(S) is discrete and preserves a horoball H of Hn , • the group ρ(S) has a fixed point in Hn , • there exists a closed, j(S)-invariant, 2-subconvex set N ⊂ ∂H such that the quotient j(S)\N has Euclidean diameter ≤ R, then any (j, ρ)-equivariant map f ′ : N → Hn satisfying Lipp (f ′ ) ≤ ε for all p ∈ N satisfies Lip(f ′ ) < 1. Lemma 6.5. In our setting, up to enlarging the compact set C ⊂ Hn and replacing the horoballs H1 , . . . , Hc and H1k , . . . , Hck with smaller horoballs, still satisfying the list of six properties (6.3), we may assume that ∂Hℓk ∩ Nk is 2-subconvex in ∂Hℓk ≃ Rn−1 for all 1 ≤ ℓ ≤ c and large enough k ∈ N∗ . Here Lemma 6.4 applies to N := Nk ∩ ∂Hℓk (which is 2-subconvex by Lemma 6.5) and to f ′ := fk′ |N (which satisfies (6.6)). Note that ρk (Sℓ ) has a fixed point in Hn by Fact 2.5, since ρk is cusp-deteriorating with respect to jk , and that the Euclidean diameter of jk (Sℓ )\(Nk ∩ ∂Hℓk ) is uniformly bounded for k ∈ N∗ , by the uniform bound Θ on cusp thickness. Therefore it is sufficient to prove Lemmas 6.4 and 6.5 to complete the proof of Proposition 6.1.(1)–(1’). Proof of Lemma 6.4. Fix R > 0 and let j, ρ, H, N be as in the statement. Consider a (j, ρ)-equivariant map f ′ : N → Hn such that Lipp (f ′ ) ≤ ε for all p ∈ N , for some ε > 0. Let us show that if ε is smaller than some constant independent of f ′ , then Lip(f ′ ) < 1. Let d∂H be the natural Euclidean metric on ∂H. By (A.3), for any p, q ∈ N ,   d∂H (p, q) . (6.7) d(p, q) = 2 arcsinh 2 If d(p, q) ≤ 1, then d(p, q) ≥ κ d∂H (p, q) for some universal κ > 0 (specifically, κ = (2 sinh(1/2))−1 by concavity of arcsinh). On the other hand, d(f ′ (p), f ′ (q)) ≤ 2ε d∂H (p, q) by Remark 2.8.(3) and 2-subconvexity, hence d(f ′ (p), f ′ (q)) 2ε 2 ≤ < d(p, q) κ 3 for all p, q ∈ N with 0 < d(p, q) ≤ 1 as soon as ε < κ/3. We now assume that this is satisfied and consider pairs of points p, q ∈ N with d(p, q) ≥ 1. 60 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Let ∂B be a sphere of Hn centered at a fixed point of ρ(S), and containing f ′ (p0 ) for some p0 ∈ N (see Figure 8). Then f ′ (j(γ) · p0 ) ∈ ∂B for all γ ∈ S, since f ′ is (j, ρ)-equivariant and ρ(S) preserves ∂B. By Remark 2.8.(3) and 2-subconvexity, the set f ′ (N ) is contained in the 2εR-neighborhood of ∂B. 1 we have If the radius of ∂B is ≤ 1/3, then as soon as ε < 24R 2 5 d(f ′ (p), f ′ (q)) ≤ + 4εR ≤ d(p, q) 3 6 ′ for all p, q ∈ N with d(p, q) ≥ 1, hence Lip(f ) ≤ 5/6 < 1. We now assume that the radius r of ∂B is > 1/3 (possibly very large!). There exists a universal constant η > 0 such that the closest-point projection onto any sphere of Hn of radius > 1/3 is 2-Lipschitz on the η-neighborhood (inner η , which we shall assume and outer) of this sphere. In particular, if ε ≤ 2R from now on, then the projection onto ∂B is 2-Lipschitz on the set f ′ (N ). p0 Hn Hn H j(S) f′ f ′ (p0 ) ρ(S) B ′ f (∂H) Figure 8. An equivariant map f ′ , contracting at small scale, taking a horosphere to (or near) a sphere, is contracting at all scales. Let x, y ∈ ∂B be the respective projections of f ′ (p), f ′ (q); the distances d(x, f ′ (p)) and d(y, f ′ (q)) are bounded from above by 2εR. Let d∂B (x, y) be the length of the shortest path from x to y that is contained in the sphere ∂B. The formulas (A.8) and (A.14) yield    d∂B (x, y) (6.8) d(x, y) = 2 arcsinh sinh(r) · sin . 2 sinh(r) On the other hand, by 2-subconvexity, we can find a path ω from p to q in N of length at most 2 d∂H (p, q). Then d∂B (x, y) is bounded from above by the length of the projection of the path f ′ (ω) to ∂B, hence, by Remark 2.8.(3), (6.9) d∂B (x, y) ≤ 4ε d∂H (p, q). Using sin(t) ≤ min{1, t} for t ≥ 0, it follows from (6.8) and (6.9) that d(f ′ (p), f ′ (q)) ≤ d(f ′ (p), x) + d(x, y) + d(y, f ′ (q))  ≤ min 2r, 2 arcsinh(d∂B (x, y)/2) + 4εR   ≤ min 2r, 2 arcsinh 2ε d∂H (p, q) + 4εR. MAXIMALLY STRETCHED LAMINATIONS 61 Comparing with (6.7), we see that if ε is smaller than some constant depending only on R, then d(f ′ (p), f ′ (q)) < d(p, q) for all p, q ∈ N with d(p, q) ≥ 1. Since d(f ′ (p), f ′ (q)) is bounded independently of p and q, the ratio d(f ′ (p), f ′ (q))/d(p, q) is uniformly bounded away from 1 by compactness of N modulo j(S). This proves that LipN (f ′ ) < 1.  Proof of Lemma 6.5. Fix 1 ≤ ℓ ≤ c, where c is still the number of cusps. • Subconvexity for ∂Hℓ ∩ N . We first prove that, up to replacing Hℓ with some smaller, concentric horoball, the set ∂Hℓ ∩ N is 2-subconvex in ∂Hℓ . This will prove Lemma 6.5 when j0 has a cusp of rank < n − 2, since in that case jk = j and Hℓk = Hℓ for all k by assumption. The stabilizer Sℓ ⊂ Γ0 of Hℓ under j has a finite-index normal subgroup S ′ isomorphic to Zm for some 0 < m < n (see Section 2.1). Consider the upper half-space model Rn−1 ×R∗+ of Hn , so that ∂∞ Hn identifies with Rn−1 ∪{∞}. We may assume that Hℓ is centered at infinity, so that ∂Hℓ = Rn−1 × {b} for some b > 0. Let Ω be the convex hull of Λj(Γ0 ) r{∞} in Rn−1 , where Λj(Γ0 ) is the limit set of j(Γ0 ). The group j(S ′ ) acts on Rn−1 by Euclidean isometries and there exists an m-dimensional affine subspace V ⊂ Ω, preserved by j(S ′ ), on which j(S ′ ) acts as a lattice of translations (see Section 2.1). We claim that N contains V × [b0 , +∞) for some b0 > 0. Indeed, since V ⊂ Ω, some point p0 ∈ V × R∗+ ⊂ Hn belongs to N . The convex hull in Hn of the orbit j(S ′ ) · p0 is also contained in N . This convex hull contains all the j(S ′ )-translates of the (compact) convex hull of  ε1 εm ) · p0 | (ε1 , . . . , εm ) ∈ {0, 1}m , j(γ1 . . . γm where (γ1 , . . . , γm ) is a generating subset of S ′ ; the union X of these j(S ′ )translates projects vertically onto the whole of V and has bounded height since j(S ′ ) preserves the horospheres centered at ∞. Then N contains V × [b0 , +∞) where b0 > 0 is the maximal height of X. Up to replacing Hℓ with some smaller, concentric horoball, we may assume that b ≥ max{b0 , 7δ}, where δ > 0 is the Euclidean diameter of j(S ′ )\Ω. Let us show that ∂Hℓ ∩ N is then 2-subconvex. Consider p, q ∈ ∂Hℓ ∩ N , with respective orthogonal projections ζp , ζq to Rn−1 . We have d∂Hℓ (p, q) = dRn−1 (ζp , ζq )/b. Suppose dRn−1 (ζp , ζq ) ≤ 6δ. By definition of δ, we can find a point ζ ∈ Λj(Γ0 ) r {∞} ⊂ Rn−1 with dRn−1 (ζ, ζp ) ≤ δ. The hyperbolic triangle (p, q, ζ) is contained in N . Since b ≥ 7δ, both edges (p, ζ] and (q, ζ] lie outside Hℓ = Rn−1 × [b, +∞). It follows that the intersection of this triangle (p, q, ζ) with ∂Hℓ is an arc of Euclidean circle from p to q, of angular measure ≤ π, and hence has Euclidean length at most π2 d∂Hℓ (p, q) ≤ 2 d∂Hℓ (p, q). Suppose dRn−1 (ζp , ζq ) ≥ 6δ. Since ζp , ζq ∈ Ω, by definition of δ we can find points p′ , q ′ in N ∩ (V × {b}) whose orthogonal projections ζp′ , ζq′ to Rn−1 satisfy and dRn−1 (ζq , ζq′ ) ≤ δ. dRn−1 (ζp , ζp′ ) ≤ δ ′ Then d∂Hℓ (p, p ) = dRn−1 (ζp , ζp′ )/b ≤ δ/b, and similarly d∂Hℓ (q, q ′ ) ≤ δ/b. As above, there is an arc of Euclidean circle from p to p′ in ∂Hℓ ∩ N , of 62 FRANÇOIS GUÉRITAUD AND FANNY KASSEL length at most 2 d∂H (p, p′ ) ≤ 2δ/b. Similarly, there is an arc of Euclidean circle from q ′ to q in ∂Hℓ ∩ N , of Euclidean length ≤ 2δ/b. Concatenating these arcs with the Euclidean segment [p′ , q ′ ] ⊂ V × {b}, which is contained in ∂Hℓ ∩ N and has Euclidean length b−1 dRn−1 (ζp′ , ζq′ ), we find a path from p to q in ∂Hℓ ∩ N of Euclidean length at most dRn−1 (ζp′ , ζq′ ) + 4δ d n−1 (ζp , ζq ) + 6δ ≤ R ≤ 2 d∂Hℓ (p, q). b b This proves that ∂Hℓ ∩ N is 2-subconvex in ∂Hℓ . • Convexity for ∂Hℓk ∩ Nk in the case of cusps of rank ≥ n − 2. Finally, we suppose that all cusps of j0 have rank ≥ n − 2, in which case the representation jk is allowed to vary with k. Recall that the cusp thickness of jk (Γ0 )\Hn at ∂Hkℓ is bounded by some constant Θ > 0 independent of ℓ and k. If we replace every horoball Hkℓ with the smaller, concentric horoball at distance log(3Θ) from ∂Hkℓ (and correspondingly enlarge the compact set C ⊂ Hn ), we obtain new horoballs Hkℓ still satisfying the list of six properties (6.3), such that the cusp thickness of jk (Γ0 )\Hn at ∂Hkℓ is ≤ 1/3 for all ℓ and k. Then ∂Hℓk ∩ Nk is convex in ∂Hℓk by Lemma B.4, hence in particular 2-subconvex.  6.3. The constant C(j, ρ) for nonreductive ρ. In order to prove conditions (2), (3), (3)’, (3)” of Proposition 6.1 (in Section 6.4), we shall rely on the existence of a maximally stretched lamination for C(j, ρ) ≥ 1, given by Theorem 1.3. However, Theorem 1.3 assumes that the space F j,ρ of equivariant maps realizing the best Lipschitz constant C(j, ρ) is nonempty: this holds for reductive ρ (Lemma 4.10), but may fail otherwise (see Section 10.3). In order to deal with nonreductive ρ, we first establish the following lemma, which extends Lemma 6.3. Lemma 6.6. For any pair of representations (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite, C(j, ρ) = C(j, ρred ), unless the representation ρ is not cusp-deteriorating and C(j, ρred ) < 1, in which case C(j, ρ) = 1. Here ρred ∈ Hom(Γ0 , G) is the “reductive part” of ρ, defined in Section 6.1.2: if ρ is nonreductive, then the group ρred (Γ0 ) preserves some geodesic line of Hn with an endpoint in ∂∞ Hn equal to the fixed point of ρ(Γ0 ). Since ρred is well defined up to conjugation, the constant C(j, ρred ) is well defined by Remark 4.3. If ρ is reductive, then ρred := ρ. Proof of Lemma 6.6. We may assume that ρ is nonreductive, with fixed point ξ ∈ ∂∞ Hn . Then ρred is cusp-deteriorating and preserves an oriented geodesic line A of Hn with endpoint ξ. If the group j(Γ0 ) is elementary and fixes a unique point in ∂∞ Hn , then C(j, ρ) = 1 by Corollary 4.18 and C(j, ρred ) = 0 by Remark 4.2. We now assume that we are not in this case, which means that the convex core of M := j(Γ0 )\Hn is nonempty. As in the proof of Lemma 6.3, by using the projection onto A along concentric horocycles we see that C(j, ρred ) ≤ C(j, ρ), MAXIMALLY STRETCHED LAMINATIONS 63 and there is a sequence (ak )k∈N∗ of pure translations along A, with repelling fixed point ξ, such that the conjugates ρk := ak ρ(·)a−1 k (which still fix ξ) converge to ρred as k → +∞. By invariance of C(j, ρ) under conjugation (Remark 4.3), it is sufficient to prove that  C(j, ρred )  if ρ is cusp-deteriorating, lim sup C(j, ρk ) ≤ red ) max 1, C(j, ρ otherwise. k→+∞ To prove this, we use a partition-of-unity argument as in Sections 6.1.1 and 6.2. Fix ε > 0. By using Proposition 4.16 and postcomposing with the closest-point projection onto A, we can find a (j, ρred )-equivariant map f : Hn → A with Lip(f ) ≤ C(j, ρred )+ε/2 that is constant on neighborhoods of some horoballs B1 , . . . , Bc of Hn whose images in M = j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions (Definition 2.2), representing all the cusps. We shall use f to build (j, ρk )-equivariant maps fk with Lip(fk ) bounded from above by Lip(f ) + ε or 1 + ε, as the case may be, for all large enough k. Let S1 , . . . , Sc ⊂ Γ0 be the respective stabilizers of B1 , . . . , Bc under j; the singleton f (Bi ) is fixed by ρ(Si ) for all 1 ≤ i ≤ c. Let also Bc+1 , . . . , BrSbe open balls of Hn , each projecting injectively to j(Γ0 )\Hn , such that ri=1 j(Γ0 ) · Bi contains the preimage N ⊂ Hn of the convex core of M . For c < i ≤ r, let fi,k : j(Γ0 ) · Bi → Hn be the (j, ρk )equivariant map that coincides with f on Bi . We first assume that ρ is cusp-deteriorating. For 1 ≤ i ≤ c, all the elements of ρ(Si ) are elliptic, hence ρ(Si ) fixes a point in Hn (Fact 2.5). Since it also fixes ξ ∈ ∂∞ Hn , it fixes pointwise a full line A′ with endpoint ξ. ′ Then ρk (Si ) = ak ρ(Si )a−1 k fixes pointwise the line ak · A , which converges to A as k → +∞. In particular, we can find a sequence (pi,k )k∈N∗ that converges to the singleton f (Bi ) ∈ A as k → +∞, with pi,k fixed by ρk (Si ) for all k. For 1 ≤ i ≤ c and k ∈ N∗ , let fi,k : j(Γ0 ) · Bi −→ Hn be the (j, ρk )-equivariant map that is constant equal to pi,k on the horoball Bi . Let (ψi )1≤i≤r be a Lipschitz partition of unity subordinated to the covering (j(Γ0 ) · Bi )1≤i≤r of N , and let L := max1≤i≤r Lip(ψi ). By Lemma 2.14, the (j, ρk )-equivariant map r X ψi fi,k : N −→ Hn fk := i=1 satisfies Lipp (fk ) ≤ rLRp,k + Lipp (f ) for all p ∈ N , where the j(Γ0 )-invariant function  d fi,k (p), fi′ ,k (p) p 7−→ Rp,k := max ′ i,i Sr converges uniformly to 0 for p ∈ i=1 Bi , as k → +∞. For large enough k this yields LipN (fk ) ≤ Lip(f ) + ε/2 by (2.2), hence C(j, ρk ) ≤ C(j, ρred ) + ε by Lemma 4.8. Letting ε go to 0, we obtain lim supk C(j, ρk ) ≤ C(j, ρred ) as desired. 64 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Suppose now that ρ is not cusp-deteriorating. WeSproceed as in the cuspdeteriorating case, but work with the union of balls c<i≤r j(Γ0 ) · Bi instead S of the union of balls and horoballs 1≤i≤r j(Γ0 ) · Bi . Let (ψi )c<i≤r be a S Lipschitz partition of unity of N ′ := N r 1≤ℓ≤c j(Γ0 ) · Bℓ subordinated to the covering (j(Γ0 ) · Bi )c<i≤r , and let L := maxc<i≤r Lip(ψi ). As in the cusp-deteriorating case, by Lemma 2.14, the (j, ρk )-equivariant map X fk′ := ψi fi,k : N ′ −→ Hn c<i≤r satisfies Lipp (fk′ ) ≤ Lipp (f ) + ε/2 for all p ∈ N ′ when k is large enough. In particular, for 1 ≤ ℓ ≤ c, since f is constant on a neighborhood of the horoball Bℓ , we obtain Lipp (fk′ ) ≤ ε/2 for all p ∈ N ∩ ∂Bℓ . It is sufficient to prove that (6.10) LipN ∩∂Bℓ (fk′ ) ≤ 1 for all 1 ≤ ℓ ≤ c, since Theorem 1.6 (or Proposition 3.9) then lets us extend fk′ |N ∩∂Bℓ to a 1-Lipschitz, (j|Sℓ , ρk |Sℓ )-equivariant map (Bℓ ∪∂Bℓ )∩N → Hn . We can then extend fk′ to the orbit j(Γ0 ) · (Bℓ ∪ ∂Bℓ ) ∩ N in a (j, ρk )equivariant way. Piecing together these maps for varying 1 ≤ ℓ ≤ c, and taking fk′ on N ′ , we then obtain a (j, ρk )-equivariant map fk : Hn → Hn with Lip(fk ) ≤ max(1, Lip(f ) + ε/2) for all large enough k (using (2.2)). Letting ε go to 0, we obtain lim supk C(j, ρk ) ≤ max(1, C(j, ρred )), as desired. To prove (6.10), it is sufficient to establish the following analogue of Lemma 6.4, which together with Lemma 6.5 completes the proof of Lemma 6.6.  Lemma 6.7. Let S be a discrete group. For any R > 0, there exists ε > 0 with the following property: if (j, ρ) ∈ Hom(S, G)2 is a pair of representations with j injective such that • the group j(S) is discrete and preserves a horoball H of Hn , • the group ρ(S) has a fixed point in ∂∞ Hn , • there exists a closed, j(S)-invariant, 2-subconvex set N ⊂ ∂H such that the quotient j(S)\N has (Euclidean) diameter ≤ R, then any (j, ρ)-equivariant map f ′ : N → Hn satisfying Lipp (f ′ ) ≤ ε for all p ∈ N satisfies Lip(f ′ ) ≤ 1. Proof. We proceed as in the proof of Lemma 6.4, but the sphere ∂B will now be a horosphere. Fix R > 0 and let j, ρ, H, N be as in the statement. Consider a (j, ρ)-equivariant map f ′ : N → Hn such that Lipp (f ′ ) ≤ ε for all p ∈ N , for some ε > 0. Let us show that if ε is smaller than some constant independent of f ′ , then Lip(f ′ ) ≤ 1. As in the proof of Lemma 6.4, if ε is smaller than some universal constant, then d(f ′ (p), f ′ (q)) ≤ d(p, q) for all p, q ∈ N with d(p, q) ≤ 1. We now consider p, q ∈ N with d(p, q) ≥ 1. Let ∂B be a horosphere centered at the fixed point of ρ(S) in ∂∞ Hn , containing f ′ (p0 ) for some p0 ∈ N . As in the proof of Lemma 6.4, the set f ′ (N ) is contained in the 2εR-neighborhood of ∂B. We now use the existence of a universal constant η > 0 such that the closest-point projection onto any horosphere of Hn is 2-Lipschitz on the η-neighborhood (inner and outer) of MAXIMALLY STRETCHED LAMINATIONS 65 η this horosphere. In particular, if ε ≤ 2R , which we shall assume from now on, then the projection onto ∂B is 2-Lipschitz on the set f ′ (N ). Denoting by x, y ∈ ∂B the projections of f ′ (p), f ′ (q), the (in)equalities (6.7) and (6.9) still hold, but (6.8) becomes   d∂B (x, y) d(x, y) = 2 arcsinh , 2 where d∂B is the natural Euclidean metric on ∂B. We obtain d(f ′ (p), f ′ (q)) ≤ d(f ′ (p), x) + d(x, y) + d(y, f ′ (q))  ≤ 2 arcsinh 2ε d∂H (p, q) + 2εR. Comparing with (6.7) we see that if ε is small enough then d(f ′ (p), f ′ (q)) ≤ d(p, q) for all p, q ∈ ∂H ∩ N with d(p, q) ≥ 1. Hence, Lip(f ′ ) ≤ 1.  6.4. Semicontinuity for C(j, ρ) ≥ 1 in the general geometrically finite case. We now complete the proof of Proposition 6.1. Condition (1) when all the cusps of j0 have rank ≥ n − 2 and condition (1’) in general have already been proved in Section 6.2. We now show that for pairs (j, ρ) of representations with j geometrically finite representations of fixed cusp type, (2) the condition 1 < C is open, (3’) the function (j, ρ) 7→ C(j, ρ) is lower semicontinuous on the set of pairs where 1 ≤ C, (3”) it is upper semicontinuous on the set of pairs where 1 ≤ C < +∞ when either all the cusps of j0 have rank ≥ n − 2 (for instance n ≤ 3) or the representation j is constant. Upper semicontinuity on the set of pairs where 1 ≤ C < +∞ does not hold in general in dimension n ≥ 4: see Section 10.10. The condition C(j, ρ) = +∞ is open in Hom(Γ0 , G)j0 × Hom(Γ0 , G) by Lemma 4.7, hence in (2) and (3’) we may actually restrict to 1 ≤ C < +∞. Let (jk , ρk )k∈N∗ be a sequence of elements of Hom(Γ0 , G)j0 × Hom(Γ0 , G) converging to an element (j, ρ) ∈ Hom(Γ0 , G)j0 × Hom(Γ0 , G) with C(j, ρ) < +∞. It is sufficient to prove the following two statements: (A) if C(j, ρ) > 1, then C(j, ρ) ≤ lim inf k C(jk , ρk ), (B) if C ∗ := lim supk C(jk , ρk ) > 1 and if either all the cusps of j0 have rank ≥ n − 2 or jk = j for all k ∈ N∗ , then C(j, ρ) ≥ C ∗ . If ρ is reductive, then (A) is an easy consequence of Corollary 1.12 (here E(j, ρ) 6= ∅ by Corollary 4.14, in which case Corollary 1.12 has been proved in Section 5.4): namely, for any ε > 0 there is an element γ ∈ Γ0 with j(γ) hyperbolic such that λ(ρ(γ)) ≥ C(j, ρ) − ε. λ(j(γ)) If k is large enough, then λ(jk (γ)) is hyperbolic and λ(ρk (γ))/λ(jk (γ)) ≥ C(j, ρ) − 2ε by continuity of λ, hence C(jk , ρk ) ≥ C(j, ρ) − 2ε by (4.1). We conclude by letting ε tend to 0. If ρ is nonreductive, then C(j, ρ) > 1 entails C(j, ρred ) = C(j, ρ) by Lemma 6.6, and the ρk have conjugates converging to ρred (see the end of Section 6.1.2), so we just apply the reductive case to obtain (A). 66 FRANÇOIS GUÉRITAUD AND FANNY KASSEL To prove (B), suppose that C ∗ > 1 and that either all the cusps of j0 have rank ≥ n − 2 or jk = j for all k ∈ N∗ . Up to passing to a subsequence, we may assume C(jk , ρk ) > 1 for all k ∈ N∗ and C(jk , ρk ) → C ∗ . Then C(jk , ρred k ) = C(jk , ρk ) for all k ∈ N∗ by Lemma 6.6. We now use Theorem 1.3, and either Proposition 5.11 (if jk = j) or Corollary 5.14 (if all the cusps of j0 have rank ≥ n−2): in either case we obtain that the stretch locus E(jk , ρred k ) is a (nonempty) geodesic lamination admitting a fundamental domain that remains in some compact subset of Hn , independent of k. This implies, up to passing to a subsequence, that E(jk , ρred k ) converges to some (nonempty) j(Γ0 )-invariant geodesic lamination L , with a compact image in j(Γ0 )\Hn . For any ε > 0, a closed curve ε-nearly carried by L is also nearly carried by E(jk , ρred k ) and will give (as in the proof of Lemma 4.6) an element γ ∈ Γ0 such that jk (γ) is hyperbolic and λ(ρred λ(ρk (γ)) k (γ)) = ≥ C(jk , ρred k )−ε λ(jk (γ)) λ(jk (γ)) for all large enough k. The right hand side converges to C ∗ − ε, hence by continuity of λ, λ(ρ(γ)) ≥ C ∗ − ε, λ(j(γ)) therefore C(j, ρ) ≥ C ∗ − ε by (4.1) (in particular, C ∗ < +∞). We conclude by letting ε tend to 0. This completes the proof of Proposition 6.1. 7. Application to properly discontinuous actions on G = PO(n, 1) In this section we prove the results of Section 1.4 on the geometrically finite quotients of G := PO(n, 1), namely Theorem 1.8 (properness criterion) and Theorems 1.9 and 1.11 (deformation). We adopt the notation and terminology of Section 1.4, and proceed as in [Ka1]. Note that all the results remain true if G is replaced by O(n, 1), SO(n, 1), or SO(n, 1)0 . In Section 7.1 we start by introducing a constant Cµ (j, ρ), which we use in Section 7.2 to state a refinement of Theorem 1.8. This refinement is proved in Sections 7.5 and 7.6. Before that, in Section 7.3 we discuss the connection with the general theory of properly discontinuous actions on reductive homogeneous spaces, and in Section 7.4 we make two side remarks. Section 7.7 is devoted to the proof of Theorems 1.9 and 1.11, and Section 7.8 to their interpretation in terms of completeness of geometric structures. 7.1. The constant Cµ (j, ρ). We shall refine Theorem 1.8 by characterizing properness, not only in terms of the constants C(j, ρ) of (1.1) and C ′ (j, ρ) of (1.4), but also in terms of a third constant Cµ (j, ρ). We start by introducing this constant. Fix a basepoint p0 ∈ Hn and let µ : G → R+ be the displacement function relative to p0 : (7.1) µ(g) := d(p0 , g · p0 ) MAXIMALLY STRETCHED LAMINATIONS 67 for all g ∈ G. This function is continuous, proper, and surjective; we shall see in Section 7.3 that it corresponds to a Cartan projection of G. Note that µ(g−1 ) = µ(g) for all g ∈ G because G acts on Hn by isometries. By the triangle inequality, µ(gg ′ ) ≤ µ(g) + µ(g ′ ), (7.2) and (7.3) g, g ′ λ(g) ≤ µ(g) for all ∈ G, where λ : G → R+ is the translation length function of (1.2). For hyperbolic g, the function k 7→ µ(g k ) grows linearly because µ(gk ) − kλ(g) is bounded (for instance by twice the distance from g · p0 to the translation axis Ag of g). For parabolic g, the function k 7→ µ(gk ) grows logarithmically (Lemma 2.6), while for elliptic g it is bounded. Therefore, 1 (7.4) λ(g) = lim µ(gk ) k→+∞ k for all g ∈ G. For any discrete group Γ0 and any pair (j, ρ) ∈ Hom(Γ0 , G)2 of representations, we denote by Cµ (j, ρ) the infimum of constants t ≥ 0 for which the set {µ(ρ(γ)) − t µ(j(γ)) | γ ∈ Γ0 } is bounded from above, i.e. for which µ(ρ(γ)) ≤ t µ(j(γ)) + O(1) as γ ranges over Γ0 . Note that (7.5) C ′ (j, ρ) ≤ Cµ (j, ρ) ≤ C(j, ρ). Indeed, the left-hand inequality follows from (7.4). The right-hand inequality follows from the fact that for any (j, ρ)-equivariant map f : Hn → Hn and any γ ∈ Γ0 , µ(ρ(γ)) = d(p0 , ρ(γ) · p0 )   ≤ d f (p0 ), ρ(γ) · f (p0 ) + 2 d p0 , f (p0 )   = d f (p0 ), f (j(γ) · p0 ) + 2 d p0 , f (p0 )  ≤ Lip(f ) d(p0 , j(γ) · p0 ) + 2 d p0 , f (p0 )  = Lip(f ) µ(j(γ)) + 2 d p0 , f (p0 ) . 7.2. A refinement of Theorem 1.8. Let Γ0 be a discrete group. In Sections 7.5 and 7.6, we shall refine Theorem 1.8 by establishing the following implications for any pair (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite. We refer to Definitions 1.1 and 1.7 for the notions of cusp-deterioration and left admissibility; recall that any ρ is cusp-deteriorating if j is convex cocompact. 68 FRANÇOIS GUÉRITAUD AND FANNY KASSEL if 5 holds px 1 C(j, ρ) < 1 KS +3 C(j, ρred ) < 1 KS   2 (j, ρ) left admissible KS +3 (j, ρred ) left admissible KS Cµ (j, ρ) < 1 KS +3 Cµ (j, ρred ) < 1 KS C ′ (j, ρ) < 1 and ρ cusp-deteriorating +3 C ′ (j, ρred ) < 1 ρ cusp-deteriorating iv   5 iii   4 +3 ρred cusp-deteriorating We define the “reductive part” ρred of ρ as in Section 6.1.2: in the generic case when ρ is reductive (Definition 4.9), we set ρred := ρ. In the degenerate case when ρ is nonreductive, we fix a Levi factor M A of the stabilizer P in G of the fixed point at infinity of ρ(Γ0 ) (see Section 7.6), denote by π : P → M A the natural projection, and set ρred := π ◦ ρ, so that ρred is reductive and preserves an oriented geodesic line A ⊂ Hn , depending only on M A. The implications 1 ⇒ 3 and i ⇒ iii ⇒ iv are immediate consequences of (7.5), while 3 ⇒ 4 ⇒ 5 and iii ⇒ v follow from (7.5) and from the estimate µ(g k ) = 2 log k + O(1) for parabolic g (Lemma 2.6); these implications do not require any geometrical finiteness assumption on j. The implications 1 ⇒ i and i ⇒ 1 , the latter assuming 5 , are immediate consequences of Lemma 6.6. We shall explain: • • • 3 iv 2 ⇒ ⇒ ⇒ ii   3 i and iii ⇒ ii and 2 ⇒ 5 in Section 7.3, and ii ⇒ i in Section 7.5, ii , 3 ⇒ iii , 4 ⇒ iv , and 5 ⇒ v in Section 7.6. 2 iii 7.3. General theory of properly discontinuous actions and sharpness. Before proving the implications above, we discuss the connection with the general theory of properly discontinuous actions on reductive homogeneous spaces. The group G endowed with the transitive action of G × G by right and left multiplication identifies with the homogeneous space (G × G)/Diag(G), where Diag(G) is the diagonal of G × G. Let K be the stabilizer in G of the basepoint p0 of (7.1): it is a maximal compact subgroup of G = PO(n, 1), isomorphic to O(n). Let A be a one-parameter subgroup of G whose nontrivial elements are hyperbolic, all pure translations, with a translation axis A v MAXIMALLY STRETCHED LAMINATIONS 69 passing through p0 . Choose an endpoint ξ ∈ ∂∞ Hn of A and let A+ be the subsemigroup of A sending p0 into the geodesic ray [p0 , ξ). Then the Cartan decomposition G = KA+ K holds: any element g ∈ G may be written as g = kak ′ for some k, k′ ∈ K and a unique a ∈ A+ (see [H, Th. IX.1.1]). The Cartan projection µ of (7.1) is the projection onto A+ composed with an appropriate identification of A+ with R+ (namely the restriction of λ to A+ ). Likewise, the group G × G admits the Cartan decomposition G × G = (K × K)(A+ × A+ )(K × K) , with Cartan projection µ• = µ × µ : G × G −→ R+ × R+ . The general properness criterion of Benoist [Be1] and Kobayashi [Ko3] states, in this context, that a closed subgroup Γ of G × G acts properly on G by right and left multiplication if and only if the set µ• (Γ) “drifts away from the diagonal at infinity”, in the sense that for any R > 0, there is a compact subset of R+ × R+ outside of which any point of µ• (Γ) lies at distance > R from the diagonal of R+ × R+ . Consider a group Γj,ρ 0 as in (1.3), with j injective and discrete. Then the properness criterion states that Γj,ρ 0 acts properly discontinuously on G (i.e. (j, ρ) is admissible in the sense of Definition 1.7) if and only if (7.6) for any R ≥ 0, |µ(j(γ)) − µ(ρ(γ))| > R for almost all γ ∈ Γ0 µ(ρ(γ)) < µ(j(γ)) − R for almost all γ ∈ Γ0 , (i.e. for all γ ∈ Γ0 but finitely many exceptions). In particular, this gives the implications 3 ⇒ 2 and iii ⇒ ii of Section 7.2 above. It also gives 2 ⇒ 5 by the contrapositive: if ρ is not cusp-deteriorating, then there exists an element γ ∈ Γ0 with j(γ), ρ(γ) both parabolic, hence j(γ k ) = 2 log k + O(1) and ρ(γ k ) = 2 log k + O(1) as k → +∞, violating (7.6). (Note that we needed no geometrical finiteness assumption on j so far.) By [Ka2, Th. 1.3], if Γ0 is residually finite (for instance finitely generated) j,ρ and Γj,ρ 0 acts properly discontinuously on G, then the set µ• (Γ0 ) lies on one side only of the diagonal of R+ × R+ , up to a finite number of points. This means, up to switching j and ρ, that condition (7.6) is in fact equivalent to the following stronger condition: (7.7) for any R ≥ 0, and that properness implies λ(ρ(γ)) < λ(j(γ)) for all γ ∈ Γ0 (using (7.4)). Condition (7.7) is a necessary and sufficient condition for left admissibility in the sense of Definition 1.7; right admissibility is obtained by switching j and ρ. The implication 2 ⇒ 3 of Section 7.2 for geometrically finite j (which will be proved in Sections 7.5 and 7.6 below) can be interpreted as follows. Theorem 7.1. Let Γ be a discrete subgroup of G × G such that the set µ• (Γ) lies below the diagonal of R+ × R+ (up to a finite number of points) and such that the projection of Γ to the first factor of G × G is geometrically finite. Then Γ acts properly discontinuously on G by right and left multiplication if and only if there are constants C < 1 and D ∈ R such that µ(γ2 ) ≤ C µ(γ1 ) + D 70 FRANÇOIS GUÉRITAUD AND FANNY KASSEL for all γ = (γ1 , γ2 ) ∈ Γ. The point of Theorem 7.1 is that if Γ acts properly discontinuously on G, then the set µ• (Γ) “drifts away from the diagonal at infinity” linearly; in other words, Γ is sharp in the sense of [KK, Def. 4.2]. In particular, Theorem 7.1 corroborates the conjecture [KK, Conj. 4.10] that any discrete group acting properly discontinuously and cocompactly on a reductive homogeneous space should be sharp. Sharpness has analytic consequences on the discrete spectrum of the (nonelliptic) Laplacian defined by the natural pseudoRiemannian structure of signature (n, n(n − 1)/2) on the quotients of G: see [KK]. 7.4. Properness and the topology of the quotients of G = PO(n, 1). Let us make two side remarks. • First, here is for convenience a short proof of the properness criterion (7.6) of Benoist and Kobayashi in our setting. Note that there is no geometrical finiteness assumption here. Proof of the properness criterion of Benoist and Kobayashi. Suppose that condition (7.6) holds. Let C be a compact subset of G and let R := max µ(g). g∈C By the subadditivity (7.2) of µ, for any g ∈ C and γ ∈ Γ0 ,  µ ρ(γ)gj(γ)−1 ≥ |µ(j(γ)) − µ(ρ(γ))| − µ(g). By (7.6), the right-hand side is > R for almost all γ ∈ Γ0 , hence C ∩ ρ(γ)C j(γ)−1 = ∅ for almost all γ ∈ Γ0 . Thus the action of Γj,ρ 0 on G is properly discontinuous. Conversely, suppose that (7.6) does not hold, i.e. there exists R > 0 and a sequence (γm )m∈N of pairwise distinct elements of Γ0 such that |µ(j(γm )−1 ) − µ(ρ(γm )−1 )| ≤ R for all m ∈ N. By definition (7.1) of µ, this means that for any m ∈ N there is an element km ∈ K such that d(ρ(γm )−1 · p0 , km j(γm )−1 · p0 ) ≤ R. Since ρ(γm ) acts on Hn by an isometry, we obtain µ(ρ(γm )km j(γm )−1 ) = d(p0 , ρ(γm )km j(γm )−1 · p0 ) ≤ R. Therefore C ∩ ρ(γm )C j(γm )−1 6= ∅, where C is the compact subset of G consisting of the elements g with µ(g) ≤ R. This shows that the action of Γj,ρ  0 on G is not properly discontinuous. • Second, still without any geometrical finiteness assumption, here is a topological consequence of the inequality C(j, ρ) < 1; we refer to [DGK] for further developments and applications. Proposition 7.2. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j injective and discrete. If C(j, ρ) < 1, then the group Γj,ρ 0 = {(j(γ), ρ(γ)) | γ ∈ Γ0 } acts properly discontinuously on G by right and left multiplication and the quotient is homeomorphic to a K-bundle over M := j(Γ0 )\Hn , where K ∼ = O(n) is a maximal compact subgroup of G = PO(n, 1). MAXIMALLY STRETCHED LAMINATIONS 71 Proof. The group K is the stabilizer in G of some point of Hn . Choose a (j, ρ)-equivariant map f : Hn → Hn with Lip(f ) < 1. For any p ∈ Hn , Lp := {g ∈ G | g · p = f (p)} is a right-and-left coset of K. An element g ∈ G belongs to Lp if and only if p is a fixed point of g −1 ◦ f ; since Lip(g −1 ◦ f ) = Lip(f ) < 1, such a fixed point exists and is unique, which shows that g belongs to exactly one set Lp . We denote this p by Π(g). The fibration Π : G → Hn is continuous: if h ∈ G is close enough to g so that d(Π(g), h−1 ◦f ◦Π(g)) ≤ (1−Lip(f )) ε, then h−1 ◦f takes the ε-ball centered at Π(g) to itself, hence Π(h) is within ε from Π(g). Moreover, Π : G → Hn is by construction (Γj,ρ 0 , j(Γ0 ))-equivariant: ρ(γ) Lp j(γ)−1 = Lj(γ)·p for all γ ∈ Γ0 and p ∈ Hn . Since the action of j(Γ0 ) on Hn is properly discontinuous, the action of Γj,ρ 0 on G is properly discontinuous. The fibration Π descends to a topological fibration of the quotient of G by Γj,ρ 0 , with base n M = j(Γ0 )\H and fiber K. Note that for constant ρ, i.e. ρ(Γ0 ) = {1}, this fibration naturally identifies with the orthonormal frame bundle of M .  7.5. Proof of the implications of Section 7.2 when ρ is reductive. We first consider the generic case where ρ is reductive (Definition 4.9), i.e. ρred = ρ. We have already explained the easy implications i ⇒ iii ⇒ iv and iii ⇒ v (Section 7.2), as well as iii ⇒ ii which is an immediate consequence of the properness criterion of Benoist and Kobayashi (Section 7.3). We now explain iv ⇒ iii and ii ⇒ i . The implication iv ⇒ iii is an immediate consequence of the following equality. Lemma 7.3. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations. If ρ is reductive, then C ′ (j, ρ) = Cµ (j, ρ). Proof. By (7.5), we always have C ′ (j, ρ) ≤ Cµ (j, ρ). Let us prove the converse inequality. If ρ is reductive, then by [AMS, Th. 4.1] and [Be2, Lem. 2.2.1] there are a finite subset F of Γ0 and a constant D ≥ 0 with the following property: for any γ ∈ Γ0 there is an element f ∈ F such that |µ(ρ(γf )) − λ(ρ(γf ))| ≤ D (the element γf is proximal — see [Be2]). Then (7.2) and (7.3) imply where we set µ(ρ(γ)) ≤ ≤ ≤ ≤ ≤ µ(ρ(γf )) + µ(ρ(f )) λ(ρ(γf )) + D + µ(ρ(f )) C ′ (j, ρ) λ(j(γf )) + D + µ(ρ(f )) C ′ (j, ρ) µ(j(γf )) + D + µ(ρ(f )) C ′ (j, ρ) µ(j(γ)) + c,  c := D + max C ′ (j, ρ) µ(j(f )) + µ(ρ(f )) < ∞. f ∈F Thus Cµ (j, ρ) ≤ C ′ (j, ρ), which completes the proof.  72 FRANÇOIS GUÉRITAUD AND FANNY KASSEL The implication ii ⇒ i (or its contrapositive) for geometrically finite j is a consequence of the existence of a maximally stretched lamination when C(j, ρ) ≥ 1 (Theorem 1.3). We first establish the following. Lemma 7.4. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite. If ρ is reductive and C(j, ρ) ≥ 1, then there is a sequence (γk )k∈N of pairwise distinct elements of Γ0 such that µ(ρ(γk )) − C(j, ρ) µ(j(γk )) is uniformly bounded from below; in particular (using Lemma 7.3 and (7.5)), (7.8) C ′ (j, ρ) = Cµ (j, ρ) = C(j, ρ). The equality C ′ (j, ρ) = C(j, ρ) is Corollary 1.12, which has already been proved in Section 5.4 when the stretch locus E(j, ρ) is nonempty. Here we do not make any assumption on E(j, ρ). Proof of Lemma 7.4. If C(j, ρ) = 1 and ρ is not cusp-deteriorating, then there exists γ ∈ Γ0 with j(γ) and ρ(γ) both parabolic. Since µ(ρ(γ k )) and µ(j(γ k )) are both equal to 2 log(k) + O(1) as k → +∞ (Lemma 2.6), the sequence (µ(ρ(γk )) − C(j, ρ) µ(j(γk )))k∈N is uniformly bounded from below. If C(j, ρ) > 1 or if C(j, ρ) = 1 and ρ is cusp-deteriorating, then by Theorem 1.3 there is a (j, ρ)-equivariant map f : Hn → Hn with minimal Lipschitz constant C(j, ρ) that stretches maximally some geodesic line ℓ of Hn whose image in j(Γ0 )\Hn lies in a compact part of the convex core. Consider a sequence (γk )k∈N of pairwise distinct elements of Γ0 such that d(j(γk ) · p0 , ℓ) is uniformly bounded by some constant R > 0. For k ∈ N, let yk be the closest-point projection to ℓ of j(γk ) · p0 . If p0 ∈ Hn is the basepoint defining µ in (7.1) and if we set ∆ := d(p0 , f (y0 )) + d(p0 , f (p0 )), then the triangle inequality implies µ(ρ(γk )) = d(p0 , ρ(γk ) · p0 )  ≥ d f (y0 ), ρ(γk ) · f (p0 ) − ∆  = d f (y0 ), f (j(γk ) · p0 ) − ∆   ≥ d f (y0 ), f (yk ) − d f (yk ), f (j(γk ) · p0 ) − ∆ ≥ C(j, ρ) d(y0 , yk ) − C(j, ρ) R − ∆  ≥ C(j, ρ) d(p0 , j(γk ) · p0 ) − 2R − C(j, ρ) R − ∆ = C(j, ρ) µ(j(γk )) − 3 C(j, ρ) R − ∆. Thus the sequence (µ(ρ(γk )) − C(j, ρ) µ(j(γk )))k∈N is uniformly bounded from below.  We can now prove the implication ii ⇒ i . Corollary 7.5. Let Γ0 be a discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite. If ρ is reductive and (j, ρ) left admissible, then C(j, ρ) < 1. Proof. Assume that ρ is reductive and (j, ρ) left admissible. By [Ka2, Th. 1.3], condition (7.7) is satisfied, hence Cµ (j, ρ) ≤ 1. Suppose by contradiction that C(j, ρ) ≥ 1. By Lemma 7.4, we have Cµ (j, ρ) = C(j, ρ) = 1 and there is a sequence (γk ) ∈ (Γ0 )N of pairwise distinct elements with |µ(ρ(γk )) − µ(j(γk ))| MAXIMALLY STRETCHED LAMINATIONS 73 uniformly bounded. This contradicts the properness criterion (7.6) of Benoist and Kobayashi.  7.6. Proof of the implications of Section 7.2 when ρ is nonreductive. We now prove the implications of Section 7.2 for geometrically finite j when ρ is nonreductive (Definition 4.9). We have already explained the easy implications 1 ⇒ 3 ⇒ 4 ⇒ 5 (Section 7.2) and 3 ⇒ 2 ⇒ 5 (Section 7.3), as well as 1 ⇒ i and i ⇒ 1 under the cusp-deterioration assumption 5 (Section 7.2). Moreover, in Section 7.5 we have established the implications i ⇔ ii ⇔ iii ⇔ iv ⇒ v for the “reductive part” ρred of ρ. Therefore, we only need to explain the “horizontal” implications 2 ⇒ ii , 3 ⇒ iii , 4 ⇒ iv , and 5 ⇒ v Let ρ ∈ Hom(Γ0 , G) be nonreductive. The group ρ(Γ0 ) has a unique fixed point ξ in the boundary at infinity ∂∞ Hn of Hn . Let P be the stabilizer of ξ in G: it is a proper parabolic subgroup of G. Choose a Levi decomposition P = (M A) ⋉ N , where A ∼ = R∗+ is a Cartan subgroup of G (i.e. a one-parameter subgroup of purely translational, commuting hyperbolic elements), M ∼ = O(n − 1) is a compact subgroup of G such that M A is the centralizer of A in G, and N ∼ = Rn−1 is the unipotent radical of P . For instance, for n = 2 (resp. n = 3), the identity component of the group G identifies with PSL2 (R) (resp. with PSL2 (C)), and we can take A to be the projectivized real diagonal matrices, N the projectivized upper triangular unipotent matrices, and the identity component of M to be the projectivized diagonal matrices with entries of module 1. We set ρred := π ◦ ρ, where π : P → M A is the natural projection. The implications 2 ⇒ ii , 3 ⇒ iii , 4 ⇒ iv , and 5 ⇒ v of Section 7.2 are consequences of the following easy observation. Lemma 7.6. After possibly changing the basepoint p0 ∈ Hn of (7.1) (which modifies µ only by a bounded additive amount, by the triangle inequality), we have λ(g) = λ(π(g)) = µ(π(g)) ≤ µ(g) for all g ∈ P . Proof. Take the basepoint p0 ∈ Hn on the geodesic line A preserved by M A, which is pointwise fixed by M and on which the elements of A act by translation. Then λ(π(g)) = µ(π(g)) for all g ∈ P . The projection onto A along horospheres centered at ξ is (P, π(P ))-equivariant, and restricts to an isometry on any line ending at ξ: therefore, if g is hyperbolic, preserving such a line, then π(g) translates along A by λ(g) units of length, yielding λ(g) = λ(π(g)). If g is parabolic or elliptic, then λ(g) = 0 and g preserves  each horosphere centered at ξ, hence λ(π(g)) = 0. Proof of 3 ⇒ iii and 4 ⇒ iv . Lemma 7.6 and (7.5) imply C ′ (j, ρ) = C ′ (j, ρred ) = Cµ (j, ρred ) ≤ Cµ (j, ρ), which immediately yields the implications.  Proof of 2 ⇒ ii . Assume that (j, ρ) is left admissible. By [Ka2], the pair (j, ρ) is not right admissible and the stronger form (7.7) of the properness 74 FRANÇOIS GUÉRITAUD AND FANNY KASSEL criterion of Benoist and Kobayashi holds. Since µ ◦ π ≤ µ by Lemma 7.6, the condition (7.7) also holds for ρred = π◦ρ, hence (j, ρred ) is left admissible.  Proof of 5 ⇒ v . Assume that ρ is cusp-deteriorating. For any γ ∈ Γ0 with j(γ) parabolic, ρred (γ) is not hyperbolic, otherwise ρ(γ) would be hyperbolic too by Lemma 7.6, and it is not parabolic since ρred takes values in the group M A which has no parabolic element.  7.7. Deformation of properly discontinuous actions. Theorems 1.9 and 1.11 follow from Theorem 1.8 (properness criterion) and Proposition 1.5 (continuity of (j, ρ) 7→ C(j, ρ) for convex cocompact j), together with a classical cohomological argument for cocompactness. Proof of Theorems 1.9 and 1.11. Let Γ be a finitely generated discrete subgroup of G × G acting properly discontinuously on G by right and left multiplication. By the Selberg lemma [Se, Lem. 8], there is a finite-index subgroup Γ′ of Γ that is torsion-free. By [KR] and [Sa] (case n = 2) and [Ka2] (general case), up to switching the two factors of G × G, the group Γ′ is of the form Γj,ρ 0 as in (1.3), where Γ0 is a torsion-free discrete subgroup of G and j, ρ ∈ Hom(Γ0 , G) are two representations of Γ0 in G with j injective and discrete, and (j, ρ) is left admissible in the sense of Definition 1.7. Assume that j is convex cocompact. Then C(j, ρ) < 1 by Theorem 1.8. By Proposition 1.5 and the fact that being convex cocompact is an open condition (see [Bo2, Prop. 4.1] or Proposition B.1), there is a neighborhood U ⊂ Hom(Γ, G × G) of the natural inclusion such that for any ϕ ∈ U , the group ϕ(Γ′ ) is of the ′ ′ form Γj0 ,ρ for some (j ′ , ρ′ ) ∈ Hom(Γ0 , G)2 with j ′ convex cocompact and C(j ′ , ρ′ ) < 1. In particular, ϕ(Γ′ ) is discrete in G × G and acts properly discontinuously on G by Theorem 1.8, and the same conclusion holds for ϕ(Γ). Assume that the action of Γ on G is cocompact. We claim that the action of ϕ(Γ) on G is cocompact for all ϕ ∈ U . Indeed, let Γ′ = Γj,ρ 0 be a finite-index subgroup of Γ as above; it is sufficient to prove that the ′ ′ action of ϕ(Γ′ ) is cocompact for all ϕ ∈ U . Since ϕ(Γ′ ) is of the form Γj0 ,ρ with j ′ injective, the group ϕ(Γ′ ) has the same cohomological dimension as Γ′ . We then use the fact that when a torsion-free discrete subgroup of G × G acts properly discontinuously on G, it acts cocompactly on G if and only if its cohomological dimension is equal to the dimension of the Riemannian symmetric space of G, namely n in our case (see [Ko1, Cor. 5.5]). ′ ′ (Alternatively, the cocompactness of the action of Γj0 ,ρ on G also follows from Proposition 7.2 and from the cocompactness of j ′ (Γ0 ).) Finally, assume that the action of Γ on G is free. This means that for any γ ∈ Γ r {1}, the elements pr1 (γ) and pr2 (γ) are not conjugate in G, where pri : G × G → G denotes the i-th projection. In fact, since the action of Γ on G is properly discontinuous, pr1 (γ) and pr2 (γ) can never be conjugate in G when γ is of infinite order. Therefore freeness is seen exclusively on torsion elements. We claim that Γ has only finitely many conjugacy classes of torsion elements. Indeed, Γ has a finite-index subgroup of the form Γj,ρ 0 with j injective and convex cocompact (up to switching the two factors of G × G), and a convex cocompact subgroup of G (or more generally a geometrically finite subgroup) has only finitely many conjugacy classes of torsion elements MAXIMALLY STRETCHED LAMINATIONS 75 (see [Bo1]). For any nontrivial torsion element γ ∈ Γ, there is a neighborhood Uγ ⊂ Hom(Γ, G × G) such that for all ϕ ∈ Uγ , the elements pr1 (ϕ(γ)) and pr2 (ϕ(γ)) are not conjugate in G; then pr1 (ϕ(γ ′ )) and pr2 (ϕ(γ ′ )) are also not conjugate for any Γ-conjugate γ ′ of γ.  The same argument, replacing Proposition 1.5 (continuity of (j, ρ) 7→ C(j, ρ) for convex cocompact j) by Proposition 6.1.(1) (openness of the condition C(j, ρ) < 1 for geometrically finite j and cusp-deteriorating ρ in dimension n ≤ 3), yields the following. Theorem 7.7. For G = PO(2, 1) or PO(3, 1) (i.e. PSL2 (R) or PSL2 (C) up to index two), let Γ be a discrete subgroup of G × G acting properly discontinuously on G, with a geometrically finite quotient (Definition 1.10). There is a neighborhood U ⊂ Homdet (Γ, G × G) of the natural inclusion such that for any ϕ ∈ U , the group ϕ(Γ) is discrete in G × G and acts properly discontinuously on G, with a geometrically finite quotient; moreover, this quotient is compact (resp. is convex cocompact, resp. is a manifold) if the initial quotient of G by Γ was. The set Homdet (Γ, G × G) is defined as follows. We have seen that the ρ,j group Γ has a finite-index subgroup Γ′ of the form Γj,ρ 0 or Γ0 , where Γ0 is a discrete subgroup of G and j, ρ ∈ Hom(Γ0 , G) are two representations of Γ0 in G with j injective and geometrically finite and (j, ρ) left admissible in the sense of Definition 1.7. By Lemma 2.7, the representation ρ is cuspdeteriorating with respect to j in the sense of Definition 1.1. We define Homdet (Γ, G × G) to be the set of group homomorphisms from Γ to G × G j,ρ whose restriction to Γ′ is of the form (j ′ , ρ′ ) (if Γ′ ∼ = Γ0 ) or (ρ′ , j ′ ) (if ρ,j Γ′ ∼ = Γ0 ) with j ′ injective and geometrically finite, of the cusp type of j, ′ and ρ cusp-deteriorating with respect to j. It is necessary to restrict to Homdet (Γ, G × G) in Theorem 7.7, for the following reasons: • as mentioned in the introduction, for a given j with cusps, the constant representation ρ = 1 can have small, non-cusp-deteriorating deformations ρ′ , for which (j, ρ′ ) is nonadmissible; • if we allow for small deformations j ′ of j with a different cusp type than j (fewer cusps), then the pair (j, ρ) can have small, nonadmissible deformations (j ′ , ρ′ ) with ρ′ cusp-deteriorating with respect to j ′ : this shows that we must fix the cusp type. Note that properly discontinuous actions on G = PO(3, 1) of finitely generated groups Γ = Γj,ρ 0 with j geometrically infinite do not deform into properly discontinuous actions in general, for the group j(Γ0 ) (e.g. the fiber group of a hyperbolic surface bundle over the circle) may have small deformations j ′ (Γ0 ) that are not even discrete (e.g. small perturbations of a nearby cusp group in the sense of [M1]). It would be interesting to know whether in this case one can define an analogue of Homdet (Γ, G×G) in which admissibility becomes again an open condition; see also Section C.2. 7.8. Interpretation of Theorem 1.9 in terms of (G, X)-structures. We can translate Theorem 1.9 in terms of geometric structures, in the sense of Ehresmann and Thurston, as follows. We set X = G = PO(n, 1) and 76 FRANÇOIS GUÉRITAUD AND FANNY KASSEL G = G × G, where G × G acts on G by right and left multiplication. Let e . Recall that a (G, X)-structure N be a manifold with universal covering N on N is a (maximal) atlas of charts on N with values in X such that the transition maps are given by elements of G. Such a structure is equivalent to a pair (h, D) where h : π1 (N ) → G is a group homomorphism called the e → X an h-equivariant local diffeomorphism called the holonomy and D : N developing map; the pair (h, D) is unique modulo the natural action of G by  g · (h, D) = gh(·)g−1 , gD . A (G, X)-structure on N is said to be complete if the developing map is a covering; this is equivalent to a notion of geodesic completeness for the natural pseudo-Riemannian structure induced by the Killing form of the Lie algebra of G (see [Go]). For n > 2, the fundamental group of G0 = PO(n, 1)0 is finite, hence completeness is equivalent to the fact that the (G, X)-structure identifies N with the quotient of X by some discrete subgroup Γ of G acting properly discontinuously and freely on X, up to a finite covering. For n = 2, this characterization of completeness still holds for compact manifolds N [KR, Th. 7.2]. Therefore, Theorem 1.9 can be restated as follows. Corollary 7.8. Let X = G = PO(n, 1) and G = G×G, acting on X by right and left multiplication. The set of holonomies of complete (G, X)-structures on any compact manifold N is open in Hom(π1 (N ), G). We note that for a compact manifold N , the so-called Ehresmann–Thurston principle asserts that the set of holonomies of all (not necessarily complete) (G, X)-structures on N is open in Hom(π1 (N ), G) (see [T1]). For n = 2, Klingler [Kl] proved that all (G, X)-structures on N are complete, which implies Corollary 7.8. For n > 2, it is not known whether all (G, X)-structures on N are complete; it has been conjectured to be true at least for n = 3 [DZ]. The question is nontrivial since the Hopf–Rinow theorem does not hold for non-Riemannian manifolds. 8. A generalization of the Thurston metric on Teichmüller space In this section we prove Proposition 1.13, which generalizes the Thurston metric on Teichmüller space to higher dimension, in a geometrically finite setting. (Corollary 1.12 has already been proved as part of Lemma 7.4; see also Section 5.4.) 8.1. An asymmetric metric on the space of geometrically finite structures. Let M be a hyperbolic n-manifold and T (M ) the space of conjugacy classes of geometrically finite representations of Γ0 := π1 (M ) into G = PO(n, 1) with the homeomorphism type and cusp type of M . In this section we assume that M contains more than one essential closed curve. We define a function dTh : T (M ) × T (M ) → R as in (1.6): for any j, ρ ∈ T (M ),   δ(ρ) , dTh (j, ρ) := log C(j, ρ) δ(j) MAXIMALLY STRETCHED LAMINATIONS 77 where δ(j) is the critical exponent of j. Recall that, by definition,  1 (8.1) δ(j) := lim sup log # j(Γ0 ) · p ∩ Bp (R) , R→+∞ R where p is any point of Hn and Bp (R) denotes the ball of radius R centered at p in Hn . We have δ(j) ∈ (0, n − 1] [Bea, S1] and the limsup is in fact P −s d(p,j(γ)·p) converges a limit [Pat, S1, Ro1]. The Poincaré series γ∈Γ0 e for s > δ(j) and diverges for s ≤ δ(j). Equivalently, δ(j) is the Hausdorff dimension of the limit set of j(Γ0 ) [S1, S2]. If M is a surface of finite volume, then T (M ) is the Teichmüller space of M , we have δ ≡ 1 on T (M ), and dTh is the Thurston metric on Teichmüller space, which was introduced in [T2] (see Section 1.5). This metric is asymmetric: in general dTh (j, ρ) 6= dTh (ρ, j), see [T2, § 2]. Lemma 8.1. The function dTh : T (M ) × T (M ) → R is continuous as soon as M is convex cocompact or all the cusps have rank ≥ n − 2. In particular, it is always continuous if n ≤ 3. Proof. If M is convex cocompact or all the cusps have rank ≥ n − 2, then the function (j, ρ) 7→ C(j, ρ) is continuous on T (M ) × T (M ) by Proposition 1.5, Lemma 2.7, and Proposition 6.1.(3). Moreover, convergence in T (M ) implies geometric convergence (see Proposition B.3), and so δ is continuous on T (M ) by [M2, Th. 7.3].  The following remark justifies the introduction of the correcting factor δ(ρ)/δ(j) in the definition (1.6) of dTh . Remark 8.2. If M has infinite volume, then log C(j, ρ) can take negative values, and log C(j, ρ) = 0 does not imply j = ρ. Proof. The following example is taken from [T2, proof of Lemma 3.4]; see also [PT]. Let M be a pair of pants, i.e. a hyperbolic surface of genus 0 with three funnels. Let α be an infinite embedded geodesic of M whose two ends go out to infinity in the same funnel, and let α′ be another nearby geodesic (see Figure 9). Cutting out the strip between α and α′ and gluing back so that the endpoints of the common perpendicular to α, α′ are identified yields a new hyperbolic surface M ′ such that two boundary components of the convex core of M ′ have the same lengths as in M , and the third one is shorter. There is a 1-Lipschitz map between M and M ′ , and the corresponding holonomies j 6= ρ satisfy log C(j, ρ) = 0. In fact, it is easy to see that after repeating the process with all three funnels we obtain an element ρ′ ∈ T (M ) with log C(j, ρ′ ) < 0.  With the correcting factor δ(ρ)/δ(j), the following holds. Lemma 8.3. For any j, ρ, j1 , j2 , j3 ∈ T (M ), (1) dTh (j, ρ) ≥ 0, (2) dTh (j1 , j3 ) ≤ dTh (j1 , j2 ) + dTh (j2 , j3 ). Proof. Let f : Hn → Hn be a (j, ρ)-equivariant Lipschitz map. For any p ∈ Hn , γ ∈ Γ0 , and R > 0, if j(γ) · p ∈ Bp (R/Lip(f )), then  ρ(γ) · f (p) = f j(γ) · p ∈ Bf (p) (R), 78 FRANÇOIS GUÉRITAUD AND FANNY KASSEL α α′ Figure 9. The strip between the geodesics α and α′ can be collapsed to create a new hyperbolic metric with shorter curves. In general, the closed geodesic at the bottom (met by α, α′ ) will not collapse to a closed geodesic of the new metric. hence δ(ρ) ≥ δ(j)/Lip(f ) by definition (8.1) of δ. Then (1) follows by letting Lip(f ) tend to C(j, ρ) and taking the logarithm. The triangle inequality (2) follows from the general inequality Lip(f1 ◦ f2 ) ≤ Lip(f1 ) Lip(f2 ).  As in Section 1.5, let T (M )Zs be the subset of T (M ) consisting of elements j such that the Zariski-closure of j(Γ0 ) in G is simple (e.g. equal to G). In order to prove Proposition 1.13, it remains to prove the following. Proposition 8.4. If j, ρ ∈ T (M )Zs are distinct, then dTh (j, ρ) > 0. Note that Proposition 8.4 is not true when j or ρ does not belong to T (M )Zs : for instance, if j ∈ T (M )Zs takes values in PO(2, 1) ⊂ G = PO(n, 1), then we may multiply it by a homomorphism with values in the centralizer O(n − 2) of PO(2, 1) in G without changing the set {µ(j(γ)) | γ ∈ Γ0 }; this yields a homomorphism ρ in T (M ) r T (M )Zs with dTh (j, ρ) = dTh (ρ, j) = 0. 8.2. Proof of Proposition 8.4. In our setting, the rigidity of the marked length spectrum {λ(j(γ)) | γ ∈ Γ0 } is well known: see [Kim, Th. 2]. We shall use a slightly stronger property, namely the rigidity of the projectivized marked length spectrum. Lemma 8.5. Let j, ρ ∈ T (M )Zs and C > 0. If λ(ρ(γ)) = C λ(j(γ)) for all γ ∈ Γ0 , then j = ρ in T (M )Zs . Proof. For i ∈ {1, 2}, let pri : G × G → G be the i-th projection. Let H1 (resp. H2 ) be the identity component (for the real topology) of the Zariski closure of j(Γ0 ) (resp. ρ(Γ0 )) in G, and let H be the identity component of the Zariski closure of (j, ρ)(Γ0 ) in G × G. Since H1 is simple, the kernel of pr2 |H is either {1} or H1 . It cannot be H1 , otherwise H = H1 × H2 would be semisimple of real rank 2, and so by [Be2] the cone spanned by {(λ(ρ(γ)), λ(j(γ))) | γ ∈ Γ0 } would have nonempty interior, contradicting the fact that λ(ρ(γ)) = C λ(j(γ)) for all γ ∈ Γ0 . Therefore pr2 |H is injective, and MAXIMALLY STRETCHED LAMINATIONS 79 similarly pr1 |H is injective, and so there is a (j, ρ)-equivariant isomorphism H1 → H2 . Note that any noncompact simple subgroup Hi of G = PO(n, 1) is conjugate to some PO(k, 1) embedded in the standard way, for k ≥ 2, up to finite index. Indeed, any Hi -orbit in Hn is a totally geodesic subspace of Hn [H, Chap. IV, Th. 7.2], hence is a copy of Hk for some k ≥ 2, and there is only one way to embed Hk into Hn up to isometry (this is clear in the hyperboloid model). Therefore the (j, ρ)-equivariant isomorphism H1 → H2 above is given by conjugation by some element of G, and j and ρ are conjugate under G.  Proof of Proposition 8.4. Assume that dTh (j, ρ) = 0 for some j 6= ρ in T (M )Zs , and let C := C(j, ρ) = δ(j)/δ(ρ). By Lemma 8.5, there exists γ0 ∈ Γ0 such that λ(ρ(γ0 )) < C λ(j(γ0 )). Let f : Hn → Hn be a (j, ρ)equivariant, C-Lipschitz map (Lemma 4.10). The translation axis A ⊂ Hn of j(γ0 ) cannot be C-stretched by f since λ(ρ(γ0 )) < Cλ(j(γ0 )). Therefore we can find p, q ∈ A and ∆ > 0 such that d(f (p), f (q)) ≤ C d(p, q)−(2+C)∆. Let Bp (resp. Bq ) be the ball of diameter ∆ centered at p (resp. q), so that d(f (p′ ), f (q ′ )) ≤ C d(p′ , q ′ ) − ∆ for all p′ ∈ Bp and q ′ ∈ Bq . We can assume moreover that p, q are close enough in the sense that no segment [p′ , q ′ ] with p′ ∈ Bp and q ′ ∈ Bq intersects any ball j(γ)·Bp or j(γ)·Bq with γ ∈ Γ0 r{1}. → Let Ue be the open set of all vectors (x, − v ) in the unit tangent bundle T 1 Hn → − such that x ∈ Bp and expx (R+ v ) intersects Bq . Let X := j(Γ0 )\T 1 Hn be the unit tangent bundle of the quotient manifold j(Γ0 )\Hn , and U ⊂ X the projection of Ue. For γ ∈ Γ0 with j(γ) hyperbolic, let Nγ be the number of times that the axis of j(γ) traverses U in X (see Figure 10); the triangle inequality yields λ(ρ(γ)) ≤ C λ(j(γ)) − Nγ ∆. (8.2) Let ν be the Bowen–Margulis–Sullivan probability measure on X (see [Ro2, Bp p Nγ copies of the axis Aj(γ) q Bq f f (p) f (q) Figure 10. Illustration of the proof of Proposition 8.4 when Nγ = 2. § 1.C]). We have ν(U ) > 0 since U intersects the projection of the axis of j(γ0 ); therefore we can find a continuous function ψ : X →R [0, 1] with compact support contained in U such that kψk∞ = 1 and ε := X ψ dν > 0. For any γ ∈ Γ0 with j(γ) hyperbolic and primitive (i.e. not a power of any other j(γ ′ )), we denote by νγ the uniform probability measure on X 80 FRANÇOIS GUÉRITAUD AND FANNY KASSEL supported on the axis of j(γ). Since the support of ψ is contained in Bp , Z Nγ diam(Bp ) =∆ . ψ dνγ ≤ kψk∞ · Nγ (8.3) λ(j(γ)) λ(j(γ)) X For R > 0, let ΓR,j be the set of elements γ ∈ Γ0 such that j(γ) is primitive 0 hyperbolic and λ(j(γ)) ≤ R. By [Ro2, Th. 5.1.1] (see also [L, DP] for special cases), Z X Z ψ dν = ε. (8.4) δ(j)R e−δ(j)R ψ dνγ −→ γ∈ΓR,j 0 R→+∞ X X Moreover, this convergence is still true if we replace ψ with the constant function equal to 1 on X [Ro2, Cor. 5.3], yielding (8.5) #(Γj,R 0 ) ∼ R→+∞ eδ(j)R . δ(j)R Combined, formulas (8.3), (8.4), (8.5) imply that the average value of Nγ /λ(j(γ)), ε for γ ranging over ΓR,j 0 , is ≥ 2∆ for all large enough R. Since Nγ 1 1 ≤ ≤ λ(j(γ)) d(p, q) − ∆ 2∆ ε for all γ ∈ ΓR,j 0 , this classically implies that a proportion ≥ 2 of elements ε , which by (8.2) entails γ ∈ ΓR,j satisfy Nγ /λ(j(γ)) ≥ 4∆ 0   ε ε λ(j(γ)) ≤ C − R. λ(ρ(γ)) ≤ Cλ(j(γ)) − Nγ ∆ ≤ C − 4 4 Thus  (C− ε )R,ρ  ε # Γ0 4 ≥ #(ΓR,j 0 ) 2 for all large enough R. Then (8.5) yields (C− 4ε ) δ(ρ) ≥ δ(j), hence C δ(ρ) δ(j) > 1.  9. The stretch locus in dimension 2 We now focus on results specific to dimension n = 2. We first consider the case C(j, ρ) > 1, for which we recover and extend two aspects of the classical theory [T2] of the Thurston metric on Teichmüller space. The first aspect is the chain recurrence of the lamination E(j, ρ), which we prove in Section 9.2. Building on chain recurrence, the second aspect is the upper semicontinuity of E(j, ρ) for the Hausdorff topology, namely E(j, ρ) ⊃ lim sup E(jk , ρk ) k→+∞ for any (jk , ρk ) → (j, ρ) with ρ and ρk reductive, which we prove in Section 9.3. We also consider the case C(j, ρ) < 1 and provide some evidence for Conjecture 1.4 (describing the stretch locus E(j, ρ)) in Section 9.4. In fact, we believe that chain recurrence (suitably defined) should probably also hold in higher dimension for C(j, ρ) > 1, but we shall use the classification of geodesic laminations on surfaces to prove it here. Semicontinuity should also hold in higher dimension, not only for C(j, ρ) > 1 but also MAXIMALLY STRETCHED LAMINATIONS 81 in some form for C(j, ρ) ≤ 1: this is natural to expect in view of Propositions 1.5 and 6.1.(3) (if the minimal Lipschitz constant varies continuously, so should the stretch locus). However, our proof hinges on chain recurrence and on the fact that f multiplies arc length along the leaves of the stretch locus: this property does not obviously have a counterpart when C(j, ρ) < 1 (the stretch locus being no longer a lamination in general), and is at any rate harder to prove (the Kirszbraun–Valentine theorem no longer applies as in Lemma 5.2). 9.1. Chain recurrence in the classical setting. We first recall the notion of chain recurrence and, for readers interested in the more technical aspects of [T2], we make the link between the “maximal, ratio-maximizing, chain recurrent lamination” µ(j, ρ) introduced by Thurston in the latter paper, and the stretch locus E(j, ρ) introduced in the present paper. On a hyperbolic surface S, a geodesic lamination is called recurrent if every half-leaf returns arbitrarily often, arbitrarily close to its starting point. In [T2], Thurston introduced the weaker notion of chain recurrence. Definition 9.1. A geodesic lamination L˙ on S is called chain recurrent if for every ṗ ∈ L˙ and ε > 0, there exists a simple closed geodesic G passing within ε of ṗ and staying ε-close to L˙ in the C 1 sense. By “ε-close in the C 1 sense” we mean that any unit-length segment of G lies ε-close to a segment of L˙ (for the Hausdorff metric). In particular, any recurrent lamination is chain recurrent. The following is well known. Fact 9.2. Any geodesic lamination on S consists of finitely many disjoint recurrent components, together with finitely many isolated leaves spiraling from one recurrent component to another (possibly the same). The total number of recurrent components and of isolated leaves can be bounded by an integer depending only on the topology of S. By Fact 9.2, chain recurrence implies that for any ε > 0, any ṗ ∈ L˙ , and any direction of travel along L˙ from ṗ, one can return to ṗ (with the same direction of travel) by following leaves of L˙ and occasionally jumping to nearby leaves within distance ε. (For example, if L˙ has an isolated leaf spiraling to a simple closed curve and no leaf spiraling out, then L˙ is not chain recurrent.) By Fact 9.2, the number of necessary ε-jumps can be bounded by a number m depending only on the topology of the surface, and the distances in-between the jumps can be taken arbitrarily large. In the sequel, we shall call a sequence of leaf segments, separated by a number ≤ m of ε-jumps, an ε-quasi-leaf of L˙ . The closing lemma (Lemma A.1) implies that conversely any ε-quasi-leaf can be ε-approximated, in the C 1 sense, by a simple closed geodesic. We now briefly discuss the relation to [T2] (this will not be needed from Lemma 9.3 onwards). Let S be a hyperbolic surface of finite volume. In [T2], Thurston associated to any pair (j, ρ) of distinct elements of the Teichmüller space T (S) of S (i.e. type-preserving, geometrically finite representations of Γ0 := π1 (S) into PO(2, 1) ∼ = PGL2 (R), of finite covolume, up to conjugation) a subset µ(j, ρ) of S, defined as the union of all chain recurrent laminations 82 FRANÇOIS GUÉRITAUD AND FANNY KASSEL L˙ that are ratio-maximizing, in the sense that there exists a locally C(j, ρ)Lipschitz map from a neighborhood of L˙ in (S, j) to a neighborhood of L˙ in (S, ρ), in the correct homotopy class, that multiplies arc length by C(j, ρ) on each leaf of L˙ . He proved that µ(j, ρ) is a lamination [T2, Th. 8.2], necessarily chain recurrent, and that this lamination is C(j, ρ)-stretched by some C(j, ρ)-Lipschitz homeomorphism (S, j) → (S, ρ), in the correct homotopy class, whose local Lipschitz constant is < C(j, ρ) everywhere outside of µ(j, ρ). Indeed, this last property follows from the existence of a concatenation of “stretch paths” going from j to ρ in T (S) [T2, Th. 8.5] and from the definition of stretch paths in terms of explicit homeomorphisms of minimal Lipschitz constant [T2, § 4]. Therefore, the preimage µ e(j, ρ) ⊂ H2 of Thurston’s chain recurrent lamination µ(j, ρ) ⊂ S ≃ j(Γ0 )\H2 contains the stretch locus E(j, ρ) that we have introduced in this paper. In fact, this inclusion is an equality, as the following variant of Lemma 5.10 shows (with Γ0 = π1 (S) and j, ρ ∈ T (S)). Lemma 9.3. (in dimension n = 2) Let Γ0 be a torsion-free discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite. Let µ e ⊂ H2 be the preimage of some chain recurrent lamination on S. If µ e is maximally stretched by some (j, ρ)-equivariant Lipschitz map f : H2 → H2 , then µ e is contained in the stretch locus E(j, ρ). Proof. We proceed as in the proof of Lemma 5.10, but using closed quasileaves instead of recurrent leaves. Set C := C(j, ρ). Consider a geodesic segment [x, y] contained in µ. By chain recurrence and by the closing lemma (Lemma A.1), for any ε > 0 there is a simple closed geodesic G on (S, j) that passes within ε of x and is ε-close to an ε-quasi-leaf L of µ. We may assume that L consists of m or fewer leaf segments, of which one contains [x, y]. Let γ ∈ Γ0 correspond to the closed geodesic G. Then λ(j(γ)) = length(G) ≤ length(L) + mε, and since each leaf segment of L is C-stretched by f we see, using the closing lemma again, that   λ(ρ(γ)) ≥ C · length(L) − 3mε ≥ C · λ(j(γ)) − 4mε . By considering p, q, p′ , q ′ ∈ H2 such that p, q project to x, y ∈ L and p′ , q ′ to points within ε from x, y in G, we obtain, exactly as in the proof of Lemma 5.10, that for any f ′ ∈ F j,ρ , d(f ′ (p), f ′ (q)) ≥ C · d(p, q) − (4m + 4)Cε. This holds for any ε > 0, hence d(f ′ (p), f ′ (q)) = Cd(p, q) and p belongs to the stretch locus of f ′ .  9.2. Chain recurrence for C(j, ρ) > 1 in general. We now prove that the stretch locus E(j, ρ) is chain recurrent in a much wider setting than [T2], allowing j(Γ0 ) to have infinite covolume in G and ρ to be any representation of Γ0 in G with C(j, ρ) > 1 (not necessarily injective or discrete). Proposition 9.4. (in dimension n = 2) Let Γ0 be a torsion-free discrete group and (j, ρ) ∈ Hom(Γ0 , G)2 a pair of representations with j geometrically finite and ρ reductive (Definition 4.9). If C(j, ρ) > 1, then the image in S := j(Γ0 )\H2 of the stretch locus E(j, ρ) is a (nonempty) chain recurrent lamination. MAXIMALLY STRETCHED LAMINATIONS 83 Proof. Let f0 ∈ F j,ρ be optimal (Definition 4.12), with stretch locus E := E(j, ρ). By Theorem 1.3 and Lemma 4.10, we know that E is a nonempty, j(Γ0 )-invariant geodesic lamination. Suppose by contradiction that its image Ė in S = j(Γ0 )\H2 is not chain recurrent. We shall “improve” f0 by decreasing its stretch locus, which will be absurd. Given ṗ ∈ Ė and a direction (“forward”) of travel from ṗ, define the forward chain closure Ėp of ṗ in Ė as the subset of Ė that can be reached from ṗ, starting forward, by following ε-quasi-leaves of Ė for positive time, for any ε > 0. Clearly, Ėp is the union of a closed sublamination of Ė and of an open half-leaf issued from ṗ. If Ėp contains ṗ for all ṗ ∈ Ė and choices of forward direction, then for any ε > 0 we can find a closed ε-quasi-leaf of Ė through ṗ. Since Ė is not chain recurrent by assumption, this is not the case: we can therefore choose a point ṗ ∈ Ė and a direction of travel such that Ėp does not contain ṗ. Then Ėp is orientable: otherwise for any ε > 0 we could find an ε-quasileaf of Ė through ṗ by following a quasi-leaf from ṗ, “jumping” onto another (quasi)-leaf with the reverse orientation, and getting back to ṗ, which would contradict the fact that Ėp does not contain ṗ. Let Υ̇ be the lamination of S obtained by removing from Ėp the (isolated) half-leaf issued from ṗ. Then Υ̇ inherits an orientation from the “forward” orientation of Ėp . No leaf of Ė r Υ̇ can be outgoing from Υ̇, otherwise it would automatically belong to Υ̇. But at least one leaf of Ė r Υ̇ is incoming towards Υ̇: namely, the leaf ℓ̇ containing ṗ. The geodesic lamination Υ̇ fills some subsurface Σ ⊂ S with geodesic boundary (possibly reduced to a single closed geodesic). Let U̇ ⊂ S be a uniform neighborhood of Σ, with the same topological type as Σ, such that U̇ ∩ Ė is the union of the oriented lamination Υ̇ and of some (at least one) incoming half-leaves. Up to shifting the point ṗ along its leaf ℓ̇, we may assume that ṗ ∈ ∂ U̇ . Let U and Υ be the (full) preimages of U̇ and Υ̇ in H2 . To reach a contradiction, we shall modify f0 on U . The modification on Υ itself is simply to replace f |Υ with fε := f0 ◦ Φ−ε , where (Φt )t∈R is the flow on the oriented lamination Υ and ε > 0 is small enough. We make the following two claims, for C := C(j, ρ): (i) the map fε is still C-Lipschitz on Υ, for all small enough ε > 0; (ii) the map fε extends to a C-Lipschitz, (j, ρ)-equivariant map f on U , that agrees with f0 on ∂U , for all small enough ε > 0. This will prove that the leaf ℓ of E containing a lift p of ṗ did not have to be maximally stretched after all, a contradiction: indeed, consider q ∈ ℓ far enough from p, at distance < ε/4 from some point q ′ ∈ Υ, such that Φ−ε (q ′ ) is still within < ε/4 from the point of ℓ at distance ε from q (see Figure 11). Then d(p, Φ−ε (q ′ )) ≤ d(p, q) − ε/2, which implies d(fε (p), fε (q)) ≤ d(fε (p), fε (q ′ )) + d(fε (q ′ ), fε (q))  ≤ C d(p, Φ−ε (q ′ )) + ε/4 ≤ C (d(p, q) − ε/4) < C d(p, q). 84 FRANÇOIS GUÉRITAUD AND FANNY KASSEL p ∂U ℓ Υ ′ q Φ−ε (q ) q′ Figure 11. Flowing back by Φ−ε brings q ′ closer to p. • Proof of (ii) assuming (i). By Remark 2.8.(2), it is sufficient to consider one connected component A of U r Υ in H2 and, assuming (i), to prove that for any small enough ε > 0 the map fε extends to a CLipschitz, (j, ρ)-equivariant map f on A, that agrees with f0 on ∂A. Fix such a connected component A; its image in S is an annulus. By Theorem 1.6, it is sufficient to prove that d(fε (x), f0 (y)) ≤ Cd(x, y) for any geodesic segment [x, y] across A with x ∈ Υ and y ∈ ∂A. Note that the length of such segments is uniformly bounded from below, by d(Υ, ∂A). ∂U y A Eδ ℓ′ Υ x Figure 12. A segment [x, y] across the lifted annulus A. For any 0 < δ < d(Υ, ∂A), let Eδ be the δ-neighborhood of the lamination E in the lifted annulus A (see Figure 12). By Lemma 2.9, since f0 is optimal, (9.1) sup Lipx (f0 ) < C. x∈ArEδ If no leaf of E entering Υ meets A, then all geodesic segments [x, y] as above spend a definite amount of length (at least d(Υ̇, ∂A) − δ) in A r Eδ , and so (9.1) implies d(f0 (x), f0 (y)) ≤ C (d(x, y) − ε0 ) for some ε0 > 0 independent of [x, y]. Therefore d(fε (x), f0 (y)) ≤ d(fε (x), f0 (x)) + d(f0 (x), f0 (y)) ≤ C d(x, y) MAXIMALLY STRETCHED LAMINATIONS 85 for all 0 < ε < ε0 . Now suppose that there are leaves of E entering Υ that meet A. The collection of such leaves is finite modulo the stabilizer of A. There exists δ > 0 such that if [x, y] is contained in the δ-neighborhood of some leaf ℓ′ of E entering A, then the function t 7→ d(Φ−t (x), y) is decreasing for t ∈ [0, 1], because the direction of the flow Φ at x is essentially the same as the direction of ℓ′ ; in particular, d(fε (x), f0 (y)) ≤ C d(Φ−ε (x), y) ≤ C d(x, y) for all ε ∈ (0, 1]. There also exists δ′ ∈ (0, δ) such that if a geodesic segment [x, y] as above is not contained in the δ-neighborhood of one of the finitely many leaves entering Υ, then it meets A r Eδ′ ; in particular, it spends a definite amount of length (at least δ′ /2) in A r Eδ′ /2 , and we conclude as above, using (9.1) with δ′ /2 instead of δ. • Proof of (i). By Remark 2.8.(2), it is enough to consider one connected component A of U rΥ in H2 and prove that d(fε (x), fε (y)) ≤ Cd(x, y) for all x, y ∈ Υ∩∂A. If Υ∩∂A is a geodesic line (corresponding to a closed geodesic of Υ̇), then (Φ−ε )|Υ∩∂A is an isometry and so LipΥ∩∂A (fε ) ≤ LipΥ∩∂A (f ) = C (in fact Υ ∩ ∂A is C-stretched by fε ). Otherwise, Υ ∩ ∂A is a countable union of geodesic lines Di , i ∈ Z, with Di and Di+1 asymptotic to each other, both oriented in the direction of the ideal spike they bound if i is odd, and both oriented in the reverse direction if i is even; the leaves of E entering Υ do so in the spikes. Suppose by contradiction that there is a sequence (εk ) ∈ (R∗+ )N tending to 0 and, for every k ∈ N, a pair (xk , yk ) of points of Υ ∪ ∂A such that (9.2) d(fεk (xk ), fεk (yk )) > C · d(xk , yk ). Note that the Hausdorff distance from [xk , yk ] to the nearest leaf segment of Υ tends to zero as k → +∞. Indeed, as above, for any δ > 0, if a geodesic segment [x, y] is not contained in the δ-neighborhood Eδ of E in A, then it spends a definite amount of length (at least δ/2) in A r Eδ/2 , and (9.1) with δ/2 instead of δ forces d(fε (x), fε (y)) ≤ Cd(x, y) for small enough ε. This proves that the Hausdorff distance from [xk , yk ] to the nearest segment of E tends to zero as k → +∞, and this segment actually lies in Υ because xk and yk both belong to Υ and there are locally only finitely many leaves of E entering Υ. Up to replacing xk and yk by j(Γ0 )-translates and passing to a subsequence, we can in fact suppose that there exists i ∈ Z such that both d(xk , Di ) and d(yk , Di ) tend to zero as k → +∞; indeed, the set of lines Di is finite modulo the stabilizer of A. Up to switching xk and yk and passing to a subsequence, we can suppose that either (xk , yk ) ∈ Di × Di+1 for all k, or (xk , yk ) ∈ Di−1 × Di+1 for all k; the case (xk , yk ) ∈ Di × Di is excluded by the assumption (9.2) since Di is C-stretched under fεk . Let yk′ be the point of Di on the same horocycle as yk in the ideal spike of A bounded by Di and Di+1 , and let ηk ≥ 0 be the length of the piece of horocycle from yk to yk′ . If xk ∈ Di−1 , define similarly an arc of horocycle from xk to x′k ∈ Di , of length ξk ; otherwise, set (x′k , ξk ) = (xk , 0). Since d(xk , Di ) and d(yk , Di ) tend to zero as k → +∞, so do ξk and ηk . We claim that, up to passing to a subsequence and replacing xk and yk by other points on the same leaves, still subject to (9.2), we can assume 86 FRANÇOIS GUÉRITAUD AND FANNY KASSEL yk ηk yk′ xk x∗ Di Di+1 yk xk Di−1 ηk ξk x′k Di Di+1 yk′ Figure 13. Distance estimates between points of Di−1 , Di , Di+1 . that d(xk , yk ) → +∞ as k → +∞. Indeed, this is already the case if (xk , yk ) ∈ Di−1 ×Di+1 for all k, because ξk , ηk → 0. If (xk , yk ) ∈ Di ×Di+1 for all k, note that the C-Lipschitz map f stretches Di and Di+1 maximally and sends them to two geodesic lines of H2 , necessarily asymptotic. Moreover, f (yk ) and f (yk′ ) lie at the same depth in the spike bounded by f (Di ) and f (Di+1 ): indeed, the distance between the horocycles through f (yk ) and through f (yk′ ) is independent of k; if it were nonzero, then for large enough k we would obtain a contradiction with the fact that f is Lipschitz (recall ηk → 0). Using (A.4), we see that there exists Q ≥ 0 such that for any integer k, the piece of horocycle connecting f (yk ) to f (yk′ ) has length QηkC , and the piece of horocycle connecting fεk (yk ) to fεk (yk′ ) has length Qe±εk ηkC , which is ≪ ηk since C > 1. In particular, xk 6= yk′ for all large enough k (since xk and yk satisfy (9.2)); in other words, xk and yk lie at distinct depths inside the spike of A bounded by Di and Di+1 (see Figure 13, top). If yk lies deeper than xk (which we can assume by symmetry), then for any x∗ ∈ Di less deep than xk , π ∗ x y < f (x∗ )f\ < x\ εk εk (xk )fεk (yk ) < π. k k 2 Moreover, d(fεk (x∗ ), fεk (xk )) = Cd(x∗ , xk ) and (9.2) holds, hence d(fεk (x∗ ), fεk (yk )) > Cd(x∗ , yk ) by Toponogov’s theorem [BH, Lem. II.1.13]. Thus, up to replacing xk by some fixed x∗ , we may assume that d(xk , yk ) → +∞. Using (A.6), we see that d(xk , yk ) = d(x′k , yk′ ) + (ξk2 + ηk2 )(1 + o(1)) (see Figure 13, bottom). Similarly, given that the length of the piece of horocycle from f (xk ) to f (x′k ) in the spike bounded by Di−1 and Di is QξkC for some Q ≥ 0 independent of k (see above) and that the length of the piece of horocycle from f (yk ) to f (yk′ ) in the spike bounded by Di and Di+1 is MAXIMALLY STRETCHED LAMINATIONS Q′ ηkC for some Q′ ≥ 0 independent of k, we obtain 87 2 d(fεk (xk ), fεk (yk )) ≤ d(fεk (x′k ), fεk (yk′ )) + (Q2 ξk2C + Q′ ηk2C )(1 + o(1)). Since d(fεk (x′k ), fεk (yk′ )) = Cd(x′k , yk′ ) and since ξkC = o(ξk ) and ηkC = o(ηk ), we find that d(fεk (xk ), fεk (yk )) ≤ Cd(xk , yk ) for all large enough k, contradicting (9.2). This completes the proof of (i).  9.3. Semicontinuity for C(j, ρ) > 1. The notion of chain recurrence (Definition 9.1) is closed for the Hausdorff topology: any compactly-supported lamination which is a Hausdorff limit of chain recurrent laminations is chain recurrent [T2, Prop. 6.1]. It is therefore relevant to consider (semi)continuity issues. In the classical setting, Thurston [T2, Th. 8.4] proved that his maximal ratio-maximizing chain recurrent lamination µ(j, ρ) varies in an upper semicontinuous way as j and ρ vary over the Teichmüller space T (S) of S. In other words, by Lemma 9.3, the stretch locus E(j, ρ) varies in an upper semicontinuous way over T (S): for any sequence (jk , ρk )k∈N of elements of T (S)2 converging to (j, ρ), E(j, ρ) ⊃ lim sup E(jk , ρk ), k→+∞ where the limsup is defined with respect to the Hausdorff topology. We now work in a more general setting and show how the chain recurrence of the stretch locus E(j, ρ) (Proposition 9.4) implies upper semicontinuity. Proposition 9.5. In dimension n = 2, the stretch locus E(j, ρ) is upper semicontinuous on the open subset of Homj0 (Γ0 , G) × Hom(Γ0 , G)red where C(j, ρ) > 1. Here we denote by Homj0 (Γ0 , G) the space of geometrically finite representations of Γ0 in G with the same cusp type as the fixed representation j0 (as in Section 6) and by Hom(Γ0 , G)red the space of reductive representations ρ ∈ Hom(Γ0 , G) (Definition 4.9). These two sets are endowed with the induced topology from Hom(Γ0 , G). The condition C(j, ρ) > 1 is open by Proposition 6.1.(2). Proof of Proposition 9.5. By Lemma 4.4, we may assume that Γ0 is torsionfree. Let (jk , ρk )k∈N be a sequence of elements of Homj0 (Γ0 , G)×Hom(Γ0 , G)red with C(jk , ρk ) > 1 converging to some (j, ρ) ∈ Homj0 (Γ0 , G)×Hom(Γ0 , G)red with C(j, ρ) > 1. Since the stretch locus E(j, ρ) is empty with our definitions when C(j, ρ) = +∞, and the condition C(j, ρ) = +∞ is open by Lemma 4.7, we may assume that the C(jk , ρk ) and C(j, ρ) are all finite. Recall from Section 6.4 the proof of the fact (labelled (B) there) that lim sup C(jk , ρk ), if greater than 1, gives a lower bound for C(j, ρ). By the same argument as in that proof, up to passing to a subsequence, the stretch loci E(jk , ρk ) are jk (Γ0 )-invariant geodesic laminations that converge to some j(Γ0 )-invariant geodesic lamination L , compact in j(Γ0 )\Hn . Moreover, the image of L in j(Γ0 )\Hn nearly carries simple closed curves corresponding to elements γ ∈ Γ0 with λ(ρ(γ))/λ(j(γ)) arbitrarily close to C(j, ρ). However, this does not immediately imply that L is contained in E(j, ρ): we need to improve the “multiplicative error” to an “additive error”. The idea is similar to Lemmas 5.10 and 9.3, but with varying j, ρ. 88 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Suppose by contradiction that L contains a point p ∈ / E(j, ρ). According j,ρ to Lemma 4.15, there is an element f ∈ F that is constant on some ball centered at p, with radius δ > 0. Since the E(jk , ρk ) are chain recurrent (Proposition 9.4), so is L . Let G be a simple closed geodesic in j(Γ0 )\H2 δ passing within δ/2 of p and approached by a 16mC -quasi-leaf of L (in the sense of Section 9.1), made of at most m leaf segments of L , where m is the integer (depending only on the topology of S = j(Γ0 )\H2 ) defined after Fact 9.2. Let γ ∈ Γ0 correspond to G. By Hausdorff convergence, for large enough k, the geodesic representative of G in jk (Γ0 )\H2 is approached by a δ 8mC -quasi-leaf of E(jk , ρk ), made of at most m leaf segments. Since E(jk , ρk ) is maximally stretched by a factor Ck := C(jk , ρk ) by any element of F jk ,ρk , it follows, as in the proof of Lemma 9.3, that δ . λ(ρk (γ)) − Ck λ(jk (γ)) ≤ 4mCk · 8mC Since Ck tends to C by Proposition 6.1.(2)–(3) and since λ is continuous, the left-hand side converges to |λ(ρ(γ)) − C λ(j(γ))| as k → +∞, while the right-hand side converges to δ/2. However, this left-hand limit is ≥ Cδ since f is constant on the ball of radius δ centered at p, which contains a segment of G of length δ. This is absurd, hence L ⊂ E(j, ρ).  9.4. The stretch locus for C(j, ρ) < 1. Still in dimension n = 2, let Γ0 , (j, ρ), K ⊂ Hn compact, and ϕ : K → Hn be as in Section 4 (with K possibly empty). The relative stretch locus EK,ϕ (j, ρ) behaves very differently depending on whether CK,ϕ (j, ρ) is smaller than, equal to, or larger than 1. Let us give a simple example to illustrate the contrast. Example 9.6. We take Γ0 to be trivial. Fix o ∈ H2 and let (as )s≥0 , (bs )s≥0 , and (cs )s≥0 be three geodesic rays issued from o, parametrized at unit speed, forming angles of 2π/3 at o. Let K = {at , bt , ct } for some t > 0 and let ϕ : K → H2 be given by ϕ(at ) = aT , ϕ(bt ) = bT , and ϕ(ct ) = cT for some T > 0. Then Lip(ϕ) = g(T )/g(t), where g : R+ → R+ is given by g(s) = d(as , bs ). By convexity√of the distance function, the function g is strictly convex, asymptotic pto 3s for s → 0 and to 2s for s → +∞. (Explicitly, g(s) = 2 arcsinh( 3/4 sinh s) by (A.14).) • If t < T , then Lip(ϕ) > T /t > 1 by strict convexity of g. By Theorem 5.1, the map ϕ extends to H2 with the same Lipschitz constant and with stretch locus the perimeter of the triangle at bt ct ; this stretch locus is the smallest possible by Remark 2.8.(1). • If t = T , then ϕ is 1-Lipschitz and has a unique 1-Lipschitz extension to the (filled) triangle at bt ct , namely the identity map. An optimal extension to H2 is obtained by precomposing with the closest-point projection onto the triangle at bt ct ; the stretch locus is this triangle. • If t > T , then Lip(ϕ) < T /t < 1 by strict convexity of g. However, the optimal Lipschitz constant of an extension of ϕ to H2 cannot be less than T /t: indeed, such an extension may be assumed to fix o by T) symmetry, and d(o,a d(o,at ) = T /t. It follows from the construction used in Section 10.4 below that a (T /t)-Lipschitz extension of ϕ to H2 MAXIMALLY STRETCHED LAMINATIONS 89 does indeed exist, and the stretch locus is equal to the union of the geodesic segments [o, at ], [o, bt ], [o, ct ]. Although the stretch locus may vary abruptly in the above, note that this variation is upper semicontinuous in (t, T ) for the Hausdorff topology, in agreement with a potential generalization of Proposition 9.5 to C ≤ 1. We now consider the case when K is empty. Here is some evidence in favor of Conjecture 1.4, which claims that for C(j, ρ) < 1 the stretch locus E(j, ρ) should be what we call a gramination: • In Section 10.4, we give a construction, for certain Coxeter groups Γ0 , of pairs (j, ρ) with j convex cocompact, j(Γ0 )\H2 compact, and C(j, ρ) < 1, for which the stretch locus E(j, ρ) is a trivalent graph. • Consider the examples constructed in [Sa, § 4.4]: for any compact hyperbolic surface S of genus g and any integer k with |k| ≤ 2g − 2, Salein constructed highly symmetric pairs (j, ρ) ∈ Hom(π1 (S), G)2 with j Fuchsian such that ρ has Euler number k; a construction similar to Section 10.4 shows that the stretch locus of such a pair (j, ρ) is a regular graph of degree 4g. • In Section 10.5, we give a construction of pairs (j, ρ) with j convex cocompact, j(Γ0 )\H2 noncompact, and C(j, ρ) < 1, for which the stretch locus E(j, ρ) is a trivalent graph. It is actually possible to generalize this construction and obtain, for any given convex cocompact hyperbolic surface S of infinite volume and any given trivalent graph G retract of S, an open set of pairs (j, ρ) ∈ Hom(Γ0 , G)2 with j convex cocompact for which the stretch locus E(j, ρ) is a trivalent graph of H2 , with geodesic edges, whose projection to j(Γ0 )\H2 is a graph isotopic to G (see Remarks 10.3). • It is also possible to construct examples of pairs (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite and C(j, ρ) < 1 for which the stretch locus E(j, ρ) is a geodesic lamination: see Sections 10.2 and 10.3 for instance. Here is perhaps a first step towards proving Conjecture 1.4. Lemma 9.7. In dimension n = 2, let (j, ρ) ∈ Hom(Γ0 , G)2 be a pair of representations with j geometrically finite and F j,ρ 6= ∅. Each connected component of the complement of the stretch locus E(j, ρ) ⊂ H2 is convex. Proof. Suppose by contradiction that the open set H2 r E(j, ρ) has a nonconvex component U . There exists a smooth arc A0 ⊂ H2 r E(j, ρ) whose endpoints x0 , y0 are connected by a segment intersecting E(j, ρ). We can assume that A0 ∪ [x0 , y0 ] is a Jordan curve, and is arbitrarily small: this can be seen by moving the segment [x0 , y0 ] until it stops intersecting E(j, ρ), and then doing a small perturbative argument. In particular, we may assume that A0 ∪ [x0 , y0 ] embeds into j(Γ0 )\H2 under the quotient map. We can perturb the Jordan curve A0 ∪ [x0 , y0 ] to a Jordan curve A ∪ [x, y] whose inner (open) disk D intersects E(j, ρ) in some point z, with A ⊂ U (see Figure 14). Let B ⊂ U be a compact neighborhood of A. Choose an optimal, CLipschitz equivariant map f (Lemma 4.13): by construction, LipB (f ) =: 90 FRANÇOIS GUÉRITAUD AND FANNY KASSEL A B′ ′ A D′ V x z V′ y E(j, ρ) Figure 14. Improving the local Lipschitz constant at z. C ∗ < C. We define a (j, ρ)-equivariant map gε := f ◦ Jε : H2 → H2 , where Jε is the small deformation of the identity map idH2 given as follows: • on H2 r j(Γ0 ) · D, take Jε to be the identity map; • on D ′ := D r B, take Jε := ε · π[x,y] + (1 − ε) · idD′ where π[x,y] denotes the closest-point projection onto [x, y]; extend (j, ρ)-equivariantly to j(Γ0 ) · D ′ ; • on B ′ := D ∩ B, note that Jε is already defined on ∂B ′ and use Proposition 3.1 to find an optimal extension to B ′ ; extend (j, ρ)equivariantly to j(Γ0 ) · B ′ . We have LipD′ (Jε ) ≤ 1 because Lip(π[x,y] ) ≤ 1 (use Lemma 2.13). Also, we claim that Lip∂B ′ (Jε ) ≤ C/C ∗ for ε small enough. This is true because ∂B ′ is the union of two subsegments V, V ′ of [x, y] and two disjoint arcs, namely A and another, nearly parallel arc A′ : the only pairs of points (ξ, ξ ′ ) ∈ (∂B ′ )2 that Jε |∂B ′ can move apart are in A × A′ (up to order), but d(ξ, ξ ′ ) is then bounded from below by a positive constant d(A, A′ ). Thus, Lip∂B ′ (Jε ) (and hence Lip(Jε )) goes to 1 as ε goes to 0, which yields Lip(gε ) ≤ C as soon as Lip(Jε ) ≤ C/C ∗ . However, since π[x,y] is contracting near z ∈ D ′ , we have Lipz (gε ) < C, hence z ∈ / Egε . This contradicts the optimality of f , as z ∈ E(j, ρ).  10. Examples and counterexamples All examples below are in dimension n = 2, except the last two. For n = 2, we use the upper half-plane model of H2 and identify G = PO(2, 1) with PGL2 (R) and its identity component G0 with PSL2 (R). Example 10.1 deals with infinitely generated Γ0 . Examples 10.2 to 10.5 concern convex cocompact j, while Examples 10.6 to 10.11 illustrate phenomena that arise only in the presence of cusps. 10.1. A left admissible pair (j, ρ) with C(j, ρ) = 1, for infinitely generated Γ0 . In this section, we give an example of an infinitely generated discrete subgroup Γ of G × G that acts properly discontinuously on G but that does not satisfy the conclusion of Theorem 7.1; in other words, Γ is not sharp in the sense of [KK, Def. 4.2]. MAXIMALLY STRETCHED LAMINATIONS 91 In the upper half-plane model of H2 , let Ak (resp. Bk ) be the half-circle of radius 1 (resp. log k) centered at k2 , oriented clockwise. Let A′k (resp. Bk′ ) be the half-circle of radius 1 (resp. log k) centered at k2 + k, oriented counterclockwise (see Figure 15). Let αk ∈ G0 (resp. βk ∈ G0 ) be the shortest hyperbolic translation identifying the geodesic represented by Ak with A′k (resp. Bk with Bk′ ); its axis is orthogonal to Ak and A′k (resp. to Bk and Bk′ ), hence its translation length λ(αk ) (resp. λ(βk )) is equal to the distance between Ak and A′k (resp. Bk and Bk′ ). An elementary computation (see (A.12) below) shows that (10.1) λ(αk ) = 2 arccosh(k/2) = 2 log k + o(1), k ) = 2 log k − 2 log log k + o(1) . λ(βk ) = 2 arccosh( 2 log k Consider the free group ΓN = hγk ik≥N and its injective and discrete representations j, ρ given by j(γk ) = αk and ρ(γk ) = βk . Since λ(βk )/λ(αk ) goes to 1, we have C(j, ρ) ≥ 1 and C(ρ, j) ≥ 1. However, we claim that for N large enough, the group Γj,ρ N = {(j(γ), ρ(γ)) | γ ∈ ΓN } is left admissible (Definition 1.7), acting properly discontinuously on G. √ Indeed, fix the basepoint p0 = −1 ∈ H2 and consider a reduced word m γ = γkε11 . . . γkεm ∈ ΓN , where εi = ±1. Let DA ⊂ H2 be the fundamental 2 domain of H for the action of j(ΓN ) that is bounded by the geodesics Ak , A′k for k ≥ N . Let DB be the fundamental domain for the action of ρ(ΓN ) that is bounded by the geodesics Bk , Bk′ for k ≥ N . The geodesic segment from p0 to j(γ) · p0 projects in the fundamental domain DA to a union of m + 1 geodesic segments I0 , . . . , Im : namely, Ii connects the half-circle Aki or A′ki (depending on εi ) to the half-circle Aki+1 or A′ki+1 (depending on εi+1 ), unless i = 0 or m, in which case one of the endpoints is p0 (see Figure 15). Moreover, the geodesic line carrying Ii hits ∂∞ H2 near the centers of these half-circles, since all half-circles Ak , A′k are far from one another and from p0 (compared to their radii). Therefore, the ends of Ii are nearly orthogonal to the Ak , A′k and the length of Ii can be approximated by the distance from some side of DA to another (or to p0 ). The error is o(1) for each segment Ii , uniformly as N → +∞. I0 √ p0 = −1 I1 Bn1 An1 Bn′ 1 A′n1 Bn2 An2 Figure 15. For infinitely generated Γ0 , construction of an admissible pair (j, ρ) with C(j, ρ) = 1. The distance from p0 to ρ(γ) · p0 is likewise a sum of lengths of segments J0 , . . . , Jm between boundary components of DB : the segment Ji meets Bki (resp. Bk′ i , Bki+1 , Bk′ i+1 ) exactly when Ii meets Aki (resp. A′ki , Aki+1 , A′ki+1 ). Therefore, Ii is longer than Ji by roughly the sum of d(Aki , Bki ) = d(A′ki , Bk′ i ) and d(Aki+1 , Bki+1 ) = d(A′ki+1 , Bk′ i+1 ). Using (10.1), we obtain length(Ii ) − length(Ji ) = log log ki + log log ki+1 + o(1) 92 FRANÇOIS GUÉRITAUD AND FANNY KASSEL (with one term stricken out for i = 0 or m), with uniform error as N → +∞. In particular, for N large enough the left-hand side is always ≥ 1. Finally, µ(j(γ)) − µ(ρ(γ)) = d(p0 , j(γ) · p0 ) − d(p0 , ρ(γ) · p0 ) m X  length(Ii ) − length(Ji ) = i=0 o n  ≥ max m, log log max ki , 1≤i≤m γkε11 m . . . γkεm which clearly diverges to +∞ as γ = exhausts the countable j,ρ group ΓN . Therefore the group ΓN acts properly discontinuously on G by the properness criterion of Benoist and Kobayashi (Section 7.3). 10.2. A nonreductive ρ with F j,ρ 6= ∅. Let Γ0 be a free group on two generators α, β and let j ∈ Hom(Γ0 , G) be the holonomy representation of a hyperbolic one-holed torus S of infinite volume, such that the translation axes Aj(α) and Aj(β) of α and β meet at a right angle at a point p ∈ H2 (see Figure 16). H2 Aj(α) U t f (s′ ) s′ Aj(β) p D s U t ′ f f (p) f (t) f (t′ ) f (s) Figure 16. A nonreductive representation ρ such that the stretch locus E(j, ρ) is the j(Γ0 )-orbit of the axis Aj(α) . We first consider the representation ρ0 ∈ Hom(Γ0 , G) given by ρ0 (α) = j(α)2 and ρ0 (β) = 1. It is reductive with two fixed points in ∂∞ H2 . We claim that C(j, ρ0 ) = 2 = λ(ρ0 (α))/λ(j(α)) and that the image of the stretch locus E(j, ρ) in j(Γ0 )\H2 is the closed geodesic corresponding to α. Indeed, consider the Dirichlet fundamental domain D of the convex core centered at p, for the action of j(Γ0 ). It is bounded by four segments of the boundary of the convex core, and by four other segments s, s′ , t, t′ such that j(α) maps s to s′ and j(β) maps t to t′ . Let πAj(α) be the closest-point projection onto Aj(α) and h the orientation-preserving homeomorphism of Aj(α) such that d(p, h(q)) = 2 d(p, q) for all q ∈ Aj(α) . The map h ◦ πAj(α) : D → H2 is 2-Lipschitz and extends to a 2-Lipschitz, (j, ρ0 )-equivariant map f0 : H2 → Aj(α) whose stretch locus is exactly j(Γ0 ) · Aj(α) . Consider a small, nonreductive deformation ρ ∈ Hom(Γ0 , G) of ρ0 such that ρ(α) = ρ0 (α) = j(α)2 and such that ρ(β) has a parabolic fixed point in MAXIMALLY STRETCHED LAMINATIONS 93 ∂∞ H2 common with j(α). Then C(j, ρ) = C(j, ρ0 ) = 2 by Lemma 6.3. We claim that F j,ρ is nonempty if ρ(β) is close enough to IdH2 . Indeed, let us construct a (j, ρ)-equivariant deformation f of f0 which is still 2-Lipschitz. By Lemma 2.9, we have LipU (f0 ) < C for some neighborhood U of t ∪ t′ . Therefore, the map f defined on s ∪ s′ ∪ t ∪ t′ by f |t∪s∪s′ = f0 |t∪s∪s′ and f |t′ = ρ(β) ◦ f0 |t′ is still 2-Lipschitz if ρ(β) is close enough to IdH2 . This map f extends, with the same Lipschitz constant 2, to all of D (by the Kirszbraun–Valentine theorem, Proposition 3.1), hence (j, ρ)-equivariantly to H2 . This construction can be adapted to any hyperbolic surface S of infinite volume when the stretch locus E(j, ρ0 ) is a multicurve. 10.3. A nonreductive ρ with F j,ρ = ∅. Let again Γ0 be a free group on two generators α, β and let j ∈ Hom(Γ0 , G) be the holonomy representation of a hyperbolic one-holed torus S of infinite volume. Let L be the preimage in H2 of an oriented irrational measured lamination of S. We first construct a reductive representation ρ0 ∈ Hom(Γ0 , G) with two fixed points in ∂∞ H2 such that E(j, ρ0 ) = L and C(j, ρ0 ) < 1. It is sufficient to construct a differential 1-form ω of class L∞ on S with the following properties: (1) ω R is locally the differential of some 1-Lipschitz function ϕ, (2) I ω = length(I) for any segment of leaf I of (the image in S of) L , oriented positively. Indeed, if such an ω exists, then for any geodesic line A of H2 , any isometric identification A ≃ R, and any C ∈ (0, 1), we can define a representation ρ0 ∈ Hom(Γ0 , G) as follows: if γ ∈ Γ0 r {1} corresponds to a loop Gγ on S, then R ρ0 (γ) is the hyperbolic element of G translating along A with length C Gγ ω ∈ R. Such a representation ρ0 satisfies E(j, ρ0 ) = L and C(j, ρ0 ) = C because for any basepoint p ∈ H2 , the map Z 2 ω e ∈R≃A f0 : q ∈ H 7−→ C [p,q] (where ω e is the j(Γ0 )-invariant 1-form on H2 lifting ω) is (j, ρ0 )-equivariant, has Lipschitz constant exactly C, and stretches L maximally, and we can use Lemma 5.10. Let us construct a 1-form ω as above. The idea is similar to the “stretch maps” of [T2]. The complement of the image of L in the convex core of S is a one-holed biinfinite bigon B; each of its two spikes can be foliated by pieces of horocycles (see Figure 17). Let H and H ′ be horoball neighborhoods of the two spikes, tangent in two points of L (one for each side of B). We take ω = dϕ where  on B r (H ∪ H ′ ),  0 d(·, ∂H) on H, ϕ :=  −d(·, ∂H ′ ) on H ′ . This form ω extends continuously to all of L . Let now ρ ∈ Hom(Γ0 , G) be a nonreductive representation such that the fixed point ξ of ρ(Γ0 ) in ∂∞ H2 is one of the two fixed points of ρ0 (Γ0 ). Then C(j, ρ) = C := C(j, ρ0 ) by Lemma 6.3. We claim that F j,ρ = ∅, i.e. there 94 FRANÇOIS GUÉRITAUD AND FANNY KASSEL L {ξ} B f H L ∂ H′ ∝ e−t t J Figure 17. Left: the one-holed bigon B bounded by the irrational lamination L . The symbol ∂ denotes the boundary of the convex core. The function ϕ is constant on the shaded area; elsewhere its level curves are pieces of horocycles. Right : the Lipschitz map f must collapse all lines of L if C < 1, because e−Ct ≫ e−t for large t. exists no C-Lipschitz, (j, ρ)-equivariant map f : H2 → H2 . Indeed, suppose by contradiction that such an f exists. We first note that f stretches maximally every leaf of L . Indeed, the “horocyclic projection” taking any p ∈ H2 to the intersection of the translation axis A of ρ0 with the horocycle through p centered at ξ is 1-Lipschitz. After postcomposing f with this horocyclic projection, we obtain a C-Lipschitz map f1 which is (j, ρ0 )-equivariant, hence has to stretch maximally every leaf of E(j, ρ0 ) = L (Theorem 1.3). Then f also stretches maximally every leaf of L . In fact, this argument shows that on any leaf of L , the map f coincides with f1 postcomposed with some parabolic (or trivial) isometry of H2 fixing ξ, depending on the leaf; the leaf endpoint in ∂∞ H2 which is sent to ξ by f1 is also sent to ξ by f . (Actually, by density of leaves the (j, ρ0 )equivariant restrictions f0 |L and f1 |L differ only by a translation along the axis A of ρ0 , but we will not need this.) Let us now prove that f maps all the leaves of L to the same geodesic line of H2 . This will provide a contradiction since f (L ) is ρ(Γ0 )-invariant and ρ(Γ0 ) has only one fixed point in ∂∞ H2 (namely ξ). Let J be a short geodesic segment of H2 transverse to the lamination L , such that J r L is the union of countably many open subintervals Jk . Then each Jk intercepts an ideal sector bounded by two leaves of L that are asymptotic to each other on one of the two sides, left or right, of J. Orient J so that all the halfleaves on the left of J are mapped under f1 to geodesic rays with endpoint ξ. Then any two leaves asymptotic on the right of J have the same image under f : indeed, the right parts of the image leaves are asymptotic because f is Lipschitz, and the left parts are asymptotic because ρ sends all the left endpoints to ξ. Consider two leaves ℓ, ℓ′ of L that are asymptotic on the left of J, bounding together an infinite spike. At depth t ≫ 1 inside the spike, ℓ and ℓ′ approach each other at rate e−t (see (A.5)), and their images under f , if distinct, approach each other at the slower exponential rate e−Ct (recall that C < 1); since f is Lipschitz, this forces f (ℓ) = f (ℓ′ ). Therefore, all the MAXIMALLY STRETCHED LAMINATIONS 95 sectors intercepted by the Jk are collapsed by f . Since by [BiS] the length of J is the sum of the lengths of the Jk , passing to the limit we see that all the leaves of L meeting J have the same image under f . We conclude by observing that the projection of J ∪ L to S carries the full fundamental group of S. This proves that F j,ρ = ∅. It is not clear whether the same can happen when C(j, ρ) ≥ 1, but the natural conjecture would be that it does not. 10.4. A pair (j, ρ) with C ′ (j, ρ) < C(j, ρ) < 1 and j(Γ0 )\Hn compact. While the constants C(j, ρ) and C ′ (j, ρ) are equal above 1 (Corollary 1.12), they can differ below 1. To prove this, we only need to exhibit a pair (j, ρ) such that any closed geodesic of j(Γ0 )\H2 spends a definite (nonzero) proportion of its length in a compact set V disjoint from the stretch locus (on V the local Lipschitz constant of an optimal Lipschitz equivariant map stays bounded away from C(j, ρ), see Lemma 2.9). In H2 , consider a positively oriented hyperbolic triangle ABC with angles b = π, C b= π b = π, B A 3 2 14 ′ ′ ′ and another, smaller triangle A B C with the same orientation and with angles c′ = π , B c′ = π , C c′ = π . A 3 2 7 The edge [A′ ,B ′ ] is shorter than [A,B]; let ϕ : [A,B] → [A′ ,B ′ ] be the uniform parametrization, with ϕ(A) = A′ and ϕ(B) = B ′ , so that C0 := Lip(ϕ) = d(A′ , B ′ ) < 1. d(A, B) Claim 10.1. The map ϕ admits a C0 -Lipschitz extension f to the filled triangle ABC, taking the geodesic segment [A,C] (resp. [C,B]) to the geodesic segment [A′ ,C ′ ] (resp. [C ′ ,B ′ ]), and with stretch locus the segment [A,B]. Proof. Let ℓ be the geodesic line of H2 containing [A,B], oriented from A to B. Any point p ∈ H2 may be reached in a unique way from A by first applying a translation of length v(p) ∈ R along the geodesic line orthogonal to ℓ at A, positively oriented with respect to ℓ (“vertical direction”), then a translation of length h(p) ∈ R along ℓ itself (“horizontal direction”). The real numbers h(p) and v(p) are called the Fermi coordinates of p with respect to (ℓ, A). Similarly, let h′ and v ′ be the Fermi coordinates with respect to (ℓ′ , A′ ), where ℓ′ is the geodesic line containing [A′ ,B ′ ], oriented from A′ to B ′ (see Figure 18). Let Ψ : R+ → R+ be a diffeomorphism whose derivative Ψ′ is everywhere < C0 on R∗+ and let f ∗ : H2 → H2 be given, in Fermi coordinates, by h′ (f ∗ (p)) = C0 h(p) and v ′ (f ∗ (p)) = Ψ(v(p)). Then Lipp (f ∗ ) < C0 for all p ∈ / ℓ. Indeed, the differential of f ∗ at p ∈ / ℓ ′ has principal value Ψ (v(p)) < C0 in the vertical direction and, by (A.9), Ψ(v(p)) principal value C0 cosh cosh v(p) < C0 in the horizontal direction. We shall take f := πA′B′C ′ ◦ f ∗ for a suitable choice of Ψ, where πA′B′C ′ is the closest-point projection onto the filled triangle A′ B ′ C ′ . Since we wish f to map [A,C] to [A′ ,C ′ ], we need to choose Ψ so that for any p ∈ [A,C] the 96 FRANÇOIS GUÉRITAUD AND FANNY KASSEL C f ∗ (C) C′ f∗ p v(p) A h(p) B A′ B′ Figure 18. Defining a contracting map between rightangled triangles. point f ∗ (p) lies above (or on) the edge [A′ ,C ′ ]. By (A.13), [= tan pAB tanh v(p) sinh h(p) and tanh Ψ(v(p)) tanh v ′ (f ∗ (p)) = . sinh h′ (f ∗ (p)) sinh(C0 v(p)) Note that tanh(C0 t) > C0 tanh(t) and sinh(C0 t) < C0 sinh(t) for all t > 0, by strict concavity of tanh and convexity of sinh (recall that 0 < C0 < 1). Therefore the function Ψ : t 7→ C0 t yields a map f ∗ with f ∗ ([A,C]) above [A′ ,C ′ ]. We can decrease this function slightly to obtain Ψ with Ψ′ (t) < C0 for all t > 0 while keeping f ∗ ([A,C]) above [A′ ,C ′ ]. In fact, by the above formulas, we can also ensure f ∗ ([A,C]) = [A′ ,C ′ ] directly, by taking Ψ = ΨAb where   tanh v −1 : (10.2) ΨAb(v) = σ (C0 σ(v)) with σ(v) = arcsinh b tan A then Ψ′b < C0 (on R∗+ ) easily follows from C0 < 1 and from the concavity A of σ.  \′ B ′ = tan f ∗ (p)A Let Γ0 be the group generated by the orthogonal reflections in the sides of ABC and j its natural inclusion in G = PGL2 (R). Let ρ ∈ Hom(Γ0 , G) be the representation taking the reflections in [A,B], [B,C], [C,A] to the reflections in [A′ ,B ′ ], [B ′ ,C ′ ], [C ′ ,A′ ] respectively; it is well defined (relations are preserved) because π/7 is a multiple of π/14. The group Γ0 has a finiteindex normal subgroup Γ0 which is torsion-free and such that j(Γ0 ) and ρ(Γ0 ) are orientation-preserving, i.e. with values in G0 = PSL2 (R). Let j, ρ ∈ Hom(Γ0 , G) be the corresponding representations. The map f given by Claim 10.1 extends, by reflections in the sides of ABC, to a C0 -Lipschitz, (j, ρ)-equivariant map on H2 . Its stretch locus is the Γ0 -orbit of the segment [A,B], which is the 1-skeleton of a tiling of H2 by regular 14-gons meeting 3 at each vertex. MAXIMALLY STRETCHED LAMINATIONS 97 We claim that C(j, ρ) = C0 and that f is an optimal element of F j,ρ , in the sense of Definition 4.12. Indeed Lemma 4.4, applied to Γ0 and its finite-index subgroup Γ0 , shows that there exists an element f ∈ F j,ρ which is optimal and (j, ρ)-equivariant. In particular, if p ∈ H2 is fixed by some j(γ) ∈ j(Γ0 ), then f (p) is fixed by ρ(γ). Applying this to the three sides of the triangle ABC, we see that f sends A, B, C to A′ , B ′ , C ′ respectively. In particular, d(A′ , B ′ ) C(j, ρ) ≥ = C0 . d(A, B) Since f is C0 -Lipschitz with stretch locus the Γ0 -orbit of the segment [A,B], this shows that C(j, ρ) = C0 and that E(j, ρ) is the stretch locus of f ; in other words, f is an optimal element of F j,ρ . It is easy to see that no geodesic of H2 can spend more than a bounded proportion of its length near the regular trivalent graph E(j, ρ), which implies that C ′ (j, ρ) < C(j, ρ). 10.5. A pair (j, ρ) with C ′ (j, ρ) < C(j, ρ) < 1 and j(Γ0 )\Hn noncompact. Let Γ0 be a free group on two generators and j ∈ Hom(Γ0 , G) the holonomy representation of a hyperbolic three-holed sphere S with three funnels. Let G be a geodesic trivalent graph on S, with two vertices v, w and three edges, such that the natural symmetry of S switches v and w and preserves each edge. Let ℓ1 , ℓ2 , ℓ3 > 0 be the lengths of the three edges and θ1 , θ2 , θ3 ∈ (0, π) the angles between consecutive edges at both vertices, so that θ1 + θ2 + θ3 = 2π. The preimage of G in H2 is an embedded trivalent tree T . For any C0 ∈ (0, 1), there exists an immersed trivalent tree T ′ with the same combinatorics as T , with all (oriented) angles between adjacent edges of T ′ the same as in T , but with all edges of length ℓi in T replaced by edges of length C0 ℓi in T ′ . The natural map ϕ : T → T ′ , multiplying all lengths along edges by C0 , is (j, ρ)-equivariant for a unique ρ ∈ Hom(Γ0 , G). If C0 < 1 is large enough, then the immersed tree T ′ is in fact embedded, and ρ is convex cocompact. Claim 10.2. Suppose ℓ1 , ℓ2 , ℓ3 are large enough so that the bisecting rays at the vertices of T meet either outside of the preimage N ⊂ H2 of the convex core of S, or not at all. Then the map ϕ extends to a (j, ρ)-equivariant map f : H2 → H2 with Lipschitz constant C0 and stretch locus T . Proof. Let e be an edge of T and e′ , e′′ two of its neighbors, so that e′ , e, e′′ are consecutive edges of some complementary component of T . By symmetry of the pair of pants S, the edge e forms the same angle θi with e′ and with e′′ . Let β ′ and β ′′ be the corresponding bisecting rays, issued from the endpoints of e. Let Q ⊂ H2 be the compact quadrilateral bounded by e, β, β ′ , and a segment of the boundary of N . There is a similarly defined quadrilateral on each side of each edge of T , and their union is N : therefore, it is sufficient to define the map f on Q in a way that is consistent (along the bisecting rays β ′ , β ′′ ) for Q and neighboring quadrilaterals Q′ , Q′′ (see Figure 19). The construction is similar to Claim 10.1, whose notation we borrow: let (h, v) : Q → R×R+ be the Fermi coordinates with respect to the edge e, and (h′ , v ′ ) the Fermi coordinates with respect to ϕ(e). Define f |Q by h′ (f (p)) = C0 h(p) and v ′ (f (p)) = Ψθi /2 (v(p)) for all p ∈ Q, where Ψθi /2 is given by 98 FRANÇOIS GUÉRITAUD AND FANNY KASSEL T e′ Q′ ′ β θi /2 Q′′ ∂N Q β ′′ e′′ e Figure 19. Defining a contracting map on the convex hull N of a tree T , one quadrilateral Q at a time. (10.2). Since the quadrilaterals Q, Q′ , Q′′ have all their angles along T equal to θi /2, the map f just defined takes the bisecting rays β, β ′ to the bisecting rays of the corresponding angles of T ′ , in a well-defined manner. The proof that f is C0 -Lipschitz on N is the same as in Claim 10.1.  We claim that C(j, ρ) = C0 and that f is an optimal element of F j,ρ , in the sense of Definition 4.12. Indeed, since G is invariant under the natural symmetry of S, the group Γ0 is contained, with index two, in a discrete subgroup Γ0 of G = PGL2 (R). Let j ∈ Hom(Γ0 , G) be the natural inclusion and let ρ ∈ Hom(Γ0 , G) be the natural extension of ρ. All reflections in perpendicular bisectors of edges of T (resp. T ′ ) belong to j(Γ0 ) (resp. ρ(Γ0 )). Lemma 4.4, applied to (Γ0 , Γ0 ), shows that there exists an element f ∈ F j,ρ which is optimal and (j, ρ)-equivariant. Let us show that f agrees with ϕ on T . Let v be a vertex of T and let e1 , e2 , e3 be the three incident edges of T , connecting v to v1 , v2 , v3 , with perpendicular bisectors M1 , M2 , M3 . For 1 ≤ i ≤ 3, by (j, ρ)-equivariance, f (vi ) is the symmetric image of f (v) with respect to the perpendicular bisector M′i of ϕ(ei ). In particular, d(f (v), f (vi )) = 2 d(f (v), M′i ). Note that the convex function q 7−→ max 1≤i≤3 H2 , d(q, M′i ) d(v, Mi ) is always ≥ C0 on with equality if and only if q = ϕ(v), in which case all three ratios are equal to C0 . Therefore C(j, ρ) = Lip(f ) ≥ C0 and the constant C0 is achieved, if at all, only by maps that agree with ϕ on the vertices of the tree T . Since the map f of Claim 10.2 is C0 -Lipschitz with stretch locus T , this shows that C(j, ρ) = C0 and that E(j, ρ) = T ; in other words, f is an optimal element of F j,ρ . As in Section 10.4, it is easy to see that no closed geodesic can spend more than a bounded proportion of its length near the trivalent graph G, which implies C ′ (j, ρ) < C(j, ρ) = C0 . Remarks 10.3. • This construction actually gives an open set of pairs (j, ρ) ∈ Hom(Γ0 , G)2 with j convex cocompact and C ′ (j, ρ) < C(j, ρ) < 1. MAXIMALLY STRETCHED LAMINATIONS 99 Indeed, Hom(Γ0 , G)2 has dimension 12 and we have 12 independent parameters, namely ℓ1 , ℓ2 , ℓ3 , θ1 , θ2 , C0 , and a choice of a unit tangent vector in H2 for T and for T ′ (i.e. conjugation of j and ρ). The map from this parameter space to Hom(Γ0 , G)2 is injective since different parameters give rise to different stretch loci; therefore its image is open by Brouwer’s invariance of domain theorem. • There is no constraint on C0 ∈ (0, 1): in particular, ρ could be noninjective or nondiscrete. • A similar construction works for any trivalent topological graph that is a retract of a convex cocompact hyperbolic surface. The invariance of the geodesic realizations under the natural symmetry of the threeholed sphere is replaced by a minimization property for the sum of weighted edge-lengths of the graph. All remaining examples show phenomena specific to the presence of cusps. 10.6. The function (j, ρ) 7→ C(j, ρ) is not upper semicontinuous when j(Γ0 ) has parabolic elements. The following example shows that Proposition 1.5 fails in the presence of cusps, even if we restrict to C < 1. (It certainly fails for larger C since the constant representation ρ can have noncusp-deteriorating deformations, for which C ≥ 1.) Let Γ0 be a free group on two generators α, β and let j ∈ Hom(Γ0 , G) be given by     1 0 1 3 . and j(β) = j(α) = −3 1 0 1 The quotient j(Γ0 )\H2 is homeomorphic to a sphere with three holes, two of which are cusps (corresponding to the orbits of 0 and ∞ in ∂∞ H2 ). Let ρ ∈ Hom(Γ0 , G) be the constant representation, so that C(j, ρ) = 0. We shall exhibit a sequence ρk → ρ with C(j, ρk ) < 1 for all k and C(j, ρk ) √ → 1. k −1 Define ρk (α) (resp. ρ (β)) to be the rotation centered at A := 2 k k √ (resp. Bk := 2−k −1), of angle 2π/(2k k). Note that a circle of radius r in H2 has circumference 2π sinh(r) (see (A.8)), which is equivalent to πer as r → +∞. Therefore, √  √ π −→ 0, ∼ d −1, ρk (α) · −1 k→+∞ k→+∞ k hence (ρk )k∈N converges to the constant representation ρ. By construction, k−1 k−1 ρk (α2 k ) is a rotation of angle π centered at Ak , and ρk (β 2 k ) a rotation k−1 k−1 of angle π centered at Bk . Therefore if ωk = α2 k β 2 k then ρk (ωk ) is a translation of length 2d(Ak , Bk ) = 4k log 2. On the other hand, one can compute explicitly |Tr (j(ωk ))| = (3 · 2k−1 k)2 − 2 which shows that j(ωk ) is a translation of length 4(k log 2 + log k) + O(1). It follows that 1 log k , +O C(j, ρk ) ≥ 1 − k log 2 k which goes to 1 as k → +∞. See Figure 20 for an interpretation of ρk as the holonomy of a singular hyperbolic metric. However, we have C(j, ρk ) < 1 for all k: otherwise, by Corollary 4.14 and Lemmas 4.10, 5.2, and 5.4, the stretch locus E(j, ρk ) would contain a maximally stretched geodesic lamination Lk with compact image L˙k in 100 FRANÇOIS GUÉRITAUD AND FANNY KASSEL H2 mod j(Γ0 ) 2π 2k k f mod Γ0 2π 2k k Figure 20. The representation ρk can be seen as the holonomy of a singular hyperbolic metric on a sphere with three 2π cone points of angle 22π The angle k k , 2k k , and close to 2π. at the third cone point determines the distance between the other two, and is adjusted so that no equivariant map f can be better than (1 − o(1))-Lipschitz, as k → +∞. j(Γ0 )\H2 . Necessarily any recurrent component of L˙k would be a geodesic boundary component of the convex core (a three-holed sphere carries no other recurrent geodesic laminations!), corresponding to αβ ∈ Γ0 . Therefore we would have λ(ρk (αβ)) = C(j, ρ) λ(j(αβ)) ≥ λ(j(αβ)) > 0. This is impossible since ρk tends to the constant √ representation and λ is continuous. ±k −1 for different values of t in (1, 2] Note that by placing Ak , Bk at t (without changing the rotation angle of ρk (α) and ρk (β)), we could also have forced C(j, ρk ) to converge to any value in (0, 1]. 10.7. The function (j, ρ) 7→ C(j, ρ) is not lower semicontinuous when j(Γ0 ) has parabolic elements. Let Γ0 be a free group on two generators α, β and j ∈ Hom(Γ0 , G) the holonomy representation of a hyperbolic metric on a once-punctured torus, with j(αβα−1 β −1 ) parabolic. We assume that j(Γ0 ) admits an ideal square Q of H2 as a fundamental domain, with the axes of j(α) and j(β) crossing the sides of Q orthogonally. Fix two points p, q ∈ H2 distance 1 apart. For each k ≥ 1, let rk ∈ H2 be the point at distance k from p and q, so that pqrk is counterclockwise oriented. Fix a small number δ > 0 and let ρk be the representation of Γ0 taking α (resp. β) to the translation of length δ along the oriented geodesic line (p, rk ) (resp. (q, rk )) — see Figure 21. As k → +∞, the representations ρk converge to a representation ρ fixing exactly one point at infinity (the limit of (rk )k≥1 ), and ρ(αβα−1 β −1 ) is parabolic: hence C(j, ρ) ≥ 1. However, C(j, ρk ) is bounded away from 1 from above. To see this, observe that the fixed points of ρk (αβα−1 β −1 ), ρk (βα−1 β −1 α), ρk (α−1 β −1 αβ), ρk (β −1 αβα−1 ) are the vertices of a quadrilateral Qk with four sides of equal length, centered at rk , of size roughly 2δ. The maps ρk (α), ρk (β) identify pairs of opposite sides of Qk . Taking δ very small, it is not difficult to construct maps Q → Qk (taking whole neighborhoods of the ideal vertices of Q to the vertices of Qk ) that are equivariant with very small Lipschitz constant. MAXIMALLY STRETCHED LAMINATIONS Qk H2 Q H2 j(β) j(α) f 101 rk ρk (α) p ρk (β) q Figure 21. If λ(ρk (α)) and λ(ρk (β)) are small enough, then C(j, ρk ) stays small and bounded away from 1. Note however that the inequality C(j, ρ) ≤ lim inf k C(jk , ρk ) of lower semicontinuity holds as soon as the Arzelà–Ascoli theorem applies for maps fk ∈ F jk ,ρk , i.e. as soon as the sequence (fk (p))k≥1 does not escape to infinity in H2 : this fails only when ρ fixes exactly one point at infinity. 10.8. A reductive, non-cusp-deteriorating ρ with E(j, ρ) = ∅. Let S be a hyperbolic surface of infinite volume with at least one cusp and j ∈ Hom(Γ0 , G) its holonomy representation, where Γ0 := π1 (S). Consider a collection of disjoint geodesics α1 , . . . , αm of S with both ends going out in the funnels, subdividing the convex core of S into contractible polygons and polygons with one puncture (cusp). We apply Thurston’s construction from the proof of Remark 8.2: for each αi we consider another geodesic α′i very close to, but disjoint from αi , and construct the holonomy ρ of a new hyperbolic metric by cutting out the strips bounded by αi ∪ α′i and gluing back the boundaries, identifying the endpoints of the common perpendicular to αi and α′i (see Figure 22). It is easy to check that the (j, ρ)-equivariant map f : H2 → H2 defined by this “cut and paste” procedure is 1-Lipschitz, hence C(j, ρ) ≤ 1. In fact, C(j, ρ) = 1 since ρ is not cusp-deteriorating (Lemma 2.7). However, E(j, ρ) = ∅: otherwise, (5.2) would imply Cs′ (j, ρ) = 1, where Cs′ (j, ρ) is the supremum of λ(ρ(γ))/λ(j(γ)) over all elements γ ∈ Γ0 corresponding to simple closed curves G in S. To see that this is impossible, first note that any such G intersects the arcs αi nontrivially, yielding λ(ρ(γ)) < λ(j(γ)). In fact, G stays in the complement of some cusp neighborhoods, which is compact: this means that G intersects the αi a number of times roughly proportional to the length of G. Moreover, each of these intersections is responsible for a definite (additive) drop in length between λ(j(γ)) and λ(ρ(γ)): this simply follows from the fact that αi is a definite distance away from α′i , and forms with G an angle which can be bounded away from 0 (again by compactness: αi exits the convex core and G must not). This implies Cs′ (j, ρ) < 1. Therefore E(j, ρ) = ∅. A similar argument can be found in [PT]. (This is an example where Cs′ (j, ρ) < 1 = C(j, ρ) = C ′ (j, ρ), the last equality coming from Lemma 7.4.) 102 FRANÇOIS GUÉRITAUD AND FANNY KASSEL α′1 α1 j(Γ0 )\H2 α′2 α2 f mod Γ0 ρ(Γ0 )\H2 Figure 22. In the second surface (with strips removed), simple closed curves are uniformly shorter than in the first. 10.9. A nonreductive, non-cusp-deteriorating ρ with C ′ (j, ρ) < 1 = C(j, ρ) (and E(j, ρ) = ∅). Let Γ0 be a free group on two generators α, β and j ∈ Hom(Γ0 , G) the holonomy representation of a hyperbolic three-holed sphere with one cusp and two funnels, such that j(α) is hyperbolic and j(β) parabolic. For any nonreductive ρ ∈ Hom(Γ0 , G), if ρ(α) and ρ(β) are not hyperbolic (for instance if ρ(Γ0 ) is unipotent), then C ′ (j, ρ) = 0; if moreover ρ(β) is parabolic, then ρ is not cusp-deteriorating and so C(j, ρ) ≥ 1 by Lemma 2.7, which implies E(j, ρ) = ∅ and C(j, ρ) = 1 by Theorem 1.3. Here is another example with C ′ (j, ρ) > 0. Let ρ ∈ Hom(Γ0 , G) be a nonreductive representation with ρ(α) hyperbolic and ρ(β) parabolic; set ε := λ(ρ(α)) > 0. There exists L > 0 with the following property (see [DOP, p. 122], together with Lemma 2.6): for any nontrivial cyclically reduced word γ = αm1 β m2 αm3 β m4 . . . in Γ0 , with m2 · · · ms 6= 0 where ms is the last exponent,   X X |mi | + (1 + log |mi |) . λ(j(γ)) ≥ L  i∈[1,s] odd i∈[1,s] even MAXIMALLY STRETCHED LAMINATIONS 103 On the other hand, for such a γ, λ(ρ(γ)) = ε X mi , i∈[1,s] odd hence λ(ρ(γ))/λ(j(γ)) ≤ ε/L. This shows that C ′ (j, ρ) ≤ ε/L, which is < 1 for ε small enough. However, since ρ(β) is parabolic we have C(j, ρ) ≥ 1 as above, which implies E(j, ρ) = ∅ and C(j, ρ) = 1 by Theorem 1.3. 10.10. In dimension n ≥ 4, the function (j, ρ) 7→ C(j, ρ) is not upper semicontinuous even above 1. When n ≥ 4, the existence of nonunipotent parabolic elements, coming from cusps of rank < n − 2, destroys certain semicontinuity properties of C. We first give an example, in dimension n = 4, where 1 ≤ C(j, ρ) < lim inf C(jk , ρk ) k for some (jk , ρk ) → (j, ρ) with j, jk geometrically finite of the same cusp type, with a cusp of rank 1. This shows that condition (3) of Proposition 6.1 is not satisfied in general for n ≥ 4. Identify ∂∞ H4 with R3 ∪{∞} and let G := PO(4, 1). For ξ ∈ R3 , we denote by Pξ ⊂ H4 the copy of H3 bordered by the unit sphere of R3 centered at ξ. Let Γ0 be a free group on two generators α and β, and let j ∈ Hom(Γ0 , G) be the representation such that • j(α) is the unipotent isometry of H4 fixing ∞ and acting on R3 by translation along the vector (2π, 0, 0); • j(β) is the pure translation (hyperbolic element) taking ξ := (3, 0, 0) to ∞, and ∞ to η := (0, 0, 0), and Pξ to Pη . It is a standard argument (sometimes called “ping pong”) that j(α) and j(β) generate a free discrete group in G; the representation j is geometrically finite and the quotient manifold j(Γ0 )\H4 has one cusp, with stabilizer hαi ⊂ Γ0 . Take ρ = ρk = j, so that C(j, ρ) = 1. Choose an integer p ≥ 2 and, for k ≥ 1, let jk ∈ Hom(Γ0 , G) be the representation such that • jk (α) is the parabolic element of G fixing ∞ and acting on R3 as the corkscrew motion preserving the line ℓk := √ {0} × R × {k}, with rotation angle 2π/k around ℓk and progression p k/k along ℓk ; • jk (β) = j(β). It is an easy exercise to check that jk → j as k → +∞. Moreover, jk is geometrically finite with the same cusp type as j for large k, by a standard ping pong argument. (Note however that fundamental domains for the action of jk (Γ0 ) do not converge to a fundamental domain for the action of j(Γ0 ), but to a smaller set.) The element ρk (αk β) = j(αk β) takes ξ to ∞, and ∞ to j(αk )(η) = (2kπ, 0, 0), and Pξ to Pj(αk )(η) ; by (A.11),  (10.3) λ j(αk β) ≥ 2 log 2πk − R for some R > 0 independent of k. On the other hand, jk (αk β) takes ξ to ∞, √ p k and ∞ to jk (α )(η) = (0, k, 0), and Pξ to Pjk (αk )(η) , hence √  p λ jk (αk β) ≤ 2 log k + R + 1 104 FRANÇOIS GUÉRITAUD AND FANNY KASSEL by (A.11). It follows, by (4.1), that λ(ρk (αk β)) 2 log 2πk − R √ , ≥ λ(jk (αk β)) 2 log p k + R + 1 which accumulates only to values ≥ p as k → +∞. Since p was arbitrary, we see that (j ′ , ρ′ ) 7→ C(j ′ , ρ′ ) is not even bounded near (j, ρ). C(jk , ρk ) ≥ 10.11. The condition C(j, ρ) < 1 is not open in dimension n ≥ 4. We finally give an example, in dimension n = 4, where C(j, ρ) < 1 < lim inf C(jk , ρk ) k for (jk , ρk ) → (j, ρ) with j, jk geometrically finite of the same cusp type, with a cusp of rank 1, and with ρk (and ρ) cusp-deteriorating. This proves that condition (1) of Proposition 6.1 need not be satisfied for n ≥ 4 when there is a cusp of rank < n − 2. Let Γ0 be a free group on two generators α and β, and let j and jk be as in Section 10.10. We take a representation ρ ∈ Hom(Γ0 , G) such that • ρ(α) = 1 ∈ G, • ρ(β) is a pure translation along some line ℓ of H4 . Since ρ(Γ0 ) is contained in the stabilizer of ℓ, multiplying the translation length of ρ(β) by some constant ε > 0 multiplies the translation length of all elements ρ(γ) by ε. Therefore, up to taking λ(ρ(β)) small enough, we may assume C(j, ρ) < 1. Up to conjugating ρ, we can furthermore assume that apart by (A.12)) such that ρ(β) there exist ξ, η ∈ R3 (distance 2 cosh λ(ρ(β)) 2 takes ξ to ∞, and ∞ to η, and Pξ to Pη . We still normalize to η = (0, 0, 0) for convenience. We then take ρk ∈ Hom(Γ0 , G) such that • ρk (α) is an elliptic transformation fixing pointwise the hyperbolic √ ′ 2-plane bordered by the line ℓk := {0} × R × { k} of R3 (compactified at ∞), and acting as a rotation of angle π/k in the orthogonal direction, • ρk (β) = ρ(β). Clearly ρk (α) → ρ(α) as k → +∞, since this holds in restriction to any horosphere centered at ∞ (such a horosphere is stable under √ ρk (α)). This time, ρk (αk β) takes ξ to ∞, and ∞ to ρk (αk )(η) = (0, 0, 2 k), and Pξ to Pρk (αk )(η) , hence √  λ ρk (αk β) ≥ 2 log 2 k − R by (A.11). Using (10.3), we obtain √ λ(ρk (ak b)) 2 log 2 k − R √ , C(jk , ρk ) ≥ ≥ λ(jk (ak b)) 2 log p k + R + 1 which accumulates only to values ≥ p/2 as k → +∞. Since p was arbitrary, we see that (j ′ , ρ′ ) 7→ C(j ′ , ρ′ ) is not bounded near (j, ρ), even in restriction to cusp-deteriorating ρ′ . Appendix A. Some hyperbolic trigonometry We collect a few well-known formulas in hyperbolic trigonometry, from which we derive several formulas used at various places in the paper. MAXIMALLY STRETCHED LAMINATIONS 105 A.1. Distances in H2 and H3 . Let n = 2 or 3. We use the upper halfspace model of Hn : if n = 2, then Hn ≃ {z ∈ C : Im(z) > 0}, the hyperbolic metric is given by d|z|2 , ds2 = Im(z)2 the isometry group G of Hn identifies with PGL2 (R) acting by Möbius transformations, and ∂∞ Hn ≃ R ∪ {∞}. If n = 3, then Hn ≃ C × R∗+ , the hyperbolic metric is given by d|a|2 + db2 b2 ∗ for (a, b) ∈ C × R+ , the identity component G0 of G identifies with PSL2 (C), which acts on the boundary ∂∞ Hn ≃ C ∪ {∞} by Möbius transformations, and this action extends in a natural way to Hn . The matrix  η/2  e 0 Tη := ∈ G0 0 e−η/2 ds2 = defines a translation of (complex) √ length η along the geodesic line with endpoints 0, ∞ ∈ ∂∞ Hn . Set p0 := −1 ∈ Hn if n = 2, and p0 := (0, 1) ∈ Hn if n = 3. Then   cos(θ/2) sin(θ/2) Rθ := ∈ G0 − sin(θ/2) cos(θ/2) defines a rotation of angle θ around p√0 if n = 2, and around the geodesic line (containing p0 ) with endpoints ± −1 ∈ ∂∞ Hn if n = 3. The stabilizer of p0in G0 is K = PSO(2) if n = 2, and K = PSU(2) if n = 3. For any a b g= ∈ G0 , c d   2 a b (A.1) 2 cosh d(p0 , g · p0 ) = := |a|2 + |b|2 + |c|2 + |d|2 . c d Indeed this holds for g = Tη and the right-hand side is invariant under multiplication of g by elements of K on either side (recall the Cartan deA := {Tη | η ∈R}, see Section 7.3). Suppose composition G0 = KAK for  v 1/2 uv −1/2 n = 2; applying (A.1) to g = , we find in particular that for 0 v −1/2 any u, v ∈ R with v > 0,   2 √ √ u + v2 + 1 . (A.2) d −1, u + −1v) = arccosh 2v   1 L A.1.1. Horospherical distances. Applying (A.1) to g = , we see that 0 1 for any points p, q on a common horosphere ∂H, the distance d(p, q) from p to q in Hn and the distance L = d∂H (p, q) of the shortest path from p to q contained in the horosphere ∂H (“horocyclic distance”) satisfy  d (p, q)   d∂H (p, q)2  ∂H = 2 arcsinh . (A.3) d(p, q) = arccosh 1 + 2 2 106 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Let t 7→ pt and t 7→ qt be the geodesic rays from p and q to the center ξ ∈ ∂∞ Hn of the horosphere ∂H, parametrized by arc length. Then (A.4) d∂Ht (pt , qt ) = e−t d∂H (p, q) for all t ≥ 0, where ∂Ht is the horocycle through pt and qt centered at ξ. Using (A.3) and the concavity of arcsinh, we find that there exists D > 1 such that (A.5) e−t d(p, q) ≤ d(pt , qt ) ≤ D e−t d(p, q) for all t ≥ 0; moreover, an upper bound on d(p, q) yields one on D. A.1.2. Distances in two ideal spikes of H2 . The following situation is considered in the proof of Proposition 9.4. Let ζ1 6= ζ2 6= ζ3 6= ζ4 be points of ∂∞ H2 , not necessarily all distinct. Let Di−1 , Di , Di+1 be the geodesic lines of H2 running from ζ1 to ζ2 , from ζ2 to ζ3 , and from ζ3 to ζ4 respectively. Consider two points x ∈ Di−1 and x′ ∈ Di on a common horocycle centered at ζ2 and let ξ ≥ 0 be their horocyclic distance. Similarly, consider two points y ∈ Di+1 and y ′ ∈ Di on a common horocycle centered at ζ3 and let η ≥ 0 be their horocyclic distance. Setting L := d(x′ , y ′ ), we have (A.6) d(x, y) = L + ξ 2 + η 2 + o(ξ 2 + η 2 ) as ξ 2 + η 2 + e−L → 0. Indeed, by (A.1),     1 1 0 1 −η T cosh d(x, y) = ξ 1 L 0 1 2 2 = cosh L + (sinh L) · (ξ 2 + η 2 )(1 + o(1)) and we conclude using the degree-1 Taylor series of cosh at L. A.1.3. Distances in a prism in H3 . The following situation is considered in the proof of Lemma 5.13. Consider a geodesic segment I of H3 , of length η ≥ 0, together with two oriented geodesic lines ℓ, ℓ′ of H3 meeting I orthogonally at its endpoints, and forming an angle θ ∈ [0, π] with each other. Note that I is the shortest geodesic segment between ℓ and ℓ′ ; the complex number L := η + iθ ∈ C is called the complex distance between ℓ and ℓ′ and will be expressed in terms of cross-ratios in Section A.1.4. For now, let us compute the distance between points p ∈ ℓ and q ∈ ℓ′ , at respective signed distances s and t from I. Note that Ts′ := Rπ/2 Ts R−π/2 ∈ G0 is a translation of length s along the geodesic line from −1 ∈ ∂∞ H3 to 1 ∈ ∂∞ H3 , which intersects the translation axis of TL (with endpoints 0, ∞ ∈ ∂∞ H3 ) perpendicularly at the basepoint p0 = (0, 1) ∈ H3 . Define ′ T T ′ . Without loss of generality, we may assume that p = p and g := T−s L t 0 ′ · p , T ′ T · p ]. Using (A.1) and the identities q = g · p, and that I = [T−s 0 −s L 0 2| cosh L2 |2 = cosh η + cos θ and 2| sinh L2 |2 = cosh η − cos θ, this gives (A.7) cosh d(p, q) = cosh η cosh s cosh t − cos θ sinh s sinh t . When η = 0 and θ = 0 or π we recover the formulas for cosh(s ± t). When η = 0 and s = t, we find that points p, q on a circle of radius s, forming an angle θ from the center, are a distance ∼ θ sinh(s) apart when θ is small. This estimate is needed in the proof of Lemma 6.4: approaching the arc of circle C from p to q with a union of short geodesic segments, we MAXIMALLY STRETCHED LAMINATIONS 107 find in the limit (A.8) length(C ) = θ sinh r. When θ = 0 and s = t, we find that points p, q at (signed) distance s from a straight line A of H2 , whose projections to A are distance η apart, satisfy d(p, q) ∼ η cosh s (A.9) when η is small. (This situation is considered in the proof of Claim 10.1.) ′ , ξ ′ ∈ ∂ H3 , the complex A.1.4. Line-to-line distances. For any ξ− , ξ+ , ξ− ∞ + ′ , ξ ′ ) satisfies distance L = η + iθ between the oriented lines (ξ− , ξ+ ) and (ξ− + (A.10) cosh η = 1 + |c| |1 − c| and cos θ = 1 − |c| , |1 − c| ′ : ξ ′ ] is the cross-ratio of ξ , ξ , ξ ′ , ξ ′ , defined so where c := [ξ− : ξ+ : ξ− − + − + + that [∞ : 0 : 1 : ξ] = ξ. Indeed, by invariance under the action of G0 , it is sufficient to check (A.10) when (ξ− , ξ+ ) = (−1, 1) and the shortest geodesic ′ , ξ ′ ) is contained in (0, ∞). In this case, segment between (ξ− , ξ+ ) and (ξ− + ′ ′ (ξ− , ξ+ ) is of the form (−z, z) for some z ∈ C∗ and we have   cosh η = (|z| + |z|−1 )/2, cos θ = Re(z/|z|),  c = (1 − z)2 /(1 + z)2 ; it is then elementary to check that (A.10) holds. Now let n ≥ 2 be arbitrary and consider as above the upper half space model of Hn , so that ∂∞ Hn identifies with Rn−1 ∪ {∞}. In Sections 10.10 and 10.11 we use the following consequence of (A.10): there exists R > 0 such that for any D ≥ 2, any ξ, η ∈ Rn−1 ⊂ ∂∞ Hn distance D apart for the Euclidean metric, and any g ∈ Isom(Hn ), if g(ξ) = ∞ = g−1 (η) and if g maps the unit hemisphere (geodesic hyperplane) Pξ centered at ξ to the unit hemisphere Pη centered at η, then g is hyperbolic and its translation length λ(g) satisfies (A.11) |λ(g) − 2 log D| ≤ R. Indeed, by (A.10) the hyperbolic distance between the closest points of Pξ and Pη is (A.12) 2 arccosh(D/2), and the intersection point of Pξ with the line (ξ, ∞) is at hyperbolic distance 2 arcsinh(D/2) from Pη ∩ (η, ∞) by (A.3). The translation length λ(g) is bounded in-between these two values, which are both 2 log D + O(1). A.2. Relations in a right-angled hyperbolic triangle. Consider a trianb B, b C b and opposite edge lengths a, b, c. Suppose gle ABC in H2 with angles A, b = π/2. Then B b = tanh c , and sin A b = sinh a . b = tanh a , cos A (A.13) tan A sinh c tanh b sinh b 108 FRANÇOIS GUÉRITAUD AND FANNY KASSEL b b Indeed, let (α, β, γ) := (ea/2 , eb/2 , ec/2 ) and (X, Y ) := (cos A2 , sin A2 ): following the perimeter of the triangle in the order C, A, B, C shows that ! γ α 1 X αγ + Y −X + Y β βγ αβ αβγ T−b RAb Tc R−π/2 Ta = αβγ β X αγ + Y βγ X αβ γ −Y 1 α must be (projectively) a rotation matrix, namely R−Cb . After multiplying all entries by αβγ, this means α2 (Xγ 2 + Y ) = β 2 (X + Y γ 2 ) and α2 β 2 (X − Y γ 2 ) = Xγ 2 − Y. It follows that 2 tanh a = = and γ 2 − γ −2 2XY b = sinh c tan A 2 X2 − Y 2 2 tanh b = 2 X+Y γ 2 X−Y γ β 2 Xγ 2 +Y − β Xγ 2 −Y α2 − α−2 = 2 X+Y γ 2 2 X−Y γ α2 + α−2 β 2 Xγ 2 +Y + β Xγ 2 −Y 2 +Y 2 X−Y γ α2 Xγ β 2 − β −2 X+Y γ 2 − α Xγ 2 −Y = 2 +Y X−Y γ 2 β 2 + β −2 + α2 Xγ α2 Xγ 2 −Y X+Y γ 2 γ 2 − γ −2 X 2 + Y 2 tanh c = . b γ 2 + γ −2 X 2 − Y 2 cos A The last identity in (A.13) follows from the first two and from the Pythagorean identity cosh b = cosh a cosh c, which is just (A.7) for (η, θ) = (0, π/2). As a consequence of the last identity in (A.13), if x, y are two points on a circle of radius r in H2 , forming an angle θ from the center, then sinh(d(x, y)/2) θ . (A.14) sin = 2 sinh r A.3. The closing lemma. Finally, we recall the following classical statement; see [BBS, Th. 4.5.15] for a proof. = Lemma A.1. For any δ > 0 and D > 0, there exists ε > 0 with the following property: given any broken line L = p0 · · · pk+1 in Hn , if d(pi , pi+1 ) ≥ D for all 1 ≤ i < k and if the angle pi−1 \ pi pi+1 is ≥ π − ε for all 1 ≤ i ≤ k, then L stays within distance δ from the segment [p0 , pk+1 ], and has total length at most d(p0 , pk+1 ) + kδ. Moreover, when δ is fixed, ε = δ will do for all large enough D. Taking limits as k → +∞, this implies in particular that for a broken line (pi )i∈Z invariant under a hyperbolic element g ∈ G taking each pi to pi+m , under the same assumptions on length and angle we have m X d(pi , pi+1 ) ≤ mδ. λ(g) − i=1 Appendix B. Converging fundamental domains Let Γ0 be a discrete group. It is well known that, in any dimension n ≥ 2, the set of convex cocompact representations of Γ0 into G = PO(n, 1) = Isom(Hn ) is open in Hom(Γ0 , G) (see [Bo2, Prop. 4.1] for instance). The set MAXIMALLY STRETCHED LAMINATIONS 109 of geometrically finite representations is open in the set of representations Γ0 → G of fixed cusp type if n ≤ 3 [Ma], or if all cusps have rank ≥ n − 2 [Bo2, Prop. 1.8], but not in general for n ≥ 4 [Bo2, § 5]. In Sections 6.1.1 and 6.2 of the paper, where we examine the continuity properties of the function (j, ρ) 7→ C(j, ρ), we need, not only this openness, but also a control on fundamental domains in Hn for converging sequences of geometrically finite representations. Propositions B.1 and B.3 below are certainly well known to experts, but we could not find a proof in the literature. Note that they easily imply the Hausdorff convergence of the limit sets, but are a priori slightly stronger. B.1. The convex cocompact case. Proposition B.1. Let Γ0 be a discrete group and (jk )k∈N∗ a sequence of elements of Hom(Γ0 , G) converging to a convex cocompact representation j ∈ Hom(Γ0 , G). Then for any large enough k ∈ N∗ the representation jk is convex cocompact. Moreover, there exists a compact set C ⊂ Hn that contains fundamental domains of the convex cores of j(Γ0 )\Hn and jk (Γ0 )\Hn for all large enough k ∈ N∗ . If Γ0 is torsion-free, then the injectivity radius of jk (Γ0 )\Hn is bounded away from 0 as k → +∞. Proposition B.1 for torsion-free Γ0 implies the general case, due to the Selberg lemma [Se, Lem. 8]. We henceforth assume Γ0 to be torsion-free. Proof. We build fundamental domains as finite unions of simplices coming from j(Γ0 )-invariant triangulations: the main step is the following. Claim B.2. There exists a j(Γ0 )-invariant geodesic triangulation ∆ of a nonempty convex subset of Hn which is finite modulo j(Γ0 ) and induces dihedral angles < π on the boundary. Let us prove Claim B.2 (note that the projection of ∆ to M := j(Γ0 )\Hn will automatically contain the convex core). The idea is to use a classical construction, the hyperbolic Delaunay decomposition (an analogue of the Euclidean Delaunay decomposition of [D]), and make sure that it is finite modulo j(Γ0 ). Let N ⊂ Hn be the preimage of the convex core of M = j(Γ0 )\Hn and let N be the uniform 1-neighborhood of N . For R ≥ 0, we call R-hyperball of Hn any convex region of Hn bounded by a connected hypersurface at constant distance R from a hyperplane. Since N is the intersection of all half-spaces containing N , we see that N is the intersection of all 1-hyperballs containing N . By the strict convexity of the distance function in Hn , there exists α > 0 such that whenever points p, q of a 1hyperball are distance ≥ 1 apart, the ball of radius α centered at the midpoint of [p, q] is also contained in the 1-hyperball. Therefore, whenever p, q ∈ N are distance ≥ 1 apart, the ball of radius α centered at the midpoint of [p, q] is also contained in N . Let X be a j(Γ0 )-invariant subset of N that is finite modulo j(Γ0 ) and intersects every ball of radius ≥ α/2 centered at a point of N . We view X as a subset of Rn+1 via the embedding of Hn as the upper hyperboloid sheet  H := x ∈ Rn+1 : x21 + · · · + x2n − x2n+1 = −1 and xn+1 > 0 . 110 FRANÇOIS GUÉRITAUD AND FANNY KASSEL b of X in Rn+1 . There is a natural bijection Consider the convex hull X between the following two sets: b separating X from 0 ∈ Rn+1 , • the set of supporting hyperplanes of X • the set of open balls, horoballs, or hyperballs of Hn that are disjoint from X but whose boundary intersects X. Namely, the bijection is given by taking any supporting hyperplane to the set of points of H that it separates from X (see Figure 23). This set is a ball (resp. a horoball, resp. a hyperball) if the intersection of H with the supporting hyperplane is an ellipsoid (resp. a paraboloid, resp. a hyperboloid). The degenerate case of a supporting hyperplane tangent to H corresponds to an open ball of radius 0 (the empty set!) centered at a point of X; the limit case of a supporting hyperplane containing 0 ∈ Rn+1 corresponds to a 0-hyperball, i.e. a half-space of Hn . H H2 Figure 23. Balls, horoballs, and hyperballs of Hn are intersections of the hyperboloid sheet H with affine half-spaces of Rn+1 containing the origin. b the corresponding open ball, horoball, For any supporting hyperplane of X, n or hyperball B ⊂ H intersects N in a region of diameter ≤ 1. Indeed, if p, q ∈ B ∩ N were distance > 1 apart, then the ball B ′ of radius α centered at the midpoint of [p, q] would be contained in N , by choice of α. But at least one hemisphere of B ′ (the hemisphere closest to the center or to the defining hyperplane of B, depending on whether B is a (horo)ball or a hyperball) would also be contained in B. A ball of radius α/2 contained in this hemisphere would intersect X (by assumption on X), while being contained in B: impossible. Thus ∂B ∩ N has diameter ≤ 1. In particular, ∂B ∩ X has diameter ≤ 1. In particular, ∂B ∩ X is finite. b be the union of all points that belong to supporting hyperLet Y ⊂ ∂ X planes separating X from 0 ∈ Rn+1 . (In other words, Y is the portion of b that is “visible from the origin”. There can also be an “invisible” por∂X tion, corresponding to hyperballs whose complement is disjoint from X.) By the previous paragraph, Y has the structure of a locally finite polyhedral hypersurface in Rn+1 , with vertex set X. Projecting each polyhedron of Y MAXIMALLY STRETCHED LAMINATIONS 111 to the hyperboloid H ≃ Hn (along the rays through the origin 0 ∈ Rn+1 ), we obtain a cellulation ∆ of the convex hull Conv(X) of X in Hn , called the Delaunay cellulation of Conv(X) relative to X. It is characterized by the fact that any cell of ∆ is inscribed in a hypersurface of Hn bounding some open ball, horoball, or hyperball disjoint from X. The cellulation ∆ is j(Γ0 )-invariant and finite modulo j(Γ0 ). Since j(Γ0 ) is torsion-free, up to taking the points of X in general position we may assume that ∆ is a b This triangulation and induces dihedral angles < π on the boundary of X. completes the proof of Claim B.2. Proposition B.1 easily follows from Claim B.2. Indeed, let F ⊂ Hn be a finite set such that X = j(Γ0 ) · F . The vertices of a d-dimensional simplex of the triangulation ∆ can be listed in the form j(γ0 ) · p0 , . . . , j(γd ) · pd , where p0 , . . . , pd ∈ F and γ0 , . . . , γd ∈ Γ0 . By finiteness of the triangulation, when jk is close enough to j the points jk (γ0 ) · p0 , . . . , jk (γd ) · pd still span a simplex and these simplices (obtained by following the combinatorics of ∆) still triangulate a region of Hn that is locally convex, hence globally convex. In particular, this region of Hn contains the preimage of the convex core of jk (Γ0 )\Hn . Thus jk (Γ0 ) is still convex cocompact for large k ∈ N∗ . Any compact neighborhood C of a union U of representatives of simplex orbits of ∆ under j(Γ0 ) contains a fundamental domain of the convex core of jk (Γ0 )\Hn for all large enough k. To bound the injectivity radius of jk (Γ0 )\Hn away from 0, we argue as follows. For any p ∈ F , let Up be the union of all simplices of ∆ containing p. Then p is an interior point of Up . Provided X is dense enough in N , each Up projects injectively to M = j(Γ0 )\Hn . For ε > 0, let Upε be the complement in Up of the ε-neighborhood of ∂Up . If ε is small enough, then any point of ∆ has a translate belonging to some Upε with p ∈ F , whose ε-neighborhood therefore projects injectively to M . This property remains true as ∆ (hence the finitely many sets Up ) are deformed slightly, up to taking a smaller ε. This completes the proof of Proposition B.1.  Note that in the above proof, for torsion-free Γ0 , the hyperbolic manifolds jk (Γ0 )\Hn and j(Γ0 )\Hn are in fact homeomorphic since their convex cores admit combinatorially identical triangulations. B.2. The geometrically finite case when all cusps have rank ≥ n − 2. Here is an analogue of Proposition B.1 for geometrically finite representations of fixed cusp type with all cusps of rank ≥ n − 2. Note that cusps always have rank ≥ n − 2 in dimension n ≤ 3. Proposition B.3. Let Γ0 be a discrete group, j ∈ Hom(Γ0 , G) a geometrically finite representation with all cusps of rank ≥ n − 2, and (jk )k∈N∗ a sequence of elements of Hom(Γ0 , G) converging to j, all of the same cusp type as j (Definition 1.1). Then for any large enough k ∈ N∗ the representation jk is geometrically finite and (jk )k∈N converges geometrically to j. More precisely, if H1 , . . . , Hc are horoballs of Hn whose images in j(Γ0 )\Hn are disjoint, small enough, and intersect the convex core in standard cusp regions (Definition 2.2), representing all the cusps, then there exist a compact set C ⊂ Hn and, for any large enough k ∈ N∗ , horoballs H1k , . . . , Hck of Hn , such that 112 FRANÇOIS GUÉRITAUD AND FANNY KASSEL • the images of H1k , . . . , Hck in jk (Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions; • the stabilizer in Γ0 of Hik under jk is the stabilizer in Γ0 of Hi under j for all 1 ≤ i ≤ c; • the horoballs Hik converge to Hi for all 1 ≤ i ≤ c, as k → +∞; • the union of C and of H1 ∪ · · · ∪ Hc (resp. H1k ∪ · · · ∪ Hck ) contains a fundamental domain of the convex core of j(Γ0 )\Hn (resp. jk (Γ0 )\Hn ); • the union of all geodesic rays from C to the centers of H1 , . . . , Hc (resp. H1k , . . . , Hck ) contains a fundamental domain of the convex core of j(Γ0 )\Hn (resp. jk (Γ0 )\Hn ); in particular, the S cusp thickness (Definition 5.12) of jk (Γ0 )\Hn at any point of 1≤i≤c ∂Hik is uniformly bounded by some constant independent of k. Moreover, if j(Γ0 ) is torsion-free, then the infimum of injectivity radii of jk (Γ0 )\Hn at projections of points of C is bounded away from 0 as k → +∞. Again, we can and will assume that Γ0 is torsion-free. Proposition B.3 fails in dimension n ≥ 4 when j has a cusp of rank < n − 2, as can be seen from [Bo2, § 5] or by adapting the examples of geometrically finite representations jk from Sections 10.10 and 10.11. In order to prove Proposition B.3, we need the following lemma, which is also used in Section 6.2. Lemma B.4. Let j ∈ Hom(Γ0 , G) be a geometrically finite representation with all cusps of rank ≥ n − 2, and let N ⊂ Hn be a uniform neighborhood of the preimage N of the convex core of j(Γ0 )\Hn . For any horoball H of Hn such that H ∩ N projects to a standard cusp region and such that the cusp thickness (Definition 5.12) of j(Γ0 )\Hn at any point of H is ≤ 1/3, the set ∂H ∩ N is convex in ∂H ≃ Rn−1 , equal to • the full Euclidean space ∂H if the cusp has rank n − 1; • the region contained between two parallel (possibly equal) Euclidean hyperplanes of ∂H if the cusp has rank n − 2. Proof of Lemma B.4. The stabilizer S ⊂ Γ0 of H under j has a finite-index normal subgroup S ′ isomorphic to Zm , where m ∈ {n − 1, n − 2} is the rank of the cusp (see Section 2.1). In the upper half-space model Rn−1 × R∗+ of Hn , in which ∂∞ Hn identifies with Rn−1 ∪ {∞}, we may assume that H is centered at infinity, so that ∂H = Rn−1 × {b} for some b > 0. Let Ω be the convex hull of Λj(Γ0 ) r {∞} in Rn−1 , where Λj(Γ0 ) is the limit set of j(Γ0 ). The group j(S) acts on Rn−1 by Euclidean isometries and there is an m-dimensional affine subspace V ⊂ Ω, preserved by j(S), on which j(S ′ ) acts as a lattice of translations (see Section 2.1). This implies that Ω is either Rn−1 (if m = n−1) or the region contained between two parallel hyperplanes of Rn−1 (if m = n − 2). Let δ > 0 be the Euclidean diameter of j(S)\Ω. Then δ is the cusp thickness of j(Γ0 )\Hn at Rn−1 × {1}, or alternatively the cusp thickness of j(Γ0 )\Hn is ≤ 1/3 exactly on Rn−1 × [3δ, +∞). Every S-orbit in Ω is δ-dense in Ω. Lemma B.4 reduces to:  (B.1) N ∩ Rn−1 × [3δ, +∞) = Ω × [3δ, +∞). MAXIMALLY STRETCHED LAMINATIONS 113 The left-hand side is always contained in the right-hand side since N is the convex hull in Hn of the limit set Λj(Γ0 ) . For the converse, suppose a point p ∈ Ω × R∗+ lies outside N . Then p belongs to a closed half-space D of Hn disjoint from N , whose ideal boundary ∂∞ D is a Euclidean (n − 1)dimensional ball disjoint from Λj(Γ0 ) . If ∂∞ D is centered inside Ω (e.g. if m = n − 1), then ∂∞ D has radius < δ because Λj(Γ0 ) is δ-dense in Ω. This yields p ∈ Ω × (0, δ) ⊂ Ω × (0, 3δ), as desired. Now suppose ∂∞ D is centered outside Ω; this may only happen if m = n−2. Let P be the connected component of ∂Ω closest to the center of ∂∞ D, and P ′ the other component: P and P ′ are parallel hyperplanes of Rn−1 both intersecting Λj(Γ0 ) (and possibly equal, if j(Γ0 ) preserves a copy of Hn−1 ). We claim that P ∩ Λj(Γ0 ) is 3δ-dense in P : indeed, fix ξ ∈ P ∩ Λj(Γ0 ) . If j(S) · ξ ⊂ P (in particular if P = P ′ ) we are done, as j(S) · ξ is already δdense in Ω. If not, since j(S) · ξ ⊂ P ∪ P ′ we can choose ξ ′ ∈ P ′ ∩ j(S) · ξ. Let S ′ ⊂ S be the stabilizer of P , which has index two in S, so that j(S ′ )\Ω has twice the Euclidean volume of j(S)\Ω. Let U and U ′ be (closed) Dirichlet fundamental domains of j(S)\Ω for the Euclidean metric, centered at ξ and ξ ′ respectively. Any lifts of U and U ′ to j(S ′ )\Ω must overlap, because of their total volume. Since U and U ′ are contained in δ-balls centered at ξ and ξ ′ , this shows that ξ and ξ ′ are at most 2δ apart in the quotient j(S ′ )\Ω. Since j(S) · ξ = j(S ′ ) · {ξ, ξ ′ } is δ-dense in Ω, we get that j(S ′ )ξ ⊂ P is 3δ-dense (and contained in P ∩ Λj(Γ0 ) ). The intersection ∂∞ D ∩ P , being disjoint from Λj(Γ0 ) , is therefore an (n − 2)-dimensional Euclidean ball of radius < 3δ. Since the hemisphere D is centered outside Ω, this shows that D does not achieve any height ≥ 3δ inside Ω × R∗+ . In particular, p ∈ D ∩ (Ω × R∗+ ) ⊂ Ω × (0, 3δ). This proves (B.1).  Proof of Proposition B.3. We proceed as in the proof of Proposition B.1 and first establish the following analogue of Claim B.2. Claim B.5. There exists a j(Γ0 )-invariant geodesic triangulation ∆ of a nonempty convex subset of Hn with the following properties: • ∆ is finite modulo j(Γ0 ), with vertices lying both in Hn and in ∂∞ Hn ; • the vertices in ∂∞ Hn are exactly the parabolic fixed points of j(Γ0 ); • no edge of ∆ connects two such (ideal) vertices; • in a neighborhood of a parabolic fixed point ξ of rank n−2, the boundary of ∆ consists of two totally geodesic hyperplanes of Hn meeting only at ξ. Let N ⊂ Hn be the uniform 1-neighborhood of the preimage N of the convex core of M = j(Γ0 )\Hn . Let X be a j(Γ0 )-invariant subset of N that is locally finite modulo j(Γ0 ) and intersects every ball of diameter ≥ α centered at a point of N , where α > 0 is chosen as in the proof of Claim B.2: whenever points p, q of a 1-hyperball of Hn are distance ≥ 1 apart, the ball of radius α centered at the midpoint of [p, q] is also contained in the 1-hyperball. By a similar argument to the proof of Claim B.2, the Delaunay cellulation ∆ of Conv(X) with respect to X is locally finite, with all cells equal to compact polyhedra of diameter ≤ 1. It remains to make ∆ finite modulo j(Γ0 ) by modifying it inside each cusp. For this purpose, we choose X carefully. 114 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Let H1 , . . . , Hc be open horoballs of Hn , centered at points ξ1 , . . . , ξc ∈ ∂∞ Hn , whose images in j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions, representing all the cusps. We take these horoballs at distance > 2 from each other in j(Γ0 )\Hn , and small enough so that the conclusions of Lemma B.4 are satisfied. Choose the j(Γ0 )-invariant, locally finite set X in general position subject to the following constraints: S (∗) X r ci=1 ∂Hi stays at distance ≥ α′ from ∂N and from each ∂Hi , for some α′ ∈ (0, α) to be determined below; (∗∗) for any 1 ≤ i ≤ c, the set X ∩ ∂Hi intersects any ball of Hn of radius α′ /2 centered at a point of ∂Hi ∩ N ; (∗∗∗) if the stabilizer of Hi has rank n − 2, then X intersects any Euclidean ball of radius α′ /8 in the boundary of ∂Hi ∩ N in ∂Hi ≃ Rn−1 , while all other points of X in ∂Hi ∩ N are at distance ≥ α′ /4 from the boundary of ∂Hi ∩ N (which by Lemma B.4 consists of two parallel (n − 2)-dimensional Euclidean hyperplanes of ∂Hi ). Qualitatively, this implies X is especially concentrated on the horospheres ∂Hi and even more on ∂N ∩ ∂Hi , but with a little buffer around these high-concentration regions. Consider the Delaunay cellulation ∆ of Conv(X) with respect to such a set X. Suppose two vertices x, y of a given cell of ∆ (inscribed in a hypersurface bounding an open ball, horoball, or hyperball B of Hn disjoint from X) lie on opposite sides of one of the horospheres ∂Hi . By (∗), the points x and y lie at distance ≥ α′ from ∂N , hence so does the intersection point {z} = [x, y]∩∂Hi . But at least one half of the ball of radius α′ centered at z is contained in B, hence B ∩ X 6= ∅ by (∗∗): impossible. Therefore the given cell of ∆ either has all its vertices in the closure of Hi , or has all its vertices in Hn r Hi . We can thus partition the cells of ∆ (of any dimension) into • interface cells, with all their vertices in some j(γ) · ∂Hi ; • thin-part cells, with all their vertices in the closure of some j(γ) · Hi (not all in the horosphere j(γ) · ∂Hi ); S • thick-part cells, with all their vertices in Hn r j(Γ0 ) · ci=1 Hi (not all in the horospheres j(γ) · ∂Hi ). Consider the Euclidean Delaunay cellulation ∆∂Hi of the Euclidean convex hull of X ∩ ∂Hi in ∂Hi , with respect to X ∩ ∂Hi , in the classical sense (see [D]): by definition, any cell of ∆∂Hi is inscribed in some Euclidean sphere bounding an open Euclidean ball of ∂Hi disjoint from X ∩ ∂Hi . Claim B.6. The geodesic straightenings of the Euclidean triangulations ∆∂Hi give exactly the interface cells. Proof. For any interface cell W of ∆, the projection of W to ∂Hi is a cell of ∆∂Hi . Indeed, if W is inscribed in an open ball, horoball, or hyperball B of Hn disjoint from X, then the projection of W is inscribed in B ∩ ∂Hi , which is a Euclidean ball (or half-plane) of ∂Hi disjoint from X. Conversely, for any cell WE of ∆∂Hi , the geodesic straightening of WE is contained in ∆ as an interface cell. Indeed, suppose WE is inscribed in an open Euclidean ball BE of ∂Hi , disjoint from X ∩ ∂Hi , and centered in ∂Hi ∩ N . By (∗∗), the hyperbolic ball B concentric to BE such that MAXIMALLY STRETCHED LAMINATIONS 115 B ∩ ∂Hi = BE has radius ≤ α′ /2, hence is disjoint from X by (∗), which means that the geodesic straightening of WE is contained in ∆. Therefore, we just need to see that WE is always inscribed in such a ball BE . If Hi has rank n − 1, this follows from the fact that ∂Hi ∩ N = ∂Hi by Lemma B.4. If Hi has rank n − 2, this follows from (∗∗∗): if WE is inscribed ′ of ∂H , disjoint from X ∩ ∂H , and centered in a Euclidean open ball BE i i ′ is contained in a boundary component P outside ∂Hi ∩ N , then X ∩ ∂BE of N ∩ ∂Hi (an (n − 2)-dimensional Euclidean hyperplane by Lemma B.4) and WE is inscribed in another ball BE of ∂Hi , still disjoint from X, but centered at the projection of p to P .  In fact, (∗∗∗) also implies that the Euclidean Delaunay cellulation ∆P of P with respect to X ∩ P is contained in ∆∂Hi . Up to taking the points of X in generic position in P , in ∂Hi , and in Hn , we can make sure that all three Delaunay cellulations ∆P ⊂ ∆∂Hi ⊂ ∆ (where the last inclusion holds up to geodesic straigthening) are in fact triangulations. It follows from the comparison between hyperbolic and Euclidean Delaunay cellulations above that any geodesic ray escaping to the point at infinity ξi ∈ ∂∞ Hn of the cusp crosses the interface cells at most once. Therefore the thin-part cells form a star-shaped domain relative to ξi . We now modify ∆ by removing all thin-part simplices and coning the interface simplices of ∆∂Hi off to ξi . We repeat for each cusp (these operations do not interfere, since the distance between two horoballs Hi is larger than twice the diameter of any cell), and still denote by ∆ the resulting complex (see Figure 24): it is now finite modulo j(Γ0 ). To complete the proof of Claim B.5, we must check that the new complex ∆ is still convex. This is clear at the cusps of rank n − 1, since the corresponding Hi satisfy N ∩ Hi = Hi by Lemma B.4. At a cusp of rank n − 2, above the interface ∆∂Hi (which is convex in ∂Hi by the above discussion), the boundary of ∆ consists of two geodesic hyperplanes tangent at infinity (by Lemma B.4), and is therefore convex. At the boundary of ∆∂Hi , dihedral angles are convex because they already were before removal of the thin simplices. This completes the proof of Claim B.5. We now deduce Proposition B.3 from Claim B.5. As above, let H1 , . . . , Hc be horoballs of Hn , centered at points ξ1 , . . . , ξc ∈ ∂∞ Hn , whose images in j(Γ0 )\Hn are disjoint and intersect the convex core in standard cusp regions, representing all the cusps. Let p1 , . . . , pr ∈ Hn be orbit representatives of the vertices of ∆ lying in Hn . For 1 ≤ i ≤ c and k ∈ N∗ , let ξik ∈ ∂∞ Hn be the fixed point of jk (Si ), where Si is the stabilizer in Γ0 of ξi under j. Since converging parabolic elements have converging fixed points, (ξik )k∈N∗ converges to ξi for all 1 ≤ i ≤ c. We can thus find horoballs Hik centered at ξik that converge to Hi . Whenever the corresponding cusp has rank n − 2, the direction of the jk (Si )-invariant (n − 2)-planes in ∂Hik converges to the direction of the j(Si )-invariant (n − 2)-planes in ∂Hi . For 1 ≤ i ≤ r, we also choose a sequence (pki )k∈N∗ of points of Hn , converging to pi , such that if [j(γ) · pi , j(γ ′ ) · pi′ ] is a boundary edge of ∆∂Hi (such as [x0 , x1 ] in Figure 24), then jk (γ) · pki and jk (γ ′ ) · pki′ belong to a horocycle of ∂Hik contained in some jk (Si )-stable (n − 2)-plane of ∂Hik . (Inside each boundary component 116 FRANÇOIS GUÉRITAUD AND FANNY KASSEL ∂N x2 y1 x1 x0 y0 ∂Hi j(S ′ ) ∂∞ H3 Figure 24. The triangulation ∆ in a rank-1 cusp bounded by a horosphere ∂Hi centered at ∞ in the upper half-space model of H3 . At great height, the uniform neighborhood N of the convex core is bounded by just two oblique Euclidean planes. To simplify the picture, we have chosen X to intersect each boundary line P of N ∩ ∂Hi in only one j(S ′ )-orbit, (xs )s∈Z or (ys )s∈Z . Since j(S ′ ) is unipotent, the triangles (∞, xs , xs+1 ) are coplanar. In the center we showed a thickpart tetrahedron and a thin-part tetrahedron (after coning off) which share an interface triangle. of j(Si )\∆∂Hi , it is enough to enforce this condition over boundary edges that form a spanning tree in the quotient.) The simplices spanned by the jk (Γ0 ) · pki and jk (Γ0 ) · ξik , following the combinatorics of ∆, still locally form a triangulation for large k, because there are only finitely many orbits of simplices to check. It remains to check that the jk (Γ0 )-invariant collection ∆k of such simplices triangulates a convex region. This can be ensured locally, at every codimension-2 face W contained in the boundary of ∆. If W is compact, then the dihedral angle of ∆k at W goes to that of ∆, which is strictly convex. If W has an ideal vertex ξi , then ∂∆ is flat at W by Claim B.5, and ∂∆k is flat by choice of the pki . Therefore ∆k triangulates a convex region, which necessarily contains the convex core of jk (Γ0 )\Hn . In particular, jk (Γ0 ) is still geometrically finite for large k (in the absence of torsion, the quotient hyperbolic manifolds are in fact homeomorphic since their convex cores admit combinatorially identical triangulations). For the compact set C of Proposition B.3, we can take a neighborhood of a union of orbit representatives of the compact simplices of ∆. To bound injectivity radii away from 0, we argue as in the convex cocompact case, but in restriction to thick-part simplices only.  MAXIMALLY STRETCHED LAMINATIONS 117 Appendix C. Open questions Here we collect a few open questions, organized by themes; some of them were already raised in the core of the paper. C.1. General theory of extension of Lipschitz maps in H2 . Does there exist a function F : (0, 1) → (0, 1) such that for any compact subset K of H2 and any Lipschitz map ϕ : K → H2 with Lip(ϕ) < 1, there is an extension f : H2 → H2 of ϕ with Lip(f ) ≤ F (Lip(ϕ))? By controlling the sizes of the neigborhoods Up in the proofs of Proposition 3.7 and Lemma 3.8, it is possible to deal with the case where a bound on the diameter of K has been fixed a priori. An encouraging sign for unbounded K is that in Example 9.6, where K consists of three equidistant points, CK,ϕ (j, ρ) = Lip(ϕ) + o(1) as the diameter of K goes to infinity with Lip(ϕ) ∈ (0, 1) fixed. Fix a compact subset K of H2 and a Lipschitz map ϕ : K → H2 . Is it possible to find an extension f : H2 → H2 of ϕ with minimal Lipschitz constant CK,ϕ (j, ρ), which is optimal in the sense of Definition 4.12 and satisfies Lipp (f ) = Lipp (ϕ) for all points p ∈ K outside the relative stretch locus EK,ϕ (j, ρ)? Under the same assumptions, if C := CK,ϕ (j, ρ) < 1, is it true that for any p ∈ EK,ϕ (j, ρ) r K, there exists a point q 6= p such that [p, q] is C-stretched, i.e. d(f (p), f (q)) = Cd(p, q)? By definition of the relative stretch locus, some segments near p are nearly C-stretched, but it is not clear whether we can take p as an endpoint. C.2. Geometrically infinite representations j in dimension n = 3. Does Theorem 1.8 hold for finitely generated Γ0 but geometrically infinite j? To prove this in dimension 3, using the Ending Lamination Classification [BCM], one avenue would be to extend Theorem 1.3 in a way that somehow allows the stretch locus E(j, ρ) to be an ending lamination. One would also need to prove a good quantitative rigidity statement for infinite ends: at least, that if two geometrically infinite manifolds j(Γ0 )\H3 and j ′ (Γ0 )\H3 have a common ending lamination, then |µ(j(γk )) − µ(j ′ (γk ))| is bounded for some appropriate sequence (γk )k∈N of elements of Γ0 whose associated loops go deeper and deeper into the common end. (Here µ : G → R+ is the Cartan projection of (7.1).) C.3. Nonreductive representations ρ. For (j, ρ) ∈ Hom(Γ0 , G)2 with j geometrically finite and ρ reductive, we know (Lemma 4.10) that the infimum C(j, ρ) of Lipschitz constants for (j, ρ)-equivariant maps Hn → Hn is always achieved (i.e. F j,ρ 6= ∅). Is it still always achieved for nonreductive ρ when C(j, ρ) ≥ 1? When C(j, ρ) < 1, we know that it may or may not be achieved: see the examples in Sections 10.2 and 10.3. C.4. Behavior in the cusps for equivariant maps with minimal Lipschitz constant. Is there always a (j, ρ)-equivariant, C(j, ρ)-Lipschitz map that is constant in each deteriorating cusp? The answer is yes for C(j, ρ) ≥ 1 (Proposition 4.16), but for C(j, ρ) < 1 we do not even know if the stretch locus E(j, ρ) has a compact image in j(Γ0 )\Hn . If it does, then one might ask for a uniform bound: do Proposition 5.11 and Corollary 5.14 extend to C(j, ρ) < 1? 118 FRANÇOIS GUÉRITAUD AND FANNY KASSEL Suppose that C(j, ρ) = 1 and that ρ is not cusp-deteriorating. If the stretch locus E(j, ρ) is nonempty, does it contain a geodesic lamination whose image in j(Γ0 )\Hn is compact? C.5. Generalizing the Thurston metric. To what extent can the 2dimensional theory of the Thurston (asymmetric) metric on Teichmüller space be transposed to higher dimension? In particular, how do the two asymmetric metrics dTh and d′Th of Section 1.5 compare on the deformation space T (M ) of a geometrically finite hyperbolic manifold M ? The topology and geometry of T (M ), or of level sets of the critical exponent δ : T (M ) → (0, n − 1], seem difficult but interesting to study. Are any two points connected by a dTh -geodesic? Is there an analogue of stretch paths (particular geodesics introduced in [T2])? Is it possible to relate infinitesimal dTh -balls to the space of projective measured laminations as in [T2]? C.6. Chain recurrence of the stretch locus. In dimension n ≥ 3, when C(j, ρ) > 1, does the stretch locus E(j, ρ) have a chain-recurrence property as in Proposition 9.4, in the sense that any point in the geodesic lamination j(Γ0 )\E(j, ρ) sits on a closed quasi-leaf? Since there is no classification of geodesic laminations (Fact 9.2) available in higher dimension, quasi-leaves can be generalized in at least two ways: either with a bound ε → 0 on the total size of all jumps from one leaf to the next, or (weaker) on the size of each jump separately. It is not clear whether the two definitions coincide, even under constraints such as the conclusion of Lemma 5.13. In dimension n ≥ 2, does chain recurrence, suitably defined, extend to the convex strata of Lemma 5.4 when C(j, ρ) = 1? C.7. Semicontinuity of the stretch locus. Is the stretch locus map (j, ρ) 7→ E(j, ρ) upper semicontinuous for the Hausdorff topology when C(j, ρ) is arbitrary, in arbitrary dimension n? Proposition 9.5 answers this question affirmatively in dimension n = 2 for C(j, ρ) > 1; the case C(j, ρ) = 1 might allow for a proof along the same lines, using chain recurrence (suitably generalized as in Section C.6 above). C.8. Graminations. If C(j, ρ) < 1 and F j,ρ 6= ∅, is the stretch locus E(j, ρ) generically a trivalent geodesic tree (as in the example of Section 10.5)? Is it, in full generality, what in Conjecture 1.4 we called a gramination, namely the union of a closed discrete set F and of a lamination in the complement of F (with leaves possibly terminating on F )? References [AMS] [BBS] [Bea] [Be1] H. Abels, G. A. Margulis, G. A. Soifer, Semigroups containing proximal linear maps, Israel J. Math. 91 (1995), p. 1–30. W. Ballmann, M. Brin, R. Spatzier, Structure of manifolds of nonpositive curvature II, Ann. of Math. 122 (1985), p. 205–235. A. F. Beardon, The Hausdorff dimension of singular sets of properly discontinuous groups, Amer. J. Math. 88 (1966), p. 722–736. Y. Benoist, Actions propres sur les espaces homogènes réductifs, Ann. of Math. 144 (1996), p. 315–347. MAXIMALLY STRETCHED LAMINATIONS [Be2] [BiS] [BJ] [Bo1] [Bo2] [BH] [BCLS] [BCM] [Bu] [BuS] [DP] [DOP] [DGK] [D] [DZ] [Gh] [Go] [H] [Ka1] [Ka2] [Ka3] [Ka4] [KK] [Kim] 119 Y. Benoist, Propriétés asymptotiques des groupes linéaires, Geom. Funct. Anal. 7 (1997), p. 1–47. J. S. Birman, C. Series, Geodesics with bounded intersection number on surfaces are sparsely distributed, Topology 24 (1985), p. 217–225. C. J. Bishop, P. W. Jones, Hausdorff dimension and Kleinian groups, Acta Math. 179 (1997), p. 1–39. B. H. Bowditch, Geometrical finiteness for hyperbolic groups, J. Funct. Anal. 113 (1993), p. 245–317. B. H. Bowditch, Spaces of geometrically finite representations, Ann. Acad. Sci. Fenn. Math. 23 (1998), p. 389–414. M. R. Bridson, A. Haefliger, Metric spaces of non-positive curvature, Grundlehren der mathematischen Wissenschaften 319, Springer-Verlag, Berlin, 1999. M. Bridgeman, R. D. Canary, F. Labourie, A. Sambarino, The Pressure metric for Anosov representations, Geom. Funct. Anal. 25 (2015), p. 1089–1179. J. Brock, R. D. Canary, Y. N. Minsky, The classification of Kleinian surface groups, II: The Ending Lamination Conjecture, Ann. of Math. 176 (2012), p. 1–149. M. Burger, Intersection, the Manhattan curve, and Patterson–Sullivan theory in rank 2, Int. Math. Res. Not. 7 (1993), p. 217–225. S. Buyalo, V. Schröder, Extension of Lipschitz maps into 3-manifolds, Asian J. Math. 5 (2001), p. 685–704. F. Dal’Bo, M. Peigné, Groupes du ping-pong et géodésiques fermées en courbure −1, Ann. Inst. Fourier 46 (1996), p. 755–799. F. Dal’Bo, J.-P. Otal, M. Peigné, Séries de Poincaré des groupes géométriquement finis, Israel J. Math. 118 (2000), p. 109–124. J. Danciger, F. Guéritaud, F. Kassel, Geometry and topology of complete Lorentz spacetimes of constant curvature, Ann. Éc. Norm. Sup. 49 (2016), p. 1– 57. B. Delaunay, Sur la sphère vide, Izvestia Akademii Nauk SSSR, Otdelenie Matematicheskikh i Estestvennykh Nauk (1934), p. 793–800. S. Dumitrescu, A. Zeghib, Global rigidity of holomorphic Riemannian metrics on compact complex 3-manifolds, Math. Ann. 345 (2009), p. 53–81. É. Ghys, Déformations des structures complexes sur les espaces homogènes de SL2 (C), J. Reine Angew. Math. 468 (1995), p. 113–138. W. M. Goldman, Nonstandard Lorentz space forms, J. Differential Geom. 21 (1985), p. 301–308. S. Helgason, Differential geometry, Lie groups, and symmetric spaces, corrected reprint of the 1978 original, Graduate Studies in Mathematics 34, American Mathematical Society, Providence, RI, 2001. F. Kassel, Quotients compacts d’espaces homogènes réels ou p-adiques, PhD thesis, Université Paris-Sud 11, November 2009, available at http://math.univ-lille1.fr/∼kassel/. F. Kassel, Proper actions on corank-one reductive homogeneous spaces, J. Lie Theory 18 (2008), p. 961–978. F. Kassel, Quotients compacts des groupes ultramétriques de rang un, Ann. Inst. Fourier 60 (2010), p. 1741–1786. F. Kassel, Deformation of proper actions on reductive homogeneous spaces, Math. Ann. 353 (2012), p. 599–632. F. Kassel, T. Kobayashi, Poincaré series for non-Riemannian locally symmetric spaces, Adv. Math. 287 (2016), p. 123–236. I. Kim, Ergodic theory and rigidity on the symmetric spaces of non-compact type, Ergodic Theory Dynam. Systems 21 (2001), p. 93–114. 120 [Kir] [Kl] [Ko1] [Ko2] [Ko3] [Ko4] [KR] [L] [LPS] [LS] [LN] [Ma] [M1] [M2] [PT] [Par] [Pat] [Ro1] [Ro2] [Sa] [Se] [S1] [S2] [T1] [T2] FRANÇOIS GUÉRITAUD AND FANNY KASSEL M. D. Kirszbraun, Über die zusammenziehende und Lipschitzsche Transformationen, Fund. Math. 22 (1934), p. 77–108. B. Klingler, Complétude des variétés lorentziennes à courbure constante, Math. Ann. 306 (1996), p. 353–370. T. Kobayashi, Proper action on a homogeneous space of reductive type, Math. Ann. 285 (1989), p. 249–263. T. Kobayashi, On discontinuous groups acting on homogeneous spaces with noncompact isotropy subgroups, J. Geom. Phys. 12 (1993), p. 133–144. T. Kobayashi, Criterion for proper actions on homogeneous spaces of reductive groups, J. Lie Theory 6 (1996), p. 147–163. T. Kobayashi, Deformation of compact Clifford–Klein forms of indefiniteRiemannian homogeneous manifolds, Math. Ann. 310 (1998), p. 394–408. R. S. Kulkarni, F. Raymond, 3-dimensional Lorentz space-forms and Seifert fiber spaces, J. Differential Geom. 21 (1985), p. 231–268. S. P. Lalley, Renewal theorems in symbolic dynamics, with applications to geodesic flows, non-Euclidean tessellations and their fractal limits, Acta Math. 163 (1989), p. 1–55. U. Lang, B. Pavlović, V. Schröder, Extensions of Lipschitz maps into Hadamard spaces, Geom. Funct. Anal. 10 (2000), p. 1527–1553. U. Lang, V. Schröder, Kirszbraun’s Theorem and metric spaces of bounded curvature, Geom. Funct. Anal. 7 (1997), p. 535–560. J. R. Lee, A. Naor, Extending Lipschitz functions via random partitions, Invent. Math. 160 (2005), p. 59–95. A. Marden, The geometry of finitely generated kleinian groups, Ann. of Math. 99 (1974), p. 383–462. C. T. McMullen, Cusps are dense, Ann. of Math. 133 (1991), p. 217–247. C. T. McMullen, Hausdorff dimension and conformal dynamics. I. Strong convergence of Kleinian groups, J. Differential Geom. 51 (1999), p. 471–515. A. Papadopoulos, G. Théret, Shortening all the simple closed geodesics on surfaces with boundary, Proc. Amer. Math. Soc. 138 (2010), p. 1775–1784. A. Parreau, Dégénérescences de sous-groupes discrets de groupes de Lie semisimples et actions de groupes sur des immeubles affines, PhD thesis, Université Paris-Sud 11, January 2000, see http://www-fourier.ujf-grenoble.fr/∼parreau/travaux/these.pdf. S. J. Patterson, The limit set of a Fuchsian group, Acta Math. 136 (1976), p. 241–273. T. Roblin, Sur la fonction orbitale des groupes discrets en courbure négative, Ann. Inst. Fourier 52 (2002), p. 145–151. T. Roblin, Ergodicité et équidistribution en courbure négative, Mém. Soc. Math. Fr. 95 (2003). F. Salein, Variétés anti-de Sitter de dimension 3 exotiques, Ann. Inst. Fourier 50 (2000), p. 257–284. A. Selberg, On discontinuous groups in higher-dimensional symmetric spaces (1960), in “Collected papers”, vol. 1, p. 475–492, Springer-Verlag, Berlin, 1989. D. Sullivan, The density at infinity of a discrete group of hyperbolic motions, Publ. Math. Inst. Hautes Études Sci. 50 (1979), p. 419–450. D. Sullivan, Entropy, Hausdorff measures old and new, and limit sets of geometrically finite Kleinian groups, Acta Math. 153 (1984), p. 259–277. W. P. Thurston, The geometry and topology of 3-manifolds, Princeton University mimeographed notes, 1977, see http://library.msri.org/books/gt3m/. W. P. Thurston, Minimal stretch maps between hyperbolic surfaces, preprint (1986), arXiv:9801039. MAXIMALLY STRETCHED LAMINATIONS [V] [Z] 121 F. A. Valentine, Contractions in non-Euclidean spaces, Bull. Amer. Math. Soc. 50 (1944), p. 710–713. A. Zeghib, On closed anti-de Sitter spacetimes, Math. Ann. 310 (1998), p. 695– 716. CNRS and Université Lille 1, Laboratoire Paul Painlevé, 59655 Villeneuve d’Ascq Cedex, France E-mail address: [email protected] [email protected]
4math.GR
Under review as a conference paper at ICLR 2017 L EARNING P YTHON C ODE S UGGESTION S PARSE P OINTER N ETWORK WITH A arXiv:1611.08307v1 [cs.NE] 24 Nov 2016 Avishkar Bhoopchand, Tim Rocktäschel, Earl Barr & Sebastian Riedel Department of Computer Science University College London [email protected], {t.rocktaschel,e.barr,s.riedel}@cs.ucl.ac.uk A BSTRACT To enhance developer productivity, all modern integrated development environments (IDEs) include code suggestion functionality that proposes likely next tokens at the cursor. While current IDEs work well for statically-typed languages, their reliance on type annotations means that they do not provide the same level of support for dynamic programming languages as for statically-typed languages. Moreover, suggestion engines in modern IDEs do not propose expressions or multi-statement idiomatic code. Recent work has shown that language models can improve code suggestion systems by learning from software repositories. This paper introduces a neural language model with a sparse pointer network aimed at capturing very longrange dependencies. We release a large-scale code suggestion corpus of 41M lines of Python code crawled from GitHub. On this corpus, we found standard neural language models to perform well at suggesting local phenomena, but struggle to refer to identifiers that are introduced many tokens in the past. By augmenting a neural language model with a pointer network specialized in referring to predefined classes of identifiers, we obtain a much lower perplexity and a 5 percentage points increase in accuracy for code suggestion compared to an LSTM baseline. In fact, this increase in code suggestion accuracy is due to a 13 times more accurate prediction of identifiers. Furthermore, a qualitative analysis shows this model indeed captures interesting long-range dependencies, like referring to a class member defined over 60 tokens in the past. 1 I NTRODUCTION Integrated development environments (IDEs) are essential tools for programmers. Especially when a developer is new to a codebase, one of their most useful features is code suggestion: given a piece of code as context, suggest a likely sequence of next tokens. Typically, the IDE suggests an identifier or a function call, including API calls. While extensive support exists for statically-typed languages such as Java, code suggestion for dynamic languages like Python is harder and less well supported because of the lack of type annotations. Moreover, suggestion engines in modern IDEs do not propose expressions or multi-statement idiomatic code. Recently, methods from statistical natural language processing (NLP) have been used to train code suggestion systems from code usage in large code repositories (Hindle et al., 2012; Allamanis & Sutton, 2013; Tu et al., 2014). To this end, usually an n-gram language model is trained to score possible completions. Neural language models for code suggestion (White et al., 2015; Das & Shah, 2015) have extended this line of work to capture more long-range dependencies. Yet, these standard neural language models are limited by the so-called hidden state bottleneck, i.e., all context information has to be stored in a fixed-dimensional internal vector representation. This limitation restricts such models to local phenomena and does not capture very long-range semantic relationships like suggesting calling a function that has been defined many tokens before. To address these issues, we create a large corpus of 41M lines of Python code by using a heuristic for crawling high-quality code repositories from GitHub. We investigate, for the first time, the use of attention (Bahdanau et al., 2014) for code suggestion and find that, despite a substantial improvement 1 Under review as a conference paper at ICLR 2017 in accuracy, it still makes avoidable mistakes. Hence, we introduce a model that leverages long-range Python dependencies by selectively attending over the introduction of identifiers as determined by examining the Abstract Syntax Tree. The model is a form of pointer network (Vinyals et al., 2015a), and learns to dynamically choose between syntax-aware pointing for modeling long-range dependencies and free form generation to deal with local phenomena, based on the current context. Our contributions are threefold: (i) We release a code suggestion corpus of 41M lines of Python code crawled from GitHub, (ii) We introduce a sparse attention mechanism that captures very long-range dependencies for code suggestion of this dynamic programming language efficiently, and (iii) We provide a qualitative analysis demonstrating that this model is indeed able to learn such long-range dependencies. 2 M ETHODS We first revisit neural language models, before briefly describing how to extend such a language model with an attention mechanism. Then we introduce a sparse attention mechanism for a pointer network that can exploit the Python abstract syntax tree of the current context for code suggestion. 2.1 N EURAL L ANGUAGE M ODEL Code suggestion can be approached by a language model that measures the probability of observing a sequence of tokens in a Python program. For example, for the sequence S = a1 , . . . , aN , the joint probability of S factorizes according to Pθ (S) = Pθ (a1 ) · N Y Pθ (at | at−1 , . . . , a1 ) (1) t=2 where the parameters θ are estimated from a training corpus. Given a sequence of Python tokens, we seek to predict the next M tokens at+1 , . . . , at+M that maximize Equation 1 arg max Pθ (a1 , . . . , at , at+1 , . . . , at+M ). (2) at+1 , ..., at+M In this work, we build upon neural language models using Recurrent Neural Networks (RNNs) and Long Short-Term Memory (LSTM, Hochreiter & Schmidhuber, 1997). This neural language model estimates the probabilities in Equation 1 using the output vector of an LSTM at time step t (denoted ht here) according to exp (vτT ht + bτ ) T 0 τ 0 exp (vτ 0 ht + bτ ) Pθ (at = τ | at−1 , . . . , a1 ) = P (3) where vτ is a parameter vector associated with token τ in the vocabulary. Neural language models can, in theory, capture long-term dependencies in token sequences through their internal memory. However, as this internal memory has fixed dimension and can be updated at every time step, such models often only capture local phenomena. In contrast, we are interested in very long-range dependencies like referring to a function identifier introduced many tokens in the past. For example, a function identifier may be introduced at the top of a file and only used near the bottom. In the following, we investigate various external memory architectures for neural code suggestion. 2.2 ATTENTION A straight-forward approach to capturing long-range dependencies is to use a neural attention mechanism (Bahdanau et al., 2014) on the previous K output vectors of the language model. Attention mechanisms have been successfully applied to sequence-to-sequence tasks such as machine translation (Bahdanau et al., 2014), question-answering (Hermann et al., 2015), syntactic parsing (Vinyals et al., 2015b), as well as dual-sequence modeling like recognizing textual entailment (Rocktäschel et al., 2016). The idea is to overcome the hidden-state bottleneck by allowing referral back to previous output vectors. Recently, these mechanisms were applied to language modelling by Cheng et al. (2016) and Tran et al. (2016). 2 Under review as a conference paper at ICLR 2017 Formally, an attention mechanism with a fixed memory Mt ∈ Rk×K of K vectors mi ∈ Rk for i ∈ [1, K], produces an attention distribution αt ∈ RK and context vector ct ∈ Rk at each time step t according to Equations 4 to 7. Furthermore, W M , W h ∈ Rk×k and w ∈ Rk are trainable parameters. Finally, note that 1K represents a K-dimensional vector of ones. Mt = [m1 . . . mK ] Gt = tanh(W M Mt + 1TK (W h ht )) T αt = softmax(w Gt ) ct = Mt αTt ∈ Rk×K (4) ∈R k×K (5) ∈R 1×K (6) ∈R k (7) For language modeling, we populate Mt with a fixed window of the previous K LSTM output vectors. To obtain a distribution over the next token we combine the context vector ct of the attention mechanism with the output vector ht of the LSTM using a trainable projection matrix W A ∈ Rk×2k . The resulting final output vector nt ∈ Rk encodes the next-word distribution and is projected to the size of the vocabulary |V |. Subsequently, we apply a softmax to arrive at a probability distribution yt ∈ R|V | over the next token. This process is presented in Equation 9 where WV ∈ R|V |×k and bV ∈ R|V | are trainable parameters.    h nt = tanh W A t ∈ Rk (8) ct yt = softmax(W V nt + bV ) ∈ R|V | (9) The problem of the attention mechanism above is that it quickly becomes computationally expensive for large K. Moreover, attending over many memories can make training hard as a lot of noise is introduced in early stages of optimization where the LSTM outputs (and thus the memory Mt ) are more or less random. To alleviate these problems we now turn to pointer networks and a simple heuristic for populating Mt that permits the efficient retrieval of identifiers in a large history of Python code. 2.3 S PARSE P OINTER N ETWORK We develop an attention mechanism that provides a filtered view of a large history of Python tokens. At any given time step, the memory consists of context representations of the previous K identifiers introduced in the history. This allows us to model long-range dependencies found in identifier usage. For instance, a class identifier may be declared hundreds of lines of code before it is used. Given a history of Python tokens, we obtain a next-word distribution from a weighed average of the sparse pointer network for identifier reference and a standard neural language model. The weighting of the two is determined by a controller. Formally, at time-step t, the sparse pointer network operates on a memory Mt ∈ Rk×K of only the K previous identifier representations (e.g. function identifiers, class identifiers and so on). In addition, we maintain a vector mt = [id1 , . . . , idK ] ∈ NK of symbol ids for these identifier representations (i.e. pointers into the large global vocabulary). As before, we calculate a context vector ct using the attention mechanism (Equation 7), but on a memory Mt only containing representations of identifiers that were declared in the history. Next, we obtain a pseudo-sparse distribution over the global vocabulary from  αt [j] if mt [j] = i st [i] = (10) −C otherwise ∈ R|V | it = softmax(st ) (11) where −C is a large negative constant (e.g. −1000). In addition, we calculate a next-word distribution from a standard neural language model yt = softmax(W V ht + bV ) 3 ∈ R|V | (12) Under review as a conference paper at ICLR 2017 Figure 1: Sparse pointer network for code suggestion on a Python code snippet, showing the nextword distributions of the language model and identifier attention and their weighted combination through λ and we use a controller to calculate a distribution λt ∈ R2 over the language model and pointer network for the final weighted next-word distribution yt∗ via " # ht hλt = xt ∈ R3k (13) ct λt = softmax(W λ hλt + bλ ) yt∗ ∈ R2 ∈R = [yt it ] λt |V | (14) (15) Here, xt is the representation of the input token, and W λ ∈ R2×3k and bλ ∈ R2 a trainable weight matrix and bias respectively. This controller is conditioned on the input, output and context representations. This means for deciding whether to refer to an identifier or generate from the global vocabulary, the controller has access to information from the encoded next-word distribution ht of the standard neural language model, as well as the attention-weighted identifier representations ct from the current history. Figure 1 overviews this process. In it, the identifier base_path appears twice, once as an argument to a function and once as a member of a class (denoted by *). Each appearance has a different id in the vocabulary and obtains a different probability from the model. In the example, the model correctly chooses to refer to the member of the class instead of the out-of-scope function argument, although, from a user point-of-view, the suggestion would be the same in both cases. 3 L ARGE - SCALE P YTHON C ORPUS Previous work on code suggestion either focused on statically-typed languages (particularly Java) or trained on very small corpora. Thus, we decided to collect a new large-scale corpus of the dynamic programming language Python. According to the programming language popularity website Pypl (Carbonnelle, 2016), Python is the second most popular language after Java. It is also the 3rd most common language in terms of number of repositories on the open-source code repository GitHub, after JavaScript and Java (Zapponi, 2016). We collected a corpus of 41M lines of Python code from GitHub projects. Ideally, we would like this corpus to only contain high-quality Python code, as our language model learns to suggest code from how users write code. However, it is difficult to automatically assess what constitutes high-quality code. Thus, we resort to the heuristic that popular code projects tend to be of good quality, There are 4 Under review as a conference paper at ICLR 2017 Table 1: Python corpus statistics. Dataset #Projects #Files #Lines #Tokens Vocabulary Size Train Dev Test 489 179 281 118 298 26 466 43 062 26 868 583 5 804 826 8 398 100 88 935 698 18 147 341 30 178 356 2 323 819 Total 949 187 826 41 071 509 137 261 395 Figure 2: Example of the Python code normalization. Original file on the left and normalized version on the right. two metrics on GitHub that we can use for this purpose, namely stars (similar to bookmarks) and forks (copies of a repository that allow users to freely experiment with changes without affecting the original repository). Similar to Allamanis & Sutton (2013) and Allamanis et al. (2014), we select Python projects with more than 100 stars, sort by the number of forks descending, and take the top 1000 projects. We then removed projects that did not compile with Python3, leaving us with 949 projects. We split the corpus on the project level into train, dev, and test. Table 1 presents the corpus statistics. 3.1 N ORMALIZATION OF I DENTIFIERS Unsurprisingly, the long tail of words in the vocabulary consists of rare identifiers. To improve generalization, we normalize identifiers before feeding the resulting token stream to our models. That is, we replace every identifier name with an anonymous identifier indicating the identifier group (class, variable, argument, attribute or function) concatenated with a random number that makes the identifier unique in its scope. Note that we only replace novel identifiers defined within a file. Identifier references to external APIs and libraries are left untouched. Consistent with previous corpus creation for code suggestion (e.g. Khanh Dam et al., 2016; White et al., 2015), we replace numerical constant tokens with $NUM$, remove comments, reformat the code, and replace tokens appearing less than five times with an $OOV$ (out of vocabulary) token. 4 E XPERIMENTS Although previous work by White et al. (2015) already established that a simple neural language model outperforms an n-gram model for code suggestion, we include a number of n-gram baselines to confirm this observation. Specifically, we use n-gram models for n ∈ {3, 4, 5, 6} with Modified Kneser-Ney smoothing (Kneser & Ney, 1995) from the Kyoto Language Modelling Toolkit (Neubig, 2012). We train the sparse pointer network using mini-batch SGD with a batch size of 30 and truncated backpropagation through time (Werbos, 1990) with a history of 20 identifier representations. We use 5 Under review as a conference paper at ICLR 2017 Table 2: Perplexity (PP), Accuracy (Acc) and Accuarcy among top 5 predictions (Acc@5). Model Train PP 3-gram 4-gram 5-gram 6-gram Dev PP Test PP Acc [%] Acc@5 [%] All IDs Other All IDs Other 12.90 7.60 4.52 3.37 24.19 21.07 19.33 18.73 26.90 23.85 21.22 20.17 13.19 13.68 13.90 14.51 – – – – – – – – 50.81 51.26 51.49 51.76 – – – – – – – – LSTM LSTM w/ Attention 20 LSTM w/ Attention 50 9.29 7.30 7.09 13.08 11.07 9.83 14.01 11.74 10.05 57.91 61.30 63.21 2.1 21.4 30.2 62.8 64.8 65.3 76.30 79.32 81.69 4.5 29.9 41.3 82.6 83.7 84.1 Sparse Pointer Network 6.41 9.40 9.18 62.97 27.3 64.9 82.62 43.6 84.5 an initial learning rate of 0.7 and decay it by 0.9 after every epoch. As additional baselines, we test a neural language model with LSTM units with and without attention. For the attention language models, we experiment with a fixed-window attention memory of the previous 20 and 50 tokens respectively, and a batch size of 75. All neural language models were developed in TensorFlow (Abadi et al., 2016) and trained using cross-entropy loss. While processing a Python source code file, the last recurrent state of the RNN is fed as the initial state of the subsequent sequence of the same file and reset between files. All models use an input and hidden size of 200, an LSTM forget gate bias of 1 (Jozefowicz et al., 2015), gradient norm clipping of 5 (Pascanu et al., 2013), and randomly initialized parameters in the interval (−0.05, 0.05). As regularizer, we use a dropout of 0.1 on the input representations. Furthermore, we use a sampled softmax (Jean et al., 2015) with a log-uniform sampling distribution and a sample size of 1000. 5 R ESULTS We evaluate all models using perplexity (PP), as well as accuracy of the top prediction (Acc) and the top five predictions (Acc@5). The results are summarized in Table 2. We can confirm that for code suggestion neural models outperform n-gram language models by a large margin. Furthermore, adding attention improves the results substantially (2.3 lower perplexity and 3.4 percentage points increased accuracy). Interestingly, this increase can be attributed to a superior prediction of identifiers, which increased from an accuracy of 2.1% to 21.4%. An LSTM with an attention window of 50 gives us the best accuracy for the top prediction. We achieve further improvements for perplexity and accuracy of the top five predictions by using a sparse pointer network that uses a smaller memory of the past 20 identifier representations. 5.1 Q UALITATIVE A NALYSIS Figures 3a-d show a code suggestion example involving an identifier usage. While the LSTM baseline is uncertain about the next token, we get a sensible prediction by using attention or the sparse pointer network. The sparse pointer network provides more reasonable alternative suggestions beyond the correct top suggestion. Figures 3e-h show the use-case referring to a class attribute declared 67 tokens in the past. Only the Sparse Pointer Network makes a good suggestion. Furthermore, the attention weights in 3i demonstrate that this model distinguished attributes from other groups of identifiers. We give a full example of a token-by-token suggestion of the Sparse Pointer Network in Figure 4 in the Appendix. 6 R ELATED W ORK Previous code suggestion work using methods from statistical NLP has mostly focused on n-gram models. Much of this work is inspired by Hindle et al. (2012) who argued that real programs fall 6 Under review as a conference paper at ICLR 2017 (a) Code snippet for referencing variable. (b) LSTM Model. (c) LSTM w/ Attention (d) Sparse Pointer Net50. work. (e) Code snippet for referencing class member. (f) LSTM Model. (g) LSTM w/ Attention (h) Sparse Pointer Net50. work. (i) Sparse Pointer Network attention over memory of identifier representations. Figure 3: Code suggestion example involving a reference to a variable (a-d), a long-range dependency (e-h), and the attention weights of the Sparse Pointer Network (i). into a much smaller space than the flexibility of programming languages allows. They were able to capture the repetitiveness and predictable statistical properties of real programs using language models. Subsequently, Tu et al. (2014) improved upon Hindle et al.’s work by adding a cache mechanism that allowed them to exploit locality stemming from the specialisation and decoupling of program modules. Tu et al.’s idea of adding a cache mechanism to the language model is specifically designed to exploit the properties of source code, and thus follows the same aim as the sparse attention mechanism introduced in this paper. While the majority of preceding work trained on small corpora, Allamanis & Sutton (2013) created a corpus of 352M lines of Java code which they analysed with n-gram language models. The size of the corpus allowed them to train a single language model that was effective across multiple different project domains. White et al. (2015) later demonstrated that neural language models outperform n-gram models for code suggestion. They compared various n-gram models (up to nine grams), including Tu et al.’s cache model, with a basic RNN neural language model. Khanh Dam et al. (2016) compared White et al.’s basic RNN with LSTMs and found that the latter are better at code suggestion due to their improved ability to learn long-range dependencies found in source code. Our paper extends this line of work by introducing a sparse attention model that captures even longer dependencies. The combination of lagged attention mechanisms with language modelling is inspired by Cheng et al. (2016) who equipped LSTM cells with a fixed-length memory tape rather than a single memory cell. They achieved promising results on the standard Penn Treebank benchmark corpus (Marcus et al., 1993). Similarly, Tran et al. added a memory block to LSTMs for language modelling of English, German and Italian and outperformed both n-gram and neural language models. Their memory encompasses representations of all possible words in the vocabulary rather than providing a sparse view as we do. An alternative to our purely lexical approach to code suggestion involves the use of probabilistic context-free grammars (PCFGs) which exploit the formal grammar specifications and well-defined, deterministic parsers available for source code. These were used by Allamanis & Sutton (2014) to extract idiomatic patterns from source code. A weakness of PCFGs is their inability to model context-dependent rules of programming languages such as that variables need to be declared before 7 Under review as a conference paper at ICLR 2017 being used. Maddison & Tarlow (2014) added context-aware variables to their PCFG model in order to capture such rules. Ling et al. (2016) recently used a pointer network to generate code from natural language descriptions. Our use of a controller for deciding whether to generate from a language model or copy an identifier using a sparse pointer network is inspired by their latent code predictor. However, their inputs (textual descriptions) are short whereas code suggestion requires capturing very long-range dependencies that we addressed by a filtered view on the memory of previous identifier representations. 7 C ONCLUSIONS AND F UTURE W ORK In this paper, we investigated neural language models for code suggestion of the dynamically-typed programming language Python. We released a corpus of 41M lines of Python crawled from GitHub and compared n-gram, standard neural language models, and attention. By using attention, we observed an order of magnitude more accurate prediction of identifiers. Furthermore, we proposed a sparse pointer network that can efficiently capture long-range dependencies by only operating on a filtered view of a memory of previous identifier representations. This model achieves the lowest perplexity and best accuracy among the top five predictions. The Python corpus and code for replicating our experiment is released at https://github.com/uclmr/pycodesuggest. The presented methods were only tested for code suggestion within the same Python file. We are interested in scaling the approach to the level of entire code projects and collections thereof, as well as integrating a trained code suggestion model into an existing IDE. Furthermore, we plan to work on code completion, i.e., models that provide a likely continuation of a partial token, using character language models (Graves, 2013). ACKNOWLEDGMENTS This work was supported by Microsoft Research through its PhD Scholarship Programme, an Allen Distinguished Investigator Award, and a Marie Curie Career Integration Award. R EFERENCES Martı́n Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, and Xiaoqiang Zhang. Tensorflow: A system for large-scale machine learning. CoRR, abs/1605.08695, 2016. URL http://arxiv.org/abs/1605. 08695. Miltiadis Allamanis and Charles Sutton. Mining idioms from source code. In Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 472–483, New York, NY, USA, 2014. ACM. ISBN 978-1-4503-3056-5. doi: 10.1145/2635868.2635901. URL http://doi.acm.org/10.1145/2635868.2635901. Miltiadis Allamanis and Charles A. Sutton. Mining source code repositories at massive scale using language modeling. In Thomas Zimmermann, Massimiliano Di Penta, and Sunghun Kim (eds.), MSR, pp. 207–216. IEEE Computer Society, 2013. ISBN 978-1-4673-2936-1. URL http://dblp.uni-trier.de/db/conf/msr/msr2013.html#AllamanisS13a. Miltiadis Allamanis, Earl T. Barr, Christian Bird, and Charles Sutton. Learning natural coding conventions. In Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 281–293, New York, NY, USA, 2014. ACM. ISBN 9781-4503-3056-5. doi: 10.1145/2635868.2635883. URL http://doi.acm.org/10.1145/ 2635868.2635883. Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. CoRR, abs/1409.0473, 2014. URL http://arxiv.org/abs/ 1409.0473. 8 Under review as a conference paper at ICLR 2017 Pierre Carbonnelle. Pypl popularity of programming language. http://pypl.github.io/ PYPL.html, 2016. URL http://pypl.github.io/PYPL.html. [Online; accessed 30August-2016]. Jianpeng Cheng, Li Dong, and Mirella Lapata. Long short-term memory-networks for machine reading. In Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, pp. 551–561. Association for Computational Linguistics, 2016. URL http:// aclweb.org/anthology/D16-1053. Subhasis Das and Chinmayee Shah. Contextual code completion using machine learning. 2015. Alex Graves. Generating sequences with recurrent neural networks. CoRR, abs/1308.0850, 2013. URL http://arxiv.org/abs/1308.0850. Karl Moritz Hermann, Tomás Kociský, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, and Phil Blunsom. Teaching machines to read and comprehend. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pp. 1693–1701, 2015. URL http://papers.nips.cc/paper/ 5945-teaching-machines-to-read-and-comprehend. Abram Hindle, Earl T. Barr, Zhendong Su, Mark Gabel, and Premkumar Devanbu. On the naturalness of software. In Proceedings of the 34th International Conference on Software Engineering, ICSE ’12, pp. 837–847, Piscataway, NJ, USA, 2012. IEEE Press. ISBN 978-1-4673-1067-3. URL http://dl.acm.org/citation.cfm?id=2337223.2337322. Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Comput., 9(8):1735– 1780, November 1997. ISSN 0899-7667. doi: 10.1162/neco.1997.9.8.1735. URL http://dx. doi.org/10.1162/neco.1997.9.8.1735. Sébastien Jean, Kyunghyun Cho, Roland Memisevic, and Yoshua Bengio. On using very large target vocabulary for neural machine translation. In Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (Volume 1: Long Papers), pp. 1–10, Beijing, China, July 2015. Association for Computational Linguistics. URL http://www.aclweb.org/anthology/P15-1001. Rafal Jozefowicz, Wojciech Zaremba, and Ilya Sutskever. An empirical exploration of recurrent network architectures. In David Blei and Francis Bach (eds.), Proceedings of the 32nd International Conference on Machine Learning (ICML-15), pp. 2342–2350. JMLR Workshop and Conference Proceedings, 2015. URL http://jmlr.org/proceedings/papers/v37/ jozefowicz15.pdf. H. Khanh Dam, T. Tran, and T. Pham. A deep language model for software code. ArXiv e-prints, August 2016. R. Kneser and H. Ney. Improved backing-off for m-gram language modeling. In Acoustics, Speech, and Signal Processing, 1995. ICASSP-95., 1995 International Conference on, volume 1, pp. 181–184 vol.1, May 1995. doi: 10.1109/ICASSP.1995.479394. Wang Ling, Edward Grefenstette, Karl Moritz Hermann, Tomas Kocisky, Andrew Senior, Fumin Wang, and Phil Blunsom. Latent predictor networks for code generation. arXiv preprint arXiv:1603.06744, 2016. Chris J Maddison and Daniel Tarlow. Structured generative models of natural source code. In International Conference on Machine Learning, 2014. Mitchell P. Marcus, Beatrice Santorini, and Mary Ann Marcinkiewicz. Building a large annotated corpus of english: The penn treebank. COMPUTATIONAL LINGUISTICS, 19(2):313–330, 1993. Graham Neubig. Kylm - the kyoto language modeling toolkit. http://www.phontron.com/ kylm/, 2012. URL http://www.phontron.com/kylm/. [Online; accessed 23-July2016]. 9 Under review as a conference paper at ICLR 2017 Razvan Pascanu, Tomas Mikolov, and Yoshua Bengio. On the difficulty of training recurrent neural networks. In Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013, pp. 1310–1318, 2013. URL http://jmlr.org/ proceedings/papers/v28/pascanu13.html. Tim Rocktäschel, Edward Grefenstette, Karl Moritz Hermann, Tomas Kocisky, and Phil Blunsom. Reasoning about entailment with neural attention. In ICLR, 2016. Ke M. Tran, Arianna Bisazza, and Christof Monz. Recurrent memory networks for language modeling. In NAACL HLT 2016, The 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego California, USA, June 12-17, 2016, pp. 321–331, 2016. URL http://aclweb.org/anthology/N/ N16/N16-1036.pdf. Zhaopeng Tu, Zhendong Su, and Premkumar Devanbu. On the localness of software. In Proceedings of the 22Nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, pp. 269–280, New York, NY, USA, 2014. ACM. ISBN 978-1-4503-3056-5. doi: 10.1145/2635868.2635875. URL http://doi.acm.org/10.1145/2635868.2635875. Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. Pointer networks. In Advances in Neural Information Processing Systems, pp. 2692–2700, 2015a. Oriol Vinyals, Lukasz Kaiser, Terry Koo, Slav Petrov, Ilya Sutskever, and Geoffrey E. Hinton. Grammar as a foreign language. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pp. 2773–2781, 2015b. URL http://papers.nips.cc/paper/ 5635-grammar-as-a-foreign-language. Paul J Werbos. Backpropagation through time: what it does and how to do it. Proceedings of the IEEE, 78(10):1550–1560, 1990. Martin White, Christopher Vendome, Mario Linares-Vásquez, and Denys Poshyvanyk. Toward deep learning software repositories. In Proceedings of the 12th Working Conference on Mining Software Repositories, MSR ’15, pp. 334–345, Piscataway, NJ, USA, 2015. IEEE Press. URL http://dl.acm.org/citation.cfm?id=2820518.2820559. Carlo Zapponi. Githut - programming languages and github. http://githut.info/, 2016. URL http://githut.info/. [Online; accessed 19-August-2016]. 10 Under review as a conference paper at ICLR 2017 A PPENDIX Figure 4: Full example of code suggestion with a Sparse Pointer Network. Boldface tokens on the left show the first declaration of an identifier. The middle part visualizes the memory of representations of these identifiers. The right part visualizes the output λ of the controller, which is used for interpolating between the language model (LM) and the attention of the pointer network (Att). 11
9cs.NE
GENE ONTOLOGY (GO) PREDICTION USING MACHINE LEARNING METHODS HAOZE WU * Department of Mathematics and Computer Science, Davidson College Box 5996, Davidson, North Carolina, 28035, USA [email protected] YANGYU ZHOU *1 Biology Department, Davidson College Box 6891, Davidson, North Carolina, 28035, USA [email protected] We applied machine learning to predict whether a gene is involved in axon regeneration. We extracted 31 features from different databases and trained five machine learning models. Our optimal model, a Random Forest Classifier with 50 submodels, yielded a test score of 85.71%, which is 4.1% higher than the baseline score. We concluded that our models have some predictive capability. Similar methodology and features could be applied to predict other Gene Ontology (GO) terms. Keywords: Gene Ontology; Machine Learning; Axon Regeneration 1. Introduction Demand for bioinformatics methods to analyze genomic information has never been greater. Researchers are particularly interested in the overall functions of genes. Despite the best curation efforts, functions of genes remain incomplete and biased toward much-studied genes and pathways. Machine learning methods have been extensively used to identify functional elements of a gene, such as transcription start sites, promoters, and transcription factor binding sites 1. However, few studies have applied machine learning to predict whether a gene has certain function, that is, whether a gene is involved in a particular biological process. * HaoZe Wu and YangYu Zhou are co-authors. As a proof-of-concept, in this paper, we aim to predict whether a gene is involved in axon regeneration in C. elegans. To establish the dataset, we find definitively positive or negative samples from literature and engineer features with the information provided with several on-line databases. We train five classifiers and assess the performance of each one of them. In the following sections, we will first briefly introduce some biology background and show how we extract features and establish the dataset. After that, we will present our methodology of training and evaluating different machine learning models. Finally, we will present and discuss our results. 2. BACKGROUND As a proof-of-concept, we chose to test the performance of our tool on axon regeneration (GO:0031103) in model organism Caenorhabditis elegans genome. We chose to analyze the genome of C. elegans, because of its well-annotated genome and vast amount of knowledge available in the scientific community. Gene ontology associates a gene and the biological function of the gene's product. There are 24500+ gene ontology terms, each term describes a biological function. The structure of GO terms resembles a directed acyclic graph (DAG), with the most general term (biological process, GO: 0008150) at the root of the graph, and the most specific terms (including the one we are concerned with, axon regeneration, GO:0031103) at the leaves. Damaged axons can sometime regenerate, restoring connections to target tissues after injury or disease. However, axon regeneration is initiated by intrinsic and extrinsic signals at the site of injury, such as neuron type, age, type of surrounding tissues and more. It is thought that the heterogeneity arises partially from regulation at the genetic level, including methylation of genome and chromatin structure. Transcription of certain key genes and synthesis of proteins are also required for successful axon regeneration. To achieve the highest predictive capabilities, eleven features were selected (Table 1). Table 1. Features, and their sources, used as input to the machine learning models. # 1 Feature Gene length 2 RNA-seq expression Mean GO distance 3 4 Minimum GO distance 5 ChIP-seq score 6 Avg. Sequence conservation Std dev Sequence conservation Ratio of positive interacting proteins Number of positive interacting proteins Phenotype association GO enriched terms 7 8 9 10 11 Description The length of a gene (in basepair) starting from its transcription start site (TSS) Gene expression level under standard conditions Database UCSC modENCODE The mean distance of all GO terms of a gene to GO:0031103 (axon regeneration) in the graph representation of all GO terms The minimum distance among the distances between a gene’s GO terms and GO: 0031103 (axon regeneration). ChIP-seq expression profile on young adult worms. Average conservation score of 15% length of the gene upstream of its TSS Standard deviation of score of 15% length of the gene upstream of its TSS AmiGo2 WormBase Among the proteins that interact with a gene, what ratio of them are products of positive genes. STRING Among the proteins that interact with a gene, how many of them are products of positive genes. STRING Whether a gene has the phenotypes that are most common in the dataset Whether a gene has the GO terms that are most common in the dataset. STRING AmiGo2 WormBase WormBase WormBase WormBase WormBase 2.1. Sequence conservation Conserved sequences are identical DNA sequences across different species. A region of high conservation score indicates that this segment of DNA is highly identical among species, suggesting that it may encode proteins of important biological functions so that it has been protected throughout evolution despite speciation. 2.2. Protein-protein interaction Proteins often interact with other proteins when performing biological functions such as signal transduction and cellular metabolism. Multiple transcription factors often act together when regulating gene expressions. 2.3. Phenotype association Phenotype is the observable characteristics of an organism, such as morphology and behavior. The phenotype largely results from the genotype, the expression of genes. In this paper, the phenotype of a gene refers to the abnormal changes when the gene is deleted. 2.4. ChIP-seq Chromatin Immunoprecipitation (ChIP) in combination with massive parallel DNA sequencing is a technique that identifies the binding sites of DNA binding proteins. Promoters of genes usually are high in ChIP-seq score due to high levels of transcription factor binding. 2.5. RNA-seq RNA sequencing quantifies the levels of transcriptions of genes genome-wide. Similar to ChIP-seq data, RNA-seq measures how active the gene is at a given time. We used RNA-seq data of young adult worms living at standard conditions. 3. Data Preprocessing Our samples are different genes, and our target variable is a boolean value that represents whether a gene is involved in axon regeneration. To determine whether a gene is involved in axon regeneration, we searched literature for definitive positive examples (genes that are for sure involved in axon regeneration) and negative examples (for sure not involved). We found three papers that describe 347 positive genes and 1401 negative genes in total2,3,4. Since most of the datasets have different formats, we wrote programs to extract useful information and compiled them into a structured format. Here we will briefly introduce the algorithms we used to extract some features and make further clarification on some features. 3.1. GO distance Each gene has several gene ontology terms. To get the distance between each of a gene's GO terms to the GO term GO:0031103 (axon regeneration), we first created a graph representation of all GO terms that captured the relationships between them, and then obtained the shortest distance between two GO terms with the Dijkstra's algorithm. 3.2. Protein interaction We first constructed a graph representation of protein interactions. Each vertex constitutes a protein, and each edge xy constitutes an interaction between protein x and y. Given a gene, we searched its neighborhood and looked for the neighbors that are protein products of the known positive examples. The data we obtained from different databases were well-established, so that we did not have a lot of missing values. We imputed missing values with mean imputation. Then, we randomly chose 20% of the dataset (350 samples) as the testing set, and used the rest 80% (1398 samples) for training and validation. From now on in this paper, for sake of convenience, we will refer to the 80% samples for training and cross-validation as the ``dataset." We will refer to the rest 20% samples as the ``testing set," as usual. Finally, we mean-normalized the dataset and the testing set. 4. Experiment We trained five different classifiers, K-nearest Neighbor (K-NN), Random Forest (RF), Logistic Regression, Support Vector Machine (SVC), and Neural Network (NN). The Neural Network model we used was a single-layer feedforward Neural Network Classifier. We used the Python Scikit-learn implementations of these models scikit-learn 5. We evaluated a model primarily based on its accuracy. In this paper, we will use the words ``score" and ``accuracy" interchangeably. We will use ``test score" to refer to the accuracy of a model on the test set; and we will use ``validation score" to refer to the mean cross-validation accuracy of a model. Besides the scores, we were also interested in the models' performance on predicting positive samples. Therefore, we recorded the precision and recall on the test set for each model. For each classifier, we tuned several hyperparameters. For each hyperparameter, we conducted a grid search for the optimal value. Table 2 shows the hyperparameters we tuned for each model, and the ranges of the grid searches. Table 2. Hyperparameters tuned for different models. Model Logistic K-NN RF SVC NN - Hyperparameters and Range of Grid Search Penalty parameter {0.001, 0.01, 0.1, 1, 10} # of neighbors (1-13 with step size 2) Distance metric {Euclidean, manhattan} Weight function {uniform, distance} # of components (10 – 100 with step size 10) Kernel {linear, rbf, sigmoid, 2nd poly} Penalty parameter {0.001, 0.01, 0.1, 1, 10} # of perceptrons (2 – 16 with step size 2) Penalty parameter {0.0001, 0.001, 0.01, 0.1, 1} Learning rate {adaptive, constant} Weight optimization algorithm {l-bfgs, sgd, adam} Besides, for K-NN, SVC, and Logistic, we tried to use Adaboost to enhance their performance. We also tried to enhance the last two classifiers with Bagging. For each model enhanced with these two meta-algorithms, we tuned the number of sub-classifiers of Adaboost or Bagging, with a grid search from 10 to 50, step size 10. We decided not to use Bagging to enhance K-NN because that would create similar effect to a weighted version of K-NN, while we would tune the weight function as a hyperparameter for the K-NN classifier. To compare models of a classifier with different values of hyperparameters, we conducted cross-validation. However, due to the small size of our dataset, we wanted to maximize the size of the training set while receiving stable validation scores. Therefore, we used leave-one-out cross-validation, that is, for each sample in the dataset, we trained a model with the rest of the samples, and predicted the target variable of that sample. In this case, the validation set is the entire dataset, and the cross-validation score would be the mean of the accuracies of all predictions (either 100% or 0%). For each optimized classifier, we reported its validation score, test score, (test) precision, and (test) recall. We also compared the validation scores of the five models horizontally, and chose the classifier with the highest score on the validation set as the model that has the highest predictive capability. To test whether our models have predictive capability, we also compared our models with the baseline model. Our training set contained 79.9% negative samples, and our test set contained 81.1% negative samples. If a model always predicted false, it would have a validation score of 79.9%, and a test score of 81.1%. Therefore, we decided that to outperform the baseline model, a model must have a validation score of more than 79.9% and a test score of more than 81.1%. 5. Results In this section, we introduce the training results of the five models in the order of their performances (from low to high). Then we compare the five models horizontally. 5.1. Logistic Regression We tuned the penalty parameter C for the Logistic Regressor and found that when C = 1, the model had the highest validation score. The model has a validation score of 79.01%, which is worse than the validation score of the baseline model. Therefore, we considered the Logistic Regressor a weak learner and used Adaboost to enhance its result. As shown by figure 1, as the number of sub-models increased, there was no significant improvement of the validation score. The model with 30 sub-models has the highest validation score. And this model has a test score of 80.57%, a precision of 42.86% and a recall of 9.09%. Though Adaboost did improve the accuracy of the Logistic Regressor, the boosted test score is still lower than the baseline. Fig. 1. Validation score vs. number of sub-models for Adaboost (Logisitic, C =1). On the other hand, Bagging led to even less improvement. Our best Bagging Logistic Regressor contains 40 sub-models, and has a validation score of 79.28%. This minimal improvement suggests that our original model did not have high variation. This is supported by figure 2 which shows that as the number of training examples increased, the training scores and the validation scores came close to each other. This means our model did not have a high variation. Fig 2. Learning Curve (Logisitic, C = 1). None of our Logistic Regression model has a test score higher than the baseline model. Therefore, we concluded that Logistic Regressor does not have predictive capability. 5.2. Neural Network (NN) We discovered that the optimal learning rate was "adaptive," and the optimal penalty parameter was 0.01. Figure 3 shows the validation scores of Neural Network with different weight optimization algorithms and numbers of perceptrons. The validation scores generally increased as the number of perceptrons increased. ``l-bfgs" and ``adam" yields comparable optimal results, while ``adam" is slightly better. Our best Neural Network model uses ``adam" as the weight optimization algorithm, and has 12 perceptrons in the hidden layer. It yielded a test score of 83.14%, a precision of 61.29%, and recall of 28.79%. Fig. 3. Cross-validating the number of perceptrons and the weight optimization algorithm for NN. 5.3. Support Vector Classifier (SVC) Figure 4 shows the validation scores of SVC models with different kernels and penalty parameters. As the penalty parameter increased, the validation scores increased for models using the ``rbf" and the ``2nd degree poly" kernels. The models using the ``sigmoid" kernel always yielded the baseline accuracy, 79.9%. The models using the ``linear" kernel yielded results worse than the baseline accuracy. Fig. 4. Cross-validating the kernel and penalty parameter for SVC. We tried to use Bagging and Adaboost to enhance the SVC, however, we received worse validation scores. We discovered that the optimal penalty parameter of SVC is 1, and the optimal kernel is ``rbf." Our optimal SVC model has a test score of 84.00%, a precision of 85.71%, and a recall of 18.18%. Fig. 5. Learning Curve (SVC, ‘rbf’ kernel, C = 1). 5.4. K-nearest Neighbors (K-NN) As shown by figure 6, models that used manhattan distance metric, and weighed the neighbors using the ``distance" weight function (weighing neighbors by the inverse of their distances to the input instance), were strictly better than the other models. On the other hand, we observed that the validation scores for manhattan distance models, and Euclidean distance models continued to increase as the number of neighbors $n$ increased, and there was no sign of convergence. Thus, we hypothesized that we had not found the optimal values of n for those two types of models and decided to cross-validate n by conducting a grid search with a wider range. Fig. 6. Validation scores of K-NN. Figure 7 supports our hypothesis. For the Euclidean distance models, the validation scores increased after n > 13 and started to decrease when n ≥ 17. For the manhattan distance models, the validation scores fluctuated and showed signs of convergence after n > 13. We discovered that the optimal K-NN classifier is a manhattan distance model that searches for 21 neighbors. This model yielded a validation score of 84.26%, a test score of 85.14%, a precision of 100%, and a recall of 21.21%. Fig. 7. Further cross-validation on the number of neighbors. We observed that for the unweighted K-NN models, the optimal value of n was only 3, which was significantly smaller than that for the weighted K-NN models. We hypothesized that weighted K-NN models correctly captured the characteristics of the dataset that predicative information was available in a fairly large neighborhood of an input instance, while the closer a neighbor was, the more important information it could provide. We tried to use Adaboost to enhance the K-NN, but there was no significant improvement. 5.5. Random Forest (RF) As shown by figure 8, the optimal number of sub-models n for Random Forest is 50. Normally, as n increases, the accuracy increases until convergence. However, this was not the case for us, the model's performance improved gradually when n ≤ 50, but when n > 50, the performance dropped and started to fluctuate. Fig. 8. Validation score vs. number of sub-models for Random Forest. Our best Random Forest model, with n = 50, yielded a test score of 85.71%, precision of 83.33%, and a recall of 30.30%. 5.6. Overall Analysis In this subsection, we first compare the performance of different classifiers; then we talk about some unrelated observations and hypotheses of our experiments, including • • The inefficiency of Adaboost; The insufficiency of training samples; • • The precision/recall trade-off; The decision boundary between positive and negative samples. Table 3. Comparison between different types of classifiers. Model Logistic NN SVC K-NN RF Validation Score 79.68% 82.19% 82.98% 84.26% 85.69% Test Score 80.57% 83.14% 84.00% 85.14% 85.71% Precision 42.86% 61.29% 85.71% 100% 83.33% Recall 9.09% 28.79% 18.18% 21.21% 30.30% Table 3 shows the validation score, test score, test precision, and test recall of the optimal model for each type of classifier. Except for the Logistic Regressor, all models outperformed the baseline model. The Random Forest Classifier had the best performance, and K-NN was the second best model. The former yielded a test score of 85.71%, and the latter 85.14%, which are both higher than the baseline test score 81.1%. The fact that most of our models outperformed the baseline model suggests that some features have certain predictive capability. However, more predicative features are needed in order to achieve a higher performance, as our best model only outperformed the baseline model by 4.6%. We observed that Adaboost generally resulted in marginal improvement or even mild decrease in the validation scores. We believed that this can be explained by the high dimensionality of the feature space, and the small size of our dataset. Adaboost is a biasincreasing method which theoretically produces weak models that barely outperform the baseline model. However, a very small dataset and a high-dimensional feature space might worsen the overfitting problem and result in sub-models with accuracies lower than the baseline. We believed that the small size of training set might also lead to sub-optimally trained models. As shown by figure 5, the validation score curve of SVC does not seem to converge when the size of the training set is about 1400. It is likely that if we acquired more training examples, we would be able to obtain models with higher scores. In terms of precision and recall, all of our models tended to have high precisions and low recalls. Intuitively, this suggests that a model would decide that a sample is positive only when the model is very ``confident" about it. We believed this high confidence threshold can be explained by the unbalanced nature of our dataset, where the models had more incentives to predict negative than predict positive. Finally, the different behaviors of different classifiers shed light on the decision boundary between the negative and positive samples in the feature space. Logistic Regression, and SVC with linear kernel yielded results worse than the baseline. On the other hand, Random Forest, K-NN, and SVC with 'rbf' kernel yielded the highest accuracy. Based on this observation, we hypothesized that the decision boundary is not linear. 6. Conclusion We started out aiming to create a classifier that predicts whether a gene is involved in axon regeneration in C. elegans. We found that a Random Forest Classifier with 50 subestimators has the highest predicative capability. It yielded a test score of 85.71%, a precision of 83.33%, and a recall of 30.30%. Since the test score is 4.6% higher than the baseline test score, we decided that our model has certain predicative capability and some of the features we extracted were effective. We also believed that similar methodologies in extracting gene features as ours could be applied to the prediction of whether a gene is involved in other biological processes, besides axon regeneration. To improve predicative capability of our models, we would 1) increase sample size through literature search and lab works, 2) extract more predicative features. References 1. 2. 3. 4. 5. Libbrecht, M. W., and Noble, W. S. 2015. Machine learning applications in genetics and genomics. Nature Reviews Genetics 16:321–332. Bejjani, R. E., and Marc, H. 2012. Neural regeneration in c. elegans. Annual Review of Genetics 46:499–513. Lizhen Chen, Zhiping Wang, A. G.-R. T. H. D. Y. S. O. R. B. B. Z. W. Y. J., and Chisholm, A. D. 2011. Axon regener- ation pathways identified by systematic genetic screening in c. elegans. Neuron 71(6):1043–1057. Paola Nix, Marc Hammarlund, L. H.-M. L. E. M. J., and Bastiani, M. 2014. Axon regeneration genes identified by RNAi screening in c. elegans. The Journal of Neuroscience 34(2):499–513. Pedregosa, F.; Varoquaux, G.; Gramfort, A.; Michel, V.; Thirion, B.; Grisel, O.; Blondel, M.; Prettenhofer, P.; Weiss, R.; Dubourg, V.; Vanderplas, J.; Passos, A.; Cournapeau, D.; Brucher, M.; Perrot, M.; and Duchesnay, E. 2011. Scikit- learn: Machine learning in Python. Journal of Machine Learning Research 12:2825–2830.
5cs.CE
arXiv:1508.07592v1 [math.AC] 30 Aug 2015 THE LINEAR STRAND OF DETERMINANTAL FACET IDEALS JÜRGEN HERZOG, DARIUSH KIANI AND SARA SAEEDI MADANI Abstract. Let X be an (m × n)-matrix of indeterminates, and let J be the ideal generated by a set S of maximal minors of X. We construct the linear strand of the resolution of J. This linear strand is determined by the clique complex of the m-clutter corresponding to the set S. As a consequence one obtains explicit formulas for the graded Betti numbers βi,i+m (J) for all i ≥ 0. We also determine all sets S for which J has a linear resolution. Introduction In this paper we consider ideals generated by an arbitrary set of maximal minors of an (m × n)-matrix of indeterminates. Such ideals have first been considered when m = 2, in which case the set of minors (which is a set of binomials) is in bijection with the edges of a graph G, and therefore is called the binomial edge ideal of G. This class of ideals has first been considered in [13] and [21]. In [13] the relevance of such ideals for algebraic statistics has been stressed. In the sequel binomial edge ideals have been studied in numerous papers with an attempt to better understand their algebraic and homological properties, see for example [8], [9], [15], [24] and [25]. In some special cases, the resolution of such ideals has been determined and upper bounds for their regularity have been given, see [4], [11], [14], [16], [18], [22] and [23]. When m > 2, these ideals are called determinantal facet ideals. Here its generators are in bijection to the facets of a pure simplicial complex of dimension m − 1. These ideals were introduced and first studied in [10]. About the resolution of determinantal facet ideals is known even less than for binomial edge ideals. Apart from a very special case considered in [19], the resolution of a determinantal facet ideal is only known when the underlying simplicial complex is a simplex, in which case the Eagon-Northcott complex provides a resolution. One of the motivations for writing this paper was a conjecture made in [14] by the second and third author of this paper. Given a finite simple graph G. Let JG be its binomial edge ideal. Then the graded Betti numbers βi,i+2 (JG ) give the ranks of the corresponding free modules of the linear strand of JG . Now the conjecture made in [14] says that βi,i+2 (JG ) = (i + 1)fi+1 (∆(G)) for all i ≥ 0. Here ∆(G) is the clique complex of G and fi+1 (∆(G)) is the number of faces of ∆(G) of dimension i + 1. In this paper we will not only prove this conjecture but also prove an analogue 2010 Mathematics Subject Classification. Primary 16E05, 13C40; Secondary 05E40, 13C05. Key words and phrases. Linear strands, generalized Eagon-Northcott complex, determinantal facet ideals, binomial edge ideals. The third author was supported by the German Research Council DFG-GRK 1916. 1 statement for determinantal facet ideals, see Corollary 4.3. In fact, the linear strand of any determinantal facet ideal, which is a subcomplex of its minimal graded free resolution, is explicitly described in Theorem 4.1. In general, the linear strand of a graded minimal free resolution is a linear complex, that is, a complex whose matrices describing the differentials of the complex have linear forms as entries. Now given any finite linear complex, one may ask when such a complex is the linear strand of the graded minimal free resolution of a suitable graded module. This question, which is of interest by itself, is answered in the first section of the paper, see Theorem 1.1. A different description of the linear strand is given by Eisenbud in [7, Theorem 7.4]. Our characterization of linear strands is then used to prove that the complex constructed in Section 2 is indeed the linear strand of the corresponding determinantal facet ideal. In order to describe this complex, let ∆ be a simplicial complex on the vertex set [n] and let ϕ be a linear map between free modules of rank m and n. We define a subcomplex of the Eagon-Northcott complex C(ϕ) associated with ϕ which we denote by C(∆; ϕ). The complex C(∆; ϕ) is obtained from C(ϕ) by restriction to basis elements determined by the faces of ∆. In order to see that this is indeed a well defined subcomplex one has to describe the differentials of C(ϕ) explicitly in terms of the given natural bases. For the convenience of the reader we included this description of the Eagon-Northcott complex. We call the subcomplex C(∆; ϕ) the generalized Eagon-Northcott complex (determined by ∆ and ϕ). When m = 1, C(∆; ϕ) is a very special cellular complex. Cellular complexes were considered by Bayer, Peeva and Sturmfels ([1], [2]). Fløystad in [12] considered this cellular complex and called their homology to be the enriched homology module of ∆ with respect to K. In Theorem 3.1 it is shown that C(∆; ϕ) is the linear strand of a module with initial degree m if and only if ∆ has no minimal nonfaces of cardinality ≥ m + 2. Here and in all the following statements ϕ is defined by an (m × n)-matrix X of indeterminates. We use this result in Section 4 to obtain one of the main results of this paper: let C be an m-uniform clutter, that is a collection of subsets of [n] of cardinality m. The elements of C are called the circuits of C. The clique complex of C, which we denote by ∆(C), has as faces all subsets σ of [n] with the property that each m-subset of σ belongs to C. The clique complex ∆(C) has so minimal nonfaces of cardinality ≥ m + 2, and hence Theorem 3.1 can be applied, and it is shown in Theorem 4.1 that C(∆(C); ϕ) is the linear strand of the resolution of JC where JC is generated by all maximal minors of X whose columns are determined by the circuits of C. From this fact one deduces immediately the formula for the Betti numbers of the linear strand of JC , namely ! m+i−1 fm+i−1 (∆(C)). βi,i+m (JC ) = m−1 In Section 5 the determinantal facet ideals with linear resolution are characterized, and it is shown in Theorem 5.1 that JC has linear resolution if and only if JC is linearly presented, and that this is the case if and only if the clutter C is complete, which means that C consists of all m-subsets of a given set V ⊂ [n]. 2 1. The linear strand of a graded free resolution Let K be a field and S = K[x1 , . . . , xn ] be the polynomial ring over K in the indeterminates x1 , . . . , xn . We view S as a standard graded K-algebra by assigning to each xi the degree 1. Let M be a finitely generated graded S-module. Let d be the initial degree of M, namely, the smallest integer i such that Mi 6= 0. L Let (F, ∂) be the minimal graded free resolution of M. Then Fi = j S(−j)βi,j where βij = dimK Tori (K, M)j is the ij-th graded Betti number of M. Note that βij = 0 for all pairs (i, j) with j < i + d. Let Filin be the direct summand S(−i − d)βi,i+d of Fi . It is obvious that ∂(Filin ) ⊂ lin Fi−1 for all i > 0. Thus Flin : · · · −→ F2lin −→ F1lin −→ F0lin −→ 0 is a subcomplex of F, called the linear strand of the resolution of M. Throughout the paper, by the linear strand of a module M we mean the linear strand of the resolution of M. A graded complex G : · · · → G2 → G1 → G0 → 0 of finitely generated graded free S-modules is called a linear complex (with initial degree d) if for all i, Gi = S(−i−d)bi for suitable integers bi . Obviously, Flin is a linear complex. The question arises which linear complexes are the linear strand of a finitely generated graded module. The following result answers this question. Theorem 1.1. Let G be a finite linear complex with initial degree d. The following conditions are equivalent: (a) G is the linear strand of a finitely generated graded S-module with initial degree d. (b) Hi (G)i+d+j = 0 for all i > 0 and for j = 0, 1. Proof. We may assume that d = 0. (a) ⇒ (b): Let G = Flin where F is the minimal graded free resolution of a finitely generated graded S-module M. We denote by D the quotient complex F/Flin. From the exact sequence of complexes 0 −→ Flin −→ F −→ D −→ 0 we deduce that (1) Hi (Flin)i+j ∼ = Hi+1 (D)i+1+(j−1) for all i > 0 and all j. Since (Di )j = 0 for all i ≥ 0 and all j ≤ i, we see that Hi+1 (D)i+1+(j−1) = 0 for j = 0 and j = 1. Thus (1) yields the desired conclusion. (b) ⇒ (a): Let M be a graded module whose minimal graded free resolution F satisfies the condition that F1lin → F0lin is isomorphic to G1 → G0 . (For example we could choose M = H0 (G)). We prove by induction on i that the truncated complex Gi → Gi−1 → · · · → G1 → G0 → 0 3 is isomorphic to the truncated complex lin Filin → Fi−1 → · · · → F1lin → F0lin → 0. By the definition of M this is the case for i = 1. Now let i > 1. By induction hypothesis we have Ker(Gi → Gi−1 ) ∼ = Ker(F lin → F lin ). i i−1 Let Z = Ker(Gi → Gi−1 ) and let W be the submodule of Z which is generated by lin all elements of Z of degree i + 1. Similarly we let Z ′ = Ker(Filin → Fi−1 ) and W ′ be the submodule of Z ′ which is generated by all the elements of Z ′ of degree i + 1. Then the isomorphism Z ∼ = Z ′ induces an isomorphism W ∼ = W ′. Since by assumption Hi (G)i+1 = Hi+1 (G)i+1 = 0, it follows that Gi+1 → W is a lin minimal free presentation of W . By the same reason, Fi+1 → W ′ is a minimal free presentation of W ′ . This shows that the truncations of G and Flin are isomorphic up to homological degree i + 1.  We would like to remark that the linear strand Flin of a module M with initial degree d is only determined by the submodule N of M which is generated by the elements of degree d of M. Moreover, N = Coker(F1lin → F0lin ) if and only if N is linearly presented. Consider for example the ideal I = (x2 , xy, y 3, z 2 ) ⊂ S = K[x, y, z] with minimal graded free resolution F. Then I and J = (x2 , xy, z 2 ) have the same linear strand. We have that J 6= Coker(F1lin → F0lin ), since J is not linearly presented. Indeed, Coker(F1lin → F0lin) is isomorphic to (x2 , xy)S ⊕ S(−2). Corollary 1.2. Let G be a finite linear complex with initial degree d satisfying the conditions (b) of Theorem 1.1. Furthermore, let W be a finitely generated graded Smodule with minimal graded free resolution F satisfying the property that G1 → G0 is isomorphic to F1lin → F0lin . Then G is isomorphic to the linear strand of W . Proof. In the proof of Theorem 1.1 (b) ⇒ (a) we have seen that if G is a finite linear complex with initial degree d satisfying the conditions (b) of Theorem 1.1 and such  that G1 → G0 ∼ = Flin. = F1lin → F0lin , then G ∼ 2. The generalized Eagon-Northcott complex Let F and G be free S-modules of rank m and n, respectively, with m ≤ n, and let ϕ : G → F be an S-module homomorphism. We choose a basis f1 , . . . , fm of F and a Pm basis g1 , . . . , gn of G. Let ϕ(gj ) = i=1 αij fi for j = 1, . . . , n. The matrix α = (αij ) describing ϕ with respect to these bases is an (m × n)-matrix with entries in S. The ideal of m-minors of this matrix is independent of the choice of these bases and is denoted Im (ϕ). It is know that with suitable grade conditions on Im (ϕ), the socalled Eagon-Northcott complex provides a free resolution of Im (ϕ), see [5]. There are nice and basis free descriptions of the Eagon-Northcott complex, see for example [3] and [6]. For our purpose however a description of the Eagon-Northcott complex and its differentials in terms of natural bases is required. For the convenience of the reader and due to the lack of a suitable reference we recall this description. 4 We denote by S(F ) the symmetric algebra of F . Then S(F ) is isomorphic to the polynomial ring over S in the variables f1 , . . . , fm . The module G ⊗S S(F ) is a free S(F )-module with basis g1 ⊗ 1, . . . , gn ⊗ 1 and ϕ gives rise to the S(F )-linear map G ⊗ S(F ) → S(F ) with gj ⊗ 1 7→ ϕ(gj ) for all j, which in turn induces the Koszul complex K(ϕ) : 0 → n ^ G ⊗ S(F ) → · · · → whose differential δ is defined as follows: (2) δ(gj1 ∧gj2 ∧· · ·∧gji ⊗1) = i X 1 ^ G ⊗ S(F ) → 0 ^ G ⊗ S(F ) → 0, (−1)k+1 gj1 ∧gj2 ∧· · ·∧gjk−1 ∧gjk+1 ∧· · ·∧gji ⊗ϕ(gjk ). k=1 The Koszul complex K(ϕ) splits into graded components K(ϕ)i : 0 → i ^ G ⊗ S0 (F ) → · · · → 1 ^ G ⊗ Si−1 (F ) → 0 ^ G ⊗ Si (F ) → 0, each of which is a complex of free S-modules. We are interested in the S-dual of the (n − m)-th component of K(ϕ) which is the complex (3) 0 → ( Let 0 ^ G ⊗Sn−m (F ))∗ → · · · → ( µ: n−i ^ n−m−1 ^ G ⊗S1 (F ))∗ → ( G → HomS ( Vn−i i ^ G, n ^ n−m ^ G ⊗S0 (F ))∗ → 0. G) be the isomorphism which assigns to a ∈ G the S-linear map µa ∈ HomS ( with µa (b) = a ∧ b. Composing µ with the isomorphism i ^ n ^ Vi G, Vn i ^ G)∗ which is induced by the isomorphism Sg1 ∧ . . . ∧ gn ∼ = S with g1 ∧ . . . ∧ gn 7→ 1, we obtain the isomorphisms HomS ( n−i ^ (4) G∼ =( i ^ G, G) → ( G)∗ for i = 0, . . . , n. Furthermore, if we use that for any two finitely generated free S-modules A and B there are natural isomorphisms (A ⊗ B)∗ ∼ (5) = Hom(A, B ∗ ) ∼ = A∗ ⊗ B ∗ , the complex (3) becomes the complex C(ϕ) : 0 → n ^ G ⊗ Sn−m (F )∗ → . . . → m+1 ^ G ⊗ S1 (F )∗ → which is called the Eagon-Northcott complex. There is a natural augmentation map ε: m ^ G ⊗ S0 (F )∗ → Im (ϕ) 5 m ^ G ⊗ S0 (F )∗ → 0, G) which assigns to gi1 ∧ · · · ∧ gim ⊗ 1 the m-minor of α with the columns i1 , i2 , . . . , im . It is known that grade Im (ϕ) ≤ n − m + 1 and equality holds if and only if C(ϕ) → Im (ϕ) → 0 is exact, that is, if and only if C(ϕ) provides a free resolution of Im (ϕ), see [3]. We now describe the differential of the Eagon-Northcott complex. The map δ∗ : ( r ^ G ⊗ Sn−m−r (F ))∗ → ( r+1 ^ G ⊗ Sn−m−r−1 (F ))∗ is just the dual of the differential δ defined in (2). Thus if we set gσ = gj1 ∧ · · · ∧ gjr am for σ = {j1 < j2 < · · · < jr } and set f a = f1a1 f2a2 · · · fm with |a| = a1 + · · · + am = n − m − r, then r X δ(gσ ⊗ f ) = a (−1)k+1 gσ\{jk } ⊗ ϕ(gjk )f a k=1 r X m X = am ). (−1)k+1 αijk (gσ\{jk } ⊗ f1a1 · · · fiai +1 · · · fm k=1 i=1 Therefore, (6) δ ∗ ((gσ ⊗ f a )∗ ) = (−1)sign(σ,j) X m X am ∗ ), αij (gσ∪{j} ⊗ f1a1 · · · fiai −1 · · · fm i=1 ai >0 j∈[n]\σ where sign(σ, j) = |{i ∈ σ : i < j}|. (a ) (am ) Let f (a) = f1 1 · · · fm denote the basis element in (Sj (F ))∗ which is dual to a am f a = f1 1 · · · fm . Furthermore, we set f (a) = 0, if ai < 0 for some i. Then by using the isomorphisms (4) and (5), we see that (gσ ⊗ f a )∗ is mapped to (−1)s(σ) gσc ⊗ f (a) , where σ c = [n] \ σ and where s(σ) is defined by the equation gσ ∧ gσc = (−1)s(σ) g[n] . Thus, δ ∗ identifies with the map (7) ∂(gσ ⊗ f (a) ) = (−1)|σ c| m+i m XX (a1 ) (−1)k+1 αijk (gσ\{jk } ⊗ f1 (ai −1) · · · fi (am ) · · · fm ), k=1 i=1 which is the differential of the Eagon-Northcott complex. In this formula, the sign c (−1)|σ | which only depends on the homological degree of gσ ⊗ f (a) , may be skipped, and we will do this in the final presentation of ∂. Indeed, to see that (7) holds, we note that, due to (6), δ ∗ ((−1)s(σ) gσc ⊗ f (a) ) = X j∈σc (−1)sign(σ,j) m X (a1 ) (−1)s(σ∪{j}) αij (gσc \{j} ⊗ f1 i=1 ai >0 6 (ai −1) · · · fi (am ) · · · fm ). Thus δ ∗ (gσ ⊗ f (a) ) = m X X j∈σ (−1)s(σ c )+sign(σ c ,j)+s(σ c ∪{j}) (a1 ) αij (gσ\{j} ⊗ f1 (ai −1) · · · fl (am ) · · · fm ). i=1 ai >0 Finally (−1)s(σ c ∪{j}) g[n] = gσc ∪{j} ∧ gσ\{j} = (−1)|σ |σc |−sign(σc ,j)+sign(σ,j) = (−1) c |−sign(σ c ,j) gσ c ∧ gσ |σc |−sign(σc ,j)+sign(σ,j)+s(σc ) = (−1) |σc | It follows that (−1) (−1)sign(σ,j) = (−1) gσc ∧ gj ∧ gσ\{j} g[n] . s(σc )+sign(σc ,j)+s(σc ∪{j}) , as desired. (a) In order to simplify notation we set b(σ; a) = gσ ⊗f . Then the elements b(σ; a) with |σ| = m + i and a = (a1 , . . . , am ) such that a1 + · · · + am = i form a basis of Vm+i G ⊗ Si (F )∗ , and ∂(b(σ; a)) = m+i m XX (−1)k+1αℓjk b(σ \ {jk }; a − eℓ ). k=1 ℓ=1 Here e1 , . . . , em is the canonical basis of Zm . Corollary 2.1. Suppose that grade Im (ϕ) = n − m + 1. Then Im (ϕ) has a linear resolution and ! ! m+i−1 n for i = 0, . . . , n − m. βi (Im (ϕ)) = m−1 m+i Now let ∆ be a simplicial complex on the vertex set [n]. We set Ci (ϕ) = m+i G ⊗ Si (F )∗ and denote Ci (∆; ϕ) the free submodule of Ci (ϕ) generated by all b(σ; a) such that σ ∈ ∆ with |σ| = m+i, and a ∈ Zm ≥0 with |a| = i. Since ∂(b(σ; a)) ∈ Ci−1 (∆; ϕ) for all b(σ; a) ∈ Ci (∆; ϕ), we obtain the subcomplex V C(∆; ϕ) : 0 → Cn−m (∆; ϕ) → · · · → C1 (∆; ϕ) → C0 (∆; ϕ) → 0 of C(ϕ) which we call the generalized Eagon-Northcott complex attached to the simplicial complex ∆ and the module homomorphism ϕ : G → F . In particular, if ∆ is just a simplex on n vertices, then C(∆; ϕ) coincides with C(ϕ). Moreover, note that the generalized Eagon-Northcott complex of a simplicial complex ∆ is determined by those facets of ∆ whose dimension is at least m − 1. More precisely, if we obtain the simplicial complex ∆′ from ∆ by removing all facets of dimension less than m − 1, then the complexes C(∆; ϕ) and C(∆′ ; ϕ) are the same. 3. The generalized Eagon-Northcott complex as a linear strand of a module Let X be an (m × n)-matrix of indeterminates xij . We fix a field K and let S be the polynomial ring over K in the variables xij . Moreover, let ϕ : G → F be the S-module homomorphism of free S-modules given by the matrix X. In the rest of this paper, we fix this situation. 7 Now we give a (Zm ×Zn )-grading to the polynomial ring S, by setting mdeg(xij ) = (ei , εj ) where ei is the i-th canonical basis vector of Zm and εj is the j-th canonical basis vector of Zn . Now, let ∆ be a simplicial complex. Then the chain complex C(∆; ϕ) inherits this grading. More precisely, for each i, the degree of a basis element b(σ; a) of Ci (∆; ϕ) with σ = {j1 , . . . , jm+i } is set to be (a + 1, γ) ∈ Zm × Zn , where γ = εj1 + · · · + εjm+i , and 1 is the vector in Zm whose entries are all equal to 1. Then, one can see that all the homomorphisms in the chain complex C(∆; ϕ) is homogeneous. To characterize all simplicial complexes for which the generalized Eagon-Northcott complex C(∆; ϕ) is the linear strand of a finitely generated graded S-module, we need to introduce a concept about simplicial complexes which is crucial in the sequel. Let ∆ be a simplicial complex on the vertex set V , and let σ be a subset of V . Then recall that σ is called a minimal nonface of ∆ if σ ∈ / ∆, but all its proper subsets belong to ∆. Theorem 3.1. Let ∆ be a simplicial complex on n vertices, and let m be a positive integer. Then the following conditions are equivalent: (a) C(∆; ϕ) is the linear strand of a finitely generated graded S-module with initial degree m. (b) ∆ has no minimal nonfaces of cardinality ≥ m + 2. Proof. We may assume that m ≤ dim ∆ + 1, because otherwise C(∆; ϕ) = 0 and the assertion is trivial. By Theorem 1.1 it suffices to show that ∆ has no minimal nonfaces of cardinality ≥ m + 2 if and only if Hi (C(∆; ϕ))i+m+j = 0 for all i > 0 and for j = 0, 1. First suppose that j = 0, and let z be a nonzero cycle of degree m + i in Ci (∆; ϕ) for some i > 0. Then z is also a cycle in Ci (ϕ). Since C(ϕ) is exact, z is a boundary in Ci (ϕ). So there is a nonzero element f of degree m + i in Ci+1 (ϕ) such that ∂(f ) = z which is a contradiction, since Ci+1 (ϕ)m+i = 0. This implies that there is no nonzero cycle of degree m + i in Ci (∆; ϕ), and hence Hi (C(∆; ϕ))i+m = 0. Therefore, to prove the theorem it is enough to show that ∆ has no minimal nonfaces of cardinality ≥ m + 2 if and only if Hi (C(∆; ϕ))i+m+1 = 0 for all i > 0. Equivalently, we show that ∆ has a minimal nonface of cardinality at least m + 2 if and only if Hi (C(∆; ϕ))i+m+1 6= 0 for some i > 0. To prove this, suppose that there is a minimal nonface σ = {j1 , . . . , jm+1+i } of ∆ for some i > 0. Therefore, σ ∈ / ∆ and for each t = 1, . . . , m + 1 + i, we have σ \ {jt } ∈ ∆. Now let z = ∂(b(σ; a)) for some a ∈ Zm ≥0 with |a| = i + 1. Then z ∈ Ci (∆; ϕ), and z is a nonzero element of Ci (ϕ). Since z is a cycle in Ci (ϕ), it is also a cycle in Ci (∆; ϕ). On the other hand, the multidegree of z is (a + 1, γ) / ∆, there is no basis element of multidegree where γ = εj1 + · · · + εjm+1+i . Since σ ∈ (a + 1, γ) in Ci+1 (∆; ϕ), and hence z is not a boundary in Ci (∆; ϕ). This implies that Hi (C(∆; ϕ))i+m+1 6= 0. Conversely, suppose that Hi (C(∆; ϕ))i+m+1 6= 0 for some i > 0. Then there is a cycle z ∈ Ci (∆; ϕ) which is not a boundary. We may assume that z is multihomogeneous with mdeg(z) = (a+1, γ) with γ = εj1 +· · ·+εjm+1+i and |a| = i+1. Since z is also a cycle in Ci (ϕ) and since C(ϕ) is exact, we deduce that z is a boundary in Ci (ϕ). 8 Thus there is a nonzero multihomogeneous element f ∈ Ci+1 (ϕ) such that ∂(f ) = z. Since C(ϕ) is a multigraded resolution, it follows that mdeg(f ) = (a+1, γ). Since any two basis elements of Ci+1 (ϕ) have different multidegrees, it follows that f = λb(σ; a) for some 0 6= λ ∈ K with σ = {j1 , . . . , jm+1+i }. Because z is not a boundary in Ci (∆; ϕ), the basis element b(σ; a) does not belong to Ci+1 (∆; ϕ), and hence σ ∈ / ∆. On the other hand, we have z = ∂(f ) = λ m+1+i m X X k=1 (−1)k+1 xℓjk b(σ \ {jk }; a − eℓ ). ℓ=1 Since the basis elements of Ci+1 (∆; ϕ) form a subset of the basis elements of Ci+1 (ϕ), it follows from this presentation of z that b(σ \ {jk }; a − eℓ ) ∈ Ci (∆; ϕ) for all jk and ℓ for which b(σ \ {jk }; a − eℓ ) 6= 0. Since z is not zero, there exist jk and l with b(σ \ {jk }; a − eℓ ) 6= 0. Therefore, a − eℓ ∈ Zm ≥0 . Hence b(σ \ {jt }; a − eℓ ) 6= 0 for all t = 1, . . . , m + 1 + i. It follows that b(σ \ {jt }; a − eℓ ) ∈ Ci+1 (∆; ϕ) for all t = 1, . . . , m + 1 + i. Therefore, σ \ {jt } is a face of ∆ for all t = 1, . . . , m + 1 + i, so that σ is a minimal nonface of ∆ of cardinality m + 1 + i ≥ m + 2, as desired.  We would like to remark that a subclass of simplicial complexes satisfying condition (b) of Theorem 3.1 has been considered in [20] for a different purpose. There, minimal nonfaces are called missing faces. Now, we give some examples of other classes of simplicial complexes which satisfy condition (b) of Theorem 3.1. First recall that a flag simplicial complex is a simplicial complex whose minimal nonfaces all have cardinality equal to two. Flag complexes are exactly clique complexes of graphs, i.e. a simplicial complex whose faces are cliques of a graph. In [17], a generalization of flag complexes has been introduced which we recall it in the following. In [17] a subset T of V is called a critical clique of ∆ if each pair of vertices form a 1-dimensional face of ∆ and T \ {v} ∈ ∆ for some v ∈ T . Let dim ∆ = d − 1 and let i be an integer with 1 ≤ i ≤ d. Then ∆ is called i-banner if every critical clique T of cardinality at least i + 1 is a face of ∆. In [17, Lemma 3.3] it is shown that a simplicial complex is 1-banner if and only if it is 2-banner, and this is equivalent to being flag. Now, let 1 ≤ m ≤ d. Then an (m + 1)-banner satisfies condition (b) of Theorem 3.1, namely has no minimal nonfaces of cardinality ≥ m + 2, see also [17, Lemma 3.6]. In particular, all flag complexes satisfy condition (b) of Theorem 3.1, because i-banner implies (i + 1)-banner for all i. We also would like to remark that not all simplicial complexes with no minimal nonfaces of cardinality ≥ m + 2 are (m + 1)-banner. For example, let ∆ be the simplicial complex with the vertex set {1, 2, 3, 4} whose facets are {1, 2, 3}, {1, 3, 4} and {2, 3, 4} and let m = 2. Then ∆ has no minimal nonfaces of cardinality 4, but it is not 3-banner. Indeed, T = {1, 2, 3, 4} ∈ / ∆ but it is a critical clique of ∆. 9 4. The linear strand of determinantal facet ideals and binomial edge ideals A clutter C on the vertex set [n] is a collection of subsets of [n] such that there is no containment between its elements. An element of C is called a circuit. In this paper, we assume that each vertex of a clutter C belongs to some circuits of C. If all circuits of C have the same cardinality d, then C is said to be an d-uniform clutter. Let C be an m-uniform clutter. To each circuit τ ∈ C with τ = {j1 , . . . , jm } and 1 ≤ j1 < j2 < · · · < jm ≤ n we assign the m-minor mτ of X which is determined by the columns 1 ≤ j1 < j2 < · · · < jm ≤ n. We denote by JC the ideal in S which is generated by the minors mτ with τ ∈ C. This ideal which has first been considered in [10] is called the determinantal facet ideal of C since the circuits of C may be considered as the facets of a simplicial complex. In the case that C is a 2-uniform clutter, C may be viewed as a graph G, and in this case JC = JG , where JG is the binomial edge ideal of G, as defined in [13]. A clique of C is a subset σ of [n] such that each m-subset τ of σ is a circuit of C. We denote by ∆(C) the simplicial complex whose faces are the cliques of C which is called the clique complex of C. A clutter is called complete if its clique complex is a simplex. Note that the clique complex of an m-clutter has no minimal nonface of cardinality ≥ m + 2. The example at the end of Section 3 also shows that not all simplicial complexes which satisfy condition (b) of Theorem 3.1 are clique complexes of clutters. Here we also give an example of a 3-clutter whose clique complex is not 4-banner, although all clique complexes of 2-clutters are 3-banner, as mentioned before. Let C be the 3-clutter on the vertices {1, . . . , 6} with the circuits {1, 2, 3}, {1, 3, 4}, {2, 3, 4}, {3, 4, 5}, {3, 4, 6}, {3, 5, 6} and {4, 5, 6}. Then ∆(C) = h{1, 2, 3}, {1, 3, 4}, {2, 3, 4}, {3, 4, 5, 6}i. Thus ∆(C) is not 4-banner, since {1, 2, 3, 4} is a critical clique of ∆(C) which is not a face. The following theorem is the main result of this section. Theorem 4.1. Let C be an m-uniform clutter on the vertex set [n], and let F be the minimal graded free resolution of JC . Then Flin ∼ = C(∆(C); ϕ). Proof. To prove the theorem, by Corollary 1.2 and Theorem 3.1, it suffices to prove the following F1lin → F0lin ∼ = C1 (∆(C); ϕ) → C0 (∆(C); ϕ). First, note that JC is a homogeneous ideal of S with respect to the (Zm × Zn )multigrading introduced in Section 3. Now, we define ψ C0 (∆(C); ϕ) −→ JC with ψ(b(σ; 0)) = mσ for each σ = {j1 , . . . , jm } ∈ C, so that it is a minimal free presentation of JC . Since C(ϕ) is the resolution of Im (ϕ), the following commutative diagram implies that ψ ◦ ∂ = 0. 10 C1 (∆(C); ϕ)  ∂ _  C1 (ϕ) / C0 (∆(C); ϕ)  ψ / _ ∂   / C0 (ϕ) JC _ / Im (ϕ) Let Z = ker ψ and Z lin be the S-module generated by the elements of Z whose degree is m + 1. Since C1 (∆(C); ϕ) is generated in degree m + 1, it follows that ∂′ ∂ induces a homogeneous homomorphism C1 (∆(C); ϕ) −→ Z lin . The desired result follows once we have shown that ∂ ′ induces an isomorphism of vector spaces ∂′ C1 (∆(C); ϕ)m+1 −→ (Z lin )m+1 = Zm+1 . Let z be a nonzero element of Z lin of multidegree (es + 1, γ) for some s = 1, . . . , m where |γ| = m + 1. Let γ = εj1 + · · · + εjm+1 . Since z 6= 0, at least m vectors among εj1 , . . . , εjm+1 are distinct, say εj1 , . . . , εjm , and the basis element b(σ; 0) appears in the presentation of z as the linear combination of the basis elements of C0 (∆(C); ϕ), where σ = {j1 , . . . , jm }. First suppose that jm+1 ∈ σ. Then according to the (Zm × Zn )-multigrading, the only basis element of C0 (∆(C), ϕ) which contributes to this multidegree in z, is b(σ; 0). Then, it follows that z = λxsjm+1 b(σ; 0) for some 0 6= λ ∈ K, and hence we have ψ(z) 6= 0, a contradiction. Therefore, jm+1 ∈ / σ. Let τ = {j1 , . . . , jm+1 }, and without loss of generality assume that j1 < · · · < jm+1 . Then all possible basis elements of C0 (∆(C), ϕ) which could contribute to this multidegree in z are of the form b(τ \ {jk }; 0). By comparing the multidegrees, we observe that z = Pm+1 k=1 λk xsjk b(τ \ {jk }; 0) for some λk ∈ K. From the above diagram it follows that z is a boundary of C(ϕ). This implies that there exists a nonzero multihomogeneous element f ∈ C1 (∆; ϕ) with ∂(f ) = z. Since mdeg(f ) = mdeg(z), it follows that P k+1 f = λb(τ ; es ) for some 0 6= λ ∈ K. Therefore, z = ∂(f ) = λ m+1 xsjk b(τ \ k=1 (−1) k+1 {jk }; 0). This implies that for each k = 1, . . . , m+1, we have λk = (−1) λ and the basis element b(τ \{jk }; 0) appears in the presentation of z with a nonzero coefficient. Hence for each k = 1, . . . , m + 1, τ \ {jk } is a circuit of C which implies that τ is a clique of C. This shows that the set {rs (τ ) : 1 ≤ s ≤ m, τ ∈ ∆(C), |τ | = m+1} with P k+1 rs (τ ) = m+1 xsjk b(τ \ {jk }; 0) for each clique τ = {j1 , . . . , jm+1 } of C, is a k=1 (−1) system of generators of Z lin . Since mdeg(rs (τ )) 6= mdeg(rs′ (τ ′ )) if (s, τ ) 6= (s′ , τ ′ ), we conclude that these elements form a basis of Zm+1 . Moreover, each basis element b(τ ; es ) is mapped by ∂ ′ to rs (τ ). Thus, we get the desired result.  Recall that for a simplicial complex ∆ and an integer i, the i-th skeleton ∆(i) of ∆ is the subcomplex of ∆ whose faces are those faces of ∆ whose dimension is at most i. Corollary 4.2. Let ∆ be a simplicial complex whose facets all have dimension at least m−1, and let C be the m-clutter whose circuits are exactly the facets of ∆(m−1) . Then C(∆; ϕ) is the linear strand of JC if and only if ∆ = ∆(C). Proof. It is enough to note that by our assumptions we have ∆ ⊆ ∆(C), so that by Theorem 4.1 the conclusion follows.  11 Recall that the f -vector (f0 (∆), f1 (∆), . . .) of a simplicial complex ∆ is the integer vector such that ft (∆) = |{σ ∈ ∆ : dim σ = t}| for each t = 0, . . . , dim ∆. The following corollary is a consequence of Theorem 4.1. In particular, in the case m = 2, it proves the conjecture in [22, page 338]. Corollary 4.3. Let C be an m-uniform clutter. Then ! m+i−1 fm+i−1 (∆(C)), βi,i+m (JC ) = m−1 for all i. Another straightforward consequence of Theorem 4.1 is the following result. Corollary 4.4. Let C be an m-uniform clutter. Then the length of the linear strand of JC is equal to dim ∆(C) − m + 1. In particular, proj dim JC ≥ dim ∆(C) − m + 1. The projective dimension of the determinantal facet ideals in general is bigger than the lower bound given in Corollary 4.4. This could be the case, even for 2-uniform clutters, namely binomial edge ideals of graphs. For example, it follows from [8, Theorem 1.1] that for a block graph G with n vertices, proj dim JG = n − c − 1 where c is the number of connected components of G. One can see that if G is a non-complete block graph G over n vertices, n − c − 1 > dim ∆(G) − 1, and hence in this case the lower bound given in Corollary 4.4 is strictly less than the projective dimension. 5. Determinantal facet ideals with linear resolution In this section, we determine when the minimal graded free resolution of determinantal facet ideals coincide with their linear strand. In other words, we characterize all m-uniform clutters whose determinantal facet ideal has a linear resolution. Moreover, we show that having a linear resolution is equivalent to being linearly presented for such ideals. Indeed, applying Theorem 4.1, we show that these properties occur for JC if and only if C is a complete clutter. Recall that a graded ideal I in S which is generated in degree d is called linearly presented if β1,j (I) = 0 for all j 6= d + 1. Moreover, I is said to have a linear resolution if βi,j (I) = 0 for all i and j 6= i + d. The following theorem is the main result of this section which in particular recovers the case of binomial edge ideals from [14]. Here, we consider S as a Zn -graded ring by setting deg(xij ) = εj for all i = 1, . . . , m, where by εj we mean the j-th canonical basis vector of Zn . Theorem 5.1. Let C be an m-uniform clutter. Then the following conditions are equivalent: (a) JC has a linear resolution. (b) JC is linearly presented. (c) C is a complete clutter. To prove the above theorem, we need the following lemma. 12 Lemma 5.2. Let C be an m-uniform clutter on [n] and suppose that JC is linearly presented. Then the following conditions hold: (a) for each σ1 , σ2 ∈ ∆(C) with |σ1 ∩ σ2 | ≥ m − 1, we have σ1 ∪ σ2 ∈ ∆(C). (b) for circuits τ and σ of C, ρ ∈ ∆(C) with σ, τ ⊆ ρ, and c ∈ / ρ, it follows that τ ∪ {c} ∈ ∆(C) if and only if σ ∪ {c} ∈ ∆(C). Proof. (a) Before proving (a) we first show: (∗) for each (m + 1)-subset σ of [n] which contains at least two circuits of C, we have σ ∈ ∆(C). Suppose on the contrary this is not the case, and suppose σ = {a1 , . . . , am+1 } is an (m+1)-subset of [n] which contains at least two circuits of C, but σ ∈ / ∆(C). We may assume that τ1 = {a1 , . . . , am } and τ2 = {a2 , . . . , am+1 } are circuits of C. Let (F, δ) be the minimal graded free resolution of JC . Note that F0 = C0 (∆(C); ϕ) and F1lin = C1 (∆(C); ϕ) by Theorem 4.1. So, F1 = C1 (∆(C); ϕ) ⊕ F1′ , for some free graded Smodule F1′ . Let z = mτ1 b(τ2 ; 0) − mτ2 b(τ1 ; 0) ∈ C0 (∆(C); ϕ). Since z ∈ ker ψ, there exists a nonzero homogeneous element f = (f1 , f2 ) ∈ F1 where f1 ∈ C1 (∆(C); ϕ), f2 ∈ F1′ and δ(f ) = z. On the other hand, deg(z) = εa1 + 2εa2 + · · ·+ 2εam + εam+1 , so that deg(f1 ) = deg(f2 ) = εa1 + 2εa2 + · · · + 2εam + εam+1 , because δ is homogeneous. Any basis element of C1 (∆(C); ϕ) appearing in the presentation of f1 is of the form b(σ; et ) for some t = 1, . . . , m. Since by the assumption σ is not a clique in C, no such basis element exists in C1 (∆(C); ϕ), and hence f1 = 0. Therefore, we have f2 6= 0, since f 6= 0. This contradicts to our assumption that JC is linearly presented. Now we show that (∗) implies (a). Suppose that condition (∗) holds. Let σ1 = {v1 , . . . , vk , u1 , . . . , ur } and σ2 = {v1 , . . . , vk , w1 , . . . , ws } be two cliques of C with |σ1 ∩ σ2 | = k ≥ m − 1. We show that σ1 ∪ σ2 is a clique. For this, it is enough to show that each m-subset H = {va1 , . . . , vat , ub1 , . . . , ubp , wc1 , . . . , wcq } of σ1 ∪ σ2 in which t + p + q = m and p, q ≥ 1, is a circuit of C. We prove this by induction on p + q. First assume that p = q = 1. Then we have τ1 = {va1 , . . . , vam−1 , ub1 } ∈ C and τ2 = {va1 , . . . , vam−1 , wc1 } ∈ C, since k ≥ m − 1 and σ1 , σ2 ∈ ∆(C). Thus, {va1 , . . . , vam−1 , ub1 , wc1 } contains at least two circuits τ1 and τ2 of C, and hence by (∗) it is a clique in C on m + 1 vertices. Therefore, all its m-subsets are circuits of C, and in particular, {va1 , . . . , vam−2 , ub1 , wc1 } ∈ C, so that we are done in this case. Now suppose that p + q = ℓ > 2. Then by induction hypothesis, we have (H ∪{vat+1 })\{ubp } ∈ C and (H ∪{vat+1 })\{wcq } ∈ C for all at+1 ∈ [k]\{a1 , . . . , at }. Therefore, by (∗) H ∪ {vat+1 } ∈ ∆(C) which implies that H is a circuit of C, as desired. (b) It is enough to show that σ ∪ {c} ∈ ∆(C) if τ ∪ {c} ∈ ∆(C). If τ = σ, there is nothing to prove. Suppose τ ∪ {c} ∈ ∆(C), a ∈ σ \ τ and b ∈ τ \ σ. Then (τ \ {b}) ∪ {c} is a circuit of C. Since ρ ∈ ∆(C), we have τ ′ = (τ \ {b}) ∪ {a} is also a circuit of C. Then it follows by (a) that τ ′ ∪ {c} ∈ ∆(C). Since |σ \ τ ′ | < |σ \ τ |, induction on |σ \ τ | yields the result.  Now we are ready to prove Theorem 5.1. 13 Proof of Theorem 5.1. (a) ⇒ (b) is clear, and (c) ⇒ (a) follows since the EagonNorthcott complex is the minimal graded free resolution of the determinantal facet ideal of a complete clutter. (b) ⇒ (c): We may assume that C is a clutter on the vertex set [n]. Assume that JC is linearly presented, and let F be the minimal graded free resolution of JC . Then by Theorem 4.1 we have F1 = C1 (∆(C); ϕ). Now suppose on the contrary that C is not complete. We claim that there exist two circuits in C whose union is not a clique in C. Now we prove the claim. Since C is not complete, there is an m-subset A = {c1 , . . . , cm } of [n] which is not a circuit of C. Let k be the biggest integer such that {c1 , . . . , ck } is contained in a circuit σ1 . Then k < m, because A is not a circuit. On the other hand, ck+1 ∈ σ2 for some σ2 ∈ C, but ck+1 ∈ / σ1 and therefore σ2 6= σ1 . Moreover, σ1 ∪ σ2 is not a clique in C, since otherwise the set {c1 , . . . , ck , ck+1 } is contained in a circuit of C which is a contradiction, because k is the biggest integer with this property. This proves the claim. Let z = mσ2 b(σ1 ; 0) − mσ1 b(σ2 ; 0). Since z ∈ ker ψ, there exists a nonzero multihomogeneous element w ∈ C1 (∆(C); ϕ) of the same multidegree as z with ∂(w) = z. Let A = {a ∈ σ1 \ σ2 : σ2 ∪ {a} ∈ ∆(C)} and B = {b ∈ σ2 \ σ1 : σ1 ∪ {b} ∈ ∆(C)}. Since ∂(w) = z, it follows that A, B 6= ∅. Now let ρ1 = σ1 ∪ B and ρ2 = σ2 ∪ A. Using repeatedly part (a) of Lemma 5.2, it follows that ρ1 , ρ2 ∈ ∆(C). Since ρ1 ∪ρ2 = σ1 ∪σ2 , we deduce that ρ1 ∪ρ2 ∈ / ∆(C). Then by Lemma 5.2 part (a), we have |ρ1 ∩ ρ2 | < m − 1. So, for i = 1, 2 we choose τi such that ρ1 ∩ ρ2 ⊆ τi ⊆ ρi and |τi | = m. In particular, τ1 6= τ2 . Now consider z ′ = mτ2 b(τ1 ; 0) − mτ1 b(τ2 ; 0) which is a nonzero element of ker ψ. We claim that τ1 ∪ {c} ∈ / ∆(C) for any c ∈ τ2 \ τ1 . Then it follows that there is no nonzero multihomogeneous element in C1 (∆(C); ϕ) of the same multidegree as z ′ , so that z ′ ∈ / ∂(C1 (∆(C); ϕ)) which is a contradiction, and hence C is a complete clutter and the desired result follows. Now, we prove the claim. Suppose there exists c ∈ τ2 \ τ1 such that τ1 ∪ {c} ∈ ∆(C). We have c ∈ / ρ1 , since c ∈ / τ1 . Then by Lemma 5.2 part (b), it follows that σ1 ∪ {c} ∈ ∆(C), since σ1 ⊆ ρ1 . This is a contradiction, since c ∈ τ2 ⊆ ρ2 which implies that c ∈ σ2 because c ∈ / A ⊆ σ1 , and so c ∈ B ⊆ ρ1 .  The following is an straightforward consequence of Theorem 5.1. Corollary 5.3. Let C be an m-clutter and consider the augmentation map ψ C0 (∆(C); ϕ) −→ JC −→ 0. ψ Then the complex C(∆(C); ϕ) −→ JC −→ 0 is exact if and only if C is a complete clutter. 14 References [1] D. Bayer, B. Sturmfels, Cellular resolutions of monomial ideals, J. Reine Angew. Math. 102 (1998), 123-140. [2] D. Bayer, I. Peeva, B. Sturmfels, Monomial resolutions, Math. Res. Lett. 5 (1-2) (1998), 31-46. [3] W. Bruns, U. Vetter, Determinantal rings, Lecture Notes in Mathematics, Springer, (1988). [4] A. Dokuyucu, Extremal Betti numbers of some classes of binomial edge ideals, to appear in Math. Reports. [5] J. A. Eagon, D. G. Northcott, Ideals defined by matrices and a certain complex associated with Them, Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences 269, (1962), no. 1337, 188-204. [6] D. Eisenbud, Commutative algebra with a view towards algebraic geometry, Springer, (1995). [7] D. Eisenbud, The geometry of syzygies (A second course in Commutative Algebra and Algebraic Geometry), Springer, (2005). [8] V. Ene, J. Herzog, T. Hibi, Cohen-Macaulay binomial edge ideals, Nagoya Math. J. 204 (2011), 57-68. [9] V. Ene, J. Herzog, T. Hibi, Koszul binomial edge ideals, Bridging Algebra, Geometry, and Topology, Volume 96 of the series Springer Proceedings in Mathematics and Statistics, (2014), 125-136. [10] V. Ene, J. Herzog, T. Hibi, F. Mohammadi, Determinantal facet ideals, Michigan Math. J. 62 (2013), 39-57. [11] V. Ene, A. Zarojanu, On the regularity of binomial edge ideals, Math. Nachr. 288, No. 1 (2015), 19-24. [12] G. Fløystad, Enriched homology and cohomology modules of simiplicial complexes, J. Algebr. Comb. 25 (2007), 285-307. [13] J. Herzog, T. Hibi, F. Hreinsdotir, T. Kahle, J. Rauh, Binomial edge ideals and conditional independence statements, Adv. Appl. Math. 45 (2010), 317-333. [14] D. Kiani, S. Saeedi Madani, Binomial edge ideals with pure resolutions, Collect. Math. 65 (2014), 331-340. [15] D. Kiani, S. Saeedi Madani, Some Cohen-Macaulay and unmixed binomial edge ideals, to appear in Comm. Algebra, (arXiv:1506.01362). [16] D. Kiani, S. Saeedi Madani, The Castelnuovo-Mumford regularity of binomial edge ideals, arXiv:1504.01403. [17] S. Klee, I. Novik, From flag complexes to banner complexes, SIAM J. Discrete Math., 27 (2013), no. 2, 1146-1158. [18] K. Matsuda, S. Murai, Regularity bounds for binomial edge ideals, Journal of Commutative Algebra. 5(1) (2013), 141-149. [19] F. Mohammadi, Prime splittings of determinantal ideals, arXiv:1208.2930. [20] E. Nevo, Remarks on missing faces and lower bounds on face numbers, Electronic J. Combin. 16(2) (the Björner Festschrift volume) (2009), R8. [21] M. Ohtani, Graphs and ideals generated by some 2-minors, Comm. Algebra. 39 (2011), 905917. [22] S. Saeedi Madani, D. Kiani, Binomial edge ideals of graphs, Electronic J. Combin. 19(2) (2012), ♯ P44. [23] S. Saeedi Madani, D. Kiani, On the binomial edge ideal of a pair of graphs, The Electronic Journal of Combinatorics. 20(1) (2013), ♯ P48. [24] P. Schenzel, S. Zafar, Algebraic properties of the binomial edge ideal of a complete bipartite graph, An. St. Univ. Ovidius Constanta, Ser. Mat. 22(2) (2014), 217-237. [25] Z. Zahid, S. Zafar, On the Betti numbers of some classes of binomial edge ideals, The Electronic Journal of Combinatorics. 20(4) (2013), ♯ P37. 15 Jürgen Herzog, Fachbereich Mathematik, Universität Duisburg-Essen, Campus Essen, 45117 Essen, Germany E-mail address: [email protected] Dariush Kiani, Department of Pure Mathematics, Faculty of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), 424, Hafez Ave., Tehran 15914, Iran, and School of Mathematics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5746, Tehran, Iran. E-mail address: [email protected], [email protected] Sara Saeedi Madani, Universität Osnabrück, Institut für Mathematik, 49069 Osnabrück, Germany E-mail address: [email protected], [email protected] 16
0math.AC
arXiv:1710.00264v1 [cs.DS] 30 Sep 2017 Bayesian estimation from few samples: community detection and related problems Samuel B. Hopkins∗ David Steurer† October 3, 2017 Abstract We propose an efficient meta-algorithm for Bayesian estimation problems that is based on low-degree polynomials, semidefinite programming, and tensor decomposition. The algorithm is inspired by recent lower bound constructions for sum-of-squares and related to the method of moments. Our focus is on sample complexity bounds that are as tight as possible (up to additive lower-order terms) and often achieve statistical thresholds or conjectured computational thresholds. Our algorithm recovers the best known bounds for community detection in the sparse stochastic block model, a widely-studied class of estimation problems for community detection in graphs. We obtain the first recovery guarantees for the mixed-membership stochastic block model (Airoldi et el.) in constant average degree graphs—up to what we conjecture to be the computational threshold for this model. We show that our algorithm exhibits a sharp computational threshold for the stochastic block model with multiple communities beyond the Kesten–Stigum bound—giving evidence that this task may require exponential time. The basic strategy of our algorithm is strikingly simple: we compute the best-possible lowdegree approximation for the moments of the posterior distribution of the parameters and use a robust tensor decomposition algorithm to recover the parameters from these approximate posterior moments. ∗ Cornell University. Supported by an NSF graduate research fellowship, a Microsoft Research PhD fellowship, a Cornell University fellowship, and David Steurer’s NSF CAREER award. Part of this work was accomplished while this author was an intern at Microsoft Research New England. † ETH Zürich. Much of this work was done while at Cornell University and the Institute for Advanced Study. Supported by a Microsoft Research Fellowship, a Alfred P. Sloan Fellowship, NSF awards, and the Simons Collaboration for Algorithms and Geometry. Contents 1 Introduction 1.1 Meta-algorithm and meta-theorems for Bayesian estimation 1.2 Detecting overlapping communities . . . . . . . . . . . . . . 1.3 Low-correlation tensor decomposition . . . . . . . . . . . . . 1.4 Information-computation gaps and concrete lower bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 3 9 14 15 2 Techniques 2.1 Approximately pairwise-independent estimators . . . . 2.2 Low-degree estimators for higher-order moments . . . 2.3 Correlation-preserving projection . . . . . . . . . . . . . 2.4 Low-correlation tensor decomposition . . . . . . . . . . 2.5 From quasi-polynomial time to polynomial time . . . . 2.6 Illustration: push-out effect in spiked Wigner matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 20 21 22 23 23 24 . . . . . . . . . . . . . . . . . . 3 Warmup: stochastic block model with two communities 26 3.1 Low-degree estimate for posterior second moment . . . . . . . . . . . . . . . . . . . . 29 4 Matrix estimation for generalized block models 31 4.1 Matrix estimation for the mixed-membership model . . . . . . . . . . . . . . . . . . . 32 4.2 Proof of Theorem 4.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 4.3 Proofs of Lemmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 5 Tensor estimation for mixed-membership block models 5.1 Main theorem and algorithm . . . . . . . . . . . . . . . . 5.2 Low-degree estimate for posterior third moment . . . . . 5.2.1 Details of unbiased estimator . . . . . . . . . . . . 5.2.2 Details of approximate conditional independence 5.3 Cross validation . . . . . . . . . . . . . . . . . . . . . . . . 5.4 Producing probability vectors . . . . . . . . . . . . . . . . 5.5 Remaining lemmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 37 43 45 46 48 50 53 6 Lower bounds against low-degree polynomials at the Kesten-Stigum threshold 53 6.1 Low-degree Fourier spectrum of the k-community block model . . . . . . . . . . . . 53 6.2 Lower bound for estimating communities . . . . . . . . . . . . . . . . . . . . . . . . . 58 7 Tensor decomposition from constant correlation 59 7.1 Proofs of Lemmas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 7.2 Lifting 3-tensors to 4-tensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 References 67 A Toolkit and Omitted Proofs 71 A.1 Probability and linear algebra tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 A.2 Tools for symmetric and Dirichlet priors . . . . . . . . . . . . . . . . . . . . . . . . . . 72 1 Introduction Bayesian1 parameter estimation [Wik17a] is a basic task in statistics with a wide range of applications, especially for machine learning. The estimation problems we study have the following form: For a known joint probability distribution p(x, θ) over data points x and parameters θ (typically both high-dimensional objects), nature draws a parameter θ ∼ p(θ) from its marginal distribution and we observe i.i.d. samples x1 , . . . , x m ∼ p(x | θ) from the distribution conditioned on θ. The goal is to efficiently estimate the underlying parameter θ from the observed samples x1 , . . . , x m . A large number of important problems in statistics, machine learning, and average-case complexity fit this description. Some examples are principal component analysis (and its many variants), independent component analysis, latent Dirichlet allocation, stochastic block models, planted constraint satisfaction problems, and planted graph coloring problems. For example, in stochastic block models the parameter θ imposes a community structure on n nodes. In the simplest case, this structure is a partition into two communities. Richer models support more than two communities and allow nodes to participate in multiple communities. The samples x1 , . . . , x m are edges between the nodes drawn from a distribution p(x | θ) that respects the community structure θ, which typically means that the edge distribution is biased toward endpoints with the same or similar communitity memberships. Taken together the samples x1 , . . . , x m form a random graph x on n vertices that exhibits a latent community structure θ; the goal is to estimate this structure θ. This problem becomes easier the more samples (i.e., edges) we observe. The question is how many samples are required such that we can efficiently estimate the community structure θ? Phrased differently: how large an average degree of the random graph x do we require to be able to estimate θ? In this work, we develop a conceptually simple meta-algorithm for Bayesian estimation problems. We focus on the regime that samples are scarce. In this regime, the goal is to efficiently compute an estimate θ̂ that is positively correlated with the underlying parameter θ given as few samples from the distribution as possible. In particular, we want to understand whether for particular estimation problems there is a difference between the sample size required for efficient and inefficient algorithms (say, exponential vs. polynomial time). In this regime, we show that our metaalgorithm recovers the best previous bounds for stochastic block models [Mas14, MNS15a, AS16a]. Moreover, for the case of richer community structures like multiple communities and especially overlapping communities, our algorithm achieves significantly stronger recovery guarantees.2 In order to achieve these improved guarantees, our meta-algorithm draws on several ideas from previous lines of work and combines them in a novel way. Concretely, we draw on ideas from recent analyses of belief propagation and their use of non-backtracking and self-avoiding random walks [Mas14, MNS15a, AS16a]. We also use ideas from recent works based on the method of moments and tensor decomposition [AGH+ 14, AGHK14, BKS15]. Our algorithm also 1Here, “Bayesian” refers to the fact that there is a prior distribution over the parameters. 2 If we represent the community structure by k vectors y1 , . . . , y k ∈ {0, 1} n that indicate community memberships, then previous algorithms [AS16a] do not aim to recover these vectors but, roughly speaking, only a random linear combination of them. While for some settings it is in fact impossible to estimate the individual vectors, we show that in many settings it is possible to estimate them (in particular for symmetric block models). 1 employs convex-programming techniques, namely the sum-of-squares semidefinite programming hierarchy, and gives a new perspective on how these techniques can be used for estimation.3 Our meta-algorithm allows for a tuneable parameter which corresponds roughly to running time. Under mild assumptions on a Bayesian estimation problem p(x, θ) (that are in particular satisfied for discrete problems such as the stochastic block model), when this parameter is set to allow the meta-algorithm to run in exponential time, if there is any estimator θ̂ of θ obtaining correlation δ, the meta-algorithm offers one obtaining correlation at least δ O(1) . While this parameter does not correspond directly to the degree paramter used in convex hiararchies such as sum of squares, the effect is similar to the phenomenon that sum of squares convex programs of exponential size can solve any combinatorial optimization problem exactly. (Since Bayesian estimation problems do not always correspond to optimization problems, this guarantee would not be obtained by sum of squares in our settings.) For many Bayesian estimation problems there is a critical number of samples n 0 such that when the number of samples n is less than n 0 , computationally-efficient algorithms seem unable to compute good estimators for θ. This is in spite of the presence of sufficient information to identify θ (and therefore estimate it with computationally inefficient algorithms), even when n < n 0 . Providing rigorous evidence for such computational thresholds has been a long-standing challenge. One popular approach is to prove impossibility of estimating θ from n < n 0 samples using algorithms from some restricted class. Such results are most convincing the chosen class captures the lowest-sample-complexity algorithms for many Bayesian inference problems, which our meta-algorithm does.4 We prove that in the k-community block model, no algorithm captured by our meta-algorithm can tolerate smaller-degree graphs than the best known algorithms. This provides evidence for a computational phase transition at the Kesten-Stigum threshold for stochastic block models. Organization In the remainder of this introduction we discuss our results and their relation to previous work in more detail. In Section 2 (Techniques) we describe the mathematical techniques involved in our meta-algorithm and its analysis, and we illustrate how to apply the meta-algorithm to recover a famous result in the theory of spiked random matrices with a much simplified proof. In Section 3 (Warmup) we re-prove (up to some loss in the running time) the result of MosselNeeman-Sly on the two-community block model as an application of our meta-algorithm, again with very simple proofs. In Section 4 (Matrix estimation) we re-interpret the best existing results on the block model, due to Abbe and Sandon, as applications of our meta-algorithm. In Section 5 (Tensor estimation) we apply our meta-algorithm to the mixed-membership block model. Following that, in Section 6 (Lower bounds) we prove that no algorithm captured by our 3 Previously, convex-programming techniques have been used in this context only as a way to obtain efficient relaxations for maximum-likelihood estimators. In contrast, our work uses convex programming to drive the method of moments approach and decompose tensors in an entropy maximizing way. 4Recent work in this area has focused on sum of squares lower bounds [HSS15, MW15, BHK+ 16]. While the sum of squares method is algorithmically powerful, it is not designed to achieve optimal sample guarantees for Bayesian estimation. Lower bounds against our meta-algorithm therefore serve better the purpose of explaining precise computational sample thresholds. 2 meta-algorithm can recover communities in the block model past the Kesten-Stigum threshold. In Section 7 (Tensor decomposition), which can be read independently of much of the rest of the paper, we give a new algorithm for tensor decomposition and prove its correctness; this algorithm is used by our meta-algorithm as a black box. 1.1 Meta-algorithm and meta-theorems for Bayesian estimation We first consider a version of the meta-algorithm that is enough to capture the best known algorithms for the stochastic block model with k disjoint communities, which we now define. Let ε, d > 0. Draw y uniformly from [k]n . For each pair i , j, add the edge {i, j} to a graph on n vertices with probability (1 + (1 − 1k )ε) nd if yi  y j and (1 − εk ) nd otherwise. The resulting graph has expected average degree d. A series of recent works has explored the problem of estimating y in these models for the sparsest-possible graphs. The emerging picture, first conjectured via techniques from statistical physics in the work [DKMZ11], is that in the k-community block model it is possible to recover a 2 nontrivial estimate of y via a polynomial time algorithm if and only if d  (1 + δ) εk 2 for δ > Ω(1). This is called the Kesten-Stigum threshold. The algorithmic side of this conjecture was confirmed by [Mas14, MNS15a] for k  2 and [AS16a] for general k. One of the goals of our meta-algorithm is that it apply in a straightforward way even to complex Bayesian estimation problems. A more complex model (yet more realistic for real-world networks) is the mixed-membership block model [ABFX08] which we now define informally. Let α > 0 be n k(α+1) an overlap parameter. Draw y from kt , where t  k+α ≈ α + 1; that is for each of n nodes pick a set S j of roughly α + 1 communities.5 For each pair i, j, add an edge to the graph with |S i ∩S j | probability (1 + ( t 2 − 1k )ε) nd . (That is, with probability which increases as i and j participate in more communities together.) In the limit α → 0 this becomes the k-community block model. Returning to the meta-algorithm (but keeping in mind the block model), let p(x, y) be a joint probability distribution over observable variables x ∈ ’n and hidden variables y ∈ ’m . Nature draws (x, y) from the distribution p, we observe x and our goal is to provide an estimate ŷ(x) for 2 y. Often the mean square error p(x,y) ŷ(x) − y is a reasonable measure for the quality of the estimation. For this measure, the information-theoretically optimal estimate is the mean of the posterior distribution ŷ(x)  p(y |x) y. This approach has two issues that we address in the current work. The first issue is that naively computing the mean of the posterior distribution takes time Í exponential in the dimension of y. For example, if y ∈ {±1} m , then p(y |x) y  y∈{±1} m y · p(y | x); there are 2m terms in this sum. There are many well-known algorithmic approaches that aim to address this issue or related ones, for example, belief propagation [Gal62, Pea82] or expectation maximization [DLR77]. While these approaches appear to work well in practice, they are notoriously difficult to analyze. 5In actuality one draws for each node i ∈ [n] a probability vector σi ∈ ∆k−1 from the Dirichlet distribution with parameter α; we describe a nearly-equivalent model here for the sake of simplicity—see Section 1.2 for details. Our guarantees for recovery in the mixed-membership model also apply to the model here because it has the same second moments as the Dirichlet distribution. 3 In this work, we can resolve this issue in a very simple way: We analytically determine a 2 low-degree polynomial f (x) so that p(x,y) f (x) − y is as small as possible and use the fact that low-degree polynomials can be evaluated efficiently (even for high dimensions n).6 Because the maximum eigenvector of an n-dimensional linear operator with a spectral gap is an O(log n)-degree polynomial of its entries, our meta-algorithm captures spectral properties of linear operators whose entries are low-degree polynomials of observable variables x. Examples of such operators include adjacency matrices (when x is a graph), empirical covariance matrices (when x is a list of vectors), as well as more sophisticated objects such as linearized belief propagation operators (e.g., [AS15]) and the Hashimoto non-backtracking operator. The second issue is that even if we could compute the posterior mean exactly, it may not contain any information about the hidden variable y and the mean square error is not the right measure to assess the quality of the estimator. This situation typically arises if there are symmetries in the posterior distribution. For example, in the stochastic block model with two communities we have p(y |x) y  0 regardless of the observations x because p(y | x)  p(−y|x). A simple way to resolve this issue is to estimate higher-order moments of the hidden variables. For stochastic block models with disjoint communities, the second moment p(y |x) y yT would suffice. (For overlapping communities, we need third moments p(y |x) y ⊗3 due to more substantial symmetries.) For now, we think of y as an m-dimensional vector and x as an n-dimensional vector (in the blockmodel on N nodes, this would correspond to m ≈ kN and n  N 2 ). Our algorithms follow a two-step strategy: 1. Given x ∼ p(x| y), evaluate a fixed, low-degree polynomial P(x) taking values in (’m )⊗ℓ . (Usually ℓ is 2 or 3.) 2. Apply a robust eigenvector or semidefinite-programming based algorithm (if ℓ  2), or a robust tensor decomposition algorithm (if ℓ  3 or higher) to P to obtain an estimator ŷ for y. The polynomial P(x) should be an optimal low-degree approximation to y ⊗ℓ , in the following sense: if n is sufficiently large that some low-degree polynomial Q(x) has constant correlation with y ⊗ℓ hQ, y ⊗ℓ i > Ω(1) · ( kQ k 2)1/2 ( k y ⊗ℓ k 2 )1/2 , x,y x then P has this guarantee. (The inner products and norms are all Euclidean.) A prerequisite for applying our meta-algorithm to a particular inference problem p(x, y) is  ⊗ℓ  that it be possible to estimate y given y | x for some constant ℓ. For such a problem, the optimal Bayesian inference procedure (ignoring computational constraints) can be captured  ⊗ℓ  by computing F(x)  y | x , then using it to estimate y. When p(x, y) is such that it is information-theoretically possible to estimate y from x, these posterior moments will generally satisfy hF(x), y ⊗ℓ i > Ω(1) · ( kF(x)k 2 )1/2 ( k y ⊗ℓ k 2 )1/2 , for some constant ℓ. Our observation is that when F is approximately a low-degree function, this estimation procedure can be carried out via an efficient algorithm. 6Our polynomials typically have logarithmic degree and naive evaluation takes time n O(log n) . However, we show that under mild conditions it is possible to approximately evaluate these polynomials in polynomial time using the idea of color coding [AYZ95]. 4 Matrix estimation and prior results for block models In the case ℓ  2, where one uses the  T  covariance y y | x to estimate y, the preceding discussion is captured by the following theorem. Theorem 1.1 (Bayesian estimation meta-theorem—2nd moment). Let δ > 0 and p(x, y) be a distriO(1) bution over vectors x ∈ {0, 1} n and unit vectors y ∈ ’d . Assume p(x) > 2−n for all x ∈ {0, 1} n .7 Suppose there exists a matrix-valued degree-D polynomial P(x) such that T p(x,y) hP(x), y y i > δ ·  p(x) kP(x)kF2  1/2 . (1.1) Then, there exists δ′ > δ O(1) > 0 and an estimator ŷ(x) computable by a circuit of size n O(D) such that p(x,y) h ŷ(x), yi 2 > δ′ . (1.2) To apply this theorem to the previously-discussed setting of samples x1 , . . . , x N generated from p(x | y), assume the samples x1 , . . . , x N are in some fixed way packaged into a single n-length vector x. One curious aspect of the theorem statement is that it yields a nonuniform algorithm—a family of circuits—rather than a uniform algorithm. If the coefficients of the polynomial P can themselves be computed in polynomial time, then the conclusion of the algorithm is that an n O(D) -time algorithm exists with the same guarantees. As previously mentioned, the meta-algorithm has a parameter D, the degree of the polynomial P. If D  n, then whenever it is information-theoretically possible to estimate y from [y y ⊤ | x], the meta-algorithm can do so (in exponential time). This follows from the fact that every function in n Boolean variables is a polynomial of degree at most n. It is also notable that, while a degree D polynomial can be evaluated by an n O(D) -size circuit, some degree-D polynomials can be evaluated by much smaller circuits. We exploit such polynomials for the block model (computable via color coding), obtaining n O(1) -time algorithms from degree log n polynomials. By using very particular polynomials, which can be computed via powers of non-backtracking operators, previous works on the block model are able to give algorithms with near-linear running times [MNS15a, AS16a].8 Using the appropriate polynomial P, this theorem captures the best known guarantees for partial recovery in the k-community stochastic block model. Via the same polynomial, applied in the mixed-membership setting, it also yields our first nontrivial algorithm for the mixed-membership model. However, as we discuss later, the recovery guarantees are weak compared to our main theorem. 7This mild condition on the marginal distribution of x allows us to rule out pathological situations where a lowdegree polynomial in x may be hard to evaluate accurately enough because of coefficients with super-polynomial bit-complexity. 8In this work we choose to work with self-avoiding walks rather than non-backtracking ones; while the corresponding polynomials cannot to our knowledge be evaluated in near-linear time, the analysis of these polynomials is much simpler than the analysis needed to understand non-backtracking walks. This helps to make the analysis of our algorithms much simpler than what is required by previous works, at the cost of large polynomial running times. It is an interesting question to reduce the running times of our algorithm for the mixed-membership block model to near-linear via non-backtracking walks, but since our aim here is to distinguish what is computable in polynomial time versus, say, exponential time, we do not pursue that improvement here. 5 Recalling the ε, d, k block model from the previous section, let y ∈ ’n be the centered indicator vector of, say, community 1. Theorem 1.2 (Implicit in [Mas14, MNS15a, AS16a], special case of our main theorem, Theorem 1.4). def k 2 (α+1)2 Let δ  1 − ε2 d . If x is sampled according to the n-node, k-community, ε-biased, α-mixed-membership block model with average degree d and y is the centered indicator vector of community 1, there is a n×n-matrix valued polynomial P of degree O(log n)/δ O(1) such that  δ hP(x), y y i > x k(α + 1) T  O(1) ( kP(x)k 2 )1/2 ( k y yT k 2 )1/2 . Together with Theorem 1.1, up to questions of n O(log n) versus n O(1) running times, when α → 0 this captures the previous best efficient algorithms for the k-community block model. (Once one has a unit vector correlated with y, it is not hard to approximately identify the vertices in community 1.) While the previous works [Mas14, MNS15a, AS16a] did not consider the mixedmembership blockmodel, this theorem is easily obtained using techniques present in those works (as we show when we rephrase those works in our meta-algorithm, in Section 4).9 Symmetries in the posterior, tensor estimation, and improved error guarantees We turn next to our main theorem on the mixed-membership model, which offers substantial improvement on the correlation which can be obtained via Theorem 1.2. The matrix-based algorithm discussed above, Theorem 1.2, contains a curious asymmetry; namely the arbitrary choice of community 1. The block model distributions are symmetric under relabeling of the communities, which means that any estimator P(x) of y yT is also an estimator of y ′ y ′T , where y ′ is the centered indicator of community j > 1. Since one wants to estimate all the vectors y1 , . . . , yk (with yi corresponding to the i-th community), it is more natural to consider the polynomial P to be an estimator of the Í matrix M  i∈[k] yi yiT .10 Unsurprisingly, P is a better estimator of M than it is of y1 . In fact, with the same notation as in the theorems, x,y hP(x), M(y)i > δ O(1) ( kP(x)k 2 )1/2 ( kM(y)k 2)1/2 , removing the k O(1) factor in the denominator. This guarantee is stronger: now the error in the estimator depends only on the distance δ of the parameters ε, d, k, α from the critical threshold k 2 (α+1)2 ε2 d  1 rather than additionally on k. If given the matrix M exactly, one way to extract an estimator ŷi for some yi is just to sample a random unit vector in the span of the top k eigenvectors of M. Such an estimator ŷi would have 9In fact, if one is willing to lose an additional 2−k in the correlation obtained in this theorem, one can obtain a similar result for the mixed-membership model by reducing it to the disjoint-communities with K ≈ 2k communities, one for each subset of k communities. This works when each node participates in a subset of communities; if one uses the Dirichlet version of the mixed-membership model then suitable discretization would be necessary. 10In more general versions of the blockmodel studied in [AS16a], where each pair i, j of communities may have a different edge probability Q i j it is not always possible to estimate all of y1 , . . . , y k . We view it as an interesting open problem to extract as much information about y1 , . . . , y k as possible in that setting; the guarantee of [AS16a] amounts, roughly, to finidng a single vector in the linear span of y1 , . . . , y k . 6 1 h ŷi , yi i 2 > k O(1) k yi k, recovering the guarantees of the theorems above but not offering an estimator ŷi whose distance to yi depends only on the distance δ above the critical threshold. Indeed, without exploiting additional structure of the vectors yi is unclear how to remove this 1/k O(1) factor. As Í a thought experiment, if one had the matrix M ′  i 6 k a i a iT , where a1 , . . . , a k were random unit vectors, then a1 , . . . , a k would be nearly orthonormal and one could learn essentially only their linear span. (From the linear span it is only possible to find aˆi with correlation h aˆi , a i i 2 > 1/k O(1) .) In the interest of generality we would like to avoid using such additional structure: while in the disjoint-community model the vectors yi have disjoint support (after un-centering them), no such special structure is evident in the mixed-membership setting. Indeed, when α is comparable to k, the vectors yi are similar to independent random vectors of the appropriate norm. To address this issue we turn to tensor methods. To illustrate the main idea simply: if a1 , . . . , a k Í are orthonormal, then it is possible to recover a1 , . . . , a k exactly from the 3-tensor T  i 6 k a i⊗3 . More abstractly, the meta-algorithm which uses 3rd moments is able to estimate hidden variables whose posterior distributions have a high degree of symmetry, without errors which worsen as the posteriors become more symmetric. Theorem 1.3 (Bayesian estimation meta-theorem—3rd moment). Let p(x, y1 , . . . , yk ) be a joint distribution over vectors x ∈ {0, 1} n and exchangable,11 orthonormal12 vectors y1 , . . . , yk ∈ ’d . Assume the O(1) marginal distribution of x satisfies p(x) > 2−n for all x ∈ {0, 1} n .13 Suppose there exists a tensor-valued degree-D polynomial P(x) such that p(x,y1 ,...,y k ) hP(x), k Õ i1 yi⊗3 i > δ·  p(x) kP(x)k 2  1/2 · √ k. (1.3) √ (Here, k·k is the√norm induced by the inner product h·, ·i. The factor k normalizes the inequality because Í k ki1 yi⊗3 k  k by orthonormality.) Then, there exists δ′ > δ O(1) > 0 and a circuit of size n O(D) that given x ∈ {0, 1} n outputs a list of unit vectors z1 , . . . , z m with m 6 n poly(1/δ) so that max hyi , z j i 2 > δ′ . p(x,y1 ,...,y k ) i∼[k] j∈[m] (1.4) That the meta-algorithm captured by this theorem outputs a list of n 1/poly(δ) vectors rather than just k vectors is an artifact of the algorithmic difficulty of multilinear algebra as compared to linear algebra. However, in most Bayesian estimation problems it is possible by using a very small number of additional samples (amounting to a low-order additive term in the total sample complexity) to cross-validate the vectors in the list z1 , . . . , z m and throw out those which are not correlated with some y1 , . . . , yk . Our eventual algorithm for tensor decomposition (see Section 1.3 11 Here, exchangeable means that for every x ∈ {0, 1} n and every permutation π : [k] → [k], we have p(y1 , . . . , y k | x)  p(y π(1) , . . . , y π(k) | x). 12 Here, we say the vector-valued random variables y1 , . . . , y k are orthonormal if with probability 1 over the distribution p we have hy i , y j i  0 for all i , j and k y i k 2  1. 13As in the previous theorem, this mild condition on the marginal distribution of x allows us to rule out pathological situations where a low-degree polynomial in x may be hard to evaluate accurately enough because of coefficients with super-polynomial bit-complexity. 7 and Section 7) bakes this step in by assuming access to an oracle which evaluates the function Í v 7→ i∈[k] hv, yi i 4 . A key component of the algorithm underlying Theorem 1.3 is a new algorithm for very robust orthogonal tensor decomposition.14 Previous algorithms for tensor decomposition require that the input tensor is close (in an appropriate norm) to only one orthogonal tensor. By contrast, our tensor decomposition algorithm is able to operate on a tensor T which is just δ ≪ 1 correlated to the Í orthogonal tensor yi⊗3 , and in particular might also be δ-correlated with 1/δ other orthogonal tensors. If one views tensor decomposition as a decoding task, taking a tensor T and decoding it into its rank-one components, then our guarantees are analogous to list-decoding. Our algorithm in this setting involves a novel entropy-maximization program which, among other things, ensures that given a tensor T which for example is δ-correlated with two distinct orthogonal tensors A and B, the algorithm produces a list of vectors correlated with both the components of A and those of B. Applying this meta-theorem (plus a simple cross-validation scheme to prune the vectors in the 1/poly(δ) n -length list) to the mixed-membership block model (and its special case, the k-disjointcommunities block model) yields the following theorem. (See Section 1.2 for formal statements.) Theorem 1.4 (Main theorem on the mixed-membership block model, informal). Let ε, d, k, α be k 2 (α+1)2 paramters of the mixed-membership block model, and let δ  1 − ε2 d > Ω(1). Let yi be the centered indicator vector of the i-th community. There is an n 1/poly(δ) -time algorithm which, given a sample x from the ε, d, k, α block model, recovers vectors ŷ1 (x), . . . , ŷk (x) such that there is a permutation π : [k] → [k] with h ŷπ(i) , yi i 2 > δ O(1) ( k ŷπ(i) k 2 )1/2 ( k yi k 2 )1/2 . The eventual goal, as we discuss in Section 1.2, is to label each vertex by a probability vector τi which is correlated with the underlying label σi , but given the ŷ vectors from this theorem this is easily accomplished. Comparison to the sum of squares method The sum of squares method has been recently been a popular approach for designing algorithms for Bayesian estimation [BKS15, HSS15, RRS16, GM15]. The technique works best in settings where the maximum-likelihood estimator can be phrased as a polynomial optimization problem (subject to semialgebraic constraints). Then the strategy is to use the sum of squares method to obtain a strong convex relaxation of the maximum-likelihood problem, solve this relaxation, and round the result. This strategy has been quite successful, but thus far it does not seem to allow the sharp (up to low-order additive terms) sample-complexity guarantees we study here. (Indeed, for some problems, including the stochastic block model, it is not clear that maximum likelihood estimation recovers those guarantees, much less the SoS-relaxed version.) One similarity between our algorithms and these applications of sum of squares is that the rounding procedures used at the end often involve tensor decomposition, which is itself often done 14An orthogonal 3-tensor is Ím ⊗3 i1 a i , where a1 , . . . , a m are orthonormal. 8 via the sum of squares method. We do employ the SoS algorithm as a black box to solve tensor decomposition problems for versions of our algorithm which use higher moments. Recent works on SoS show that the low-degree polynomials computed by our meta-algorithm are closely connected to lower bounds for the SoS hierarchy, though this connection remains far from fully understood. The recent result [BHK+ 16] on the planted clique problem first discovered this connection. The work [HKP+ 17] (written concurrently with the present paper) shows that this connection extends far beyond the planted clique setting. Comparison to the method of moments Another approach for designing statistical estimators for provable guarantees is the method of moments. Typically one considers parameters θ (which need not have a prior distribution p(θ)) and iid samples x1 , . . . , x n ∼ p(x|θ). Generally one shows that the moments of the distribution {x|θ} are related to some function of θ: for example perhaps [xx ⊤ | θ]  f (θ). Then one uses the samples x i to estimate the moment M  [xx ⊤ | θ], and finally to estimate θ by f −1 (M). While the method of moments is quite flexible, for the high-noise problems we consider here it is not clear that it can achieve optimal sample complexity. For example, in our algorithms (and existing sample-optimal algorithms for the block model) it is important to exploit the flexibility to compute any polynomial of the samples jointly—given n samples our algorithms can evaluate a polynomial P(x1 , . . . , x n ), and P often will not be an empirical average of some simpler function like Í i 6 n q(x i ). The best algorithm for the mixed-membership block model before our work uses the method of moments and consequently requires much denser graphs than our method [AGHK14]. 1.2 Detecting overlapping communities We turn now to discuss our results for stochastic block models in more detail and compare them to the existing literature. The stochastic block model is a widely studied (family of) model(s) of random graphs containing latent community structure. It is most common to study the block model in the sparse graph setting: many large real-world networks are sparse, and the sparse graph setting is nearly always more mathematically challenging than the dense setting. A series of recent works has for the first time obtained algorithms which recover communities in block model graphs under (conjecturally) optimal sparsity conditions. For an excellent survey, see [Abb17]. Such sharp results remain limited to relatively simple versions of the block model; where, in particular, each vertex is assigned a single community in an iid fashion. A separate line of work has developed more sophisticated and realistic random graph models with latent community structure, with the goal of greater applicability to real-life networks. The mixed-membership stochastic block model [ABFX08] is one such natural extension of the stochastic block model that allows for communities to overlap, as they do in large networks found in the wild. In addition to the number of vertices n, the average degree d, the correlation parameter ε, and the number of communities k, this model has an overlap parameter α > 0 that controls how many communities a typical vertex participates in. Roughly speaking, the model generates an n-vertex 9 graph by choosing k communities as random vertex subsets of size (1 + α)n/k and choosing dn/2 random edges, favoring pairs of vertices that have many communities in common. Definition 1.5 (Mixed-membership stochastic block model). The mixed-membership stochastic block model SBM(n, d, ε, k, α) is the following distribution over n-vertex graphs G and kdimensional probability vectors σ1 , . . . , σn for the vertices: • draw σ1 , . . . , σn independently from Dir(α) the symmetric k-dimensional Dirichlet distribution with parameter α > 0,15   • for every potential edge {i, j}, add it to G with probability d n · 1 + hσi , σ j i − 1 k  ε . Due to symmetry, hσi , σ j i has expected value 1k , which means that the expected degree of every vertex in this graph is d. In the limit α → 0, the Dirichlet distribution is equivalent to the uniform distribution over coordinate vectors 11 , . . . , 1k and the model becomes SBM(n, d, ε, k), the stochastic block model with k disjoint communities. For α  k, the Dirichlet distribution is uniform over the open (k − 1)-simplex [Wik17b]. For general values of α, a probability vector from Dir(α) 1 + 1k , which means that we can think turns out to have expected collision probability (1 − 1k ) α+1 of the probability vector being concentrated on about α + 1 coordinates.16 This property of the Dirichlet distribution is what determines the threshold for our algorithm. Correspondingly, our algorithm and analysis extends to a large class of distributions over probability vectors that share this property. Measuring correlation with community structures In the constant-average-degree regime of the block model, recovering the label of every vertex correctly is information-theoretically impossible. For example, no information is present in a typical sample about the label of any isolated vertex, and in a typical sample a constant fraction of the vertices are isolated. Instead, at least in the k-disjoint-community setting, normally one looks to label vertices by labels 1, . . . , k so that (up to a global permutation), this labeling has positive correlation with the true community labels. bj |, When the communities are disjoint, one can measure such correlation using the sizes of |S j ∩ S bj is an estimated set of nodes in community where S j ⊆ [n] is the set of nodes in community j and S j. The original definition of overlap, the typical measure of labeling-accuracy in the constant-degree regime, takes this approach [DKMZ11]. For present purposes this definition must be somewhat adapted, since in the mixedmembership block model there is no longer a good notion of a discrete set of nodes S j for each community j ∈ [k]. We define a smoother notion of correlation with underlying community labels to accommodate that the labels σi are vectors in ∆k−1 . In discrete settings, for example when α → 0 (in which case one recovers the k-disjoint-community model), or more generally when each σi is the uniform distribution over some number of communities, our correlation measure recovers the usual notion of overlap. 15In the symmetric k-dimensional Dirichlet distribution with parameter α > 0, the probability of a probability vector Î σ is proportional to kt1 σ(t)α/k−1 . By passing to the limit, we define Dir(0) to be the uniform distribution over the coordinate vectors 11 , . . . , 1k . k 16When k and α are comparable in magnitude, it is important to interpret this more accurately as (α + 1) · k+α coordinates. 10 Let σ  (σ1 , . . . , σn ) and τ  (τ1 , . . . , τn ) be labelings of the vertices 1, . . . , n by by k-dimensional probability vectors. We define the correlation corr(σ, τ) as max π i∼n hσi , τπ(i) i − 1 k (1.5) where π ranges over permutations of the k underlying communities. This notion of correlation is closely related to the overlap of the distributions σi , τi . To illustrate this notion of correlation, consider the case of disjoint communities (i.e., α  0), where the ground-truth labels τi are indicator vectors in k dimensions. Then, if i hσi , τπ(i) i − 1k > δ, by looking at the large coordinates of σi it is possible to correctly identify the community memberships of a δ O(1) + 1k fraction of the vertices, which is a δ O(1) fraction more than would be identified by randomly assigning labels to the vertices without looking at the graph. When the ground truth labels τi are spread over more than one coordinate—say, for example, they are uniform over t coordinates—the best recovery algorithm cannot find σ’s with correlation better than 1 1 corr(σ, τ)  − , t k which is achieved by σ  τ. This is because in this case τ has collision probability hτ, τi  1t . Main result for mixed-membership models The following theorem gives a precise bound on the number of edges that allows us to find in polynomial time a labeling of the vertices of an n-node mixed membership block model having nontrivial correlation with the true underlying labels. Here, the parameters d, ε, k, α of the mixed-membership stochastic block model may even depend on the number of vertices n. Theorem 1.6 (Mixed-membership SBM—significant correlation). Let d, ε, k, α be such that k 6 n o(1) , k 2 (α+1)2 def > 0. (Equivalently for small δ, suppose α 6 n o(1) , and ε 2 d 6 n o(1) . Suppose δ  1 − ε2 d 2 2 2 ′ O(1) ε d > (1 + δ) · k (α + 1) .) Then, there exists δ > δ > 0 and an n 1/poly(δ) -time algorithm that given an n-vertex graph G outputs τ1 , . . . , τn ∈ ∆k−1 such that  1 1 − corr(σ, τ) > δ · t k (G,σ)∼SBM(n,d,ε,k,α) ′  (1.6) k where t  (α + 1) · k+α (samples from the α, k Dirichlet distribution are roughly uniform over t out of k coordinates). In particular, as δ → 1 we have corr(σ, τ) → 1t − 1k , while corr(σ, σ)  1t − 1k . Note that in the above theorem, the correlation δ′ that our algorithm achieves depends only on δ (the distance to the threshold) and in particular is independent of n and k (aside from, for the latter, the dependence on k via δ). For disjoint communities (α  0), our algorithm achieves constant correlation with the planted labeling if ε 2 d/k 2 is bounded away from 1 from below. We conjecture that the threshold achieved by our algorithm is best-possible for polynomial-time algorithms. Concretely, if d, ε, k, α are constants such that ε 2 d < k 2 (α + 1)2 , then we conjecture that for every polynomial-time algorithm that given a graph G outputs τ1 , . . . , τn ∈ ∆k−1 , lim n→∞ (G,σ)∼SBM(n,d,ε,k,α) 11 corr(σ, τ)  0 . (1.7) This conjecture is a natural extension of a conjecture for disjoint communities (α  0), which says that beyond the Kesten–Stigum threshold, i.e., ε 2 d < k 2 , no polynomial-time algorithm can achieve correlation bounded away from 0 with the true labeling [Moo17]. For large enough values of k, this conjecture predicts a computation-information gap because the condition ε 2 d > Ω(k log k) is enough for achieving constant correlation information-theoretically (and in fact by a simple exponential-time algorithm). We discuss these ideas further in Section 1.4. Comparison with previous matrix-based algorithms We offer a reinterpretation in our metaalgorithmic framework of the algorithms of Mossel-Neeman-Sly and Abbe-Sandon. This will permit us to compare our algorithm for the mixed-membership model with what could be achieved by the methods in these prior works, and to point out one respect in which our algorithm improves on previous ones even for the disjoint-communities block model. The result we discuss here is a slightly generalized version of Theorem 1.2. Let U be a (possibly infinite or continuous) universe of labels, and let W assign to every x, y ∈ U a nonnegative real number W(x, y)  W(y, x) > 0. Let µ be a probability distribution on U, which induces the inner product of functions f , 1 : U → ’ given by h f , 1i  x∼µ f (x)1(x). The function W can be considered as linear operator on { f : U → ’}, and under mild assumptions it has eigenvalues λ1 , λ2 , . . . with respect to the inner product h·, ·i. The pair µ, W along with an average degree parameter d induce a generalized stochastic block model, where labels for nodes are drawn from µ and an edge between a pair of nodes with labels x and y is present with probability nd · W(x, y). When U is ∆k−1 and µ is the Dirichlet distribution, this captures the mixed-membership block model. Assume λ 1  1 and that µ and W are sufficiently nice (see Section 4 for all the details). Then one can rephrase results of Abbe and Sandon in this setting as follows. Theorem 1.7 (Implicit in [AS16a]). Suppose the operator W has eigenvalues 1  λ1 > λ 2 > · · · > λ r def (each possibly with higher multiplicity) and δ  1 − dλ1 2 > 0. Let Π be the projector to the second eigenspace 2 of the operator W. For types x1 , . . . , x n ∼ U, let A ∈ ’n×n be the random matrix A i j  Π(x i , x j ), where we abuse notation and think of Π : U × U → ’. There is an algorithm with running time n poly(1/δ) which outputs an n × n matrix P such that for x, G ∼ G(n, d, W, µ), x,G Tr P · A > δ O(1) · ( x,G kAk 2)1/2 ( x,G kP k 2 )1/2 . In one way or another, existing algorithms for the block model in the constant-degree regime are all based on estimating the random matrix A from the above theorem, then extracting from an estimator for A some labeling of vertices by communities. In our mixed-membership setting, Í one may show that the matrix A is s∈[k] v s v sT , where v s ∈ ’n has entries v s (i)  σi (s) − 1k . Furthermore, as we show in Section 4, the condition dλ22 > 1 translates for the mixed-membership model to the condition ε 2 d > k(α + 1)2 , which means that under the same hypotheses as our main theorem on the mixed-membership model it is possible in polynomial time to evaluate a Í constant-correlation estimator for s∈[k] v s v sT . As we discussed in Section 1.1, however, extracting estimates for v1 , . . . , v k (or, almost equivalently, estimates for σ1 , . . . , σn ) from this matrix seems 12 to incur an inherent 1/k loss in the correlation. Thus, the final guarantee one could obtain for the mixed-membership block model using the techniques in previous work would be estimates  O(1) .17 We avoid this loss in our main theorem τ1 , . . . , τn for σ1 , . . . , σn such that corr(σ, τ) > δk via tensor methods. Although this 1/k multiplicative loss in the correlation with the underlying labeling is not inherent in the disjoint-community setting (roughly speaking this is because the matrix A is a 0/1 block-diagonal matrix), previous algorithms nonetheless incur such loss. (In part this is related to the generality of the work of Abbe and Sandon: they aim to allow W where A might only have rank one, while in our settings A always has rank k − 1. For low-rank A this 1/k loss is probably necessary for polynomial time algorithms.) Thus our main theorem on the mixed membership model offers an improvement on the guarantees in the previous literature even for the disjoint-communities setting: when W only has entries 1 − ε and ε we obtain a labeling of the vertices whose correlation with the underlying labeling depends only on δ. This allows the number k of communities to grow with n without incurring any loss in the correlation (so long as the average degree of the graph grows accordingly). For further discussion of the these results and a proof of the above theorem, see Section 4. Comparison to previous tensor algorithm for mixed-membership models Above we discussed a reinterpretation (allowing a continuous space U of labels) of existing algorithms for the constantaverage-degree block model which would give an algorithm for the mixed-membership model, and discussed the advantages of our algorithm over this one. Now we turn to algorithms in the literature which are specifically designed for stochastic block models with overlapping communities. The best such algorithm requires ε 2 d > O(log n)O(1) · k 2 (α + 1)2 [AGHK13]. Our bound saves the O(log n)O(1) factor. (This situation is analogous to the standard block model, where simpler algorithms based on eigenvectors of the adjacency matrix require the graph degree to be Í logarithmic.) Notably, like ours this algorithm is based on estimating the tensor T  s∈[k] v s⊗3 , where v s ∈ ’n has entries v s (i)  σi (s) − 1k . However, the algorithm differs from ours in two key respects. 1. The algorithm [AGHK13] estimates the tensor T using a 3-tensor analogue of a high power of the adjacency matrix of an input graph, while we use self-avoiding walks (which are rather like a tensor analogue of the nonbacktracking operator). 2. The tensor decomposition algorithm used in [AGHK13] to decompose the (estimator for the) tensor T tolerates much less error than our tensor decomposition algorithm; the result is that a higher-degree graph is needed in order to obtain a better estimator for the tensor T. The setting considered by [AGHK13] does allow a more sophisticated version of the Dirichlet distribution than we allow, in which different communities have different sizes. It is an interesting open problem to extend the guarantees of our algorithm to that setting. 17In fact, it is not clear one can obtain even this guarantee using strictly matrix methods. Strictly speaking, in estimating, say, v1 using the above described matrix method, one obtains a unit vector v such that hv, v1 i 2 > Ω(1) · kv1 k 2 . Without knowing whether v or −v is the correct vector it is not clear how to transform estimates for the v s ’s to estimates for the σ’s. However, matrix methods cannot distinguish between v s and −v s . In our main algorithm we avoid this issue Í because the 3rd moments v s⊗3 are not sign-invariant. 13 1.3 Low-correlation tensor decomposition Tensor decomposition is the following problem. For some unit vectors a1 , . . . , a m ∈ ’n and a Í ⊗k constant k (often k  3 or 4), one is given the tensor T  m i1 a i + E, where E is some error tensor. The goal is to recover vectors b 1 , . . . , b m ∈ ’n which are as close as possible to a1 , . . . , a m . Tensor decomposition has become a common primitive used by algorithms for parameter learning and estimation problems [CJ10, AGH+ 14, GHK, GVX14, BKS15, MSS16, SS17]. In the simplest examples, the hidden variables are orthogonal vectors a1 , . . . , a m and there is a simple Í function of the observed variables which estimates the tensor i 6 m a i⊗k (often an empirical k-th moment of observed variables suffices). Applying a tensor decomposition algorithm to such an estimate yields estimates of the vectors a1 , . . . , a m . We focus on the case that a1 , . . . , a m are orthonormal. Algorithms for this case are already useful for a variety of learning problems, and it is often possible to reduce more complicated problems to the orthonormal case using a small amount of side information about a1 , . . . , a m (in Í T particular their covariance m i1 a i a i ). In this setting the critical question is: how much error E (and measured in what way) can the tensor decomposition algorithm tolerate and still produce useful outputs b 1 , . . . , b m ? When we use tensor decomposition in our meta-algorithm, the error E will be incurred when Í ⊗k estimating m i1 a i from observable samples. Using more samples would decrease the magnitude Ím ⊗k of T − i1 a i , but because our goal is to obtain algorithms with optimal sample complexity we need a tensor decomposition algorithm which is robust to greater errors than those in the existing literature. Our main theorem on tensor decomposition is the following. Theorem 1.8 (Informal). For every δ > 0, there is a randomized algorithm with running time n 1/poly(δ) that given a 3-tensor T ∈ (’n )⊗3 and a parameter k outputs n poly(1/δ) unit vectors b 1 , . . . , b m with the √ Ík ⊗3 following property: if T satisfies hT, i1 a i i > δ · kT k · k for some orthonormal vectors a1 , . . . , a k , then max ha i , b j i 2 > δ O(1) . i∼[k] j∈[m] Furthermore, if the algorithm is allowed to make n 1/poly(δ) calls to an oracle O which correctly answers Í 4 O(1) ?”, then it outputs just k orthonormal queries of the form “does the unit vector v satisfy m i1 ha i , vi > δ vectors, b 1 , . . . , b k such that there is a permutation π : [k] → [k] with i∈[k] ha i , b π(i) i 2 > δ O(1) . (These guarantees hold in expectation over the randomness used in the decomposition algorithm.) (For a more formal statement, and in particular the formal requirements for the oracle O, see Section 7.) √ Í Rescaling T as necessary, one may reinterpret the condition hT, ki1 a i⊗3 i > δ · kT k · k as √ Í Í ⊗3 k/δ and k · k is the Euclidean norm. T  ki1 a i⊗3 + E, where hE, m i1 a i i  0 and kEk 6 In particular, E may have Euclidean norm which is a large constant factor 1/δ larger than the 14 Í ⊗3 Euclidean norm of the tensor m i1 a i that the algorithm is trying to decompose! (One way such error could arise is if T is actually correlated with 1/δ unrelated orthogonal tensors; our algorithm in that case ensures that the list of outputs vectors is correlated with every one of these orthogonal tensors.) In all previous algorithms of which we are aware (even for the case of orthogonal a1 , . . . , a m ), the error E must have spectral norm (after flattening to an n 2 × n 2 matrix) at most ε for ε < 21 ,18 √ or E must have Euclidean norm at most ε m [SS17]. The second requirement is strictly stronger than ours (thus our algorithm has weaker requirements and so stronger guarantees). The first, on the spectral norm of E when flattened to a matrix, is incomparable to the condition in our theorem. However, when E satisfies such a spectral bound it is possible to decompose T using (sophisticated) spectral methods [MSS16, SS17]. In our setting such methods seem unable to avoid producing only vectors b which are correlated with E but not with any a1 , . . . , a m . In other words, such methods would overfit to the error E. To avoid this, our algorithm uses a novel maximum-entropy convex program (see Section 7 for details). One a priori unusual requirement of our tensor decomposition algorithm is access to the oracle O. In any tensor decomposition setting where E satisfies kEkin j  max kxk1 hE, x ⊗3 i 6 o(1), the Í oracle O can be implemented just be evaluating hT, v ⊗3 i  ki1 ha i , vi 3 + o(1). All previous works on tensor decomposition of which we are aware either assume that the injective norm kEkin j is bounded as above, or (as in [SS17]) can accomplish this with a small amount of preprocessing on the tensor T. Our setting allows, for example, E  100 · v ⊗3 for some unit vector v, and does not appear to admit the possibility of such preprocessing, hence the need for an auxiliary implementation of O. In our learning applications we are able to implement O by straightforward holdout set/cross-validation methods. 1.4 Information-computation gaps and concrete lower bounds The meta-algorithm we offer in this paper is designed to achieve optimal sample complexity among polynomial-time algorithms for many Bayesian estimation problems. It is common, though, that computationally inefficient algorithms can obtain accurate estimates of hidden variables with fewer samples than seem to be tolerated by any polynomial-time algorithm. This appears to be true for the k-community stochastic block model we have used as our running example here: efficient algorithms seem to require graphs of average degree d > k 2 /ε 2 to estimate communities, while inefficient algorithms are known which tolerate d of order k log k [AS16b, Moo17]. Such phenomena, sometimes called information-computation gaps, appear in many other Bayesian estimation problems. For example, in the classical planted clique problem [Jer92, Kuc95], a clique of size k > (2 + ε) log n is randomly added to a sample G ∼ G(n, 12 ); the goal is to find the clique given the graph. Since the largest clique in G(n, 12 ) has expected size 2 log n, so long as k > (2 + ε) log n it is information-theoretically possible, via brute-force search, to recover the planted clique. On the other hand, despite substantial effort, no polynomial-time algorithm is √ known which can find a clique of size k 6 o( n), exponentially-larger than cliques which can be 18Or, mildly more generally, E should have SoS norm less than ε [MSS16]. 15 found by brute force. For other examples one need not look far: sparse principal component analysis, planted constraint satisfaction problems, and densest-k-subgraph are just a few more problems exhibiting information-computation gaps. This ubiquity leads to several questions: 1. What rigorous evidence can be provided for the claim: no polynomial algorithm tolerates b 1 , . . . , x n ) for particular a n < n ∗ samples and produces a constant-correlation estimator θ(x Bayesian estimation problem p(x, θ)? 2. Can information-computation gaps of different problems be explained by similar underlying phenomena? That is, is there a structural feature of a Bayesian estimation problem which determines whether it exhibits an information-computation gap, and if so, what is the critical number of samples n ∗ required by polynomial-time algorithms? 3. Are there methods to easily predict the location of a critical number n ∗ of samples, without analyzing every polynomial-time algorithm one can think of? Rigorous evidence for computational phase transitions The average-case nature of Bayesian estimation problems makes it unlikely that classical tools like (NP-hardness) reductions allow us to reason about the computational difficulty of such problems in the too-few-samples regime. Instead, to establish hardness of an estimation problem when n < n ∗ for some critical n ∗ , one proves impossibility results for restricted classes of algorithms. Popular classes of algorithms for this purpose include Markov-Chain Monte Carlo algorithms and various classes of convex programs, especially arising from convex hierarchies such as the Sherali-Adams linear programming hierarchy and the sum of squares semidefinite programming hierarchy. Results like this are meaningful only if the class of algorithms for which one proves an impossibility result captures the best known (i.e. lowest-sample-complexity) polynomial-time algorithm for the problem at hand. Better yet would be to use a class of algorithms which captures the lowest-sample-complexity polynomial-time algorithms for many Bayesian estimation problem simultaneously. In the present work we study sample complexity up to low-order additive terms in the number n of samples. For example, in the k-community α-mixed-membership stochastic block model, we provide an algorithm which estimates communities in graphs of average degree d > (1 + δ)k 2 (α + 1)2 /ε 2 , for any constant δ > 0. Such precise algorithmic guarantees suggest the pursuit of equally-precise lower bounds. Proving a lower bound against the convex-programming-based algorithms most commonly considered in previous work on lower bounds for Bayesian estimation problems does not suit this purpose. While powerful, these algorithms are generally not designed to achieve optimal sample complexity up to low-order additive terms. Indeed, there is mounting evidence in the block model setting that sum of squares semidefinite programs actually require a constant multiplicative factor more samples than our meta-algorithm [MS16, BKM17]. Another approach to providing rigorous evidence for the impossibility side of a computational threshold is statistical query complexity, used to prove lower bounds against the class of statistical query algorithms [FGR+ 13, FGV15, FPV15]. To the best of our knowledge, similar to sum of squares 16 algorithms, statistical query algorithms are not known to achieve optimal sample rates for problems such as community recovery in the block model up to low-order additive terms. Such sampleoptimal algorithms seem to intrinsically require the ability to compute a complicated function of many samples simultaneously (for example, the top eigenvector of the non-backtracking operator). But even the most powerful statistical query algorithms (using the 1-STAT oracle) can access one bit of information about each sample x (by learning the value of some function h(x) ∈ {0, 1}). This makes it unclear how the class of statistical query algorithms can capture the kinds of sampleoptimal algorithms we want to prove lower bounds against. Our meta-algorithm offers an alternative. By showing that when n is less than a critical n ∗ there are no constant-correlation low-degree estimators for a hidden random variable, one rules out any efficient algorithm captured by our meta-algorithm. Concretely, Theorems 1.1 and 1.3 show that in order for an estimation problem to be intractable it is necessary that every low-degree polynomial fails to correlate with the second or third moment of the posterior distribution (in the sense of Eqs. (1.1) and (1.3)). This kind of fact about low-degree polynomial is something we can aim to prove unconditionally as a way to give evidence for the intractability of a Bayesian estimation problem. Next we discuss our example result of this form in the block model setting. Concrete unconditional lower bound at the Kesten–Stigum threshold In this work, we show an unconditional lower bound about low-degree polynomials for the stochastic block model with k communities at the Kesten–Stigum threshold. For k > 4, this threshold is bounded away from the information-theoretic threshold [AS15]. In this way, our lower bounds gives evidence for an inherent gap between the information-theoretical and computational thresholds. For technical reasons, our lower bound is for a notion of correlation mildly different from Eqs. (1.1) and (1.3). Our goal is to compare the stochastic block model distribution SBM(n, d, ε, k) graphs to the Erdős-Rényi distribution G(n, nd ) with respect to low-degree polynomials. As before we represent graphs as adjacency matrices x ∈ {0, 1} n×n . Among all low-degree polynomials p(x), we seek one so that the typical value of p(x) for graphs x from the stochastic blocks model is as large as possible compared to its typical for Erdős-Rényi graphs. The following theorem shows that a suitable mathematical formalization of this question exhibits a sharp “phase transition” at the Kesten–Stigum threshold. Theorem 1.9. Let d, ε, k be constants. Then, max p∈’[x]6 ℓ x∼SBM(n,d,ε,k) x∼G(n,d/n) p(x)   2 1/2 p(x) ( > n Ω(1) if ε 2 d > k 2 , ℓ > O(log n) 6 n o(1) if ε 2 d < k 2 , ℓ 6 n o(1) (1.8) Let µ : {0, 1} n×n → ’ be the relative density of SBM(n, d, ε, k) with respect to G(n, nd ). Basic linear algebra shows that the left-hand side of Eq. (1.8) is equal to kµ 6 ℓ k2 , where k·k2 is the Euclidean norm with respect to the measure G(n, d/n) and µ 6 ℓ is the projection (with respect to this norm) of µ to the subspace of functions of degree at most ℓ. This is closely related to the χ2 -divergence of µ with respect to G(n, d/n), which in the present notation would be given by k(µ − 1)k2 . When the latter quantity is small, k(µ − 1)k2 6 o(1), one may conclude that the distribution µ is information17 theoretically indistinguishable from G(n, d/n). This technique is used in the best current bounds on the information-theoretic properties of the block model [MNS12, BMNN16]. The quantity in Theorem 1.9 is a low-degree analogue of the χ2 -divergence. If it were true that k(µ 6 ℓ − 1)k2 6 o(1), then by a straightforward application of Cauchy-Schwarz it would follow that no low-degree polynomial p(x) distinguishes the block model from G(n, d/n), since every such p would have (after setting G(n,d/n) p(x)  0) that SBM p(x) 6 o( G(n,d/n) p(x)2 )1/2 . This condition turns out to be quite powerful: [BHK+ 16, HKP+ 17] give evidence that for problems such as planted clique, for which distinguishing instances drawn from a null model from instances with hidden structure should be computationally intractable, the condition k(µ 6 ℓ − 1)k 6 o(1) is closely related to sum of squares lower bounds.19 The situation in the k-community block model is a bit more subtle. One has only that kµ 6 ℓ k 6 n o(1) below the Kesten-Stigum threshold because even in the latter regime it remains possible to distinguish a block model graph from G(n, d/n) via a low-degree polynomial (simply counting triangles will suffice). However, we can still hope to rule out algorithms which accurately estimate communities below the Kesten-Stigum threshold. For this we prove the following theorem. Theorem 1.10. Let d, ε, k, δ be constants such that ε 2 d < (1 − δ)k 2 . Let f : {0, 1} n×n → ’ be any function, let i, j ∈ [n] be distinct. Then if f satisfies d f (x)  0 and is correlated with the indicator x∼G(n, n ) 1σi σ j that i and j are in the same community in the following sense: x∼SBM(n,d,ε,k) ( f (x)(1σi σ j − 1k ) d x∼G(n, n ) f (x)2 )1/2 > Ω(1) then deg f > n c(d,ε,k) for some c(d, ε, k) > 0. There is one subtle difference between the polynomials ruled out by this theorem and those which could be used by our meta-algorithm. Namely, this theorem rules out any f whose correlation with the indicator 1σi σ j is large compared to f ’s standard deviation under G(n, d/n), whereas our meta-algorithm needs a polynomial f where this correlation is large compared to f ’s standard deviation under the block model. In implementing our meta-algorithm for the block model and for other problems, we have found that these two measures of standard deviation are always equal (up to low-order additive terms) for the polynomials which turn out to provide sample-optimal constant-correlation estimators of hidden variables. Interesting open problems are to prove a version of the above theorem where standard deviation is measured according to the block model and to formalize the idea that SBM f (x)2 should be related to G(n,d/n) f (x)2 for good estimators f . It would also be quite interesting to see how large the function c(d, ε, k) can be made: the above theorem shows that when d < (1 − δ)k 2 /ε 2 the degree of any good estimator of 1σi σ j must be polynomial in n—perhaps it must be linear, or even quadratic in n. 19In particular, the so-called pseudocalibration approach to sum of squares lower bounds works only when k(µ 6 ℓ −1)k 6 o(1). 18 General strategies to locate algorithmic thresholds The preceding theorems suggest a general strategy to locate critical a sample complexity n ∗ for almost any Bayesian estimation problem: compute a Fourier transform of an appropriate relative density µ and examine the 2-norm of its low-degree projection. This strategy has several merits beyond its broad applicability. One advantage is that in showing k(µ > ℓ − 1)k > Ω(1), one automatically has discovered a degree-ℓ polynomial and a proof that it distinguishes samples with hidden structure from an appropriate null model. Another is the mounting evidence (see [BHK+ 16, HKP+ 17]) that when, on the other hand k(µ 6 ℓ −1)k 6 o(1) for large-enough ℓ, even very powerful convex programs cannot distinguish these cases. A final advantage is simplicity: generally computing k(µ > ℓ − 1)k is a simple exercise in Fourier analysis. Finally, we compare this strategy to the only other one we know which shares its applicability across many Bayesian estimation problems, namely the replica and cavity methods (and their attendant algorithm, belief propagation) from statistical physics [MM09]. These methods were the first used to predict the sharp sample complexity thresholds we study here for the stochastic block model, and they have also been used to predict similar phenomena for many other hidden variable estimation problems [LBB+ 16, LBB+ 16, LBB+16]. Though remarkable, the predictions of these methods are much more difficult than ours make rigorous—in particular, it is notoriously challenging to rigorously analyze the belief propagation algorithm, and often when these predictions are made rigorous, only a modified version (“linearized BP”) can be analyzed in the end. By contrast, our methods to predict critical sample complexities, design algorithms, and prove lower bounds all study essentially the same low-degree-polynomial algorithm. We view it as a fascinating open problem to understand why predicted critical sample complexities offered by the replica and cavity methods are so often identical to the predictions of the low-degree-polynomials meta-algorithm we propose here. 2 Techniques To illustrate the idea of low-degree estimators for posterior moments, let’s first consider the most basic stochastic block model with k  2 disjoint communities (α  0). (Our discussion will be similar to the analysis in [MNS15a].) Let y ∈ {±1} n be chosen uniformly at random and let x ∈ {0, 1} n×n be the adjacency matrix of a graph such that for every pair i < j ∈ [n], we have x i j  1 with probability (1 + ε yi y j ) nd . Our goal is to find a matrix-valued low-degree polynomial P(x) that correlates with y yT . It turns out to be sufficient to construct for every pair i, j ∈ [n] a low-degree polynomial that correlates with yi y j . The linear polynomial p i j (x)  n εd  xi j − d n  is an unbiased estimator for yi y j in the sense that [p i j (x) | y]  yi y j . By itself, this estimator is not particular useful because its variance p i j (x)2 ≈ εn2 d is much larger than the quantity yi y j we are trying to estimate. However, if we let α ⊆ [n]2 be a length-ℓ path between i and j (in the complete graph), then we can combine the unbiased estimators along the path α and obtain a polynomial p α (x)  Ö ab∈α 19 p ab (x) (2.1) Î  that is still an unbiased estimator [p α (x) | yi , y j ]  ab∈α y a y b | y i , y j  y i y j . This estimator n ℓ 2 has much higher variance p α (x) ≈ (ε2 d ) . But we can hope to reduce this variance by averaging over all such paths. The number of such paths is roughly n ℓ−1 (because there are ℓ − 1 intermediate vertices to choose). Hence, if these estimators {p α (x)}α were pairwise independent, this averaging would reduce the variance by a multiplicative factor n ℓ−1 , giving us a final variance of (εn2 d )ℓ · n 1−ℓ  ( ε12 d )ℓ · n. We can see that above the Kesten–Stigum threshold, i.e., ε 2 d > 1 + δ for δ > 0, this heuristic variance bound ( ε12 d )ℓ · n 6 1 is good enough for estimating the quantity yi · y j for paths of length ℓ > log1+δ n. Two steps remain to turn this heuristic argument into a polynomial-time algorithm for estimating the matrix y yT . First, it turns out to be important to consider only paths that are self-avoiding. As we will see next, estimators from such paths are pairwise independent enough to make our heuristic variance bound go through. Second, a naive evaluation of the final polynomial takes quasipolynomial time because it has logarithmic degree (and a quasi-polynomial number of non-zero coefficients in the monomial basis). We describe the high-level ideas for avoiding quasi-polynomial running time later in this section (Section 2.5). 2.1 Approximately pairwise-independent estimators Let SAWℓ (i, j) be the set of self-avoiding walks α ⊆ [n]2 of length ℓ between i and j. Consider the Í unbiased estimator p(x)  |SAW1ℓ (i, j)| α∈SAWℓ (i, j) p α (x) for yi y j . Above the Kesten–Stigum threshold and for ℓ > O(log n), we can use the following lemma to show that p(x) has variance O(1) and achieves constant correlation with z  yi y j . We remark that the previous heuristic variance bound corresponds to the contribution of the terms with α  β in the left-hand side of Eq. (2.2). Lemma 2.1 (Constant-correlation estimator). Let (x, z) be distributed over {0, 1} n × ’. Let {p α }α∈I be a collection of real-valued n-variate polynomials with the following properties: 1. unbiased estimators: [p α (x) | z]  z for every α ∈ I 2. approximate pairwise independence: for δ > 0, Õ α,β∈I Then, the polynomial p  1 |I| Í α∈I p α (x) · p β (x) 6 p α satisfies 1 δ2 p(x) · z > δ · · |I| 2 z2 p(x)2 · (2.2) z2  1/2 . Remark 2.2. In applying the lemma we often substitute for Eq. (2.2) the equivalent condition z2 · Õ α,β∈I p α (x) · p β (x) 6 1 Õ ( p α (x)z) · ( p β (x)z) · δ2 α,β∈I which is conveniently invariant to rescaling of the p α ’s. Proof. Since the polynomial p is an unbiased estimator for z, we have p(x)z  p(x)2 6 (1/δ 2 ) · z 2 . Taken together, we obtain the desired conclusion. 20 z 2 . By Eq. (2.2),  In Section 3.1, we present the short combinatorial argument that shows that above the Kesten– Stigum bound the estimators for self-avoiding walks satisfy the conditions Eq. (2.2) of the lemma. We remark that if instead of self-avoiding walks we were to average over all length-ℓ walks between i and j, then the polynomial p(x) computes up to scaling nothing but the (i, j)-entry of the ℓ-th power of the centered adjacency x − nd 1 1 T . For ℓ ≈ log n, the ℓ-th power of this matrix converges to vvT , where v is the top eigenvector of the centered adjacency matrix. For constant degree d  O(log n), it is well-known that this eigenvector fails to provide a good approximation to the true labeling. In particular, the corresponding polynomial fails to satisfy the conditions of Lemma 2.1 close to the Kesten–Stigum threshold. 2.2 Low-degree estimators for higher-order moments Let’s turn to the general mixed-membership stochastic block model SBM(n, d, ε, k, α 0). Let (G, σ) be graph G and community structure σ  (σ1 , . . . , σn ) drawn from this model. Recall that σ1 , . . . , σn are k-dimensional probability vectors, each roughly uniform over α 0 + 1 of the coordinates. Let x ∈ {0, 1} n×n be the adjacency matrix of G and let y1 , . . . , yk ∈ ’n be centered community indicator vectors, so that (ys )i  (σi )s − 1k . It’s instructive to see that, unlike for disjoint communities, second moments are not that useful for overlapping communities. As a thought experiment suppose we are given the matrix Ík T s1 (y s )(y s ) (which we can estimate using the path polynomials described earlier). In case of disjoint communities, this matrix allows us to “read off” the community structure directly (because two vertices are in the same community if and only if the entry in the matrix is 1 − O(1/k)). For overlapping communities (say the extreme case α 0 ≫ k for simplicity), we can think of each σi as a random perturbation of the uniform distribution so that (σi )s  (1 + ξ i,s ) 1k for iid Gaussians {ξ i,s } with small variance. Then, the centered community indicator vectors y1 , . . . , yk are iid Í centered, spherical Gaussian vectors. In particular, the covariance matrix ks1 ys ysT essentially only determines the subspace spanned by the vectors y1 , . . . , yk but not the vectors themselves. (This phenomenon is sometimes called the “rotation problem” for matrix factorizations.) In contrast, classical factor analysis results show that if we were given the third moment tensor Ík ⊗3 s1 y s , we could efficiently reconstruct the vectors y1 , . . . , y k [Har70, LRA93]. This fact is the reason for aiming to estimate higher order moments in order to recover overlapping communities. In the same way that a single edge x i, j − nd gives an unbiased estimator for the (i, j)-entry of the second moment matrix, a 3-star (x i,c − nd )(x j,c − nd )(x k,c − nd ) gives an unbiased estimator for Í the (i, j, k)-entry of the third moment tensor ks1 ys⊗3 . This observation is key for the previous best algorithm for mixed-membership community detection [AGHK13]. However, even after averaging over all possible centers c, the variance of this estimator is far too large for sparse graphs. In order to decrease this variance, previous algorithms [AGHK13] project the tensor to the top eigenspace of the centered adjacency matrix of the graph. In terms of polynomial estimators this projection corresponds to averaging over all length-ℓ-armed 3-stars20 for ℓ  log n. Even for 20A length-ℓ-armed 3-star between i, j, k ∈ [n] consists of three length-ℓ walks between i, j, k and a common center c ∈ [n] 21 disjoint communities, this polynomial estimator would fail to achieve the Kesten–Stigum bound. In order to improve the quality of this polynomial estimator, informed by the shape of thresholdachieving estimator for second moments, we average only over such long-armed 3-stars that are self-avoiding. We show that the resulting estimator achieves constant correlation with the desired third moment tensor precisely up to the Kesten–Stigum bound (Section 5.2). 2.3 Correlation-preserving projection A recurring theme in our algorithms is that we can compute an approximation vector P that is correlated with some unknown ground-truth vector Y in the Euclidean sense hP, Yi > δ · kP k · kY k, where the norm k·k is induced by the inner product h·, ·i. (Typically, we obtain P by evaluating a low-degree polynomial in the observable variables and Y is the second or third moment of the hidden variables.) In this situation, we often seek to improve the quality of the approximation P—not in the sense of increasing the correlation, but in the sense of finding a new approximation Q that is “more similar” to Y while roughly preserving the correlation, so that hQ, Yi > δ O(1) · kQ k · kY k. As a concrete example, we may know that Y is a positive semidefinite matrix with all-ones on the diagonal and our goal is to take an arbitrary matrix P correlated with Y and compute a new matrix Q that is still correlated with Y but in addition is positive semidefinite and has all-ones on the diagonal. More generally, we may know that Y is contained in some convex set C and the goal is “project” P into the set C while preserving the correlation. We note that the perhaps most natural choice of Q as the vector closest to P in C does not work in general. (For example, if Y  (1, 0), C  {(a, b) | a 6 1}, and P  (δ · M, M), then the closest vector to P in C is (1, M), which has poor correlation with Y for large M.) Theorem 2.3 (Correlation-preserving projection). Let C be a convex set and Y ∈ C. Let P be a vector with hP, Yi > δ · kP k · kY k. Then, if we let Q be the vector that minimizes kQ k subject to Q ∈ C and hP, Qi > δ · kP k · kY k, we have hQ, Yi > δ/2 · kQ k · kY k . (2.3) Furthermore, Q satisfies kQ k > δkY k. Proof. By construction, Q is the Euclidean projection of 0 into the set C ′ : {Q ∈ C | hP, Qi > δkP k · kY k}. It’s a basic geometric fact (sometimes called Pythagorean inequality) that a Euclidean projection into a set decreases distances to points into the set. Therefore, kY − Q k 2 6 kY − 0k 2 (using that Y ∈ C ′). Thus, hY, Qi > kQ k 2/2. On the other hand, hP, Qi > δkP k · kY k means that kQ k > δkY k by Cauchy–Schwarz. We conclude hY, Qi > δ/2 · kY k · kQ k.  In our applications the convex set C typically consists of probability distributions or similar objects (for example, quantum analogues like density matrices or pseudo-distributions—the sumof-squares analogue of distributions). Then, the norm minimization in Theorem 2.3 can be viewed as maximizing the Rényi entropy of the distribution Q. From this perspective, maximizing the entropy within the set C ′ ensures that the correlation with Y is not lost. 22 2.4 Low-correlation tensor decomposition Earlier we described how to efficiently compute a 3-tensor P that has correlation δ > 0 with Í a 3-tensor ki1 yi⊗3 , where y1 , . . . , yk are unknown orthonormal vectors we want to estimate (Section 2.2). Here, the correlation δ depends on how far we are from the threshold and may be minuscule (say 0.001). It remains to decompose the tensor P into a short list of vectors L so as to ensure that O(1) . (Ideally of course |L|  k. In the block model context this guari∈[k] max ŷ∈L h ŷ, yi > δ antee requires a small amount of additional work to cross-validate vectors in a larger list.) To the best of our knowledge, previous tensor decomposition algorithms do not achieve this kind of Í guarantee and require that the correlation of P with the orthogonal tensor ki1 yi⊗3 is close to 1 (sometimes even within polynomial factors 1/n O(1) ). In the current work, we achieve this guarantee building on previous sum-of-squares based tensor decomposition algorithms [BKS15, MSS16]. These algorithms optimize over moments of pseudo-distributions (a generalization of probability distributions) and then apply Jennrich’s classical tensor decomposition algorithms to these “pseudo-moments”. The advantage of this approach is that it provably works even in situations where Jennrich’s algorithm fails when applied to the original tensor. As a thought experiment, suppose we are able to find pseudo-moments M that are correlated Í with the orthogonal tensor ki1 yi⊗3 . Extending previous techniques [MSS16], we show that Jennrich’s algorithm applied to M is able to recover vectors that have constant correlation with a constant fraction of the vectors y1 , . . . , yk . A priori it is not clear how to find such pseudo-moments M because we don’t know the Í orthogonal tensor ki1 yi⊗3 , we only know a 3-tensor P that is slightly correlated with it. Here, the correlation-preserving projection discussed in the previous section comes in: by Theorem 2.3 we can efficiently project P into the set of pseudo-moments in a way that preserves correlation. In this way, we obtain pseudo-moments M that are correlated with the unknown orthogonal tensor Ík ⊗3 i1 y i . When P is a 3-tensor as above, we encounter technical difficulties inherent to odd-order tensors. (This is a common phenomenon in the tensor-algorithms literature.) To avoid these difficulties we give a simple algorithm, again using the correlation-preserving projection idea, to lift a 3-tensor P which is δ-correlated with an orthogonal tensor A to a 4-tensor P ′ which is δ O(1) -correlated with an appropriate orthogonal 4-tensor. See Section 7.2. 2.5 From quasi-polynomial time to polynomial time In this section, we describe how to evaluate certain logarithmic-degree polynomials in polynomialtime (as opposed to quasi-polynomial time). The idea is to use color coding [AYZ95].21 ℓ For a coloring c : [n] → [ℓ] and a subgraph α ⊆ [n]2 on ℓ vertices, let Fc,α  ℓℓ! · 1c(α)[ℓ] be a scaled indicator variable of the event that α is colorful. 21We thank Avi Wigderson for suggesting that color coding may be helpful in this context. 23 Theorem 2.4 (Evaluating colorful-path polynomials). There exists a n O(1) · exp(ℓ)-time algorithm that given vertices i, j ∈ [n], a coloring c : [n] → [ℓ] and an adjacency matrix x ∈ {0, 1} n×n evaluates the polynomial Õ p c (x) : |SAW1ℓ (i, j)| p α (x) · Fc,a . (2.4) (Here, p α ∝ Î α∈SAW ℓ (i, j) ab∈α (x ab − nd ) is the polynomial in Eq. (2.1).) Proof. We can reduce this problem to computing the ℓ-th power of the following n · 2ℓ -by-n · 2ℓ matrix: The rows and columns are indexed by pairs (a, S) of vertices a ∈ [n] and color sets S ⊆ [ℓ]. The entry for column (a, S) and row (b, T) is equal to x ab − nd if T  S ∪ {c(a)} and 0 otherwise. If we compute the ℓ-th power of this matrix, then the entry for column (i, ∅) and row (j, [ℓ]) is the sum over all colorful ℓ-paths from i to j.  For a fixed coloring c, the polynomial p c does not provide a good approximation for the Í polynomial p(x) : |SAW1ℓ (i, j)| α∈SAWℓ (i, j) p α (x). In order to get a good approximation, we will choose random colorings and average over them. If we let c be a random coloring, then by construction c Fc,α  1 for every simple ℓ-path α. Therefore, c p c (x)  p(x) for every x ∈ {0, 1} n×n . We would like to estimate the variance of p c (x). Here, it turns out to be important to consider a typical x drawn from stochastic block model distribution SBM. x∼SBM(n,d,ε) c p c (x)2  1 |SAWℓ (i, j)| 2 6e 2ℓ · Õ Õ α,β∈SAW ℓ (i, j) 1 |SAWℓ (i, j)| c Fc,α · Fc,β · α,β∈SAW ℓ (i, j) x∼SBM | p α (x)p β (x)| . x p α (x)p β (x) (2.5) (2.6) 2 6 e 2ℓ (because ℓ ℓ /ℓ! 6 e ℓ ). For the last step, we use that c Fc,α The right-hand side of Eq. (2.6) corresponds precisely to our notion of approximate pairwise independence in Lemma 2.1. Therefore, if we are within the Kesten–Stigum bound, ε 2 d > 1 + δ, the right-hand side of Eq. (2.6) is bounded by e 2ℓ · 1/δ O(1) . We conclude that with high probability over x, the variance of p c (x) for random c is bounded by O(ℓ) e . It follows that by averaging over e O(ℓ) random colorings we obtain a low-variance estimator for p(x). 2.6 Illustration: push-out effect in spiked Wigner matrices We turn to a first demonstration of our meta-algorithm beyond the stochastic block model: deriving the critical signal-to-noise ratio for (Gaussian) Wigner matrices (i.e. symmetric matrices with iid entries) with rank-one spikes. This section demonstrates the use of Theorem 1.1; more sophisticated versions of the same ideas (for example our 3rd-moment meta-theorem, Theorem 1.3) will be used in the course of our block model algorithms. Consider the following Bayesian estimation problem: We are given a spiked Wigner matrix A  λvvT + W so that W is a random symmetric matrix with Gaussian entries Wi j ∼ N(0, n1 ) and 24 v ∼ N(0, n1 Id). The goal is to estimate v, i.e., compute a unit vector v̂ so that hv, v̂i 2 > Ω(1). Since √ √ the spectral norm of a Wigner matrix satisfies kW k  2, it follows that for λ > 2, the top eigenvector v̂ of A satisfies hv, v̂i 2 > Ω(1). However, it turns out that we can estimate the spike v even for smaller values of λ: a remarkable property of spiked Wigner matrices is that as soon as λ > 1, the top eigenvector v̂ becomes correlated with the spike v [BAP+ 05]. (This property is sometimes called the “pushout effect”.) Unfortunately known proofs of this property a quite involved. In the following, we apply Theorem 1.1 to give an alternative proof of the fact that it is possible to efficiently estimate the spike v as soon as λ > 1. Our algorithm is more involved and less efficient than computing the top eigenvector of A. The advantage is that its analysis is substantially simpler compared to previous analyses. Theorem 2.5 (implicit in [BAP+ 05]). If λ  1 + δ for some 1 > δ > 0, there is a degree δ−O(1) · log n matrix-valued polynomial f (A)  { f i j (A)}i j 6 n such that ( k ⊤ W,v Tr f (A)vv f (A)kF2 )1/2 · ( kvv ⊤ kF2 )1/2 > δ O(1) . O(1) Together with Theorem 1.1, the above theorem gives an algorithm with running time n log n/δ to find v̂ with nontrivial h v̂, vi 2 .22 The analysis of [BAP+ 05] establishes the above theorem for the polynomial f (A)  A ℓ with ℓ  δ−O(1) · log n. Our proof chooses a different polynomial, which affords a substantially simpler analysis.  Î Proof of Theorem 2.5. For α ⊆ n2 , let χα (A)  {i, j}∈α A i j . Let L  log n/δ C for C a large enough constant. For i j ∈ [n], let SAWi j (L) be the collection of all self-avoiding paths from i to j in the L−1 complete graph on n vertices. Observe that nλ L χα for α ∈ SAWi j (L) is an unbiased estimator of vi v j :   χα (A) | v i , v j  v " Ö kℓ∈α W # (Wkℓ + λv k v ℓ ) | v i , v j  λ L v i v j Ö k∈α\{i, j} v 2k  λL · vi v j . n L−1 L−1 We further claim that the collection { nλ L χα }α∈SAWi j (L) is approximately pairwise independent in the sense of Lemma 2.1. To show this we must check that n 2(L−1) Õ λ2L α,β χα χβ 6 1 |SAWi j (L)| 2 δ2 v 2i v 2j  1 1 |SAWi j (L)| 2 · 2 . 2 δ n 22While this algorithm is much slower than the eigenvector-based algorithm—even after using color coding to O(1) O(1) improve the n log n/δ running time to n 1/δ —the latter requires many sophisticated innovations and ideas from random matrix theory. This algorithm, by contrast, can be derived and analyzed with our meta-theorem, little innovation required. 25 The dominant contributers to the sum are α, β which intersect only on the vertices i and j. In that case, Ö n 2(L−1) 2(L−1) v 2k  v 2i v 2j . χ χ  n α β 2L λ k∈α∪β The only other terms which might contribute to the same order are α, β such that α ∩ β is a union of two paths, one starting at i and one at j. If the lengths of these paths are t and t ′, respectively, and t ′ + t ′ < L, then n 2(L−1) λ 2L n 2(L−1) χα χβ  2(t+t ′ ) λ where we have used that  v  Ö  Ö   n t+t ′ 2 t+t ′ 2   v v ( A ) · k ℓ   t+t ′ · (1 + O(λ /n))  kℓ W λ (k,ℓ)∈α∩β  (k,ℓ)∈α△β    1 2 2 2 A2kℓ | v k , v ℓ  n (1 + O(λ /n)) · t+t ′ vi v j . choices for such pairs α, β, so long as t + t ′ < L. If t + t ′  L, There are at most |SAWi j (L)| 2 /n then there are n times more choices than the above bound. All together, n 2(L−1) λ2L Õ α,β∈SAWi j (L) L © Õ 1 χα χβ 6 |SAWi j (L)| · ­ λt « t0 !2 + n ª ®· λL ¬ v 2i v 2j 6 1 + o(1) · |SAWi j (L)| · 1 − 1/λ v 2i v 2j where we have used that λ  1 + δ > 1 and chosen C large enough that n/λ L 6 1/n. Rewriting in  terms of δ  λ − 1 and applying Lemma 2.1 finishes the proof. 3 Warmup: stochastic block model with two communities We demonstrate our meta-algorithm by applying it to the two-community stochastic block model. The algorithm achieves here the same threshold for partial recovery as the best previous algorithms [MNS13, Mas13], which is also known to be the information-theoretic threshold [MNS15b]. While the original works involved a great deal of ingenuity, the merit of our techniques is to provide a simple and automatic way to discover and analyze an algorithm achieving the same guarantees. Definition 3.1 (Two-community stochastic block model). For parameters ε, d > 0, let SBM(n, d, ε) n be the following distribution on pairs (x, y) where x ∈ {0, 1}( 2 ) is the adjacency matrix of an n-vertex graph and y ∈ {±1} n is a labeling of the n vertices. First, sample y ∼ {±1} n uniformly. Then, independently for every pair i < j, add the edge {i, j} with probability (1 + ε) nd if yi  y j and with probability (1 − ε) nd if yi , y j . The following theorem gives the best bounds for polynomial-time algorithms for partial recovery in this model. (We remark that the algorithms in [MNS13, Mas13] actually run in time close to linear. In this work, we content ourselves with coarser running time bounds.) 26 1 ε2 d and d 6 n o(1) . Then, there exists n a randomized polynomial-time algorithm A that given a graph x ∈ {0, 1}( 2 ) outputs a labeling ỹ(x) such that for all sufficiently large n > n 0 (ε, d), Theorem 3.2 ([MNS13, Mas13]). Let ε ∈ ’, d ∈ Ž with δ ≔ 1 − (x,y)∼SBM(n,d,ε) h ỹ(x), yi 2 > δ O(1) · n 2 . Here, the factor n 2 in the conclusion of the theorem normalizes the vectors ỹ(x) and y because k ỹ(x)k 2 · k y k 2  n 2 . In the remainder of this section, we will prove the above theorem by specializing our metaalgorithm for two-community stochastic block model. For simplicity, we will here only analyze a version of algorithm that runs in quasi-polynomial time. See Section 2.5 for how to improve the running time to n 1/poly(δ) . n Algorithm 3.3. For a given n-vertex graph x ∈ {0, 1}( 2) with average degree d and some parameter δ > 0, execute the following steps:23 1. evaluate the following matrix-valued polynomial P(x)  (Pi j (x)) Pi j (x) ≔ ℓ Õ α∈SAW ℓ (i, j) p α (x) . (3.1) Here as in Section 2, SAWℓ (i, j) ⊆ n2 consists of all sets of vertex pairs that form a simple O(1) .24 The polynomial p is a (self-avoiding) path between i and j of length ℓ  Θ(log n)/δ α   Î product of centered edge indicators, so that p α (x)  ab∈α x ab − nd .25 2. compute a matrix Y with minimum Frobenius norm satisfying the constraints          1 kP(x)kF ·n diag(Y)  1    · hP(x), Yi > δ′     Y0  . (3.2) and output a vector ỹ ∈ {±1} n obtained by taking coordinate-wise signs of a centered Gaussian vector with covariance Y.26 The matrix P(x) is essentially the same as the matrix based on self-avoiding walks analyzed in [MNS13]. The main departure from previous algorithms lies in the second step of our algorithm. As stated, the first step of the algorithm takes quasi-polynomial because it involves a sum over n ℓ terms (for ℓ  Θ(log n)/δ O(1) ). In prior works this running time is improved by using non-backtracking paths instead of self-avoiding paths. Non-backtracking paths can be counted in n O(1) time using matrix multiplication, but relating the non-backtracking path polynomial to the self-avoiding path polynomial requires intensive moment-method calculations. An alternative, 23The right choice of δ′ will depend in a simple way on the parameters ε and d. 24In particular, the paths in SAWℓ (i, j) are not necessarily paths in the graph x but in the complete graph on n vertices. 25Up to scaling, this polynomial is a d/n-biased Fourier character of sparse Erdős-Rényi graph. 26In other words, we apply the hyperplane rounding algorithm of Goemans and Williamson. 27 described in Section 2.5, is to compute the self-avoiding path polynomial P using color-coding, O(1) requiring time n O(1)+1/δ , still polynomial time for any constant δ > 0. The second step of the algorithm is a convex optimization problem over an explicitly represented spectrahedron. Therefore, this step can be carried out in polynomial time. We break the analysis of the algorithm into two parts corresponding to the following lemmas. The first lemma shows that if ε 2 d > 1 then the matrix P(x) has constant correlation with y yT for (x, y) ∼ SBM(n, d, ε) and n sufficiently large. (Notice that this the main preconditon to apply meta-Theorem 1.1.) Lemma 3.4 (Low-degree estimator for posterior second moment). Let ε ∈ ’ and d ∈ Ž, and assume def d  n o(1) . If δ  1 − ε12 d > 0 and n > n 0 (ε, d, δ) is sufficiently large, then the matrix-valued polynomial P(x) in Eq. (3.1) satisfies T (x,y)∼SBM(n,d,ε) hP(x), y y i > δ O(1) ·  x∼SBM(n,d,ε) kP(x)kF2  1/2 ·n (3.3) (Here, the factor n in the conclusion normalizes the matrix y yT because k y yT kF  n.) By application of Markov’s inequality to the conclusion of this theorem one shows that with P has Ω(1)-correlation with y y ⊤ with Ω(1)-probability. As we have noted several times, the same theorem would hold if we replaced P, an average over self-avoiding walk polynomials, with an average over nonbacktracking walk polynomials. This would have the advantage that the resulting polynomial can be evaluated in n O(1) time (i.e. with running time independent of δ), rather than n O(log n)/poly(δ) for P (which can be improved to n poly(1/δ) via color coding), but at the cost of complicating the moment-method analysis. Since we are aiming for the simplest possible proofs here we use P as is. The second lemma shows that given a matrix P that has constant correlation with y yT for an unknown labeling y ∈ {±1} n , we can efficiently compute a labeling ỹ ∈ {±1} n that has constant correlation with y. We remark that for this particular situation simpler and faster algorithms work (e.g., choose a random vector in the span of the top 1/δ O(1) eigenvectors of P); these are captured by the meta-Theorem 1.1, which we could use in place of the next lemma. (We are presenting this lemma, which involves a more complex and slower algorithm, in order to have a self-contained analysis in this warmup and because it illustrates a simple form of a semidefinite programming technique that is important for our tensor decomposition algorithm, which we use for overlapping communities.) Lemma 3.5 (Partial recovery from posterior moment estimate). Let P ∈ ’n×n be a matrix and 1 hP, y yT i. Let Y be the matrix of minimum Frobenius such that y ∈ {±1} n be a vector with δ′ ≔ kPk·n 1 Y  0, diagY  1, and kPk·n hY, Pi > δ′ (i.e., the constraints Eq. (3.2)). Then, the vector ỹ obtained by taking coordinate-wise signs of a Gaussian vector with mean 0 and covariance Y satisfies h ỹ, yi 2 > Ω(δ′)2 · n 2 . (Here, the factor n 2 in the conclusion normalizes the vectors ỹ, y because k ỹk 2 · k y k 2  n 2 .) 28 Proof. By Theorem 2.3, the matrix Y satisfis hY, y yTi > (δ′/2)kY k · k y k 2 and kY k > δ · k y k 2 . In particular, hY, y yTi > δ 2 n 2 /2. The analysis of rounding algorithm for the Grothendieck problem on psd matrices [AN04], shows that h ỹ, yi 2 > π2 hY, y yTi > Ω(δ 2 ) · n 2 . (Here, we use that y yT is a psd matrix.)  Taken together, the above lemmas imply a quasi-polynomial time algorithm for partial recovery in SBM(n, d, ε) when ε 2 d > 1. Proof of Theorem 3.2 (quasi-polynomial time version). Let (x, y) ∼ SBM(n, d, ε) with δ ≔ 1−1/ε 2 d > 0. 1 Run Algorithm 3.3 on x with the parameter δ′ chosen as 10 times the correlation factor in the conclusion of Lemma 3.4. Then, by Lemma 3.4, (x,y)∼SBM(n,d,ε) hP(x), y yT i > 10δ′ · x∼SBM(n,d,ε) kP(x)k · n. By a variant of Markov inequality Theorem A.1, the matrix P(x) satisfies with constant probability hP(x), y yT i > δ′ · kP(x)k · n. In this event, by Lemma 3.5, the final labeling ỹ satisfies 2 ′ 2 2 ỹ h ỹ, yi > Ω(δ ) · n . Since this event has constant probability, the total expected correlation satisfies (x,y)∼SBM(n,d,ε) h ỹ(x), yi 2 > Ω(δ′)2 · n 2 as desired.  It remains to prove Lemma 3.4. 3.1 Low-degree estimate for posterior second moment We will apply Lemma 2.1 to prove Lemma 3.4. The next two lemmas verify that the conditions of that lemma hold; they immediately imply Lemma 3.4. Lemma 3.6 (Unbiased estimators for yi y j ). For i, j ∈ [n] distinct, let SAWℓ (i, j) be the set of all simple paths from i to j in the complete graph on n vertices of length ℓ. Let x i j be the i j-th entry of the Î adjacency matrix of G ∼ SBM(n, d, ε), and for α ∈ SAWℓ (i, j), let p α (x)  ab∈α (x ab − nd ). Then for any yi , y j ∈ {±1} and α ∈ SAWℓ (i, j),  n ℓ   p α (x) | yi y j  yi y j . εd Thus, each simple path α from i to j in the complete graph provides an unbiased estimator (n/εd)ℓ p α (x) of yi y j . It is straightforward to compute that each has variance  pairwise independent, they could be averaged to give an estimator with variance n(ε 2 d)−ℓ , n ℓ−1 n ε2 d ℓ . If they were  1 n |SAWℓ (i, j)| · ε 2 d ℓ  since there are simple paths from i to j. If ℓ is logarithmic in n, this becomes small. The estimators are not strictly pairwise independent, but they do satisfy an approximate pairwise independence property which will be enough for us. def Lemma 3.7 (Approximate conditional independence). Suppose δ  1 − ε12 d > Ω(1) and d  n o(1) . For i, j ∈ [n] distinct, let SAWℓ (i, j) be the set of all simple paths from i to j in the complete graph on n vertices of length ℓ  Θ(log n)/δ C for a large-enough constant C. Let x i j be the i j-th entry of the adjacency Î matrix of G ∼ SBM(n, d, ε). Let p α (x)  ab∈α (x ab − nd ). Then yi2 y 2j Õ α,β∈SAW ℓ (i, j) p α (x)p β (x) 6 δ −O(1) · Õ α,β∈SAW ℓ (i, j) 29 p α (x)yi y j   p β (x)yi y j . To prove the lemmas we will use the following fact; the proof is straightforward. Fact 3.8. For x, y ∼ SBM, the entries of x are all independent conditioned on y, and a, b distinct,  x ab − d n | ya , yb  εd · ya yb  n  and We can prove both of the lemmas. x ab − d n 2  | ya , yb   d 1 + ε ya yb + O(d/n) . n Proof of Lemma 3.6. We condition on y and expand the expectation.   p α (x) | yi y j  y " Ö [x ab − ab∈α d n #  εd | y]  n ℓ y " Ö ya yb ab∈α # by Fact 3.8.  ℓ Because α is a path from i to j, every index a ∈ [n] except for i and j appears exactly twice in the product. So, removing the conditioning on ya for all a , i, j, we obtain as desired.   p α (x) | yi y j  εd n · yi y j  The proof of Lemma 3.7 is the heart of the proof, and will use the crucial assumption ε 2 d > 1. Proof of Lemma 3.7. Let α, β ∈ SAWℓ (i, j), and suppose that α and β share r edges. Let α△β denote the symmetric difference of α and β. Then   x ab − | ya , yb  | ya , yb · (x ab − x x  ab∈α△β    Ö Ö   ya yb  ε 2ℓ−2r  (1 + ε ya yb + O(d/n)) · y   ab∈α△β  ab∈α∩β  Ö  p α (x)p β (x)   y  ab∈α∩β   2ℓ−r  d n  d 2 n)  Ö  d n using Fact 3.8 in the second step. Since α and β are paths, the graph α△β has all even degrees, Î so ab∈α△β ya yb  1. Furthermore, any subgraph of α ∩ β contains some odd-degree vertex. So Î r y ab∈α∩β (1 + ε y a y b + O(d/n))  (1 + O(d/n)) . All in all, we obtain p α (x)p β (x)    2ℓ−r d n ε 2ℓ−2r (1 + O(d/n))r (3.4) Suppose r < ℓ. Paths α, β sharing r edges must share at least r vertices. If they share exactly r vertices, then the shared vertices must form paths in α and β beginning at i and j. Since each path has length ℓ and therefore contains ℓ − 1 vertices in addition to i and j, there are at most r · n 2(ℓ−1)−r such pairs α, β (the multiplicative factor r comes because the shared paths starting from i and j could have lengths between 0 and r). Other pairs α, β share r edges but s vertices for some s > r. For each s and r, there are at most n 2(ℓ−1)−s ℓ O(s−r) such pairs, because the shared edges must occur as at most s − r paths. Furthermore, ℓ O(s−r) n −(s−r) 6 n −Ω(1) when s > r. Putting all of this together, Õ α,β∈SAW ℓ (i, j) p α (x)p β (x) 6 n −2 · " ℓ−1 Õ r0   d 2ℓ−r ε 2ℓ−2r (1 + O(d/n))r r + n −Ω(1) + (ε 2 d)ℓ · n 30 #  n −2 · (1 + n −Ω(1) ) · (εd)2ℓ · ℓ Õ r0 ! r · (ε 2 d)−r + (ε 2 d)−ℓ · n , The additive factor of (ε 2 d)ℓ n in the first line comes from the case r  ℓ (i.e., α  β), where there are n ℓ−1 paths. In the second line we have used the assumption that d ≪ n to simplify the expression. Í m Finally, by convergence of the series ∞ m0 m · z for |z| < 1, and the choice of ℓ logarithmic in n, this is at most ! (1 + n −Ω(1) 2ℓ ) · (εd) O(1) 1 · 1− . 1 ε2 d So, now our goal is to show that Õ α,β∈SAW ℓ (i, j) ( p α (x)yi y j )( p β (x)yi y j ) > n −2 · (1 + n −Ω(1) 2ℓ ) · (εd) · 1 1− 1 ε2 d ! O(1) . Each term in the left-hand sum is (εd/n)2ℓ (by Lemma 3.6) and there are Ω(n 2ℓ−2 ) such terms, so the left-hand side of the above is at least Ω((εd)2ℓ /n 2 ). This proves the Lemma.  4 Matrix estimation for generalized block models In this section we phrase a result essentially due to Abbe and Sandon [AS16a] (and closely related to results by Bordenave et al [BLM15]) in somewhat more general terms. This turns out to be enough to capture an algorithm to estimate a pairwise-vertex-similarity matrix in the d, k, α, ε mixed-membership block model when ε 2 d > k 2 (α + 1)2 . ∫ Let U be a universe of labels, endowed with some base measure ν, such that 1 · dν  1. Let µ be a probability distribution on U, with a density relative to ν. (We abuse notation by conflating µ and its associated density). Let W : U × U → ’+ be a bounded nonnegative function with W(x, y)  W(y, x) for every x, y ∈ U. Consider a random graph model G(n, d, W, µ) sampled as follows. For each of n vertices, draw a label x i ∼ µ independently. Then for each pair i j ∈ [n]2 , independently add the edge (i, j) to the graph with probability nd W(x i , x j ). (This captures the W-random graph models used in literature on graphons.) Let F denote the space of square-integrable functions f : U → ’, endowed with the inner product h f , 1i  x∼µ f (x)1(x). That is, f ∈ F if x∼µ f (x)2 exists. We assume throughout that 1. (Stochasticity) For every x ∈ U, the average y∼µ W(x, y)  1. Í 2. (Finite rank) W has a finite-rank decomposition W(x, y)  i 6 r λ i f i (x) f i (y) where λ i ∈ ’ and f i : U → ’. The values λ i are the eigenvalues of W with respect to the inner product generated by µ. The eigenfunctions are orthonormal with respect to the µ inner product. Notice that the assumptions on W imply that its top eigenfunction f1 (x) is the constant function, with eigenvalue λ1  1. 31 3. (Niceness I) Certain rational moments of µ−1 exist; that is x∼µ µ(x)−t exists for t  −3/2, −2. p 4. (Niceness II) W and µ are nice enough that W(x, y) 6 1/ µ(x)µ(y) and |W(x, y)| 6 p λ 2 / µ(x)µ(y) for every x, y ∈ U, where W(x, y)  W(x, y) − 1. (Notice that in the case of discrete W and µ this is always true, and for smooth enough W and µ it is true via a δ-function argument.) The function W induces a Markov operator W : F → F . If f ∈ F , then (W f )(x)  y∼µ W(x, y) f (y) . (We abuse notation by conflating the function W and the Markov operator W.) Theorem 4.1 (Implicit in [AS16a]). Suppose the operator W has eigenvalues 1  λ1 > λ 2 > · · · > λ r def (each possibly with higher multiplicity) and δ  1 − dλ1 2 > 0. Let Π be the projector to the second eigenspace 2 of the operator W. For types x1 , . . . , x n ∼ µ, let A ∈ ’n×n be the random matrix A i j  Π(x i , x j ), where we abuse notation and think of Π : U × U → ’. There is an algorithm with running time n poly(1/δ) which outputs an n × n matrix P such that for x, G ∼ G(n, d, W, µ), x,G Tr P · A > δ O(1) · ( x,G kAk 2)1/2 ( x,G kP k 2 )1/2 . When U is discrete with k elements one recovers the usual k-community stochastic block model, and the condition λ 22 > 1 matches the Kesten-Stigum condition in that setting. When λ 22 > 1 + δ, the guarantees of Abbe and Sandon can be obtained by applying the above theorem to obtain an Í estimator P for the matrix M  s∈[k] v s v ⊤ s , where v s is the centered indicator vector of community s. The estimator P will have at least δ O(1) /k correlation with M, and a random vector in the span of the top k/δ O(1) eigenvectors of M will have correlation (δ/k)O(1) with some v s . Thresholding that vector leads to the guarantees of Abbe and Sandon for the k-community block model, with one difference: Abbe and Sandon’s algorithm runs in O(n log n) time, much faster than the n poly(1/δ) running time outlined above. In essence, they achieve this by computing an estimator P ′ for M which counts only non-backtracking paths in G (the estimator P counts self-avoiding paths). In Section 4.1 we prove a corollary of Theorem 4.1. This yields the algorithm discussed Theorem 1.2 for the mixed-membership blockmodel. As discussed before, the quantitative recovery guarantees of this algorithm are weaker than those of our final algorithm, whose recovery accuracy depends only on the distance δ of the signal-to-noise ratio of the mixed-membership blockmodel to 1. In Section 4.2 we prove Theorem 4.1. 4.1 Matrix estimation for the mixed-membership model We turn to the mixed-membership model and show that Theorem 4.1 yields an algorithm for partial recovery in the mixed-membership block model. However, the correlation of the vectors output by this algorithm with the underlying community memberships depends both on the signal-to-noise ratio and the number k of communiteis. (In particular, when k is super-constant this algorithm no longer solves the partial recovery task.) 32 Definition 4.2 (Mixed-Membership Block Model). Let G(n, d, ε, α, k) be the following random Í graph ensemble. For each node i ∈ [n], sample a probability vector σi ∈ ’k>0 with t∈[k] σi (t)  1 according to the following (simplified) Dirichlet distribution. (σ) ∝ Ö t∈[k] σi (t)α/k−1 For each pair of vertices i, i ′ ∈ [n], sample communities t ∼ σi and t ′ ∼ σi′ . If t  t ′, add the edge {i, i ′ } to G with probability nd (1 + (1 − 1k )ε). If t , t ′, add the edge {i, i ′ } to G with probability ε d n (1 − k ). (For simplicity, throughout this paper we consider only the case that the communities have equal sizes and the connectivity matrix has just two unique entries.) Theorem 4.3 (Constant-degree partial recovery for mixed-membership block model, k-dependent O(1) error). For every δ > 0 and d(n), ε(n), k(n), α(n), there is an algorithm with running time n O(1)+1/δ with the following guarantees when def δ  1− k 2 (α + 1)2 >0 ε2 d k, α 6 n o(1) and ε 2 d 6 n o(1) . and Let σ, G ∼ G(n, d, ε, k, α) and for s ∈ [k] let v s ∈ ’n be given by v s (i)  σi (s) − 1k . The algorithm outputs a vector x such that hx, v1 i 2 > δ′ kx k 2 kv1 k 2 , for some δ′ > (δ/k)O(1) .27 Ideally one would prefer an algorithm which outputs τ1 , . . . , τn ∈ ∆k−1 with corr(σ, τ) > δ′/(α + 1). If one knew that hx, v1 i > δ′ kx k kv k rather than merely the guarantee on hx, v1 i 2 (which does not include a guarantee on the sign of x), then this could be accomplished by correlationpreserving projection, Theorem 2.3. The tensor methods we use in our final algorithm for the mixedmembership model are able to obtain a guarantee on hx, v1 i and hence can output probability vectors τ1 , . . . , τn .28 To prove Theorem 4.3 we will apply Theorem 4.1 and then a simple spectral rounding algorithm; the next two lemmas capture these two steps. Lemma 4.4 (Mixed-membership block model, matrix estimation). If U is the (k − 1)-simplex, µ is the α, k Dirichlet distribution, and W(σ, σ′)  1 − εk + εhσ, σ′i, then G(n, d, W, µ) is the mixed-membership block model with parameters k, d, α, ε. In this case, the second eigenvalue of W has multiplicity k − 1 and ε . has value λ 2  k(α+1) Proof. The first part of the claim follows from the definitions. For the second part, note that W has the following decomposition W(σ, τ)  1 + Õ i6k ε(σi − 1k )(τi − 1k ) . 27The requirement ε2 d 6 n o(1) is for technical convenience only; as ε2 d increases the recovery problem only becomes easier. 28Such a guarantee could be obtained here by using a cross-validation scheme on x to choose between x and −x. Since we are focused on what can be accomplished by matrix estimation methods generally we leave this to the reader. 33 The functions σ 7→ σi − 1 k are all orthogonal to the constant function σ 7→ 1 with respect to µ; i.e. σ∼µ 1 · (σi − 1k )  0 because σi  1k . It will be enough to test the above Rayleigh quotient σ∼µ f (σ) · (W f )(σ) σ∼µ f (σ)2 with any function f (σ) in the span of the functions σ 7→ σi − 1k . If we pick f (σ)  σ1 − 1k the remaining calculation is routine, using only the second moments of the Dirichlet distribution (see Fact 4.5 below).  Fact 4.5 (Special case of Fact A.3). Let σ ∈ ’k be distributed according to the α, k Dirichlet distribution. 1 Let σ̃  σ − 1k · 1 be centered. Then (σ̃)(σ̃)⊤  k(α+1) · Π where Π is the projector to the complement of the all-1s vector in ’k . We analyze a simple rounding algorithm. Í be an n × n symmetric rank-k PSD matrix. Let P ∈ ’n×n be another Lemma 4.6. Let M  ki1 v i v ⊤ i symmetric matrix such that hP, Mi > δkP k kM k (where k · k is the Frobenious norm). Then for at least one vector v among v1 , . . . , v k , a random unit vector x in the span of the top (k/δ)O(1) eigenvectors of P satisfies hx, vi 2 > (δ/k)O(1) kv k 2 . Now we can prove Theorem 4.3. Proof of Theorem 4.3. Lemma 4.4 shows that the conditions of Theorem 4.1hold, and hence (via color coding) there is an n poly(1/δ) time algorithm to compute a matrix P such that hP, Mi > δ O(1) kP k kM k Í with probability at least δ O(1) , where M  s∈[k] v s v ⊤ s . (The reader may check that the matrix A of Theorem 4.1 is in this case the matrix M described here.) Applying Lemma 4.6 shows that a random unit vector x in the span of the top (k/δ)O(1) eigenvectors of P satisfies hx, vi 2 > (δ/k)O(1) kv k 2 , where v ∈ ’n has entries v i  σi (1). (The choice of 1 is without loss of generality.)  4.2 Proof of Theorem 4.1 Definition 4.7. For a pair of functions A, B : U × U → ’, we denote by AB their product, whose entries are (AB)(x, y)  z∼µ A(x, z)B(z, y). The strategy to prove Theorem 4.1 will as usual be to apply Lemma 2.1. We check the conditions of that Lemma in the following Lemmas, deferring their proofs till the end of this section. 34 Lemma 4.8. Let G i j be the 0/1 indicator for the presence of edge i ∼ j in a graph G. As usual, let SAWℓ (i, j) be the collection of simple paths of length ℓ in the complete graph on n vertices from i to j. Î Let x, G ∼ G(n, d, W, µ). Let α ∈ SAWℓ (i, j). Let p α (G)  ab∈α (G ab − nd ). Let W(x, y)  W(x, y) − 1. Then  ℓ   ℓ−1 d W (x i , x j ) p α (G) | x i , x j  n Lemma 4.9. With the same notation as in Lemma 4.8, as long as ℓ > C log n/δ O(1) for a large-enough constant C,  n  2ℓ d Õ p α (G)p β (G) 6 δ −O(1) · |SAWℓ (i, j)| 2 · α,β∈SAW ℓ (i, j) W ℓ−1 (x i , x j )2 . (The constant C depends on W and the moments of µ.) ℓ−1 −(ℓ−1) W (x i , x j ). By Lemma 4.8, Lemma 4.9, and Lemma 2.1, Proof of Theorem 4.1. Let B i j  λ 2 there is matrix polynomial P(G), computable to 1/poly(n)-accuracy in time n poly(1/δ) by color coding, such that Tr PB T > δ O(1) ( kP k 2 )1/2 ( kB k 2)1/2 . At the same time, B − A has entries (B − A)i j  Õ  λ  ℓ−1 t 36 t 6 r λ2 Πt (x i , x j ) where the Πt projects to the t-th eigenspace of W. Since W is bounded, choosing ℓ a large enough multiple of log n ensures that kB − Ak 2 6 n −100 kB k 2 , so the theorem now follows by standard manipulations.  4.3 Proofs of Lemmas Proof of Lemma 4.8. As usual, we simply expand p, obtaining   p α (G) | x i , x j   x  " d n Ö d ab∈α ℓ · (Wx a ,x b − 1) | x i , x j n ·W ℓ−1 # (x i , x j ) .  We will need some small facts to help in proving Lemma 4.9. Fact 4.10. If ℓ − t > C log n for large enough C  C(W), then λ2t 2 x,y∼µ W ℓ−t (x, y)2 6 (1 + o(1)) · ℓ x,y∼µ W (x, y)2 . Also, for any t 6 ℓ, λ 2t 2 x,y∼µ W ℓ−t (x, y)2 6 r · where r is the rank of W. 35 ℓ x,y∼µ W (x, y)2 . Proof. Using the eigendecomposition of W, we have that similarly ℓ x,y∼µ W (x, y)2  Í x,y∼µ W ℓ−t λ 2ℓ . If i > 2, then i 26 i 6 r 2(ℓ−t) λ 2t 2 λi (x, y)2  Í 2(ℓ−t) 26 i 6 r λi and 2(ℓ−t)  λ2ℓ 6 λ2ℓ 2 (λ i /λ 2 ) 2 /n by our assumption that ℓ − t > C log n for large enough C. This finishes the proof of the first claim; the second one is similar.  Proof of Lemma 4.9. Pairs α, β which share only the vertices i, j each contribute exactly ℓ−1 W (x i , x j )2 to the left-hand side, by Lemma 4.8. Consider next the contribution of α, β whose shared edges form paths originating at i and j. Suppose there are t such shared edges. Then pα pβ     2ℓ−t Ö d n x d n (1 + O(d/n))t   2ℓ−t ab∈α△β W(x a , x b ) · W Ö ab∈α∩β 2(ℓ−t−1) (W(x a , x b ) + O(d/n)) (x, y)2 , where for the second equality we used the assumption x∼µ W(x, y)  1 for every y. If ℓ − t > C log n for the constant in Fact 4.10, then this is at most (1 + o(1))   2ℓ−t d n λ −2t 2 W 2(ℓ−1) (x, y)2 , and for every t 6 ℓ it is at most r ·   2ℓ−t d n λ −2t 2 W 2(ℓ−1) (x, y)2 . There are at most |SAWℓ (i, j)| 2 /n t · t choices for such pairs α, β, except when t  ℓ, in which case there are |SAWℓ (i, j)| 2 /n t−1 choices. So the total contribution from such α, β is at most |SAWℓ (i, j)| 2 · x,y W ℓ−1 6 δ−O(1) |SAWℓ (i, j)| 2 ©Õ (x, y)2 · ­ x,y W ℓ−1 «t 6 ℓ/2 td −t λ −2t 2 + nr · Õ ℓ > t>ℓ/2 (x, y)2 . ª td −t λ −2t 2 ® ¬ It remains to handle pairs α, β which share t vertices and s edges for t > s. If t, s 6 ℓ − 2, then there are only n 2(ℓ−1)−s ℓ O(t−s) choices for such a pair α, β. The contribution of each such pair we bound as follows pα pβ  Now,     2ℓ−s d n Ö ab∈α∩β Ö (G ab − nd )2 · W x a ,x b . ab∈α△β (G ab − nd )2 | x  nd (W(x a , x b ) + O(d/n)) by straightforward calculations, so the above is (1 + O(d/n)) s   2ℓ−s d n 6 (1 + O(d/n)) s x   2ℓ−s d n Ö ab∈α∩β λ 22ℓ−s Ö a∈α∪β 36 Ö W(x a , x b ) · ab∈α△β W(x a , x b ) − degα,β (a)/2 µ(x a ) where degα,β (a) is the degree of the vertex a in the graph α ∪ β. Any degree-2 vertices simply contribute 1 in the above, since x∼µ 1/µ(x)  1. There are at most t − s vertices of higher degree; they may have degree at most 4. They each contribute at most some number C  C(µ) by the niceness assumptions on µ. So the above is at most (1 + o(1))   2ℓ−s d n λ22ℓ−s exp{O(t − s)} . Putting things together as in Lemma 3.7 finishes the proof.  Proof of Lemma 4.6. By averaging, there is some v among v1 , . . . , v k such that hP, vv ⊤i > δ δ · kP k · kM k > · kP k · kvv ⊤ k k k where the second inequality uses M  0. Renormalizing, we may assume kP k has Frobenious norm 1 and v is a unit vector; in this case we obtain hv, Pvi > δ/k. Writing out the eigendecomposition Í of P, let P  ni1 λ i u i u ⊤ and we get i n Õ i1 By Cauchy-Schwartz, and hence inequality. Ín i1 n Õ i1 λ i hv, u i i 2 > δ/k n Õ λ i hv, u i i 2 6 λ 2i hv, u i i 2 > (δ/k)2 , while Ín i1 i1 λ 2i hv, u i i 2 ! 1/2 λ 2i  1. Now the Lemma follows from Markov’s  5 Tensor estimation for mixed-membership block models 5.1 Main theorem and algorithm Theorem 5.1 (Constant-degree partial recovery for mixed-membership block model). There is a constant C such that the following holds. Let G(n, d, ε, k, α) be the mixed-membership block model. For O(1) with the every δ ∈ (0, 1) and d(n), ε(n), k(n), α(n), there is an algorithm with running time n O(1)+1/δ following guarantees when def δ  1− k 2 (α + 1)2 >0 ε2 d and k, α 6 n o(1) and ε 2 d 6 n o(1) . k (samples from the α, k Dirichlet distribution are Let σ, G ∼ G(n, d, ε, k, α). Let t  (α + 1) · k+α approximately uniform over t coordinates). Given G, the algorithm outputs probability vectors τ1 , . . . , τn ∈ ∆k−1 such that   1 C 1 . − corr(σ, τ) > δ t k 37 (Recall the definition of correlation from (1.5).)29 Let c ∈ (0, 1) be a small-enough constant. Let C(c) ∈ Ž be a large-enough constant (different from the constant in the theorem statement above). There are three important parameter regimes: 1. Large δ, when δ ∈ [1 − c, 1). 2. Small δ, when δ ∈ (1 − c, 1/k 1/C ). This is the main regime of interest. In particular when k(n) → ∞ this contains most values of δ. 3. Tiny δ, when δ ∈ (0, 1/k 1/C ]. (This regime only makes sense when k(n) 6 O(1).) Let Ginput be an n-node graph. Algorithm 5.2 (Main algorithm for mixed-membership model). Let η > 0 be chosen so that k 2 (α+1)2 1 − ε2 d(1−η) > δ 2 and o(1) > η > n −γ for every constant γ > 0. (This guarantees that enough edges remain in the input after choosing a holdout set.) 1. Select a partition of [n] into A and A at random with |A|  ηn. Let G  A ∩ Ginput 2. If δ is large, run Algorithm 5.5 on (Ginput , G, A). 3. If δ is small, run Algorithm 5.4 on (Ginput , G, A). 4. If δ is tiny, run Algorithm 5.3 on (Ginput , G, A). Algorithm 5.3 (Tiny δ). foo 1. Run the algorithm from Theorem 4.3 on G with parameters (1 − η)d, k, ε, α to obtain a vector x ∈ ’n−ηn . (4) (3) 2. Evaluate the quantities s x  S3 (Ginput \ G, x) and s x  S4 (Ginput \ G, x), the polynomials (4) from Lemma 5.8. If s x < C(n, α, k, ε, d, η), output random labels τ1 , . . . , τn . (The scalar C(n, α, k, ε, d, η) depends in a simple way on the parameters.) (3) 3. If s x < 0, replace x by −x. 4. Run the cleanup algorithm from Lemma 5.11 on the vector x, padded with zeros to make a length n vector. Output the resulting τ1 , . . . , τn . Algorithm 5.4 (Small δ). foo 1. Using color coding, evaluate the degree-log n/poly(δ) polynomial P(G)  (Pi jk (G)) from Lemma 5.6. (This takes time n poly(1/δ) .) 2. Run the 3-tensor to 4-tensor lifting algorithm (Theorem 7.14) on P(G) to obtain a 4-tensor T. 3. Run the low-correlation tensor decomposition algorithm (Corollary 7.3) on T, implementing (4) the cross-validation oracle O as follows. For each query x ∈ ’n−ηn , compute s x  S4 (Ginput \ (4) G, x), the quantity from Lemma 5.9. If s x > C(n, d, k, ε, α, η) (distinct from the C above, again depending in a simple way on the parameters), output YES, otherwise output NO. The tensor decomposition algorithm returns unit vectors x1 , . . . , x k ∈ ’n−ηn . 29The requirement ε2 d 6 n o(1) is for technical convenience only; as ε2 d increases the recovery problem only becomes easier. 38 (3) 4. For each x1 , . . . , x k , compute s i for which (4) si (4)  S3 (Ginput \ G, x i ) and s i  S4 (Ginput \ G, x i ). For any x i < C(n, d, k, ε, α, η), replace x i with a uniformly random unit vector. For any (3) si < 0, replace x i with −x i . x i for which 5. Run the algorithm from Lemma 5.10 on (x1 , . . . , x k ) (padded with zeros to make an n × k matrix) and output the resulting τ1 , . . . , τn . Algorithm 5.5 (Large δ). foo 1. Using color coding, evaluate the degree-log n/poly(δ) polynomial P(G)  (Pi jk (G)) from Lemma 5.6. (This takes time n poly(1/δ) .) 2. Run the 3-tensor to 4-tensor lifting algorithm (Theorem 7.14) on P(G) to obtain a 4-tensor T. 3. Run the low-correlation tensor decomposition algorithm on T, obtaining unit vectors x1 , . . . , x k . (4) (4) 4. For each x i , compute the quantity s i  S4 (Ginput \ G, x i ) from Lemma 5.9. If s i < C(n, d, k, ε, α, η), replace x i with a uniformly random unit vector. (The scalar threshold C(n, d, k, ε, α, η) depends in a simple way on the parameters.) (3) (3) 5. For each x i , compute the quantity s i  S3 (Ginput \ G, x i ) from Lemma 5.9. If s i < 0, replace x i with −x i . 6. Run the algorithm from Lemma 5.10 on the matrix x  (x1 , . . . , x k ) and output the resulting τ1 , . . . , τn . We will analyze each of these algorithms separately, but we state the main lemmas together because many are shared among tiny, small, and large δ cases. Two of the algorithms use the low-correlation tensor decomposition algorithm as a black box; Corollary 7.3 in Section 7 captures the guarantees of that algorithm. The first thing we need is Theorem 4.3, which describes a second-moment based algorithm used as a subroutine by Algorithm 5.3. (This subroutine was already analyzed in Section 4.) Theorem (Restatement of Theorem 4.3). For every δ > 0 and d(n), ε(n), k(n), α(n), there is an algoO(1) rithm with running time n O(1)+1/δ with the following guarantees when def δ  1− k 2 (α + 1)2 >0 ε2 d and k, α 6 n o(1) and ε 2 d 6 n o(1) . Let σ, G ∼ G(n, d, ε, k, α) and for s ∈ [k] let v s ∈ ’n be given by v s (i)  σi (s) − 1k . The algorithm outputs a vector x such that hx, v1 i 2 > δ′ kx k 2 kv1 k 2 , for some δ′ > (δ/k)O(1) .30 The proofs of all the lemmas that follow can be found later in this section. Next, we state the tensor estimation lemma used to analyze the tensor P computed in Algorithm 5.4 and Algorithm 5.5. 30The requirement ε2 d 6 n o(1) is for technical convenience only; as ε2 d increases the recovery problem only becomes easier. 39 Lemma 5.6. Suppose def δ  1− k 2 (α + 1)2 >0 ε2 d ε 2 d 6 n 1−Ω(1) and k, α 6 n o(1) . and Í For a collection σ1 , . . . , σn of probability vectors, let V(σ)  s∈[k] v s⊗3 , where the vectors v s ∈ ’n have entries v s (i)  σi (s) − 1k . Let w s ∈ ’n have entries w s (i)  v s (i) + √1 . (Note that hw s , w t i  0 for Í k α+1 s , t.) Let W(σ)  s∈[k] w s⊗3 . If G ∼ G(n, d, ε, α, k), there is a degree O(log n/δ O(1) ) polynomial P(G) ∈ (’n )⊗3 such that  σ,G hP(G), W(σ)i  1/2  1/2  2 2 · σ,G kW(σ)k σ,G kP(G)k > δ O(1) Furthermore, P can be evaluated up to (1 + 1/poly(n)) multiplicative error (whp) in time n poly(1/δ) . Two of our algorithms use the low-correlation tensor decomposition algorithm of Corollary 7.3. That corollary describes an algorithm which recovers an underlying orthogonal tensor, but the tensor W is not quite orthogonal. The following lemma, proved via standard matrix concentration, captures the notion that W is close to orthogonal. Lemma 5.7. Let σ1 , . . . ,√σn be iid draws from the α, k Dirichlet distribution. Let w s ∈ ’n be given by w s (i)  σi (s) − 1k (1 − 1/ α + 1). Then as long as k, α 6 n o(1) , with high probability 1 Õ ws w⊤ s  (1 + n −Ω(1) ) · Id . ) · Id  2 k kw s k s1 k (1 + n −Ω(1) All of the algorithms perform some cross-validation using the holdout set A. The next two lemmas offer what we need to analyze the cross-validations. Lemma 5.8. Let n 0 , n 1 satisfy n 0 + n 1  n. Let A ⊆ [n] have size |A|  n 1 > n Ω(1) . Let k  0 k(n), d  d(n), ε  ε(n), α  α(n) > 0 and α, k, ε 2 d 6 n o(1) . Let σ ∈ ∆nk−1 . Let v s ∈ ’n0 have entries 1 v s (i)  σi (s) − k . Let τ1 , . . . , τn1 be iid from the α, k Dirichlet distribution. Let G be a random bipartite graph on vertex sets A, [n] \ A, with edges distributed according to the n, d, ε, k, α mixed-membership model with labels σ, τ. Let x ∈ ’n0 . For a ∈ A, let Pa (G, x) be the expression Õ Pa (G, x)  (G ai − nd )(G a j − nd )(G ak − nd )x i x j x k . i jk∈A distinct Let S3 (G, x) be S3 (G, x)  Õ a∈A Pa (G, x) . There is a number C  C(n, d, k, ε, α, n1) such that  G,τ        C · S3 (G, x) − Õ hv , xi 3 s s∈[k] kv s k 3 40 > n −Ω(1)        6 exp(−n Ω(1) ) . Similarly, there are scalars C(n, d, k, ε, α, n1), C ′(n, d, k, ε, α, n 1) such that the following holds. For a ∈ A, let Õ Q a (G, x)  (G ai − nd )(G a j − nd )(G ak − nd )(G aℓ − nd )x i x j x k x ℓ . i jkℓ∈A distinct Õ and let R a (G, x)  Finally let S4 (G, x)  C · Then  G,τ        S4 (G, x) − (G ai − nd )(G a j − nd )x i x j . i j∈A distinct Õ a∈A Q a (G, x) − C ′ · Õ hv , xi 4 s s∈[k] kv s k 4 >n Õ a∈A −Ω(1)        R a (G, x) !2 . 6 exp(−n Ω(1) ) . Lemma 5.9. Under the same hypotheses as Lemma 5.8, there are S3 (G, x), S4(G, x), polynomials of degree 3 and 4, respectively, in x and in the edge indicators of G, such that  G,τ and  G,τ               S4 (G, x) − Õ hw , xi 4 s s∈[k] C · S3 (G, x) − kw s k 4 >n Õ hw , xi 3 s s∈[k] kw s k 3 where w 1 , . . . , w k are the vectors w s (i)  v s (i) + −Ω(1)        > n −Ω(1) √1 . k α+1 6 exp(−n Ω(1) ) ,        6 exp(−n Ω(1) ) , Finally, all of the algorithms have a cleanup phase to transform n-length vectors to probability vectors τ1 , . . . , τn ∈ ∆k−1 . The following lemma describes the guarantees of the cleanup algorithm used by the small and large δ algorithms, which takes as input vectors x correlated with the vectors w. Lemma 5.10. Let δ ∈ (0, 1) and k  k(n) ∈ Ž and α  α(n) > 0, with α, k 6 n o(1) . Suppose δ > 1/k 1/C for a big-enough constant C. There is a poly(n)-time algorithm with the following guarantees. Let σ1 , . . . , σn be iid draws from the α, k Dirichlet distribution. Let v1 , . . . , v k ∈ ’n be the vectors given by v s (i)  σi (s) − 1k . Let w 1 , . . . , w k ∈ ’n be the vectors given by w s (i)  v s (i) + √1 , so that hw s , w t i  0 for s , t. Let M  1. M −1/2 w s − ws ( kw s k 2 )1/2 6 Í T s w s w s . Let E be the event that 1 poly n for every s ∈ [k]. 2. kw s k  (1 ± 1/poly(n))( kw s k 2 )1/2 for every s ∈ [k]. 3. kv s k  (1 ± 1/poly(n))( kv s k 2 )1/2 for every s ∈ [k]. 41 k α+1 Suppose x1 , . . . , x k ∈ ’n are unit vectors such that for at least δk vectors w 1 , . . . , w m there exists t ∈ [k] such that hw s , x t i > δkw s k. The algorithm takes input x1 , . . . , x k and when E happens returns probability vectors τ1 , . . . , τn ∈ ∆k−1 such that   k+α 1 1 O(1) 2 O(1) · − corr(σ, τ) > δ kv k  δ . α+1 k k Finally, the last lemma captures the cleanup algorithm used by the tiny-δ algorithm, which takes a single vector x correlated with v1 . Lemma 5.11. Let δ ∈ (0, 1) and k  k(n) ∈ Ž and α  α(n) > 0, with α, k 6 n o(1) . Suppose δ 6 k 1/C for any constant C. There is a poly(n)-time algorithm with the following guarantees. Let σ1 , . . . , σn be iid draws from the α, k Dirichlet distribution. Let v1 , . . . , v k ∈ ’n be the vectors given by v s (i)  σi (s) − 1k . Let x ∈ ’n be a unit vector satisfying hx, v s i > δkv s k for some s ∈ [k]. On input x, the algorithm produces τ1 , . . . , τn ∈ ∆k−1 such that   O(1) δ corr(σ, τ) > k · 2 kv k  δ so long as the event E from Lemma 5.10 occurs. O(1)   k+α 1 1 · − . α+1 k k Analysis for tiny δ (Algorithm 5.3) Proof of Theorem 5.1, tiny-δ case. Let C ∈ Ž and 1 > δ > 0 be any fixed constants. We will prove that if k 6 δ C then the output of Algorithm 5.2 satisfies the conclusion of Theorem 5.1. Let x ∈ ’(1−η)n be the output of the matrix estimation algorithm of Theorem 4.3. By Markov’s inequality, with probability (δ/k)O(1) over G and σ1 , . . . , σ(1−η)n , the vector x satisfies hv, xi 2 > (δ/k)O(1) kv k 2 kx k 2 , where v ∈ ’(1−η)n is the vector v(i)  σi (1) − 1k . By our assumption k 6 δ C , this means that with probability δ O(1) the vector x satisfies hx, vi 2 > δ O(1) kx k 2 kv k 2. Now, the labels σ(1−η)n , . . . , σn and the edges from nodes 1, . . . , (1 − η)n to nodes (1 − η)n, . . . , n are independent of everything above. So, invoking Lemma 5.8, we can assume that the quantity (4) s x computed by Algorithm 5.3 satisfies (4) sx − Õ hv , xi 4 s s∈[k] kv s k 4 6 n −Ω(1) . (4) Now, if x satisfies hv s , xi 2 > δ O(1) kv s k 2 for some v s , then also s x > δ O(1) . On the other hand, if O(1) (4) s x > δ O(1) then there is some s such that hx, v s i 2 > δ k kv s k 2 . So choosing the threshold C in Algorithm 5.3 appropriately, we have obtained that with probability δ O(1) the algorithm reaches step 3 with a vector x which satisfies hx, v s i 2 > δ O(1) kv s k 2 , and otherwise the algorithm outputs random τ1 , . . . , τn . Step 3 is designed to check the sign of hx, v s i. Call x good if there is s ∈ [k] such that (3) hx, v s i > δ O(1) kv s k. If |s x | 6 δ O(1) then x there are v s , v t such that hv s , xi > δ O(1) kv s k and (3) hv t , xi 6 −δ O(1) kv t k, so both x and −x are good If |s x | > δ O(1) then clearly step 3 outputs a good vector. Since after step 3 the vector x is good, applying Lemma 5.11 finishes the proof in the tiny δ case.  42 Analysis for small and large δ (Algorithm 5.4, Algorithm 5.5) Proof of Theorem 5.1, small δ case. Let n 0  (1 − η)n and n 1  ηn with η as in Algorithm 5.2. By Markov’s inequality applied to Lemma 5.6, with probability δ O(1) the tensor P satisfies Í hP, Wi > δ O(1) kP k kW k, where W ∈ (’n0 )⊗3 is as in Lemma 5.6. Let M  s∈[k] w s w ⊤ s , where w s is as in Lemma 5.6. The vectors M −1/2 w s are orthonormal, and Lemma 5.7 guarantees that Í ws k kw − M −1/2 w s k 6 n −Ω(1) with high probability. Let W ′  s∈[k] (M −1/2 w s )⊗3 and let W4′  sk Í Then also hP, W ′i > δ O(1) kP k kW ′ k. By the guarantees of the 3-to-4 lifting algorithm (Theorem 7.14), finally we get hT, W4′ i > δ O(1) kT k kW4′ k. In order to conclude that Algorithm 5.4 successfully runs the low-correlation tensor decomposition algorithm, we have to check correctness of its implementation of the cross-validation oracle. This follows from Lemma 5.7, Lemma 5.9, the size of η, and a union bound over the exp(k/poly(δ)) 6 exp(n o(1) ) queries made by the nonadaptive implementation of the lowcorrelation tensor decomposition algorithm, and independence of the randomness in the holdout set. We conclude that with probability at least δ O(1) , the tensor decomposition algorithm returns unit vectors x1 , . . . , x k ∈ ’n0 such that a δ O(1) fraction of w s among w 1 , . . . , w k have x t such that hw s , x t i 2 > δ O(1) kw s k 2 . By the same reasoning as in the tiny δ case, using Lemma 5.9 after the signchecking step the same guarantee holds with the strengthened conclusion hw s , x t i > δ O(1) kw s k. Finally, we apply Lemma 5.10 (along with elementary concentration arguments to show that the event E occurs with high probability) to conclude that the last   step of Algorithm 5.4 gives τ1 , . . . , τn s∈[k] (M −1/2 w s) ⊗4 . such that (in expectation) corr(σ, τ) > δ O(1) 1 α+1 · k k+α − 1 k as desired.  5.2 Low-degree estimate for posterior third moment In this section we prove Lemma 5.6. The strategy is to apply Lemma 2.1 to find an estimator for the Í 3-tensor s∈[k] v s⊗3 . With that in hand, combining with the estimators in Section 4 for the second Í moments s∈[k] v s v sT is enough to obtain an estimator for W, since Õ w s⊗3  Õ Õ s∈[k] s∈[k]  (v s + c · 1)⊗3 (5.1) v s⊗3 + c(v s ⊗ v s ⊗ 1 + v s ⊗ 1 ⊗ v s + 1 ⊗ v s ⊗ v s ) + 1⊗3 (5.2) s∈[k] √1 , k α+1 where 1 is the all-1s vector, c  n poly(1/δ) and we have used that polynomial such that hR, Õ s∈[k] v s⊗3 i > δ O(1) ( kRk 2)1/2 ( Í Í Õ s∈[k] s∈[k] v s  0. Thus if R is a degree 2 v s⊗3 )1/2 and Q is similar but estimates s∈[k] v s v sT , then R and Q can be combined according to (5.2) to obtain the polynomial P from the lemma statement. 43 j k i Figure 1: A 3-armed star with arms of length 2. We will eventually use arms of length t ≈ log n. Thus in the remainder of this section we focus on obtaining such a polynomial R; we change notation to call this polynomial P. The first step will be to define a collection of polynomials {G α }α for all distinct i, j, k ∈ [n].  Definition 5.12. Any α ⊆ n2 can be interpreted as a graph on some nodes in [n]. Such an α is a long-armed star if it consists of three self-avoiding paths, each with ℓ edges, joined at one end at a single central vertex, at the other end terminating at distinct nodes i, j, k ∈ [n]. (See figure.) Let STARℓ (i, j, k) be the set of 3-armed stars with arms of length ℓ and terminal vertices i, j, k. For any  Î α ⊆ n2 let G α  ab∈α (x ab − nd ) be the product of centered edge indicators. The next two lemmas check the conditions to apply Lemma 2.1 to the sets {G α }α∈STARℓ (i, j,k) . Lemma 5.13 (Unbiased Estimator). Let i, j, k ∈ [n] all be distinct. Let α ∈ STARℓ (i, j, k). Í For a collection of probability vectors σ1 , . . . , σk , let V(σ)  s∈[k] v s⊗3 where v s (i)  σi (s) − 1k . Let G ∼ G(n, d, ε, α 0, k).  α G | σi , σ j , σk   εd  n  3ℓ  1 k(α 0 + 1)  3(ℓ−1) · C 3 · V(σ)i jk . O(1) Here α 0 > 0 is the Dirichlet concentration paramter, unrelated to the graph α, and C 3  1/(k O(1) α 0 constant related to third moments of the Dirichlet distribution. ) is a Lemma 5.14 (Approximate conditional independence). If def δ  1− k 2 (α 0 + 1)2 >0 ε2 d k, α 0 6 n o(1) and ε 2 d 6 n o(1) . and and ℓ > C log n/δ O(1) for a large enough constant C, then for G ∼ G(n, d, ε, k, α 0), h i V(σ)2i jk · Õ α,β∈STARℓ (i, j,k) G α G β 6 1/δ O(1) · Õ α,β∈STARℓ (i, j,k) Now we can prove Lemma 5.6. 44   G α V(σ)i, j,k ·   G β V(σ)i, j,k . Proof of Lemma 5.6. As discussed at the beginning of this section, it is enough to find an estimator for the tensor V(σ). Lemma 5.13 and Lemma 5.14 show that Lemma 2.1 applies to each set of polynomials STARℓ (i, j, k). The conclusion is that for every distinct i, j, k ∈ [n] there is a degree log n poly(1/δ) polynomial P(G)i jk so that P(G)i jk V(σ)i jk ( P(G)2i jk )1/2 · ( V(σ)2i jk )1/2 > Ω(1) . One may check that the entries i, j, k for i, j, k all distinct of the tensor V(σ) comprise nearly all of its 2-norm. That is, Õ V(σ)2i, j,k > (1 − o(1)) kV(σ)k 2 . i, j,k distinct This is sufficient to conclude that the tensor-valued polynomial P(G) whose (i, j, k)-th entry is Pi, j,k (G) when i, j, k are all distinct and is 0 otherwise is a good estimator of V(σ) (see Fact A.2). Thus, σ,G hP(G), V(σ)i   1/2 > Ω(1) .  1/2   2 2 · kV(σ)k kP(G)k σ,G σ,G 5.2.1 Details of unbiased estimator We work towards proving Lemma 5.13. We will need to assemble a few facts. The first will help us control moment tensors of the Dirichlet distribution. The proof can be found in the appendix. Fact 5.15 (Special case of Fact A.3). Let σ be distributed according to the α, k Dirichlet distribution. Let σ̃  σ − 1k 1. There are numbers C 2 , C 3 depending on α, k so that for every x1 , x2 , x3 in ’k with Í s∈[k] x i (s)  0, h σ̃, x1 ih σ̃, x2 i  C 2 hx1 , x2 i σ and σ h σ̃, x1 ih σ̃, x2 ih σ̃, x3 i  C 3 Furthermore, 1 k(α + 1) Now we can prove Lemma 5.13. C2  and Õ s∈[k] C3  x1 (s)x2 (s)x3 (s) . 1 k O(1) α O(1) . Proof of Lemma 5.13. For any collection of σ’s and α ∈ STARℓ (i, j, k),  εd [G | σ]  n G α  3ℓ Ö (a,b)∈α h σ̃a , σ̃b i Let a be the central vertex of the star α. Taking expectations over all the vertices in the arms of the star,   3ℓ   3(ℓ−1)  α  εd 1 G | σi , σ j , σk  h σ̃i , σ̃a ih σ̃ j , σ̃a ih σ̃k , σ̃a i . σa n k(α 0 + 1) Finally, using the second part of Fact 5.15 completes the proof.  45 5.2.2 Details of approximate conditional independence Í We prove Lemma 5.14, first gathering some facts. In the sum α,β∈STARℓ (i, j,k) G α G β , the terms α, β which (as graphs) share only the vertices i, j, k will not cause us any trouble, because such G α and G β are independent conditioned on σi , σ j , σk . Fact 5.16. If α, β ∈ STARℓ (i, j, k) share only the vertices i, j, k, then for any collection σ of probability vectors,  α β   α   β  G G | σi , σ j , σk  G | σi , σ j , σk · G | σi , σ j , σk . Proof. To sample G α , one needs to know σa for any a ∈ [n] with nonzero degree in α, and similar for b ∈ [n] and G β . The only overlap is σi , σ j , σk .  The next fact is the key one. Pairs α, β which share vertices forming paths originating at i, j, Í and k make the next-largest contribution (after α, β sharing only i, j, k) to α,β G α G β . Fact 5.17. Let i, j, k ∈ [n] be distinct. Let V(σ)i jk be as in the Lemma 5.14. Let C 2 ∈ ’ be as in Fact 5.15. Let α, β ∈ STARℓ (i, j, k) share s vertices (in addition to i, j, k) for some s 6 2t , and suppose the shared vertices form paths in α and β starting at i, j, and k. Then V(σ)2i jk · α β G G 6ε −2s   −s d n −s (1 + O(d/n))  1 · k(α 0 + 1)  −2s  ·  G α V(σ)i jk ·   G β V(σ)i jk . Proof. Let σα∩β be the σ’s corresponding to vertices sharerd by α, β. Let i ′ , j ′ , k ′ be the last shared vertices along the paths beginning at i, j, k respectively. We expand G α G β and use conditional independence of the G e ’s given the σ’s: Gα Gβ  σ i′ , j′ ,k′     (G α∩β )2 |σi′ , σ j′ , σk′ ·  G α\β | σi′ σ j′ σk′ ·  G β\α | σi′ σ j′ σk′  . Both G α\β and G β\α are long-armed stars with terminal vertices i ′ , j ′ , k ′. The arm lengths of G α\β total 3ℓ − s. By a similar argument to Lemma 5.13, G α\β is an unbiased estimator of V(σ)i′ j′ k′ with  G α\β | σi′ , σ j′ , σk ′   εd  n  3ℓ−s  1 k(α 0 + 1)  3(ℓ−1)−s · C 3 · V(σ)i′ , j′ ,k′ and the same goes for G β\α . Furthermore,  (G α∩β 2 ) | σi′ , σ j′ , σk ′    |α∩β| d  n  Ö     ′ , σ j′ , σk ′  . (1 + εh σ̃ , σ̃ i + O(d/n)) σ a i b   (a,b)∈α∩β    By our assumption that α ∩ β consists just of paths, every subset of edges in the graph α ∩ β contains   α∩β 2 a vertex of degree 1. Hence, (G ) | σi′ , σ j′ , σk′  (1 + O(d/n))|α∩β| (d/n)|α∩β| . Putting these together, α β s 6ℓ−2s G G  (1 + O(d/n)) ε   6ℓ−s  d n 46 1 k(α 0 + 1)  6(ℓ−1)−2s C 32 V(σ)2i jk G α V(σ)i jk to obtain At the same time, one may apply Lemma 5.13 to   α  G V(σ)i jk · The lemma follows. β G V(σ)i jk   εd  n  6ℓ  1 k(α 0 + 1)  6(ℓ−1) C 32 ·  V(σ)2i jk σ i ,σ j ,σ k 2 .  The last fact will allow us to control α, β which intersect in some way other than paths starting at i, j, k. The key idea will be that such pairs α, β must share more vertices than they do edges. Fact 5.18. Let i, j, k ∈ [n] be distinct. Let V(σ)i jk be as in the Lemma 5.14. Let C 2 ∈ ’ be as in Fact 5.15. C 2  k(α10 +1) . Let α, β ∈ STARℓ (i, j, k) share s vertices (in addition to i, j, k) and r edges. Then V(σ)2i jk · α β G G 6ε −2r   −r d n  · C 2−2s · k O(s−r) (1 + α 0 )O(s−r) · Proof. Expanding as usual, α β G G    6ℓ−r d n σ Ö ab∈α△β h σ̃a , σ̃b i · Ö ab∈α∩β   G α V(σ)i jk ·  G β V(σ)i jk . (1 + εh σ̃a , σ̃b i + O(d/n)) . Any nontrivial edge-induced subgraph of α ∩ β contains a degree-1 vertex; using this to expand the second product and simplifying with σ̃a  0, the above is   6ℓ−r d n σ Ö ab∈α△β h σ̃a , σ̃b i · (1 + O(d/n))r . For every degree-2 vertex in α△β we can use Fact A.3 to take the expectation. Each such vertex contributes a factor of C 2 and there are at least 3ℓ − O(s − r) such vertices. The remaining expression will be bounded by 1. The fact follows.  Now we can prove Lemma 5.14. Proof of Lemma 5.14. Let us recall that our goal is to show h i V(σ)2i jk · Õ α,β∈STARℓ (i, j,k) k 2 (α +1)2 G α G β 6 δ O(1) ·   Õ α,β∈STARℓ (i, j,k)     G α V(σ)i jk ·  G β V(σ)i jk  where δ  1 − ε20 d . Let c  G α V(σ)i jk · G β V(σ)i jk . (Notice this number does not depend on α or β.) The right-hand side above simplifies to |STARℓ (i, j, k)| 2 · c. On the left-hand side, what is the contribution from α, β sharing s vertices? First consider what happens with s 6 t/2 and the intersecting vertices form paths in α and β starting at i, j, k. Choosing a random pair α, β from STARℓ (i, j, k), the probability that they intersect along paths of length s1 , s2 , s3 starting at i, j, k respectively is at most n −s1−s2 −s3 . There are at most (1 + s 2 ) choices 47 for nonnegative integers s1 , s2 , s3 with s1 + s2 + s3  s. By Fact 5.17, such terms therefore contribute at most  q |STARℓ (i, j, k)| 2 · ε c· n −s d n (1 + O(d/n))  −2s C 2−2s · s 2  c · |STARℓ (i, j, k)| 2 · (ε 2 dC 22 (1 + O(d/n)))−s · s 2 where C 2  k(α10 +1) . By hypothesis, δ > 0. Consider the sum of all such contributions for s 6 t/2; this is at most 2 c · |STARℓ (i, j, k)| · t/2 Õ s0 (1 + s 2 ) ·  k 2 (α 0 +1)2 ε2 d s 6 δ O(1) · c · |STARℓ (i, j, k)| 2 . Next, consider the contribution from α, β which share s vertices in some pattern other than those considered above. Unless α  β, this means α, β share at least one more vertex than the number r of edges that they share. Suppose α , β and let s − r  q. There are t O(q) patterns in which such an intersection might occur, and each occurs for a random pair α, β ∈ STARℓ (i, j, k) with probabilty n −s . So using Fact 5.18, the contribution is at most 2 c · |STARℓ (i, j, k)| · t  2 q Õ ε d n q1 · k O(q) (1 + α 0 )O(q) t O(q) By the hypotheses k, α  n o(1) and ε 2 d  n 1−Ω(1) , this is all o(c|STARℓ (i, j, k)| 2 ). Finally, consider the case α  β. Then, using Fact 5.18 again, the contribution is at most c · |STARℓ (i, j, k)| 2  ε2 d k 2 (α 0 + 1)2  −t k O(1) α O(1) which is o(c|STARℓ (i, j, k)| 2 ) because t ≫ log(n). Putting these things together gives the lemma.  5.3 Cross validation In this section we show how to use a holdout set of vertices to cross-validate candidate community membership vectors. The arguments are all standard, using straightforward concentration inequalities. At the end we prove the first part of Lemma 5.8, on the estimator S3 . The proof of the second part, on S4 is similar, using standard facts about moments of the Dirichlet distribution (see Fact A.3). The proof of Lemma 5.9 is also similar, using the discussion in Section 5.2 to turn estimators for moments of the v vectors into estimators for moments of the w vectors—we leave it to the reader. We will need a few facts to prove the lemma. Fact 5.19. Let n 0 , n 1 , A, k, d, ε, α, σ, v, τ, G, x, P be as in Lemma 5.8. Let a ∈ A. There is a number C  C(k, α) 6 poly(k, α) such that  εd Pa (G, x)  n G,τ 3 ·C· Õ Õ i jk∈A distinct s∈[k] 48 σi (s)σ j (s)σk (s)x i x j x k . Proof. Immediate from Fact 5.15.  Fact 5.20. Let n 0 , n 1 , A, k, d, ε, α, σ, v, τ, G, x, P be as in Lemma 5.8. Let a ∈ A. The following variance bound holds.  2 poly(k, α, ε, d) 2 Pa (G, x) − Pa (G, x) 6 . G,τ G,τ n3 Proof. Expanding Pa (G, x) and using that |hσ, σ′i| 6 1 for any σ, σ′ ∈ ∆k−1 we get  6 d Pa (G, x) 6 n G,τ 2 Õ x i x j x k x i′ x j′ x k ′ 6 i jk distinct i′ j′ k ′ distinct  6 d n · n 3 · kx k 12 .  Fact 5.21. Let n 0 , n 1 , A, k, d, ε, α, σ, v, τ, G, x, P be as in Lemma 5.8. Let a ∈ A. For some constant γ∗ (ε, d, k, α) and every γ∗ > γ > 0,  {|Pa (G, x)| > n γ } 6 exp(−n Ω(γ) ) G,τ Proof. The fact follows from a standard exponential tail bound on the degree of vertex a.  We can put these facts together to prove the S3 portion of Lemma 5.8 (as we discussed above, the S4 portion and Lemma 5.9 are similar). The strategy will be to use the following version of Bernstein’s inequality, applied to the random variables hG a , v ⊗3 i. The proof of the inequality is in the appendix. Proposition 5.22 (Bernstein wth tails). Let X be a random variable satisfying numbers R, δ, δ′ ∈ ’, {|X | > R} 6 δ and |X | · 1 |X|>R 6 δ′ . Let X1 , . . . , X m be independent realizations of X. Then  ( 1 m Õ Xi > t + δ i6m ′ )  X  0 and, for some  −Ω(1) · m · t 2 + mδ . 6 exp X2 + t · R Now we can prove Lemma 5.8. Proof of Lemma 5.8. We apply Proposition 5.22 to the n 1 random variables X a   εd n  −3 C −1 Pa (G, x) for a ∈ A, where C  C(k, α) is the number from Fact 5.20. (For each a ∈ A these are iid over G, τ.) ′ Take t  n 3/2−γ for a small-enough constant γ′ so that n 1 t 2 /n 3 > n γ for some constant γ, using the assumption n 1 > n Ω(1) . All together, we get     Õ Õ  1 Õ    ′ 3/2−γ′ Xa −  σs (i)σs (j)σs (k)x i x j x k > n 6 exp(n −γ )  G,τ   n 1 a∈A  s∈[k] i jk∈A distinct   49 for some constants γ, γ′ (possibly different from γ, γ′ above) and large-enough n. For any unit n0 x ∈ ’n0 and σ ∈ ∆k−1 , using that k 6 n o(1) it is not hard to show via Cauchy-Schwarz that Õ s∈[k] hv s , xi 3 − Õ Õ s∈[k] i jk∈A distinct σs (i)σs (j)σs (k)x i x j x k 6 n 1+o(1) . The lemma follows.  5.4 Producing probability vectors In this section we prove Lemma 5.10. The proof of Lemma 5.11 is very similar (in fact it is somewhat easier) so we leave it to the reader. Lemma (Restatement of Theorem 5.10). Let δ ∈ (0, 1) and k  k(n) ∈ Ž and α  α(n) > 0, with α, k 6 n o(1) . Suppose δ > 1/k 1/C for a big-enough constant C. There is a poly(n)-time algorithm with the following guarantees. Let σ1 , . . . , σn be iid draws from the α, k Dirichlet distribution. Let v1 , . . . , v k ∈ ’n be the vectors given by v s (i)  σi (s) − 1k . Let w 1 , . . . , w k ∈ ’n be the vectors given by w s (i)  v s (i) + √1 , so that hw s , w t i  0 for s , t. Let M  1. M −1/2 w s − ws ( kw s k 2 )1/2 6 Í k α+1 T s w s w s . Let E be the event that 1 poly n for every s ∈ [k]. 2. kw s k  (1 ± 1/poly(n))( kw s k 2 )1/2 for every s ∈ [k]. 3. kv s k  (1 ± 1/poly(n))( kv s k 2 )1/2 for every s ∈ [k]. Suppose x1 , . . . , x k ∈ ’n are unit vectors such that for at least δk vectors w 1 , . . . , w m there exists t ∈ [k] such that hw s , x t i > δkw s k. The algorithm takes input x1 , . . . , x k and when E happens returns probability vectors τ1 , . . . , τn ∈ ∆k−1 such that   1 k+α 1 O(1) 2 O(1) corr(σ, τ) > δ kv k  δ . · − α+1 k k First some preliminaries. Let σ1 , . . . , σn be iid from the α, k Dirichlet distribution. There are two important families of vectors in ’n . Let 1 v s (i)  σi (s) − k   1 1 w s (i)  σi (s) − 1− √ . k α+1 We will also work with a normalized version of the v vectors: vs vs  . ( kv s k 2 )1/2 Í Í By construction, kv s k 2  1. Also by definition, s v s  s v s  0. Thus Í −1 k + s ,t hv s , v t i  0 and so by symmetry hv s , v t i  k−1 . We let 1 ws  vs + √ · n 50 r 1 k−1 h Í s vs , Í s vsi  so that hw s , w t i  0 for s , t. (In the facts which follow we sometimes write v as v when both normalizations are not needed; this is always noted.) We will want the following fact; the proof is elementary. Fact 5.23. Let σ, u, v, w as above, and suppose y is an n × k matrix whose rows are in ∆k−1 − 1k (that is they are shifted probability vectors). Then τ  y + 1k is a matrix whose rows are probability vectors, and τ satisfies n hτ, σi > hy, vi + . k The following fact√will be useful when δ is small but not tiny; i.e. δ < 1 − c for some fixed constant c but δ ≫ 1/ k. Fact 5.24. Suppose that x1 , . . . , x k are unit vectors and w 1 , . . . , w k are orthonormal. Also suppose that there is 1 > δ > 0 such that for at least δk vectors w s among w 1 , . . . , w k there exists a vector x t among x1 , . . . , x k such that hw s , x t i > δ. Then there is a permutation π : [k] → [k] such that if x  (x1 , . . . , x k ) is an n × k matrix and similarly for w,  1 1 hx, π · wi > δ5 − √ 4 k 1−δ  1/2 ! kx k kw k , where x  (x1 , . . . , x k ) is an n × k matrix and similarly for w. Proof. We will think of π as a matching of w 1 , . . . , w k to x1 , . . . , x k . Call x t good for w s if hw s , x t i > δ. First of all, by orthogonality of vectors w 1 , . . . , w k , any particular vector x t is good for at most 1/δ 2 vectors w s . Hence, there is a set S of δ4 k vectors w s such that for each w s there exists a good x t and all the good x t ’s are distinct. Begin by matching each w s ∈ S to its good x t . Let π be the result of extending that matching randomly to a perfect matching of k to k. Í We need to lower bound s <S hw s , x π(s) i. Consider that for a particular t, −hx t , w π−1(t) i 6 ( hx t , w π−1(t) i 2 )1/2 . The distribution of π−1 (t) is uniform among all s < S. So  1 1 1 Õ hw s , x t i 2 6 hx t , w π−1 (t) i  k − |S| k 1 − δ4 2 since Í s <S s∈[k] hw s , xt i2 6 1. It follows that    1/2 1 1 hx t , w π−1(t) i > − √ . 4 k 1−δ  1/2 √  Í 1 Therefore, k hw , x i > − . Thus there is some choice of π such that s π(s) s <S 1−δ4   1/2 √ Í 1 . Hence for this π one gets s <S hw s , x π(s) i > − k 1−δ4 Õ s∈[k] √  1 hw s , x π(s) i > δ 5 k − k 1 − δ4  1/2 51  1 1  δ5 − √ 4 k 1−δ  1/2 ! kx k kw k .  The next fact serves the same purpose as the previous one but in the large δ case (i.e. δ close to 1). Fact 5.25. Under the same hypotheses as Fact 5.24, letting δ  1 − ε for some ε > 0, there is a permutation π : [k] → [k] such that hx, π · wi > (1 − 9ε)kx k kw k. Proof. As in the proof of Fact 5.24, we construct a matching π by first matching a set S of at least δ4 k > (1 − 4ε)k vectors w s to corresponding x t . Then we match the remaining vectors arbitrarily. For any s, t we know hw s , x t i > −1. So the result is hx, π · wi > (1 − 5ε)k − 4εk  (1 − 9ε)k  (1 − 9ε)kx k kw k .  We will also want a way to translate a matrix correlated with w to one correlated with v, so that we can apply Fact 5.23. Fact 5.26. Suppose v is an n × k matrix whose rows are centered probability vectors and w  v + c is a coordinate-wise additive shift of v. Suppose y is also an n × k matrix whose rows are centered probability vectors shifted by c in each coordinate (so y − c is a matrix of centered probability vectors). Then the shifted matrix y − c satisfies hy − c, vi > hy, wi − c 2 nk . Proof. By definition, hy − c, vi  hy, vi. Since v  w − c, we get hy − c, vi  hy, vi  hy, wi − chy, 1i  hy, wi − c 2 nk .  Proof of Lemma 5.10. First assume δ < 1 − c for any small constant c. Let π be the permutation guaranteed by Fact 5.24 applied to the vectors x1 , . . . , x k and M −1/2 w 1 , . . . , M −1/2 w k . (Without loss of generality reorder the vectors so that π is the identity permutation.) Since 1 − c > δ > 1/k 1/C for big-enough C and small-enough c (which are independent of n, k) and the guarantee of Fact 5.24, by event E we get that hx, wi > δ O(1) kx k kw k . So by taking a correlation-preserving projection of x into the set of matrices whose rows are shifted probability vectors, we get a matrix y with the guarantee hy, wi > δ O(1) k y k kw k and k y k > δ O(1) kw k . Applying Fact 5.26, we obtain hy − c, vi > hy, wi − c 2 nk  hy, wi − where c  √1 . k α+1 Putting things together and using hy − c, vi > δ O(1) So applying Fact 5.23 finishes the proof in this case. 52 kv k 2 6 kv k 2 . kw k 2 k kw k 2 and the event E, we get Now suppose δ > 1 − c for a small-enough constant c. Then using event E and Fact 5.25, there is π such that hx, wi > (1 − O(c))kx k( kw k 2) (where again we have without loss of generality reordered the vectors so that π is the identity permutation). Now taking the Euclidean projection of x· by ( kwk 2 )1/2 into the n × k matrices whose rows are centered kxk 1 √ c  , we get a matrix y which again satisfies hy, k α+1 probability vectors shifted entrywise wi > (1 − O(c))k y k kw k and k y k > (1 − O(c))kw k, so (using event E), hy, wi > (1 − O(c)) kw k 2. Removing the contribution from hy, 1i, this implies that hy − c, vi > (1− O(c)) kv k 2 . For c small enough, this is at least δ O(1) kv k 2 .  Applying Fact 5.23 finishes the proof. 5.5 Remaining lemmas We provide sketches of the proofs of Lemma 5.7 and Lemma 5.10, since the proofs of these lemmas use only standard techniques. √ Proof sketch of Lemma 5.7. For σ ∈ ’k , let σ̃  σ − (1 − 1/ α + 1)/k. Standard calculations show that 1 Id. It follows by standard if σ is drawn from the α, k Dirichlet distribution then σ̃ σ̃ ⊤  k(α+1) Í matrix concentration and the assumption k, α 6 n o(1) that the eigenvalues of n1 i 6 n σ̃i σ̃i⊤ are all 1 ± n −Ω(1) , where σ1 , . . . , σn are iid draws from the α, k Dirichlet distribution. For the second part of the Lemma, use the first part to show that kvv ss k − w ′s 6 1/poly(k). Then when k > δ−C for large-enough C, if hx, v s i 3 > δ O(1) kv s k 3 it follows that also hx, w s i > δ O(1) − 1/poly(k) > δ O(1) . The lemma follows.  Proof sketch of Lemma 5.10. If δ < 1 − Ω(1), then δ 2 /2 > δ O(1) , so the Lemma follows from standard concentration and Theorem 2.3 on correlation-preserving projection. On the other hand, if δ > ˜ k−1 )n by 1 − o(1), then kv ′ − σ̃k 6 o(1) · k σ̃k, so the same is also true for the projection of v ′ into (∆ convexity and the lemma follows.  6 Lower bounds against low-degree polynomials at the Kesten-Stigum threshold In this section we prove two lower bounds for k-community partial recovery algorithms based on low-degree polynomials. 6.1 Low-degree Fourier spectrum of the k-community block model Theorem 6.1. Let d, ε, k be constants. Let µ : {0, 1} n×n → ’ be the relative density of SBM(n, d, ε, k) with respect to G(n, nd ). Let µ 6 ℓ be the projection of µ to the degree-ℓ polynomials with respect to the norm 53 induced by G(n, nd ).31 For any constant δ > 0 and ξ > 0 (allowing ξ 6 o(1)), kµ 6 ℓ k is ( > n Ω(1) if ε 2 d > (1 + δ)k 2 , ℓ > O(log n) 6 n 2ξ if ε 2 d < (1 − δ)k 2 , ℓ < n ξ . This proves Theorem 1.9 (see discussion following statement of that theorem). To prove the theorem we need the following lemmas. Lemma 6.2. Let χα : {0, 1} n×n → ’ be the nd -biased Fourier character. If α ⊆ on n vertices, has any degree-one vertex, then G∼SBM(n,d,ε,k) n 2 , considered as a graph χα (G)  0 The proof follows from calculations very similar to those in Section 5, so we omit it. Proof of Theorem 6.1. The bound kµ 6 ℓ k > n Ω(1) when ε 2 d > (1 + δ)k 2 and ℓ ≫ log(n), follows from almost identical calculations to Section 5,32 so we omit this argument and focus on the regime ε 2 d < (1 − δ)k 2 . By definition and elementary Fourier analysis, kµ 6 ℓ k 2  Also by definition, b µ(α)  d G∼G(n, n ) Õ n 2 α⊆( ) ,|α| 6 ℓ µ(G)χα (G)  b µ(α)2 G∼SBM(n,d,ε,k) (6.1) χα where {χα } are the nd -biased Fourier characters. Thus, using Lemma 6.2 we may restrict attion to  the contribution of those α ⊆ n2 with |α| 6 ℓ and containing no degree-1 vertices. Fix such an α, and suppose it has C(α) connected components and V2 (α) vertices of degree 2 (considered again as a graph on [n]). Fact 6.3 (following this proof) together with routine computations shows that  G∼SBM(n,d,ε,k)  χα (G) 2  |α|   |α|  k −2(V(α)−C(α)) 6 1 + O( nd ) ·n −|α| ·(1−δ)|α| ·k 2(|α|−V(α)+C(α)) . 6 (1 + O( nd ))ε 2 nd  |α| Let c(α)  1 + O( nd ) · n −|α| · (1 − δ)|α| · k 2(|α|−V(α)+C(α)) be this upper bound on the contribution of α to the right-hand side of (6.1). It will be enough to bound (∗) 31That is, k f k  ( d) G∼G(n, n def  Õ c(α) n 2 α⊆( ) |α| 6 ℓ α has no degree 1 nodes f (G)2 )1/2 . 32The calculations in Section 5 are performed for long-armed stars; to prove the present result the analogous calculations should be performed for cycles of logarithmic lengh. Similar calculations also appear in many previous works. 54 Given any α as in the sum, we may partition it into two vertex-disjoint subgraphs, α 0 and α 1 , where α 0 is a union of cycles and no connected component of α 1 is a cycle, such that α  α 0 ∪ α 1 . Thus, Õ (∗) 6 α0 c(α 0 ) ! Õ α1 c(α 1 ) ! where α 0 ranges over unions of cycles with |α 0 | 6 ℓ and α 1 ranges over graphs on [n] with at most ℓ where all degrees are at least 2 and containing no connected component which is a cycle. Lemmas 6.4 and 6.5, which follow, the terms above as O(1) and n 2ξ , respectively, which finishes the proof.  Fact 6.3. Let U be a connected graph on t vertices where all degrees are at least 2. For each vertex v of U let σv ∈ ’k be a uniformly random standard basis vector. Let σ̃v  σv − 1k · 1. Then Ö (u,v)∈U h σ̃v , σ̃u i 6 tk −t+1 Proof. Consider a particular realization of σ1 , . . . , σt . Suppose all but m vertices v in U are adjacent to at least 2 vertices u 1 , u 2 such that σu1 , σv and σu2 , σv . In this case, Ö (u,v)∈U h σ̃v , σ̃u i 6 k −(t−m) . The probability of such a pattern of disagreements is at most k −m , unless m  t, in which case the probability is at most k −t+1 . The fact follows.  Lemma 6.4. For α ⊆ n 2 ,  def components in α. For constants ε, d, k, let c(α)  1 + O( nd ) ℓ 6 n 0.01 and     |α| let V(α) be the number of vertices in α, let C(α) be the number of connected · n −|α| · (1 − δ)|α| · k 2(|α|−V(α)+C(α)) Let  n : α has all degrees > 2, has no connected components which are cycles, |α| 6 ℓ . U α⊆ 2 Then Õ c(α) 6 O(1) . α∈U Proof. We will use a coding argument to bound the number of α ∈ U with V vertices, E edges, and C connected components. We claim that any such α is uniquely specified by the following encoding. To encode α, start by picking an arbitrary vertex v1 in α. List the vertices v1 , . . . , v |V | of α, each requiring log n bits, starting from v1 , using the following rules to pick v i . 1. If v i−1 has a neighbor not yet appearing in the list v1 , . . . , v i−1 , let v i be any such neighbor. 55 2. Otherwise, if v i−1 has a neighbor v j which (a) appears in the list v1 , . . . , v i−1 and (b) for which either j  1 or v j−1 is not adjacent to v j in α, and (c) for which if j , i ′ for i ′ 6 i − 1 being the minimal index such that v i′ , . . . , v i−1 is a path in α (i.e. v j , . . . , v i−1 are not a cycle in α) then reorder the list as follows. Remove vertices v j , . . . , v j′ where j ′ is the greatest index so that all edges v ℓ , v ℓ+1 exist in α for j 6 ℓ 6 j ′. Also remove vertices v i′ , . . . , v i−1 where i ′ is analogously the minimal index such that edes v ℓ , v ℓ+1 exist in α for i ′ 6 ℓ 6 i − 1. Then, append the list v j′ , v j′−1 , . . . , v j , v i−1 , . . . , v i′ . By construction, all of these vertices appear in a path in α. The new list retains the invariant that every vertex either preceeds a neighbor in α or has no neighbors in α which have not previous appeared in the list. 3. Otherwise, let v i be an arbitrary vertex in α in the same connected component as v i−1 , if some such vertices has not yet appeared in the list. 4. Otherwise, let v i be an arbitrary vertex of α not yet appearing among v1 , . . . , v i−1 . After the list of vertices, append to the encoding the following information. First, a list of the R (for removed) pairs v i , v i+1 for which there is not an edge (v i , v i+1 ) in α. This uses 2R log V bits. Last, a list of the edges in α which are not among the pairs v i , v i+1 (each edge encoded using 2 log V bits). We argue that the number R of removed pairs (and hence the length of their list in the encoding) is not too great. In particular, we claim R 6 2(E −V). In fact, this is true connected-component-wise in α. To see it, proceed as follows. Fix a connected component β of α. Let v t be the first vertex in β to appear in the list v1 , . . . , v |V | . Proceeding in increasing order down the list from v t , let (v r1 , v r1+1 ), (v r2 , v r2 +1 ), . . . be the pairs encountered (before leaving β) which do not correspond to edges in α (and hence will later appear in the list of removed pairs). Construct a sequence of subgraphs β j of β as follows. The graph β 1 is the line on vertices v t , . . . , v r1 . To construct the graph β j , start from β j−1 and add the line from v r j−1 +1 to v r j (by definition all these edges appear in β). Since v r j must have at least degree 2, it has a neighbor u j in β among the vertices v a for a < r j aside from v r j −1 . (If v r j had a neighbor not yet appearing in the list, then v r j +1 would have been that neighbor, contrary to assumption.) Choose any such neighbor and add it to β j ; this finishes construction of the graph β j . For later use, note that either adding the edge to u j turns β j \ b j−1 into a cycle or u j is not itself among the v r ’s, since otherwise in constructing the list we would have done a reordering operation. In each of the graphs β j , the number of edges is equal to the number of vertices. To obtain β, we must add E β − Vβ edges (where E β is the number of edges and β and Vβ is the number of vertices). We claim that in so doing at least one half of a distinct such edge must be added per β j ; we prove this via a charging scheme. As noted above, each graph β j \ β j−1 either contains v r j−1 as a degree-1 vertex or it forms cycle. If it contains a degree-1 vertex, by construction this vertex is not u j′ for any j ′ > j, otherwise we would have reordered. So charge β j to the edge which must be added to fix the degree-1 vertex. 56 In the cycle case, either some edge among the E β − Vβ additional edges is added incident to the cycle (in which case we charge β j to this edge), or some u j′ for j ′ > j is in β j \ β j−1 . If the latter, then β j′ \ β j′−1 contains a degree-1 vertex and β j \ β j − 1 can be charged to the edge which fixes that degree 1 vertex. Every additional edge was charged at most twice. Thus, R 6 2(E − V) It is not hard to check that α can be uniquely decoded from the encoding previously described. The final result of this encoding scheme is that each α can be encoded with at most V log n + 6(E − V) log V bits, and so there are at most n V · V 6(E−V) choices for α. The contribution of such α to Í α∈U c(α) is thus at most n −(E−V) V 6(E−V) (1 − δ/2)E k 2(E−V+C) We know that C 6 E − V. So as long as k, V 6 n 0.01 , we obtain that this contributes at most n (E−V)/2 (1 − δ/2)E . Summing across all V, E 6 n 0.01 , the lemma follows.  n 2 , Lemma 6.5. For α ⊆   |α| let V(α) be the number of vertices in α, let C(α) be the number of connected def components in α. For constants 1 > δ > 0 and k, let c(α)  1 + O( nd ) 2 Let ℓ 6 n ξ/k for some ξ > 0 (allowing ξ 6 o(1)) and    ·n −|α| ·(1−δ)|α| ·k 2(|α|−V(α)+C(α))  n U α⊆ : α is a union of cycles . 2 Õ Then c(α) 6 n 2ξ α∈U Proof. Let U t be the set of α which are unions of t-cycles (we exclude the empty α). Let c t  Then Õ Ö c(α) 6 (1 + c t ) . α∈U Í α∈U t cα. t 6ℓ Count the α ∈ U t which contain exactly p cycles of length t by first choosing a list of pt vertices— there are n pt choices. In doing so we will count each alpha p!t p times, since each of the p cycles can be rotated and the cycles can themselves be exchanged. All in all, there are at most n pt /(p!t p ) such α, and they contribute at most (1 − δ/2)pt k 2p c(α)n pt 6 6 k 2p /(p!t p ) . p!t p p!t p for large enough n. Thus, summing over all α ∈ U t , we get (1 + c t ) 6 So, Ö t 6ℓ (1 + c t ) 6 exp(k 2 ℓ Õ (1 − δ/2)p k 2p p0 ℓ Õ t1 p!t p 6 exp(k 2 /t) . 2 1/t) 6 exp(k 2 log 2ℓ) 6 (2ℓ)k 6 n 2ξ .  57 6.2 Lower bound for estimating communities Theorem 6.6. Let d, ε, k, δ be constants such that ε 2 d < (1− δ)k 2 . Let f : {0, 1} n×n → ’ be any function, let i, j ∈ [n] be distinct. Then if f satisfies d f (G)  0 and is correlated with the indicator 1 σ i σ j G∼G(n, n ) that i and j are in the same community in the following sense: G∼SBM(n,d,ε,k) ( f (G)(1σi σ j − 1k ) f (G)2 )1/2 d G∼G(n, n ) > Ω(1) then deg f > n c(d,ε,k) for some c(d, ε, k) > 0. Proof. Let 1(G)  µ(G) [1σi σ j − 1k | G], where µ(G) is the relative density of SBM(n, d, ε, k). Standard Fourier analysis shows that the optimal degree-ℓ choice for such f to maximize the above correlation is 1 6 ℓ , the orthogonal projection of 1 to the degree-ℓ polynomials with respect to the measure G(n, nd ), and the correlation is at most k1 6 ℓ k. It suffices to show that for some constant c(d, ε, k), if ℓ < n c(d,ε,k) then k1 6 ℓ k 6 o(1). For this we expand 1 in the Fourier basis, noting that where as usual σ̃i  σi − tions show that 1 k b 1 (α)  σ,G∼SBM(n,d,ε,k) h σ̃i , σ̃ j iχα (G) · 1 is the centered indicator of i’s community. By-now routine computa-  b 1 (α)2 6 (1 + O(d/n))ε 2 nd  |α| Ö © ª h σ̃i , σ̃ j i ® · ­ h σ̃i , σ̃ j i · (k,ℓ)∈α « ¬ 2 We assume that (i, j) < α; it is not hard to check that such α’s dominate the norm k1 6 ℓ k. If some vertex aside from i, j in α has degree 1 then this is zero. Similarly, if i or j does not appear in α then this is zero. Otherwise, b 1 (α)2 6 ((1 + O(d/n)))|α| n −|α| (1 − δ)|α| k 2(|α|−V(α)+C(α) where as usual V(α) is the number of vertices in α and C(α) is the number of connected components in α. Let β(α) be the connected component of α containing i and j (if they are not in the same component the arguments are mostly unchanged). Then we can bound k1 6 ℓ k 2  Õ |α| 6 ℓ b 1 (α)2 6 kµ 6 ℓ k 2 · Õ β ((1 + O(d/n)))|β| n −|β| (1 − δ)|β| k 2(|β|−V(β)+1 where β ranges over connected graphs with vertices from [n], at most ℓ edges, every vertex except i and j having degree at least 2, and containing i and j with degree at least 1. There are at most n V−2 V O(E−V) such graphs containing at V vertices aside from i and j and E edges (by an analogous argument as in Lemma 6.4). The total contribution from such β is therefore at most k 2(E−V+1) V O(E−V) n E−V+2 58 Summing over V and E, we get Õ β ((1 + O(d/n)))|β| n −|β| (1 − δ)|β| k 2(|β|−V(β)+1 6 n −Ω(1) so long as ℓ 6 n c for small enough c. Using Theorem 6.1 to bound kµ 6 ℓ k finishes the proof.  7 Tensor decomposition from constant correlation Problem 7.1 (Orthogonal n-dimensional 4-tensor decomposition from constant correlation). Let Í ⊗4 n ⊗4 satisfy hA,Bi > δ  Ω(1). a1 , . . . , a m ∈ ’n be orthonormal, and let A  m i1 a i . Let B ∈ (’ ) kAkkBk Let O be an oracle such that for any unit v ∈ ’n , O(v)  ( YES if Ím i1 ha i , vi 4 > δ O(1) NO otherwise Input: The tensor B, and if δ < 0.01, access to the oracle O. Goal: Output orthonormal vectors b 1 , . . . , b m so that there is a set S ⊆ [m] of size |S| > δ O(1) · m where for every i ∈ S there is j 6 m with hb j , a i i 2 > δ O(1) . O(1) O(1) We will give an n 1/δ -time algorithm (hence using at most n 1/δ oracle calls) for this problem based on a maximum-entropy Sum-of-Squares relaxation. The main theorem is the following; the subsequent corollary arrives at the final algorithm. Theorem 7.2. Let A, B and a1 , . . . , a m and δ 6 0.01 be as in Problem 7.1. Let v1 , . . . , v r for r 6 δ 4 m be orthonormal vectors. There is a randomized algorithm ALG with running time n O(1) which takes input B, v1 , . . . , v r and outputs a unit vector v, orthogonal to v1 , . . . , v r , with the following guarantee. There is a set S ⊆ [m] of size |S| > δ O(1) · m so that for i ∈ S,   hv, a i i 2 > δ O(1) > n −1/poly(δ) . The following corollary captures the overall algorithm for tensor decomposition, using the oracle O to filter the output of the algorithm of Theorem 7.2. Corollary 7.3. Let a1 , . . . , a n , A, B, δ be as in Theorem 7.2 and O as in Problem 7.1. There is a n poly(1/δ) time algorithm which takes the tensor B as input and returns b 1 , . . . , b m such that with high probability there is a set S ⊆ [m] of size |S| > δ O(1) m which has the guarantee that for all i ∈ S there is j 6 m with ha i , b j i 2 > δ O(1) . If δ 6 1 − Ω(1), the algorithm makes n 1/poly(δ) adaptive queries to the oracle O. The algorithm can also be implemented with nonadaptive queries as follows. Once the input B and the random coins of the algorithm are fixed, there is a list of at most n poly(k/δ) . Query the oracle O nonadaptively on all these vectors and assemble the answers into a lookup table; then the decomposition algorithm can be run using access only to the lookup table. 59 Proof of Corollary 7.3. If δ > 1 − ε ∗ for a small enough constant ε ∗ then the tensor decomposition algorithm of Schramm and Steurer has the appropriate guarantees. (See Theorem 4.4 and Lemma 4.9 in [SS17]. This algorithm has several advantages, including that it does not need to solve any semidefinite program, but it cannot handle the high-error regime we need to address here.) From here on we assume δ 6 0.01 < 1 − ε ∗ . (Otherwise, we can replace δ with δ C 6 0.01 for large enough C.) Our algorithm is as follows. Algorithm 7.4 (Constant-correlation tensor decomposition). 1. Let V be an empty set of vectors. 2. For rounds 1, . . . , T  δ O(1) m, do: (a) Use the algorithm of Theorem 7.2 on the tensor B to generate w 1 , . . . , w t , where t  O(1) n 1/δ . (b) Call O on successive vectors w 1 , . . . , w t , and let w be the first for which it outputs YES. (If no such vector exists, the algorithm halts and outputs random orthonormal vectors b 1 , . . . , b m .) (c) Add w to V. 3. Let b 1 , . . . , b m−|V | be random orthonormal vectors, orthogonal to each v ∈ V. 4. Output {b 1 , . . . , b m−|V | } ∪ V. O(1) large enough, and T  δ O(1) m small enough, by Theorem 7.2 with high Choosing t  n 1/δ probability in every round 1, . . . , T there is some w among w 1 , . . . , w t for which O outputs YES. Suppose that occurs. In this case, the algorithm outputs (along with some random vectors b i ) a set of vectors V which are orthonormal, and each v ∈ V satisfies hv, a i i > δ O(1) for some a i ; say that this a i is covered by v. Each a i can be covered at most 1/δ O(1) times, by orthonormality of the set V. So, at least δ O(1) |V |  δ O(1) m vectors are covered at least once, which proves the corollary.  We turn to the proof of Theorem 7.2. We will use the following lemmas, whose proofs are later in this section. The problem is already interesting when the list v1 , . . . , v r is empty, and we encourange the reader to understand this case first. The first lemma says that a pseudodistribution of high entropy (in the 2-norm sense33) which is correlated with the tensor B must also be nontrivially correlated with A. Lemma 7.5. Let A, B be as in Problem 7.1. Let v1 , . . . , v r ∈ ’n be orthonormal, with r 6 δ 4 m. Suppose ˜ is the degree-4 pseudodistribution solving mink ˜ x ⊗4 kF s.t. ˜ satisfies {kx k 2 6 1, hx, v1i  0, . . . , hx, v r i  0} δ h ˜ x ⊗4 , Bi > 2m ˜ xx ⊤ 6 1 m ˜ xx ⊤ ⊗ xx ⊤ 6 1 m (7.1) (7.2) (7.3) 33For a distribution µ finitely-supported on a family of orthonormal vectors, the Frobenious norm k x∼µ x ⊗k k is closely related to the collision probability of µ, itself closely related to the order-2 case of Rényi entropy. 60 Í Then ˜ i 6 m hx, a i i 4 > δ 2 /8. Furthermore, it is possible to find ˜ in polynomial time.34 The second lemma says that given a high-entropy (in the spectral sense of [MSS16]) pseudodistribution ˜ having nontrivial correlation with some a ∈ ’n , contracting ˜ with a yields a matrix whose quadratic form is large at a and which does not have too many large eigenvalues. Lemma 7.6. Let a1 , . . . , a m ∈ ’n be orthonormal. Let ˜ be a degree-4 pseudoexpectation such that 1. ˜ satisfies {kx k 2 6 1} Í 2. ˜ i 6 m hx, a i i 4 > δ. 3. k ˜ xx ⊤ ]kop , k ˜ xx ⊤ ⊗ xx ⊤ kop 6 1 m .35 Let M i ∈ ’n×n be the matrix ˜ hx, a i i 2 xx ⊤ . For every i ∈ [m], the matrix M i has at most 4/δ eigenvalues δ larger than 4m . Furthermore,  δ > 2δ .  ha i , M i a i i > 2m i∼[m] The last lemma will help show that a random contraction of a high-entropy pseudodistribution behaves like one of the contractions from Lemma 7.6, with at least inverse-polynomial probability. Lemma 7.7. Let 1 ∼ N(0, Σ) for some 0  Σ  Id and let ˜ be a degree-4 pseudoexpectation where • ˜ satisfies {kx k 2 6 1}. • ˜ xx ⊤ 6 c. • ˜ xx ⊤ ⊗ xx ⊤ 6 c Then 1 ˜ h1, xi 2 xx ⊤ 6 O(c · log n) . Now we can prove Theorem 7.2. Proof of Theorem 7.2. The algorithm is as follows: Algorithm 7.8 (Low-correlation tensor decomposition). 1. Use the first part of Lemma 7.5 to obÍ 4 2 2 ˜ tain a degree-4 pseudoexpectation with i∈[m] ha i , xi > δ /4 satisfying {kx k 6 1, hx, v 1 i  0, . . . , hx, v r i  0}. 2. Sample a random 1 ∼ N(0, Id) and compute the contraction M  ˜ h1, xi 2 xx ⊤ . eigenvectors of M. 3. Output a random unit vector b in the span of the top 32 δ2 34Up to inverse-polynomial error, which we ignore here. See [MSS16] for the ideas needed to show polynomial-time solvability. 35Recall that k·k denotes the operator norm, or maximum singular value, of a matrix. 61 First note that for any v ∈ Span{v1 , . . . , v r }, we must have hv, Mvi  ˜ h1, xi 2 hv, xi 2  0, so v lies in the kernel of M. Hence, the ouput of the algorithm will always be orthogonal to v1 , . . . , v r . Let Π32/δ2 be the projector to the top 32/δ2 eigenvectors of M. For any unit vector a with kΠ32/δ2 a k > δ O(1) , the algorithm will output b with nontrivial correlation with a. Formally, for any such a, hb, ai 2 > δ O(1) . b So, our goal is to show that for a δ O(1) -fraction of the vectors a1 , . . . , a m , {kΠ32/δ2 a i k > δ O(1) } > n −1/δ O(1) 1 . For i ∈ [m], let M i  ˜ ha i , xi 2 xx ⊤ . Let i be the index of some a i so that δ2 16m ha i , M i a i i > δ2 > 32m and rank M i 6 32 δ2 as in Lemma 7.6. (There are Ω(δ2 m) possible choices for a i , according to the Lemma.) We expand the Gaussian vector 1 from the algorithm as 1  10 · a i + 1 ′ where 10 ∼ N(0, 1) and h1 ′ , a i i  0. We note for later use that 1 ′ is a Gaussian vector independent of 10 and that (1 ′)(1 ′)⊤  Id. Using this expansion, M  102 ˜ ha i , xi 2 xx ⊤ + 2 · 10 ˜ h1 ′ , xiha i , xixx ⊤ + ˜ h1 ′ , xi 2 xx ⊤ . We will show that all but the first term have small spectral norm. Addressing the middle term first, by Cauchy-Schwarz, for any unit v ∈ ’n , ˜ h1 ′ , xiha i , xihv, xi 2 6 ˜ h1 ′ , xi 2 hx, vi 2  1/2 ˜ ha i , xi 2 hv, xi 2 where in the last step we have used that ˜ xx ⊤ ⊗ xx ⊤ 6 By Markov’s inequality and Lemma 7.7, ′ 1 n ˜ h1 ′ , xi 2 xx ⊤ > t log n m Let t be a large enough constant so that ′ 1 n ˜ h1 ′ , xi 2 xx ⊤ 6 o t log n m 1 m.  1/2 6O o 1 t  6 ˜ h1 ′, xi 2 xx ⊤ 1/2 ·  1 1/2 m , . > 0.9 . For any constant c, with probability n −1/poly(δ) , the foregoing occurs and 10 (which is independent of 1 ′) is large enough that 2 102 · cδm > δ14 M − 102 M i . Choosing c large enough, in this case def 1 M 102 M′   M i + O(δ6 /m) . 62 Hence the vector a i satisfies 1 ha i , 102 Ma i i > δ2 33m This means that the projection b of a i into the span of eigenvectors of M ′ with eigenvalue at least δ2 /60m has kb k 2 > δ O(1) . This finishes the proof.  7.1 Proofs of Lemmas These lemmas and their proofs use many ideas from [MSS16]. The main difference here is that we want to contract the tensor ˜ x ⊗4 in 2 modes, to obtain the matrix ˜ h1, xi 2 xx ⊤ . For us this is useful because ˜ h1, xi 2 xx ⊤  0. By contrast, the tools in [MSS16] would only allow us to analyze the contraction ˜ hh, x ⊗ xixx ⊤ for h ∼ N(0, Idn 2 ). We start with an elementary fact. Fact 7.9. Let a1 , . . . , a m ∈ ’n be orthonormal. Let Π be the projector to a subspace of codimension at most √ Ím ⊗4 Ím ⊗4 δm. Let A  i1 a i and ΠA  i1 (Πa i ) . Then hA, ΠAi > (1 − O( δ))kAk · kΠAk. A useful corollary of Fact 7.9 is that if T is any 4-tensor satisfying hT, ΠAi > δkT k kΠAk and Π has codimension ≪ δ 2 m, then hT, Ai > Ω(δ)kT k kAk. Proof of Fact 7.9. We expand hA, ΠAi  Õ i, j 6 m ha i , Πa j i 4 > Õ i, j 6 m kΠa i k 8 Writing Π in the a i basis, we think of kΠa i k 4  Π2ii , the square of the i-th diagonal entry of Π. Since Π has codimension at most δm, rank Π  Tr Π  Õ i6n Πii > n − δm . √ Furthermore, for each i, it must be√that 0 6 Πii 6 1. By Markov’s inequality, at√most δm diagonal Í entries of Π can be less than 1 − δ in magnitude. Hence, i 6 m Π4ii > (1 − 4 δ)m. On the other hand, kAk 2  m; this proves the fact.  Now we can prove Lemma 7.5. Proof of Lemma 7.5. We will appeal to Theorem 2.3. Let C be the convex set of all pseudo-moments ˜ x ⊗4 such that ˜ is a deg-4 pseudo-distribution that satisfies the polynomial constraints {kx k 2 6 1, hx, v i i  0} and the operator norm conditions ˜ xx ⊤ 6 1 m, ˜ xx ⊤ ⊗ xx ⊤ 6 1 m . Let Π be the projector to the orthogonal space of v1 , . . . , v r . Notice that m1 ΠA ∈ C. Furthermore, hB, ΠAi > δ/2 by Fact 7.9, the assumption that r 6 δ4 m, and the assumption δ 6 0.01. By Theorem 2.3, and Fact 7.9 again, the optimizer of the convex program in the Lemma satisfies δ2 ) and the result follows.  h ˜ x ⊗4 , m1 Ai > 8m 63 Proof of Lemma 7.6. By the assumption k ˜ xx ⊤ ⊗xx ⊤ k 6 m1 , for every a i it must be that ˜ hx, a i i 4 6 m1 . Í δ 4 4 ˜ Since ˜ m i1 hx, a i i > δ, at least δm/2 of the a i ’s must satisfy hx, a i i > 2m . Rewritten, for any δ . such a i we obtain ha i , M i a i i > 2m For any M i , Tr M i  ˜ hx, a i i 2 kx k 2  ˜ hx, a i i 2 6 m1 because k ˜ xx ⊤ k 6 δ 4m . 1 m. Also, M i  0. Hence, M i can have no more than 4 δ eigenvalues larger than  Now we turn to the proof of Lemma 7.7. We will need spectral norm bounds on certain random matrices associated to the random contraction ˜ h1, xixx ⊤. The following are closely related to Theorem 6.5 and Corollary 6.6 in [MSS16]. Lemma 7.10. Let 1 ∼ N(0, Id) and let ˜ be a degree-4 pseudoexpectation where • ˜ satisfies {kx k 2  1}. • ˜ xx ⊤ 6 c. • ˜ xx ⊤ ⊗ xx ⊤ 6 c Then ˜ h1, xi 2 xx ⊤ 6 O(c · log n) . 1 Before proving the lemma, we will need a classical decoupling inequality. Fact 7.11 (Special case of Theorem 1 in [dlPnMS94]). Let 1, h ∼ N(0, Idn ) be independent. Let M i j for i, j ∈ [n] be a family of matrices. There is a universal constant C so that Õ 1 i, j 1i 1 j · Mi j 6 C · 1,h Õ i, j 1i h j · Mi j . We will also need a theorem from [MSS16]. Fact 7.12 (Corollary 6.6 in [MSS16]). Let T ∈ ’p ⊗ ’q ⊗ ’r be an order-3 tensor. Let 1 ∼ N(0, Σ) for some 0  Σ  Idr . Then for any t > 0,  1 n (Id ⊗ Id ⊗ 1)⊤ T {1},{2} and consequently, 1 h (Id ⊗ Id ⊗ 1)⊤ T o  2 > t · max kT k{1},{2,3} , kT k{2},{1,3} 6 2(p + q) · e −t /2 , {1},{2} i  6 O(log(p + q))1/2 · max kT k{1},{2,3} , kT k{2},{1,3} 64 Proof of Lemma 7.10. We expand the matrix ˜ h1, xi 2 xx ⊤ as ˜ h1, xi 2 xx ⊤  Õ i , j∈[n] i∈[n] Addressing the first term, by standard concentration, 1 Õ 1i2 ˜ x 2 xx ⊤ 6 i i∈[n] 1  max 1i2 i∈[n] Õ 1i2 ˜ x 2i xx ⊤ + · ˜ kx k 2 xx ⊤  1i 1 j · ˜ x i x j xx ⊤ . max i∈[n] 1i2  O(log n). So,  O(log n) · ˜ xx ⊤  O(c · log n) . The second term we will decouple using Fact 7.11. 1 Õ i, j 1i 1 j · ˜ x i x j xx ⊤ 6 O(1) · 1,h Õ i, j 1i h j · ˜ x i x j xx ⊤ . We add some aditional terms to the sum; by similar reasoning to our bound on the first term they do not contribute too much to the norm. 1,h Õ i, j 1i h j · ˜ x i x j xx ⊤ 6 O(1) · Õ 1,h Õ i, j∈[n] 1i h j · ˜ x i x j xx ⊤ + O(c · log n) . We can rewrite the matrix in the first term on the right-hand side as i, j∈[n] 1i h j · ˜ x i x j xx ⊤  ˜ h1, xihh, xixx ⊤ . Now we can apply Fact 7.12 twice in a row; first to 1 and then to h, which together with our norm bound on xx ⊤ ⊗ xx ⊤ , gives 1,h ˜ h1, xihh, xixx ⊤ 6 O(c · log n) . Putting all of the above together, we get the lemma.  Next we prove Lemma 7.7 as a corollary of Lemma 7.7 which applies to random contractions which are non-spherical. The proof technique is very similar to that for Fact 7.12. Proof of Lemma 7.7. Let h ∼ N(0, Id − Σ) be independent of 1, and define 1 ′  1 + h and 1 ′′  1 − h, so that 1  21 (1 ′ + 1 ′′). It is sufficient to bound 1,h ˜ h1 ′ + 1 ′′ , xi 2 xx ⊤ . Expanding and applying triangle inequality, 1,h ˜ h1 ′ + 1 ′′ , xi 2 xx ⊤ 6 1,h ˜ h1 ′ , xi 2 xx ⊤ + 2 1,h ˜ h1 ′ , xih1 ′′, xixx ⊤ + 1,h ˜ h1 ′′ , xi 2 xx ⊤ . The first and last terms are O(c · log n) by Lemma 7.10. For the middle term, consider the quadratic form of the matrix ˜ h1 ′ , xih1 ′′, xixx ⊤ on a vector v ∈ ’n : ˜ h1 ′ , xih1 ′′, xihx, vi 2 6 ˜ h1 ′ , xi 2 hx, vi 2 + ˜ h1 ′′ , xi 2 hx, vi 2 by pseudoexpectation Cauchy-Schwarz. Thus for every 1 ′ , 1 ′′, ˜ h1 ′ , xih1 ′′, xixx ⊤ 6 ˜ h1 ′ , xi 2 xx ⊤ + ˜ h1 ′′ , xi 2 xx ⊤ . Together with Lemma 7.10 this concludes the proof. 65  7.2 Lifting 3-tensors to 4-tensors Problem 7.13 (3-to-4 lifting). Let a1 , . . . , a m ∈ ’n be orthonormal. Let A3  Ím ⊗4 n×n×n satisfy hB, A i > δ · kA k · kB k. 3 3 i1 a i . Let B ∈ ’ Input: The tensor B. Goal: Output B ′ satisfying hB ′ , A4 i > δ O(1) · kA4 k · kB ′ k. Ím i1 a i⊗3 and A4  Theorem 7.14. There is a polynomial time algorithm, using the sum of squares method, which solves the 3-to-4 lifting problem. Proof. Small δ regime: δ < 1 − Ω(1): The algorithm is to output the fourth moments of the optimizer of the following convex program. min ˜ s.t. k ˜ x ⊗3 k ˜ is degree-4 ˜ satisfies {kx k 2  1} δkB k h ˜ x ⊗3 , Bi > √ m 1 k ˜ x ⊗4 k 6 √ . m To analyze the algorithm we apply Theorem 2.3. Let C be the set of degree-4 pseudodistributions √ satisfying {kx k 2  1} and having k ˜ x ⊗4 k 6 1/ m. The uniform distribution over a1 , . . . , a m , whose third and fourth moments are m1 A3 and m1 A4 , respectively, is in C. Let ˜ be the pseudoexpectation solving the convex program. By Theorem 2.3, h ˜ x ⊗3 , 1 m A3 i > δ 1 δ2 · √ · k ˜ x ⊗3 k > 2 2m m At the same time, m 1 Õ˜ 1 h ˜ x ⊗3 , m1 A3 i  hx, a i i 3 6 m m i1 ˜ m Õ i1 hx, a i i 4 ! 1/2 by Cauchy-Schwarz. Putting these together, we obtain h ˜ x ⊗4 , A4 i  ˜ m Õ i1 hx, a i i 4 > δ 4 /4 . √ Finally, kA4 k · k ˜ x ⊗4 k 6 1 (since we constrained k ˜ x ⊗4 k 6 1/ m), which finishes the proof. Large δ regime: δ > 1 − o(1): Modify the convex program from the small-δ regime to project √ (B/kB k) · 1/ m to same convex set C. The normalization is so that √ (B/kB k) · 1/ m  m1 · A3 . The analysis is similar.  66 Acknowledgments We are indebted to Avi Wigderson who suggested color coding as a technique to evaluate the kinds of polynomials we study in this work. We thank Moses Charikar for pointing out the relationship between our SOS program for low correlation tensor decomposition and Rényi entropy. We thank Christian Borgs, Jennifer Chayes, and Yash Deshpande for helpful conversations, especially relating to Section 4. We thank anonymous reviewers for many suggested improvements to this paper. References [Abb17] Emmanuel Abbe, Community detection and stochastic block models: recent developments, CoRR abs/1703.10146 (2017). 9 [ABFX08] Edoardo M. Airoldi, David M. Blei, Stephen E. Fienberg, and Eric P. Xing, Mixed membership stochastic blockmodels, NIPS, Curran Associates, Inc., 2008, pp. 33–40. 3, 9 [AGH+ 14] Animashree Anandkumar, Rong Ge, Daniel J. Hsu, Sham M. Kakade, and Matus Telgarsky, Tensor decompositions for learning latent variable models, Journal of Machine Learning Research 15 (2014), no. 1, 2773–2832. 1, 14 [AGHK13] Animashree Anandkumar, Rong Ge, Daniel J. Hsu, and Sham Kakade, A tensor spectral approach to learning mixed membership community models, COLT 2013 - The 26th Annual Conference on Learning Theory, June 12-14, 2013, Princeton University, NJ, USA (Shai Shalev-Shwartz and Ingo Steinwart, eds.), JMLR Workshop and Conference Proceedings, vol. 30, JMLR.org, 2013, pp. 867–881. 13, 21 [AGHK14] Animashree Anandkumar, Rong Ge, Daniel J. Hsu, and Sham M. Kakade, A tensor approach to learning mixed membership community models, Journal of Machine Learning Research 15 (2014), no. 1, 2239–2312. 1, 9 [AN04] Noga Alon and Assaf Naor, Approximating the cut-norm via grothendieck’s inequality, STOC, ACM, 2004, pp. 72–80. 29 [AS15] Emmanuel Abbe and Colin Sandon, Community detection in general stochastic block models: Fundamental limits and efficient algorithms for recovery, FOCS, IEEE Computer Society, 2015, pp. 670–688. 4, 17 [AS16a] , Achieving the KS threshold in the general stochastic block model with linearized acyclic belief propagation, NIPS, 2016, pp. 1334–1342. 1, 3, 5, 6, 12, 31, 32 [AS16b] , Crossing the KS threshold in the stochastic block model with information theory, ISIT, IEEE, 2016, pp. 840–844. 15 [AYZ95] Noga Alon, Raphael Yuster, and Uri Zwick, Color-coding, J. ACM 42 (1995), no. 4, 844–856. 4, 23 67 [BAP+ 05] Jinho Baik, Gérard Ben Arous, Sandrine Péché, et al., Phase transition of the largest eigenvalue for nonnull complex sample covariance matrices, The Annals of Probability 33 (2005), no. 5, 1643–1697. 25 [BHK+ 16] Boaz Barak, Samuel B. Hopkins, Jonathan A. Kelner, Pravesh Kothari, Ankur Moitra, and Aaron Potechin, A nearly tight sum-of-squares lower bound for the planted clique problem, FOCS, IEEE Computer Society, 2016, pp. 428–437. 2, 9, 18, 19 [BKM17] Jess Banks, Robert Kleinberg, and Cristopher Moore, The lovász theta function for random regular graphs and community detection in the hard regime, APPROX-RANDOM, LIPIcs, vol. 81, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2017, pp. 28:1–28:22. 16 [BKS15] Boaz Barak, Jonathan A. Kelner, and David Steurer, Dictionary learning and tensor decomposition via the sum-of-squares method, STOC, ACM, 2015, pp. 143–151. 1, 8, 14, 23 [BLM15] Charles Bordenave, Marc Lelarge, and Laurent Massoulié, Non-backtracking spectrum of random graphs: Community detection and non-regular ramanujan graphs, FOCS, IEEE Computer Society, 2015, pp. 1347–1357. 31 [BMNN16] Jess Banks, Cristopher Moore, Joe Neeman, and Praneeth Netrapalli, Informationtheoretic thresholds for community detection in sparse networks, COLT, JMLR Workshop and Conference Proceedings, vol. 49, JMLR.org, 2016, pp. 383–416. 18 [CJ10] Pierre Comon and Christian Jutten, Handbook of blind source separation: Independent component analysis and applications, Academic press, 2010. 14 [DKMZ11] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborová, Asymptotic analysis of the stochastic block model for modular networks and its algorithmic applications, CoRR abs/1109.3041 (2011). 3, 10 [dlPnMS94] Victor H. de la Peña and S. J. Montgomery-Smith, Bounds on the tail probability of Ustatistics and quadratic forms, Bull. Amer. Math. Soc. (N.S.) 31 (1994), no. 2, 223–227. MR 1261237 64 [DLR77] Arthur P Dempster, Nan M Laird, and Donald B Rubin, Maximum likelihood from incomplete data via the em algorithm, Journal of the royal statistical society. Series B (methodological) (1977), 1–38. 3 [DM15] Yash Deshpande and Andrea Montanari, Improved sum-of-squares lower bounds for hidden clique and hidden submatrix problems, COLT, JMLR Workshop and Conference Proceedings, vol. 40, JMLR.org, 2015, pp. 523–562. 72 [FGR+ 13] Vitaly Feldman, Elena Grigorescu, Lev Reyzin, Santosh Vempala, and Ying Xiao, Statistical algorithms and a lower bound for detecting planted cliques, STOC, ACM, 2013, pp. 655–664. 16 68 [FGV15] Vitaly Feldman, Cristobal Guzman, and Santosh Vempala, Statistical query algorithms for stochastic convex optimization, CoRR abs/1512.09170 (2015). 16 [FPV15] Vitaly Feldman, Will Perkins, and Santosh Vempala, On the complexity of random satisfiability problems with planted solutions, STOC, ACM, 2015, pp. 77–86. 16 [Gal62] Robert Gallager, Low-density parity-check codes, IRE Transactions on information theory 8 (1962), no. 1, 21–28. 3 [GHK] Rong Ge, Qingqing Huang, and Sham Kakade, Learning mixtures of gaussians in high dimensions, stoc 2015, 761–770. 14 [GM15] Rong Ge and Tengyu Ma, Decomposing overcomplete 3rd order tensors using sum-ofsquares algorithms, APPROX-RANDOM, LIPIcs, vol. 40, Schloss Dagstuhl - LeibnizZentrum fuer Informatik, 2015, pp. 829–849. 8 [GVX14] Navin Goyal, Santosh Vempala, and Ying Xiao, Fourier PCA and robust tensor decomposition, STOC, ACM, 2014, pp. 584–593. 14 [Har70] Richard A Harshman, Foundations of the parafac procedure: Models and conditions for an" explanatory" multi-modal factor analysis. 21 [HKP+ 17] Samuel B Hopkins, Pravesh Kothari, Aaron Potechin, Prasad Raghavendra, Tselil Schramm, and David Steurer, The power of sum-of-squares for detecting hidden structures, Symposium on Foundations of Computer Science (2017). 9, 18, 19 [HSS15] Samuel B. Hopkins, Jonathan Shi, and David Steurer, Tensor principal component analysis via sum-of-square proofs, COLT, JMLR Workshop and Conference Proceedings, vol. 40, JMLR.org, 2015, pp. 956–1006. 2, 8 [Jer92] Mark Jerrum, Large cliques elude the metropolis process, Random Struct. Algorithms 3 (1992), no. 4, 347–360. 15 [Kuc95] Ludek Kucera, Expected complexity of graph partitioning problems, Discrete Applied Mathematics 57 (1995), no. 2-3, 193–212. 15 [LBB+16] Thibault Lesieur, Caterina De Bacco, Jess Banks, Florent Krzakala, Cristopher Moore, and Lenka Zdeborová, Phase transitions and optimal algorithms in high-dimensional gaussian mixture clustering, Allerton, IEEE, 2016, pp. 601–608. 19 [LRA93] S. E. Leurgans, R. T. Ross, and R. B. Abel, A decomposition for three-way arrays, SIAM J. Matrix Anal. Appl. 14 (1993), no. 4, 1064–1083. MR 1238921 21 [Mas13] Laurent Massoulié, Community detection thresholds and the weak ramanujan property, CoRR abs/1311.3085 (2013). 26, 27 [Mas14] , Community detection thresholds and the weak ramanujan property, STOC, ACM, 2014, pp. 694–703. 1, 3, 6 69 [MM09] Marc Mezard and Andrea Montanari, Information, physics, and computation, Oxford University Press, 2009. 19 [MNS12] Elchanan Mossel, Joe Neeman, and Allan Sly, Stochastic block models and reconstruction, arXiv preprint arXiv:1202.1499 (2012). 18 [MNS13] Elchanan Mossel, Joe Neeman, and Allan Sly, A proof of the block model threshold conjecture, CoRR abs/1311.4115 (2013). 26, 27 [MNS15a] , Consistency thresholds for the planted bisection model, STOC, ACM, 2015, pp. 69– 75. 1, 3, 5, 6, 19 [MNS15b] Elchanan Mossel, Joe Neeman, and Allan Sly, Reconstruction and estimation in the planted partition model, Probab. Theory Related Fields 162 (2015), no. 3-4, 431–461. MR 3383334 26 [Moo17] Cristopher Moore, The computer science and physics of community detection: Landscapes, phase transitions, and hardness, CoRR abs/1702.00467 (2017). 12, 15 [MS16] Andrea Montanari and Subhabrata Sen, Semidefinite programs on sparse random graphs and their application to community detection, STOC, ACM, 2016, pp. 814–827. 16 [MSS16] Tengyu Ma, Jonathan Shi, and David Steurer, Polynomial-time tensor decompositions with sum-of-squares, FOCS, IEEE Computer Society, 2016, pp. 438–446. 14, 15, 23, 61, 63, 64 [MW15] Tengyu Ma and Avi Wigderson, Sum-of-squares lower bounds for sparse PCA, NIPS, 2015, pp. 1612–1620. 2 [Pea82] Judea Pearl, Reverend bayes on inference engines: A distributed hierarchical approach, Cognitive Systems Laboratory, School of Engineering and Applied Science, University of California, Los Angeles, 1982. 3 [RRS16] Prasad Raghavendra, Satish Rao, and Tselil Schramm, Strongly refuting random csps below the spectral threshold, CoRR abs/1605.00058 (2016). 8 [SS17] Tselil Schramm and David Steurer, Fast and robust tensor decomposition with applications to dictionary learning, COLT, Proceedings of Machine Learning Research, vol. 65, PMLR, 2017, pp. 1760–1793. 14, 15, 60 [Wik17a] Wikipedia, Bayes estimator — Wikipedia, the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Bayes%20estimator&oldid=754605088, 2017, [Online; accessed 30-March-2017]. 1 [Wik17b] , Dirichlet distribution — Wikipedia, the free encyclopedia, http://en.wikipedia.org/w/index.php?title=Dirichlet%20distribution&oldid=762020989, 2017, [Online; accessed 30-March-2017]. 10 70 A Toolkit and Omitted Proofs A.1 Probability and linear algebra tools Fact A.1. Consider any inner product h·, ·i on ’n with associated norm k · k. Let X and Y be joinlydistributed ’n -valued random variables. Suppose that kX k 2 6 C kX k 2 with probability 1, and that ( Then hX, Yi > δ. kY k 2 )1/2 kX k 2 )1/2 (   hX, Yi δ2 δ . > >  kX k · kY k 2 4C 2 Proof of Fact A.1. Let 1E be the 0/1 indicator of an event E. Note that   Hence, hX, Yi 1 hX, Yi 1 δ hX,Yi 6 2 ·kXk·kY k δ hX,Yi> 2 ·kXk·kY k At the same time,  hX, Yi 1 δ hX,Yi> 2 ·kXk·kY k    6 δ 2 kX k · kY k 6 2δ ( kX k 2 )1/2 ( kY k 2 )1/2 . > δ 2 kX k · kY k 6 2δ ( kX k 2)1/2 ( kY k 2 )1/2 . 2  2 1/2 6 kX k · kY k  kX k 2 · kY k 2  1/2 ·  1 δ hX,Yi> 2 ·kXk·kY k · {hX, Yi > δ 2  1/2 · kX k · kY k} 6 C( kX k 2)1/2 ( kY k 2)1/2 · {hX, Yi > δ 2  1/2 · kX k · kY k} Putting the inequalities together and rearranging finishes the proof.  1/2 .  Proof of Proposition 5.22. We decompose X i as X i  X i 1|X i | 6R +X i 1 |X i |>R . Let Yi  X i 1 |X i | 6R . Then | Yi |  | X i 1|X i |>R | 6 δ′ Xi − and – Yi 6 Yi2 6 1 Í So we can apply Bernstein’s inequality to  ( 1 m Õ ) i6m m Yi > t + δ i6m ′ X i2 . Yi to obtain that   −Ω(1) · m · t 2 . 6 exp X2 + t · R Now, with probability at least 1 − δ we know X i  Yi , so by a union bound,  ( 1 m Õ i6m Xi > t + δ ′ )   −Ω(1) · m · t 2 + mδ . 6 exp X2 + t · R 71  Fact A.2. Let {X1 , . . . , X n , Y1 , . . . , Ym } are jointly distributed real-valued random variables. Suppose there is S ⊆ [m] with |S| > (1 − o m (1)) · m such that for each i ∈ S there a degree-D polynomials p i satisfying p i (X)Yi > δ. ( Y 2 )1/2 ( p i (X)2 )1/2 Í Í Furthermore, suppose i∈S Yi2 > (1 − o(1)) i∈[m] Yi2 . Let Y ∈ ’m be the vector-valued random variable with i-th coordinate Yi , and similarly let P(X) have i-th coordinate p i (X). Then ( hP(X), Yi > (1 − o(1)) · δ · ( kP(X)k 2 )1/2 kY k 2 )1/2 Proof. The proof is by Cauchy-Schwarz. hP(X), Yi  Õ Õ i∈S >δ i∈S >δ p i (X)Y ( p i (X)2 )1/2 ( Yi2 )1/2 Õ i∈S p i (x)2 ! 1/2 A.2 Tools for symmetric and Dirichlet priors © Õ 2ª Yi ® · (1 − o(1)) ­ i∈[m] ¬ « 1/2 .  Proof of Fact 5.15. Let X be any ’k -valued random variable which is symmetric in distribution Í with respect to permutations of coordinates and satisfies s∈[k] X(s)  0 with probability 1. (The variable σ̃ is one example.) We prove the claim about hX, xihX, yihX, zihX, wi; the other proofs are similar. Consider the matrix M  (X ⊗ X)(X ⊗ X)⊤ . Since x, y, z, w are orthogonal to the all-1’s vector, we may add 1 ⊗ v, for any v ∈ ’n , to any row or column of M without affecting the statement to be proved. Adding multiples of 1 ⊗ e i to rows and columns appropriately makes M a block diagonal matrix, with the top block indexed by coordinates (i, i) for i ∈ [k] and the bottom block indexed by pairs (i, j) for i , j. The resulting top block takes the form cId + c ′ J, where J is the all-1’s matrix. The bottom block will be a matrix from the Johnson scheme. Standard results on eigenvectors of the Johnson scheme (see e.g. [DM15] and references therein) finish the proof. The values of constants C for the Dirichlet distribution follow from the next fact.  Fact A.3. Let σ ∈ ’k be distributed according to a (symmetric) Dirichlet distribution with parameter α. Î That is, (σ) ∝ j∈[k] σ α−1 . Let γ ∈ Žk be a k-tuple, and let σ γ  Î γj j6k σ j . Let |γ|  Γ(kα) · σγ  Γ(kα + |γ|) 72 Î j6k Í j6k γ j . Then Γ(α + γ j ) Γ(α)k . Furthermore, let σ̃ ∈ ’k be given by σ̃i  σi − 1k . Then   Γ(kα) Γ(α + 2) Γ(α + 1)2 1 σ̃ σ̃  ·Π − ·Π, 2 Γ(kα + 2) Γ(α) k(kα + 1) Γ(α) ⊤ where Π ∈ ’k×k is the projector to the subspace orthogonal to the all-1s vector. Proof. We recall the density of the k-dimensional Dirichlet distribution with parameter vector α 1 , . . . , α k . Here Γ denotes the usual Gamma function. Í Γ( {σ}  Î Í In particular, Γ( Î j6k j6k α j) Γ(α j ) α j ) Ö α j −1 σj . · j 6 k Γ(α j ) · j6k j6k ∫ Ö α j −1 σj dσ  1 j6k Í where the integral is taken with respect to Lebesgue measure on {σ : j 6 k σ j  1}. Using this fact we can compute the moments of the symmetric Dirichlet distribution with parameter α. We show for example how to compute second moments; the general formula can be proved along the same lines. For s , t ∈ [k], Γ(kα) · σs σt  Γ(α)k ∫ σs σt Ö σ α−1 j j6k Γ(kα + 2) Γ(α + 1)2 Γ(kα) · ·  · 2 Γ(kα + 2) Γ(α) Γ(α)k−2 Γ(α + 1)2  ∫ Γ(α + 1)2 Γ(kα) · . Γ(kα + 2) Γ(α)2 (α+1)−1 (α+1)−1 σt σs Ö σ α−1 j j ,s,t Similarly, σs2  The formula for Γ(α + 2) Γ(kα) · . Γ(kα + 2) Γ(α) σ̃ σ̃ ⊤ follows immediately.  73
8cs.DS
1 Canonical form of linear subspaces and coding invariants: the poset metric point of view arXiv:1706.09996v1 [cs.IT] 30 Jun 2017 Jerry Anderson Pinheiro and Marcelo Firer Abstract In this work we introduce the concept of a sub-space decomposition, subject to a partition of the coordinates. Considering metrics determined by partial orders in the set of coordinates, the so called poset metrics, we show the existence of maximal decompositions according to the metric. These decompositions turns to be an important tool to obtain the canonical form for codes over any poset metrics and to obtain bounds for important invariants such as the packing radius of a linear subspace. Furthermore, using maximal decompositions, we are able to reduce and optimize the full lookup table algorithm for the syndrome decoding process. Index Terms Canonical form, poset codes, poset metrics, syndrome decoding, packing radius. MSC2010: 15A21, 94B05, 52C17 C ONTENTS I Introduction 2 II Poset Metrics and Decomposition of Subspaces 4 II-A Posets and Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 II-B Partitions and Decompositions . . . . . . . . . . . . . . . . . . . . . . . . 6 II-C Construction of Maximal P-Decompositions . . . . . . . . . . . . . . . . . 13 III Comparison of Posets and Decompositions 18 III-A Decompositions and refinements . . . . . . . . . . . . . . . . . . . . . . . 19 III-B Hierarchical Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 The authors are at Institute of Mathematics, Statistics and Scientific Computing, University of Campinas, Brazil, e-mail: [email protected], [email protected]. March 1, 2018 DRAFT 2 IV Applications to Coding Theory 21 IV-A Packing Radius Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 IV-B Optimizing the Full Lookup Table Searching in Syndrome Decoding . . . 23 References 27 I. I NTRODUCTION Coding theory is a mathematical theory that deals with many different aspects that emerges in the engineering of communication. A significant and classical part of it, the study of block-codes, is a subject that deals with many geometric and computational aspects of linear subspaces of finite dimensional vector spaces over finite fields. The most classic metric considered in this context is a metric that counts the number of different coordinates between two vectors, and it is named after R. W. Hamming, which introduced it in a seminal work [10, 1950]. Later, in ([21], 1957) and ([13], 1958), another well-known metric was proposed, the Lee metric. Up to our knowledge, the first work considering metrics in a general approach is a short communication of S. W. Golomb ([9], 1969). In that work, Golomb described a family of additive metrics (metrics defined over an alphabet and additively extended to a set of words with a fixed length) which are still being investigated nowadays, as we can see in [20]. Recently, due to the development of new communication channels and models, new families of metrics has been studied in the context of coding theory, as can be seen, for example, in [4], [2], [8] and [5]. The family of poset metrics was defined by Brualdi, Graves and Lawrence, in ([4], 1995) as an extension of the metrics proposed by Niederreiter in [15] and [16]. This is a large family of metrics which are determined by partial orders and generalizes the classical Hamming metric. Since then, it has been studied intensively, in order to understand the behaviour of metric invariants that are relevant to coding theory. As it frequently happens with generalizations, besides the possible inherent merits, some side effects may arise, either by giving a more profound understanding about the nature of previously established knowledge or by posing some new interesting (and difficult) questions. This is the case of poset metrics. Postponing the details for the next section, a poset metric depends on the non-zero positions of a vector and also on the level of these positions in a partial order (or the level in the Hasse DRAFT March 1, 2018 3 diagram). A significant part of the knowledge available for poset metrics can be understood once we consider a decomposition of a code (a vector subspace) which depend on the levels of the poset. Considering the metrics determined by the family of the so-called hierarchical posets, one can fully grasp the role of such decompositions. Being studied since the 90’s, results previously proved1 by many researchers were restated in an alternative and simple way [14], all the proofs were derived from the existence of a canonical decomposition. Besides the canonical-systematic form introduced in [7] for hierarchical poset metrics, the only known attempt to construct standard forms for poset metrics was made in [1], where a standard form for a particular case (Niederreiter-Rosenbloom-Tsfasman (NRT), or metrics induced by orders consisting of multiple disjoint chains with same cardinality) is presented. In that work, one can see that the standard form is not unique (in any possible sense). In a matter of fact, unicity of such a pre-established form is a characteristic of hierarchical posets [14, Theorem 3]. Since unicity of the form is not available, we strives for the best possible option: canonical forms determined by maximal decompositions, whose unicity is obtained according to the degree of the decomposition. Hence, the main subject of this work is how to decompose a subspace “respecting” the metric structure. For the reader that is not particularly interested in coding theory, despite the use of a terminology from coding theory, there is essentially a very short lexicon that needs to be translated: instead of “code” and “[n, k]q ”-code, one should read “vector subspace” and “k-dimensional vectors subspace of Fnq ”, respectively; instead of “C ⊆ Fnq ”, simply writes “V ⊆ Fnq ”. This work is organized as follows. In Section II we introduce the basic concepts of this work (poset metrics and P-decomposition) and describe an algorithm for decomposing a code. In Section III we show that the decomposition of a subspace is “well behaved” in the sense that when different posets are comparable, so are the corresponding decompositions. Using this fact and the knowledge about hierarchical poset metrics, in part III-B we produce bounds for the degree of a maximal P-decomposition of a code, where P is an arbitrary poset. Finally, on Section IV we go back to the coding ambient and give some applications: the determination of the packing radius (part IV-A) and the possible simplification of syndrome decoding algorithm 1 Results concerning the MacWilliams identity [12], association schemes [17], extension of isometries [3] (MacWilliams Extension Theorem) and the relation between the packing radius and the minimum distance [7]. March 1, 2018 DRAFT 4 (part IV-B). II. P OSET M ETRICS AND D ECOMPOSITION OF S UBSPACES This section has three parts. In the first part we summarize the basic concepts about poset metrics. In the second we introduce a new concept, object of study of this work: how different poset metrics allow different decompositions of a subspace. After doing so, we introduce the maximal and the primary P-decompositions of a subspace. The third part is devoted to an algorithm to find a maximal P-decompositions. A. Posets and Metrics Let P = ([n], 6P ) be a partially ordered set (or poset), where [n] := {1, . . . , n} and 6P is an order relation. We may denote the order relation only as a 6 b if the poset is immaterial or clear in the context. A set I ⊂ [n] is an order ideal of P if for every x ∈ I and y ∈ [n] with y 6P x implies y ∈ I. Given E ⊆ [n], the smallest ideal of P containing E is denoted by hEiP and called the ideal generated by E. The maximal elements (according to P) of E will be denoted by M(E). In case E = {a} is a singleton, we denote hEiP = haiP . An order isomorphism f : P → Q between posets P and Q over [n] is a bijection f : [n] → [n] such that a 6P b if, and only, if f (a) 6Q f (b), for all a, b ∈ [n]. In the case P = Q, f is said to be a P-automorphism. The group of all automorphisms of P will be denoted by Aut(P). Given a poset P = ([n], 6P ) and a subset X ⊂ [n], considering the order on X inherited from P, we say that (X, 6P ) is a sub-poset of P and denote X ⊆ P. A chain is a poset that is totally ordered, that is, for any a, b ∈ [n], either a 6 b or b 6 a. An anti-chain is a poset with no relations excepts the trivial relations a 6 a. Given a ∈ P, the height of a according to P is the maximal length of a chain in P that has a as a maximal element, i.e., h(a) = max{|C| : C ⊆ P is a chain and b 6P a ∀ b ∈ C}, and the height of P is h(P) = max{h(a) : a ∈ [n]}. The i-th level ΓPi of P is the set of all elements with height i, i.e., ΓPi = {a ∈ P : h(a) = i}. We remark that each level ΓPi is a chain and the extremal condition of chains can be grasped from the fact that h(P) = n if, and only if, P is a chain or, equivalently, if every level satisfies DRAFT March 1, 2018 5 |ΓPi | = 1. Similarly, for an anti-chain, we have h(P) = 1 and |ΓP1 | = n. If X ⊆ P is a chain or an anti-chain, we say that X is a chain or anti-chain in P. If X is a chain (anti-chain), we call its cardinality |X | the length of the chain (anti-chain). A broader class of posets, containing both anti-chain and chain posets, is the class of hierarchical posets. We say that P = ([n], 6P ) is hierarchical if elements at different levels are always j comparable, i.e., a 6P b for every a ∈ ΓPi and b ∈ ΓP where 1 ≤ i < j ≤ h(P). This is an interesting class of posets that will play a central role in the applications to coding theory, as we shall see in Section IV. We now show how a poset determines a metric over a finite-dimensional vector space. Due to the primary concern to applications in coding theory, we will restrict ourselves to the case of finite fields, so we let Fq be the finite field with q elements and Fnq be the vector space of all n-tuples over Fq . A k-dimensional subspace C ⊂ Fnq is called an [n, k]-linear code or, simply a code when the parameters are either clear from the context or not relevant. Given a vector v = (v1, . . . , vn ) ∈ Fnq , its support is the set of all non-null coordinates: supp(v) = {i ∈ [n] : vi , 0}. Given a poset P over [n], the poset weight (or P-weight) of an element v ∈ Fnq is the cardinality of the ideal generated by its support, i.e., wP (v) = |hsupp(v)iP |. The poset distance (or P-distance) dP is the distance function over Fnq induced by the P-weight, in other words, if u, v ∈ Fnq , then dP (u, v) = wP (u − v). The poset distance was introduced by Brualdi et.al. [4] and it is immediate to prove that (Fnq, dP ) is a metric space. The space (Fnq, dP ) is called P-space and the metric dP is called P-metric. A linear P-isometry is a linear map T : Fnq → Fnq preserving the P-weight, and hence the Pdistance. Two codes C1 and C2 over Fnq are said to be P-equivalent if there is a linear isometry T such that T(C1 ) = C2 . This is clearly an equivalence relation on the set of all codes and to determine the equivalence classes we need to know what are the linear P-isometries of the space. The group of all linear P-isometries over Fnq is denoted by GLP (Fnq ), and it is described by the next proposition. March 1, 2018 DRAFT 6 Proposition 1 ([19]): Let P be a poset over [n]. Given T ∈ GLP (Fnq ), the map φT (i) = M(supp(T(ei ))) is a P-automorphism. Furthermore, T ∈ GLP (Fnq ) if, and only if, Õ T(ei ) = xi j eφT (i), i6 P j where xi j are scalars satisfying x j j , 0 for every j ∈ [n]. Let GP be the subgroup of all linear isometries T such that φT = id. Considering the subgroup of linear isometries induced by the automorphisms of P (the permutation part), witch is commonly denoted by Aut(P), in [19], it was proved that GLP (Fnq ) = GP ⋊ Aut(P). B. Partitions and Decompositions A partition of a subset J ⊆ [n] is a family of non-empty subsets {J1, . . . , Jr } such that r Ø J= Ji and Ji ∩ J j = ∅ for every i , j. i=1 We will denote such partition by J = (Ji )ri=1 . The triple J ∗ = (J; J0; Ji )ri=1 where J0 = [n] \J = {i ∈ [n] : i < J} is called pointed partition. Since J is the union of the subsets Ji , the pointed partition J ∗ is completely determined once the pair (J0 ; Ji )ri=1 is given, so we may also write J ∗ = (J0 ; Ji )ri=1 . Note that J0 = ∅ if, and only if, J = [n]. We stress that the pointer J0 has a special role, since it is the only part we allow to be empty. From now on, we consider only pointed partitions, hence we will omit the symbol ∗ and the adjective “pointed”. A partition J can be refined in two ways: either by increasing the number of parts or by enlarging the distinguished part J0 . Except for the pointer J0 , the order of the other parts is irrelevant, for example, (J0 ; {1, 2} , {3, 4, 5}) = (J0 ; {5, 4, 3} , {1, 2}) . Definition 1: Given a partition J = (J0 ; Ji )ri=1 , a split of J is a partition J ′ = (J0 ; Ji′)r+1 i=1 ′ where Jl = Jl′ ∪ Jr+1 for some l ∈ [r] and Ji = Ji′ for each i , l. This means that Jl is split into two components and the others are unchanged. An aggregate of J is a partition J ′ = (J0′ ; Ji′)ri=1 where for some l ∈ [r], Ji′ = Ji if i < {l, 0}, Jl = Jl′ ∪ Jl∗ and J0′ = J0 ∪ Jl∗ for some ∅ , Jl∗ Jl , i.e., some elements of Jl were aggregated into the distinguished part J0 . Definition 2: We say that a partition J ′ is a 1-step refinement of J if J ′ is obtained from J either by a splitting or by aggregating only one element. The partition J ′ is a refinement of DRAFT March 1, 2018 7 J if J ′ can be obtained from J by a successive number of 1-step refinements and, if that is the case, we use the notation J ≥ J ′. Example 1: The partition ([4]; ∅; {1, 2, 3, 4}) can be refined in order to get the partition ([4]; {1, 3}; {2}, {4}) by using the following 1-step refinements: (∅; {1, 2, 3, 4}) ≥ ({3} ; {1, 2, 4}) ≥ ({1, 3} ; {2, 4}) ≥ ({1, 3} ; {2} , {4}) . Set partitions and refinement operations allow us to define decompositions of codes. Definition 3: We say that C = (C; C0 ; Ci )ri=1 is a decomposition of an [n, k, δ]q code C if each Ci is a subspace of Fnq and r C with dim(C ) > 0 for every i ∈ [r]; (a) C = ⊕i=1 i i (b) C0 = {(x 1, x2, . . . , xn ) : xi = 0 if i ∈ supp (C)}; (c) (supp (C0 ) ; supp (Ci ))ri=1 is a partition over [n]. Definition 4: A split, aggregate, 1-step refinement and a refinement C ′ = (C; C0′ ; Ci′)r′ i=1 of a decomposition C = (C; C0 ; Ci )ri=1 are defined according to (supp(C0′ ); supp(Ci′))r′ i=1 being a split, aggregate, 1-step refinement or a refinement of (supp (C0 ) ; supp (Ci ))ri=1 respectively. We will also use the notation C ≥ C ′ to denote a refinement. Example 2: Let P be a poset over [4]. Consider the [4, 2, δP ]2 code C given by C = {0000, 1100, 0010, 1110}. Then, 2 (C; he4 i; C) ≥ (C; he4 i; Ci )i=1 where C1 = {0000, 1100} and C2 = {0000, 0010}. Definition 5: A decomposition C = (C; C0; Ci )ri=1 is said to be maximal if it does not admit a refinement. Until now, only the algebraic aspects of the codes were used, the metric dP has not played any role in the decomposition of a code. We introduce now a decomposition that depends of the metric and consequently of the poset P. Definition 6: A P-decomposition of C is a decomposition C = (C ′; C0′ ; Ci′)ri=1 of C ′ (as in Definition 3) where C ′ ∼P C. Each Ci′ is called a component of the decomposition. A trivial P-decomposition of C is either the decomposition (C; C0; C) or any P-decomposition with a unique factor (C ′; C0′ ; C ′) where |supp(C ′)| = |supp (C)| and |supp(C0′ )| = |supp (C0 )|. March 1, 2018 DRAFT 8 Definition 7: A code C is said to be P-irreducible if it does not admit a non-trivial Pdecomposition. Example 3: Let P be the hierarchical poset with order relations 1, 2, 3 6 4. The codes C = {0000, 1001} and C ′ = {0000, 0111} are equivalent since T(e1 ) = e1, T(e2 ) = e2, T(e3 ) = e3, T(e4 ) = e1 + e2 + e3 + e4 is an isometry satisfying T(C) = C ′. Then, C ′ = (C ′; he1 i; C ′) is a P-decomposition of C while C = (C; he2, e3 i; C) is a decomposition of C. We note that if we consider the partitions ([4]; {2, 3}; {1, 4}) and ([4]; {1}; {2, 3, 4}) induced by the P-decompositions C and C ′ constructed in the previous example, these partitions can not be obtained from each other by a sequence of aggregations and splittings. Hence, we must use the order automorphism induced by the isometries in order to compare them. We now do it explicitly. ′ Let C = (C ′′; C0′′; Ci′′)ri=1 and C ′ = (C ′; C0′ ; Ci′)ri=1 be two P-decompositions of a code C. Associated to those P-decompositions there are two partitions of [n], namely: (supp(C0′′); supp(Ci′′))ri=1 ′ and (supp(C0′ ); supp(Ci′))ri=1 . By the definition of a P-decomposition, there are isometries T1, T2 ∈ GLP (Fnq ) such that T1 (C) = C ′′ and T2 (C) = C ′. Denote T = T2 ◦ (T1 )−1 . Then T is a linear isometry and T(C ′′) = C ′. Considering the automorphism φT of Proposition 1 (the order automorphism induced by T), φT induces a map on the partition of [n] determined by the Pdecomposition C , namely, φT [(supp(C0′′); supp(Ci′′))ri=1 ] = (φT (supp (C0 )) ; φT (supp (Ci )))ri=1 . Considering the map T defined in Example 3, we may define T1 = identity and T2 = T. Then, φT [([4]; {2, 3}; {1, 4})] = ([4]; φT ({2, 3}); φT ({1, 4})) = ([4]; {2, 3}; {1, 4}) is a partition which also can not be obtained by ([4]; {1}; {2, 3, 4}) using an aggregation. Considering the isometry S(e1 ) = e3, S(e2 ) = e2, S(e3 ) = e1, S(e4 ) = e2 + e4 we still have that S(C ′′) = C ′ but now φS [([4]; {2, 3}; {1, 4})] = ([4]; φS ({2, 3}); φS ({1, 4})) = ([4]; {1, 3}; {2, 4}) DRAFT March 1, 2018 9 is an aggregation of ([4]; {1}; {2, 3, 4}). Hence, it may happen that C ′ and C ′′ may not be comparable for some U ∈ GLP (Fnq ) but comparable for some T ∈ GLP (Fnq ). Therefore, we can define the analogous of the operations on decompositions by demanding the existence of such an isometry. ′′ ′′ ′′ ′′ r′′ Definition 8: Let C ′ = (C ′; C0′ ; Ci′)r′ i=1 and C = (C ; C0 ; Ci )i=1 be two P-decompositions of C. We say that C ′ is a P-refinement of C ′′ (and write C ≥ C ′) if there is T ∈ GLP (Fnq ) such ′′ ′′ ′′ r that φT [(supp(C0′ ); supp(Ci′))r′ i=1 ] is a refinement of the partition (supp(C0 ); supp(Ci ))i=1 . Since, for every T ∈ GLP (Fnq ), the induced map φT is an automorphism, if C and C ′ are comparable by S and T respectively, the number of aggregations and splittings used to obtain C ′ from C ′′ coincides when S or T are used to compare them. Hence, splittings and aggregations are well determined once two P-decompositions are given. Definition 9: A P-decomposition C = (C; C0 ; Ci )ri=1 is said to be maximal if it can not be refined or, equivalently, if each Ci is P-irreducible for every i ∈ [r]. Let us consider the Hamming metric dH over Fn2 . It is well-known that the group of linear isometries of this metric space is isomorphic to the permutation group Sn . Given a code C, let C = (C; C0; Ci )ri=1 be a maximal decomposition of C. If a code C ′ is dH -equivalent to C, then there is T ∈ GLdH (Fnq ) ∼ Sn such that T (C) = C ′. Note that the decomposition C ′ = (C ′; T(C0); T(Ci ))ri=1 is a maximal decomposition of C ′, otherwise, C would not be a maximal decomposition of C. Therefore, when considering the Hamming metric, a maximal decomposition is also a maximal H-decomposition (H is the anti-chain poset over [n]). This is not true in general, as we can see in Example 3. Definition 10: Let C = (C ′; C0; Ci )ri=1 be a P-decomposition of an [n, k, δ]q code C. The profile of C is the array profile (C ) := [(n0, k0 ) , (n1, k1 ) , . . . , (nr , kr )] , where ni = |supp (Ci )| and ki = dim (Ci ) . Let β = {e1, . . ., en } be the canonical basis of Fnq . Given I ⊂ [n], the I-coordinate subspace VI is defined by VI = span {ei : i ∈ I} = ( Õ i∈I ) xi ei : xi ∈ Fq . Given a decomposition C = (C; C0; Ci )ri=1 of a linear code C, we say that March 1, 2018 DRAFT 10 Vi := Vsupp(Ci ) = span {ei : i ∈ supp (Ci )} is the support-space of (the component) Ci . We consider [n]C = supp (C) and [n]C = [n] \ [n]C . In the case where [n]C , ∅, we write V0 = V[n] C and denote C0 = V0 . We say that the decomposition (C; C0; Ci )ri=1 is supported by the environment decomposition (V0 ; Vi )ri=1 . In the case where [n]C = ∅, we have V0 = C0 = {0}. Given a P-decomposition C = (C ′; C0′ ; Ci′)ri=1 of C, the environment decomposition determine a partition of [n], i.e., [n] = ∪ri=0 supp (Vi ). Also, if Ci′ = {0}, then i = 0. If each Ci′ is Pirreducible, denoting ni = dim(Vi ) = |supp(Ci )| and ki = dim(Ci′), then r Õ ni = n = dim(Fnq ) and i=0 r Õ ki = k = dim(C). i=1 The following theorem states that the profile of a maximal P-decomposition C of a code C depends (essentially) exclusively on C, not on C . Theorem 1: Let C be an [n, k, δ]q code and let P be a poset over [n]. If C ′ and C ′′ are two maximal P-decompositions of C with   profile(C ′) = (n′0, k ′0 ), (n′1, k1′ ), . . ., (nr′ , kr′ ) and   profile(C ′′) = (n′′0 , k0′′), (n′′1 , k1′′), . . . , (n′′s , k s′′) . Then, r = s and, up to a permutation, profile (C ′) = profile (C ′′), i.e., there is σ ∈ Sr such that ′′ ) and (n′ , k ′ ) = (n′′, k ′′). (ni′, ki′) = (n′′σ(i), k σ(i) 0 0 0 0 s Proof: Let C ′ = (C ′; C0′ ; Ci′)ri=1 and C ′′ = (C ′′; C0′′; Ci′′)i=1 be two maximal P-decompositions of C. Suppose, without loss of generality, r < s. If T ∈ GLP (Fnq ) is an isometry satisfying T (C ′) = C ′′, there is a component Ci′ of C ′ such that T(Ci′) is not contained in any component Cj′′ of C ′′, otherwise r ≥ s. Hence, there are components Ci′0 of C ′ and Cj′′0, Cj′′1, . . ., Cj′′t of C ′′ such that T(Ci′0 ) ⊂ Cj′′0 ⊕ Cj′′1 ⊕ · · · ⊕ Cj′′t and T(Ci′0 ) ∩ Cj′′l , ∅ for any l ∈ {1, . . . , t}. Therefore, T(Ci′0 ) = t Ê T(Ci′0 ) ∩ Cj′′m m=0 is a non-trivial P-decomposition for Ci′0 , contradicting the fact that each component of a maximal P-decomposition is P-irreducible. It follows that r = s. Moreover, for every i ∈ {1, . . . , r } there DRAFT March 1, 2018 11 is ji such that T(Ci′) ⊆ Cj′′i . Hence, ni′ ≤ n′′ji and ki′ ≤ k ′′ji . Applying the same reasoning to T −1 ∈ GLP (Fnq ), we get that ni′′ ≤ n′ji and ki′′ ≤ k ′ji , hence ni′ = n′′ji and ki′ = k ′′ji , so that, up to a permutation, profile(C ′) = profile(C ′′). The next Corollary follows straight from Theorem 1. Corollary 1: Let C ′ = (C ′; C0′ ; Ci′)ri=1 and C ′′ = (C ′′; C0′′; Ci′′)ri=1 be two maximal P-decompositions of C and let T ∈ GLP (Fnq ) be a linear isometry such that T (C ′) = C ′′. Then, there is a permutation ′′ . σ ∈ Sr such that T(Ci′) = Cσ(i) To express the number of operations (splitting and aggregations) performed in a decomposition from a trivial decomposition, we first need to show that every non-trivial P-decomposition is a refinement of a trivial P-decomposition. Lemma 1: If T ∈ GLP (Fnq ) then the ideals hsupp(C)i and hsupp(T(C))i are isomorphic. Proof: Given T ∈ GLP (Fnq ), follows immediate from the definition of φT (Proposition 1) that φT (M(supp(C))) = M(supp(T(C))). Hence, hsupp(T(C))i = hM(supp(T(C)))i = hφT (M(supp(C)))i. On the other hand, since φT is an isomorphism, hsupp(C)i = hM(supp(C))i ∼ φT (hM(supp(C))i) = hφT (M(supp(C)))i. Therefore, hsupp(C)i ∼ hsupp(T(C))i. Proposition 2: If C = (C ′; C0′ ; Ci′)ri=1 is a non-trivial P-decomposition of C with |supp(C0′ )| > |supp(C0)|, then C is a refinement of a trivial P-decomposition of C. Proof: It is straightforward that C is a refinement of the one-component P-decomposition (C ′; C0′ ; C ′). To conclude, we need to prove that (C ′; C0′ ; C ′) is obtained by aggregations from a trivial P-decomposition. Since |supp(C ′)| < |supp(C)| and |M(supp(C ′))| = |M(supp(C))|, there exist i0 ∈ hsupp(C ′)i \ supp(C ′), otherwise hsupp(C)i / hsupp(C ′)i contradicting Lemma 1. Take j0 ∈ M(supp(C ′)) such that j0 > P i0 and define S ∈ GLP (Fnq ) by S(ei ) = ei ∀ i , j0 March 1, 2018 and S(e j0 ) = e j0 + ei0 . DRAFT 12 Therefore, φS = id. Denoting S(C ′) = C ′′, since supp(C ′) = supp(C ′′) ∪ {i0 } we get that (C ′; C0′ ; C ′) is a 1-step refinement of (C ′′; C0′′; C ′′). Proceeding in this form (performing aggregations), at some point we get a trivial P-decomposition having C as its refinement. Definition 11: Given a P-decomposition C = (C ′; C0′ ; Ci′)ri=1 of C, its degree according to C is defined by DP (C , C) = (r − 1) + |supp(C0′ )| − |supp(C0 )|. A P-decomposition with maximum degree is called primary P-decomposition. The degree of a decomposition is basically the number of 1-step refinements necessary to obtain the given decomposition from a trivial decomposition, clearly, if C is a trivial decomposition, DP (C , C) = 0 and if C ′ is a P-refinement of C , then DP (C ′, C) > DP (C , C). Furthermore, the degree of a decomposition is completely determined by its profile. Hence, by Theorem 1, maximal P-decompositions have the same degree. Thus, the maximum degree of a decomposition of a code C will be denoted by DP (C) instead of DP (C , C). The following proposition follows straight from the previous comments. Proposition 3: A P-decomposition of a code C is maximal if, and only if, it is a primary P-decomposition. We recall that the group of linear P-isometries is the semi-direct product GLP (Fnq ) = GP ⋊ Aut(P). It is worth remarking that the permutation part Aut(P) is irrelevant regarding maximality of P-decompositions: Proposition 4: Let C = (C ′; C0; Ci )ri=1 be a maximal P-decomposition of C. Let φ ∈ Aut (P) and Tφ ∈ Aut(P) be the isometry induced by φ. Then, C ′ = Tφ (C ′) ; Tφ (C0 ) ; Tφ (Ci ) r i=1 is also a maximal P-decomposition of C. Proof: Because φ is a permutation, for every i ∈ {0, 1, . . ., r }, j ∈ supp(Ci ) ⇐⇒ φ( j) ∈ supp(Tφ(Ci )). Hence, C ′ is a P-decomposition of C. Since its profile coincides with the profile of C , C ′ is also a maximal P-decomposition of C. DRAFT March 1, 2018 13 C. Construction of Maximal P-Decompositions In order to find maximal P-decompositions of a code C, we need to obtain the maximal decompositions of its equivalent codes. In this section, we will describe the construction of a generator matrix which provides a code equivalent to C and determines a maximal P-decomposition of C. Let P be a poset over [n] and G = (gi j ) be a k × n generator matrix of an [n, k, δ]q code C. We lose no generality by assuming that G is in a reduced row echelon form, obtained by elementary operations on rows. In order to obtain a maximal P-decomposition, we need to use a slight different definition for the classical reduced row echelon form. For each i ∈ [k], let  j (i) := max j : gi j , 0 be the right-most non-zero column of the i-th row of G. Performing elementary row operations on G, we may assume that j(1) > j(2) > · · · > j(k) and gi j(l) = 0 if i , l. (1) We say that G is in inverse reduced row echelon form if the entries of G satisfy Property (1). From now on, we assumed that generator matrices have this form. In order to make more clear the difference of the proposed reduced row echelon form and the classical one, we present the next example. Example 4: Let    1 0 1 1 0      G= 1 1 0 1 1       0 1 0 1 1    be a generator matrix of a [5, 3]2 code C (the metric here is irrelevant). Then,     G1 =      are also generator matrices     0 1 1 0 1  1 0 0 0 0       and G =  0 0 1 1 0  0 1 0 1 1  2       0 0 1 1 0   1 0 0 0 0     of C. Note that G1 is in the classical reduced row echelon form while G2 is in the proposed one. A generator matrix G of C determines a unique decomposition C in the following sense: Construction of C : March 1, 2018 DRAFT 14 Suppose β1 = {v1, . . ., vk } is the set of all rows of G and I ⊂ [n] is the index set of the null columns of G. Then, define ( C0 = v ∈ Fnq : v = Õ i∈I ) xi ei . Take w1 ∈ β1 and let γ1 = {vi1, . . ., vir } ⊂ β1 be the set of all rows of G such that if v ∈ γ1 , then supp(w1 ) ∩ supp(v) , ∅. Denote    r Õ    C1 = c ∈ C : c = xi vi j .   j=1   Take β2 = β1 \γ1 , if it is empty, the decomposition (C; C0; C1 ) is the one determined by G. If β2 , ∅, take w2 ∈ β2 and γ2 = {vi1, . . ., vis } ⊂ β2 where v ∈ γ2 if, and only if, supp(w2 )∩supp(v) , ∅. Define Proceeding in this way, βr+1    s Õ    C2 = c ∈ C : c = xi vi j .   j=1   = ∅ and βr , ∅ for some r. In this case, C = (C; C0 ; Ci )ri=1 is the decomposition determined by G. It is clear that the choice of wi does not change the degree of the decomposition, therefore, the decomposition constructed is unique, up to a permutation of its components. As we shall see in the next proposition, this decomposition is maximal. Example 5: Consider the generator matrices of Example 4. The decomposition determined by G is trivial since every two rows of G have intersection in their supports. On the other hand, the decomposition obtained by the matrix G2 is not trivial, indeed, the third row has disjoint support from the first and second rows. Therefore, if C1′ = {00000, 01011, 00110, 01101}, C2′ = {00000, 10000}, and C1 = {00000, 01101, 00110, 01011}, C2 = C2′, 2 and (C; ∅; C )2 are the decomposition obtained from G and G respectively. then (C; ∅; Ci′)i=1 i i=1 1 2 A generator matrix G is said to be in generalized reduced row echelon form if there is a permutation σ ∈ Sk such that j(σ(1)) > . . . > j(σ(k)) and gi j(l) = 0 if i , l, i.e., if a matrix in inverse reduced row echelon form may be obtained by permuting the rows of G. DRAFT March 1, 2018 15 Proposition 5: Let C be an [n, k, δ]q code. If G is a generator matrix of C in a generalized reduced row echelon form, then G determines a maximal decomposition for C. Proof: Let G be a generator matrix of C in a generalized reduced row echelon form. Without loss of generality, we will assume that the decomposition determined by G has only one component, i.e., C = (C; C0; C). By the construction of C it is straightforward that C can 2 is a splitting of C . Thus, C = C ⊕ C not be refined by aggregations. Suppose C ′ = (C; C0 ; Ci )i=1 1 2 and supp(C1 ) ∩ supp(C2) = ∅. Let {w1, . . ., wk1 } and {wk1 +1, . . ., wk } be a basis of C1 and C2 respectively. The k × n matrix G1 having {w1, . . ., wk } as its rows is the generator matrix of C whose decomposition induced is C ′. Then, each row of G1 is a linear combination of the rows of G. Let β1 be the minimum set of rows of G generating {w1, . . ., wk1 }, i.e., for every i ∈ {1, . . ., k1 }, wi = Õ xvi v v∈β1 where xvi ∈ Fq . Similarly, let β2 be the minimum set of rows of G generating {wk1 +1, . . ., wk }. Since G and G1 generates the same code, β1 ∩ β2 = ∅. Since the decomposition induced by G is trivial, supp(β1 ) ∩ supp(β2 ) , ∅. Take i0 ∈ supp(β1 ) ∩ supp(β2 ), since span{β1 } = C1 and span{β2 } = C2 , it follows that i0 ∈ supp(C1) ∩ supp(C2), a contradiction. The previous proposition ensures that each maximal decomposition is obtained by taking a generator matrix in a generalized reduced row echelon form. Till now, we have not used the group of linear isometries to construct maximal P-decompositions. In the following, we will consider the subgroup of isometries GP (as we saw, the automorphism part is not relevant when searching for maximal P-decompositions since it does not change the degree of a decomposition). By definition of GP , the following two operations over a generator matrix G will provide matrices generating equivalent codes to the one generated by G = (gi j ): (OP 1) If gi0 j0 , 0, gi j0 = 0 for every i , i0 (gi0 j0 is the only non-zero entry on the j0 -th column) and r 6P j0 (r , j0 ), we may assume gi0r = 0; This is equivalent to choosing the isometry T ∈ GP such that T(e j ) = e j for every j , j0 and T(e j0 ) = e j0 − gi0r gi−1 e. 0 j0 r (OP 2) More generally, if there is s ∈ [n] such that r 6P ji and r , ji for every i ∈ {1, . . . , s}, Ís furthermore, there are two rows of G, namely, i1, i2 ∈ [k], such that gi1r = l=1 xl gi1 jl Ís and gi2r = l=1 xl gi2 jl for some choice of x1, . . . , xl ∈ Fq , and gi jl = 0 for every i , i1, i2 , March 1, 2018 DRAFT 16 we may assume gi1r = gi2r = 0. The procedure can be performed simultaneously to many lines and all those entries may be considered to be 0. Furthermore, if the column r is a linear combination of columns j1, . . . , js , then one may exchange the column r by the null column. Let {g1, . . . , gn } be the set of columns of G and suppose s Õ gr = xi g ji . i=1 In order to exchange the r-th column of G by a null column we consider the isometry T ∈ GP defined by T(ei ) = ei for every i < { j1, . . ., js } and T(e ji ) = e ji − xi er for every i ∈ {1, . . . , s}. Definition 12: Let G be a generator matrix of an [n, k, δ]q code C. If G is in generalized reduced row echelon form and none non-null entry of G may be exchanged by zero using Operations (OP 1) or (OP 2), we say that G is in P-canonical form. Example 6: Let C be the [6, 3]2 code with generator matrix given by    0 0 1 1 0 1      G=  1 0 1 1 1 0 .      1 1 0 0 0 0    Consider the poset P1 with order relations 1 6P1 2 and 3 6P1 4. Applying operations (OP 1) and (OP 2) we get the following matrix in P1 -canonical form:    0 0 0 1 0 1      G′ =  1 0 0 1 1 0  .      0 1 0 0 0 0    Furthermore, if we consider P2 a poset such that P1 ⊂ P2 and 4 6P2 5, then performing operation (OP 1) we get   0   G′′ =  1    0  ′′ It is clear that G is in P2 -canonical form. decomposition for C.  0 0 1 0 1   0 0 0 1 0 .   1 0 0 0 0   It is also clear that it determines a maximum P2 - Theorem 2: Let G be a generator matrix of a code C. If G is in a P-canonical form then the decomposition determined by G is a maximal P-decomposition of C. DRAFT March 1, 2018 17 Proof: Assume, without loss of generality, C = (C; C0; C). We will first show that C does not admit aggregations. Suppose there is a P-decomposition C ′ = (T(C); C0′ ; T(C)) where T ∈ GP and φT (supp(C0)) ⊂ supp(C0′ ). Since T ∈ GP , the map φT coincides with the identity map, hence supp(C0 ) ⊂ supp(C0′ ). Let G2 = T(G) be the matrix whose i-th row is obtained by the action of T in the i-th row of G = (gi j ). Thus, G2 is a generator matrix of T(C). If i0 ∈ supp(C0′ ), then i0 is a null column of G2 . The characterization of GP ensures that for every row gi = (gi1, . . . , gin ) of G, the i0 -th coordinate of T(gi ), which is null and denoted by T(gi )i0 , is given by Õ Õ 0 = T(gi )i0 = x ji0 gi j = gii0 xi0 i0 + x ji0 gi j (2) for every i ∈ {1, . . ., k}. Since xi0 i0 , 0, it follows that Õ  x ji  − 0 gi j gii0 = xi0 i0 j (3) j i0 6 P j j j,i0, i0 6 P j j,i0, i0 6 P j for every i ∈ {1, . . ., k}. Since G is in P-canonical form, Equation 3 together with Operation (OP 2) ensures that the i0 -th column of G is null, so i0 ∈ supp(C0 ). Therefore, supp(C0′ ) = supp(C0 ). The decomposition C also does not admit a splitting, indeed, suppose otherwise and let 2 C ′ = (T(C); C0 ; Ci )i=1 be its refinement. Let G1 be as in Proposition 5, then G1 is a generator matrix of T(C) and, by construction, the decomposition determined by G1 is C ′. Let β1 be the minimal set of rows of G such that for every i ∈ {1, . . ., k1 }, Õ wi = xgi T(g) (4) g∈β1 where xvi ∈ Fq . Let β2 be the minimal set of rows of G such that Õ wi = xgi T(g) (5) g∈β2 for every i ∈ {k1 + 1, . . . , k}. We stress that the only difference between this equalities and the ones in Proposition 5 is the presence of the linear isometry T. As before, we also have that β1 ∩ β2 = ∅. By construction, supp(β1 ) ∩ supp(β2 ) , ∅. Let i0 be the rightmost column of G such that i0 ∈ supp(β1 ) ∩ supp(β2 ), if i0 < supp(T(β1 )) then for every gi = (gi1, . . ., gin ) ∈ β1 (which is also a row of G), the i0 -th coordinate of T(gi ) is given by Equation 2. Since i0 is the rightmost column of G such that i0 ∈ supp(β1 ) ∩ supp(β2 ). Equation 3 ensures that the i0 -th column of G is null, a contradiction. The same argument shows that i0 ∈ supp(T(β2 )). Therefore, i0 ∈ supp(T(β1 )) ∩ supp(T(β2 )). By identities 4 and 5, there exist j ∈ {1, . . ., k1 } and l ∈ {k1 + 1, . . ., k} such that i0 ∈ supp(w j ) ∩ supp(wl ), a contradiction. March 1, 2018 DRAFT 18 Each time we exchange a non-null column by a null column, we exchange a code C with Pdecomposition C = (C; C0; Ci )ri=1 by a P-equivalent code with P-decomposition C ′ = (C ′; C0′ ; Ci′)ri=1 where dim(C0′ ) = dim(C0) + 1. If the Operation (OP 2) is performed in a proper subset of k-lines of G, we do not increase dim(C0 ) but, we may split some of the Ci into Ci = Ci′1 ⊕ Ci′2 with supp(Ci′1 ) ∩ supp(Ci′2 ) = ∅. Note that the role of P in such operations rests solely on the condition j 6P j1, j2, . . . , js . For the two extremal posets, namely, the anti-chain and the chain poset, the picture is absolutely clear: If P is an anti-chain (hence we are considering the Hamming metric), no such operation may be performed (since i 6P j ⇐⇒ i = j). Hence, maximal P-decompositions coincide with maximal decompositions (see the paragraph after Definition 9) and the P-canonical form is a permutation of the classical systematic form; if P is a chain with 1 6P 2 6P · · · 6P n, then (OP 1) may be performed to every j (i) in the reduced row echelon matrix G, hence, C is equivalent to a code that has a generator matrix G = (gi j ) where gi j(i) = 1 and gi j = 0 if j , j(i) (see [18]). More general, for N RT metrics, the P-canonical form is also a permutation of the N RT-triangular form presented in [1]. We stress that, fixing the natural labeling in the posets, the permutations necessary to obtain one form from other are the ones induced by Aut(P). The other case that can be easily described is the case of hierarchical posets. The algorithm to find P-decompositions according to the levels of the poset was first proposed in [7]. The matrix obtained by this form is called canonical-systematic and it is also a permutation of the P-canonical form. Furthermore, in this case, the canonical-systematic form is a standard representation in the sense that every code has such decomposition. In [14], it was proved that for every non-hierarchical poset, it is not possible to give a standard representation like this one (whose support of each component is entirely contained in a specific level of the poset). III. C OMPARISON OF P OSETS AND D ECOMPOSITIONS As proved in [7, Corollary 1], if P is a hierarchical poset, a linear code may be canonically decomposed as T(C) = C1 ⊕ · · · ⊕ Cr where supp (Ci ) ⊂ ΓPi . As we shall explain in Section IV, this canonical decomposition permits to give explicit formulae and constructions for metric invariants. Since this decomposition (according to the levels of the poset) is a characteristic of hierarchical posets, see [14, Theorem 3], we aim to use the knowledge about hierarchical poset metrics to establish bounds in the general case. To do that, we need to show that the P-primary decomposition is “well behaved”, in the sense that the decomposition are comparable when DRAFT March 1, 2018 19 the posets are comparable. The meaning of the expression “well behaved” will be explained in Theorem 3. A. Decompositions and refinements The set of all posets over [n] is denoted by Pn . It is, on itself, a partially ordered set with the order relation given by P ≤ Q if for every a, b ∈ [n] with a 6P b implies a 6Q b. The set Pn has n! (isomorphic) chain posets and one anti-chain poset, these n! + 1 elements may be considered as extremal posets, indeed, it is easy to verify that adding a relation to a chain will give rise to a cycle a 6 b 6 a since a total order on [n] is defined once we state that σ(1) ≤ σ(2) ≤ . . . ≤ σ(n) for some permutation σ ∈ Sn , contradicting the anti-symmetry property of a partial order. On the other hand, it is also immediate to realize that no relation can be removed from an anti-chain since a 6 a for all a ∈ [n] are the unique relations on an anti-chain. Theorem 3: Let P, Q ∈ Pn with P ≤ Q. Given a code C, there is a maximal P-decomposition of C which is a Q-decomposition of C. Proof: Assume P, Q ∈ Pn and P < Q. Let C ′ = (C ′; C0 ; Ci )ri=1 be a maximal P-decomposition of C and T ∈ GLP (Fnq ) such that T (C) = C ′. By the characterization of GLP (Fnq ), T = A ◦ Tφ where A ∈ GP and Tφ ∈ Aut(P). From Proposition 4, we have that  r C ′′ = Tφ−1 (C ′) ; Tφ−1 (C0 ) ; Tφ−1 (Ci ) i=1 is also a maximal P-decomposition of C. However Tφ−1 (C ′) = Tφ−1 ◦ T(C), hence Tφ−1 (C ′) = Tφ−1 ◦ A ◦ Tφ (C). We stress that GP ⊂ GQ always that P ≤ Q. Because GP is a normal subgroup of GLP (Fnq ), it follows that Tφ−1 ◦ A ◦ Tφ ∈ GP , hence Tφ−1 ◦ A ◦ Tφ ∈ GQ . Therefore, C ′′ is a Q-decomposition of C. As a direct consequence of the previous theorem, we obtain a relation among primary decom- positions of posets and the natural order over Pn . Corollary 2: If P, Q ∈ Pn with P ≤ Q. Then, DP (C) ≤ DQ (C) for every linear code C. Concerning primary P-decompositions, there is always a code that it is differently decomposed depending on the poset, that is, the preceding inequality is strict: Proposition 6: If P, Q ∈ Pn with P < Q. Then, there is a code C such that DP (C) < DQ (C). March 1, 2018 DRAFT 20 Proof: Suppose P < Q. Hence, there are i0, j0 ∈ [n] such that i0 P j0 and i0 6Q j0 . Let C = span{ei0 + e j0 } and C ′ = span{e j0 } be two codes over Fnq . The linear map T defined by T(e j ) = e j for every j ∈ [n] \ {i0, j0 }, T(ei0 ) = ei0 and T(e j0 ) = e j0 − ei0 , is a Q-linear isometry, by the characterization of GLQ (Fnq ) given in Proposition 1. Therefore, the Q-decomposition C ′ = (C ′; C0′ ; C ′) of C, where C0′ = {v ∈ Fnq : v j0 = 0}, is a primary Q-decomposition and it follows that DQ (C) = 1. On the other hand, when considering the P-metric, the decomposition C = (C; C0 ; C), where C0 = {v ∈ Fnq : vi0 , 0 and v j0 , 0}, can not be refined since C is a one-dimensional code (hence, splittings are not allowed) whose support is composed by two maximal elements of P (hence, aggregations are not allowed). Therefore, C ′ is a primary P-decomposition for C and DP (C) = 0. We remark that Corollary 2 together with Proposition 6 implies that primary decomposition is a characterization of posets, in the sense that a given poset P may be reconstructed from the profile of codes according to P. Moreover, looking at the proof of Proposition 6, one may notice that the reconstruction can be done by considering only the n(n − 1)/2 pairs of vectors (ei, e j ). B. Hierarchical Bounds As we have mentioned, metrics induced by hierarchical posets are well understood. This knowledge was mainly obtained from the existence of the decomposition derived from the canonical-systematic form. Since the degree of a decomposition express the amount of 1step refinements performed from the trivial decomposition, we aim to use the knowledge of hierarchical posets and establish bounds for the degree considering the easy-to-compute degree of primary P-decompositions relatively to hierarchical posets. As we have mentioned, hierarchical poset metrics are well understood and, in particular, if P is a hierarchical poset, the profile (and consequently the degree) of a primary P-decomposition of a code C can be easily computed once we know the canonical-systematic form. For this reason, when considering a general poset P, we aim to establish bounds for DP (C) considering the easy-to-compute primary P-decompositions relatively to hierarchical posets. Considering the natural order ≤ on Pn , out of P we can define two hierarchical posets: DRAFT March 1, 2018 21 1 - Upper neighbor: P + = min {Q ∈ Pn : P ≤ Q and Q is hierarchical} . 2 - Lower neighbor: P − = max {Q ∈ Pn : Q ≤ P and Q is hierarchical} . The next proposition follows directly from Corollary 2. Proposition 7: For any linear code C, DP+ (C) ≤ DP (C) ≤ DP− (C) . If P is not hierarchical, both inequalities are strict for some code C. Moreover, the bounds are tight, in the sense that, given a poset P, there are codes C1 and C2 such that DP+ (C1 ) = DP (C1 ) and DP− (C2 ) = DP (C2 ) (just consider any code C with supp(C) ⊂ ΓP1 ). IV. A PPLICATIONS TO C ODING T HEORY The poset-metrics, as much as the decomposition problem, arose in the context of coding theory, what justified the use of the terminology and the notation from the area: code and codeword for vector subspace and vector, respectively. Now comes the time to justify it with some content, i.e., with applications to coding theory. We combine the knowledge available for hierarchical posets with the degree’s bound found in Section III-B to produce bounds for the most important invariant in coding theory (the packing radius) and to optimize the traditional full lookup table searching algorithm in the syndrome decoding process. A. Packing Radius Bounds If Fnq is endowed with a P-metric, an [n, k, δP ] P-code is an [n, k]-linear code C with minimum distance δP = min{wP (c) : c ∈ C} = min{dP (c, c′) : c, c′ ∈ C, c , c′ }. In the context of coding theory, the minimum distance is considered the most important metric parameter of a code. Its importance comes from the fact that it may ensures the correction of a certain amount of errors. If P is an anti-chain, the P-weight and metric are known as Hamming weight and metric, denoted by wH and δH , respectively. This is the most important setting in March 1, 2018 DRAFT 22 the context of coding theory. In this situation, let us say that a message c ∈ C is transmitted and it is received with errors as a message v = c + e, where e ∈ Fnq is the error vector. If δH is the minimum distance of C and wH (e) ≤ ⌊(δH − 1)/2⌋ (where ⌊·⌋ is the floor function), then we can ensure that the original message c can be recovered. The quantity ⌊(δH − 1)/2⌋ happens to be what is known as the packing radius of the code, defined, in general, as R P (C) = max{r ≥ 0 : BP (c, r) ∩ BP (c′, r) = ∅ ∀c, c′ ∈ C, c , c′ }, where BP (u, r) = {v ∈ Fnq : dP (u, v) ≤ r } is the P-ball with center u and radius r. When considering a general poset metric, the packing radius maintains the same property of evaluating the correction capability. However, in general, the minimum distance does not determine the packing radius, only bounds for it (see [6]). Indeed, hierarchical posets are the unique posets for which the packing radius of a code is a function of its minimum distance, as can be seen in [14]. Determining the packing radius, in general settings, is a very difficult task, it may be an NP-hard problem even considering the case of a code with only two elements (see [6]). For this reason, working with a general poset, the best we can do is to find bounds and we do it considering maximal P-decompositions of the code. We start with two simple propositions. Proposition 8: Let C = (C ′; C0; Ci )ri=1 be a P-decomposition for C. Then, R P (C) ≤ min R P (Ci ). i∈{1,...,r} Proof: Note that R P (C) = R P (C ′). Furthermore, since each Ci is a subcode of C ′, it follows that R P (C) ≤ R P (Ci ) for every i ∈ {1, . . . , r }. Proposition 9: If P ≤ Q, then R P (C) ≤ RQ (C) for every linear code C. Proof: If follows directly from the fact that BQ (r, c) ∩ BQ (r, 0) ⊂ BP (r, c) ∩ BP (r, 0) for every c ∈ C and any integer r ≥ 0. Using Proposition 9 and the upper and lower neighbours P + and P − defined in the previous section, bounds for the packing radius of codes according to hierarchical posets may be obtained. The proof of the next proposition follows straight from the previous proposition. Proposition 10: Given a maximal P-decomposition C = (C ′; C0; Ci )ri=1 for C, R P− (Ci ) ≤ R P (Ci ) ≤ R P+ (Ci ) for every i ∈ {1, . . ., r }. DRAFT March 1, 2018 23 Propositions 8 and 10 yield the following upper and lower bounds for the packing radius: R P− (C) ≤ R P (C) ≤ min R P+ (Ci ) i∈{1,...,r} (6) for every i ∈ {1, . . ., r }. Since P + and P − are hierarchical, these bounds are obtained just by finding the minimum distance of C and each code Ci according to P − and P + , respectively. Furthermore, each of these codes may be decomposed according to the lower and upper neighbors in order to simplify and optimize the search for the minimum distance. If P is hierarchical, we obtain equalities in the bounds obtained in Proposition 10 and in Inequality (6), hence, these bounds are tight. B. Optimizing the Full Lookup Table Searching in Syndrome Decoding The core of coding theory is the existence of errors: the messages to be sent are elements of a code C ⊂ Fnq , but, in the occurrence of errors, any element of Fnq may be received. Once y ∈ Fnq arrives, the receiver needs to decide what was the original message. There are essentially to types of decision criteria: probabilistic and deterministic. We are interested in the deterministic criteria determined by metrics, the well-known minimum distance decoding. Minimum distance decoding works as follows: once y ∈ Fnq is received, we look for one of the codewords that minimizes the distance to y. We are in a good situation if the minimum is unique and this is the case if the weight of the error was not greater than the packing radius. Despite the fact that the minimum distance decoding is very simple to describe as a criterion, its implementation as an algorithm is very difficult, since codes (for practical purposes) are very large and searching on very large sets is infeasible. Syndrome decoding is an algorithm to perform minimum distance decoding that works for every linear code and every metric that is determined by a weight or, equivalently, a metric that is invariant by translations. Given a code C ⊂ Fnq , for each coset u + C, consider an element with minimal weight, called coset leader. In syndrome decoding, once a message y is received, instead looking for c ∈ C that minimizes dP (y, c), one looks for a coset leader u such that T(u − y) = 0, where T : Fnq → Fn−k is a linear map that has C as its kernel (determined by q the parity check matrix, in coding jargon). The advantage of using syndrome decoding is the exchange of a lookup table of size q k by one of size q n−k , what is smaller, in general, since coding theory looks for [n, k]-codes with k/n close to 1. This quantity, q n−k , is an algebraic invariant that does not depend on the metric. March 1, 2018 DRAFT 24 We do not explain here the details of syndrome decoding (it can be found in any book on coding theory, for example [11, Section 1.11]), but it is a very established process and all we need is to state that when we use the poset metric dP , we mean that the minimality of the coset leader refers to the P-weight wP . In this section we show how we can reduce the searching process in the lookup table of syndrome decoding, by considering P-decompositions of a code. Roughly speaking, the finest the decomposition, the smaller the search table. Let us do it in details. Let C = (C; C0; Ci )ri=1 be a maximal P-decomposition of an [n, k, δ]q code C. Initially, note that in order to perform decoding, we can ignore the component V0 (recall that Vi is the supportspace of Ci ) since we know that any codeword c = (c1, . . ., cn ) ∈ C should have c j = 0 for every j ∈ [n]C . Consider the projection π : Fnq −→ Fnq1 +···+nr (recall that ni = |supp(Ci )|) defined by π(x1, . . ., xn ) = (xi1, . . ., xis ) r V , the where {i1, . . ., is } = supp(C) and we assume i1 < · · · < is . The map π1,...,r = π|⊕i=1 i r V , is a bijection. Therefore, by pushing forward the metric in restriction of π to the space ⊕i=1 i the restriction, we obtain the metric dPπ in Fnq1 +···+nr defined by −1 −1 dPπ (x, y) := dP (πi,...,r (x), πi,...,r (y)) for every x, y ∈ Fnq1 +···+nr . The metric dPπ turns the restriction map π1...r into a linear isometry. Because C is a subspace of V1 ⊕ . . . ⊕ Vr , the proof of the proposition below follows straight from these observations. Proposition 11: The metric-decoding criteria of Fnq for C is equivalent to the metric-decoding criteria of Fnq1 +···+nr for π(C), i.e., dP (c′, y) = min dP (c, y) ⇐⇒ dPπ (π(c′), π(y)) = min dPπ (c, π(y)). c∈C c∈π(C) By Proposition 11, to perform syndrome decoding, instead of using a lookup table with Î |Fnq /C| = q n−k elements, we can reduce the number of cosets to |Fnq1 +···+nr /π(C)| = ri=1 q ni −ki elements. Note that n0 q × r Ö q ni −ki = q n−k . i=1 Therefore, P-decompositions having the maximum possible number of elements in the support of C0 are the best ones in order to perform syndrome decoding. DRAFT March 1, 2018 25 Besides this possible (and a-posteriori irrelevant) gain in the cardinality of the syndrome lookup table obtained considering aggregations, there is a more significant gain that can be obtained through the splitting operation. Proposition 12: If hsupp(Ci )iP ∩ hsupp(Cj )iP = ∅ for all i , j and i, j , 0, then given y ∈ Fnq , min dP (c, y) = c∈C r Õ i=1 min dPπi (πi (c), πi (y)). c∈Ci Proof: Note that if c ∈ C, then c = c1 + · · · + cr with ci ∈ Ci and for every yi ∈ Fnqi , supp(yi − ci ) ⊂ hsupp(Ci )i = supp(Vi ). Then, d(y, c) = d(y1, c1 ) + · · · + d(yr , cr ), where y = y1 + · · · + yr and yi ∈ Fnqi for all i ∈ [r]. Due to Proposition 12, if the ideals generated by each component are disjoint, syndrome decoding can be done independently in each component Ci . Therefore, the number of cosets Í can be reduced from q n−k elements to ri=1 q ni −ki elements, where the last one is the sum of the cosets in each quotient Fnqi /πi (Ci′). More generally, if r is a disjoint union of subsets Ii , i.e., [r] = I1 ⊔ . . . ⊔ Is , and hsupp(⊕i∈I j Ci )iP ∩ hsupp(⊕i∈Il Ci )iP = ∅, for every j , l, then decoding can be separately done in each projection of ⊕i∈I j Ci into FqN Í where N = i∈I j ni . Until now, in order to obtain the reductions, it was not necessary to change the syndrome decoding algorithm; we just performed it in a different (smaller) space. The hierarchical relation among elements of the poset will provide us a “quasi-independent” syndrome decoding algorithm that is performed by choosing first coordinates that hierarchically dominate others, therefore we will call this algorithm a Leveled Syndrome Decoding. Given two subsets I, J ⊂ [n], we say that I and J are hierarchically related if every element in I is smaller than every element in J. Suppose [r] is an ordered disjoint union of sets, [r] = I1 ⊔ . . . ⊔ Is , such that supp(⊕i∈I j Ci ) is hierarchically related with supp(⊕i∈I j+1 Ci ) for every j ∈ {1, . . . , s − 1}, so if i0 ∈ supp(⊕i∈I j0 Ci ), then i0 6 i for every i ∈ supp(⊕i∈Il Ci ) with March 1, 2018 DRAFT 26 l > j0 . By using the well-known syndrome decoding algorithm, the leveled syndrome decoding algorithm is as follows: Input: y = y1 + · · · + ys ∈ Fnq where yi ∈ ⊕ j∈Ii Vj For each i ∈ {1, . . ., s} do Í Decode π j∈Ii (yi ) ∈ Fq j ∈Ii nj π j ∈Ii using syndrome (dP ) outputting ci ∈ π j∈Ii (⊕ j∈Ii Cj ) −1 Output: c = π −1 j∈I1 (c1 ) + · · · + π j∈Is (cs ). Leveled Syndrome Decoding Algorithm 1. Furthermore, performing an ordered syndrome decoding from the higher level to the smaller ones, we can proceed as follows: Input: y = y1 + · · · + ys ∈ Fnq where yi ∈ ⊕ j∈Ii Vj For i = s to 1, do If π j∈Ii (yi ) ∈ ⊕ j∈Ii Cj do ci = π j∈Ii (yi ); else do Í Decode π j∈Ii (yi ) ∈ Fq j ∈Ii nj π j ∈Ii using syndrome (dP ) outputting ci ∈ π j∈Ii (⊕ j∈Ii Cj ); Go to Output; end if; end For; −1 −1 Output: c = π −1 j∈Ii (ci ) + π j∈Ii+1 (ci+1 ) + · · · + π j∈Is (cs ). Leveled Syndrome Decoding Algorithm 2. The first algorithm was described in [7] for the hierarchical poset case. The second one is also a minimum distance algorithm according to the poset metric dP (see the next proposition), but if there is an error in a particular level, the decoder outputs the null vector in the levels covered by the one where the error happened. Proposition 13: Algorithm 2 determines a minimum distance decoder according to the metric dP . Proof: Given y ∈ Fnq and c ∈ C, then π j ∈Ii dP (y, c) = dP DRAFT (π j∈Ii (y), π j∈Ii (c)) March 1, 2018 27 where i is the largest integer such that π j∈Ii (y) , π j∈Ii (c). Therefore, if c′ ∈ C satisfies dP (y, c′) = min dP (y, c), c∈C ′ then c′′ = cs′ + cs−1 + · · · + ci′ also attains the minimum and this is the codeword returned by algorithm 2. Both the algorithms demand the storage of the lookup tables of each quotient FqN /π j∈Ii (⊕ j∈Ii Cj ) Í where j∈Ii n j . The total number of elements we need to store is s Ö Õ q n j −k j . (7) i=1 j∈Ii The difference between Algorithm 1 and 2 is that while the search in the Algorithm 1 is performed over all elements of the lookup table, the ordered procedure in Algorithm 2 stop the search in the first level where an error has occurred, i.e., if this happens in the level i0 , then the search is performed only over the lookup table of π j∈Ii0 (⊕ j∈Ii0 Cj ) which has Ö q n j −k j (8) j∈Ii0 elements. Note that if the poset has only one level, the values of Expressions (7) and (8) coincide and are equal to q n−k . However, the more the support of a P-decomposition of a code is partitioned into hierarchically related subsets, the more we may transform factors in the product (7) into parcels in expression (8). ACKNOWLEDGMENT The authors would like to thank the São Paulo Research Foundation (Fapesp) for the financial support through grants 2013/25977-7 and 2016/01551-9. The second author would like to thank also CNPq, for the support through grant 303985/2014-3. R EFERENCES [1] Marcelo Muniz S. Alves. A standard form for generator matrices with respect to the niederreiter-rosenbloom-tsfasman metric. In Information Theory Workshop (ITW), pages 486–489. IEEE, 2011. [2] Marcelo Muniz S. Alves, Luciano Panek, and Marcelo Firer. Error-block codes and poset metrics. Advances in Mathematics of Communications, 2(1):95–111, 2008. [3] Aleams Barra and Heide Gluesing-Luerssen. MacWilliams extension theorems and the local-global property for codes over Frobenius rings. Journal of Pure and Applied Algebra, 219(4):703 – 728, 2015. [4] Richard A Brualdi, Janine Smolin Graves, and K Mark Lawrence. Codes with a poset metric. Discrete Mathematics, 147(1):57–72, 1995. March 1, 2018 DRAFT 28 [5] Michel Marie Deza and Elena Deza. Encyclopedia of distances. Springer, Berlin, 2009. [6] Rafael Gregorio Lucas D’Oliveira and Marcelo Firer. The packing radius of a code and partitioning problems: The case for poset metrics on finite vector spaces. Discrete Mathematics, 338(12):2143–2167, 2015. [7] Luciano Viana Felix and Marcelo Firer. Canonical-systematic form for codes in hierarchical poset metrics. Advances in Mathematics of Communications, 6(3):315–328, 2012. [8] Ernst Gabidulin. A brief survey of metrics in coding theory. Mathematics of Distances and Applications, pages 66–84, 2012. [9] S. Golomb. A general formulation of error metrics (corresp.). Information Theory, IEEE Transactions on, 15(3):425–426, 1969. [10] Richard W. Hamming. Error detecting and error correcting codes. Bell System technical journal, 29(2):147–160, 1950. [11] W. Cary Huffman and Vera Pless. Fundamentals of error-correcting codes. Cambridge university press, 2003. [12] H.K. Kim and Dong Yeol Oh. A classification of posets admitting the MacWilliams identity. IEEE Transactions on Information Theory, 51(4):1424–1431, April 2005. [13] C. Y. Lee. Some properties of nonbinary error-correcting codes. IRE Transactions on Information Theory, 4(2):77–82, 1958. [14] R. Machado, J. Pinheiro, and M. Firer. Characterization of metrics induced by hierarchical posets. IEEE Transactions on Information Theory, PP(99):1–1, 2017. [15] Harald Niederreiter. A combinatorial problem for vector spaces over finite fields. Discrete Mathematics, 96(3):221–228, 1991. [16] Harald Niederreiter. Orthogonal arrays and other combinatorial aspects in the theory of uniform point distributions in unit cubes. Discrete mathematics, 106:361–367, 1992. [17] Dong Yeol Oh. Poset metrics admitting association schemes and a new proof of Macwilliams identity. Journal of the Korean Mathematical Society, 50(5):917–931, 2013. [18] Luciano Panek, Marcelo Firer, and Marcelo Muniz Silva Alves. Classification of niederreiter–rosenbloom–tsfasman block codes. Information Theory, IEEE Transactions on, 56(10):5207–5216, 2010. [19] Luciano Panek, Marcelo Firer, Hyun Kwang Kim, and Jong Yoon Hyun. Groups of linear isometries on poset structures. Discrete Mathematics, 308(18):4116–4123, 2008. [20] Claudio Qureshi and Sueli IR Costa. On perfect q-ary codes in the maximum metric. Information Theory and Applications, 2016. [21] Werner Ulrich. Non-binary error correction codes. Bell System Technical Journal, 46(6):1341–1388, 1957. DRAFT March 1, 2018
7cs.IT
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 1 AffectNet: A Database for Facial Expression, Valence, and Arousal Computing in the Wild arXiv:1708.03985v4 [cs.CV] 9 Oct 2017 Ali Mollahosseini, Student Member, IEEE, Behzad Hasani, Student Member, IEEE, and Mohammad H. Mahoor, Senior Member, IEEE Abstract—Automated affective computing in the wild setting is a challenging problem in computer vision. Existing annotated databases of facial expressions in the wild are small and mostly cover discrete emotions (aka the categorical model). There are very limited annotated facial databases for affective computing in the continuous dimensional model (e.g., valence and arousal). To meet this need, we collected, annotated, and prepared for public distribution a new database of facial emotions in the wild (called AffectNet). AffectNet contains more than 1,000,000 facial images from the Internet by querying three major search engines using 1250 emotion related keywords in six different languages. About half of the retrieved images were manually annotated for the presence of seven discrete facial expressions and the intensity of valence and arousal. AffectNet is by far the largest database of facial expression, valence, and arousal in the wild enabling research in automated facial expression recognition in two different emotion models. Two baseline deep neural networks are used to classify images in the categorical model and predict the intensity of valence and arousal. Various evaluation metrics show that our deep neural network baselines can perform better than conventional machine learning methods and off-the-shelf facial expression recognition systems. Index Terms—Affective computing in the wild, facial expressions, continuous dimensional space, valence, arousal. F 1 I NTRODUCTION A FFECT is a psychological term used to describe the outward expression of emotion and feelings. Affective computing seeks to develop systems and devices that can recognize, interpret, and simulate human affects through various channels such as face, voice, and biological signals [1]. Face and facial expressions are undoubtedly one of the most important nonverbal channels used by the human being to convey internal emotion. There have been tremendous efforts to develop reliable automated Facial Expression Recognition (FER) systems for use in affect-aware machines and devices. Such systems can understand human emotion and interact with users more naturally. However, current systems have yet to reach the full emotional and social capabilities necessary for building rich and robust Human Machine Interaction (HMI). This is mainly due to the fact that HMI systems need to interact with humans in an uncontrolled environment (aka wild setting) where the scene lighting, camera view, image resolution, background, users head pose, gender, and ethnicity can vary significantly. More importantly, the data that drives the development of affective computing systems and particularly FER systems lack sufficient variations and annotated samples that can be used in building such systems. There are several models in the literature to quantify affective facial behaviors: 1) categorical model, where the emotion/affect is chosen from a list of affective-related categories such as six basic emotions defined by Ekman et al. [2], 2) dimensional model, where a value is chosen over a continuous emotional scale, such as valence and arousal [3] and 3) Facial Action Coding System (FACS) model, where • Authors are with the Department of Electrical and Computer Engineering, University of Denver, Denver, CO, 80210. E-mail: amollah, bhasani, [email protected] all possible facial actions are described in terms of Action Units (AUs) [4]. FACS model explains facial movements and does not describe the affective state directly. There are several methods to convert AUs to affect space (e.g., EMFACS [5] states that the occurrence of AU6 and AU12 is a sign of happiness). In the categorical model, mixed emotions cannot adequately be transcribed into a limited set of words. Some researchers tried to define multiple distinct compound emotion categories (e.g., happily surprised, sadly fearful) [6] to overcome this limitation. However, still the set is limited, and the intensity of the emotion cannot be defined in the categorical model. In contrast, the dimensional model of affect can distinguish between subtly different displays of affect and encode small changes in the intensity of each emotion on a continuous scale, such as valence and arousal. Valence refers to how positive or negative an event is, and arousal reflects whether an event is exciting/agitating or calm/soothing [3]. Figure 1 shows samples of facial expressions represented in the 2D space of valence and arousal. As it is shown, there are several different kinds of affect and small changes in the same emotion that cannot be easily mapped into a limited set of terms existing in the categorical model. The dimensional model of affect covers both intensity and different emotion categories in the continuous domain. Nevertheless, there are relatively fewer studies on developing automated algorithms in measuring affect using the continuous dimensional model (e.g., valence and arousal). One of the main reasons is that creating a large database to cover the entire continuous space of valence and arousal is expensive and there are very limited annotated face databases in the continuous domain. This paper contributes to the field of affective computing by providing a large annotated face database of the dimensional as well as the IEEE TRANSACTIONS ON AFFECTIVE COMPUTING Fig. 1. Sample images in Valence Arousal circumplex categorical models of affect. The majority of the techniques for automated affective computing and FER are based on supervised machine learning methodologies. These systems require annotated image samples for training. Researchers have created databases of human actors/subjects portraying basic emotions [7], [8], [9], [10], [11]. Most of these databases mainly contain posed expressions acquired in a controlled lab environment. However, studies show that posed expressions can be different from unposed expressions in configuration, intensity, and timing [12], [13]. Some researchers captured unposed facial behavior while the subject is watching a short video [14], [15], engaged in laboratory-based emotion inducing tasks [16], or interacted with a computer-mediated tutoring system [17]. Although a large number of frames can be obtained by these approaches, the diversity of these databases is limited due to the number of subjects, head position, and environmental conditions. Recently, databases of facial expression and affect in the wild received much attention. These databases are either captured from movies or the Internet, and annotated with categorical model [18], [19], [20], dimensional model [21], and FACS model [22]. However, they only cover one model of affect, have a limited number of subjects, or contain few samples of certain emotions such as disgust. Therefore, a large database, with a large amount of subject variations in the wild condition that covers multiple models of affect (especially the dimensional model) is a need. To address this need, we created a database of facial Affect from the InterNet (called AffectNet) by querying different search engines (Google, Bing, and Yahoo) using 1250 emotion related tags in six different languages (English, Spanish, Portuguese, German, Arabic, and Farsi). AffectNet contains more than one million images with faces and extracted facial landmark points. Twelve human experts manually annotated 450,000 of these images in both categorical 2 and dimensional (valence and arousal) models and tagged the images that have any occlusion on the face. Figure 1 shows sample images from AffectNet and their valence and arousal annotations. To calculate the agreement level between the human labelers, 36,000 images were annotated by two human labelers. AffectNet is by far the largest database of facial affect in still images which covers both categorical and dimensional models. The cropped region of the facial images, the facial landmark points, and the affect labels will be publicly available to the research community1 . Considering the lack of inthe-wild large facial expressions datasets and more specifically annotated face datasets in the continuous domain of valence and arousal, AffectNet is a great resource which will enable further progress in developing automated methods for facial behavior computing in both the categorical and continuous dimensional spaces. The rest of this paper is organized as follows. Section 2 reviews the existing databases and state-of-the-art methods for facial expression recognition with emphasis on the dimensional model and in the wild setting databases. Section 3 explains the process of collecting AffectNet images from the Internet and annotating the categorical and dimensional models. Section 4 presents two different baselines for automatic recognition of categorical emotions and prediction of dimensional valence and arousal in the continuous space using AffecNet images. Finally Section 5 concludes the paper. 2 2.1 R ELATED W ORK Existing databases Early databases of facial expressions such as JAFFE [7], Cohn-Kanade [8], [9], MMI [10], and MultiPie [11] were captured in a lab-controlled environment where the subjects portrayed different facial expressions. This approach resulted in a clean and high-quality database of posed facial expressions. However, posed expressions may differ from daily life unposed (aka spontaneous) facial expressions. Thus, capturing spontaneous expression became a trend in the affective computing community. Examples of these environments are recording the responses of participants’ faces while watching a stimuli (e.g., DISFA [14], AM-FED [15]) or performing laboratory-based emotion inducing tasks (e.g., Belfast [16]). These databases often capture multi-modal affects such as voice, biological signals, etc. and usually a series of frames are captured that enable researchers to work on temporal and dynamic aspects of expressions. However, the diversity of these databases is limited due to the number of subjects, head pose variation, and environmental conditions. Hence there is a demand to develop systems that are based on natural, unposed facial expressions. To address this demand, recently researchers paid attention to databases in the wild. Dhall et al. [18] released Acted Facial Expressions in the Wild (AFEW) from 54 movies by a recommender system based on subtitles. The video clips were annotated with six basic expressions plus neutral. AFEW 1. Interested researcher can download a copy of AffectNet from: http: //mohammadmahoor.com/databases-codes/ IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 3 TABLE 1 The Summary and Characteristics of Reviewed Databases in Affect Recognition Database Database information # of Subjects CK+ [9] - Frontal and 30 degree images - 123 MultiPie [11] - Around 750,000 images - Under multiple viewpoints and illuminations - 337 MMI [10] - Subjects portrayed 79 series of facial expressions - Image sequence of frontal and side view are captured - 25 DISFA [14] SALDB [23], [24] - Video of subjects while watching a four minutes video - Clip are recorded by a stereo camera - SAL - Audiovisual (facial expression,shoulder, audiocues) - 20 facial feature points, 5 shoulder points for video - 27 Condition - Controlled - Posed - Controlled - Posed - Controlled - Posed & Spontaneous - Controlled - Spontaneous -4 - Controlled - Spontaneous RELOCA [25] - Multi-modal audio, video, ECG and EDA - 46 - Controlled - Spontaneous AM-FED [15] - 242 facial videos - 242 - Spontaneous DEAP [26] - 40 one-minute long videos shown to subjects - EEG signals recorded - 32 - Controlled - Spontaneous - Videos - Images queried from web - Images queried from web - 100,000 images annotated manually - 900,000 images annotated automatically - 330 - ∼35,887 - Wild - Wild - ∼100,000 - Wild Aff-Wild [21] - 500 videos from YouTube - 500 - Wild FER-Wild [20] - 24,000 images from web - ∼24,000 - Wild AffectNet (This work) - 1,000,000 images with facial landmarks - 450,000 images annotated manually - ∼450,000 - Wild AFEW [18] FER-2013 [19] EmotioNet [22] contains 330 subjects aged 1-77 years and addresses the issue of temporal facial expressions in the wild. A static subset (SFEW [27]) is created by selecting some frames of AFEW. SFEW covers unconstrained facial expressions, different head poses, age range, occlusions, and close to real world illuminations. However, it contains only 700 images, and there are only 95 subjects in the database. The Facial Expression Recognition 2013 (FER-2013) database was introduced in the ICML 2013 Challenges in Representation Learning [19]. The database was created using the Google image search API that matched a set of 184 emotion-related keywords to capture the six basic expressions as well as the neutral expression. Images were resized to 48x48 pixels and converted to grayscale. Human labelers rejected incorrectly labeled images, corrected the cropping if necessary, and filtered out some duplicate images. The resulting database contains 35,887 images most of which are in the wild settings. FER-2013 is currently the biggest publicly available facial expression database in the wild settings, enabling many researchers to train machine learning methods such as Deep Neural Networks (DNNs) where large amounts of data are needed. In FER-2013, the faces are not registered, a small number of images portray disgust (547 images), and unfortunately most of facial landmark detectors fail to extract facial landmarks at this resolution and quality. In addition, only the categorical model of affect is provided with FER-2013. The Affectiva-MIT Facial Expression Dataset (AM-FED) database [15] contains 242 facial videos (160K frames) of people watching Super Bowl commercials using their webcam. The recording conditions were arbitrary with differ- Affect Modeling - 30 AUs - 7 emotion categories - 7 emotion categories - 31 AUs - Six basic expression - 12 AUs - Valence - Quantized [23] - Continuous [24] - Valence and arousal (continuous) - Self assessment - 14 AUs - Valence and arousal (continuous) - Self assessment - 7 emotion categories - 7 emotion categories - 12 AUs annotated - 23 emotion categories based on AUs - Valence and arousal (continuous) - 7 emotion categories - 8 emotion categories - Valence and arousal (continuous) ent illumination and contrast. The database was annotated frame-by-frame for the presence of 14 FACS action units, head movements, and automatically detected landmark points. AM-FED is a great resource to learn AUs in the wild. However, there is not a huge variance in head pose (limited profiles), and there are only a few subjects in the database. The FER-Wild [20] database contains 24,000 images that are obtained by querying emotion-related terms from three search engines. The OpenCV face recognition was used to detect faces in the images, and 66 landmark points were found using Active Appearance Model (AAM) [28] and a face alignment algorithm via regression local binary features [29], [30]. Two human labelers annotated the images into six basic expressions and neutral. Comparing with FER2013, FER-Wild images have a higher resolution with facial landmark points necessary to register the images. However, still a few samples portray some expressions such as disgust and fear and only the categorical model of affect is provided with FER-Wild. The EmotioNet [22] consists of one million images of facial expressions downloaded from the Internet by selecting all the words derived from the word “feeling” in WordNet [31]. Face detector [32] was used to detect faces in these images and the authors visually inspected the resultant images. These images were then automatically annotated with AUs and AU intensities by an approach based on Kernel Subclass Discriminant Analysis (KSDA) [33]. The KSDA-based approach was trained with Gabor features centered on facial landmark with a Radial Basis Function (RBF) kernel. Images were labeled as one of the 23 (basic or compound) emotion categories defined in [6] based on IEEE TRANSACTIONS ON AFFECTIVE COMPUTING AUs. For example, if an image has been annotated as having AUs 1, 2, 12 and 25, it is labeled as happily surprised. A total of 100,000 images (10% of the database) were manually annotated with AUs by experienced coders. The proposed AU detection approach was trained on CK+ [9], DISFA [14], and CFEE [34] databases, and the accuracy of the automated annotated AUs was reported about 80% on the manually annotated set. EmotioNet is a novel resource of FACS model in the wild with a large amount of subject variation. However, it lacks the dimensional model of affect, and the emotion categories are defined based on annotated AUs and not manually labeled. On the other hand, some researchers developed databases of the dimensional model in the continuous domain. These databases, however, are limited since the annotation of continuous dimensions is more expensive and necessitate trained annotators. Examples of these databases are Belfast [16], RECOLA [25], Affectiva-MIT Facial Expression Dataset (AM-FED) [15], and recently published Aff-Wild Database [21] which is the only database of dimensional model in the wild. The Belfast database [16] contains recordings (5s to 60s in length) of mild to moderate emotional responses of 60 participants to a series of laboratory-based emotion inducing tasks (e.g., surprise response by setting off a loud noise when the participant is asked to find something in a black box). The recordings were labeled by information on self-report of emotion, the gender of the participant/experimenter, and the valence in the continuous domain. The arousal dimension was not annotated in Belfast database. While the portrayed emotions are natural and spontaneous, the tasks have taken place in a relatively artificial setting of a laboratory where there was a control on lighting conditions, head poses, etc. The Database for Emotion Analysis using Physiological Signals (DEAP) [26] consists of spontaneous reactions of 32 participants in response to one-minute long music video clip. The EEG, peripheral physiological signals, and frontal face videos of participants were recorded, and the participants rated each video in terms of valence, arousal, like/dislike, dominance, and familiarity. Correlations between the EEG signal frequencies and the participants ratings were investigated, and three different modalities, i.e., EEG signals, peripheral physiological signals, and multimedia features on video clips (such as lighting key, color variance, etc.) were used for binary classification of low/high arousal, valence, and liking. DEAP is a great database to study the relation of biological signals and dimensional affect, however, it has only a few subjects and the videos are captured in lab controlled settings. The RECOLA benchmark [25] contains videos of 23 dyadic teams (46 participants) that participated in a video conference completing a task which required collaboration. Different multi-modal data of the first five minutes of interaction, i.e., audio, video, ECG and EDA) were recorded continuously and synchronously. Six annotators measured arousal and valence. The participants reported their arousal and valence through the Self-Assessment Manikin (SAM) [35] questionnaire before and after the task. RECOLA is a great database of the dimensional model with multiple cues and modalities, however, it contains only 46 4 subjects and the videos were captured in the lab controlled settings. Audio-Visual Emotion recognition Challenge (AVEC) series of competitions [36], [37], [38], [39], [40], [41] provided a benchmark of automatic audio, video and audiovisual emotion analysis in continuous affect recognition. AVEC 2011, 2012, 2013, and 2014 used videos from the SEMAINE [42] database videos. Each video is annotated by a single rater for every dimension using a two-axis joystick. AVEC 2015 and 2016 used the RECOLA benchmark in their competitions. Various continuous affect recognition dimensions were explored in each challenge year such as valence, arousal, expectation, power, and dominance, where the prediction of valence and arousal are studied in all challenges. The Aff-Wild Database [21] is by far the largest database for measuring continuous affect in the valence-arousal space “in-the-wild”. More than 500 videos from YouTube were collected. Subjects in the videos displayed a number of spontaneous emotions while watching a particular video, performing an activity, and reacting to a practical joke. The videos have been annotated frame-by-frame by three human raters, utilizing a joystick-based tool to rate valence and arousal. Aff-Wild is a great database of dimensional modeling in the wild that considers the temporal changes of the affect, however, it has a small subject variance, i.e., it only contains 500 subjects. Table 1 summarizes the characteristics of the reviewed databases in all three models of affect, i.e., categorical model, dimensional model, and Facial Action Coding System (FACS). 2.2 Evaluation Metrics There are various evaluation metrics in the literature to measure the reliability of annotation and automated affective computing systems. Accuracy, F1-score [49], Cohens kappa [50], Krippendorfs Alpha [51], ICC [52], area under the ROC curve (AUC), and area under Precision-Recall curve (AUC-PR) [53] are well-defined widely used metrics for evaluation of the categorical and FACS-based models. Since, the dimensional model of affect is usually evaluated in a continuous domain, different evaluation metrics are necessary. In the following, we review several metrics that are used in the literature for evaluation of dimensional model. Root Mean Square Error (RMSE) is the most common evaluation metric in a continuous domain which is defined as: v u n u1 X RM SE = t (θ̂i − θi )2 (1) n i=1 where θ̂i and θi are the prediction and the ground truth of ith sample, and n is the number of samples in the evaluation set. RMSE-based evaluation can heavily weigh the outliers [54], and it is not able to provide the covariance of prediction and ground-truth to show how they change with respect to each other. Pearsons correlation coefficient IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 5 TABLE 2 State-of-the-art Algorithms and Their Performance on the Databases Listed in Table 1. Work Mollahosseini et al. [43] Database CK+ MultiPie Shan et al. [44] MMI Zhang et al. [45] DISFA Nicolaou et al. [24] SALDB He et al. [46] RECOLA McDuff et al. [15] AM-FED Koelstra et al. [26] DEAP Fan et al. [47] AFEW Tang et al. [48] FER-2013 Benitez-Quiroz et al. [22] EmotioNet Mollahosseini et al. [20] FER-Wild Method - Inception based Convolutional Neural Network (CNN) - Subject-independent and cross-database experiments - Different SVM kernels trained with LBP features - Subject-independent and cross-database experiments - lp norm multi-task multiple kernel learning - learning shared kernels from a given set of base kernels - Bidirectional LSTM - Trained on multiple engineered features extracted from audio, facial geometry , and shoulder - Multiple stack of bidirectional LSTM (DBLSTM-RNN) - Trained on engineered features extracted from audio (LLDs), video (LPQ-TOP), 52 ECG features, and 22 EDA features - HOG features extracted - SVM with RBF kernel - Gaussian naive Bayes classifier - EEG, physiological signals, and multimedia features - Binary classification of low/high arousal, valence, and liking - Trained on both video and audio. - VGG network are followed by LSTMs and combined with 3D convolution - CNN with linear one-vs-all SVM at the top - New face feature extraction method using Gabor filters - KSDA classification - Subject-independent and cross-database experiments - Trained on AlexNet - Noise estimation methods used is therefore proposed in some literature [24], [36], [37] to overcome this limitation: E[(θ̂ − µθ̂ )(θ − µθ )] COV {θ̂, θ} = (2) σθ̂ σθ σθ̂ σθ Concordance Correlation Coefficient (CCC) is another metric [40], [41] which combines the Pearsons correlation coefficient (CC) with the square difference between the means of two compared time series: 2ρσθ̂ σθ (3) ρc = 2 2 σθ̂ + σθ + (µθ̂ − µθ )2 CC = where ρ is the Pearson correlation coefficient (CC) between two time-series (e.g., prediction and ground-truth), σθ̂2 and σθ2 are the variance of each time series, and µθ̂ and µθ are the mean value of each. Unlike CC, the predictions that are well correlated with the ground-truth but shifted in value are penalized in proportion to the deviation in CCC. The value of valence and arousal are [-1,+1] and their signs are essential in many emotion-prediction applications. For example, if the ground-truth valence is +0.3, prediction of +0.7 is far better than prediction of -0.1, since +0.7 indicates a positive emotion similar to the ground-truth (despite both predictions have the same RMSE). Sign Agreement Metric (SAGR) is another metric that is proposed in [24] to evaluate the performance of a valence and arousal prediction system. SAGR is defined as: n SAGR = 1X δ(sign(θ̂i ), sign(θi )) n i=1 where δ is the Kronecker delta function, defined as: ( 1, a = b δ(a, b) = 0, a 6= b (4) (5) Results - 93.2% accuracy on CK+ - 94.7% accuracy on MultiPie - 86.9% accuracy on MMI - 0.70 F1-score on DISFA - 0.93 recognition rate on DISFA - Leave-one-sequence-out - BLSTM-NN outperform SVR - Valence (RMSE=0.15 and CC=0.796) - Arousal (RMSE=0.21 and CC=0.642) - Winner of AVEC 2015 challenge - Valence (RMSE=0.104 and CC=0.616) - Arousal (RMSE=0.121 and CC=0.753) - AUC 0.90, 0.72 and 0.70 for smile, AU2 and AU4 respectively - 0.39 F1-score on Arousal - 0.37 F1-score on Valence - 0.40 F1-score on Liking - Winner of EmotiW 2016 challenge - 56.16% accuracy on AFEW - Winner of the FER challenge - 71.2% accuracy on test set - ∼80% AU detection on EmotioNet - 82.12% accuracy on FER-Wild The above discussed metrics are used to evaluate the categorical and dimensional baselines on AffectNet in Sec. 4. 2.3 Existing Algorithms Affective computing is now a well-established field, and there are many algorithms and databases for developing automated affect perception systems. Since it is not possible to include all those great works, we only give a brief overview and cover the state-of-the-art methods that are applied on the databases explained in Sec. 2.1. Conventional algorithms of affective computing from faces use hand-crafted features such as pixel intensities [55], Gabor filters [56], Local Binary Patterns (LBP) [44], and Histogram of Oriented Gradients (HOG) [14]. These handcrafted features often lack enough generalizability in the wild settings where there is a high variation in scene lighting, camera view, image resolution, background, subjects head pose and ethnicity. An alternative approach is to use Deep Neural Networks (DNN) to learn the most appropriate feature abstractions directly from the data and handle the limitations of handcrafted features. DNNs have been a recent successful approach in visual object recognition [57], human pose estimation [58], face verification [59] and many more. This success is mainly due to the availability of computing power and existing big databases that allow DNNs to extract highly discriminative features from the data samples. There have been enormous attempts on using DNNs in automated facial expression recognition and affective computing [20], [43], [46], [47], [48] that are especially very successful in the wild settings. Table 2 shows a list of the state-of-the-art algorithms and their performance on the databases listed in Table 1. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 6 Fig. 2. A screen-shot of the software application used to annotate categorical and dimensional (valence and arousal) models of affect and the osculation tag if existing. Only one detected face in each image is annotated (shown in the green bounding box). As shown in the table, the majority of these approaches have used DNNs to learn a better representation of affect, especially in the wild settings. Even some of the approaches, such as the winner of the AVEC 2015 challenge [46], trained a DNN with hand-crafted features and still could improve the prediction accuracy. 3 A FFECT N ET AffectNet (Affect from the InterNet) is the largest database of the categorical and dimensional models of affect in the wild (as shown in Table 1). The database is created by querying emotion related keywords from three search engines and annotated by expert human labelers. In this section, the process of querying the Internet, processing facial images and extracting facial landmarks, and annotating facial expression, valence, and arousal of affect are discussed. 3.1 Facial Images from the Web Emotion-related keywords were combined with words related to gender, age, or ethnicity, to obtain nearly 362 strings in the English language such as “joyful girl”, “blissful Spanish man”, “furious young lady”, “astonished senior”. These keywords are then translated into five other languages: Spanish, Portuguese, German, Arabic and Farsi. The direct translation of queries in English to other languages did not accurately result in the intended emotions since each language and culture has differing words and expressions for different emotions. Therefore, the list of English queries was provided to native non-English speakers who were proficient in English, and they created a list of queries for each emotion in their native language and inspected the quality of the results visually. The criteria for highquality queries were those that returned a high percentage of human faces showing the intended queried emotions rather than drawings, graphics, or non-human objects. A total of 1250 search queries were compiled and used to crawl the search engines in our database. Since a high percentage of results returned by our query terms already contained neutral facial images, no individual query was performed to obtain additional neutral face. Three search engines (Google, Bing, and Yahoo) were queried with these 1250 emotion related tags. Other search engines such as Baidu and Yandex were considered. However, they either did not produce a large number of facial images with intended expressions or they did not have available APIs for automatically querying and pulling image URLs into the database. Additionally, queries were combined with negative terms (e.g., “drawing”, “cartoon”, “animation”, “birthday”, etc.) to avoid non-human objects as much as possible. Furthermore, since the images of stock photo websites are posed unnaturally and contain watermarks mostly, a list of popular stock photo websites was compiled and the results returned from the stock photo websites were filtered out. A total of ∼1,800,000 distinct URLs returned for each query were stored in the database. The OpenCV face recognition was used to obtain bounding boxes around each face. A face alignment algorithm via regression local binary features [29], [30] was used to extract 66 facial landmark points. The facial landmark localization technique was trained using the annotations provided from the 300W competition [60]. More than 1M images containing at least one face with extracted facial landmark points were kept for further processing. The average image resolution of faces in AffectNet are 425 × 425 with STD of 349 × 349 pixels. We used Microsoft cognitive face API to extract these facial attributes on 50,000 randomly selected images from the database. According to MS face API, 49% of the faces are men. The average estimated age of the faces is 33.01 years with the standard deviation of 16.96 years. In particular, 10.85, 3.9, 30.19, 26.86, 14.46, and 13.75 percent of the faces are in age ranges [0, 10), [10, 20), [20, 30), [30, 40), [40, 50) and [50, -), respectively. MS face API detected forehead, mouth, and eye occlusions in 4.5, 1.08, and 0.49 percent of the images, respectively. Also, 9.63% of the faces wear glasses, 51.07 and 41.4% of the faces have eye and lip make-ups, respectively. In terms of head IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 7 pose, the average estimated pitch, yaw, roll are 0.0,-0.7, and -1.19 degrees, respectively. Expression Neutral Happy Sad Surprise Fear Disgust Anger Contempt None Uncertain Non-Face Annotation Crowd-sourcing services like Amazon Mechanical Turk are fast, cheap and easy approaches for labeling large databases. The quality of labels obtained from crowd-sourcing services, however, varies considerably among the annotators. Due to these issues and the fact that annotating the valence and arousal requires a deep understanding of the concept, we avoided crowd-sourcing facilities and instead hired 12 fulltime and part-time annotators at the University of Denver to label the database. A total of 450,000 images were given to these expert annotators to label the face in the images into both discrete categorical and continuous dimensional (valence and arousal) models. Due to time and budget constraints each image was annotated by one annotator. A software application was developed to annotate the categorical and dimensional (valence and arousal) models of affect. Figure 2 shows a screen-shot of the annotation application. A comprehensive tutorial including the definition of the categorical and dimensional models of affect with some examples of each category, valence and arousal was given to the annotators. Three training sessions were provided to each annotator, in which the annotator labeled the emotion category, valence and arousal of 200 images and the results were reviewed with the annotators. Necessary feedback was given on both the categorical and dimensional labels. In addition, the annotators tagged the images that have any occlusion on the face. The occlusion criterion was defined as if any part of the face was not visible. If the person in the images wore glasses, but the eyes were visible without any shadow, it was not considered as occlusion. 3.2.1 Categorical Model Annotation Eleven discrete categories were defined in the categorical model of AffectNet as: Neutral, Happy, Sad, Surprise, Fear, Anger, Disgust, Contempt, None, Uncertain, and Non-face. The None (“None of the eight emotions”) category is the type of expression/emotions (such as sleepy, bored, tired, seducing, confuse, shame, focused, etc.) that could not be assigned by annotators to any of the six basic emotions, contempt or neutral. However, valence and arousal could be assigned to these images. The Non-face category was defined as images that: 1) Do not contain a face in the image; 2) Contain a watermark on the face; 3) The face detection algorithm fails and the bounding box is not around the face; 4) The face is a drawing, animation, or painted; and 5) The face is distorted beyond a natural or normal shape, even if an expression could be inferred. If the annotators were uncertain about any of the facial expressions, images were tagged as uncertain. When an image was annotated as Nonface or uncertain, valence and arousal were not assigned to the image. The annotators were instructed to select the proper expression category of the face, where the intensity is not important as long as the face depicts the intended emotion. Table 3 shows the number of images in each category. Table 4 indicates the percentage of annotated categories for queried emotion terms. As shown, the happy emotion Number 80,276 146,198 29,487 16,288 8,191 5,264 28,130 5,135 35,322 13,163 88,895 TABLE 4 Percentage of Annotated Categories for Queried Emotion Terms (%) Annotated Expression 3.2 TABLE 3 Number of Annotated Images in Each Category NE* HA SA SU FE DI AN CO NO UN NF HA 17.3 48.9 2.6 2.7 0.7 0.6 2.8 1.3 5.4 1.3 16.3 SA 16.3 27.2 15.7 3.1 1.2 0.7 4.5 0.9 8.7 3.1 18.6 Query Expression SU FE DI 13.9 17.8 17.8 30.4 28.6 33 4.8 5.8 4.5 16 4.4 3.6 4.2 4 1.5 0.7 0.9 2.7 3.8 5.6 6 0.4 1.1 1.1 4.8 8.1 8.8 4.3 3.1 4.1 16.7 20.6 16.9 AN 16.1 29.5 5.4 3.4 1.4 1.1 12.2 1.2 9.3 3.7 16.8 CO 20.1 30.1 4.6 4.1 1.3 1 6.1 2.4 11.2 2.7 16.3 * NE, HA, SA, SU, FE, DI, AN, CO, NO, UN , and NF stand for Neutral, Happy, Sad, Surprise, Fear, Anger, Disgust, Contempt, None, Uncertain, and Non-face categories, respectively. had the highest hit-rate (48%), and the rest of the emotions had hit-rates less than 20%. About 15% of all query results were in the No-Face category, as many images from the web contain watermarks, drawings, etc. About 15% of all queried emotions resulted in neutral faces. Among other expressions, disgust, fear, and contempt had the lowest hitrate with only 2.7%, 4%, and 2.4% hit-rates, respectively. As one can see, the majority of the returned images from the search engines were happy or neutral faces. The authors believe that this is because people tend to publish their images with positive expressions rather than negative expressions. Figure 3 shows a sample image in each category and its intended queries (in parentheses). 3.2.2 Dimensional (Valence & Arousal) Annotation The definition of valence and arousal dimensions was adapted from [3] and was given to annotators in our tutorial as: “Valence refers to how positive or negative an event is, and arousal reflects whether an event is exciting/agitating or calm/soothing”. A sample circumplex with estimated positions of several expressions, borrowed from [61], was provided in the tutorial as a reference for the annotators. The provided circumplex in the tutorial contained more than 34 complex emotions categories such as suspicious, insulted, impressed, etc., and used to train annotators. The annotators were instructed to consider the intensity of valence and arousal during the annotation. During the annotation process, the annotators were supervised closely and constant necessary feedback was provided when they were uncertain about some images. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 8 1 10000 0.8 3162 0.6 1000 0.4 Neutral (Angry) Happy (Happy) Sad (Angry) Surprise (Fear) 0.2 316 0 100 −0.2 32 −0.4 10 −0.6 Fear (Fear) Disgust (Disgust) Angry (Angry) Contempt (Happy) 3 −0.8 −1 −1 1 −0.5 0 0.5 1 Fig. 4. Histogram (number of frames in each range/area) of valence and arousal annotations (Best viewed in color). Non-face (Surprise) Uncertain (Sad) None (Fear) None (Happy) TABLE 5 Annotators’ Agreement in Dimensional Model of Affect Fig. 3. Samples of queried images from the web and their annotated tags. The queried expression is written in parentheses. To model the dimensional affect of valence and arousal, a 2D Cartesian coordinate system was used where the x-axis and y -axis represent the valence and arousal, respectively. Similar to Russell’s circumplex space model [3], our annotation software did not allow the value of valence and arousal outside of the circumplex. This allows us to convert the Cartesian coordinates to polar coordinates with 0 ≤ r ≤ 1 and 0 ≤ θ < 360. The annotation software showed the value of valence and arousal to the annotators when they selected a point in the circumplex. This helped the annotators to pick more precise locations of valence and arousal with a higher confidence. A predefined estimated region of valence and arousal was defined for each categorical emotion in the annotation software (e.g., for happy emotion the valence is in (0.0, 1.0], and the arousal is in [-0.2, 0.5] ). If the annotators select a value of valence and arousal outside of the selected emotion’s region, the software indicates a warning message. The annotators were able to proceed, and they were instructed to do so, if they were confident about the value of valence and arousal. The images with the warning messages were marked in the database, for further review by the authors. This helped to avoid mistakes in the annotation of the dimensional model of affect. Figure 4 shows the histogram (number of samples in each range/area) of annotated images in a 2D Cartesian coordinate system. As illustrated, there are more samples in the center and the right middle (positive valence and small positive arousal) of the circumplex, which confirms the higher number of Neutral and Happy images in the database compared to other categories in the categorical model. 2 2. A numerical representation of annotated images in each range/area of valence and arousal is provided in the Appendix. RMSE CORR SAGR CCC 3.3 Same Category Valence Arousal 0.190 0.261 0.951 0.766 0.906 0.709 0.951 0.746 All Valence 0.340 0.823 0.815 0.821 Arousal 0.362 0.567 0.667 0.551 Annotation Agreement In order to measure the agreement between the annotators, 36,000 images were annotated by two annotators. The annotations were performed fully blind and independently, i.e., the annotators were not aware of the intended query or other annotator’s response. The results showed that the annotators agreed on 60.7% of the images. Table 6 shows the agreement between two annotators for different categories. As it is shown, the annotators highly agreed on the Happy and No Face categories, and the highest disagreement occurred in the None category. Visually inspecting some of the images in the None category, the authors believe that the images in this category contain very subtle emotions and they can be easily confused with other categories (the last two example of Fig. 3 show images in the None category). Table 5 shows various evaluation metrics between the two annotators in the continuous dimensional model of affect. These metrics are defined in Sec. 2.2. We calculated these metrics in two scenarios: 1) the annotators agreed on the category of the image; 2) on all images that are annotated by two annotators. As Table 5 shows, when the annotators agreed on the category of the image, the annotations have a high correlation and sign agreement (SAGR). According to Table 6, this occurred on only 60.7% images. However, there is less correlation and SAGR on overall images, since the annotators had a different perception of emotions expressed in the images. It can also be seen that the annotators agreed on valence more than arousal. The authors believe that this is because the perception of valence (how positive or negative the emotion is) is easier and less subjective than arousal (how excited or calm the subject is) especially in still images. Comparing the metrics in the existing dimensional IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 9 TABLE 6 Agreement Between Two Annotators in Categorical Model of Affect (%) Neutral Happy Sad Surprise Fear Disgust Anger Contempt None Uncertain Non-Face Neutral 50.8 6.3 11.8 2.0 3.1 1.5 8.1 10.2 22.6 13.5 3.7 Happy 7.0 79.6 0.9 3.8 1.5 0.8 1.2 7.5 12.0 12.1 3.8 Sad 9.1 0.6 69.7 1.6 3.8 3.6 7.5 2.1 14.5 7.8 1.7 Surprise 2.8 1.7 1.2 66.5 15.3 1.2 1.7 0.5 8.0 7.3 1.1 Fear 1.1 0.3 3.4 14.0 61.1 3.5 2.9 0.5 6.0 4.0 0.9 Disgust 1.0 0.4 1.3 0.8 2.5 67.6 4.4 4.4 2.3 4.5 0.4 databases (shown in Table 2) with the agreement of human labelers on AffectNet, suggest that AffectNet is a very challenging database and even human annotations have more RMSE than automated methods on existing databases. 4 BASELINE In this section, two baselines are proposed to classify images in the categorical model and predict the value of valence and arousal in the continuous domain of dimensional model. Since deep Convolutional Neural Networks (CNNs) have been a successful approach to learn appropriate feature abstractions directly from the image and there are many samples in AffectNet necessary to train CNNs, we proposed two simple CNN baselines for both categorical and dimensional models. We also compared the proposed baselines with conventional approaches (Support Vector Machines [62] and Support Vector Regressions [63]) learned from hand-crafted features (HOG). In the following sections, we first introduce our training, validation and test sets, and then show the performance of each proposed baselines. 4.1 Test, Validation, and Training Sets Test set: The subset of the annotated images that are annotated by two annotators is reserved for the test set. To determine the value of valence and arousal in the test set, since there are two responses for one image in the continuous domain, one of the annotations is picked randomly. To select the category of image in the categorical model, if there was a disagreement, a favor was given to the intended query, i.e., if one of the annotators labeled the image as the intended query, the image was labeled with the intended query in the test set. This happened in 29.5% of the images with disagreement between the annotators. On the rest of the images with disagreement, one of the annotations was assigned to the image randomly. Since the test set is a random sampling of all images, it is heavily imbalanced. In other words, there are more than 11,000 images with happy expression while it contains only 1,000 images with contemptuous expression. Validation set: Five hundred samples of each category is selected randomly as a validation set. The validation set is used for hyper-parameter tuning, and since it is balanced, there is no need for any skew normalization. Training set: The rest of images are considered as training examples. The training examples, as shown in Table 3, are heavily imbalanced. 4.2 Anger 4.8 0.5 4.0 1.9 7.2 13.1 62.3 2.1 16.9 6.2 1.7 Contempt 5.3 3.0 0.3 0.6 0.0 1.7 1.3 66.9 1.3 2.6 0.4 None 11.1 4.6 3.5 4.2 1.9 2.7 5.5 3.7 9.6 12.3 1.2 Uncertain 1.9 1.0 1.2 1.9 0.4 2.3 1.9 1.5 4.3 20.6 1.4 Non-Face 5.1 2.2 2.6 2.7 3.3 2.1 3.3 0.6 2.6 8.9 83.9 Categorical Model Baseline Facial expression data is usually highly skewed. This form of imbalance is commonly referred to as intrinsic variation, i.e., it is a direct result of the nature of expressions in the real world. This happens in both the categorical and dimensional models of affect. For instance, Caridakis et al. [64] reported that a bias toward quadrant 1 (positive arousal, positive valence) exists in the SAL database. The problem of learning from imbalanced data sets has two challenges. First, training data with an imbalanced distribution often causes learning algorithms to perform poorly on the minority class [65]. Second, the imbalance in the test/validation data distribution can affect the performance metrics dramatically. Jeni et al. [53] studied the influence of skew on imbalanced validation set. The study showed that with exception of area under the ROC curve (AUC), all other studied evaluation metrics, i.e., Accuracy, F1-score, Cohens kappa [50], Krippendorfs Alpha [51], and area under Precision-Recall curve (AUCPR) are affected by skewed distributions dramatically. While AUC is unaffected by skew, precision-recall curves suggested that AUC may mask poor performance. To avoid or minimize skew-biased estimates of performance, the study suggested to report both skew-normalized scores and the original evaluation. We used AlexNet [57] architecture as our deep CNN baseline. AlexNet consists of five convolution layers, followed by max-pooling and normalization layers, and three fully-connected layers. To train our baseline with an imbalanced training set, four approaches are studied in this paper as Imbalanced learning, Down-Sampling, Up-Sampling, and Weighted-Loss. The imbalanced learning approach was trained with the imbalanced training set without any change in the skew of the dataset. To train the down-sampling approach, we selected a maximum of 15,000 samples from each class. Since there are less than 15,000 samples for some classes such as Disgust, Contempt, and Fear, the resulting training set is semi-balanced. To train the up-sampling approach, we heavily up-sampled the under-represented classes by replicating their samples so that all classes had the same number of samples as the class with maximum samples, i.e., Happy class. The weighted-loss approach weighted the loss function for each of the classes by their relative proportion in the training dataset. In other words, the loss function heavily penalizes the networks for misclassifying examples from under-represented classes, while penalizing networks less IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 10 TABLE 7 F1-Scores of four different approaches of training AlexNet Neutral Happy Sad Surprise Fear Disgust Anger Contempt Imbalanced Top-1 Top-2 Orig* Norm* Orig Norm 0.63 0.49 0.82 0.66 0.88 0.65 0.95 0.80 0.63 0.60 0.84 0.81 0.61 0.64 0.84 0.86 0.52 0.54 0.78 0.79 0.52 0.55 0.76 0.78 0.65 0.59 0.83 0.80 0.08 0.08 0.49 0.49 Down-Sampling Top-1 Top-2 Orig Norm Orig Norm 0.58 0.49 0.78 0.70 0.85 0.68 0.92 0.85 0.64 0.60 0.81 0.78 0.53 0.63 0.75 0.83 0.54 0.57 0.80 0.82 0.53 0.64 0.74 0.81 0.62 0.60 0.79 0.78 0.22 0.32 0.60 0.70 Up-Sampling Top-1 Top-2 Orig Norm Orig Norm 0.61 0.50 0.81 0.64 0.85 0.71 0.95 0.80 0.6 0.57 0.81 0.77 0.57 0.66 0.80 0.81 0.56 0.58 0.75 0.76 0.53 0.59 0.70 0.72 0.63 0.59 0.81 0.77 0.15 0.18 0.42 0.42 Weighted-Loss Top-1 Top-2 Orig Norm Orig Norm 0.57 0.52 0.81 0.77 0.82 0.73 0.92 0.88 0.63 0.61 0.83 0.81 0.51 0.63 0.77 0.86 0.56 0.66 0.79 0.86 0.48 0.66 0.69 0.83 0.60 0.60 0.81 0.81 0.27 0.59 0.58 0.79 *Orig and Norm stand for Original and skew-Normalized, respectively. for misclassifying examples from well-represented classes. The entropy loss formulation for a training example (X, l) is defined as: E=− K X Hl,i log(pˆi ) (6) i=1 where Hl,i denotes row l penalization factor of class i, K is the number of classes, and pˆi is the predictive softmax with values [0, 1] indicating the predicted probability of each class as: exp(xi ) (7) pˆi = PK j=1 exp(xj ) Equation (6) can be re-written as: exp(xi ) Hl,i log( P ) j exp(xj ) i X X X =− Hl,i xi + Hl,i log( exp(xj )) E= − X i = log( i X exp(xj )) j (8) j X Hl,i − i X Hl,i xi i The derivate with respect to the prediction xk is: X X ∂E ∂ ∂ X = [log( exp(xj )) Hl,i ] − [ Hl,i xi ] ∂xk ∂xk ∂xk j i i 1 ∂ X exp(xj ) − Hl,k j exp(xj ) ∂xk j X =( Hl,i ) P i X exp(xk ) =( Hl,i ) P − Hl,k j exp(xj ) i X =( Hl,i )pˆk − Hl,k i (9) When H = I , the identity, the proposed weighted-loss approach gives the traditional cross-entropy loss function. We used the implemented Infogain loss in Caffe [66] for this purpose. For simplicity, we used a diagonal matrix defined as: ( fi , if i = j Hij = fmin (10) 0, otherwise where fi is the number of samples of the ith class and fmin is the number of samples in the most under-represented class, i.e., Disgust class in this situation. Before training the network, the faces were cropped and resized to 256×256 pixels. No facial registration was performed at this baseline. To augment the data, five crops of 224×224 and their horizontal flips were extracted from the four corners and the center of the image at random during the training phase. The networks were trained for 20 epochs using a batch size of 256. The base learning rate was set to 0.01, and decreased step-wise by a factor of 0.1 every 10,000 iterations. We used a momentum of 0.9. Table 7 shows the top-1 and top-2 F1-Scores for the imbalanced learning, down-sampling, up-sampling, and weighted-loss approaches on the test set. Since the test set is imbalanced, both the skew-normalized and the original scores are reported. The skew normalization is performed by random under-sampling of the classes in the test set. This process is repeated 200 times, and the skew-normalized score is the average of the score on multiple trials. As it is shown, the weighted-loss approach performed better than other approaches in the skew-normalized fashion. The improvement is significant in under-represented classes, i.e., Contempt, Fear, and Disgust. The imbalanced approach performed worst in the Contempt and Disgust categories since there were a few training samples of these classes compared with other classes. The up-sampling approach also did not classify the Contempt and Disgust categories well, since the training samples of these classes were heavily upsampled (almost 20 times), and the network was over-fitted to these samples. Hence the network lost its generalization and performed poorly on these classes of the test set. The confusion matrix of the weighted-loss approaches is shown in Table 8. The weighted-loss approach classified the samples of Contempt and Disgust categories with an acceptable accuracy but did not perform well in Happy and Neutral. This is because the network was not penalized enough for misclassifying examples from these classes. We believe that a better formulation of the weight matrix H based on the number of samples in the mini-batches or other data-driven approaches can improve the recognition of wellrepresented classes. Table 9 shows accuracy, F1-score, Cohens kappa, Krippendorfs Alpha, area under the ROC curve (AUC), and area under the Precision-Recall curve (AUC-PR) on the test sets. Except for the accuracy, all the metrics are calculated in a binary-class manner where the positive class contains the samples labeled by the given category, and the negative class contains the rest. The reported result in Table 9 is the average of these metrics over eight classes. The accuracy is defined in a multi-class manner in which the number of correct predictions is divided by the total number of samples in the test set. The skew-normalization is performed by IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 11 NE HA SA SU FE DI AN CO NE 53.3 4.5 13.0 3.4 1.5 2.0 6.2 16.2 HA 2.8 72.8 1.3 1.2 1.5 2.2 1.2 13.1 SA 9.8 1.1 61.7 1.7 4.6 5.8 5.0 3.5 Predicted SU FE 8.7 1.7 6.0 0.6 3.6 5.8 69.9 18.9 13.5 70.4 3.3 6.2 3.2 5.8 3.1 0.5 DI 2.5 1.7 4.4 1.7 4.2 68.6 11.1 4.3 AN 10.4 1.0 9.2 2.8 4.3 10.6 65.8 5.7 CO 10.9 12.2 1.2 0.5 0.2 1.3 1.9 53.8 balancing the distribution of classes in the test set using random under-sampling and averaging over 200 trials. Since the validation set is balanced, there is no need for skewnormalization. We compared the performance of CNN baseline with a Support Vector Machine (SVM) [62]. To train SVM, the faces in the images were cropped and resized to 256×256 pixels. HOG [67] features were extracted with the cell size of 8. We applied PCA retaining 95% of the variance to reduce the HOG features dimensionality from 36,864 to 6,697 features. We used a linear kernel SVM in Liblinear package [68] (which is optimized for large-scale linear classification and regression). Table 9 shows the evaluation metrics of SVM. Reported AUC and AUCPR values for SVM are calculated using the LibLinear’s resulting decision values. We calculated the scores of predictions using a posterior-probability transformation sigmoid function. Comparing the performance of SVM with the CNN baselines on AffectNet, indicates that CNN models perform better than conventional SVM and HOG features in all metrics. We also compared the baseline with an available off-theshelf expression recognition system (Microsoft Cognitive Services emotion API [69]). The MS cognitive system had an excellent performance on Neutral and Happy categories with an accuracy of 0.94 and 0.85, respectively. However, it performed poorly on other classes with an accuracy of 0.25, 0.27 and 0.04 in the Fear, Disgust and Contempt categories. Table 9 shows the evaluation metrics on the MS cognitive system. Comparing the performance of the MS cognitive with the simple baselines on AffectNet indicates that AffectNet is a challenging database and a great resource to further improve the performance of facial expression recognition systems. Figure 5 shows nine samples of randomly selected misclassified images of the weighted-loss approach and their corresponding ground-truth. As the figure shows, it is really difficult to assign some of the emotions to a single category. Some of the faces have partial similarities in facial features to the misclassified images, such as nose wrinkled in disgust, or eyebrows raised in surprise. This emphasizes the fact that classifying facial expressions in the wild is a challenging task and, as mentioned before, even human annotators agreed on only 60.7% of the images. 4.3 Dimensional Model (Valence and Arousal) Baseline Predicting dimensional model in the continuous domain is a real-valued regression problem. We used AlexNet [57] architecture as our deep CNN baseline to predict the value Angry (Disgust) Disgust (Angry) Fear (Sad) Angry (Sad) Happy (Surprise) Fear (Surprise) Surprise (Fear) Angry (Fear) Angry (Disgust) Happy (Neutral) Sad (Angry) Happy (Contempt) Fig. 5. Samples of miss-classified images. Their corresponding groundtruth is given in parentheses. 0.25 Training Validation 0.2 error Actual TABLE 8 Confusion Matrix of Weighted-Loss Approach on the Test Set 0.15 0.1 0 2000 4000 6000 8000 10000 12000 14000 16000 iteration Fig. 6. Euclidean error of training valence and arousal. of valence and arousal. Particularly, two separate AlexNets were trained where the last fully-connected layer was replaced with a linear regression layer containing only one neuron. The output of the neuron predicted the value of valence/arousal in continuous domain [-1,1]. A Euclidean (L2) loss was used to measure the distance between the predicted value (ŷn ) and actual value of valence/arousal (yn ) as: N 1 X ||ŷn − yn ||22 (11) E= 2N n=1 The faces were cropped and resized to 256×256 pixels. The base learning rate was fixed and set to 0.001 during the training process. We used a momentum of 0.9. Training was continued until a plateau was reached in the Euclidean error of the validation set (approximately 16 epochs with a minibatch size of 256). Figure 6 shows the value of training and validation losses over 16K iterations (about 16 epochs). We also compared Support Vector Regression (SVR) [63] with our DNN baseline for predicting valence and arousal in AffectNet. In our experiments, first, the faces in the images were cropped and resized to 256×256 pixels. Histogram of Oriented Gradient (HOG) [67] features were extracted with the cell size of 8. Afterward, we applied PCA retaining 95% IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 12 TABLE 9 Evaluation Metrics and Comparison of CNN baselines, SVM and MS Cognitive on Categorical Model of Affect. Accuracy F1 -Score Kappa Alpha AUC AUCPR Imbalanced Orig Norm 0.72 0.54 0.57 0.52 0.53 0.46 0.52 0.45 0.85 0.80 0.56 0.55 CNN Baselines Down-Sampling Up-Sampling Orig Norm Orig Norm 0.68 0.58 0.68 0.57 0.56 0.57 0.56 0.55 0.51 0.51 0.52 0.49 0.51 0.51 0.51 0.48 0.82 0.85 0.82 0.84 0.54 0.57 0.55 0.56 TABLE 10 Baselines’ Performances of Predicting Valence and Arousal on Test Set RMSE CORR SAGR CCC CNN (AlexNet) Valence Arousal 0.394 0.402 0.602 0.539 0.728 0.670 0.541 0.450 SVR Valence Arousal 0.494 0.400 0.429 0.360 0.619 0.748 0.340 0.199 Fig. 7. RMSE of predicted valence and arousal using AlexNet and Euclidean (L2) loss (Best viewed in color). of the variance of these features to reduce the dimensionality. Two separate SVRs were trained to predict the value of valence and arousal. Liblinear [68] package was used to implement SVR baseline. Table 10 shows the performances of the proposed baseline and SVR on the test set. As shown, the CNN baseline can predict the value of valence and arousal better than SVR. This is because the high variety of samples in AffectNet allows the CNN to extract more discriminative features than hand-crafted HOG, and therefore it learned a better representation of dimensional affect. The RMSE of CNN baseline (AlexNet) between the predicted valence and arousal and the ground-truth are shown in Fig. 7. As illustrated, the CNN baseline has a lower error rate in the center of circumplex. In particular, predicting low-valence mid-arousal and low-arousal mid-valence areas were more challenging. These areas correspond to the expressions of contempt, bored, and sleepy. It should be mentioned that predicting valence and arousal in the wild is a challenging task, and as discussed in Sec. 3.3, the disagreement between two human annotators has RMSE=0.367 and RMSE=0.481 for valence and arousal, respectively. 5 Weighted-Loss Orig Norm 0.64 0.63 0.55 0.62 0.5 0.57 0.5 0.57 0.86 0.86 0.58 0.64 SVM Orig 0.60 0.37 0.32 0.31 0.77 0.39 Norm 0.37 0.31 0.25 0.22 0.70 0.37 MS Cognitive Orig 0.68 0.51 0.46 0.46 0.83 0.52 Norm 0.48 0.45 0.40 0.37 0.77 0.50 machine learning methodologies, and their performance highly depends on the amount and diversity of annotated training samples. Recently, databases of facial expression and affect in the wild received much attention. However, existing databases of facial affect in the wild only cover one model of affect, have a limited number of subjects, or contain few samples of certain emotions. The Internet is a vast source of facial images, most of which are captured in uncontrolled conditions. These images are often taken in the wild under natural conditions. In this paper, we introduced a new publicly available database of a facial Affect from the InterNet (called AffectNet) by querying different search engines using emotion related tags in six different languages. AffectNet contains more than 1M images with faces and extracted landmark points. Twelve human experts manually annotated 450,000 of these images in both the categorical and dimensional (valence and arousal) models and tagged the images that have any occlusion on the face. The agreement level of human labelers on a subset of AffectNet showed that expression recognition and predicting valence and arousal in the wild is a challenging task. The two annotators agreed on 60.7% of the category of facial expressions, and there was a large disagreement on the value of valence and arousal (RMSE=0.34 and 0.36) between the two annotators. Two simple deep neural network baselines were examined to classify the facial expression images and predict the value of valence and arousal in the continuous domain of dimensional model. Evaluation metrics showed that simple deep neural network baselines trained on AffectNet can perform better than conventional machine learning methods and available off-the-shelf expression recognition systems. AffectNet is by far the largest database of facial expression, valence and arousal in the wild, enabling further progress in the automatic understanding of facial behavior in both categorical and continuous dimensional space. The interested investigators can study categorical and dimensional models in the same corpus, and possibly co-train them to improve the performance of their affective computing systems. It is highly anticipated that the availability of this database for the research community, along with the recent advances in deep neural networks, can improve the performance of automated affective computing systems in recognizing facial expressions and predicting valence and arousal. C ONCLUSION The analysis of human facial behavior is a very complex and challenging problem. The majority of the techniques for automated facial affect analysis are mainly based on ACKNOWLEDGMENTS This work is partially supported by the NSF grants IIS1111568 and CNS-1427872. We gratefully acknowledge the IEEE TRANSACTIONS ON AFFECTIVE COMPUTING support of NVIDIA Corporation with the donation of the Tesla K40 GPUs used for this research. R EFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] J. Tao and T. Tan, “Affective computing: A review,” in International Conference on Affective Computing and Intelligent Interaction. Springer, 2005, pp. 981–995. 1 P. Ekman and W. V. Friesen, “Constants across cultures in the face and emotion.” Journal of personality and social psychology, vol. 17, no. 2, p. 124, 1971. 1 J. A. Russell, “A circumplex model of affect,” Journal of Personality and Social Psychology, vol. 39, no. 6, pp. 1161–1178, 1980. 1, 7, 8 P. Ekman and W. V. Friesen, “Facial action coding system,” 1977. 1 W. V. Friesen and P. Ekman, “Emfacs-7: Emotional facial action coding system,” Unpublished manuscript, University of California at San Francisco, vol. 2, p. 36, 1983. 1 S. Du, Y. Tao, and A. M. Martinez, “Compound facial expressions of emotion,” Proceedings of the National Academy of Sciences, vol. 111, no. 15, pp. E1454–E1462, 2014. 1, 3 M. Lyons, S. Akamatsu, M. Kamachi, and J. Gyoba, “Coding facial expressions with gabor wavelets,” in Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on. IEEE, 1998, pp. 200–205. 2 Y.-I. Tian, T. Kanade, and J. F. Cohn, “Recognizing action units for facial expression analysis,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 23, no. 2, pp. 97–115, 2001. 2 P. Lucey, J. F. Cohn, T. Kanade, J. Saragih, Z. Ambadar, and I. Matthews, “The extended cohn-kanade dataset (ck+): A complete dataset for action unit and emotion-specified expression,” in Computer Vision and Pattern Recognition Workshops (CVPRW), 2010 IEEE Computer Society Conference on. IEEE, 2010, pp. 94–101. 2, 3, 4 M. Pantic, M. Valstar, R. Rademaker, and L. Maat, “Web-based database for facial expression analysis,” in Multimedia and Expo, 2005. ICME 2005. IEEE International Conference on. IEEE, 2005, pp. 5–pp. 2, 3 R. Gross, I. Matthews, J. Cohn, T. Kanade, and S. Baker, “Multipie,” Image and Vision Computing, vol. 28, no. 5, pp. 807–813, 2010. 2, 3 J. F. Cohn and K. L. Schmidt, “The timing of facial motion in posed and spontaneous smiles,” International Journal of Wavelets, Multiresolution and Information Processing, vol. 2, no. 02, pp. 121– 132, 2004. 2 M. F. Valstar, M. Pantic, Z. Ambadar, and J. F. Cohn, “Spontaneous vs. posed facial behavior: automatic analysis of brow actions,” in Proceedings of the 8th international conference on Multimodal interfaces. ACM, 2006, pp. 162–170. 2 S. M. Mavadati, M. H. Mahoor, K. Bartlett, P. Trinh, and J. F. Cohn, “Disfa: A spontaneous facial action intensity database,” Affective Computing, IEEE Transactions on, vol. 4, no. 2, pp. 151–160, 2013. 2, 3, 4, 5 D. McDuff, R. Kaliouby, T. Senechal, M. Amr, J. Cohn, and R. Picard, “Affectiva-mit facial expression dataset (am-fed): Naturalistic and spontaneous facial expressions collected,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2013, pp. 881–888. 2, 3, 4, 5 I. Sneddon, M. McRorie, G. McKeown, and J. Hanratty, “The belfast induced natural emotion database,” IEEE Transactions on Affective Computing, vol. 3, no. 1, pp. 32–41, 2012. 2, 4 J. F. Grafsgaard, J. B. Wiggins, K. E. Boyer, E. N. Wiebe, and J. C. Lester, “Automatically recognizing facial expression: Predicting engagement and frustration.” in EDM, 2013, pp. 43–50. 2 A. Dhall, R. Goecke, J. Joshi, M. Wagner, and T. Gedeon, “Emotion recognition in the wild challenge 2013,” in Proceedings of the 15th ACM on International conference on multimodal interaction. ACM, 2013, pp. 509–516. 2, 3 I. J. Goodfellow, D. Erhan, P. L. Carrier, A. Courville, M. Mirza, B. Hamner, W. Cukierski, Y. Tang, D. Thaler, D.-H. Lee et al., “Challenges in representation learning: A report on three machine learning contests,” Neural Networks, vol. 64, pp. 59–63, 2015. 2, 3 A. Mollahosseini, B. Hasani, M. J. Salvador, H. Abdollahi, D. Chan, and M. H. Mahoor, “Facial expression recognition from world wild web,” in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2016. 2, 3, 5 13 [21] S. Zafeiriou, A. Papaioannou, I. Kotsia, M. A. Nicolaou, and G. Zhao, “Facial affect “in-the-wild”: A survey and a new database,” in International Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, Affect ”in-the-wild” Workshop, June 2016. 2, 3, 4 [22] C. F. Benitez-Quiroz, R. Srinivasan, and A. M. Martinez, “Emotionet: An accurate, real-time algorithm for the automatic annotation of a million facial expressions in the wild,” in Proceedings of IEEE International Conference on Computer Vision & Pattern Recognition (CVPR16), Las Vegas, NV, USA, 2016. 2, 3, 5 [23] M. A. Nicolaou, H. Gunes, and M. Pantic, “Audio-visual classification and fusion of spontaneous affective data in likelihood space,” in Pattern Recognition (ICPR), 2010 20th International Conference on. IEEE, 2010, pp. 3695–3699. 3 [24] ——, “Continuous prediction of spontaneous affect from multiple cues and modalities in valence-arousal space,” IEEE Transactions on Affective Computing, vol. 2, no. 2, pp. 92–105, 2011. 3, 5 [25] F. Ringeval, A. Sonderegger, J. Sauer, and D. Lalanne, “Introducing the recola multimodal corpus of remote collaborative and affective interactions,” in Automatic Face and Gesture Recognition (FG), 2013 10th IEEE International Conference and Workshops on. IEEE, 2013, pp. 1–8. 3, 4 [26] S. Koelstra, C. Muhl, M. Soleymani, J.-S. Lee, A. Yazdani, T. Ebrahimi, T. Pun, A. Nijholt, and I. Patras, “Deap: A database for emotion analysis; using physiological signals,” IEEE Transactions on Affective Computing, vol. 3, no. 1, pp. 18–31, 2012. 3, 4, 5 [27] A. Dhall, R. Goecke, S. Lucey, and T. Gedeon, “Static facial expression analysis in tough conditions: Data, evaluation protocol and benchmark,” in Computer Vision Workshops (ICCV Workshops), 2011 IEEE International Conference on. IEEE, 2011, pp. 2106–2112. 3 [28] A. Mollahosseini and M. H. Mahoor, “Bidirectional warping of active appearance model,” in Computer Vision and Pattern Recognition Workshops (CVPRW), 2013 IEEE Conference on. IEEE, 2013, pp. 875–880. 3 [29] S. Ren, X. Cao, Y. Wei, and J. Sun, “Face alignment at 3000 fps via regressing local binary features,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 1685–1692. 3, 6 [30] L. Yu, “face-alignment-in-3000fps,” https://github.com/ yulequan/face-alignment-in-3000fps, 2016. 3, 6 [31] G. A. Miller, “Wordnet: a lexical database for english,” Communications of the ACM, vol. 38, no. 11, pp. 39–41, 1995. 3 [32] P. Viola and M. J. Jones, “Robust real-time face detection,” International journal of computer vision, vol. 57, no. 2, pp. 137–154, 2004. 3 [33] D. You, O. C. Hamsici, and A. M. Martinez, “Kernel optimization in discriminant analysis,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 3, pp. 631–638, 2011. 3 [34] P. Lucey, J. F. Cohn, K. M. Prkachin, P. E. Solomon, and I. Matthews, “Painful data: The unbc-mcmaster shoulder pain expression archive database,” in Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on. IEEE, 2011, pp. 57–64. 4 [35] M. M. Bradley and P. J. Lang, “Measuring emotion: the selfassessment manikin and the semantic differential,” Journal of behavior therapy and experimental psychiatry, vol. 25, no. 1, pp. 49–59, 1994. 4 [36] B. Schuller, M. Valstar, F. Eyben, G. McKeown, R. Cowie, and M. Pantic, “Avec 2011–the first international audio/visual emotion challenge,” in International Conference on Affective Computing and Intelligent Interaction. Springer, 2011, pp. 415–424. 4, 5 [37] B. Schuller, M. Valster, F. Eyben, R. Cowie, and M. Pantic, “Avec 2012: the continuous audio/visual emotion challenge,” in Proceedings of the 14th ACM international conference on Multimodal interaction. ACM, 2012, pp. 449–456. 4, 5 [38] M. Valstar, B. Schuller, K. Smith, F. Eyben, B. Jiang, S. Bilakhia, S. Schnieder, R. Cowie, and M. Pantic, “Avec 2013: the continuous audio/visual emotion and depression recognition challenge,” in Proceedings of the 3rd ACM international workshop on Audio/visual emotion challenge. ACM, 2013, pp. 3–10. 4 [39] M. Valstar, B. Schuller, K. Smith, T. Almaev, F. Eyben, J. Krajewski, R. Cowie, and M. Pantic, “Avec 2014: 3d dimensional affect and depression recognition challenge,” in Proceedings of the 4th International Workshop on Audio/Visual Emotion Challenge. ACM, 2014, pp. 3–10. 4 [40] F. Ringeval, B. Schuller, M. Valstar, R. Cowie, and M. Pantic, “Avec 2015: The 5th international audio/visual emotion challenge and IEEE TRANSACTIONS ON AFFECTIVE COMPUTING [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] [61] workshop,” in Proceedings of the 23rd ACM international conference on Multimedia. ACM, 2015, pp. 1335–1336. 4, 5 M. Valstar, J. Gratch, B. Schuller, F. Ringeval, D. Lalanne, M. T. Torres, S. Scherer, G. Stratou, R. Cowie, and M. Pantic, “Avec 2016-depression, mood, and emotion recognition workshop and challenge,” arXiv preprint arXiv:1605.01600, 2016. 4, 5 G. McKeown, M. Valstar, R. Cowie, M. Pantic, and M. Schroder, “The semaine database: Annotated multimodal records of emotionally colored conversations between a person and a limited agent,” IEEE Transactions on Affective Computing, vol. 3, no. 1, pp. 5–17, 2012. 4 A. Mollahosseini, D. Chan, and M. H. Mahoor, “Going deeper in facial expression recognition using deep neural networks,” IEEE Winter Conference on Applications of Computer Vision (WACV), 2016. 5 C. Shan, S. Gong, and P. W. McOwan, “Facial expression recognition based on local binary patterns: A comprehensive study,” Image and Vision Computing, vol. 27, no. 6, pp. 803–816, 2009. 5 X. Zhang, M. H. Mahoor, and S. M. Mavadati, “Facial expression recognition using {l} {p}-norm mkl multiclass-svm,” Machine Vision and Applications, pp. 1–17, 2015. 5 L. He, D. Jiang, L. Yang, E. Pei, P. Wu, and H. Sahli, “Multimodal affective dimension prediction using deep bidirectional long shortterm memory recurrent neural networks,” in Proceedings of the 5th International Workshop on Audio/Visual Emotion Challenge. ACM, 2015, pp. 73–80. 5, 6 Y. Fan, X. Lu, D. Li, and Y. Liu, “Video-based emotion recognition using cnn-rnn and c3d hybrid networks,” in Proceedings of the 18th ACM International Conference on Multimodal Interaction. ACM, 2016, pp. 445–450. 5 Y. Tang, “Deep learning using linear support vector machines,” arXiv preprint arXiv:1306.0239, 2013. 5 M. Sokolova, N. Japkowicz, and S. Szpakowicz, “Beyond accuracy, f-score and roc: a family of discriminant measures for performance evaluation,” in Australasian Joint Conference on Artificial Intelligence. Springer, 2006, pp. 1015–1021. 4 J. Cohen, “A coefficient of agreement for nominal scales,” Educational and Psychological Measurement, vol. 20, no. 1, p. 37, 1960. 4, 9 K. Krippendorff, “Estimating the reliability, systematic error and random error of interval data,” Educational and Psychological Measurement, vol. 30, no. 1, pp. 61–70, 1970. 4, 9 P. E. Shrout and J. L. Fleiss, “Intraclass correlations: uses in assessing rater reliability.” Psychological bulletin, vol. 86, no. 2, p. 420, 1979. 4 L. A. Jeni, J. F. Cohn, and F. De La Torre, “Facing imbalanced data–recommendations for the use of performance metrics,” in Affective Computing and Intelligent Interaction (ACII), 2013 Humaine Association Conference on. IEEE, 2013, pp. 245–251. 4, 9 S. Bermejo and J. Cabestany, “Oriented principal component analysis for large margin classifiers,” Neural Networks, vol. 14, no. 10, pp. 1447–1461, 2001. 4 M. Mohammadi, E. Fatemizadeh, and M. H. Mahoor, “Pca-based dictionary building for accurate facial expression recognition via sparse representation,” Journal of Visual Communication and Image Representation, vol. 25, no. 5, pp. 1082–1092, 2014. 5 C. Liu and H. Wechsler, “Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition,” IEEE Trans. Image Process., vol. 11, no. 4, pp. 467–476, 2002. 5 A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105. 5, 9, 11 A. Toshev and C. Szegedy, “Deeppose: Human pose estimation via deep neural networks,” in Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on. IEEE, 2014, pp. 1653–1660. 5 Y. Taigman, M. Yang, M. Ranzato, and L. Wolf, “Deepface: Closing the gap to human-level performance in face verification,” in Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on. IEEE, 2014, pp. 1701–1708. 5 C. Sagonas, E. Antonakos, G. Tzimiropoulos, S. Zafeiriou, and M. Pantic, “300 faces in-the-wild challenge: Database and results,” Image and Vision Computing, vol. 47, pp. 3–18, 2016. 6 G. Paltoglou and M. Thelwall, “Seeing stars of valence and arousal in blog posts,” IEEE Transactions on Affective Computing, vol. 4, no. 1, pp. 116–123, 2013. 7 14 [62] C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning, vol. 20, no. 3, pp. 273–297, 1995. 9, 11 [63] A. Smola and V. Vapnik, “Support vector regression machines,” Advances in neural information processing systems, vol. 9, pp. 155– 161, 1997. 9, 11 [64] G. Caridakis, K. Karpouzis, and S. Kollias, “User and context adaptive neural networks for emotion recognition,” Neurocomputing, vol. 71, no. 13, pp. 2553–2562, 2008. 9 [65] H. He and E. A. Garcia, “Learning from imbalanced data,” IEEE Trans. Knowl. Data Eng., vol. 21, no. 9, pp. 1263–1284, 2009. 9 [66] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, “Caffe: Convolutional architecture for fast feature embedding,” in Proceedings of the 22nd ACM international conference on Multimedia. ACM, 2014, pp. 675–678. 10 [67] N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR’05), vol. 1. IEEE, 2005, pp. 886–893. 11 [68] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin, “Liblinear: A library for large linear classification,” Journal of machine learning research, vol. 9, no. Aug, pp. 1871–1874, 2008. 11, 12 [69] “Microsoft cognitive services - emotion api,” https://www. microsoft.com/cognitive-services/en-us/emotion-api, (Accessed on 12/01/2016). 11 Ali Mollahosseini received the BSc degree in computer software engineering from the Iran University of Science and Technology, Iran, in 2006, and the MSc degree in computer engineering - artificial intelligence from AmirKabir University, Iran, in 2010. He is currently working toward the Ph.D. degree and is a graduate research assistant in the Department of Electrical and Computer Engineering at the University of Denver. His research interests include deep neural networks for the analysis of facial expression, developing humanoid social robots and computer vision. Behzad Hasani received the BSc degree in computer hardware engineering from Khaje Nasir Toosi University of Technology, Tehran, Iran, in 2013, and the MSc degree in computer engineering - artificial intelligence from Iran University of Science and Technology, Tehran, Iran, in 2015. He is currently pursuing his Ph.D. degree in electrical & computer engineering and is a graduate research assistant in the Department of Electrical and Computer Engineering at the University of Denver. His research interests include Computer Vision, Machine Learning, and Deep Neural Networks, especially on facial expression analysis. Mohammad H. Mahoor received the BS degree in electronics from the Abadan Institute of Technology, Iran, in 1996, the MS degree in biomedical engineering from the Sharif University of Technology, Iran, in 1998, and the Ph.D. degree in electrical and computer engineering from the University of Miami, Florida, in 2007. He is an Associate Professor of Electrical and Computer Engineering at DU. He does research in the area of computer vision and machine learning including visual object recognition, object tracking and pose estimation, motion estimation, 3D reconstruction, and humanrobot interaction (HRI) such as humanoid social robots for interaction and intervention with children with special needs (e.g., autism) and elderly with depression and dementia. He has received over $3M of research funding from state and federal agencies including the National Science Foundation. He is a Senior Member of IEEE and has published about 100 conference and journal papers. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 15 A PPENDIX A TABLE 11 Samples of Annotated Categories for Queried Emotion Terms Happy Annotated Expression Neutral Happy Sad Surprise Fear Disgust Anger Contempt None Uncertain Non-Face Sad Queried Expression Surprise Fear Disgust Anger Contempt IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 16 TABLE 12 Samples of Annotated Images by Two Annotators (Randomly selected) Neutral Happy Sad Surprise Fear Annotator 1 Disgust Anger Contempt None Annotator 2 Neutral Happy Sad Surprise Fear Disgust Anger Contempt None Uncertain Non-Face TABLE 13 Agreement percentage between Two Annotators in Categorical Model of Affect (%) A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 A11 A12 A1* 0.0** 69 70 68 0 0 0 0 0 0 0 0 A2 69 0 64.9 68.3 0 0 0 64.7 0 0 0 0 A3 70 64.9 0 70.6 67.4 69.9 63 62.3 0 48.1 0 0 A4 68 68.3 70.6 0 70.4 70.8 64.3 67.5 0 27.5 0 0 A5 0 0 67.4 70.4 0 70.6 0 0 0 0 0 0 A6 0 0 69.9 70.8 70.6 0 0 0 0 0 0 0 A7 0 0 63 64.3 0 0 0 0 0 75.8 0 0 A8 0 64.7 62.3 67.5 0 0 0 0 51.1 0 0 0 A9 0 0 0 0 0 0 0 51.1 0 0 54.4 0 * A1 to A12 indicate Annotators 1 to 12 ** Zero means that there were no common images between the two annotators A10 0 0 48.1 27.5 0 0 75.8 0 0 87.5 0 61.9 A11 0 0 0 0 0 0 0 0 54.4 0 0 0 A12 0 0 0 0 0 0 0 0 0 61.9 0 0 Uncertain Non-Face IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 17 Arousal V: -0.2 A: 0.87 V: 0.2 A: 0.85 V: -0.6 A: 0.75 V: 0.3 A: 0.62 V: -0.4 A: 0.6 V: 0.68 A: 0.66 V: 0.1 A: 0.46 V: -0.77 A: 0.45 V: -0.35 A: 0.28 Valence V: 0.35 A: 0.3 V: -0.95 A: 0.19 V: 0.95 A: 0.17 V: 0.0 A: 0.0 V: -0.55 A: -0.1 V: 0.97 A: -0.1 V: 0.4 A: -0.41 V: -0.3 A: -0.35 V: -0.85 A: -0.38 V: -0.55 A: -0.6 V: 0.23 A: -0.65 V: 0.7 A: -0.73 V: -0.47 A: -0.73 V: -0.12 A: -0.75 V: 0.1 A: -0.85 V: 0.0 A: -0.98 Fig. 8. Sample images in Valence Arousal circumplex with their corresponding Valence and Arousal values (V: Valence, A: Arousal). Arousal TABLE 14 Number of annotated images in each range/area of valence and arousal [.8,1] [.6,.8] [.4,.6] [.2,.4] [0,.2] [-.2,0] [-.4,-.2] [-.6,-.4] [-.8,-.6] [-1,-.8] [-1,-.8] 0 0 638 6770 3331 395 787 610 0 0 [-.8,-.6] 0 74 720 9283 1286 577 1364 7800 3537 0 [-.6,-.4] 21 161 312 3884 2971 5422 3700 2645 8004 4123 [-.4,-.2] 674 561 505 2473 4854 3675 6344 3571 4374 1759 Valence [-.2,0] [0,.2] 1021 521 706 1006 2689 1905 5530 2296 14083 15300 9024 23201 2804 1745 2042 2517 5066 3379 4836 1845 [.2,.4] 60 432 1228 3506 4104 6237 821 1993 4169 1672 [.4,.6] 57 738 992 1824 9998 42219 5241 467 944 739 [.6,.8] 0 530 3891 2667 13842 23281 10619 1271 873 0 [.8,1] 0 0 957 1125 9884 21040 9934 921 0 0 IEEE TRANSACTIONS ON AFFECTIVE COMPUTING 18 TABLE 15 Evaluation Metrics and Comparison of CNN baselines, SVM and MS Cognitive on Categorical Model of Affect on the Validation Set. Accuracy F 1-Score Kappa Alpha AUCPR AUC Imbalanced 0.40 0.34 0.32 0.39 0.42 0.74 CNN Baselines Down-Sampling Up-Sampling 0.50 0.47 0.49 0.44 0.42 0.38 0.42 0.37 0.48 0.44 0.47 0.75 Weighted-Loss 0.58 0.58 0.51 0.51 0.56 0.82 SVM MS Cognitive 0.30 0.24 0.18 0.13 0.30 0.68 0.37 0.33 0.27 0.23 0.38 0.70 TABLE 16 Baselines’ Performances of Predicting Valence and Arousal on the Validation Set RMSE CORR SAGR CCC CNN (AlexNet) Valence Arousal 0.37 0.41 0.66 0.54 0.74 0.65 0.60 0.34 SVR Valence Arousal 0.55 0.42 0.35 0.31 0.57 0.68 0.30 0.18
1cs.CV
EXPLICIT BELYI MAPS OVER Q HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS arXiv:1703.02848v1 [math.NT] 8 Mar 2017 DOMINIK BARTH AND ANDREAS WENZ Abstract. We present all Belyi maps f : P1 C → P1 C having almost simple primitive monodromy groups (not isomorphic to An or Sn ) containing rigid and rational generating triples of degree between 50 and 250. This also leads to new polynomials having almost simple Galois groups over Q(t). 1. Introduction A triple (x, y, z) ∈ Sn3 is called nice if it satisfies the following conditions: • xyz = 1. • hx, yi is not a full symmetric or alternating group. • hx, yi is primitive and almost simple. • (x, y, z) is a genus 0 triple. • (x, y, z) is rigid and each element is contained in a rational conjugacy class of hx, yi. Using Magma [3] we can find all nice triples of permutation degree between 50 and 250. Theorem. There are exactly 10 nice triples (x, y, z) up to simultaneous conjugation with hx, y, zi being a permutation group of degree between 50 and 250. These triples generate the following groups: group degree ] nice triples Aut(PSL(3, 3)) 52 1 PGL(2, 11) 55 2 NS56 (PSL(3, 4)) 56 1 Aut(PSU(3, 3)) 63 1 Aut(M22 ) 77 1 PSp(4, 4):2 85 1 Aut(HS) 100 2 + O (8, 2) 135 1 According to Riemann’s existence theorem and the Riemann-Hurwitz formula every nice triple (x, y, z) of the previous theorem leads to a 3-branchpoint covering f˜ : P1 C → P1 C (also called Belyi map) with monodromy group isomorphic to hx, yi. Combining the rational rigidity criterion and some additional rationality considerations shows the existence of a Möbius 2010 Mathematics Subject Classification. 12F12. Key words and phrases. Inverse Galois Problem, Belyi Maps, almost simple groups. 1 2 DOMINIK BARTH AND ANDREAS WENZ transformation µ such that f := f˜ ◦ µ ∈ Q(X), see [4] and [5]. Note that Belyi maps are unique up to inner and outer Möbius transformations. In this paper we will present Belyi maps to all nice triples of the theorem and verify their respective monodromy group. 2. Computed Results and Verification We use the following definitions and facts: Let f = p/q ∈ Q(X) be of degree n where p and q are coprime polynomials in Q[X]. The arithmetic monodromy group of f is defined as A := Gal(p(X) − tq(X) ∈ Q(t)[X]), and the geometric monodromy group as G := Gal(p(X) − tq(X) ∈ C(t)[X]). Both groups act transitively on the n roots of p(X) − tq(X) in a splitting field and we have G E A ≤ Sn . The subdegrees of A correspond to the degrees of the irreducible factors of p(X) − f (t)q(X) ∈ Q(t)[X]. In order to verify the respective geometric monodromy groups we will pursue the following idea: The first step is to check whether the computed function f = p/q = 1+r/q is indeed a Belyi map, i.e. a three branch point covering P1 C → P1 C ramified over 0, 1 and ∞. This can be done by combining the Riemann-Hurwitz genus formula with the factorization of the polynomials p, q, r ∈ Q[X]. We will omit this easy computation in the following. The next step is to obtain the subdegrees of the arithmetic monodromy group A. In most cases we can then apply the following obvious divisibility criterion: If there is no subset of the subdegrees containing 1 adding up to a nontrivial divisor of the permutation degree, then A is primitive. If this fails we can apply Ritt’s theorem which states that A is imprimitive if and only if f decomposes nontrivially into f = g ◦ h with g, h ∈ Q(X). The latter can be tested by the decomposition algorithm found in [1]. By checking the Magma database for finite primitive groups having the desired subdegrees we obtain a list of possibilities for the arithmetic monodromy group A, and for the geometric monodromy group G, since G E A. Fortunately, in most cases only one of these groups contains elements having the same cycle structure as x, y and z. This turns out to be the geometric monodromy group G. Once G has been determined we check if G contains exactly one generating permutation triple (up to simultaneous conjugation) having the desired cycle structure. In our examples this is always the case and ensures that the ramification data over 0, 1, ∞ is indeed given by {x, y, z}. Note that due to the rational rigidity of (x, y, z) the splitting field of p(X) − tq(X) ∈ Q(t)[X] is regular over Q, thus we have A = G. Aut(PSL(3,3)) of degree 52. We begin with the nice triple (x, y, (xy)−1 ) generating Aut(PSL(3, 3)) where x = (1, 41, 8, 9, 45, 32, 39, 44)(2, 13, 29, 21, 50, 26, 34, 6)(3, 35, 52, 30) (4, 7, 22, 18, 33, 43, 10, 38)(5, 37, 27, 42, 25, 15, 12, 24) (11, 51, 17, 47, 36, 31, 49, 40)(14, 20, 28, 48)(16, 19, 23, 46) BELYI MAPS HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS 3 and y = (1, 20)(2, 34)(3, 7)(4, 16)(5, 17)(8, 41)(9, 13)(10, 52)(11, 40) (12, 23)(14, 29)(15, 25)(18, 33)(19, 47)(21, 35)(22, 43)(26, 42) (27, 45)(28, 36)(31, 39)(32, 49)(37, 51)(38, 48)(46, 50) of type x (xy)−1 y cycle structure 85 .43 224 .14 410 .24 .14 The corresponding Belyi map f = p/q = 1 + r/q is given by p(X) = 22 · (4X 4 − 16X 3 − 24X 2 − 8X − 1)2 · (4X 4 − 16X 3 − 18X 2 − 8X − 1) · (4X 4 + 8X 3 + 36X 2 + 28X + 5)4 · (4X 6 − 36X 5 − 24X 4 − 4X 3 + 9X 2 + 3X + 1)4 and r(X) = 33 · (X + 1)8 · (2X 2 − 8X − 1)8 · (2X 2 + 1)4 · (6X 2 + 4X + 1)8 . Verification of monodromy. The factorization p(X) − f (t)q(X) ∈ Q(t)[X] yields that A has subdegrees 1, 6, 18, 27. Using the divisibility criterion we find that A is primitive. As there is only one primitive permutation group of degree 52 with these subdegrees we obtain A = Aut(PSL(3, 3)). Since G is normal in A we have G = PSL(3, 3) or G = Aut(PSL(3, 3)). The first case can be ruled out because PSL(3, 3) does not contain elements having the same cycle structure as (xy)−1 , thus G = A = Aut(PSL(3, 3)).  PGL(2,11) of degree 55. This group has exactly two nice triples (x, y, (xy)−1 ) up to simultaneous conjugation. The first one is given by x = (1, 33, 17, 8, 41, 32)(2, 51, 45, 36, 55, 50)(3, 43, 47, 24, 44, 25) (4, 40, 49, 52, 18, 6)(5, 7, 26, 16, 37, 23)(9, 21, 22, 38, 31, 20) (10, 48, 29, 30, 35, 19)(11, 28, 54)(12, 15, 13, 34, 42, 27)(39, 46, 53) and y = (1, 26)(2, 41)(3, 51)(4, 32)(5, 29)(6, 37)(7, 20)(8, 47)(10, 44)(11, 50) (12, 52)(13, 15)(14, 35)(17, 46)(18, 23)(19, 42)(21, 48)(24, 38) (25, 45)(27, 30)(31, 39)(33, 53)(34, 36)(40, 54)(49, 55) of type x y (xy)−1 cycle structure 68 .32 .11 225 .15 412 .23 .11 4 DOMINIK BARTH AND ANDREAS WENZ This triple corresponds to the Belyi map f = p/q = 1 + r/q where q(X) = 114 · (2X + 1) · (176X 3 + 1056X 2 + 330X + 31)4 · (264X 3 + 154X 2 + 22X + 1)4 · (352X 3 + 264X 2 + 99X + 14)4 · (704X 3 + 132X 2 + 1)4 · (1408X 3 + 693X 2 + 132X + 8)2 and r(X) = − 24 · (22X 2 − 11X − 2)6 · (44X 2 + 22X + 3)6 · (88X 2 + 55X + 1)6 · (176X 2 + 44X + 5)6 · (704X 2 + 242X + 17)3 . Verification of monodromy. The polynomial p(X)−f (t)q(X) ∈ Q(t)[X] factorizes into irreducible polynomials of degree 1, 6, 12, 12, 12, 12, thus A must have the subdegrees 1, 6, 12, 12, 12, 12 and the primitivity of A follows from the divisibility criterion. The only primitive group of degree 55 having these subdegrees is PGL(2, 11). Since G is normal in PGL(2, 11) we have G = PGL(2, 11) or G = PSL(2, 11). The latter case can be ruled out because PSL(2, 11) does not contain elements with the cycle structure of y. We find G = A = PGL(2, 11).  Concerning the second nice triple (x, y, (xy)−1 ) in PGL(2, 11) we have x = (2, 54, 55, 3)(4, 42, 33, 47)(5, 46, 48, 41)(6, 27, 49, 50)(7, 17, 38, 26) (8, 37, 36, 22)(9, 30, 32, 51)(10, 21, 19, 35)(11, 44, 39, 20)(12, 45, 31, 34) (13, 52, 40, 53)(14, 23, 29, 28)(15, 16, 18, 25) and y = (1, 22)(2, 34)(3, 41)(4, 39)(5, 50)(6, 52)(8, 42)(9, 54)(10, 27)(11, 23) (12, 24)(14, 44)(15, 49)(16, 33)(17, 35)(18, 37)(19, 32)(21, 40)(25, 46) (26, 47)(28, 48)(29, 45)(31, 38)(43, 53)(51, 55) of type x y (xy)−1 cycle structure 413 .13 225 .15 68 .31 .22 The computed results for this Belyi map f = p/q = 1 + r/q are q(X) = 24 · (3X − 1)3 · (2X 2 − 5X − 1)6 · (3X 2 − 2X + 4)2 · (12X 2 − 8X + 5)6 · (12X 4 + 6X 3 + 19X 2 − 3X + 3)6 and r(X) = − 33 · 115 · (4X 3 − 4X 2 + 5X − 3)4 · (6X 3 + 5X 2 + 2X + 1)4 · (12X 3 − 56X 2 + 15X − 9) · (72X 6 − 144X 5 + 230X 4 − 134X 3 + 61X 2 − 14X + 2)4 . BELYI MAPS HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS 5 Verification of monodromy. The subdegrees of A are 1, 4, 6, 8, 12, 24. By applying the decomposition algorithm we see that f is indecomposable and thus A is primitive by Ritt’s theorem. It follows G = PGL(2, 11) or G = PSL(2, 11) and since there are no elements of cycle structure 225 .15 in PSL(2, 11) we conclude again G = A = PGL(2, 11).  NS56 (PSL(3, 4)) of degree 56. The only nice permutation triple (x, y, (xy)−1 ) in this group is given by x = (1, 36, 2, 5)(3, 47)(7, 45, 33, 22)(8, 31, 55, 14)(9, 21, 50, 48)(10, 16, 40, 39) (11, 54)(12, 19, 49, 23)(13, 41, 42, 15)(17, 56, 24, 30)(18, 53, 44, 25) (20, 52, 28, 35)(26, 29, 46, 37)(27, 34, 51, 43) and y = (1, 27, 36, 32)(2, 43, 50, 14, 52, 17, 30, 54)(3, 38, 47, 29, 33, 53, 16, 46) (4, 7, 22, 26, 28, 55, 44, 45)(5, 11, 24, 56, 20, 12, 41, 34) (6, 40, 18, 19, 35, 37, 10, 39)(8, 21)(9, 48, 51, 13, 15, 49, 25, 31)(23, 42) having the following cycle structure x y cycle structure 412 .22 .14 86 .41 .22 (xy)−1 225 .16 The Belyi map f = p/q = 1 + r/q consists of p(X) = (X 2 − 6X − 1)2 · (3X 4 − 468X 3 − 258X 2 − 60X − 5) · (3X 4 + 36X 3 + 54X 2 + 60X + 19)4 · (3X 8 − 96X 7 − 12X 6 + 432X 5 + 1498X 4 − 320X 3 − 348X 2 − 80X − 5)4 and r(X) = − 22 · 55 · (X 2 + 2X + 3)2 · (3X 2 + 6X + 1)8 · (3X 4 − 12X 3 + 38X 2 + 12X + 3)8 Verification of monodromy. The subdegrees of A turn out to be 1, 10, 45, thus A is primitive. There are five finite primitive groups having these subdegrees, all between PSL(3, 4) and NS56 (PSL(3, 4)). As PSL(3, 4) is simple these five groups are also the only possibilities for the geometric monodromy group G E A. However, only NS56 (PSL(3, 4)) contains a generating triple with the desired cycle structure. It follows A = G = NS56 (PSL(3, 4)).  Aut(PSU(3,3)) of degree 63. This group only has the nice triple (x, y, (xy)−1 ) where x = (1, 43, 31, 39, 63, 35, 2)(3, 17, 24, 21, 20, 55, 53)(4, 29, 62, 11, 14, 45, 27) (5, 38, 23, 32, 48, 18, 51)(6, 13, 36, 47, 25, 8, 61)(7, 9, 15, 56, 34, 28, 42) (10, 33, 59, 60, 44, 19, 37)(12, 26, 52, 30, 54, 49, 41) (16, 40, 57, 50, 22, 46, 58) 6 DOMINIK BARTH AND ANDREAS WENZ and y = (2, 53)(3, 9)(4, 38)(5, 29)(6, 51)(8, 25)(10, 19)(11, 20)(12, 44)(13, 43) (14, 21)(16, 40)(17, 32)(18, 39)(22, 62)(23, 30)(24, 26)(27, 59)(33, 54) (34, 63)(35, 56)(36, 55)(41, 49)(42, 48)(45, 60)(46, 61)(47, 50)(57, 58) of type x y (xy)−1 cycle structure 79 228 .17 412 .26 .13 The corresponding Belyi map is given by f = p/q = 1 + r/q where r(X) = − 28 · 312 · (X 2 − X + 2)7 · (X 3 + 2X 2 − X − 1)7 · (X 3 + 9X 2 − X − 1)7 and q(X) = (X 3 + 30X 2 + 27X + 6) ·(X 6 + 18X 5 + 93X 4 + 169X 3 + 144X 2 − 75X − 62)2 ·(X 12 + 15X 11 − 15X 10 − 332X 9 − 2766X 8 + 4002X 7 + 2002X 6 − 2496X 5 − 1215X 4 + 1047X 3 + 117X 2 − 108X + 36)4 . Verification of monodromy. The subdegrees of A are 1, 6, 24, 32. Again, by applying the decomposition algorithm we see that A is primitive and only three possibilities for A remain. Since G is normal in A there are four possibilities for G. Fortunately, among these groups only Aut(PSU(3, 3)) contains elements of cycle structure of y and (xy)−1 . This yields G = A = Aut(PSU(3, 3)).  Aut(M22 ) of degree 77. The only nice triple (x, y, (xy)−1 ) is given by x = (1, 14, 3, 53, 31, 27, 71, 62, 10, 65, 61)(2, 50, 46, 29, 12, 7, 56, 19, 63, 28, 25) (4, 36, 38, 44, 17, 13, 66, 43, 39, 9, 72)(5, 49, 68, 51, 58, 59, 70, 15, 11, 23, 33) (6, 55, 42, 67, 32, 21, 45, 64, 48, 77, 57)(8,41,60,20, 26, 74, 76, 24, 69, 52, 40) (16, 22, 54, 35, 34, 37, 18, 73, 75, 30, 47) and y = (1, 54)(2, 59)(3, 48)(4, 20)(6, 32)(7, 29)(11, 38)(13, 43)(14, 51)(15, 19) (18, 37)(21, 57)(22, 46)(24, 73)(30, 44)(31, 40)(33, 45)(34, 52)(35, 71) (36, 64)(39, 75)(47, 56)(49, 77)(50, 58)(53, 60)(62, 65)(63, 70)(72, 76) of type x y (xy)−1 cycle structure 117 228 .121 416 .26 .11 The corresponding Belyi map is f = p/q = 1 + r/q with p(X) = 222 · (X 2 + X + 3)11 · (X 5 − 3X 4 − 14X 3 + 15X 2 + X − 1)11 BELYI MAPS HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS 7 and r(X) = − 114 · (X 4 + 2X 3 + 7X 2 − 16X − 2)4 ·(X 6 + 14X 5 + 34X 4 + 8X 3 − 30X 2 + 60X + 16)4 ·(4X 6 + X 5 + 15X 4 + 10X 3 − 10X 2 − 2X − 2)4 ·(16X 6 − 29X 5 + 71X 4 − 136X 3 + 92X 2 − 8X − 8)2 . Verification of monodromy. The subdegrees of A are 1, 16, 60, thus A is primitive. The classification of finite primitive rank 3 groups yields A = M22 or A = Aut(M22 ). Since M22 does not contain elements with the cycle structure of y, we see G = A = Aut(M22 ).  PSp(4,4):2 of degree 85. We now consider the nice triple (x, y, (xy)−1 ) where x = (1, 85, 49, 26, 15, 39, 65, 24, 37, 4, 23, 3, 28, 19, 76) (2, 82, 64, 74, 52, 58, 20, 70, 43, 7, 68, 12, 53, 40, 16) (5, 81, 51, 67, 54, 44, 41, 77, 30, 21, 71, 63, 33, 66, 18) (6, 42, 46, 50, 60, 22, 73, 80, 47, 45, 14, 31, 13, 55, 79) (8, 62, 56, 36, 72, 69, 35, 25, 10, 84, 48, 34, 59, 27, 11) (9, 57, 83, 78, 17)(29, 38, 61, 75, 32) and y = (3, 70)(5, 29)(6, 17)(7, 68)(8, 27)(9, 74)(14, 23)(15, 39)(16, 57)(18, 33) (19, 52)(20, 58)(22, 35)(24, 31)(25, 60)(26, 65)(30, 71)(32, 81)(34, 56) (36, 51)(38, 53)(40, 63)(41, 78)(42, 84)(43, 61)(44, 48)(45, 75)(46, 50) (47, 72)(49, 55)(54, 67)(64, 82)(73, 80)(76, 79)(77, 83). It has the following cycle structure: x y (xy)−1 cycle structure 155 .52 235 .115 416 .27 .17 This leads to the Belyi map f = p/q = 1 + r/q with q(X) = X · (5X 3 + 20X 2 + 20X + 6)2 · (5X 4 + 10X 3 − 14X − 10)4 · (5X 4 + 10X 3 − 8X − 4)2 · (5X 6 + 30X 5 + 60X 4 + 8X 3 − 48X 2 − 24X − 4) · (625X 12 + 3750X 11 + 7500X 10 + 3500X 9 − 3750X 8 − 1500X 7 + 2700X 6 + 3000X 5 + 2100X 4 + 1040X 3 + 240X 2 − 8)4 and r(X) = − 224 · (5X 2 + 5X + 2)5 · (5X 4 + 10X 3 − 5X − 1)15 . Verification of monodromy. Again, A turns out to be a primitive rank 3 group with subdegrees 1, 20, 64. Thus, we either have A = PSp(4, 4) or 8 DOMINIK BARTH AND ANDREAS WENZ A = PSp(4, 4):2. As PSp(4, 4) does not contain elements with the cycle structure of y, we obtain A = G = PSp(4, 4):2.  Aut(HS) of degree 100. Both nice triples (x, y, (xy)−1 ) generating Aut(HS) have already been discussed in [2]. The first one is given by x = (1, 23, 53, 86)(2, 36, 29, 43)(3, 15, 46, 6)(4, 80, 71, 81)(5, 75, 16, 47) (7, 32, 60, 8)(9, 76, 100, 51)(10, 50, 49, 34)(11, 28, 74, 84)(12, 72, 37, 52) (13, 21, 96, 88)(14, 41, 40, 87)(17, 42, 45, 79)(18, 63, 19, 20)(22, 99, 39, 89) (24, 59, 77, 38)(25, 68, 26, 35)(27, 69, 73, 48)(30, 92, 33, 82)(31, 56, 93, 58) (44, 98, 67, 64)(54, 95, 85, 62)(55, 65, 94, 61)(57, 78, 83, 97)(66, 90, 70, 91), y = (1, 75, 5, 71, 15)(2, 43, 52, 89, 39)(3, 18, 100, 33, 35, 26, 58, 32, 53, 23) (4, 81, 47, 16, 86, 7, 42, 38, 77, 59)(6, 41, 14, 87, 82, 76, 9, 97, 19, 63) (8, 60, 93, 56, 13, 61, 36, 99, 70, 45)(10, 65, 55, 88, 12, 29, 94, 34, 49, 50) (11, 44, 64, 25, 92)(17, 72, 96, 69, 28, 30, 40, 46, 80, 24)(20, 83, 78, 57, 51) (21, 31, 68, 67, 98, 84, 74, 27, 48, 73)(22, 37, 79, 90, 66, 95, 54, 62, 85, 91) of type x y z cycle structure 425 108 .54 235 .130 The Belyi map f = p/q = 1 + r/q is given by p(X) = (7X 5 − 30X 4 + 30X 3 + 40X 2 − 95X + 50)4 · (2X 10 − 20X 9 + 90X 8 − 240X 7 + 435X 6 − 550X 5 + 425X 4 − 100X 3 − 175X 2 + 250X − 125)4 · (2X 10 + 5X 8 − 40X 6 + 50X 4 − 50X 2 + 125)4 , q(X) = 28 · (X 4 − 5)5 · (X 8 − 20X 6 + 60X 5 − 70X 4 + 100X 2 − 100X + 25)10 . Verification of monodromy. Once again, A is a primitive rank 3 group with subdegrees 1, 22, 77, therefore A = HS or A = Aut(HS) and we find G = HS or G = Aut(HS). Since HS does not contain elements having the cycle structure of (xy)−1 we get A = G = Aut(HS).  The second triple (x, y, (xy)−1 ) consists of the following permutations: x = (1, 64, 8, 54, 37)(2, 20, 81, 42, 49)(3, 98, 32, 73, 89)(4, 96, 86, 15, 79) (5, 22, 28, 78, 48)(6, 67, 97, 40, 14)(7, 58, 82, 59, 18)(9, 16, 87, 85, 60) (10, 70, 41, 56, 55)(11, 77, 36, 25, 68)(12, 17, 19, 21, 80)(13, 35, 90, 33, 91) (23, 50, 66, 84, 27)(24, 72, 95, 52, 76)(26, 99, 100, 57, 93)(29, 71, 38, 69, 65) (30, 74, 94, 53, 51)(31, 45, 47, 75, 34)(43, 63, 44, 46, 62) BELYI MAPS HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS 9 and y = (1, 20)(2, 64)(3, 76)(4, 45)(5, 83)(6, 26)(7, 13)(8, 74)(9, 41)(10, 63)(11, 25) (12, 66)(14, 21)(15, 52)(16, 62)(17, 33)(18, 35)(19, 42)(22, 60)(23, 58) (24, 73)(28, 98)(29, 82)(30, 53)(31, 61)(32, 59)(34, 67)(36, 95)(37, 85) (38, 47)(39, 51)(40, 80)(43, 92)(44, 78)(46, 99)(48, 55)(49, 94)(50, 91) (54, 90)(65, 88)(69, 72)(71, 75)(77, 79)(81, 87)(84, 97)(86, 100)(93, 96) of type x y z cycle structure 519 .15 247 .16 610 .310 .25 The corresponding Belyi map f = p/q = 1 + r/q can be computed as p(X) = 33 · (X 4 − 8X 3 − 6X 2 + 8X + 1)5 · (X 5 − 5X 4 + 50X 3 + 70X 2 + 25X + 3)5 · (3X 5 − 5X 4 − 5X 3 + 35X 2 + 40X + 4)· (9X 10 − 30X 9 + 55X 8 − 200X 7 + 210X 6 + 924X 5 − 890X 4 − 360X 3 + 1925X 2 − 1070X + 291)5 and q(X) = (3X 5 − 35X 4 + 90X 3 − 50X 2 + 15X + 9)2 · (9X 10 − 120X 9 + 10X 8 − 1960X 7 − 1090X 6 + 3304X 5 − 760X 4 − 920X 3 + 145X 2 + 80X + 6)3 · (3X 10 − 10X 9 − 65X 8 + 160X 7 − 90X 6 − 932X 5 − 330X 4 + 880X 3 + 1255X 2 + 830X + 27)6 . Verification of monodromy. One can apply the exact same proof as before to show G = A = Aut(HS).  O+ (8, 2) of degree 135. In this group the nice triple (x, y, (xy)−1 ) is given by x = (1, 94, 65, 71, 134, 80, 107, 98, 4)(2, 104, 58, 121, 97, 116, 88, 8, 23) (3, 69, 36, 32, 29, 73, 102, 128, 106)(5, 14, 124, 105, 67, 18, 49, 117, 34) (6, 28, 100, 41, 135, 31, 48, 109, 17)(7, 133, 112, 53, 91, 15, 25, 122, 129) (9, 62, 99, 96, 131, 77, 10, 81, 52)(11, 56, 110, 13, 115, 111, 95, 89, 54) (12, 64, 113, 108, 20, 76, 50, 22, 55)(16, 61, 83, 118, 75, 66, 39, 35, 132) (19, 85, 68, 126, 40, 125, 74, 130, 43)(21, 47, 79, 78, 72, 84, 24, 37, 57) (26, 38, 70, 90, 92, 103, 63, 120, 44)(27, 119, 127, 42, 87, 82, 101, 93, 45) (30, 59, 86, 51, 33, 60, 123, 46, 114) 10 DOMINIK BARTH AND ANDREAS WENZ and y = (3, 118)(4, 110)(5, 132)(7, 36)(9, 33)(10, 46)(12, 112)(13, 129)(16, 65) (17, 106)(20, 113)(21, 107)(22, 55)(25, 61)(26, 27)(28, 30)(29, 37)(31, 109) (32, 98)(35, 130)(40, 42)(43, 99)(44, 125)(45, 90)(47, 49)(50, 91)(51, 93) (52, 60)(54, 56)(58, 116)(59, 128)(62, 82)(63, 73)(64, 69)(66, 96)(67, 78) (71, 117)(72, 105)(74, 124)(75, 135)(76, 83)(77, 121)(80, 134)(84, 120) (85, 87)(86, 103)(88, 104)(89, 94)(95, 122)(97, 114)(100, 131)(119, 127) and is of the following type x y (xy)−1 cycle structure 915 252 .131 430 .26 .13 The corresponding Belyi map f = p/q = 1 + r/q consists of p(X) = 222 · (3X 3 − 9X 2 − 9X − 2)9 · (3X 3 + 9X 2 + 6X + 1)9 · (27X 9 + 243X 8 + 567X 7 + 513X 6 + 162X 5 − 27X 4 + 9X 3 + 27X 2 + 9X + 1)9 and q(X) = (3X 3 − 9X − 2) · (3X 3 + 27X 2 + 27X + 7)2 · (6X 3 + 9X 2 − 1)2 · (36X 6 + 189X 5 + 189X 4 + 96X 3 + 36X 2 + 9X + 1)4 · (81X 12 + 1944X 11 + 11178X 10 + 27648X 9 + 29403X 8 − 1944X 7 − 39150X 6 − 44712X 5 − 25434X 4 − 8088X 3 − 1332X 2 − 72X + 4)4 · (648X 12 + 3888X 11 + 11907X 10 + 15120X 9 + 13365X 8 + 14580X 7 + 11772X 6 + 3240X 5 − 1782X 4 − 1632X 3 − 504X 2 − 72X − 4)4 . Verification of monodromy. We find that A is a primitive rank 3 group with subdegrees 1, 64, 70. Therefore we have A = O+ (8, 2) or A = O+ (8, 2).2 and due to normality G = O+ (8, 2) or G = O+ (8, 2).2. Note that G is generated by permutations of cycle structure 915 , 252 .131 , 430 .26 .13 and by inspecting the sizes of conjugacy classes of O+ (8, 2) and O+ (8, 2).2 we can conclude that there are no elements with these cycle structures in O+ (8, 2).2 \ O+ (8, 2). It follows G = O+ (8, 2). Because G contains only one generating triple (up to simultaneous conjugation) having the desired cycle structure the ramification data over 0, 1, ∞ is given by {x, y, (xy)−1 }. Since (x, y, (xy)−1 ) is rigid we have A = G = O+ (8, 2).  Acknowledgements We would like to thank Peter Müller for introducing us to the subject of this work and for providing us with helpful suggestions. References [1] Mohamed Ayad and Peter Fleischmann. On the decomposition of rational functions J. Symbolic Comput., 43(4):259–274, 2008. [2] Dominik Barth and Andreas Wenz. Explicit Polynomials Having the Higman-Sims Group as Galois Group over Q(t). arXiv:1611.04314, 2016 BELYI MAPS HAVING ALMOST SIMPLE PRIMITIVE MONODROMY GROUPS 11 [3] Wieb Bosma, John Cannon, and Catherine Playoust. The Magma algebra system. I. The user language. J. Symbolic Comput., 24(3-4):235–265, 1997. Computational algebra and number theory (London, 1993). [4] Gunter Malle and B. Heinrich Matzat. Inverse Galois theory. Berlin: Springer, 1999. [5] Helmut Völklein. Groups as Galois groups: an introduction. Cambridge: Cambridge Univ. Press, 1996. Institute of Mathematics, University of Würzburg, Emil-Fischer-Straße 30, 97074 Würzburg, Germany E-mail address: [email protected] E-mail address: [email protected]
4math.GR
Evolutionary Optimisation Methods for Template Based Image Registration Lukasz A Machowski, Tshilidzi Marwala School of Electrical and Information Engineering University of Witwatersrand, Johannesburg, South Africa. [email protected] [email protected] Abstract This paper investigates the use of evolutionary optimisation techniques to register a template with a scene image. An error function is created to measure the correspondence of the template to the image. The problem presented here is to optimise the horizontal, vertical and scaling parameters that register the template with the scene. The Genetic Algorithm, Simulated Annealing and Particle Swarm Optimisations are compared to a Nelder-Mead Simplex optimisation with starting points chosen in a pre-processing stage. The paper investigates the precision and accuracy of each method and shows that all four methods perform favourably for image registration. SA is the most precise, GA is the most accurate. PSO is a good mix of both and the Simplex method returns local minima the most. A pre-processing stage should be investigated for the evolutionary methods in order to improve performance. Discrete versions of the optimisation methods should be investigated to further improve computational performance. 1. Introduction Image registration has great practical application in the field of computer vision, medicine, remote sensing and image watermarking [1][2]. Being able to determine how best the template image fits into the scene poses several problems that have to be overcome. The registration process may involve shifting, scaling, rotation, perspective projection or other non-linear transformations. The shear number of possible transformations makes it difficult to automate the process and usually requires a person to verify the results manually. This paper presents findings on the use of evolutionary optimisation methods for automating the template matching of 2-dimensional intensity images. 1.1 Image Registration Image registration is the process by which a template is oriented in such a way as to match an entire, or a portion of, a given scene [1][2]. The template is transformed in such a way as to match the scene as closely as possible. There are four main steps required for registration of an image. These are feature detection, feature matching, transform model estimation and image transformation [1]. Feature based detection makes it easier to determine the orientation of the template with respect to the scene. Area based detection methods are much more computationally expensive due to the amount of data that needs to be processed. Since the area based detection methods depend on the appearance of the images, they are intolerant of changes in illumination and ambient conditions [1][2]. The feature based detection methods do not suffer from this but it is more difficult to automatically extract the features for any general image. It is common to combine the advantages from both methods to form a hybrid approach to the registration process [2]. Correlation-like methods are typically used for area-based detection methods where a correlation surface is calculated for the template and the maximum point is found and interpreted as the best fit for the template [1]. This method is adversely affected by self similarity in the image and it is characterised by high computational complexity. It also does not allow much variance in template rotation or other more complex transformations. This approach, is still however attractive for real-time object tracking [1][3]. An alternative to cross correlation is to use optimisation to find the best fit for the template in the scene [4]. The advantage of this approach is that one can apply more complex transformations to the templates, and thus make the method robust when compared to cross correlation. This method also requires less computation because the entire correlation surface does not have to be determined. In this paper, we investigate the use of a Genetic Algorithm (GA), Simulated Annealing (SA) and Particle Swarm Optimisation (PSO) to register a template with a given scene. These methods are also compared to the Nelder-Mead Simplex method. For simplicity, only three transformation parameters are defined. These are horizontal translation, vertical translation and uniform scaling. 1.2 Evolutionary Optimisation The term “evolutionary” refers to the fact that the optimum solution gradually evolves from a population of individuals that share information and have group dynamics [5]. This is in contrast to the non-evolutionary or classical optimisation methods which always try to travel in the best direction. Typically, the evolutionary concept is linked with GA alone but in this paper, we group GA, SA and PSO into the subset. All evolutionary optimisation methods have the following operations [5]: • Evaluation • Selection • Alteration An initial population of individuals is initialised, covering the parameter space and the objective function is evaluated for each individual. From this data, a subset of individuals is selected and altered to form new individuals. The degree to which each of these operations is performed in GA, SA and PSO varies from algorithm to algorithm. To find the optimal registration parameters for template matching, it is important to construct a multivariate cost function that represents how well the template matches the scene [6]. The traditional techniques for optimisation make use of the objective function value, first derivative or its second derivative [6][7]. The general approach for all non-evolutionary optimisation methods is to select an initial guess for the registration parameters and travel in a direction as to improve the objective function. Once a suitable direction is found, it is possible to make either fixed or varying successive steps towards the local optimum. Evolutionary Optimisation methods, however, do not make use of any other information but the objective function values themselves. This eliminates the evaluation of gradients which may be expensive and misleading for image registration. Evolutionary methods typically sample the search space significantly more than the non-evolutionary techniques but this improves the probability of the algorithm finding the global optimum point. The evolutionary algorithms are typically based on the processes which occur in the natural world, such as genetics, the swarming behaviour of bees and the annealing of metals. Various data structures are used to simulate these [5]. A brief review of the methods suitable for image registration is given below: 1.2.1 Simplex Method This is a non-evolutionary (classical) method. A simplex is a geometric figure that has one more vertex than the number of dimensions in the parameter space (a triangle in two dimensions, as shown in Figure 1). The objective function is sampled at each vertex and the one that has the worst value gets removed from the simplex. A new vertex is then created by reflecting the simplex about the remaining points. Depending on whether the fitness of the new point improves or not, the simplex is expanded or contracted to look for a more precise solution. In this manner, the algorithm steps its way towards the local optimum point. This method is relatively robust when used for discontinuous objective functions [8]. x2 Reflected Vertex x1 Figure 1 A simplex in two dimensions, showing a reflection. 1.2.2 Simulated Annealing Simulated Annealing is a Monte Carlo Technique [5] and is based on the analogy of metals cooling slowly to form a crystalline structure with low energy. The SA introduces a probability of acceptance of a new sample point for a hill-climbing process. The probability of accepting the new point is based on a control variable called the temperature. The higher the temperature, the more likely it is for a worse point to be accepted. This allows the algorithm to escape from local optima [5][9]. This algorithm is commonly referred to as Metropolis after its founder. The SA technique used in this paper modifies the simplex method described above to allow the simplex to accept a worse vertex with a probability distribution that is based on the temperature. If the change in energy is negative (we have a better point) then the new point will always be chosen. If the change in energy is positive (the point is worse) then the probability of accepting it is given by: p=e − ∆E k B .T (1) where ∆E is the change in energy, kB is Boltzmann’s constant and T is the current temperature. The cooling schedule (how many iterations to spend at each temperature) is an important factor in the success of the algorithm. 1.2.3 Genetic Algorithm Based on the theory of genetics, the GA encodes each individual in the population with a chromosome [5][10]. This encoding represents the parameters for the objective function being optimised. There are several different techniques for encoding parameters, performing the selection, and the alteration stages of the algorithm. The alteration stage is separated into Crossover and Mutation. The method used in this paper selects a random sample of parents from the population with a specified probability. An arithmetic crossover is then performed on these individuals which creates children based on a linear interpolation of the two parents. This is shown in Figure 2. xd (t + 1) = xd (t ) + vd (t + 1) (3) The various components that make up the velocity for each particle are shown in Figure 3. pi x2 c1 = p1.(mix) + p2.(1-mix) c2 = p1.(1-mix) + p2.(mix) x where vd(t+1) is the next velocity for particle d, α is an acceleration constant, βi is an attraction constant for the individual best position, βg is an attraction constant for the group best position, pi,d is the best individual position for particle d, pi,g is the best group position for particle d’s neighbourhood and xd(t) is the current position for particle d. The position of each particle is then calculated for each iteration as: pg p1 c1 eg: Mix = 0.6 Vd(t) x x1 c2 Figure 3 Various components making up the new velocity. p2 Figure 2 One Dimensional Arithmetic crossover operator. 2. A multi-non-uniform mutation is performed which modifies the parent parameters with a binomial distribution which narrows as the number of generations gets larger. More details of the individual techniques are given in [5]. 1.2.4 Particle Swarm Optimisation PSO is based on the swarming behaviour of bees, flocking of birds, schooling of fish and social relations of humans [11]. A population of particles is randomly initialised within the parameter space and each one is given an initial velocity. At each iteration of the algorithm, the particle position is updated and a new velocity is calculated, taking the best position for the particle and the group into account. There are different ways of grouping the particles together. The method used in this paper creates a social grouping where each particle has n logical neighbours (referenced by adjacent index numbers). This means that particles can be neighbours even though they are not close to each other spatially. This method also tends to produce better global exploration by the particles since there are many more attractors. The velocity of each particle is calculated as:   α .v(t )   vd (t + 1) =  + β i .( pi ,d − xd (t ))    + β .( p − x ( t )) g g , d d   (2) Method 2.1 Objective Function In order to perform optimisation, it is necessary to define an objective function that captures the essence of the problem at hand. In image registration, one wants to maximise correspondence between the scene image and the template posed at its current position. The correspondence can be measured as the sum-squared difference between the intensities of overlapping pixels. This can be expressed as an error function where a value of zero represents a perfect match. The parameters to be optimised in this problem are horizontal translation (x), vertical translation (y) and uniform scaling (s). The objective function used when there are overlapping pixels between the template and the scene image is given by: error = ∑ ( A − T ) 2 numel ( A) (3) where A is the scene image, T is the template, the 2 refers to element-wise squaring and the summation is over each element of the resultant matrix. This error is then normalised with the number of pixels that are overlapping between both images. It is also important to interpolate sub-pixel values for the optimisation algorithm to be able to function correctly. This allows the traditional algorithms to be run unchanged and also allows it to be compared to other general optimisation algorithms. It is necessary to penalise the error function when there are template pixels that do not lie within the image. This error component is added to the existing value calculated above. The penalised error then becomes: errorp = error + OutPixels × c (4) where error is from equation (3), OutPixels is the number of template pixels that do not lie in the image, and c is a penalisation constant which should be large (~1000). This penalisation has the effect of constraining the x and y parameters back into range when the images no longer overlap. It is necessary to hard-limit the scale parameter because the optimisation algorithms might try ridiculously high values which require extremely large amounts of memory. Very seldom does a template match a scene at very high scaling values. Similarly, if the template gets scaled to one pixel in size, then a fit can be found nearly anywhere in the scene. 2.2 Test Image The test image used is the familiar picture of Lena, which has a good mix of various image features and provides several local minima for registration. The template is a cut-out of Lena’s face and is shown in Figure 4. The image scene is 256x256 pixels and the template is 170x138 pixels taken from the coordinates (151.5, 151.5) with a scale of 2.0. This means that the global optimum for our objective function is at the coordinates (151.5, 151.5, 0.5) with an error value of 0. (b) (a) Figure 4 a) Test Image b) Template for registration. 2.3 Optimisation This section describes implementation details for each of the optimisation algorithms. All routines are implemented in Matlab R13. The implementation details for each algorithm are given below: 2.3.1 Simplex Method Matlab’s Optimisation Toolbox is used to perform the Nelder-Mead simplex optimisation [8]. The function used is fminsearch.m. A simple pre-processing algorithm is used to choose initial starting points. 2.3.2 Simulated Annealing The SA algorithm used in this paper is based on the code given in [12] and is extended to include restarts. The code is abstracted into a higher level in order to take advantage of Matlab’s matrix arithmetic capabilities. The following is a high level description of the algorithm used: x = RandomStartingSimplex(); y = EvaluateSimplex(S); for each temperature in cooling schedule: for number of iterations: yFluc = AddFluctuation(y); sort(yFluc); ReflectSimplex; If better than best then ExpandSimplex(x) Else if worse than 2nd highest: ContractSimplex(x); If still bad then: ContractOtherVerices(x); End End If SimplexIsStuck() then: % Restart, keeping best point: x = RandomStartingSimplex(); KeepBestPoint(x); End End for each iteration End for each temperature The restart allows the algorithm to oscillate at a local minimum for only a limited number of iterations. After this, it is restarted with the best point as one of the vertices. This behaviour is justified because it is recommended in [12] that the algorithm be re-run in the same fashion once a solution is found. This merely allows the simplex to further explore the parameter space. 2.3.3 Genetic Algorithm The Genetic Optimization Toolbox (GAOT) [13] is used for the implementation of the GA. This is an extensive toolbox with many functions for the encoding, selection, crossover and mutation operators. The following operators were used for the optimisation: • normGeomSelect.m, with the probability of selecting the best, set to 0.6. • arithXover.m, with 10 crossovers per generation • multiNonUnifMutation.m, with 20 mutations per generation. The particular selection operator used gives a good mix of exploration and precision. The arithmetic crossover is very useful in this problem since it assists in finding more precise parameters for the objective function. It is important to use the given mutation operator so that a sufficient amount of exploration occurs. The nature of the image registration problem creates an objective function with many local minima so it is important to mutate out of these valleys. Since the GAOT maximises an objective function, we merely multiply our original objective function by a factor of -1 to perform the minimisation. 2.3.4 Particle Swarm Optimisation After evaluating the performance of a free PSO toolbox, and getting poor results, it was decided to write a custom PSO routine based on the method described in the previous section. The high level description of the algorithm is given below: Swarm = CreateRandomSwarm(); While we have more iterations to go: EvaluateObjectiveFunction(Swarm); If Swarm.BestValue<GlobalBestValue then GlobalBestValue = Swarm.BestValue; GlobalBestPosition=Swarm.BestPosition; End UpdateIndividualAndGroupBestValues(Swarm); CalculateParticleVelocities(Swarm); UpdateParticlePositions(Swarm); End While loop Output GlobalBestPosition; The initial swarm is created with random particles between the bounds of the parameter space. A record is kept of each particle’s best value that it has sampled. Similarly, a group-best is maintained for a social neighbourhood size of 3 particles to either side of the current particle. Modulo indexing is used. The α parameter (described in the previous section) is set to 0.99 so that the swarm does not become unstable and diverge. Both β parameters are set to 0.01 in order that the particles approach the best locations gradually. This samples the objective function many times along the trajectory of the particle. 3. Results 3.1 Optimisation In order to be able to compare the algorithms, the maximum number of function evaluations for each method is set to 1000. The algorithms are stopped as close to this value as possible (since the number of function evaluations may vary from run to run). The amount of time taken by each algorithm is not a good measure of its performance in this case because the amount of processing in the objective function is highly dependent on the parameter values being sampled. All four algorithms described in this paper ultimately approach the global optimum so a suitable measure for their performance is to investigate their precision and accuracy. Each algorithm is run 50 times and an accuracy histogram is calculated for how close and how consistently the algorithm reached the global optimum of (151.5, 151.5, 0.5). The distance is measured geometrically by the following equation: di = (xG − xi )2 + ( yG − yi )2 + (sG − si )2 (5) where di is the distance for the ith run, (xG, yG, sG) are the global optimum parameters and (xi, yi, si) are the optimum parameters as calculated in the ith run. The histogram is divided into 10 equal bins so that the last bin has a distance which is 10 units away from the global optimum. The accuracy histograms for the various methods are given in Figure 5 and the results are analysed below. Higher counts towards bin zero are better. 20 40 15 30 Simplex SA 20 10 10 5 0 1 2 3 4 5 6 7 8 9 101112 30 20 1 2 3 4 5 6 7 8 9 101112 30 GA 10 0 0 20 PSO 10 1 2 3 4 5 6 7 8 9 1011 0 1 2 3 4 5 6 7 8 9 101112 Figure 5 Accuracy Histograms. 3.1.1 Simplex Method This method is especially robust for functions that have peculiar gradients or that are discontinuous, as is common in image registration. The method of travel by the simplex acts as a pseudo-gradient that plays a similar role as in the gradient methods. The success of this algorithm is attributed to the pre-processing stage of the algorithm which selects suitable starting points for the Nelder-Mead optimisation. The histogram shows that when the algorithm is near the global optimum, it is reasonably precise. It does however, find local minima quiet often. 3.1.2 Simulated Annealing It is expected that this algorithm performs better than the Simplex Method described above due to the Metropolis method that it employs. It was found that the performance of the algorithm is significantly improved by restarting when the simplex becomes stuck. Without this behaviour, the algorithm tries oscillatory values which waste precious computation time since the samples do not advance the simplex at all. The histogram shows that the algorithm is the least accurate (repeatable) algorithm of the four but is precise (finds values near to the global optimum many times). 3.1.3 Genetic Algorithm The performance of the GA can be attributed to the number of mutations that take place. This is important for image registration because the objective function has many local optima that vary in shallowness. It is more important for the algorithm to explore the parameter space than it is to improve the precision (using the arithmetic crossover). It was also observed that the mutation rate is more important than the initial population size (which randomly explores the parameter space), since sufficient mutations will explore the space more wisely. The histogram shows a clear binomial distribution near the global optimum. This shows that the GA produces reasonably accurate (consistent) results. 3.1.4 Particle Swarm Optimisation The PSO produces acceptable results because of the group dynamics in the system. The social groups promote exploration of the search space while the individual best position lets each particle improve its precision. Good parameter values were found by investigating what effect they have on the swarm behaviour and then tweaking the values to suite the problem domain. The behaviour of the swarm is predictably based on the algorithm parameters so it is relatively easy to infer good parameter values by watching how the particles swarm in the objective function. The histogram shows that the algorithm finds precise results but not always accurately. 3.2 Other Sample Data The algorithms managed to register the templates of distorted and noisy images of Lena’s face to the image. The various modifications to the templates that were made include, Gaussian blurring, the addition of Gaussian noise, vortex rotation, smudging and non-uniform stretching. The characteristics and accuracy histograms for each algorithm remain relatively consistent with the results described in the previous section. 4. Recommendations The current objective function makes use of sub-pixel sampling to obtain a continuous parameter space. This is very computationally intensive and unnecessary for certain parameters in image registration such as x and y coordinates. The algorithms presented above should be modified so that the user can specify that certain parameters may vary discretely whilst others continuously. This should reduce the amount of time taken for each function evaluation. Another improvement to the algorithms would be to select regions of interest that are likely to contain the template. This requires looking for higher level features in the image first and then creating bounds for the optimisation algorithms. 5. Conclusion This paper introduced evolutionary optimisation methods and contextualised them in the image registration field. It was found that the algorithms perform well in different aspects of the image registration process. The parameters for each method need to be tuned to suite the given image but the behaviour of the methods presented in this paper are intuitive and insight into how to modify parameters can easily be gained by simulating a few initial runs. These evolutionary optimisation methods were compared to the non-evolutionary Nelder-Mead simplex method with starting points selected by doing higher level preprocessing. SA returns the most precise results, while GA returns the most accurate results. PSO is in between these two and it is followed by the Simplex method. Preprocessing should be investigated for the evolutionary methods. 6. References [1] B. Zitova, J. Flusser. “Image registration methods: a survey”; Elsevier B.V.; Image and Vision Computing 21 (2003) 977–1000; June 2003. [2] X. Peng, M. Ding, C. Zhou, Q. Ma. “A practical twostep image registration method for two-dimensional images”; Elsevier B.V.; Information Fusion; Article in press; 2004. [3] S. Chien, S. Sung. “Adaptive window method with sizing vectors for reliable correlation-based target tracking”; Elsevier B.V.; Pattern Recognition 33 (2000) 237}249; 1999. [4] H. Lim, S. Hossein Cheraghi. “An optimization approach to shape matching and recognition”; Computers & Electrical Engineering 24 (1998) 183-200; 1998. [5] Z. Michalewicz. “Genetic Algorithms + Data Structures = Evolution Programs 3rd Ed.”; Springer; New York; 1999. [6] E. Chong, S. Zak. “An Introduction to Optimization, 2nd Ed.”; Wiley; 2001. [7] I. T. Nabney. “Netlab: Algorithms for Pattern Recognition”; Springer; UK; 2002. [8] “Optimization Toolbox Mathworks Inc.; 2002. [9] C. Skiscim. “Optimisation by Simulated Annealing”; Proceedings of the 1983 Winter Simulation Conference; pp 523-535; 1983. [10] C. Houck; J. Joines; M. Kay. "A Genetic Algorithm for Function Optimization: A Matlab Implementation"; NCSU-IE TR 95-09, 1995. [11] J. Kennedy, R. C. Eberhart. “Particle swarm optimization”, Proceedings of the 1995 IEEE International Conference on Neural Networks, vol. 4, pp. 1942–1948. IEEE Press; 1995. [12] W. Press, W. Vetterling, S. Teukolsky, B. Flannery. “Numerical Recipes in C++, 2nd Ed.”; Cambridge University Press; 2002. [13] “Genetic Optimization Toolbox”; Last Accessed: 11/05/2004. http://www.ie.ncsu.edu/mirage/GAToolBox/gaot/ User’s Guide V2”; The
5cs.CE
From Principles to Practice with Class in the First Year Sam Tobin-Hochstadt David Van Horn Northeastern University Boston, Massachusetts, USA {samth,dvanhorn}@ccs.neu.edu We propose a bridge between functional and object-oriented programming in the first-year curriculum. Traditionally, curricula that begin with functional programming transition to a professional, usually object-oriented, language in the second course. This transition poses obstacles for students, and often results in confusing the details of development environments, syntax, and libraries with the fundamentals of OO programming that the course should focus on. Instead, we propose to begin the second course with a sequence of custom teaching languages which minimize the transition from the first course, and allow students to focus on core ideas. After working through the sequence of pedagogical languages, we then transition to Java, at which point students have a strong command of the basic principles. We have 3 years of experience with this course, with notable success. 1 Introduction Many universities and colleges aim to teach their students proficiency in an industrial object-oriented programming language by the end of the students’ first year. The most common approach to achieve this aim is to teach an industrial language in the first course, often Java, starting on the first day. Other curricula take a more indirect route by teaching functional programming in the first semester, followed by a second semester in Java. The latter approach is an improvement over the first, as pointed out by numerous observers [9, 23, 7, 22], but both suffer serious flaws. As an example, Northeastern University teaches introductory programming in the first semester using How to Design Programs [8], followed by object-oriented programming using How to Design Classes [11] in the second semester. This sequence was designed to provide a smooth path for incoming students with a competence in high-school level algebra to reach proficiency in Java by the end of their first year [9]. It was a major improvement over the previous Java-first curriculum in terms of student success, attrition, and preparation for subsequent courses [21]. However, significant problems remain; in particular, the second semester course violates the designers’ own principles (as recalled in [5]): 1. introduce only those language constructs that are necessary to teach programming principles, and 2. choose a language with as few language constructs as possible, and one in which they can be introduced one at a time. The problem is that the first semester ends with an advanced pedagogical functional language and the second semester starts with Java, although it focuses on a side-effect free subset. Despite this focused subset, this transition is too abrupt to meaningfully bridge the gap between functional and object-oriented programming, because several other significant transitions happen in concert: • from a highly regular and minimal syntax to a complicated irregular syntax, • from an untyped language to a typed language, • from a pedagogical programming environment (DrRacket) to a professional programming environment (Eclipse), Philip K.F. Hölzenspies (Ed.): Trends on Functional Programming In Education (TFPIE) EPTCS 136, 2013, pp. 1–15, doi:10.4204/EPTCS.136.1 c S. Tobin-Hochstadt & D. Van Horn 2 From Principles to Practice with Class in the First Year • from a language with numeric values corresponding to mathematical objects to a language with numeric values corresponding to common machine representations,1 • from a language with image literals and graphical libraries to one in which graphical programming is tedious, • from an interaction-oriented language and tool suite to a compiled, batch-oriented language. This abrupt transition has several negative consequences which we have experienced first-hand: the principles of object-oriented programming are obscured and de-emphasized, struggling with the programming environment is frustrating and can cause potentially good students to leave the program, it favors students with prior exposure to the particular tools (a set that is demographically skewed), it inhibits students from experimenting by allowing them to rely upon past skills, and it creates the false impression that courses are discrete units of instruction that can be discarded after successful completion rather than being part of a continuous and cumulative educational experience. We contribute an alternative approach to the second semester that overcomes these problems and provides a gradual introduction to object-oriented programming. Our approach starts the second semester by introducing only the concept of programming with objects, while all other aspects of the course remain where they were left off in the previous semester. This allows other concepts to be introduced at the point at which they are relevant and motivated. Despite this more gradual approach, the course accomplishes the goal of reaching industrial language competence by the end of the semester, covering a super-set of the concepts and topics covered in the How to Design Classes-based course. Outline The remainder of this paper is organized as follows: section 2 provides background on How to Design Programs and the context and constraints involved in the first year at Northeastern. Section 3 describes our approach to the second semester, which starts with a small shift in perspective to bridge the gap between functional programming and object oriented programming. Section 4 describes the path from our pedagogical languages to an industrial object-oriented programming language. Section 5 discusses the relation to existing work and section 6 concludes. 2 Background: the context at Northeastern At Northeastern, the College of Computer & Information Science (CCIS) requires a four course introductory sequence for Computer Science majors in the first year. The first semester features both a course on discrete mathematics and an introduction to programming following the How to Design Programs curriculum. The second semester follows with a course on object-oriented programming and one featuring formal reasoning about programs, both on paper and with the ACL2 theorem prover [17]. After the first year, students take a wide variety of follow-up courses, ranging from a required course in “Object-oriented design” to architecture, operating systems, robotics, and programming languages. No standard language is used in these courses. More significantly, Northeastern distinctively emphasizes experiential education, with almost all Computer Science majors participating in a 6 month “co-op” internship after their third semester. These co-ops take place at a wide variety of companies, and while most students do some software development, there is no single platform or set of tools that commands majority use. In particular, there is wide 1 While this may seem like a minor point, details of numeric representation can crop up quickly in a Java-based course—for example, 1/3 cannot be represented by any Java numeric types. S. Tobin-Hochstadt & D. Van Horn 3 variation in the languages students use while on co-op. This combination sets the constraints under which we designed our approach. 2.1 A first course on How to Design Programs In the first semester, students are introduced to the “design recipe”, a step-by-step process for going from English descriptions of problems to working programs. The design recipe involves six steps: 1. Analyze the information involved in the problem and express how to represent it as data. 2. Write down a function signature, a summary of the purpose of the function, and a function stub. 3. Illustrate the signature and the purpose statement with some functional examples. 4. Take an inventory of the input data that can be used to compute an answer. 5. Write the code for the function. 6. Verify the behavior of the program against the functional examples given earlier. Students explore program design using this process in the context of a series of successively richer pedagogical programming language levels [9, 8] that are included in the DrRacket (formerly DrScheme) programming environment [12]. These languages are called the beginning student language (BSL), the intermediate student language (ISL), and the advance student language (ASL). The language and environment include several tools in support of the design recipe. For example, functional examples can be written as executable tests by writing check-expect expression [14]; an algebraic stepper and REPL are provided to interact with programs at each step of the design process. Finally, the first semester course makes extensive use of a library for developing interactive animations and games using functional programming and functional graphics [10, 4]. 2.2 The goal of the second course After the second course, students should both (a) be prepared for subsequent courses in the curriculum, which expect familiarity with Java and standard Java libraries, (b) be prepared for co-ops in which they will use professional-grade languages and tools which will almost certainly be object-oriented. More significantly, we aim to teach the key insights behind the object-oriented approach to program design. These constraints, while in detail specific to Northeastern and the CCIS curriculum, are broadly similar to the requirements for the first year at many universities. Our course also attends to smaller and more idiosyncratic elements of our curriculum, ranging from formal reasoning to algorithmic analysis, as described in the following sections. 3 A small shift of focus On the first day of the second semester, we introduce a single linguistic concept to an otherwise unchanged context of the previous semester: the idea of an object. An object is a new kind of value that can, as a first cut, be understood as a pairing together of two familiar concepts: data and functionality. • An object is like a structure in that it has a fixed number of fields, thus an object (again, like a structure) can represent compound data. But unlike a structure, an object contains not just data, but functionality too; • An object is like a (set of) function(s) in that it has behavior—it computes; it is not just inert data. From Principles to Practice with Class in the First Year 4 This suggests that objects are a natural fit for well-designed programs since good programs are organized around data definitions and functions that operate over such data. An object, in essence, packages these two things together into a single programming apparatus. This has two important consequences: 1. Students already know how to design programs oriented around objects. Since objects are just the combination of two familiar concepts that students already use to design programs, they already know how to design programs around objects, even if they have never heard the term “object” before. 2. Objects enable new kinds of abstraction and composition. Although the combination of data and functionality may seem simple, objects enable new forms of abstraction and composition. That is, objects open up new approaches to the construction of computations. By studying these new approaches, we can distill new design principles. Because we understand objects are just the combination of data and functionality, we can understand how all of these principles apply in the familiar context of programming with functions. 3.1 The basics of objects To begin with, we introduce the notion of a class definition, which can be thought of at first as a structure definition in that it defines a new class of compound data. A class is defined using the define-class form: (define-class posn (fields x y)) This is similar to the define-struct form of the first semester, used as follows: (define-struct posn (x y)) An object is a value that is a member of this class of data, which can be constructed with the new keyword, a class name, and the appropriate number of arguments for the fields of the object: (new posn 3 4) An object understands some set of messages. Simple structure-like objects understand messages for accessing their fields and messages are sent by using the send keyword, followed by an object, a message name, and some number of arguments: (send (new posn 3 4) x) ;=> 3 (send (new posn 3 4) y) ;=> 4 The send notation is simple, but syntactically heavy. Once students are comfortable with send, we introduce shorthand to make it more convenient, writing (x . m) for (send x m). The dot notation can be nested, so (x . m . n) is shorthand for (send (send x m) n). (The approach of introducing a simple, uniform syntax and later introducing a convenient shorthand that would have been confusing to start with follows the approach of first introducing cons and then later list and quote in the first semester.) It is possible to endow objects with functionality by defining methods, which extend the set of messages an object understands. A method definition follows the same syntax as a function definition, but is located inside of a class definition. Here is a more complete development of the posn class with two methods: S. Tobin-Hochstadt & D. Van Horn 5 ;; A Posn is a (new posn Number Number), ;; which represents a point on the Cartesian plane (define-class posn (fields x y) ;; dist : Posn -> Number ;; Distance between this (check-expect ((new posn (define (dist that) (sqrt (+ (sqr (- (this (sqr (- (this posn and that posn 0 0) . dist (new posn 3 4)) 5) . x) (that . x))) . y) (that . y)))))) ;; dist-origin : -> Number ;; Distance of this posn from the origin (check-expect ((new posn 0 0) . dist-origin) 0) (check-expect ((new posn 3 4) . dist-origin) 5) (define (dist-origin) (this . dist (new posn 0 0)))) This class definition defines a new class of values which are posn objects. Such objects are comprised of two numeric values and understand the messages x, y, dist, and dist-origin. Unit tests have been included with each method definition, following the principles of the design recipe studied in the first semester. Although check-expect forms can appear within class definitions, they are lifted to the top-level when a program is run. Methods can be defined to consume any number of arguments, but they are implicitly parameterized over this, the object that received the message. 3.2 Where did the cond go? Unions, and recursive unions in particular, are a fundamental kind of data definition that students are well-versed in from the previous semester. A fundamental early lesson is how to represent (recursive) unions using classes and how to write recursive methods. As an example, figure 1 defines binary trees of numbers (an archetypal recursive union data definition) using the Beginning Student language (BSL) as used at the start of the first semester, and also using the Class language of our course. The structure of this program is analogous to the approach of the previous semester but this example brings to light an important difference with the functional approach. The method for computing the sum of a leaf is defined in the leaf class, while the method for computing the sum of a node is in the node class. When a tree object is sent the sum method, there is no function with a conditional to determine whether the object is a leaf—instead, the object itself takes care of computing the sum based on its own sum method. This shift in perspective is at the core of object-orientation: objects contain their own behavior and the case analysis previously done in functions is eliminated. 3.3 Worlds and animations At Northeastern, Programming in the first semester is often oriented around interactive event-driven video games. The basic design of a video game involves defining a data representation for states of the game and functions for transitioning between states based on events such as clock ticks, keyboard input, or mouse events. The design of a game thus involves the design of data and operations on that data; From Principles to Practice with Class in the First Year 6 #lang bsl ;; A Tree is one of: ;; - (make-leaf Number) ;; - (make-node Tree Number Tree) (define-struct leaf (v)) (define-struct node (left v right)) ;; sum : Tree -> Number ;; sums the elements of the given tree (define (sum a-tree) (cond [(leaf? a-tree) (leaf-v a-tree)] [else (+ (sum (node-left a-tree)) (node-v a-tree) (sum (node-right a-tree)))])) (check-expect (sum (make-leaf 7)) 7) (check-expect (sum (make-node (make-leaf 1) 5 (make-node (make-leaf 0) 10 (make-leaf 0)))) 16) #lang class/1 ;; A Tree is one of: ;; - (new leaf Number) ;; - (new node Tree Number Tree) ;; and implements ;; sum : -> Number ;; sums the elements of this tree (define-class leaf (fields v) (define (sum) (this . v))) (define-class node (fields left v right) (define (sum) (+ (this . left . sum) (this . v) (this . right .sum)))) (check-expect ((new leaf 7) . sum) 7) (check-expect ((new node (new leaf 1) 5 (new node (new leaf 0) 10 (new leaf 0)))) . sum) 16) Figure 1: Binary tree sum in Beginning Student and in the Class language in other words, the game involves the design of objects. We therefore continue in the second semester with the use of programming video games but supplement the course with a library for doing so in an object-oriented style. Figure 2 gives an example written in both the functional style and object-oriented style. The key difference between these two programs is that the functional program uses the 2htdp/universe library, which provides a big-bang form that consumes the initial state of the world and has a declarative form of associating event-handler functions, while the object-oriented program uses an alternative library developed for our class: class/universe. It also provides a big-bang form but it consumes a single argument, the initial state of the world represented as an object. Event handlers are simply methods of this object; for example, clock ticks trigger the on-tick method. The program on the left is the first program of the first semester, while the one on the right is the first program of the second semester. Our approach is able to make the conceptual connection between functional and object-oriented programming quite clear while appealing to the familiar event-driven interactive programs developed throughout the year. S. Tobin-Hochstadt & D. Van Horn 7 #lang bsl (require 2htdp/image 2htdp/universe) #lang class/1 (require 2htdp/image class/universe) ;; A World is a Number ;; A World is a (new world Number) (define-class world (fields n) ;; on-tick : World -> World (define (tick w) (add1 w)) ;; to-draw : World -> Image (define (draw w) (place-image (circle 10 "solid" "red") w 200 (empty-scene 400 400))) ;; on-key : KeyEvent World -> World (define (on-key k w) 10) (big-bang 10 [to-draw draw] [on-tick tick]) ;; on-tick : -> World (define (on-tick) (new world (add1 (this . n)))) ;; to-draw : -> Image (define (to-draw) (place-image (circle 10 "solid" "red") (this . w) 200 (empty-scene 400 400))) ;; on-key : KeyEvent -> World (define (on-key k) (new world 10))) (big-bang (new world 10)) Figure 2: World programs The move to object-oriented style immediately and naturally leads to designs that are enabled by organizing programs around objects. For example, the state pattern [13] becomes useful almost immediately. The programs in figure 2 animate a rocket (rendered as a circle in this example) taking off. An illustrative follow-up exercise is to animate a rocket that lands. The natural design is to have two variants for states of the rocket: one for descending rockets and one for landed rockets (an example is given in appendix A). While in the functional approach it is easy to use the state-pattern for the data representing a rocket, it is more difficult to have states of behavior. The typical solution adds conditionals to all of the event handlers. In the object-oriented approach, states of behavior are just as natural as data. It is therefore straightforward to design programs with easy to observe invariants such as “a landed rocket never changes position.” In the functional approach, even such simple properties are more involved to establish, because all event handlers must be inspected. This approach also leads naturally to discussion of inheritance. Often programs with multiple states wish to share the implementation of some methods. We first show that this can be accomplished at the cost of minor boilerplate with delegation, and then show how inheritance allows the programmer to avoid duplication and boilerplate entirely. Once inheritance is able to group identical methods, overriding is a natural next step when some but not all of the implementations are identical across the variants. 3.4 Language levels Our introduction to object-oriented programming is built on a series of “language levels”, each of which introduces additional features, adding complexity to the programming model and expressiveness to the programs. Each language is class/N for some N, with features appearing in the following order. From Principles to Practice with Class in the First Year 8 0. Classes and Objects 1. Abbreviated notation for method calls 2. Super classes 3. Overriding 4. Constructors Several commonalities run through all of these languages. First, they are all purely functional; we do not introduce imperative I/O or side-effects until after transitioning to Java in the second half of the course. Second, they all are a super set of the Intermediate Student language from How to Design Programs, meaning that they support higher-order functional programming and lists. One key principle that we adhere to in the design of the language levels is that no features of the language are added purely to support “software engineering” concerns such as specification mechanisms. Not only does that language not support declaring types or contracts, but interfaces are described purely in comments. This is not to say that interfaces and contracts are optional; in fact, they are mandatory. But the focus of the first part of the course is on the fundamentals of object-orientation. Teaching the use of software engineering tools such as type systems, while vital, is a topic which we defer to the second half of the course when we transition to Java. We made this decision after experience in which students were confused about the relationship between explicit interface specifications, type systems, and the informal data definitions and contracts which students are required to write for all methods. After removing interfaces from the language and making them purely a specification construct, this confusion disappeared. 4 From principles to industrial languages The transition from custom teaching languages to a professional language takes place about half-way through the course. At this point, students already have experience with many of the essential concepts of object-oriented programming. In particular: objects, classes, fields and methods, dynamic dispatch, inheritance, and overriding. From this point, almost any language that students might encounter in future co-op positions, summer internships, or upper-level courses would be an appropriate follow-up. Our course transitions to Java, but C#, Python, Ruby, Eiffel, or JavaScript would all work naturally. The key lesson of the transition is that the fundamental principles underlying object-oriented programming remain the same between languages, and that learning a new language is primarily a matter of mapping these concepts to specific constructs in the new language. Of course, particular languages also use unique specific mechanisms which need to be taught to use the language effectively, but these are rarely as vital as the cross-language principles. We chose the half-way point as the time for transition based on experience with earlier versions of this course. In particular, we found that a later transition, while allowing us to present additional concepts in a controlled environment, did not give students sufficient time and experience with Java. Subsequent classes found that students were strong on fundamentals but weak on Java practice. The other alternative, transitioning earlier, would not provide sufficient time to cover the fundamental topics before the transition. S. Tobin-Hochstadt & D. Van Horn 9 4.1 Functional Java The transition begins with replicating the object-oriented style of our teaching languages in Java. In particular, we do not introduce mutation, for loops, or mutable data structures such as arrays or ArrayLists until later in the semester. Instead, students design data representations using classes, with interfaces representing unions of data. Additionally, we avoid mention of the distinction between primitive and other values in Java, which is made easier by not using standard libraries early. An example of this style of programming is presented in figure 3, repeating the binary tree sum from the previous section. Comparing this figure to the previous example illustrates a number of the differences that students are exposed to upon transition to Java. 1. Explicit representation of unions and interfaces in the language. Previously, interfaces were simply described in stylized comments, following the How to Design Programs approach. 2. Types are now specified as part of the program and are (statically) enforced. Data definitions and interfaces can be transformed from the stylized comments into interface definitions and method signatures annotated with types. Students are taught the benefits of type systems, which impose syntactic restrictions sufficient to prove objects meet (the structural aspects of) their interface definitions. Students also encounter the downside of types when they discover the type system cannot always follow valid reasoning about program invariants and may reject perfectly good programs. 3. Java syntax is substantially different and more verbose. For example, constructors must be defined explicitly. 4. The testing environment is somewhat different, and requires additional boilerplate, although we are able to use the JavaLib framework [20] to support testing with structural equality. There are other differences which cannot be seen from a code snippet. 5. Students must use a new development environment and compiler. In class, we primarily develop in a text editor and run the Java compiler at the command line. In labs and on homeworks, students typically use the Eclipse IDE. 6. Installing and configuring libraries is now required. Because we use a custom library for testing, students must cope with library installation and class paths on the first day. All but the first two of these changes are unrelated to the fundamental lessons we hope to teach—the rest merely present additional hurdles for students. However, at this point in the semester, the students are far better equipped to meet these challenges. They are already familiar with objects, classes, and the other concepts we have covered. They are also fully engaged in the class, instead of making the transition in the midst of the transition between semesters. Finally, they have now been programming for 50% longer than they had at the start of the semester. 4.2 Traditional Java Thanks to the preparation in the first half of the course, we can cover OO programming in a functional subset of Java in a just a few lectures. We then increase the subset of the language we use to encompass mutation, loops, and mutable data structures and introduce the underlying design principles. We present ArrayLists, followed briefly by arrays. Students use, and then implement, hash tables as well as other mutable and immutable data structures. Conventional input and output are treated only very briefly, as we focus instead on both fundamentals and exercises making use of real APIs such as hashing functions From Principles to Practice with Class in the First Year 10 import tester.*; interface Tree { // sums the elements of this tree Integer sum(); } class Leaf implements Tree { Integer v; Leaf(Integer v) { this.v = v; } public Integer sum() { return this.v; } } class Node implements Tree { Tree left; Integer v; Tree right; Node(Tree l, Integer v, Tree r) { this.left = l; this.v = v; this.right = r; } public Integer sum() { return this.left.sum() + this.v + this.right.sum(); } } class Examples { void test_tree(Tester t) { t.checkExpect(new Leaf(7).sum(), 7); t.checkExpect(new Node(new Leaf(1), 5, new Node(new Leaf(0), 10, new Leaf(0))).sum(), 16); } } Figure 3: Binary tree sum in the style of How to Design Classes S. Tobin-Hochstadt & D. Van Horn 11 or Twitter posting. Finally, while, for, and for-each loops are presented, following the methodology of How to Design Classes which connects loops to stylized use of recursive functions with accumulators, a technique the students now have used for two semesters. 4.3 Beyond Traditional Java Finally, at the end of the course, we are able to build on the two major segments to examine less-wellexplored topics in object-oriented programming. Typically, we cover the basics of representing objects in a functional language, advanced OO techniques such as mixins and prototypes, and a new OO language such as Ruby or JavaScript. Additionally, we emphasize the ability to embed functional programming in an OO context, using techniques such as the command pattern and the visitor patterns. Again, the key message is the transferability of concepts across languages. 5 Related work Teaching programming principles in a functional style has a long history, with Abelson and Sussman’s Structure and Interpretation of Computer Programs [1] being a prominent example. Our work follows in the tradition of the Program by Design (PbD) project2 (previously known as the TeachScheme! project), which emphasizes a systematic approach to program construction. Since the introduction of functional-first curricula, and more specifically in the Program by Design framework, numerous courses have tackled the problem of transition. Typically they, as we, transition to Java in the second course. We discuss first the approach developed by some of the principal creators of PbD, and then other approaches. 5.1 Program by Design and ProfessorJ The Program by Design project initially focused only on the first course, with the second course typically taught in Java in institution-specific ways. Subsequently, the pedagogical approach was extended to Java, but without the tool support and textbook of the first course. An example of this approach is described by (author?) [5], who presents the experience integrating these courses at Adelphi. He reports that “many of Java’s concepts could be introduced more easily in a second course than a first.” With these lessons in mind, the PbD project set out to apply the lessons of teaching languages and IDE support to Java, as well as to present the approach to object-oriented programming in textbook form. ProfessorJ [15] is the resulting system, accompanying the draft textbook How to Design Classes [11]. In parallel to our course, Northeastern teaches the remainder of its computer science majors following this approach. ProfessorJ and How to Design Classes maintain many of the ideas of the first course. In particular, ProfessorJ brings language levels to Java, in an attempt to smooth the transition for students from the first course and provide more helpful feedback. ProfessorJ is also embedded in the DrRacket IDE, increasing familiarity for the students and supporting tools such as an interactive read-eval-print loop. However, the “day 1” transition from the student languages used with How to Design Programs to ProfessorJ is too abrupt and too large. Most significantly, changing languages from the first semester immediately rather than simply adding a new concept confuses too many issues for students. On the first day of a How to Design Classes-based course, students see object-orientation, a new programming 2 http://www.programbydesign.org/ From Principles to Practice with Class in the First Year 12 paradigm; Java, a new language with new syntax, and a static type system, a crucial but orthogonal concept. In contrast, our course presents just one of these concepts on the first day, but covers all of them by the end of the semester. ProfessorJ also takes on the dual challenges of implementing Java as well as subsetting it. This ultimately resulted in both a limited Java environment as well as the eventual abandoning of the tool since it was too difficult to maintain, let alone keep up with advances in Java. Committing to Java on the first day, regardless of the environment provided to students, has significant limitations. First, the syntactic and semantic heaviness of Java is a burden for beginning students, and discourages interactive and experimental programming. The very first chapter of How to Design Classes discusses the fixed size of Java integers, a topic avoided entirely in the first course. Second, by committing to a particular industrial-strength language, it closes off possibilities in the curriculum. Third, it commits entirely to the new paradigm, making it more difficult for students to compare the approaches. Since ProfessorJ is no longer available, students are faced with an even starker change on the first day. Even with a student-oriented environment such as DrJava or BlueJ [2, 16], students must learn an entirely new tool, along with new libraries. If the course uses a typical professional development environment such as Eclipse, students must also contend with compilation, loss of interactivity, and subtle issues such as classpaths, none of which are fundamental to the concepts that the course focuses on. 5.2 Other transitions Not every curriculum that begins with How to Design Programs transitions to Java after the first course. (author?) [22] describes a second course that includes both more advanced work in Scheme beyond teaching-oriented languages as well as low-level programming in C, taught to computer science majors at University of Waterloo. Radge’s course intentionally does not use student-oriented languages, although the recently-developed C0 language [19] could provide such a language. Other discussions of functional programming in the first year [7] do not discuss the problems of transition. 5.3 Other approaches to Java The problems of teaching Java in introductory courses have been well-explored; we mention only a few related directions here. DrJava [2] and BlueJ [16, 18] are introductory environments for Java, which alleviate some but not all of the drawbacks we have outlined. For example, both of these systems immediately present students with (1) type systems and (2) Java syntax, and (3) do not support the image values and exact numeric values that we rely on in our course. Several teaching-oriented graphics libraries for Java have been proposed [6, 3], but these are significantly more complex than the graphics and interaction libraries we are able to use in the introductory language we present. 6 Experience and outlook We have now completed the third iteration of this course, teaching approximately 35 students each time. Our experience has been uniformly positive, and the students have gone on to significant success in the subsequent courses, despite the curriculum differing from what the bulk of Northeastern University computer science majors take. Anecdotally, the class has also had notable success in the recruitment and S. Tobin-Hochstadt & D. Van Horn 13 retention of female students, as compared to the other versions of the second-semester course. However, the classes are sufficiently different as to make a precise comparison impossible. The course has provided a vantage point to introduce topics that will be taken up later in the curriculum. We present types, contracts, invariants, and properties of functions, all of which tie into both the concurrent course on logic and computation, as well as later classes on formal methods. The emphasis on representation-independence and interfaces both tie into later classes on software engineering, as well as preparing students for algorithms and data structures courses. Finally, the use of interactive and distributed systems connects to later courses on operating systems and networks. Despite our success, much remains to be done. Type systems are a fundamental concept, but their introduction accompanies the rest of Java. Developing a typed version of our introductory languages would allow a smoother introduction of this idea. Our class’s use of Eclipse could also be improved by first transitioning to a pedagogically-oriented Java environment, but we have not evaluated the specific options. Alternatively, introducing Java-like syntax for the teaching languages we have developed would help tease apart the difficult transitions still present in the course. Finally, the Java portion of the class does not continue the use of “World”-style interactive graphical programming, although a version of the “World” library has been developed for Java [20]. Instead, our course focuses on coverage of standard Java libraries, as well as introductory algorithmic and data structure topics. Continuing to use World-style programming in motivating examples might be valuable for continuity between the two halves of the course. Acknowledgments Matthias Felleisen’s approach to pedagogy and passion for undergraduate teaching has inspired this work from the beginning. CCIS Dean Larry Finkelstein entrusted two postdocs with the redesign of a key undergraduate course, which made this experiment possible. Our teaching assistants, Dan Brown, Asumu Takikawa, and Nicholas Labich, as well as the tutors and graders, contributed enormously to the success of our courses. Finally, and most importantly, our students at Northeastern for the last three years have put up with a curriculum in progress, and the opportunity to teach them has been truly rewarding. References [1] Harold Abelson & Gerald J. Sussman (1996): Structure and Interpretation of Computer Programs. MIT Press. [2] Eric Allen, Robert Cartwright & Brian Stoler (2002): DrJava: a lightweight pedagogic environment for Java. SIGCSE Bull. 34(1), pp. 137–141, doi:10.1145/563517.563395. [3] Carl Alphonce & Phil Ventura (2003): Using graphics to support the teaching of fundamental object-oriented principles in CS1. In: Companion of the 18th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, OOPSLA ’03, ACM, pp. 156–161, doi:10.1145/949344.949391. [4] Ian Barland, Matthew Flatt & Robby Findler (2010): The Design of a Functional Image Library. In: Workshop on Scheme and Functional Programming (SFP). [5] Stephen A. Bloch (2000): Scheme and Java in the first year. J. Comput. Sci. Coll. 15(5), pp. 157–165. 14 From Principles to Practice with Class in the First Year [6] Kim B. Bruce, Andrea Danyluk & Thomas Murtagh (2001): A library to support a graphics-based object-first approach to CS 1. In: Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education, SIGCSE ’01 33, ACM, pp. 6–10, doi:10.1145/366413.364527. [7] Manuel M. T. Chakravarty & Gabriele Keller (2004): The risks and benefits of teaching purely functional programming in first year. J. Funct. Program. 14(1), pp. 113–123, doi:10.1017/S0956796803004805. [8] Matthias Felleisen, Robert B. Findler, Matthew Flatt & Shriram Krishnamurthi (2001): How to design programs: an introduction to programming and computing. MIT Press. [9] Matthias Felleisen, Robert B. Findler, Matthew Flatt & Shriram Krishnamurthi (2004): The structure and interpretation of the computer science curriculum. Journal of Functional Programming 14(4), pp. 365–378, doi:10.1017/s0956796804005076. [10] Matthias Felleisen, Robert B. Findler, Matthew Flatt & Shriram Krishnamurthi (2009): A functional I/O system or, fun for freshman kids. In: ICFP ’09 Proceedings of the 14th ACM SIGPLAN International Conference on Functional programming, ACM, pp. 47–58, doi:10.1145/1631687.1596561. [11] Matthias Felleisen, Matthew Flatt, Robert Bruce Findler, Kathryn E. Gray, Shriram Krishnamurthi & Viera K. Proulx (2012): How to Design Classes (Draft). Available at http://www.ccs.neu.edu/home/matthias/htdc.html. [12] Robert B. Findler, John Clements, Cormac Flanagan, Matthew Flatt, Shriram Krishnamurthi, Paul Steckler & Matthias Felleisen (2002): DrScheme: a programming environment for Scheme. JFP 12(02), pp. 159–182, doi:10.1017/s0956796801004208. [13] Erich Gamma, Richard Helm, Ralph Johnson & John Vlissides (1994): Design Patterns: Elements of Reusable Object-Oriented Software. Addison Wesley. [14] Kathryn E. Gray & Matthias Felleisen (2007): Linguistic Support for Unit Tests. Technical Report UUCS-07-013, University of Utah. [15] Kathryn E. Gray & Matthew Flatt (2003): ProfessorJ: a gradual introduction to Java through language levels. In: Companion of the 18th annual ACM SIGPLAN conference on Objectoriented programming, systems, languages, and applications, OOPSLA ’03, ACM, pp. 170–177, doi:10.1145/949344.949394. [16] James I. Hsia, Elspeth Simpson, Daniel Smith & Robert Cartwright (2005): Taming Java for the classroom. SIGCSE Bull. 37(1), pp. 327–331, doi:10.1145/1047124.1047459. [17] Matt Kaufmann, J. Strother Moore & Panagiotis Manolios (2000): Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers. [18] Michael Kölling, Bruce Quig, Andrew Patterson & John Rosenberg (2003): The BlueJ system and its pedagogy. Journal of Computer Science Education 13(4). [19] Frank Pfennig (2011): C0 Reference. Available at http://c0.typesafety.net/doc/c0-reference.pdf. [20] Viera K. Proulx (2012): JavaLib. Available at http://www.ccs.neu.edu/javalib/. [21] Viera K. Proulx & Kathryn E. Gray (2006): Design of class hierarchies: an introduction to OO program design. In: Proceedings of the 37th SIGCSE technical symposium on Computer science education, SIGCSE ’06, ACM, pp. 288–292, doi:10.1145/1121341.1121431. S. Tobin-Hochstadt & D. Van Horn 15 [22] Prabhakar Ragde (2008): The chilling descent: making the transition to a conventional curriculum. In: Proceedings of the 2008 international workshop on Functional and declarative programming in education, FDPE ’08, ACM, pp. 13–20, doi:10.1145/1411260.1411263. [23] Joel Spolsky (2005): The Perils of JavaSchools. Available http://www.joelonsoftware.com/articles/ThePerilsofJavaSchools.html. A Worlds and the State pattern #lang class/1 (require 2htdp/image class/universe) ;; A World is one of ;; - (new landed-world) ;; - (new downworld Number) (define-class landed-world ;; to-draw : -> Image (define (to-draw) (place-image (circle 10 "solid" "red") 390 200 (empty-scene 400 400)))) (define-class downworld (fields n) ;; on-tick : -> World (define (on-tick) (cond [(zero? (this . n)) (new landed-world)] [else (new world (sub1 (this . n)))])) ;; to-draw : -> Image (define (to-draw) (place-image (circle 10 "solid" "red") (this . w) 200 (empty-scene 400 400))) ;; on-key : KeyEvent -> World (define (on-key k) (new world 400))) (big-bang (new downworld 400)) at
6cs.PL
Tropical Vertex-Disjoint Cycles of a Vertex-Colored Digraph: Barter Exchange with Multiple Items Per Agent arXiv:1610.05115v3 [cs.DS] 3 Aug 2017 Timothy Highley 1 Hoang Le 1 1 Department of Mathematics and Computer Science, La Salle University Abstract In a barter exchange market, agents bring items and seek to exchange their items with one another. Agents may agree to a k-way exchange involving a cycle of k agents. A barter exchange market can be represented by a digraph where the vertices represent items and the edges out of a vertex indicate the items that an agent is willing to accept in exchange for that item. It is known that the problem of finding a set of vertexdisjoint cycles with the maximum total number of vertices (MAX-SIZEEXCHANGE) can be solved in polynomial time. We consider a barter exchange where each agent may bring multiple items, and items of the same agent are represented by vertices with the same color. A set of cycles is said to be tropical if for every color there is a cycle that contains a vertex of that color. We show that the problem of determining whether there exists a tropical set of vertex-disjoint cycles in a digraph (TROPICALEXCHANGE) is NP-complete and Log-APX-hard. This is equivalent to determining whether it is possible to arrange an exchange of items among agents such that every agent trades away at least one item. TROPICALMAX-SIZE-EXCHANGE is a similar problem, where the goal is to find a set of vertex-disjoint cycles that contains the maximum number of vertices and also contains all of the colors in the graph. We show that this problem is likewise NP-complete and Log-APX-hard. For the restricted case where there are at most two vertices of each color (corresponding to a restriction that each agent may bring at most two items), both problems remain NP-hard but are in APX. Finally, we consider MAX-SIZE-TROPICALEXCHANGE, where the set of cycles must primarily include as many colors as possible and secondarily include as many vertices as possible. We show that this problem is NP-hard. E-mail addresses: [email protected] (Timothy Highley) [email protected] (Hoang Le) 2 1 Highley, Le Tropical Vertex-Disjoint Cycles Introduction Consider a barter exchange where many different agents each bring multiple items to trade. For each item at the barter exchange, the agent lists which other items may be accepted in trade for that item. Based on the lists, an algorithm determines which items are traded for which other items. Instead of restricting exchanges to one-to-one trades, k-way trades are also permitted, where k is limited only by the number of items at the swap meet. If k-way trades are permitted, the traders potentially give items to and receive items from different agents. This barter exchange can be represented as a directed graph where each item brought to the exchange is a vertex and there are edges from each item to those items that may be accepted in trade for that item. The problem of determining the maximum possible number of items that can be simultaneously exchanged is equivalent to finding a set of vertex-disjoint cycles that maximizes the total number of vertices in the cycles. (Throughout this paper, all cycles are assumed to be simple cycles.) This problem is equivalent to the Assignment Problem, which can be solved in polynomial time. It has also been called MAX-SIZE-EXCHANGE [10]. The decision and optimization versions of the problem are defined as follows. Problem 1a. MAX-SIZE-EXCHANGE (MSE-d) Input: A directed graph G Question: Is there a set of vertex-disjoint cycles that includes every vertex in the graph? Problem 1b. MAX-SIZE-EXCHANGE (MSE-o) Input: A directed graph G Output: A set of vertex-disjoint cycles that includes as many vertices as possible If there are many items, it is very likely that there are multiple solutions that tie for the maximum number of items traded. How should the tie be broken? As a secondary criterion, it may be desirable to choose, from among those itemmaximizing solutions, the solution that maximizes the number of agents who trade away at least one item. This can be accomplished by converting the previously described directed graph into a vertex-colored digraph, with each participant having a unique color. The problem, then, is equivalent to finding a set of vertex-disjoint cycles with the maximum total number of vertices in the cycles, and in the case of ties, finding a solution that secondarily contains the maximum number of colors. A subset of vertices from a vertex-colored graph is called tropical if it includes every color in the vertex-colored graph [3]. We define the decision and optimization versions of the TROPICAL-MAX-SIZEEXCHANGE as follows. 3 Problem 2a. TROPICAL-MAX-SIZE-EXCHANGE (TMaxEx-d) Input: A vertex-colored digraph G Question: Is there a set of vertex-disjoint cycles S such that no other set of vertex-disjoint cycles contains more vertices in the cycles, and for every color in the graph there is a cycle in S that contains a vertex of that color? Problem 2b. TROPICAL-MAX-SIZE-EXCHANGE (TMaxEx-o) Input: A vertex-colored digraph G Output: A set of vertex-disjoint cycles that includes as many colors as possible, subject to the restriction that there does not exist another set of vertexdisjoint cycles that has more vertices If the goal is instead to simply maximize the number of agents who trade away at least one item (with no regard for the total number of items traded away), that is equivalent to the problem of finding a set of vertex-disjoint cycles that collectively contain the maximum number of colors. We define the decision and optimization versions of TROPICAL-EXCHANGE as follows. Problem 3a. TROPICAL-EXCHANGE (TEx-d) Input: A vertex-colored digraph G Question: Is there a set of vertex-disjoint cycles such that for every color there is a cycle that contains a vertex of that color? Problem 3b. TROPICAL-EXCHANGE (TEx-o) Input: A vertex-colored digraph G. Output: A set of vertex-disjoint cycles such that the total number of vertex colors in the cycles is maximized We show that both TMaxEx-d and TEx-d are NP-complete via a reduction from CNFSAT. We show that both TMaxEx-o and TEx-o are Log-APX-hard via a reduction from MIN-DOMINATING-SET. We also consider restricted cases where each agent is permitted to bring at most j items to the barter exchange. We then maximize the number of agents who get to trade an item: Problem 4. j-PER-COLOR-TROPICAL-EXCHANGE (jPC-TEx) Input: A vertex-colored digraph G with at most j vertices of each color Output: A set of vertex-disjoint cycles such that the total number of vertex colors in the cycles is maximized 4 Highley, Le Tropical Vertex-Disjoint Cycles Problem 5. j-PER-COLOR-TROPICAL-MAX-SIZE-EXCHANGE (jPC-TMaxEx) Input: A vertex-colored digraph G with at most j vertices of each color Output: A set of vertex-disjoint cycles that includes as many colors as possible, subject to the restriction that no other set of vertex-disjoint cycles has more vertices These problems can be trivially solved in polynomial time if j = 1, but even if j = 2, a reduction from MAX-2-SAT shows that these problems are NP-hard. They are, however, in APX. Finally, we define MAX-SIZE-TROPICAL-EXCHANGE (MaxTEx), which reverses the criteria of TMaxEx-o. In TMaxEx-o, the first criterion is maximizing the total number of vertices in the cycles and the second criterion is maximizing the total number of colors. MaxTEx first maximizes the total number of colors in the cycles and secondarily maximizes the total number of vertices. We show that MaxTEx is NP-hard and Log-APX-hard. We define the optimization version of MaxTEx as follows. Problem 6. MAX-SIZE-TROPICAL-EXCHANGE (MaxTEx) Input: A vertex-colored digraph G. Output: A set of vertex-disjoint cycles S such that no other set of vertexdisjoint cycles contains more colors, and no other set with the same number of colors contains more vertices. Barter exchanges as described in this paper regularly occur online. For example, since 2006 an average of 10 barter exchanges per month have been organized at boardgamegeek.com, with a total of over 500,000 items offered for trade. When participants are informed of the results, they exchange items either in person or by mailing items to each other. Usually, a participant will give an item to one person and receive an item from a different person. Maximizing the number of items traded is the primary goal, and is accomplished using a solution to the Assignment Problem. Maximizing the number of users that trade at least one item is the secondary goal, and this is addressed by solving the Assignment Problem multiple times and after a set number of iterations selecting the solution that yields the greatest number of users trading. However, there is no guarantee that the chosen solution actually maximizes the number of users who trade at least one item. This paper demonstrates that, in general, the problem of maximizing the number of users trading cannot be solved in polynomial time unless P = N P . Other websites, such as barterquest.com, swapdom.com, netcycle.com, and rehash.com, have offered similar services in a more general context. 2 Related Work The Assignment Problem is the minimum weight bipartite perfect matching problem. It is a well-known fundamental optimization problem that can be 5 solved in polynomial time. The polynomial bound was first shown by Jacobi [21], but was not widely known until Kuhn’s publication of the Hungarian Algorithm [24]. More efficient algorithms for the Assignment Problem have been discovered since then [15] [25]. It is known that MAX-SIZE-EXCHANGE can be solved by reducing it to the Assignment Problem [1] [10]. MAX-SIZE-EXCHANGE and related problems have been studied extensively in the context of kidney exchange programs. In kidney exchange programs, it is impractical to allow cycles of unbounded length because it is important for all surgeries to happen at the same time. As a result, most work related to kidney exchanges addresses the MAX SIZE ≤ k-WAY EXCHANGE problem, which is APX-complete when k ≥ 3 [1] [10]. Work on the kidney exchange problem includes investigation of approximability [9], techniques to mitigate failure after matches have been determined [16], dynamic exchanges [29], and incentivecompatible mechansims to ensure that hospitals publish all incompatible pairs [7]. The problems discussed in this paper differ from the kidney exchange problem because we are not concerned with the length of the cycles, and because of the introduction of colored vertices. We explore problems that are similar to the Assignment Problem and kidney exchange problem but based on vertex-colored graphs. Vertex-colored graphs have also been called tropical graphs [20]. As mentioned earlier, a subset of vertices from a vertex-colored graph is called tropical if it includes every color in the vertex-colored graph. Tropical connected subgraphs, tropical dominating sets, and tropical homomorphisms have been studied [3] [4] [20]. In this paper, we are concerned with sets of vertex-disjoint cycles. We say that a set of cycles is tropical if every color in the vertex-colored graph is represented by a vertex in at least one cycle. We study the total number of vertices and colors in a set of vertex-disjoint cycles, but not the total number of cycles in the set. Cycle packing is concerned with the total number of cycles, and it has been studied extensively for both edge-disjoint and vertex-disjoint cycles [11] [23] [28]. There is other work on graphs and colors that is not directly related to our work, but we provide representative citations to help readers delineate the differences. For instance, Fellows et al. and Dondi et al. explored patternmatching in vertex-colored graphs [17] [19]. Coudert et al. explored complexity and approximability properties of edge-colored graphs [13]. Our work assumes that the color of a vertex is an inherent property of the graph. Graph-coloring is a separate topic where colors are added to a graph such that adjacent nodes have different colors. The Four-Color Theorem is a famous result from graph-coloring [5] [6]. Coloring graphs are graphs where each node represents a possible coloring of another graph [8]. More recent graph-coloring work includes the search for rainbow connections [12] [27] [26]. Colorful paths are paths that are both rainbow paths (all vertices in the path have different colors) and tropical paths (all colors in the graph are represented in the path) [2]. 6 Highley, Le Tropical Vertex-Disjoint Cycles 3 CNFSAT as a Vertex-Colored Graph Consider an instance of CNFSAT with q clauses. Let x1 , ..., xn be the n variables in the expression. For each variable, create a vertex. Give all of these vertices the same color, and refer to them as the“variable vertices.” On each vertex, create two edges that loop back to the same vertex. Label one edge TRUE and one edge FALSE on each vertex. Assign each clause of the CNFSAT instance a separate color: c1 , c2 , ..., cq . For each literal in the clause, create a vertex that has the clause’s color. Refer to these vertices as “literal vertices.” For negative literals, put the corresponding vertex on the FALSE loop of the variable vertex for that variable by removing one edge from that loop and adding the new literal vertex along with two edges so that the FALSE loop remains a single cycle from the variable vertex back to itself. Similarly, for positive literals put the literal vertex on the TRUE loop of the variable vertex for that variable. Figure 1 depicts an example graph for a given CNFSAT instance. c1 Variables … … … … … … … … c2 c3 c4 c5 TRUE w … … FALSE TRUE x … … FALSE TRUE y … … FALSE TRUE z … … FALSE 𝑥˅𝑦˅𝑧 ˄ 𝑥˅𝑦˅𝑧 ˄ 𝑤˅𝑧 ˄ 𝑤˅𝑦 ˄ 𝑤˅𝑥 Figure 1: CNFSAT instance represented as a vertex-colored directed graph. 4 CNFSAT reduces to TROPICAL-EXCHANGE Constructing a graph for a CNFSAT instance can clearly be accomplished in polynomial time. Each variable only adds one vertex and two edges to the graph, and each clause only adds a vertex and an edge for each literal in the clause. 7 Based on the way that the graph is constructed, there can be at most n vertex-disjoint cycles. Each variable vertex is part of two cycles (the TRUE loop and the FALSE loop), so a set of vertex-disjoint cycles can only contain one or the other. There are no other cycles in the graph. The cycle that is chosen for the set of vertex-disjoint cycles corresponds to the truth value of that variable in the expression. If we have a polynomial time algorithm for TROPICAL-EXCHANGE, then solving TROPICAL-EXCHANGE will also solve CNFSAT in polynomial time. This is because each clause’s color will be in a cycle if and only if a variable is set to a truth value that satisfies that clause. If all colors can be in the set of vertex-disjoint cycles, then all clauses and thus the entire expression is satisfiable. Since CNFSAT is NP-complete, TROPICALEXCHANGE is NP-hard. TROPICAL-EXCHANGE is also in NP (it is trivial to verify that all colors are in the solution), so TROPICAL-EXCHANGE is NPcomplete. 5 CNFSAT reduces to TROPICAL-MAX-SIZE-EXCHANGE MAX-SIZE-EXCHANGE can be solved in polynomial time, but TROPICALEXCHANGE is NP-complete. What about TROPICAL-MAX-SIZE-EXCHANGE (TMaxEx-d)? That is, if we restrict the search space to only those sets of cycles that maximize the total number of vertices in the cycles, then does that make it easier to determine whether it is possible for a set of vertex-disjoint cycles to cover all of the colors in the graph? The previous reduction does not work for TMaxEx-d due to the fact that solving TMaxEx-d for the constructed graph does not solve CNFSAT. Because TMaxEx-d first maximizes the total number of vertices in the cycles, it may be the case that the CNFSAT instance is satisfiable even though the solution to TMax-Ex-d for the graph does not include all of the colors. That would be the case if the only way to include all of the colors in the graph in the cycles is to accept a lower total number of vertices in the cycles. We can adjust the graph by adding “balance vertices” that all have the same color (the “balance color”). First, we identify the cycle with the most vertices. In the case of a tie, we choose any of the tied cycles. We add one balance vertex to this cycle and then add balance vertices to all other cycles so that every cycle has the same number of vertices. These balance vertices accomplish two tasks: • The number of vertices in each cycle has no impact on the solution produced by TMaxEx-d. With the addition of the balance vertices, every cycle has the same number of vertices, so every possible combination of vertex-disjoint cycles has the same total number of vertices, assuming one cycle per variable vertex. As a result, the secondary criterion (number of colors in the set of cycles) determines the solution. • The balance color has no impact. Because every cycle has a balance vertex, 8 Highley, Le Tropical Vertex-Disjoint Cycles the balance color is guaranteed to be in the set of vertex-disjoint cycles, and the balance color will not have an impact on the final solution. If all possible combinations of vertex-disjoint cycles have the same number of total vertices, then by the same logic described for the previous reduction, the solution to TMaxEx-d for the constructed graph will also solve CNFSAT. Figure 2 depicts an example graph for a given CNFSAT instance. c1 Variables … … … … … … … … c2 c3 c4 c5 Balance Vertices TRUE w … … FALSE TRUE x … … FALSE TRUE y … … FALSE TRUE z … … FALSE 𝑥˅𝑦˅𝑧 ˄ 𝑥˅𝑦˅𝑧 ˄ 𝑤˅𝑧 ˄ 𝑤˅𝑦 ˄ 𝑤˅𝑥 Figure 2: CNFSAT graph with the addition of Balance Vertices. TMaxEx-d is easily shown to be in NP. A proposed solution to an instance of TMaxEx-d can be verified by first solving MAX-SIZE-EXCHANGE for the same graph, which can be accomplished in polynomial time. The next step is verifying that the proposed solution to TMaxEx-d and the solution produced by MAXSIZE-EXCHANGE have the same number of vertices in their respective sets of vertex-disjoint cycles. Assuming they do, it is simple to verify that all colors appear in the proposed solution. Therefore, TMaxEx-d is NP-complete. 6 TROPICAL-EXCHANGE and TROPICAL-MAX-SIZEEXCHANGE are Log-APX-hard A set of vertices is a dominating set of a graph if every vertex in the graph is either in the set or adjacent to a vertex in the set. MIN-DOMINATING-SET is known to be Log-APX-complete, since there exist L-reductions in both directions between MIN-DOMINATING-SET and MIN-SET-COVER [22], and MINSET-COVER is known to be Log-APX-complete [18]. 9 MIN-DOMINATING-SET ≤strict TEx-o. To reduce to TEx-o, for each vertex in an instance of MIN-DOMINATING-SET, create a vertex in an instance of TExo. Call this vertex a mirror, and give all of these mirror vertices in TEx-o the color black. On each mirror vertex, create two cycles (initially just loops). Label one cycle IN and the other NOT-IN. IN and NOT-IN respectively represent a vertex’s inclusion in or exclusion from the dominating set. For each vertex in MIN-DOMINATING-SET, designate two unused colors. The purpose of these two colors is to indicate that the vertex is dominated. Call them the domination colors. On the IN cycle of its mirror in TEx-o, add two new vertices: one for each of its domination colors. Also, for each adjacent vertex in the MINDOMINATING-SET graph, add two vertices to the IN cycle of its mirror in TEx-o, and give the new vertices the two domination colors. Finally, add a “NOT-IN” vertex to the NOT-IN cycle of each mirror vertex. Give each NOT-IN vertex its own unique color. A solution to TEx-o will choose cycles that include as many colors as possible, so the domination colors will certainly be included. It is clearly possible to include all domination colors by simply taking the IN cycle for every mirror vertex. Black is included automatically, and thus the best solution is determined simply by including as many of the unique NOT-IN colors as possible while still including all of the domination colors. If a NOT-IN color is included, that indicates that its vertex is not in the dominating set. Obviously, by maximizing the number of vertices not in the dominating set, the number of vertices in the dominating set is minimized. Note that every correct TEx-o solution will include all of the domination colors, because if any domination color were missing, two domination colors could be added by changing the cycle for the appropriate mirror vertex from its NOT-IN cycle to its IN cycle. That would remove the unique NOT-IN color, but two domination colors would be added for a gain of one additional color in the set of cycles. Similarly, MIN-DOMINATING-SET reduces to TMaxEx-o. The only change to the previous reduction is that black balance vertices are added to the NOT-IN cycles in order to give every IN cycle and NOT-IN cycle the exact same number of vertices. To illustrate the reduction, Figure 3 presents a graph that is an instance of MIN-DOMINATING-SET, and Figure 4 presents the corresponding instance of TMaxEx-o. The number of vertices in the MIN-DOMINATING-SET solution is exactly the same as the number of colors excluded from the TEx-o or TMaxEx-o solution. If there are n vertices in the MIN-DOMINATING-SET problem, then there are 3n + 1 colors in the corresponding TEx-o or TMaxEx-o problem: black, along with two domination colors and one NOT-IN color for each vertex. Therefore, if x is the optimal solution to MIN-DOMINATING-SET and y is the number of vertices in the solution proposed by the reduction, then the performance ratio is y/x, which is greater than the performance ratio for TEx-o or TMaxEx-o: (3n + 1 − x)/(3n + 1 − y). Hence, this reduction is a strict reduction [14]. Because MIN-DOMINATING-SET is Log-APX-hard, TEx-o and TMaxEx-o are also Log-APX-hard. 10 Highley, Le Tropical Vertex-Disjoint Cycles Figure 3: An instance of MIN-DOMINATING-SET Figure 4: MIN-DOMINATING-SET instance from Figure 3 reduced to TMaxEx-o 11 7 TROPICAL-EXCHANGE with only 2 vertices per color We now consider the problems jPC-TEx and jPC-TMaxEx, which are special cases of TROPICAL-EXCHANGE and TROPICAL-MAX-SIZE-EXCHANGE, respectively. For these problems, there can be at most j vertices of each color. In terms of a barter exchange, this corresponds to an organized exchange where each person is permitted to bring at most j items. We will show that these restricted cases are in APX and, unless j = 1, they are NP-hard. There is a trivial algorithm to show that both 2PC-TEx and 2PC-TMaxEx are in APX. Simply solve MAX-SIZE-EXCHANGE for the given graph, completely ignoring vertex colors. Because there are only two vertices in the graph for each color, the solution to MAX-SIZE-EXCHANGE is guaranteed to have at least half as many colors as the maximum number of colors possible in a solution to 2PC-TEx or 2PC-TMaxEx. Therefore it is a 2-approximation. Similarly, a j-approximation can be attained for any j, so jPC-TEx and jPC-TMaxEx are in APX for all j. Consider an instance of the NP-hard problem MAX-2-SAT. Build a graph in polynomial time as described in Section 3, but instead of making all variable vertices the same color, assign a unique color to each variable vertex. This graph has at most two vertices of any given color, so it is an instance of 2PC-TEx. A solution of 2PC-TEx will include as many colors as possible. If a clause’s color is included in the solution, that corresponds to a satisfied clause, so MAX-2-SAT reduces to 2PC-TEx, which means both are NP-hard. Similarly, 2PC-TMaxEx can be shown to be NP-hard with a reduction from MAX-2-SAT. As before, create a graph to represent the MAX-2-SAT instance, giving each variable vertex a unique color. Add balance vertices and give each balance vertex its own unique color. Finally, add an additional cycle that includes a vertex for each of the balance vertex colors. Each balance vertex color appears only twice: once in a TRUE or FALSE cycle and once in the balance vertex cycle. Due to the balance vertex cycle, every balance vertex color is guaranteed to appear in the solution, so those colors do not affect any decisions regarding whether to take a TRUE cycle or a FALSE cycle. As a result, every combination of TRUE and FALSE cycles has the same number of vertices in the cycles, and a solution to 2PC-TMaxEx will simply maximize the number of colors in the cycles. Maximizing the number of colors in the solution corresponds to maximizing the number of satisfied clauses. Thus, 2PC-TMaxEx is also NP-hard. Figure 5 depicts the reduction of an instance of MAX-2-SAT to jPC-TMaxEx. Because 2PC-TEx and 2PC-TMaxEx are NP-hard, jPC-TEx and jPC-TMaxEx are also NP-hard for all j > 2. 12 Highley, Le Tropical Vertex-Disjoint Cycles Figure 5: MAX-2-SAT instance reduced to TMaxEx. 8 MAX-SIZE-TROPICAL-EXCHANGE is NP-Hard and Log-APX-hard For completeness, we consider MAX-SIZE-TROPICAL-EXCHANGE (MaxTEx), where the primary criterion is maximizing the total number of colors in the set of vertex-disjoint cycles, and the secondary criterion is maximizing the number of vertices. This simply reverses the criteria of TMaxEx-o. It is easy to see that a solution to MaxTEx simultaneously solves TEx-o. One only needs to observe the number of colors in the solution to MaxTEx. Thus, MaxTEx is NP-hard and Log-APX-hard. 9 Conclusion In this paper, we have defined and analyzed problems that have practical application in the area of algorithmically arranged barter exchanges. We have shown that TROPICAL-EXCHANGE and TROPICAL-MAX-SIZE-EXCHANGE are NPcomplete and Log-APX-hard, and that MAX-SIZE-TROPICAL-EXCHANGE is NP-hard and Log-APX-hard. When instances of TROPICAL-EXCHANGE and TROPICAL-MAX-SIZE-EXCHANGE are restricted to j vertices per color (jPCTEx and jPC-TMaxEx, respectively), the optimization problems remain NP-hard if j > 1, but are in APX. 13 References [1] D. J. Abraham, A. Blum, and T. Sandholm. Clearing algorithms for barter exchange markets: Enabling nationwide kidney exchanges. In Proceedings of the 8th ACM Conference on Electronic Commerce, EC ’07, pages 295– 304, New York, NY, USA, 2007. ACM. doi:10.1145/1250910.1250954. [2] S. Akbari, V. Liaghat, and A. Nikzad. Colorful paths in vertex coloring of graphs. Electronic Journal of Combinatorics, 18(1), 2011. [3] J.-A. Angles d’Auriac, C. Bujtás, H. El Maftouhi, N. Narayanan, L. Rosaz, J. Thapper, and Z. Tuza. Tropical dominating sets in vertex-coloured graphs. In Proceedings of WALCOM: Algorithms and Computation: 10th International Workshop. Springer, 2016. [4] J.-A. Angles d’Auriac, H. El Maftouhi, S. Legay, N. Cohen, A. Harutyunan, and Y. Manoussakis. Connected tropical subgraphs in vertexcoloured graphs. Discrete Mathematics and Theoretical Computer Science, 17(3):327–348, 2016. [5] K. Appel and W. Haken. Every planar map is four colorable. Part i: Discharging. Illinois Journal of Mathematics, 21(3):429–490, 1977. [6] K. Appel, W. Haken, and J. Koch. Every planar map is four colorable. Part ii: Reducibility. Illinois Journal of Mathematics, 21(3):491–567, 1977. [7] I. Ashlagi, F. Fischer, I. A. Kash, and A. D. Procaccia. Mix and match: A strategyproof mechanism for multi-hospital kidney exchange. Games and Economic Behavior, 91:284–296, 2015. [8] J. Beier, J. Fierson, R. Haas, H. M. Russell, and K. Shavo. Classifying coloring graphs. Discrete Mathematics, 339:2100–2012, 2016. doi:10. 1016/j.disc.2016.03.003. [9] P. Biró and K. Cechlárová. Inapproximability of the kidney exchange problem. Information Processing Letters, 101(5):199–202, 2007. [10] P. Biro, D. F. Manlove, and R. Rizzi. Maximum weight cycle packing in directed graphs, with application to kidney exchange programs. Discrete Mathematics, Algorithms and Applications, 1(04):499–517, 2009. [11] H. L. Bodlaender, S. Thomassé, and A. Yeo. Kernel bounds for disjoint cycles and disjoint paths. In European Symposium on Algorithms, pages 635–646. Springer, 2009. [12] G. Chartrand, G. L. Johns, K. A. McKeon, and P. Zhang. Rainbow connection in graphs. Mathematica Bohemica, 133(1):85–98, 2008. [13] D. Coudert, P. Datta, S. Pérennes, H. Rivano, and M.-E. Voge. Shared risk resource group complexity and approximability issues. Parallel Processing Letters, 17(02):169–184, 2007. 14 Highley, Le Tropical Vertex-Disjoint Cycles [14] P. Crescenzi. A short guide to approximation preserving reductions. In Proceedings of the 12th Annual IEEE Conference on Computational Complexity, CCC ’97, pages 262–, Washington, DC, USA, 1997. IEEE Computer Society. URL: http://dl.acm.org/citation.cfm?id=791230.792302. [15] S. Daitch and D. Spielman. Faster approximate lossy generalized flow via interior point algorithms. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pages 451–460. ACM, 2008. [16] J. P. Dickerson, A. D. Procaccia, and T. Sandholm. Failure-aware kidney exchange. In Proceedings of the fourteenth ACM conference on Electronic commerce, pages 323–340. ACM, 2013. [17] R. Dondi, G. Fertin, and S. Vialette. Complexity issues in vertex-colored graph pattern matching. Journal of Discrete Algorithms, 9(1):82–99, 2011. [18] B. Escoffier and V. T. Paschos. Completeness in approximation classes beyond apx. Theoretical Computer Science, 359(1):369 – 377, 2006. URL: http://www.sciencedirect.com/science/article/pii/ S0304397506003148, doi:http://dx.doi.org/10.1016/j.tcs.2006. 05.023. [19] M. R. Fellows, G. Fertin, D. Hermelin, and S. Vialette. Upper and lower bounds for finding connected motifs in vertex-colored graphs. Journal of Computer and System Sciences, 77(4):799–811, 2011. doi:doi:10.1016/ j.jcss.2010.07.003. [20] F. Foucaud, A. Harutyunyan, P. Hell, S. Legay, Y. Manoussakis, and R. Naserasr. The complexity of tropical graph homomorphisms. CoRR, abs/1607.04777, 2016. URL: http://arxiv.org/abs/1607.04777. [21] C. Jacobi. About the research of the order of a system of arbitrary ordinary differential equations, 2016. [Online; accessed 6-October-2016]. URL: http: //www.lix.polytechnique.fr/~ollivier/JACOBI/jacobiEngl.htm. [22] V. Kann. On the approximability of NP-complete optimization problems. PhD thesis, Royal Institute of Technology Stockholm, 1992. [23] M. Krivelevich, Z. Nutov, M. R. Salavatipour, J. V. Yuster, and R. Yuster. Approximation algorithms and hardness results for cycle packing problems. ACM Transactions on Algorithms (TALG), 3(4):48, 2007. [24] H. Kuhn. The Hungarian Method for the assignment problem. Naval Research Logistics Quarterly, 2:83–97, 1955. [25] Y. Lee and A. Sidford. Path√finding methods for linear programming: Solving linear programs in O( rank) iterations and faster algorithms for maximum flow. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS), pages 424–433. IEEE, 2014. doi:10.1109/ FOCS.2014.52. 15 [26] X. Li and Y. Shi. Rainbow connection in 3-connected graphs. Graphs and Combinatorics, 29(5):1471–1475, 2013. [27] X. Li and Y. Sun. Rainbow connections of graphs. Springer Science & Business Media, 2012. [28] J. P. Pedroso. Maximizing expectation on vertex-disjoint cycle packing. In International Conference on Computational Science and Its Applications, pages 32–46. Springer, 2014. [29] M. U. Ünver. Dynamic kidney exchange. The Review of Economic Studies, 77(1):372–414, 2010.
8cs.DS
Hypergraph Two-coloring in the Streaming Model∗ arXiv:1512.04188v1 [cs.DS] 14 Dec 2015 Jaikumar Radhakrishnan† Saswata Shannigrahi ‡ Rakesh Venkat § Abstract We consider space-efficient algorithms for two-coloring n-uniform hypergraphs H = (V, E) in the streaming model, whenpthe hyperedges arrive one at a time. It is known that any such hypergraph with at most 0.7 lnnn 2n hyperedges has a two-coloring [4], which can be found deterministically in polynomial time, if allowed full access to the input. • Let sD (v, q, n) be the minimum space used by a deterministic (one-pass) streaming algorithm p that on receiving an n-uniform hypergraph H on v vertices and q hyperedges (q ≤ 0.7 lnnn 2n ), produces a proper two-coloring of H. We show that sD (n2 , q, n) = Ω(q/n). • Let sR (v, q, n) be the minimum space used by a randomized (one-pass) streaming algorithm that on receiving an n-uniform hypergraph H on v vertices and q hyperedges with high probability p n n produces a proper two-coloring of H (or declares failure). We show that 1 sR (v, 10 ln n 2 , n) = O(v log v).  2  n2 , sR nt , 2n−2 exp( 8t ), n = O(n2 /t); in particular, • We show that for any 4 ≤ t ≤ 2n−1 this shows that every n-uniform hypergraph with at most hyperedges is two-colorable. n2 t vertices and 2n−1 exp( 8t ) The above results are inspired by the study of the number q(n), the minimum possible number of p hyperedges in a n-uniform hypergraph that is not two-colorable. It is known that q(n) = Ω( lnnn 2n ) and q(n) = O(n2 2n ). The lower bound (due to Radhakrishnan and Srinivasan [4]) has a corresponding algorithm to deterministically produce the two-coloring; the upper bound due to Erdős is obtained by picking about n2 2n hyperedges randomly from a vertex set of n2 vertices. Our first result shows that no efficient deterministic streaming algorithm can match the performance of the algorithm in [4]; the second result shows that there is, however, an efficient randomized algorithm for the task; the third result shows that that if the number of vertices is substantially smaller than n2 , then every non-two-colorable hypergraph has significantly more than n2 2n hyperedges. 1 Introduction A hypergraph H = (V, E) is a set system E defined on a finite universe V (called the vertex set). The sets in the set system are called hyperedges. We consider n-uniform hypergraphs, that is, hypergraphs whose hyperedges all have n elements. We say that a hypergraph is two-colorable, or has Property B, if there is an assignment of colors χ : V → {red, blue} to the vertex set V such that ∗ A part of this work was reported earlier in the conference paper, Streaming Algorithms for 2-Coloring Uniform Hypergraphs by Jaikumar Radhakrishnan and Saswata Shannigrahi, WADS (2011): 667-678. † Tata Institute of Fundamental Research, Mumbai. E-mail: [email protected] ‡ Indian Institute of Technology, Guwahati. E-mail: [email protected] § Tata Institute of Fundamental Research, Mumbai. E-mail: [email protected] 1 every hyperedge e ∈ E(H) has a vertex colored red and a vertex colored blue, that is, no hyperedge is monochromatic. Note that the hypergraph two-coloring problem can be viewed as a constraint satisfaction problem where the clauses are of a specific kind (the Not-All-Equal predicate). In the special case of graphs (which we may view as two-uniform hypergraphs) two-colorability is easy to characterize and establish: the graph is two-colorable if and only if it does not have an odd cycle; one can find a two-coloring in linear time and O(|V |) space with random access to the input; if the edges are streamed one at a time, a two-coloring can be constructed with O(|V | log |V |) space and O((|E| + |V |) log2 |V |) bit operations. For the case of hypergraphs, the situation is not as simple. Using the probabilistic method, Erdős [2] showed that any n-uniform hypergraph with fewer than 2n−1 hyperedges is two-colorable: a random two-coloring is valid with positive probability; furthermore, this randomized method can be derandomized using the method of conditional probabilities. Erdős [2] later showed that there are n-uniform hypergraphs with Θ(n2 ) vertices and Θ(n2 2n ) hyperedges that are not two-colorable. Both these bounds remained unchanged for some time, until it was first improved by Beck [1], and further improved p n n by Radhakrishnan and Srinivasan [4], who showed that any hypergraph with fewer than 0.7 ln n 2 hyperedges is two-colorable. They also provided a polynomial-time randomized algorithm (and its derandomization) for coloring such hypergraphs. The algorithm has one-sided error, i.e., with some small probability δ that can be made arbitrarily small, it declares failure, but otherwise it always outputs a valid two-coloring. Recently, Cherkashin and Kozik [13] showed that a remarkably simple randomized algorithm achieves this bound. Erdős and Lovász [3] have conjectured that any hypergraph with fewer than n2n hyperedges is two-colorable. In related work, Achlioptas et al. [9] studied when, in terms of the number of hyperedges, does a randomly chosen n-uniform hypergraph stop being two-colorable, and relate this to similar questions for random nSAT. The above results are formally stated in terms of bounds on the number q(n), the minimum number of hyperedges in a non-two-colorable hypergraph. In its original description, the delayed recoloring algorithm of Radhakrishnan and Srinivasan [4] assumes that the entire hypergraph is available in memory, its vertices and hyperedges and may be accessed quickly. Unfortunately, the number of hyperedges can be exponentially larger than the number of vertices. For example, the number of hyperedges can be as high as Ω(2n ) even when there are just O(n) vertices, and it may be unrealistic to expect the entire hypergraph to be available in the main memory. In this paper, we ask if the performance of the delayed recoloring algorithm can be replicated when the work space of the algorithms is limited to (say) a polynomial in the size of vertex set. To study this question, we consider the hypergraph two-coloring problem in the streaming model, where the data arrives as a stream or is stored in external memory, and an algorithm with limited local work space analyzes it by making a small number of sequentially passes over it. The resources whose use one tries to minimize in this model are: the number of passes over the data, the amount of local memory required, and the maximum processing time for any data item. On receiving the complete data set, the algorithm must decide as fast as possible either to start another pass or stop with an output. The algorithm could be either deterministic or randomized, and in the latter case, its output needs to be accurate with high probability over the algorithm’s internal coin tosses. A number of important algorithms have been developed in the streaming model of computation, e.g., estimating frequency moments [8] and heavy hitters [12] of a data stream. These algorithms find applications in the context of network routing, where large amount of data flows through a router but each of them has limited memory. 2 Further motivation for our work comes from the semi-streaming model for graphs that has recently been considered widely in the literature. Proposed by Muthukrishnan [17], this model looks at solving fundamental problems on graphs such as Max-Cut, s − t-connectivity, shortest paths, etc. (see, for e.g. the works [18, 19, 20] and references therein) when the edges are streamed in one at a time. The algorithm only has O(|V |poly log(|V |) bits of workspace, and limited number of passes over the edge-stream, which means that it cannot store the entire graph in memory. Our model for hypergraphs is an extension of this setting, when we have a stream of hyperedges coming in. The parameter of interest to us is the uniformity n of the hypergraph, and we assume the number of vertices is poly(n): this is the natural regime in which all the results known for two-coloring hypergraphs are stated. The hyperedges are made available one at a time as a list of n vertices each, where every vertex is represented using B bits. Furthermore, we assume that poly(n) bits (equivalently, poly(|V |) bits are available in the algorithm’s work space. Notice that the number of hyperedges could now be exponential in n (or subexponential in |V |), and hence we allow for a space that is poly(|V |), rather than close to linear in the number of vertices like in the semi-streaming model for graphs. 1.1 Deterministic streaming algorithms: In the first part of the paper, we investigate the space requirements of deterministic streaming algorithms for the hypergraph two-coloring problem. It seems reasonable to conjecture that any deterministic two-coloring one-pass algorithm must essentially store all the hyperedges before it can arrive at a valid coloring. Let sD (v, q, n) be the minimum space used by a deterministic (one-pass) streaming algorithm that on receiving an n-uniform hypergraph H on v vertices and q hyperedges produces a proper two-coloring of H. Theorem 1.1. sD (n2 , q, n) = Ω(q/n). p Note that when q ≤ 0.7 lnnn 2n , the graph is guaranteed to have a two-coloring. However, the above theorem shows if the number of hyperedges is large, a two-coloring (though it is guaranteed to exist) cannot be found efficiently by a deterministic streaming algoirithm. Lower bounds for space bounded computations often follow from lower bounds for associated communication complexity problems. The above result is also obtained using this strategy. However, the communication complexity problem turns out to be somewhat subtle; in particular, we are not able to directly reduce it to a well-known problem and refer to an existing lower bound. We conjecture that no deterministic algorithm can do substantially better if it is allowed only a constant number of passes over the input. Note, however, that proving this might be non-trivial, because the corresponding two-round deterministic communication problem has an efficient protocol; see Section 3.1 for details. 1.2 Randomized streaming algorithms: We show that a version of the delayed recoloring algorithm can be implemented in the streaming model, and provides essentially the same guarantees as the original algorithm. Let sR (v, q, n) be the minimum space used by a randomized (one-pass) streaming algorithm that on receiving an n-uniform hypergraph H on v vertices and q hyperdges with probability at least 34 (say) produces a proper two-coloring of H (or declares failure). We suppose that each vertex is represented using B bits, and each edge is represented as an n-tuple of vertices. 3 p n n 1 Theorem 1.2. sR (v, 10 ln n 2 , n) = O(vB). Furthermore, the corresponding randomized algorithm maintains a coloring of the vertices encountered, p n n and updates this coloring in time O(nvB) 1 per hyperedge. If the hypergraph has at most 10 ln n 2 hyperedges, then with high probability the two-coloring is valid. If the two-coloring being maintained valid, the algorithm declares failure (the algorithm never outputs an invalid coloring). 1.3 The number of vertices in non-two-colorable hypergraphs The upper bound for Property B, q(n) = O(n2 2n ), was shown by Erdős by exhibiting a hypergraph with O(n2 2n ) hyperedges that is not two-colorable; this hypergraph needed n2 vertices. We ask if there are such non-two-colorable hypergraphs with o(n2 ) vertices. 2 n Theorem 1.3. (a) Let t be such that 4 ≤ t ≤ 2n−1 . An n-uniform hypergraph with at most 2 n−1 n /t vertices and at most 2 exp(t/8) hyperedges is two-colorable. The corresponding two-   2 n n−1 R exp(t/8), n = coloring can be found using an efficient randomized streaming algorithm: s t ,2 O(n2 /t). 2 2 n tn (b) If t ≤ 2n−1 , there is a graph with n2 /t vertices and O( nt · 2n exp( n−2t )) hyperedges that is not two-colorable. Setting t = 8 ln(2n) in Theorem 1.3(a) above implies that for any n-uniform hypergraph with n2 vertices and q < n2 2n hyperedges, there is a randomized one-pass streaming algorithm v ≤ 8 ln(2n) 2 that outputs a two-coloring with high probability. This algorithm requires O( lnn n ) space at any instant and O(n) processing time after reading each hyperedge. A comparison of this to the result of Erdős [2], which gave a construction of a non-two-colorable hypergraph with the same q = n2 2n hyperedges, but on Θ(n2 ) vertices shows that the number of vertices being Ω(n2 ) was crucial, and anything significantly smaller would not have worked. Furthermore, Theorem 1.3 (b) recovers Erdős’ bound when t = O(1), and generalizes it to make explicit the dependence of the Erdős’ upper bound on q(n) on the vertex-set size. Organisation of the rest of the paper: In Section 2 we introduce the notation. In Section 3, we establish Theorem 1.1, showing the limitation of deterministic streaming algorithms. In Section 4, we prove Theorem 1.2 by showing how a version of the off-line delayed recoloring algorithm of [4] (see Section 4.1) can, in fact, be implemented efficiently in the streaming model. In Section 5, we prove the results in Theorem 1.3 regarding non-two-colorability. We conclude with some remarks and open problems. 2 Notation  Our n-uniform hypergraphs will be denoted by (V, E), where V is the set of vertices, and E ⊆ Vn is the set of hyperedges of H. For a hypergraph H = (V, E), we use v for |V |, and q for |E|. In our setting, v will typically be a small polynomial in n and q will be exponential in n. For any k ∈ N, we use the notation [k] := {1, . . . , k}. A valid two-coloring of the hypergraph H is an assignment χ : V → {Red, Blue} that leaves no edge monochromatic, i.e., ∀e ∈ E, ∃i, j ∈ e such that χ(i) 6= χ(j). A hypergraph that admits a valid two-coloring is said to be two-colorable, or equivalently, to have Property B. 4 We will be interested in space-efficient streaming algorithms for finding two-colorings of hypergraphs. Consider a hypergraph with edge set E = {e1 , . . . , eq }. The hyperedges are made available to the algorithm one at a time in some order ei1 , . . . , eiq . To keep the problem general, we will not assume that the vertex set is fixed in advance. The algorithm will become aware of the vertices as they arrive as part of the stream of hyperedges. We will assume that each vertex is encoded using B bits. The goal is to design a space-efficient algorithm (deterministic or randomized) that can output a valid coloring for the entire hypergraph once all the hyperedges have passed. We may allow multiple passes over the input data. We call the algorithm a r-pass streaming algorithm, if it outputs a valid coloring after making r passes over the input stream. By space-efficient, we mean that the algorithm uses poly(n) internal workspace. We will assume that n is large, say at least 100. Denote by sD r (v, q, n) the minimum space used by a deterministic r-pass streaming algorithm that on receiving an n-uniform hypergraph H on v vertices and q hyperedges produces a proper twocoloring of H. Similarly, sR r (v, q, n) is the minimum space used by a randomized r-pass streaming algorithm that on receiving an n-uniform hypergraph H on v vertices and q hyperedges with probability at least 43 (say) produces a proper two-coloring of H (or declares failure). When r is omitted from the subscript, it is assumed r = 1. 3 Deterministic streaming algorithms We first show lower bounds in the deterministic setting. We recall the routine translation of an efficient streaming algorithm to a communication complexity protocol [8], with a view to proving lower bounds. There are two computationally unbounded players Alice and Bob, who both know of a relation R ⊆ X × Y × Z. Alice receives an input x ∈ X and Bob gets y ∈ Y; in the beginning, neither player is aware of the other’s input. Their goal is to exchange bits according to a fixed protocol and find a z ∈ Z so that (x, y, z) ∈ R. The communication complexity of R is the minimum number of bits that Alice and Bob exchange in any valid protocol for the worst case input pair (x, y). Several generalizations of this model can be defined with k >= 3 players, we will define our specific model below. For more details on communication complexity in general, please consult the book by Kushilevitz and Nisan [7]. To show lower bounds for hypergraph two-coloring, we define the class of communication problems H(v, q, k) 1 . Definition 3.1 (Problem class H(v, q, k)). For k >= 2, an instance I ∈ H(v, q, k) has k players P1 , . . . , Pk . Each player Pi has a subset Ei ⊆ E of some hypergraph H = (V, E = E1 ∪E2 ∪· · ·∪Ek ), with |V | = v and |Ei | ≤ q. The communication is done in sequential order: starting with P1 , Pi sends a message to Pi+1 for i ∈ {1, . . . , k − 1}. This sequence of communication constitutes a round. In a multiple-round protocol, Pk may start a new round by sending back a message to P1 , who would continue communication in the above order. In a valid r-round protocol Π, some Pi in the course of the r-th round will output a coloring χ that is valid for H. Denote by Π(I, Pi , l) the communication sent by Pi in round l on instance I. We define the r-round communication complexity of H(v, q, k) as follows: CCr (H(v, q, k)) = 1 min Π: r−round valid protocol max I∈H(v,q,k), i∈[k],l∈[r] |Π(I, Pi , l)| Since all hypergraphs we consider are n-uniform, we will not explicitly state n as a parameter 5 Remark 3.2. In this definition, we consider the maximum communication by any single player instead of total communication because this quantity is related more closely to the space requirement of streaming protcols (see Proposition 3.3 below). If the maximum communication by any player is s bits, then the total communication is bounded above by kr · s bits for an r round protocol. Besides, for the values of k and r that we consider, this O(kr) blowup is immaterial. Note that when k = 2 and r = 1, we get the two-player one-round model (where we traditionally call P1 as Alice and P2 as Bob): Alice sends a message m to Bob depending on her input and Bob outputs a coloring looking at m and his input. Our lower bound for hypergraph coloring in the streaming model will rely on the following well-known connection between streaming and communication complexity introduced in [8]. Proposition 3.3 ([8]). For any k ∈ Z, k ≥ 2, we have: CCr (H(v, q, k)) ≤ sD r (v, q, n) Thus, to establish Theorem 1.1, it is enough to show an appropriate lower bound on CC1 (H(v, q, k)). We start with the two-player case, which already introduces most of the ideas. 2 Theorem 3.4. CC1 (H(n2 , q, 2)) = Ω( 2nqn4 ). Remark 3.5. Note that the above theorem gives a non-trivial lower bound only when q ≫ n2 2n/2 . Ideally, we would expect a lower bound that is linear in q, for all values of q. Proof. Consider a valid one-round protocol for the two-player problem where Alice sends a message m from a set M of possible messages. Let the input to the protocol be (HA , HB ), where HA and HB are hypergraphs, each with q hyperedges on a common vertex set [n2 ]. For every hypergraph HB that Bob receives, he must output a coloring χ = f (m, HB ) based on some deterministic function f . For m ∈ M, define L(m) = {f (m, HB ) : HB is an input for Bob}. It is easy to see that Bob may identify the message m with the list L(m); on receiving m, he must find a proper coloring for HB from L(m). Thus, for every m ∈ M, we have the following. Completeness for Bob: Every possible input hypergraph to Bob (i.e. all hypergraphs on q hyperedges) should have a valid coloring in L(m). Soundness for Alice: Let P (m) = {HA : Alice sends the message m for input HA }. Then every χ ∈ L(m) should be valid for every hypergraph HA ∈ P (m). We will show that these two conditions imply the claimed lower bound on |M|. Definition 3.6 (Shadows). Given a coloring χ, we define its shadow ∆(χ) to be the set of all possible hyperedges that are monochromatic under χ. The shadow of a list L of colorings is [ ∆(L) = ∆(χ) χ∈L 6 Note that in the above definition, the shadow ∆(χ) collects all possible monochromatic hyperedges under χ, so it depends only on the coloring χ, and not on any hypergraph. Similarly, ∆(L) is also a collection of hyperedges and does not depend on any hypergraph; in particular, if a hypergraph HA is monochromatic under every coloring in L, then none of HA ’s hyperedges can appear in ∆(L). In the following, assume that n is large. Claim 3.7. For every coloring χ, we have  2 n 1 . ∆(χ) ≥ n n 10 · 2 (3.1) Proof of Claim. : One of the two color classes χ has at least ⌈n2 /2⌉ vertices. It follows that  2   2 ⌈n /2⌉ 1 n ∆(χ) ≥ ≥ . n n n 10 · 2 We next observe that the completeness condition for Bob imposes a lower bound on ∆(L(m)). Claim 3.8. For every m ∈ M,  2 n q . |∆(L(m))| ≥ 2 n n 10n 2 Proof of Claim. : Suppose the claim does not hold, that is,  2 q n |∆(L(m))| < . 2 n n 10n 2 (3.2) (3.3) Choose a random hypergraph HB by choosing q hyperedges randomly from ∆(L(m)). We will say that the hypergraph hits χ ∈ L(m), if at least one of its hyperedges falls in ∆(χ), otherwise we say it misses χ. For each χ ∈ L(m), we have, using the bounds (3.1) and (3.3), that  q |∆(χ)| Pr[H misses χ] ≤ 1 − H |∆(L(m))| q  n2 ≤ 1− q ≤ exp(−n2 ) 2 Since there are at most 2n colorings, the union bound yields: 2 Pr[∃χ ∈ L(m) : H misses χ] ≤ 2n exp(−10n2 ) ≪ 1 H Thus there exists a hypergraph H with q hyperedges that hits every coloring χ ∈ L(m), that is every coloring in L(m) is invalid for H. This, however, violates Completeness for Bob, proving the Claim. 7 We can now complete the proof of the theorem. Consider a random hypergraph H for Alice, obtained by choosing each of its hyperedges uniformly at random from the set of all hyperedges. Since Alice sends some m ∈ M for every hypergraph, the soundness condition for Alice implies that q2 q q ) ≤ |M| exp(− ), 1 = Pr[∃m : H misses all χ ∈ L(m)] ≤ |M|(1 − H 10n2 2n 10n2 2n where we used Claim 3.8 to justify the first inequality. 2 Taking logarithms on both sides yields the desired lower bound log |M| = Ω( nq4 2n ). As remarked earlier, the above communication lower bound implies that the space required by a deterministic streaming algorithm to find a valid coloring is exponential in n even for hypergraphs that have very simple randomized coloring strategies; it does not yield any such lower bound for hypergraphs that have fewer than 2n/2 hyperedges. In order to overcome this limitation, we generalize the analysis above to the k-player hypergraph coloring problem. We will see later that for q ≤ 2n/2 there do exist efficient two-player one-round protocols, so we could not have proved our lower bounds while restricting our attention to the two-player setting. Proof of Theorem 1.1: Theorem 1.1 will follow from the following theorem: Theorem 3.9. Let k ≥ 1.  " q CC1 (H(v, q, k + 1)) = Ω q v v/2 n v n #1  k  Proof. Recall that the protocol has k + 1 players, P1 , P2 , . . . , Pk , Pk+1 . player Pi receives a hypergraph Hi with q hyperedges over the vertex set [v]. The communication starts with P1 , who sends a message m1 of length ℓ1 to player P2 ; in the i-th step, Pi sends a message of length ℓi to Pi+1 . In the end, Pk+1 produces a coloring for the hypergraph H1 ∪ H2 ∪ · · · ∪ Hk+1 . It will be convenient to view this coloring as a message sent by player Pk+1 , and set ℓk+1 = v (the number of bits needed to describe a coloring). In a (k + 1)-player protocol, after the messages sent by the first i players have been fixed, we have a list of colorings that may still be output at the end; we use the following notation to refer to this list (recall that mk+1 is a coloring): L(m1 , m2 , . . . , mi ) = {mk+1 : for some input H1 , H2 , . . . , Hk+1 the transcript is of the form (m1 , m2 , . . . , mi , . . . , mk , mk+1 )}. In particular, by considering the situation at the beginning of the protocol (when no messages have yet been generated), we let L0 = {χ : mk+1 = χ is output by the protocol on some input}. Let  s0 = |∆(L0 )|/ nv , and for i = 1, . . . , k + 1, let   v si (m1 , . . . , mi ) = |∆(L(m1 , m2 , . . . , mi ))| n 8 and si = min (m1 ,m2 ,...,mi ) si (m1 , . . . , mi ). Here the minimum is taken over all possible sequences of first i messages that arise in the protocol. In particular, s0 corresponds to the union of shadows of all colorings ever output by the protocol, and sk+1 corresponds to the shadow of the output corresponding to the transcript (that is, the shadow of the last message, which is a coloring). Claim 3.10. s0 ≤ 1 ∀i ∈ {0, . . . , k} : (3.4) si ≥ si+1 sk+1 ≥ q ℓi+1 ⌈v/2⌉ n . v (3.5) (3.6) n Proof. Inequality (3.4) is immediate from the definition of s0 . For Claim (3.5), we use ideas similar to those used in the proof of Claim 3.8 for two-player protocols. Fix m1 , m2 , . . . , mi . We will show that si (m1 , m2 , . . . , mi ) is at least the right hand side of (3.5). Pick a random hypergraph H (which we will consider as a possible input to Pi+1 ) as follows: choose q hyperedges independently and uniformly from the set ∆(L(m1 , . . . , mi )). When H is presented to Pi+1 , it must respond with a message mi+1 . None of the colorings that Pk+1 produces after that can include any edge of H in its shadow, that is, ∆(L(m1 , . . . , mi+1 )) ∩ H = ∅. For each valid choice m for mi+1 , we have ∆(L(m1 , . . . , mi , m)) ⊆ ∆(L(m1 , . . . , mi )) and   q  si+1 si+1 (m1 , . . . , mi , m) q ≤ 1− . Pr[H ∩ ∆(L(m1 , . . . , mi , m)) = ∅] ≤ 1 − si (m1 , . . . , mi )) si (m1 , . . . , mi )) Thus, q si+1 H si (m1 , . . . , mi ))   si+1 q q This yields exp(ℓi+1 − si (m1 ,...,mi ) ) ≥ 1, giving si (m1 , . . . , mi ) ≥ si+1 ℓi+1 . By minimizing over valid sequences (m1 , . . . , mi ), we justify our claim.  Claim 3.6 follows from the fact the shadow of every coloring has at least ⌈v/2⌉ hyperedges. n  1 = Pr[∃mi+1 : ∆(L(m1 , . . . , mi+1 )) ∩ H = ∅] ≤ 2ℓi+1 1 − By combining parts (3.4) and (3.5), we obtain 1≥ q k+1 sk+1 ,k+1 Y ℓi . i=1 The theorem follows from this by using (3.6), noting that ℓk+1 ≤ v, and for i = 1, 2, . . . , k: ℓi ≤ maxi∈[k] ℓi . Corollary 3.11 (Restatement of Theorem 1.1). Every one-pass deterministic streaming algorithm to two-color an n-uniform hypergraph with at most q hyperedges requires Ω( nq ) bits of space. Proof. Setting k = n in the previous result immediately yields that for hypergraphs on v = n2 vertices and at most q = (n + 1)q ′ hyperedges, the communication required is Ω(q ′ ). The lower bound for streaming algorithms then follows from Proposition 3.3. 9 3.1 Deterministic communication protocols for the two-coloring problem In the previous section, we derived our lower bound for the deterministic streaming algorithms by invoking multi-player communication complexity, because the two-player lower bound did not give us a non-trivial lower bound for hypergraphs with fewer than 2n/2 hyperedges. In this section, we first show an upper bound in the two-player setting, which shows that it was essential to consider the multi-player setting in order to get the stronger lower bound. Next, we consider two-round protocols, for they are related to two-pass streaming algorithms. We show below, perhaps surprisingly, that the two-round two-player deterministic communication complexity for the problem is poly(n). However, we do not have a streaming algorithm with a matching performance. Theorem 3.12. CC1 (H(v, 2n/2 , 2)) = poly(n) Proof. Alice and Bob will base their protocol on a special collection of lists of colorings L = {L1 , . . . , Lr }, with r = 2n . Suppose Alice’s hypergraph is HA and Bob’s hypergraph is HB . The protocol will have the following form. Alice Alice sends an index i of a list Li ∈ L such that every coloring in Li is valid for HA . Bob Bob outputs a coloring χ ∈ Li that is valid for HB . We next identify some properties on the collection of lists that easily imply that the protocol above produces a valid two-coloring. Definition 3.13 (Good Lists). (a) A collection of lists L is good for Bob, if for every hypergraph HB , in every list L in L there is a valid coloring for HB in L. (b) A collection of lists L is good for Alice, if for every hypergraph HA , there is some list L in L, such that every coloring in L is valid for HA . Note that good collections are defined differently for Alice and Bob. With this definition, the existence of a collection of lists that is good for both Alice and Bob would furnish a one-way communication protocol with ⌈log r⌉ bits of communication, and establish the theorem. Such a good collection is shown to exist in Lemma 3.14 below. Lemma 3.14. Suppose HA and HB are restricted to have at most 2n/2 hyperedges. Then, there exists a collection of L = {L1 , . . . , Lr } of r = 2n lists, each with k = ⌈62n/2 log v⌉ colorings, which is good for Alice and Bob. Proof. We pick L by picking r lists randomly: list Li will be of the form {χi1 , . . . , χik }, where each coloring is chosen independently and randomly from the set of all colorings. We will show that with positive probability L is a good collection of lists. We will separately bound the probability that L fails to satisfy conditions (a) and (b) above. We may restrict attention to hypergraphs that have exactly q = ⌊2n/2 ⌋ hyperedges. (a) We first bound the probability that L is not good for Bob. Consider one list Li ∈ L. Pr[Li is not good for Bob ] = Pr[∃HB such that none of the k colorings are valid for HB ]  v   q k n . ≤ 2n−1 q 10 Since L is a collection of r lists, we have Pr[L is not good for Bob] = Pr[∃Li ∈ L is not good for Bob]  v   q k n ≤ r 2n−1 q ≤ 2(nq log v+log r)−k(n−log q−1) . (3.7) (3.8) To make the right hand side of (3.8) small, we will later choose k such that k≫ nq log v + log r . n − log q − 1 (3.9) (b) We next bound the probability that L is not good for Alice. Fix a hypergraph HA for Alice, and consider Li ∈ L.  q k Pr[every χ ∈ Li is valid for HA ] ≥ 1 − n−1 Li 2     qk x ) . (using 1 − x ≥ exp − 1−x ≥ exp − n−1 2 −q v  Since L is a collection of r such lists chosen independently and there are (nq ) choices for HA , we have  v   r  qk n Pr[L is not good for Alice] ≤ 1 − exp − n−1 2 −q q    qk ≤ exp qn ln v − r exp − n−1 . (3.10) 2 −q To make the right hand side of (3.10) small, we will choose r such that   qk r ≫ (qn ln v) exp . 2n−1 − q (3.11) Now, suppose v = poly(n). Then one can verify that if we set k = ⌈6q log v⌉ and r = 2n , then (3.9) and (3.11) both hold for all large n. It follows that the required collection of lists exists. 3.1.1 Circuit upper bounds and a 2-round communication protocol Next we present our efficient two-player, two-round communication protocol for hypergraph twocoloring. Theorem 3.15. CC2 (H(v, 2n /8, 2)) = poly(n) We will prove Theorem 3.15 by exploiting the connection between circuit complexity and KarchmerWigderson games [14]. Definition 3.16 (Karchmer-Wigderson game). Given a monotone boolean function f : {0, 1}N → {0, 1}, the Karchmer-Wigderson communication game Gf between two players Alice and Bob is the following: Alice gets an input x ∈ f −1 (0), and Bob gets an input y ∈ f −1 (1), and they both know f . The goal is to communicate and find an index i ∈ [N ] such that xi = 0 and yi = 1 (such an index exists since f is monotone). The communication complexity of this game is denoted by CC(Gf ) (or specifically CCr (Gf ) for an optimal r-round protocol). 11 Karchmer and Wigderson make the following connection: Theorem 3.17 ([14]). If a monotone boolean function f has a depth-d, size s circuit, then CCd−1 (Gf ) = O(d log s). The proof of Theorem 3.15 will be based on the circuit complexity of Approximate Majority functions. Define the partial function ApprMajN on a subset of {0, 1}N as follows: ApprMajN (x) = 1 when |x| ≥ 2N/3, and ApprMajN (x) = 0 when |x| ≤ N/3. A function f : {0, 1}N → {0, 1} is an Approximate Majority function if it satisfies: f (x) = 1 when |x| ≥ 2N/3, and f (x) = 0 when |x| ≤ N/3. We need the following Lemma. v Lemma 3.18. For any Approximate Majority function f : {0, 1}2 → {0, 1}, we have: CCr (H(v, 2n /8, 2)) ≤ CCr (Gf ) Proof. We will prove this by reducing H(v, 2n /8, 2) to Gf , for any Approximate Majority function f . For convenience, let N := 2v . Suppose Alice receives HA = (V, EA ), and Bob receives HB = (V, EB ). Let LA ∈ {0, 1}N be an indicator vector for Alice that marks which of the N possible twocolorings of V (arranged in some canonical order) are valid for HA , and let LB be the corresponding indicator vector for Bob. Since we know that both HA , HB have q ≤ 2n /8 hyperedges, a randomly chosen coloring will color either hypergraph with probability ≥ 3/4, which implies |LA | ≥ 3N/4 and |LB | ≥ 3N/4. To find a coloring valid for both HA and HB , Alice and Bob just have to find an index i ∈ [2v ] such that LA (i) = LB (i) = 1. Alice now complements her input to consider LA . Since |LA | ≤ N/4, ApprMajN (LA ) = 0, whereas ApprMajN (LB ) = 1. Clearly, playing the Karchmer-Wigderson game for any Approximate Majority function f on N bits, LA , LB would find a index i where LA = LB = 1, and consequently yield a valid coloring for HA ∪ HB . Hence, a small depth-3 monotone circuit that computes ApprMaj2v on its domain would yield an efficient 2-round protocol for H(v, 2n /8, 2), using Theorem 3.17. Ajtai [15] showed that such a circuit exists, and Viola [16] further showed uniform constructions of such circuits. Theorem 3.19. [16] There exist monotone, uniform poly(N )-sized depth-3 circuits for ApprMajN on N input bits. Proof (of Theorem 3.15). The proof of Theorem 3.15 is now immediate from Theorems 3.17, 3.19 and Lemma 3.18, since v is polynomial in n. 4 Streaming algorithms for hypergraph two-coloring In this section, we present streaming algorithms that come close to the performance of the randomized off-line algorithm of Radhakrishnan and Srinivasan [4]. We first point out why this algorithm, as stated, cannot be implemented with limited memory. Next, we show how an alternative version can be implemented using a small amount of memory. This modified version, however, does return colorings that are not valid (though it does this with small probability); we show how by maintaining a small amount of additional information, we can derive an algorithm that returns and valid coloring with high probability or returns failure, but never returns an invalid coloring. In order to describe our algorithms, it will be convenient to use u, w to denote vertices in the hypergraph. Also, in this section, we will explicitly use |V | to denote the size of the vertex set V , 12 and |E| to denote the number of hyperedges in the hypergraph. The vertex set of the hypergraph will be identified with [|V |], and B will denote the number of bits required to represent a single vertex in V . 4.1 The delayed recoloring algorithm Radhakrishnan and Srinivasan [4] showed that by introducing delays in the recoloring step of an algorithm originally proposed by Beck [1] one can two-color hypergraphs with more hyperedges than it was possible before. p Theorem 4.1. Let H = (V, E) be an n-uniform hypergraph with at most 1/10 n/ ln n × 2n hyperedges. Then H is two-colorable; also a proper two-coloring can be found with high probability in time O(poly(|V | + |E|)). Algorithm 1 (Off-line delayed recoloring algorithm) 1: Input H = (V, E). 2: For all u ∈ V , independently set χ0 (u) to Red or Blue with probability 12 . 3: Let M0 be the set of hyperedges of H, that are monochromatic under χ0 . 4: For all u ∈ V , independently set b(u) to be 1 with probability p, and 0 with probability 1 − p. 5: Let π be one of the |V |! permutations of V , chosen uniformly at random. 6: for i = 1, 2, . . . , |V | do 7: χi is obtained from χi−1 by retaining the colors of all vertices except perhaps π(i). If b(π(i)) = 1, and some hyperedge containing π(i) was monochromatic under χ0 and all its vertices still have the same color in χi−1 , then χi−1 (π(i)) is flipped to obtain χi (π(i)). 8: end for 9: Output χf = χ|V | . The term off-line refers to the fact that we expect all hyperedges to remain accessible throughout the algorithm. The term delayed recoloring refers to the fact that vertices are considered one after another, and are recolored only if the initially monochromatic edge they belonged to has not been set right by a vertex recolored earlier. For a coloring χ, let B(χ) be the set of hyperedges that are colored entirely blue under χ, and the following claims are let R(χ) be the set of hyperedges colored entirely red under χ. In p[4], 1 n n established for this algorithm under the assumption that |E| ≤ 10 2 . In the following, the ln n parameter p denotes the probability that the bit b(v) is set to 1 in Algorithm 1. r 2 n Pr[(B(χf ) ∩ B(χ0 ) 6= ∅) ∨ (R(χf ) ∩ R(χ0 ) 6= ∅)] ≤ (1 − p)n (4.1) 10 ln n 2np ; (4.2) Pr[B(χf ) \ B(χ0 ) 6= ∅] ≤ 100 ln n 2np Pr[R(χf ) \ R(χ0 ) 6= ∅] ≤ . (4.3) 100 ln n The first inequality (4.1) helps bound the probability that an initially monochromatic hyperedge does not change our attempts at recoloring; the second inequality (4.2) considers the event where an initially non-blue hyperedge become blue because of recoloring; the third inequality (4.3) similarly refers to the event where an initially non-red hyperedge becomes red because of recoloring. These 13 events together cover all situations where χf turns out to be invalid for H. Now, set p = ln ln n) so that we have r 2 4np 1 1 11 n (1 − p)n + ≤ + ≤ . 10 ln n 100 ln n 5 50 50 1 2n (ln n − (4.4) Thus, the above algorithm produces a valid two-coloring with probability at least 12 . Furthermore, since the entire graph is available in this off-line version, we can efficiently verify that the final coloring is valid. By repeating the algorithm ⌈log(1/δ)⌉ times, we can ensure that the algorithm produces a valid coloring with probability at least 1 − δ, and declares failure otherwise (but never produces an invalid coloring). Implementation in the streaming model: Now, suppose the hyperedges arrive one at a time, each hyperedge is a sequence of n vertices, each represented using B bits. In time O(Bn) per edge, we may extract all the vertices. The corresponding colors and bits for recoloring can be generated in constant time per vertex. Generating the random permutation π is a routine matter, we maintain a random permutation of the vertices received so far by inserting each new vertex at a uniformly chosen position in the current permutation; using specialized data structure, the total time taken for generating π is O(|V ||B| log |V |). Overall, the the algorithms can be implemented in time Õ(nB|V ||E|) (the Õ hides some polylog(|V |) factors). The space required is rather large because we explicitly store the hyperedges. Observe, however, that we need store only the hyperedges that are monochromaticpafter the initial random coloring. Thus, the algorithm can be implemented using Õ(|V |B + nB lnnn ) bits of space on the average. The space and time requirements may then be considered acceptable, but this implementation does not allow us to determine if the coloring produced at the end is valid; moreover, it is not clear how we may reduce the error probability by repetition. In the next section, we give an implementation that does not suffer from this deficiency. 4.2 An efficient streaming algorithm In this section, we modify the randomized streaming algorithm of the previous section so that it uses O(B|V |) bits of space and takes time comparable to the off-line algorithm. This version maintains a running list of vertices as suggested above, but it assigns them colors immediately, and with the arrival of each edge decides if some of its vertices must be recolored. The algorithm is derived from the off-line algorithm. It maintains enough information to ensure that the actions of this streaming algorithm can somehow be placed in one-to-one correspondence with the actions of the off-line algorithm. We wish to show that Algorithm 2 succeeds in constructing a valid coloring with probability at least 12 . To justify this, we compare the actions of this algorithm and the off-line delayed recoloring algorithm stated earlier, and observe that their outputs have the same distribution. Recall that χ0 was the initial coloring generated in the Algorithm 1. Let χ̂0 be the corresponding coloring for Algorithm 2: that is, let χ̂0 (u) be the color u was first assigned when the first hyperedge containing u appeared in the input. Similarly, let b̂ be the sequence of bits generated by the above algorithm, and π̂ be the final permutation of vertices that results. Notice (χ0 , b, π) and (χ̂0 , b̂, π̂) have the same distribution. In Algorithm 1, once χ0 , b and π are fixed, the remaining actions are deterministic. That is, χf = χf (χ0 , b, π) is a function of (χ0 , b, π). Similarly, once we fix (i.e., condition on) (χ̂0 , b̂, π̂), the final coloring χ̂f = χ̂f (χ̂0 , b̂, π̂) is fixed. 14 Algorithm 2 Delayed recoloring with limited space 1: Input: The hypergraph H = (V, E) as a sequence of hyperedges h1 , h2 , . . .. 2: The algorithm will maintain for each vertex u three pieces of information: (i) its initial color χ0 (u); (ii) its current color χ(u); (iii) a bit b(u) that is set to 1 with probability p; 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: Furthermore, it maintains a random permutation π of the vertices received so far. for i = 1, 2, . . . , |E| do Read hi . for u ∈ hi do if u has not been encountered before then Set χ0 (u) = χ(u) to Red or Blue with probability 12 . Set b(u) to 1 with probability p and 0 with probability 1 − p. Insert u at a random position in π. end if end for if hi was monochromatic under χ0 and all its vertices have the same color under χ then Let u be the first vertex (according to the current π) such that b(u) = 1. if χ0 (u) = χ(u) then Flip χ(u). end if end if end for Output χf = χ|V | . 15 Lemma 4.2. For all χ, b and π, we have χf (χ0 , b, π) = χ̂f (χ0 , b, π). Proof. Suppose χf (u) 6= χ̂f (u) for some vertex u. One of them must equal χ0 (u). We have two cases. Suppose χ0 (u) = χ̂f (u) 6= χf (u): Let us also assume that h is a hyperedge that necessitated u’s recoloring in the off-line algorithm. This implies that b(u) = 1, and b(w) = 0 for the vertices w of h that appeared before u in π. Now in the streaming algorithm above, when h is considered, we would find that h is monochromatic in χ0 , and flip χ(u) unless it is already flipped. Once flipped, the color of u will not change again. Thus, χ̂f (u) 6= χ0 (u)—a contradiction. Suppose χ0 (u) = χf (u) 6= χ̂f (u): Let h be the hyperedge that necessitated the recoloring of u in the above streaming algorithm. This implies that b(u) = 1, and all vertices w of h that appear before u in permutation π have b(w) = 0. But in such a situation, the original off-line algorithm will find h monochromatic when u is considered, and will flip its color. Thus, χ0 (u) 6= χf (u)—a contradiction. We conclude that (4.4) applies to Algorithm 2 as well. Corollaryp4.3 (Compare Theorem 4.1). Let H = (V, E) be an n-uniform hypergraph with at most 1/10 n/ ln n × 2n hyperedges. Then, with probability at least 12 Algorithm 2 produces a valid two-coloring for H. Note, however, Algorithm 2 lacks the desirable property that it outputs only valid colorings. A straight-forward check does not seem possible using O(|V |B) RAM space. We show below that with carefully storing some vertices of a few hyperedges, we can in fact achieve this using only O(nB) RAM space. 4.3 An efficient algorithm that produces only valid colorings As remarked before the events considered in inequalities (4.1), (4.2) and (4.3) cover all situations when the algorithm might return an invalid coloring. So, in order never to return an invalid coloring, it suffices to guard against these events. (a) To ensure that some vertex in every initially monochromatic hyperedge h does change its color, we just need to verify that b(u) = 1 for some u ∈ h. This we can ensure by examining χ0 and b just after they are generated in line 7 of Algorithm 2. (b) To ensure that no initially non-blue hyperedge h has turned blue, we will will save the red vertices of h whenever there is potential for them all turning blue, and guard against their turning blue. Consider the hypergraph HBlue with hyperedges −1 −1 E(HBlue ) = {h ∩ χ−1 0 (Red) : h ∩ χ0 (Red) 6= ∅ and b(u) = 1 for all u ∈ h ∩ χ0 (Red)}. We will then verify that no hyperedge in HBlue is entirely blue in the end. 16 (c) To ensure that no initially non-red hyperedge h has turned red, we consider the corresponding hypergraph HRed with hyperedges −1 −1 E(HRed ) = {h ∩ χ−1 0 (Blue) : h ∩ χ0 (Blue) 6= ∅ and b(u) = 1 for all u ∈ h ∩ χ0 (Blue)}, and verify in the end that no hyperedge in HRed is entirely red in the end. It remains to show how HBlue and HRed can be stored efficiently. Each hyperedge will be stored separately by listing all its vertices. Thus, the expected sum of the sizes of the hyperedges in HBlue is n   X X n i −n i E[size(HBlue )] = 2 p i i=1 h∈E(H) −n ≤ |E| np2 n−1  X i=0 −n ≤ |E| np2  n − 1 i−1 p i−1 (1 + p)n−1 . Clearly, the same bound applies to HRed . We will choose the value of p, so that with high probability size(HBlue ) and size(HBlue ) are both at most n (if either of them exceeds n, the algorithm terminates with failure), while also ensuring that the right hand sides of (4.1), (4.2) and (4.3) stay small. As 1 (ln n − ln ln n). To the failures accounted for in (4.4), we must account for before set p = 2n p n ln n p n n 1 size(HBlue ) or size(HBlue ) exceeding n. Now, E[size(HBlue )] ≤ 10 ln n 2 ln n ≤ 20 , and by 1 1 Markov’s inequality Pr[size(HBlue ) ≥ n] ≤ 20 . Similarly, Pr[size(HRed ) ≥ n] ≤ 20 . Thus, the 1 1 11 + 20 + 20 ≤ 12 , while revised algorithm fails to deliver a valid coloring with probability at most 50 it uses at most O(|V |B + nB) bits of space. 4.4 A local version The above results deal with the cases when a upper bound on the number of hyperedges of H guarantees that it has a valid two-coloring. Using the Lovász LocalpLemma one can show that n-uniform hypergraphs where no hyperedge intersects more than 0.17 n/ ln n 2n others has a twocoloring [4]. Note that this does not require a bound on the number of hyperedges of H, but only one on the number of intersections of any one hyperedge with others. The algorithms of Moser and Tardos [10] can now be used to recover a valid two-coloring of H. As in the previous case, though the algorithm a-priori requires access to the entire hypergraph in an offline fashion, we can modify it to adapt it to the streaming setting. The details are straightforward, and we omit them here to state only the result that derives from the parallel algorithm in [10]. n−1 Proposition 4.4. If each hyperedge of a hypergraph H intersects at most (1−ǫ)2 − 1 other e hyperedges, then a two-coloring of the hypergraph can be found by a streaming algorithm that makes at most O(log |V |) passes over the input stream and uses space O(|V |B). p Compared to the Moser-Tardos algorithm, which works when the number of intersections is O( n/ ln n 2n ), this works only until intersections of up to O(2n ). Furthermore, note that it requires log |V | passes over the input stream, in contrast to previous algorithms that required just one pass. 17 5 Coloring n-uniform hypergraphs with few vertices The upper bound q(n) = O(n2 2n ) was shown by Erdős by considering a random graph on n2 vertices. We ask if hypergraphs with a comparable number of hyperedges but supported on fewer vertices (perhaps o(n)) can be non-two-colorable. We show that that the choice of n2 above is essentially optimal. Theorem 5.1 (Implies Theorem 1.3(a)). Let t ≥ 4 be a parameter, and H be an n-uniform 2 hypergraph on v vertices and q hyperedges with v ≤ nt vertices. Then, a random two-coloring that partitions the vertex set into two almost equal color classes is a valid coloring with probability at least 1 − 2−(n−1) exp(− 8t )q. The following Corollary is obtained by setting t = 8 ln 2n. Corollary 5.2. Every n-uniform hypergraph with at most edges is two-colorable. n2 8 ln 2n vertices and at most n2 2n hyper- The Corollary shows that Erdős’ construction of non-two-colorable hypergraphs having q = n2 2n hyperedges on a vertex set of size v = Θ(n2 ) is nearly optimal in terms of the number of vertices. Proof of Theorem 5.1: Suppose V (H) = [v]. Consider the coloring χ obtained by partitioning [v] into two roughly equal parts and coloring one part Red and the other part Blue. Every hyperedge has the same probability p of being monochromatic under this coloring. The theorem will follow immediately from the claim below using a union bound.   2 Claim 5.3. p ≤ 2−(n−1) exp − (n−1) . 2v Proof of claim: If v ≤ 2(n − 1), then this probability is 0. In general, the probability that a hyperedge is monochromatic is   ⌈v/2⌉  2 v/2 + ⌊v/2⌋ n n n  ≤ v (since na is convex for a ≥ n − 1). p= v n n We then have p≤ 2· v2 ( v2 −1)( v2 −2)···( v2 −n+1) v(v−1)(v−1)···(v−n+1) n−1 Y v − 2i v−i i=1 n−1 Y −(n−1) 1− = 2 = 2−(n−1) i=1 −(n−1) ≤ 2 exp − i v−i n−1 X i=1 18  i v−i ! . Now, − n−1 X i=1 i v−i = (n − 1) − v Pv−1 1 j=v−n+1 j ≤ (n − 1) − v Z v v−n+1 1 dx x  n−1 ≤ (n − 1) + v ln 1 − v   n−1 1 n−1 2 ≤ (n − 1) − v + ( ) v 2 v (n − 1)2 = − . 2v    2 This shows that p ≤ 2−(n−1) exp − (n−1) and concludes the proof of the Claim. 2v To recover the statement of Theorem 5.1, we union-bound over the set of hyperedges, and observe 2 ≥ (n − 1)2 · nt2 ≥ t/8. that (n−1) v A streaming algorithm: Theorem 5.1 (more generally, Proposition 5.5 at the end of this section for k-coloring) gives rise to a straightforward randomized streaming algorithm for two-coloring (k-coloring) assuming that the number of vertices in the hypergraph is known in advance. For 2 example, suppose we are given an n-uniform hypergraph on v = nt vertices and at most 2n−2 exp( 2t ) hyperedges. We just pick a random coloring χ that assigns colors Red and Blue to roughly the same number of vertices, and verify that no edge is monochromatic under χ. The algorithm uses O(v) bits of space, and returns a valid coloring with probability 12 and fails otherwise. The probability of failure can be reduced to δ by running the algorithm log 1δ times in parallel. We further examine the trade-off between the number of vertices and the number of hyperedges. 2 Let q(n, t) be the minimum number of hyperedges in a non-two-colorable hypergraph with nt vertices. Note that when the number of vertices v ≤ 2n − 2, every n-uniform hypergraph is trivially two-colorable by any coloring that colors ⌊v/2⌋ vertices Blue and the rest Red, and so we will take n2 t ≥ 2n − 1. The above proof (of Theorem 1.3(a)) shows:   t q(n, t) ≥ 2(n−1) exp . 8 Using arguments similar to those used by Erdős [2], we will now obtain a comparable upper bound on q(n, t). This makes the dependence of two-colorability on the vertex set-size explicit. 2 Proposition 5.4 (Restatement of Theorem 1.3(b)). Suppose N ≤ nt is an integer that is at least tn 2n − 1. Then, there is an n-uniform hypergraph with N vertices and O(N · 2n exp( n−2t )) hyperedges 2 tn ). that is not two-colorable. Thus, q(n, t) ≤ ( nt )2n exp( n−2t Proof. Our non-two-colorable n-uniform hypergraph will be obtained by picking the required number of hyperedges at random from [N ]. Fix a coloring χ. Then, a randomly drawn hyperedge is 19 monochromatic with probability at least n2 2t p= n n2 t n   n−1 1 Y n2 /t − 2i 2n n2 /t − i i=0 −n  t −n ≥ 2 1+ n − 2t   −tn ≥ 2−n exp . n − 2t = ] Let H be the hypergraph obtained by picking q hyperedges uniformly and independently from [N n . The probability that χ is valid for H (i.e., none of its hyperedges is monochromatic under χ) is at most q  −tn ) . 1 − 2−n exp( n − 2t Since there are at most 2N colorings, the probability that some coloring χ is valid for H is at most   −tn q N −n 2 1 − 2 exp( . n − 2t tn ) · ln 2 this quantity is less than 1. Our claim follows from this. If q ≥ N · 2n exp( n−2t The above results can be generalized easily to k-colorings. Let qk (n, t) be the minimum number of 2 hyperedges in a non-k-colorable hypergraph with at most nt (≥ kn − 1) vertices. We then have the following bounds (we omit the proofs).     (k − 1)t (k − 1)tn n2 Proposition 5.5. kn−1 exp − ≤ qk (n, t) ≤ ( )kn exp . 2 t n − kt 6 Conclusion The lower bound we obtain on the space requirements of one-pass streaming algorithms is optimal (up to poly(n)) factors. We present an efficient two-player two-round deterministic communication protocol for two-coloring n-uniform hypergraphs with up to 2n /8 hyperedges, but we do not know if there is a corresponding streaming algorithm. As mentioned in the introduction, it is easy to come up with a deterministic streaming algorithm that works in |V | passes using the method of conditional expectations. Even in the two-player communication setting it would be interesting p to determine if the protocol can accommodate up ω(2n ) hyperedges, perhaps even Ω( lnnn 2n ) hyperedges. 2 Our two-coloring algorithm for hypergraphs with O( nt ) vertices does not improve on the bound provided via the delayed recoloring algorithm when t is small, say, o(log n). We believe it should be possible to combine our argument and the delayed recoloring algorithm to show that p ifn the 1 n number of vertices is o(n2 ) then we can two-color hypegraphs with strictly more than 10 ln n 2 hyperedges. 20 References [1] J.Beck. On 3-chromatic hypergraphs. Discrete Mathematics, 24:127-137, 1978. [2] P. Erdős. On a Combinatorial Problem. Nordisk Mat. Tidsskr, 11:5–10, 1963. [3] P. Erdős and L. Lovász. Problems and results on 3-chromatic hypergraphs and some related questions. Colloq. Math. Soc. Jnos Bolyai, 10:609–627, 1973. [4] J. Radhakrishnan and A. Srinivasan. Improved bounds and algorithms for hypergraph 2coloring. Random Structures Algorithms, 16 (1):4–32, 2000. [5] S. Shannigrahi. Coloring, Embedding, Compression and Data Structure Problems on Uniform Hypergraphs Ph.D. Thesis, School of Technology and Computer Science, Tata Institute of Fundamental Research, 2011. [6] N. Alon and J. H. Spencer. The Probabilistic Method. Wiley-Interscience Series, John Wiley and Sons, Inc., New York, U.S.A., 1992. [7] E. Kushilevitz and N. Nisan. Communication Complexity. Book, Cambridge University Press, 1996. [8] N. Alon, Y. Matias and M. Szegedy. The space complexity of approximating the frequency moments. Proceedings of the twenty-eighth annual ACM symposium on Theory of computing (STOC ’96) Pages 20-29, 1996. [9] D. Achlioptas, J.H. Kim, M. Krivelevich, and P. Tetali. Two-coloring random hypergraphs. Random Structures & Algorithms 20(2): 249-259, 2002. [10] R. A. Moser and G. Tardos. A constructive proof of the general Lovász local lemma. Journal of the ACM 57 (2): 1-15, 2010. [11] M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, 2005. [12] R. M. Karp, C. H. Papadimitriou and S. Shenker. A simple algorithm for finding frequent elements in streams and bags. ACM Transactions on Database Systems 28: 51-55, 2003. [13] D. D. Cherkashin and J. Kozik. A note on random greedy coloring of uniform hypergraphs. Random Structures & Algorithms 47(3): 407-413, 2015. [14] M. Karchmer and A. Wigderson. Monotone Circuits for Connectivity Require SuperLogarithmic Depth. SIAM J. Discrete Math. 3(2): 255-265 , 1990. [15] M. Ajtai. Σ11 -formulae on nite structures.Ann. Pure Appl. Logic. 24(1):148, 1983. [16] Emanuele Viola. On Approximate Majority and Probabilistic Time. Computational Complexity, v.18 n.3, p.337-375, 2009. [17] S. Muthukrishnan. Data Streams: Algorithms and Applications, Foundations and Trends in Theoretical Computer Science: Vol. 1: No. 2, pp 117-236, 2005. [18] Joan Feigenbaum, Sampath Kannan, Andrew McGregor, Siddharth Suri, Jian Zhang. On Graph Problems in a Semi-streaming Model, Proc. 31st International Colloquium on Automata, Languages and Programming, (ICALP), v. 3182: 531-543, 2004. 21 [19] J. Feigenbaum, S. Kannan, and J. Ziang. Computing diameter in the streaming and sliding window models, Algorithmica, vol. 41, no. 1, pp. 2541, 2004 [20] J. Feigenbaum, S. Kannan, A. McGregor, S. Suri, and J. Zhang. Graph distances in the streaming model: The value of space. Proc. ACM-SIAM SODA, pp. 745754, 2005. 22
8cs.DS
1 Wireless Channel Modeling Perspectives for Ultra-Reliable Low Latency Communications Patrick C. F. Eggers, Marko Angjelichinoski, and Petar Popovski arXiv:1705.01725v2 [cs.IT] 12 Jan 2018 Department of Electronic Systems, Aalborg University, Denmark Abstract Ultra-Reliable Low Latency Communication (URLLC) is one of the distinctive features of the upcoming 5G wireless communication, going down to packet error rates (PER) of 10−9 . In this paper we discuss the statistical properties of the wireless channel models that are relevant for characterization of the lower tail of the Cumulative Distribution Function (CDF). We show that, for a wide range of channel models, the outage probability at URLLC levels can be approximated by a simple power law expression, whose exponent and offset depend on the actual channel model. The main insights from the analysis can be summarized as follows: (1) the two-wave model and the impact of shadowing in combined models lead to pessimistic predictions of the fading in the URLLC region; (2) the CDFs of models that contain single cluster diffuse components have slopes that correspond to the slope of a Rayleigh fading, and (3) multi-cluster diffuse components can result in different slopes. We apply our power law approximation results to analyze the performance of receiver diversity schemes for URLLCrelevant statistics and obtain a new simplified expression for Maximum Ratio Combining (MRC) in channels with power law tail statistics. Index Terms Ultra-reliable communications, URLLC, 5G, wireless channel models, fading, diversity, probability tail approximations, rare event statistics. I. I NTRODUCTION One of the features of 5G wireless communication systems is to offer wireless communication with extremely high reliability guarantees, also known as Ultra-Reliable Low Latency Communication (URLLC) [1], [2]. The level of reliability, going sometimes down to packet error rates (PER) of 10−9 , should be sufficiently convincing in order to remove cables in an industrial setting, remote control of robots and drones that need to perform a critical function, remote surgery or 2 self-driving cars [3]. A significant number of the URLLC use cases take place indoors, which resonates with the expectation for a wireless environment that is, to some extent, controlled and offers predictable signal quality. Wireless communication performance is inherently a stochastic variable; however, URLLC refocuses our attention to the statistical characterization of the rare events and the lower tail of the channel Cumulative Distribution Function (CDF). This requires a major effort in terms of measurement campaigns, purposefully designed to capture the lower tail statistics, as well as in terms of analytical channel modeling. Nevertheless, a good starting point for characterizing wireless channels is to analyze the current channel models in regimes that are relevant for URLLC, which is the topic of this article. The related works [4], [5], [22], [23], [26] have characterized the probability density functions of wireless channel models, often leading to very complex expression and analysis dependent on multiple parameters. Our objective is to get insight into the behavior of different channel models at the region of ultra-low error rates, which we define as a PER that is  ≤ 10−5 or lower, corresponding to the reliability of “five nines”. We have selected 10−5 as this is the target error rate for URLLC selected in 3GPP for a packet of 32 bytes to be delivered within 1 ms [44]. Different mission-critical services will use different levels of ultra-reliability, such as PERs of 10−6 in smart grids and 10−9 for factory automation [3]. We focus on the packet errors that occur due to outages, induced by block fading, rather than errors caused by noise. Recent studies [6] have shown that this is a very suitable model for transmission of short packets, which are in turn expected to be prevalent in the URLLC scenarios. Throughout the paper we will use the term URLLC-relevant statistics to denote the events in signal reception that occur with probabilities on the order of 10−5 or less. Our analysis shows that, despite the complex probability density functions, the behavior of the lower tail can be significantly simplified, leading to important insights on the behaviors that occur when the outage probabilities are very low. While the tuning of the models can only be done with appropriate experimental evidence, this work provides a valuable contribution to the modeling efforts that are essential for designing ultra-reliable wireless systems. Besides the analysis of various statistical channel models, in this paper we also revisit the basic assumptions adopted in channel modeling in the light of the statistically rare events that needs to be captured in an URLLC regime. The existing channel models have been developed 3 for wireless communication systems1 that deal with bit error rates (BER) of 10−3 to 10−4 [7] and there is a lack of experimental evidence to support channel models that deal with PER at the URLLC levels. This paper extrapolates the standard channel models towards URLLC-relevant statistics and identifies their limitations when modeling rare events. One of our main result is that, for a wide range of channel models (but not all, as it will be seen in the paper), the tail approximation of the cumulative distribution function at the URLLC levels has the form:  β   PR PR ≈α F A A (1) where A is the average power, PR is the minimal required power to decode the packet correctly and α, β are parameters that depend on the actual channel model. Since the support of URLLC will be significantly dependent on high levels of diversity, we have also characterised the URLLC-relevant statistics when multiple antennas are considered. Specifically, we provide a simplified analysis of M -branch receive diversity for uncorrelated branch signals, that makes use of (1), as well as approximations for some special channels. The result provides a compact Maximum Ratio Combing (MRC) solution of form FMRC ≈ αMRC (β1 ..βM )FSC (2) that is, a scaled version of a Selection Combining (SC) solution, in which the scale parameter αMRC depends only on the branch exponents β. The paper is organized as follows. After the introduction, in Section II we provide the system model. Section III contains analysis of a wide range of channel models which exhibit power law tails at URLLC-relevant probabilities. Section IV contains analysis of two models that do not not result in power law tails. Section V contains the analysis of the receive diversity schemes in URLLC-relevant regime. Section VI concludes the paper. II. W IRELESS C HANNEL M ODELING FOR URLLC-R ELEVANT S TATISTICS 1) Preliminaries: The common approach in wireless channel modeling is to assume separability of the following effects [9]: 1 • Path loss, dependent on the actual geometric setting and operating frequency. • Long-term fading (i.e., shadowing) that captures slowly-varying macroscopic effects. For example, the first generation digital systems, such as GSM, that had an emphasis on voice communication. 4 • Short-term fading processes, relevant on a time scale of a packet (i.e., quasi-static fading) or even a symbol (fast fading), assuming stationary scattering conditions. The URLLC performance is determined by the short-term process and its (un)predictability, which ultimately determines the fate of the packet at the destination. Assuming separability, the statistics of short-term fading is described via parameters that are derived from the longterm fading and path loss effects; these parameters are assumed to be constant over a period of time. However, separability becomes problematic when URLLC-relevant statistics is considered, since the estimated long-term parameters require certain level of accuracy in order to have a valid short-term statistics of rare events. Motivated by this, we also consider combined long and short term fading models. Furthermore, in absence of dedicated URLLC channel models, we investigate the behavior of a wide palette of existing wireless channel models in URLLC regime. 2) General Model: We use combination of (a) the complex baseband model of a narrowband channel with reduced wave grouping from [4], and (b) the incoherent multi-cluster channel of [17], [19]. Let P denote the total received power; we have: P =ω µ X m=1 2/β |Vm | , Vm = ξ N X i=1 ! jφi,m ρi,m e + L Y Vdif,m,l . (3) l=1 Vm denotes the complex received voltage from the m−th cluster m = 1, . . . , µ, in which ρi,m /φi,m is the amplitude/phase of the i−th specular component, i = 1, . . . , N and Vdif,m,l is the l−th diffuse component for the m−th cluster with L denoting the number of diffuse components per cluster [8]. β caters for the modeling of a Weibull channel [16], and for all other models it is set to β = 1. The shadowing effects are represented by the random variables (RVs) ξ and ω. Here ξ is a common shadowing amplitude that affects only the specular components [26], while ω induces a shadowing effect on the total power [9], [23], see section III-G. We assume that each ρi of a specular component is constant and that φi is a uniform random variable [4]. The elementary diffuse components Vdif,m,l are treated in their simplest form, as a contribution from a large number of waves and application of the central limit theorem [4], [17], [19], which leads to Vdif = XR + jXI , where XR and XI are independent Gaussian variables, each with zero mean and variance σ 2 . A more general variant of the diffuse component follows from a multi-scatter physical setup [8], [17], [19]. This leads to the cases of Nakagami, Weibull and Cascaded Rayleigh channel, as well as compound channels, such as Suzuki and shadowed κ − µ [9], [22], [23], [26]. 5 We treat narrowband channel models with block fading, such that the power at which the packet is received remains constant and equal to P given with (3). The noise power is normalized to 1, such that P also denotes the Signal-to-Noise Ratio (SNR) at which a given packet is received. For each new packet, all RVs from (3) are independently sampled from their probability distributions2 . The average received power for the channel model (3) across many realizations is denoted by A and can be computed as: (a) A = E[P ] = ω µ X " ξ2 m=1 N X ! ρ2i,m " +E i=1 L Y ## 2 |Vdif,m,l | , (4) l=1 with E[·] denoting the expectation operator. Note that (a) is valid when we treat the reduced wave grouping model from [4]. In the subsequent analysis we assume normalized shadowing power, i.e. ω = 1 and ξ 2 = 1. The diffuse term depends on link signal correlation, while for a single link (L = 1) the average power of the elementary terms is E[|Vdif,m |2 ] = 2σ 2 . 3) Descriptive Metrics: The specular component vector balancing in the reduced wave group model of [4] is given via the peak to average ratio of the two dominant specular powers: ∆= 2ρ1 ρ2 . ρ21 + ρ22 (5) Furthermore, the power ratio of the specular components and the diffuse component per cluster, called k-factor is defined as kN = PN ρ2i , which in case of the multiple clusters gives [19]: Pµ PN 2 µ ρi,m 1X kN,m = m=1 i=1 . (6) κ= µ m=1 µ · 2σ 2 i=1 2σ 2 4) URLLC-Relevant Statistics: Let R denote the transmission rate of the packet. We assume that packet errors occur due to outage only, such that the PER  is given by:  = Pr(R < log2 (1 + P )) = Pr(P < PR ), (7) where PR = 2R − 1 is the minimal required power to receive the packet sent at rate R. Denote by  the target packet error probability (PER), also referred to as outage probability. Then, for each model the objective is to find PR , defined in (7) through the CDF F (PR ), obtained as: Z √PR  = F (PR ) = f (r)dr, (8) rmin 2 The reader may object that this assumption is not valid when long-term shadowing is treated, i.e. a sample for a given ρi is applicable to several packet transmissions. See Section IV-A for discussion about this assumption. 6 TABLE I CDF TAIL APPROXIMATIONS ˜, FOR DISTRIBUTIONS IN THE FOLLOWING SUBSECTIONS . GAIN OFFSET ( SCALE ) Channel Model TW Tail ˜ = limp→0 F (p)  1 − π1 asin 1−p 2 ∆ PR 4π∆r 3W TWDP κµ κµ/m κµ/α Suz Cas LN where r = 1 4π∆r FRayl (p(k1 + 1)) e FRice (p; k2 ) I0 (k2 ∆) (Γ(1 + 1/β)p) m β (m /Γ(m + 1)) p when ρ1 < ρ2 + ρ3 1 (k1 + 1)e −k2 1 I0 (k2 ∆) 1 β β m FNak (p; µ)FRice (1; κ)  m m FNak (p; µ)(1 + κ)µ κµ+m Γ(α+µ) (α−1)µ Γ(α) Fκµ (p; κ, µ) · 1 2 ln 10 PR 10 10 (σdB ( 20 )−µdB )   1+Γ 1+Γ −p 1−Γ ln p (1−Γ) 2 ( 1 −k1 Γ(1 + 1/β) m µ − 1 e 4 1 2 when ∆ → 1 (k2 + 1)e 1 ln(P )−aσ −µ 2 R l l 2 2σ 2 l m /Γ(m + 1) (e−κ (κ+1)µ)µ Γ(µ+1)  m µ µ µ (1+κ) Γ(µ+1) (1). Slope β 1 −k1 Wei Nak Offset α √ 2 π p Rayl Rice α AND LOG - LOG SLOPE ( SHAPE ) β = R ELATIVE POWER p = PR /A, d log(F ) FOLLOWING d log(p) m µ m κµ+m µ Γ(α+µ) (α−1)µ Γ(α) ακµ · 1 2 ln 10 10 10 (σdB ( 20 )−µdB ) µ 1 ln(p)+ln ) - 1 1+ - 10 ln 10 h a σdB −2 1+Γ (1−Γ)2 PR,dB −µdB 2 2σdB i √ P is the received envelope and rmin is the minimal value of the envelope in the support set of f (r), which is the Probability Density Function (PDF) of the specific channel model. The key to the approximations presented in this paper is the fact that, for URLLC scenarios,  is very small. III. C HANNELS WITH P OWER L AW TAIL S TATISTICS We analyze the behavior of common wireless channel models in URLLC-relevant regime and derive asymptotically tight approximations ˜ of their tail probabilities , that satisfy limPR →0 ˜ =  The common trait of all models considered in this section is that ˜ takes the form of a simple power law (1). with distribution-specific values of the parameters α, β. For the channel models that are important in practice (see subsections III-A-III-F), we also provide a simple tool to analyze the convergence of ˜ to . Specifically, we introduce the nonnegative approximation error function φ(PR ) that satisfies the inequality (see Appendix A): ˜(1 − φ(PR )) ≤  ≤ ˜(1 + φ(PR )). (9) 7 φ(PR ) increases monotonically with PR and satisfies limPR →0 φ(PR ) = 0. We say that ˜ converges   η ˜ −1 asymptotically to  in the sense that  − 1 ≤ η if PR ≤ φ for some small error 1+η tolerance η > 0. In other words, φ(PR ) can be used to compute the range of envelopes over which the relative tail approximation error is less than η. Table I summarizes the tail approximations that are derived in the sequel. A. Two-Wave Model (TW) We start with the common Two-Wave channel model [4], where µ = 1, N = 2 and L = 0, i.e., single cluster, two specular and no diffuse components. The envelope PDF is given by: 2r fTW (r) = r πATW where ATW = ρ21 +ρ22 ,  ∆2 − 1 − 2 , r2 (10) ATW i hp p ATW (1 − ∆), ATW (1 + ∆) . ∆ is given by (5) and r ∈ [rmin , rmax ] = By putting fTW (r) in (8) we obtain the CDF: 1 1  = FTW (PR ) = − asin 2 π 1− PR ATW ! ∆ . Bounding  from below leads to the tail approximation: r 2 p ? 1 PR , ˜ = π ATW where PR? = 1 P ∆ R − (11) (12) 1−∆ ATW . ∆ The approximation error function is (see Appendix A): r 4 ATW (ATW + PR? )PR? p φ(PR ) = . 3 2 (2ATW − PR? )3 (13) The upper bound on the power for error tolerance η can be evaluated numerically. Fig. 1 depicts the tail  for the TW channel. When ∆ < 1, the tail falls abruptly to zero at PR = ATW (1 − ∆). However, as it is seen from Fig. 1, the log-log slope that precedes this abrupt transition to zero is 1 2 (half a decade per 10 dB), which can be also see from (12). In the singular case ∆ = 1 (0 dB), the tail approximation is given by (12) with PR? = PR and the slope continues until −∞ dB3 . For example, if the log-log slope of 1 2 should be present at  = 10−6 , then we need to have ∆ > −4 · 10−6 dB, i.e. ρ2 very close to ρ1 , which is unlikely in practice due to the losses of the reflected wave. Hence, the two-wave model should be used with high caution when evaluating URLLC scenarios. 3 The case ∆ ≈ 1 has been referred to in the literature as hyper-Rayleigh fading [10] 8 10 0 10 -1 TW ∆T W = −3 dB 10 -2 ∆ 10 -4 10 -5 10 -6 -60 ∆T W = −0.12 dB 10 -3 dB ∆T W = −0.001 dB ǫ =0 TW Rayl -50 -40 -30 -20 -10 0 PR /A dB Fig. 1. Two-wave (11) and the classical Rayleigh (15) CDFs and their tail approximations (12), (16) (black dotted lines). For Two-wave: ρ1 = 1, while ρ2 is set to correspond to the ∆ (5) given at each curve. B. Rayleigh Channel (Rayl) This model, adopted in many wireless studies, has µ = 1, N = 0 and L = 1 (single cluster and diffuse component and no specular components) and the envelope PDF is [9]: r2 2r − ARayl e fRayl (r) = , ARayl (14) with average power ARayl = 2σ 2 . The CDF follows readily as: PR Rayl −A  = FRayl (PR ) = 1 − e , (15) which can be upper bounded by retaining only the first term in the Taylor expansion, resulting in the following simple power law approximation: ˜ = PR , ARayl (16) also known as the Rayleigh rule of thumb “10dB outage margin per decade probability” due to a log-log slope of β = 1. The approximation error function can be derived via an upper bound on the Taylor remainder, yielding the simple form (see Appendix A): φ(PR ) = PR . 2ARayl (17) 9 C. Rician Channel (Rice) This is an extension of the Rayleigh channel, featuring a specular component in addition to the diffuse one. The average received power is ARice = ρ21 + 2σ 2 = 2σ 2 (k1 + 1), where k1 = is the Rician k-factor and the PDF of the received envelope is [9]: rp  −k1 fRice (r) = fRayl (r)e I0 2k1 σ ρ21 2σ 2 (18) where I0 (·) is the modified Bessel function of 1st kind and 0th order. The tail can then be expressed in closed form in terms of the 1st order Marcum Q-function as follows: ! r p PR (k1 + 1) .  = FRice (PR ) = 1 − Q1 2k1 , 2 ARice (19) Bounding  from below via 1st polynomial expansion of Q1 , we arrive at the tail approximation: ˜ = PR (k1 + 1)e−k1 . ARice (20) The approximation error function obtains the form (see Appendix A):  P  k1 R (k +1) 1 A φ(PR ) = e 2 e Rice −1 , (21) The tail approximation of the Rician channel in URLLC-relevant regime has Rayleigh slope β = 1. However, Fig. 2 shows that before attaining the slope β = 1, the Rician CDF has a steeper slope compared to the Rayleigh one. In the context of wireless communications, this can be interpreted as an increased diversity order offered by the Ricean distribution. The lower the k1 −factor, the sooner the slope becomes identical to the Rayleigh one; in other words, as k1 increases, PR decreases for fixed error tolerance η which can be also see from (21). D. Weibull Channel (Wei) The Weibull channel is a generalization of the Rayleigh model, where the diffuse component p is given by |Vdif | = (XR2 + XI2 )1/β with β 6= 1. This model has been used in empirical studies as it offers increased freedom to fit the modeling of the diffuse part [14], [15]. As in the Rayleigh case, here we also have only a diffuse component, but the received envelope follows Weibull distribution [16]: fWei (r) = 1/β with AWei = (2σ 2 ) Γ(1 + 1/β). For β = 2βr2β−1 − r2β2 e 2σ 2σ 2 1 2 (22) we get the TW case, while β = 1 leads to the Rayleigh case. The tail is given as:  β P − Γ(1+1/β) A R  = FWei (PR ) = 1 − e W ei . (23) 10 10 0 10 -2 ǫ 10 -4 10 -6 k1 = 9 dB 10 -8 k1 = 12 dB 10 k1 = 16 dB -10 -50 -40 -30 -20 -10 0 PR /A dB Fig. 2. Rician CDF (19) and its tail approximation (20) (black dotted lines): The Rician k-factor k1 is indicated at the respective curves. Using first order Taylor expansion, we obtain the following tail approximation:  β PR ˜ = Γ(1 + 1/β) . AWei (24) Here β denotes the log-log slope and an example with β = 2 is shown in Fig. 3. The approximation error function for the Weibull channel is given by (see Appendix A): β  R Γ(1 + 1/β) APWei φ(PR ) = β .  PR 1 + Γ(1 + 1/β) AWei (25) E. Nakagami-m Channel (Nak) The envelope of this model behaves similarly to the Weibull model, although the diffuse pPm 2 2 component is modeled differently as r = |Vdif | = i=1 (XRi + XIi ), with m integer. This model can be interpreted as an incoherent sum of m i.i.d. Rayleigh-type clusters, each with mean power 2σ 2 and total power ANak = m · 2σ 2 . The PDF of the envelope r is given by [17]:  2 m 2 r2 r 2mm 2 − r2 2m−1 −m ANak 2σ , (26) fNak (r) = r e = e Γ(m)Am rΓ(m) 2σ 2 Nak where we interpret m ∈ R ≥ 1 2 for generality. For m = 1 2 we get an exponential, while for m = 1 a Rayleigh distribution. The CDF is given as:   PR γ m; m AN ak  = FNak (PR ) = Γ(m) (27) 11 where γ(a, x) is the lower incomplete gamma function. The power law tail approximation can be obtained via the upper bound γ(a; x) ≤ xa /a [18], resulting in:  m mm PR ˜ = . Γ(m + 1) AN ak (28) We see that (28) has the same flexibility and slope behavior as the Weibull model (for m ≥ 21 ), but a different offset. This can be also observed in Fig. 3 with m = 2, where the wide shoulder sends the tail (28) to lower levels compared with the Weibull case. By bounding the lower incomplete gamma function in (27) from both sides, i.e., e−x xa /a ≤ γ(a; x) ≤ xa /a [18], we derive the approximation error function: PR Nak −m A φ(PR ) = 1 − e ≤e PR Nak mA − 1. (29) F. κ − µ Channel (κµ) The κ−µ model was developed in [19] as a generalization to the Nakagami model, by considerpPµ 2 2 ing incoherent sum of µ Rician type clusters, i.e. envelope r = i=1 (XRi + pi ) + (XIi + qi ) where XRi + jXIi are complex Gaussian diffuse components (all same mean power 2σ 2 ) and pi + jqi the corresponding specular components with arbitrary power ρ2i = p2i + qi2 . Here κ is a generalized Rician type k-factor defined in (6). Consequently, the total mean power is Aκµ = µ(1 + κ) · 2σ 2 and the PDF of r is given by [19]: " r #  µ  2  2 r 2(κµ)(1−µ)/2 r r − √ √ fκµ (r) = e 2σ2 Iµ−1 2 κµ 2 , µ ≥ 0 κµ 2 2 2σ e 2σ 2σ (30) Again, for generality, we interpret µ ∈ R. The CDF in closed form is described via the generalized Marcum Q function, from [19]:   q p 2κµ, 2(1 + κ)µPR /Aκµ Fκµ (PR ) = 1 − Qµ (31) Using a first-order polynomial expansion of the generalized Marcum Q-function, we obtain the following tail approximation: µ (e−κ (κ + 1)µ) ˜ = Γ(µ + 1)  PR Aκµ µ = FN ak  PR ;µ Aκµ  FRice (1; κ)µ (32) i.e. a multiplicative form of the previous Rician and Nakagami-m tail approximation. The approximation error function obtains the simple form (see Appendix A):   P κµ (κ+1)µ A R κµ φ(PR ) = e 2 e −1 . (33) 12 10 0 10 -2 ǫ 10 -4 10 -6 Nak 10 κ−µ Wei -8 10 -10 -50 -40 -30 -20 -10 0 PR /A dB Fig. 3. Nakagami-m (27) (m = 2), Weibull (23) (β = 2) and κ − µ (31) (κ = 3.9, µ = 2) CDFs and their tail approximations (28),(24),(32) (black dotted lines). We see that both ˜ and φ(PR ) reduce to the forms derived earlier as special cases; specifically, for µ = 1 the κ − µ model reduces to a Rician situation, while for κ = 0 the Nakagami-m situation emerges. The tail (32) in a typical Rician setting (κ = 3.9, µ = 2) is seen in Fig. 3, where it can be seen that the tail is pushed to lower probabilities compared to Nakagami and Weibull models. G. Generalizations We analyze several generalizations of the channels presented in the previous subsection and derive their power law tail approximations. First, we explore the transition of the behavior from few paths to many paths. In this sense, we expand the previous TW model to cater for 3−vector components or include a diffuse part that is generalized compared to the models with diffuse part in the previous section. As it will be shown, both cases result in a tail behavior that conforms to a behavior dominated by diffuse components. In other words, three specular components can be sufficient to produce the behavior of a Rayleigh diffuse component at URLLC levels. Another important generalization is to use combined short and long term processes, particularly when such are inseparable. We consider three combined models in following sub-sections: 1) Log-normal shadowed Rayleigh fading, i.e. the Suzuki distribution typically used to model Macro-cell behavior [9]; 2) κ − µ fading with Nakagami-m shadowing; and 3) κ − µ fading with 13 inverse Gamma distributed shadowing. While 1) is a classical case, 2) and 3) have been found useful for modeling close range propagation [22], [23], [26]. We can think of the combined channel models to be applicable to the following situation. When there is only short term block fading, the outage probability can be controlled by selecting the rate R according to the known average power of the short term channel. Equally important is the specular component balancing or ratio towards the diffuse parts, captured by ∆, κ in (5), (6). However, when the sender does not have a reliable estimate of the average power (or impact of specular components), then this uncertainty can be modeled by assuming that the average power or ∆, κ are random variables. The independent sampling from the shadowing distribution is a pessimistic case that assumes sporadic transmissions, sufficiently separated in time. 1) Three-Wave Model (3W): We consider the Three-Wave generalization of the TW model. Here N = 3, Vdif = 0, received envelope r = |ρ1 + ρ2 ejφ2 + ρ3 ejφ3 | and average power A3W = P3 2 n=1 ρn . The probability density function [4] is given by:   2  √ ∆r  2√ r K ∆2r ≤ ρ1 ρ2 ρ3 r π ρ1 ρ2 ρ3 ρ1 ρ2 ρ3 r   (34) f3W (r) = 2  2r K ρ1 ρ22ρ3 r > ρ ρ ρ r ∆ 1 2 3 r π ∆r ∆ r for r ∈ [rmin , rmax ], and it is 0 otherwise, with rmin = max(2 max(ρ1 , ρ2 , ρ3 ) − ρ1 − ρ2 − ρ3 , 0), rmax = ρ1 + ρ2 + ρ3 . In (34), K(·) is an elliptic integral of the first kind4 and the quantity ∆r is defined as: ∆2r = 1 [(r + ρ1 )2 − (ρ2 − ρ3 )2 ][(ρ2 + ρ3 )2 − (r − ρ1 )2 ]. 16 (35) Without losing generality, we can take ρ1 ≥ ρ2 ≥ ρ3 and define the difference ∆ρ = ρ1 −(ρ2 +ρ3 ), such that rmin = max(∆ρ , 0). Three cases can be considered: (1) rmin = 0 when ∆ρ < 0; (2) rmin = 0 and ∆ρ = 0; and (3) rmin > 0 otherwise. Here we treat the case ∆ρ < 0, which sets the basis for the reader to treat the other two cases. The integral (8) is evaluated for values √ r ∈ [0, PR ] that are very small and taking r → 0: lim ∆2r = [ρ21 − (ρ2 − ρ3 )2 ][(ρ2 + ρ3 )2 − ρ21 ] > 0 r→0 which implies that ∆2r > ρ1 ρ2 ρ3 r holds in (34). With r → 0:   ρ1 ρ2 ρ3 r r π r r→0 f3W (r) → 2 K ≈ 2 2 π ∆r ∆r π ∆r 2 4 Convention of [4] is K(m) with argument m = k2 (instead of K(k) with modulus k). (36) (37) 14 10 0 10 -1 − k∗ 3 = 04 00 10 -3 10 -6 -60 3 1. 8 1. 7 k∗ 3 = k∗ 3 = 10 -5 dB dB 10 -4 k∗ 3 = − 0. ǫ dB 2. 82 dB 10 -2 -50 -40 -30 -20 -10 0 10 PR /A dB Fig. 4. Three Wave CDF (numerical integration of (34)) and the tail approximation (38) (black dotted line): Here ρ1 = 1 while ρ2 and ρ3 are set according to k3∗ indicated at the curves. The solid dots depicts the locations of the “breaking points” where the asymptotic slopes change (as determined by the value of |∆ρ |2 ). where we have used limx→0 K(x) = π2 . Approximating ∆2r as a constant for small values of r, we get the following tail approximation: r2 PR ˜ = = 4π∆r 4π∆r (38) such that the log-log linear slope is β ≈ 1. In the singular case rmin = 0 and ∆ρ = 0 it can be shown that β = 43 , while the case rmin > 0 has a slope of 21 , 34 or 1, before an abrupt fall to zero 2 . when PR = rmin The 3W CDF is shown in Fig. 4 for ρ1 = 1 and different variations of ρ2 and ρ3 . The curves are labeled by k3∗ = ρ21 2 (ρ2 +ρ23 ) 5 2 ρ| = −50dB . We select to represent two cases with identical 10 log |∆ A3W that are seen to diverge significantly when PR A3W < −40dB. The difference between these two cases emerges due to the different sign of ∆ρ , which in one case results in rmin > 0 (ρ2 =0.7850, ρ3 =0.2109) and in the other case rmin = 0 (ρ2 =0.7914, ρ3 =0.2126). The latter case has a log-log slope of β = 1, identical to the Rayleigh distribution. Hence, if the sum of the two smallest components can cancel and overshoot the strongest component, the URLLC-level behavior of the 3W model is practically identical to that of a Rayleigh channel in terms of a slope. 5 Note that this metric differs from the k-factor which involves diffuse parts. k3∗ is the ratio between specular component powers only 15 2) Two-Wave Diffuse Power (TWDP) Channel: In this model N = 2 and Vdif , with envelope r = |ρ1 +ρ2 +Vdif | and average received power ATWDP = ρ21 +ρ22 +2σ 2 [4]. The PDF is obtained by averaging of the Rician PDF [5]: 1 fTWDP (r) = 2π Z 2π fRice (r; k2 [1 + ∆ cos (ψ)]) dψ (39) 0 with ∆ defined in (5) and k2 in (6). The integration over ψ involves only I0 (·) and the exponential R 2π k ∆ cos ψ PR 1 terms in (18). Using I0 ≥ 1 for ATWDP e2 · 1 dψ =  4k2 (k12 +1) , this integration is ∼ 2π 0 I0 (k2 ∆), i.e. it leads to a constant with respect to r. Hence, the tail can be lower-bounded through a scaled Rician tail:  = FTWDP (PR ) ≥ FRice (PR ; k2 ) I0 (k2 ∆) = ˜ (40) and the analysis from the Rician case can be directly applied, scaled by I0 (k2 ∆). From Fig. 5 it can be seen that TWDP6 starts to differ from a Rician model (with k1 = k2 ) when ∆ is sufficiently high, such that ρ2 can be distinguished from Vdif . The second specular component ρ2 lifts-off the lower tail as ∆ → 0 dB, while preserving the Rayleigh tail slope. Note that, in order to reach the extreme slope of the singular TW model at the URLLC levels, one needs ∆ = 0dB and k2 in range 50 to 60dB, which is very unlikely to happen in practice. 3) Suzuki Channel (Suz): This is a compound channel consisting of a diffuse component only, which is a mixture between a Rayleigh envelope and a log-normal varying mean [9]. The compound envelope is r = |XR + jXI |, where XR and XI are zero-mean Gaussian variables with variance σLN = eN that has a log-normal distribution. The PDF and CDF of the Suzuki channel can be found as follows. Let us denote by A the average power used to generate Rayleigh-faded power level A. The power A is log-normal distributed, such that we can obtain its PDF from the PDF of the log-normal envelope (53) by substituting A = r2 . This leads to the following joint distribution of P and A: − 1 1 P √ e fSuz (P, A) = e− A · A 2Aσl 2π ( 12 ln A−µl ) 2 2σ 2 l For given PR , the outage probability can be calculated as follows: Z PR Z ∞ = dP fSuz (P, A)dA 0 6 (41) (42) 0 No tractable closed form of PDF or CDF exists. In [4] the PDF is approximated, while we use a complete expansion as in [13]. However, due to the numerical sensitivity at URLLC levels, it requires the use of high-precision numerical tools. 16 10 0 10 -2 dB dB ∆T W DP increases = −6 k2 = ∆T =0 ǫ 10 -4 dB 16 P WD k2 dB =9 ∆T W =− k2 = 16 dB ∆T W 10 DP DP B 6d -6 B 6d 10 -8 B 2d ∆T P WD =− 1 k2 = 10 -10 -50 -40 -30 -20 -10 0 PR /A dB Fig. 5. Two-Wave Diffuse Power CDF and its tail approximation (black dotted line): ρ = 1, while ρ2 is set to correspond to the ∆ (5) given at each curve. The corresponding k2 (6) is also given. The upper bound for (42) is obtained by noting that P A ≥ 0 and it can be removed from (41), after which we get: 2 Z PR Z ∞ − 1 √ e  ≤ dP 2A2 σl 2π 0 0 PR 2 2 = e2σl −2µl PR = · e4σl ASuz ( 12 ln A−µl ) 2σ 2 l dA (43) 2 where ASuz = e2σl +2µl = ALN [37]7 . The lower bound can be found by using the inequality e−x ≥ 1 − x which leads to: − 1 √ e fSuz (P, A) ≥ 2 2A σl 2π and results in PR 4σl2 ≥ e − ASuz  PR ASuz 2 2 ( 12 ln A−µl ) · e12σl ≈ 2σ 2 l 2 (1 − P ) A 2 2 ln(10) PR 4σdB 202 e = ˜ ASuz (44) (45) For URLLC-relevant levels it is PR  ASuz , such that the upper bound can be treated as tight. The tail has a Rayleigh-like slope of β = 1, but pushed to lower levels as seen in Fig. 6. 2 2 Note that ASuz = E[r2 ]e2σl +2µl , where E[r2 ] = 2 · σRayl is the mean power of the Rayleigh part. [37] has used unit √ 2 variance Gaussians σRayl = 1. Without loss of generality we assume σRayl = 1/ 2, such that all mean level shifts are attributed 7 solely to µl . 17 10 0 10 -2 Suzuki ǫ 10 -4 10 -6 κµ/m κµ/α -40 -30 10 -8 10 -10 -50 -20 -10 0 PR /A dB Fig. 6. Shadowed CDFs from (47) and numerical integration of (42),(49) and their tail approximations (45),(48),(51) (black dotted lines) and heuristic CDF expansion (52) (dash-dot curve): Suzuki (σdB = 6dB), κ − µ/m and κ − µ/α (κ = 3.9, µ = 2, m = 0.25, α = 1.5). 4) Nakagami-m shadowed κ − µ Channel (κµ/m): Shadowing the total signal has been investigated in [22], [23], but provides complicated PDF and no known closed-form solution for the CDF. A model that considers shadowing of only the dominant signal parts has been P developed by [26]. The instant power is p = µi=1 (XRi + ξpi )2 + (XIi + ξqi )2 , where ξ is a power normalized Nakagami-m distributed shadowing amplitude acting on specular components pi + jqi = ρi ejφi . The closed form PDF of PR (with p = PR /Aκµ/m ) is given by [26]: m    µµ m κ(1 + κ)µ2 µ−1 −(1+κ)µ·p p e p fκµ/m (PR ) = 1 F1 m; µ; Γ(µ)Aκµ/m κµ + m κµ + m (46) with 1 F1 (·) Kummer’s function of the first kind [43]. Essentially, the first part is a Nakagami-m PDF of order µ, while the latter part holds a µ−order modified Rician impact. The tail is:   µ m m µµ PR µ  = Fκµ/m (PR ) = (κ + 1) Φ2 (b1 , b2 ; c, x, y) (47) Γ(µ + 1) Aκµ/m κµ + m | {z } {z } | →e−κµ |m→∞ ≈FN ak (p;µ) µµ (κ + 1)µ ≈ Γ(µ + 1)  PR Aκµ/m µ  m κµ + m m = ˜ (48) where Φ2 (·) is Humberts function [27] with arguments (b1 = µ − m, b2 = m, c = µ + 1, x = PR m −µ(1 + κ) Aκµ/m , y = x κµ+m ). The power law tail approximation follows from [26, eq. (13)]. Since ξ → 1 when m → ∞, expression (47) should reduce to the regular κ − µ in (32); this m is indeed so, as x+m → ex and (47) is evidently in accordance with (32). Fig. 6 shows m 18 a strongly shadowed example (m = 0.25). It can be noticed that the shoulder is significantly broadened to a degree that the elevation of the shoulder visible in the regular κ − µ case, has vanished. This is expected as only the LOS part has been shadowed, thereby effectively averaging the κ − µ distributions shape (κ-factor). Consequently, the tail is being pushed to significantly lower outages. 5) Inverse Γ−shadowed κ − µ Channel (κµ/α): Shadowing the total κ − µ (30) fading envelope rκµ = |Vκµ | by an inverse Gamma (Γ−1 ) distributed varying mean power ω = Aκµ , leads to a closed form PDF but no tractable closed-form CDF solution [23]8 . The combined signal √ (r = rκµ ω) PDF is obtained [23, (6)] by averaging the conditional envelope PDF fκµ|Aκµ (30)  βα 1 · exp − ωβ , with shape α > 0 and scale over the mean power statistics fΓ−1 (ω) = Γ(α) ω α+1 β > 0 parameters. The combined signal power PDF of [23, (10)] can be written as κµ · c/Aκµ/αβ µ−1 (e−k /κµ)µ fκµ/αβ (PR ) = · x 1 F1 (α + µ; µ; x) B(α, µ) (c · p + 1)α−1 (c · p + 1)2 | {z } (49) dx/dPR with B(·, ·) the beta function and argument scaling c = power is p = r2 E[r2 ] tail levels p  1 c = PR Aκµ/αβ µ(1+κ) β c·p in x = κµ c·p+1 . The relative and Aκµ/αβ is the mean power of the combined signal. For lower or α → 1+ , (c · p + 1)α−1 → 1 and constraining this approximation to the leading term only, we essentially have a function of form f (x) = xb−1 1 F1 (a, b, x). To obtain the R Γ(b) CDF we make use of f (x)dx = xb Γ(b+1) 1 F1 (a, b + 1, x) [25]. Thus, via variable transform and reordering of terms, we arrive at the following upper bound for the CDF:  µ   e−κµ c·p c·p  = Fκµ/αβ (PR ) ≤ · 1 F1 α + µ; µ + 1; κµ µB(α, µ) c · p + 1 c·p+1 (50) which is exact in the limit α → 1+ . Furthermore, we can simplify (50) as 1 F1 (a, b, x) → 1 for x → 0 and realizing that the scale β in [23] is set arbitrarily, such that fΓ−1 is not normalized. As ω = E[ω] = β α−1 valid for α > 1 [23], normalizing shadowing by setting ω = 1, we get β = α − 1. Thus, we can represent the impact of the shadowing through a single parameter: Fκµ/α (PR ) & (µ(1 + κ)e−k )µ µ Γ(α + µ) p = ˜, Γ(1 + µ) (α − 1)µ Γ(α) | {z } (51) ≈Fκµ (p;κ;µ) 8 Very recently [24, (3.14)] has provided a closed-form CDF. However, this is provided through a complex Kampé de Fériet function, for which no readily available numerical evaluation exists in tools such as MatlabTM . Furthermore, no simple analytical approximation seems available to be used in an URLLC setting. The underlying inverse Gamma PDF in [24, (3.14)] seems normalized in a skewed manner with ω = α . α−1 Thus we make our approximation analysis based on the PDF in [23]. 19 i.e. in form of a scaled κ − µ tail, representing a lower bound. However, for α . 1 other normalization methods must be used. We can heuristically reintroduce the denominator term (c · p + 1)α−1 into the leading term of (50) for larger arguments: e−κµ Fκµ/α (PR ) & µB(α, µ)(c · p + 1)α−1 where we can redefine c = µ(1+κ) α−1  c·p c·p+1 µ   c·p · 1 F1 α + µ; µ + 1; κµ = ˜ (52) c·p+1 via the above normalization. This result provides a significantly better fit than (50) or (51), especially in a strongly shadowed Rician regime (κ/α & 1), as it can be seen in Fig. 6. Furthermore, this expanded expression seems to act as a lower bound. It is also seen that the elevated shoulder from the underlying κ − µ signal is better preserved than in the case of the previous κµ/m model, while also having strong shadowing (α = 1.5) that indicates that the complete signal has been shadowed. IV. OTHER C HANNELS In this section we analyze two special models that do not exhibit power-law tail behavior and derive their corresponding tail approximations. First, we consider the log-normal distribution [9], as a classical reference distribution for shadowing. Next, we treat cascaded channel type models that arise in NLOS propagation, backscatter communication and in ’pin hole’ channels [9]. The two models also represent two extremes, the macro scale (log-normal shadowing) and short range (e.g. device-to-device). Furthermore, these models can be used as instances to illustrate cases that do not follow the power law in the diversity analysis presented in the next section. A. Log-Normal Channel (LN) In this model there is a single specular component N = 1 and no diffuse component. The specular component is not constant, but subject to a log-normal shadowing, such that log-envelope ln(r) is modeled as Gaussian variable [9] with PDF: 2 (ln(r)−µl ) − 1 1 2σ 2 l √ e fLN (r) = Nln(r) (µl , σl ) = r rσl 2π with logarithmic mean and standard deviation µl = E[ln(r)] = µdB ln(10) and σl = 20 (53) p E[ln(r)2 ] − µ2l = 2 σdB ln(10) . The average power is ALN = e2σl +2µl [9] and the CDF 20  = FLN (r) = 1 2 + 12 erf(x(r)) (54) 20 √ with x = (ln(r) − µl )/(σl 2) and erf being the error function. Using Bürmann-type asymptotic   √ 2 2 1 −x approximation [35] leads to FLN (x) ≈ 2 1 + sgn(x) 1 − e ≈ 14 e−x , when omitting higher order terms and approximating the square root for |x|  0. A tighter approximation can be obtained if we use FLN (x) ≈ 14 e−f (x) with a polynomial fitting function f (x) [36]. Comparing 1 −x2 e 4 with (54), it appears to be shifted proportionally to σl , such that: 2  = FLN (PR ) ≈ 41 e log  ≈ log 14 − − ( 12 ln(PR )−aσl −µl ) 2σ 2 l = ˜ (55) 1 (PR,dB − aσdB − µdB )2 2 ln(10) 2σdB (56) With a = 0.223, the relative error is η . 10−1 for 10−12 ≤  ≤ 10−2 and 3 ≤ σdB ≤ 24dB. The deviation on the margin matters most for outage analysis and is here below 1 dB. 3 This accuracy is still very useful, considering the simplicity of the expression for analytical studies. Finding a root of the second order equation in ln(PR ) (55) we get √ √ −1 2[(aσl +µl )+ 2σl − ln()+ln(1/4)] PR = FLN () ≈ e For a given PR , we can find the log-log slope as β = d log(FLN ) d log(PR ) ≈ 10 ln 10 h a σdB (57) i PR,dB −µdB . − 2 2σ2 dB From Fig. 7 it is observed that, for large σdB , a log-normal channel can exhibit extreme slopes when the level PR A is in the region −10 to −30 dB, which makes it hard to distinguish from a TW or TWDP channel. However, when going towards URLLC-relevant levels, the deviation from a linear slope is noticeable. B. Cascaded Rayleigh Channel (Cas) This model also contains only a diffuse component, which is a product of the envelopes of two Rayleigh links r1 and r2 . The compound received envelope is r = r1 r2 = |XR1 + jXI1 | · |XR2 + jXI2 | with PDF equal to [30], [31]9 : fCas (r) = where rΓ = r . σ1 σ2 (1−Γ)  √  rΓ I0 rΓ Γ K0 (rΓ ) σ1 σ2 (58) Using (58) we get ACas = E[r2 ] = 4σ12 σ22 (1 + Γ) = P¯1 P¯2 (1 + Γ) with correlation coefficient Γ between powers P1 = r12 and P2 = r22 . In and Kn are the Modified Bessel functions of 1st and 2nd kind, of order n. The CDF follows as: 9 Ref. [31] uses the convention Γ = ΓV1 ,V2 , whereas we use Γ = ΓP1 ,P2 as in [30]. Note that for Rayleigh fading |ΓV1 ,V2 |2 = Γ2XR 1 ,XR2 + Γ2XR 1 ,XI2 = ΓP1 ,P2 ≈ Γr1 ,r2 and Γ2XR 1 ,XI2 ≈ 0 for random links [32]. 21  √   √  √  = FCas (PR ) = 1 − rΓ [ Γ· I1 rΓ Γ K0 (rΓ ) + I0 rΓ Γ K1 (rΓ )] (59) Approximating the Bessel functions for rΓ  1, the general case (Γ < 1) simplifies as h r  i rΓ2 Γ + (2γ − 1)  = FCas (PR ) ≈ − (1 − Γ) 2 ln 4 2   PR 1 + Γ PR 1 + Γ ≈− ln = ˜ (60) ACas 1 − Γ ACas (1 − Γ)2 where γ = 0.5772.. is Euler’s constant. The log probability is:    PR 1+Γ PR 1 + Γ log(˜) = log + log + log − ln ACas 1−Γ ACas (1 − Γ)2 and is valid below the knee point to β ≈ 1 + ln  PR ACas 1 +ln 1+Γ (1−Γ)2 PR ACas  2 1 (1−Γ) 4 1+Γ . The slope is found as β ≈ and it gradually approaches a Rayleigh slope (61) d log(˜ ) P , leading d log A R Cas R → for APCas 0. For Γ = 0 the model collapses to the well known double-Rayleigh model [8]. When ˜ < 1/e, the function in (60) can be inverted [33] via a single Lambert W branch [34]: 1 1−Γ −1  PR = FCas () ≈ −ACas ˜ ˜ 1 + Γ W−1 − 1−Γ (62) −1 For the singular case of Γ = 1(r1 = r2 ), simple deduction yields rCas = r1 r2 = FCas () = q √ −1 2 R and the slope β ≈ 21 is identical to FRayl ()2 = rRayl . Thus, FCas (PR ) = FRayl ( PR ) ∼ APRayl the singular case of a TW model. It can be concluded from Fig. 7 that a the log-log behavior of cascaded Rayleigh fading can be represented by two different slopes with a breakpoint. V. S IMPLIFIED A NALYSIS OF D IVERSITY S CHEMES In practice, attaining very high reliability levels with reasonable power can only happen by having high levels of diversity at the receiver. Our analysis has shown that the tail approximation at the URLLC levels mostly has the form given in (1), which can be used for simplified diversity analysis, in particular in cases in which the full PDF/CDF are not tractable. For small terminals, the main impairment towards exploiting multi-antenna (multi-branch) diversity is the branch power ratio (BPR), defined for a pair of the m−th and n−th antenna as BPRmn = Am An [38], [39]. On the other hand, when operating in higher frequency bands, the terminal dimensions become comparable or larger than the wavelength, which leads to low branch correlations. Therefore, in the following we assume that the receiver has M antennas 22 10 0 10 -1 ǫ 10 -2 10 -3 FCas , Γ =0 Γ =0.8 Γ =0.99 Γ=1 FLN , σdB =8dB σdB =12 dB σdB =16dB ǫ̃ 10 -4 10 -5 10 -6 -60 -50 -40 -30 -20 -10 0 10 PR /A dB Fig. 7. Cascaded Rayleigh (59) with equal power links (σ1 = σ2 = σ) - and Log-Normal (54) distributions, for different values of the parameters. Dotted curves: tail approx. (60), (55). that are not correlated, i.e., the received signals across antennas are independent non-identically distributed (i.n.i.d.) random variables (RV). In Selection Combining (SC), only the strongest signal among the M antennas is selected: PR,SC = max(P1 , .., PM ) (63) For independent branches, the CDF can be expressed as a simple product of the individual CDFs across branches: M Y  = FSC (PR ) = Fm (PR ) (64) m=1 When Maximum Ratio Combining (MRC) is used, the received power is: PR,MRC = M X Pm (65) m=1 The simplest distribution we consider, is the Rayleigh case. For uncorrelated Rayleigh branch signals, tractable expressions for the tail exist when all BPR=1 or all BPR6=1 [9], [40]. [40] suggests a simple approximation for the MRC PDF for low powers, valid for all BPRs; using the approximation in [40] one can readily obtain:  M Y M M 1 Y PR 1 PR αm  = FMRC (PR ) ∼ αm = = ˜ M ! m=1 Am M ! A1 BPRm1 |{z} |{z} m=1 {z } αMRC | {z } αMRC | ∼FSC which has simple product form as in SC, shifted by αMRC = ∼FSC 1 . M! (66) 23 Next, we derive an approximation of the CDF for general M-branch MRC at low powers (see Appendix B); the approximation is of the same form as (66): QM  β M Y PR m m=1 Γ(1 + βm ) = ˜  = FMRC (PR ) ≈ αm P Am Γ(1 + M m=1 βm ) m=1 | {z }| {z } αMRC ∼FSC = Q (67) Fm Note that this solution also splits into a MRC weighting term αMRC , which depends solely on the branch slopes β and correctly collapsing to 1 for M = 1, and a term similar to SC Q FSC = Fm , which involves the offsets α. The distribution specific parameters α, β for this simple expression, are given in Table I. Inserting ακµ/m and βκµ/m from Table I, does indeed produce the distribution specific MRC solution for shadowed κ − µ fading given in [26, (18)]. When all branch slopes are equal βm = β, we get:  βM Y M Γ(1 + β)M PR αm  = FMRC (PR ) ≈ = ˜ Γ(1 + βM ) A1 BPRβm m=1 {z }| | {z } αMRC (68) Q ∼FSC = Fm with BPRm = Am /A1 . A heuristic simplification is αMRC ∼ 1 , M !β M = 4 and . 1.5dB for M = 8, both at 10−6 probability and for with outage error . 1dB for 1 2 . β . 2. For the particular Rayleigh case of β = 1, the solution collapses to the known result of (66). Using (67), we can bound the tail approximation error using the approximation error functions derived previously, resulting in: φMRC (PR ) = (1 + φmax (PR ))M − 1, (69) with φmax (PR ) = max(φ1 (PR ), . . . , φM (PR )). Using Bernoulli approximation, we arrive at the intuitive expression φMRC (PR ) ≈ M φmax (PR ), which can be used for quick evaluation of the upper bound on the power PR for given error tolerance η. Finally, based on (67) it is easy to make a heuristic generic expansion by considering local log-log linear approximation of any CDF tail. This is e.g. the case for Log-Normal and Cascaded Rayleigh models 10 , where the branch slopes depend on the power levels β(PR /A), such that:  = FMRC (PR ) ≈ αMRC (β1 (PR )..βM (PR ))FSC (PR ) = ˜ (70) with αMRC given in (67) or simplified in (68) when all branches have the same log-log slope. With this structure and availability of slopes β(PR ), one can use the full CDFs in FSC . 10 or some of the more elaborate tails, like for κ − µ type models etc. 24 Fig. 8. MRC with M = 4 for i.i.d. TWDP, Log-Normal and Double-Rayleigh (Cascaded Rayleigh with Γ = 0). Also MRC with M = 3 for one branch of each of the distributions. Bolder curves are obtained by simulation, thin dotted lines are the tail approximations. (40), (60), (55) and MRC (70), (67). Bold dots represent 1dB deviation of tail vs. simulation. Fig. 8 shows Monte Carlo simulation with 108 samples of TWDP, Log-Normal and DoubleRayleigh (Cascaded Rayleigh with Γ = 0) distributions with different mean powers. Each distribution is further circularly shifted to provide uncorrelated copies for i.i.d. M = 4. It is observed how the single branch tail approximations (thin lines) follow the simulations up to the onset of the shoulders. The 4−branch MRC tail approximation shows very good fit at URLLC probabilities - bold dots indicate point of 1dB deviation to the simulation. Furthermore, from the log-normal and 3-branch cross-distribution MRC, it is observed that the heuristic expansion in (70) indeed provides very useful results. VI. D ISCUSSION AND C ONCLUSIONS We have investigated the properties of wireless channel models in the URLLC regime and developed approximations of the tail distributions. Furthermore, our analysis has shown that, for a wide range of practical models, the outage probability at URLLC levels depends on the minimal required decoding power through an exponent β which, for the case of Rayleigh fading is β ≈ 1. More importantly, it has also been shown that the outage probability also depends on a tail offset α, which is strongly dependent on specific specular and diffuse part combinations. 25 The previous URLLC studies [41] have adopted Rayleigh models. Our analysis reveal it is not so much the existence of such a power law outage model with exponent β, but rather the tail offset α, which needs attention in assessing the tail probability. We have seen that hyper-Rayleigh fading, can result in an exponent β = 1 2 at URLLC levels, which leads to very conservative, if at all useful, rate selection. Several models can lead to hyper-Rayleigh fading, despite the fact that the physical basis of the models are different, such as: cancellation of dominant paths, cascaded links, multiple scattering or shadowing. Hence, when conducting empirical studies that work with these models, one should account for the large uncertainty that occurs when assessing the models at the URLLC levels and collect proportionally large number of samples. Finally, we have provided a simplified analysis of MRC diversity for power-law tails, as well as a heuristic generic expansion. This paves the way for more elaborate diversity analysis, which is, on the other hand, vital for achieving URLLC operation with reasonable data rates. We have used a comprehensive list of channel models and in this sense the present paper can be considered as a reference work for the channel models in URLLC regime. The necessary next step is to relate the models to the experimental results that are relevant for the URLLC regime. This requires a careful design of the measurement procedures, considering that one needs to capture rare events and thus potentially use a large number of measurement samples. ACKNOWLEDGMENT This work was supported by the H2020 European Research Council (ERC Consolidator Grant Nr. 648382 WILLOW). A PPENDIX A D ERIVATION OF THE A PPROXIMATION E RROR F UNCTION Two-Wave Model: We derive the tail for the general case when ∆ ≤ 1 (which includes ∆ = 1 as a special case). By definition the tail is the solution to the following integral: Z √PR 2r r = √  2 dr. ATW (1−∆) r2 2 πATW ∆ − 1 − ATW We introduce the following variable x ≡ x(r): r 1 2 1−∆ x= r − ATW . ∆ ∆ (71) (72) 26 Using change of variables, the integral (71) can be written as follows: Z √PR? 2x r = 2 dx,  0 x2 πATW 1 − 1 − ATW (73) where PR? = x2 (PR ). Even though the CDF has a closed form expression, bounding the sum of the higher order terms of its series expansion is difficult. We use an alternative approach instead. Specifically, we expand the integrand into Taylor series in the interval [0, x), x ≥ 0, x → 0 using Lagrange form for the remainder (i.e., the sum of the remaining higher order terms): f (x) = f (0) + f 00 (δ) 2 f 0 (0) x+ x, 1! 2! (74) for δ ∈ (0, x). Then, we bound the remainder from above, relying on the fact that integrating will not change the inequality; we obtain the following: ! r Z √PR? 1 2 4(ATW − δ 2 ) = x2 dx + p 2 3 π A π (2ATW − δ ) TW 0 √ ! r Z PR? ? 1 2 4(ATW − PR ) x2 dx ≤ + p ? 3 π ATW π (2ATW − PR ) 0 p ? r (PR )3 2 p ? 4(ATW − PR? ) 1 PR + p = π ATW 3 π (2ATW − PR? )3 ! r r 1 2 p ? 4 ATW (ATW − PR? )PR? p = PR 1 + , π ATW 3 2 π (2ATW − PR? )3 (75) (76) (77) (78) Recognizing that (78) can be written as  ≤ ˜(1 + φ(PR )), we extract φ(PR ) as the second term in the brackets in (78), completing the derivation. Note that in (76) we used the fact that the multiplicative term in front of x2 increases monotonically with δ ∈ (0, x); hence we bound it p from above with x = PR? . Rayleigh Model: Deriving the approximation error function follows similar steps as in the TW case, except that we directly bound the Lagrange remainder of the Taylor series expansion of the tail in the interval [0, PR ), PR → 0. Hence, we obtain: PR P 2 − PR PR P2 PR = − 2R e ARayl ≥ − 2R = ARayl ARayl ARayl ARayl ARayl  PR 1− 2ARayl  , (79) which completes the derivation. Weibull Model: We use the inversion: PR = 1 AWei (− ln(1 − )) β , Γ(1 + 1/β) (80) 27 and the following bounds: + 2 ≥ − ln(1 − ) ≥ . (1 − ) (81) The upper bound in (81) has been derived by bounding from above the remainder of the Taylor expansion of the function − ln(1 − ) in the interval [0, ), i.e.: 2 2 , ≤ 2(1 − )2 (1 − ) (82) for  ≥ 0. Replacing (81) into (80), we get:   β1 1 1 AWei  AWei β β , ≥ PR ≥ Γ(1 + 1/β) 1− Γ(1 + 1/β) (83) which, after inverting for , can be written as: β  PR Γ(1 + 1/β) AWei 1   ˜ ≥  ≥ ˜ β = ˜ 1 − β  .   R R 1 + Γ(1 + 1/β) APWei 1 + Γ(1 + 1/β) APWei   (84) Rician, Nakagami-m and κ−µ Model: Due to space limitation, we derive the approximation error function only for the general κ − µ model; the corresponding error functions for the Rician and Nakagami-m models can be obtained as special cases.11 We use polynomial series expansion for the generalized Marcum Q-function via generalized Laguerre polynomials and write the CDF as follows [21]: −κµ =e ∞ X (µ−1) Ln (κµ) (−1) Γ(µ + n + 1) n=0 n  PR (κ + 1)µ Aκµ n+µ , (85) (α) where Ln (·) is the generalized Laguerre polynomial of degree n and order α. Recognizing that the first term in the above sum gives the power law approximation ˜, we obtain the following:  n+µ ∞ (µ−1) X PR (κµ) −κµ n Ln (86) | − ˜| = e (−1) (κ + 1)µ Γ(µ + n + 1) A κµ n=1  n+µ ∞ X |L(µ−1) PR (κµ)| n −κµ ≤e (κ + 1)µ (87) Γ(µ + n + 1) A κµ n=1  n+µ ∞ − κµ Γ(µ + n) PR e 2 X ≤ (κ + 1)µ (88) Γ(µ) n=1 n!Γ(µ + n + 1) Aκµ µ X  n κµ  ∞ 1 e− 2 PR PR ≤ (κ + 1)µ (κ + 1)µ (89) Γ(µ)µ Aκµ n! A κµ n=1   P R κµ (κ+1)µ A κµ − 1 = ˜e 2 e , (90) 11 Note that they can be derived separately using similar reasoning. 28 which completes the derivation. In (88) we used the following upper bound [21]: |L(α) n (x)| ≤ Γ(α + n + 1) x e2 , n!Γ(α + 1) (91) and in (89) we used: Γ(µ + n) (µ + n − 1)! 1 1 = = ≤ , Γ(µ + n + 1) (µ + n)! µ+n µ (92) for n ≥ 1. A PPENDIX B MRC FOR R ANDOM VARIABLES WITH P OWER -L AW TAILS A general M-branch MRC PDF solution for independent RV can be obtained through a convolution of the branch PDFs f1 ∗ f2 .. ∗ fM , e.g. through the multiplication of moment Q generating functions (MGF) Mm and inverse Laplace transform L−1 . However, approximating the full CDF this way, can result in too complex solutions to readily extract a simple tail approximation. However, it is sufficient to deal with branch tail PDFs only [42]. The lower tail PDF corresponding to (1) can be obtained as: dα PAR f (PR ) ≈ PR →0 dPR β  β 1 βPRβ−1 =α A (93) Using Laplace transform relation [43, ET I 137(1), Table 17.13] F (s) = L(f (t)) = 1/sν ↔ β f (t) = tν−1 /Γ(ν), the branch F (s) ≈ α A1 β Γ(β) . The i.n.i.d M-branch MRC CDF (for any sβ   Q M 1 −1 1 BPR or β combination), is established as FMRC (PR ) = L m=1 Fm (s) , where s is used s to produce the CDF from the inverse transform. Using the same Laplace relation as before, we arrive at  = FMRC (PR ) ≈ −1 L ! 1 s QM m=1 sβm · M Y  αm βm Γ(βm ) m=1 1 Am βm = ˜ (94) which after reordering of terms appears in the form given in (67). R EFERENCES [1] P. Popovski, “Ultra-reliable communication in 5G wireless systems,” in Proceedings of the 1st International Conference on 5G for Ubiquitous Connectivity (5GU), Levi, Finland, 2014, pp. 146–151. [2] P. Popovski, J. J. Nielsen, C. Stefanovic, E. de Carvalho, E. Strom, K. F. Trillingsgaard, A.-S. Bana, D. M. Kim, R. Kotaba, J. Park, and R. B. Sorensen, “Wireless Access for Ultra-Reliable Low-Latency Communication (URLLC): Principles and Building Blocks”, IEEE Network Magazine, accepted, 2017, available on Arxiv. 29 [3] P. Schulz, M. Matthe, H. Klessig, M. Simsek, et al., “Latency critical iot applications in 5g: Perspective on the design of radio interface and network architecture,” IEEE Communications Magazine, vol. 55, no. 2, pp. 70–78, 2017. [4] G. D. Durgin, T. S. Rappaport, and D. A. De Wolf, “New analytical models and probability density functions for fading in wireless communications,” IEEE Transactions on Communications, vol. 50, no. 6, pp. 1005–1015, 2002. [5] M. Rao, F. J. Lopez-Martinez, M.-S. Alouini, and A. Goldsmith, “MGF approach to the analysis of generalized two-ray fading models,” IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp. 2548–2561, 2015. [6] G. Durisi, T. Koch, and P. Popovski, “Toward massive, ultrareliable, and low-latency wireless communication with short packets,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1711–1726, 2016. [7] Digital cellular telecommunications system (Phase 2+); Radio transmission and reception, TS 145 005 V10.8.0, ETSI standard, 2014. [8] J. B. Andersen and I. Z. Kovacs, “Power distributions revisited,” in COST273 3rd Management Committee Meeting, 2002, pp. 17–18. [9] R. Vaughan and J. B. Andersen, Channels, propagation and antennas for mobile communications. IET, 2003, vol. 50. [10] J. Frolik, “On appropriate models for characterizing hyper-rayleigh fading,” IEEE Trans. on Wireless Com., vol. 7, no. 12, 2008. [11] M. Pent, “Orthogonal polynomial approach for the Marcum Q-function numerical computation,” Electronics Letters, vol. 4, no. 25, pp. 563–564, 1968. [12] Á. Baricz, “Bounds for modified Bessel functions of the first and second kinds,” Proceedings of the Edinburgh Mathematical Society (Series 2), vol. 53, no. 03, pp. 575–599, 2010. [13] S. A. Saberali and N. C. Beaulieu, “New expressions for TWDP fading statistics,” IEEE Wireless Communications Letters, vol. 2, no. 6, pp. 643–646, 2013. [14] R. Lorenz, “Theoretical distribution functions of multipath fading processes in the mobile radio and determination of their parameters by measurements,” Technisher Bericht (in German), vol. 455, 1979. [15] H. Hashemi, “The indoor radio propagation channel,” Proceedings of the IEEE, vol. 81, no. 7, pp. 943–968, 1993. [16] A. Bessate and F. El Bouanani, “A very tight approximate results of MRC receivers over independent Weibull fading channels,” Physical Communication, vol. 21, pp. 30–40, 2016. [17] M. Nakagami, “The m-Distribution, a general formula of intensity of rapid fading,” Proceedings of Statistical Methods in Radio Wave Propagation, Pergamon Press, pp. 3–36, June 18–20, 1958 [18] G. J. O. Jameson, “The incomplete gamma functions,” Math. Gazette, vol. 100, no. 548, pp. 298–306, 2016. [19] M. D. Yacoub, “The κ − µ distribution and the η − µ distribution,” IEEE Antennas and Propagation Magazine, vol. 49, no. 1, pp. 68–81, 2007. [20] Á. Baricz, “Tight bounds for the generalized Marcum Q-function,” J. Math. Anal. Appl., vol. 360, no. 1, pp. 265–277, 2009. [21] Sz. András, Á. Baricz and Y. Sun, “The generalized Marcum Q-function: an orthogonal polynomial approach,” Acta Univ. Sapientiae Math., vol.3, no. 1, pp. 60–76, 2011. [22] S. K. Yoo, S. L. Cotton, P. C. Sofotasios and S. Freear, “Shadowed Fading in Indoor Off-Body Communication Channels: A Statistical Characterization Using the κµ / Gamma Composite Fading Model,” in IEEE Trans. on Wireless Com., vol. 15, no. 8, pp. 5231-5244, 2016. [23] S. K. Yoo, S. L. Cotton, P. C. Sofotasios, M. Matthaiou, M. Valkama, and G K. Karagiannidis,“The κ − µ / Inverse Gamma Fading Model,” IEEE 26th Int. Symp. on Pers., Indoor, and Mob. Radio Com. (PIMRC), pp. 425-429, 2015 [24] S. K. Yoo, Fading in Wearable Communications Channels and its Mitigation. PhD [Dissertation]. Belfast, UK: Queens Univ. of Belfast, 2017. Accessed 19-11-2017. [Online]. Available: https://pure.qub.ac.uk/portal/files/130797348/thesis final.pdf. 30 [25] Hypergeometric 1F1, Wolfram Research, Inc.. Assessed 19-11-2017. [Online]. Available http://functions.wolfram.com/PDF/ Hypergeometric1F1.pdf [26] J. F. Paris, “Statistical Characterization of κ−µ Shadowed Fading,” IEEE Trans. on Veh. Tech., vol, 63, no. 2, pp. 518–526, 2014. [27] J. Choi and A. K. Rathie, “Certain Summation Formulas for Humbert´s Double Hypergeometric Series,” Com. Korean Math. Soc., vol. 30, no. 4, pp. 439–446, 2015. [28] C. M. Joshi and J. P. Arya, “Inequalities for certain confluent hypergeometric functions of two variables,” Indian J. pure appl. Math, vol. 13, no. 4, pp. 491–500, 1982. [29] E. Martos-Naya, J. M. Romero-Jerez, F. J. Lopez-Martinez and J. F. Paris. (2016) A MATLAB program for the computation of the confluent hypergeometric function Φ2 . Accessed 3-11-2017. [Online]. Available: https://riuma.uma.es//xmlui/handle/ 10630/12068. [30] M. K. Simon and M.-S. Alouini, Digital communication over fading channels. John Wiley & Sons, 2005, vol. 95. [31] Y. A. Chau and K. Y.-T. Huang, “On the second-order statistics of correlated cascaded rayleigh fading channels,” International Journal of Antennas and Propagation, vol. 2012, 2012. [32] J. N. Pierce and S. Stein, “Multiple diversity with nonindependent fading,” Proceedings of the IRE, vol. 48, no. 1, pp. 89–104, 1960. [33] Maplesoft, Maple User Manual, Maplesoft, Waterloo, ON Canada, 2017, version 18. [Online]. Available: http://www.maplesoft.com [34] R. M. Corless, G. H. Gonnet, D. E. G. Hare, D. J. Jeffrey, and D. E. Knuth, “On the LambertW function,” Advances in Computational Mathematics, vol. 5, no. 1, pp. 329–359, 1996. [35] H. M. Schöpf and P. H. Supancic, “On Bürmann’s theorem and its application to problems of linear and nonlinear heat transfer and diffusion,” The Mathematica Journal, vol. 16, pp. 1–44, 2014. [36] S. Winitzki. (2008) A handy approximation for the error function and its inverse. Assessed: 19-11-2017. [Online]. Available: https://sites.google.com/site/winitzki/sergei-winitzkis-files [37] C. S. Withers and S. Nadarajah, “A Generalized Suzuki Distribution,” IEEE Wireless Personal Communications, vol. 62, pp. 807–830, 2012. [38] V. Plicanic, B. K. Lau, A. Derneryd, and Z. Ying, “Actual diversity performance of a multiband diversity antenna with hand and head effects,” IEEE Transactions on Antennas and Propagation, vol. 57, no. 5, pp. 1547–1556, 2009. [39] B. R. Yanakiev, J. Ødum Nielsen, M. Christensen, and G. Frølund Pedersen, “Correlation measurements on small mobile devices,” in Antennas and Propagation (EUCAP), 2012 6th European Conference on. [40] M. Schwartz, W. R. Bennett, and S. Stein, Communication Systems and Techniques. [41] N. A. Johansson, Y.-P. E. Wang, E. Eriksson and M. IEEE, 2012, pp. 382–385. McGraw-Hill -IEEE Press, 1996. Hessler, “Radio access for ultra-reliable and low-latency 5G communications,” in International Conference on Communication Workshop (ICCW). IEEE, 2015, pp. 1184–1189. [42] P. Hitczenko and S. Montgomery-Smith, “A note on sums of independent random variables,” in Advances in Stochastic Inequalities, Contemp. Math. 234, T. Hill and C. Houdre, Eds. Providence R.I., USA: A.M.S., 1999, pp. 69–73. [43] I. Gradshteyn and I. Ryzhik, Table of Integrals, Series, and Products, 7th ed. USA: Academic Press/ Elsevier, 2007. [44] 3rd Generation Partnership Project (3GPP), “Study on scenarios and requirements for next generation access technologies,”, Technical Report TR 38.913 V14.3.0, retrieved 09 2017.
7cs.IT
1 Exploiting Multiple-Antenna Techniques for Non-Orthogonal Multiple Access Xiaoming Chen, Senior Member, IEEE, Zhaoyang Zhang, Member, IEEE, Caijun Zhong, arXiv:1706.00635v1 [cs.IT] 2 Jun 2017 Senior Member, IEEE, and Derrick Wing Kwan Ng, Member, IEEE Abstract This paper aims to provide a comprehensive solution for the design, analysis, and optimization of a multiple-antenna non-orthogonal multiple access (NOMA) system for multiuser downlink communication with both time duplex division (TDD) and frequency duplex division (FDD) modes. First, we design a new framework for multiple-antenna NOMA, including user clustering, channel state information (CSI) acquisition, superposition coding, transmit beamforming, and successive interference cancellation (SIC). Then, we analyze the performance of the considered system, and derive exact closedform expressions for average transmission rates in terms of transmit power, CSI accuracy, transmission mode, and channel conditions. For further enhancing the system performance, we optimize three key parameters, i.e., transmit power, feedback bits, and transmission mode. Especially, we propose a lowcomplexity joint optimization scheme, so as to fully exploit the potential of multiple-antenna techniques in NOMA. Moreover, through asymptotic analysis, we reveal the impact of system parameters on average transmission rates, and hence present some guidelines on the design of multiple-antenna NOMA. Finally, simulation results validate our theoretical analysis, and show that a substantial performance gain can be obtained over traditional orthogonal multiple access (OMA) technology under practical conditions. Index Terms NOMA, multiple-antenna techniques, performance analysis, power allocation, feedback distribution, mode selection. Xiaoming Chen ([email protected]), Zhaoyang Zhang ([email protected]), and Caijun Zhong ([email protected]) are with the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China. Derrick Wing Kwan Ng ([email protected]) is with the school of Electrical Engineering and Telecommunications, the University of New South Wales, NSW, Australia. 2 I. I NTRODUCTION Current wireless communication systems in general adopt various types of orthogonal multiple access (OMA) technologies for serving multiple users, such as time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA), where one resource block is exclusively allocated to one mobile user (MU) to avoid possible multiuser interference. In practice, the OMA technologies are relatively easy to implement, albeit at the cost of low spectral efficiency. Recently, with the rapid development of mobile internet and proliferation of mobile devices, it is expected that future wireless communication systems should be able to support massive connectivity, which is an extremely challenging task for the OMA technologies with limited radio resources. Responding to this, non-orthogonal multiple access (NOMA) has been recently proposed as a promising access technology for the fifth-generation (5G) mobile communication systems, due to its potential in achieving high spectral efficiency [1]–[3]. The principle of NOMA is to exploit the power domain to simultaneously serve multiple MUs utilizing the same radio resources [4], [5], with the aid of sophisticated successive interference cancellation (SIC) receivers [6], [7]. Despite the adoption of SIC, inter-user interference still exists except for the MU with the strongest channel gain, which limits the overall system performance [8]. To address this issue, power allocation has been considered as an effective method to harness multiuser interference [9], [10]. Since the overall performance is limited by the MUs with weak channel conditions, it is intuitive to allocate more power to the weak MUs and less power to the strong MU in order to enhance the effective channel gain and minimize the interference to the weak MUs [11]. For the specific two-user case, the optimal power allocation scheme was studied in [12], and [13] proposed two sub-optimal power allocation schemes exploiting the Karush-Kuhn-Tucker (KKT) conditions, while the issue of quality of service (QoS) requirements of NONA systems was investigated in [14]. For the case with arbitrary number of users, the computational complexity of performing SIC increases substantially and the design of the optimal power allocation becomes intractable. To facilitate an effective system design, clustering and user pairing have been proposed [15], [16]. Generally speaking, multiple MUs with distinctive channel gains are selected to form a cluster, in which SIC is conducted 3 to mitigate the interference [17], [18]. In general, a small cluster consisting a small number of MUs implies low complexity of SIC, but leads to high inter-cluster interference. Thus, it makes sense to dynamically adjust the size of a cluster according to performance requirements and system parameters, so as to achieve a balance between implementation complexity and interference mitigation [19]. However, dynamic clustering is not able to reduce the inter-cluster interference, indicating the necessity of carrying out dynamic clustering in combination with efficient interference mitigation schemes. It is well known that the multiple-antenna technology is a powerful interference mitigation scheme [20]–[22], hence, can be naturally applied to NOMA systems [23], [24]. In [25], the authors proposed a beamforming scheme for combating inter-cluster and intra-cluster interference in a NOMA downlink, where the base station (BS) was equipped with multiple antennas and the MUs have a single antenna each. A more general setup was considered in [26], where both the BS and the MUs are multiple-antenna devices. By exploiting multiple antennas at the BS and the MUs, a signal alignment scheme was proposed to mitigate both the intra-cluster and intercluster interference. It is worth pointing out that the implementation of the two above schemes requires full channel state information (CSI) at the BS, which is usually difficult and costly in practice. To circumvent the difficulty in CSI acquisition, random beamforming was adopted in [27], which inevitably leads to performance loss. Alternatively, the work in [28] suggested to employ zero-forcing (ZF) detection at the multiple-antenna MUs for inter-cluster interference cancelation. However, the ZF scheme requires that the number of antennas at each MU is greater than the number of antennas at the BS, which is in general impractical. To effectively realize the potential benefits of multiple-antenna techniques, the amount and quality of CSI available at the BS plays a key role. In practice, the CSI can be obtained in several different ways. For instance, in time duplex division (TDD) systems, the BS can obtain the downlink CSI through estimating the CSI of uplink by leveraging the channel reciprocity. While in frequency duplex division (FDD) systems, the downlink CSI is usually first estimated and quantized at the MUs, and then is conveyed back to the BS via a feedback link. For both practical TDD and FDD systems, the BS has access to only partial CSI. As a result, there will be residual inter-cluster and intra-cluster interference. To the best of the authors’ knowledge, previous works only consider two extreme cases with full CSI or no CSI, the design, analysis 4 and optimization of multiple-antenna NOMA systems with partial CSI remains an uncharted area. Motivated by this, we present a comprehensive study on the impact of partial CSI on the design, analysis, and optimization of multiple-antenna NOMA downlink communication systems. Specifically, we consider heterogeneous downlink channels, and the BS equipped with arbitrarily multiple antennas has different CSI accuracies about the downlink channels. The major contributions of this paper are summarized as follows: 1) We design a general framework for multiple-antenna NOMA downlink communications including user clustering, CSI estimation, superposition coding, transmit beamforming, and SIC. In particular, the proposed framework is applicable in both TDD and FDD modes. 2) We analyze the performance of the proposed multiple-antenna NOMA, and derive exact expressions for the average transmission rates of each MU in an arbitrary cluster. The average transmission rate is a function of transmit power, CSI accuracy, transmission mode, and channel conditions. 3) We optimize three key parameters of multiple-antenna NOMA, namely, transmit power, feedback bits, and transmission mode. In particular, we present closed-form expressions for the power allocation and feedback distribution. For mode selection, we show that the mode of two MUs in a cluster is optimal in practical cases with moderate and high CSI accuracy, which provides theoretical justification for the two-user setup in the previous works [9]–[14], [23]–[28], [30], [31]. Finally, a low complexity joint optimization scheme of transmit power, feedback bits, and transmission mode is proposed. 4) Through asymptotic analysis of average transmission rates, several key insights are obtained. a) Imperfect CSI results in residual inter-cluster interference at MUs. Thus, there exists a performance gap between practical NOMA with imperfect CSI and ideal NOMA with perfect CSI. The performance gap is an increasing function of transmit power of information signal and a decreasing function of CSI accuracy. In order to maintain a constant performance, transmit energy of pilot sequence for channel estimation in TDD mode and spatial resolution in FDD mode should be increased as transmit 5 power of information signal grows. b) From the perspective of maximizing the sum rate, arranging all MUs in one cluster is optimal if there is no CSI at the BS, while the best option is to arrange one MU in each cluster if there is perfect CSI at the BS. c) In the interference-limited scenario, the average transmission rate for the 1st MU with the strongest channel gain in each cluster increases linearly proportionally to the number of feedback bits. Under the noise-limited condition, the average transmission rate is independent of CSI accuracy. d) In the interference-limited case, equal power allocation among all MUs asymptotically approaches the optimal performance. The rest of this paper is organized as follows: Section II gives a brief introduction of the considered NOMA downlink communication system, and designs the corresponding multipleantenna transmission framework. Section III first analyzes the average transmission rates in presence of imperfect CSI, and then proposes three performance optimization schemes. Section IV derives the average transmission rates in two extreme cases through asymptotic analysis, and presents some system design guidelines. Section V provides simulation results to validate the effectiveness of the proposed schemes. Finally, Section VI concludes the whole paper. Notations: We use bold upper (lower) letters to denote matrices (column vectors), (·)H to denote conjugate transpose, E[·] to denote expectation, k · k to denote the L2 -norm of a vector, d | · | to denote the absolute value, = to denote the equality in distribution, ⌊x⌋ to denote the maximum integer not larger than x, and C to denote the set of complex number. The acronym i.i.d. means “independent and identically distributed”, pdf means “probability density function”, and cdf means “cumulative distribution function”. II. S YSTEM M ODEL AND F RAMEWORK D ESIGN A. User Clustering Consider a downlink communication scenario in a single-cell system, where a base station (BS) broadcasts messages to multiple MUs, cf. Fig. 1. Note that the BS is equipped with M antennas, while the MUs have a single antenna each due to the size limitation. To strike a balance between the system performance and computational complexity in NOMA systems, 6 BS Fig. 1. A multiuser NOMA communication system with 4 clusters. it is necessary to carry out user clustering. In particular, user clustering can be designed from different perspectives. For instance, a signal-to-interference-plus-noise ratio (SINR) maximization user clustering scheme was adopted in [32] and quasi-orthogonal MUs were selected to form a cluster in [33]. Intuitively, these schemes perform user clustering by the exhaustive search method, resulting in high implementation complexity. In this paper, we design a simple user clustering scheme based on the information of spatial direction1 . Specifically, the MUs in the same direction but with distinctive propagation distances are arranged into a cluster. On one hand, the same direction of the MUs in a cluster allows the use of a single beam to nearly align all MUs in such a cluster, thereby facilitating the mitigation of the inter-cluster interference and the enhancement of the effective channel gain. On the other hand, a large gap of propagation distances avoids severe inter-user interference and enables a more accurate SIC at the MUs [34]– [36]. If two MUs are close to each other with almost equal channel gains, it is possible to assign them in different clusters by improving the spatial resolution via increasing the number of spatial beams and the number of BS antennas. Without loss of generality, we assume that the MUs are grouped into N clusters with K MUs in each cluster. To facilitate the following presentation, 1/2 we use αn,k hn,k to denote the M-dimensional channel vector from the BS to the kth MU in the nth cluster, where αn,k is the large-scale channel fading, and hn,k is the small-scale channel fading following zero mean complex Gaussian distribution with unit variance. It is assumed that αn,k remains constant for a relatively long period, while hn,k keeps unchanged in a time slot but 1 The spatial direction of users can be found via various methods/technologies such as GPS or user location tracking algorithms. 7 varies independently over time slots. B. CSI Acquisition For the TDD mode, the BS obtains the downlink CSI through uplink channel estimation. Specifically, at the beginning of each time slot, the MUs simultaneously send pilot sequences of τ symbols to the BS, and the received pilot at the BS can be expressed as YP = N X K q X P αn,k hn,k Φn,k + NP , τ Pn,k (1) n=1 k=1 P where Pn,k is the transmit power for pilot sequence of the kth MU in the nth cluster, NP is an additive white Gaussian noise (AWGN) matrix with i.i.d. zero mean and unit variance complex Gaussian distributed entries. Φn,k ∈ C1×τ is the pilot sequence sent from the kth MU in the nth cluster. It is required that τ > NK, such that the pairwise orthogonality that Φn,k ΦH i,j = 0 and Φn,k ΦH n,k = 1, ∀(n, k) 6= (i, j), can be guaranteed. By making use of the pairwise orthogonality, the received pilot can be transformed as YP Φ H n,k q P αn,k hn,k + NP ΦH = τ Pn,k n,k . (2) Then, by using minimum mean squared error (MMSE) estimation, the relation between the actual channel gain hn,k and the estimated channel gain ĥn,k can be expressed as hn,k = √ ρn,k ĥn,k + p 1 − ρn,k en,k , (3) where en,k is the channel estimation error vector with i.i.d. zero mean and unit variance complex Gaussian distributed entries, and is independent of ĥn,k . Variable ρn,k = 1 P α 1+τ Pn,k n,k P α τ Pn,k n,k P α 1+τ Pn,k n,k = 1− is the correlation coefficient between hn,k and ĥn,k . A large ρn,k means a high accuracy for channel estimation. Thus, it is possible to improve the CSI accuracy by increasing the transmit P power Pn,k or the length τ of pilot sequence. For the FDD mode, the CSI is usually conveyed from the MUs to the BS through a feedback link. Since the feedback link is rate-constrained, CSI at the MUs should first be quantized. Specifically, the kth MU in the nth cluster chooses an optimal codeword from a predetermined (1) Bn,k ) (2 quantization codebook Bn,k = {h̃n,k , . . . , h̃n,k (j) } of size 2Bn,k , where h̃n,k is the jth codeword 8 of unit norm and Bn,k is the number of feedback bits. Mathematically, the codeword selection criterion is given by j ⋆ = arg max (j) 2 Bn,k 1≤j≤2 hH n,k h̃n,k . (4) Then, the MU conveys the index j ⋆ to the BS with Bn,k feedback bits, and the BS recoveries (j ⋆ ) the quantized CSI h̃n,k from the same codebook. In other words, the BS only gets the phase information by using the feedback scheme based on a quantization codebook. However, as shown in below, the phase information is sufficient for the design of spatial beamforming. Similarly, the relation between the real CSI and the obtained CSI in FDD mode can be approximated as [39] h̃n,k = where h̃n,k = hn,k khn,k k √ ⋆ ̺n,k h̃n,k + p 1 − ̺n,k ẽn,k , (5) ⋆ is the phase of the channel hn,k , h̃n,k is the quantized phase information, ẽn,k Bn,k is the quantization error vector with uniform distribution, and ̺n,k = 1 − 2− M −1 is the associated correlation coefficient or CSI accuracy. Thus, it is possible to improve the CSI accuracy by increasing the size of quantization codebook for a given number of antennas M at the BS. C. Superposition Coding and Transmit Beamforming Based on the available CSI, the BS constructs one transmit beam for each cluster, so as to mitigate or even completely cancel the inter-cluster interference. To strike balance between system performance and implementation complexity, we adopt zero-force beamforming (ZFBF) at the BS. We take the deign of beam wi for the ith cluster as an example. First, we construct a complementary matrix H̄i 2 as: H̄i = [ĥ1,1 , · · · , ĥ1,K , · · · , ĥi−1,1 , · · · , ĥi−1,K , ĥi+1,1 , · · · , ĥN,K ]H . (6) Then, we perform singular value decomposition (SVD) on H̄i and obtain its right singular vectors ui,j , j = 1, · · · , Nu , with respect to the zero singular values, where Nu is the number of zero Nu P θi,j ui,j , where θi,j > 0 is a weight singular values. Finally, we can design the beam as wi = j=1 2 ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ In FDD mode, the complementary matrix is given by H̄i = [h̃1,1 , · · · , h̃1,K , · · · , h̃i−1,1 , · · · , h̃i−1,K , h̃i+1,1 , · · · , h̃N,K ]H . 9 such that Nu P θi,j = 1. Thus, the received signal at the kth MU in the nth cluster is given by j=1 yn,k = √ αn,k hH n,k N X wi si + nn,k i=1 = √ αn,k hH n,k wn sn N q X H wi si + nn,k , + αn,k (1 − ρn,k )en,k (7) i=1,i6=n where si = K q P j=1 S S Pi,j si,j is the superposition coded signal with Pi,j and si,j being transmit power and transmit signal for the jth MU in the ith cluster, and nn,k is the AWGN with unit S variance. In general, Pi,j should be carefully allocated to distinguish the MUs in the power domain, which we will discuss in detail below. Note that Eq. (7) holds true due to the fact that p p H √ 3 hH ρn,k ĥn,k wi + 1 − ρn,k eH 1 − ρn,k eH n,k wi = n,k wi = n,k wi for ZFBF in TDD mode . With perfect CSI at the BS, i.e., ρn,k = 1, the inter-cluster interference can be completely cancelled. D. Successive Interference Cancellation Although ZFBF at the BS can mitigate partial inter-cluster interference from the other clusters, there still exists intra-cluster interference from the same cluster. In order to improve the received signal quality, the MU conducts SIC according to the principle of NOMA. Without loss of generality, we assume that the effective channel gains in the ith cluster have the following order: √ √ 2 H 2 | αi,1 hH i,1 wi | ≥ · · · ≥ | αi,K hi,K wi | . (8) It is reasonably assumed that the BS may know MUs’ effective gains through the channel quality indicator (CQI) messages, and then determines the user order in (8). Thus, in the ith cluster, the jth MU can always successively decode the lth MU’s signal, ∀l > j, if the lth MU can decode its own signal. As a result, the jth MU can subtract the interference from the lth MU in the received signal before decoding its own signal. After SIC, the signal-to-interference-plus-noise 3 √ In FDD mode, we have hH n,k wi = ̺n,k eH n,k wi , d √ ⋆ ̺n,k khn,k k(h̃n,k )H wi + √ 1 − ̺n,k khn,k kẽH n,k wi = √ d 1 − ̺n,k khn,k kẽH n,k wi = 1− where = denotes the equality in distribution. If ̺n,k = ρn,k , Eq. (7) also holds true in FDD mode. In the sequel, without loss of generality, we no longer distinguish between TDD and FDD. 10 ratio (SINR) at the kth MU in the nth cluster is given by γn,k = 2 αn,k |hH n,k wn | | {z k−1 X 2 S αn,k |hH n,k wn | Pn,k S Pn,j j=1 Intra-cluster interference } + αn,k (1 − ρn,k ) | N X i=1,i6=n 2 |eH n,k wi | {z K X , S Pi,l l=1 Inter-cluster interference (9) + |{z} 1 AWGN } where the first term in the denominator of (9) is the residual intra-cluster interference after SIC at the MU, the second one is the residual inter-cluster interference after ZFBF at the BS, and the third one is the AWGN. For the 1st MU in each cluster, there is no intra-cluster interference, since it can completely eliminate the intra-cluster interference. Note that in this paper, we assume that perfect SIC can be performed at the MUs. In practical NOMA systems, SIC might be imperfect due to a limited computational capability at the MUs. Thus, there exists residual intra-cluster interference from the weaker MUs even after SIC [37]. However, the study of the impact of imperfect SIC on the system performance is beyond the scope of this paper and we would like to investigate it in the future work. Moreover, the transmit power has a significant impact on the SIC and the performance of NOMA [38]. Thus, we will quantitatively analyze the impact of transmit power and then aim to optimize the transmit power for improving the performance in the following sections. III. P ERFORMANCE A NALYSIS AND O PTIMIZATION In this section, we concentrate on performance analysis and optimization of multi-antenna NOMA downlink with imperfect CSI. Specifically, we first derive closed-form expressions for the average transmission rates of the 1st MU and the other MUs, and then propose separate and joint optimization schemes of transmit power, feedback bits, and transmit mode, so as to maximize the average sum rate of the system. A. Average Transmission Rate We start by analyzing the average transmission rate of the kth MU in the nth cluster. First, we consider the case k > 1. According to the definition, the corresponding average transmission rate can be computed as Rn,k = E [log2 (1 + γn,k )] 11   H 2  αn,k |hn,k wn |    = E log2    " = E log2 −E log2 S Pn,j j=1 + αn,k (1 − ρn,k ) N P 2 |eH n,k wi | K P  S Pi,l + 1    K k−1 N P P P  H S S H 2 2 Pi,l + 1 αn,k |hn,k wn | Pn,j + αn,k (1 − ρn,k ) |en,k wi | 2 αn,k |hH n,k wn | " k P j=1 k X S Pn,j + αn,k (1 − ρn,k ) k−1 X S Pn,j j=1 N X i=1,i6=n + αn,k (1 − ρn,k ) l=1 l=1 i=1,i6=n j=1 2 αn,k |hH n,k wn | i=1,i6=n 2 |eH n,k wi | N X K X +1 l=1 2 |eH n,k wi | i=1,i6=n S Pi,l K X l=1 S Pi,l !# +1 !# . (10) Note that the average transmission rate in (10) can be expressed as the difference of two terms, which have a similar form. Hence, we concentrate on the derivation of the first term. k P 2 S For notational convenience, we use W to denote the term αn,k |hH Pn,j + αn,k (1 − n,k wn | j=1 ρn,k ) N P i=1,i6=n |eH n,k wi | K P 2 l=1 S Pi,l . To compute the first expectation, the key is to obtain the probability 2 density function (pdf) of W . Checking the first random variable |hH n,k wn | in W , since wn of 2 2 unit norm is designed independent of hn,k , |hH n,k wn | is χ distributed with 2 degrees of freedom 2 2 [40]. Similarly, |eH n,k wi | also has the distribution χ (2). Therefore, W can be considered as a weighted sum of N random variables with χ2 (2) distribution. According to [41], W is a nested finite weighted sum of N Erlang pdfs, whose pdf is given by fW (x) = N X i=1 where q ηn,k =  q i ΞN i, {ηn,k }N q=1 g(x, ηn,k ),  k P  S  α Pq,j  n,k K P  S   αn,k (1 − ρn,k ) Pq,l if q 6= n i g(x, ηn,k )= ΞN  q i, {ηn,k }N q=1 if q = n j=1 1 i ηn,k , l=1 exp − N −1 i Y (−1)N −1 ηn,k = N Q l s=1 ηn,k l=1 (11) x i ηn,k 1 i ηn,k ! , − 1 s+U(s−i) ηn,k !−1 , 12 and U(x) is the well-known unit step function defined as U(x ≥ 0) = 1 and zero otherwise. q It is worth pointing out that the weights ΞN are constant for given {ηn,k }N q=1 . Hence, the first expectation in (10) can be computed as Z ∞ E[log2 (1 + W )] = log2 (1 + x)fW (x)dx = 0 N X i=1 where Ei (x) = Rx q ΞN i, {ηn,k }N q=1 N  Z ∞ 0 log2 (1 + x)  1 X q ΞN i, {ηn,k }N = − q=1 exp ln(2) i=1 1 i ηn,k 1 i ηn,k ! exp − Ei − x ! i ηn,k ! 1 i ηn,k , dx (12) exp(t) dt t is the exponential integral function. Eq. (12) follows from [42, Eq. N K k−1 P P P S 2 S 2 |eH Pi,t (4.3372)]. Similarly, we use V to denote αn,k |hH Pn,j +αn,k (1−ρn,k ) n,k wn | n,k wi | −∞ j=1 i=1,i6=n in the second term of (10). Thus, the second expectation term can be computed as ! ! N  1 1 1 X v ΞN i, {βn,k }N Ei − i , E[log2 (1 + V )] = − v=1 exp i ln(2) i=1 βn,k βn,k where v βn,k =  k−1 P S   Pv,j α  n,k t=1 (13) if v = n j=1 K P   S  αn,k (1 − ρn,k ) Pv,l if v 6= n . l=1 Hence, we can obtain the average transmission rate for the kth MU in the nth cluster as follows ! ! N  1 1 1 X v Ei − i ΞN i, {βn,k }N Rn,k = v=1 exp i ln(2) i=1 βn,k βn,k ! ! N X  1 1 1 q ΞN i, {ηn,k }N Ei − i . (14) − q=1 exp i ln(2) i=1 ηn,k ηn,k Then, we consider the case k = 1. Since the first MU can decode all the other MUs’ signals in the same cluster, there is no intra-cluster interference. In this case, the corresponding average transmission rate reduces to Rn,1     N −1  1 1 X 1 v N −1 Ei − i = ΞN −1 i, {βn,1 }v=1 exp i ln(2) i=1 βn,1 βn,1 13 N  1 X q ΞN i, {ηn,1 }N − q=1 exp ln(2) i=1 where q = ηn,1 and v βn,1 =  S   αn,1 Pq,1  1 i ηn,1    1 Ei − i , ηn,1 (15) if q = n   αn,1 (1 − ρn,1 ) K P l=1 S Pq,l if q 6= n  K P  S   αn,1 (1 − ρn,1 ) Pv,l    αn,1 (1 − ρn,1 ) l=1 K P l=1 S Pv+1,l , if v < n . if v ≥ n Combing (14) and (15), it is easy to evaluate the performance of a multiple-antenna NOMA downlink with arbitrary system parameters and channel conditions. In particular, it is possible to reveal the impact of system parameters, i.e., transmit power, CSI accuracy, and transmission mode. B. Power Allocation From (14) and (15), it is easy to observe that with imperfect CSI, transmit power has a great impact on average transmission rates. On one hand, increasing the transmit power can enhance the desired signal strength. On the other hand, it also increases the interference. Thus, it is desired to distribute the transmit power according to channel conditions. To maximize the sum rate of the considered multiple-antenna NOMA system subject to a total power constraint, we have the following optimization problem: J1 : max S Pn,k s.t. C1 : C2 : N X K X Rn,k (16) n=1 k=1 N X K X S S Pn,k ≤ Ptot n=1 k=1 S Pn,k > 0, S where Ptot is the maximum total transmit power budget. It is worth pointing out that in certain scenarios, user fairness might be of particular importance. To guarantee user fairness, one can replace the objective function of J1 with the maximization of a weighted sum rate, where the 14 weights can directly affect the power allocation and thus the MUs’ rates. Unfortunately, J1 is not a convex problem due to the complicated expression for the objective function. Thus, it is difficult to directly provide a closed-form solution for the optimal transmit power. As a compromise solution, we propose an effective power allocation scheme based on the following important observation of the multiple-antenna NOMA downlink system: Lemma 1: The inter-cluster interference is dependent of power allocation between the clusters, while the intra-cluster interference is determined by power allocation among the MUs in the same cluster. Proof: A close observation of the inter-cluster interference αn,k (1 − ρn,k ) K P l=1 S Pi,l in (9) indicates that K P l=1 N P i=1,i6=n 2 |eH n,k wi | S Pi,l is the total transmit power for the ith cluster, which suggests that inter-cluster power allocation does not affect the inter-cluster interference. Inspired by Lemma 1, the power allocation scheme can be divided into two steps. In the first step, the BS distributes the total power among the N clusters. In the second step, each cluster individually carries out power allocation subject to the power constraint determined by the first step. In the following, we give the details of the two-step power allocation scheme. First, we design the power allocation between the clusters from the perspective of minimizing inter-cluster interference. For the ith cluster, the average aggregate interference to the other clusters is given by Ii = E " N K X X n=1,n6=i k=1 = N K X X n=1,n6=i k=1 where PiS = K P l=1 2 αn,k (1 − ρn,k )|eH n,k wi | ! K X S Pi,l l=1 αn,k (1 − ρn,k ) PiS , # (17) S Pi,l is the total transmit power of the ith cluster. Eq. (17) follows the fact that 2 E[|eH n,k wi | ] = 1. Intuitively, a large interference coefficient N P K P n=1,n6=i k=1 αn,k (1 − ρn,k ) means a more severe inter-cluster interference caused by the ith cluster. In order to mitigate the intercluster interference for improving the average sum rate, we propose to distribute the power proportionally to the reciprocal of interference coefficient. Specifically, the transmit power for 15 the ith cluster can be computed as PiS = N P K P n=1,n6=i k=1 N P l=1 N P αn,k (1 − ρn,k ) K P n=1,n6=l k=1 !−1 αn,k (1 − ρn,k ) S !−1 Ptol . (18) Then, we allocate the power in the cluster for further increasing the average sum rate. According to the nature of NOMA techniques, the first MU not only has the strongest effective channel gain for the desired signal, but also generates a weak interference to the other MUs. On the contrary, the Kth MU has the weakest effective channel gain for the desired signal, and also produces a strong interference to the other MUs. Thus, from the perspective of maximizing the sum of average rate, it is better to allocate the power based on the following criterion: S S S Pn,1 ≥ · · · ≥ Pn,k ≥ · · · ≥ Pn,K . (19) On the other hand, in order to facilitate SIC, the NOMA in general requires the transmit powers in a cluster to follow a criterion below [28]: S S S Pn,1 ≤ · · · ≤ Pn,k ≤ · · · ≤ Pn,K . (20) Under this condition, the MU performs SIC according to the descending order of the user index, namely the ascending order of the effective channel gain. Specifically, the kth MU cancels the interference from the Kth to the (k + 1)th MU in sequence. Thus, the SINR for decoding each interference signal is the highest, which facilitates SIC at MUs [38]. To simultaneously fulfill the above two criterions, we propose to equally distribute the powers within a cluster, namely S Pn,k = PnS /K. (21) Substituting (18) into (21), the transmit power for the kth MU in the nth cluster can be computed 16 as S Pn,k = N P K P i=1,i6=n j=1  K N P l=1 αi,j (1 − ρi,j ) !−1 S !−1  Ptol . N K P P  αi,j (1 − ρi,j ) (22) i=1,i6=l j=1 Thus, we can distribute the transmit power based on (22) for given channel statistical information and the CSI accuracy, which has a quite low computational complexity. Remarks: We note that path loss coefficient αn,k , ∀n, k, remain constant for a relatively long time, and it is easy to obtain at the BS via long-term measurement. Hence, the proposed power allocation scheme incurs a low system overhead, and can be implemented with low complexity. C. Feedback Distribution For the FDD mode, the accuracy of quantized CSI relies on the size of codebook 2Bn,k , where Bn,k is the number of feedback bits from the kth MU in the nth cluster. As observed in (14) and (15), it is possible to decrease the interference by increasing feedback bits. However, due to the rate constraint on the feedback link, the total number of feedback bits is limited. Therefore, it is of great importance to optimize the feedback bits among the MUs for performance enhancement. According to the received SNR in (9), the CSI accuracy only affects the inter-cluster interference. Thus, it makes sense to optimize the feedback bits to minimizing the average sum of inter-cluster interference given by # " N K K N X XX X S 2 Iinter = E Pi,l αn,k (1 − ̺n,k ) |eH n,k wi | n=1 k=1 = N X K X n=1 k=1 αn,k i=1,i6=n N X i=1,i6=n Bn,k PiS 2− M −1 . l=1 (23) 17 Hence, the optimization problem for feedback bits distribution can be expressed as J2 : min Bn,k N X K X s.t. C3 : αn,k n=1 k=1 N X K X n=1 k=1 N X Bn,k PiS 2− M −1 (24) i=1,i6=n Bn,k ≤ Btot , C4 : Bn,k ≥ 0, where Btot is an upper bound on the total number of feedback bits. J2 is an integer programming problem, hence is difficult to solve. To tackle this challenge, we relax the integer constraint on Bn,k . In this case, according to the fact that N X K X αn,k n=1 k=1 N X PiS 2 B − Mn,k −1 i=1,i6=n N Y K Y ≥ NK αn,k n=1 k=1  N P = NK 2  = NK 2 where the equality holds true only when αn,k K P Bn,k 1  NK N P PiS 2 B − Mn,k −1 i=1,i6=n k=1 − n=1 M −1 B − Mtot −1 N X 1  NK N Y K Y  1 ! NK αn,k n=1 k=1 N Y K Y n=1 k=1 PiS i=1,i6=n N X αn,k N X PiS i=1,i6=n 1 ! NK 1 ! NK , (25) Bn,k i=1,i6=n PiS 2− M −1 , ∀n, k are equal. In other words, the objective function in (24) can be minimized while satisfying the following condition: αn,k N X i=1,i6=n PiS 2 B − Mn,k −1  = 2 B − Mtot −1 1  NK N Y K Y αn,k n=1 k=1 N X PiS i=1,i6=n 1 ! NK . (26) Hence, based on the relaxed optimization problem, the optimal number of feedback bits for the kth MU in the nth cluster is given by Bn,k N K Btot 1 XX = log2 − NK NK i=1 j=1 αi,j N X l=1,l6=i PlS ! + log2 αn,k N X l=1,l6=n PlS ! . (27) Given channel statistical information and transmit power allocation, it is easy to determine the feedback distribution according to (27). Note that there exists an integer constraint on the number of feedback bits in practice, so we should utilize the maximum integer that is not larger than 18 Bn,k in (27), i.e., ⌊Bn,k ⌋, ∀n, k. Remarks: The number of feedback bits distributed to the kth MU in the nth cluster is determined by the average inter-cluster interference generated by the kth MU in the nth cluster with respect to the average inter-cluster interference of each MU. In other words, if one MU generates more inter-cluster interference, it would be allocated with more feedback bits, so as to facilitate a more accurate ZFBF to minimize the total interference. D. Mode Selection As discussed above, the performance of the multiple-antenna NOMA system is limited by both inter-cluster and intra-cluster interference. Although ZFBF at the BS and SIC at the MUs are jointly applied, there still exists residual interference. Intuitively, the strength of the residual interference mainly relies on the number of clusters N and the number of MUs in each cluster K. For instance, increasing the number of MUs in each cluster might reduce the inter-cluster interference, but also results in an increase in intra-cluster interference. Thus, it is desired to dynamically adjust the transmission mode, including the number of clusters and the number of MUs in each cluster, according to channel conditions and system parameters. For dynamic mode selection, we have the following lemma: Lemma 2: If the BS has no CSI about the downlink, it is optimal to set N = 1. On the other hand, if the BS has perfect CSI about the downlink, K = 1 is the best choice. Proof: First, if there is no CSI, namely ρn,k = 0, ∀n, k, ZFBF cannot be utilized to mitigate the inter-cluster interference. If all the MUs belong to one cluster, interference can be mitigated as much as possible by SIC. In the case of perfect CSI at the BS, ZFBF can completely the interference. Thus, it is optimal to arrange one MU in one cluster. In above, we consider two extreme scenarios of no and perfect CSI at the BS, respectively. In practice, the BS has partial CSI through channel estimation or quantization feedback. Thus, we propose to dynamically choose the transmission mode for maximizing the sum of average 19 transmission rate, which is equivalent to an optimization problem below: J3 : max N,K N X K X Rn,k (28) n=1 k=1 s.t. C5 : NK = Nu , C6 : N > 0, C7 : K > 0, where Nu is the number of MUs in the multiple-antenna NOMA system. J3 is also an integer programming problem, so it is difficult to obtain the closed-form solution. Under this condition, it is feasible to get the optimal solution by numerical search and the search complexity is O(N K ). In order to control the complexity of SIC, the number of MUs in one cluster is usually small, e.g., K = 2. Therefore, the complexity of numerical search is acceptable. E. Joint Optimization Scheme In fact, transmit power, feedback bits and transmission mode are coupled, and determine the performance together. Therefore, it is better to jointly optimize these variables, so as to further improve the performance of the multiple-antenna NOMA systems. For example, given a transmission mode, it is easy to first allocate transmit power according to (22), and then distribute feedback bits according to (27). Finally, we can select an optimal transmission mode with the largest sum rate. The complexity of the joint optimization is mainly determined by the mode selection. As mentioned above, if the number of MUs in one cluster is small, the complex of mode selection is acceptable. IV. A SYMPTOTIC A NALYSIS In order to provide insightful guidelines for system design, we now pursue an asymptotic analysis on the average sum rate of the system. In particular, two extreme cases are studied, namely, interference limited and noise limited. 20 A. Interference Limited Case S S With loss of generality, we let Pn,k = θn,k Ptot , ∀n, k, where 0 < θn,k < 1 is a power N P K P !−1 αv,j (1−ρv,j ) v=1,v6=n j=1 allocation factor. For instance, θn,k is equal to  K N P l=1 N P K P v=1,v6=l j=1 !−1   αv,j (1−ρv,j ) in the proposed S power allocation scheme in Section III.B. If the total power Ptot is large enough, the noise term of SINR in (9) is negligible. In this case, with the help of [42, Eq. (4.3311)], the average transmission rate of the kth MU (k > 1) in the nth cluster reduces to N Rn,k = N   1 X 1 X q v i i ΞN i, {ηn,k ΞN i, {βn,k }N }N q=1 ln(ηn,k ) − v=1 ln(βn,k ), ln(2) i=1 ln(2) i=1 (29) where we have also used the fact that N X ΞN i=1  q i, {ηn,k }N q=1 = N X i=1  v ΞN i, {βn,k }N v=1 = 1. (30) Similarly, the asymptotic average transmission rate of the 1st MU in the nth MU can be obtained as Rn,1 = N N −1     1 X 1 X q i v N −1 i ΞN i, {ηn,1 }N ln η − ΞN −1 i, {βn,1 }v=1 ln βn,1 . q=1 n,1 ln(2) i=1 ln(2) i=1 (31) Combining (29) and (31), we have the following important result: Theorem 1: In the region of high transmit power, the average transmission rate is independent S S S of Ptot , and there exists a performance ceiling regardless of Ptot , i.e., once Ptot is larger than a saturation point, the average transmission rate will not increase further even the transmit power increases. i i i i S Proof: According to the definitions, ηn,k and βn,k can be rewritten as ηn,k = ωn,k Ptot and i i S βn,k = ψn,k Ptot , where i ωn,k =  k P   α θi,j  n,k if i = n j=1 K P    αn,k (1 − ρn,k ) θi,l if i 6= n l=1 , 21 and i ψn,k =  k−1 P   θi,j  αn,k if i = n j=1 K P    αn,k (1 − ρn,k ) θi,l if i 6= n , l=1   q v N S respectively. Thus, ΞN i, {ηn,k }N and Ξ i, {β } N q=1 n,k v=1 are independent of Ptot . Hence, Rn,k in (29) can be transformed as N Rn,k  1 X q S i ΞN i, {ηn,k }N = q=1 (ln(Ptot ) + ln(ωn,k )) ln(2) i=1 N  1 X v S i − ΞN i, {βn,k }N v=1 (ln(Ptot ) + ln(ψn,k )) ln(2) i=1 N N   1 X 1 X q i v i ΞN i, {ηn,k }N ln(ω ) − ΞN i, {βn,k }N = q=1 n,k v=1 ln(ψn,k ), (32) ln(2) i=1 ln(2) i=1 where Eq. (32) follows the fact that N P i=1 we can rewrite Rn,1 in (31) as Rn,1 N  P  q v ΞN i, {ηn,k }N = ΞN i, {βn,k }N q=1 v=1 = 1. Similarly, i=1 N N −1     1 X 1 X q N i v N −1 i ΞN i, {ηn,1 }q=1 ln ωn,1 − ΞN −1 i, {βn,1 }v=1 ln ψn,1 , (33) = ln(2) i=1 ln(2) i=1 where i ωn,1 = and i ψn,1 =  S   αn,1 θi,1 if i = n   αn,1 (1 − ρn,1 ) K P l=1 S θi,l if i 6= n  K P  S   αn,1 (1 − ρn,1 ) θi,l    αn,1 (1 − ρn,1 ) l=1 K P l=1 S θi+1,l , if i < n . if i ≥ n S Note that both (32) and (33) are regardless of Ptot , which proves Theorem 1. Now, we investigate the relation between the performance ceiling in Theorem 1 and the CSI accuracy ρn,k . First, we consider Rn,k with k > 1. As ρn,k asymptotically approaches 1, the 22 inter-cluster interference is negligible. Then, Rn,k can be further reduced as !# !# " " k−1 k X X S 2 S 2 ideal Pn,j Pn,j − E log2 αn,k |hH Rn,k = E log2 αn,k |hH n,k wn | n,k wn | j=1 j=1  k P  ωn,j    j=1  = log2  k−1 . P  ψn,j (34) j=1 It is found that even with perfect CSI, the average transmission rate for the (k > 1)th MU is P  k ωn,j j=1 still upper bounded. The bound log2  k−1 P ψn,j j=1  is completely determined by channel conditions, and thus cannot be increased via power allocation. Differently, for the 1st MU, if the CSI at the BS is sufficiently accurate, the SINR γn,1 becomes high. As a result, the constant term 1 in the rate expression is negligible, and thus the average transmission rate can be approximated as        Rn,1 ≈E log2     2 S αn,1 |hH  n,1 wn | Pn,1  N K P P S  H 2 αn,1 (1 − ρn,1 ) |en,1 wi | Pi,l i=1,i6=n l=1 "   2 S − E log2 =E log2 αn,1 |hH n,1 wn | Pn,1 {z } | Ideal average rate | αn,1 (1 − ρn,1 ) N X i=1,i6=n {z 2 |eH n,1 wi | Rate loss due to imperfect CSI K X l=1 S Pi,l !# .(35) } In (35), the first term is the ideal average transmission rate with perfect CSI, and the second one is rate loss caused by imperfect CSI. We first check the term of the ideal average transmission rate, which is given by   S 2 ideal θn,1 |hH w | Rn,1 = E log2 αn,1 Ptot n n,1  C S θn,1 − = log2 αn,1 Ptot . ln(2) (36) Note that if there is perfect CSI at the BS, the average transmission rate of the 1st MU increases S proportionally to log2 (Ptot ) without a bound. However, as seen in (34), the (k > 1)th MU has an upper bounded rate under the same condition, which reconfirms the claim in Lemma 2 that it is optimal to arrange one MU in each cluster in presence of perfect CSI. Then, we investigate 23 the rate loss due to imperfect CSI, which can be expressed as loss Rn,1 = log2 αn,1 (1 − S ρn,1 )Ptot where µvn,1 =  N −1   1 X N −1 − ΞN −1 i, {µvn,1 }v=1 C − ln µin,1 , (37) ln(2) i=1  K P   θv,l     l=1 K P l=1 if v < n . θv+1,l if v ≥ n loss S Given a ρn,1 , the rate loss Rn,1 enlarges as the total transmit power Ptot increases. In order ideal to keep the same rate of increase to the ideal rate Rn,1 , the CSI accuracy ρn,1 should satisfy the following theorem: S Theorem 2: Only when (1 − ρn,1 )Ptot is equal to a constant ε, the average transmission rate of the 1st MU in the nth cluster with imperfect CSI remains a fixed gap with respect to the p ideal rate. Specifically, the transmit power for training sequence should satisfy Pn,1 = S /ε−1 Ptot αn,1 τ S in TDD systems, while the number of feedback bits should satisfy Bn,1 = (M − 1) log2 (Ptot /ε) in FDD systems. Proof: The proof is intuitively. By substituting ρn,1 = 1 − 1+τ P P1 Bn,1 n,1 αn,1 S into (1 − ρn,1 )Ptot =ε S for TDD systems and ̺n,1 = 1 − 2− M −1 into (1 − ̺n,1 )Ptot = ε for FDD systems, we can get p Pn,1 = S /ε−1 Ptot αn,1 τ S and Bn,1 = (M − 1) log2 (Ptot /ε), which proves Theorem 2. p Remarks: For the CSI accuracy at the BS, Pn,1 τ (namely transmit energy for training sequence) in TDD systems and Bn,1 M −1 (namely spatial resolution) in FDD systems are two crucial factors. Specifically, given a requirement on CSI accuracy, it is possible to shorten the length of training sequence by increasing the transmit power, so as to leave more time for data transmission in a time slot. However, in order to keep the pairwise orthogonality of training sequences, the length of training sequence τ must be larger than the number of MUs. In other words, the minimum value of τ is NK. Similarly, in FDD systems, it is possible to reduce the feedback bits by increasing the number of antennas M. Yet, in order to fulfill the spatial degrees of freedom for ZFBF at the BS, M must be not smaller than (N − 1)K + 1. This is because the beam wi for the ith cluster should be in the null space of the channels for the (N − 1)K MUs in the other N − 1 clusters. 24 Furthermore, substituting (36) and (37) into (35), we have Rn,1 ≈ − log2 (1 − ρn,1 ) + log2 (θn,1 ) − N −1 X i=1   N −1 ΞN −1 i, {µvn,1}v=1 log2 µin,1 . (38) Given a power allocation scheme, it is interesting that the bound of Rn,1 is independent of channel conditions. As analyzed above, it is possible to improve the average rate by improving the CSI accuracy. Especially, for FDD systems, we have the following lemma: Lemma 3: At the high power region with a large number of feedback bits, the average rate of the 1st MU increases linearly as the numbers of feedback bits increase. Bn,1 Proof: Replacing ρn,1 in (38) with ̺n,1 = 1 − 2− M −1 , Rn,1 is transformed as N −1 Rn,1 X   Bn,1 N −1 + log2 (θn,1 ) − ΞN −1 i, {µvn,1 }v=1 log2 µin,1 , ≈ M −1 i=1 (39) which yields Lemma 3. B. Noise Limited Case If the interference term is negligible with respect to the noise term due to a low transmit power, then the SINR γn,k , ∀n, k is reduced as 2 S γn,k = αn,k |hH n,k wn | Pn,k , (40) 2 2 which is equivalent to the interference-free case. As discussed earlier, |hH n,k wn | is χ (2) dis- tributed, then the average transmission rate can be computed as Z ∞  S Rn,k = αn,k x exp(−x)dx log2 1 + Pn,k 0 ! ! 1 1 Ei − S . = − exp S αn,k Pn,k Pn,k αn,k (41) Note that Eq. (41) is independent of the CSI accuracy, thus it is unnecessary to carry out channel estimation or CSI feedback in this scenario. Since both intra-cluster interference and inter-cluster interference are negligible, ZFBF at the BS and SIC at the MUs are not required, and all optimization schemes asymptotically approach the same performance. 25 TABLE I PARAMETER TABLE FOR (αn,k , ρn,k ), ∀n ∈ [1, 3] AND k ∈ [1, 2]. ❍❍ k n ❍❍ 1 2 1 2 3 (1.00, 0.90) (0.95, 0.85) (0.90, 0.80) (0.10, 0.70) (0.20, 0.75) (0.15, 0.80) V. S IMULATION R ESULTS To evaluate the performance of the proposed multiple-antenna NOMA technology, we present several simulation results under different scenarios. For convenience, we set M = 6, N = 3, K = 2, Btot = 12, while αn,k and ρn,k are given in Tab. I for all simulation scenarios without S extra specification. In addition, we use SNR (in dB) to represent 10 log10 Ptot . 2 Theoretical (R1,1) 1.8 Simulation (R ) 1,1 1.6 Theoretical (R ) Simulation (R ) 1,2 Average Rate (b/s/Hz) 1.4 1,2 1.2 1 0.8 0.6 0.4 0.2 0 −10 Fig. 2. −5 0 5 10 15 SNR (dB) 20 25 30 35 Comparison of theoretical expressions and simulation results. First, we verify the accuracy of the derived theoretical expressions. As seen in Fig. 2, the theoretical expressions for both the 1st and the 2nd MUs in the 1st cluster well coincide with the simulation results in the whole SNR region, which confirms the high accuracy. As the principle of NOMA implies, the 1st MU performs better than the second MU. At high SNR, the average rates of the both MUs are asymptotically saturated, which proves Theorem 1 again. Secondly, we compare the proposed power allocation scheme with the equal power allocation scheme and the fixed power allocation scheme proposed in [4]. Note that the fixed power allocation scheme distributes the power with a fixed ratio 1:4 between the two MUs in a cluster 26 6 Sum of Average Rate (b/s/Hz) 5 4 3 2 Adapive Power Allocation Equal Power Allocation Fixed Power Allocation 1 0 -10 -5 0 5 10 15 20 25 30 35 SNR (dB) Fig. 3. Performance comparison of different power allocation schemes. so as to facilitate the SIC. It is found in Fig. 3 that the proposed power allocation scheme offers an obvious performance gain over the two baseline schemes, especially in the medium SNR region. Note that practical communication systems in general operate at medium SNR, thus the proposed scheme is able to achieve a given performance requirement with a lower SNR. As the SNR increases, the proposed scheme and the equal allocation scheme achieve the same saturated sum rate, but the fixed allocation scheme has a clear performance loss. Next, we examine the advantage of feedback allocation for the FDD based NOMA system with equal power allocation, cf. Fig. 4. As analyzed in Section IV.B, at very low SNR, namely the noise-limited case, the average rate is independent of CSI accuracy, and thus the two schemes asymptotically approach the same sum rate. As SNR increases, the proposed feedback allocation scheme achieves a larger performance gain. Similarly, at high SNR, both the two schemes are saturated, and the proposed scheme obtains the largest performance gain. For instance, at SNR= 30 dB, there is a gain of more than 0.5 b/s/Hz. Furthermore, we investigate the impact of the total number of feedback bits on the average rates of different MUs at SNR= 35 dB. As shown in Fig. 5, the performance of the 1st MU is clearly better than that of the 2nd MU. Moreover, the average rate of the 1st MU is nearly a linear function of the number of feedback bits, which reconfirms the claims of Lemma 3. Then, we investigate the impact of transmission mode on the performance of the NOMA systems at SNR= 10 dB with equal power allocation in Fig. 6. To concentrate on the impact of 27 3 Sum of Average Rate (b/s/Hz) 2.5 2 1.5 1 Adaptive Feedback Allocation Equal Feedback Allocation 0.5 0 −10 Fig. 4. −5 0 5 10 15 SNR (dB) 20 25 30 35 Performance comparison of different feedback allocation schemes. 1.4 1.2 Average Rate (b/s/Hz) 1 0.8 ideal R1,2 0.6 R 1,1 R1,2 0.4 0.2 0 Fig. 5. 0 5 10 15 20 25 Total Number of Feedback (bits) 30 35 Asymptotic performance with a large number of feedback bits. transmission mode, we set the same CSI accuracy of all downlink channels as ρ. Note that we consider four fixed transmission modes under the same channel conditions in the case of 6 MUs in total. Consistent with the claims in Lemma 2, mode 4 with N = 1 and K = 6 achieves the largest sum rate at low CSI accuracy, while mode 1 with N = 6 and K = 1 performs best at high CSI accuracy. In addition, it is found that at medium CSI accuracy, mode 2 with N = 3 and K = 2 is optimal, since it is capable to achieve a best balance between intra-cluster interference and inter-cluster interference. Thus, we propose to dynamically select the transmission mode according to channel conditions and system parameters. As shown by the red line in Fig. 6, dynamic mode selection can always obtain the maximum sum rate. Finally, we exhibit the superiority of the proposed joint optimization scheme for the NOMA 28 7 Mode 1 (N=6, K=1) Mode 2 (N=3, K=2) Mode 3 (N=2, K=3) Mode 4 (N=1, K=6) Dynamic Mode Sum of Average Rate (b/s/Hz) 6 5 4 3 2 1 Fig. 6. 0 0.1 0.2 0.3 0.4 0.5 ρ 0.6 0.7 0.8 0.9 1 Performance comparison of different transmission modes. 9 Sum of Average Rate (b/s/Hz) 8 NOMA (Joint Optimization) NOMA (Fixed Scheme) OMA (TDMA) 7 6 5 4 3 2 1 Fig. 7. 0 0.1 0.2 0.3 0.4 ρ 0.5 0.6 0.7 0.8 0.9 Performance comparison of a joint optimization scheme and a fixed allocation scheme. systems at SNR= 10 dB. In addition, we take a fixed scheme based on NOMA and a time division multiple access (TDMA) based on OMA as baseline schemes. Specifically, the joint optimization scheme first distributes the transmit power with equal feedback allocation, then allocates the feedback bits based on the distributed power, finally selects the optimal transmission mode. The fixed scheme always adopts the mode 2 (N = 3, K = 2) with equal power and feedback allocation. The TDMA equally allocates each time slot to the 6 MUs, and utilizes maximum ratio transmission (MRT) based on the available CSI at the BS to maximize the rate. For clarity of notation, we use ρ to denote the CSI accuracy based on equal feedback allocation. In other words, the total number of feedback bits is equal to Btot = −K ∗ N ∗ (M − 1) ∗ log2 (1 − ρ). As seen in Fig. 7, the fixed scheme performs better than the TDMA scheme at low and high 29 CSI accuracy, and slightly worse at medium regime. However, the proposed joint optimization scheme performs much better than the two baseline schemes. Especially at high CSI accuracy, the performance gap becomes substantially large. For instance, there is a performance gain of about 3 b/s/Hz at ρ = 0.8, and up to more than 5 b/s/Hz at ρ = 0.9. As analyzed in Lemma 2 and confirmed by Fig. 6, when ρ is larger than 0.8, which is a common CSI accuracy in practical systems, mode 2 is optimal for maximizing the system performance. Thus, the joint optimization scheme is reduced to joint power and feedback allocation, which requires only a very low complexity. Thus, the proposed NOMA scheme with joint optimization can achieve a good performance with low complexity, and it is a promising technique for future wireless communication systems. VI. C ONCLUSION This paper provided a comprehensive solution for designing, analyzing, and optimizing a NOMA technology over a general multiuser multiple-antenna downlink in both TDD and FDD modes. First, we proposed a new framework for multiple-antenna NOMA. Then, we analyzed the performance, and derived exact closed-form expressions for average transmission rates. Afterwards, we optimized the three key parameters of multiple-antenna NOMA, i.e., transmit power, feedback bits, and transmission mode. Finally, we conducted asymptotic performance analysis, and obtained insights on system performance and design guidelines. R EFERENCES [1] Y. Saito, Y. Kishiyama, A. Benjebour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in Proc. IEEE Veh. Technol. Conf. (VTC-Spring), Jun. 2013, pp. 1-5. [2] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C-L. I, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” IEEE Commun. Mag., vol. 55, no. 2, pp. 185-191, Feb. 2017. [3] L. Dai, B. Wang, Y. Yuan, S. Han, C-L. I, and Z. Wang, “Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends,” IEEE Commun. Mag., vol. 53, no. 9, pp. 74-81, Sept. 2015. [4] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” IEEE Signal Process. Lett., vol. 21, no. 12, pp. 1501-1505, Dec. 2014. [5] Y. Yuan, Z. Yuan, G. Yu, C-H. Hwang, P-K. Liao, A. Li, and K. Takeda, “Non-orthogonal transmission technology in LTE evolution,” IEEE Commun. Mag., vol. 54, no. 7, pp. 68-74, Jul. 2016. [6] S. Timotheou and I. Krikidis, “Fairness for non-orthogonal multiple access in 5G systems,” IEEE Signal Process. Lett., vol. 22, no. 10, pp. 1647-1651, Oct. 2015. 30 [7] S-L. Shieh and Y-C. Huang, “A simple scheme for realizing the promised gains of downlink nonorthogonal multiple access,” IEEE Trans. Commun., vol. 64, no. 4, pp. 1624-1635, Apr. 2016. [8] P. Xu, Y. Yuan, Z. Ding, X. Dai, and R. Schober, “On the outage performance of non-orthogonal multiple access with 1-bit feedback,” IEEE Trans. Wireless Commun., vol. 15, no. 10, pp. 6716-6730, Oct. 2016. [9] Z. Yang, Z. Ding, P. Fan, and Z. Ma, “Outage performance for dynamic power allocation in hybrid non-orthogonal multiple access systems,” IEEE Commun. Lett., vol. 20, no. 8, pp. 1695-1698, Aug. 2016. [10] F. Fang, H. Zhang, J. Cheng, and V. C. M. Leung, “Energy-efficient resource allocation for downlink orthogonal multiple access (NOMA) network,” IEEE Trans. Commun., vol. 64, no. 9, pp. 3722-3732, Sept. 2016. [11] H. Tabassum, M. S. Ali, E. Hossain, M. J. Hossain, and D. I. Kim, “Non-orthogonal multiple access (NOMA) in cellular uplink and downlink: challenges and enabling techniques,” Aug. 2016. [Online]: http://128.84.21.199/abs/1608.05783. [12] J. Choi, “On the power allocation for a practical multiuser superposition scheme in NOMA systems,” IEEE Commun. Lett., vol. 20, no. 3, pp. 438-441, Mar. 2016. [13] C-L. Wang, J-Y. Chen, and Y-J. Chen, “Power allocation for downlink non-orthogonal multiple access system,” IEEE Wireless Commun. Lett., vol. 5, no. 5, pp. 532-535, Oct. 2016. [14] Z. Yang, Z. Ding, P. Fan, and N. Al-Dhahir, “A general power allocation scheme to guarantee quality of service in downlink and uplink NOMA systems,” IEEE Trans. Wireless Commun., vol. 15, no. 11, pp. 7244-7257, Nov. 2016. [15] Y. Liu, M. Elkashlan, Z. Ding, and G. K. Karagiannidis, “Fairness of user clustering in MIMO non-orthogonal multiple access systems,” IEEE Commun. Lett., vol. 20, no. 7, pp. 1465-1468, Jul. 2016. [16] H. Zhang, D-K. Zhang, W-X. Meng, and C. Li, “User pairing algorithm with SIC in non-orthogonal multiple access system,” in Proc. IEEE Intern. Conf. Commun. (ICC), May 2016, pp. 1-6. [17] J. Mei, L. Yao, H. Long, and K. Zheng, “Joint user pairing and power allocation for downlink non-orthogonal multiple access systems,” in Proc. IEEE Intern. Conf. Commun. (ICC), May 2016, pp. 1-6. [18] Z. Q. Al-Abbasi and D. K. C. So, “User-pairing based non-orthogonal multiple access (NOMA) system,” in Proc. IEEE Veh. Technol. Conf. (VTC-Spring), Apr. 2016, pp. 1-5. [19] Md S. Ali, H. Tabassum, and E. Hossain, “Dynamic user clustering and power allocation for uplink and downlink nonorthogonal multiple access (NOMA) systems,” IEEE Access, vol. 4, pp. 6325-6343, Aug. 2016. [20] H. Weingarten, Y. Steinberg, and S. S. Shamai, “The capacity region of the Gaussian multiple-input multiple-output broadcast channel,” IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936-3964, Sept. 2006. [21] M. A. Maddah-Ali, M. A. Sadrabadi, and A. K. Khandani, “Broadcast in MIMO systems based on a generalized QR decomposition: signaling and performance analysis,” IEEE Trans. Inf. Theory, vol. 54, no. 3, pp. 1124-1138, Mar. 2008. [22] A. D. Dabbagh and D. J. Love, “Precoding for multiple antenna Gaussian broadcast channels,” IEEE Trans. Signal Process., vol. 55, no. 7, pp. 3837-3850, Jul. 2007. [23] Q. Sun, S. Han, C-L. I, and Z. Pan, “On the ergodic capacity of MIMO NOMA systems,” IEEE Wireless Commun. Lett., vol. 4, no. 4, pp. 405-408, Oct. 2015. [24] J. Choi, “On the power allocation for MIMO-NOMA systems with layered transmission,” IEEE Trans. Wireless Commun., vol. 15, no. 5, pp. 3226-3237, May 2016. [25] Z. Chen, Z. Ding, and X. Dai, “Beamforming for combating inter-cluster and intra-cluster interference in hybrid NOMA systems,” IEEE Access, vol. 4, pp. 4452-4463, Aug. 2016. [26] Z. Ding, R. Schober, and H. V. Poor, “A general MIMO framework for NOMA downlink and uplink transmission based on signal alignment,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 4438-4454, Jun. 2016. 31 [27] K. Higuchi and Y. Kishyama, “Non-orthogonal access with random beamforming and intra-beam SIC for cellular MIMO downlink,” in Proc. IEEE Veh. Technol. Conf. (VTC-Fall), Sept. 2013, pp. 1-5. [28] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to non-orthogonal multiple access,” IEEE Trans. Wireless Commun., vol. 15, no. 1, pp. 537-552, Jan. 2016. [29] D. J. Love, R. W. Heath Jr., V. K. N. Lau, D. Gesbert, B. D. Rao, and M. Andrews, “An overview of limited feedback in wireless communication systems,” IEEE J. Sel. Areas Commun.,, vol. 26, no. 8, pp. 1341-1365, Oct. 2008. [30] N. Zhang, J. Wang, G. Kang, and Y. Liu, “Uplink non-orthogonal multiple access in 5G systems,” IEEE Commun. Lett., vol. 20, no. 3, pp. 458-461, Mar. 2016. [31] Y. Liu, Z. Ding, M. Elkashlan, and H. V. Poor, “Cooperative non-orthogonal multiple access with simultaneous wireless information and power transfer,” IEEE J. Sel. Areas Commun., vol. 34, no. 4, pp. 938-953, Mar. 2016. [32] N. Nonaka, Y. Kishiyama, and K. Higuchi, “Non-orthogonal multiple access using intra-beam superposition coding and SIC in base station cooperative MIMO cellular downlink,” in Proc. IEEE Veh. Technol. Conf. (VTC-Spring), Sept. 2014, pp. 1-5. [33] S. Ali, E. Hossain, and D. I. Kim, “Non-orthogonal multiple access (NOMA) for downlink multiuser MIMO systems: user clustering, beamforming, and power allocation,” IEEE Access, vol. 5, pp. 565-577, Oct. 2017. [34] M. B. Shahab, M. Irfan, M. F. Kader, and S. Y. Shin, “User pairing schemes for capacity maximization in nonorthogonal multiple access systems,” Wireless Commun. Mob. Comp., vol. 16, no. 17, pp. 2884-2894, Dec. 2016. [35] Z. Ding, P. Fan, and V. Poor, “Impact of user pairing on 5G non-orthogonal multiple access downlink transmissions,” IEEE Trans. Veh. Technol., vol. 65, no. 8, pp. 6010-6023, Aug. 2016. [36] M. B. Shahab, M. F. Kader, and S. Y. Shin, “A virtual user pairing scheme to optimally utilize the spectrum of unpaired users in non-orthogonal multiple access,” IEEE Signal Process. Lett., vol. 23, no. 12, pp. 1766-1770, Dec. 2016. [37] K. Saito, A. Benjebbour, Y. Kishiyama, Y. Okumura, and T. Nakamura, “Performance and design of SIC receiver for downlink NOMA with open-loop SU-MIMO,” in Proc. IEEE Intern. Conf. Commun. Workshop (ICCW), Jun. 2015, pp. 1161-1165. [38] M. B. Shahab, M. F. Kader, and S. Y. Shin, “On the power allocation of non-orthogonal multiple access for 5G wireless networks,” in Proc. Intern. Conf. Open Source Systems Technol. (ICOSST), Dec. 2016, pp. 89-94. [39] N. Jindal, “MIMO Broadcast channels with finite-rate feedback,” IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5045-5060, Nov. 2006. [40] K. K. Mukkavilli, A. Sabharwal, E. Erkip, and B. Aazhang, “On beamforming with finite rate feedback in multiple-antenna systems,” IEEE Trans. Inf. Theory, vol. 49, no. 10, pp. 2562-2579, Oct. 2003. [41] G. K. Karagiannidis, N. C. Sagias, and T. A. Tsiftsis, “Closed-form statistics for the sum of squared Nakagami-m variates and its application,” IEEE Trans. Commun., vol. 54, no. 8, pp. 1353-1359, Aug. 2006. [42] I. S. Gradshteyn and I. M. Ryzhik, “Tables of intergrals, series, and products,” Acedemic Press, USA, 2007.
7cs.IT
Motion Planning with Gamma-Harmonic Potential Fields Ahmad A. Masoud Electrical Engineering Department, King Fahad University of Petroleum and Minerals, Dhahran 31261, Saudi Arabia, e-mail: [email protected] Abstract: This paper extends the capabilities of the harmonic potential field (HPF) approach to planning. The extension covers the situation where the workspace of a robot cannot be segmented into geometrical subregions where each region has an attribute of its own. The suggested approach uses a task-centered, probabilistic descriptor of the workspace as an input to the planner. This descriptor is processed, along with a goal point, to yield the navigation policy needed to steer the agent from any point in its workspace to the target. The approach is easily adaptable to planning in a cluttered environment containing a vector drift field. The extension of the HPF approach is based on the physical analogy with an electric current flowing in a nonhomogeneous conducting medium. The resulting potential field is known as the gamma-harmonic potential (GHPF). Proofs of the ability of the modified approach to avoid zero-probability (definite threat) regions and to converge to the goal are provided. The capabilities of the planner are demonstrated using simulation. Keywords: probabilistic robotics, autonomous agents, motion planning, navigation, risk minimization, harmonic potential Nomenclature HPF: Harmonic potential field GHPF: Gamma-harmonic potential field BVP: Boundary value problem LFC: Liapunov function candidate P(x): a probabilistic field describing of the fitness of the point x to carry-out a task S: So: Sa: O: T: u(x): xs: xT: N: D(t): H(x): L: L2: L@: ': V(x): F(x): J(x): Q(x): =: Ξ : workspace of the agent E: definite threat (P(x)=0) subset of S the admissible region of the probabilistic workspace (Sa=S-So) forbidden regions in deterministic worspaces an infinitesimally small set in S navigation policy starting point of motion target point the empty set the time paramerized trajectory laid by the planner the hessian matrix the gradient operator the laplacian operator the divergence operator boundary of the deterministic workspace potential field conductivity electric current density a vector field describing the drift force in the workspace Liapunov function time derivative of = minimum invariant set I. Introduction: Designing an autonomous agent is a challenging multi-disciplinary task [1]. Special attention is being paid to the propulsion, data acquisition and communication systems used by an agent. However, the biggest challenge seems to be in designing a proper planning module. The function of this module is to unite these sub-systems into one goal-oriented unit. There is a long list of conditions a planner must satisfy. These conditions are necessary in order to generate a sequence of instructions which the actuators of motion may execute to successful completion of an assignment. However, the conditions on handling and representing mission data seem to be the most stringent [2]. There are two core requirements a representation should satisfy. They are 1- compatibility with the manner in which data is being processed and action is being generated, 2- updatability of the representation. Updatability requires that the validity of the existing portion of the representation not be conditioned on the future data that could be received. This allows for the incremental construction of a representation. Another important issue is to increase the diversity of environment-related, operator-supplied information which the planner is capable of processing in order to yield the guidance signal. Most planners assume divisible environments that may be partitioned into subsets of homogeneous attributes. The most common scheme is to have a binary partition of admissible sets and forbidden ones. Binary partitions may be constructed using geometric structures like circles [3], occupancy maps, Voronoi partitions [4], grids and graphs [5], samples [9] and trees [6]. There are situations where the environment in which an agent is operating is not divisible. For example, a plane flying through turbulent atmosphere [7] experiences a degree of turbulence where clear space is diffused into turbulent space with no sharp boundaries separating the two. Also, in the case of mobile robots operating in rough terrains [8], the description should be based on the degree of difficulty in negotiating the terrain. It is highly unlikely that success can be attained by basing the actions on a binary geometric partition of the environment into admissible and forbidden regions. An alternative to the geometric approach is the use of a soft representation that consists of a field reflecting, at each point in the environment, the probability of achieving the task. Probabilistic representations are ideal for encoding the information in non-divisible environments. These representations may also be used to efficiently incorporate spatial ambiguity and the aging of information in the representation. For example, exact knowledge of the location of a one-dimensional point object may be represented as a probability distribution function (PDF) with an impulse function (figure-1). Convolution of this exact spatial knowledge with the proper blurring operator produces another representation with the ambiguity factored-in. Repeated application of the blurring operator leads to a uniform PDF representing the maximum state of ambiguity (i.e. the object could be anywhere). Figure-1: spatial ambiguity and aging of information Errors and uncertainty in the sensed signals are almost always present in navigation systems. Countermeasures [38] to reduce their effect on the generated trajectory have to be incorporated into the system for robust operation. Soft probabilistic representations are an effective approach to counteracting ambiguity. They have been adopted by many researchers in robotics. For example, in [10,11], probabilistic representations were used for path planning in the presence of sensory data ambiguity. This representation may be fed to a reinforcement learning-based, or an optimal control-based stage, to generate the navigation policy. It is noticed that the structure of the ambiguity field has a pronounced influence on the performance of the policy generator. The less structured the field is, the more time it takes the algorithm to converge. In [39], the ambiguity in determining the location of a target moving in an obstacle-free space was probabilistically modeled using an occupancy map. This map is fed into the potential field stage to direct the motion of the pursuer in a direction that would increase the probability of capturing the target. Fuzzy logic techniques [12] are used to derive navigation actions for robots based on soft probabilistic representations. While these techniques have proven their practicality, they are not provably correct (heuristics). Qualitative methods for dealing with uncertainty may also be found in [13]. Occasionally, a workspace contains a force external to the agent that influences its state. This force is known as the drift field. A drift field is usually treated as a source of disturbance whose influence should be suppressed by the agent’s low-level controller. With the advances in forecast technology [14], a drift field may be predicted for a considerable period ahead of time. These advances make it possible to consider drift as a source of information which the planner should take into consideration instead of being a source of disturbance that has to be suppressed. Being able to treat drift as a source of information has important applications in the area of energyexhaustive missions. When energy is a scarce resource, good planning does not only reduce the drain caused by drift, but may even use it as a source for powering the agent. In the past, several techniques were suggested for incorporating drift fields in the planning process. Most of these techniques use optimization or search-based methods for determining the minimum cost path that connects two points in the driftoccupied space while avoiding the obstacles. In [15], a genetic algorithm planner is used to lay a minimum energy trajectory for an AUV operating in turbulent waters. A tree-based trajectory planner [16] is used to plan a path for an aerial glider so that the path is laid along the component of the wind which exerts maximum lift. The A* search approach is used for planning a path for an AUV operating in a current field [17]. A symbolic wave expansion approach is developed to tackle planning in workspaces with dynamic current fields [18]. Other approaches may be found in [19,20]. This study suggests a method for generating the navigation policy for a robot using a goal point, and a taskcentered, probabilistic description of the environment, as inputs. The method is efficient, provably-correct and assumes no structure whatsoever on the descriptor used to represent the environment. The developed method can be adapted in a straightforward manner to motion planning in a cluttered workspace that is populated by a drift field. The suggested approach is called the gamma-harmonic [33] potential field planning approach. It is derived by extending the capabilities of the deterministic harmonic potential field (HPF) approach to motion planing [21,22,23] in order to tackle environments that can only be probabilistically described. Previous attempts to construct a probabilistic HPF planner focus on using HPF as a probability measure describing the danger of collision with obstacles in the environment. This strips the HPF approach from its welljustified role as a navigation policy generator and reduces it to a merely descriptive tool that is an input to a navigation policy generation stage [24,25]. This paper is organized in the following manner. In section II, the problem is stated along with its scope. In section III, the probabilistic, HPF-based planning approach is developed. In section IV, an interpretation of the task-centered, probabilistic descriptor is suggested for incorporating drift in the trajectory generation process. Section V provides a basic analysis of the behavior of the approach. Simulation results are in section VI and conclusions are placed in section VII. II. Problem Statement and Scope The objective of this work is to develop a navigation guidance policy (u) generator that can be used by a point mobile agent to convert an a priori known, differentiable probabilistic field (P) that describes the content of the workspace (S) and a target point (XT) into a well-behaved vector field that may be used by the agent to direct its motion in S . The probabilistic field describes, in a task-centered manner, the fitness of a point x in S to carry-out the intended task. Let So ( So d S) be the set of definite threat region defined as (1) Ωo = {x:P(x) = 0} . regardless of the structure of P, the first order dynamical system that is constructed using the navigation policy (2) x = u(x, P(x), x T ) ∀ x( 0) ∈ Ω − Ω o must yield a goal-seeking guidance action that enables a point agent to converge from anywhere in S-So to the target lim x(t) → x T . t→ ∞ (3) The navigation policy must also guarantee that definite threat regions (So) are avoided at all times: x(t) ∩ Ωo ≡ ϕ œt . (4) The trajectory D(t) which is the solution of the dynamical system in (2) is required to be analytic. It is also required that the risk (risk=1/P(x)) accumulated by moving along this trajectory ∞ 1 ∫0 (P( ρ(t))) ρ (t) dt (5) be reduced to a global minimum. To the best of this author’s knowledge, the suggested navigation policy generator is the first to directly generate a goal-seeking, guidance action from a probabilistic description of the environment. The approach amasses a considerable number of novel and important properties: 1- it can process inherently ambiguous data while making provably-correct statements on the resulting behavior of the agent, 2- the probabilistic descriptor has an intuitive format whose local effect on the generated action is discernable by the operator. This makes the policy generator a valuable component in a decision support system [40], 3- the probabilistic descriptor need not be generated from an underlying deterministic model of the environment. Therefore, its use extends beyond that of modeling the ambiguity and uncertainty of a deterministic model to dealing with inherently stochastic environments such as rough terrains, 4- the goal-seeking guidance action adds to the robustness of the planning process in the sense that if a disturbance throws the agent off-course, the new location contains another sequence of instructions that will lead the agent to the target. The analyticity of the solutions making up the navigation policy causes the deviation from the original path to be commensurate with the amount of disturbance the agent is subjected to, 5- forcing the solution trajectories to be analytic results in well-behaved, dynamically-friendly paths that can, with high probability, be converted by the control unit of the agent into a navigation control, 6- as will be demonstrated in this paper, the nature of the probabilistic descriptor, and the fact that it doesn’t have to satisfy any condition other than differentiability, have significant advantages. They make it possible, with little effort, to change the format of the environment data to suit other challenging planning problems, e.g., planning in the presence of drift fields for energy exhaustive missions. III. The Gamma-Harmonic Approach III.1: HPF: A Background Harmonic potential fields (HPFs) have proven to be effective tools for inducing, in an agent, an intelligent, emergent, embodied, context-sensitive and goal-oriented behavior (i.e. a planning action). A planning action generated by an HPF-based planner can operate in an informationally-open and organizationally-closed mode [26]. Thus, an agent is able to make decisions on-the-fly using on-line sensory data without relying on the help of an external agent. HPF-based planners can also operate in an informationally-closed, organizationally-open mode. This mode makes it possible to utilize existing data about the environment in generating the planning action as well as eliciting the help of external agents in managing the task at hand. Such features make it possible to adapt HPFs for planning in a variety of situations. For example, in [27] vector-harmonic potential fields were used for planning with robots having second order dynamics. In [28], the approach was configured to work in a pursuit-evasion planning mode, and in [29], the HPF approach was modified to incorporate joint constraints on regional avoidance and direction. The decentralized, multi-agent planning case was tackled using the HPF approach in [30]. The HPF approach was also found to be able to facilitate the integration of planners as subsystems in networked controllers [31]. It effectively addresses the real-life requirements needed to successfully network sensory, communication and control modules. A basic setting of the HPF approach is shown in (6). L2V(x)/0 X0S ∂V = 0 at x = ', subject to: V(xS) = 1, V(xT) = 0 , and ∂n A provably-correct path may be generated using the gradient dynamical system Solve: (6) x = -∇V(x). (7) where S is the workspace, ' is its boundary, n is a unit vector normal to ', xs is the starting point, and xT is the target point [29]. III.2: A Physical Metaphor: Equations (6) & (7) model the behavior of an electric current flowing in a homogeneous conductor with a conductivity F(x)= constant [32]. The conductor is populated by perfect insulators (F=0) occupying the forbidden regions surrounded by ' (figure-2). Figure-2: Physical metaphor for the planner The flow is described by the electric current density(J) J(x) = −σ (x)∇V(x) . (8) The homogeneous Neumann condition means that the current cannot penetrate the perfect conductor and has to move tangentially to it. The Laplce equation is simply a product of applying the continuity condition to the electric flow ∇ ⋅ ( −σ (x)∇V(x)) = 0 . (9) If F is constant, equation (9) reduces to the well-known Laplace operator in (6). The conductivity F may be used to represent how favorable a point in the robot’s space is to conducting motion. A F=0 means that the corresponding space does not support motion at all. On the other hand, a high value of F means that the corresponding space highly favors motion. III.3 The Gamma-Harmonic Planner It is possible to establish a tight analogy between the above situation and the situation where the agent’s environment is to be represented in a task-centered manner using a descriptor (P(x)). This descriptor specifies at each point in the space the agent’s ability to perform the assigned task. It does not matter what the causes are e.g. sensor problems, rough terrains, man-made hazzards etc. If the agent is expected to encounter difficulties operating in a certain region of space, a low value for P(x) is assigned to that region. A navigation policy that satisfies the conditions stated in II may be generated as LA(P(x)LV(x))/0 subject to x0S (10) V(xS) = 1, V(xT) = 0 A provably-correct , analytical trajectory may be constructed using the gradient dynamical system u(x) = -∇V(x). (11) The potential field (V) generated by (10) is known as the gamma-harmonic potential field (GHPF) [33]. The GHPF operator in (10) is strongly related to the ordinary Laplace operator and possesses a useful physical interpretation. First, the operator should be expanded as LA(P(x)LV(x)) = P(x)L2V(x) + LP(x)tLV(x)) =0, which leads to (12) L2V(x) = - (1/P(x)) (-LP(x)t (-LV(x))). Notice that -LV(x) is the direction at which motion is to be driven and -LP(x) is a vector pointing in the direction of increasing risk. Also, keep in mind that the Laplacian of a potential is the divergence of the gradient field which is physically defined as the outflow of flux when the volume shrinks to zero. If the Laplacian is negative, there is a sink in the closed region, i.e. motion is indebted by absorbing the gradient flux used to direct motion. If the Laplacian is positive, there is a source in the closed region, that is, motion is stimulated by aiding the flow of the gradient flux. When the Laplacian is zero (Lapace equation), the region is neutral towards the gradient flux. As can be seen, the GHPF operator may be viewed as an intelligent version of the HPF that is sensitive to the future ability of the agent to carry-out its task (figure-3). Figure-3: The modified operator exhibits intelligent behavior. IV. Adapting the planner to the drift case It is shown that P(x) may be easily interpreted in an opportunistic manner that exploits drift as a source for powering the agent. A planner that mitigates the effect of drift on motion is expected to satisfy the following conditions lim x(t) → x T , ∀x(0) ∈ Ω x(t) ∩ O ≡ φ ∀t t→ ∞ U= ∫ ∞ 0 Fc( Ψ (x(t)),−∇V(x(t))) ∇V(x(t)) dt (13) where the functional U has to be minimized, or reduced, to a satisfactory value. x 0RN, O is the set of forbidden regions (obstacles, '=MO), S is the subset of admissible space (worksapce), Q(x) is the field in S describing drift, U is a task-related cost functional constructed by accumulating point costs (Fc(x)) along the path of the agent from the starting point to the target and Fc is a point cost function constructed in aim with the aspect of interest to the operator. In an energy exhaustive mission, it is desirable that the obstaclefree path connecting the starting and end points has a drift component that is in-phase with the direction along which motion is heading. A choice of Fc is (figure-4) K ∇V T Ψ K Fc = (1 − cos(Θ)) = (1 + ). 2 ∇V Ψ 2 P(x) = K − Fc = A drift-sensitive descriptor is K ∇V T Ψ (1 − ). 2 ∇V Ψ (14) (15) where 1 is the angle between -LV and Q and K is a positive constant. Here P(x) is used to describe the utility of the drift at a certain point in space. Figure-4: The suggested utility function versus 1. The drift-sensitive GHPF operator is ∇V T Ψ ∇ V − ∇⋅( )∇V) ≡ 0. ∇V Ψ 2 (16) and the overall drift-sensitive navigation policy generator is ∇V T Ψ )∇V) ≡ 0. x0S (17) ∇V Ψ subject to V(xS) = 1, V(xT) = 0 , and P(x)/0 at x 0O, where O is the set of deterministic obstacles to ∇2V − ∇ ⋅ ( be avoided. The path may be generated using the dynamical system in (7). V. Stability Analysis: In this section, propositions along with their proofs are provided to explore the behavior of the GHPF approach suggested in section III. Proposition-1: The path generated by the PDE-ODE system in (10) will avoid regions that have zero probability of achieving the task (So). Proof: Assume a point x that is arbitrarily close to So (figure-5). Since P(x) is differentiable, its value may be assumed equal to zero. Using the identity LA(P(x)LV(x)) = LP(x)t LV(x) + P(x)L2V(x) = 0 when x is close to So, equation 18 reduces to (18) - (-LP(x)t )(-LV(x)) = 0. Note that -LP(x) points in the direction of increasing risk that leads to the region So, while -LV(x) is the direction along which motion is to be steered. In other words, in the vicinity of So, the planner will project motion tangentially to the boundary of the zero probability region. Hence, So will be avoided. Figure-5: Zero-P regions will be avoided, Proposition-2: A potential field that is generated using the boundary value problem in (10) cannot have any extrema local or global in its admissible workspace S-So. Proof: Note that from proposition-1, x will always stay in S-So where P(x) is greater than zero. The fact that no minima or maxima can occur in S-So may be inferred directly from the GHPF operator. Using the expansion in (12) and noting that at a critical point LV(x)=0, we have ∂ 2 V(x) ∇ ⋅ (P(x)∇V(x)) = P(x)∇ V(x) = P(x) ∑ =0 ∂ x 2i i =1 2 N (19) where x=[x1 x2 ... xN]t. At a local maxima, LV(x) will be negative in the whole local neighborhood surrounding x. This means that the second derivative of V(x) with respect to all xi’s has to be positive (i.e. V(x) at the critical point is concaved upward). Since P(x) in that region is finite and positive, the governing relationship in (10) will be violated. The same thing will happen at a minima. LV(x) will be positive in the whole local neighborhood surrounding x. Therefore, no extrema of V local or global can occur in S-So. Proposition-3: For an Sa (Sa = S - So)with a finite size, V(x) 0 Sa is a Liapunov function candidate (LFC). Proof: An LFC defined on a finite space must satisfy the following: 1- it must be at least continuous, 2- it must be positive in Sa (V(x) > 0, x 0 Sa), 3- its value must be zero at the target point (V(xT) =0). Since V(x) is forced to satisfy the differential condition in (10), it is analytic. Therefore, it satisfies the first condition. Since the global maximum happens at x=xs (V(xs)=1) and a global minimum at x=xT (V(xT)=0), the second and third conditions are satisfied. Proposition-4: If V(x) is constant at a subset of S, it is constant for all S. Proof: First assume that V(x) = C ( C is a constant) in T where Td S (figure-6). Then consider an infinitesimally expanded region T` that surrounds T. Finally, let xo be a point that lies on the boundary of T (MT) and xo+ a point on MT`. Then, the potential at xo+ may be written as V(xo+) = V(xo) + drA(-LV(xo)t n) (20) where dr is a differential element and n is a unit vector normal to MT. Since V is constant inside T, the gradient field degenerates to zero. Since the continuity relation (10) is enforced in both T and T`, equation (20) reduces to: V(xo+) = V(xo) = C . (21) By repeatedly applying the above procedure, it can be shown that the subregion T may be expanded to include all S. In other words, if V(x) is constant on a subregion of S, it will be constant for all S. Figure-6: Subregions of degenerate fields cannot occur, Definition-1: Let V(x) be at least twice differentiable scalar function (V(x): RN 6 R). A point xo is called a critical point of V if the gradient vanishes at that point (LV(xo)=0). Otherwise, xo is regular. A critical point is Morse if its Hessian matrix (H(xo)) is nonsingular. V(x) is Morse if all of its critical points are Morse [34]. Showing that the GHPF is Morse is a key requirement for generating a provably-correct navigation policy [45]. The critical points in a Morse function are saddle points that do not trap motion and prevent the agent from reaching its target. Proposition-5: If V(x) is a function defined in an N-dimensional space (RN) on an open set S and satisfies (10), then the Hessian matrix at every critical point of V is nonsingular, i.e. V is Morse. Proof: There are two properties of V that are used in the proof of proposition 5. 1- V(x) defined on an open set S contains no maxima or minima, local or global in S. An extrema of V(x) can only occur at the boundary of S, 2- if V(x) is constant in any open subset of S, then it is constant for all S. Let xo be a critical point of V(x) inside S. Since no maxima or minima of V exist inside S, xo has to be a saddle point. Let V(x) be represented in the neighborhood of xo using a second order Taylor series: V(x) = V(x O ) + ∇V(x O ) T (x − x O ) + 1 (x − x O ) T H(x O )(x − x O ) 2 *x-xo*<<1. (22) Since Xo is a critical point of V, we have V ' = V(x) - V(x O ) = 1 (x − x O ) T H(x O )(x − x O ) 2 *x-xo*<<1. (23) Notice that adding or subtracting a constant to V yields another potential field that satisfies the relation in (10). Using eigenvalue decomposition [35] ⎡λ1 ⎢0 1 ' T T⎢ V = (x − x O ) U ⎢. 2 ⎢ ⎣0 0 . 0 . ⋅ 0 . λ2 ⎡λ1 ⎤ ⎢0 ⎥ ⎥ U(x − x O ) = 1 ξ T ⎢ ⎥ 2 ⎢. ⎥ ⎢ λN ⎦ ⎣0 0 0 . 0 λ2 . 0 0 . ⋅ . ⎤ ⎥ ⎥ξ = 1 ⎥ 2 ⎥ λN ⎦ 0 0 . N ∑λ ξ i i i=1 2 (24) where U is an orthonormal matrix of eigenvectors, 8’s are the eigenvalues of H(xo), and >=[>1 >2 ..>N]T = U(x-xo). V` cannot be zero on any open subset S. Otherwise, it will be zero for all S which is not the case. This can only be true if and only if all the 8i’s are nonzero. In other words, the Hessian of V at a critical point Xo is nonsingular. This makes V a Morse function. Proposition-6: Let V(x) be the potential field generated using the BVP in (10). The trajectory of the dynamical system will globally, asymptotically converge to: x = −∇V(x) lim x → x T (25) x(0) = xs 0 Sa t→ ∞ (26) Proof of the above proposition is carried out using the LaSalle invariance principle [36]. Proof: Let = be the Liapunov function candidate Ξ = V(x) (27) 1 T  . x D(x)x + x T D(x)x 2 x = −∇V(x)  x)  = K ⋅ ∇V(x) x + The time derivative (27) is Ξ(x, (28) Substituting in the above equation yields (29) (30) T x = − ∇V(x) 2 LV will vanish at the target point (xT) and may have isolated critical points {xi} in Sa. This results in Ξ ≤ 0 ∀ x. (31) According to the LaSalle principle, any bounded solution of (25) will converge to the minimum invariant set E ⊂ {x T ∪ {x i }} . (32) Determining E requires studying the critical points of V(x) where LV(x)=0. According to proposition-2, xT is the only minimum (stable equilibrium point) V(x) can have. Besides xT , V(x) has other critical points {xci} at which LV=0. However, the Hessian at these points is non-singular, i.e. V(x) is Morse. From the above, we conclude that E contains only one point x = x T to which motion will converge. Proposition-7: Let D(t) be the time parameterized trajectory generated by the gradient dynamical system x = −∇V(x) x(0) = xs 0Sa (33) where D(0)= xs, D(4)=xT and V(x) is generated from the GHPF BVP in (10). Then D(t) minimizes the cost ∞ 1 ∫ P(x( t)) ∇V(x( t)) dt functional: 0 (34) Proof: The proof follows directly from using electric current to model motion and using the conductivity field to model cost (cost=1/fitness). It is well-known that electric current will flow along the minimum resistance (cost) path. For a mathematical proof, that is based on the calculus of variation, see [43]. It is also worth mentioning that in addition to the above, the suggested navigation policy globally minimizes the energy functional ∫ P(x) ∇V(x) dΩ 2 (35) Ω which is known as the Dirichlet principle [44]. VI. Results: In this section, simulation results are presented to demonstrate the capabilities of the GHPF approach. V.1: From Probabilistic to Deterministic Planning: There are several settings in which a harmonic potential field may be configured for navigation. Some of these settings are discussed in [31,32]. Each one of these configurations possesses distinct topological properties that are reflected in the integral and differential properties of the generated path. Figure-7 shows the control navigation policies of four different configurations for a simple rectangular environment. Homogeneous Neumann Nonhomogeneous Neumann Dirichlet Biharmonic Figure-7: Navigation policies, different settings, HPF approach. The following example demonstrates the ability of the GHPF planner to handle deterministic environments by simply binary quantizing P(x) into 0 and 1(figure-8). Figure-8: Probabilistic descriptor, Figure-9: Path and navigation policy - GHPF approach, The navigation control policy and the generated path are shown in figure-9. Unlike the deterministic case where the navigation policy degenerates inside the region to be avoided, the probabilistic HPF approach maintains the navigation field inside this region. This is of practical value because if a disturbance occurs throwing the robot inside a forbidden region, the robot can resume motion to the target instead of staying motionless in that area. V.2: Typical Non-divisible Environments: In figure-10, a more challenging environment is used to test the approach. The probabilistic descriptor is shown as a 3-dimensional plot. As can be seen, segmenting this map into regions suitable for navigation, and into others that are not, is very difficult, if at all possible. Moreover, this binary segmentation could result in creating isolated regions that are disconnected from the rest of the workspace. Figure-10: Probabilistic descriptor - surface map, The navigation control policy is generated directly from the probabilistic map in figure-10 by the GHPF planner without any conditioning to the signal. The generated path superimposed on the image of the probabilistic descriptor (the brighter the area, the more suitable it is for navigation) of the environment is shown in figure-11. Visual assessment of the path in figure-11 clearly shows its smoothness and reasonable length. The path passes mainly through bright areas which are best suited for navigation. The corresponding navigation policy is shown in figure-12. Figure-11: Generated path, Figure-12: Navigation policy. Figure-13 shows another nondivisible environment for different starting and end points. Figure-13: Different paths, same environment. V.3: Comparison With the D-Star Algorithm: The GHPF approach is compared to the D-star algorithm [41,42]. The D-star is the benchmark for planning in the presence of uncertainties. Figure-14 shows an intensity map reflecting the fitness of space for motion. The brighter the region the more suitable it is for motion to pass through. The trajectory generated by the D-star is shown in figure-15. The trajectory generated by the GHPF planner along with an alternative path resulting from adding an obstruction (zero fitness zone) is shown in figure-16 . As can be seen, the trajectories from both techniques have comparable lengths and seek the most suitable area for motion to pass through. However, the path from the GHPF is considerably smoother than that produced by the D-star algorithm. As a result, the GHPF path is favorable for a dynamical agent to traverse. One must keep in mind that the GHPF approach is a goal-seeking planner where as the D-star is a path following planner. If a disturbance throws the agent off-course, an agent using GHPF will still move towards the target in an acceptable manner while an expensive re-planning has to be used in the case of the D-star. Figure-14: The probabilistic environment. Figure-15: Path from the D-Star Algorithm Figure-16: Paths from the GHPF planner. V.4: Extreme Disorder: The capabilities of the GHPF planner in handling unstructured descriptors are tested using natural white noise as a representation of the environment (figure-17). Figure-18 shows the generated path superimposed on the image of the descriptor. One may observe the following: 1- the method works well although a highly unstructured, nondifferentiable white noise is used as the environment descriptor, 2- the path did converge to the target, 3- the path remained smooth with a reasonable length, 4- Although it is generally accepted that white noise means zero information, the path is low risk-sensitive. Figure-19 shows the path superimposed on two risk levels where the black areas of the first risk level are higher than 95% of the maximum of the environment and the other is higher than 85% of the maximum. As can be seen in both cases, the planner steered the path away from those regions. Figure-17: White noise, Figure-18: Path - random environment, Figure-19: Path versus risk levels. V.5: Drift-sensitive Planning The ability of the planner to process the drift data and the geometry of the space while generating a wellbehaved navigation policy is demonstrated in different drift scenarios. In figure-20, the planner tackles a drift that has a vortex form and is rotating in a counter-clockwise direction. Two paths are shown; one with the box interior empty and one with an obstruction added. As can be seen in both cases, an obstacle-free trajectory that exploits the presence of drift in powering motion is laid to the target. Figure-20: Trajectory in a ccw vortex In figure-21, a random correlated drift field is used instead of the vortex field. As can be seen, a smooth path with reasonable length respecting the boundary of the space is laid to the target. Figure-22 shows the difference between the trajectory heading and the angle of drift at different points along the path. One can see that the majority of the drift components are aiding motion. Notice that motion starts from a difficult area where there is no direction to proceed along without going against drift. Figure-21: Trajectory in a random drift field, Figure-22: Drift-heading differential in figure-21. Figure-23: Navigation policy in figure-21. Figure-23 shows the navigation policy corresponding to the drift in figure-21. Despite the random nature of drift, a smooth navigation policy is obtained for steering motion. In figure-24, an additional obstacle is added in the middle of the workspace for another case of random drift. As before, a smooth and safe path with reasonable length is generated. Figure-25 shows the difference between the heading of the trajectory and the angle of the drift. As can be seen, almost all the points of the trajectory lie in the energy harvesting zone with the absolute value of the difference being less than B/2. Figure-24: Trajectory in a random drift field. Figure-25: Drift-heading differential in figure-24. VII. Conclusion: In this paper, the gamma-harmonic potential field approach is suggested for tackling planning in environments with inherent uncertainty that deny an operator the ability to segment the workspace into geometric regions of homogeneous attributes. An interpretation of the GHPF approach is also suggested for handling planning in cluttered environments that are populated by a drift field. The suggested extensions are proof of principle that the HPF approach is capable of efficiently addressing the information diversity issue needed for a planner to tackle a realistic situation in a provably-correct manner. Acknowledgment: The author would like to thank King Fahad University of Petroleum and Minerals for its support of this work. References: [1] B. Siciliano, O. Khatib, “Handbook of Robotics”, Springer-Verlag, Berlin Heilderberg, 2008 [2] W. Woods, “What’s Important About Knowledge Representation”, Computer, Vol. 16, Issue 10, 1983, pp. 22-27 [3] H. Moravec, “Obstacle Avoidance and Navigation in the Real World by a Seeing Robot Rover”, CMURI, TR-3, 1980 [4] C. Jorgensen, W. Hamel, C. Weisbin, “Autonomous Navigation”, Byte, January 1986, pp. 223-235 [5] G. Giralt, R. Chatila, M. Vaisset, “An Integrated Navigation and Motion Control System for Autonomous, Multisensory, Mobile Robots”, Robotics Research: The first international symposium, 1990, pp. 420-443 [6] S. LaValle, “Planning Algorithms”, Cambridge University Press, 2006 [7] H. Stough, “Aircraft Weather Mitigation for the Next Generation Air Transportation Systems”, 23rd Conference on IIPS, Dec. 2004, 15.8, pp. 1-6. [8] K. Iagnemma, “S. Dubousky, “Mobile Robots in Rough Terrains”, Springer Tracts in Advanced Robotics, Vol. 12, 2004 [9] M. Unser, “Sampling-50 Years After Shannon”, Proc. IEEE Vol. 88, No. 4, pp. 469-587, April 2000. [10] S. Thrun, W. Burgard, D. Fox, “Probabilistic Robotics”, MIT Press, 2005 [11] R. Simmons, S. Koenig, “Probabilistic Robot Navigation in Partially Observable Environments”, Proceedings of the International Joint Conference on Artificial Intelligence ( IJCAI’90), 1995, pp. 10801087. [12] X. Yang, “Development and Application of Fuzzy Logic-Based Autonomous Robot Navigation Algorithms”, Ph.D Thesis, University of Toronto, Canada 2005. [13] S. Parsons, “Qualitative Methods for Reasoning Under Uncertainty”, MIT Press 2001. [14] J. Armstrong, “Long-Range Forecasting”. John Wiley 1985. 2nd Edition. [15] A. Alvarez, A. Caiti, R. Onken, "Evolutionary Path Planning for Autonomous Underwater Vehicles in a Variable Ocean", IEEE Journal of Oceanic Engineering, vol. 29, no. 2, April 2004, pp. 418-429 [16] Jack W. Langelaan, "Tree-based Trajectory Planning to Exploit Atmospheric Energy", 2008 American Control Conference, Westin Seattle Hotel, Seattle, Washington, USA, June 11-13, 2008 [17] Bartolome Garau, Alberto Alvarez, Gabriel Oliver, "Path Planning of Autonomous Underwater Vehicles in Current Fields with Complex Spatial Variability: an A* Approach", Proceedings of the 2005 IEEE, International Conference on Robotics and Automation Barcelona, Spain, April 2005 [18] M. Soulignac, P. Taillibert, M. Rueher, "Time-minimal Path Planning in Dynamic Current Fields", 2009 IEEE International Conference on Robotics and Automation, Kobe International Conference Center, Kobe, Japan, May 12-17, 2009 [19] Juan Carlos Rubio, Sean Kragelund, "The Transpacific Crossing: Long Range Adaptive Path Planning for UAVS Through Variable Wind Fields", Digital Avionics Systems Conference, 2003. DASC '03. The 22nd Publication Date: 12-16 Oct. 2003 Volume: 2, On page(s): 8.B.4- 81-12 vol [20] Hiroshi Kawano,, "Method for Designating the Wind Condition in MDP-based Motion Planning of Under-actuated Blimp type UAV", 2007 IEEE International Conference on Robotics and Automation Roma, Italy, 10-14 April 2007. [21] C. Connolly, R. Weiss, J. Burns, “Path Planning Using Laplace Equation”, IEEE Int. Conf. Robotics Automat., Cincinnati, OH, May 13-18, 1990, pp. 2102-2106. [22] J. Decuyper, D. Keymeulen, “A Reactive Robot Navigation System Based on a Fluid Dynamics Metaphor”, in Proc. Parallel Problem Solving from Nature First Workshop, H. Schwefel, R. Hartmanis Eds, Dortmund-Germany, Oct 1-3, 1990, pp. 356-362. [23] S. Akashita, S. Kawamura, K. Hayashi, “New Navigation Function Utilizing Hydrodynamic Potential for Mobile Robots”, IEEE Int. Workshop Intelli. Motion Contr., Istanbul, Turkey, Aug 20-22, 1990, pp. 413-417. [24] C. Connolly, “Harmonic Functions and Collision Probabilities”, The International Journal of Robotics Research, Vol. 16, No.4, pp. 497-507, August 1997. [25] J. Rossell, P. Iniguez, “Path Planning Using Harmonic Functions and Probabilistic Cell Decomposition”, Universitat Politechnica De Catalunya, IOC-DT-P-2004-16, Octubre, 2004. [26] A. Masoud, "An Informationally-Open, Organizationally-Closed Control Structure for Navigating a Robot in an Unknown, Stationary Environment" 2003 IEEE International Symposium on Intelligent Control, October 5-8, 2003, Houston, Texas, USA, pp. 614-619. [27] S. Masoud A. Masoud, "Constrained Motion Control Using Vector Potential Fields", The IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans. May 2000, Vol. 30, No.3, pp.251-272. [28] Ahmad A. Masoud, “A Hybrid PDE-ODE Controller for Intercepting an Intelligent, Well-informed Target in a Stationary, Cluttered Environment”, 44th IEEE Conference on Decision and Control, Seville-Spain, December 12-15, 2005. [29] S. Masoud, A. Masoud, " Motion Planning in the Presence of Directional and Obstacle Avoidance Constraints Using Nonlinear Anisotropic, Harmonic Potential Fields: A Physical Metaphor", IEEE Transactions on Systems, Man, & Cybernetics, Part A: systems and humans, Vol 32, No. 6, November 2002, pp. 705-723. [30] Ahmad A. Masoud, "Decentralized, Self-organizing, Potential field-based Control for Individually-motivated, Mobile Agents in a Cluttered Environment: A Vector-Harmonic Potential Field Approach", IEEE Transactions on Systems, Man, & Cybernetics, Part A: systems and humans, Vol. 37, No. 3, pp. 372-390, May 2007. [31] R. Gupta, A. Masoud, M. Chow, "A Network based, Delay-tolerant, Integrated Navigation System for a differential drive UGV using Harmonic Potential Field", Proceedings of the 45th IEEE Conference on Decision & Control Manchester Grand Hyatt Hotel San Diego, CA, USA, December 13-15, 2006, pp. 1870-1875. [32] J. Jackson , "Classical Electrodynamics", Wiley, 1989 [33] D. Ingerman, J. Morrow, "On a Characterization of the Kernel of the Dirichlet-to-Neumann Map for a Planar Region”, SIAM Journal on Mathematical Analysis, Vol. 29 , No. 1, Jan. 1998, pp. 106 - 115. [34] J. Milnor, “Morse Theory”, Princeton University Press, 1963. [35] G. Strang, "Linear Algebra and Its Applications", Brooks Cole, 3 edition, 1988. [36] J. LaSalle, “Some Extensions of Lyapunov’s Second Method”, IRE Transactions on Circuit Theory, CT-7, No. 4, pp. 520-527, 1960. [37] Ahmad A. Masoud, "A Harmonic Potential Field Approach with a Probabilistic Space Descriptor for Planning in Non-divisible Environments.", 2009 IEEE International Conference on Robotics and Automation, May 12 - 17, 2009, Kobe, Japan, pp. 3774-3779. [38] K. Deergha Rao, M. N. S. Swamy, E. I. Plotkin, "GPS Navigation with Increased Immunity to Modeling Errors", IEEE Transactions on Aerospace and Electronic Systems Vol. 40, No. 1 January 2004, pp. 2-11 [39] A. G. Shem, T. A. Mazzuchi, "Addressing Uncertainty in UAV Navigation Decision-Making", IEEE Transactions on Aerospace and Electronic Systems Vol. 44, No. 1 January 2008, pp. 295-313 [40] P. Keen,(1978). Decision support systems: an organizational perspective. Reading, Mass., Addison-Wesley Pub. Co. ISBN 0-201-03667-3 [41] A. Stentz, “Optimal and Efficient Path Planning for Partially-Known Environments”, Proceedings 1994 IEEE Robotics and Automation, 1994, 8-13 May 1994, pp. 3310-3317. [42] A. Stentz, “Optimal and Efficient Path Planning for Unknown and Dynamic Environments”, technical report CMU-RI-TR-93-20, the robotics institute, Carnegie Mellon University, 1993. [43] H. Schroer, “The Minimum Resistance”, 2002, Mire book, Harvard. [44] S. Bergman, M. Schiffer, “Kernel Functions and Elliptic Differential Equations in Mathematical Physics”, Academic Press Inc, New York, 1953. [45] D. Koditschek, “Exact Robot Navigation by Means of Potential Functions: Some Topological Considerations”, IEEE International conference on Robotics and Automation, Raleigh, N.C. 1987, pp. 1-6.
3cs.SY
arXiv:1607.07650v1 [math.GR] 26 Jul 2016 The concept of self-similar automata over a changing alphabet and lamplighter groups generated by such automata Adam Worynaa a Silesian University of Technology, Institute of Mathematics, ul. Kaszubska 23, 44-100 Gliwice, Poland Abstract Generalizing the idea of self-similar groups defined by Mealy automata, we itroduce the notion of a self-similar automaton and a self-similar group over a changing alphabet. We show that every finitely generated residually-finite group is self-similar over an arbitrary unbounded changing alphabet. We construct some naturally defined self-similar automaton representations over an unbounded changing alphabet for any lamplighter group K ≀ Z with an arbitrary finitely generated (finite or infinite) abelian group K. Keywords: rooted tree, changing alphabet, time-varying automaton, group generated by an automaton, lamplighter group 1. Introduction and main results The handling of various languages and approaches for describing groups of automorphisms of spherically homogeneous rooted trees brought many significant results. For example, the algebraic language of the so-called ’tableaux’ with ’truncated’ polynomials over finite fields, introduced by L. Kaloujnine [8], turned out to be effective in studying these groups as iterated wreath products. V. I. Sushchanskyy [16] uses this language to construct the pioneering examples of infinite periodic 2-generated p-groups (p > 2) as well as to produce factorable subgroups of wreath products of groups [17, 18]. A. V. Rozhkov [12], by using the notion of the cortage and studying the so-called Aleshin type groups, first gave an example of a 2-generated periodic group containing elements of all possible finite orders (see also [13, 14]). A. Ershler [2, 3] uses a combinatorial language of a time-varying automaton to discover new results concerning the growth and the so-called Fölner functions of groups. In the present paper, by introducing the notion of a self-similar automaton over a changing alphabet and the group generated by such an automaton, Email address: [email protected] (Adam Woryna) Preprint we make an attempt to show that the concept of a self-similar group with its faithful action by automorphisms on a homogeneous rooted tree (also called a regular rooted tree) can be naturally extended to an arbitrary spherically homogeneous rooted tree. As we show in Theorem 1, our combinatorial approach allows to characterize the class of finitely generated residually finite groups. We also provide (Theorem 2) naturally-defined representations for a large class of lamplighter groups for which the realization by the standard notion of a Mealy type automaton is not known. 1.1. Mealy automata and self-similar groups Self-similar groups appear in many branches of mathematics, including operators algebra, dynamical systems, automata theory, combinatorics, ergodic theory, fractals, and others. The most interesting and beautiful examples of selfsimilar actions are defined on the tree X ∗ of finite words over a finite alphabet X by using the notion of a transducer (also called a Mealy automaton), which, by definition, is a finite set Q together with the transition function ϕ : Q × X → Q and an output function ψ : Q × X → X. The convenient way defining and presenting a Mealy automaton is to draw its diagram. For example, the diagram in Figure 1 determines a Mealy automaton over the alphabet X = {0, 1}, with five states a, b, c, d, e, with a transition function given by the oriented edges and with an output function given by labelling of the vertices by the maps X → X, where id denotes the identity map and σ is a transposition: 0 7→ 1, 1 7→ 0. We d b 1 id id 1 1 0 0 id c 0 s id 0,1 0,1 e a Figure 1: The automaton generating the Grigorchuk group easily verify from this diagram the following equalities defining the transition and output functions of this automaton: ϕ(a, x) = ϕ(b, 0) = ϕ(e, x) = e, x ∈ X, a, ϕ(b, 1) = c, ϕ(c, 0) = a, ϕ(c, 1) = ψ(a, x) = d, ϕ(d, 0) = e, ϕ(d, 1) = b, σ(x), ψ(b, x) = ψ(c, x) = ψ(d, x) = ψ(e, x) = x, x ∈ X. Each state q ∈ Q of a Mealy automaton A = (X, Q, ϕ, ψ) defines a transformation of the tree X ∗ . Namely, given a word x0 x1 . . . xk ∈ X ∗ the automaton A 2 acts on the first letter x0 by the map which labels the vertex corresponding to the state q in the diagram of A, changes its state to the state given by the end of the arrow going out of q and labelled by x0 ; being in a new state the automaton reads the next letter x1 , transforms it and moves to the next state according to the above rule; and continues in this way to transform the remaining letters of the word. The induced transformation of the set X ∗ preserves the empty word and the beginnings of words and, if A is invertible (i.e. all the maps labelling vertices in the diagram of A are permutations of the alphabet X), it defines an automorphism of the tree X ∗ . The group generated by automorphisms corresponding to all states of an invertible automaton A with the composition of mappings as a product is called the group generated by this automaton. According to [4] (Definition 1.1, p. 129) an abstract group G is called self-similar over an alphabet X if there is a Mealy automaton A = (X, Q, ϕ, ψ) which generates a group isomorphic with G. For instance, the group G generated by the automaton depicted in Figure 1 is a fameous Grigorchuk group constituting one of the most interesting example among groups generated by all the states of a Mealy automaton and, as it turned out, in the whole group theory. This is also the first nontrivial example of a self-similar group. Groups generated by the states of a Mealy automaton form a remarkable class of groups containing various important examples connected to many interesting topics. For more about Mealy automata, groups generated by them, self-similar groups and for many open problems around these concepts see the survey paper [6] or [11]. 1.2. Time-varying automata and self-similarity over a changing alphabet A time-varying automaton, which is a natural generalization of a Mealy type automaton, allows to work not only with a fixed finite alphabet X but also with an infinite sequence X = (Xi )i≥0 = (X0 , X1 , . . .) of such alphabets, which further will be called a changing alphabet. We say that the changing alphabet X is unbounded if the sequence of cardinalities (|Xi |)i≥0 (the so-called branching index of X) is unbounded. By definition, a time-varying automaton over a changing alphabet X = (Xi )i≥0 is a quadruple A = (X, Q, ϕ, ψ), where Q is a finite set of states, ϕ = (ϕi )i≥0 and ψ = (ψi )i≥0 are sequences of, respectively, transition functions and output functions of the form ϕi : Q × Xi → Q, ψi : Q × Xi → Xi . The automaton A is called invertible if x 7→ ψi (q, x) is an invertible mapping of the set Xi for all i ≥ 0 and q ∈ Q. For every k ≥ 0 we also define the k-th shift of the automaton A that is a time-varying automaton Ak = (X(k) , Q, ϕ(k) , ψ(k) ), 3 where X(k) = (Xk+i )i≥0 , ϕ(k) = (ϕk+i )i≥0 , ψ(k) = (ψk+i )i≥0 . In particular, A is a Mealy automaton if and only if Ak = A for every k ≥ 0. At first, in the literature of time-varying automata only the notion of an automaton over a fixed alphabet was considered and merely the structural properties of such automata were studied (see [10]). We first define in [20] the class of time-varying automata over a changing alphabet X = (Xi )i≥0 (see also [21, 22, 23]). Such an alphabet defines a tree X ∗ of finite words, which is an example of a spherically homogeneous rooted tree. The tree X ∗ is homogeneous if and only if the branching index of X is constant. Moreover, any locally finite spherically homogeneous rooted tree T is isomorphic with X ∗ for a suitable changing alphabet X = (Xi )i≥0 . We introduced in [20] the notion of a group generated by an automaton over a changing alphabet and show that this combinatorial language is apt to define and study groups of automorphisms of spherically homogeneous rooted trees which may be not homogeneous. Specifically, if A = (X, Q, ϕ, ψ) is an invertible time-varying automaton over a changing alphabet X = (Xi )i≥0 , then for every k ≥ 0 and each state q ∈ Q we define, via transition and output functions, an ∗ automorphism qk of the tree X(k) and call the group G(Ak ) = hqk : q ∈ Qi as a group generated by the k-th shift of A. Definition 1. An invertible time-varying automaton A = (X, Q, ϕ, ψ) is called self-similar if for every k ≥ 0 the mapping qk 7→ q0 (q ∈ Q) induces an isomorphism G(Ak ) ≃ G(A). If A = (X, Q, ϕ, ψ) is a Mealy automaton, then we have qk = q0 for all k ≥ 0 and q ∈ Q. Thus every Mealy automaton is self-similar by the above definition. Definition 2. An abstract group G is called a self-similar group over the changing alphabet X = (Xi )i≥0 if there is a self-similar automaton A = (X, Q, ϕ, ψ) which generates a group isomorphic with G, i.e. G(A) ≃ G. Every self-similar group G over a changing alphabet X is an example of a finitely generated residually finite group (a group is called residually finite if there is a descending chain N0 ≥ N1 ≥ N2 ≥ . . . of normal subgroups of finite indexes and the trivial intersection). Indeed, the group Aut(X ∗ ) of all automorphisms of the tree X ∗ is an example of a residually finite group (stabilizers of consecutive levels of this tree are normal subgroups of finite indexes which intersect trivially). Thus G, as a group isomorphic with a subgroup of Aut(X ∗ ), is residually finite. Given an abstract group G and a changing alphabet X = (Xi )i≥0 , it is natural to ask about the automaton complexity of the group G over the alphabet X, i.e. about the minimal number of states in an automaton over X which 4 generates a group isomorphic with G. Obviously, for any changing alphabet X the automaton complexity of any group G over X is not smaller than the rank r(G) of this group, i.e. than the minimal cardinality of a generating set of G. Definition 3. If the number of states in an automaton A = (X, Q, ϕ, ψ) coincides with the rank of the group G(A), i.e. |Q| = r(G(A)), then the automaton A is called optimal. 1.3. The class of finitely generated self-similar groups over an unbounded changing alphabet In the theory of groups generated by Mealy automata the problem of classifying all groups generated by automata over a given alphabet X and with a given number of states is essential and intensively studied. For example, by the result from [6] there are only six groups (up to isomorphism) generated by 2-state Mealy automata over the binary alphabet, including the simplest example of an interesting group generated by a Mealy automaton, that is the lamplighter group C2 ≀ Z, where C2 denotes a cyclic group of order 2 and Z is the infinite cyclic group. Much effort put towards a classification of groups 1 0 s id 1 0 Figure 2: A Mealy automaton generating the lamplighter group C2 ≀ Z generated by 3-state Mealy automata over the binary alphabet. In the paper [1] was shown, among other things, that there are no more than 124 pairwise nonisomorphic groups defined by such automata. Only recently it was discovered that a free-nonabelian group of finite rank is self-similar. Namely, M. Vorobets and Ya. Vorobets showed in [19] that a Mealy automaton (the so-called Aleshin type automaton) depicted in Figure 3 generates a free group of rank 3. Moreover, it is still an open question whether or not there exists an optimal Mealy automaton which generates a free group of rank 2. Referring to this problem, we provided [23] for this group an explicit and naturally defined realization by an optimal automaton over a changing alphabet; see also Example 1. The first result of the present paper shows that the situation completely changes if we try to characterize all self-similar groups over an arbitrary unbounded changing alphabet. Namely, we show the following Theorem 1. Every finitely generated residually finite group G is self-similar over any unbounded changing alphabet and the corresponding self-similar automaton is optimal. 5 id 0,1 0 1 1 s s 0 Figure 3: A Mealy automaton generating a free group As we will see in the proof, the construction leading to Theorem 1 is based on the specific type of automaton which we call an automaton of a diagonal type. Definition 4. We say that a time-varying automaton A = (X, Q, ϕ, ψ) is of a diagonal type, or that A has transition functions defined in the diagonal way if ϕi (q, x) = q for all i ≥ 0, q ∈ Q and x ∈ Xi . Note that the proof of Theorem 1 is unconstructive and we can not explicitly define the output functions of the corresponding self-similar automaton for a given group G and a changing alphabet X = (Xi )i≥0 . Indeed, in that proof we choose for the construction of an automaton A which generates the group G an arbitrary generating set S as a set of states and we define the transition functions in the diagonal way. Next, we show that the output functions of A can be induced by some embedding g 7→ (g (0) , g (1) , . . .) of the group G into the infinite cartesian product S(X0 ) × S(X1 ) × . . . of symmetric groups on sets of letters; due to this embedding we define the output functions as follows: ψi (s, x) = s(i) (x) for all i ≥ 0, s ∈ S and x ∈ Xi . However, the above embedding arises simply from the fact that G embeds into the cartesian product G/N0 × G/N1 × . . ., where G = N0 ⊲ N1 ⊲ N2 ⊲ . . . is an infinite normal series with finite quotients G/Ni (i ≥ 0) and the trivial intersection. But the existence of such a normal series is equivalent to the assumption that G is residually finite. Hence, given a residually finite group G, this method does not tell us how to compute effectively the permutations s(i) ∈ S(Xi ). In particular, we know nothing about the cycle structure of these permutations. Moreover, in the case of a free group of rank 2 we tried to find in the paper [21] an explicit representation by an optimal automaton of a diagonal type. However, our computations led to a pretty complicated description of the mappings s(i) and, consequently, of output functions in such an automaton. In view of the above disadvantages as well as the previous results, it would be interesting to find and study explicit and naturally defined representations of a given group G by self-similar automata over a changing alphabet, especially if such representations are unknown by using the notion of a Mealy automaton. 6 1.4. Lamplighter groups as self-similar groups over a changing alphabet Let K be an arbitrary nontrivial finitely generated (finite or infinite) abelian group. By definition, the lamplighter group K ≀ Z is a semidirect product M K ⋊Z Z L with the action of the infinite cyclic group on the direct sum Z K by a shift. For the rank r(K ≀ Z) of this group we have: r(K ≀ Z) = r(K × Z) = r(K) + 1. In recent years groups of this form are intensively studied via their selfsimilar actions. For example, the automaton realization of the lamplighter group C2 ≀ Z from the paper [7] was used by R. Grigorchuk and A. Żuk to compute the spectral measure associated on random walks on this group, which leads to a counterexample to the strong Atiyach conjecture [5]. This construction was generalized [9, 15] by P. Silva and B. Steinberg in the concept of a reset Mealy automaton, where for every finite abelian group K the corresponding lamplighter group was realized as a group generated by a Mealy automaton in which the set of states and the alphabet coincides with K. Hence, the only known optimal realization of the group K ≀ Z by an automaton concerns the simplest case K = C2 . Here, it should also be mentioned that the question whether or not there exists a representation of a lamplighter group K ≀ Z with an infinite K by a Mealy automaton is still open. For the second result of this paper we come from a naturally defined and self-similar automaton D of a diagonal type over a changing alphabet X that generates the direct product K × Z (see Example 3). We discover that only by a simple manoeuvre on each transition function in D we can pass to a new automaton A and obtain in this way a self-similar optimal automaton realization for the lamplighter group K ≀ Z. Namely, we distinguish the state a in the automaton D and the letters xq,i ∈ Xi (i ≥ 0) for each state q 6= a and we define A as an automaton which operates like D, unless being in a state q 6= a it receives the letter xq,i in a moment i ≥ 0, then it moves to the state a. To define the changing alphabet X = (Xi )i≥0 and output functions in the automaton D we decompose the group K into a direct product of cyclic groups K = Zn1 × (Cr1 × . . . × Crn2 ), n1 , n2 ≥ 0 such that n1 + n2 = r(K). Let us denote n := r(K) = n1 + n2 . For every i ≥ 0 we consider arbitrary 2n pairwise disjoint cycles π1,i , . . . , πn,i , σ1,i , . . . , σn,i in the symmetric group on a finite set Xi which satisfy the following conditions: for each 1 ≤ s ≤ n the cycles πs,i (i ≥ 0) do not have a uniformly bounded length, as well as the cycles σs,i (i ≥ 0) for each 1 ≤ s ≤ n1 , and the length of each cycle σs,i (n1 < s ≤ n, i ≥ 0) does not depend on i and is equal to rs−n1 . In particular, we see that the arising changing alphabet X = (Xi )i≥0 is unbounded. 7 Now, taking n symbols b1 , . . . , bn different from a, we define the automaton D as an automaton of a diagonal type over the changing alphabet X = (Xi )i≥0 , with the set of states Q = {a, b1 , . . . , bn } and the output functions defined as follows:  αi (x), q = a, ψi (q, x) = βs,i (x), q = bs , 1 ≤ s ≤ n for all i ≥ 0, q ∈ Q and x ∈ Xi , where the permutations αi , βs,i are defined in the following way αi = π1,i · . . . · πn,i , βs,i = σs,i · αi . As we mention above, passing to the automaton A just needs to redefine transition functions of D. Explicitly, we define: A = (X, Q, ϕA , ψ), where  a, q = bs , x = xs,i , 1 ≤ s ≤ n, A ϕi (q, x) = q, otherwise, and xs,i := xbs ,i is a letter from the cycle πs,i . Our main result is the following Theorem 2. The automaton A is self-similar and the group G(A) is isomorphic with the lamplighter group K ≀ Z. In the proof of Theorem 2 we do not use the algebraic language of embedding into wreath products of groups (the so-called wreath recursion), which is common in studying self-similar groups. Instead of this, for any i ≥ 0 we di∗ of rectly provide some recursive formulae describing the action on the tree X(i) ∗ ∗ , where → X(i) automaton transformations ai , cs,i : X(i) cs,i = (bs )i · a−1 i , 1 ≤ s ≤ n. We show (Proposition 3 and Lemma 1) that for every i ≥ 0 any two transformations cs,i and cs′ ,i (1 ≤ s, s′ ≤ n) commute and the mapping cs,i 7→ κs induces an isomorphism between the group Ki = hci,1 , . . . , ci,n i and the group K, where the elements κs ∈ K (1 ≤ s ≤ n) form the standard generating set of K, that is κs = (0, . . . , 0, us , 0, . . . , 0), where us occurs in the s-th position and represents a generator of the corresponding cyclic factor of K. (k) Next, for each k ∈ Z we consider the conjugation Ki = ai−k Ki aki as well as the group (k) Hi = hKi : k ∈ Zi generated by all these conjugations, and we show (Proposition 4) that Hi is a (k) direct sum of its subgroups Ki , k ∈ Z, which gives the isomorphism Hi ≃ L Z K. Further, we show (Lemma 4) that the group Hi intersects trivially 8 with the cyclic group generated by ai and that this cyclic group acts on Hi by conjugation via the shift (Lemma 3). This implies that the group Gi = hHi , ai i = hc1,i , . . . , cn,i , ai i is a semidirect product of the subgroups Hi and hai i, and, consequently, that Gi is isomorphic with the lamplighter group K ≀ Z via the mapping ai 7→ u, cs,i 7→ ηs , 1 ≤ s ≤ n, where {u, η1 , . . . , ηn } is theLstandard generating set of K ≀ Z, that is u is a generator of Z in the product Z K ⋊ Z and M ηs = (. . . , 0, 0, 0, κs , 0, 0, 0, . . .) ∈ K, Z where each κs on the right hand side occurs in zero position. Finally, we obtain that the group G(Ai ) = hai , (b1 )i , . . . , (bn )i i generated by the i-th shift of the automaton A is isomorphic with Gi and the mapping ai 7→ u, (bs )i 7→ ηs · u induces the isomorphism G(Ai ) ≃ K ≀ Z. As we will see in the proof, all calculations verifying the above propositions and lemmas are entirely elementary. However, they are burdened with some technical formulae and the presentation of the proof seems to be quite formalistic. This contrasts with a transparent and intuitive idea behind the definition of the automaton A. On the other hand, our construction confirms one of the most intriguing phenomenon in the computational group theory which originates from dealing with the simplest examples of transducers, i.e. although they can generate various classic and important groups with rare and exotic properties, the derivation of such a group from the corresponding automaton is far from obvious and, quite often, requires sophisticated and complex approaches. It can be seen, for example, in the original proof from [7] finding the lamplighter group C2 ≀ Z as a self-similar group or in a long history discovering a free group behind the Aleshin type automaton. We hope that our construction will not only fill the gap in self-similar automaton representations for a large class of lamplighter groups, but also can serve as a useful tool in the further study of these groups, in particular, via their dynamics and geometry on the corresponding tree. We also think that it will help to better understand the connection between the structure of an automaton over a changing alphabet and the group it defines. 2. The tree X ∗ and its automaton transformations In the Introduction, we have already presented the notion of a changing alphabet X = (Xi )i≥0 , a time-varying automaton A = (X, Q, ϕ, ψ), their shifts X(k) , Ak (k ≥ 0) and a self-similar group over a changing alphabet. Now, we only recall the necessary notions and facts concerning the tree X ∗ of finite words ∗ ∗ (q ∈ Q, k ≥ 0). We over X and automaton transformations qk : X(k) → X(k) ∗ define the tree X as a disjoint sum of cartesian products X0 × X1 × . . . × Xi , i ≥ 0, 9 together with the empty word ǫ. Since the elements of a word w ∈ X ∗ are called letters, we will not separate them by commas and we will write w = x0 x1 . . . xk , where xi ∈ Xi are the letters. Thus for a given i ≥ 0 the above cartesian product consists of all words w ∈ X ∗ with the length |w| = i + 1. If w ∈ X ∗ and ∗ v ∈ X(|w|) , then wv denotes a concatenation of w and v. Obviously wv ∈ X ∗ . The set X ∗ has the structure of a spherically homogeneous rooted tree. The empty word is the root of this tree and two words are connected if and only if they are of the form w and wx for some w ∈ X ∗ and x ∈ X|w| . In particular, the i-th level X i (i ≥ 0) of the tree X ∗ (that is the set of vertices at the distance i from the root) consists of all words of the length i. There is a natural interpretation of an automaton A = (X, Q, ϕ, ψ) over a changing alphabet X = (Xi )i≥0 as a machine, which being in a moment i ≥ 0 in a state q ∈ Q reads a letter x ∈ Xi from the input tape, types the letter ψi (q, x) on the output tape, moves to the state ϕi (q, x) and proceeds further to the moment i + 1. This allows to define for every k ≥ 0 and q ∈ Q the ∗ ∗ ∗ transformation qk : X(k) → X(k) recursively: qk (ǫ) = ǫ and if xw ∈ X(k) with ∗ x ∈ Xk , w ∈ X(k+1) , then ′ (w), qk (xw) = x′ qk+1 (1) where x′ = ψk (q, x) and q ′ = ϕk (q, x). The transformation qk is called an ∗ automaton transformations of the tree X(k) (corresponding to the state q in the k-th transition of A). It is convenient to present an automaton A = (X, Q, ϕ, ψ) over a changing alphabet X = (Xi )i≥0 as a labeled directed locally finite graph with the set {(i, q) : i ≥ 0, q ∈ Q} as a set of vertices. Two vertices are connected with an arrow if and only if they are of the form (i, q) and (i + 1, ϕi (q, x)) for some i ≥ 0, q ∈ Q and x ∈ Xi . This arrow is labeled by x, starts from the vertex (i, q) and goes to the vertex (i + 1, ϕi (q, x)). Each vertex (i, q) is labeled by the mapping τi,q : Xi → Xi , τi,q : x 7→ ψi (q, x) (the so-called labelling of the state q in the i-th transition of A). Further, to make the graph of the automaton clear, we will substitute a large number of arrows connecting two given vertices and having the same direction for a one multi-arrow labeled by suitable letters and if the labelling of such a multi-arrow starting from a given vertex follows from the labelling of other arrows starting from this vertex, we will omit this labelling. Directly by the formula (1) we see that in case A invertible (i.e. each τi,q is a permutation of the set Xi ), every ∗ ∗ automaton transformation qi : X(i) → X(i) is also invertible. By the formula (1) we also see that qi preserves the lengths of words and common beginnings ∗ and hence it defines an endomorphisms of the tree X(i) . Moreover, the composition of two automaton transformations of the same tree is also an automaton transformation of this tree and the inverse mapping to the invertible automaton 10 x1,0 a0 b1,2 b1,1 b1,0 x1,1 b1,3 x1,2 a2 a1 a3 Figure 4: The graph of the automaton A generating K ≀ Z, case n = 1 transformation is also of this type (we can show this by using an operation of the composition of two time-varying automata over the same changing alphabet and the notion of an inverse automaton - see [20]). In particular, the set of all invertible automaton transformations of a tree X ∗ together with the composition of mappings as a product forms a proper subgroup of the group Aut(X ∗ ) of automorphisms of this tree, which is denoted by F A(X ∗ ) and called the group of finite-state automorphisms. Remark 1. Through the rest of the text we use the right action convention in writing the composition f g of two transformation f, g : X ∗ → X ∗ , i.e. the transformation applied first is written on the left and for any word w ∈ X ∗ we have the equality f g(w) = g(f (w)). 3. The proof of Theorem 1 Since the group G is countable and residually finite, there is an infinite normal series G = N0 ⊲ N1 ⊲ . . . with finite quotients G/Ni and the trivial intersection. Then the function g 7→ (gNi )i≥0 is an embedding of G into the infinite cartesian product G/N0 × G/N1 × . . . . (2) Let X = (Xi )i≥0 be an unbounded changing alphabet. Then there is an infinite increasing sequence 0 < t0 < t1 < . . . of integers such that for every i ≥ 0 the quotient G/Ni embeds into the product S(Xti−1 +1 ) × S(Xti−1 +2 ) × . . . × S(Xti ) of symmetric groups of consecutive sets of letters, where for i = 0 we take t(−1) = −1. Consequently, there is an embedding g 7→ (g (0) , g (1) , . . .), g ∈ G 11 of G into the cartesian product S(X0 ) × S(X1 ) × . . .. The above embedding ∗ ∗ allows to define the transformations ξg,i : X(i) → X(i) (i ≥ 0, g ∈ G) as follows: ∗ ξg,i (ǫ) = ǫ and if w = x0 x1 . . . xk ∈ X(i) , then ξg,i (w) = g (i) (x0 )g (i+1) (x1 ) . . . g (i+k) (xk ). In particular, for all g, g ′ ∈ G and i ≥ 0 we have ξgg′ ,i = ξg,i · ξg′ ,i , ξg−1 ,i = (ξg,i )−1 . (3) Let S be any generating set of G whose cardinality coincides with the rank of G. Let us define a time-varying automaton A = (X, S, ϕ, ψ) as follows: ϕi (s, x) = s, ψi (s, x) = s(i) (x) for all i ≥ 0, s ∈ S, x ∈ Xi . Let us fix i ≥ 0. Directly by the definition of A the transformation si defined by a state s ∈ S in the i-th transition of A acts ∗ on any word w = x0 x1 . . . xk ∈ X(i) in the following way si (w) = s(i) (x0 )s(i+1) (x1 ) . . . s(i+k) (xk ). In particular, we have si = ξs,i for every s ∈ S and, since the elements si for s ∈ S generate the group G(Ai ), we have G(Ai ) = {ξg,i : g ∈ G}. By the equalities (3) we see that the mapping G → G(Ai ), g 7→ ξg,i T is an epimorphism. Further, since k≥0 Nk = {1G}, for every g 6= 1G there are infinitely many k ≥ 0 such that gNk 6= Nk . Consequently g (k) 6= IdXk for ∗ for every g 6= 1G . Hence the infinitely many k ≥ 0, which implies ξg,i 6= IdX(i) above epimorphism is one-to-one. Consequently, the mapping s 7→ si (s ∈ S) induces an isomorphism G ≃ G(Ai ), i.e. the automaton A is an optimal selfsimilar realization of G. As we explained in the introduction, in spite of Theorem 1, it is not easy to find an explicit self-similar automaton realization for a given group G. Even if we are able to construct an automaton defining G, this automaton may not be necessarily self-similar. Example 1. Let (ri )i≥0 be a nondecreasing unbounded sequence of integers ri > 1 and let X = (Xi )i≥0 be a changing alphabet in which Xi = {1, 2, . . . , ri }. For each i ≥ 0 we define two cyclic permutations αi , βi of the set Xi : αi = (1, 2), βi = (1, 2 . . . , ri ). Let A = (X, {a, b}, ϕ, ψ) be an automaton in which the transition and output functions are defined as follows    q, x 6= 1, αi (x), q = a, a, x = 1, q = b, ϕi (q, x) = ψi (q, x) = βi (x), q = b.  b, x = 1, q = a, 12 b0 b1 1 a0 1 b2 a1 b3 1 1 1 a2 1 a3 Figure 5: A self-similar automaton from Example 1 According to [23] the group G(A) = ha0 , b0 i is a free nonabelian group of rank two generated freely by the transformations a0 , b0 . Directly by the construction of the automaton A we see that for every i ≥ 0 the automaton transformations ∗ ∗ ai , bi : X(i) → X(i) also generate a free nonabelian group of rank 2. In particular, the mapping ai 7→ a0 , bi 7→ b0 induces an isomorphism G(Ai ) ≃ G(A). Thus the automaton A is a self-similar realization of a free nonabelian group of rank 2 over the changing alphabet X. Example 2. Let the changing alphabet X = (Xi )i≥0 and the permutations αi , βi ∈ S(Xi ) be defined as in the previous example. Let A = (X, {a, b}, ϕ, ψ) be an automaton of a diagonal type with the output functions defined as follows: ψi (a, x) = αi (x) and ψi (b, x) = βi (x) for all i ≥ 0 and x ∈ Xi . The automaton b0 b1 b2 b3 a0 a1 a2 a3 Figure 6: An automaton from Example 2 A is not a self-similar realization of the group G = G(A) because A is not selfsimilar. Indeed, let t ≥ 0 be the smallest number such that rt ≥ 3 and t′ > t be the smallest number such that rt′ > rt . Then one can verify by straightforward calculations that W (at′ , bt′ ) 6= IdX(t∗ ′ ) and W (a0 , b0 ) = IdX ∗ , where the groupword W = W (a, b) is defined as follows W (a, b) = (abrt −1 ab−rt +1 )2 . Thus the mapping at′ 7→ a0 , bt′ 7→ b0 can not be extended to the isomorphism of groups G(At′ ) and G(A). Example 3. Let D be an automaton of a diagonal type defined in the introduction. For every i ≥ 0 let ai , (bs )i (1 ≤ s ≤ n) be automaton transfor∗ mations of the tree X(i) corresponding to the states of D in i-th transition. Obviously, the automaton D is invertible. By definition of transition and output functions in D we obtain the following recursions: ai (xw) = αi (x)ai+1 (w), 13 ∗ (bs )i (xw) = βs,i (x)bi+1 (w) for every x ∈ Xi and w ∈ X(i+1) . The group G(Di ) generated by the i-th shift of the automaton D is generated by the transformations ai and cs,i = (bs )i a−1 for 1 ≤ s ≤ n. Since σs,i = βs,i α−1 = α−1 i i i βs,i , we have by the above recursions: cs,i (xw) = σs,i (x)cs,i+1 (w) for x ∈ Xi and ∗ w ∈ X(i+1) . We consider in the infinite cartesian product S(X0 ) × S(X1 ) × . . . the subgroup hλi , γ1,i , . . . , γn,i i, where λi = (αi , αi+1 , . . .), γs,i = (σs,i , σs,i+1 , . . .). By the above recursions for ai and cs,i we see that the mapping ai 7→ λi , cs,i 7→ γs,i , 1 ≤ s ≤ n induces an isomorphism G(Di ) ≃ hλi , γ1,i , . . . , γn,i i. For each i ≥ 0 the permutations αi , σ1,i , . . . , σn,i are pairwise disjoint. Consequently, the mn 0 m1 group hλi , γ1,i , . . . , γn,i i is abelian and the product λm i γ1,i . . . γn,i is trivial if and only if o(λi ) | m0 and o(γs,i ) | ms for 1 ≤ s ≤ n, where o(g) denotes the order of an element g. Since αi = π1,i · . . . · πn,i , we see by the assumptions on the permutations πs,i and σs,i that o(λi ) = o(γ1,i ) = . . . = o(γn1 ,i ) = ∞ and o(γs,i ) = rs−n1 for n1 < s ≤ n. This implies that the automaton D is self-similar and it generates the group isomorphic with K × Z. 4. The proof of Theorem 2 Let A be an automaton defined in the introduction and for every i ≥ 0 let ai , ∗ (bs )i (1 ≤ s ≤ n) be automaton transformations of the tree X(i) corresponding to the states of A in its i-th transition. Obviously, the automaton A is invertible. Directly by formulae defining transition and output functions of A we obtain the following recursions:  βs,i (x)ai+1 (w), x = xs,i , ai (xw) = αi (x)ai+1 (w), (bs )i (xw) = βs,i (x)(bs )i+1 (w), x 6= xs,i −1 −1 ∗ for every x ∈ Xi and w ∈ X(i+1) . Hence a−1 i (xw) = αi (x)ai+1 (w) and the −1 transformations cs,i = (bs )i ai satisfy: cs,i (xw) = (bs )i a−1 (xw) = a−1 i ((bs )i (xw)) =  −1i ai (βs,i (x)ai+1 (w)), x = xs,i , = = a−1 (β (x)(b ) (w)), x 6= xs,i , s,i s i+1 i  −1 −1 αi (βs,i (x))ai+1 (ai+1 (w)), x = xs,i , = = −1 α−1 i (βs,i (x))ai+1 ((bs )i+1 (w)), x 6= xs,i ,  σs,i (x)w, x = xs,i , = σs,i (x)cs,i+1 (w), x 6= xs,i . But, if x = xs,i , then σs,i (x) = x as the cycles πs,i and σs,i are disjoint. In consequence, we have  xw, x = xs,i , cs,i (xw) = (4) σs,i (x)cs,i+1 (w), x 6= xs,i . 14 4.1. The groups Ki We consider the groups Ki = hc1,i , . . . , cn,i i, i ≥ 0. Proposition 3. For every i ≥ 0 the mapping cs,i 7→ κs (1 ≤ s ≤ n) induces an isomorphism Ki ≃ K. Proof. At first we show that for s 6= s′ the transformations cs,i and cs′ ,i commute. By (4) we obtain: cs,i cs′ ,i (xw) = cs′ ,i (cs,i (xw)) =  cs′ ,i (xw), = cs′ ,i (σs,i (x)cs,i+1 (w)), x = xs,i , x 6= xs,i . (5) If x = xs,i , then x 6= xs′ ,i and σs′ ,i (x) = x. Thus by (4) and (5) we have in this case cs,i cs′ ,i (xw) = cs′ ,i (xw) = σs′ ,i (x)cs′ ,i+1 (w) = xcs′ ,i+1 (w). Similarly, if x = xs′ ,i , then σs,i (x) = x and by (4) and (5) we obtain in this case cs,i cs′ ,i (xw) = cs′ ,i (σs,i (x)cs,i+1 (w)) = cs′ ,i (xcs,i+1 (w)) = xcs,i+1 (w). If x 6= xs,i and x 6= xs′ ,i , then σs,i (x) 6= xs′ ,i and consequently cs,i cs′ ,i (xw) = cs′ ,i (σs,i (x)cs,i+1 (w)) = σs,i σs′ ,i (x)cs,i+1 cs′ ,i+1 (w). We conclude   xcs′ ,i+1 (w), xcs,i+1 (w), cs,i cs′ ,i (xw) =  σs,i σs′ ,i (x)cs,i+1 cs′ ,i+1 (w), x = xs,i , x = xs′ ,i , otherwise.   xcs′ ,i+1 (w), ′ xcs,i+1 (w), cs ,i cs,i (xw) =  ′ σs ,i σs,i (x)cs′ ,i+1 cs,i+1 (w), x = xs,i , x = xs′ ,i , otherwise. (6) By analogy we have Thus we may write cs,i cs′ ,i (xw) =  cs′ ,i cs,i (xw), σs,i σs′ ,i (x)cs,i+1 cs′ ,i+1 (w), x ∈ {xs,i , xs′ ,i }, otherwise. (7) Since the cycles σs,i and σs′ ,i commute, we see by (7) that the transformations cs,i and cs′ ,i commute as well. −1 If x 6= xs,i , then σs,i (x) 6= xs,i and by the recursion (4) we have: c−1 s,i (xw) =  xw, −1 (x)c−1 σs,i s,i+1 (w), 15 x = xs,i , x 6= xs,i By easy inductive argument we obtain for any integer k:  xw, x = xs,i , cks,i (xw) = k k σs,i (x)cs,i+1 (w), x 6= xs,i . (8) By our assumption, for each 1 ≤ s ≤ n1 the cycles σs,i (i ≥ 0) do not have a uniformly bounded length. Hence, by the recursion (8) we see that the transformation cs,i is of infinite order for every 1 ≤ s ≤ n1 . Similarly, if n1 < s ≤ n, then the length of σs,i is equal to rs−n1 and consequently the order of cs,i is equal to rs−n1 . We define the subset V ⊆ Zn as follows: V = {(m1 , . . . , mn ) : 0 ≤ ms < rs−n1 for n1 < s ≤ n}. By above, we obtain the equality Ki = {CM,i : M ∈ V}, where for every M = (m1 , . . . , mn ) ∈ V we define mn 1 CM,i = cm 1,i · . . . · cn,i . We show that the above presentation is unique. To this end to each CM,i we associate the permutation ΣM,i ∈ Sym(Xi ) defined as follows: m1 · . . . · σnm,ni . ΣM,i = σ1,i In the following lemma, which is a generalization of the recursion (8), for every M ∈ V we denote by M (s) (1 ≤ s ≤ n) the element arising from M by the substitution of ms for 0. Lemma 1. We have CM,i (xw) =  xCM (s) ,i+1 (w), ΣM,i (x)CM,i+1 (w), x = xs,i , otherwise (9) ∗ for all x ∈ Xi , w ∈ X(i+1) and M ∈ V. Proof. (of Lemma 1) Let M = (m1 , . . . , mn ) and for every 1 ≤ s ≤ n let Ms ∈ V arises from M by the substitution of every component mi with i > s for 0. Since Mn = M and for every 1 ≤ s ≤ n we have ms 1 CMs ,i = cm 1,i · . . . · cs,i , it is sufficient to show that for every 1 ≤ s ≤ n the following recursion holds:  xCM (s′ ) ,i+1 (w), x = xs′ ,i , 1 ≤ s′ ≤ s, s CMs ,i (xw) = (10) ΣMs ,i (x)CMs ,i+1 (w), otherwise. 16 1 For s = 1 we have CMs ,i = CM1 ,i = cm 1,i and (10) coincides with the recursion (8). Let us fix s > 1 and let us assume that (10) is true for s − 1. Then we have CMs ,i (xw) s = cm s,i (CMs−1 ,i (xw)) = ( m cs,is (xCM (s′ ) ,i+1 (w)), s−1 = s cm s,i (ΣMs−1 ,i (x)CMs−1 ,i+1 (w)), x = xs′ ,i , 1 ≤ s′ < s, otherwise. ms But, if x = xs′ ,i for some 1 ≤ s′ < s, then σs,i (x) = x. Thus by the recursion (8) we have in this case ms ms s cm s,i (xCM (s′ ) ,i+1 (w)) = σs,i (x)cs,i+1 (CM (s′ ) ,i+1 (w)) = xCM (s′ ) ,i+1 (w). s−1 s−1 s m m1 s−1 (x) = x. Thus by the recursion (8) ·. . .·σs−1,i If x = xs,i , then ΣMs−1 ,i (x) = σ1,i we have in this case CMs ,i (xw) s = cm s,i (ΣMs−1 ,i (x)CMs−1 ,i+1 (w)) = s = cm s,i (xCMs−1 ,i+1 (w)) = = xCMs−1 ,i+1 (w) = = xCM (s) ,i+1 (w). s If x ∈ / {x1i , . . . , xs,i }, then ΣMs−1 ,i (x) 6= ΣMs−1 ,i (xs,i ) = xs,i . Thus by the recursion (8) we have in this case CMs ,i (xw) s = cm s,i (ΣMs−1 ,i (x)CMs−1 ,i+1 (w)) = ms s (ΣMs−1 ,i (x))cm = σs,i s,i+1 (CMs−1 ,i+1 (w)) = = ΣMs ,i (x)CMs ,i+1 (w). To sum up, we conclude the recursion (10), which finishes the proof of the lemma. mn 1 Now, let us assume that the product CM,i = cm 1,i · . . . · cn,i represents the identity mapping for some M = (m1 , . . . , mn ) ∈ V. Let n1 < s ≤ n. Since there is x0 ∈ Xi which belongs to the cycle σs,i and x0 ∈ / {x1,i , . . . , xn,i }, we ms (x0 ). Thus the divisibility have by Lemma 1: x0 = CM,i (x0 ) = ΣM,i (x0 ) = σs,i rs−n1 | ms holds and consequently ms = 0. If 1 ≤ s ≤ n1 , then there is i0 > i such that the length of the cycle σs,i0 is greater than |ms |. Let w = ∗ x0 x1 . . . xi0 −i ∈ X(i) be a word such that the last letter xi0 −i belongs to the / {x1,j+i , . . . , xn,j+i } for every 0 ≤ j ≤ i − i0 . By Lemma 1 cycle σs,i0 and xj ∈ we obtain CM,i (w) = ΣM,i (x0 )ΣM,i+1 (x1 ) . . . ΣM,i0 (xi0 −i ). ms (xi0 −i ). Consequently Since CM,i (w) = w, we have xi0 −i = ΣM,i0 (xi0 −i ) = σs,i 0 ms = 0, which finishes the proof of Proposition 3. 17 4.2. The groups Hi We consider the transformations dk,s,i = a−k · cs,i · aki , i ≥ 0, k ∈ Z, i 1 ≤ s ≤ n. For every i ≥ 0 we define the group Hi = hdk,s,i : k ∈ Z, 1 ≤ s ≤ ni. (k) For every i ≥ 0 and k ∈ Z we also define the subgroup Ki (k) Ki ≤ Hi , where −k k k = a−k i Ki ai = {ai CM,i ai : M ∈ V}. (k) By Proposition 3 we have the isomorphism Ki ≃ Ki ≃ K. (k) Proposition 4. The group Hi is a direct sum of its subgroups Ki and the mapping dk,s,i 7→ (. . . , 0, 0, κs , 0, 0, . . .), k ∈ Z, for k ∈ Z 1 ≤ s ≤ n, where the generator κs ∈ LK on the right hand side is in the k-th position, induces the isomorphism Hi ≃ Z K. Proof. By the recursion for ai and by (4) we easily obtain:  xw, x = αki (xs,i ), dk,s,i (xw) = σs,i (x)dk,s,i+1 (w), x 6= αki (xs,i ) ∗ . Further, by the recursion for all x ∈ Xi and w ∈ X(i+1) ′ obtain for all k, k ∈ Z, 1 ≤ s, s′ ≤ n, x ∈ Xi and w ∈ recursion:   xdk′ ,s′ ,i+1 (w), ′ ′ dk,s,i dk ,s ,i (xw) = xdk,s,i+1 (w),  σs,i σs′ ,i (x)dk,s,i+1 dk′ ,s′ ,i+1 (w), for ai and by (6) we ∗ X(i+1) the following x = αki (xs,i ), ′ x = αki (xs′ ,i ), otherwise, and hence dk,s,i dk′ ,s′ ,i (xw) =  dk′ ,s′ ,i dk,s,i (xw), σs,i σs′ ,i (x)dk,s,i+1 dk′ ,s′ ,i+1 (w), ′ x ∈ {αki (xs,i ), αki (xs′ ,i )}, otherwise. Consequently, the group Hi is abelian. For k ∈ Z, M ∈ V and i ≥ 0 we denote k dk,M,i = a−k i CM,i ai . (k) In particular, we have Ki = {dk,M,i : M ∈ V}. Lemma 2. If M = (m1 , . . . , mn ) ∈ V, then mn 1 dk,M,i = dm k,1,i · . . . · dk,n,i . 18 Proof (of Lemma 2). We have dk,M,i = mn k 1 a−k · cm 1,i · . . . · cn,i · ai = i = −k −k k k k n 2 1 · cm · cm (a−k · cm n,i · ai ) = 2,i · ai ) · . . . · (ai 1,i · ai ) · (ai i = · cn,i · aki )mn = (a−k · c1,i · aki )m1 · . . . · (a−k i i = mn 1 dm k,1,i · . . . · dk,n,i , which finishes the proof of Lemma 2. Since the group Hi is abelian, we see by Lemma 2 that every element of Hi can be presented as a product dk1 ,M1 ,i · . . . · dkt ,Mt ,i , t ≥ 1, (11) where k1 < k2 < . . . < kt , kj ∈ Z, Mj ∈ V, 1 ≤ j ≤ t. We call the weight of the product (11) as a number ||M1 || + . . . + ||Mt ||, where ||M || = |m1 | + . . . + |mn | for any M = (m1 , . . . , mn ) ∈ V. Now, we have to show that every element of Hi is represented uniquely by such a product. Suppose not. Then there are products (11) with nonzero weights defining the identity transformation. By Proposition 3 it must be t ≥ 2 in every such product. Let us choose t ≥ 2, i0 ≥ 0 and the triples (k1 , M1 , i0 ), . . . , (kt , Mt , i0 ) ∈ Z × V × {i0 }, such that the product dk1 ,M1 ,i0 · . . . · dkt ,Mt ,i0 defines the identity transformation and its nonzero weight is minimal. We can assume that each Mj ∈ V (1 ≤ j ≤ t) is a nonzero vector. For every i ≥ 0 we define the product Di = dk1 ,M1 ,i · . . . · dkt ,Mt ,i . There is a letter zi ∈ Xi (i ≥ 0) which does not belong to any of the cycles πs,i (1 ≤ s ≤ n). In particular zi 6= αki 1 (xs,i ) for every 1 ≤ s ≤ n. For every 1 ≤ s ≤ n we also have k ΣM1 ,i · ΣM2 ,i · . . . · ΣMj ,i (zi ) 6= αi j+1 (xs,i ), 1 ≤ j ≤ t. (12) Let us denote: zi′ = ΣM1 ,i · . . . · ΣMt ,i (zi ), i ≥ 0. ∗ X(i+1) For all i ≥ 0, k ∈ Z, M ∈ V, x ∈ Xi and w ∈ following recursion  xdk,M (s) ,i+1 (w), dk,M,i (xw) = ΣM,i (x)dk,M,i+1 (w), 19 we obtain by Lemma 1 the x = αki (xs,i ), otherwise. (13) The above recursion and the inequalities (12) imply ′ ′ Di (zi zi+1 . . . zi+j w) = zi′ zi+1 . . . zi+j Di+j+1 (w) (14) ∗ for all i, j ≥ 0 and w ∈ X(i+j+1) . Since Di0 defines the identity mapping, we obtain by (14) that for every i ≥ i0 the transformation Di also defines the identity mapping. Let 1 ≤ s ≤ n be such that the s-th component of M1 is not (s) equal to 0. In particular ||M1 || < ||M1 ||. Let ν ≥ i0 be such that the length L of the cycle πs,ν is greater than the sum |k1 | + . . . + |kt |. Let us consider the letter k1 (xs,ν ) ∈ Xν . z = αkν1 (xs,ν ) = πs,ν By the equality (13) we have dk1 ,M1 ,ν (zw) = zdk1 ,M (s) ,ν+1 (w) 1 (15) ∗ for every w ∈ X(ν+1) . For every 2 ≤ j ≤ t we obviously have: ΣM2 ,ν · . . . · ΣMj ,ν (z) = z. (16) z∈ / {αkνj (x1,ν ), . . . , αkνj (xn,ν )}. (17) For 2 ≤ j ≤ t we also have Indeed, suppose to othe contrary that k z = αkνj (xs′ ,ν ) = πs′j,ν (xs′ ,ν ) for some 2 ≤ j ≤ t and 1 ≤ s′ ≤ n. Then we have k k1 (xs,ν ) = πs′j,ν (xs′ ,ν ). πs,ν Since the cycles π1,ν , . . . , πn,ν are pairwise disjoint, we obtain s = s′ . Hence kj −k1 (xs,ν ) = xs,ν and consequently L | kj − k1 , which contradicts with the πs,ν inequality L > |k1 | + . . . + |kt |. By (13) and by (15)-(17) we obtain Dν (zw) = ∗ zD(w) for all w ∈ X(ν+1) , where D = dk1 ,M (s) ,ν+1 · dk2 ,M2 ,ν+1 · . . . · dkt ,Mt ,ν+1 . 1 Since Dν defines the identity mapping, the product D also defines the identity (s) mapping. Since ||M1 || < ||M1 || and each Mj (2 ≤ j ≤ t) is a nonzero vector, we see that D has a nonzero weight which is smaller than the weight of Di0 , contrary to our assumption. This finishes the proof of Proposition 4. Lemma 3. We have a−k · dk1 ,M1 ,i · . . . · dkt ,Mt ,i · aki = dk+k1 ,M1 ,i · . . . · dk+kt ,Mt ,i i for all i ≥ 0, t ≥ 1, k, kj ∈ Z and Mj ∈ V (1 ≤ j ≤ t). 20 Proof. The left side of the above equality is equal to (a−k · dk1 ,M1 ,i · aki ) · (a−k · dk2 ,M2 ,i · aki ) · . . . · (a−k · dkt ,Mt ,i · aki ). i i i Now, it suffices to see that the j-th factor (1 ≤ j ≤ t) of the above product is equal to a−k · dkj ,Mj ,i · aki i −kj = ai−k · (ai = ai −(k+kj ) k · CMj ,i · ai j ) · aki = k+kj · CMj ,i · ai = dk+kj ,Mj ,i . This finishes the proof of Lemma 3. ∗ Let us fix 1 ≤ s ≤ n. For all i, j ≥ 0 let us consider the words wi,j ∈ X(i) , where wi,j = xs,i xs,i+1 . . . xs,i+j . Lemma 4. For every i ≥ 0 the following hold: (i) the group Hi is contained in the stabilizer of any wi,j , (ii) for every nonzero integer k there is j ≥ 0 such that aki (wi,j ) 6= wi,j . Proof. For j ≥ 0 and M ∈ V we have ΣM,i+j (xs,i+j ) = xs,i+j . Thus by the equality (13) we see that for every j ≥ 0 the transformations dk,M,i+j (k ∈ Z, M ∈ V) stabilize the letter xs,i+j . Consequently, the elements dk,M,i (k ∈ Z, M ∈ V) stabilize the words wi,j (j ≥ 0). Since the elements generate the group Hi , we obtain (i). To show (ii) we see by the recursion for ai that for every j ≥ 0 we have: k k aki (wi,j ) = αki (xs,i ) . . . αki+j (xs,i+j ) = πs,i (xs,i ) . . . πs,i+j (xs,i+j ). Now, the claim follows from the assumption that the lengths of cycles πs,i+j (j ≥ 0) are not uniformly bounded. 4.3. The groups Gi Let us define the groups Gi = hai , c1,i , . . . , cn,i i = hKi , ai i, i ≥ 0. Directly by the definition of the group Hi we obtain Ki ≤ Hi ⊳ Gi . By Lemma 4 the group Hi intersects trivially with the cyclic group hai i. Thus Gi is a semidirect product of the subgroups Hi and L hai i. By Proposition 4 the subgroup Hi is isomorphic with the direct sum Z K via dk,s,i 7→ (. . . , 0, 0, κs , 0, 0, . . .), k ∈ Z, 1 ≤ s ≤ n, where κs ∈ K on the right hand side is in the k-th position. By Lemma 4 the cyclic group hai i is isomorphic, via ai 7→ u, with Z. By Lemma 3 this cyclic 21 group acts on Hi by L conjugation via the shift. Consequently, we obtain the isomorphism Gi ≃ Z K ⋊ Z = K ≀ Z, which is induced by the mapping ai 7→ u, cs,i 7→ ηs (1 ≤ s ≤ n). Further, for the group G(Ai ) generated by the i-th shift (i ≥ 0) of the automaton A we have G(Ai ) = hai , (b1 )i , . . . , (bn )i i. Since cs,i = (bs )i a−1 i , we obtain G(Ai ) = Gi and the mapping ai 7→ u, (bs )i 7→ ηs · u, 1 ≤ s ≤ n induces an isomorphism G(Ai ) ≃ K ≀ Z, which finishes the proof of Theorem 2. 5. Examples 5.1. The lamplighter group Z ≀ Z The lamplighter group Z ≀ Z is an example of a 2-generated torsion-free not finitely presented metabelian group. It is generated L by two elements u, η, where u is a generator of Z in the semidirect product Z Z ⋊ Z and η = (. . . , 0, 0, 0, u, 0, 0, 0, . . .), where u on the right hand side is in zero position. This group has the following k k′ presentation hu, η : [η u , η u ] = 1, k, k ′ ∈ Zi, where [x, y] = x−1 y −1 xy. Basing on the construction of the automaton A we can present the lamplighter group Z≀Z as a group defined by a 2-state self-similar automaton over the changing alphabet as follows. Let (ri )i≥0 be an arbitrary unbounded sequence of integers ri > 1 and let X = (Xi )i≥0 be the changing alphabet with Xi = {1, 2, . . . , 2ri }. Let A = (X, Q, ϕ, ψ) be an automaton with the 2-element set Q = {a, b} of internal states and the following sequences ϕ = (ϕi )i≥0 , ψ = (ψi )i≥0 of transition and output functions:   a, q = b, x = 1, αi (x), q = a, ϕi (q, x) = ψi (q, x) = q, otherwise, βi (x), q = b, where the permutations αi , βi of the set Xi may be defined, for example, as follows: αi = (1, 3, . . . , 2ri − 1), βi = (1, 3, . . . , 2ri − 1)(2, 4, . . . , 2ri ). By above, we see that the automaton A is self-similar and the group G(A) defined by A is isomorphic with the lamplighter group Z ≀ Z via a0 7→ u, c0 7→ η, where c0 = b0 a−1 0 . 22 5.2. The lamplighter groups Zn ≀ Z, n ≥ 1 Generalizing the above construction, we can describe for every positive integer n the wreath product Zn ≀ Z as a group defined by the following self-similar automaton A = (X, Q, ϕ, ψ): • X = (Xi )i≥0 , where Xi = {1, 2, . . . , 2nri } and (ri )i≥0 is an arbitrary unbounded sequence of integers greater than 1, • Q = {a, b0 , . . . , bn−1 },  a, q = bs , x = 2sri + 1, 0 ≤ s ≤ n − 1, • ϕi (q, x) = q, otherwise,  αi (x), q = a, • ψi (q, x) = βs,i (x), q = bs , 0 ≤ s ≤ n − 1, where the permutations αi , βs,i of the set Xi are defined as follows αi = n−1 Y (2sri + 1, 2sri + 3, . . . , 2sri + 2ri − 1), s=0 βs,i = αi · (2sri + 2, 2sri + 4, . . . , 2sri + 2ri ). 5.3. The lamplighter groups Cr ≀ Z, r > 1 For lamplighter groups of the form Cr ≀ Z (r > 1) the corresponding selfsimilar automaton representation A = (X, Q, ϕ, ψ) may be described as follows: • Xi = {1, 2, . . . , ri , ri + 1, ri + 2, . . . , ri + r}, where (ri )i≥0 is an arbitrary unbounded sequence of integers greater than 1, • Q = {a, b},  a, q = b, x = 1, • ϕi (q, x) = q, otherwise,  αi (x), q = a, • ψi (q, x) = βi (x), q = b, where the permutations αi , βi ∈ Sym(Xi ) may be defined, for example, as follows: αi = (1, 2, . . . , ri ), βi = (1, 2, . . . , ri )(ri + 1, ri + 2, . . . , ri + r). References [1] I. Bondarenko, R. Grigorchuk, R. Kravchenko, Y. Muntyan, V. Nekrashevych, Z. Sunic, D. Savchuk. Groups generated by 3-state automata over a 2-letter alphabet II, Journal of Mathematical Sciences Vol. 156, N 1 (2009), 187-208. 23 [2] A. Erschler. Piecewise automatic groups, Duke Math. J., 134:3 (2006), 591613. [3] A. Erschler. Automatically presented groups, Groups Geom. Dyn., (2007), 47-59. [4] R. Grigorchuk. Solved and Unsolved Problems Around One Group, in Infinite Groups: Geometric, Combinatorial and Dynamical Aspects. Progress in Mathematics Series, Vol. 248, L. Bartholdi, T. Ceccherini-Silberstein, T. Smirnova-Nagnibeda, A. Żuk (Eds.), 2005, 413 p. [5] R. Grigorchuk, P. Linnell, T. Schick and A. Żuk. On a question of Atiyah, C. R. Acad. Sci., Paris, Sr. I, Math. 331 (2000), 663-668. [6] R. Grigorchuk, V. Nekrashevych, V. Sushchanskii. Automata, Dynamical Systems and Groups, Proceedings of Steklov Institute of Mathematics, 231:128-203, 2000. [7] R. Grigorchuk, A. Żuk. The Lamplighter Group as a Group Generated by a 2-state Automaton and its spectrum, Geometriae Dedicata, 87:209-244, 2001. [8] L. Kaloujnine. La structure des p-groupes de Sylow des groupes symetriques finis, Ann. Sci. Ecole Norm. Sup. (3), 65:239-276, 1948. [9] M. Kambites, P. Silva, B. Steinberg. The spectra of lamplighter groups and Cayley machines, Geometriae Dedicata, Vol. 120, No. 1. (2006), pp. 193227. [10] B. Mikolajczak. Algebraic and structural automata theory, translated from the Polish Annals of Discrete Mathematics, Vol. 44 (North-Holland Publishing Co., Amsterdam, 1991). [11] V. Nekrashevych. Self-similar groups, volume 117 in Mathematical Surveys and Monographs. Amer. Math. Soc., Providence, RI, 2005. [12] A. V. Rozhkov. Theory of Aleshin type groups, Math. Notes Vol. 40, Number 5, (1986), 827-836. [13] A. V. Rozhkov. Conditions for finiteness in Aleshin-type groups, Algebra and Logic, Vol. 29, Number 6 (1990), 467-479. [14] A. V. Rozhkov. Stabilizers of corteges in Aleshin-type groups, Math. Notes Vol. 47, Number 3 (1990), 307-312. [15] P. Silva, B. Steinberg. On a class of automata groups generalizing lamplighter groups, Internat. J. Algebra Comput. 15 (2005), no. 5-6, 1213-1234. [16] V. I. Sushchanskyy. Periodic permutation p-groups and the unrestricted Burnside problem, Soviet Math. Dokl. vol 20 (1979), N4, 766-770. 24 [17] V. I. Sushchanskyy. Wreath products and periodic factorable groups, Math. USSR Sbornik, vol. 67 (1990), N2, 535-553. [18] V. I. Sushchanskyy. Wreath products and factorable groups, St. Petersburg Math, v. 6 (1995), N1, 173-198. [19] M. Vorobets, Ya. Vorobets. On a free group of transformations defined by an automaton, Geom. Dedicata 124 (2007) 237-249. [20] A. Woryna. On permutation groups generated by time-varying Mealy automata, Publ. Math. Debrecen, 67(1-2):115-130, 2005. [21] A. Woryna. Representations of a free group of rank two by time-varying Mealy automata, Discuss. Math. Gen. Algebra Appl. 25 (1) (2005) 119-134. [22] A. Woryna. On generation of wreath products of cyclic groups by two state time varying Mealy automata, Internat. J. Algebra Comput., 16(2):397-415, 2006. [23] A. Woryna. The concept of duality for automata over a changing alphabet and generation a free group by such automata, Theoret. Comput. Sci., 412(45):6420-6431, 2011. 25
4math.GR
HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH arXiv:1603.03671v5 [math.GR] 22 Sep 2017 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER Abstract. We show that any free product of two (non-trivial) countable groups, one of them being infinite, admits a faithful and homogeneous action on the Random Graph. We also show that a large class of HNN extensions or free products, amalgamated over a finite group, admit such an action and we extend our results to groups acting on trees. Finally, we show the ubiquity of finitely generated free dense subgroups of the automorphism group of the Random Graph whose action on it have all orbits infinite. Introduction The Random Graph (or Rado graph or Erdös-Rényi graph) is the unique, up to isomorphism, countable infinite graph R having the following property : for any pair of disjoint finite subsets (U, V ) of the set of vertices there exists a vertex adjacent to any vertex in U and not adjacent to any vertex in V . Using this property and a model theoretic device called “back-andforth” one can show that R is homogeneous: any graph isomorphism between finite induced subgraphs can be extended to a graph automorphism of R. Hence, the Random Graph plays the same role in graph theory as the Uryshon’s space does in metric spaces. The Random Graph has been popularized by Erdös and Rényi in a serie of papers between 1959 and 1968. They showed [ER63] that if a countable graph is chosen at random, by selecting edges independently with probability 21 from the set of 2-elements subsets of the vertex set, then almost surely the resulting graph is isomorphic to R. Erdös and Rényi conclude that this Theorem demolishes the theory of infinite random graphs (however, the world of finite random graphs is much less predictable). Since almost all countable graphs are isomorphic to R, Erdös and Renyi did not give an explicit construction of the Random Graph. However, by using the uniqueness property of R, it is clear that one may give many different explicit constructions. Such an explicit description was proposed by Rado [Ra64]. The uniqueness property of R may also be used to show many stability properties (if small changes are made on R then the resulting graph is still isomorphic to R) and to construct many automorphisms of R as well as group actions on R. The homogeneity of R means that its automorphism group Aut(R) is large: it acts transitively on vertices, edges and more generally on finite configurations of any given isomorphism type. We will view it as a closed subset of the Polish group (for the topology of pointwise convergence) of the bijections of the vertices. Hence, it has a natural Polish group topology. The goal of this paper is to understand the countable dense subgroups of Aut(R). The first construction of such subgroups was given in [Mac86], where Macpherson showed that Aut(R) contains a dense free subgroup on 2 generators. More generally, he showed that if M is a ℵ0 categorical structure, then Aut(M ) has a dense free subgroup of rank ℵ0 . Melles and Shelah This research has been partially supported by the ANR Blanc ANR-14-CE25-0004, acronym GAMME. 1 2 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER [MS94] proved that, if M is a saturated model of a complete theory T with |M | = λ > |T |, then Aut(M ) has a dense free subgroup of cardinality 2λ . By using the extension property for graphs, Bhattacharjee and Macpherson showed in [BM05] that Aut(R) has a dense locally finite subgroup. We call a group action Γ y R homogeneous if, for any graph isomorphism ϕ : U → V between finite induced subgraphs U, V of R, there exists g ∈ Γ such that g(u) = ϕ(u) for all u ∈ U . The homogeneity of R means exactly that Aut(R) y R is homogeneous. Moreover, it is easy to check that a subgroup G < Aut(R) is dense if and only if the action G y R is homogeneous. Hence, to understand the countable dense subgroups of Aut(R) one has to identity the class HR of all countable groups that admit a faithful and homogeneous action on R. Besides free groups ([Mac86], [MS94], [GK03] and [GS15]) and a locally finite subgroup ([BM05]), little is known on groups in HR . There are some obvious obstructions to be in the class HR : it is easy to deduce from the simplicity of Aut(R), proved in [Tr85], that any Γ ∈ HR must be icc and not solvable (see Corollary 2.14). Our first positive result is the following. We shall use the notion of highly core-free subgroups, which is a strengthening of core-freeness, introduced in [FMS15] and recalled in Section 1.2. As an example, let us note that a finite subgroup in an icc group is highly core-free. Theorem A. If Γ1 , Γ2 are non-trivial countable groups and Γ1 is infinite then Γ1 ∗ Γ2 ∈ HR . If Σ < Γ1 , Γ2 is a common finite subgroup such that Σ is highly core-free in Γ1 and, either Γ2 is infinite and Σ is highly core-free in Γ2 , or Γ2 is finite and [Γ2 : Σ] ≥ 2, then Γ1 ∗ Γ2 ∈ HR . Σ To prove Theorem A, we first show that any infinite countable group Γ admits a “nice” action on R (Corollary 2.8). To produce this explicit action on R we use an inductive limit process. Then starting from an action of Γ := Γ1 ∗ Γ2 y R and an automorphism α ∈ Aut(R), we construct a natural action πα : Γ y R and we show that the set {α ∈ Aut(R) : πα is faithful and homogeneous} is a dense Gδ in Aut(R) whenever the initial action is “nice enough” (Theorem 3.1). We follow the same strategy for amalgamated free products but we need to be more careful since we also have to realize the amalgamated free product relations. Using the same strategy, we prove an analogous result for HNN-extensions. Theorem B. Let H be an infinite countable group, Σ < H a finite subgroup and θ : Σ → H an injective group homomorphism. If both Σ and θ(Σ) are highly core-free in H then HNN(H, Σ, θ) ∈ HR . By Bass-Serre theory we obtain the following result. Corollary C. Let Γ be a countable group acting, without inversion, on a non-trivial tree T in the sense of [Se77]. If every vertex stabilizer of T is infinite and, for every edge e of T the stabilizer of e is finite and is a highly core-free subgroup of both the stabilizer of the source of e and the stabilizer of the range of e, then Γ ∈ HR . Finally, we study the ubiquity of dense free subgroups of Aut(R). Gartside and Knight [GK03] gave necessary and sufficient conditions for a Polish topological group to be “almost free1”, and gave applications to permutation groups, profinite groups, Lie groups and unitary 1A Polish group G is almost free if for all n ≥ 2, the set {(g , . . . , g ) ∈ Gn : g , . . . , g freely generates a 1 n 1 n free subgroup of G} is a dense Gδ in Gn . HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 3 groups. In particular, they showed that if M is ℵ0 -categorical then Aut(M ) is almost free. There are abundant results on the ubiquity of free subgroups in various classes of groups. In particular, almost freeness of various oligomorphic2 groups has been shown in [Dr85], [Ka92], [GMR93], [Ca96] and [GK03]. We prove the following result. For k ≥ 2 and ᾱ = (α1 , . . . , αk ) ∈ Aut(R)k , we denote by hᾱi the subgroup of Aut(R) generated by α1 , . . . , αk , and we set Ak := {ᾱ ∈ Aut(R)k : hᾱi y R has all orbits infinite}. Since Ak is closed in Aut(R)k , it is a Baire space. Theorem D. For all k ≥ 2, the set of ᾱ = (α1 , . . . , αk ) ∈ Aut(R)k such that hᾱi is a free group with basis ᾱ and hᾱi y R is homogeneous with all orbits infinite is a dense Gδ in Ak . To prove Theorem D we use the “back-and-forth” device (Theorem 6.6). The paper is organized as follows. In Section 1 we introduce the notations used in the paper about graphs, random extensions and inductive limits. In Section 2 we introduce the Random Graph and we show how to extend any group action on a finite or countable graph to a group action on the Random Graph. We study the basic properties of the extension and the properties of groups acting homogeneously of R. We prove Theorem A in Section 3, Theorem B in Section 4, Corollary C in Section 5 and Theorem D in Section 6. 1. preliminaries 1.1. Graphs. A Graph G is a pair (V (G), E(G)), where V (G) is a set and E(G) ⊂ V (G)2 is a subset such that E(G) ∩ ∆ = ∅, where ∆ = {(u, u) ∈ V (G)2 : u ∈ V (G)}, and (u, v) ∈ E(G) ⇔ (v, u) ∈ E(G). For u, v ∈ V (G), we write u ∼ v if (u, v) ∈ E(G). Any subset U ⊂ V (G) has a natural structure of a graph, called the induced graph structure on U and denoted by GU , defined by V (GU ) = U and E(GU ) = E(G) ∩ (U × U ). Let G1 , G2 be two graphs. A morphism of graphs from G1 to G2 is a map π : V (G1 ) → V (G2 ) such that, for all u, v ∈ V (G1 ), u ∼ v =⇒ π(u) ∼ π(v). A morphism π is called an isomorphism of graphs if π is moreover bijective and its inverse π −1 : V (G2 ) → V (G1 ) is a morphism of graphs. A morphism of graphs π : G1 → G2 is called open if for all u, v ∈ V (G1 ), u ∼ v ⇔ π(u) ∼ π(v). Note that the inclusion ι of a subset U ⊂ V (G) gives an open and injective graph homomorphism ι : GU → G. Moreover, an injective graph homomorphism π : G1 → G2 induces an isomorphism between G1 and the induced graph on π(V (G1 )) if and only if π is open. A partial isomorphism of a graph G is an isomorphism between induced subgraphs of G. For a partial isomorphism ϕ, we write d(ϕ) its domain and r(ϕ) its range. We denote by P (G) the set of finite partial isomorphisms i.e. those partial isomorphism for which d(ϕ) is finite (hence r(ϕ) is also finite). Given a graph G, we write Aut(G) the group of isomorphisms from G to G. An action of a group Γ on the graph G is a group homomorphism α : Γ → Aut(G). We write Γ y G an action of Γ on G. Let S(X) be the group of bijections of a countable set X. It is a Polish group under the topology of pointwise convergence. Note that Aut(G) ⊂ S(V (G)) is a closed subgroup hence, Aut(G) is a Polish group. 2A permutation group G < S(X) is called oligomorphic if G has only finitely many orbits on X n for every n ∈ N. 4 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER 1.2. Group actions. The main purpose of this section is to introduce the Random Extension of a group action on a graph. This notion will be crucial to produce explicit actions on the Random Graph (Section 2.2). Many properties of an action are preserved by its Random Extension (Proposition 1.1). However, the freeness property is not preserved; except for actions of torsion-free groups. Nevertheless, a weaker -but still useful- property, that we call strong faithfulness, is preserved. An action Γ y X of a group Γ on a set X is called strongly faithful if, for all finite subsets F ⊂ X with X \ F 6= ∅ one has g(x) = x ∀x ∈ / F =⇒ g = 1. When X is finite, an action on X is strongly faithful if and only if it is free. When X is infinite, an action Γ y X is strongly faithful if and only if for all g ∈ Γ \ {1}, the set {x ∈ X : gx 6= x} is infinite. Note also that, for an action Γ y X with X infinite, one has: almost free (i.e. every non-trivial group element has finitely many fixed points) =⇒ strongly faithful =⇒ faithful. An action Γ y G of a group Γ on a graph G is called homogeneous if for all ϕ ∈ P (G) (recall that d(ϕ) and r(ϕ) are supposed to be finite), there exists g ∈ Γ such that gu = ϕ(u) for all u ∈ d(ϕ). It is easy to see that Γ y G is homogeneous if and only if the image of Γ in Aut(G) is dense. We say that Γ y G has infinite orbits (resp. is free, resp. is strongly faithful) if the action Γ y V (G) on the set V (G) has infinite orbits i.e. all orbits are infinite (resp. is free, resp. is strongly faithful). We say that Γ y G disconnects the finite sets if for all finite subsets F ⊂ V (G) there exists g ∈ Γ such that gF ∩ F = ∅ and, for all u, v ∈ F , gu ≁ v. Note that if Γ y G disconnects the finite sets then it has infinite orbits and the converse holds when E(G) = ∅. We say that Γ y G is singular if there exists u ∈ V (G) and g ∈ Γ such that gu ∼ u. The notion of a highly core-free subgroup Σ < Γ with respect to an action Γ y X on the set X has been introduced in [FMS15]. We will use here a similar notion for an action Γ y G on a graph G. Let Σ < Γ be a subgroup and Γ y G be an action on the graph G. We say that Σ is highly core-free with respect to Γ y G if for every finite subset F ⊂ V (G) there exists g ∈ Γ such that gF ∩ ΣF = ∅, gu ≁ v for all u, v ∈ F , Σgu ∩ Σgv = ∅ for all u, v ∈ F with u 6= v and σgu ≁ gv for all u, v ∈ F and all σ ∈ Σ \ {1}. It is clear that if Σ is highly core-free w.r.t. Γ y G then the action Γ y G disconnects the finite sets. We adopt a terminology slightly different from [FMS15]: if E(G) = ∅ then Σ is highly core-free with respect to the action Γ y G on the graph G in the sense explained above if and only if Σ is strongly highly core-free with respect to the action Γ y V (G) on the set in the sense of [FMS15, Definition 1.7]. In particular, if E(G) = ∅ and Γ y G is free then Σ is highly core-free with respect to Γ y G if and only if Σ is highly-core free in Γ (see [FMS15, Definition 1.1 and Lemma 1.6]. Note also that the trivial subgroup is highly core-free w.r.t. Γ y G if and only if the action Γ y G disconnects the finite sets and, if Σ is highly core-free with respect to Γ y G then every subgroup of Σ is highly core-free with respect to Γ y G. In particular, if there exists a subgroup Σ which is highly core-free with respect to Γ y G then the action Γ y G disconnects the finite sets. We refer to [FMS15] for examples of highly core-free subgroups and we just recall that any finite subgroup of an icc group is a highly core-free subgroup. In the sequel we always assume that G is a non-empty graph. The Random Extension of G is e = V (G) ⊔ Pf (V (G)), where Pf (X) denotes the set of non-empty the graph Ge defined by V (G) HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 5 e = E(G) ⊔ (⊔U ∈P (V (G)) U × {U }) ⊔ (⊔U ∈P (V (G)) {U } × U ) finite subsets of a set X, and E(G) f f e is exactly the set of neighbors of the vertex U ∈ V (G). e Note that the i.e., U ⊂ V (G) ⊂ V (G) e defines an injective and open graph homomorphism ι : G → G. e inclusion ι : V (G) → V (G) Given an action Γ y G there is a natural action Γ y Ge for which the map ι is Γ-equivariant. e and, for U ∈ Pf (V (G)) ⊂ V (G) e and Indeed, we take the original action of Γ on V (G) ⊂ V (G) g ∈ Γ, we define the action of g on U by g · U := gU := {gu : u ∈ U } ∈ Pf (V (G)). This e U ∈ Pf (V (G)) and all g ∈ Γ we have defines an action of Γ on Ge since for all z ∈ V (G), z ∼ U ⇔ z ∈ U ⇔ gz ∈ gU ⇔ g · z ∼ g · U. It is clear that ι is Γ-equivariant. Proposition 1.1. The following holds. (1) Γ y Ge is faithful if and only if Γ y G is faithful. (2) Γ y Ge is non-singular if and only if Γ y G is non-singular. (3) Γ y Ge has infinite orbits if and only if Γ y G has infinite orbits. (4) Γ y Ge disconnects the finite sets if and only if Γ y G disconnects the finite sets. (5) If Γ has torsion then Γ y Ge is not free and if Γ is torsion-free, G is infinite and Γ y G is free then Γ y Ge is free. (6) If Γ y G is strongly faithful and G is infinite then Γ y Ge is strongly faithful. (7) Let Σ < Γ be a subgroup. Σ is highly core-free w.r.t. Γ y G if and only if it is highly e core-free w.r.t. Γ y G. Proof. The proofs of (1) to (6) are routine verifications and left to the reader. We prove e be a statement (7) below. Suppose that Σ is highly core-free w.r.t. Γ y G. Let F ⊂ V (G) finite set and write F = F1 ⊔ F2 , where F1 = F ∩ V (G) and F2 = F ∩ Pf (V (G)). Define the finite subset Fe = F1 ∪ (∪U ∈F2 U ) ⊂ V (G). Since Σ is highly core-free w.r.t. Γ y G there exists g ∈ Γ such that gFe ∩ ΣFe = ∅, u ≁ gv for all u, v ∈ Fe, Σgu ∩ Σgv = ∅ for all u, v ∈ Fe with u 6= v and σgu ≁ gv for all u, v ∈ Fe and all σ ∈ Σ \ {1}. Obviously, gF ∩ ΣF = ∅ and for all u, v ∈ F , gu ≁ v. Let us show that Σgu ∩ Σgv = ∅ for all u, v ∈ F with u 6= v. If both u, v are in F1 or if (u ∈ F1 and v ∈ F2 ) or (v ∈ F2 and u ∈ F1 ) this is obvious. So assume that U, V ∈ F2 . We need to show that ΣgU = ΣgV =⇒ U = V . We know that for all u ∈ U and all v ∈ V we have u 6= v =⇒ Σgu ∩ Σgv = ∅. Hence, if there exists x ∈ ΣgU ∩ ΣgV then we find σ, σ ′ ∈ Σ such that σgU = σ ′ gV . It follows that if u ∈ U then there exists v ∈ V such that σgu = σ ′ gv hence, Σgu = Σgv so we must have u = v ∈ V . Hence, U ⊂ V . Similarly, V ⊂ U so that U = V . It remains to show that σgu ≁ gv for all u, v ∈ F and σ ∈ Σ \ {1}. For σ ∈ Σ \ {1} it is clear that σgu ≁ gv for all u, v ∈ F2 and also for all u, v ∈ F1 . Let u ∈ F1 and V ∈ F2 . If σ ∈ Σ is such that σgu ∼ gV then there exists v ∈ V ⊂ Fe such that σgu = gv. Hence Σgu = Σgv which implies that u = v. It follows that σ = 1. The converse is obvious.  1.3. Inductive limits. Let Xn be a sequence of countable sets with injective maps ιn : Xn → Xn+1 . Let l ≥ n. Define the injective map ιl,n : Xn → Xl by ιl,n = ιl−1 ◦ · · · ◦ ιn if l > n, and ιn,n = id. Observe that for all n ≤ m ≤ l, ιl,m ◦ ιm,n = ιl,n . Let X∞ be the inductive limit i.e. X∞ = ⊔Xn / ∼, where x ∼ y if and only if there exists n, m ∈ N and l ≥ n, m such that x ∈ Xn , y ∈ Xm and ιl,n (x) = ιl,m (y). Observe that we have injections ι∞,n : Xn → X∞ , ι∞,n (x) = [x], where [x] denotes the class of the element x ∈ Xn ⊂ ⊔n Xn 6 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER for the equivalence relation described above. Those injections satisfy X∞ = ∪↑n ι∞,n (Xn ) and ι∞,n+1 ◦ ιn = ι∞,n for all n ∈ N. Actually X∞ is the unique set, up to a canonical bijection, such that there exists injections ι∞,n : Xn → X∞ satisfying X∞ = ∪↑n ι∞,n (Xn ) and ι∞,n+1 ◦ ιn = ιn for all n ∈ N. Note that X∞ is at most countable. Actually, it is finite if and only if for all n ∈ N, Xn is finite and there exists l ∈ N such that ιk (Xk ) = Xk+1 for all k ≥ l. Given a sequence of actions πn : Γ → S(Xn ) of a group Γ on the set Xn satisfying πn+1 (g) ◦ ιn = ιn ◦ πn (g) for all n ∈ N and g ∈ Γ, we define the inductive limit action π∞ : Γ → S(X∞ ) by π∞ (g) ◦ ι∞,n = ι∞,n ◦ πn (g) for all n ∈ N. The next proposition contains some standard observations on inductive limits. Since this results are well known and very easy to check, we omit the proof. Proposition 1.2. The following holds. (1) (2) (3) (4) If there exists n ∈ N such that Γ y Xn is faithful then Γ y X∞ is faithful. Γ y X∞ is free if and only if Γ y Xn is free for all n ∈ N. If Γ y Xn is strongly faithful for all n ∈ N then Γ y X∞ is strongly faithful. Γ y X∞ has infinite orbits if and only if Γ y Xn has infinite orbits for all n ∈ N. Let Gn be a sequence of countable graphs with injective graphs homomorphisms ιn : Gn → Gn+1 . We define the inductive limit graph G∞ by defining V (G∞ ) = ∪↑ ι∞,n (V (Gn )) as the inductive limit of the V (Gn ) with respect to the maps ιn and E(G∞ ) is the set of couples (u, v) ∈ V (G∞ )2 for which there exists k ≥ n, m with u = ι∞,n (u0 ), u0 ∈ V (Gn ), v = ι∞,m (v0 ), v0 ∈ V (Gm ) and (ιk,n (u0 ), ιk,m (v0 )) ∈ E(Gk ). We collect elementary observations on the inductive limit graph in the following proposition. Proposition 1.3. The following holds. (1) ι∞,n is a graph homomorphism for all n ∈ N. (2) If ιn is open for all n ∈ N then ι∞,n is open for all n ∈ N. (3) If Γ y G∞ disconnects the finite sets then Γ y Gn disconnects the finite sets for all n ∈ N. The converse holds when ιn is open for all n ∈ N. (4) If Γ y G∞ is non-singular then Γ y Gn is non-singular for all n ∈ N. The converse holds when ιn is open for all n ∈ N. (5) Let Σ < Γ be a subgroup. If Σ is highly core-free w.r.t. Γ y G∞ then Σ is highly core-free w.r.t. Γ y Gn for all n. The converse holds when ιn is open for all n. Proof. The proofs of (1) to (4), being routine verifications, are left to the reader. Let us prove (5). Suppose that Σ is highly core-free with respect to Γ y G∞ and let n ∈ N and F ⊂ V (Gn ) be a finite subset. Let F ′ = ι∞,n (F ) ⊂ V (G∞ ) and take g ∈ Γ such that gF ′ ∩ ΣF ′ = ∅, gu′ ≁ v ′ for all u′ , v ′ ∈ F ′ , Σgu′ ∩ Σgv ′ = ∅ for all u′ , v ′ ∈ F ′ with u′ 6= v ′ and σgu′ ≁ gv ′ for all u′ , v ′ ∈ F ′ and all σ ∈ Σ \ {1}. It follows that gF ∩ ΣF = ∅ and Σgu ∩ Σgv = ∅ for all u, v ∈ F with u 6= v. Moreover, ι∞,n (gu) ≁ ι∞,n (v) and ι∞,n (σgu) ≁ ι∞,n (gv) for all u, v ∈ F and all σ ∈ Σ \ {1}. By (1) we have gu ≁ v and σgu ≁ gv for all u, v ∈ F and all σ ∈ Σ \ {1}. Suppose now that ιn is open and Σ is highly core-free w.r.t. Γ y Gn for all n ∈ N. Let F ⊂ V (G∞ ) be a finite set and take n ∈ N large enough so that F = ι∞,n (F ′ ), where F ′ ⊂ V (Gn ) is a finite set. Take g ∈ Γ such that gF ′ ∩ ΣF ′ = ∅, gu′ ≁ v ′ and σgu′ ≁ gv ′ for all u′ , v ′ ∈ F ′ and all σ ∈ Σ \ {1} and Σgu′ ∩ Σgv ′ = ∅ for all u′ , v ′ ∈ F ′ with u′ 6= v ′ . Since ι∞,n injective we have gF ∩ ΣF = ∅ and Σgu ∩ Σgv = ∅ for all u, v ∈ F with u 6= v. HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 7 Moreover, since ι∞,n is open (by (2)) we have gu ≁ v and σgu ≁ gv for all u, v ∈ F and all σ ∈ Σ \ {1}.  2. The Random Graph 2.1. Definition of the Random Graph. Given a graph G and subsets U, V ⊂ V (G) we define GU,V as the induced subgraph on the subsets of vertices V (GU,V ) := {z ∈ V (G) \ (U ∪ V ) : z ∼ u , ∀u ∈ U and z ≁ v , ∀v ∈ V }. Note that V (GU,V ) may be empty for some subsets U and V . To ease the notations we will denote by the same symbol GU,V the induced graph on V (GU,V ) and the set of vertices V (GU,V ). Definition 2.1. We say that a graph G has property (R) if, for any disjoint finite subsets U, V ⊂ V (G), GU,V 6= ∅. Note that a graph with property (R) is necessarily infinite. We recall the following well-known result (See e.g. [Ca97] or [Ca99]) that will be generalized later (Proposition 2.5). Proposition 2.2. Let G1 , G2 be two infinite countable graphs with property (R) and A ⊂ V (G1 ), B ⊂ V (G2 ) be finite subsets. Any isomorphism between the induced graphs ϕ : (G1 )A → (G2 )B extends to an isomorphism ϕ : G1 → G2 . There are many ways to construct a countable graph with property (R). Proposition 2.2 shows that a countable graph with property (R) is unique, up to isomorphism. Such a graph is denoted by R and called the Random Graph. It also follows from Proposition 2.2 that every ϕ ∈ P (R) admits an extension ϕ ∈ Aut(R) (i.e. ϕ|d(ϕ) = ϕ). Proposition 2.2 is also useful to show stability properties of the graph R as done in the next Proposition. Proposition 2.3. The following holds. (1) For all finite subset A ⊂ V (R), the induced subgraph RV (R)\A on V (R) \ A is isomorphic to R. (2) For all finite and disjoint U, V ⊂ V (R), the graph RU,V is isomorphic to R. (3) For all non-empty countable graph G, the inductive limit G∞ of the sequence G0 = G and Gn+1 = Gen (with ιn : Gn → Gn+1 the inclusion) is isomorphic to R. In particular, every countable graph is isomorphic to an induced subgraph of R. Proof. (1). Let U, V ⊂ V (R)\A be disjoint finite subsets. Apply property (R) with the disjoint finite subsets U ′ = U ⊔ A, V ⊂ V (R) and get z ∈ V (R) \ (U ′ ∪ V ) = (V (R) \ A) \ (U ∪ V ) such that z ∼ u for all u ∈ U and z ≁ v for all v ∈ V . Hence the countable graph induced on V (R) \ A has property (R). (2). Since RU,V is at most countable, it suffices to check that RU,V has property (R) and it is left to the reader. (3). Since G is either finite and non-empty or infinite countable, the inductive limit is infinite countable and it suffices to check that it has property (R). Since ιn is open for all n ∈ N it follows from Proposition 1.3 that we may and will assume that ι∞,n = id and (Gn )n is an increasing sequence of induced subgraphs of G∞ such that G∞ = ∪↑ Gn . Let U, V be two finite and disjoint subsets of the inductive limit. Let n large enough so that U, V V (Gn ). If U 6= ∅, we consider the element z = U ∈ Pf (V (Gn )) ⊂ V (Gn+1 ) ⊂ V (G∞ ) and if U = ∅, we consider any element z = {x} ∈ Pf (V (Gn )) ⊂ V (Gn+1 ) ⊂ V (G∞ ) for x ∈ V (Gn ) \ V . 8 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER Then, by definition of the Random extension, we have, for all u ∈ U , (u, z) ∈ E(Gn+1 ) and, for all v ∈ V , (v, z) ∈ / E(Gn+1 ). Since Gn+1 is the induced subgraph on V (Gn+1 ) we have z ∈ (G∞ )U,V . The last assertion also follows from Proposition 1.3 since the inclusion of G0 = G in the inductive limit is open.  Remark 2.4. The construction of Proposition 2.3, assertions (3), shows the existence of R. This construction may also be performed starting with any countable graph G, even G = ∅, and replacing, in the construction of the Random Extension, Pf (X) by all the finite subsets of X (even the empty one). The resulting inductive limit is again isomorphic to R. We shall need the following generalization of Proposition 2.2. The proof is done by using the “back-and-forth” device. Proposition 2.5. For k = 1, 2, let πk : Σ y R be two free and non-singular actions of the finite group Σ. For any partial isomorphism ϕ ∈ P (R) such that π1 (Σ)d(ϕ) = d(ϕ) and π2 (Σ)r(ϕ) = r(ϕ) and ϕπ1 (σ) = π2 (σ)ϕ for all σ ∈ Σ, there exists ϕ ∈ Aut(R) such that ϕπ1 (σ) = π2 (σ)ϕ for all σ ∈ Σ and ϕ|d(ϕ) = ϕ. ∞ Proof. Write V (R) \ d(ϕ) = ⊔∞ k=1 π1 (Σ)xk and V (R) \ r(ϕ) = ⊔k=1 π2 (Σ)yk . We define inductively pairwise distinct integers kn , pairwise distinct integers ln , subsets An = d(ϕ) ⊔ π1 (Σ)xk1 ⊔ . . . ⊔ π1 (Σ)xkn ⊂ V (R), Bn = r(ϕ) ⊔ π2 (Σ)yl1 ⊔ · · · ⊔ π2 (Σ)yln ⊂ V (R) and isomorphisms ϕn : An → Bn such that ϕn |d(ϕ) = ϕ, ϕn π1 (σ) = π2 (σ)ϕn for all σ ∈ Σ, An ⊂ An+1 , Bn ⊂ Bn+1 , ϕn+1 |An = ϕn and V (R) = ∪An = ∪Bn . Once it is done, the Proposition is proved since we can define ϕ ∈ Aut(R), x ∈ An 7→ ϕn (x) which obviously satisfies ϕπ1 (σ) = π2 (σ)ϕ for all σ ∈ Σ and ϕ|d(ϕ) = ϕ. Define A0 = d(ϕ), B0 = r(ϕ) and ϕ0 = ϕ. If step n is constructed and n is even define kn+1 = Min{k ≥ 1 : xk ∈ / An }, U = {x ∈ An : x ∼ xkn+1 }, V = An \ U and W = {y ∈ V (R) \ Bn : y ∼ ϕn (x) for all x ∈ U and y ≁ ϕn (x) for all x ∈ V }. By property (R), W is non-empty. Let ln+1 = Min{k ≥ 1 : π2 (Σ)yk ∩ W 6= ∅}. Replacing yln+1 by an element in π2 (Σ)yln+1 we may and will assume that yln+1 ∈ W . Define An+1 = An ⊔ π1 (Σ)xkn+1 and Bn+1 = Bn ⊔ π2 (Σ)yln+1 . By freeness, we may define a bijection ϕn+1 : An+1 → Bn+1 by ϕn+1 |An = ϕn and ϕn+1 (π1 (σ)xkn+1 ) = π2 (σ)ykn+1 , for all σ ∈ Σ. By construction, it is an isomorphism between the induced graphs. Indeed if x ∈ An is such that x ∼ π1 (σ)xkn+1 for some σ ∈ Σ then π1 (σ −1 )x ∼ xkn+1 so yln+1 ∼ ϕn (π1 (σ −1 )x) = π2 (σ −1 )ϕn (x) hence, ϕn+1 (x) = ϕn (x) ∼ π2 (σ)yln+1 = ϕn+1 (π1 (σ)xkn+1 ). Since ϕn is a graph isomorphism and since both actions are non-singular (which means that there is no edges on induced subgraphs of the form πk (Σ)z) it shows that ϕn+1 is also a graph isomorphism. By construction we also have that ϕn+1 π1 (σ) = π2 (σ)ϕn+1 for all σ ∈ Σ. If n is odd define ln+1 = Min{k ≥ 1 : yk ∈ / Bn }, U = {y ∈ Bn : y ∼ yln+1 }, V = Bn \ U and −1 W = {x ∈ V (G1 ) \ An : x ∼ ϕ−1 n (y) for all y ∈ U and x ≁ ϕn (y) for all y ∈ V }. By property (R), W is non-empty. Let kn+1 = Min{k ≥ 1 : xk ∈ W }. We may and will assume that xkn+1 ∈ W . Define An+1 = An ⊔ π1 (Σ)xkn+1 , Bn+1 = Bn ⊔ π2 (Σ)yln+1 . By construction, the map ϕn+1 : An+1 → Bn+1 defined by ϕn+1 |An = ϕn and ϕn+1 (π1 (σ)xkn+1 ) = π2 (σ)ykn+1 , σ ∈ Σ, is an isomorphism between the induced graphs. HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 9 F Let us show that ∪An = d(ϕ) ⊔ ∞ n=1 π1 (Σ)xkn = V (R). It suffices to show that {kn : n ≥ ∗ 1} = N . Suppose that there exists s ∈ N, s 6= kn for all n ≥ 1. Since the elements kn are pairwise distinct, the set {k2n+1 : n ≥ 0} is not bounded. Hence, there exists n ∈ N such that s < k2n+1 . By definition, we have k2n+1 = Min{k ≥ 1 : xk ∈ / A2n }. However we have xs ∈ / A2n and s < k2n+1 , a contradiction. The proof of ∪Bn = V (R) is similar.  2.2. Induced action on the Random Graph. Let Γ y G be an action of a group Γ on a non-empty countable graph G and consider the sequence of graphs G0 = G and Gn+1 = Gen with the associated sequence of actions Γ y Gn . By Proposition 2.3, assertion (3), the inductive limit action defines an action of Γ on R. We call it the induced action of Γ y G on R. We will show in Corollary 2.7 that many properties on the action Γ y G are preserved when passing to the induced action Γ y R. However, freeness is not preserved and one has to consider a weaker notion that we call property (F ). Definition 2.6. We say that an action Γ y G has property (F ) if for all finite subsets S ∈ Γ \ {1} and F ⊂ V (G), there exists x ∈ V (G) \ F such that x ≁ u for all u ∈ F and gx 6= x for all g ∈ S. Note that any action with property (F ) is faithful and any free action on R has property (F ). Corollary 2.7. Let Γ y G be an action of a group Γ on a non-empty countable graph G and write Γ y R the induced action. The following holds. (1) If Γ y G is faithful then Γ y R is faithful. (2) Γ y G has infinite orbits if and only if Γ y R has infinite orbits. (3) Γ y G disconnects the finite sets if and only if Γ y R disconnects the finite sets. (4) Γ y G is non-singular if and only if Γ y R is non-singular. (5) Let Σ < Γ be a subgroup. Σ is highly core-free w.r.t. Γ y G if and only if Σ is highly core-free w.r.t. Γ y R. (6) If Γ y G is free, G is infinite and Γ is torsion free then Γ y R is free. (7) If Γ y G is strongly faithful, G is infinite then Γ y R has property (F ). Proof. The assertions (1) to (6) follow directly follows from Propositions 1.1, 1.2 and 1.3. Let fn . Let F ⊂ V (G∞ ) us prove (7). We recall that R = G∞ = ∪↑ Gn , where G0 = G and Gn+1 = G and S = {g1 , . . . , gn } ⊂ Γ \ {1} be finite subsets. Since Γ y G is strongly faithful we deduce, by Proposition 1.1 (6) and induction that Γ y GN is strongly faithful for all N . Let N ∈ N be large enough so that F ⊂ V (GN ). We can use strong faithfulness (and the fact that GN is infinite) to construct, by induction, pairwise distinct vertices y1 , . . . yn ∈ V (GN ) \ F such that yi 6= gj yj for all 1 ≤ i, j ≤ n. Define x := {y1 , . . . yn } ∈ Pf (V (GN )) ⊂ V (GN +1 ) ⊂ V (G∞ ) = V (R). By construction x ∈ V (R) \ F and gk x 6= x for all k. Since the inclusion GN +1 ⊂ G∞ = R is open, we also have x ≁ u for all u ∈ F .  Corollary 2.8. Every infinite countable group Γ admits an action Γ y R that is nonsingular, has property (F ) and disconnects the finite sets. If Γ is torsion-free then the action can be chosen to be moreover free. Proof. Consider the graph G defined by V (G) = Γ and E(G) = ∅ with the action Γ y G given by left multiplication which is free, has infinite orbits and hence disconnects the finite sets and is non-singular since E(G) = ∅. By Corollary 2.7 the induced action Γ y R has the required properties.  10 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER 2.3. The Random Extension with paramater. We now describe a parametrized version of the induced action. As explained before, freeness is not preserved when passing to the action on the Random Extension and also when passing to the induced action. However, it is easy to compute explicitly the fixed points of any group element in the Random Extension. Now, given an action Γ y G and some fixed group elements in Γ, one can modify the Random Extension by removing the fixed points of our given group elements to make them act freely on this modified version of the Random Extension. Then, the inductive limit process associated to this modified Random Extension will also produce, in some cases, the Random Graph with an action on it, for which our given group elements act freely. We call this process the parametrized Random Extension. Let π : Γ y G be an action of the group Γ on the graph G and F ⊂ Γ be a subset. From the action π, we have a canonical action Γ y Ge on the Random Extension. Remark 2.9. If G is infinite, for any g ∈ Γ, the set of fixed points of g for the action on the Random Extension is either empty or of the form : FixGe(g) = {A ∈ Pf (V (G)) of the form A = ⊔N i=1 hgixi with hgixi finite ∀i} ⊔ FixG (g). In particular, when the action π is free one has FixGe(g) = ∅ whenever g has infinite order and, if g has finite order, then FixGe(g) is the set of finite unions of hgi-orbits. e \ {Fix e(g) : g ∈ F }. Note that if gF g −1 = F for all Consider the induced subgraph on V (G) G −1 e g ∈ Γ then, since gFixGe(h) = FixGe(ghg ), the induced subgraph on V (G)\{Fix Ge(g) : g ∈ F } is globally Γ-invariant and we get an action of Γ on it by restriction for which the elements of F act freely by construction. However, for a general F , we cannot restrict the action and this is why we will remove more sets then the fixed points of elements of F . Assume from now that G is a graph and l ∈ N∗ . We define the graph Gel , the Random Extension of G with parameter l, as the induced subgraph on e V (Gel ) := V (G) ⊔ {U ∈ Pf (V (G)) : gcd(l, |U |) = 1} ⊂ V (G). Fix an action Γ y G. Since for any g ∈ Γ and any finite subset U ⊂ V (G) one has |gU | = |U |, the subgraph Gel is globally Γ-invariant and we get an action π el : Γ y Gel by restriction. Note that for any u ∈ V (G) one has {u} ∈ V (Gel ). It is clear that the inclusions of G in Gel and of Gel in Ge are Γ-equivariant open (and injective) graph homomorphisms. Proposition 2.10. Let π : Γ y G be an action and l ∈ N∗ . (1) π is faithful if and only if π el is faithful. (2) π is non-singular if and only if π el is non-singular. (3) π has infinite orbits if and only if π el has infinite orbits. (4) π disconnects the finite sets if and only if π el disconnects the finite sets. (5) Let Σ < Γ be a subgroup. Σ is highly core-free w.r.t. π if and only if Σ is highly core-free w.r.t. π el . (6) If π is strongly faithful and G is infinite then π el is strongly faithful. (7) Let Σ < Γ be a finite subgroup. If Σ y G is free and G is infinite then Σ y Ge|Σ| is free. Proof. Assertions (1) to (6) are obvious. Let us prove (7). Since any non-trivial element of Σ acts freely, it follows from Remark 2.9 that any finite subset U ⊂ V (G) in the set of fixed HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 11 points of σ ∈ Σ is a finite union of sets of the form hσix, hence its size is a multiple of the order of σ and U ∈ / V (Ge|Σ| ).  We can now construct the induced action on R of the action π with paramter l. Define the g sequence of graphs G0 = G with action π0 = π of Γ on it and, for n ≥ 0, Gn+1 = (G n )l with l the action πn+1 = (f πn )l . Consider the inductive limit G∞ with the inductive limit action l : Γ y G l on it. We list the properties of π in the next Proposition. π∞ l ∞ Proposition 2.11. Let π : Γ y G be an action on a countable graph G and let l ∈ N∗ . l ≃ R. (1) If G is infinite then G∞ l is faithful. (2) π is faithful if and only if π∞ l has infinite orbits. (3) π has infinite orbits if and only if π∞ l disconnects the finite sets. (4) π disconnects the finite sets if and only if π∞ (5) Let Σ < Γ be a subgroup. Σ is highly core-free w.r.t. to π if and only if Σ is highly l . core-free w.r.t. to π∞ l is non-singular. (6) π is non-singular if and only if π∞ |Σ| (7) Let Σ < Γ be a finite subgroup. If Σ y G is free and G is infinite then Σ y G∞ is free. l has property (F ). (8) Suppose that Γ and G are infinite. If π is strongly faithful then π∞ Proof. The assertions (2) to (7) follow directly follows from Propositions 2.10, 1.2 and 1.3. (1). Since G is infinite it follows that Gn is infinite for all n and G∞ is infinite. Hence, it suffices to check that G∞ has property (R). Let U, V ⊂ V (G∞ ) be two finite subsets such that U ∩ V = ∅ and let n ∈ N such that U, V ⊂ V (Gn ). Since V (Gn ) \ V is infinite, we may find a finite subset x ⊂ V (Gn ) \ V such that U ⊂ x and gcd(|x|, |Σ|) = 1. Hence, |Σ| fn )|Σ| ) ⊂ V (G∞ x ∈ V ((G ) is such that x ∼ u for all u ∈ U and x ≁ v for all v ∈ V . l ) be finite subsets. Taking a larger S if (8). Let S = {g1 , . . . , gn } ⊂ Γ \ {1} and F ⊂ V (G∞ necessary, we may and will assume that gcd(n, l) = 1. We repeat the proof of Corollary 2.7, assertion (7) and we get pairwise distinct vertices y1 , . . . yn ∈ V (GN ), where F ⊂ V (GN ) such that the element x = {y1 , . . . , yn } ∈ Pf (V (GN )) ⊂ GeN satisfies the desired properties. Since l gcd(|x|, l) = 1, x ∈ V ((Gg  N )l ) ⊂ V (G∞ ). This concludes the proof. Let Σ < Γ be a finite subgroup of an infinite countable group Γ. By considering the induced action on R with parameter l = |Σ| of the free action by left multiplication Γ y Γ and view Γ as a graph with no edges, we obtain the following Corollary. Corollary 2.12. Let Σ < Γ be a finite subgroup of an infinite countable group Γ. There exists a non-singular action Γ y R with property (F ) such that the action Σ y R is free, the action H y R of any infinite subgroup H < Γ disconnects the finite sets and, for any pair of intermediate subgroups Σ′ < H ′ < Γ, if Σ′ is a highly core-free in H ′ then Σ′ is highly core-free w.r.t. H ′ y R. 2.4. Homogeneous actions on the Random Graph. Proposition 2.13. Let Γ y R be an homogeneous action. The following holds. (1) Γ y R disconnects the finite sets. (2) If N < Γ is normal then either N acts trivially or it acts homogeneously. 12 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER Proof. (1). Let F ⊂ V (R) be a finite set and write F = {u1 , . . . , un } where the vertices ui are pairwise distinct. We shall define inductively pairwise distinct vertices v1 , . . . vn ∈ V (R) \ F such that, for all 1 ≤ i, j ≤ n, ui ∼ uj ⇔ vi ∼ vj and ui ≁ vj . Take v1 ∈ R∅,F . Suppose that for a given 1 ≤ l ≤ n − 1 we have pairwise distinct vertices v1 , . . . , vl ∈ V (R) \ F such that, for all 1 ≤ i, j ≤ l, ui ∼ uj ⇔ vi ∼ vj and ui ≁ vj . Let U = {vi : 1 ≤ i ≤ l s.t. ui ∼ ul+1 } and V = {vi : 1 ≤ i ≤ l s.t. ui ≁ ul+1 }. Then U and V ⊔ F are finite and disjoint. Take vl+1 ∈ RU,V ⊔F . Then vl+1 ∼ vi ⇔ ul+1 ∼ ui and vl+1 ≁ ui for all 1 ≤ i ≤ l and vl+1 ∈ / F ⊔ {vi : 1 ≤ i ≤ l}. This concludes the construction of the vi by induction. By the properties of the vi , the map ϕ : {ui : 1 ≤ i ≤ n} → {vi : 1 ≤ i ≤ n} defined by ϕ(ui ) = vi is an isomorphism between the induced subgraphs. Since Γ y R is homogeneous there exists g ∈ Γ such that gui = vi for all 1 ≤ i ≤ n. It follows that gF ∩ F = ∅ and gu ≁ u′ for all u, u′ ∈ F . (2). Write N the closure of the image of N inside Aut(R). By [Tr85], the abstract group Aut(R) is simple and, since N is normal in Aut(R) one has either N = {1} or N = Aut(R).  Using the previous Proposition and arguing as in [MS13, Corollary 1.6] we obtain the following Corollary. Corollary 2.14. If Γ ∈ HR then Γ is icc and not solvable. 3. Actions of amalgamated free products on the Random Graph Let Γ1 , Γ2 be two countable groups with a common finite subgroup Σ and define Γ = Γ1 ∗ Γ2 . Suppose that we have a faithful action Γ y R and view Γ < Aut(R). Σ Let Z := {α ∈ Aut(R) : ασ = σα ∀σ ∈ Σ}. Note that Z is a closed subgroup of Aut(R), hence a Polish group. Moreover, for all α ∈ Z, there exists a unique group homomorphism πα : Γ → Aut(R) such that:  g if g ∈ Γ1 , πα (g) = −1 α gα if g ∈ Γ2 . When Σ is trivial, we have Z = Aut(R). In this section we prove the following result. Theorem 3.1. If Γ y R is non-singular and has property (F ), Σ is highly core-free w.r.t. Γ1 , Γ2 y R and Σ y R is free then the set O = {α ∈ Z : πα is homogeneous and faithful} is a dense Gδ in Z. In particular, for every countably infinite groups Γ1 , Γ2 we have Γ1 ∗Γ2 ∈ HR and, for any finite highly core-free subgroup Σ < Γ1 , Γ2 we have Γ1 ∗ Γ2 ∈ HR . Σ Proof. We separate the proof in two lemmas. Lemma 3.2. If Σ y R is free and non-singular and Σ is highly core-free w.r.t. Γ1 , Γ2 y R then the set U = {α ∈ Z : πα is homogeneous} is a dense Gδ in Z. Proof. Since U = ∩ϕ∈P (R) Uϕ , where Uϕ = {α ∈ Z : ∃g ∈ Γ such that πα (g)|d(ϕ) = ϕ} is obviously open, it suffices to show that Uϕ is dense for all ϕ ∈ P (R). Let ϕ ∈ P (R), α ∈ Z and F ⊂ V (R) a finite subset. It suffices to show that there exists γ ∈ Z and g ∈ Γ such that γ|F = α|F and πγ (g)|d(ϕ) = ϕ. Since Σ is highly core-free w.r.t. Γ1 y R, there exists g1 ∈ Γ1 such that g1 d(ϕ) ∩ ΣF = ∅, g1 x ≁ u and σg1 x ≁ g1 x′ for all u ∈ ΣF , x, x′ ∈ d(ϕ), σ ∈ Σ \ {1} and Σg1 x ∩ Σg1 x′ = ∅ for all x, x′ ∈ d(ϕ) with x 6= x′ . There exists also g2 ∈ Γ1 such that HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 13 g2−1 r(ϕ) ∩ (ΣF ⊔ Σg1 d(ϕ)) = ∅ and g2−1 y ≁ u , σg2−1 y ≁ g2−1 y ′ for all u ∈ ΣF ⊔ Σg1 d(ϕ), y, y ′ ∈ r(ϕ), σ ∈ Σ \ {1} and Σg2−1 y ∩ Σg2−1 y ′ = ∅ for all y, y ′ ∈ r(ϕ) with y 6= y ′ . Define F ′ = α(ΣF ) ⊔ Σα(g1 d(ϕ)). Since Σ is highly core-free w.r.t. Γ2 y R, there exists h ∈ Γ2 such that hF ′ ∩ F ′ = ∅ and for all u, v ∈ F ′ and σ ∈ Σ \ {1}, hu ≁ v, σhu ≁ hv and Σhu ∩ Σhu′ = ∅ for all u, u′ ∈ F ′ with u 6= u′ . Define A = (ΣF ) ⊔ Σg1 d(ϕ) ⊔ Σg2−1 r(ϕ) and B = α(ΣF ) ⊔ α(Σg1 d(ϕ)) ⊔ Σhα(g1 d(ϕ)). Note that ΣA = A and, since α ∈ Z, ΣB = B. Since the Σ action is free, we can define a bijection γ0 : A → B by γ0 (u) = α(u) for u ∈ ΣF ⊔ Σg1 d(ϕ) and γ0 (σg2−1 ϕ(x)) = σhg1 x, for all x ∈ d(ϕ) and σ ∈ Σ. By construction, γ0 is an isometry and γ0 σ = σγ0 for all σ ∈ Σ. By Proposition 2.5 there exists an extension γ ∈ Z of γ0 . Note that γ|F = α|F moreover, with g = g2 hg1 ∈ Γ we have, for all x ∈ d(ϕ), πγ (g)x = g2 γ −1 hγg1 x = g2 γ −1 hα(g1 x) = g2 g2−1 ϕ(x) = ϕ(x).  Lemma 3.3. If Σ y R is free, Γ y R is non-singular and has property (F ) then the set V = {α ∈ Z : πα is faithful} is a dense Gδ in Z. Proof. Writing V = ∩g∈Γ\{1} Vg , where Vg = {α ∈ Z : πα (g) 6= id} is obviously open, it suffices to show that Vg is dense for all g ∈ Γ \ {1}. If g ∈ Γk \ {1} (k = 1, 2) then it is easy to see that Vg = Z. Hence it suffices to show that Vg is dense for all g reduced of length at least 2. Write g = gin . . . gi1 , where n ≥ 2 and gik ∈ Γik \ Σ reduced expression for g. Fix α ∈ Z and F ⊂ V (R) a finite subset. Define the finite sets ! n [ Fe := ΣF ∪ α(ΣF ) ∪ (gi . . . gi )−1 (ΣF ∪ α(ΣF ) ⊂ V (R), l 1 l=1 and σgik . . . gi1 : 1 ≤ l < k ≤ n, σ ∈ Σ} ⊂ Γ\{1}. S := {σgil . . . gi1 : 1 ≤ l ≤ n, σ ∈ Σ}∪{gi−1 . . . gi−1 1 l Using property (F ) for Γ y R we find a vertex x ∈ V (R)\ Fe such that x ≁ u for all u ∈ Fe and gx 6= x for all g ∈ S. In particular, the sets ΣF (resp. α(ΣF )) and Σx, Σgil . . . gi1 x for 1 ≤ l ≤ n are pairwise distincts the only F vertices on the induced Fnand, since Γ y R is non-singular, ′ subgraph on Y := ΣF ⊔( l=1 Σgil . . . gi1 x)⊔Σx (resp. Y := Σα(F )⊔( nl=1 Σgil . . . gi1 x)⊔Σx) are the ones with extremities in ΣF (resp. Σα(F )). Hence, the bijection γ0 : Y → Y ′ defined by γ0 |ΣF = α|ΣF and γ0 |Y \ΣF = id is a graph isomorphism between the induced subgraphs. By construction and since α ∈ Z we have γ0 σ = σγ0 for all σ ∈ Σ. By Proposition 2.5 there exists an extension γ ∈ Z of γ0 . Then γ|F = α|F and πγ (gin . . . gi1 )x = gin . . . gi1 x 6= x, since gin . . . gi1 ∈ S. Hence γ ∈ Vg .  End of the proof of the Theorem. The first part of the Theorem follows from Lemmas 3.2 and 3.3 since O = U ∩ V . The last part follows from the first part and Corollary 2.12.  We have a similar result when only one of the factors in the free product is infinite. Theorem 3.4. Suppose that Γ2 is finite such that [Γ2 : Σ] ≥ 2. If Γ y R is non-singular and has property (F ), Σ is highly core-free w.r.t. Γ1 y R and the action Γ2 y R is free then the set O = {α ∈ Z : πα is homogeneous and faithful} is a dense Gδ in Z. In particular, for every countably infinite group Γ1 , for every finite nontrivial group Γ2 we have Γ1 ∗ Γ2 ∈ HR and, for any commun finite subgroup Σ < Γ1 , Γ2 such that Σ is highly core-free in Γ1 and [Γ2 : Σ] ≥ 2 we have Γ1 ∗ Γ2 ∈ HR . Σ 14 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER Proof. We first prove the analogue of Lemma 3.2. Lemma 3.5. If Σ is highly core-free w.r.t. Γ1 y R, Γ2 is finite and Γ2 y R is free and non-singular such that [Γ2 : Σ] ≥ 2, then the set U = {α ∈ Z : πα is homogeneous} is a dense Gδ in Z. Proof. Since U = ∩ϕ∈P (R) Uϕ , where Uϕ = {α ∈ Z : ∃g ∈ Γ such that πα (g)|d(ϕ) = ϕ} is obviously open, it suffices to show that Uϕ is dense for all ϕ ∈ P (R). Let ϕ ∈ P (R), α ∈ Z and F ⊂ V (R) a finite subset. Since Σ is highly core-free w.r.t. Γ1 y R, there exists g1 ∈ Γ1 such that g1 d(ϕ) ∩ ΣF = ∅, g1 x ≁ u and σg1 x ≁ g1 x′ for all u ∈ ΣF , x, x′ ∈ d(ϕ), σ ∈ Σ \ {1} and Σg1 x ∩ Σg1 x′ = ∅ for all x, x′ ∈ d(ϕ) with x 6= x′ . There exists also g2 ∈ Γ1 such that g2−1 r(ϕ) ∩ (ΣF ⊔ Σg1 d(ϕ)) = ∅ and g2−1 y ≁ u , σg2−1 y ≁ g2−1 y ′ for all u ∈ ΣF ⊔ Σg1 d(ϕ), y, y ′ ∈ r(ϕ), σ ∈ Σ \ {1} and Σg2−1 y ∩ Σg2−1 y ′ = ∅ for all y, y ′ ∈ r(ϕ) with y 6= y ′ . In the sequel we write d(ϕ) = {x1 , . . . , xn }. Claim. There exists pairwise distinct vertices z1 , . . . , zn ∈ V (R) \ Γ2 α(F ) such that • • • • • Γ2 zi ∩ Γ2 zj = ∅, ∀1 ≤ i 6= j ≤ n; Σhzi ∩ Σzi = ∅, ∀h ∈ Γ2 \ Σ, ∀ 1 ≤ i ≤ n; hzi ≁ zj , ∀h ∈ Γ2 \ {1}, ∀1 ≤ i, j ≤ n; xi ∼ xj ⇔ zi ∼ zj , ∀1 ≤ i, j ≤ n; zi ≁ u, ∀u ∈ Γ2 α(F ), ∀1 ≤ i ≤ n. Proof of the Claim. We define inductively the vertices z1 , . . . , zn ∈ V (R) \ Γ2 α(F ). For n = 1 we take z1 ∈ R∅,Γ2 α(F ) \ Γ2 α(F ). Then z1 ∈ / Γ2 α(F ) and, for all u ∈ Γ2 α(F ) and for all h ∈ Γ2 , u ≁ z1 and hz1 ≁ z1 since Γ2 y R is non-singular. Moreover, since Γ2 y R is free, we have hz1 6= σzi for all h ∈ Γ2 \ Σ and all σ ∈ Σ. Suppose that, for a given 1 ≤ l ≤ n − 1, we have pairwise distinct vertices z1 , . . . , zl ∈ V (R) \ Γ2 α(F ) such that Γ2 zi ∩ Γ2 zj = ∅, ∀1 ≤ i 6= j ≤ l, Σhzi ∩ Σzi = ∅, ∀ h ∈ Γ2 \ Σ, ∀ 1 ≤ i ≤ l, hzi ≁ zj , ∀h ∈ Γ2 \ {1}, xi ∼ xj ⇔ zi ∼ zj and zi ≁ u, ∀u ∈ Γ2 α(F ) ∀1 ≤ i, j ≤ l. Define U = {zi : 1 ≤ i ≤ l s.t. xi ∼ xl+1 } and V = {zi : 1 ≤ i ≤ l s.t. xi ≁ xl+1 } ⊔ {hzi : 1 ≤ i ≤ l, h ∈ Γ2 \ {1}} ⊔ Γ2 α(F ). Since RU,V is infinite and Γ2 is finite, we may take   zl+1 ∈ RU,V \ Γ2 α(F ) ⊔ ⊔li=1 Γ2 zi . Then, for all u ∈ Γ2 α(F ), u ≁ zl+1 and, for all 1 ≤ i ≤ l, h ∈ Γ2 \ {1}, xi ∼ xl+1 ⇔ zi ∼ zl+1 , hzi ≁ zl+1 and, for all i 6= l + 1, Γ2 zi ∩ Γ2 zl+1 = ∅. Also, since Γ2 y R is free, we have Σhzl+1 ∩ Σzl+1 = ∅ for all h ∈ Γ2 \ Σ. This completes the proof. End of the proof of the Lemma. Write d(ϕ) = {x1 , . . . , xn } and define, for 1 ≤ k ≤ n, yk = ϕ(xk ). Let z1 , . . . zn be the elements obtained by the Claim. Take h ∈ Γ2 \ Σ. Then the sets α(ΣF ), Σzi for 1 ≤ i ≤ n, and Σhzi for 1 ≤ i ≤ n are pairwise disjoint. Moreover, u ≁ σzi , u ≁ σhzi and σ ′ zi ≁ σhzj for all u ∈ α(ΣF ), for all σ, σ ′ ∈ Σ and for all 1 ≤ i, j ≤ n. Define  A = ΣF ⊔ (⊔ni=1 Σg1 xi ) ⊔ ⊔ni=1 Σg2−1 yi and B = α(ΣF ) ⊔ (⊔ni=1 Σzi ) ⊔ (⊔ni=1 Σhzi ) HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 15 and consider the induced graph structure on A and B. Note that ΣA = A , ΣB = B and the only vertices in A (resp. B) are the ones with extremities in ΣF (resp. α(ΣF )). Since Σ y R is free, we may define a bijection γ0 : A → B by γ0 (u) = α(u) for u ∈ ΣF and γ0 (σg1 xi ) = σzi , γ0 (σg2−1 yi ) = σhzi for all 1 ≤ i ≤ n and for all σ ∈ Σ which is a graph isomorphism satisfying γ0 σ = σγ0 for all σ ∈ Σ. By Proposition 2.5, there exists an extension γ ∈ Z of γ0 . Then γ|F = α|F and with g = g2 hg1 ∈ Γ we have, for all 1 ≤ i ≤ n, πγ (g)xi = g2 γ −1 hγg1 xi = g2 γ −1 hzi = g2 g2−1 yi = yi .  End of the proof of the Theorem 3.4. The first assertion of the Theorem follows from Lemmas 3.5 and 3.3. The last part follows from the first part and Corollary 2.12, where the group Σ in Corollary 2.12 is actually our group Γ2 , the group Σ′ is our group Σ and the group H ′ is our group Γ1 .  4. Actions of HNN extensions on the Random Graph Let Σ < H be a finite subgroup of a countable group H and θ : Σ → H be an injective group homomorphism. Define Γ = HNN(H, Σ, θ) the HNN-extension and let t ∈ Γ be the “stable letter” i.e. Γ is the universal group generated by Σ and t with the relations tσt−1 = θ(σ) for all σ ∈ Σ. For ǫ ∈ {−1, 1}, we write  Σ if ǫ = 1, Σǫ := θ(Σ) if ǫ = −1. Suppose that we have a faithful action Γ y R and view Γ < Aut(R). Define the closed (hence Polish space) subset Z = {α ∈ Aut(R) : θ(σ) = ασα−1 for all σ ∈ Σ} ⊂ Aut(R) and note that it is non-empty (since t ∈ Z). By the universal property of Γ, for each α ∈ Z there exists a unique group homomorphism πα : Γ → Aut(R) such that πα |H = idH and πα (t) = α. In this section we prove the following result. Theorem 4.1. If Γ y R is non-singular, has property (F ), Σǫ y R is free and Σǫ is highly core-free w.r.t. H y R for all ǫ ∈ {−1, 1} then the set O = {α ∈ Aut(R) : πα is faithful and homogeneous} is a dense Gδ in Z. In particular, for any finite subgroup Σ of an infinite countable group H such that Σǫ < H is highly core-free for all ǫ ∈ {−1, 1}, we have HNN(H, Σ, θ) ∈ HR . We separate the proof in two lemmas. Lemma 4.2. If, for all ǫ ∈ {−1, 1}, Σǫ y R is free, non-singular and Σǫ is highly core-free w.r.t. H y R then the set U = {α ∈ Aut(R) : πα is homogeneous} is a dense Gδ in Z. Proof. Since U = ∩ϕ∈P (R) Uϕ , where Uϕ = {α ∈ Z : ∃g ∈ Γ such that πα (g)|d(ϕ) = ϕ} is obviously open, it suffices to show that Uϕ is dense for all ϕ ∈ P (R). Let ϕ ∈ P (R), α ∈ Z and F ⊂ V (R) a finite subset. It suffices to show that there exists γ ∈ Z and g ∈ Γ such that γ|F = α|F and πγ (g)|d(ϕ) = ϕ. Since Σ is highly core-free w.r.t. H y R, there exists g1 ∈ H such that g1 d(ϕ) ∩ ΣF = ∅ and g1 x ≁ u, σg1 x ≁ g1 x′ for all u ∈ ΣF , x, x′ ∈ d(ϕ), σ ∈ Σ \ {1} and Σg1 x ∩ Σg1 x′ = ∅ for all x, x′ ∈ d(ϕ) with x 6= x′ . Since θ(Σ) is highly core-free w.r.t. H y R, there exists g2 ∈ H such that g2−1 r(ϕ) ∩ (α(ΣF ⊔ Σg1 d(ϕ))) = ∅ 16 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER and g2−1 y ≁ u, θ(σ)g2−1 y ≁ g2−1 y ′ for all u ∈ α(ΣF ⊔ Σg1 d(ϕ)), y, y ′ ∈ r(ϕ), σ ∈ Σ \ {1} and θ(Σ)g2−1 y ∩ θ(Σ)g2−1 y ′ = ∅ for all y, y ′ ∈ r(ϕ) with y 6= y ′ . In the sequel we write d(ϕ) = {x1 , . . . , xn } and yi = ϕ(xi ). Define Y = (⊔ni=1 Σg1 xi )⊔(⊔ni=1 Σα−1 (g2−1 yi ))⊔(ΣF ) and note that α(Y ) = (⊔ni=1 θ(Σ)α(g1 xi )) ⊔ (⊔ni=1 θ(Σ)(g2−1 yi )) ⊔ (θ(Σ)α(F )). Note that ΣY = Y and θ(Σ)α(Y ) = α(Y ). Define the bijection γ0 : Y → α(Y ) by γ0 (σg1 xi ) = θ(σ)g2−1 yi , γ0 (σα−1 (g2−1 yi )) = θ(σ)α(g1 xi ) for all 1 ≤ i ≤ n, σ ∈ Σ and γ0 |ΣF = α|ΣF . By construction γ0 is a graph isomorphism such that γ0 σ = θ(σ)γ0 for all σ ∈ Σ. By Proposition 2.5 there exists an extension γ ∈ Z of γ0 . Note that γ|F = α|F moreover, with g = g2 tg1 ∈ Γ we have, for all 1 ≤ i ≤ n, πγ (g)xi = g2 γg1 xi = g2 γ0 (g1 xi ) = g2 g2−1 yi = yi .  Lemma 4.3. If, for all ǫ ∈ {−1, 1}, Σǫ y R is free and Γ y R is non-singular and has property (F ) then the set V = {πα : πα is faithful} is a dense Gδ in Z. T Proof. Since V = g∈Γ\{1} Vg , where Vg = {α ∈ Z : πα (g) 6= id} is clearly open, it suffices to show that Vg is dense for all g ∈ Γ \ {1}. We may and will assume that g ∈ / H, since when g ∈ H we have Vg = Z. Write g = hn tǫn . . . tǫ1 h0 a reduced expression for g, where n ≥ 1, hk ∈ H and ǫk ∈ {−1, 1}, ∀1 ≤ k ≤ n. Fix α ∈ Z and F ⊂ V (R) be a finite subset. Define H1 =  Σh0 if ǫ1 = 1 Σt−1 h0 if ǫ1 = −1 e1 = and H  θ(Σ)th0 if ǫ1 = 1 θ(Σ)h0 if ǫ1 = −1. For 2 ≤ l ≤ n, define   if ǫl = 1 θ(Σ)thl−1 tǫl−1 . . . tǫ1 h0 if ǫl = 1 Σhl−1 tǫl−1 . . . tǫ1 h0 e and H = Hl = l θ(Σ)hl−1 tǫl−1 . . . tǫ1 h0 if ǫl = −1. Σt−1 hl−1 tǫl−1 . . . tǫ1 h0 if ǫl = −1 −1 e := ∪n H e e−1 e Let G := ∪nl=1 Hl , G l=1 l and S := G G ∪ G G ∪ {g} ⊂ Γ be finite subsets of Γ and Fe := ∪s∈G∪Ge s−1 (ΣF ∪ α(ΣF )) ⊂ V (R) a finite subset of V (R). Since Γ y R has property (F ) there exists x ∈ V (R) \ Fe such that x ≁ u for all u ∈ Fe and sx 6= x for all e l x, the sets ΣF and Yl (resp. s ∈ S \ {1}. In particular, defining Yl := Hl x and Yel := H α(ΣF ) and Yel ) for 1 ≤ l ≤ n are pairwise disjoint and, using moreover the fact Fnthat Γ y R is non-singular, the only vertices on the induced subgraph on Y := ΣF ⊔ ( l=1 Yl ) (resp. F on Ye := θ(Σ)α(F ) ⊔ ( nl=1 Yel )) are the ones with extremities in ΣF (resp. in θ(Σ)α(F )). It implies that the bijection γ0 : Y → Ye defined by γ0 |ΣF = α|ΣF and, for all 1 ≤ l ≤ n, γ0 |Yl = t|Yl is actually a graph isomorphism between the induced subgraphs. Since we clearly have γ0 σ = θ(σ)γ0 for all σ ∈ Σ, there exists, by Proposition 2.5 an extension γ ∈ Z of γ0 . Then γ satisfies γ|F = α|F and πγ (g)x = hn γ ǫn . . . γ ǫ1 h0 x = hn tǫn . . . tǫ1 h0 x = gx 6= x since g ∈ S. It follows that γ ∈ Vg .  End of the proof of Theorem 4.1. The first assertion follows directly from Lemmas 4.2 and 4.3 since O = U ∩ V and the last part follows from the first part and Corollary 2.12. 5. Actions of groups acting on trees on the random graph Let Γ be a group acting without inversion on a non-trivial tree. By [Se77], the quotient graph G can be equipped with the structure of a graph of groups (G, {Γp }p∈V(G) , {Σe }e∈E(G) ) where each Σe = Σe is isomorphic to an edge stabilizer and each Γp is isomorphic to a vertex stabilizer and such that Γ is isomorphic to the fundamental group π1 (Γ, G) of this graph of HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 17 groups i.e., given a fixed maximal subtree T ⊂ G, the group Γ is generated by the groups Γp for p ∈ V(G) and the edges e ∈ E(G) with the relations e = e−1 , se (x) = ere (x)e−1 , ∀x ∈ Σe and e = 1 ∀e ∈ E(T ), where se : Σe → Γs(e) and re = se : Σe → Γr(e) are respectively the source and range group monomomorphisms. Theorem 5.1. If Γp is countably infinite, for all p ∈ V(G), Σe is finite and se (Σe ) is highly core-free in Γs(e) , for all e ∈ E(G), then Γ ∈ HR . Proof. Let e0 be one edge of G and G ′ be the graph obtained from G by removing the edges e0 and e0 . Case 1: G ′ is connected. It follows from Bass-Serre theory that Γ = HNN(H, Σ, θ) where H is fundamental group of our graph of groups restricted to G ′ , Σ = re0 (Σe0 ) < H is a subgroup and θ : Σ → H is given by θ = se0 ◦ re−1 . By hypothesis H is countably infinite, 0 Σ is finite and, since Σ < Γr(e0 ) (resp. θ(Σ) < Γs(e0 ) ) is a highly core-free subgroup, Σ < H (resp. θ(Σ) < H) is also a highly core-free subgroup. Thus we may apply Theorem 4.1 to conclude that Γ ∈ HR . Case 2: G ′ is not connected. Let G1 and G2 be the two connected components of G ′ such that s(e0 ) ∈ V(G1 ) and r(e0 ) ∈ V(G2 ). Bass-Serre theory implies that Γ = Γ1 ∗Σe0 Γ2 , where Γi is the fundamental group of our graph of groups restricted to Gi , i = 1, 2, and Σe0 is viewed as a highly core-free subgroup of Γ1 via the map se0 and as a highly core-free subgroup of Γ2 via the map re0 since se0 (Σe0 ) is highly core-free in Γs(e0 ) and re0 (Σe0 ) is highly core-free in Γr(e0 ) by hypothesis. Since Γ1 and Γ2 are countably infinite and Σe0 is finite, we may apply Theorem 3.1 to conclude that Γ ∈ HR .  6. Actions of free groups on the random graph Recall that P (R) denotes the set of isomorphisms of R between finite induced subgraphs d(ϕ), r(ϕ) ⊂ V (R) and note that P (R) has a natural structure of groupoid. In this Section, we prove Theorem D. The main tool, called an elementary extension, is a refinement of the “back and forth” method used to extend any partial isomorphism ϕ ∈ P (R) to an automorphism of R. 6.1. Elementary extensions. Let Φ ⊂ P (R) and F ⊂ V (R) be finite subsets. Let γ ∈ Φ. We construct a partial isomorphism γ̃ ∈ P (R) which extends γ as follows: first, we set [  d(ϕ) ∪ r(ϕ) , D := K \ d(γ), R := K \ r(γ). K := F ∪ ϕ∈Φ Note that D and R have the same cardinality and write D = {x1 , . . . , xm } and R = {v1 , . . . , vm }. We then successively find vertices u1 , . . . , um ∈ V (R) \ K such that: • the vertex uj is adjacent to all vertices u ∈ d(γ) such that vj ∼ γ(u) and all vertices uj ′ , with j ′ < j, such that vj ′ ∼ vj ; • it is not adjacent to any other vertices in K. After that, we successively find vertices y1 , . . . , ym ∈ V (R) \ (K ∪ {u1 , . . . , um }) such that: • the vertex yi is adjacent to all vertices y ∈ r(γ) such that xj ∼ γ −1 (y) and all vertices yi′ , with i′ < i, such that xi′ ∼ xi ; 18 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER • it is not adjacent to any other vertices in K, nor to vertices u1 , . . . , um . Finally, since the sets D = {x1 , . . . , xm }, d(γ), {u1 , . . . , um } are pairwise disjoint, and the sets {y1 , . . . , ym }, r(γ), R = {v1 , . . . , vm } are pairwise disjoint, we can define a partial bijection γ̃ : K ⊔ {u1 , . . . , um } → {y1 , . . . , ym } ⊔ K which extends γ by setting γ̃(xi ) = yi for all i = 1, . . . , m, and γ̃(z) = γ(z) for all z ∈ d(γ), and γ̃(uj ) = vj for all j = 1, . . . , n. Definition 6.1. The above γ̃ is called an elementary extension of the triple (γ, Φ, F ). Proposition 6.2. Any elementary extension γ̃ of (γ, Φ, F ) has the following properties: (1) γ̃ ∈ P (R), that is, γ̃ is an isomorphism between finite induced subgraphs; (2) F ⊂ d(γ̃) ∩ r(γ̃), and for all ϕ ∈ Φ, d(ϕ) ∪  r(ϕ) ⊂ d(γ̃) ∩ r(γ̃); (3) The sets γ̃ −1 d(γ) \ r(γ) , γ̃ r(γ) \ d(γ)  and K are pairwise disjoint and u ≁ v, ∀u ∈ γ̃ −1 d(γ) \ r(γ) , ∀v ∈ γ̃ r(γ) \ d(γ) ; S e e := (Φ \ {γ}) ∪ {e (4) Let Φ γ }. For any subset A of ϕ∈Φe (d(ϕ) ∪ r(ϕ)) let Ω (resp. Ω) e Then, any edge of R be the orbit of A under the groupoid generated by Φ (resp. Φ). −1 e contained in Ω \ Ω is the image under γ e or γ e of an edge in Ω. Proof. (1) It is clear from the construction that K is finite, as it is a finite union of finite sets. Hence, d(γ̃) = K ⊔ {u1 , . . . , um } and r(γ̃) = {y1 , . . . , ym } ⊔ K are finite. Let us now check that γ̃ is an isomorphism between finite induced subgraphs. Notice that one has d(γ̃) = {x1 , . . . , xm } ⊔ d(γ) ⊔ {u1 , . . . , um } and let u, x ∈ d(γ̃). We are going to check that u ∼ x ⇔ γ̃(u) ∼ γ̃(x) by distinguishing cases. If u and x are in the same component of the disjoint union {x1 , . . . , xm } ⊔ d(γ) ⊔ {u1 , . . . , um }, the equivalence follows readily from the construction and the fact that γ ∈ P (R). If x ∈ d(γ) and u = uj , then x ∼ uj ⇔ γ(x) ∼ vj ⇔ γ̃(x) ∼ γ̃(uj ) by the selection of the uj ’s. If x = xi and u ∈ d(γ), then xi ∼ u ⇔ yi ∼ γ(u) ⇔ γ̃(xi ) ∼ γ̃(u) again by the choice of the yi ’s. Finally, if x = xi and u = uj , then γ̃(uj ) = vj and γ̃(xi ) = yi . It follows from the selection of the uj ’s and yi ’s that uj 6∼ xi and vj 6∼ yi . Hence the equivalence holds. (2) It is clear since F ∪ d(ϕ) ∪ r(ϕ) for ϕ ∈ Φ are contained in K and K ⊂ d(e γ ) ∩ r(e γ ).   (3) Notice that γ̃ −1 d(γ) \ r(γ) = {u1 , . . . , um } and γ̃ r(γ) \ d(γ) = {y1 , . . . , ym }. Therefore the assertion follows from the construction. e\Ω ⊂ γ e 2 \ Ω2 such that x ∼ y. (4) Note that Ω e−1 (Ω \ r(γ)) ∪ e γ (Ω \ d(γ)). Let (x, y) ∈ Ω −1 If x, y ∈ γ e(Ω \ d(γ)) or x, y ∈ e γ (Ω \ r(γ)) the result is trivial. Note that we cannot have x∈γ e(Ω \ d(γ)) and y ∈ γ e−1 (Ω \ r(γ)) because otherwise there exists i and j such that x = yi and y = uj which implies that x ≁ y. Suppose now that x ∈ e γ (Ω \ d(γ)) and y ∈ Ω. Then there is some i such that x = yi but then yi ∼ y implies that y ∈ r(γ) and γ e−1 (y) ∼ e γ −1 (x). −1 −1 −1 −1 Since γ e (y) = γ (y) ∈ Ω and e γ (x) = γ e (yi ) = xi ∈ Ω, we are done. The other cases are proved in the same way.  6.2. “Treezation” of a free group action. We denote by Fk the free group on k generators a1 , . . . , ak . Given a tuple ᾱ = (α1 , . . . , αk ) ∈ Aut(R)k , we denote by α : Fk → Aut(R) the unique group homomorphism such that α(aj ) = αj for all j. HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 19 In this section, given such a k-tuple ᾱ ∈ Aut(R)k and a finite set F of vertices of R, we explain how to get a k-tuple β̄ ∈ Aut(R)k such that, for all j and ε = ±1, the automorphisms αεj and βjε coincide on F , and, informally speaking, the associated Schreier graph (see definition below) looks like a tree far from F . First, we define, for 1 ≤ j ≤ k, the element β0,j ∈ P (R) by the restriction: β0,j := αj |α−1 (F )∪F : α−1 j (F ) ∪ F → F ∪ αj (F ). j   Sk S Write Fe = kj=1 α−1 j (F ) ∪ F ∪ αj (F ) = j=1 (d(β0,j ) ∪ r(β0,j )). Let B0 ⊂ P (R) be the groupoid generated by β0,j for 1 ≤ j ≤ k and note that, for all ϕ ∈ B0 , one has d(ϕ)∪r(ϕ) ⊂ Fe. Remark 6.3. Suppose that α has all orbits infinite. It implies that for all x ∈ Fe there exists g ∈ B0 and 1 ≤ j ≤ k such that x ∈ d(g) and gx ∈ / d(β0,j ) ∩ r(β0,j ). Indeed, since the α-orbit of x is infinite, there exists w ∈ Fk such that α(w)x ∈ / Fe . Write w = αǫinn . . . αǫi11 its reduced ǫ1 ǫn expression, where ǫl ∈ {−1, 1}. Since α(w)x ∈ / Fe it follows that x ∈ / d(β0,i . . . β0,i ). We may n 1 ǫ1 and will assume that x ∈ d(β0,i ) (otherwise the conclusion is obvious). Let 1 ≤ n 0 ≤ n−1 1 ǫn0 ǫn0 ǫ1 ǫ1 be the largest integer such that x ∈ d(β0,in . . . β0,i1 ). Defining g = β0,in . . . β0,i1 ∈ B0 and 0 0 j = in0 +1 we reach the conclusion. Let V (R) = {z0 , z1 , . . . } be an enumeration of V (R) and define inductively β̄l ∈ P (R)k by β̄0 = (β0,1 , . . . , β0,k ) and, if for some l ≥ 0 the element β̄l = (βl,1 , . . . , βl,k ) is defined, we denote by j(l) the unique element in {1, . . . k} such that j(l) ≡ l + 1 (mod k) and we define β̄l+1 = (βl+1,1 , . . . , βl+1,k ) where βl+1,j(l) is the elementary extension of the triple (βl,j(l) , {βl,1 , . . . , βl,k }, {zl }) and βl+1,j = βl,j for j 6= j(l). We will denote by Bl ⊂ P (R) the groupoid generated by βl,1 , . . . , βl,k . Define β̄ = (β1 , . . . , βk ) ∈ Aut(R)k , where βj is (well-) defined by βj (x) = βj,l (x) whenever x ∈ d(βj,l ) (and denote by β : Fk → Aut(R) the unique group morphism which maps the aj onto βj ). Definition 6.4. The k-tuple β̄ is said to be a treezation of ᾱ relatively to F . We denote by Gβ the Schreier graph of β: the vertices are V (Gβ ) = V (R) and for all x ∈ V (Gβ ) we have an oriented edge from x to βj (x) which is decorated by j + and an oriented edge from βj−1 (x) to x decorated by j − . More generally, given a groupoid H ⊂ P (R) generated by γ1 , . . . , γk ∈ P (R), we define GH the Schreier graph of H with the generating tuple (γ1 , ..., γk ) in the following way: V (GH ) = V (R) and, for all x ∈ V (GH ), there is an oriented edge decorated by j + from x to γj (x) whenever x ∈ d(γj ) and there is an oriented edge decorated by j − from γj−1 (x) to x whenever x ∈ r(γj ). For all l ≥ 0, we will denote by Gl the Schreier graph of Bl with the generating tuple β̄l . Given a graph G, for l ≥ 2, a minimal path in G from x1 ∈ V (G) to xl ∈ V (G) is a finite sequence of pairwise distinct vertices x1 , . . . xl such that xi ∼ xi+1 for all 1 ≤ i ≤ l − 1. When l ≥ 3 and x1 ∼ xl , we call it a minimal cycle. Recall that a1 , . . . ak are the canonical generators of Fk . Proposition 6.5. Any treezation β̄ of ᾱ satisfies the following properties. 20 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER For all l ≥ 0 the minimal cycles in Gl are all contained in Fe. The minimal cycles of Gβ are all in Fe. The minimal paths of Gβ with extremities in Fe are contained in Fe. If the orbits of α are infinite then the orbits of β are infinite. For all x, y ∈ β(Fk )(Fe), if (x, y) ∈ E(R) then there exists x0 , y0 ∈ Fe such that (x0 , y0 ) ∈ E(R) and w ∈ Fk such that β(w)x0 = x and β(w)(y0 ) = y. (6) Let x ∈ Fe and w = aǫinn . . . aǫi11 ∈ Fk with its reduced expression, where ǫl ∈ {−1, 1}. If there exists s such that βiǫss . . . βiǫ11 x ∈ / Fe, then for all s < t ≤ n the path (1) (2) (3) (4) (5) ǫ s+1 βiǫss . . . βiǫ11 x, βis+1 . . . βiǫ11 x, . . . , βiǫnn . . . βiǫ11 x ǫt−1 is a geodesic path in Gβ and d(βiǫtt . . . βiǫ11 x, Fe) = 1 + d(βit−1 . . . βiǫ11 x, Fe ) for all s < t ≤ n, where d is the graph distance. Proof. (1) The result is obvious for G0 since all the edges in G0 have their source and range in Fe. Now, observe that the edges of Gl are included in the edges of Gl+1 with the same label and any edge of Gl+1 which is not already an edge on Gl has an extremity which is not in any domain or range of any βl,j for 1 ≤ j ≤ k since βl+1,j(l) is an elementary extension of βl,j(l) and for j 6= j(l) one has βl+1,j = βj,l . Hence, the minimal cycles in Gl+1 are contained in Gl . This proves the result by induction on l. (2) It follows from (1) since any minimal cycle in Gβ is a minimal cycle in Gl for some l ≥ 0. (3) The proof is the same as the one of (1) and (2). (4) It follows from (2) that the induced graph structure on the complement of Fe coming from Gβ is a forest. Hence, every x ∈ / Fe has an infinite β-orbit. If x ∈ Fe, we find, by Remark 6.3, g ∈ B0 and 1 ≤ j ≤ n such that x ∈ d(g) and gx ∈ / d(β0,j ) ∩ r(β0,j ). Hence either βk,j (gx) ∈ / Fe −1 or βk,j (gx) ∈ / Fe. In both cases, we find an element w ∈ Fk such that β(w)(x) ∈ / Fe . By the first part of the proof, the β-orbit of x is infinite. (5) Let Ω be the orbit of Fe under the action β and, for l ≥ 0, Ωl be the orbit of Fe under the groupoid Bl . Since every edge of R which is in Ω is actually in Ωl for some l, it suffices to show that, for all l ≥ 0 and all x, y ∈ Ωl with (x, y) ∈ E(R), there exists g ∈ Bl and x0 , y0 ∈ Fe such that gx0 = x and gy0 = y. For l = 0 it is trivial since Ω0 = Fe and the proof follows by induction by using assertion (4) of Proposition 6.2. (6) The proof is a direct consequence of the following remark, which is itself a direct consequence of (2) and (3). For all x ∈ / Fe in the connected component of a point in Fe there exist a unique path in Gβ without backtracking x1 , x2 , . . . , xl such that • x1 = x, • x2 , . . . , xl−1 ∈ / Fe, • xl ∈ Fe. Moreover, this path is geodesic.  6.3. Proof of Theorem D. Let us fix an integer k ≥ 2. We still denote by Fk the free group on k generators a1 , . . . , ak , and by α the morphism Fk → Aut(R) associated to some ᾱ ∈ Aut(R)k . Let us mention that one has hᾱi = {α(w) : w ∈ Fk }. The set A = {ᾱ ∈ Aut(R)k : every hαi-orbit on the vertices is infinite} HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 21 is closed in Aut(R)k , which is closed on S(R)k . Thus A is a Baire space. We also consider the subsets F = {ᾱ ∈ Aut(R)k : α is injective }; H = {ᾱ ∈ Aut(R)k : α is an homogeneous action on Aut(R)}. Now, Theorem D can be stated as follows. Theorem 6.6. The subset A ∩ F ∩ H is a dense Gδ in A. Proof. Let us prove that A ∩ H is a dense Gδ in A. To do this, we observe that A ∩ H = T k ϕ∈P (R) (A ∩ Hϕ ), where Hϕ = {ᾱ ∈ Aut(R) : ∃w ∈ Fk , ∀x ∈ d(ϕ), α(w)x = ϕx}. Since the A ∩ Hϕ ’s are all open because the Hϕ ’s are open in Aut(R)k , it suffices to prove that A ∩ Hϕ is dense for all ϕ ∈ P (R). Take an arbitrary ϕ ∈ P (R) and an arbitrary ᾱ = (α1 , . . . , αk ) ∈ A. We need to prove that, ±1 for any finite subset F ⊂ V (R), there exists ω̄ ∈ A ∩ Hϕ such that α±1 j and ωj coincide on F for all j. To prove this, we may assume that F contains both d(ϕ) and r(ϕ). S We take such an F and we set F̃ = kj=1 (α−1 j (F ) ∪ F ∪ αj (F )) as we did in Section 6.2. Then we take a treezation β̄ of ᾱ relatively to F . Let us recall that β has all orbits infinite since α does, and that, for all j, the automorphisms βj±1 and α±1 j coincide on F . By Neumann’s Lemma, there exists u ∈ Fk (we consider it as a reduced word) such that β(u)F̃ ∩ F̃ = ∅. Up to replacing u by some aj u, we may assume that u is moreover cyclically reduced. This is possible thanks to Proposition 6.5 (6). Since u2 is reduced, we also have β(u2 )F̃ ∩ F̃ = ∅, again by Proposition 6.5 (6). Let us now show that F̃ and β(u2 )F̃ are disconnected, that is, for all x ∈ F̃ and y ∈ β(u2 )F̃ , we have x ≁ y. Assume by contradiction that there exsit x ∈ F̃ and y ∈ β(u2 )F̃ such that x ∼ y. By Proposition 6.5 (5), there exist x0 , y0 ∈ F̃ and v ∈ Fk such that x = β(v)x0 and y = β(v)y0 . Using Proposition 6.5 (6), we see first that v = uv ′ (reduced expression) since y = β(v)y0 is in β(v)F̃ ∩ β(u2 )F̃ , and then that β(v)x0 = β(u)β(v ′ )x0 is not in F̃ . Indeed, if β(v ′ )x0 ∈ F̃ , then β(u)β(v ′ )x0 is not in F̃ , and if β(v ′ )x0 ∈ / F̃ , then β(u)β(v ′ )x0 is farer from ′ F̃ than β(v )x0 in the Schreier graph of β. Since we have β(v)x0 ∈ / F̃ , x ∈ F̃ and x = β(v)x0 , we have obtained a contradiction. S We now set K = v β(v)F̃ , where the union is taken over the prefixes of u2 (it is the union of trajectories (see Definition 3.1 in [MS13]) of points in F̃ in the Schreier graph of β) and S K̃ = kj=1 (βj−1 (K) ∪ K ∪ βj (K)). We also consider some integer s > 10 diam(K̃), with respect to the metric on the Schreier graph of β, and an index i such that the first letter of u −s 2 s 2 is different from a±1 i . Proposition 6.5 ensures that β(ai u )F̃ , K̃ and β(ai u )F̃ are pairwise disjoint. 2 s 2 Moreover, β(a−s i u )F̃ and β(ai u )F̃ are both disconnected from K̃. Indeed, assume by contradiction that there exist x ∈ K̃ and y ∈ β(asi u2 )F̃ such that x ∼ y. By Proposition 6.5 (5), there exist x0 , y0 ∈ F̃ and v ∈ Fk such that x = β(v)x0 and y = β(v)y0 . On the one hand, using Proposition 6.5 (6), we see first that v = asi uv ′ (reduced expression) since y = β(v)y0 is in β(v)F̃ ∩ β(asi u2 )F̃ , and then that the distance (in the Schreier graph of β) between β(v)x0 and F̃ is greater than 10 diam(K̃). Indeed, we get, as above, that β(uv ′ )x0 ∈ / F̃ , and 22 PIERRE FIMA, SOYOUNG MOON, AND YVES STALDER deduce that the distance between β(v)x0 = β(asi )β(uv ′ )x0 and F̃ is greater than s, which is itself greater than 10 diam(K̃). On the other hand, since x is in K̃, its distance is less or equal to diam(K̃). Hence, we get x 6= β(v)x0 , a contradiction. This proves that there are no edges between K̃ and β(asi u2 )F̃ . One gets similarly that there are no edges between K̃ and 2 β(a−s i u )F̃ . Thus we can define a partial graph isomorphism τ ∈ P (R) as follows: we fix some index i′ distinct from i (which exists since k ≥ 2) and set: 2 s 2 r(τ ) = (K ∪ βi′ K) ⊔ β(a−s • d(τ ) = (βi−1 ′ K ∪ K) ⊔ β(ai u )d(ϕ); i u )r(ϕ); • for x ∈ βi−1 ′ K ∪ K, we set τ x = βi′ x; 2 −2 −s • for x ∈ β(asi u2 )d(ϕ), we set τ x = β(a−s i u ) ◦ ϕ ◦ β(u ai )x. 2 s 2 Note that without the fact that β(a−s i u )F̃ and β(ai u )F̃ are both disconnected from K̃, the map τ could be only a bijection between vertices. Now, one can extend τ to an automorphism ωi′ , and set ωj = βj for other indices j. Then, −s 2 −s 2 for all j, ωj±1 , βj±1 and α±1 j coincide on F . Moreover β(ai u ) and ω(ai u ) coincide on F , and the same holds for β(asi u2 ) and ω(asi u2 ). Hence, one has −s 2 −s 2 −2 −s ω(u−2 a−s i ai′ ai u )x = β(u ai )τ β(ai u )x s 2 −2 s −s 2 = β(u−2 a−s i )β(ai u )ϕβ(u ai )β(ai u )x = ϕx for all x ∈ d(ϕ). In other words, ω̄ = (ω1 , . . . , ωk ) is in Hϕ . Finally, as ωi′ coincides with βi′ on βi−1 ′ K ∪ K and all βi -orbits are infinite outside this set, ω also has all orbits infinite, that is ω̄ is in A. Consequently, we obtain that ω is in A ∩ Hϕ , which concludes the proof that A ∩ H is dense Gδ in A. One can use a similar, but much easier, argument to show that A ∩ F is a dense Gδ in A. This is left to the reader.  References [BM05] M. Bhattacharjee and H.D. Macpherson, A locally finite dense group acting on the random graph, Forum Math. 17 (2005) 513–517. [Ca96] P. J. Cameron, Cofinitary permutation groups, Bull. London Math. Soc. 28 (1996) 1–17. [Ca97] P. J. Cameron, The random graph, The mathematics of Paul Erdos, II, Algorithms Combin. 14, Springer, Berlin (1997) 333–351. [Ca99] P.J. Cameron, Permutation groups, London Mathematical Society Student Texts. 45 Cambridge University Press, Cambridge (1999). [Dr85] M. Droste, Structure of partially ordered sets with transitive automorphism group, Mem. Amer. Math. Soc. 334 (1985). [ER63] P. Erdös and A. Rényi. Asymmetric graphs, Acta Math. Acad. Sci. Hungar. 14 (1963) 295–315. [FMS15] P. Fima, S. Moon and Y. Stalder. Hilghly transitive actions of groups acting on trees, Proc. Amer. Math. Soc. 143 (2015) 5083–5094. [GMR93] A. M. W. Glass, S. H. McCleary and M. Rubin, Automorphism groups of countable highly homogeneous partially ordered sets, Math. Z. 214 (1993) 55–66. [GK03] P.M. Gartside and R.W. Knight, Ubiquity of free groups, Bull. Lond. Math. Soc. 35 (2003) 624–634. [GS15] S. Glaband and F. Strobin, Large free subgroups of automorphisms groups of ultrahomogeneous spaces, Colloq. Math. 140 (2015) 279–295. [Ka92] R. Kaye, The automorphism group of a countable recursive saturated structure, Proc. London Math. Soc. (3) 65 (1992) 225–244. [Mac11] H.D. Macpherson, A survey of homogeneous structures. Discrete Math. (15) 311 (2011) 1599–1634. [Mac86] H.D. Macpherson, Groups of automorphisms of ℵ0 -categorical structures, Quart. J. Math. (2) 37 (1986) 449–465. HOMOGENEOUS ACTIONS ON THE RANDOM GRAPH 23 [MS94] G. Melles and S. Shelah, Aut(M) has a large dense free subgroup for saturated M, Bull. London Math. Soc. 26 (1994), 339–344. [MS13] S. Moon and Y. Stalder, Highly transitive actions of free products, Algebr. Geom. Topol. 13 (2013) 589–607 [Ra64] R. Rado, Universal graphs and universal functions, Acta Arith. 9 (1964) 393–407. [Se77] J.-P. Serre, Arbres, amalgames, SL2 , Astérisque 46, Société Mathématique de France (1977). [Tr85] J. K. Truss, The group of the countable universal graph, Math. Proc. Cambridge Philos. Soc. 98 (1985) 213–245. Pierre Fima Univ Paris Diderot, Sorbonne Paris Cité, IMJ-PRG, UMR 7586, F-75013, Paris, France, Sorbonne Universités, UPMC Paris 06, UMR 7586, IMJ-PRG, F-75005, Paris, France, CNRS, UMR 7586, IMJ-PRG, F-75005, Paris, France. E-mail address: [email protected] Soyoung Moon Université de Bourgogne, Institut Mathématiques de Bourgogne, UMR 5584 CNRS, BP 47870, 21078 Dijon cedex France E-mail address: [email protected] Yves Stalder Université Clermont Auvergne, CNRS, Laboratoire de Mathmatiques Blaise Pascal, F-63000 Clermont-Ferrand, France E-mail address: [email protected]
4math.GR
Alternating Optimization for Capacity Region of Gaussian MIMO Broadcast Channels with Per-antenna Power Constraint Thuy M. Pham, Ronan Farrell, and Le-Nam Tran arXiv:1704.01473v2 [cs.IT] 17 May 2017 Department of Electronic Engineering, Maynooth University, Maynooth, Co. Kildare, Ireland Email: {minhthuy.pham, ronan.farrell, lenam.tran}@nuim.ie Abstract—This paper characterizes the capacity region of Gaussian MIMO broadcast channels (BCs) with per-antenna power constraint (PAPC). While the capacity region of MIMO BCs with a sum power constraint (SPC) was extensively studied, that under PAPC has received less attention. A reason is that efficient solutions for this problem are hard to find. The goal of this paper is to devise an efficient algorithm for determining the capacity region of Gaussian MIMO BCs subject to PAPC, which is scalable to the problem size. To this end, we first transform the weighted sum capacity maximization problem, which is inherently nonconvex with the input covariance matrices, into a convex formulation in the dual multiple access channel by minimax duality. Then we derive a computationally efficient algorithm combining the concept of alternating optimization and successive convex approximation. The proposed algorithm achieves much lower complexity compared to an existing interiorpoint method. Moreover, numerical results demonstrate that the proposed algorithm converges very fast under various scenarios. Index Terms—MIMO, minimax duality, dirty paper coding, alternating optimization, successive convex optimization. I. I NTRODUCTION Since its invention in the mid-90s [1], [2], multiple-input multiple-output (MIMO) technology has been adopted in all modern mobile wireless networks. From a system design perspective, one of the most fundamental problems is to compute the capacity of the system of interest. For a single user MIMO (SU-MIMO) channel, pioneer studies proved that the capacity can be achieved by Gaussian input signaling [1], [2]. For multiuser MIMO scenarios, the seminal work of [3] showed that dirty-paper coding (DPC) in fact achieves the entire capacity region of Gaussian MIMO broadcast channels (BCs). The particular case of the sum capacity of MIMO BCs was studied in several pioneer studies including [3]–[7], The capacity of MIMO systems is investigated along with a certain type of constraint on the input covariance matrices. In this regard, we remark that all papers mentioned above assume a sum power constraint (SPC), and this usually leads to efficiently computational algorithms. For the sum-capacity computation, Viswanathan et al. [8] applied a steepest descend method, while Yu [9] proposed a dual decomposition-based algorithm. In this line of research, Jindal et al. presented a sum power iterative water-filling algorithm by exploiting the MACBC duality. The entire capacity region of MIMO BCs with a SPC was characterized in [10], [11], using conjugate gradient projection (CGP)- and pre-conditioned gradient projectionbased approaches. While SPC has been widely considered, it is less appealing in reality due to the fact that each antenna is usually equipped with a different power amplifier, which has its own power budget. Despite its practical and fundamental importance, the research on efficient methods for computing the capacity region of Gaussian MIMO BCs has been quite limited. For SU-MIMO, this problem was solved in [12], [13] by the socalled mode-dropping algorithm. In [3], it was shown that DPC still achieves the full capacity region of the MIMO BC under PAPC. However, finding the DPC region with PAPC is more numerically difficult than with a SPC. In fact, no closed-form design has been reported for the computation of the capacity region of the MIMO BC subject to PAPC. To the best of our knowledge, the only attempt to characterize the entire capacity region of the MIMO BC subject to PAPC was made in [14]. Specifically, the authors in [14] established a modified duality between the MAC and BC and transformed the input optimization problem in the BC into a minimax optimization problem in the dual MAC. Then resulting program is solved by a standard barrier interior-point routine. Thus, as a common property for the class of second order optimization methods, the algorithm proposed in [14] has computational complexity that does not favor large-scale antenna systems which are envisioned in next wireless communications generations. In this paper, we determine the capacity region of MIMO BCs under PAPC. In particular, the problem of interest is also known as weighted sum rate maximization (WSRMax) for MIMO BCs. As mentioned earlier, the capacity region can be achieved by DPC, but the resulting WSRMax problem is nonconvex. As a standard step, we apply the minimax duality presented in [14] to transform the WSRMax problem into a minimax program. However, unlike [14] which solves the resulting minimax problem by a barrier interiorpoint method, we take advantage of the problem specifics to propose an efficient algorithm that blends the concept of alternating optimization (AO) and successive convex approximation (SCA). Especially, in each iteration of the proposed algorithm, closed-form expressions based on conjugate gradient projection (CGP) method are derived. As a result, the complexity of the proposed algorithm is much lower than that of the barrier method in [14], and scales linearly with the number of users in the system, making it particularly suitable for large-scale networks. Numerical experiments are carried out to demonstrate that the proposed algorithm can converge rapidly, especially for networks of high signal-to-noise ratio, and the number of iterations required for convergence is quite insensitive to the number of users. The remainder of the paper is organized as follows. The system model is described in Section II followed by the proposed algorithm in Section III. Section IV provides the complexity analysis of the proposed algorithm while Section V presents the numerical results. Finally, we conclude the paper in Section VI. Notation: Standard notations are used in this paper. Bold lower and upper case letters represent vectors and matrices, respectively. I defines an identity matrix, of which the size can be easily inferred from the context; CM×N denotes the space of M × N complex matrices; H† and HT are Hermitian and normal transpose of H, respectively; Hi,j is the (i, j)th entry of H; |H| is the determinant of H; rank(H) stands for the rank of H; diag(x) denotes the diagonal matrix with diagonal elements being x. II. S YSTEM M ODEL Consider a K-user MIMO BC where the base station and each user have N and Mk antennas, respectively. The channel matrix for user k is denoted by Hk . Let s be the composite signal that combines the data for all users in the downlink. Then, the received signal at user k is expressed as (1) yk = Hk s + zk where zk is the Gaussian noise with distribution CN (0, IM ). When DPC is applied to achieve the capacity region, for a given user k, the interference caused by users j < k is completely canceled without affecting the optimality. As a result, the WSRMax under PAPC is formulated as maximize {Sk 0} subject to PK |I+H Pk S H† | k i=1 i k k=1 wk log | |I+Hk Pk−1 Si H† | i=1 k PK [S ] ≤ P , ∀i k i,i i k=1 (2) where Sk is the input covariance matrix for the kth user, Pi is the power constraint on antenna i, and wk is the weighting factor assigned to user k. Without loss of P optimality, we assume that 0 < w1 ≤ w2 ≤ ... ≤ wK and K k=1 wk = 1 in the following. Since (2) is a nonconvex problem, solving it directly is not a good option. However, we can exploit the MAC-BC duality to transform (2) into minimax program in the dual MAC which can be solved efficiently by the novel AO as presented in the next section. III. P ROPOSED S OLUTION Applying the modified MAC-BC duality introduced in [15], we can equivalently rewrite (2) as the following minimax optimization problem PK PK † min max k=1 ∆k log |Q + i=k Hi S̄i Hi | Q0 {S̄k 0} subject to −w log |Q| PKK k=1 tr(S̄k ) = P, tr(QP) = P, Q : diagonal (3) PN where ∆k = wk − wk−1 ≥ 0, P , i=1 Pi ; {S̄k } and Q are input covariance and noise covariance matrices in the dual MAC, respectively. As shown in [15], the objective in (3) is convex with Q  0 and concave with {S̄k  0}. Thus, there exists a saddle point for (3), which also solves (2). The minimax formulation in (3) also suggests a way to find {S̄k } and Q by AO. However, a pure AO algorithm is not guaranteed to converge. In fact, a counterexample was already given in [16]. In what follows, we propose an iterative algorithm based on combining AO and SCA, of which convergence can be proved. Let {S̄nk } be the solution to the following maximization problem in the nth iteration PK PK † n maximize k=1 ∆k log |Q + i=k Hi S̄i Hi | {S̄k 0} (4) PK subject to k=1 tr(S̄k ) = P. The above maneuver is nothing but a standard routine of optimizing {S̄k } when Q is held fixed. Problem (4) can be solved by off-the-shelf interior-point convex solvers but the complexity is not affordable for large-scale systems. In our numerical experiments, all of known (free and commercial) solvers fail to solve (4) on a relatively powerful desktop PC for N ≥ 100, regardless of the number of users. That is, interiorpoint methods are not an efficient approach to solving (4) for massive MIMO techniques which are likely to be adopted in 5G systems. To overcome this shortcoming, we now present an efficient method to solve (4) based PKon the CGP framework. To proceed, let S = {S̄k |S̄k ≻ 0, k=1 tr(S̄k ) = P } be the feasible set of (4). The main operation of a CGP method is to project a given {S̃k } onto S. Our motivation is that the projection of {S̃k } onto S can be reduced to a projection of a resulting vector onto a canonical simplex, which can be computed efficiently. The projection of {S̃k } onto the feasible set S is formulated as PK 2 minimize k=1 ||Ṡk − S̃k ||F {Ṡk 0} (5) PK subject to tr( Ṡ ) = P. k k=1 Let Uk D̃k U†k = S̃k be the EVD of S̃k , where Uk is unitary and D̃k is diagonal. Then we can write Ṡk = Uk Ḋk U†k for some Ḋk  0. Since Uk is unitary, it holds that tr(Ṡk ) = tr(Ḋk ) and that ||Ṡk − S̃k ||F = ||Ḋk − D̃k ||F . That is to say, (5) is equivalent to PK 2 minimize k=1 ||Ḋk − D̃k ||F {Ḋk 0} (6) PK subject to k=1 tr(Ḋk ) = P. It is easy to see that Ḋk must be diagonal to minimize the objective of (6). Next let d̄k = diag(Ḋk ), d̃k = diag(D̃k ), d̄ = [d̄T1 , d̄T2 , . . . , d̄TK ]T , and d̃ = [d̃T1 , d̃T2 , . . . , d̃TK ]T . Then (6) can be reduced to minimize d̄≥0 subject to 1 2 ||d̄ − d̃||22 1M̃ d̄ = P (7) P where M̃ = K 1 Mk . It is now clear that (7) is the projection onto a canonical simplex and efficient algorithms (similar to water-filling algorithms) can be found in [17]. The complete description of the proposed CGP method for solving (4) is provided in Algorithm 1. We note that similar approaches were also presented in [10], [11]. Algorithm 1: The proposed CGP algorithm for solving (4). Input: P , ǫ > 0 0 1 Initialization: τ = 1 + ǫ, m = 0, {S̄k } ∈ S. 2 while (τ > ǫ) do 3 Calculate the conjugate gradient G̃m k . 4 Choose an appropriate positive scalar sm and create m m S̃m = S̄m k + s G̃k . m 5 Project S̃k onto S to obtain Ṡm k . 6 Choose appropriate step size αm and set m m m S̄m+1 = S̄m k + α (Ṡk − S̄k ). k m+1 m † 7 τ = | tr(∇f (S̄k ) (S̄k − S̄m k ))|. 8 m := m + 1. 9 end Output: S̄k as the optimal solution to (4). Another main step of a CGP method is the computation of the conjugated gradient of the objective, as required in line 3 of Algorithm 1. The conjugate gradient, denoted as G̃m k , can be calculated as follows. First, we compute the gradient of the objective in (4) as −1  K k X X H†k . (8) H†i S̄i Hi ∆j Q + ∇f (S̄k ) = −Hk j=1 i=j Then the conjugate gradient direction is given by m m m−1 G̃m k = −∇f (S̄k ) + β G̃k where the parameter β [18] ( 0 m β = m (9) is the Fletcher choice of deflection 2 −||∇f (S̄m k )|| † ∇f (S̄m−1 )) tr((G̃m−1 ) k k m=0 m≥1 (10) For the step size in line 6 of Algorithm 1, we perform an Armijo line search [19] to determine appropriate value. For the importance case of the sum capacity of the MIMO BC, we note that more efficient approaches to solving (4) do exist. In fact, in this case (4) becomes PK maximize log |Qn + i=1 H†i S̄i Hi | {S̄k 0} (11) PK subject to tr( S̄ ) = P. k k=1 We remark that (11) is equivalent to the problem of finding the sum-capacity of a MAC with a SPC for which the sum power iterative water-filling proposed in [20] or the dual decomposition method in [9] have been shown to be particularly computationally efficient. We now turn our attention to the problem of finding Qn+1 . If a pure AO method is followed, we arrive at the optimization problem below: PK PK † minimize i=k Hi S̄i Hi | k=1 ∆k log |Q + Q0 (12) −wK log |Q| subject to tr(QP) = P However, as mentioned in [14] and also observed in [16], the convergence of such a naive AO method is not guaranteed. The novelty of our proposed AO algorithm is that, instead of optimizing the original objective in (12) which can lead to fluctuations, we opt to minimize an upper bound of the objective in (12). This is in light of the SCA principle, and will lead to a monotonic convergence as shown in the Appendix. To this end, by invoking the concavity of logdet function, we have the following inequality  P † n n −n Q − Qn log |Q + K i=k Hi S̄i Hi | ≤ log |Φk | + tr Φk (13) PK n −1 where Φnk = Qn + i=k H†i S̄ni Hi , Φ−n , (Φ ) . Thus, k k using the above upper bound, Qn+1 is found to be the optimal solution to the following problem PK ∆k  −n  minimize k=1 wK tr Φk Q − log |Q| Q0 (14) subject to tr(QP) = P. Since Q in (14) is diagonal, i.e., Q = diag(q), we can rewrite (14) as PN PK n minimize i=1 k=1 φki qi − log qi q>0 (15) PN subject to i=1 Pi qi = P,  ∆ −n  k Φk i,i , i.e., φnki is the ith diagonal element where φnki = w K ∆k Φ−n of w k . By setting the derivative of Lagrangian function K of (15) to zero, we obtain 1 qi = PK (16) n k=1 φki + γPi where γ ≥ 0 is the solution of the equation N X i=1 PN Pi PK k=1 φnki + γPi = P. (17) Pi φn ki +γPi − P . It’s easy to see that PK g(γ) is decreasing with γ. When γ = 0, since k=1 φnki ≤ qi−1 we have Denote g(γ) = i=1 N X i=1 PK k=1 Pi PK k=1 φnki ≥ N X Pi qi = P. (18) i=1 Therefore, (17) always has a unique solution, which can found efficiently, e.g., by the bisection or Newton method. The proposed algorithm based on AO is summarized in Algorithm 2. The main point of Algorithm 2 is to eliminate the possible ping-pong effect of the obtained objective by the use of the inequality in (13). The convergence proof of Algorithm 2 is provided in the Appendix. Note that the error tolerance τ of Algorithm 2 is only computed for n ≥ 1. Algorithm 2: Proposed algorithm for the computation of the capacity region of a MIMO BC based on AO. Input: Q := Q diagonal matrix of positive elements, ǫ>0 Initialization: Set n := 0 and τ = 1 + ǫ. while (τ > ǫ) do Solve (4) and denote the optimal solution by {S̄nk } For n ≥ 1 compute τ = |f DPC (Qn , {S̄nk }) − f DPC (Qn−1 , {S̄kn−1 })|, where f DPC (·) denotes the objective in (3). For each k, compute PK † n n −1 Φ−n . k = (Q + i=k Hi S̄i Hi ) n+1 Solve (14) to find Q . n := n + 1. end Output: Use the obtained {S̄nk }K k=1 and the BC-MAC transformation in [5] to find the optimal solution to (2). 0 1 2 3 4 5 6 7 8 IV. C OMPLEXITY A NALYSIS In this section, we analyze the complexity estimation of the proposed algorithm in terms of the number of flops. The results of flop counting for typical matrix operations such as EVD, matrix inversion are taken from [21] and [22]. Moreover,we treat every complex operation as 6 real flops as considered in [22], [23]. In the complexity analysis presented below, we only consider the main operations of high complexity in the overall complexity. A. Complexity of Algorithm 2 Algorithm 2 has two key procedures, one for finding {S̄k } and one for finding Q. Of all steps in Algorithm 1, the computation of the conjugate gradient direction given in (8) has the largest computation cost. Similarly, the complexity for finding Q is mostly due to the computation of Φ−n k defined in (13). Therefore, the per-iteration complexity of Algorithm 2 is O(KN 3 ). That is, the complexity of the proposed algorithm increases linearly with the number of users. B. Complexity of the Barrier Interior-Point Method in [14] The method presented in [14] is based on solving the KKT condition for (3). To find the gradient w.r.t each input covariance matrix for the logdet function, the complexity is 6N 3 . Then, to find a Newton direction, this algorithm still needs to solve a linear system of M (M + 1)/2 unknowns, + 3N )3 flops.1 In total, the perwhich requires 6( KM(M+1) 2 2 3 iteration complexity is O(K N + K 3 M 6 ). 1 Here we assume Mk = M for all k to simplify the notation. TABLE I P ER - ITERATION COMPLEXITY COMPARISON Algorithms Per-iteration complexity Algorithm 2 Barrier interior-point method [14] O(KN 3 ) O(K 2 N 3 + K 3 M 6 ) The complexity comparison is summarized in Table I. We remark that the complexity of Algorithm 2 increases linearly with the number of users K, which was also achieved in [20] for the sum-capacity with SPC. Thus, Algorithm 2 scales much better than the barrier interior-point method in [14] with the number of users. V. N UMERICAL R ESULTS This section provides numerical results to verify the proposed algorithm. If not otherwise mentioned, the number of transmit antennas at the BS is set to N = 5 and the number of receive antennas at each user is set to Mk = 2 for all k.. The total power P is varied from a low value to a high one to investigate the convergence rate of the proposed algorithm.The power constraint for each transmit antenna is set equally. The initial value Q0 in the proposed algorithm is set to the identity matrix. An error tolerance of ǫ = 10−6 is selected as the stopping criterion for the proposed algorithm. In the first simulation, we plot the convergence of the proposed algorithm for different value of the total transmit power for a set of randomly generated channel realizations. As can be seen, Fig. 1 shows that the convergence of the proposed algorithm is strictly monotonic as proved in the Appendix. An interesting observation is that the number of iterations decreases when the total power increases. As mentioned in the complexity analysis, the proposed algorithm has a desirable property, i.e., the per-iteration complexity increases linearly with the number of users K. This is an attractive property in the system of a large number of users which is usually the case for a massive MIMO setup. However, it is difficult, if not impossible, to analyze the convergence rate of the proposed algorithm with K by analytical expressions. Instead, we study the convergence property of the proposed algorithm with K by numerical experiments. For the purpose, we plot in Fig. 2 the average number of iterations required by the proposed algorithm to converge. As can be seen, the number of iterations for the proposed algorithm to converge is relatively insensitive to K . It is worth noting that for similar setups, the interior-point method in [14] requires at least 60 iterations to converge, while the proposed algorithm only takes 4 iterations even in the case of 50 users. This promising characteristic of the proposed algorithm makes it suitable for studying the capacity region of massive MIMO systems where the number of transmit antennas and/or the number of users can be very large. This point will be further elaborated in the next numerical experiment. Taking the advantage that the proposed algorithm has low complexity, in the last numerical experiment we characterize the capacity region of a massive MIMO system with PAPC. In 102 P = 0 dB P = 10 dB P = 20 dB 4 ZF, PAPC DPC, PAPC DPC, SPC R2 Duality gap 10−1 2 10−4 10−7 0 2 4 6 8 10 0 Iteration 0 1 4 15 R2 Average number of iterations 20 5 10 15 20 25 30 35 40 45 ZF, PAPC DPC, PAPC DPC, SPC 50 Number of users Fig. 2. Average number of iterations versus number of users. 5 10 5 2 4 (a) Number of users K = 2 5 P = 0 dB P = 20 dB 3 R1 Fig. 1. Convergence behavior of the proposed algorithm with K = 2. 3 2 0 0 1 2 3 4 5 R1 particular, we also consider achievable rate region of the wellknown ZF scheme [24], [25]. The purpose is to understand the performance of ZF (which is thought to be sub-optimal) in comparison with the capacity achieving coding scheme under some realistic channel models. To this end we consider a simple urban scenario using WINNER II B1 channel model [26], where a base station, equipped with N = 128 antennas, is located at the center of the cell and single-antenna receivers are distributed randomly. The total power at the BS is P = 46 dBm and each antenna is subject to equal power constraint, i.e., Pi = P/N for i = 1, 2, . . . , 128. As can be seen clearly in Fig. 3, there is a remarkable gap between the achievable rate region of ZF and the capacity region, especially when the number of users increases. This basically implies that ZF is still far from optimal for a practical number of transmit antennas. Our observation opens research opportunities in the future to strike the balance between optimal performance by DPC and low-complexity by ZF. VI. C ONCLUSIONS In this paper, we have considered the problem of computing the capacity region of Gaussian MIMO BCs subject to PAPC. (b) Number of users K = 8 Fig. 3. Comparison of capacity region of a massive MIMO setup with N = 128 and Mk = 1 for all k. For the case K = 8 users, the capacity region is projected on the first two users. Towards this end, the problem of WSRMax with PAPC has been solved by a low-complexity algorithm. We have first converted the noncovex problem of MIMO BC into an equivalent minimax problem in the corresponding dual MAC. Then a novel AO algoithm has been proposed to solve the resulting mimimax program in combination with the successive convex optimization principle. In particular, all the computation in the proposed algorithm is based on closed-form expressions. In addition, the simulation results have demonstrated a fast and stable convergence of the proposed algorithm, even for large-scale settings. ACKNOWLEDGEMENTS This work was supported by a research grant from Science Foundation Ireland and is co-funded by the European Regional Development Fund under Grant 13/RC/2077. A PPENDIX For notational convenience, we denote Q , {Q|Q : ˆ k = ∆k . Since the diagonal, Q  0, tr(QP) = P }, ∆ wK PK function log |Q + i=k H†i S̄i Hi | is jointly concave with Q and {S̄k }, the following inequality holds K X k=1 ˆ k log |Q + ∆ ≤ K X i=k K X k=1 ˆ k log | Qn + ∆ K X + H†i S̄i Hi | | + ˆk ∆ k=1 K X i=k K X i=k H†i S̄ni Hi | k=1 ˆ k log |Qn+1 + ∆ ≤ K X {z Φn k } i=k k=1 + K X i=k Since {S̄nk } = arg max {S̄k }∈S † n tr(HΦ−n k H (S̄i − S̄i )) (19) ˆk ∆ k=1 K X i=k  n+1 † − S̄ni )) . (20) tr(HΦ−n k H (S̄i PK k=1 ∆k log |Qn + PK i=k H†i S̄i Hi |, † n tr(HΦ−n k H (S̄i − S̄i )) ≤ 0 ˆk ∆ k=1 K X i=k n+1 † tr(HΦ−n − S̄ni )) ≤ 0 k H (S̄i k=1 ˆ k log |Qn+1 + ∆ ≤ K X k=1 K X (21) (22) i=k H†i S̄n+1 Hi | i  ˆ k log |Φn | + tr Φ−n (Qn+1 − Qn ) . (23) ∆ k k  } k=1 (24) n+1 solves (14) it holds that   ˆ k log |Φn | + tr Φ−n (Qn+1 − Qn ) − log |Qn+1 | ∆ k k k=1 K X k=1   ˆ k log |Φn | + tr Φ−n (Q − Qn ) − log |Q| (25) ∆ k k for all Q ∈ Q. For the special case Q := Qn , the inequality above is reduced to K X k=1   ˆ k log |Φnk | + tr Φ−n (Qn+1 − Qn ) − log |Qn+1 | ∆ k K X k=1 | ˆ k log |Φnk | − log |Qn | . (26) ∆ {z f DPC (Qn ,{S̄n k }) } Combining (24) and (26) results in f DPC (Qn , {S̄nk }) ≥ f DPC (Qn+1 , {S̄n+1 }). k It is easy to see that {f DPC (Qn , {S̄nk })} is bounded above, and thus {f DPC (Qn , {S̄nk })} is convergent. We also note that (13) is strict if Q 6= Qn . Consequently, the sequence {f DPC (Qn , {S̄nk })} is strictly decreasing unless it is convergent. Therefore, the continuity of f DPC (·) and the compactness of S and Q imply lim f DPC (Qn , {S̄nk }) = f DPC (Q∗ , {S̄∗k }). n→∞ R EFERENCES which leads to K X {z   ˆ k log |Φn |+tr Φ−n (Qn+1 −Qn ) −log |Qn+1 |. ∆ k k H†i S̄n+1 Hi | i for all {S̄k } ∈ S. For {S̄k } = {S̄n+1 } the above inequality k is equal to K X i=k H†i S̄n+1 Hi | − log |Qn+1 | i f DPC (Qn+1 ,{S̄n+1 }) k K X ≤ K X ≤ the optimality condition results in K X | K X  ˆ k log |Φn | + tr(Φ−n (Qn+1 − Qn )) ∆ k k K X k=1 ˆ k log |Qn+1 + ∆ Since Q for all Q ∈ Q and {S̄k } ∈ S. The above inequality comes PK from the first order approximation of log |Q + i=k H†i S̄i Hi | around the point (Qn , {S̄nk }). Substitute Q := Qn+1 and S̄k := S̄n+1 into the above equality, we have k K X K X ≤   ˆ k tr Φ−n (Q − Qn ) ∆ k k=1 K X Subtract both sides of the above inequality by log |Qn+1 | results in [1] E. Telatar, “Capacity of multi-antenna Gaussian channels,” Eur. Trans. Telecommun, vol. 10, pp. 585–598, Nov. 1999. [2] G. J. Foschini and M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Pers.Commun, vol. 6, pp. 311–335, Mar. 1998. [3] H. Weingarten, Y. Steinberg, and S. S. Shamai, “The capacity region of the Gaussian multiple-input multiple-output broadcast channel,” IEEE Trans. Inf. Theory, vol. 52, no. 9, pp. 3936 – 3964, Sep. 2006. [4] G. Caire and S. Shamai, “On the achievable throughput of a multiantenna Gaussian broadcast channel,” IEEE Trans. Inf. Theory, vol. 49, no. 7, pp. 1691–1706, Jul. 2003. [5] S. Vishwanath, N. Jindal, and A. Goldsmith, “Duality, achievable rates and sum-rate capacity of Gaussian MIMO broadcast channels,” IEEE Trans. Inf. Theory, vol. 49, pp. 2658–2668, Oct. 2003. [6] P. Viswanath and D. Tse, “Sum capacity of the vector Gaussian broadcast channel and uplink-downlink duality,” IEEE Trans. Inf. Theory, vol. 49, no. 8, pp. 1912–1921, Aug. 2003. [7] W. Yu and J. Cioffi, “Sum capacity of Gaussian vector broadcast channels,” IEEE Trans. Inf. Theory, vol. 50, no. 9, pp. 1875–1892, Sep. 2004. [8] H. Viswanathan, S. Venkatesan, and H. Huang, “Downlink capacity evaluation of cellular networks with known-interference cancellation,” IEEE J. Sel. Areas Commun., vol. 21, no. 5, pp. 802–811, Jun. 2003. [9] W. Yu, “Sum-capacity computation for the Gaussian vector broadcast channel via dual decomposition,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 754 –759, Feb. 2006. [10] J. Liu, Y. T. Hou, and H. D. Sherali, “On the maximum weighted sumrate of MIMO Gaussian broadcast channels,” in Proc. IEEE ICC, May 2008, pp. 3664 – 3668. [11] R. Hunger, D. A. Schmidt, M. Joham, and W. Utschick, “A general covariance-based optimization framework using orthogonal projections,” in Proc. IEEE SPAWC, Jul. 2008, pp. 76 – 80. [12] M. Vu, “MIMO capacity with per-antenna power constraint,” in Proc. IEEE GLOBECOM, Dec. 2011, pp. 1 – 5. [13] ——, “The capacity of MIMO channels with per-antenna power constraint,” CoRR, vol. abs - 1106 - 5039, 2011. [14] W. Yu and T. Lan, “Transmitter optimization for the multi-antenna downlink with per-antenna power constraints,” IEEE Trans. Signal Process., vol. 55, no. 6, pp. 2646–2660, Jun. 2007. [15] W. Yu, “Uplink-downlink duality via minimax duality,” IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 361–374, Feb. 2006. [16] T. M. Pham, R. Farrell, and L.-N. Tran, “Revisiting the MIMO capacity with per-antenna power constraint: Fixed-point iteration and alternating optimization,” IEEE Trans. Signal Process., submitted. [17] L. Condat, “Fast projection onto the simplex and the ℓ1 ball,” Mathematical Programming, Series A, vol. 158, no. 1, pp. 575 – 585, July 2016. [18] R. Fletcher, Practical Methods of Optimization, 2nd ed. New York, NY, USA: Wiley-Interscience, 1987. [19] L. Armijo, “Minimization of functions having Lipschitz continuous first partial derivatives.” Pacific J. Math., vol. 16, no. 1, pp. 1 – 3, 1966. [20] N. Jindal, W. Rhee, S. Vishwanath, S. Jafar, and A. Goldsmith, “Sum power iterative water-filling for multi-antenna Gaussian broadcast channels,” IEEE Trans. Inf. Theory, vol. 51, no. 4, pp. 1570–1580, Apr. 2005. [21] G. H. Golub and C. F. V. Loan, Matrix Computations, 3rd ed. The John Hopkins Univ. Press, 1996. [22] Z. Shen, R. Chen, J. Andrews, J. Heath, R.W., and B. Evans, “Low complexity user selection algorithms for multiuser MIMO systems with block diagonalization,” IEEE Trans. Signal Process., vol. 54, no. 9, pp. 3658–3663, Sep. 2006. [23] L.-N. Tran, M. Bengtsson, and B. Ottersten, “Iterative precoder design and user scheduling for block-diagonalized systems,” IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3726–3739, Jul. 2012. [24] Q. Spencer, A. Swindlehurst, and M. Haardt, “Zero-forcing methods for downlink spatial multiplexing in multiuser MIMO channels,” IEEE Trans. Signal Process., vol. 52, no. 2, pp. 461–471, Feb. 2004. [25] K. Karakayali, R. Yates, G. Foschini, and R. Valenzuela, “Optimum zero-forcing beamforming with per-antenna power constraints,” in Proc. IEEE ISIT 2007, Jun. 2007, pp. 101–105. [26] P. Kyösti, J. Meinilä, L. Hentilä, X. Zhao, T. Jämsä, C. Schneider, M. Narandzić, M. Milojević, A. Hong, J. Ylitalo, V.-M. Holappa, M. Alatossava, R. Bultitude, Y. de Jong, and T. Rautiainen, “Winner II channel models,” tech. rep. D1.1.2 V1.2, IST-4-027756 WINNER II, 2007.
7cs.IT
arXiv:cs/0203023v1 [cs.CE] 19 Mar 2002 Agent Trade Servers in Financial Exchange Systems DAVID LYBÄCK Financial Market Systems, OM AB and MAGNUS BOMAN Swedish Institute of Computer Science (SICS) AB New services based on the best-effort paradigm could complement the current deterministic services of an electronic financial exchange. Four crucial aspects of such systems would benefit from a hybrid stance: proper use of processing resources, bandwidth management, fault tolerance, and exception handling. We argue that a more refined view on Quality-of-Service control for exchange systems, in which the principal ambition of upholding a fair and orderly marketplace is left uncompromised, would benefit all interested parties. Categories and Subject Descriptors: I.2.11 [Artificial Intelligence]: Distributed Artificial Intelligence—Intelligent Agents; J.4 [Social and Behavioral Sciences]: Economics; K.4.4 [Computers and Society]: Electronic Commerce—Distributed Commercial Transactions General Terms: Economics, Management, Performance Additional Key Words and Phrases: Trading agent, Agent server, Financial exchange service, Agent programming 1. BACKGROUND Exchange operators are now in a business environment shaped by the nature of electronic trading, competing for listings and order flow, and facing the needs of both institutional major traders and retail-level investors. An exchange operation excels when traders display their true willingness to trade. The transaction costs of trading may then shrink, to the benefit of the participants and indirectly also of the marketplace in the competitive environment. The electronic exchange is a high-confidence complex system that has to behave in a very well understood and predictable fashion. This implies that the system must withstand variable load, various failures in supporting systems, faulty user commands, et cetera, and must not by erroneous internal actions cause serious economic damage to the participants of the exchange. While the ideal is continuous matching of simple orders at the equilibrium point with a completely deterministic flow, many needs arise where this ideal cannot be upheld. The complexity of the market entails that decision situations are not repeatable: if a trader makes the wrong choice, very few conclusions can be drawn ex post to improve a similar Journal Name etc. Permission to make digital/hard copy of all or part of this material without fee for personal or classroom use provided that the copies are not made or distributed for profit or commercial advantage, the ACM copyright/server notice, the title of the publication, and its date appear, and notice is given that copying is by permission of the ACM, Inc. To copy otherwise, to republish, to post on servers, or to redistribute to lists requires prior specific permission and/or a fee. c 2017 ACM 0000-0000/2017/0000-0001 $5.00 ACM Journal Name, Vol. V, No. N, December 2017, Pages 1–11. 2 · D. Lybäck and M. Boman situation next time, since there is no identifiable next time. The ideal is also under threat from all sorts of failures: hardware, software, peripheral, and network failures. Such failures negatively affect price dissemination routines, market access opportunities, and bid feedback in general. Our starting point is thus not the ideal marketplace, but a real one, the resilience of which is pivotal. In a deterministic system, output messages are deterministically repeatable given a stochastic series of input events, i.e. some identified non-deterministic events will completely determine the nature and sequence of the output stream in a welldocumented fashion. This implies that if there is any choking in the system whatsoever, the input stream will have to buffer. A best-effort service on the other hand, uses as much resources as it is allocated or until there is no better solution possible. Prolonged execution usually yield “better” results for a user, but prolonging is not always an option. The notion of best-effort defines the service result delivered at a particular time as the best one found or best one possible under those given, unrepeatable circumstances, and the service level of the result cannot be impeached: it is rational given the boundary [Russell and Wefald 1991]. Introducing the concept of best-effort could open up many new possibilities, but care must be taken so that the maximal downside of using a best-effort service - as opposed to a completely deterministic service - is under control and can be described. It is vital that an add-on service that executes according to best-effort does not in any way compromise the overall ambition of a fair and orderly marketplace. So far, these concerns have hindered best-effort innovations in the financial domain. We acknowledge the importance of complete tractability in the financial exchange services and therefore propose a hybrid system where new best-effort services complement the current deterministic services. We start in section 2 by discussing the state-of-the-art, and thereafter current problems. In section 4, we propose solutions to those problems. In sections 5 and 6, we analyze the advantages and point forwards, respectively. 2. THE STATE-OF-THE-ART A strong trend in the software industry is towards Quality-of-Service management with anytime algorithms [Dean and Boddy 1988] for good usage of processing resources and network bandwidth, and clever procedures for graceful degradation whenever there is choking or an outright subsystem failure. An anytime algorithm is a constructive solution to the problem of how to implement best-effort services. 2.1 Processing Resources Contingency orders depend on other orders in the marketplace. Some of the functionality in contingency orders can be provided by the distributed local trading clients, but only the core exchange system can guarantee deals involving more than one trade, such as buying one stock and selling another one simultaneously. Apart from such combinations, one can also place a linked order, i.e., a number of single orders held together by a “spider object” with information about exclusive ORconditions in that set of orders. By using contingency orders, the trading tactic or need is hidden from other participants; only the added liquidity is displayed, to some extent. A programming technique used for contingency order evaluation is ACM Journal Name, Vol. V, No. N, December 2017. Agent Trade Servers in Financial Exchange Systems · 3 automatic insertion of virtual orders derived from the contingency order. 2.2 Bandwidth Management Network congestion is (to a reasonable extent) avoided through the use of dedicated leased lines to the exchange system gateways. Custom-built delay boxes are sometimes in place to neutralize systematic latency differences, in order to minimize unfairness between participants. In some systems, the matching service can throttle down automatically (brake the matching service somewhat to reduce dissemination congestion) if the network is choking, to smoothen a temporary peak. 2.3 Fault Tolerance Fault tolerance techniques provide services compliant with the specification after a fault has occured. For hardware errors, or catastrophic situations like flooding or fire, exchange systems provide hot fail-over mechanisms (based on active replication), i.e. a hot standby replica is ready to take over in a very short time after a serious problem occurred in the primary site. As the secondary has processed the same material as the primary, processing can continue easily (after catch-up and rollback, if needed). Thus, the fail-over procedure is designed to have a minimal impact on users. In fact, users might not even realize that a fail-over has taken place. 2.4 Exception Handling Exception handling deals with the undefined and unanticipated conditions that, if left unchecked, can propagate through the system and cause a serious fault. Selfverifying software is an ad hoc method used in many important systems already deployed in our society, including electronic exchange systems, phone switches, and aircraft. A typical exchange system uses a rollback procedure from disk-based transaction logs for a restart, and in problematic cases, the operations staff must identify and (technically) nullify the transaction causing the problem, to enable a successful restart of the system. Whereas some adaptive rate control procedures are implemented in high-end electronic exchange systems, no system has (to our knowledge) installed components that actively and explicitly base the service offering to the user on a best-effort principle, because one does not want to compromise the paramount paradigm of determinism. 3. THE PROBLEM In this section, we will focus on unsolved problems within the four key areas explained in the previous section. We build on our own experiences of programming real-time trading agents. Parts of this experience comes from participating in the Trading Agent Competition (TAC), see http://tac.eecs.umich.edu/. Compared to artificial markets, such as the Artificial Stock Market (see http: //ArtStkMkt.sourceforge.net/) or idealized games (see, e.g., [Rust et al. 1994]), TAC is a realistic, albeit simple, emulation of real agent electronic trading. In order to keep its focus on practical issues, TAC was set up not as a (complex) stock exchange, but as an intelligent assistant competition. The assistants acquire resources for eight different customers on real-time Internet auctions. ACM Journal Name, Vol. V, No. N, December 2017. 4 · D. Lybäck and M. Boman 3.1 Processing Resources Contingency order matching can easily degrade the performance of the matching service. Basic Quality-of-Service control can temporarily suspend the evaluation of certain complex orders to ensure the upkeeping of basic matching service performance at all times. This is a crude maneuver, and will not suffice as users expect their combination orders kept active at all times. Future order types with more conditions and parameters will also increase the expectations on the evaluation policy (cf. [Ygge and Akkermans 2000]). In effect, users will slowly start to expect a more refined view on Quality-of-Service, like in all areas of Information Technology (cf., e.g., the Open Financial Exchange effort [Cover 2001] in which financial data is exchanged over the Internet in XML). The non-deterministic nature of multi-threaded processes with anytime algorithms has so far effectively kept them banned from live exchanges, while they play an important role on artificial marketplaces. For instance, the constraint solver implemented by Mats Carlsson in our TAC’02 agent 006, computes optimal amounts of various goods using an anytime algorithm [Aurell et al. 2002]. On the other hand, there will arise temporal series of events in a full-scale, multithreaded non-deterministic matching service that are practically non-repeatable, since the operating system is involved in the algorithm. For example, a single context switch event may not necessarily occur at exactly the same time or in the same way when replaying a situation, and may thereby promote another flow of events. This inherent property of non-deterministic services makes simulation, verification, and debugging extremely hard. This also means that no guarantees of basic performance or temporally dependent completions can be given a priori in a non-deterministic service, which makes it inappropriate for many heavy participants, considering the financial values involved. In other words, one would like best-effort processing services in certain cases, to open up for evaluation of more complex orders, but one can not give up the deterministic stance for the matching engine software. 3.2 Bandwidth Management Congestion that impacts order transactions or crucial price updates will undoubtedly lead to business problems for the participant and eventually for the exchange itself. A systematic latency that is not fair or a partial failure that affects some participants is unacceptable, and may even close the exchange until the problem is resolved. Interactive traffic such as order submission is very sensitive to latency caused by the need to retransmit after a packet loss. Treating packet loss as an indication of congestion in the network as done in TCP is inappropriate for time-critical transactions - such as most order submissions today. General throttling is not an ideal solution for bandwidth management in all cases. If more traffic is to become best-effort throughput, there should to be an alternative where there is less business sensitivity to inevitable small delays. One may argue that future networks with Active Queue Management [Ramakrishnan et al. 2001] which does not use overflow as a the only indication of congestion, will somewhat reduce the impact of a loss on latency-sensitive flows, but this is far from enough, considering the second-by-second importance of quotes in highly liquid ACM Journal Name, Vol. V, No. N, December 2017. Agent Trade Servers in Financial Exchange Systems · 5 orderbooks. Further, many exchanges prioritize between similar orders based on their arrival timestamp in milliseconds. We therefore see a future need of an explicit rate control, and a refined view of congestion. Furthermore, at the retail level, the drawbacks of TCP/IP are already at hand, since end customers do typically not lease dedicated lines to their respective Internet brokers. 3.3 Fault Tolerance A fail-over mechanism is often not a sufficient solution, as a logical problem leading to a stop in the primary site will also cause the exact same problem in the secondary site. Redundant replication is the classical way to get reliability from a sub-system, and since it can not be applied to software logic errors, this has created a software problem, which will continue to affect dependability. 3.4 Exception Handling On the one hand, fault-detection checks, which make a whole partition grind to a halt just because of one problematic minor software logic situation somewhere deep in one of many orderbooks, is not the exception handling one would like in a modern software system. On the other hand, no mistakes must be made by the system whatsoever. As mentioned above, it is totally unacceptable that the system would perform erroneous executions in a repeating or even aggravating fashion. The operator prefers a technical stop compared to a long series of faulty deals, for obvious reasons. Therefore the programmer may add invariants at vital points in the code, to defuse any potentially dangerous problem immediately. The obvious problem with self-checking software is its lack of rigor and the unclear coverage. There is always a trade-off between control and performance. Consequently, one method and level of exception handling is not appropriate for all parts of the software. The lack of proper technologies for ultra-reliable systems has created an unsatisfying situation when it comes to exception handling. In summary, the demand for complete tractability and total determinism puts harsh restrictions on the services and architecture options. We believe that it is the lack of proper assurance techniques that currently keeps ambitions of best-effort execution from the exchange systems arena. 4. THE SOLUTION While the ability to control the rate at which objects are refreshed is a nice tool for ensuring optimal usage of available bandwidth in network-enabled games, it requires good design judgment if best-effort transport via Internet is to be used professionally in active financial marketplaces. We believe that best-effort transport is most reasonable when combined with best-effort execution of scenario-based orders, because of the much lower criticality of its client to front-end server interaction timing. The marketplace operator can consider our suggested technical solutions in a backcasting milieu. 4.1 The Agent Trade Server To build upon the robustness of the deterministic exchange system platform, we propose a complementary subsystem operating fully under the best-effort principle, both for its bandwidth management, processing resource management, fault ACM Journal Name, Vol. V, No. N, December 2017. 6 · D. Lybäck and M. Boman tolerance, and exception handling. We acknowledge the importance of continued complete tractability in the current services and therefore propose a hybrid system where the new, optional best-effort services are contained in a separate subsystem: the Agent Trade Server (ATS), complementing the current deterministic services. A cardinal use case for the new subsystem is when the user uploads a latent order combined with a trigger configuration, combined into a so-called Agent Instruction, to the ATS. The ATS, operating under the best-effort principle, communicates with the exchange system platform using one of the already available protocols. 4.2 Proximity Advantage The ATS computer will typically be placed physically close to the computer hosting the exchange system back-end processes (core), and between the ATS and the core will be a high-speed local connection (cf. Figure 1). The parts comprising the complete setup with Agent Trade Servers are: (1) Deterministic core with the matching service proper. (2) Multi-protocol gateway(s). (3) Best-effort appurtenance: one or many adjacent servers, running encapsulated complementary best-effort services. The appurtenance is split into three parts: (a) Core services extension(s), e.g., a computer running Combinatorial Solution Finder, or other supportive services. (b) Agent Trade Server(s) type I, with user-configurable agents spawned under control of a dispatch service, utilizing multi-threading or similar nonverified resource sharing under the operating system of the server. (c) Agent Trade Server(s) type II, with user-programmable agents executing under sandbox resource management, or similar sharing mechanisms. There is extensive shielding between individual agents, so that one erroneously programmed or extra demanding agent cannot affect others in an uncontrollable way. (4) External connections via gateway(s), typically through either leased lines or shared IP links. Using these connections, users run interactive sessions for order submission, and subscribe to multi-cast messages, such as price updates. (5) External connections to the best-effort appurtenance, typically via the Internet for the interactive sessions and the subscriptions of, for example, status updates. Note that servers in the appurtenance classified as 3a above do not have external connections, but only internal links with the core. 4.3 Agent Trade Server Operation The ATS will, upon receiving an agent instruction, create a new thread to handle the request, or revise a previously spawned thread or process. A precondition for the automatic activation of a latent order in the ATS is a Boolean operation on a set of scenario triggers. Inspirational generic scenarios can be proposed by the marketplace operator, and then adjusted by each trader or investor. The scenarios could be saved in personalized galleries, and optionally calibrated for each individual order. The agent in the ATS will continuously evaluate the triggers in its instruction against real-time market information received from the core. ACM Journal Name, Vol. V, No. N, December 2017. Agent Trade Servers in Financial Exchange Systems Fig. 1. · 7 The Agent Trade Servers setup. To avoid resonance effects, the bourse operator would typically not allow only one short-term fluctuation in an index value as a single trigger. Instead, the trader should set a scenario by combining at least two (not totally correlated) triggers. Note that a real-time scenario trigger must evaluate the current market situation within specified timing constraints, quite short-termed, possibly slightly trading-off the quality of its own analysis if needed. Thus, even the trigger in itself is under Quality-of-Service control. The user could be allowed to set a minimal acceptable quality of the best-effort service for each individual agent instruction (according to a measurement yet to be defined), below which the agent is not allowed to trade. Another challenge is to investigate what scenarios that a trader would like to trigger some latent orders, and how the quality of real-time triggering is to be measured. The operator would also be constrained with respect to integrity and security issues. The trust relationship between marketplace and customer will be put to harsh tests, as the customer in the typical case is reluctant to reveal her preferences. As most uploads encode true preferences, this information is ideally processed without human intervention, and must be treated as maximally sensitive data. The drawback for the trader with communicating trade intention early, can be more than offset by the inherent premium in the reliable, cheap, high-speed connection between the core and the ATS. The proximity and direct connection is effectively feeding the ATS with market data much faster than anyone else, thus ACM Journal Name, Vol. V, No. N, December 2017. 8 · D. Lybäck and M. Boman putting the Agents in the ATS at an advantage in certain cases. This may be a strong enough incentive to stimulate an early submission of orders via the ATS when appropriate. 4.4 Agent Programming Although we primarily envision a few archetypical agents to be offered by the exchange for traders to configure, it is not unreasonable in later generations of the system to open up so-called “sandbox areas” for user-created code to execute in. To encode trade logic into agents means that the code can be pro-active, autonomous, and encapsulated. These features make agents an interesting option for future complex order types. The user can also make it hard for unauthorized persons to grasp the preferences encoded in the agent, and make it virtually impossible to apply reverse engineering techniques. The programming tools for creating agents are increasing in number and quality, as is the number of agent programming consultants and brokers, and plenty of code is shared through online communities. Academic research has pursued this track for years, also as connected to a marketplace scenario. Examples of our own recent efforts in this field include agent-based simulations on real stock market data [Boman et al. 2001], and multi-agent systems situations, in which several artificial agents operate simultaneously on the same marketplace, subject to norms and other constraints [Boman et al. 2001]. Although there is substantial previous work in the academic field when it comes to agent-mediated commerce, we feel that it is often unrealistic in the way it commonly approaches agent-mediated trading [Weinhardt and Gomber 1999] and agent mobility [Ruddle 1999]. The agency gateway is a multiprotocol connectivity zone to reach users via various end-user devices. At SICS, ways of providing accessible APIs for end-user services have been produced [Bylund 2001]. International community-shaping efforts, such as .NET and the possibility of SOAP adaptation for web services are also likely to be important in the near future. It should be noted that agent/server communication also has its own set of problems. An agent server is under constant threat of overload, due to malicious intent or bad agent code. In the TAC server, agent requests which are looped without correct termination conditions produce problems. It is also difficult for the people responsible for the server to shut out agents due to erroneous behavior, since the reasons for the shutout should be communicated to the agent owners, which is sometimes impossible. As a result, agent owners might find their agent has not been running as expected, and this without notification, let alone explanation. In a financial exchange, this is totally unacceptable. In addition, a study made in the first phases of programming our TAC’01 agent 006 [Hauser and Orrhult 2002] analyzes the following latency concerns. —Round trip time for agent- or server-generated message —Receive interval (from message receipt start until finish) —Intrinsic data time bound (e.g., a bound on the validity of message data) —Agent deliberation time (e.g., for interpreting a message) —Throughput: number of messages per time unit or clock cycle —Time-slotting: agent planning activities for sending and receiving messages ACM Journal Name, Vol. V, No. N, December 2017. Agent Trade Servers in Financial Exchange Systems · 9 —Network topology, affecting message delivery time These concerns should be added to the usual performance considerations [Tanenbaum 1996], including: —Traffic congestion caused by temporary resource overload —Resource imbalance (e.g., between network and processor capacity) —Broken cables —Broken connections (e.g., overloaded hosts or routers) Moreover, the sheer amount and varibility of the code running on an agent server makes code verification a practical impossibility. To get a crude feel for the amount of code expected, consider that our TAC’01 agent RiskPro consisted of about 7000 lines of code, 3000 lines of which were devoted to communication with the TAC server, over TCP/IP [Boman 2001]. There is currently considerable effort being put into solving these problems, however, both in the form of market-driven and in the form of purely academic research. 5. THE ADVANTAGES 5.1 Processing Resources New scenario-based orders can be evaluated continuously in the ATS without degrading the basic matching service. This means that the exchange system as a whole can offer not only the matching itself, but also resources for tactical trading without negative impact on the basic services. Special limitations surround combination orders. Only the core can fully match a combination, but cumbersome combinations should be kept away from the core as long as possible. Moreover, instead of a large combination, the ATS can formulate a basket of smaller combinations in a quick sequence, accepting small residuals. That said, the major advantage of an ATS when it comes to processing resources, is the continuous scenario evaluations ongoing in the agents. Only when a latent order triggers, it will be formulated in detail and submitted to the core. The user could be allowed to set a minimal acceptable quality of the best-effort matching service for each individual order, according to a measurement yet to be defined, below which the service is automatically disregarding that order. Another challenge is to investigate how the quality of real-time triggering is to be measured. 5.2 Bandwidth Management We argue that regardless of how clever future transport protols may become, besteffort transport solutions between the marketplace and the end user are most reasonable when combined with best-effort evaluation of scenario-based orders, such as in the ATS, because of the much lower criticality of its client/server interaction timing. Furthermore, the more intentions that could be communicated in advance of unfolding market events, the more the network load smoothens, which reduces the need for expensive reserve capacity in the network. Also, traffic between the ATS and the core would not be hindered, or slowed down, by network load in the Wide Area Network or the Internet, due to the direct or LAN connection used. A setup ACM Journal Name, Vol. V, No. N, December 2017. 10 · D. Lybäck and M. Boman with an ATS may therefore reduce gateway and network loads slightly, which is especially beneficial when approaching heavy load situations. Throttling may then in certain situations be eluded. This in turn might slightly increase the number of completed deals per minute under those circumstances. 5.3 Fault Tolerance Keeping as much as possible of the new functionality out of the deterministic core altogether will drastically reduce the risk of introducing new code into the heart of the system. Containment of new functionality away from the core is in itself a strategy for upkeeping and increasing highest possible reliability while the system is under continuous development. A crashed ATS thread was presumably only evaluating a single agent instruction from one user, and can therefore be out of action for a few seconds (or even die) without widespread consequences, whereas the core in a sense is the marketplace, and must not fault. The best-effort nature of the ATS allows for many possibilities in a fail-over situation to degrade its services until fully recovered to normal operating status. A recovery unit can replace a failed process, and concentrate on agent restart based on the user-submitted agent instruction, and can discard processing states. 5.4 Exception Handling Error containment and exception handling will be in effect locally in the ATS, and internal problems are not to affect the core services. 6. CONCLUSION We have suggested an Agent Trade Server as a complement to an exchange system, without compromising the core service, and so: —open up for proper best-effort transport connectivity, fully in line with Internet design foundations and contemporary trends in the industry —prepare for the introduction of new order details and tactical trading instructions —provide a new level of containment to better defend the complex system from fatal software error propagation when new services are introduced in the future. Acknowledgements The authors would like to thank Johan Kummeneje and Lars Rasmusson for draft comments. Lybäck was supported through his research assignment at OM, while the VINNOVA project TAP on accessible autonomous software provided Boman with the time required for this study. REFERENCES Aurell, E., Boman, M., Carlsson, M., Eriksson, J., Finne, N., Janson, S., Kreuger, P., and Rasmusson, L. 2002. A constraint programming agent for automated trading. Submitted. Boman, M. 2001. Trading agents. AgentLink News 6, 15–17. Boman, M., Brouwers, L., Hansson, K., Jansson, C.-G., Kummeneje, J., and Verhagen, H. 2001. Artificial agent action in markets. Electronic Commerce Research 1, 1-2, 159–168. Boman, M., Johansson, S., and Lybäck, D. 2001. Parrondo strategies for artificial traders. In Intelligent Agent Technology, N. Zhong, J. Liu, S. Ohsuga, and J. Bradshaw, Eds. World Scientific, Singapore, 150–159. ACM Journal Name, Vol. V, No. N, December 2017. Agent Trade Servers in Financial Exchange Systems · 11 Bylund, M. 2001. Personal service environments—Openness and user control in user-service interaction. Tech. rep., Dept of Information Technology, Uppsala Univ. IT Licentiate Thesis 2001-008. Cover, R. 2001. The XML cover pages—Open Financial Exchange (OFX). Available at http: //xml.coverpages.org/ofx.html, last modified Jan 3, 2001. Dean, T. and Boddy, M. 1988. An analysis of time-dependent planning. In Proc AAAI’88. AAAI Press/MIT Press, St. Paul, MN, 49–54. Hauser, V. and Orrhult, J. 2002. Network monitoring for networking agents. M.S. thesis, Dept of Computer and Systems Sciences, Stockholm University. 02-01-DSV-SU. Ramakrishnan, K. K., Floyd, S., and Black, D. 2001. The Addition of Explicit Congestion Notification (ECN) to IP. Internet Engineering Task Force. RFC 3168, Proposed Standard. Ruddle, M. 1999. The application of mobile agents to share trading. M.S. thesis, Dept of Electrical and Electronic Engineering, Univ of London. Russell, S. and Wefald, E. 1991. Do the Right Thing–Studies in Limited Rationality. MIT Press, Cambridge, Mass. Rust, J., Miller, J. H., and Palmer, R. 1994. Characterizing effective trading strategies–insights from a computerized double auction tournament. Economic Dynamics and Control 18, 61–96. Tanenbaum, A. S. 1996. Computer Networks, 3rd ed. Prentice-Hall, New Jersey. Weinhardt, C. and Gomber, P. 1999. Agent-mediated off-exchange trading. In Proc HICSS-32. IEEE Computer Society. Ygge, F. and Akkermans, H. 2000. Resource-oriented multicommodity market algorithms. Autonomous Agents and Multi-Agent Systems 3, 1, 53–71. Received March 2002; revised...; accepted... ACM Journal Name, Vol. V, No. N, December 2017.
5cs.CE
THE NUMBER OF MONODROMY REPRESENTATIONS OF ABELIAN VARIETIES OF LOW p-RANK arXiv:1706.03435v1 [math.AG] 12 Jun 2017 BRETT FRANKEL Abstract. Let Ag be an abelian variety of dimension g and p-rank λ ≤ 1 over an algebraically closed field of characteristic p > 0. We compute the number of homomorphisms from π1ét (Ag , a) to GLn (Fq ), where q is any power of p. We show that for fixed g, λ, and n, the number of such representations is polynomial in q, and give an explicit formula for this polynomial. We show that the set of such homomorphisms forms a constructible set, and use the geometry of this space to deduce information about the coefficients and degree of the polynomial. In the last section we prove a divisibility theorem about the number of homomorphisms from certain semidirect products of profinite groups into finite groups. As a corollary, we deduce that when λ = 0, # Hom(π1ét (Ag , a), GLn (Fq )) #GLn (Fq ) is a Laurent polynomial in q. Contents Acknowledgments 1. Introduction 2. Counting Formulas 2.1. Some Linear Algebra 2.2. Polynomials and their Types 2.3. Counting 3. The Space of Representations 4. A Divisibility Theorem for Profinite Groups 4.1. Introduction and Statement of Theorem 4.2. Proof (first statement) 4.3. Proof of the Converse References 1 2 2 4 4 4 5 10 12 12 13 14 15 Acknowledgments This paper is derived from my Ph.D. thesis, and as such there are far too many people who have impacted this work than can be listed here. It is a pleasure to thank Ted Chinburg, my thesis advisor, for suggesting this problem and for countless discussions and guidance. Thanks also to David Harbater, Zach Scherr, and Ching-Li Chai for helpful discussions and answering my questions. I am grateful to Professor Fernando Rodriguez-Villegas for hosting me for a very productive week at the International Centre for Theoretical Physics. It was he who observed Corollary 3, and introduced me to both his theorem with Cameron Gordon [5] and the theorem of Frobenius, [3] from which one easily deduces Corollary 3. He also made me aware of Proposition 2. Bob Guralnick very helpfully referred me to both his paper with Sethuraman [6] and earlier work of Gerstenhaber [4]. Additional thanks are due to Nir Avni for comments on the draft and Sebastian Sewerin for help reading [3]. Many others have had a great influence on my mathematical development, which no doubt manifests itself in some of the work that follows. There are too many to list here, but I have attempted to acknowledge many of these people in the thesis document.[2] 1. Introduction In Mixed Hodge Polynomials of Character Varieties, [7] Hausel and RodriguezVillegas computed the number of homomorphisms from the fundamental group of a Riemann surface X of genus g into GLn (Fq ). By van Kampen’s theorem, this is equivalent to counting 2g-tuples of matrices, P (q) = # Hom(π1 (X, x), GLn (Fq )) = #{(X1 , Y1 , · · · , Xg , Yg ) : [X1 , Y1 ][X2 , Y2] · · · [Xn , Yn ] = 1}, where [Xi , Yi ] denotes the commutator XY X −1 Y −1 . They also consider a twisted version of the problem, computing R(q) = # Homtwist (π1 (X, x), GLn (Fq )) = #{(X1 , Y1 , · · · , Xg , Yg ) : [X1 , Y1 ][X2 , Y2] · · · [Xn , Yn ] = ζn }, where ζn is a primitive nth root of 1. The salient feature of both these counts is that, for fixed g and n, P and R are both polynomial functions of q. Another curious feature is that P (q) is divisible by the order of GLn (Fq ). This phenomenon is explained in [5]. In the twisted case, P GLn acts scheme-theoretically freely on Homtwist (π1 (X), GLn ), and the GIT quotient Mn = Homtwist (π1 (X, x), GLn )//P GLn is the moduli space of twisted homomorphisms from π1 (X, x) to GLn . Via a theorem of N. Katz, (in the appendix to [7]), the polynomial point-counting formula is equal to the E-polynomial E(Mn , T ) of Mn (C), which encodes information about the weight and Hodge filtrations on the cohomology of Mn . Baraglia and Hekmati [1] have more recently extended these methods to the moduli of untwisted representations. The results in this paper may be thought of as an analogue of the combinatorial results in [7] and [1], now applied to varieties of positive characteristic. The most natural analogue would be consider a curve C/F̄p in place of a Riemann surface. 2 However, in positive characteristic, the étale fundamental group is a much more subtle object. In particular, there is not a single curve of genus greater than 1 for which an explicit presentation of the fundamental group is known. [12] However, these fundamental groups have well-understood abelianization; the abelianization of the fundamental group of a curve is the fundamental group of the Jacobian variety, which is the dual of the Jacobian. This paper treats representations of fundamental groups of abelian varieties. Let Ag be an abelian variety of dimension g. The p-torsion points of A form a vector space over Fp of dimension 0 ≤ λ ≤ g. We call λ the p-rank of Ag . Let a ∈ A. The étale fundamental group of Ag is given by π1ét (Ag , a) ∼ = Y (Zℓ )2g × Zλp ℓ6=p ∼ = (Ẑ′ )2g−λ × Ẑλ , where Ẑ = lim Z/n ←− is the profinite completion of the group of integers and Ẑ′ = lim Z/n ←− (n,p)=1 is the group of integers completed away from the prime p. To lighten the notation, we will henceforth write π1 (Ag ) instead of π1ét (Ag , a). Let q be a power of p. A homomorphism π1 (Ag ) → GLn (Fq ) is determined by the image of the topological generators, so specifying a homomorphism is equivalent to choosing an ordered 2g-tuple of pairwise commuting matrices, such that the first 2g − λ have order not divisible by p. Theorems 1 and 2 explicitly compute the number of homomorphisms π1 (Ag ) → GLn (Fq ), where q is a power of p and the p-rank of Ag is either 0 or 1, respectively. Theorem 3 computes the number of homomorphisms up to conjugation in the p-rank 0 case. All three counting formulas are polynomial in q, depending on g and n but not on the characteristic. Section 3 considers the space of all such representation, and relates the geometry of this space to certain features of the polynomial formulas in the previous section. We show that the counting polynomial has integer coefficients, and give a lower bound for the degree, which we show to be exact when A is in elliptic curve. In section 4, we state and prove the following theorem. Theorem (Theorem 6). Let S be a set of primes (not necessarily finite), and let ẐS = lim Z/n, where the the inverse limit is taken over all natural numbers n not ←− divisible by any prime in S. Then for any topologically finitely generated profinite group Γ and finite group G, # Hom(Γ ⋊ ẐS , G) ∈ S−1 Z, |G| 3 where Γ ⋊ ẐS is any semidirect product of Γ and G, and S is the multiplicative set generated by the elements of S. Conversely, if Γ̃ is topologically finitely generated and # Hom(Γ̃, G) ∈ S−1 Z |G| for all finite groups G, then there exists a Γ with Γ̃ ∼ = Γ ⋊ ẐS . Theorem 6 is the profinite analogue of a divisibility theorem by Gordon and Villegas[5]. We deduce as a corollary that when the λ = 0, Hom(π1 (Ag ), GLn (Fq ))/#GLn (Fq ) is a Laurent polynomial in q. 2. Counting Formulas Our main reference in this section is Macdonald’s Symmetric Functions and Hall Polynomials. [10] Throughout, p will be a prime number, and q will denote a power of p. 2.1. Some Linear Algebra. For any matrix X ∈ GLn (Fq ) we have an associated Fq [T ]-module structure on Fnq , where T acts by X. If X and Y induce isomorphic module structures on Fnq , then the isomorphism of Fq [T ]-modules defines an element of GLn (Fq ), so X and Y are conjugate. Note that X ∈ GLn (Fq ) has order prime to p if and only if X acts semisimply on Fnq . That is, X is diagonalizable over F̄q . Since elements of order prime to p act semisimply, the associated Fq [T ]-module is a direct sum of simple modules of the form Fq [T ]/f (T ), where the f (T ) are irreducible but not necessarily distinct. Matrices of order prime to p are thus uniquely characterized, up to conjugation, by their characteristic polynomials. 2.2. Polynomials and their Types. Definition 1. A type Λ of n is a partition of n along with a refinement of its conjugate. That is, a partition λ of n along with partitions λi of the multiplicities of the entries i of λ. This is a slight generalization of what Macdonald calls a type in [10]. For example, the data λ = (5 3 3 3 3 3 2 2 2 1 1) = (5(1) 3(5) 2(3) 1(2) ), λ5 = (1), λ4 = ∅, λ3 = (2 2 1), λ2 = (2 1), λ1 = (2) give a type of 28. We shall write λ ⊢ n when λ is a partition of n, and Λ  n when Λ is a type of n. By Y f (i, r) (i,r)∈Λ we will mean the product taken over all pairs (i, r) such that i ∈ λ and r ∈ λi . We index over λ without multiplicity, but over r ∈ λi with multiplicity. So if   λ = (3 3 3 3 3 1 1) Λ = λ3 = (2 2 1) ,  λ1 = (2) then Y f (i, r) = f (3, 2)2f (3, 1)f (1, 2). (i,r)∈Λ 4 We associate to an n × n matrix X a type Λ  n by considering the characteristic polynomial cX (T ) of X. Factoring cX (T ) into irreducible factors gives a partition of λ ⊢ n, where the entries of λ are the degrees of the irreducible factors of cX (T ), counted with multiplicity. We then take λi to be the partition consisting of the multiplicity of each distinct degree-i factor of cX (T ). For example, over F3 , we associate λ = (3 3 1 1 1 1 1 1), λ3 = (2), λ1 = (3 3) to the polynomial (T 3 + 2T + 1)2 (T − 2)3 (T − 1)3 . Recall that the number of irreducible monic polynomials over Fq of degree i is 1X µ(k)q i/k , i k|i where µ is the Möbius function. [9] Definition 2. Denote by ψΛ (q) the number of monic polynomials p(T ) ∈ Fq (T ) with factorization type Λ. Note that ψΛ (T ) ∈ Q[T ], but in general ψΛ (T ) ∈ / Z[T ]. For instance, if λ = (1 1), λ = (1 1), then (q − 1)(q − 2) φΛ (q) = . 2 1 2.3. Counting. We now count the number of homomorphisms from π1 (Ag ) to GLn (Fq ), where the p-rank of Ag is 0. This is equivalent to counting 2g-tuples of commuting matrices (X1 , . . . , Xk ) such that each Xi has order prime to p. Since the combinatorial arguments below do not make use of the fact that 2g is even, we may state a slightly stronger theorem. Theorem 1. The number of ordered k-tuples of pairwise-commuting, semisimple, invertible matricies with entries in Fq is Y X Y X ··· ψΛ2 (q i1 ) ψΛ1 (q) #GLn (q) (i1 ,r1 )∈Λ1 Λ2 r1 Λ1 n ··· X ψΛk−1 (q i1 i2 ···ik−2 ) Λk−1 rk−2 Y X (ik−1 ,rk−1 )∈Λk−1 Λk rk−1 (i2 ,r2 )∈Λ2 i1 i2 ···ik−1 ψ (q ) Q Λk . i 1 #GLrk (q i2 ···ik ) (ik ,rk )∈Λk For instance, the number of commuting semisimple pairs (X, Y ) ∈ GL2 (Fq )2 is (q 3 + q 2 − q + 1) #GL2 (Fq ) = q 6 − 3q 4 + 2q 3 + q 2 − 2q + 1. q In GL3 (Fq ), the number of semisimple commuting pairs is q 6 − q 5 − q 4 + 2q 3 − q 2 + q − 1 q3 =q 12 − 2q 11 − q 10 + 4q 9 − q 8 − 4q 6 + 2q 5 + 3q 4 − 2q 3 + q 2 − 2q + 1. #GL3 (Fq ) Proof. We first prove the theorem for k = 2. Since semisimple matrices are characterized, up to conjugation, by their characteristic polynomials, we associate to each such conjugacy class a type Λ. There are by definition ψΛ (q) conjugacy classes of 5 type Λ. Suppose X1 is any matrix of order prime to p, with associated type Λ. A matrix Y commutes with X1 if and only if Y acts X-equivariantly on Fnq . That is, writing Fnq as a sum of simple modules M (Fq [T ]/fj (T ))rj , Fnq ∼ = j the action of Y is a Fq [T ]-automorphism of each (Fq [T ]/fj (T ))rj . Specifying such an action is given by an element of GLrj (Fqdeg fj ). The order of the centralizer of a semisimple matrix X1 with type Λ is thus Y Y (1) #GLrj (Fqdeg fj ) = #GLr (Fqi ). fj (i,r)∈Λ The matrix X2 commutes with X1 and also must be semisimple, so X2 acts semisimply on each (Fq [T ]/fj (T ))rj . A semisimple matrix Yj ∈ GLrj (Fqdeg fj ) is determined, up to conjugacy, by its characteristic polynomial, or equivalently by a type N = (ν, ν ℓ )  rj and a polynomial of type N in Fqdeg fj [T ]. By the same argument used to compute the cardinality of the centralizer of X1 , we see that index of the centralizer of Yj ∈ GLrj (Fqdeg fj ) is #GLrj (Fqdeg fj ) Q . #GLs (Fqdeg(fj )ℓ ) (ℓ,s)∈N The number of all such Yj is therefore   X #GLrj (Fqdeg fj )  deg fj ) Q (2) . ψN (q #GLs (Fqdeg(fj )ℓ ) N r j (ℓ,ν)∈N So, if X1 is semisimple with type Λ, the number of semisimple matrices X2 commuting with X1 is   YX #GLrj (Fqdeg fj )  deg fj ) Q ψN (q  #GLs (Fqdeg(fj )ℓ ) f N r j (3) = j (ℓ,s)∈N   Y X #GLr (Fqi )  i . ψN (q ) Q ) #GL (F iℓ s q N r (i,r)∈Λ (ℓ,s)∈N Given a semisimple matrix X ∈ GLn (Fq ), we have just computed both the number of matrices (1) that commute with X and the number of semisimple matrices (3) that commute with X. Note that both of these numbers depend only on the type associated to X, since the deg(fj )’s are the entries of λ, and the rj ’s are the entries of the corresponding λdeg fj ’s. 6 From these two computations, we see that the number of pairs (X1 , X2 ) of commuting semisimple matrices in GLn (Fq ) is   XX Y X #GLr (Fqi ) #GLn (Fq )  i Q (4)  ψN (q ) Q #GLr (Fqi ) #GLs (Fqiℓ ) Λn ψ(Λ) (i,r)∈Λ N r (i,r)∈Λ (ℓ,s)∈N where the second sum is taken over polynomials with type Λ. Since   Y X #GLr (Fqi ) #GLn (Fq )  i Q  ψN (q ) Q #GLr (Fqi ) #GLs (Fqiℓ ) N r (i,r)∈Λ (i,r)∈Λ (ℓ,s)∈N depends only on Λ, we may simplify (4) by replacing the second summation with multiplication by ψΛ (q). Thus (4) simplifies to (5) #GLn (Fq ) X ψΛ (q) Y X (i,r)∈Λ N r Λn Q ψN (q i ) . #GLs (Fqiℓ ) (ℓ,s)∈N We now continue by induction. Suppose the number of pairwise commuting (k − 1)-tuples of semisimple elements of GLn (Fq ) is Y Y X X ψΛ2 (q i1 ) ψΛ1 (q) #GLn (q) Λ1 n ··· X Λk−2 rk−3 ψΛk−2 (q i1 i2 ···ik−3 ) X Y (ik−2 ,rk−2 )∈Λk−2 Λk−1 rk−2 (i1 ,r1 )∈Λ1 Λ2 r1 ··· (i2 ,r2 )∈Λ2 i1 i2 ···ik−2 Q ψΛk−1 (q ) . #GLrk−1 (q i1 i2 ···ik−1 ) (ik−1 ,rk−1 )∈Λk−1 Suppose further that for each possible action of X1 , . . . , Xk−1 on Fnq , the action of Xk−1 on an isotypic summands of the Fq [X1 , . . . , Xk−2 ]-module Fnq has characteristic polynomials of type Λk−1 as above when these isotypic summands are viewed as Fqi1 i2 ···ik−2 -vector spaces. (We note that Λ2k−1 may be different for different summands; indeed, Λk−1  rk−2 , and the symbol rk−2 takes on different values in different terms of the above formula). Since Xk commutes with each Xℓ , 1 ≤ ℓ < k, then Xk acts on Fnq by acting on each isotypic summand, which by induction are Fqi1 i2 ···ik−2 [Xk−1 ]-modules, or Fqi1 i2 ···ik−1 vector spaces of dimension rk−1 . There are X ψΛk (q i1 i2 ···ik−1 ) Λk rk−1 conjugacy classes of semisimple elements of GLrk−1 (Fqi1 i2 ···ik−1 ). By (1), each conjugacy class has #GLrk−1 (Fqi1 i2 ···ik−1 ) Q #GLrk (Fqi1 i2 ···ik ) (ik ,rk )∈Λk 7 elements, for a total of F (rk−1) = X ψΛk (q i1 i2 ···ik−1 ) Λk rk−1 #GLrk−1 (Fqi1 i2 ···ik−1 ) Q #GLrk (Fqi1 i2 ···ik ) (ik ,rk )∈Λk r Fqk−1 i1 i2 ···ik−1 . So by induction, the number of pairwise-commuting possible Xk -actions on k-tuples of semisimple matrices in GLn (Fq ) is X Y X Y #GLn (q) ψΛ1 (q) ··· ψΛ2 (q i1 ) (i1 ,r1 )∈Λ1 Λ2 r1 Λ1 n ··· X Y ψΛk−1 (q i1 ···ik−2 ) Λk−1 rk−2 (ik−1 ,rk−1 )∈Λk−1 (i2 ,r2 )∈Λ2 1 F (rk−1 ). #GLrk−1 (q i1 ···ik−1 ) Canceling factors of #GLrk−1 (q i1 ···ik−1 ), the above formula simplifies to the statement of the theorem.  Observation. From the proof, we see that the formula in Theorem 1 is polynomial in q. This polynomial depends on n and k, but not on the characteristic. The next theorem computes # Hom(π1 (Ag ), GLn (Fq )) when the p-rank of Ag is 1. Remark. The polynomial behavior of the formula in Theorem 1 is strictly a samecharacteristic phenomenon, which fails even in the simplest case in characteristic ℓ 6= p. Consider the set Hom(Ẑ′ , Gm (Fℓn ). When ℓ 6≡ 1 mod p, there are infinitely many n for which ℓn 6≡ 1 mod p, and for such n # Hom(Ẑ′ , Gm (Fℓn ) = ℓn − 1. But ℓn − 1. When ℓ ≡ 1 for those n such that ℓn ≡ 1 mod p, # Hom(Ẑ′ , Gm (Fℓn ) s mod p, we may write ℓ = mp + 1 with p ∤ m. Then for those n such that p ∤ n, the p-adic valuation of ℓn − 1 is s, and # Hom(Ẑ′ , Gm (Fℓn ) = (ℓn − 1)/ps . When p | n, # Hom(Ẑ′ , Gm (Fℓn ) (ℓn − 1)/ps . Theorem 2. The number of ordered k-tuples of invertible, pairwise-commuting matrices (X1 , . . . , Xk−1, Y ) such that the Xi are all semisimple is Y X Y X ··· ψΛ2 (q i1 ) #GLn (q) ψΛ1 (q) (i1 ,r1 )∈Λ1 Λ2 r1 Λ1 n ··· X ψΛk−2 (q i1 i2 ···ik−3 ) Λk−2 rk−3 Y (i2 ,r2 )∈Λ2 (q i1 ···ik−2 − 1)(q i1 ···ik−2 )rk−2 −1 . (ik−2 ,rk−2 )∈Λk−2 Proof. As in the inductive step of the theorem, we assume the number of pairwise commuting (k − 2)-tuples of semisimple elements of GLn (Fq ) is X Y X Y #GLn (q) ψΛ1 (q) ··· ψΛ2 (q i1 ) Λ1 n ··· X Λk−3 rk−4 ψΛk−3 (q i1 i2 ···ik−4 ) X Y (ik−3 ,rk−3 )∈Λk−3 Λk−2 rk−3 (i1 ,r1 )∈Λ1 Λ2 r1 (i2 ,r2 )∈Λ2 i1 i2 ···ik−3 Q ψΛk−2 (q ) . #GLrk−2 (q i1 i2 ···ik−2 ) (ik−2 ,rk−2 )∈Λk−2 As before, for each possible action of X1 , . . . , Xk−2 on Fnq , the action of Xk−2 on an isotypic summands of the Fq [X1 , . . . , Xk−3]-module Fnq has characteristic polynomials 8 of type Λk−2 as above when these isotypic summands are viewed as Fqi1 i2 ···ik−3 -vector spaces. Thus it suffices to count the number of pairs Xk−1 , Y which act on each isotypic summand of the Fq [X1 , . . . , Xk−2 ]-module Fnq . By assumption, these summands are r of the form Fqk−2 i1 ···ik−2 . Let O be the orbit, under the conjugation action in GLrk−2 (Fqi1 ···ik−2 ), of a matrix of order prime-to-p. Given any Xk−1 , we will denote by A its restriction to the isotypic summand in question, and similarly B will denote the restriction of Y . For any A ∈ O, the number of nonsingular matrices B that commute with A is the order of the centralizer of A. The number of elements in O is the index of the centralizer of A. Thus there are precisely #GLrk−2 (Fqi1 ···ik−2 ) pairs (A, B) such that A and B commute and A ∈ O. So to compute the number of pairs (A, B) with [A, B] = 1 and |A| prime to p, we need only count the number of possible conjugacy classes A. These are in bijection with characteristic polynomials, of which there are (q i1 ···ik−2 )rk−2 −1 (q i1 ···ik−2 − 1). Thus the number of pairwise commuting k-tuples of invertible n × n matrices (X1 , . . . , Xk−1 , Y ), of which all but possibly the last have order prime to p, is #GLn (q) X ψΛ1 (q) X ψΛk−3 (q i1 ···ik−4 ) X Y (ik−3 ,rk−3 )∈Λk−3 Λk−2 rk−3 Λk−3 rk−4 X ψΛ2 (q i1 ) (i1 ,r1 )∈Λ1 Λ2 r1 Λ1 n ··· Y ψΛk−2 (q Q Y ··· (i2 ,r2 )∈Λ2 i1 ···ik−3 )#(A, B) , #GLrk−2 (q i1 ···ik−2 ) (ik−2 ,rk−2 )∈Λk−2 where #(A, B) = Y #GLrk−2 (Fq i1···ik−2 )(q i1 ···ik−2 )rk−2 −1 (q i1 ···ik−2 − 1). (ik−2 ,rk−2 )∈Λk−2 After cancellation we arrive at the statement of the theorem.  Theorem 3. The number of conjugacy classes of k-tuples of pairwise-commuting, invertible, semisimple matrices is X ψΛ1 (q) ··· Λk−1 rk−2 ψΛk−1 (q i1 i2 ···ik−2 ) #{(X1 , . . . , Xk )}/ ∼= Y X ··· ψΛ2 (q i1 ) (i1 ,r1 )∈Λ1 Λ2 r1 Λ1 n X Y Y (i2 ,r2 )∈Λ2 (q i1 ···ik−1 )rk−1 −1 (q i1 ···ik−1 − 1). (ik−1 ,rk−1 )∈Λk−1 Proof. Observe that Y ∈ GLn (Fq ) stabilizes (X1 , . . . , Xk ) if and only if it commutes with each Xℓ . Writing Z(X1 , . . . , Xk ) for the order of the stabilizer of (X1 , . . . , Xk ) 9 and applying the orbit-stabilizer lemma, X #{(X1 , . . . , Xk )}/ ∼ = {(X1 ,...,Xk )} = = Z(X1 , . . . , Xk ) #GLn (Fq ) 1 #GLn (Fq ) 1 #GLn (Fq ) X Z(X1 , . . . , Xk ) {(X1 ,...,Xk )} X 1 {(X1 ,...,Xk ,Y )} where the last sum is taken over k +1-tuples pairwise commuting semisimple matrices (X1 , . . . , Xk , Y ) with all Xℓ semisimple. The value of this sum was computed in Theorem 2.  3. The Space of Representations In this section, Ag will be an abelian variety with p-rank 0, as before. However, all statements apply if the p-rank of Ag is 1, mutatis mutandi. All schemes below are reduced. Recall that a subset of affine (or projective) space is said to be constructible if it may be expressed as a Boolean combination of Zariski-closed sets. [11] Fix n, and let R = Hom(π1 (Ag ), GLn (F̄q )). Recall that a representation of π1 (Ag ) is given by a choice of 2g invertible matrices X k , 1 ≤ i ≤ 2g, such that these matrices are pairwise commuting and each have order relatively prime to p. Assigning a matrix 2 (Xijk )1≤i,j≤n to each generator, we may view R as a subset of A2gn . We will now show that for fixed n and g, the set R = Hom(π1 (Ag ), GLn (F̄q )) of all representations may be considered a constructible set. Proposition 1. R is constructible. Proof. The requirement that the matrices pairwise commute defines a closed affine subscheme. Invertibility is an open condition, so the variety of pairwise commuting, invertible matrices is quasi-affine. We may further specify that the matrices are (simultaneously) diagonalizable with the statement that there exists an invertible matrix C (with coordinates C i,j , 1 ≤ i, j ≤ n) so that CX k C −1 is diagonal for each k. This last statement requires an existential quantifier, and thus does not necessarily define a subscheme, but it is a first order statement in the sense of model theory, and 2 hence the space of representations is a definable subset of A2gn . Since the theory of algebraically closed fields admits quantifier elimination, [11] every definable set is in fact constructible, i.e. a Boolean combination of closed subschemes.  Alternatively, since we are considering simultaneously diagonalizable matrices, one may write the diagonalization of each Xk as an element of a torus, and then define 2 a morphism GLn × G2gn → A2gn , (C, X1 , . . . , X2g ) 7→ (C −1 X1 C, . . . , C −1 X2g C). m By Chevalley’s Theorem, [11] the image of this morphism, which is equal to R, is constructible.  Since R is constructible, we may write R = (R1 − R1′ ) ∪ (R2 − R2′ ) ∪ . . . ∪ (Rt − Rt′ ), where each Ri is a projective variety and Ri′ is a (possibly empty) closed subscheme 10 of Ri . Alternatively, since R is contained in affine space, we may choose each Ri and Ri′ to be affine. Proposition 2. Let P (T ) be the polynomial such that P (q) = #R(Fq ), the number of Fq -rational points of R. Then P (T ) ∈ Z[T ]. This argument is not new, and can be found in the appendix of [7] by Katz. Proof. Chose q so that each Ri and Ri′ is defined over Fq . Let P (T ) = a0 + a1 T + . . . ad T d . Then the zeta function Z(R, T ) is defined to be ∞ ∞ X X n P (q n )T n /n) Z(R, T ) = exp( R(Fqn )T /n) = exp( n=0 n=0 On the other hand, each Ri and is rational, and Ri′ is a projective variety, each Z(Ri , T ) and Z(Ri′ , T ) Z(R, T ) = Y Z(Ri , T ) i Z(Ri′ , T ) . Writing (1 − α1 T ) · · · (1 − αr T ) (1 − β1 T ) · · · (1 − βs T ) in lowest terms and taking logs, we see that r s X X log(1 − βk T ) = log Z(R, T ) log(1 − αj T ) − Z(R, T ) = j=1 k=1 = ∞ X P (q n )T n /n n=0 = ∞ X d X ai q in T n /n. n=0 i=0 And so, taking derivatives, s X k=1 r ∞ d d X αj XX X ai q i βk ∂ − = Z(R, T ) = ai q in T n−1 = . 1 − βk T 1 − αj T ∂T 1 − qiT n=0 i=1 j=1 i=1 Comparing poles, each αj and βk must be a power of q. Comparing numerators we see that for each i, either ai is the number of k such that βk = q i , or −ai is the number of j for which αj = q i .  From the above proof, we see that the leading coefficient of P (T ) is the multiplicity of (1 − βs T ) in the denominator of Z(R, T ). Theorem 4 (R. Guralnick, B. Sethuraman [6]). Let V be the variety of commuting k-tuples of n × n matrices. If ∆ ⊂ V denotes the union of the discriminant loci, i.e. the set on which at least one matrix has a repeated eigenvalue, then the the closure of R − ∆ is an irreducible component of V . The dimension of this component is n2 + (k − 1)n. Corollary 1. The degree of P (T ) is at least n2 + (2g − 1)n. 11 Proof. Let D ⊂ V be the union of the determinant loci, the set on which at least one matrix is not invertible. Note that V ⊃ R ⊃ V − (∆ ∪ D). Then we may decompose R = (R1 − R1′ ) ∪ (R2 − R2′ ) ∪ . . . ∪ (Rt − Rt′ ), where R1 is the closure of V − ∆, R1′ = ∆ ∪ D, and all Ri ⊂ (∆ ∪ D) for all i > 1. By theorem 4, the closure of R1 − ∆ is irreducible, and is thus equal to the closure of R1 − (∆ ∪ D) because D is closed. From the proof of Proposition 2, the degree of P (T ) is supi dim Ri , and dim R1 = n2 + (k − 1).  Theorem 5 (Gerstenhaber [4]). The variety of commuting pairs of matrices is irreducible. Corollary 2. When g = 1, P (T ) is monic of degree n2 + (2g − 1)n. Proof. Since the variety V of pairs of commuting matrices is irreducible, we may write R1 = V and R1′ = ∆ ∪ D, and V ⊃ R ⊃ V − (∆ ∪ D) as in the proof of Corollary 1. All remaining Ri are contained in ∆∪D, which is a closed subvariety of an irreducible variety and therefore of strictly lower dimension.  4. A Divisibility Theorem for Profinite Groups 4.1. Introduction and Statement of Theorem. In “On the divisibility of # Hom(Γ, G) by |G|,” [5] Cameron Gordon and Fernando Rodriguez-Villegas prove that for a finitely-generated group Γ̃, Γ̃ has infinite abelianization if and only if it satisfies the divisibility condition in the paper’s title for all finite groups G. This extends a result of Louis Solomon [14] which proves the same, assuming Γ̃ has a presentation with more generators than relations. Using their notation, # will denote the cardinality of a set, while | · | will be the order of either a finite group or an element of a finite group. By homomorphism, we will always mean a continuous homomorphism, where where countable groups are given the discrete topology. We now state and prove the following profinite analogue of [5]: Theorem 6. Let S be a set of primes (not necessarily finite), and let ẐS = lim Z/n, ←− where the the inverse limit is taken over all natural numbers n not divisible by any prime in S. Then for any topologically finitely generated profinite group Γ and finite group G, # Hom(Γ ⋊ ẐS , G) ∈ S−1 Z, |G| where Γ ⋊ ẐS is any semidirect product of Γ and G, and S is the multiplicative set generated by the elements of S. Conversely, if Γ̃ is topologically finitely generated and # Hom(Γ̃, G) ∈ S−1 Z |G| for all finite groups G, then there exists a Γ with Γ̃ ∼ = Γ ⋊ ẐS . Remark. This result is precisely the profinite version of [5], because a finitely generated group has infinite abelianiztion if and only if it is of the form Γ ⋊ Z. 12 Corollary 3. Let P (T ) be as in the previous section, i.e. the unique polynomial such that P (q) = Hom(π1 (Ag ), GLn (Fq )) whenever q is a power of p, and denote by G(T ) the polynomial such that G(q) = #GLn (Fq ). Then P (T ) 1 ∈ Z[T, ]. #GLn (Fq ) T Proof. Choose S = {p}. Writing π1 (Ag ) ∼ = (Ẑ′ )2g ∼ = (Ẑ′ )2g−1 × Ẑ′ ∼ = (Ẑ′ )2g−1 × ẐS , we see that for all q, P (q)/#GLn (Fq ) is a rational number whose denominator is (T ) divisible only by the prime p. Thus T n PG(T ∈ Q[T ] for sufficiently large n. Since ) (T ) G(T ) is monic, T n PG(T ∈ Z[T ]. )  4.2. Proof (first statement). In this section we prove that for any topologically finitely generated Γ, the number of homomorphisms from Γ ⋊ ẐS to G, when divided by |G|, has denominator divisible only by primes in S. We first recall a theorem of Frobenius. [3] (See [8] for a short elementary proof.) Theorem 7 (Frobenius). If H is a finite group and n elements of H with order dividing n is a multiple of n. |H|, then the number of Lemma 1. Let G be a finite group, and H a subgroup of order pr m, with p ∤ m. Choose g ∈ NG (H) with |g| a power of p. Then the set {x ∈ Hg : |x| is a power of p} has cardinality divisible by pr . Proof. We may assume that g ∈ / H, for otherwise the lemma follows from Theorem 7, and then reduce to the case that G = hH, gi, since it suffices to prove the lemma for s this subgroup. Let ps be the least positive integer with g p ∈ H. By Theorem 7, the number of elements of G with p-power order is a multiple of r+s p , and the number of such elements in K = hH, g p i is a multiple of pr+s−1 . Thus the number of elements of G\K with p-power order is a multiple of pr+s−1 . Let x ∈ G\K be of p-power order. Then we may write x = yg t with y ∈ H and p ∤ t. The group Z/(pr+s )× acts on the set of of all such x, n · x = xn . The orbit s of x under this action is the set of generators of hxi, and hxi surjects onto hgi/hg p i. Each orbit inside G\K therefore contains the same number of elements in each coset of the form Hg u with p ∤ u. G\K is the union of ϕ(ps ) = ps−1 (p − 1) cosets of H, so the number of elements of Hg with p-power order is equal to #{x ∈ G\K : |x| is a power of p}/ϕ(ps ), and is thus divisible by pr .  For any p ∈ / S we may write Γ ⋊ ẐS ∼ = (Γ ⋊ ẐS∪{p} ) ⋊ Zp . Therefore, we have reduced the statement of the theorem to the following: Proposition 3. Suppose Γ is any topologically finitely generated profinite group, and let vp denote the p-adic valuation on the integers. Then   # Hom(Γ ⋊ Zp , G) vp ≥ 0. |G| The proof of the proposition is now a straightforward modification of the argument in [5]. 13 Proof. A homomorphism Φ : Γ ⋊ Zp is determined by its restriction φ = Φ and the Γ image of 1 ∈ Zp , which is an element g ∈ G such that the order of g is a power of p, subject to the condition that φ((−1)γ(1)) = g −1φ(γ)g for all γ ∈ Γ. In particular, this condition ensures that g normalizes φ(Γ), and thus normalizes the centralizer Cφ of φ(Γ). Observe that if a pair (φ, g) determines a well-defined homomorphism Γ⋊Zp → G as above, then so does (φ, x) if and only if |x| is a power of p and x ∈ Cφ g. Thus # Hom(Γ ⋊ Zp , G) X #{g ∈ G : |g| is a power of p, g −1φ(γ)g = φ((−1)γ1) ∀ γ ∈ Γ}, = φ where the sum is taken over all φ which are restrictions of homomorphisms from Γ ⋊ Zp , ie. those φ for which there exists such a g. We let G act by conjugation on the set of homomorphisms restricted to Γ. The stabilizer of φ under this action is Cφ . Denoting by the orbit of φ by [φ], each element of [φ] extends to the same number of homomorphisms on Γ ⋊ Zp . For each [φ] choose a representative φ and an element gφ ∈ G such that (φ, gφ ) determines a homomorphism. # Hom(Γ ⋊ Zp , G) X #{g ∈ G : |g| is a power of p, g −1φ(γ)g = φ((−1)γ1) ∀ γ ∈ Γ} = φ X |G| = #{g ∈ G : |g| is a power of p, g −1 φ(γ)g = φ((−1)γ1) ∀ γ ∈ Γ} |Cφ | [φ] X |G| #{x ∈ Cφ gφ : |x| is a power of p}. = |Cφ | [φ] The proposition follows by applying Lemma 1 to the coset Cφ gφ .  4.3. Proof of the Converse. We have the following proposition: Lemma 2. Let S and S be as above, and Γ̃ a topologically finitely generated profinite group. Suppose that for all finite groups G, # Hom(Γ̃, G)/|G| ∈ S−1 Z. Then Γ̃ has ẐS = lim Z/n ←− (n,p)=1 ∀p∈S as a quotient. Proof. Suppose Γ̃ does not surject onto lim Z/n. ←− (n,p)=1 ∀p∈S Then for some prime ℓ ∈ / S and sufficiently large m, Γ̃ does not surject onto Z/ℓm . All homomorphisms from Γ̃ to abelian ℓ-groups factor through the maximal proabelian ℓ-quotient of Γ̃, which is itself a quotient of (Z/ℓm−1 )r , where Γ̃ is topologically generated by r generators. But there are at most ℓr(m−1) homomorphisms 14 (Z/ℓm−1 )r → Z/ℓs . Taking s > r(m − 1) and G = Z/ℓs , we see that # Hom(Γ̃, G) is not a multiple of |G|, and thus is not an element of S−1 Z.  All that remains to be shown is that Γ̃ is a semidirect product, which follows from the proposition below. Proposition 4. Let f : H → ẐS be a continuous surjection of profinite groups. Then f has a continuous section with closed image. Proof. Let h ∈ H with f (h) = 1. Q Consider the < h > generated by Q closed nsubgroup p h. It is isomorphic to a product p∈I Zp × p∈I / Z/p , where I is a set of primes. The order of h, as a supernatural number, is divisible by the order of 1 ∈ ẐS , and so S is contained in the complement of I (See [13]). Thus < h > has a direct factor K isomorphic to ẐS , which is a closed subgroup of H. K is topologically generated by the image k of h under the projection map < h > → K, and f (k) = 1. So H has a closed subgroup K which is abstractly isomorphic to ẐS , and f sends a topological generator of K to a topological generator of ẐS . The restriction of f to K is thus an isomorphism, and therefore admits a section.  Remark. We have in fact proven a stronger statement than the theorem. Namely, it suffices to check that # Hom(Γ̃, G)/|G| ∈ S−1 Z only for groups of the form G = Z/pe , where p ∈ / S. References [1] D. Baraglia and P. Hekmati. Arithmetic of singular character varieties and their e-polynomials. To appear in: Procedings of the LMS, 20(3):241–247, 2017. [2] B. Frankel. Representations of fundamental groups of abelian varieties in characteristic p. Dissertations available from ProQuest, Paper AAI10134944. [3] F. G. Frobenius. Verallgemeinerung des Sylow’schen satzes. Sitzungsberichte der Königlich Preussischen Akademie der Wissenschaften zu Berlin, pages 981–993, 1895. [4] M. Gerstenhaber. On dominance and varieties of commuting matrices. Annals of Mathematics, 73:324–348, 1961. [5] C. Gordon and F. Rodriguez-Villegas. On the divisibility of #Hom(Γ, G) by |G|. Journal of Algebra, 350(1):300–307, 2012. [6] R. M. Guralnick and B. A. Sethuraman. Commuting pairs and triples of matrices and related varieties. Linear Algebra and its Applications, 310(1-3):139–148, 2000. [7] T. Hausel and F. Rodriguez-Villegas. Mixed Hodge polynomials of character varieties. Inventiones Mathematicae, 174:555–624, 2008. [8] M. I. Isaacs and G. R. Robinson. On a theorem of Frobenius: Solutions of xn = 1 in finite groups. The American Mathematical Monthly, 99(4):352–354, 1992. [9] S. Lang. Algebra. Number 217 in Graduate Texts in Mathematics. Springer-Verlag, New York, revised third edition, 2000. [10] I. G. MacDonald. Symmetric Functions and Hall Polynomials. Oxford Mathematical Monographs. Oxford University Press, New York, second edition, 1995. [11] D. Marker. Model Theory: An Introduction. Number 217 in Graduate Texts in Mathematics. Springer-Verlag, New York, 2000. [12] R. Pries and K. Stevenson. A survey of Galois theory of curves in characteristic p. Fields Institute Communications, 60:169–191, 2011. [13] J-P. Serre. Galois Cohomology. Springer Monographs in Mathematics. Springer-Verlag, Berlin, corrected second printing of the second edition, 2002. [14] L. Solomon. The solution of equations in groups. Archiv der mathematik, 20(3):241–247, 1969. 15 Department of Mathematics, Northwestern University. 2033 Sheridan Road, Evanston, IL 60208, USA [email protected] 16
4math.GR
arXiv:1708.02218v3 [cs.CV] 12 Feb 2018 Graph Classification with 2D Convolutional Neural Networks Antoine J.-P. Tixier Giannis Nikolentzos École Polytechnique [email protected] École Polytechnique and AUEB [email protected] Polykarpos Meladianos Michalis Vazirgiannis École Polytechnique and AUEB [email protected] École Polytechnique and AUEB [email protected] ABSTRACT 2 Graph learning is currently dominated by graph kernels, which, while powerful, suffer some significant limitations. Convolutional Neural Networks (CNNs) offer a very appealing alternative, but processing graphs with CNNs is not trivial. To address this challenge, many sophisticated extensions of CNNs have recently been introduced. In this paper, we reverse the problem: rather than proposing yet another graph CNN model, we introduce a novel way to represent graphs as multi-channel image-like structures that allows them to be handled by vanilla 2D CNNs. Experiments reveal that our method is more accurate than state-of-the-art graph kernels and graph CNNs on 4 out of 6 real-world datasets (with and without continuous node attributes), and close elsewhere. Our approach is also preferable to graph kernels in terms of time complexity. Code and data are publicly available1 . The state-of-the-art in graph classification is currently dominated by a family of methods referred to as graph kernels. Graph kernels compute the similarity between two graphs as the sum of the pairwise similarities between some of their substructures, and then pass the similarity matrix computed on the entire dataset to a kernel-based supervised algorithm such as the Support Vector Machine [7] to learn soft classification rules. Graph kernels mainly vary based on the substructures they use, which include random walks [10], shortest paths [2], and subgraphs [28], to cite only a few. While graph kernels have been very successful, they suffer significant limitations: L1: High time complexity. This problem is threefold: first, populating the kernel matrix requires computing the similarity between every two graphs in the training set (say of size N ), which amounts to N (N −1)/2 operations. The cost of training therefore increases much more rapidly than the size of the dataset. Second, computing the similarity between a pair of graphs (i.e., performing a single operation) is itself polynomial in the number of nodes. For instance, the time complexity of the shortest path graph kernel is O(|V1 | 2 |V2 | 2 ) for two graphs (V1 , V2 ), where |Vi | is the number of nodes in graph Vi . Processing large graphs can thus become prohibitive, which is a serious limitation as big networks abound in practice. Finally, finding the support vectors is O(N 2 ) when the C parameter of the SVM is small and O(N 3 ) when it gets large [4], which can again pose a problem on big datasets. L2: Disjoint feature and rule learning. With graph kernels, the computation of the similarity matrix and the learning of the classification rules are two independent steps. In other words, the features are fixed and not optimized for the task. L3: Graph comparison is based on small independent substructures. As a result, graph kernels focus on local properties of graphs, ignoring their global structure [24]. They also underestimate the similarity between graphs and suffer unnecessarily high complexity (due to the explosion of the feature space), as substructures are considered to be orthogonal dimensions [32]. KEYWORDS Deep Learning, Graphs Kernels, Neural Networks, Convolution, Social Networks, Bioinformatics. 1 GRAPH CLASSIFICATION Graphs, or networks, are rich, flexible, and universal structures that can accurately represent the interaction among the components of many natural and human-made complex systems. A central graph mining task is that of graph classification (not to be mistaken with node classification). The instances are full graphs and the goal is to predict the category they belong to. The applications of graph classification are numerous and range from determining whether a protein is an enzyme or not in bioinformatics, to categorizing documents in NLP, and social network analysis. Graph classification is the task of interest in this study. 1 link will be provided upon acceptance Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. Conference’17, July 2017, Washington, DC, USA © 2018 Association for Computing Machinery. ACM ISBN 978-x-xxxx-xxxx-x/YY/MM. . . $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn LIMITATIONS OF GRAPH KERNELS 3 PROPOSED METHOD 3.1 Proposed method: overview We propose a simple approach to turn a graph into a multichannel image-like structure suitable to be processed by a traditional 2D CNN. The process (summarized in Figure 1) can be broken down into 3 steps: (1) graph node embedding, Figure 1: Our 3-step approach represents graphs as “images” suitable to be passed to vanilla 2D CNNs (continuous node attribute vectors can be passed as extra channels). Steps 1 & 2: graph node embeddings and compression with PCA. Step 3: computation and stacking of the 2D histograms. (2) embedding space compression, (3) repeated extraction of 2D slices from the compressed space and computation of a 2D histogram for each slice. The “image” representation of the graph is finally given by the stack of its 2D histograms (each histogram making for a channel). Note that the dimensionality of the final representation of a graph does not depend on its number of nodes or edges. Big and small graphs are represented by images of the same size. Our method addresses the limitations of graph kernels (in bold) in the following ways: L1. By converting all graphs in a given dataset to representations of the same dimensionality, and by using a classical 2D CNN architecture for processing those graph representations, our method offers constant time complexity at the instance level, and linear time complexity at the dataset level. Moreover, state-of-the-art node embeddings can be obtained for a given graph in linear time w.r.t. the number of nodes in the graph, for instance with node2vec [12]. L2. Thanks to the 2D CNN classifier, features are learned directly from the raw data during training to optimize performance on the downstream task. L3. Our approach capitalizes on state-of-the-art graph node embedding techniques that capture both local and global properties of graphs. In addition, we remove the need for handcrafted features. 3.2 Proposed method: details How to represent graphs as structures that verify the spatial dependence property? Convolutional Neural Networks (CNNs) are feedforward neural networks specifically designed to work on regular grids [18]. A regular grid is the d-dimensional Euclidean space discretized by parallelotopes (rectangles for d = 2, cuboids for d = 3, etc.). Regular grids satisfy the spatial dependence2 property, which is the fundamental premise on which local receptive fields and hierarchical composition of features in CNNs hold. Traditionally, a graph G(V , E) is encoded as its adjacency matrix A or Laplacian matrix L. A is a square matrix of dimensionality |V | × |V |, symmetric in the case of undirected graphs, whose (i, j)th entry Ai, j is equal to the weight of the edge ei, j between nodes vi and v j , if such an edge exists, or to 0 otherwise. On the other hand, the Laplacian matrix L is equal to D − A, where D is the diagonal degree matrix. One could initially consider passing one of those structures as input to a 2D CNN. However, unlike in images, where close pixels are more strongly correlated than distant pixels, adjacency and Laplacian matrices are not associated with spatial dimensions and the notion of Euclidean distance, and thus do not satisfy the spatial dependence property. As will be detailed next, we capitalize on graph node embeddings to address this issue. Step 1: Graph node embeddings. There is local correlation in the node embedding space. In that space, the Euclidean distance between two points is meaningful: it is inversely proportional to the similarity of the two nodes they represent. For instance, two neighboring points in the embedding space might be associated with two nodes playing the same structural role (e.g., of flow control), belonging to the same community, or sharing some other common property. Step 2: Alignment and compression with PCA. As state-of-theart node embedding techniques (such as node2vec) are neural, they are stochastic. Dimensions are thus recycled from run to run, which means that a given dimension will not be associated with the same latent concepts across graphs, or across several runs on the same graph. Therefore, to ensure that the embeddings of all the graphs in the collection are comparable, we apply PCA and retain the first d ≪ D principal components (where D is the dimensionality of the original node embedding space). PCA also serves an information maximization (compression) purpose. Compression is desirable as it greatly reduces the shape of the tensors fed to the CNN (for reasons that will become clear in what follows), and thus complexity, at the expense of a negligible loss in information. 2 the concept of spatial dependence is well summarized by: “everything is related to everything else, Step 3: Computing and stacking 2D histograms. We finally repeatedly extract 2D slices from the d-dimensional PCA node embedding space, and turn those planes into regular grids by discretizing them into a finite, fixed number of equally-sized bins, where the value associated with each bin is the count of the number of nodes falling into that bin. In other words, we represent a graph as a stack of d/2 2D histograms of its (compressed) node embeddings3 . As illustrated in Figure 2, the first histogram is computed from the coordinates but near things are more related than distant things” [31]. For instance in images, close pixels are more related than distant pixels. 3 our representation is unrelated to the widespread color histogram encoding of images. channel 1 channel 2 compressed embeddings counts 3 3 40 2 2 30 1 1 4 20 0 0 20 dimension 4 3 30 1 2 4 dimension 2 0 1 2 3 40 bivariate histogram 4 counts 4 bivariate histogram 0 compressed embeddings −2 −1 0 1 2 3 −2 −1 4 0 1 2 3 4 10 −2 0 −2 −2 −2 10 −2 −1 dimension 1 dimension 1 0 1 2 3 dimension 3 4 0 −2 −1 0 1 2 3 dimension 3 4 Figure 2: Node embeddings and image representation of graph ID #10001 (577 nodes, 1320 edges) from the REDDIT-12K dataset. of the nodes in the plane made of the first two principal directions, the second histogram from directions 3 and 4, and so forth. Note that using adjacent and following PCA dimensions is an arbitrary choice. It ensures at least that channels are sorted by decreasing order of informativeness. Using computer vision vocabulary, bins can be viewed as pixels, and the 2D slices of the embedding space as channels. However, in our case, instead of having 3 channels (R,G,B) like with color images, we have d/2 of them. That is, each pixel (each bin) is associated with a vector of size d/2, whose entries are the counts of the nodes falling into that bin in the corresponding 2D slice of the embedding space. Finally, the resolution of the image is determined by the number of bins of the histograms, which is constant for a given dataset across all channels. 4 EXPERIMENTAL SETUP 4.1 2D CNN Architecture We implemented a variant of LeNet-5 [18] with which we reached 99.45% accuracy on the MNIST handwritten digit classification dataset. As illustrated in Figure 3 for an input of shape (5,28,28), this simple architecture deploys four convolutional-pooling layers (each repeated twice) in parallel, with respective region sizes of 3, 4, 5 and 6, followed by two fully-connected layers. Dropout [30] is employed for regularization at every hidden layer. The activations are ReLU functions (in that, our model differs from LeNet-5), except for the ultimate layer, which uses a softmax to output a probability distribution over classes. For the convolution-pooling block, we employ 64 filters at the first level, and as the signal is halved through the (2,2) max pooling layer, the number of filters in the subsequent convolutional layer is increased to 96 to compensate for the loss in resolution. Input (5,28,28) ConvPoolDropx2 ConvPoolDropx2 ConvPoolDropx2 ConvPoolDropx2 filter shape: (3,3) (96,5,5) filter shape: (4,4) (96,4,4) filter shape: (5,5) (96,4,4) filter shape: (6,6) (96,3,3) ReLU (all) FlattenConcatDrop (6336) DenseDrop (128) Output (#classes) ReLU Softmax Figure 3: 2D CNN architecture used in our experiments. The number within parentheses refer to the output dimensions of the tensors. 4.2 Neural embeddings To learn node embeddings, we used the high performance C++ implementation4 of the node2vec algorithm [12]. node2vec applies the very fast Skip-Gram language model [20] to truncated biased random walks performed on the graph. The algorithm scales linearly with the number of nodes in the network. 4.3 Real-world datasets We conducted experiments on 6 real-world datasets which we describe in what follows, and in Table 1. In all datasets, graphs are unweighted, undirected, with unlabeled nodes, and the task is to predict the class they belong to. Classes are mutually exclusive. In the first five datasets, we can only learn from the topology of the network, while in the sixth, we also have access to continuous node attributes. SOCIAL NETWORK DATASETS5 [32]. Note: in all REDDIT datasets, a graph corresponds to a thread where nodes represent users, and there is an edge between two nodes if one of the two users responded to a comment from the other user. • REDDIT-B graphs are labeled according to whether they were constructed from Q&A or discussion communities, • REDDIT-5K & REDDIT-12K feature graphs taken respectively from 5 and 11 forums dedicated to specific topics, • COLLAB graphs are hop-1 neighborhoods of researchers from a scientific collaboration network (two researchers are linked if they co-authored a paper), and are labeled according to the subfield of Physics the corresponding researcher belongs to, • IMDB-B features hop-1 neighborhoods of actors and actresses selected from two movie collaboration networks corresponding to specific genres (action and romance), in which two actors are linked if they starred in the same movie. Graphs are labeled according to the genre they were sampled from. BIOINFORMATICS DATASET [3, 14] (with continuous node attributes). • PROTEINS_full proteins are represented as graphs where nodes are secondary structure elements (SSEs) and there is an edge between two nodes if they are neighbors in the amino-acid sequence or in 3D space. The goal is to predict whether the protein is an enzyme or not. Furthermore, each node is associated with a 29dimensional continuous vector representing chemical measurements. 4 https://github.com/snap-stanford/snap/tree/master/examples/node2vec 5 http://www.mit.edu/~pinary/kdd/datasets.tar.gz To incorporate this extra information into our images, we compressed the attribute vectors with PCA, retaining the same number of dimensions as for the node embeddings, and normalized them to have same range as the node embeddings. Finally, each node was represented by a single vector made of its compressed node embedding concatenated with its compressed and normalized continuous attribute vector. That is, we had d/2 channels for node embeddings and d/2 channels for node attributes, where d is the number of principal components retained in each case. 4.4 Baselines On the social network datasets (on which there are no continuous node attributes), we re-implemented two state-of-the-art graph kernels, the graphlet kernel and the Weisfeiler-Lehman (WL) kernel. • the graphlet kernel [28] computes the similarity between two graphs as the cosine of their count vectors. These vectors encode how many subgraphs of size up to a certain threshold can be found in each graph (each entry is an occurrence count). We sampled 2000 graphlets of size up to 6 from each graph. • the Weisfeiler-Lehman (WL) subtree kernel [29]. The WL kernel is actually a framework that operates on top of any graph kernel accepting node labels and boosts its performance by using the relabeling procedure of the WL test of isomorphism. More precisely, following the computation of the kernel value between the two graphs, vertex labels are updated based on the labels of their neighbors. This two-step process repeats for a certain number of iterations. The final kernel value is the sum of the values at each iteration. Since our graphs have unlabeled nodes, we use their degrees as labels. Furthermore, we used the WL framework with the subtree graph kernel [10], as it is very efficient with this kernel [29]. We also report for comparison purposes the performance of multiple state-of-the-art baselines (the experimental setting in each case is the same as ours): • Deep Graph Kernels [32]. To be fair, we exclude this baseline from the comparison on the bioinformatics dataset since it doesn’t make use of node attributes. For all datasets: • PATCHY-SAN (PSCN k = 10), which is the best performing graph CNN model presented in [23], • Deep Graph CNN (DGCNN) [33]. On the PROTEINS_full dataset (all baselines below take into account node attribute vectors): • HGK-SP Hash Graph Kernel with shortest-path base kernel [21], • HGK-WL Hash Graph Kernel with Weisfeiler-Lehman subtree base kernel [21], • Graph invariant kernels (GIK) [25] (the best performing variant), • GraphHopper [9] and baselines within (all using continuous node attributes): • PROP-diff propagation kernel with diffusion scheme [22], • PROP-WL propagation kernel with hashing-based label discretization and WL kernel update [22]. 4.5 Configuration Following the conventional experimental set-up, we used 10fold cross validation and repeated each fold 3 times in all our experiments. For the graphlet and WL kernels, we used a C-SVM classifier6 [26]. The C parameter of the SVM and the number of iterations in WL were jointly optimized on a 90-10  % partition of the training set of each fold by searching the grid (10−4 , 104 , len = 10); (2, 7, step = 1) . For our 2D CNN, we used Xavier initialization [11], a batch size of 32, and for regularization, a dropout rate of 0.3 and early stopping with a patience of 5 epochs (null delta). The categorical cross-entropy loss was optimized with Adam [15] (default settings). We implemented our model in Keras [6] version 1.2.27 with tensorflow [1] backend. The hardware used consisted in an NVidia Titan X Pascal GPU with an 8-thread Intel Xeon 2.40 GHz CPU and 16 GB of RAM, under Ubuntu 16.04.2 LTS 64-bit operating system and Python 2.7. The graph kernel baselines were run on an 8-thread Intel i7 3.4 GHz CPU, with 16 GB of RAM, under Ubuntu 16.06 LTS 64-bit operating system and Python 2.7. 4.6 Resolution, channels, and node2vec parameters Image resolution. In our initial experiments involving spectral embeddings, the coordinates of any node in any dimension belonged to the [−1, 1] range, due to the eigenvectors being unit-normed. Furthermore, inspired by the MNIST images which are 28 × 28 in size, and on which we initially tested our 2D CNN architecture, we decided to learn 2D histograms featuring 28 bins in each direction. This gave us a resolution of 28/(1−(−1)), that is, 14 pixels per unit (or simply 14:1). As it was giving good results, we stuck to similar values in our subsequent experiments making use of neural embeddings. The only other value we experimented with was 9:1. Number of channels. With the p and q parameters of node2vec held constant and equal to 1, we conducted a search on the coarse grid (14,9);(2,5) to get more insights about the impact of resolution and number of channels (respectively). When using 5 channels, the graphs with less than 10 nodes were removed, because for these graphs, we cannot get a 10-dimensional node embedding space (we cannot have more dimensions than data points). However, this represented only a couple of graphs overall. On the PROTEINS_full dataset, we only experimented with 2 node embeddings channels and 2 node attributes channels. Image size. On a given dataset, image size is calculated as the range |max(coordinates)−min(coordinates)|×resolution, where coordinates are the flattened node embeddings. For instance, on COLLAB with a resolution of 9:1, image size is equal to 37 × 37, since |2.78 − (−1.33)| × 9 ≈ 37. p,q,c, and dn2v node2vec parameters. With the best resolution and number of channels, we then tuned the return and in-out parameters p and q of node2vec. Those parameters respectively bias the random walks towards exploring larger areas of the graph or staying in local neighborhoods, allowing the embeddings to encode a similarity that interpolates between structural equivalence (two nodes acting as, e.g., flow controllers, are close to each other) and 6 http://scikit-learn.org/stable/modules/generated/sklearn.svm.SVC.html 7 https://faroit.github.io/keras-docs/1.2.2/ Max # vertices Min # vertices Average # vertices Max # edges Min # edges Average # edges # graphs Average diameter Average density (%) # classes Max class imbalance IMDB-B COLLAB REDDIT-B REDDIT-5K REDDIT-12K PROTEINS_full 136 12 19.77 1249 26 96.53 1000 1.861 52.06 2 1:1 492 32 74.49 40120 60 2457.78 5000 1.864 50.92 3 1:3.4 3782 6 429.61 4071 4 497.75 2000 9.72 2.18 2 1:1 3648 22 508.50 4783 21 594.87 4999 11.96 0.90 5 1:1 3782 2 391.40 5171 1 456.89 11929 10.91 1.79 11 1:5 620 4 39.05 1049 5 72.82 1113 11.57 21.21 2 1:1.5 Table 1: Statistics of the social network datasets (first 5 columns) and the bioinformatics dataset used in our experiments. homophily (two nodes belonging to the same community are close to each other). Following the node2vec paper, we tried 5 combinations of values for (p, q): (1, 1); (0.25, 4); (4, 0.25); (0.5, 2); (2, 0.5) . Note that p = q = 1 is equivalent to DeepWalk [27]. Since the graphs in the COLLAB and the IMDB-B datasets are very dense (> 50%, average diameter of 1.86), we also tried to set the context size c to smaller values of 1 and 2 (the default value is c = 10). The context size is used when generating the training examples (context,target) to pass to the skip-gram model: in a given random walk, it determines how many nodes before and after the target node should be considered part of the context. Finally, since the graphs in COLLAB, IMDB-B, and PROTEINS_full are small (20, 74, and 39 nodes on average), we experimented with lower values of dn2v , namely 12 and 4. dn2v is the dimension of the node embeddings learned by node2vec (default value is 128). The final values of p, q, c, and dn2v for each dataset are summarized in Table 2. Res. #Chann. p,q c,dn2v REDDIT-B 9:1 5 2,0.5 - REDDIT-5K 9:1 2 4,0.25 - REDDIT-12K 9:1 5 1,1 - COLLAB 9:1 5 0.5,2 2,12 IMDB-B 14:1 5 1,1 - PROTEINS_full 9:1 2/2⋆ 0.5,2 -,4 Table 2: Final resolution, number of channels, and p, q, c, and d n2v node2vec parameters for each dataset. ⋆ number of channels for node embeddings and continuous node attributes. - means default value(s). 5 RESULTS The classification accuracy of our approach in comparison to the baselines is reported in Table 3 for the social network datasets and Table 4 for the bioinformatics dataset. Our approach shows (statistically) significantly better than all baselines on the REDDIT-12K and REDDIT-B datasets, with large improvements of 6.81 and 2.82 in accuracy over the best performing competitor, respectively. We also reach best performance on the REDDIT-5K and PROTEINS_full datasets, with respective improvements in accuracy of 1.34 and 0.52 over the best performing baselines. In particular, the fact that we reach best performance on PROTEINS_full shows that our approach is flexible enough to leverage not only the topology of the network, but also continuous node attributes, in a very simple and unified way (we simply concatenate node embeddings with node attribute vectors). Note that when not using node attributes (only the first 2 node embeddings channels), the performance of our model decreases from 77.12 to 73.43 on PROTEINS_full (3.69 decrease), which proves that the skill of our model comes from leveraging both node embeddings and attributes. Finally, on the IMDB-B dataset, we get third place, very close (≤ 1.2) to the top performers (no statistically significant difference). The only dataset on which a baseline proved significantly better than our approach is actually COLLAB (WL graph kernel). On this dataset though, the WL kernel beats all models by a wide margin, and we are relatively close to the other Deep Learning approaches (≤ 2.43). 5.1 Runtimes Even if not directly comparable, we report in Table 5 kernel matrix computation time for the two graph kernel baselines, along with the time required by our 2D CNN model to perform one pass over the entire training set, i.e., the time per epoch. With respects to time complexity, our method is superior to graph kernels on several counts: first, unlike graph kernels, the time required by the 2D CNN to process one training example is constant (all images for a given dataset have the same size), while computing the kernel value for a pair of graphs depends on their size (polynomial in the number of nodes). It is true that a prerequisite for our approach is an embedding for all the graphs in the dataset, but node2vec scales linearly with the number of nodes in the graph. Therefore, on big graphs, our method is still usable, while graph kernels may not be. Also, node2vec is easily parallelizable over the collection, so one can take advantage of multi-core CPUs to considerably speed up the process. Second, with a 2D CNN, the time necessary to go through the entire training set only increases linearly with the size of the set, while populating the kernel matrix is quadratic, and finding the support vectors is then again at least quadratic. This means that on large datasets, our approach is also preferable to graph kernels. Examples of 2D CNN architectures much more complex than ours applied to millions of images in reasonable time abound in the recent computer vision literature. Processing such big Table 3: 10-fold CV average test set classification accuracy of our proposed method compared to state-of-the-art graph kernels and graph CNNs, on the social network datasets. ± is standard deviation. Best performance per column in bold. ⋆ indicates stat. sign. at the p < 0.05 level (our 2D CNN vs. WL) using the Mann-Whitney U test (https://docs.scipy.org/doc/scipy-0.19.0/reference/generated/scipy.stats.mannwhitneyu.html). Dataset Acc. Std. dev. REDDIT-B REDDIT-5K REDDIT-12K COLLAB IMDB-B Method (size=2,000;nclasses=2) (4,999;5) (11,929;11) (5,000;3) (1,000;2) Graphlet Shervashidze2009 WL Shervashidze2011 Deep GK Yanardag2015 PSCN k = 10 Niepert2016 DGCNN Zhang2018 2D CNN (our method) 77.26 (± 2.34) 78.52 (± 2.01) 78.04 (± 0.39) 86.30 (± 1.58) 89.12⋆ (± 1.70) 39.75 (± 1.36) 50.77 (± 2.02) 41.27 (± 0.18) 49.10 (± 0.70) 52.11 (± 2.24) 25.98 (± 1.29) 34.57 (± 1.32) 32.22 (± 0.10) 41.32 (± 0.42) 48.13⋆ (± 1.47) 73.42 (± 2.43) 77.82⋆ (± 1.45) 73.09 (± 0.25) 72.60 (± 2.15) 73.76 (± 0.49) 71.33 (± 1.96) 65.40 (± 5.95) 71.60 (± 5.16) 66.96 (± 0.56 ) 71.00 (± 2.29) 70.03 (± 0.86) 70.40 (± 3.85) 2D CNN our method 77.12 2.79 DGCNN Zhang18 75.54 0.94 PSCN k = 10 Niepert16 75.00 2.51 HGK-SP Morris16 75.14 0.47 HGK-WL Morris16 74.88 0.64 GIK Orsini15 76.6 0.6 GraphHopper Feragen13 74.1 0.5 PROP-diff Neumann12 73.3 0.4 PROP-WL Neumann12 73.1 0.8 Table 4: 10-fold CV average test set classification accuracy of our proposed method compared to state-of-the-art graph kernels and graph CNNs on the bioinformatics dataset (PROTEINS_full). REDDIT-B REDDIT-5K REDDIT-12K COLLAB IMDB-B Size, average (# nodes, # edges) 2000, (430,498) 4999, (509,595) 11929, (391,457) 5000, (74,2458) 1000, (20,97) 1113, (39,73) Input shapes (for our approach) (5,62,62) (2,65,65) (5,73,73) (5,36,36) (5,37,37) (4,70,70) (2,70,70)⋆ Graphlet Shervashidze2009 WL Shervashidze2011 551 645 5046 5087 12208 20392 3238 1579 275 23 - 6 16 52 5 1 1 2D CNN (our approach) PROTEINS_full Table 5: Runtimes in seconds, rounded to the nearest integer. For the graph kernel baselines, time necessary to populate the Kernel matrix (8-thread 3.4GHz CPU). For our model, time per epoch (Titan X Pascal GPU). ⋆ with and without using node attributes datasets with graph kernels would simply be intractable. In addition, the performance of Deep Learning models tends to significantly improve in the presence of large quantities of training data. 6 RELATED WORK Motivated by the outstanding performance recently reached by Convolutional Neural Networks (CNNs) in computer vision, e.g. [17? ], many research efforts have been devoted to generalizing CNNs to graphs. Indeed, CNNs offer a very appealing alternative to kernel-based methods. The parsimony achieved through weight sharing makes them very efficient, their time complexity is constant for each training example and linear with respect to the size of the dataset, and the extra expressiveness they bring might translate to significant accuracy gains. However, since convolution and pooling are natively defined for regular, low-dimensional grids such as images (2D Euclidean space discretized by rectangles), generalizing CNNs to graphs, which are irregular, non-Euclidean objects, is far from trivial. Possible solutions that can be found in the literature fall into two broad categories: spatial and spectral techniques [5]. Spectral approaches [8, 16] invoke the convolution theorem from signal processing theory to perform graph convolutions as pointwise multiplications in the Fourier domain of the graph. The basis used to send the graph to the Fourier domain is given by the SVD decomposition of the Laplacian matrix of the graph, whose eigenvalues can be viewed as “frequencies”. By contrast, spatial methods [23, 33? ] operate directly on the graph structure. For instance, in [23], the algorithm first determines the sequence of nodes for which neighborhood graphs (of equal size) are created. To serve as receptive fields, the neighborhood graphs are then normalized, i.e., mapped to a vector space with a linear order, in which nodes with similar structural roles in the neighborhood graphs are close to each other. Normalization is the central step, and is performed via a labeling procedure. A 1D CNN architecture is finally applied to the receptive fields. 6.1 Departure from previous work While the aforementioned sophisticated frameworks have made great strides, we showed in this paper that graphs can also be processed by vanilla 2D CNN architectures. This is made possible by the novel graph representation we introduce, which encodes graphs as stacks of 2D histograms of their node embeddings (and continuous attribute vectors, if available). Compared to the more complex approaches that involve different architectural and/or operational modifications, the main advantage of our method is its simplicity. Crucially, we show that this simplicity can be obtained without giving up accuracy: we indeed outperform graph CNN baselines by a wide margin on some datasets, and are very close elsewhere. graph kernels too, allowing to process bigger datasets featuring larger graphs. 6.2 REFERENCES Discussion Replacing the raw counts by the empirical joint probability density function, either by normalizing the histograms, or with a Kernel Density Estimate, significantly deteriorated performance. This suggests that keeping the absolute values of the counts is important, which makes sense, because some categories might be associated with larger or smaller graphs, on average. Therefore, preventing the model from using size information is likely to decrease accuracy. We also observed that increasing the number of channels to more than 5 does not yield better results (which makes sense, as channels contain less and less information), but that reducing this number improves performance in some cases, probably because it plays a regularization role. The main contribution of our study is a novel method for representing graphs as multi-channel image-like structures from their node embeddings, that allows them to be processed by 2D CNNs. How the embeddings are computed, and which 2D CNN architecture is used, does not matter. We hold this flexibility to be a major strength. First, the embedding-agnostic nature of our method means that it can be seamlessly extended to directed, weighted, or labeled graphs with continuous or categorical node/edge attributes, simply by using an embedding algorithm that accepts such graphs, e.g., [19]. The independence of our approach with respect to the image classification model used is another advantage. Here, we employed a vanilla 2D CNN architecture as it was offering an excellent tradeoff between accuracy and simplicity, but more recent models, such as the one of [13], may yield even better results. Above all, performance should improve as graph node embedding algorithms and CNN architectures for images improve in the future. Limitations. Even though results are very good out-of-the-box in most cases, finding an embedding algorithm that works well, or the right combination of parameters for a given dataset, can require some efforts. For instance, on COLLAB and IMDB-B (the only two datasets on which we do not reach best performance), we hypothesize that our results are inferior to that observed elsewhere because the default parameter values of node2vec may not be wellsuited to very dense graphs such as the ones found in COLLAB and IMDB-B (diameter< 2, density > 50). Optimizing the node2vec parameters on these datasets probably requires more than a coarse grid search. 7 CONCLUSION The main contribution of this paper is to show that CNN architectures designed for images can be used for graph processing in a completely off-the-shelf manner, simply by representing graphs as stacks of two-dimensional histograms of their node embeddings. Our approach is flexible and continuous node attributes can be taken into account by passing them as additional channels. Despite the simplicity of our approach, we reach better results than stateof-the-art graph kernels and graph CNN models on 4 real-world datasets out of 6. Furthermore, these good results were obtained with limited parameter tuning and by using a basic 2D CNN model. From a time complexity perspective, our approach is preferable to [1] Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, et al. 2016. Tensorflow: Large-scale machine learning on heterogeneous distributed systems. arXiv preprint arXiv:1603.04467 (2016). [2] K. M. Borgwardt and H. Kriegel. 2005. Shortest-path kernels on graphs. In Proceedings of the 5th International Conference on Data Mining. 74–81. [3] Karsten M Borgwardt, Cheng Soon Ong, Stefan Schönauer, SVN Vishwanathan, Alex J Smola, and Hans-Peter Kriegel. 2005. Protein function prediction via graph kernels. Bioinformatics 21, suppl 1 (2005), i47–i56. [4] Léon Bottou and Chih-Jen Lin. 2007. Support vector machine solvers. Large scale kernel machines 3, 1 (2007), 301–320. [5] Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. 2013. Spectral networks and locally connected networks on graphs. arXiv preprint arXiv:1312.6203 (2013). [6] François Chollet et al. 2015. Keras. https://github.com/fchollet/keras. (2015). [7] Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Machine learning 20, 3 (1995), 273–297. [8] Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. 2016. Convolutional neural networks on graphs with fast localized spectral filtering. In Advances in Neural Information Processing Systems. 3837–3845. [9] Aasa Feragen, Niklas Kasenburg, Jens Petersen, Marleen de Bruijne, and Karsten Borgwardt. 2013. Scalable kernels for graphs with continuous attributes. In Advances in Neural Information Processing Systems. 216–224. [10] Thomas Gärtner, Peter Flach, and Stefan Wrobel. 2003. On graph kernels: Hardness results and efficient alternatives. In Learning Theory and Kernel Machines. Springer, 129–143. [11] Xavier Glorot and Yoshua Bengio. 2010. Understanding the difficulty of training deep feedforward neural networks.. In Aistats, Vol. 9. 249–256. [12] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 855–864. [13] Gao Huang, Zhuang Liu, Kilian Q Weinberger, and Laurens van der Maaten. 2016. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993 (2016). [14] Kristian Kersting, Nils M. Kriege, Christopher Morris, Petra Mutzel, and Marion Neumann. 2016. Benchmark Data Sets for Graph Kernels. (2016). http:// graphkernels.cs.tu-dortmund.de [15] Diederik Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014). [16] Thomas N Kipf and Max Welling. 2016. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016). [17] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems. 1097–1105. [18] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradientbased learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278– 2324. [19] Lizi Liao, Xiangnan He, Hanwang Zhang, and Tat-Seng Chua. 2017. Attributed Social Network Embedding. arXiv preprint arXiv:1705.04969 (2017). [20] Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013). [21] Christopher Morris, Nils M Kriege, Kristian Kersting, and Petra Mutzel. 2016. Faster kernels for graphs with continuous attributes via hashing. In Data Mining (ICDM), 2016 IEEE 16th International Conference on. IEEE, 1095–1100. [22] Marion Neumann, Novi Patricia, Roman Garnett, and Kristian Kersting. 2012. Efficient graph kernels by randomization. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 378–393. [23] Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. 2016. Learning convolutional neural networks for graphs. In Proceedings of the 33rd annual international conference on machine learning. ACM. [24] Giannis Nikolentzos, Polykarpos Meladianos, and Michalis Vazirgiannis. 2017. Matching Node Embeddings for Graph Similarity.. In AAAI. 2429–2435. [25] Francesco Orsini, Paolo Frasconi, and Luc De Raedt. 2015. Graph invariant kernels. In Proceedings of the Twenty-fourth International Joint Conference on Artificial Intelligence. 3756–3762. [26] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825–2830. [27] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. Deepwalk: Online learning of social representations. In Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 701–710. [28] N. Shervashidze, T. Petri, K. Mehlhorn, K. M. Borgwardt, and S.V.N. Vishwanathan. 2009. Efficient Graphlet Kernels for Large Graph Comparison. In Proceedings of the International Conference on Artificial Intelligence and Statistics. 488–495. [29] N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt. 2011. Weisfeiler-Lehman Graph Kernels. The Journal of Machine Learning Research 12 (2011), 2539–2561. [30] Nitish Srivastava, Geoffrey E Hinton, Alex Krizhevsky, Ilya Sutskever, and Ruslan Salakhutdinov. 2014. Dropout: a simple way to prevent neural networks from overfitting. Journal of Machine Learning Research 15, 1 (2014), 1929–1958. [31] Waldo R Tobler. 1970. A computer movie simulating urban growth in the Detroit region. Economic geography 46, sup1 (1970), 234–240. [32] Pinar Yanardag and SVN Vishwanathan. 2015. Deep graph kernels. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1365–1374. [33] Muhan Zhang, Zhicheng Cui, Marion Neumann, and Yixin Chen. 2018. An End-to-End Deep Learning Architecture for Graph Classification. (2018).
1cs.CV
Applying deep learning to classify pornographic images and videos Mohamed N. Moustafa arXiv:1511.08899v1 [cs.CV] 28 Nov 2015 Department of Computer Science and Engineering, The American University in Cairo, New Cairo 11835, Egypt [email protected] Abstract. It is no secret that pornographic material is now a one-clickaway from everyone, including children and minors. General social media networks are striving to isolate adult images and videos from normal ones. Intelligent image analysis methods can help to automatically detect and isolate questionable images in media. Unfortunately, these methods require vast experience to design the classifier including one or more of the popular computer vision feature descriptors. We propose to build a classifier based on one of the recently flourishing deep learning techniques. Convolutional neural networks contain many layers for both automatic features extraction and classification. The benefit is an easier system to build (no need for hand-crafting features and classifiers). Additionally, our experiments show that it is even more accurate than the state of the art methods on the most recent benchmark dataset. Keywords: deep learning, convolutional neural networks, adult image classification 1 Introduction For one reason or another, we aim for filtering out adult images and videos. Most parents, for instance, strive to protect their young children and minors from accessing online porn web sites either intentionally or accidentally. Additionally, in educational and workplace settings, basic ethical and conduct standards dictate that such images become inaccessible to the community. There are many indicators that online pornographic content is increasing exponentially [1], especially in the past few years [11]. Given the continuous flood of uploaded images and videos to general social media networks, one can imagine the difficult and tedious job of filtering out inappropriate material manually by the sites administrators. Therefore, we need to turn our attention to a solution that automatically detects and isolates porn content. Obviously, the solution is a form of an intelligent machine that can analyze the text, audio, or visual signals. In this paper, we focus on the visual cue, being the most salient form of pornography. We propose a deep learning system that automatically analyzes images (and video frames) before classifying the content as regular or porn. Our 2 M. Moustafa proposed solution achieved the highest classification rate, to our knowledge, of more than 94%, on the most recent Pornography benchmark dataset [8]. 2 Related work Most of the existing porn detection research relies on image analysis, based on some form of machine intelligence. Usually, the intelligent processing pipeline includes a feature extractor followed by a classifier. The feature extractor abstracts important information from the input image and feeds it to the pre-trained classifier that takes the decision. Along with the features, mentioned below, Support Vector Machines (SVM) was the most frequently used classifier in recent methods. Historically, the most investigated feature was the human skin color [6]. If the input image contains too much skin colored pixels, it was taken as an indicator of nudity. However, skin color solely is not reliable since a face closeup image has a lot of skin pixels while being non-porn. So, researchers augmented the skin color with other constraints or shape features [10]. With the introduction of new computer vision models, porn detection algorithms became more accurate. For instance, Deselaers et al introduced classification accuracy improvement by adopting the visual bag-of-words (BoW) model [4]. BoW tries to extract the most common patches that exist on a set of training images. For a detailed survey of existing methods, please refer to [9]. Recently, Avila et al [2] introduced a BoW framework, the BossaNova representation, to classify pornographic videos. BossaNova relies on the HueSIFT descriptors. Since HueSIFT represents both color and shape, it outperformed standard BoW models that rely only on shape or edge cues. Additionally, Caetano et al [3] extended the BossaNova to be more suitable for video classification. They applied binary descriptors with BossaNova for even better accuracy on the same benchmark dataset. 3 Deep learning In parallel with the traditional route of handcrafting a set of features and a classifier, another route is witnessing a rising interest: deep learning. This route combines both features extraction and classification into one module with less involvement from the designer in terms of selecting features or classifier. The ultimate target is to have a generic architecture that can learn any problem from its data, thus coming closer in performance to the human brain. Many researchers are now paying more attention to deep learning systems, specifically after the Alex Krizhevsky et al (AlexNet) outstanding performance in the ILSVRC-2012 Imagenet competition [7]. Imagenet challenge includes classifying hundreds of thousands of images to 1000 different possible classes. Krizhevsky used a convolutional neural network (ConvNet) architecture to win this most challenging competition in the area of image classification. Since then, ConvNet appeared in solutions to numerous image analysis problems, e.g., pedestrian detection, traffic Applying deep learning to classify pornographic images and videos 3 sign recognition, image segmentation, image restoration, and object recognition. Recently, the winner of 2014 Imagenet competition was also a ConvNet based system: GoogLeNet [12]. In this paper we propose applying a system of ConvNets to solve the pornographic classification with higher accuracy than the reported state of the art performance [3]. 4 Proposed method We propose applying a combination of ConvNets to classify porn from regular images and video frames. We will first describe the slight modifications we propose to change in the existing AlexNet and GoogLeNet to suit our problem. This is followed by a proposed simple fusion of both networks. 4.1 ANet: AlexNet-based classifier Basically, we adopt the same architecture proposed in [7], sans the output layer. As depicted in figure 1, the net contains five convolutional layers of neurons followed by three fully-connected ones. Each convolution layer filters its input two dimensional vectors with a kernel, whose coefficients are calculated iteratively during the training process. The fully connected layers are simply implementing the dot product between the input and weight vectors, where each neuron in layer l is connected to all outputs of neurons in layer l − 1. All neurons have Rectified Linear Unit (ReLU) activation function to speed up the learning process. The output of the last fully-connected layer is fed to a 2-way softmax which produces a distribution over our two class labels: benign or porn. Fig. 1. ANet: AlexNet-based deep ConvNet porn image classifier. The first five layers (in green) are convolutional followed by three fully connected layers (in red), including the output layer that contains two neurons corresponding to our two classes ‘benign’ or ‘porn’. ANet contains almost 56 million parameters that need to be calculated during the learning process. In order to properly train such a large network, a 4 M. Moustafa huge dataset is needed. The collection and labelling of this dataset would prove impractical. So, instead of starting training from scratch, we trained only the last layer that we newly introduced to the reference network. We started from the reference AlexNet weights for the first seven layers of the ConvNet. Those weights are the results of training the original AlexNet on the Imagenet 1.2 million images from 1000 different classes [5]. During our training, we used benign and porn images as input to the first layer, computed the output of the seventh layer (the feature vector), and only changed the weights of the eighth layer in a supervised way given the ground truth label of the image. This way, we are using the ConvNet as a general feature extractor (the first seven layers) and as a classifier (the last layer). The last layer could also be replaced with any other classifier, e.g., Support Vector Machine (SVM). This fine-tune training method lets the network train faster with less numbers of training data than the full method as it has less parameters to adapt (those of the last layer only). To test a new image, we adjust it by rescaling and subtracting the mean, before feeding it as input to the trained ConvNet. The network has two normalized outputs corresponding to the confidence in each class that sum to 100%. The test image is labeled after the output neuron with the largest score. 4.2 GNet: GoogLeNet-based classifier GoogLeNet, shown in figure 2, comprises 22 layers [12]. It is much deeper than AlexNet and incorporates the inception concept, which performs dimensionality reduction and projection. Each inception module contains two convolutional layers. Again, we have to change the output layers to produce only two labels: benign or porn. We follow the same steps in modifying, training, and testing this ConvNet as we have explained in the ANet classifier subsection above. Fig. 2. GoogLeNet-based deep ConvNet porn image classifier. The first three layers (in green) are convolutional followed by nine inception modules (in yellow), each contains two convolutional layers. The output layer is fully connected and contains two neurons corresponding to our two classes ‘benign’ or ‘porn’. Applying deep learning to classify pornographic images and videos 4.3 5 AGNet: Ensemble-ConvNet classifier When solving a hard problem, what would be better than consulting an expert? It would be having more than one to consult! We expect that ANet and GNet are making different classification mistakes. Therefore, we believe that Our Ensemble-ConvNet , fusing both ANet and GNet scores, should result in a smoother decision that makes less mistakes. We describe in figure 3 the overall architecture of our proposed AGNet classifier. We have followed the same procedure as [7] to pre-process images before feeding it as input to the first convolution layer. The preprocessing step in this case includes rescaling the image to 256 x 256 RGB pixels, subtracting the mean image, and finally dividing it into one or more windows of 224 x 224 pixels each to increase the training data instances. Each of ANet and GNet tests the input image, and produces ‘benign’ and ‘porn’ scores. We combine those scores in the ‘Fusion’ block, and finally decide whether it belongs to the benign or porn classes based on some predetermined threshold. By default, this threshold is 50%. This fusion block could be as complex as another trained nonlinear classifier. On the other hand, it could be as simple as a linear weighted average of scores. We show in our experiments below that a simple weighted average with equal weights is enough to produce superior accuracy than each individual network. To test a video sequence, we extract key frames and test them individually and finally label the video based on majority voting. In the event that the number of benign and porn voted frames is equal, we decide based on the class with the largest sum of scores for all key frames. Fig. 3. Proposed AGNet porn image classifier. 5 Experiments and results We have implemented our proposed ANet, GNet, and AGNet classifiers in C++ relying on the open source frameworks CAFFE [5] to train and test the ConvNets. To put our results in comparison with other state of the arts methods, we have used a recent benchmark dataset described below. 6 5.1 M. Moustafa NDPI dataset The NPDI Pornography database contains nearly 80 hours of 400 pornographic and 400 non-pornographic videos. It has been collected by the NPDI group, Federal University of Minas Gerais (UFMG), Brazil [8]. The database consists of several genres of pornography and depicts actors of many ethnicities, including multi-ethnic ones. The NPDI group has collected the pornographic videos from websites which only host that kind of material. The non-pornographic videos include two subcategories: 200 videos chosen at random (which they called “easy”) and 200 videos (“difficult”), selected from textual search queries like “beach”, “wrestling”, “swimming”, which contain body skin but not nudity or porn. The videos are already segmented into shots. On the average, there are almost 20 shots per video. A key-frame has been selected as simply the middle-frame of each video shot. In total, there are 16,727 key-frames (shots). Tables 1 and 2 highlight some statistics and samples of this dataset respectively. To unify the cross-validation protocol, the dataset is divided into five folds by generating nearly 640 videos for training and 160 for testing on each fold. In our experiments, we have followed the same training/testing 5-folds cross-validation. Table 1. NPDI dataset content Class Videos Hours Shots per Video Porn 400 57 15.6 Non-porn (“easy”) 200 11.5 33.8 Non-porn (“difficult”) 200 8.5 17.5 All videos 800 77 20.6 5.2 Experiment: testing individual images In this experiment, we have tested each classifier on the NPDI videos key-frames as individual images. The objective of this experiment was threefold. First, it was a comparison between the full versus the fine-tune training of the ConvNets. Second, we wanted to check whether GoogLeNet was better than AlexNet in this problem as it was in the Imagenet categorization challenge. Third, we were testing the individual ConvNet classifier versus the ensemble one. We have tested many variations of the ‘fusion’ block mentioned in figure 3. Our findings do not show much differences in the results. Consequently, we decided to choose the equal weighted average of both ConvNets scores for simplicity. In total, we trained 5 ANets, 5 GNets using four of the NPDI five folds of videos and used the fifth one for testing. We recorded the average accuracy of classification for various values of the threshold from 0 to 100 to build Receiver Operating Characteristics (ROC) curves. ROC is very informative since the user can select his or her operating point based on the application. Simply put, at threshold 0, both correct benign and false porn rates will be 1.0, which Applying deep learning to classify pornographic images and videos 7 Table 2. NPDI dataset samples Porn Non-porn (“difficult”) Non-porn (“easy”) corresponds to the top right corner point of the ROC. Increasing the threshold tightens the classifier filtration with lowering both rates. On the other hand, at threshold 100, the classifier will not pass any image and all classification rates will be 0.0, which is the left bottom point of the full ROC. We can see in figure 4, that both ANet and GNet (which were fine-tune trained as described earlier in the previous section) produced higher ROC than their fully trained counterparts. For instance when the rate of classifying porn frames by mistake as benign was 0.1, i.e., 10%, the rate of classifying benign frames correctly stood at 0.68 and 0.87 respectively for ANet fully trained and ANet fine tuned. Similarly, rates for GNet fully trained and fine tuned were 0.80 and 0.91 respectively. The ROC curves also show that AGNet is more accurate than GNet, especially when the rate of false porn classification is very low or very high. 5.3 Experiment: testing videos In this experiment, we have considered the majority voting of all frames, that belong to the same video sequence, in the decision as described earlier in the AGNet section. We recorded the average correct classification rate of all 5 folds and the standard deviation. The reported correct classification rate is the average of both ‘correctly classifying benign as benign’ and ‘correctly classifying porn as porn’. We included in table 3 also the best accuracy numbers reported in the recent literature as a baseline for comparison. As expected, GNet is more accurate than ANet as it has deeper architecture. Additionally, AGNet (with simple equal weighted average) is slightly more accurate than GNet. Note also that AGNet produced smaller variance than either ANet or GNet. For the record, we also reported the results of AGbNet, where 8 M. Moustafa Rate of classifying Benign as Benign 1 0.95 0.9 0.85 0.8 0.75 ANet-Fulltrain GNet-Fulltrain ANet GNet AGNet 0.7 0.65 0.6 0.01 0.1 Rate of classifying Porn as Benign Fig. 4. ConvNet Benign/Porn image classifier ROC. 1 Applying deep learning to classify pornographic images and videos 9 the score ‘fusion’ is the larger of ANet and GNet score instead of the simple average. It was interesting to see the all ConvNet based classifiers outperformed the BossaNova state of the art methods [2] [3] in the average accuracy but with slightly larger standard deviation. This might be due to the random initialization of the neural networks weights during training. We believe that the variance would go lower if we were to add more networks to the ensemble and fine tune some training parameters. Table 3. Videos classification accuracy on NPDI benchmark dataset Approach Accuracy (%) BossaNova (HueSIFT) [2] 89.5±1 BossaNova VD (BinBoost16) [3] 90.9±1 Proposed ANet 92.01±3 Proposed GNet 93.7±3 Proposed AGNet 93.8±2 Proposed AGbNet 94.1±2 6 Conclusions We proposed applying convolutional neural networks to automatically classify pornographic images and videos. We showed that our proposed fully automated solution outperformed the accuracy of hand-crafted feature descriptors solutions. We are continuing our research to find an even better network architecture for this problem. Nevertheless, all the successful applications so far rely on supervised training methods. We expect a new wave of deep learning networks would emerge by combining supervised and unsupervised methods where a network can learn from its mistakes while in actual deployment. We believe further research can also be directed toward allowing machines to consider the context and overall rhetorical meaning of a video clip while relating them to the images involved. References 1. Anthony, S., Just how big are porn sites?, (2012), http://www.extremetech.com/ computing/123929-just-how-big-are-porn-sites 2. Avila, S., Thome, N., Cord, M., Valle, E., and Araujo, A., Pooling in image representation: The visual codeword point of view. Computer Vision and Image Understanding, 117(5), pp. 453 – 465 (2013) 3. Caetano, C., Avila, S., Guimaraes, S., and Araujo, A. Pornography detection using bossanova video descriptor. In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European, pp. 1681–1685 (2014) 10 M. Moustafa 4. Deselaers, T., Pimenidis, L., and Ney, H. Bag-of-visual-words models for adult image classification and filtering. In Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1–4 (2008) 5. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., and Darrell, T. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093 (2014) 6. Jones, M.J., and Rehg, J.M. Statistical color models with application to skin detection. In Computer Vision and Pattern Recognition, 1999. IEEE Computer Society Conference on., vol. 1. IEEE (1999) 7. Krizhevsky, A., Sutskever, I., and Hinton, G. Imagenet classification with deep convolutional neural networks. In F. Pereira, C.J.C. Burges, L. Bottou, and K.Q. Weinberger, editors, Advances in Neural Information Processing Systems 25, pp. 1097– 1105. Curran Associates, Inc., (2012) 8. NPDI Pornography Database, (2013), https://sites.google.com/site/ pornographydatabase/ 9. Ries, C., and Lienhart, R. A survey on visual adult image recognition. Multimedia Tools and Applications, 69(3), pp. 661–688 (2014) 10. Rowley, H., Jing, Y., and Baluja, S. Large scale image-based adult-content filtering. In Int Conference on Comp Vis Theor Appl (VISAPP 2006), pp. 290–296 (2006) 11. Short, M., Black, L., Smith, A., Wetterneck, C., and Wells, D. A review of internet pornography use research: methodology and content from the past 10 years. Cyberpsychology, behavior and social networking, 15(1), pp. 13–23 (2012) 12. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., and Rabinovich, A. Going deeper with convolutions. CoRR, abs/1409.4842 (2014)
9cs.NE
Astroinformatics c 2017 International Astronomical Union Proceedings IAU Symposium No. 325, 2017 M. Brescia, S. G. Djorgovski, E. Feigelson, G. Longo & S. Cavuoti. DOI: 00.0000/X000000000000000X What can the programming language Rust do for astrophysics? Sergi Blanco-Cuaresma1 and Emeline Bolmont2 1 arXiv:1702.02951v1 [astro-ph.IM] 9 Feb 2017 2 Observatoire de Genève, Université de Genève, CH-1290 Versoix, Switzerland. email: [email protected] NaXys, Department of Mathematics, University of Namur, 8 Rempart de la Vierge, 5000 Namur, Belgium. email: [email protected] Abstract. The astrophysics community uses different tools for computational tasks such as complex systems simulations, radiative transfer calculations or big data. Programming languages like Fortran, C or C++ are commonly present in these tools and, generally, the language choice was made based on the need for performance. However, this comes at a cost: safety. For instance, a common source of error is the access to invalid memory regions, which produces random execution behaviors and affects the scientific interpretation of the results. In 2015, Mozilla Research released the first stable version of a new programming language named Rust. Many features make this new language attractive for the scientific community, it is open source and it guarantees memory safety while offering zero-cost abstraction. We explore the advantages and drawbacks of Rust for astrophysics by re-implementing the fundamental parts of Mercury-T, a Fortran code that simulates the dynamical and tidal evolution of multi-planet systems. Keywords. Rust, programming languages, N-Body, simulations, exoplanets 1. Introduction Plenty of tools in astrophysics are developed using system programming languages such as Fortran, C or C++. These languages are known to provide high performance and fast executions but they rely heavily on the developer for concurrency and memory control, which may lead to common errors as shown in Fig. 1: a) access to invalid memory regions, b) dangling pointers and attempts to free already freed memory, c) memory leaks and, d) race conditions. This can produce random behaviors and affect the scientific interpretation of the results. The recently created language Rust prevents such problems and fields like bioinformatics (Köster, 2015) have already started to take advantage of it. Astroinformatics can benefit from it too. We first discuss the general principles behind this new language and what makes it attractive when compared to more traditional languages such as C or Fortran. We then show that this language can reach the same performance as a Fortran N-Body simulator, Mercury-T† (Bolmont et al., 2015), designed for the study of the tidal evolution of multi-planet systems. 2. Rust Mozilla Research, motivated by the development of a new web browser engine (Anderson et al., 2015), released in 2015 the first stable version of a new open source pro† http://www.emelinebolmont.com 1 2 Sergi Blanco-Cuaresma & Emeline Bolmont a) b) c) Read / Write 4th element Allocate memory Allocate memory 1 2 Free 3 Your vector Neighboor's memory Free a 2 time d) Shared data Task 1 Forget to free nd Access freed memory Allocate memory Read Write Out of memory! Read Task 2 Overwrite Figure 1. Typical memory and concurrency problems with system programming languages such as Fortran, C or C++. gramming language named Rust. It uses patterns coming from functional programming languages (Poss, 2014) and it is designed not only for performance and concurrency, but also for safety. Rust introduces concepts like ownership, borrowing and variable lifetime, which: - facilitates the automatic control of the lifetime of objects during compilation time. There is no need for manually freeing resources or for an automated garbage collector like in Java or Go; - prevents the access to invalid memory regions; - enforces thread-safety (race conditions cannot occur). These zero-cost abstraction features make Rust very attractive for the scientific community with high performance needs. In Rust, variables are non-mutable by default (unless the mutable keyword is used) and they are bound to their content (i.e, they own it or they have ownership of it). When you assign one variable to another (case ’a’ in Fig. 2), you are not copying the content but transferring the ownership†, so that the previous variable does not have any content (like when we give a book to a friend, we stop having access to it). This transfer takes also place when we call functions (case ’b’ in Fig. 2), and it is important to note that Rust will free the bound resource when the variable binding goes out of scope (at the end of the function call for case ’b’). Hence, we do not have to worry about freeing memory and the compiler will validate for us that we are not accessing a memory region that has already been freed (errors are caught at compilation time, before execution time). Additionally, apart from transferring ownership, we can borrow the content of a variable (case ’c’ in Fig. 2). In this case, two variables have the same content but none of them can be modified, thus protecting us from race conditions. Alternatively, we can borrow in a more traditional way (like when we borrow a book from a friend, he is expecting to get it back when we stop using it) like in case ’d’ in Fig. 2, where the function borrows the content of a variable, operates with it (in this case, it could modify its content) and returns it to the original owner (not destroying it as shown in case ’b’). Exceptionally, all these rules can be violated if we make use of unsafe blocks, which is strongly discouraged but necessary in certain situation (e.g., dealing with external libraries written in Fortran, C or C++). If present, unsafe blocks allow us to clearly identify parts of the code which should be carefully audited, keeping it isolated and not making the whole program unsafe by default like in Fortran, C or C++. 3. Assessment We explored the advantages and drawbacks of Rust for astrophysics by re-implementing the fundamental parts of Mercury-T (Bolmont et al., 2015), a Fortran code that simulates the dynamical and tidal evolution of multi-planet systems. † Except primitive types or types that implement the Copy trait. What can Rust do for astrophysics? Transfer ownership Transfer Compiler All errors are caught at compilation time. v2 v2 error: v1 doesn't own anything Lifetime starts let v1 = vec![1, 2, 3]; calc(v1); println!("{}", v1[0]); ownership b) v1 error: v1 doesn't own anything d) Transfer v v ownership v1 Borrowing c) Borrows Without mutability v1 let mut v1 = vec![1, 2, 3]; let v2 = &v1; v2 v1 v1 and v2 access the same memory println!("{} {}", v1[0], v2[0]); v2 v1 v1[0] = 10; error: v1/v2 can be read but none can be modified fn calc(v: Vec<i32>) {...} Lifetime ends (i.e., vector is freed) Lifetime starts let mut v1 = vec![1, 2, 3]; calc(&mut v1); println!("{}", v1[0]); ownership ownership a) let v1 = vec![1, 2, 3]; let v2 = v1; println!("{}", v1[0]); 3 v1 v1 v1 Borrows With mutability v Gives back Borrowing rules Two kinds of borrows, never both: 1. One or more non-mutable reference 2. Just one mutable reference fn calc(v: &mut Vec<i32>) { v[0] = 10; } Lifetime ends (i.e., vector is freed) Figure 2. Rust’s ownership and borrowing concepts help us overcome the problems of traditional system programming languages. We developed a simple N-Body dynamical simulator‡ (without tidal effects) based on a leapfrog integrator in Rust, Fortran, C and Go (which provide a garbage collector for memory management). The software design and implementation does not include any language-specific optimization that a developer with basic knowledge would not do. We compiled the four implementations with an optimization level 3 (rustc/gfortran/gcc compiler) and the standard compilation arguments in the case of Go. We selected the best execution time out of five for an integration of 1 million years and the results are in Table 1. For this particular problem, Rust is as efficient as Fortran, and both surpass C and Go implementations Table 1. Best execution times of pure N-body simulations, for an integration time of 1 million years using a leap-frog integrator. Fortran C Go Rust 0m13.660s 0m14.640s 2m32.910sa 4m26.240s a Time might be improved if language-specific optimizations were implemented. Based on Mercury-T, we implemented the additional acceleration produced by tidal forces between the star and its planets into our Rust and Fortran leapfrog integrators. To test the codes, we ran a simulation of 100 million years with the same initial conditions as the case 3 described in the Mercury-T article (Bolmont et al., 2015), hence a single planet with a rotation period of 24 hours, orbiting a brown dwarf (0.08 M ) at 0.018 AU with an eccentricity of 0.1. The results are shown in Fig. 3, the Rust and Fortran code are practically identical and they reproduce a similar behavior to what is shown in the Mercury-T article. Nevertheless, leapfrog is a very simple integrator and not very accurate. This can be seen in the eccentricity evolution, which is slightly different from the Mercury-T article and appears noisy. As an additional exercise, we implemented the WHFast integrator (Rein and Tamayo, 2015) in Rust (black line in Fig. 3). This better integrator leads to a better agreement with Mercury-T thus demonstrating that a high level of accuracy can also be achieved with Rust. ‡ http://www.blancocuaresma.com/s/ Sergi Blanco-Cuaresma & Emeline Bolmont 0.028 0.026 0.024 0.022 0.020 0.018 0.016 Eccentricity Planet rotation period (hours) Semi-major axis (AU) 4 Leapfrog Fortran Leapfrog Rust WHFast Rust 140 120 100 80 60 10 -1 10 -2 10 -3 2 10 10 3 10 4 10 5 10 6 Time (years) 10 7 10 8 Figure 3. Tidal evolution of a single planet orbiting a brown-dwarf with the three integrators. Top: evolution of the semi-major axis of the planet. Middle: evolution of the planet’s rotation period. Bottom: evolution of the eccentricity of the planet. 4. Conclusions We have shown the reliability of Rust as a programming language as opposed to Fortran, C or even Go. Rust allows the user to avoid common mistakes such as the access to invalid memory regions and race conditions. We have also shown that it is a competitive language in terms of speed and accuracy. The main challenge we experienced was the initial learning curve, it was necessary to really understand and get used to the ownership and borrowing concepts. Once the paradigm shift is done, the benefits are immediate. We therefore encourage the community to consider Rust as a language that will help us produce good quality, memory safe, concurrent and high-performance scientific code. References Anderson, B., Herman, D., Matthews, J., McAllister, K., Goregaokar, M., Moffitt, J. and Sapin, S. 2015, arXiv, 1505.07383 Bolmont, E. and Raymond, S. N. and Leconte, J. and Hersant, F. and Correia, A. C. M. 2015, A&A, 583, A116 Köster, J. 2015, Bioinformatics, 32, 444 Poss, R. 2014, arXiv, 1407.5670 Rein, H. and Tamayo, D. 2015, MNRAS, 452, 376-388
6cs.PL
1 Flatness-based control of a two-degree-of-freedom platform with pneumatic artificial muscles arXiv:1703.05503v1 [cs.SY] 16 Mar 2017 David Bou Saba, Paolo Massioni, Eric Bideaux, and Xavier Brun Abstract—Pneumatic artificial muscles are a quite interesting type of actuators which have a very high power-to-weight and power-to-volume ratio. However, their efficient use requires very accurate control methods which can take into account their complex dynamic, which is highly nonlinear. This paper consider a model of two-degree-of-freedom platform whose attitude is determined by three pneumatic muscles controlled by servovalves, which mimics a simplified version of a Stewart platform. For this testbed, a model-based control approach is proposed, based on accurate first principle modeling of the muscles and the platform and on a static model for the servovalve. The employed control method is the so-called flatness-based control introduced by Fliess. The paper first recalls the basics of this control technique and then it shows how it can be applied to the proposed experimental platform; being flatness-based control an open-loop kind of control, a proportional-integral controller is added on top of it in order to add robustness with respect to modelling errors and external perturbations. At the end of the paper, the effectiveness of the proposed approach is shown by means of experimental results. A clear improvement of the tracking performance is visible compared to a simple proportional-integral controller. Index Terms—Pneumatic artificial muscles, nonlinear control, flatness. I. I NTRODUCTION Pneumatic artificial muscles (PAMs) are a quite efficient type of actuators which feature high power-to-volume ratio, high pulling efforts at a relatively low price [7]. This makes their use quite interesting in many engineering and robotic applications, even if their control is problematic due the nonlinearity in their dynamic model as well as from the hysteresis phenomena which they feature. Pneumatic artificial muscles produce a contraction effort when inflated, which is a nonlinear function of both the internal pressure and the relative contraction of its length. Many theoretical models of PAMs can be found in the literature [7], [6], [15], and this paper will refer to the results of experimental tests [3] that average out the hysteresis phenomena and therefore can model the behaviour very accurately. The subject of this paper is a study of a two-degree-of-freedom platform, actuated by three pneumatic muscles. The objective is the synthesis of a model-based control law allowing the tracking of a reference trajectory for a wide operating range of the muscles. The platform is constrained to a limited operating domain due to mechanical constraints and to the fact that the muscles generate only pulling efforts. Furthermore, the system The authors are with Laboratoire Ampère, UMR CNRS 5005, INSA de Lyon, Université de Lyon, 69621 Villeurbanne CEDEX, France. {david.bou-saba, paolo.massioni, eric.bideaux, xavier.brun}@insa-lyon.fr. Corresponding author: Paolo Massioni, tel: +33(0)472436035, fax: +33(0)472438530. can be considered as overactuated (three actuators moving two degrees of freedom), which requires a control allocation strategy. The control of PAMs has been approached with several methods, which try to cope with the strong nonlinearities of its dynamics. The approaches found in the literature are mainly inherently nonlinear control methods [2], [16]; sliding mode controllers are one of the most common choices [1], [5], [13], also sometimes combined with adaptive or neural controllers [14], [12], or backstepping [11]. Sliding mode controllers in fact provide enough robustness with respect to the dynamical model which is considered as uncertain. In this work, a flatness-based control [8] is proposed, which exploits a model of all the elements involved and which also solves the over-actuation problem at the same time. The robustness with respect to model errors is provided by coupling the flatness-based controller with a proportional-integral (PI) controller feeding back the error with respect to the reference trajectory. The paper is structured as follows. Section II introduces the notation used throughout the paper. Section III describes the model of the platform and of all its elements, including the pneumatic artificial muscles. Section IV shows that a proper choice of measurements makes the platform a flat system, for which a flatness-based law is proposed. Section V concerns the problem of overactuation and how it is solved. At last, Section VI proposes some experimental results whereas Section VII draws the conclusions of the article. II. N OTATION AND DEFINITIONS Let R be the set of real number, and N the set of the strictly positive integers. For a matrix A, A⊤ denotes the transpose. Given two functions f (x), g(x) ∈ Rn , with x ∈ Rn , let the Lie (x) · g(x). derivative of f along g be defined as Lg f (x) = ∂f∂x ∂Lξ−1 f (x) g · g(x), with L0g f (x) = For ξ ∈ N, let Lξg f (x) = ∂x f (x). For all signals x depending from the time t, let x(ξ) (2) indicate its ξ-th time derivative, i.e. x(1) = dx = dt = ẋ, x 2 d x dt2 = ẍ, etc. All the symbols concerning the pneumatic muscle platform are defined in Table I. III. T HE PNEUMATIC PLATFORM A. Description The pneumatic platform studied in this paper is represented in Fig. 1 and Fig. 2. It consists of a metal plate fixed to a spherical hinge on top of a vertical beam; three pneumatic muscles controlled by servovalves are attached to the plate at 2 P0 θ0 D0 l0 α K εa εb k r T R J φ1 = −90◦ φ2 = 30◦ φ3 = 150◦ θx θy Pi vi Vi qi εi ε0 Fi Γ Atmospheric pressure Weave angle of the muscle at rest Diameter of the muscle at rest Length of the muscles at rest Experimentally determined power coefficient Experimentally determined coefficient Experimentally determined coefficient Experimentally determined coefficient Polytropic index of air Perfect gas constant Air temperature Muscle application point distance from center (constant) Momentum of inertia about an horizontal axis (constant) Angular position of the 1st muscle (constant) Angular position of the 2nd muscle (constant) Angular position of the 3rd muscle (constant) Angular position of the platform around x axis Angular position of the platform around y axis Absolute pressure inside the i-th muscle Voltage applied to the i-th servovalve Volume of the i-th muscle Mass flow into the i-th muscle Contraction of the i-th muscle Initial contraction of the muscle Force applied by the i-th the muscle Perturbation torques TABLE I S YMBOL DEFINITIONS . equally spaced points. Due to the muscles, and for simplicity, it can be considered that the platform has only two degrees of freedom, i.e. the two rotational angles (θx and θy ) with respect to horizontal axes passing through the hinge. An inclinometer provides measurements of such angles, and pressure sensors are located inside each muscle. This platform can be considered as a simplified version of a Stewart platform, a test bench on which control laws can be tried and evaluated before moving to more complex systems with more degrees of freedom. Inclinometer Platform Pneumatic muscle Servovalve Pressure sensor Fig. 1. The experimental platform. θy y y M3 M3 M2 M2 φ3 θx φ2 x x F3 F2 M1 z φ1 M1 F1 Fig. 2. Axonometric view and view from the top of the top plate, with definition of the axes x, y, z and the rotation angles θx and θy . M1 , M2 and M3 are the attachment points of the three pneumatic artificial muscles. B. Model This section reports the differential equations describing the system dynamic and the different assumptions made. A more detailed description of the complete model of the system is presented in [4], with all the assumptions and explanations (including those concerning how the hysteresis has been taken into account). The first elements to be modeled are the pneumatic muscles, which are supposed to be identical (they have the same length at rest l0 , the same initial contraction ε0 , etc.). The length contraction of each muscle (i = 1, 2, 3) can be written as: εi = R (cos φi sin θy − sin φi sin θx cos θy ) + ε0 l0 (3) Subsequently, the rate of contraction of each muscle is the time derivative of εi , i.e. Rh −θ̇x sin φi cos θx cos θy ε̇i = l0 (4) i +θ̇y (cos φi cos θy + sin φi sin θx sin θy )     F1 1 θ̈x = M (θx , θy ) F2  + Γ θ̈y J F3 (5) where the matrix M (θx , θy ) is given in equation (1) at the top of the next page. The term Γ = [Γx , Γy ]⊤ contains the torques that will not be modelled (as an arbitrary choice) and will be left to the feedback control to take care of. Such terms are either due to friction, or to gyroscopic couplings between the two axes, or to external forces acting on the platform. The friction terms are quite difficult to model exactly, whereas the gyroscopic couplings are quite small due to the fact that the platform keeps always almost horizontal and moves at relatively low angular velocities. This allows writing the platform around each axis as decoupled, according to (5) above. Such an equation can also be written as     1 F θ̈x (6) = E (θx , θy ) 1 + G (θx , θy ) F3 + Γ F2 θ̈y J where the matrices E (θx , θy ) and G (θx , θy ) are given in equation (2) at the top of the next page. This form separates the effect of the first two forces with respect to F3 , which makes it easier to approach the overactuation problem. 3 M (θx , θy ) =  R − sin φ1 cos θx cos θy J cos φ1 cos θy + sin φ1 sin θx sin θy − sin φ2 cos θx cos θy cos φ2 cos θy + sin φ2 sin θx sin θy − sin φ3 cos θx cos θy cos φ3 cos θy + sin φ3 sin θx sin θy     R − sin φ1 cos θx cos θy − sin φ2 cos θx cos θy  E (θx , θy ) =    J cos φ1 cos θy + sin φ1 sin θx sin θy cos φ2 cos θy + sin φ2 sin θx sin θy     − sin φ3 cos θx cos θy   G (θx , θy ) = R J cos φ3 cos θy + sin φ3 sin θx sin θy where εi (εi − εa ) εi + εb (8)   α πD02 3 (1 − εi ) 1 − 4 tan2 θ0 sin2 θ0 (9) L(εi ) = K and H(εi ) = with α, K, εa and εb experimentally determined constants. Considering that the operating range of the servovalves is for 1.25 bar 6 Pi 6 7 bar, the possible forces for each muscle are represented in Figure 3. Notice that only traction forces are possible (the muscles cannot push). (2) At last, the mass flow of gas qi entering each muscle is a nonlinear function of the pressure inside the muscle and the voltage vi fed to the servovalve. This function is considered as static, and it can be described by means of a polynomial approximation of experimental data [10] (graphically depicted in Figure 4). Mass flow (q i ) [Nl/min] In turn, each force due to pneumatic muscles can be modeled with the so called quasi-static model [7], [4], [3] as Fi (Pi , εi ) = H(εi )(Pi − P0 ) + L(εi ), (7) 150 200 100 100 50 0 -100 0 -200 5 -50 -100 1000 0 P = 1.25 bar Voltage (v i ) [V] i 900 P = 2 bar 800 P i = 3 bar i Traction force (F i ) [N] (1) -5 P i = 4 bar 1 3 4 5 6 7 -150 Pressure (P i ) [bar] P = 5 bar 700 2 i P i = 6 bar P i = 7 bar 600 Fig. 4. Mass flow of a servovalve as a function of voltage vi and absolute muscle pressure Pi . 500 400 Considering that at each time instant, Pi is measured by pressure sensors, it is possible to find the vi which gives the desired qi by a simple inversion of the polynomial function qi (Pi , vi ). 300 200 100 0 0 0.05 0.1 0.15 0.2 0.25 Contraction (ǫ i ) C. Control objectives Fig. 3. Traction force applied by a muscle as a function of the contraction εi and absolute pressure Pi . The pressure inside each muscle is modeled as   krT Pi ∂V (εi ) Ṗi = qi (Pi , vi ) − ε̇i Vi (εi ) rT ∂εi (10) where k is the polytropic index of the gas, r the perfect gas constant, T the temperature (considered constant), qi the mass flow of gas, and Vi the volume of the muscle, for which the following formula has been proposed [4], [3]  α 1 ∂V (1 − εi ) π (11) (εi ) = D02 l0 − 2 + (α + 1) ∂εi 4 tan2 θ0 sin θ0 where D0 , l0 are the diameter and length of the muscle at rest, and θ0 is the weave angle of the muscle fibers (a constant). The aim of this testbed is to demonstrate the ability to track any smooth trajectory of θx and θy . Trajectories of this kind can be chosen as infinitely differentiable piece-wise polynomial function. The angles of the platforms (θx , θy ) are physically constrained to be in the range [−15◦ , 15◦ ]. For these values, for the contractions εi the ranges are constrained within [−0.03, .21] (the muscles need to be contracted in order to apply a force), for which H(εi ) is never equal to 0. IV. M ODEL ANALYSIS AND CONTROL The accurate knowledge of the model allows the application of flatness-based control, at the condition of being able to prove that the system is flat. The relevant notions are recalled here. 4 A. Flatness and flatness-based control The notion of flat system and flatness-based control for nonlinear systems have been introduced in [8]. Basically, the “flatness” is a property of a dynamical system and a choice of its output y, as defined here. Definition 1 (Flat system - adapted from [8]): A dynamical system of equations ẋ = f (x) + g(x)u, with x ∈ Rn , u =∈ Rm is flat if there exist an Rm -valued map h, an Rn -valued map η, and an Rm -valued map θ such that y = h(x, u, u(1) , . . . , u(ν) ) (12) x = η(y, y (1) , . . . , y (ν−1) ) (13) u = θ(y, y (1) , . . . , y (ν) ) (14) for an appropriate value of ν ∈ N. The output y is then called “flat output”. The idea of flatness can be explained briefly as follows. If one can choose as many output variables yi as inputs (the system is square), such that it is possible to recover the state and the inputs from the derivatives of these output variables, then the system is flat and a flatness-based, open loop control law can be derived by system inversion (as explained later on). Two fundamental concepts for system inversion are characteristic index and coupling matrix. Definition 2 (Characteristic index): The characteristic index of the i-th component yi of y is the smallest ρi ∈ N for which Lgj Lρfi −1 hi 6= 0 for at least one value of j. Definition 3 (Coupling matrix): The coupling matrix ∆(x) is given by the expression:   Lg2 Lfρ1 −1 h1 . . . Lgm Lfρ1 −1 h1 Lg1 Lfρ1 −1 h1   ρ −1 Lg2 Lfρ2 −1 h2 . . . Lgm Lfρ2 −1 h2   Lg1 Lf2 h2 .  ∆(x)= .. .. .. ..  .   . . . Lg1 Lρfm −1 hm Lg2 Lρfm −1 hm ... Lgm Lρfm −1 hm It can be shown that  (ρ )   ρ1 L f h1 y1 1  (ρ2 )   Lρf2 h2  y2     = ∆(x)u +  .. ..    .   . ρ (ρ ) L f m hm ym m (15)    .  (16) The control law which has been applied to the testbed is based on the following theorem, which is a well-known result for which no proof is necessary here. Theorem 4 (Adapted from [8]): If a system of equations ẋ = f (x) + g(x)u with u ∈ Rm is flat (Definition 1) with respect to a flat output y = h(x) ∈ Rm with characteristic coefficients ρi , and if the matrix ∆(x) is invertible (at least locally), then it is possible to track a given smooth reference trajectory y(t) = h(x(t)) by employing the control law  (ρ )   ρ  L f 1 h1 y1 1  (ρ2 )   Lρ2 h    f 2   y2 −1  − . (17) u = ∆(x)   .. ..    .    . (ρ ) ym m Lρfm hm It is possible to prove that with this state trajectory, the system’s dynamic of each yi is linear (simply a chain of ρi integrators). B. Complete state-space model The state of the platform model can be chosen as x = [x1 , x2 , x3 , . . . x7 ]⊤ = [θx , θy , θ̇x , θ̇y , P1 , P2 , P3 ]⊤ , whereas the input vector is u = [q1 , q2 , q3 ]⊤ . By neglecting the perturbation term Γ, the system dynamic can then be expressed as follows. ẋ = f (x) + g(x)u (18) where f (x) =   x3       x4       − cos x1 cos x2 sin φ1 (H (ε1 ) (x5 − P0 ) + L (ε1 ))     − cos x cos x sin φ (H (ε ) (x − P ) + L (ε )) 1 2 2 2 6 0 2     − cos x1 cos x2 sin φ3 (H (ε3 ) (x7 − P0 ) + L (ε3 ))            (cos φ1 cos x2 + sin φ1 sin x1 sin x2 ) (H (ε1 ) (x5 − P0 ) + L (ε1 )),   + (cos φ2 cos x2 + sin φ2 sin x1 sin x2 ) (H (ε2 ) (x6 − P0 ) + L (ε2 ))    + (cos φ3 cos x2 + sin φ3 sin x1 sin x2 ) (H (ε3 ) (x7 − P0 ) + L (ε3 ))              a(ε1 , ε̇1 )(x5 − P0 )       a(ε2 , ε̇2 )(x6 − P0 )     a(ε3 , ε̇3 )(x7 − P0 ) (19) g(x) = [g1 (x), g2 (x), g3 (x)] with     0 0  0   0       0   0         g1 (x) =   0  , g2 (x) =  0  , b(ε1 )  0       0  b(ε2 ) 0 0 with     a (εi , ε̇i ) = −  0  0     0     g3 (x) =   0   0     0  b(ε3 ) (20) k ∂V (εi ) ε̇i V (εi ) ∂εi krT    b(εi ) = V (εi )  (21) C. Flatness of the model The system is flat if a vector flat output [y1 y2 y3 ]⊤ , according to (12), can be found. Such flat output has to fulfill both (13), i.e., it should be possible to express the state vector as a function of its time derivatives, and (14), i.e. it should be possible to express the input as a function of its derivatives. This paragraph shows that the choice   y1 = x1 y2 = x2 (22)  y3 = F3 = H(ε3 )(x7 − P0 ) + L(ε3 ) 5 plotted in Figure 5 never reaches zero in this interval. So ρ2 = 3. actually works in making the system flat. First consider condition (13); x1 , x2 , x3 and x4 can be obtained directly from y1 , y2 and their first degree time derivatives. Once x1 , x2 , x3 and x4 are known, all εi , H(εi ) and L(εi ) are determined as well. Since F3 is an output and H(ε3 ) 6= 0, x7 is immediately also determined. At last, x5 and x6 can be determined from ẋ3 and ẋ4 if the matrix  − cos x1 cos x2 sin φ1 − cos x1 cos x2 sin φ2 cos x2 cos φ1 +sin x1 sin x2 sin φ1 cos x2 cos φ2 +sin x1 sin x2 sin φ2  is invertible. The determinant of this matrix is cos2 x2 cos x1 (sin φ2 cos φ1 − sin φ1 cos φ2 ) which is never 0 in the range of θx = x1 , θy = x2 allowed for the platform (i.e. they never reach ±90◦ ). Secondarily, consider condition (13); a necessary condition for this is that the sum of the characteristic indices of the three outputs is the same as the number of states, i.e. 7. The computation of such indices leads to the following results. Fig. 5. Value of z as function of x1 = θx and x2 = θy . • • Output y1 Lg1 y3 = Lg2 y3 = 0; Lg3 y3 = b(ε3 )H(ε3 ) 6= 0 ⇒ ρ3 = 1. Lg1 y1 = Lg2 y1 = Lg3 y1 = 0 ⇒ ρ1 > 1; Lf y1 = x3 ; Lg1 Lf y1 = Lg2 Lf y1 = Lg3 Lf y1 = 0 ⇒ ρ1 > 2; L2f y1 = ẋ3 = − cos x1 cos x2 (sin φ1 (H(ε1 )(x5 − P0 )+ L(ε1 )) + sin φ2 (H(ε2 )(x6 − P0 ) + L(ε2 ))+ sin φ3 (H(ε3 )(x7 − P0 )+L(ε3 ))); Lg1 L2f y1 = − sin φ1 cos x1 cos x2 H(ε1 )b(ε1 ) Lg2 L2f y1 = − sin φ2 cos x1 cos x2 H(ε2 )b(ε2 ) Lg3 L2f y1 = − sin φ3 cos x1 cos x2 H(ε3 )b(ε3 ) It can be pointed out that Lg1 L2f y1 , Lg2 L2f y1 and Lg3 L2f y1 are never equal to 0 for the x1 and x2 within the valid range, so ρ1 = 3. • Output y3 Output y2 Lg1 y2 = Lg2 y2 = Lg3 y2 = 0 ⇒ ρ2 > 1; Lf y2 = x4 ; Lg1 Lf y2 = Lg2 Lf y2 = Lg3 Lf y2 = 0 ⇒ ρ2 > 2; L2f y2 = ẋ4 = (cos φ1 cos x2 + sin φ1 sin x1 sin x2 )(H(ε1 )(x5 − P0 ) + L(ε1 ))+(cos φ2 cos x2 +sin φ2 sin x1 sin x2 )(H(ε2 )(x6 − P0 ) + L(ε2 )) + (cos φ3 cos x2 + sin φ3 sin x1 sin x2 )(H(ε3 )(x7 − P0 ) + L(ε3 )); Lg1 L2f y2 = (cos φ1 cos x2 + sin φ1 sin x1 sin x2 )H(ε1 )b(ε1 ) Lg2 L2f y2 = (cos φ2 cos x2 + sin φ2 sin x1 sin x2 )H(ε2 )b(ε2 ) Lg3 L2f y2 = (cos φ3 cos x2 + sin φ3 sin x1 sin x2 )H(ε3 )b(ε3 ) The necessary condition of ρ1 + ρ2 + ρ3 = 7 is satisfied. The last step is to verify that the decoupling matrix  Lg1 L2f y1  ∆ = Lg1 L2f y2 Lg1 y3 Lg2 L2f y1 Lg2 L2f y2 Lg2 y3 (23) (24) is invertible. The expression of ∆ is made explicit in (25) at the top of the next page (with the shorthand notation of Hi = H(εi ), Li = L(εi ), bi = b(εi )). The determinant of this matrix is |∆| = H1 H2 H3 b1 b2 b3 m with m = − sin φ1 cos x1 cos x2 (cos φ2 cos x2 + sin φ2 sin x1 sin x2 ) + sin φ2 cos x1 cos x2 (cos φ1 cos x2 + sin φ1 sin x1 sin x2 ). The values of m as function of θx and θy in the valid interval are depicted in Figure 6 Accordingly, |∆| 6= 0, so the decoupling matrix is invertible over the operating range and the chosen output is proven to be flat. Notice that Lg2 L2f y2 can never be zero in the valid range, as the function z = cos φ2 cos x2 + sin φ2 sin x1 sin x2  Lg3 L2f y1 Lg3 L2f y2  Lg3 y3 Fig. 6. Values of m as function of θx and θy . 6  − sin φ1 cos x1 cos x2 H1 b1 ∆ = (cos φ1 cos x2 + sin φ1 sin x1 sin x2 ) H1 b1 0 − sin φ2 cos x1 cos x2 H2 b2 (cos φ2 cos x2 + sin φ2 sin x1 sin x2 ) H2 b2 0  − sin φ3 cos x1 cos x2 H3 b3 (cos φ3 cos x2 + sin φ3 sin x1 sin x2 ) H3 b3  (25) H3 b3 ... ... θx , θ˙ x , ¨θx , θ x , θy , θ˙ y , ¨θ y , θ y , F 3 , F˙ 3 qi servovalves platform inclinometer pressure sensors θx,y flatness controller Pi + muscle model vi F3 − error inverse polynomial map experimental setup PI + + desired qi controller Fig. 7. Global control scheme. D. Control law The platform can then be controlled in open-loop with the law  (ρ )    y1 1 L3f y 1    q = ∆−1 (x)  y 2(ρ2 )  − L3f y 2  + ∆−1 (x)w (26) (ρ ) Lf y 3 y3 3 where y i is the desired trajectory and w is an additional control term. Due to the presence of the perturbation terms which have been neglected (Γ), if w = 0 there will necessarily be a non-zero error ǫi = yi − yi . Considering that the dynamic of the system under this law is just a chain of integrators, by imposing to w a feedback law as a function of the ǫi closes the loop. In this case, a proportional-integral controller (PI) has been tuned. Figure 7 shows the overall control scheme. The flatness-based control is for some aspects, quite similar to feedback linearisation control [9]. The main differences lie in the fact that flatness-based requires a specific choice of flat output (whereas feedback linearisation can take any output, assuming the system is observable), and that it does not require a knowledge or measure of the state variable. On the other hand, the baseline flatness-based control is feedforward only, which requires the introduction of the additional feedback term w. V. S OLVING THE OVERACTUATION It can be pointed out that the platform is overactuated, in the sense that the three forces applied by the muscles are generating only two torques. To tell it in another way, the average value of the Fi is irrelevant for the platform’s dynamic; if a given F1 = F̃1 , F2 = F̃2 and F3 = F̃3 generate certain torques, then F1 = F̃1 + F0 , F2 = F̃2 + F0 and F3 = F̃3 + F0 will generate the same torques for any F0 . On the other hand, it is useful to have three muscles instead of two due to the fact that muscles can only pull and not push, i.e. their force range is quite limited as shown by Figure 3. The choice of F3 as one of the flat output can be then interpreted in the light of this fact: first of all, it would be impossible to resolve the state from the output if one of the forces (or pressure) is not measured, as their effects on the angles is the same up to a constant term. Secondarily, the flat control allows choosing the value of F3 , which lets one choose the best value in order to let all the muscles be in their valid force range. Consider that at each instant, the εi are determined by the instantaneous geometry, which implies that each muscle has a limited interval of possible applicable forces (see Figure 8). One can find the intersection of such intervals and call Fmin its minimum and Fmax its maximum. Under the reasonable hypothesis that the platform turns slowly (in any case it is constrained to angles smaller than 15◦ ), it can be assumed that F1 , F2 and F3 have to be close to the equilibrium values, i.e. F1 ≈ F2 ≈ F3 . For this reason, setting the reference for F3 as 1 (27) F 3 = (Fmax (ε1 , ε2 , ε3 ) + Fmin (ε1 , ε2 , ε3 )) 2 gives the best chances of having F2 and F3 within the realisable interval as well. For the experiment in the next section, the reference for F3 has been determined by the law in (27). VI. E XPERIMENTAL RESULTS In order to assess the performance of the proposed control approach, an experiment has been conducted on the platform. The proposed flatness-based control coupled with PI has been compared to a PI controller, empirically tuned to get the best apparent performances. The same reference trajectory (a combination of sinusoids) has been tested for both controllers. Figure 9 reports the results for the PI controller, whereas Figure 10 shows the flatness-based controller results. It is 7 600 6 P i = 1.25 bar P i = 7 bar 4 450 2 300 degrees Traction force (F i ) [N] ǫ2 ǫ3 150 Fmax 0 -2 ǫ1 -4 θ (measure) Fmin x reference for θ 0 0 0.05 0.1 0.15 0.2 x θ (measure) -6 0.25 y reference for θ y Contraction (ǫ i ) -8 Fig. 8. For a given position, the three contractions εi are given, so not all forces are possible for each muscle, but only those within the pressure range between 1.25 and 7 bar. One can compute Fmax (the maximum force that all muscles can exert) and Fmax (the minimum force that all muscles can exert). Setting F3 as the average between these two allows all muscles to apply the desired forces and to maximise their range. 0 5 10 15 20 25 30 time [s] Fig. 10. Trajectory tracking with flatness-based control plus a PI. 6.5 6 5.5 bar apparent from the picture that the feedforward action added by the flatness-based control greatly improves the tracking ability; in fact, it can be computed that the root mean square tracking errors (for θx and θy respectively) are 0.51 and 0.59 degrees for the PI case. With the flatness controller, these root mean square errors become less than half, i.e. 0.25 and 0.29 degrees respectively (consider also that the inclinometers’ output has a quantisation equivalent to 0.18 degrees). 5 4.5 4 P 6 P P 1 2 3 3.5 0 4 10 15 20 25 30 time [s] Fig. 11. Pressures inside the pneumatic artificial muscles during the flatnessbased control plus PI experiment. 2 degrees 5 0 VII. C ONCLUSION -2 θ (measure) x -4 reference for θ x θ (measure) y reference for θ y -6 0 5 10 15 20 25 30 time [s] Fig. 9. Trajectory tracking with simple PI control. Figure 11 shows the evolution of the pressures during the flatness-based controller test. Figure 12 shows the force of the three muscles during the same test; remember that the reference for F3 is determined with the overactuation-solving law proposed in Section V. Notice that the forces never saturate (and neither do the voltages or the pressure), which validates the proposed strategy. This paper has presented the successful application of a flatness-based controller to a platform featuring three PAMs. The experimental results clearly show a better trajectory tracking compared to a simple PI controller. Future research will look at the possibility of using PAMs for building a complete six-degree-of-freedom Stewart platform, and controlling it with the same approach. R EFERENCES [1] H. Aschemann and D. Schindele. Sliding-mode control of a high-speed linear axis driven by pneumatic muscle actuators. IEEE Transactions on Industrial Electronics, 55(11):3855–3864, 2008. [2] D.X. Ba, T.Q. Dinh, and K.K. Ahn. An integrated intelligent nonlinear control method for a pneumatic artificial muscle. IEEE/ASME Transactions on Mechatronics, 21(4):1835–1845, 2016. [3] E. Bideaux, S. Sermeno Mena, and S. Sesmat. Parallel manipulator driven by pneumatic muscles. In 8th International Conference on Fluid Power (8th IFK), Dresden, Germany, 2012. 8 280 F1 260 F2 F3 240 220 N 200 180 160 140 120 100 80 0 5 10 15 20 25 30 time [s] Fig. 12. Forces applied by the pneumatic artificial muscles (estimated from the pressures and the contractions) with flatness-based control plus a PI. [4] D. Bou Saba, E. Bideaux, X. Brun, and P. Massioni. A complete model of a two degree of freedom platform actuated by three pneumatic muscles elaborated for control synthesis. In BATH/ASME 2016 Symposium on Fluid Power and Motion Control, pages V001T01A004– V001T01A004. American Society of Mechanical Engineers, 2016. [5] D. Cai and Y. Dai. A sliding mode controller for manipulator driven by artificial muscle actuator. In Proceedings of the 2000 IEEE International Conference on Control Applications, pages 668–673. IEEE, 2000. [6] C.-P. Chou and B. Hannaford. Measurement and modeling of McKibben pneumatic artificial muscles. IEEE Transactions on Robotics and Automation, 12(1):90–102, 1996. [7] F. Daerden and D. Lefeber. Pneumatic artificial muscles: actuators for robotics and automation. European journal of mechanical and environmental engineering, 47(1):11–21, 2002. [8] M. Fliess, J. Lévine, P. Martin, and P. Rouchon. Flatness and defect of non-linear systems: introductory theory and examples. International Journal of Control, 61(6):1327–1361, 1995. [9] A. Isidori. Nonlinear control systems. Springer Science & Business Media, 2013. [10] O. Olaby, X. Brun, S. Sesmat, T. Redarce, and E. Bideaux. Characterization and modeling of a proportional value for control synthesis. In Proceedings of the JFPS International Symposium on Fluid Power, volume 2005, pages 771–776. The Japan Fluid Power System Society, 2005. [11] R.A. Rahman and N. Sepehri. Design and experimental evaluation of a dynamical adaptive backstepping-sliding mode control scheme for positioning of an antagonistically paired pneumatic artificial muscles driven actuating system. International Journal of Control, pages 1–26, 2016. [12] R.M. Robinson, C.S. Kothera, R.M. Sanner, and N.M. Wereley. Nonlinear control of robotic manipulators driven by pneumatic artificial muscles. IEEE/ASME Transactions on Mechatronics, 21(1):55–68, February 2016. [13] X. Shen. Nonlinear model-based control of pneumatic artificial muscle servo systems. Control Engineering Practice, 18(3):311–317, 2010. [14] G.L. Shi and W. Shen. Hybrid control of a parallel platform based on pneumatic artificial muscles combining sliding mode controller and adaptive fuzzy CMAC. Control Engineering Practice, 1(1):76–86, 2013. [15] B. Tondu and P. Lopez. Modeling and control of McKibben artificial muscle robot actuators. Control Systems, IEEE, 20(2):15–38, 2000. [16] X. Zhu, G. Tao, B. Yao, and J. Cao. Adaptive robust posture control of parallel manipulator driven by pneumatic muscles with redundancy. IEEE/ASME Transactions on Mechatronics, 13(4):441–450, August 2008.
3cs.SY
A Simple Semantics for Haskell Overloading J. Garrett Morris arXiv:1612.08199v1 [cs.PL] 24 Dec 2016 University of Edinburgh [email protected] Abstract 1.1 Dictionary-Passing and its Disadvantages As originally proposed, type classes provide overloading and adhoc definition, but can still be understood (and implemented) in terms of strictly parametric calculi. This is not true of subsequent extensions of type classes. Functional dependencies and equality constraints allow the satisfiability of predicates to refine typing; this means that the interpretations of equivalent qualified types may not be interconvertible. Overlapping instances and instance chains allow predicates to be satisfied without determining the implementations of their associated class methods, introducing truly nonparametric behavior. We propose a new approach to the semantics of type classes, interpreting polymorphic expressions by the behavior of each of their ground instances, but without requiring that those behaviors be parametrically determined. We argue that this approach both matches the intuitive meanings of qualified types and accurately models the behavior of programs. The semantics of type classes has primarily been given by translations from instance declarations and (implicit) overloading to dictionaries and (explicit) dictionary arguments. This parallels the treatment of implicit polymorphism by translation to systems with explicit polymorphism (such as System F), and shares similar challenges. For a simple example, in Haskell, the map function has the polymorphic type scheme (t → u) → [t] → [u]. In translating to System F, this could be interpreted as either Categories and Subject Descriptors D.3.1 [Programming Languages]: Formal Definitions and Theory—Semantics; F.3.2 [Logics and Meanings of Programs]: Semantics of Programming Languages—Denotational semantics Keywords overloading; type classes; semantics ∀t.∀u.(t → u) → [t] → [u] or ∀u.∀t.(t → u) → [t] → [u]. But these types are not equivalent: they express different orders of passing type arguments. There are various ways of addressing this discrepancy: for example, Mitchell [8] shows that, for any two translations of an implicitly typed scheme, there is a term (which he calls a retyping function) which transforms terms of one translation to terms of the other, while only manipulating type abstractions and applications. Similar issues arise in the semantics of type classes. For example, a function to compare pairs (t, u) for equality could be given either the type scheme (Eq t, Eq u) ⇒ (t, u) → (t, u) → Bool or the type scheme 1. Introduction Implicit polymorphism (as provided by the Hindley-Milner type systems in ML and Haskell) provides a balance between the safety guarantees provided by strong typing, and the convenience of generic programming. The Hindley-Milner type system is strong enough to guarantee that the evaluation of well-typed terms will not get stuck, while polymorphism and principal types allow programmers to reuse code and omit excessive type annotation. Type classes [16] play a similar role for overloading: they preserve strong typing (ruling out run-time failures from the use of overloaded symbols in undefined ways) without requiring that programmers explicitly disambiguate overloaded expressions. Since their introduction, type classes have seen numerous extensions, such as multiparameter type classes, functional dependencies [5], and overlapping instances [13]; a variety of practical uses, from simple overloading to capturing complex invariants and type-directed behavior; and, the adoption of similar approaches in other strongly-typed programming languages, including Isabelle and Coq. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. Haskell ’14, September 6, 2014, Gothenburg, Sweden. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-3041-1/14/09. . . $15.00. http://dx.doi.org/10.1145/2633357.2633364 (Eq u, Eq t) ⇒ (t, u) → (t, u) → Bool. In a dictionary-passing translation, type classes are interpreted by tuples, called dictionaries, containing the type-specific implementations of each of the class methods. Class instances correspond to dictionary definitions, while predicates in types correspond to dictionary arguments. In the case of the Eq class, which has equality and inequality methods, we could define Eq dictionaries by EqDict t = (t → t → Bool, t → t → Bool). Even though the two types for pair equality above are equivalent in the implicitly overloaded setting, their dictionary-passing translations are not: the first corresponds to a function of type EqDict t → EqDict u → (t, u) → (t, u) → Bool, while the second corresponds to EqDict u → EqDict t → (t, u) → (t, u) → Bool, Again, approaches exist to address this discrepancy: for example, Jones shows [3] that there are conversion functions, similar to Mitchell’s retyping functions, to convert between different translations of the same overloaded term. Our own work began by exploring instance chains [10], a proposed extension to Haskell-like type class systems. In the course of this exploration, we discovered several difficulties with existing approaches to the semantics of overloading. Mismatch in expressivity. System F typing is significantly more expressive than the Hindley-Milner type systems it is used to model. In particular, even within the translation of an ML or Haskell type scheme, there are arbitrarily many expressions that do not correspond to any expressions of the source language. The problem is compounded when considering dictionary-passing translations of type classes. For example, there is no notion in Haskell of class instances depending on terms; on the other hand, there is no difficulty in defining a term of type Int → EqDict Int. Uses of such a term cannot be equivalent to any use of the methods of Eq. As a consequence, there are properties of source programs (for example, that any two instances of == at the same type are equal) that may not be provable of their dictionary-passing translation without reference to the specific mechanisms of translation. Predicates refine typing. Second, the notions of equivalence of System F and Haskell types diverge once the satisfiability of predicates can refine typing. For example, functional dependencies allow programmers to declare that some parameters of a class depend upon others; in the declaration class Elems c e | c → e where empty : : c insert : : e → c → c the dependency c → e captures the intuition that the type of a container’s elements are determined by the type of the container. Concretely, given two predicates Elems τ υ and Elems τ ′ υ ′ , if we know that τ = τ ′ , then we can conclude υ = υ ′ . This property is lost in the dictionary-passing translation. Dictionaries for Elems contain just their methods: ElemsDict c e = (c, e → c → c) As a consequence, there are types that are equivalent in Haskell, but are not interconvertible in the dictionary-passing interpretation. For example, the type (Elems c e, Elems c e′ ) ⇒ e → e′ → c is equivalent to the (simpler) type (Elems c e) ⇒ e → e → c as we must have that e = e′ for the qualifiers in the first type to be satisfiable. However, there is no corresponding bijection between terms of type ElemsDict c e → ElemsDict c e′ → e → e′ → c and terms of type ElemsDict c e → e → e → c. While we can construct a term of the second type given a term of the first, there is no parametric construction of a term of the first type from a term of the second. Non-parametric behavior. Finally, other extensions to class systems make it possible to define terms which have no translation to parametric calculi. For example, we could define a function invBool that negated booleans and was the identity on all other types. We begin by introducing a suitable class: class Univ t where invBool : : t → t There are several approaches to populating the class, using different extensions of the Haskell class system. Using overlapping instances [13], we could simply provide the two desired instances of the class, relying on the type checker to disambiguate them based on their specificity: instance Univ Bool where invBool = not instance Univ t where invBool = id Using instance chains, we would specify the ordering directly: instance Univ Bool where invBool = not else Univ t where invBool = id With either of these approaches, we might expect that the type of the class method invBool is (Univ t) ⇒ t → t. However, the predicate Univ τ is provable for arbitrary types τ . Thus, the above type is intuitively equivalent to the unqualified type t → t; however, there is no term of that type in a purely parametric calculus that has the behavior of method invBool. (In practice, this is avoided by requiring that invBool’s type still include the Univ predicate, even though it is satisfied in all possible instantiations; while this avoids the difficulties in representing invBool in a parametric calculus, it disconnects the meaning of qualified types from the satisfiability of their predicates.) 1.2 Specialization-based Semantics We propose an alternative approach to the semantics of type-class based implicit overloading. Rather than interpret polymorphic expressions by terms in a calculus with higher-order polymorphism, we will interpret them as type-indexed collections of (the interpretations of) monomorphic terms, one for each possible ground instantiation of their type. We call this a specialization-based approach, as it relates polymorphic terms to each of their (groundtyped) specializations. We believe this approach has a number of advantages. • First, our approach interprets predicates directly as restrictions of the instantiation of type variables, rather than through an intermediate translation. Consequently, properties of the source language type system—such as the type refinement induced by the Elems predicates—are immediately reflected in the semantics, without requiring the introduction of coercions. • Second, our approach naturally supports non-parametric exam- ples, such as class Univ, and avoids introducing artificial distinction between the semantics of expressions using parametric and ad-hoc polymorphism. • Third, because our approach does not need to encode overload- ing via dictionaries, it becomes possible to reason about class methods directly, rather than through reasoning about the collection of dictionaries defined in a program. Our approach builds on Ohori’s simple semantics for ML polymorphism [12], extended by Harrison to support polymorphic recursion [1]. In this paper, we introduce a simple overloaded language called H− (§2), and give typing and equality judgments in the presence of classes and class methods. We apply our specialization-based approach to give a denotational semantics of H− (§3), and show the soundness of typing and equality with respect to the denotational semantics (§4). We also develop two examples, to demonstrate the advantages of our approach. First, we consider a pair of definitions, one parametric and the other ad-hoc, defining operational equivalent terms. We show that the defined terms are related by our equality judgment (§2.3) and have the same denotations (§3.5). This demonstrates the flexibility of our approach, and the ability to reason about class methods directly (the second and third advantages listed above). Second, we extend H− with functional dependencies (§5), and establish the soundness of the (extended) typing and equality judgments, all without having to augment the models of terms. This demonstrates the extensibility of our approach, and the close connection between properties of source terms and properties of their denotations (the first advantage listed above). 2. The H− Language Figure 1 gives the types and terms of H− ; we write x to denote a (possibly empty) sequence of x’s, and if π is a predicate C τ , we will sometimes write class(π) for C. As in Jones’s theory of qualified types [2], the typical Hindley-Milner types are extended with x ∈ Var t ∈ TVar C Term variable Type variables Class names Term constants Type constants Instance names Types τ, υ Predicates Pred ∋ π Contexts P, Q Qualified types ρ Type schemes Scheme ∋ σ Expressions Expr ∋ M, N Class axioms Axiom sets Methods: Signatures Implementations Class contexts ::= ::= ::= ::= ::= ::= | Axiom ∋ α ::= A ⊂ k K d ∈ InstName (VAR ) t|K|τ →τ Cτ π τ |π⇒ρ ρ | ∀t.σ x | k | λx.M | M N µx.M | let x = M in N d : ∀t. P ⇒ π Axiom Si ∈ Var ⇀ Pred × Scheme Im ∈ InstName × Var ⇀ Expr Ψ ::= hA, Si, Imi (x : σ) ∈ Γ P | Γ ⊢A x : σ (→ E) (µ) qualified types ρ, capturing the use of predicates. We must also account for the definition of classes and their methods. One approach would be to expand the grammar of expressions to include class and instance declarations; such an approach is taken in Wadler and Blott’s original presentation [16]. However, this approach makes such definitions local, in contrast to the global nature of subsequent type class systems (such as that of Haskell), and introduces problems with principal typing (as Wadler and Blott indicate in their discussion). We take an alternative approach, introducing new top level constructs (axioms A, method signatures Si, and method implementations Im) to model class and instance declarations. We refer to tuples of top level information as class contexts Ψ, and will give versions of both our typing and semantic judgments parameterized by such class contexts. Note that this leaves implicit many syntactic restrictions that would be present in a full language, such as the requirement that each instance declaration provide a complete set of method implementations. 2.1 H− Typing We begin with the typing of H− expressions; our expression language differs from Jones’s only in the introduction of µ (providing recursion) . Typing judgments take the form P | Γ ⊢A M : σ, where P is a set of predicates restricting the type variables in Γ and σ, and A is the set of class axioms (the latter is the only significant difference between our type system and Jones’s). The typing rules for H− expressions are given in Figure 2. We write ftv(τ ) for the free type variables in τ , and extend ftv to predicates π, contexts P, and environments Γ in the expected fashion. Rules (⇒ I) and (⇒ E) describe the interaction between the predicate context P and qualified types ρ. Otherwise, the rules are minimally changed from the corresponding typing rules of most Hindley-Milner systems. We continue with the rules for predicate entailment in H− , given in Figure 3. The judgment d : P A π denotes that the axiom named d proves predicate π, given assumptions P and class axioms A. We use a dummy instance name, written -, in the case that the goal is one of the assumptions. We will omit the instance name if (as in the typing rules) the particular instance used is irrelevant. We write P A Q if there are d1 . . . dn such that di : P Qi , and A P to abbreviate ∅ A P. Our entailment relation differs from Jones’s entailment relation for type classes and from our prior systems [10] in two respects. First, our system is intentionally simplified (for example, we omit superclasses and instance chains). P | Γ ⊢A (λx.M) : τ → τ ′ (⇒ I) P | Γ ⊢A µx.M : τ P | Γ ⊢A M : σ P, π | Γ ⊢A M : ρ P | Γ ⊢A M : π ⇒ ρ P | Γ ⊢A M : π ⇒ ρ P A π P | Γ ⊢A M : ρ t 6∈ ftv(Γ, P) P | Γ ⊢A M : ∀t.σ (L ET ) P | Γ ⊢A N : τ P | Γ ⊢A (M N) : τ ′ P | Γ, x : τ ⊢A M : τ − Figure 1: Types and terms of H . P | Γ, x : τ ⊢A M : τ ′ P | Γ ⊢A M : τ → τ ′ (⇒ E) (∀ I) (→ I) P | Γ ⊢A M : σ (∀ E) P | Γ ⊢A M : ∀t.σ P | Γ ⊢A M : [τ /t]σ P | Γ, x : σ ⊢A N : τ P | Γ ⊢A (let x = M in N) : τ Figure 2: Expression typing rules of H− . (A SSUME ) (A XIOM ) π∈P -:P Aπ (d : ∀t.Q′ ⇒ π ′ ) ∈ A d:P S π′ = π A P A S Q′ π Figure 3: Predicate entailment rules of H− . Second, we do not attempt to capture all the information that would be necessary for an dictionary-passing translation; we will show that having just the first instance name is sufficient to determine the meanings of overloaded expressions. In the source code of a Haskell program, type class methods are specified in class and instance declarations, such as the following: class Eq t where (==) : : t → t → Bool instance Eq t ⇒ Eq [ t ] where xs == ys = . . . We partition the information in the class and instance declarations into class context tuples hA, Si, Imi. The logical content is captured by the axioms A; in this example, we would expect that there would be some instance name d such that (d : ∀t. Eq t ⇒ Eq [t]) ∈ A. Haskell’s concrete syntax does not name instances; for our purposes, we assume that suitable identifiers are generated automatically. The method signatures are captured in the mapping Si; we distinguish the class in which the method is defined (along with the corresponding type variables) from the remainder of the method’s type scheme. For this example, we would have Si(==) = hEq t, t → t → Booli. Note that we have not quantified over the variables appearing in the class predicate, nor included the class predicate in the type scheme t → t → Bool. Each predicate in the range of Si will be of the form C t for some class C and type variables t, as they arise from class definitions. The type scheme of a class member may quantify over variables or include predicates beyond those used in the class itself. For example, the Monad class has the following definition: (C TXT ) {π ≁ π ′ | (d : P ⇒ π), (d′ : P′ ⇒ π ′ ) ∈ A} {(P | Γ, xi : σxi ⊢A Im(y, d) : σy,d ) | hy, di ∈ dom(Im)} P | Γ, xi : σxi ⊢A M : σ {β} P | Γ ⊢hA,Si,Imi M : σ P | Γ, x : τ ⊢Ψ M : τ ′ P | Γ ⊢Ψ (λx.M)N ≡ [N/x]M : τ ′ {η} Figure 4: H− typing with class contexts. {µ} class Monad m where return : : a → m a (¿¿=) : : m a → (a → m b) → m b {L ET } Note that the variable a in the type of return is not part of the Monad constraint. Thus, we would have that P | Γ ⊢Ψ M : τ → τ ′ P | Γ, x : τ ⊢Ψ M : τ P | Γ ⊢Ψ µx.M ≡ [µx.M/x]M : τ P | Γ ⊢Ψ M : σ ∀t.Eq t ⇒ [t] → [t] → Bool. We introduce abbreviations for the type scheme of each method, in general and at each instance, assuming some class context hA, Si, Imi. For each method name x such that Si(x) = hπ, ∀u.ρi, we define the type scheme for x by: σx = ∀t.∀u. π ⇒ ρ, or, equivalently, writing ρ as Q ⇒ τ : σx = ∀t, u. (π, Q) ⇒ τ where, in each case, t = ftv(π). Similarly, for each method x as above, and each instance d such that • hx, di ∈ dom(Im); • (d : ∀t. P ⇒ π ′ ) ∈ A; and, • there is some substitution S such that S π = π ′ we define the type scheme for x in d by: σx,d = ∀t, u. (P, S Q) ⇒ S τ. P | Γ, x : σ ⊢Ψ N : τ P | Γ ⊢Ψ (let x = M in N) ≡ [M/x]N : τ {M ETHOD} {∀ I} x 6∈ fv(M) P | Γ ⊢Ψ λx.(Mx) ≡ M : τ → τ ′ Si(return) = hMonad m, ∀a.a → m ai. The method implementations themselves are recorded in component Im, which maps pairs of method and instance names to implementing expressions. To describe the typing of methods and method implementations, we begin by describing the type of each method implementation. This is a combination of the defining instance, including its context, and the definition of the method itself. For example, in the instance above, the body of the == method should compare lists of arbitrary type t for equality (this arises from the instance predicate Eq [t ] and the signature of ==), given the assumption Eq t (arising from the defining instance). That is, we would expect it to have the type P | Γ ⊢Ψ N : τ t 6∈ ftv(P, Γ) Si(x) = hπ, σi d:P Sπ P | Γ ⊢hA,Si,Imi x ≡ Im(x, d) : S σ {(P | Γ ⊢Ψ M ≡ N : [τ /t]σ) | τ ∈ GType} P | Γ ⊢Ψ M ≡ N : ∀t.σ {∀ E} {⇒ I} {⇒ E} P | Γ ⊢Ψ M ≡ N : ∀t.σ P | Γ ⊢Ψ M ≡ N : [τ /t]σ P, π | Γ ⊢Ψ M ≡ N : ρ P | Γ ⊢Ψ M ≡ N : π ⇒ ρ P | Γ ⊢Ψ M ≡ N : π ⇒ ρ P π P | Γ ⊢Ψ M ≡ N : ρ Figure 5: Equality for H− terms. 2.2 Equality of H− Terms In this section, we give an axiomatic presentation of equality for H− terms. Our primary concerns are the treatment of polymorphism and class methods; otherwise, H− differs little from standard functional calculi. As described in the introduction, our intention is to permit reasoning about class methods directly, without relying on either a dictionary-passing translation or a preliminary inlining step that resolves all method overloading. This results in two unusual aspects of our rules: • While our presentation gives equality for expressions, it relies critically on components of the class context hA, Si, Imi—the axioms A to determine which instance solves given constraints, and the method implementations Im to determine the behavior of methods. • The treatment of polymorphism cannot be completely paramet- Finally, we give a typing rule parameterized by class contexts in Figure 4; in xi : σxi , the xi range over all methods defined in the program (i.e., over the domain of Si). Intuitively, an expression M has type τ under hA, Si, Imi if: ric, and different equalities may be provable for the same term at different types; for example, we cannot hope to have uniform proofs of properties of the == method when it is defined differently at different types. • None of the class instances overlap. More expressive class sys- Equality judgments take the form P | Γ ⊢Ψ M ≡ N : σ, denoting that, assuming predicates P, variables typed as in Γ, and class context Ψ, expressions M and N are equal at type σ. To simplify the presentation, we have omitted equational assumptions; however, extending our system with assumptions and a corresponding axiom rule would be trivial. The rules are those listed in Figure 5, together with rules for reflexivity, symmetry, and transitivity of equality, and the expected α-equivalence and congruence rules for each syntactic form. Rules {β}, {η}, {µ} and {L ET } should tems will require more elaborate restrictions; we give an example when extending H− to support functional dependencies (§5). • Each method implementation Im(x, d) has the type σx,d (meth- ods are allowed to be mutually recursive). • The main expression has the declared type σ, given that each class method xi has type σxi . be unsurprising. Rules {⇒I} and {⇒E} mirror the corresponding typing rules, assuring that we can only conclude equalities about well-typed expressions. Rule {∀ E} should also be unsurprising: if we have proved that two expressions are equal at a quantified type, we have that they are equal at any of its instances. Rule {∀ I} is less typical, as it requires one subproof for each possible ground type (GType ranges over ground type expressions). Note that this is only non-trivial for terms involving overloading. Finally, rule {M ETHOD} provides (one step of) method resolution. Intuitively, it says that for some class method x at type σ, if instance d proves that x is defined at σ, then x is equal to the implementation of x provided by instance d. 2.3 Polymorphic Identity Functions In the introduction, we gave an example of a polymorphic function (invBool) that could be instantiated at all types, yet did not have parametric behavior. In this section, we will consider a function which does have parametric behavior, but is defined in an ad-hoc fashion. We will demonstrate that our treatment of equality allows us to conclude that it is equal to its parametric equivalent. Our particular example is the identity function. First, we give its typical definition: id1 : : t → t id1 x = x For our second approach, we intend an overloaded definition that is provably equal to the parametric definition. We could produce such a definition using instance chains: class Id2 ' t where id2 ' : : t → t instance (Id2 ' t , Id2 ' u) ⇒ Id2 ' ( t → u) where id2 ' f = id2 ' ◦ f ◦ id2 ' else Id2 ' t where id2 ' x = x This gives an ad-hoc definition of the identity function, defined at all types but defined differently for function and non-function types. Reasoning about this definition would require extending the entailment relation to instance chains, introducing significant additional complexity. We present simpler instances, but restrict the domain of types to achieve a similar result. class Id2 t where id2 : : t → t instance Id2 Int where id2 x = x instance (Id2 t , Id2 u) ⇒ Id2 ( t → u) where id2 f = id2 ◦ f ◦ id2 We will use Int to stand in for all base (non-function) types. It should be intuitive that, while they are defined differently, id1 x and id2 x should each evaluate to x for any integer or function on integers x. Correspondingly, given a class context Ψ that describes (at least) Id2, we can prove that ⊢Ψ id1 ≡ id2 : τ (we omit the empty context and empty assumptions) for any such type τ . The case for integers is direct: one application of {M ETHOD} is sufficient to prove ⊢Ψ id2 ≡ λx.x : Int → Int. For functions of (functions of. . . ) integers, the proof has more steps, but is no more complicated. For the simplest example, to show that ⊢Ψ id2 ≡ λx.x : (Int → Int) → (Int → Int), we use {M ETHOD} to show ⊢Ψ id2 ≡ λf .(id2 ◦ f ◦ id2) : (Int → Int) → (Int → Int). Relying on the usual definition of composition and {β}, we show ⊢Ψ λf .(id2 ◦ f ◦ id2) ≡ λf .λx.id2(f (id2 x)) : (Int → Int) → (Int → Int) Finally, by two uses of {M ETHOD} for id2 on integers, and {η}, we have ⊢Ψ λf .λx.id2(f (id2 x)) ≡ λf .f : (Int → Int) → (Int → Int) and thus the desired result. We cannot expect to prove that id1 ≡ id2 at all types (i.e., ⊢Ψ id1 ≡ id2 : ∀t.t → t) without limiting the domain of types. For example, there is no instance of Id2 at type Bool; therefore, we cannot prove any non-trivial equalities ⊢Ψ id2 ≡ M : Bool → Bool. However, if we were to restrict the grammar of types to those types for which Id2 is defined (that is, if we define that τ ::= Int | τ → τ ), then we could construct such an argument. To show that ⊢Ψ id2 ≡ λx.x : ∀t.t → t, we begin by applying {∀ E}, requiring a derivation ⊢Ψ id2 ≡ λx.x : τ → τ for each ground type τ . We could construct such a set of derivations by induction on the structure of types, using the argument for Int above as the base case, and a construction following the one for Int → Int for the inductive case. A similar approach applies to the formulation using instance chains (class Id2'): we could show that the first clause applied to functions, the second clause applied to any non-function type, and use induction over the structure of types with those cases. 3. A Simple Semantics for Overloading Next, we develop a simple denotational semantics of H− programs, extending an approach originally proposed by Ohori [12] to describe the implicit polymorphism of ML. As with the presentation of equality in the previous section, the primary new challenges arise from the definition of class methods and the treatment of overloading. We will demonstrate that the specialization-based approach is well-suited to addressing both challenges. In particular, it allows expressions to have different interpretations at each ground type without introducing additional arguments or otherwise distinguishing qualified from unqualified type schemes. 3.1 The Meaning of Qualified Types To describe the meaning of overloaded expressions, we must begin with the meaning of qualified types. Intuitively, qualifiers in types can be viewed as predicates in set comprehensions—that is, a class Eq denotes a set of types, and the qualified type ∀t.Eq t ⇒ t → t → Bool describes the set of types {t → t → Bool | t ∈ Eq}. However, most existing approaches to the semantics of overloading do not interpret qualifiers in this fashion: Wadler and Blott [16], for instance, translate qualifiers into dictionary arguments, while Jones [2] translates qualified types into a calculus with explicit evidence abstraction and application. Our approach, by contrast, preserves the intuitive notion of qualifiers. Given some class context Ψ = hA, Si, Imi, we define the ground instances ⌊σ⌋Ψ of an H− type scheme σ by: ⌊τ ⌋Ψ = {τ } ( ⌊ρ⌋Ψ if A π ⌊π ⇒ ρ⌋Ψ = ∅ otherwise [ ⌊∀t.σ⌋Ψ = ⌊[τ /t]σ⌋Ψ . τ ∈GType Equivalently, if we define GSubst(t) to be substitutions that map t to ground types and are otherwise the identity, we have ⌊∀t.P ⇒ τ ⌋Ψ = {S τ | S ∈ GSubst(t, A S P}. We will omit annotation Ψ when it is unambiguous. In the typing judgments for H− , predicates can appear in both types and contexts. To account for both sources of predicates, we adopt Jones’s constrained type schemes (P | σ), where P is a list of predicates and σ is an H− type scheme; an unconstrained type scheme σ can be treated as the constrained scheme (∅ | σ) (as an empty set of predicates places no restrictions on the instantiation of the variables in σ). We can define the ground instances of constrained type schemes by a straightforward extension of the definition for unconstrained schemes: if Ψ = hA, Si, Imi, then ⌊(P | ∀t.Q ⇒ τ )⌋Ψ = {S τ | S ∈ GSubst(t), A (P, S Q)}. 3.2 Type Frames for Polymorphism We intend to give a semantics for H− expressions by giving a mapping from their typing derivations to type-indexed collections of monomorphic behavior. We begin by fixing a suitable domain for the monomorphic behaviors. Ohori assumed an underlying typeframe semantics; his translations, then, were from implicitly polymorphic terms to the interpretations of terms in the simply-typed λ-calculus. Unfortunately, we cannot apply his approach without some extension, as type classes are sufficient to encode polymorphic recursion. However, we can adopt Harrison’s extension [1] of Ohori’s approach, originally proposed to capture polymorphic recursion, and thus also sufficient for type class methods. We begin by defining PCPO frames, an extension of the standard notion of type frames. A PCPO frame is a tuple T = hT type J·K, T term J·K, Tτ,υ , ⊑τ , ⊔τ , ⊥τ i, (where we will omit the type and term annotations when they are apparent from context) subject to the following six conditions. 1. For each ground type τ , T the interpretation of τ . type Jτ K is a non-empty set providing 2. For each typing derivation ∆ of Γ ⊢ M : τ and Γ-compatible environment η, T term J∆Kη is the interpretation of M in T type Jτ K. 3. Tτ,υ : T type Jτ → υK × T type Jτ K → T type JυK provides the interpretation of the application of an element of τ → υ to an element of τ . 4. For any f , g ∈ T type Jτ → υK, if, for all x ∈ T type Jτ K, Tτ,υ (f , x) = Tτ,υ (g, x), then f = g. 5. T term J·K and Tτ,υ respect the semantics of the simply-typed λcalculus. In particular: each type. We would expect its semantics to include the pair hInt → Int, T term J⊢ λx : Int.x : Int → IntKi to account for the Int → Int ground instance of its type scheme, the pair hBool → Bool, T term J⊢ λx : Bool.x : Bool → BoolKi to account for the Bool → Bool ground instance of its type scheme, and so forth. Note that if σ has no quantifiers, and so ⌊σ⌋Ψ = {τ } for some type τ , then we have T scheme JσKΨ = {{hτ, bi} | b ∈ T type Jτ K}, and so an element of T scheme Jτ K is a singleton map, not an element of T type Jτ K. Harrison proves that T JσK is itself a pointed CPO, justifying solving recursive equations in T JσK. Theorem 1 (Harrison). Let T be a PCPO frame. Then, for any type scheme σ, T JσK is a pointed CPO where: • For any f , g ∈ T JσK, f ⊑σ g ⇐⇒ (∀τ ∈ ⌊σ⌋. f (τ ) ⊑τ g(τ )); • The bottom element ⊥σ is defined to be {hτ, ⊥τ i | τ ∈ ⌊σ⌋}; and, • The least upper bound of an ascending chain {fi } ⊆ T JσK is {hτ, uτ i | τ ∈ ⌊σ⌋, uτ = ⊔τ (fi (τ ))}. We can define continuous functions and least fixed points for sets T JσK in the usual fashion: • A function f : T JσK → T Jσ ′ K is continuous if f (⊔σ Xi ) = ⊔σ ′ (f (Xi )) for all directed chains Xi in T JσK. • The fixed point of a continuous function f : T JσK → T JσK is defined by fix(f ) = ⊔σ (f n (⊥σ )), and is the least value such that fix(f ) = f (fix(f )). 3.3 Semantics for Overloaded Expressions We can now give denotations for (typing derivations of) H− expressions. For some type environment Γ and substitution S ∈ GSubst(ftv(Γ)), we define an S − Γ-environment η as a mapping from variables to values such that η(x) ∈ T J(S σ)K for each assignment (x : σ) in Γ. Given a PCPO frame T , a derivation ∆ of P | Γ ⊢A M : σ, a ground substitution S, and an environment η, we define the interpretation T J∆KSη by cases. We have included only a few, representative cases here. • Case (→E): we have a derivation of the form • If ∆ derives Γ ⊢ x : τ , then T J∆Kη = η(x); • If ∆ derives Γ ⊢ M N : υ, ∆M derives Γ ⊢ M : ∆1 = τ → υ and ∆N derives Γ ⊢ N : τ , then T J∆Kη = Tτ,υ (T J∆M Kη, T J∆N Kη); and, ∆= • If ∆λ derives Γ ⊢ λx : τ.M : τ → υ and ∆M derives Γ, x : τ ⊢ M : υ, then Tτ,υ (T J∆λ Kη, d) = T J∆M K(η[x 7→ d]). 6. Each set T Jτ K is a PCPO with respect to ⊑τ , ⊔τ and ⊥τ . The first five conditions are the standard requirements for type frames; the final condition relates the type frame and PCPO structures of a PCPO frame. Given a PCPO frame T , we can define the interpretation of a polymorphic type scheme σ as the mappings from the ground instances τ of σ to elements of T Jτ K. That is: T scheme JσKΨ = Π(τ ∈ ⌊σ⌋Ψ ).T type Jτ K. where we will omit the scheme and Ψ annotations when it is not ambiguous. For example, the identity function λx.x has the type scheme ∀t.t → t. Therefore, the semantics of the identity function is a map from the ground instances of its type (i.e., the types τ → τ ) to the semantics of the simply-typed identity function at .. . P | Γ ⊢A M : τ → τ ′ ∆2 = .. . P | Γ ⊢A N : τ P | Γ ⊢A (M N) : τ ′ Let υ = S τ and υ ′ = S τ ′ , and define T J∆KSη = {hυ ′ , Tυ,υ′ ((T J∆1 KSη)(υ → υ ′ ), (T J∆2 KSη)(υ))i}. • Case (⇒I): we have a derivation of the form .. . ∆1 = P, π | Γ ⊢A M : ρ ∆= P | Γ ⊢A M : π ⇒ ρ This rule excludes those cases in which the predicate does not hold; thus, we define: ( T J∆1 KSη if S P S π; T J∆KSη = ∅ otherwise. • Case (⇒E): we have a derivation of the form .. . ∆1 = P | Γ ⊢A M : π ⇒ ρ P ∆= P | Γ ⊢A M : ρ π This rule does not affect the semantics of expression M, and so we define: T J∆KSη = T J∆1 KSη. • Case (∀ I): we have a derivation of the form .. . ∆1 = P | Γ ⊢A M : σ t 6∈ ftv(P, Γ) ∆= P | Γ ⊢A M : ∀t.σ Intuitively, we interpret a polymorphic expression as the map from ground instances of its type to its interpretations at those types. As the interpretation of the subderivation ∆1 is already in the form of a such a map, we can interpret ∆ as the union of the meanings of ∆1 for each ground instantiation of the quantified variable t. Formally, we define [ T J∆KSη = T J∆1 K(S[t 7→ τ ])η. τ ∈GType • Case (∀ E): we have a derivation of the form ∆1 = ∆= .. . P | Γ ⊢A M : ∀t.σ P | Γ ⊢A M : [τ /t]σ S By definition, ⌊∀t.σ⌋ = τ ∈GType ⌊[τ /t]σ⌋, and so ⌊[τ /t]σ⌋ ⊆ ⌊∀t.σ⌋. Thus, the interpretation of ∆ is a subset of the interpretation of ∆1 ; writing f |Y for the restriction of a function f to some subset Y of its domain, we define: T J∆KSη = (T J∆1 KSη)|⌊[τ /t]σ⌋. 3.4 Expressions with Class Contexts To complete our semantics of H− programs, we must account for the meaning of class methods. Our approach is intuitively simple: we collect the meanings of the class methods from the method implementations in each instance, and use the meanings of the methods to define the meaning of the main expression. Formally, we extend the interpretation function from derivations of P | Γ ⊢A M : σ to derivations of P | Γ ⊢Ψ M : σ as follows: • Let ∆ be a derivation of P | Γ ⊢Ψ M : τ . Then we know that ∆ must begin with an application of (C TXT ) (Figure 4) with one subderivation ∆y,d = .. . P | Γ, xi : σxi ⊢A Im(y, d) : σy,d for each pair hy, di ∈ dom(Im) and a subderivation ∆M = .. . P | Γ, xi : σxi ⊢A M : τ for the main expression M. We enumerate the methods in the program as x1 , x2 , . . . , xm , and let Σ = T Jσx1 K × T Jσx2 K × · · · × T Jσxm K. For each method xi , we define a function fi : Σ → T Jσxi K, approximating its meaning, as follows: [ T J∆xi ,d KS(η[xj 7→ bj ]), fi (hb1 , b2 , . . . , bm i)Sη = hxi ,di∈dom(Im) and define function f : Σ → Σ, approximating the meaning of all the methods in the program, as f (b) = hf1 (b), f2 (b), . . . , fm (b)i. We can now define a tuple b, such that the component bi is the meaning of method xi , as follows: G n f (⊥Σ ). b= Σ Finally, we extend the interpretation function to programs by T J∆KSη = T J∆M KS(η[xi 7→ bi ]). 3.5 Polymorphic Identity Functions Revisited We return to our earlier example of polymorphic identity functions (§2.3). As before, we consider two definitions of identity functions, one given parametrically (id1) and one given by overloading (id2). In this section, we will show that the denotations of id1 and id2 agree at all types for which id2 is defined. By doing so, we provide an intuitive demonstration that our denotational semantics captures the meaning of ad-hoc polymorphic and agrees with our definition of equality for H− terms. We show that T Jid1K and T Jid2K have the same value at each point in the domain of T Jid2K; that is, that for any type τ ∈ GType such that Id2 τ , T Jid1K(τ → τ ) = T Jid2K(τ → τ ). We proceed by induction on the structure of τ . In the base case, we know that τ = K for some non-functional type K. As we have assumed Id2 τ , we must have that K = Int, and, from the instances for Id2, we have T Jid2K(K → K) = T Jid2K(Int → Int) = T J⊢ λx : Int.x : Int → IntK. As T Jid1K(Int → Int) = T J⊢ λx : Int.x : Int → IntK, we have T Jid1K(K → K) = T Jid2K(K → K). In the inductive case, we know that τ = τ0 → τ1 for some types τ0 and τ1 . From the assumption that Id2 (τ0 → τ1 ) and the instances for Id2, we can assume that Id2 τ0 , Id2 τ1 , and that T Jid2K(τ → τ ) = T J⊢ λf : (τ0 → τ1 ).M ◦ f ◦ N : τ → τ K for some simply typed expressions M and N such that T JMK = T Jid2K(τ0 → τ0 ) and T JNK = T Jid2K(τ1 → τ1 ). The induction hypothesis gives that T Jid2K(τ0 → τ0 ) = T Jid1K(τ0 → τ0 ) and that T Jid2K(τ1 → τ1 ) = T Jid1K(τ1 → τ1 ), and thus that T JMK = T J⊢ λx : τ1 .x : τ1 → τ1 K and T JNK = T J⊢ λx : τ0 .x : τ0 → τ0 K. By congruence, we have T Jid2K(τ → τ ) = T Jλf : (τ0 → τ1 ).(λx : τ1 .x)◦f ◦(λx : τ0 .x)K. Finally, assuming a standard definition of composition, and reducing, we have T Jid2K(τ → τ ) = T Jλf : (τ0 → τ1 ).f K = T Jλf : τ.f K = T Jid1K(τ → τ ). In our previous discussion of this example, we argued that if the set of types were restricted to those types for which Id2 held, then id1 and id2 were equal. We can show a similar result here, by showing that if we define that τ ::= Int | τ → τ , then T Jid1K = T Jid2K. We begin by showing that they are defined over the same domain; that is, that ⌊∀t. t → t⌋ = ⌊∀u.Id2 u ⇒ u → u⌋. By definition, we have • Case (∀ I). Because σ = ∀t.σ ′ , we have that ⌊σ⌋ = ⌊∀t. t → t⌋ = {τ → τ | τ ∈ GType} [ ⌊[τ /t]σ ′ ⌋, τ ∈GType and and thus that ⌊∀u. Id2 u ⇒ u → u⌋ = {τ → τ | τ ∈ GType, Id2 τ }. We show that Id2 τ for all types τ by induction on the structure of τ . In the base case, we know that τ = Int, and by the first instance of Id2 we have Id2 τ . In the inductive case, we know that τ = τ0 → τ1 for some types τ0 , τ1 . In this case, we have that [τ0 /t, τ1 /u]τ = t → u and by the induction hypothesis, that Id2 τ0 and Id2 τ1 . Thus, from the second instance of Id2, we can conclude that Id2 (τo → τ1 ), that is, that Id2 τ . Because Id2 τ for all ground types τ , we have {τ → τ | τ ∈ GType, T JσK = 4. Formal Properties The previous sections have outlined typing and equality judgments for H− terms, and proposed a denotational semantics for H− typings. In this section, we will relate these two views of the language. We begin by showing that the denotation of a typing judgment falls into the expected type. This is mostly unsurprising; the only unusual aspect of H− in this respect is the role of the class context. We go on to show that the equational judgments are sound; again, the unusual aspect is to do with polymorphism ({∀ I} and {∀ E}) and class methods ({M ETHOD}). The H− type system follows Jones’s original formulation of OML; we rely on several of his metatheoretical results, such as the closure of typing under substitution. Theorem 2 (Soundness of typing). Given a class context Ψ, if ∆ is a derivation of P | Γ ⊢Ψ M : σ, S is a substitution, and η is an (S Γ)-environment, then T J∆KSη ∈ T J(S P | S σ)KΨ . We will divide the proof into three pieces. First, we show the soundness of the judgment P | Γ ⊢A M : σ. Then, we will argue that the union of the implementations of a method has the type of the method itself. Finally, we can combine these results to argue the soundness of P | Γ ⊢Ψ M : σ. Lemma 3. Given a class context Ψ = hA, Si, Imi where A is non-overlapping, if ∆ is a derivation of P | Γ ⊢A M : σ, S is a substitution, and η is a (S Γ)-environment, then T J∆KSη ∈ T J(S P | S σ)KΨ . Proof. The proof is by induction over the structure of derivation ∆. The cases are straightforward; we include several representative examples. (Meta-variables ∆n are as in the definition of T J·K above.) • Case (⇒ I). Observe that ⌊(S(P, π) | S ρ)⌋ = ⌊(S P | S (π ⇒ ρ))⌋. As such, if T J∆1 KSη ∈ T J(S (P, π) | S ρ)KΨ , then we must also have that T J∆KSη ∈ T J(S P | S (π ⇒ ρ))KΨ . • Case (⇒ E). As entailment is (trivially) closed under substitu- tion, P π implies that S P S π for any substitution S; thus, we can conclude that ⌊(S P | S (π ⇒ ρ))⌋ = ⌊(S P | S ρ)⌋. Finally, assuming that T J∆1 KSη ∈ T J(S P | S (π ⇒ ρ))K, we can conclude that T J∆KSη ∈ T J(S P | S ρ)K. (T J[τ /t]σ ′ K). τ ∈GType Thus, assuming that for ground types τ , T J∆1 K(S[t 7→ τ ])η ∈ T J(S P | S σ ′ )K, we have ! [ ′ T J∆KSη ∈ T J(S P | S σ )K = T J(S P | S σ)K. τ ∈GType • Case (∀ E). Assuming that T J∆1 KSη ∈ T J(S P | S (∀t.σ ′ ))K, the same argument about ground types as in the previous case gives that T J∆KSη ∈ T J(S P | S σ)K. Id2 τ } = {τ → τ | τ ∈ GType}, and so T Jid1K and T Jid2K are defined over the same domain. We have already shown that T Jid1K and T Jid2K agree at all points at which they are defined, and so we conclude T Jid1K = T Jid2K. [ The interpretation of typings P | Γ ⊢Ψ M : σ depends on the interpretations of the class methods. We will begin by showing that the interpretation of each method is in the denotation of its type. To do so, we will demonstrate that the interpretation of the type scheme of a method is the union of the interpretation of the type schemes of its instances. This will show that the union of the implementations is in the type of the method, from which the desired result follows immediately. Lemma 4. The ground instances of the type scheme of a method x are the union of its ground instances at each of its instances. That is, [ ⌊σx,d ⌋. ⌊σx ⌋ = hx,di∈dom(Im) Proof. Let σx = ∀t.(π, Q) ⇒ τ , where x is a method of class(π). We prove that [ ⌊σx,d ⌋ ⌊σx ⌋ = hd,xi∈dom(Im) by the inclusions ⌊σx ⌋ ⊆ [ ⌊σx,d ⌋, [ ⌊σx,d ⌋. hx,di∈dom(Im) and ⌊σx ⌋ ⊇ hx,di∈dom(Im) We will show only the first inclusion; the second is by an identical argument. Fix some υ ∈ ⌊σx ⌋. By definition, there is some S ∈ GSubst(t) such that υ = S τ and S π, S Q. Because S π, there must be some (d : ∀u. P ⇒ π ′ ) ∈ A and substitution S′ ∈ GSubst(u) such that S π = S′ π ′ and S′ P. Now, we have that σx,d = ∀t′ .(P, T Q) ⇒ T τ for some substitution T; thus, there is some T ′ ∈ GSubst(t′ ) such that υ = T ′ (T τ ), S P = T ′ (T Q), and so υ ∈ ⌊σx,d ⌋. Lemma 5. The interpretation of the type scheme of a method x is the union of the interpretations of its type scheme at each instance. That is, [ T Jσx,d K. T Jσx K = hx,di∈dom(Im) Proof. Recall that T scheme Jσx K = Π(τ ∈ ⌊σx ⌋).T type Jτ K. From Lemma 4, we have that  T scheme Jσx K = Π τ ∈ [  ⌊σx,d ⌋ .T type Jτ K. hx,di∈dom(Im) As T type J·K is a function, this is equivalent to [ Π(τ ∈ ⌊σx,d ⌋).T type Jτ K, T scheme Jσx K = hx,di∈dom(Im) and finally, again from the definition of T scheme J·K, [ T scheme Jσx,d K. T scheme Jσx K = hx,di∈dom(Im) Proof of Theorem 2. Finally, we can extend the soundness of our semantics to include class contexts. From Lemmas 4 and 5, we know that the interpretations of the methods fall in the interpretations of their type schemes, and so if η is a S − Γ-environment, then η[xi 7→ bi ] is a S − (Γ, xi : σxi )-environment. From Theorem 3, we have that T J∆M KS(η[xi 7→ bi ) ∈ T J(S P | S σ)KΨ , and thus that T J∆KSη ∈ T J(S P | S σ)KΨ . We would like to know that the meaning of an expression is independent of the particular choice of typing derivation. Unfortunately, this is not true in general for systems with type classes. A typical example involves the read and show methods, which have the following type signatures read : : Read t ⇒ String → t show : : Show t ⇒ t → String We can construct an expression show◦read of type (Read t, Show t) ⇒ String → String, where variable t can be instantiated arbitrarily in the typing, changing the meaning of the expression. To avoid this problem, we adopt the notion of an unambiguous type scheme from Jones’s work on coherence for qualified types [3]. Definition 6. A type scheme σ = ∀~t.P ⇒ τ is unambiguous if ftv(P) ⊆ ftv(τ ). As long as we restrict our attention to unambiguous type schemes, we have the expected coherence result. For example, suppose that ∆ is a derivation of P | Γ ⊢A λx.M : σ. We observe that ∆ must conclude with an application of (→I), say at P0 | Γ ⊢A λx.M : τ → τ ′ , followed by a series of applications of (⇒I), (⇒E), (∀ I) and (∀ E). While these latter applications determine σ, we can see intuitively that each υ ∈ ⌊σ⌋ must be a substitution instance of τ → τ ′ , and that the interpretation of ∆ at each ground type must be the interpretation of an instance of the subderivation ending with (→I). We can formalize these two observations by the following lemma. Lemma 7. If σ = ∀t.Q ⇒ τ , and ∆1 . . . ∆n is a sequence of derivations such that: • • • • ∆1 is a derivation of P1 | Γ ⊢A M : τ1 ; ∆n is a derivation of P | Γ ⊢A M : σ; Each of ∆2 . . . ∆n is by (⇒I), (⇒E), (∀ I) or (∀ E); and, Each ∆i is the principal subderivation of ∆i+1 then (a) There is a substitution S such that τ = S τ1 and P ∪ Q ⊣⊢ S P1 ; and, (b) For all ground substitutions S, for all υ ∈ ⌊S σ⌋, there is a unique S′ such that T J∆n KSηυ = T J∆1 KS′ ηυ. The proof is by induction on n; the cases are all trivial. We can now characterize the relationship between different typings of M. Theorem 8 (Coherence of T J·K). If ∆ derives P | Γ ⊢A M : σ and ∆′ derives P′ | Γ′ ⊢A M : σ ′ , where σ and σ ′ are unambiguous, then for all substitutions S and S′ such that S P ⊣⊢ S′ P′ , S Γ = S′ Γ′ , and S σ = S′ σ ′ , and for all ground substitutions U, T J∆K(U ◦ S) = T J∆′ K(U ◦ S′ ). The proof is by induction over the structure of M. In each case, use of the inductive hypothesis is justified by Lemma 7(a), and the conclusion derived from the definition of T J·K and Lemma 7(b). As an immediate corollary, we have that if ∆ and ∆′ are two derivations of the same typing judgment, then T J∆K = T J∆′ K. We can also show that, if P | Γ ⊢A M : σ is a principal typing of M, with derivation ∆, and ∆′ derives P | Γ ⊢A M : σ ′ for any other σ ′ , then for each substitution S′ there is a unique S such that, for all environments η, T J∆KSη ⊇ T J∆′ KS′ η. Theorem 9 (Soundness of ≡). Given a class context Ψ, if σ is unambiguous, P | Γ ⊢Ψ M ≡ N : σ, and ∆M , ∆N are derivations of P | Γ ⊢Ψ M : σ, P | Γ ⊢Ψ N : σ, then T J∆M K = T J∆N K. Proof. The proof is by induction over the derivation of P | Γ ⊢Ψ M ≡ N : σ. The interesting cases are to do with polymorphism and overloading. • Case {⇒ I}. We have a derivation concluding P, π | Γ ⊢Ψ M ≡ N : ρ P | Γ ⊢Ψ M ≡ N : π ⇒ ρ Let ∆M , ∆N be typing derivations of P | Γ ⊢A M : π ⇒ ρ and P | Γ ⊢A N : π ⇒ ρ; without loss of generality (because of Theorem 8), assume that each is by (⇒I), with subderivations ∆′M , ∆′N of P, π | Γ ⊢Ψ M : ρ and P, π | Γ ⊢Ψ N : ρ. From the definition of T J·K, we have T J∆M K = T J∆′M K and T J∆N K = T J∆′N K. The induction hypothesis gives that T J∆′M K = T J∆′N K, and so we can conclude T J∆M K = T J∆N K. • Case {⇒ E}. We have a derivation concluding P | Γ ⊢Ψ M ≡ N : π ⇒ ρ P A π P | Γ ⊢Ψ M ≡ N : ρ where Ψ = hA, Si, Imi. As in the previous case, the interpretation of the typing derivations for P | Γ ⊢Ψ M : ρ and P | Γ ⊢Ψ M : π ⇒ ρ are equal, and similarly for the typing derivations for N, and thus the induction hypothesis is sufficient for the desired conclusion. • Case {∀ I}. We have a derivation concluding {(P | Γ ⊢Ψ M ≡ N : [τ /t]σ) | τ ∈ GType} P | Γ ⊢Ψ M ≡ N : ∀t.σ From the induction hypothesis, we can conclude that, given derivations ∆τM of P | Γ ⊢Ψ M : [τ /t]σ and ∆τN of P | Γ ⊢Ψ N : [τ /t]σ, T J∆τM K = T J∆τN K. Let ∆M derive P | Γ ⊢Ψ M : ∀t.σ (and, without loss ofSgenerality, assume ∆M is by (∀I)); we know that T J∆M K = τ ∈GType T J∆τM K. We argue similarly for derivations ∆N of P | Γ ⊢Ψ N : ∀t.σ, and conclude that T J∆M K = T J∆N K. • Case {∀ E}. We have a derivation concluding P | Γ ⊢Ψ M ≡ N : ∀t.σ P | Γ ⊢Ψ M ≡ N : [τ /t]σ Let ∆M , ∆N be derivations that M and N have type [τ /t]σ; without loss of generality, assume they are by (∀E), with subderivations ∆′M , ∆′N that M and N have type ∀t.σ. From the induction hypothesis, we know T J∆′M K = T J∆′N K, and from the definition of T J·K we know that T J∆M K ⊆ T J∆′M K and T J∆N K ⊆ T J∆′N K. Thus, we can conclude that T J∆M K = T J∆N K. • Case {M ETHOD}. We have a derivation of the form Si(x) = π, σ d:P A Sπ P | Γ ⊢hA,Si,Imi x ≡ Im(x, d) : S σ Let ∆M be the derivation of P | Γ ⊢Ψ x : S σ. From the definition of T J·K, we know that T J∆M KSη = T J∆′M KS(η[xi 7→ bi ]) where the xi are the class methods, the bi are their implementations, and ∆′M is the derivation of P | Γ, xi : σi ⊢A x : S σ. Since x is a class method, we know that η[xi 7→ bi ] maps x to some method implementation bj , and therefore that T J∆′M K ⊆ bj . We also knowSthat bj is the fixed point of a function fj (hb1 , . . . , bn i)Sη = d T J∆x,d′ KS(η[xi 7→ bi ]), where ∆x,d′ derives P | Γ ⊢A Im(x, d′ ) : σx,d′ and d is one of the di . Thus, we know that if ∆N derives P | Γ ⊢Ψ Im(x, d) : S σ, then T J∆N K ⊆ bj . Finally, as T J∆M K and T J∆N K are defined over the same domain, we have that T J∆M K = T J∆N K. 5. Improvement and Functional Dependencies In the introduction, we set out several ways in which extensions of type class systems went beyond the expressiveness of existing semantic approaches to overloading. In this section, we return to one of those examples, demonstrating the flexibility of our specialization-based approach to type-class semantics. Functional dependencies [5] are a widely-used extension of type classes which capture relationships among parameters in multiparameter type classes. Earlier, we gave a class Elems to abstract over common operations on collections: class Elems c e | c → e where empty : : c insert : : e → c → c The functional dependency c → e indicates that the type of a collection (c) determines the type of its elements (e). Practically speaking, this has two consequences: • A program is only valid if the instances in the program respect the declared functional dependencies. For example, if a program already contained an instance which interpreted lists as collections: instance Elems [ t ] t where . . . the programmer could not later add an instance that interpreted strings (lists of characters in Haskell) as collections of codepoints (for simplicity represented as integers): instance Elems [Char ] Int • Given two predicates Elems τ υ and Elems τ ′ υ ′ , if we know τ = τ ′ , then we must have υ = υ ′ for both predicates to be satisfiable. We now consider an extension of H− to support functional dependencies. Following Jones [4], we introduce a syntactic characterization of improving substitutions, one way of describing predicate-induced type equivalence. We then extend the typing and equality judgments to take account of improving substitutions. Finally, we show that the extended systems are sound with respect to our semantics. Importantly, we do not have to extend the models of terms, nor do we introduce coercions, or other intermediate translations. We need only show that our characterization of improving substitutions is sound to show that the resulting type equivalences hold in the semantics. 5.1 Extending H− with Functional Dependencies To account for the satisfiability of predicates in qualified types, Jones introduces the notion of an improving substitution S for a set of predicates P [4]. Intuitively, a S improves P if every satisfiable ground instance of P is also a ground instance of S P. Jones uses improving substitutions to refine the results of type inference while still inferring principal types. We will adopt a similar approach, but in typing instead of type inference. Syntax. We begin by extending the syntax of class axioms to include functional dependency assertions: Index sets Class axioms X, Y ⊆ N α ::= C : X Y | d : ∀t. P ⇒ π In the representation of functional dependency axioms, we treat the class parameters by index rather than by name. If A were the axioms for the example above, we would expect to have a dependency Elems : {0} {1} ∈ A. Any particular class name may appear in many functional dependency assertions, or in none at all. We adopt some notational abbreviations: if X is an index set, we write π =X π ′ to indicate that π and π ′ agree at least on those parameters with indices in X, and S similarly write π ∼X π ′ to indicate that S is a unifier for those parameters of π and π ′ with indices in X. Improvement. To account for improvement in typing, we need a syntactic characterization of improving substitutions. In the case of functional dependencies, this can be given quite directly. We can give an improvement rule as a direct translation of the intuitive description above: (F UNDEP ) (C : X P Cτ Y) ∈ A P Cυ S τ =X υ τ ∼Y υ A ⊢ S improves P For example, if we have some Q such that Q Elems τ υ and Q Elems τ υ ′ , then (F UNDEP ) says that the any unifying substitution U such that U υ = U υ ′ is an improving substitution for Q. If S is an improving substitution for P, then the qualified type schemes (P | σ) and (S P | S σ) are equivalent, and we should be able to replace one with the other at will in typing derivations. One direction is already possible: if a term has type σ, then it is always possible to use it with type S σ (by a suitable series of applications of (∀ I) and (∀ E)). On the other hand, there is not (in general) a way with our existing typing rules to use a term of type S σ as a term of type σ. We add a typing rule to support this case. (I MPR ) S P | S Γ ⊢A M : S σ A ⊢ S improves P P | Γ ⊢A M : σ As in the case of (⇒I) and (⇒E), (I MPR ) has no effect on the semantics of terms. Thus, if we have a derivation .. . ∆1 = S P | S Γ ⊢A M : S σ A ⊢ S improves P ∆= P | Γ ⊢A M : σ we define that T J∆KS′ η = T J∆1 KS′′ η, where S′′ ◦ S = S′ (the existence of such an S′′ is guaranteed by the soundness of (F UN DEP )). Finally, we add a rule to the equality judgment allowing us to use improving substitutions in equality proofs. {I MPR} S P | S Γ ⊢hA,Si,Imi M ≡ N : S σ A ⊢ S improves P P | Γ ⊢hA,Si,Imi M ≡ N : σ Validating Functional Dependency Axioms. We must augment the context rule to check that the axioms respect the declared dependencies. This can be accomplished by, first, refining the overlap check to assure that no axioms overlap on the determining parameters of a functional dependencies, and second, requiring that, for each dependency C : X Y and each instance P ⇒ π of class C, any variables in the positions Y are determined by the functional dependencies of P. Our formalization of the latter notion follows Jones’s development [6]. We define the closure of a set of variables J with respect to the functional dependencies F as the least set JF+ such that • J ⊆ JF+ ; and V ∈ F and U ⊆ JF+ , then V ⊆ JF+ . S We write ftvX (C τ ) to abbreviate x∈X ftv(τx ), define the instantiation of a functional dependency assertion C : X Y at a predicate π = C τ , as the dependency ftvX (π) ftvY (π), and write fd(A, P) for the set of the instantiation of each functional dependency assertion in A at each predicate in P. We can now define the verification conditions for axioms and the new version of (C TXT ), as follows. • If U {π ≁X π ′ | (d : P ⇒ π), (d′ : P′ ⇒ π ′ ), (class(π) : X Y) ∈ A} Theorem 11 (Soundness of typing). Given a class context Ψ, if ∆ is a derivation of P | Γ ⊢Ψ M : σ, S is a substitution, and η is an (S Γ)-environment, then T J∆KSη ∈ T J(S P | S σ)KΨ . Proof. We need only consider the (I MPR ) case. From Lemma 10, we have that if T improves P, then T J(P | σ)KΨ = T J(T P | T σ)KΨ , and so the result follows from the induction hypothesis. We extend our notion of ambiguity to take account of functional dependencies: it is enough for the variables in the predicates P to be determined by the variables of τ . Definition 12. A type scheme σ = ∀~t.P ⇒ τ is unambiguous (given class axioms A) if ftv(P) ⊆ ftv(τ )+ fd(A,P) . The previous definition of ambiguity is a special case of this definition, where fd(A, P) is always empty. As uses of (I MPR ) do not affect the semantics of terms, its introduction does not compromise coherence. Theorem 13. If σ is unambiguous and ∆1 , ∆2 are derivations of P | Γ ⊢Ψ M : σ, then T J∆1 K = T J∆2 K. ⊢ non-overlapping(A) {ftv(πY ) ⊆ ftv(πX )+ | (d : P ⇒ π), (class(π) : X fd(A,P) Y) ∈ A} ⊢ covering(A) (C TXT ) There is some type variable in ftvY (π0′ ) \ ftvX (π0′ ) that is not constrained by P. This contradicts ⊢ covering(A). There is some π ′ ∈ P such that S0 π ′ and S1 π ′ violate a functional dependency of class(π ′ ). The derivations of S0 π ′ and S1 π ′ must be shorter than the derivations of π0 , π1 , and so we have the desired result by induction. ⊢ non-overlapping(A) ⊢ covering(A) {(P | Γ, xi : σxi ⊢A Im(y, d) : σy,d ) | hy, di ∈ dom(Im)} P | Γ, xi : σxi ⊢A M : σ P | Γ ⊢hA,Si,Imi M : σ Theorem 14 (Soundness of ≡). Given a class context Ψ, if σ is unambiguous, P | Γ ⊢Ψ M ≡ N : σ, and ∆M , ∆N are derivations of P | Γ ⊢Ψ M : σ, P | Γ ⊢Ψ N : σ, then T J∆M KΨ = T J∆N KΨ . Proof. Again, we need consider only the {I MPR} case. Without loss of generality, assume ∆M and ∆N are by (I MPR ), with subderivations ∆′M and ∆′N . As the interpretations of ∆M and ∆N are equal to the interpretations of ∆′M and ∆′N , the result follows from the induction hypothesis. 5.2 Soundness The significant challenge in proving soundness of the extended rules is showing that when A ⊢ S improves P is derivable, S is an improving substitution for P. Once we have established that result, the remaining soundness results will be direct. We introduce notation for the satisfiable ground instances of predicates P: ⌊P⌋A = {S P | S ∈ GSubst(ftv(P)), A S P}. We can now formally describe an improving substitution. Lemma 10. Given a set of axioms A such that ⊢ non-overlapping(A) and ⊢ covering(A), if A ⊢ S improves P, then ⌊P⌋A = ⌊S P⌋A . Proof. By contradiction. Assume that A ⊢ S improves P; then we must have π0 , π1 such that A π0 , A π1 and there is a functional dependency (class(π) : X Y) ∈ A such that π0 =X π1 but π0 6=Y π1 . We proceed by induction on the heights of the derivations of A π0 , A π1 . • There are distinct axioms d : P ⇒ π0′ , d′ : P′ ⇒ π1′ ∈ A and substitutions S0 , S1 such that S0 π0′ = π0 and S1 π1′ = π1′ . But then S0 ◦ S1 is a unifier for π0′ ∼X π1′ , contradicting ⊢ non-overlapping(A). • There is a single axiom d : P ⇒ π0′ and substitutions S0 , S1 such that S0 π0′ = π0 and S1 π0′ = π1 . We identify two subcases. 6. Related Work The semantics of polymorphism, in its various forms, has been studied extensively over the past half century; however, the particular extensions of Haskell that motivated this work are recent, and have received little formal attention. Our approach was inspired by Ohori’s semantics of Core ML [12]. While Ohori’s approach describes the semantics of polymorphism, he does not represent polymorphic values directly, which leads to an unusual treatment of the typing of let expressions. Harrison extends Ohori’s approach to treat polymorphic recursion [1]; in doing so, he provides a representation of polymorphic values. Harrison suggests that his approach could be applied to type classes as well. Ohori’s approach to the semantics of ML is somewhat unusual; more typical approaches include those of Milner [7] and Mitchell and Harper [9]. Ohori identifies reasons to prefer his approach over either that of Milner or that of Mitchell and Harper: both approaches use a semantic domain with far more values than correspond to values of ML, either because (in the untyped case) those values would not be well-typed, or (in the explicit typed case) they differ only in the type-level operations. The semantics of type-class-based overloading has also received significant attention. Wadler and Blott [16] described the meaning of type classes using a dictionary-passing translation, in which overloaded expressions are parameterized by type-specific implementations of class methods. Applying their approach to the full Haskell language, however, requires a target language with more complex types than their source language. For example, in translating the Monad class from the Haskell prelude, the dictionary for Monad τ must contain polymorphic values for the return and (¿¿=) methods. In his system of qualified types [2], Jones generalized the treatment of evidence by translating from a language with overloading (OML) to a language with explicit evidence abstraction and application. Jones does not provide a semantics of the language with explicit evidence abstraction and application; indeed, such a semantics could not usefully be defined without choosing a particular form of predicate, and thus a particular form of evidence. Odersky, Wadler and Wehr [11] propose an alternative formulation of overloading, including a type system and type inference algorithm, and a ideal-based semantics of qualified types. However, their approach requires a substantial restriction to the types of overloaded values which rules out many functions in the Haskell prelude as well as the examples from our previous work [10]. Jones [5] introduced functional dependencies in type classes, and discusses their use to improve type inference; his presentation of improvement is similar to ours, but he does not augment typing as does our (I MPR ) rule. Sulzmann et al. [15] give an alternative approach to the interaction of functional dependencies and type inference, via a translation into constraint-handling rules; unfortunately, their presentation conflates properties of their translation, such as termination, with properties of the relations themselves. System FC [14] extends System F with type-level equality constraints and corresponding coercion terms. While we are not aware of any formal presentation of functional dependencies in terms of System FC , we believe that a formulation of our (F UNDEP ) rule in terms of equality constraints is possible. In contrast to our approach, System FC requires extending the domain of the semantics, while still requiring translation of source-level features (functional dependencies or GADTs) into features of the semantics (equality constraints). 7. Conclusion We have proposed an alternative approach to the semantics of overloading, based on interpreting polymorphic values as sets of their monomorphic interpretations, which avoids several problems with traditional translation-based approaches. We have applied this result to a simple overloaded calculus, and shown the soundness of its typing and equality judgments. Finally, we have argued that the approach is flexible enough to support extensions to the type system, such as allowing the use of improving substitutions in typing. We conclude by identifying directions for future work: • Practical class systems are richer than the one used in this paper. We would like to extend these results to fuller systems, including our prior work on instance chains. • Dictionary-passing provides both a semantics of overloading and an implementation technique. We would like to explore whether implementation techniques based on specialization can be used to compile practical languages. • We claim that our approach avoids making distinctions between some observationally equivalent terms (such as in the polymorphic identity function example). We would like to explore whether adequacy and full abstraction results for the underlying frame model can be extended to similar results for our semantics. • Our definition of equality provides η-equivalence; however, η equivalence is not sound for Haskell. We would like to explore either whether our approach can be adapted to a language without η-equivalence. Acknowledgments. We would like to thank: Mark Jones for initially suggesting Ohori’s semantics of ML polymorphism as a basis for understanding overloading; Jim Hook for proposing the polymorphic identity function example; and, Keiko Nakata for her helpful feedback on drafts of the paper. References [1] W. Harrison. A simple semantics for polymorphic recursion. In Proceedings of the 3rd Asian Symposium on Programming Languages and Systems, APLAS ’05, pages 37–51, Tsukuba, Japan, 2005. SpringerVerlag. [2] M. P. Jones. A theory of qualified types. In B. K. Bruckner, editor, Proceedings of the 4th European symposium on programming, volume 582 of ESOP’92. Springer-Verlag, Rennes, France, 1992. [3] M. P. Jones. Coherence for qualified types. Technical Report YALEU/ DCS/RR-989, Yale University, 1993. [4] M. P. Jones. Simplifying and improving qualified types. In Proceedings of the seventh international conference on Functional programming languages and computer architecture, FPCA ’95, pages 160– 169, La Jolla, California, USA, 1995. ACM. [5] M. P. Jones. Type classes with functional dependencies. In Proceedings of the 9th European Symposium on Programming Languages and Systems, ESOP ’00, pages 230–244, Berlin, Germany, 2000. SpringerVerlag. [6] M. P. Jones and I. S. Diatchki. Language and program design for functional dependencies. In Proceedings of the first ACM SIGPLAN symposium on Haskell, Haskell ’08, pages 87–98, Victoria, BC, Canada, 2008. ACM. [7] R. Milner. A theory of type polymorphism in programming. Journal of Computer and System Sciences, (17):348–375, 1978. [8] J. C. Mitchell. Polymorphic type inference and containment. Inf. Comput., 76(2-3):211–249, Feb. 1988. [9] J. C. Mitchell and R. Harper. The essence of ML. In Proceedings of the 15th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’88, pages 28–46, San Diego, California, USA, 1988. ACM. [10] J. G. Morris and M. P. Jones. Instance chains: Type-class programming without overlapping instances. In Proceedings of the 15th ACM SIGPLAN international conference on Functional programming, ICFP ’10, Baltimore, MD, 2010. ACM. [11] M. Odersky, P. Wadler, and M. Wehr. A second look at overloading. In Proceedings of the seventh international conference on Functional programming languages and computer architecture, FPCA ’95, pages 135–146, La Jolla, California, USA, 1995. ACM. [12] A. Ohori. A simple semantics for ML polymorphism. In Proceedings of the fourth international conference on Functional programming languages and computer architecture, FPCA ’89, pages 281–292, London, UK, 1989. ACM. [13] S. Peyton Jones, M. P. Jones, and E. Meijer. Type classes: an exploration of the design space. In Proceedings of the 1997 workshop on Haskell, Haskell ’97, Amsterdam, The Netherlands, 1997. [14] M. Sulzmann, M. M. T. Chakravarty, S. P. Jones, and K. Donnelly. System f with type equality coercions. In Proceedings of the 2007 ACM SIGPLAN international workshop on Types in language design and implementation, TLDI ’07, pages 53–66, Nice, France, 2007. ACM. [15] M. Sulzmann, G. J. Duck, S. Peyton Jones, and P. J. Stuckey. Understanding functional dependencies via constraint handling rules. JFP, 17(1):83–129, 2007. [16] P. Wadler and S. Blott. How to make ad-hoc polymorphism less ad hoc. In Proceedings of the 16th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, POPL ’89, pages 60–76, Austin, Texas, USA, 1989. ACM.
6cs.PL
arXiv:1405.6963v1 [math.AC] 27 May 2014 PSEUDO-GORENSTEIN AND LEVEL HIBI RINGS VIVIANA ENE, JÜRGEN HERZOG, TAKAYUKI HIBI AND SARA SAEEDI MADANI Abstract. We introduce pseudo-Gorenstein rings and characterize those Hibi rings attached to a finite distributive lattice L which are pseudo-Gorenstein. The characterization is given in terms of the poset of join-irreducible elements of L. We also present a necessary condition for Hibi rings to be level. Special attention is given to planar and hyper-planar lattices. Finally the pseudo-Goresntein and level property of Hibi rings and generalized Hibi rings is compared with each other. Introduction Let K be a field. Naturally attached to a finite distributive lattice L is a K-algebra K[L] which nowadays is called the Hibi ring of L. This K-algebra was introduced by the third author in 1987, see [11]. In that paper it is shown that K[L] is a normal Cohen–Macaulay domain and that K[L] is Gorenstein if and only if the poset P of join-irreducible elements of L is pure. Let R be an arbitrary standard graded Cohen–Macaulay K-algebra with canonical module ωR . Then R is Gorenstein if and only if ωR is a cyclic module, and hence generated in a single degree. The condition on ωR may be weakened in different ways. If one only requires that the generators of ωR are of the same degree, then R is called a level ring, and if one requires that there is only one generator of least degree, then we call R a pseudo-Gorenstein ring. In this paper we intend to characterize the pseudo-Gorenstein and level Hibi rings K[L] in terms of P . For that purpose we use the basic fact, observed in [11], that a K-basis of K[L] can be described in terms of order reversing functions P̂ → Z≥0 , and that a K-basis of the canonical module ωL of K[L] can be described in terms of strictly order reversing functions P̂ → Z≥0 . Here P̂ = P ∪ {−∞, ∞} with −∞ < x < ∞ for all x ∈ P , see Section 2 for details. Since the property of K[L] to be level, Gorenstein or pseudo-Gorenstein does not depend on the field K, we simply say that L is level, Gorenstein or pseudo-Gorenstein if K[L] has this property. In Section 1 we briefly list conditions which are equivalent to pseudo-Gorenstein and describe the relation of this notion to that of level and Gorenstein. Since pseudoGorenstein rings can be identified by the property that the leading coefficient of the numerator polynomial of the Hilbert series is equal to 1, pseudo-Gorenstein rings are much easier accessible than level rings. Theorem 2.1 gives a full characterization 2010 Mathematics Subject Classification. Primary 05E40, 13C13; Secondary 06D99, 06A11. Key words and phrases. Distributive lattices, Hibi rings, pseudo-Gorenstein, level. The first author was supported by the grant UEFISCDI, PN-II-ID-PCE- 2011-3-1023. The paper was written while the forth author was visiting the Department of Mathematics of University Duisburg-Essen. She wants to express her thanks for its hospitality. 1 of Hibi rings which are pseudo-Gorenstein. Indeed, it is shown that L is pseudoGorenstein if and only if depth(x) + height(x) = rank P̂ for all x ∈ P . This is equivalent to say, that for any given x ∈ P there exists a chain of maximal length in P̂ passing through x. It may be of interest to notice that this property of the chains in P has its analogue in the fact that in an affine domain dim R = dim R/p+height p for all p ∈ Spec R. Though Theorem 2.1 characterizes Hibi rings which are pseudo-Gorenstein, it may nevertheless be difficult to apply this characterization efficiently, even for planar lattices. In Section 3 we introduce hyper-planar lattices which represent a natural extension of planar lattices to higher dimensions. They are defined by the property that their poset P of join-irreducible elements admits a canonical chain decomposition, that is, a decomposition into pairwise disjoint maximal chains. In general such a decomposition is not unique. For hyper-planer lattices we introduce a regularity condition with the effect that the height of an element in P is the same as the height of the element in the chain to which it belongs. Apart from a few exceptions we keep this regularity hypothesis on hyper-planar lattices throughout the rest of the paper. In Theorem 3.3 it is shown that a regular hyper-planar lattice is pseudo-Gorenstein if and only if all chains in a canonical chain decomposition of P have the same length. For simple planar lattices it is shown in Theorem 3.5 that the regularity condition is in fact indispensable. Indeed, it is proved that a simple planar lattice is pseudo-Gorenstein if and only if it is regular and the (two) chains in a canonical chain decomposition of P have the same length. Unfortunately this result cannot be extended to hyper-planar lattices as we show by an example. The study of level Hibi rings is more difficult. There is a very nice sufficient condition on P that guarantees that L is level. In [12, Theorem 3.3] Miyazaki showed that L is level if for all x ∈ P all chains in P̂ ascending from x have the same length, and he showed by an example that this condition is not necessary. Let P ∨ be the dual poset of P , i.e., the poset on the same set as P but with all order relation reversed, and let L∨ be the distributive lattice whose poset of join-irreducible elements is P ∨. Then it is easily seen that L is level if and only if L∨ is level. Therefore it follows from Miyazaki’s theorem (as remarked by him in his paper), that L is also level if for all x ∈ P , all chains in P̂ descending from x have the same length. Thus we call a finite poset P a Miyazaki poset if for all x ∈ P all chains in P̂ ascending from x have the same length or all chains in P̂ descending from x have the same length. Unfortunately L may be level, though P is not a Miyazaki poset, and this may happen even for regular planar lattices. On the other hand, in Theorem 4.1 it is shown that if L is an arbitrary finite distributive lattice which is level, then for all x, y ∈ P with x ⋗ y we must have that height(x) + depth(y) ≤ rank P̂ + 1. Here we use the notation “x ⋗ y” to express that x covers y, that is, x > y and for any z ∈ P either z > x or z < y. At present we do not know whether these inequalities for all covering pairs in P actually characterize the levelness of L. On other hand, it is shown in Theorem 4.3 that a regular planar lattice L is level if and only if these inequalities hold for all covering pairs in P . We apply this result to give in Theorem 4.6 an explicit description of those distributive lattices L whose poset P 2 of join-irreducible elements has a special shape which we call a butterfly. In this particular case it turns out that L is level if and only if the initial ideal in(IL ) defines a level ring where IL is the defining ideal of the Hibi ring K[L]. One may wonder whether the regularity condition in Theorem 3.5 is really needed. In the case of a planar lattice with only one inside corner the regularity hypothesis may indeed be dropped, as shown in Theorem 4.8. In the last section of this paper we study the pseudo-Gorenstein and level property of generalized Hibi rings. For a fixed field K, a poset P and any integer r one defines the so-called generalized Hibi ring Rr (P ) which is naturally attached to rmultichains of poset ideals in P , see [5]. For r = 2 one obtains the ordinary Hibi rings. In Theorem 5.1 it is shown that R2 (P ) is pseudo-Gorenstein if and only if Rr (P ) is pseudo-Gorenstein for some r ≥ 2, and that R2 (P ) is level if Rr (P ) is level for some r ≥ 2. 1. Pseudo-Gorenstein rings Let K be a field and R a Cohen-Macaulay standard graded K-algebra of dimension d with canonical module ωR . We choose a presentation R ∼ = S/I where 2 S = K[x1 , . . . , xn ] is a polynomial ring and I ⊂ m with m = (x1 , . . . , xn ). Furthermore, let F be the graded minimal free resolution of S/I. It is a simple exercise to see that the following conditions are equivalent: (i) Let a = min{i : (ωR )i 6= 0}. Then dimK (ωR )a = 1; (ii) Let y1 , . . . , yd be a maximal regular sequence of linear forms in R and set R̄ = R/(y1, . . . , yd )R. Furthermore, let b = max{i : R̄i 6= 0}. Then dimK R̄b = 1. (iii) Let HR (t) = P (t)/(1 − t)d be the Hilbert series of R. Then the leading coefficient of P (t) is equal to 1. (iv) The highest shift c in the resolution F appears in Fn−d and βn−d,c (S/I) = 1. We call R pseudo-Gorenstein if one (or all) of the above equivalent conditions hold. The ring R is called level if ωR is generated in a single degree. It is clear from (i) that a pseudo-Gorenstein ring is level if and only if it is Gorenstein. Let < be a monomial order and assume that S/ in< (I) is Cohen-Macaulay. It follows from (iv) that S/ in< (I) is pseudo-Gorenstein if and only if S/I is pseudoGorenstein. In particular, if I ⊂ S is a toric ideal such that S/I is Gorenstein and in< (I) is a squarefree monomial ideal, then S/ in< (I) is pseudo-Gorenstein. Here we use that S/ in< (I) is Cohen–Macaulay, if I is a toric ideal and in< (I) is squarefree, see [13, Corollary 6.6.18]. 2. The canonical module of a Hibi ring Let (L, ∧, ∨) be a finite distributive lattice. An element α ∈ L is called joinirreducible if α 6= min L and whenever α = β ∨ γ, then α = β or α = γ. Let P be the subposet of join-irreducible elements of L. By a well-known theorem of Birkhoff [1], one has that L ∼ = I(P ), where I(P ) is the lattice of poset ideals of P with the partial order given by inclusion and with union and intersection as join and meet 3 operation. Poset ideals of P are subsets α of P with the property that if x ∈ α and y ≤ x, then y ∈ α. In particular, ∅ is a poset ideal of P . Given a field K. The Hibi ring of L over K is the K-algebra K[L] generated by the elements α ∈ L and with the defining relations αβ − (α ∧ β)(α ∨ β). Identifying L with I(P ), it is shown in [11] that K[L] is isomorphic to the toric ring generated Q over K by the elements uα with α ∈ L, where uα is the monomial s x∈α tx in the polynomial ring K[s, tx : x ∈ P ]. Let P̂ be the poset P ∪ {∞, −∞} with −∞ < x < ∞ for all x ∈ P . A map v : P̂ → Z≥0 is called order reversing if v(x) ≤ v(y) for all x, y ∈ P̂ with x ≥ y, and v is a called strictly order reversing if v(x) < v(y) for all x, y ∈ P̂ with x > y. We denote by S(P̂ ) the set of all order reversing functions v on P̂ with v(∞) = 0, and by T (P̂ ) the set of all strictly order reversing functions v on P̂ with v(∞) = 0. It is shown in [11] that the toric ring K[L] has a K-basis consisting of the monomials (1) sv(−∞) Y txv(x) , v ∈ S(P̂ ), Y txv(x) , v ∈ T (P̂ ) x∈P and that the monomials (2) sv(−∞) x∈P form a K-basis of the canonical ideal ωL ⊂ K[L]. The (finite) set of elements v ∈ T (P̂ ) which correspond to a minimal set of generators of ωL will be denoted by T0 (P̂ ). It follows from this description of ωL that the property of K[L] to be pseudoGorenstein, Gorenstein or level does not depend on K. Thus we call L itself pseudoGorenstein, Gorenstein or level if K[L] has this property Note that K[L] is standard graded with deg sv(−∞) of the monomials in (1). Q v(x) x∈P tx = v(−∞) for each Before proceeding we recall some basic concepts and notation regarding finite posets. Let Q be an arbitrary poset. A nonempty subposet C of P which is totally ordered is called a chain in P . The length of C is defined to be |C| − 1, and denoted ℓ(C). The rank of Q, denoted rank Q, is defined to be the maximal length of a chain in Q. Let x ∈ Q. Then heightQ (x) (resp. depthQ (x)) is defined to be the maximal length of a chain descending (resp. ascending) from x in Q. In the case that Q = P̂ for some poset P , we omit the lower index and simply write height(x) and depth(x). Let x, y ∈ P . It is said that x covers y, denoted x ⋗ y, if x > y and there exists no z ∈ P such that x > z > y. Let as before L be a finite distributive lattice. Then L is called simple if there exist no elements α, β ∈ L with the property α ⋗ β and such that for each γ ∈ L with γ 6= α, β, we have γ > α or γ < β. Let P be the poset of join-irreducible elements of L. Then L is simple if and only if there exists no element x ∈ P which is comparable with all elements in P . 4 It is observed in [6] that min{v(−∞) : v ∈ T (P̂ )} = rank P̂ . Thus it follows that L is pseudo-Gorenstein if and only if there exists precisely one v ∈ T (P̂ ) with v(−∞) = rank P̂ , and that L is level if and only if for any v ∈ T (P̂ ) there exists v ′ ∈ T (P̂ ) with v ′ (−∞) = rank P̂ and such that v − v ′ ∈ S(P̂ ). In the following result we characterize pseudo-Gorenstein distributive lattices in terms of their poset of join-irreducible elements. Theorem 2.1. The distributive lattice L is pseudo-Gorenstein if and only if depth(x) + height(x) = rank P̂ for all x ∈ P. Proof. Suppose first that depth(x) + height(x) = rank P̂ for all x ∈ P . This implies that for any x ∈ P̂ there exists a chain C of length equal to rank P̂ with x ∈ C. Now let v be any strictly order reversing function on P̂ with v(∞) = 0 and v(−∞) = rank P̂ . Then for any y ∈ C we must have v(y) = depth(y). In particular, v(x) = depth(x). This shows that v is uniquely determined, and proves that L is pseudo-Gorenstein. Conversely, suppose that L is pseudo-Gorenstein. For all x ∈ P̂ we set v(x) = depth(x) and v ′ (x) = rank P̂ − height(x). Then both, v and v ′ , are strictly order reversing functions on P̂ with v(∞) = v ′ (∞) = 0 and v(−∞) = v ′ (−∞) = rank P̂ . Since L is pseudo-Gorenstein we have v = v ′ . This implies that depth(x) + height(x) = rank P̂ for all x ∈ P .  3. Hyper-planar lattices Let L be a finite distributive lattice and P its poset of join-irreducible elements. We call L a hyper-planar lattice, if P as a set is the disjoint union of chains C1 , . . . , Cd , where each Ci is a maximal chain in P . We call such a chain decomposition canonical. Of course in general an element x ∈ Ci may be comparable with an element y ∈ Cj for some j 6= i. If this is the case and if x ⋗ y, then we call the chain x ⋗ y (of length one) a diagonal of P (with respect to the given canonical chain decomposition). For example, the poset depicted in Figure 5 has two diagonals. If d = 2, we recover the simple planar lattices. A canonical chain decomposition of the poset P of join-irreducible elements for a hyper-planar lattice L is in general not uniquely determined. However we claim that if C1 ∪ C2 ∪ · · · ∪ Cs and D1 ∪ D2 ∪ · · · ∪ Dt are canonical chain decompositions of P , then s = t. Indeed, let max(Q) denote the set of maximal elements of a finite poset Q. Then (3) max(P ) = max(C1 ) ∪ max(C2 ) ∪ · · · ∪ max(Cs ) = max(D1 ) ∪ max(D2 ) ∪ · · · ∪ max(Dt ). Let max(Ci ) = {xi } for i = 1, . . . , s and max(Di ) = {yi} for i = 1, . . . , t. Then the elements xi as well as the elements yi are pairwise distinct, and it follows from (3) that {x1 , x2 , . . . , xs } = {y1 , y2 , . . . , yt}, 5 Hence we see that s = t. One would even expect that the (4) {ℓ(C1 ), ℓ(C2 ), . . . , ℓ(Cs )} = {ℓ(D1 ), ℓ(D2 ), . . . , ℓ(Dt )}, as multisets. This however is not the case. For the poset P displayed in Figure 1 we have the following two canonical chain decompositions C1 = a < b < c < d < e < f, C2 = g < h < i < j < k < l, and D1 = a < b < i < e < f, D2 = g < h < c < d < j < k < l. Thus we see that ℓ(C1 ) = ℓ(C2 ) = 5, while ℓ(D1 ) = 4 and ℓ(D2 ) = 6. Also, note that the chain i ⋗ b is a diagonal of P , depicted in Figure 1, with respect to the canonical chain decomposition C1 ∪ C2 , but not is not a diagonal of P with respect to the canonical chain decomposition D1 ∪ D2 . •l f• •k e• •j d• •i c• b• •h a• •g Figure 1. In order to guarantee that equality (4) is satisfied we have to add an extra condition on the hyper-planar lattice: let L be a hyper-planar lattice whose poset of join-irreducible elements is P . In what follows this will be our standard assumption and notation. We say that L is a regular hyper-planar lattice, if for any canonical chain decomposition C1 ∪ C2 ∪ . . . ∪ Cd of P , and for all x < y with x ∈ Ci and y ∈ Cj it follows that heightCi (x) < heightCj (y). Lemma 3.1. Let L be a regular hyper-planar lattice and C1 ∪ . . . ∪ Cd be a canonical chain decomposition of P . Then for all i and x ∈ Ci we have heightCi (x) = heightP (x). Proof. We proceed by induction on heightP (x). If heightP (x) = 0, then there is nothing to show. Now assume that heightP (x) > 0 and let y ∈ P covered by x with heightP (y) = heightP (x) − 1. Say, y ∈ Cj . Since heightP (y) = heightP (x) − 1 we may apply our induction hypothesis and obtain heightP (x) − 1 = heightP (y) = heightCj (y) < heightCi (x) ≤ heightP (x). This yields the desired conclusion.  6 Corollary 3.2. Let L be a regular hyper-planar lattice, and assume that besides of C1 ∪ . . . ∪ Cd there is still another canonical chain decomposition D1 ∪ D2 ∪ · · · ∪ Dd of P . Then (a) {ℓ(C1 ), ℓ(C2), . . . , ℓ(Cd )} = {ℓ(D1 ), ℓ(D2 ), . . . , ℓ(Dd )}, as multisets. (b) rank P = max{ℓ(C1 ), . . . , ℓ(Cd )}. (c) height(x) + depth(x) = rank P̂ for all Ci with ℓ(Ci ) = rank P and all x ∈ Ci . Proof. Let max(Ci ) = {xi } and max(Di ) = {yi } for i = 1, . . . , t. We have seen in the discussion before Lemma 3.1 that {x1 , x2 , . . . , xd } = {y1, y2 , . . . , yd }, Therefore, {heightP (x1 ), heightP (x2 ), . . . , heightP (xd )} = {heightP (y1 ), heightP (y2 ), . . . , heightP (yd )}, as multi-sets. By Lemma 3.1, heightP (xi ) = ℓ(Ci) and heightP (yi ) = ℓ(Di ). This together with the observation that rank P = max{heightP (x1 ), heightP (x2 ), . . . , heightP (xd )} proves (a) and (b). In order to prove (c) we observe that rank P̂ = ℓ(Ĉi ) = heightĈi (x) + depthĈi (x) ≤ height(x) + depth(x) ≤ rank P̂ .  Now we are able to characterize the regular hyper-planar lattices which are pseudoGorenstein. Theorem 3.3. Let L be a regular hyper-planar lattice and C1 ∪. . .∪Cd be a canonical chain decomposition of P . Then L is pseudo-Gorenstein if and only if all Ci have the same length. Proof. Suppose all Ci have the same length. Then Corollary 3.2 implies that ℓ(Ci ) = rank P̂ for all i. Let x ∈ P . Then x ∈ Ci for some i, and hence height(x)+depth(x) = rank P̂ , by Corollary 3.2. Therefore, by Theorem 2.1, L is pseudo-Gorenstein. Conversely, suppose that not all Ci have the same length. Then Corollary 3.2 implies that there exists one Ci with ℓ(Ci ) < rank P . As in the proof of Theorem 2.1 we consider the strictly order reversing function v(x) = depth(x) and v ′ (x) = rank P̂ − height(x). Let x = max(Ci ). Then v(x) = 1 and, since L is regular, v ′ (x) = rank P̂ − (ℓ(Ci ) + 1) > rank P̂ − rank P − 1 = 1. This shows that L is not pseudo-Gorenstein.  In [12] Miyazaki showed that L is level, if for all x ∈ P all maximal chains ascending from p have the same length, or all maximal chains descending from x have the same length. We call a poset P with this property a Miyazaki poset. Corollary 3.4. Let L be a regular hyper-planar lattice and let C1 ∪ C2 ∪ · · · ∪ Cd be a canonical chain decomposition of P . We assume that all Ci have the same length. Then the following conditions are equivalent: 7 (a) L is Gorenstein; (b) L is level; (c) P is a Miyazaki poset. Proof. By Theorem 3.3, L is pseudo-Gorenstein. Thus (a) and (b) are equivalent, as noticed in Section 1. The implication (c) ⇒ (b) follows by Miyazaki [12], and (a) ⇒ (c) follows by Hibi’s theorem [11] which says that L is Gorenstein if and only if P is pure.  For simple planar lattices Theorem 3.3 can be improved as follows. Theorem 3.5. Let L be a simple planar lattice, and let C1 ∪C2 be a canonical chain decomposition of P . Then the following conditions are equivalent: (a) L is pseudo-Gorenstein; (b) L is regular and the chains C1 and C2 have the same length. Proof. It suffices to prove (a) ⇒ (b) because the implication (b) ⇒ (a) is a special case of Theorem 3.3. Now for the proof of the implication (a) ⇒ (b) we use the characterization of pseudo-Gorenstein lattices via the Hilbert series of K[L], as given in (iii), Section 1. Namely, if HK[L] (t) = P (t)/(1 − t)d with d = dim K[L], then L is pseudo-Gorenstein if and only if the leading coefficient of P (t) is one. Note that L may be identified with a two-sided ladder inside an m × n rectangle with n ≤ m as shown in Figure 2. Now according to [7] the leading coefficient of P (t) is the number (m, n) L (0, 0) Figure 2. of maximal cyclic sublattices of L. Thus L is pseudo-Gorenstein if and only if L admits precisely one maximal cyclic sublattice. By a cyclic sublattice of L, we mean a sublattice inside the two-sided ladder in Figure 2 consisting of a chain of squares and edges as in the example shown in Figure 3. We call the cyclic sublattice maximal if it has the maximal number of squares among all cyclic sublattices contained in L. 8 • • • • • • • • • • • • • • • • Figure 3. In the first step of our proof we show by induction on n + m that if L is pseudoGorenstein, then m = n and the lower inside corners of L are below the diagonal connecting (0, 0) with (n, n), while the upper inside corners are above this diagonal. In other words, if (i, j) is a lower inside corner of L, then i ≥ j, while for an upper inside corner (i, j) we have i ≤ j. If this is the case, then we say that the inside corners do not cross the diagonal. If m+n = 2, then there is nothing to prove. Let L′ be the maximal sublattice of L (again viewed as a ladder) with the bottom and top elements (0, 0) and (m−1, n−1), respectively. Now, we consider two cases. Suppose first that the integral points of the square [(m − 2, n − 2), (m − 1, n − 1)] belong to L′ . In this case, L′ is simple since L is simple. We claim that L′ is pseudo-Gorenstein. Indeed, suppose this is not the case. Then L′ has at least two different maximal cyclic sublattices. Then because L is simple, the square [(m − 1, n − 1), (m, n)] is a subset of L. Therefore, each of these maximal sublattices may be extended in L with the square [(m − 1, n − 1), (m, n)], contradicting our assumption that L is pseudo-Gorenstein. Thus, the induction hypothesis implies that m − 1 = n − 1, so that m = n. Also, the induction hypothesis implies that the inside corners of L′ do not cross the diagonal, and hence this is also the case for L. Now, suppose that L′ does not contain the square [(m − 2, n − 2), (m − 1, n − 1)]. Then we may assume that for some j < n − 1 the ladder L contains the squares [(m − 1, k), (m, k + 1)] for all k with j ≤ k ≤ n − 1, but does not contain the squares [(i, k), (i + 1, k)] for all i and j with 1 ≤ i ≤ m − 2 and j ≤ k ≤ n − 1. Then K[L′ ] has the same h-vector as K[L′′ ] where L′′ is a sublattice of L which viewed as a ladder is contained in [(0, 0), (m − 1, j)]. Note that j 6= m − 1, because j < n − 1 ≤ m. Therefore, since L′′ is simple, our induction hypothesis implies that L′′ is not pseudo-Gorenstein. Hence there exist at least two maximal cyclic sublattices in L′′ , and each of these cyclic sublattices may be extended to maximal cyclic sublattices in L, which contradicts the fact that L is pseudo-Gorenstein. Thus this second case is not possible. 9 Now we are ready to prove (b): Let C1 = x1 < x2 < · · · < xm and C2 = y1 < y2 < · · · < yn . Then L viewed as a two-sided ladder contains the points (0, 0) (corresponding to the poset ideal ∅ of L), and (m, n) (corresponding to the poset ideal L). Since L is pseudo-Gorenstein, it follows that m = n, as we have seen before. Being regular is equivalent to the condition that the inside corners of a ladder L do not cross the diagonal connecting (0, 0) and (n, n). In fact, the joinirreducible elements of L establishing the chain C2 can be identified with the vertices of the ladder (as displayed in Figure 2) which are located on the vertical border lines of the upper border and are different from the inside corners and different from (0, 0), while the join-irreducible elements of L forming the chain C1 can be identified with the vertices of the ladder which are located on the horizontal border lines of the lower border of L and are different from the inside corners and different from (0, 0). After this identification let x = (i, j) ∈ C2 be and y = (k, l) ∈ C1 , Then heightC2 (x) = j and heightC1 (y) = k. Assume now that x > y. Then this implies that i ≥ k. Since the inside corners of L do not cross the diagonal we have j > i, and thus heightC2 (x) = j > i ≥ k = heightC1 (y). Similarly, one shows that heightC2 (x) < heightC1 (y), if x < y. This completes the proof.  Theorem 3.5 is not valid if the hyper-planar lattice is not planar, as the example displayed in Figure 4 demonstrates. Indeed, the lattice L corresponding to P is pseudo-Gorenstein, but in this example we only have one canonical chain decomposition, and the chains of this decomposition have different lengths. Moreover, L is not regular. • • • • • • • • Figure 4. We also would like to remark that in Theorem 3.5(b) the condition “regular” is required. Indeed the poset shown in Figure 5 is the poset of join-irreducible elements of a non-regular simple planar lattice L for which L is not pseudo-Gorenstein. 4. Level distributive lattices Throughout this section L will be a finite distributive lattice and P its poset of join-irreducible elements. In the previous section we recalled the fact that L is level if P is a Miyazaki poset. In his paper [12] Miyazaki mentioned the fact that his condition on P is only a sufficient condition. One may ask whether for hyper-planar lattices a stronger result is possible. We begin with a necessary condition for levelness which is valid for any distributive lattice. 10 • • • • • • • • • • Figure 5. Theorem 4.1. Suppose L is level. Then height(x) + depth(y) ≤ rank P̂ + 1 (5) for all x, y ∈ P with x ⋗ y. Proof. Let x, y ∈ P such that x covers y and suppose that height(x) + depth(y) > rank P̂ + 1. We have to show that L is not level. Our assumption implies that height(x) + depth(y) > rank P̂ + 1 ≥ height(x) + depth(x) + 1, and hence depth(y) > depth(x) + 1. We show that there exists w ∈ T0 (P̂ ) with w(−∞) > rank P̂ . This then proves that L is not level. Let depth(y) − depth(x) − 1 = α. Then α > 0. We define v : P̂ → Z≥0 as follows: v(z) = ( depth(z) + α, depth(z), if x ≥ z, z 6= y, otherwise. Then v ∈ T (P̂ ). If v ∈ T0 (P̂ ), then we are done, since v(−∞) = depth(−∞) + α = rank P̂ + α ≥ rank P̂ + 1. The last inequality follows from the fact that α > 0. On the other hand, if v 6∈ T0 (P̂ ), then there exists w ∈ T0 (P̂ ) with v − w ∈ S(P̂ ). It follows that 0 ≤ v(x) − w(x) ≤ v(y) − w(y) = depth(y) − w(y) ≤ 0. Hence w(x) = v(x) = depth(x) + α = depth(x) + depth(y) − depth(x) − 1 = depth(y) − 1. Let x = z0 > z1 > · · · > zk = −∞ 11 be a chain whose length is height(x). Then w(x) < w(z1 ) < · · · < w(zk ) = w(−∞), which implies that w(−∞) ≥ w(x) + height(x) = (depth(y) − 1) + height(x) > rank P̂ .  In his paper [12] Miyazaki remarked that for all z ∈ P all chains ascending from z have the same length if and only if for all x, y ∈ P with x ⋗ y, we have depth(y) = depth(x) + 1. Therefore, P is a Miyazaki poset if and only if depth(y) = depth(x) + 1 for all x, y ∈ P with x ⋗ y, or height(x) = height(y) + 1 for all x, y ∈ P with x ⋗ y. In either case L is level. Corollary 4.2. Suppose L is pseudo-Gorenstein and P satisfies the inequality (5) for all x, y ∈ P with x ⋗ y. Then depth(y) = depth(x) + 1 and height(x) = height(y) + 1 for all x, y ∈ P with x ⋗ y. In particular, L is level and hence Gorenstein. Proof. For all x, y ∈ P with x ⋗ y, we have height(x) + depth(x) = rank P̂ , since L is pseudo-Gorenstein. Thus, by the inequality (5), we have height(x) + depth(y) ≤ height(x) + depth(x) + 1, and hence depth(y) ≤ depth(x) + 1. On the other hand, clearly, we have depth(y) ≥ depth(x) + 1, which implies the first desired formula. The formula regarding height is similarly obtained. Therefore, L is level, because P is a Miyazaki poset.  As mentioned before, if P is not a Miyazaki poset, then L may nevertheless be level, and this may happen even if L is a regular simple planar lattices. Figure 6 shows a poset which is not a Miyazaki poset. However its ideal lattice is a regular simple planar lattice and is level. • • • • • Figure 6. The following result shows that for regular planar lattices the necessary condition for levelness formulated in Theorem 4.1 is also sufficient. Theorem 4.3. Let L be a regular planar lattice. Then the following conditions are equivalent: 12 (a) L is level; (b) height(x) + depth(y) ≤ rank P̂ + 1 for all x, y ∈ P with x ⋗ y; (c) for all x, y ∈ P with x ⋗ y, either depth(y) = depth(x) + 1 or height(x) = height(y) + 1. Remark 4.4. (i) Observe that a Miyazaki poset satisfies condition (c). On the other hand, Figure 6 shows a poset satisfying condition (c) which is not Miyazaki. (ii) Let C1 ∪ C2 be a canonical chain decomposition of P . The inequality in (b) and the equations in (c) are always satisfied for those x ⋗ y for which x and y belong to the same chain in the decomposition. Hence it suffices to check the inequality in (b) and equations in (c) only for diagonals. Indeed, this fact follows directly from Lemma 3.1. For instance, if x covers y and both belong to the same chain, then, by Lemma 3.1, height(x) = height(y) + 1. Thus height(x) + depth(y) = height(y) + 1 + depth(y) ≤ rank P̂ + 1. For (c) we only need to observe that the condition height(x) = height(y) + 1 for any x that covers y in the same chain, is always fulfilled, again by Lemma 3.1. Before proving Theorem 4.3 we will need the following result. Lemma 4.5. Let L be a regular planar lattice. Let C1 ∪ C2 be a canonical chain decomposition of P , and assume that ℓ(C1 ) = rank P (cf. Corollary 3.2). Suppose that P satisfies condition (b) of Theorem 4.3. Then for every v ∈ T0 (P̂ ) we have v(max(C1 )) = 1. Proof. Assume that v(max(C1 )) > 1. Then v(z) ≥ depth(z) + 1 for all z ∈ C1 . Let ( v(x) − 1, if v(x) ≥ depth(x) + 1 (I), ′ v (x) = v(x), if v(x) = depth(x) (II), for all x ∈ P̂ . We show that v ′ ∈ T (P̂ ) and v − v ′ ∈ S(P̂ ). Since v ′ 6= v, this will then show that v 6∈ T0 (P̂ ), a contradiction. Indeed, to see that v ′ ∈ T (P̂ ) we have to show that v ′ (x) < v ′ (y) for all x ⋗ y. If both x and y satisfy (I) or (II), then the assertion is trivial. If x satisfies (I) and y satisfies (II), then v ′ (x) = v(x) −1 < v(y) = v ′ (y), and if x satisfies (II) and y satisfies (I), then v(x) = depth(x) ≤ depth(y) − 1 ≤ v(y) − 2. Hence v(x) < v(y) − 1, and this implies that v ′ (x) < v ′ (y). It remains to be shown that v − v ′ ∈ S(P̂ ) which amounts to prove that v(x) − ′ v (x) ≤ v(y) − v ′ (y) for all x ⋗ y. For this we only need to show that we cannot have v ′ (x) = v(x) − 1 and v(y) = v ′ (y), or, equivalently, that v(x) ≥ depth(x) + 1 and v(y) = depth(y) is impossible. Assume to the contrary that there exist x ⋗ y with v(x) ≥ depth(x) + 1 and v(y) = depth(y) . Then y 6∈ C1 since v(z) ≥ depth(z) + 1 for all z ∈ C1 . Thus, we may either have x ∈ C1 and y ∈ C2 , or x, y ∈ C2 . In the first case, since height(x) + depth(y) ≤ rank P̂ + 1 by assumption, and since rank P̂ = height(x) + depth(x) due to the regularity of L (see Corollary 3.2), we get depth(y) ≤ depth(x) + 1, and hence depth(y) = depth(x) + 1. Therefore, depth(y) = depth(x) + 1 ≤ v(x) < v(y), a contradiction. 13 Finally, let x, y ∈ C2 . Since v(x) < v(y), it follows that depth(y) > depth(x) + 1. Therefore, the longest chain from y to ∞ cannot pass through x. This implies that there exists z ∈ C1 with z ⋗ y. As in the first case we then deduce that v(y) > depth(y). So we get again a contradiction.  Proof of Theorem 4.3. (a) ⇒ (b) follows from Theorem 4.1. (b) ⇒ (c): Let C1 ∪ C2 be a canonical chain decomposition of P with |C1 | ≥ |C2 |. If x, y ∈ C1 or x, y ∈ C2 , then by Lemma 3.1, it follows that height(x) = height(y) + 1. Next suppose that x ∈ C1 . Since L is regular, we may apply Corollary 3.2 and conclude that height(x) + depth(x) = rank P̂ . Thus, by (b), we get depth(y) ≤ depth(x) + 1. On the other hand, it is clear that depth(y) ≥ depth(x) + 1. So that depth(y) = depth(x) + 1. Finally, if y ∈ C1 , then by Corollary 3.2 we have height(y)+depth(y) = rank P̂ . As in the previous case, we conclude that height(x) = height(y) + 1. (c) ⇒ (b): If depth(y) = depth(x) + 1, then height(x) + depth(y) = height(x) + depth(x) + 1 ≤ rank P̂ + 1, and if height(x) = height(y) + 1, then height(x) + depth(y) = height(y) + depth(y) + 1 ≤ rank P̂ + 1. (b) ⇒ (a): As in Lemma 4.5 we let C1 ∪ C2 be a canonical chain decomposition of P , and may assume that ℓ(C1 ) = rank P ≥ ℓ(C2 ). Let v ∈ T0 (P̂ ). We will show that there exists v ′ ∈ T (P̂ ) with v ′ (−∞) = rank P̂ and such that v − v ′ ∈ S(P̂ ). Since v is a minimal generator it follows that v = v ′ , and we are done. In order to construct v ′ we consider the subposet Q of P which is obtained from P by removing the maximal elements max(C1 ) and max(C2 ). We define on Q̂ the strictly order reversing function u by u(∞) = 0, and u(z) = v(z) − 1 for all other z ∈ Q̂. We notice that the ideal lattice of Q is again a regular planar lattice satisfying (b). Indeed, assume that there exist x ⋗ y with x, y ∈ Q such that heightQ̂ (x) + depthQ̂ (y) > rank Q̂ + 1 = rank P̂ . Since heightQ̂ (x) = height(x) and depth(y) = depthQ̂ (y) + 1, it follows that height(x) + depth(y) = heightQ̂ (x) + depthQ̂ (y) + 1 > rank P̂ + 1, a contradiction. Therefore, by induction on the rank we may assume that the ideal lattice of Q is level. Hence there exists w ∈ T (Q̂) with w(−∞) = rank Q̂ = rank P̂ − 1 and such that u − w ∈ S(Q̂). Set v ′ (z) = 1 + w(z) for all z ∈ A = Q ∪ {−∞}. Then v ′ is a strictly order reversing function on A with v ′ (−∞) = rank P̂ and such that v − v ′ is order reversing on A. It remains to define v ′ (Ci ) for i = 1, 2 in a way such that v ′ ∈ T (P̂ ) and v−v ′ ∈ S(P̂ ). We have to set v ′ (max(C1 )) = 1 since v(max(C1 )) = 1, and of course v ′ (∞) = 0. Let x = max(C2 ) and let z ∈ C2 be the unique element with x⋗z. We set v ′ (x) = v(x)−u(z)+w(z) = v(x)−v(z)+1+w(z), and claim that this v ′ has the desired properties. Indeed, v ′ (x) = v(x) − (v(z) − 1 − w(z)) ≤ v(x) and v ′ (x) < 1 + w(z) = v ′ (z), since v(x) < v(z). If z is the only element covered by x, we are done. Otherwise, there exists y ∈ C1 with x ⋗ y and it remains to be shown that v ′ (y) > v ′ (x) = v(x) − v(z) + 1 + w(z). Suppose we know that 14 depthQ̂ (y) ≥ w(z), then v ′ (y) = w(y) + 1 ≥ depthQ̂ (y) + 1 > w(z) ≥ v ′ (x), as desired, since v(x) − v(z) + 1 ≤ 0. Thus in order to complete the proof we have to show that depthQ̂ (y) ≥ w(z). Since the ideal lattice of Q̂ is regular, this is equivalent to showing that (6) w(z) ≤ rank Q̂ − heightQ̂ (y). The assumption (b) and Corollary 3.2(c) imply that height(x) + depth(y) ≤ rank P̂ + 1 = height(y) + depth(y) + 1, so that height(x) ≤ height(y) + 1. This yields (7) height(x) = height(y) + 1 since height(x) ≥ height(y) + 1 is always valid. On the other hand, since L is regular, Lemma 3.1 implies that heightP (x) = heightC2 (x) = heightC2 (z) + 1 = heightP (z) + 1. This implies that height(x) = height(z) + 1. So together with (7) we then conclude that height(y) = height(z). Since heightQ̂ (y) = height(y) and height(z) = heightQ̂ (z), inequality (6) becomes w(z) ≤ rank Q̂ − heightQ̂ (z), and since w(−∞) = rank Q̂, this inequality indeed holds. This completes the proof of the theorem.  In the following theorem we discuss an example of a poset for which the conditions of Theorem 4.1 can be made more explicit. Let P be a finite poset with a canonical chain decomposition C1 ∪C2 with 2 ≤ |C1 | ≤ |C2 |. For i = 1, 2, let xi be the maximal and yi the minimal element of Ci . We call P a butterfly poset (of type (C1 , C2 )), if x1 ⋗ y2 and x2 ⋗ y1 are the only diagonals of P . Figure 6 displays a butterfly poset. Obviously, the ideal lattice of a butterfly poset is regular. For the next result, we need some notation. The Hibi ring K[L] can be presented as the quotient ring T /IL , where T is the polynomial ring over K in the variables xα with α ∈ L and where IL is generated by the binomials xα xβ − xα∨β xα∧β . In the following theorem, we consider a monomial order < given by a height reverse lexicographic monomial order, that is, the reverse lexicographic monomial order induced by a total ordering of the variables satisfying xα < xβ if heightL (α) > heightL (β). Theorem 4.6. Let P be a butterfly poset of type (C1 , C2 ), and L its ideal lattice. Then the following conditions are equivalent: (a) T /in< (IL ) is level; (b) L is level; (c) height(x) + depth(y) ≤ rank P̂ + 1 for all x, y ∈ P with x ⋗ y; (d) for all x, y ∈ P with x ⋗ y, either depth(y) = depth(x) + 1 or height(x) = height(y) + 1; (e) |C1 | = 2. 15 Proof. (a) ⇒ (b) is well-known. Conditions (b), (c) and (d) are equivalent by Theorem 4.3, since L is regular. (c) ⇒ (e): Since 2 ≤ |C1 | ≤ |C2 |, we have height(x1 ) = |C1|, depth(y2 ) = |C2 | and rank P̂ = |C2 | + 1. On the other hand, by condition (b), we have height(x1 ) + depth(y2 ) ≤ rank P̂ + 1. So, |C2 | ≤ 2, and hence |C2 | = 2. (e) ⇒ (a): It is shown in [11] that in< (IL ) is generated by the monomials xα xβ where α and β are incomparable elements of L. Thus, in< (IL ) is the StanleyReisner ideal of the order complex ∆ of L. It is known that ∆ is pure shellable, and hence Cohen-Macaulay, see [2, Theorem 6.1]. Since dim(T / in< (IL )) = dim(T /IL ) = |P | + 1, it follows that pd(T / in< (IL )) = pd(T /IL ) = |L| − |P | − 1. Moreover, since T / in< (IL ) and T /IL are Cohen-Macaulay, their regularity is given by the degree of the numerator polynomial of their Hilbert series. Hence, since both Hilbert series coincide, their regularity is the same and we obtain reg(T /in< (IL )) = reg(T /IL ) = |P | − rank P , by [6]. Since |C1 | = 2, the lattice L viewed as a ladder is of the form as shown in Figure 7. So, we see that |L| = 3|C2| + 1. Therefore, since |P | = |C2 | + 2, we see that pd(T /in< (IL )) = 2|C2| − 2 and reg(T /in< (IL )) = 2. (|C2 |, 2) (0, 0) Figure 7. So to prove (a), it is enough to show that β2|C2 |−2,j (T /in< (IL )) = 0, for all j < 2|C2 |. By Hochster’s formula, we have β2|C2 |−2,j (T /in< (IL )) = X W ⊆V,|W |=j f dimK H j−2|C2 |+1 (∆W ; K), where V is the vertex set of ∆, and where ∆W denotes as usual the subcomplex of ∆ f induced by W . For W ⊆ V with |W | = j < 2|C2 | − 1, dimK H j−2|C2 |+1 (∆W ; K) = 0, since j − 2|C2| + 1 < 0. Let W ⊆ V with |W | = 2|C2 | − 1. We show that f (∆ ; K) = 0 or equivalently ∆ is a connected simplicial complex. As the dimK H 0 W W (1) connectedness of ∆W is equivalent to the connectedness of the 1-skeleton ∆W of (1) ∆W , we show that the graph G = ∆W is connected. The vertices of G correspond to the lattice points of the elements in W which is a certain subset of the lattice points of the ladder displayed in Figure 7. Two vertices of G are adjacent if they are contained in a chain in the lattice L. In other words, two vertices (i, j) and (i′ , j ′) with j ≤ j ′ are adjacent in G if j = j ′ or i ≤ i′ . Let v = (i, j) and w = (i′ , j ′) be two nonadjacent vertices in G, so that we may assume j < j ′ and i′ < i. We show that there exists a path in G connecting v and w. 16 Case 1. There exists (s, t) ∈ W such that either s ≤ i′ , t ≤ j or s ≥ i, t ≥ j ′ . Then (s, t) is adjacent to both of v and w, and hence v and w are connected. Case 2. There exists s with i′ < s < i such that (s, j), (s, j ′) ∈ W . Then we get a path in G between v and w passing through (s, j) and (s, j ′ ). Assume that W does not satisfy the conditions given in Case 1 and Case 2. Let A = {(s, t) ∈ W : i′ < s < i, t = j or t = j ′ }. Then |A| ≤ i − i′ − 1. First suppose that j = 0 and j ′ = 1. Also, set A1 = {(s, 0) : i ≤ s ≤ |C2| − 1}, A2 = {(s, 1) : 0 ≤ s ≤ i′ } and A3 = {(s, 2) : 1 ≤ s < i}. Since we are not in Case 1 and Case 2, it follows that W ⊂ A1 ∪ A2 ∪ A3 ∪ A. Therefore, |W | ≤ |A1 | + |A2 | + |A3 | + |A| ≤ (|C2 | − i) + (i′ + 1) + (i − 1) + (i − i′ − 1) = |C2 | + i − 1 < 2|C2| − 1. The last inequality follows since i < |C2 |. This contradicts the fact that |W | = 2|C2 | − 1. Now suppose that j = 0 and j ′ = 2 and set A1 = {(s, 0) : i ≤ s ≤ |C2 | − 1}, A2 = {(s, 1) : 0 ≤ s ≤ |C2 |}, A3 = {(s, 2) : 1 ≤ s ≤ i′ }. We claim that |A2 ∩ W | ≤ |A2 | − 2, unless there is a path in G connecting v and w. Indeed, we may assume that either (i, 1) or (i′ , 1) belongs to W . If both vertices belong to W , then there is a path in G between v and w. Without loss of generality, we may assume that (i, 1) ∈ W and (i′ , 1) ∈ / W . In that case, non of the elements in the nonempty set {(s, 1) : s < i′ } belongs to W , because otherwise we get a path connecting v and w in G. This proves the claim. Since we are not in Case 1 and Case 2, we have W ⊂ A1 ∪ (A2 ∩ W ) ∪ A3 ∪ A. As we may assume that |A2 ∩ W | ≤ |A2 | − 2, we get |W | ≤ |A1 | + |A2 ∩ W | + |A3 | + |A| ≤ (|C2 | − i) + (|C2 | − 1) + (i′ ) + (i − i′ − 1) = 2|C2 | − 2, a contradiction. Finally, j = 1 and j ′ = 2 is similarly treated as the case j = 0 and j ′ = 1.  As a straightforward consequence of the next result it can be seen that the implication (a) ⇒ (c) in Theorem 4.3 is in general not valid for non-planar lattices, not even for hyper-planar lattices. Theorem 4.7. Let P = P1 ∪ P2 be a finite poset with the property that the elements of P1 and P2 are incomparable to each other, and suppose that P2 is a chain of length r. Let L be the ideal lattice of P . Then L is level for all r ≫ 0. Proof. Let L1 by the ideal lattice of P1 , and L2 that of P2 . It is observed in [10] and easy to see that K[L] ∼ = K[L1 ] ∗ K[L2 ] (which is the Segre product of K[L1 ] and K[L2 ]). By [8, Theorem 4.3.1] we have ωL ∼ = ωL1 ∗ ωL2 , where for graded K[L1 ]module M and a graded K[L2 ]-module N the homogeneous components of the Segre product M ∗ N are given by (M ∗ N)i = Mi ⊗K Ni for all i. Now if L2 is a chain of length r, then S = K[L2 ] is a polynomial ring of dimension r + 2, and hence ωL2 ∼ = S(−r − 2), see for example [3, Proposition 3.6.11 and Example 3.6.10]. Hence 17 we obtain (8) ωL ∼ = ωL1 ∗ S(−r − 2) ∼ = (ωL1 )≥r+2 , L where for a graded module M and any integer s we set M≥s = i≥s Mi . Let t be the highest degree of a generator in a minimal set of generators of ωL1 . Then (8) implies that ωL1 is generated in the single degree r + 2 if r + 2 ≥ t. Thus for any r ≥ t − 2 we see that L is level.  We would like to mention that the arguments given in the proof of Theorem 4.7 yield the following slightly more general result: for an arbitrary finite poset P we set γ(P ) = max{v(−∞) : v ∈ T0 (P̂ )}. Note that γ(P ) is the highest degree of a generator in a minimal set of generators of the canonical module of the ideal lattice of P . Now let P = P1 ∪ P2 and suppose that the elements of P1 and P2 are incomparable. Furthermore, assume that the ideal lattice L2 of P2 is level. Then the ideal lattice L of P is level if γ(P2 ) ≥ γ(P1 ). Computational evidence leads us to conjecture that the equivalent conditions given in Theorem 4.3 do hold for any planar lattice (without any regularity assumption). In support of this conjecture we have the following result. Theorem 4.8. Let L be a simple planar lattice whose poset P of join-irreducible elements has the single diagonal x⋗y with respect to a canonical chain decomposition. Then the following conditions are equivalent: (a) L is level; (b) height(x) + depth(y) ≤ rank P̂ + 1; (c) either depth(y) = depth(x) + 1 or height(x) = height(y) + 1. Observe that for all covering pairs u, v ∈ P which are different from the diagonal, conditions (b) and (c) are always satisfied. Proof of Theorem 4.8. (a) ⇒ (b) follows from Theorem 4.1. (b) ⇒ (c): Let C1 ∪ C2 be a canonical chain decomposition of P and x ⋗ y its unique diagonal with x ∈ C1 and y ∈ C2 . We define the integers a = |{z ∈ P̂ : z > x}|, b = |{z ∈ P̂ : z < x, z ∈ / C2 }|, c = |{z ∈ P̂ : z > y, z ∈ / C1 }| and d = |{z ∈ P̂ : z < y}|, see Figure 8. Then height(y) = d and depth(x) = a. On the other hand, depth(y) = max{c, a + 1} and height(x) = max{b, d + 1}. Suppose that none of the equalities in condition (c) hold. Then depth(y) > depth(x) + 1 and height(x) > height(y) + 1. So, max{c, a + 1} > a + 1, and hence c > a + 1 and depth(y) = c. Similarly, max{b, d + 1} > d + 1, and hence b > d + 1 and height(x) = b. Note that P̂ has just three maximal chains whose lengths are a + b, c + d and a + d + 1, so that rank P̂ = max{a + b, c + d}. Thus (b) implies b + c ≤ max{a + b + 1, c + d + 1}, a contradiction. Therefore one of the desired equalities in (c) hold for x, y. (c) ⇒ (a): Let C1 : −∞ = x′b < x′b−1 < · · · < x′1 < x < x1 < · · · < xa−1 < xa = ∞, ′ C2 : −∞ = yd′ < yd−1 < · · · < y1′ < y < y1 < · · · < yc−1 < yc = ∞. 18 ∞ • • • a c •x y• b • d • • −∞ Figure 8. The condition (c) guarantees that either a + 1 ≥ c or b ≤ d + 1. We may assume that a + 1 ≥ c. The case b ≤ d + 1 is treated similarly by replacing P by P ∨. Case 1. Suppose that a longest chain of P̂ is ′ −∞ = yd′ < yd−1 < · · · < y1′ < y < x < x1 < · · · < xa−1 < xa = ∞. In other words, one has b ≤ d + 1. The rank of P̂ = a + d + 1. Let v ∈ T (P̂ ) with v(−∞) > a + d + 1. We distinguish several cases: (i) Let v(x) > a. Then there are i and j with v(xi ) − v(xi+1 ) ≥ 2 and v(yj ) − v(yj+1) ≥ 2, where x0 = x and y0 = y. Let u ∈ S(P̂ ) with u(z) = 1 if either z ≤ xi or z ≤ yj and u(z) = 0, otherwise. Then v − u ∈ T (P̂ ). (ii) Let v(x) = a. In this case v(y) ≥ a + 1. ′ If v(y) = a+1, then there are i and j with v(x′i+1 )−v(x′i ) ≥ 2 and v(yj+1 )−v(yj′ ) ≥ 2, where x′0 = x and y0′ = y. Let u ∈ S(P̂ ) with with u(z) = 1 if either z ≤ x′i+1 or ′ z ≤ yj+1 and u(z) = 0, otherwise. Then v − u ∈ T (P̂ ). If v(y) > a+1, then there are i and j with v(yj )−v(yj+1) ≥ 2 and v(x′i+1 )−v(x′i ) ≥ 2, where x′0 = x and y0 = y. Let u ∈ S(P̂ ) with u(z) = 1 if either z ≤ x′i+1 or z ≤ yj and u(z) = 0, otherwise. Then v − u ∈ T (P̂ ). Case 2. Suppose that a longest chain of P̂ is −∞ = x′b < x′b−1 < · · · < x′1 < x < x1 < · · · < xa−1 < xa = ∞. In other words, one has b ≥ d + 1. The rank of P̂ = a + b. Let v ∈ T (P̂ ) with v(−∞) > a + b. We distinguish several cases: (i) Let v(x) > a. Then there are i and j with v(xi ) − v(xi+1 ) ≥ 2 and v(yj ) − v(yj+1) ≥ 2, where x0 = x and y0 = y. Let u ∈ S(P̂ ) with u(z) = 1 if either z ≤ xi or z ≤ yj and u(z) = 0, otherwise. Then v − u ∈ T (P̂ ). 19 (ii) Let v(x) = a. Then there is i with v(x′i+1 ) − v(x′i ) ≥ 2, where x′0 = x. Since ′ b ≥ d + 1, one has either v(y) − v(x) ≥ 2 or there is j with v(yj+1 ) − v(yj′ ) ≥ 2, where y0′ = y. If v(y) − v(x) ≥ 2, then there is j with v(yj ) − v(yj+1) ≥ 2, where y0 = y. Let u ∈ S(P̂ ) with u(z) = 1 if either z ≤ x′i+1 or z ≤ yj and u(z) = 0 otherwise. Then v − u ∈ T (P̂ ). ′ Suppose that there is j with v(yj+1 )−v(yj′ ) ≥ 2, where y0′ = y. Let u ∈ S(P̂ ) with ′ and u(z) = 0, otherwise. Then v − u ∈ T (P̂ ). u(z) = 1 if either z ≤ x′i+1 or z ≤ yj+1 The discussions in both cases show that every v ∈ T (P̂ ) which belongs to T0 (P̂ ) satisfies v(−∞) = rank(P̂ ). Hence L is level, as desired.  s m t n Figure 9. Corollary 4.9. Let I be the ladder determinantal ideal of 2-minors of the ladder as displayed in Figure 9. Then S/I is level if and only if min{m, n} ≤ s + t. Proof. First note that the ideal lattice of the poset with one diagonal depicted in Figure 8 can be identified with the one-sided ladder as shown in Figure 9 with n = c + d − 1, m = a + b − 1, s = a and t = d. Thus, by Theorem 4.8, S/I is level if and only if condition (c) of Theorem 4.8 holds. According to Figure 8, this is equivalent to say that b ≤ d + 1 or c ≤ a + 1, or equivalently m ≤ s + t or n ≤ s + t, which implies the assertion.  5. Generalized Hibi rings Let P = {x1 , . . . , xn } be a finite poset and r a positive integer. In Section 2 we identified the Hibi ring K[L] as a subring of the polynomial ring K[s, tx : x ∈ P ]. There is a different natural embedding of K[L] into a polynomial ring, namely into the polynomial ring K[sx , tx : x ∈ P ] where P is the set of join-irreducible elements of L, see [9]. For this embedding the generators of K[L] are the monomials Q Q uα = x∈α tx x∈P \α sx . This suggests an extension of the notion of Hibi rings as introduced in [5], see also [4]. 20 An r-multichain of I(P ) is a chain of poset ideals of length r, I : ∅ = α0 ⊆ α1 ⊆ α2 ⊆ · · · ⊆ αr = P. We define a partial order on the set Ir (P ) of all r-multichains of I(P ) by setting I ≤ I ′ if αk ⊆ αk′ for k = 1, . . . , r. Observe that the partially ordered set Ir (P ) is a distributive lattice, with meet and join defined as follows: for I : α0 ⊆ α1 ⊆ · · · ⊆ αr and I ′ : α0′ ⊆ α1′ ⊆ · · · ⊆ αr′ we let I ∧ I ′ be the multichain with (I ∧ I ′ )k = αk ∩ αk′ for k = 1, . . . , r, and I ∨ I ′ the multichain with (I ∨ I ′ )k = αk ∪ αk′ for k = 1, . . . , r. With each r-multichain I of Ir (P ) we associate a monomial uI in the polynomial ring K[xij : 1 ≤ i ≤ r, 1 ≤ j ≤ n] in rn indeterminates which is defined as Q uI = x1γ1 x2γ2 · · · xrγr , where xkγk = xℓ ∈γk xkℓ and γk = αk \ αk−1 for k = 1, . . . , r. The generalized Hibi ring Rr (P ) is the toric ring generated by the monomials uI with I ∈ Ir (P ). By what we said at the beginning of this section it is clear that K[L] = R2 (P ). In [5, Theorem 4.1] is shown that Rr (P ) can be identified with the ordinary Hibi ring K[Lr ] where Lr is the ideal lattice of Ir (P ), and further it is shown in [5, Theorem 4.3] that Ir (P ) is isomorphic to the poset Pr = P × Qr−1 where Qr−1 = [r − 1] with the natural order of its elements, and where P × Qr−1 denotes the direct product of the posets P and Qr−1 . In general the direct product P × Q of two posets P and Q is defined to be the poset which as a set is just the cartesian product of two sets P and Q and with partial order given by (x, y) ≤ (x′ , y ′) if and only if x ≤ x′ and y ≤ y ′. This identification of Rr (P ) with K[Lr ] was used in [5] to prove that for any given r ≥ 2, the Hibi ring K[L] is Gorenstein if and only if K[Lr ] is Gorenstein. We denote by type(R) the Cohen–Macaulay type of a Cohen–Macaulay ring R. It is defined to be the number of generators of ωR . Here we show Theorem 5.1. Let L be a finite distributive lattice, and r ≥ 2 an integer. Then (a) type(K[L]) ≤ type(K[Lr ]); (b) L is pseudo-Gorenstein if and only if Lr is pseudo-Gorenstein; (c) If Lr is level then L is level. Proof. (a) We need to show that |T0 (P̂ )| ≤ |T0 (P̂r )|. In order to prove this we define an injective map ι : T0 (P̂ ) → T0 (P̂r ). Given v ∈ T0 (P̂ ) we let ι(v)(x, i) = v(x) + (r − 1 − i) and ι(v)(∞) = 0 and ι(v)(−∞) = v(−∞) + (r − 2). Obviously, ι(v) 6= ι(w) for v, w ∈ T0 (P̂ ) with v 6= w and ι(v) ∈ T (P̂r ). Thus it remains to show that ι(v) actually belongs to T0 (Pˆr ). We set v ′ = ι(v), and show that if v ′ −u ∈ S(P̂r ) for some u ∈ T (P̂r ), then v ′ = u. For any w ∈ T (P̂r ) and for i ∈ [r − 1] we define the function wi on P̂ as follows: wi (x) = w(x, i) − (r − 1 − i) for all x ∈ P, wi (∞) = 0 and wi (−∞) = max{wi (x) : x ∈ P } + 1. Then wi ∈ T (P̂ ). Since v ′ − u ∈ S(P̂r ) it follows that v − ui = vi′ − ui ∈ S(P̂ ). Since v ∈ T0 (P̂ ) we see that v = ui for all i. This shows that v ′ = u. 21 (b) Let x ∈ P and i ∈ [r − 1]. We claim that heightP̂r (x, i) = heightP̂ (x) + (i − 1) and depthP̂r (x, i) = depthP̂ (x)+(r−i−1). If heightP̂r (x, i) = 1, then there is nothing to prove. Let heightP̂r (x, i) > 1 and let x = x0 > x1 > · · · > xd > −∞ be a maximal chain of length heightP̂ (x) in P̂ . Then (x, i) = (x0 , i) > (x1 , i) > · · · > (xd , i) > (xd , i − 1) > · · · > (xd , 1) > −∞ is a maximal chain of length heightP̂ (x) + (i − 1) in P̂r . It follows that heightP̂r (x, i) ≥ heightP̂ (x)+(i−1). To prove the other inequality we use induction on height. Let (x, i) = z0 > z1 > · · · > zt > −∞ be a maximal chain of length heightP̂r (x, i) in P̂r . Then z1 = (x, i − 1) or z1 = (x′ , i) where x′ is an element of P covered by x. If z1 = (x, i − 1), then by induction hypothesis, we get heightP̂r (x, i−1) ≤ heightP̂ (x)+(i−2), and hence heightP̂r (x, i) = heightP̂r (x, i−1)+ 1 ≤ heightP̂ (x) + (i − 1). If z1 = (x′ , i), then our induction hypothesis implies that heightP̂r (x′ , i) ≤ heightP̂ (x′ )+(i−1), and hence heightP̂r (x, i) = heightP̂r (x′ , i)+1 ≤ heightP̂ (x)+(i−1), where the last inequality follows from the fact that heightP̂ (x′ ) ≤ heightP̂ (x) − 1. So, heightP̂r (x, i) = heightP̂ (x) + (i − 1). A similar argument can be applied to prove the claimed formula regarding the depth. As a side result, we obtain that rank P̂r = rank P̂ + (r − 2). It follows that heightP̂ (x) + depthP̂ (x) = rank P̂ if and only if heightP̂r (x, i) + depthP̂r (x, i) = rank P̂r . Thus Theorem 2.1 yields the desired result. (c) Suppose that L is not level. Then there exists v ∈ T0 (P̂ ) with v(−∞) > rank P̂ . Then ι(v), as defined in the proof of part (a), belongs to T0 (P̂r ) and ι(v)(−∞) = v(−∞) + (r − 2) > rank P̂ + (r − 2) = rank P̂r . This shows that Lr is not level.  Note that if type(K[L]) = 1, then type(K[Lr ]) = 1 for all r ≥ 2, since by [5, Corollary 4.5], K[L] is Gorenstein if and only if K[Lr ] is Gorenstein. But the following example given in Figure 10 shows that the inequality in Theorem 5.1 (a) may be strict. Indeed, let P be the poset depicted in the left side of Figure 10. Then P3 is the poset which is shown in right side of Figure 10. It can be easily checked, by considering all possible strictly order reversing functions on P̂ and P̂3 which correspond to the minimal generators of the canonical module, that type(K[L]) = 2, but type(K[L3 ]) = 3. • • • • • • • • • Figure 10. In Theorem 5.1(c) we only could prove that if Lr is level, then L is level. However we expect that the other implication also holds. An indication that this might be true is Miyazaki’s theorem and the easy to prove fact that a poset P is Miyazaki if 22 and only if Pr is Miyazaki. Moreover, if the necessary condition for levelness given in Theorem 4.1 would also be sufficient, which indeed we expect, then one could also conclude that L is level if and only if Lr is level, since P̂ satisfies the inequalities (5) if and only if this is the case for P̂r . References [1] G. Birkhoff, Lattice Theory (3rd ed.), Amer. Math. Soc. Colloq. Publ. No. 25. Providence, R. I.: Amer. Math. Soc. [2] A. Björner, Shellable and Cohen-Macaulay partially ordered sets, Trans. Amer. Math. Soc. 260 (1980), 159–183. [3] W. Bruns, J. Herzog, Cohen-Macaulay rings, Revised Ed., Cambridge University Press, (1998). [4] V. Ene, J. Herzog, Gröbner bases in commutative algebra, Graduate Studies in Mathematics 130, AMS, (2012). [5] V. Ene, J. Herzog, F. Mohammadi, Monomial ideals and toric rings of Hibi type arising from a finite poset, Eur. J. Comb. 32 (2011), 404-421. [6] V. Ene, J. Herzog, S. Saeedi Madani, A note on the regularity of Hibi rings, preprint, arXiv: 1404.2554v2. [7] V. Ene, A. A. Qureshi, A. Rauf, Regularity of join-meet ideals of distributive lattices, Electron. J. Combin. 20 (3) (2013), #P20. [8] S. Goto, K.-i. Watanabe, On graded rings, I, J. Math. Soc. Japan 30(2) (1978), 179–213. [9] J. Herzog, T. Hibi, Distributive lattices, bipartite graphs and Alexander duality, J. Algebraic Combin. 22 (2005), 289-302. [10] J. Herzog, T. Hibi, G. Restuccia, Strongly Koszul algebras, Math. Scand. 86(2) (2000), 161– 178. [11] T. Hibi, Distributive lattices, affine semigroup rings and algebras with straightening laws, In: “Commutative Algebra and Combinatorics” (M. Nagata and H. Matsumura, Eds.), Adv. Stud. Pure Math. 11, North–Holland, Amsterdam, (1987), 93–109. [12] M. Miyazaki, A sufficient condition for a Hibi ring to be level and levelness of Schubert cycles, Comm. Alg. 35 (2007), 2894–2900. [13] R. Villarreal, Combinatorial optimization methods in commutative algebra, to appear. Viviana Ene, Faculty of Mathematics and Computer Science, Ovidius University, Bd. Mamaia 124, 900527 Constanta, Romania, and Simion Stoilow Institute of Mathematics of the Romanian Academy, Research group of the project ID-PCE-2011-1023, P.O.Box 1-764, Bucharest 014700, Romania E-mail address: [email protected] Jürgen Herzog, Fachbereich Mathematik, Universität Duisburg-Essen, Campus Essen, 45117 Essen, Germany E-mail address: [email protected] Takayuki Hibi, Department of Pure and Applied Mathematics, Graduate School of Information Science and Technology, Osaka University, Toyonaka, Osaka 5600043, Japan E-mail address: [email protected] Sara Saeedi Madani, Department of Pure Mathematics, Faculty of Mathematics and Computer Science, Amirkabir University of Technology (Tehran Polytechnic), 424, Hafez Ave., Tehran 15914, Iran, and School of Mathematics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5746, Tehran, Iran E-mail address: [email protected] 23
0math.AC
Towards Advanced Phenotypic Mutations in Cartesian Genetic Programming arXiv:1803.06127v1 [cs.NE] 16 Mar 2018 Roman Kalkreuth TU Dortmund University, Department of Computer Science, Dortmund, Germany [email protected] Abstract. Cartesian Genetic Programming is often used with a point mutation as the sole genetic operator. In this paper, we propose two phenotypic mutation techniques and take a step towards advanced phenotypic mutations in Cartesian Genetic Programming. The functionality of the proposed mutations is inspired by biological evolution which mutates DNA sequences by inserting and deleting nucleotides. Experiments with symbolic regression and boolean functions problems show a better search performance when the proposed mutations are in use. The results of our experiments indicate that the use of phenotypic mutations could be beneficial for the use of Cartesian Genetic Programming. Keywords: Cartesian Genetic Programming · Mutation · Phenotype 1 Introduction Genetic Programming (GP), as popularized by Koza [5,6,7], uses syntax trees as program representation. Cartesian Genetic Programming (CGP) as introduced by Miller et al. [10] offers a novel graph-based representation which in addition to standard GP problem domains, makes it easy to be applied to many graph-based applications such as electronic circuits, image processing, and neural networks. CGP is often used only with a point mutation as genetic operator. In contrast to tree-based GP for which advanced methods of crossover and mutation have been introduced and investigated, the use of advanced mutation techniques in CGP appears to be mostly unexplored. This significant lack of knowledge in CGP has been the major motivation for our work. Another motivation for our work has been the introduction of a phenotypic subgraph crossover technique for CGP by Kalkreuth et al. [4]. The experiments of Kalkreuth et al. show that the use of the subgraph crossover technique can be beneficial for the search performance of CGP. In standard tree-based GP, the simultaneous use of multiple types of mutation has been found beneficial by Kraft et al. [8] and Angeline et al. [1]. To our best knowledge, this principle has not been investigated in CGP yet. In this paper, we propose two phenotypic mutations for CGP and take a step towards advanced phenotypic mutations in CGP. Furthermore, we present a first empirical initial testing of both techniques. Section 2 of this paper describes CGP briefly and surveys previous work on phenotypic mutations in CGP. In section 3 we propose our new mutation techniques. Section 4 is devoted to the experimental results and the description of our experiments. In Section 5 we discuss the results of our experiments. Finally, section 6 gives a conclusion and outlines future work. 2 2.1 Related Work Cartesian Genetic Programming Cartesian Genetic Programming is a form of Genetic Programming which offers a novel graph-based representation. In contrast to tree-based GP, CGP represents a genetic program via genotype-phenotype mapping as an indexed, acyclic and directed graph. Originally the structure of the graphs was a rectangular grid of Nr rows and Nc columns, but later work also focused on a representation with at least one row. The genes in the genotype are grouped, and each group refers to a node of the graph, except the last one which represents the outputs of the phenotype. Each node is represented by two types of genes which index the function number in the GP function set and the node inputs. These nodes are called function nodes and execute functions on the input values. The number of input genes depends on the maximum arity Na of the function set. The last group in the genotype represents the indexes of the nodes which lead to the outputs. A backward search is used to decode the corresponding phenotype. The backward search starts from the outputs and processes the linked nodes in the genotype. In this way, only active nodes are processed during the evaluation. The number of inputs Ni , outputs No and the length of the genotype is fixed. Every candidate program is represented with Nr ∗ Nc ∗ (Na + 1) + No integers. Even when the length of the genotype is fixed for every candidate program, the length of the corresponding phenotype in CGP is variable which can be considered as a significant advantage of the CGP representation. Figure 2 exemplifies the CGP decoding procedure. CGP traditionally operates within a (1+λ) evolutionary algorithm (EA) in which λ is often chosen with a size of four. The new population in each generation consists of the best individual of the previous population and the λ created offspring. The breeding procedure is mostly done by a point mutation which swaps genes in the genotype of an individual in their permissible range by chance. Algorithm 1 exemplifies the functioning of the standard (1+λ)-EA. One of the most important technique is a special rule for the selection of the new parent. In the case when two or more individuals can serve as the parent, an individual which has not served as the parent in the previous generation will be selected as a new parent. This strategy is important because it ensures the diversity of the population and has been found highly beneficial for the search performance of CGP. Algorithm 1 Standard (1+λ)-CGP algorithm 1: procedure (1+λ)-CGP 2: Initialize(P) . Initialize parent individual 3: Evaluate(P) . Evaluate the fitness of the parent individual 4: Check(P) . Check if the parent individual meets the target fitness 5: while true do . Until termination criteria not triggered 6: Q ← breed(P) . Breed λ offsprings by mutation 7: Evaluate(Q) . Evaluate the fitness of the offsprings 8: if any individual of Q meets the target fitness then 9: return best individual of Q 10: end if 11: if any individual of Q has better fitness then P then 12: Replace P by the offspring with the best fitness 13: end if 14: end while 15: end procedure Fig. 1: Decoding procedure in Cartesian Genetic Programming 2.2 Advanced Mutation Techniques in CGP For an investigation of the length bias and the search limitation of CGP, a variation of the standard point mutation technique has been introduced by Goldman et al. [3]. The modified point mutation mutates exactly one active gene for all offspring. This called single active-gene mutation strategy (SAGMS) has been found beneficial for the search performance of CGP. The SAGMS can be seen as a form of phenotypic genetic operator since it respects only active function genes in the genotype which are part of the corresponding phenotype. Later work by Pedroni [11] utilized SAGMS to propose an explicitly neutral mutation operator which allows the user to directly control the mutation rate of inactive genes. Pedroni found that the proposed mutation is less sensitive to mutation rate and to reach perfect solutions more consistently than the standard mutation operator. 3 The Proposed Methods The proposed phenotypic mutations for CGP are inspired by biological evolution in which extra base pairs are inserted into a new place in the DNA sequence. This type of mutation is called insertion. Another mutation called deletion removes sections of the DNA sequence. Related to CGP, we adopt this principle by activating and deactivating randomly chosen function nodes. If a genome is selected for the insertion mutation, one inactive function node becomes active. In the case that all function nodes are active, the individual remains unchanged. Contrary, when deletion is performed, one active node becomes inactive. If the option that outputs can directly connect to the input nodes is disabled, a minimum number of active function nodes has to be defined. The activation and deactivation of the nodes is done by adjusting the connection genes of neighborhood nodes. Both mutation techniques work similarly to the single active-gene mutation strategy. The state of exactly one function node of an individual is changed. Since these forms of mutation can elicit strong changes in the behavior of the individuals, we apply an insertion rate and a deletion rate for each offspring which is selected for mutation. Fig. 2 and Fig. 3 exemplify the insertion and the deletion mutation techniques. As visible, the connection genes in the genotype are adjusted to deactivate or activate a particular function node in the phenotype. Fig. 2: The proposed insertion mutation technique Fig. 3: The proposed deletion mutation technique 4 4.1 Experiments Experimental Setup We performed experiments on symbolic regression and boolean functions. To evaluate the search performance of the mutations, we measured the number of generations until the CGP algorithm terminated successfully (generations-tosuccess) and the best fitness value which was found after a predefined number of generations (best-fitness-of-run). We used the standard (1+λ)-CGP algorithm with a population size of 5 individuals ( (1 + 4)-CGP) for our experiments. To classify the significance of our results, we used the Mann-Whitney-U-Test. The mean values are denoted a † if the p-value is less than the significance level 0.05 and a ‡ if the p-value is less than the significance level 0.01 compared to the use of mutation as the sole genetic operator. We performed 100 independent runs with different random seeds. For an empirical initial testing of the proposed mutation techniques we defined a range of the mutation ranges from 0% to 30% inclusive. The setting of important CGP parameters such as point mutation rate has been empirically determined and is oriented with former work. We used the insertion and deletion mutation technique in combination with the standard point mutation technique of CGP. The termination criteria are explained in the particular experiment. For our experiments, we performed a grid analysis of a set of popular benchmark problems which have been used in former GP and CGP experiments. We chose three well known boolean and symbolic regression problems. We analyzed a 4x 4 grid for each problem. The mutations rates for the insertion and deletion mutation techniques are denoted in 10% steps. For instance, a mutation rate of 10% is denoted as 0.1. We used a reducing fitness for our experiments. The minimum number of function nodes in the phenotype was set to a number of 4. 4.2 Boolean Functions For our first experiment in the boolean domain, we chose multiple boolean output problems as the digital adder, subtractor, and multiplier.Former work by White et al. [12] proposed these sort of problems as suitable alternatives to the overused parity problems. To evaluate the fitness of the individuals on the multiple output problems, we used compressed truth tables. We defined the fitness value of an individual as the number of different bits. When this number became zero, the algorithm terminated successfully. The configurations for the two-bit boolean functions are shown in Table 1. In this problem domain, we evaluated the problems with (generations-to-success). Table 2, 3 and 4 show the results of the grid analysis for the boolean problems. It is clearly visible that the use of the insertion and deletion mutation technique significantly reduces the number of generations until the termination criterion triggered. Table 1: Configuration of the boolean functions problems Property Add. 2 Bit Mul. 2 Bit Sub. 2 Bit 30 3 2 30 4 4 30 4 3 AND, OR XOR, AND? AND, OR XOR, AND? AND, OR, XOR NOR, AND? Point mutation rate 0.05 ? AND with one inverted input 0.05 0.05 Node count Number of inputs Number of outputs Function set 0.0 Deletion Rate 0.1 0.2 0.3 0.0 86494 49710‡ 36302‡ 46613‡ Insertion Rate 0.1 0.2 ‡ 54474 57109‡ 49894‡ 49767‡ 42709‡ 53105‡ 52043‡ 49382‡ 0.3 55678‡ 47868‡ 47358‡ 57263‡ Table 2: Mean number of generations for various settings of insertion and deletion mutation for the 2-Bit digital adder problem 0.0 Deletion Rate 0.1 0.2 0.3 0.0 17497 14682 18196 17978 Insertion Rate 0.1 0.2 ‡ 10995 12290† 12873† 15050 14115† 13440† 24898 15954 0.3 12260† 14761 15396 12414 Table 3: Mean number of generations for various settings of insertion and deletion mutation for the 2-Bit multiplier problem 0.0 Deletion Rate 0.1 0.2 0.3 0.0 14809 14327 14277 15436 Insertion Rate 0.1 0.2 10607‡ 10864‡ 11166† 12079† 9515‡ 11638† 8335‡ 12566† 0.3 11157‡ 13661 12562 9734‡ Table 4: Mean number of generations for various settings of insertion and deletion mutation for the 2-Bit subtractor problem 4.3 Symbolic Regression For symbolic regression, we have chosen three problems from the work of Clegg et al. [2] and McDermott et al. [9] for better GP benchmarks, and the Pagie-1 problem which has been proposed by White et al. [12] as an alternative to the heavily overused Koza-1 (“quartic”) problem. The functions of the problems are shown in Table 6. A training data set U[a, b, c] refers to c uniform random samples drawn from a to b inclusive and E[a, b, c] relates to a grid of points evenly spaced with an interval of c, from a to b inclusive. The configurations for the problems are shown in Table 5. In this problem domain, we evaluated the problems with the (best-fitness-of-run) method. The fitness of the individuals was represented by a cost function value. The cost function was defined by the sum of the absolute difference between the real function values and the values of an evaluated individual. We defined the termination criteria for the experiment with a cost function value less or equal than 0.01 and a predefined number of generations. We defined a budget of 10000 fitness evaluations for each run. Table 5: Configuration of the symbolic regression problems Property Node count Number of inputs Number of outputs Function set Point mutation rate Koza-2,3, Pagie-1 10 1 1 +, −, ∗, /, sin, cos, ln(|n|), e n 0.2 Table 6: Symbolic regression problems of the first experiment Problem Koza-2 Koza-3 Pagie-1 Objective Function x 5 − 2x 3 + x x 6 − 2x 4 + x 2 1/(1 + x −4 ) + 1/(1 + y −4 ) Vars 1 1 2 Training Set U[-1,1,20] U[-1,1,20] E[-5,5,0.4] Table 7, 8 and 9 show the results of the grid analysis for the symbolic regression problems. It is clearly visible that the use of the insertion and deletion mutation technique significantly improves the fitness after a predefined number of fitness evaluations. 5 Discussion Our experiments indicate that the insertion and deletion mutation may be beneficial for the search performance of CGP. Furthermore, our experiments showed beneficial effects in two different problem domains. The results of our 0.0 Deletion Rate 0.1 0.2 0.3 0.0 0, 33 0, 25 0, 25 0, 23 Insertion Rate 0.1 0.2 0.3 0, 20‡ 0, 18‡ 0, 17‡ 0, 21‡ 0, 17‡ 0, 20‡ 0, 20‡ 0, 18‡ 0, 19‡ 0, 21‡ 0, 21‡ 0, 21‡ Table 7: Mean best fitness of run for various settings of insertion and deletion mutation for the Koza-2 problem 0.0 Deletion Rate 0.1 0.2 0.3 0.0 0, 34 0, 32 0, 30 0, 32 Insertion Rate 0.1 0.2 0.3 0, 25‡ 0, 23‡ 0, 22‡ 0, 24‡ 0, 22‡ 0, 23‡ 0, 26‡ 0, 24‡ 0, 23‡ 0, 26 0, 24‡ 0, 22‡ Table 8: Mean best fitness of run for various settings of insertion and deletion mutation for the Koza-3 problem 0.0 Deletion Rate 0.1 0.2 0.3 0.0 195, 90 194, 12 192, 69 193, 93 Insertion Rate 0.1 0.2 186, 12 176, 23‡ 185, 55† 175, 03‡ 183, 32† 187, 43 191, 85 183, 04† 0.3 175, 45‡ 172, 52‡ 179, 07‡ 178, 39‡ Table 9: Mean best fitness of run for various settings of insertion and deletion mutation for the Pagie-1 problem experiments also show that the proposed phenotypic mutations can significantly contribute to the search performance for different types of fitness. However, in our experiments, we only investigated simple test problems which are well known in the field of GP and CGP. For more significant statements about the potential of the insertion and deletion mutation techniques in CGP a more detailed and comprehensive study is needed. This study should include a larger set of state-of-the-art benchmarks which have been proposed by McDermott et al. [9] and White et al. [12] Furthermore, this study should also include more problem domains. Beside to the question of contributions to the search performance of CGP, it has to be investigated in which way the proposed mutations contribute to the search performance. A suitable method to investigate the behavior and effect of both mutations would be an analysis of the exploration abilities of the search space. A method which could contribute to achieving more insight into the exploration behavior of both mutations would be an analysis of the fitness landscape. This analysis could also answer the question if our proposed mutations contribute to the overstepping of local optima. Another important point to discuss is the parametrization of the insertion and deletion mutation technique. On some problems, the simultaneous use of both mutations showed beneficial effects. However, our experiments also show that the sole use of one phenotypic mutation can also beneficial for the search performance. Therefore we think that a detailed investigation of different cases is needed in which the use of both or only one mutation is beneficial. The last point which should be discussed is the complexity of the insertion and deletion mutation. To activate and deactivate certain function nodes, both mutations require a permanent listing of the active function nodes and the corresponding structure of connections. Therefore we think that the runtime of both mutations should be investigated on a theoretical and practical level. The results of the runtime measurement should also be compared to the runtime of the respective fitness evaluation tasks. This type of comparison could be very helpful to get more clearness if the insertion and deletion mutation are really beneficial for the search performance of CGP. 6 Conclusion and Future Work Within this paper, we proposed two new phenotypic mutations and took a step towards advanced phenotypic mutations in CGP. A first initial empirical testing indicates that the use of both mutation techniques could be beneficial for the search performance of CGP. Our experiments clearly show that the use of the insertion and deletion mutation techniques can significantly improve the search performance of CGP for our tested problems. However, for more significant statements about the beneficial effects of the proposed mutations, a rigorous and comprehensive study on a larger set of problems is needed and should include the investigation of different CGP algorithms. Consequently, we will mainly focus on more detailed and comprehensive experiments in the future. These experiments will also include an analysis of the exploration abilities of CGP when the proposed mutations are in use. Another part of our future work is devoted to a detailed investigation of the parametrization of both mutation techniques. This will also include investigations in which way both mutations work together and if there are similar functional behaviors between different problems. References 1. Angeline, P.J.: An investigation into the sensitivity of genetic programming to the frequency of leaf selection during subtree crossover. In: Koza, J.R., Goldberg, D.E., Fogel, D.B., Riolo, R.L. (eds.) Genetic Programming 1996: Proceedings of the First Annual Conference. pp. 21–29. MIT Press, Stanford University, CA, USA (28–31 Jul 1996) 2. Clegg, J., Walker, J.A., Miller, J.F.: A New Crossover Technique for Cartesian Genetic Programming. In: GECCO ’07: Proceedings of the 9th annual conference on Genetic and evolutionary computation. vol. 2, pp. 1580–1587. ACM Press, London (7-11 Jul 2007) 3. Goldman, B.W., Punch, W.F.: Length bias and search limitations in cartesian genetic programming. In: Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation. pp. 933–940. GECCO ’13, ACM, New York, NY, USA (2013) 4. Kalkreuth, R., Rudolph, G., Droschinsky, A.: A New Subgraph Crossover for Cartesian Genetic Programming, pp. 294–310. Springer International Publishing, Cham (2017), https://doi.org/10.1007/978-3-319-55696-3_19 5. Koza, J.: Genetic Programming: A paradigm for genetically breeding populations of computer programs to solve problems. Technical Report STAN-CS-90-1314, Dept. of Computer Science, Stanford University (Jun 1990) 6. Koza, J.R.: Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge, MA, USA (1992) 7. Koza, J.R.: Genetic Programming II: Automatic Discovery of Reusable Programs. MIT Press, Cambridge Massachusetts (May 1994) 8. Kraft, D.H., Petry, F.E., Buckles, B.P., Sadasivan, T.: The use of genetic programming to build queries for information retrieval. In: Proceedings of the 1994 IEEE World Congress on Computational Intelligence. vol. 1, pp. 468–473. IEEE Press, Orlando, Florida, USA (27-29 Jun 1994) 9. McDermott, J., White, D.R., Luke, S., Manzoni, L., Castelli, M., Vanneschi, L., Jaśkowski, W., Krawiec, K., Harper, R., Jong, K.D., O’Reilly, U.M.: Genetic programming needs better benchmarks. In: Proceedings of the 14th international conference on Genetic and Evolutionary Computation Conference. pp. 791–798. GECCO ’08, ACM, Philadelphia (2012) 10. Miller, J.F., Thomson, P.: Cartesian Genetic Programming. In: Genetic Programming, Proceedings of EuroGP’2000. LNCS, vol. 1802, pp. 121–132. Springer-Verlag, Edinburgh (15-16 Apr 2000) 11. Pedroni, E.: An explicitly neutral mutation operator in cartesian genetic programming, https://equalparts.eu/about/ Neutral-Mutations-in-Cartesian-Genetic-Programming.pdf 12. White, D.R., McDermott, J., Castelli, M., Manzoni, L., Goldman, B.W., Kronberger, G., Jaskowski, W., O’Reilly, U.M., Luke, S.: Better GP Benchmarks: Community Survey Results and Proposals. Genetic Programming and Evolvable Machines 14(1), 3–29 (Mar 2013)
9cs.NE
A Metamodel of Unit Testing for Object-Oriented Programming Languages arXiv:0912.3583v1 [cs.PL] 18 Dec 2009 Martin Lévesque Dept. of Computer Science University of Quebec at Montréal Montréal, Québec, Canada Email: [email protected] ABSTRACT A unit test is a method for verifying the accuracy and the proper functioning of a portion of a program. This work consists to study the relation and the approaches to test Object-Oriented Programming (OOP) programs and to propose a metamodel that enables the programmer to write the tests while writing the source code to be tested. Categories and Subject Descriptors D.2.5 [Software Engineering]: Testing and Debugging General Terms Verification Keywords Object-Oriented Programming, Unit Testing, Metamodel 1. INTRODUCTION A unit test [10] is a method for verifying the accuracy and the proper functioning of a portion of a program. This work consists to study the relation and the approaches to test OOP programs and to propose metamodel that enables the programmer to write the tests while writing the source code to be tested. By considering the current approaches used in the industry, the integration and the writing of the tests are hard tasks: most likely, the tools available require to write additional components manually and most of the time, the tests are not near of the source code to be tested. This paper is organized as follows. Section 2 gives a state of the art about the relation between OOP programs and the tests. Section 3 describes the proposed metamodel of unit testing for OOP languages. Section 4 gives an example of what could looks like an OOP environment which uses the proposed metamodel. finally, Section 5 contains the conclusion and future possible work. 2. OOP AND UNIT TESTS This section contains the motivations of testing OOP languages differently compared to testing procedural languages. Then, the levels of abtraction for the tests are defined. Finally, current approaches to test OOP languages are discussed. 2.1 Motivations of testing OOP languages differently compared to testing procedural languages This section describes some reasons why an OOP language must be tested completely differently compared to procedural languages. Intuitively, specialization and aggregation combined to polymorphism increases the difficulty to detect errors during the integration of several components. The primary goal consists of decreasing the maximum effort to test a unit by reusing as much as possible the tests [9, 5]. 2.1.1 Test unit In procedural languages such as (C, Pascal, etc.), the principal units are the procedure and the module. However, the principal unit in an OOP language is the class [9, 1, 4]. This difference has a huge impact on the methodology to test the software since several new OOP concepts are nonexistent in the procedural paradigm. 2.1.2 Object and encapsulation Traditional techniques to test procedural languages are not necessary application to the object oriented paradigm since the encapsulation reduces or eliminates the possibility to test a specific state of an attribute of an object [9]. 2.1.3 Specialization and inheritance A method is defines by one of the following characteristic [9]: 1. Inherited from the parent class without redefinition. 2. Redefinition without any call to super. 3. Redefinition with a call to super. 4. A new method nonexistent in the parent classes. Existing works consider that the tests for cases 2, 3 and 4 must be retested completely compared to the first case which does not require any redefinition. 2.1.4 Polymorphism Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 200X ACM X-XXXXX-XX-X/XX/XX ...$10.00. Let p(z) be a method named p which take a parameter z where z contains a method m. Depending on the dynamic type of z, several different methods m when z.m is called by polymorphism. It has a huge impact on the tests since several permutations of dynamic types must be passed for the parameters in order cover more lines of code. 2.1.5 OOP language entity dimensions OOP language entities can be categorized as follows [1]: • Object: A class instance composed of several attributes and methods. An object represents a specific state. • Class: A model which factorizes the properties of its instances. • Class hierarchy: A class inherits the properties of its parent classes. • Package (or subsystem): A subsystem defines an interface presenting services. A subsystem regroups classes with strong semantic relations. Jin et al. has developed a mechanism which uses a metamodel which allows to test the coupling between units [8]. Figure 1: System of N classes uing JUnit. • System: Composed of a set of subsystems and links them together. 2.2 Levels of abstraction for the tests The principal levels of abstraction for the test are the white box, the black box and the grey box [4]: • White box: White box tests consider the implementation of the classes and the methods. • Black box: Black box tests does not take into account the implementation but only the interface units. • Grey box: Grey box tests take into account the white box and the black box levels. 2.3 Current approaches to test OOP languages The approaches used in practice and in the research community are based on specifications or on programs. 2.3.1 Specification-based The first approach to test an object-oriented program consists to use a certain specification language which describes what the packages and the classes are actually doing. With this specification, it is possible to generate several tests automatically in order to verify the correctness of the implementation. Barbey et al. [2] have used an object oriented specification called Concurrent Object-Oriented Petri Nets (CO-OPN/2). In such a language, an interface describing the attributes in the methods is defined. The axioms enable the programmer to define the comportements of the methods. The main problem in this work is that it does not take into account the characteristics of the OOP paradigm such as polymorphism, specialization, etc. Several researchers [6, 12] have defined that the state of an object is the result of a certain number of method calls. Doong et al. [6] have used a similar approach compared to the work of Barbey and al., however they specified algebraically the behavior of the classes. The verification of the correctness of a method is done by generating a sequence of method calls. Then axioms are used to validate the results. The main problems with the specification-based approach is that the programmer must manipulate an extra language only in order to test the software. Also, the tests are most likely not near the source code to be tested which is not good by considerating that, in practice, the tests are not updated when the software change. Figure 2: Loss of the semantic relations with a typical system using JUnit. 2.3.2 Program-based The program-based approach consists to get a certain confidence level by writing manually the tests in order to simulate the main possibilities of execution of the software. A standard in the industry is the JUnit Framework [3] well used for the Java programming language. The main components of the JUnit Framework are the tests suites and the tests cases. A test case regroups several tests of a class and the suite is used to contains several tests cases. Let say a system has N classes. Then if there is one test case for each class, then the system will consists of 2∗N +1 classes (Fig. 1). Another problem with JUnit is the loss of the semantic relations between test classes (Fig. 2). In fact, classes TestClass2 and TestClass3 could be defined to be the subclass of TestClass1 and reuse the code from TestClass1. However it would be done manually. We need something more automatic in order to reuse the tests. 3. METAMODEL OF UNIT TESTING FOR OOP The proposed metamodel (Fig. 3) is an extension of the metamodel defined by Ducournau et al. [7]. The main motivation of this extension is to add properties specifically for unit tests in order to write unit tests by taking advantage of the mechanisms and the forces of OOP. The relations defined in [7] are also used and expressed as follows: • Redefines (redef): Used to redefines a given entity. • Has (has): Used to know which knowledge is known by a certain entity. For example, it can be useful to know which tests are attached to a given local property. • Introduces (intro): Useful to know which entity has introduced a property or a test. • Belongs to (belongs): Useful to know which global entity is associated to a given local entity. • Defines (def): Used to know which entity has defined a certain property. Figure 3: Metamodel of Unit Testing for OOP. 3.1.1 Property tests Global Test Property. A test property (Test Package, Local Test Class or Local Test Property) represents, in a complete OOP environment using the proposed metalmodel, a block of unit test code associated to a unit (A Package, a class or a property). The idea of incorporating test properties inside a class in the metamodel was inspired by the D Programming Language [11]. However, they do not considered OOP mechanisms such as inheritance and they have not modeled several layers of granularity. Here is a brief list of the main features of the proposed metamodel: • Covered dimensions: The proposed model enables to test packages (and sub-packages), classes and class properties. • Level of abstraction to define tests: Grey box. Testing packages allows to link classes together regardless of the implementation, which corresponds to the black box level. However, testing classes and methods corresponds to the white box level since the tests and the implementation are regrouped within the same entity. • The program-based approach to test the software is used. • Test’s units are the package, the class and the property class. On the other hand, the central unit is the class. • Encapsulation: the white box tests allow to access to all properties compared to the black box tests which allow to access only to public properties. • Inheritance and specialization of tests are built by considering the real world and the type safety. A super class’ test is useful to test a subclass, so it is inherited by default. Let’s express the global test properties which belongs to a certain global property (gc ) of a class c having super classes. P arentsc represents the set of all super classes of c: ∀p∈P arentsc c ≺ p Let Gc be the global properties of c, Lgc the local properties of a given global property gc ∈ Gc of a class c and its super classes are defined by: [ Lgc = {ld |belongs(ld , gc ), ld ∈ Ld } As said, the proposed metamodel (Fig. 3) is an extension of the metalmodel proposed by Ducournau et al. [7]. However, properties for tests are the following: where belongs is a relation used to know if a local property belongs to a global property. Then the global test properties (GT Pgc ) of a given global global property is given by: [ GT Pgc = {gtp|has(lc , gtp), gtp ∈ GT Pc } • Properties to test packages. (3) lc ∈Lgc where GP Tc represents the global test properties of a class c. The relation has(lc , gtp) states that lc knows gtp. A Global Test Property (GTP) is either inherited from a local property redefinition or introduced by a local property. The introduced global tests (IGT Pgc ) represent a sub set of GT Pgc : [ {gtp|intro(d, gtp), d∈P arentsc ∪{c} ∃lc ∈Lgc has(lc , gtp), gtp ∈ GT Pc } ⊆ GT Pgc (4) where intro(d, gtp) means that d introduces gtp. Local Test Property. Let define all local test properties LT Pc for a given class c, the local test properties of a given global property gtc is defined by: • Properties to test classes. • Properties to test class properties. (2) d∈P arentsc ∪{c} • The specialization is used for the tests class and for the tests property in order to reuse 3.1 Class and properties (1) LT P Cgtc = [ {ltc |belongs(ltc , gtc )} ltc ∈LT Pc However, redefined tests must be removed: (5) LT Pgtc = LT P Cgtc − [ {t1 |∃t2 ∈LT P Cgtc redef (t2 , t1 )} t1 ∈LT P Cgtc (6) where redef (t2 , t1 ) is a relation which expresses that the test t2 redefines the test t1 . 3.1.2 Class tests Global Test Class. A global test class is either inherited from a super class or introduced by a given class. Let GT C be the global tests class of a system, GT Cc the global tests class of a class c are defined by: [ GT Cc = {t|∃c∈P arentsc ∪{c} intro(c, t)} Figure 4: Example of name conflict of tests with inheritance: by using two times the same global test property associated to the same local property of a super class. (7) t∈GT C Local Test Class. Let LT C be the local tests of a class. The local tests of a class c is given by: LT CCc = [ {lt|∃gtc∈GT Cc belongs(lt, gtc)} (8) lt∈LT C However, redefinitions must be removed: LT Cc = S LT CCc − {t |∃t2 ∈LT CCc redef (t2 , t1 )} 1 t1 ∈LT CCc (9) 3.2 Type-Safety In static typing languages, the redefinition of the return type must covariant and the redefinition of the parameters must be contravariant in order to have safe types. It does not poses any problem for the proposed metamodel since the metamodel is an extension of the existing properties and the notion of property and class is not altered. 3.3 Property Conflicts 3.3.1 Global Test Property Name conflict of tests with inheritance: by using two times the same global test property associated to the same local property of a super class. The example in Fig. 4 is an example of a name conflict of tests by using two times the same global test property associated to the same local property of a super class. In this example, two tests for the same method operation are defined (Test1Operation and Test2Operation). Both classes B and C define a new test Test2Operation which causes a name conflict since two global test property with the same exists for the method operation. Solutions: 1. Factorize B.Test2Operation and C.Test2Operation in the super class A if the test in class B is the same than the one defined in class C. 2. Redefine operation in B and C. Figure 5: Example of name conflict of global property test with multiple inheritance. 3. Move Test2Operation in class A and redefine the local test property associated to Test2Operation in class B and C. Multiple Inheritance. The second type of possible conflict with global test properties is with multiple inheritance. The example with multiple inheritance (Fig. 5) does not cause any conflict for the tests since each new global test property is associated to the redefined add method. However, the method add is redefined in classes B and C and there exist three solutions for this problem. The tests must follow one of these three methods of conflict resolution: 1. Rename method add in B and C (for example B.addB, C.addC). 2. Selection. In class D, the method add is redefined and a method between B.add and C.add is called and the associated tests of that selection are now associated also to D.add. 3. Unification. In class D, all tests from B and C are associated to D.add. 3.3.2 Local Test Property Local Test Property name conflict with inheritance. Let A be a super class of B and C which introduces a method add and a test associated (Fig. 6). The subclasses B and C redefine the local test property Test1Add. Without class D, there Figure 7: A very simple example: Cow, grass and mouse. Figure 6: Example of Local Test Property name conflict with inheritance. exists no conflict. However, with a class D which can inherit both B.Test1Add and C.Test1Add there is a name conflict: which test should be chosen by the compiler ? Depending on the test, three strategies exists with multiple inheritance: rename, select and unify. 3.4 Tests execution A compiler of an object oriented programming language can then execute automatically by using the meta information from the metamodel proposed (Algorithm 1). Algorithm 1: Executing the tests by using the metamodel (ExecTests). Data: P , a set of all packages. 1 foreach p ∈ P do 2 // Test all packages 3 foreach Test Package tp such that has(p, tp) do 4 Execute tp 5 end 6 foreach Class c such that has(p, c) do 7 // Test all classes 8 foreach ltc ∈ LT Cc do 9 Execute ltc 10 end 11 // Test all properties: 12 foreach Global Property gp such that has(c, gp) do 13 foreach Global Test Property such that gtp ∈ GT Pgp do 14 foreach Local Test Property such that ltp ∈ LT Pgtp do 15 Execute ltp 16 end 17 end 18 end 19 end 20 end Figure 8: Metamodel of the example for the classes Animal, Mouse and Cow. 4.1 First example: Cow, grass and mouse The example (Fig. 7) contains a super class Animal and two subclasses Cow and Mouse. The Animal class defines a method lastF oodEaten which returns the last food that the animal has recently eaten. That class also introduces a new test property T estN otN ull associated to the method lastF oodEaten. This test verify that the food exists when the animal has recently eaten something. The class Cow redefines the method lastFoodEaten and adds a new test T estGrassColor in order to verify that the grass has the right color (Green). The following listing presents the pseudocode of the first example: ✞ 1 2 3 4 5 6 7 8 9 12 13 EXAMPLE This section contains a very basic example showing the strengths of the proposed metamodel in a real OOP environment like Java. p u b l i c Food ( C o l o r c ) { c o l o r s . add ( c ) ; } 10 11 4. p u b l i c c l a s s Food { p r i v a t e L i s t <Color > c o l o r s = new A r r a y L i s t < C o l o r > ( ) ; p u b l i c Food ( ) { } 14 15 16 17 / / Returns t r u e i f the food i s c . p u b l i c boolean i s C o l o r ( Color c ) { /∗ . . . ∗/ } 18 } 20 21 22 23 24 25 26 f () 2 p u b l i c c l a s s G r a s s e x t e n d s Food { public Grass ( ) { c o l o r s . add ( C o l o r . Green ) ; } } defines a Property Test named T estN ame associated to the method f . Let say that a compiler tests those classes in the order of the declaration. Then, the following output would be printed: • Animal.lastFoodEaten() v1 • Animal.TestNotNull 27 28 29 30 p u b l i c c l a s s Animal { p r i v a t e Food l a s t F o o d E a t e n = n u l l ; • Mouse.lastFoodEaten() v1 31 Test TestNotNull { C u r r e n t . l a s t F o o d E a t e n = new Food ( C o l o r . Red ) ; 32 33 34 35 37 String output = t h i s . g e t C l a s s ( ) . getName ( ) + " . T e s t N o t N u l l " ; System . o u t . p r i n t l n ( o u t p u t ) ; 40 41 } p u b l i c Food l a s t F o o d E a t e n ( ) { String output = t h i s . g e t C l a s s ( ) . getName ( ) + " . l a s t F o o d E a t e n ( ) v1 " System . o u t . p r i n t l n ( o u t p u t ) ; 42 43 44 45 46 47 48 5. CONCLUSION AND FUTURE WORK There exist two approaches in order to test a OOP software: specification-based and program-based. The approach based on a specification enables the programmer to modelize the behavior of the objects, but this technique is not so interesting since it uses an extra language and the mechanisms used does not take into account the advantages of an OOP language. The proposed metamodel offers a new approach combining the advantages of the current approaches. The metamodel makes it possible to write unit tests inside the classes to be tested. It facilitates the programmer to write and maintain a software unit. The proposed metamodel contains test properties for the class properties, for the classes and for the packages. There exists specialization links between the tests properties. The metamodel enables the compiler to execute automatically the tests. The future work is to embed the proposed metamodel in a real OOP environment in order to validate the usability and the reliability. Then, existing systems using for example JUnit will be converted to a system using the proposed metamodel in order to compare the testing approaches. return lastFoodEaten ; } 51 } 53 54 55 56 p u b l i c c l a s s Mouse e x t e n d s Animal { } 57 58 59 60 61 62 63 p u b l i c c l a s s Cow e x t e n d s Animal { Test TestGrassColor { / / Ok , i t i s g r a s s . C u r r e n t . l a s t F o o d E a t e n = new G r a s s ( ) ; 64 Food f = C u r r e n t . l a s t F o o d E a t e n ( ) ; a s s e r t T r u e ( f . i s C o l o r ( C o l o r . Green ) ) ; System . o u t . p r i n t l n ( t h i s . g e t C l a s s ( ) . getName ( ) + " . TestGrassColor" ) ; 65 66 67 68 69 } public Grass lastFoodEaten ( ) { System . o u t . p r i n t l n ( t h i s . g e t C l a s s ( ) . getName ( ) + " . l a s t F o o d E a t e n ( ) v2 " ) ; 70 71 72 73 74 75 6. REFERENCES 76 i f ( lastFoodEaten instanceof Grass ) return ( Grass ) lastFoodEaten ; 77 78 79 return null ; 80 } 81 82 } ✆ ✝ Listing 1: Pseudocode of the example. The listing 1 contains a new keyword Current which correspond to a new instance of the current class, allocated only during the test. The following syntax: ✞ 1 T e s t TestName { . . . } • Cow.TestGrassColor We can clearly observe the benefit of using the proposed metamodel: the tests defined in a class are also used in the subclasses in order to cover more lines of code automatically. 49 50 • Cow.lastFoodEaten() v2 • Cow.lastFoodEaten() v2 38 39 • Mouse.TestNotNull • Cow.TestNotNull Food l a s t = C u r r e n t . l a s t F o o d E a t e n ( ) ; a s s e r t T r u e ( l a s t != n u l l ) ; 36 52 ✆ ✝ 19 [1] S. Barbey, M. Ammann, and A. Strohmeier. Open Issues in Testing Object-Oriented Software. In Karol FrÃijhauf, editor, ECSQ’94 (European Conference on Software Quality), Basel, Switzerland, October 17-20 1994, pages 257– 267. vdf Hochschulverlag AG an der ETH ZÃijrich, 1994. Also available as Technical Report EPFL-DI No 94/45. [2] S. Barbey, D. Buchs, and C. Péraire. A Theory of Specification-Based Testing for Object-Oriented Software. In EDCC-2: Proceedings of the Second European Dependable Computing Conference on Dependable Computing, pages 303–320, London, UK, 1996. Springer-Verlag. [3] R. A. Becker and W. S. Cleveland. Java Development With Ant, Chapitre 4 : Testing with JUnit. Manning, 2002. [4] E.V. Berard. Issues in the testing of object-oriented software. In Electro/94 International. IEEE Computer Society, 1994. [5] C. Bucanac. Object Oriented Testing Report. Technical Report 1998-12-09, IDE, University Of Karlskrona/Ronneby, December 1998. [6] R. Doong and P. G. Frankl. The ASTOOT approach to testing object-oriented programs. ACM Trans. Softw. Eng. Methodol., 3(2):101–130, 1994. [7] R. Ducournau, F. Morandat, and J. Privat. Modules and Class Refinement: a Meta-Modeling Approach to Object-Oriented Programming. Technical Report 07-021, LIRMM, 2007. [8] Z. Jin and A. J. Offutt. Coupling-based Integration Testing. In ICECCS ’96: Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems, page 10, Washington, DC, USA, 1996. IEEE Computer Society. [9] T. A. Roger. Testing the Polymorphic Relationships of Object-Oriented Components. Technical Report ISE-TR-99-05, Department of Information and Software Engineering, George Mason University, February 1999. [10] P. Runeson. A Survey of Unit Testing Practices. IEEE Software, 23(4):22–29, 2006. [11] W. Bright. D programming Language, 2005. http://www.digitalmars.com/d/. [12] T. Xie. Automatic identification of common and special object-oriented unit tests. In OOPSLA ’04: Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications, pages 324–325, New York, NY, USA, 2004. ACM.
6cs.PL
lpopt: A Rule Optimization Tool for Answer Set Programming arXiv:1608.05675v2 [cs.LO] 23 Aug 2016 Manuel Bichler, Michael Morak, and Stefan Woltran TU Wien, Vienna, Austria {surname}@dbai.tuwien.ac.at Abstract. State-of-the-art answer set programming (ASP) solvers rely on a program called a grounder to convert non-ground programs containing variables into variable-free, propositional programs. The size of this grounding depends heavily on the size of the non-ground rules, and thus, reducing the size of such rules is a promising approach to improve solving performance. To this end, in this paper we announce lpopt, a tool that decomposes large logic programming rules into smaller rules that are easier to handle for current solvers. The tool is specifically tailored to handle the standard syntax of the ASP language (ASP-Core) and makes it easier for users to write efficient and intuitive ASP programs, which would otherwise often require significant hand-tuning by expert ASP engineers. It is based on an idea proposed by Morak and Woltran (2012) that we extend significantly in order to handle the full ASP syntax, including complex constructs like aggregates, weak constraints, and arithmetic expressions. We present the algorithm, the theoretical foundations on how to treat these constructs, as well as an experimental evaluation showing the viability of our approach. 1 Introduction Answer set programming (ASP) [15,17,8,13] is a well-established logic programming paradigm based on the stable model semantics of logic programs. Its main advantage is an intuitive, declarative language, and the fact that, generally, each answer set of a given logic program describes a valid answer to the original question. Moreover, ASP solvers—see e.g. [14,1,12,2]—have made huge strides in efficiency. A logic program usually consists of a set of logical implications by which new facts can be inferred from existing ones, and a set of facts that represent the concrete input instance. Logic programming in general, and ASP in particular, have also gained popularity because of their intuitive, declarative syntax. The following example illustrates this: Example 1. The following rule naturally expresses the fact that two people are relatives of the same generation up to second cousin if they share a great-grandparent. uptosecondcousin(X, Y) :parent(X, PX), parent(PX, GPX), parent(GPX, GGP), parent(GPY, GGP), parent(PY, GPY), parent(Y, PY), X != Y. Rules written in an intuitive fashion, like the one in the above example, are usually larger than strictly necessary. Unfortunately, the use of large rules causes problems for current ASP solvers since the input program is grounded first (i.e. all the variables in each rule are replaced by all possible, valid combinations of constants). This grounding step generally requires exponential time for rules of arbitrary size. In practice, the grounding time can thus become prohibitively large. Also, the ASP solver is usually quicker in evaluating the program if the grounding size remains small. In order to increase solving performance, we could therefore split the rule in Example 1 up into several smaller ones by hand, keeping track of grandparents and greatgrandparents in separate predicates, and then writing a smaller version of the second cousin rule. While this is comparatively easy to do for this example, this can become very tedious if the rules become even more complex and larger, maybe also involving negation or arithmetic expressions. However, since current ASP grounders and solvers become increasingly slower with larger rules, and noting the fact that ASP programs often need expert hand-tuning to perform well in practice, this represents a significant entry barrier and contradicts the fact that logic programs should be fully declarative: in a perfect world, the concrete formulation should not have an impact on the runtime. In addition, to minimize solver runtime in general, it is therefore one of our goals to enable logic programs to be written in an intuitive, fully declarative way without having to think about various technical encoding optimizations. To this end, in this paper we propose the lpopt tool that automatically optimizes and rewrites large logic programming rules into multiple smaller ones in order to improve solving performance. This tool, based on an idea proposed for very simple ASP programs in [18], uses the concept of tree decompositions of rules to split them into smaller chunks. Intuitively, via a tree decomposition joins in the body of a rule are arranged into a tree-like form. Joins that belong together are then split off into a separate rule, only keeping the join result in a temporary atom. We then extend the algorithm to handle the entire standardized ASP language [10], and also introduce new optimizations for complex language constructs such as weak constraints, arithmetic expressions, and aggregates. The main contributions of this paper are therefore as follows: – we extend, on a theoretical basis, the lpopt algorithm proposed in [18] to the full syntax of the ASP language according to the ASP-Core-2 language specification [10]; – we establish how to treat complex constructs like aggregates, and propose an adaptation of the decomposition approach so that it can split up large aggregate expressions into multiple smaller rules and expressions, further reducing the grounding size; – we implement the lpopt algorithm in C++, yielding the lpopt tool for automated logic program optimization, and give an overview of how this tool is used in practice; and – we perform an experimental evaluation of the tool on the encodings and instances used in the fifth Answer Set Programming Competition which show the benefit of our approach, even for encodings already heavily hand-optimized by ASP experts. 2 Preliminaries General Definitions. We define two pairwise disjoint countably infinite sets of symbols: a set C of constants and a set V of variables. Different constants represent different values (unique name assumption). By X we denote sequences (or, with slight notational abuse, sets) of variables X1 , . . . , Xk with k > 0. For brevity, let [n] = {1, . . . , n}, for any integer n > 1. A (relational) schema S is a (finite) set of relational symbols (or predicates). We write p/n for the fact that p is an n-ary predicate. A term is a constant or variable. An atomic formula a over S (called S-atom) has the form p(t), where p ∈ S and t is a sequence of terms. An S-literal is either an S-atom (i.e. a positive literal), or an S-atom preceded by the negation symbol “¬” (i.e. a negative literal). For a literal `, we write dom(`) for the set of its terms, and var (`) for its variables. This notation naturally extends to sets of literals. For brevity, we will treat conjunctions of literals as sets. For a domain C ⊆ C, a (total or two-valued) S-interpretation I is a set of S-atoms containing only constants from C such that, for every S-atom p(a) ∈ I, p(a) is true, and otherwise false. When obvious from the context, we will omit the schema-prefix. A substitution from a set of literals L to a set of literals L0 is a mapping s : C∪V → C ∪ V that is defined on dom(L), is the identity on C, and p(t1 , . . . , tn ) ∈ L (resp. ¬p(t1 , . . . , tn ) ∈ L) implies p(s(t1 ), . . . , s(tn )) ∈ L0 (resp., ¬p(s(t1 ), . . . , s(tn )) ∈ L0 ). Answer Set Programming (ASP). A logic programming rule is a universally quantified reverse first-order implication of the form H(X, Y) ← B + (X, Y, Z, W) ∧ B − (X, Z), where H (the head), resp. B + (the positive body), is a disjunction, resp. conjunction, of atoms, and B − (the negative body) is a conjunction of negative literals, each over terms from C ∪ V. For a rule π, let H (π), B + (π), and B − (π) denote the set of atoms occurring in the head, the positive, and the negative body, respectively. Let B (π) = B + (π) ∪ B − (π). A rule π where H (π) = ∅ is called a constraint. Substitutions naturally extend to rules. We focus on safe rules where every variable in the rule occurs in the positive body. A rule is called ground if all its terms are constants. The grounding of a rule π w.r.t. a domain C ⊆ C is the set of rules ground C (π) = {s(π) | s is a substitution, mapping var (π) to elements from C}. A logic program Π is a finite set of logic programming rules. The schema of a program Π, denoted sch(Π), is the set of predicates appearing in Π. The active domain of Π, denoted adom(Π), with adom(Π) ⊂ C, is the set of constants appearing in Π. A program Π is ground if all its rules S are ground. The grounding of a program Π is the ground program ground (Π) = π∈Π ground adom(Π) (π). The (GelfondLifschitz) reduct of a ground program Π w.r.t. an interpretation I is the ground program Π I = {H (π) ← B + (π) | π ∈ Π, B − (π) ∩ I = ∅}. A sch(Π)-interpretation I is a (classical) model of a ground program Π, denoted I  Π if, for every ground rule π ∈ Π, it holds that I ∩ B + (π) = ∅ or I ∩ (H (π) ∪ B − (π)) 6= ∅, that is, I satisfies π. I is a stable model (or answer set) of Π, denoted I s Π if, in addition, there is no J ⊂ I such that J  Π I , that is, I is subset-minimal w.r.t. the reduct Π I . The set of answer sets of Π, denoted AS (Π), are defined as AS (Π) = {I | I is a sch(Π)-interpretation, and I s Π}. For a non-ground program Π, we define AS (Π) = AS (ground (Π)). When referring to the fact that a logic program is intended to be interpreted under the answer set semantics, we often refer to it as an ASP program. Tree Decompositions. A tree decomposition of a graph G = (V, E) is a pair T = (T, χ), where T is a rooted tree and χ is a labelling function over nodes t of T , with χ(t) ⊆ V called the bag of t, such that the following holds: (i) for each v ∈ V , there exists a node t in T , such that v ∈ χ(t); (ii) for each {v, w} ∈ E, there exists a node t in T , such that {v, w} ⊆ χ(t); and (iii) for all nodes r, s, and t in T , such that s lies on the path from r to t, we have χ(r) ∩ χ(t) ⊆ χ(s). The width of a tree decomposition is defined as the cardinality of its largest bag minus one. The treewidth of a graph G, denoted by tw (G), is the minimum width over all tree decompositions of G. To decide whether a graph has treewidth at most k is NP-complete [3]. For an arbitrary but fixed k however, this problem can be solved (and a tree decomposition constructed) in linear time [6]. Given a non-ground logic programming rule π, we let its Gaifman graph Gπ = (var (π), E) such that there is an edge (X, Y ) in E iff variables X and Y occur together in the head or in a body atom of π. We refer to a tree decomposition of Gπ as a tree decomposition of rule π. The treewidth of rule π is the treewidth of Gπ . 3 Rule Decomposition This section lays out the theoretical foundations for our rule decomposition approach. First, we recall the algorithm from [18], and then describe how it can be extended to handle three of the main extensions of the ASP language, namely arithmetic expressions, aggregates, and weak constraints (i.e. optimization statements), as defined in the ASP-Core language standard [10]. As demonstrated in Example 1, rules that are intuitive to write and read are not necessarily the most efficient ones to evaluate in practice. ASP solvers generally struggle with rules that contain many variables since they rely on a grounder-solver approach: first, the grounding of a logic program is computed by a grounder. As per the definition in Section 2, the size of the grounding can, in the worst case, be exponential in the number of variables. For large rules, the grounding step can already take a prohibitively large amount of time. However, the solver is also adversely affected by this blowup. In practice, this leads to long runtimes and sometimes the inability of the ASP system to solve a given instance. This also contributes to the fact that, while the syntax of ASP is fully declarative, writing efficient encodings still takes expert knowledge. It is therefore desirable to have a way to automatically rewrite such large rules into a more efficient representation. One way to do this is the rule decomposition approach, first proposed in [18], which we will briefly recall next. 3.1 Decomposition of Simple Rules Generally speaking, the approach in [18] computes the tree decomposition of a rule, and then splits the rule up into multiple, smaller rules according to this decomposition. While in the worst case this decomposition may not change the rule at all, in practice it is often the case that large rules can be split up very well. For instance, the large rule in Example 1 will be amenable for such a decomposition. Let us briefly recall the algorithm from [18] which we will refer to as the lpopt algorithm. For a given rule π, the algorithm works as follows: 1. Compute a tree decomposition T = (T, χ) of π with minimal width where all variables occurring in the head of π are contained in its root node bag. 2. For each node n, let temp n be a fresh predicate, and the same for each variable X in π and predicate dom X . Let Yn = χ(n) ∩ χ(pn ), where pn is the parent node of n. For the root node root, let temp root be the entire head of π, and, accordingly, Yroot = var (H (π)). Now, for a node n, generate the following rule: temp n (Yn ) ← {a ∈ B (π) ∪ {dom X (X) | var (a) ⊆ χ(n)} | a ∈ B − (π), X ∈ var (a), var (a) ⊆ χ(n), 6 ∃b ∈ B + (π) : var (b) ⊆ χ(n), X ∈ var (b)} ∪ {temp m (Ym ) | m is a child of n}. 3. For each X ∈ var (B − (π)), for which a domain predicate dom is needed to guarantee safety of a rule generated above, pick an atom a ∈ B + (π), such that X ∈ var (a) and generate a rule domX (X) ← a. Step 3 is needed because splitting up a rule may make it unsafe. In order to remedy this, a domain predicate is generated for each unsafe variable that arises due to the rule splitting in step 2. The following example illustrates how the algorithm works. Example 2. Given the rule π = h(X, W ) ← e(X, Y ), e(Y, Z), ¬e(Z, W ), e(W, X), a tree decomposition of π could look as follows (note that we write in each bag of the tree decomposition not just the variables as per definition but also all literals of rule π over these variables which is a more intuitive notation): h(X, W ), e(X, Y ), e(W, X) e(Y, Z), ¬e(Z, W ) Applying the lpopt algorithm to π with the tree decomposition above yields the following set of rules lpopt(π): domW (W ) ← e(W, X), temp(Y, W ) ← e(Y, Z), ¬e(Z, W ), domW (W ), and h(X, W ) ← e(X, Y ), e(W, X), temp(Y, W ), where temp is a fresh predicate not appearing anywhere else. Let Π be a logic program. When the above algorithm is applied to all rules in Π, resulting in a logic program lpopt(Π) as stated in [18], the answer sets of Π are preserved in the following way: when all temporary atoms are removed, each answer set of lpopt(Π) coincides with exactly one answer set from the original program Π. Furthermore, the size of the grounding now no longer depends on the rule size. In fact, it now only depends on the rule treewidth as the following result states: Theorem 1 ([18]). The size of ground (lpopt(Π)) is bounded by O(2k · n), where n is the size of Π, and k is the maximal treewidth of the rules in Π. The above theorem implies that the size of the grounding of a program Π, after optimization via the lpopt algorithm, is no longer exponential in the size of Π, but only in the treewidth of its rules. As [18] demonstrates, this decomposition approach already has a significant impact on the size of the grounding in practical instances. However, the ASP language standard [10] extends the ASP language with other useful constructs that the lpopt algorithm proposed in [18] cannot handle. These include arithmetic expressions, aggregates, and weak constraints. Looking at concrete, practical instances of ASP programs, e.g. the encodings used in recent ASP competitions [11], a large majority use such constructs. In the following, we will therefore extend the lpopt algorithm to be able to treat them in a similar way. 3.2 Treating Arithmetic Expressions Arithmetic expressions are atoms of the form X = ϕ(Y), that is, an equality with one variable (or constant number) X on the left-hand side, and an expression ϕ on the right-hand side, where ϕ is any mathematical expression built using the variables from Y, constant numbers, and the arithmetic connectives “+,” “-,” “*,” and “/.” In addition to the positive and negative body, a rule π may also contain a set of such arithmetic expressions describing a relationship between variables with the obvious meaning. Clearly, in order to adapt the rule decomposition approach to this it is easy to extend the definition of the graph representation of π to simply contain a clique between all variables occurring together in an arithmetic expression. The lpopt algorithm then works as described above up to step 2. However, a problem may arise when, in step 3 of the lpopt algorithm, a domain predicate domX (X) is to be generated. Consider the following example: Example 3. Let π be the rule a(X) ← ¬b(X, Y ), c(Y ), d (Z), X = Z + Z. A simple decomposition according to the lpopt algorithm may lead to the following rules: temp(X) ← ¬b(X, Y ), c(Y ), domX (X), and a(X) ← d (Z), X = Z + Z, temp(X). It remains to define the domain predicate domX . According to the original definition of lpopt, we would get domX (X) ← X = Z + Z which is unsafe. The conditions for safety of rules with arithmetic expressions are defined in the ASP language specification [10]. As Example 3 shows, in order for such expressions to work with the lpopt algorithm a more general approach to defining the domain predicates is needed in step 3. In fact, instead of choosing a single atom from the rule body to generate the domain predicate, in general a set of atoms and arithmetic expressions must be chosen. It is easy to see that if a rule π is safe then, for each variable X ∈ B (π), there is a set A of (positive) atoms and arithmetic expressions in the body of π that makes that variable safe. In step 3 of the lpopt algorithm, for a variable X we now choose such a set AX of body elements in a greedy fashion as follows: let S = {X} the set of variables that we need to make safe. For each variable S ∈ S, pick a (positive) atom from B (π) that makes S safe, add it to AX , and remove S from S. If no such atom exists in the body of π, greedily add the smallest arithmetic expression S = ϕ(Y) in B (π) to AX and let S = S \ {S} ∪ Y. Repeat this process until S is empty. Since π itself is safe and finite in size, the above procedure necessarily terminates. Finally, generate the rule domX (X) ← AX . It is easy to see that this rule is safe and describes the possible domain of variable X as required. Note also that this rule can not be split up futher as removing any single element of the rule would make it unsafe. Example 4. A correct domain predicate for Example 3 would be defined as follows: domX (X) ← X = Z + Z, d (Z). This ensures the proper safety of all rules generated by the lpopt algorithm. Note that the rule generated in Example 4 repeats most of the atoms that the second rule generated in Example 3 already contains. It is not immediately obvious how such situations can be remedied in general. Investigating this issue is part of ongoing work. 3.3 Treating Weak Constraints As defined in [10], a weak constraint π[k : t] is a constraint π annotated with a term k representing a weight and a sequence of terms t occurring in π. The intended meaning is that each answer set I is annotated by a total weight w(I), which is the sum over all k for each tuple of constants c that realize t in I and satisfy the body of π. Such a weak constraint can easily be decomposed by replacing π[k : t] with the rule π 0 = temp(k, t) ← B (π), where temp is a fresh predicate, and the weak constraint ⊥ ← temp(k, t)[k : t]. Finally, the lpopt algorithm is then applied to rule π 0 . This allows our rule decomposition approach also to be applied in an optimization context (i.e. where the task for the solver is to find optimal answer sets w.r.t. their weight). 3.4 Treating Aggregate Expressions An aggregate expression, as defined in [10], is an expression of the form t 4 #agg{t : ϕ(X)}, where t is a term; 4 ∈ {<, 6, =, 6=, >, >} is a builtin relation; agg is one of sum, count, max , and min; t = ht1 , . . . , tn i is a sequence of terms; and ϕ(X) is a set of literals, arithmetic expressions, and aggregate expressions, called the aggregate body. Aggregates may appear in rule bodies, or recursively inside other aggregates, with the following semantic meaning: Given an interpretation I, for each valid substitution s such that s(ϕ(X)) ⊆ I, take the tuple of constants s(t). Let us denote this set with T . Now, execute the aggregate function on T as follows: for #count, calculate |T |; for #sum, calculate Σt∈T t1 , where t1 is the first term in t; for #max and #min, take the maximum and minimum term appearing in the first position of each tuple in T , respectively. Finally, an aggregate expression is true if the relation 4 between term t and the result of the aggregate function is fulfilled. Extending the lpopt algorithm to aggregate expressions is again straightforward: The rule graph Gπ = (V, E) of a rule π containing aggregate expressions is defined as follows: Let V be the set of variables occurring in π outside of aggregate expressions. Let E be as before and, in addition, add, for each aggregate expression e, a clique between all variables var (e) ∩ V to E. Intuitively, the rule graph should contain, for each aggregate expression, a clique between all variables that appear in the aggregate and somewhere else in the rule. Variables appearing only in aggregates are in a sense “local” and are therefore not of interest when decomposing the rule. While the above transformation is straightforward, we can, however, go one step further and also decompose the inside elements of an aggregate expression. To this end, let t 4 #agg{t : ϕ(X, Y)} be an aggregate expression occurring in some rule π, where X are variables that occur either in t or somewhere else in π, and Y are variables occurring inside the aggregate only. Replace the aggregate expression with t 4 #agg{t : ψ(X, Z), temp(t, Z)}, and furthermore, generate a rule temp(t, Z) ← ψ(Y), ψ dom (Y), for some fresh predicate temp. Here, ψ contains all those atoms from ϕ that contain a variable from X, and ψ contains the rest. ψ dom contains domain predicates generated like in step 3 of the lpopt algorithm, as needed to make the temporary rule safe. The temporary rule can then be decomposed via lpopt. This is best illustrated by an example: Example 5. Let π be the following logic programming rule, saying that a vertex is “good” if it has at least two neighbours that, themselves, have a red neighbour: good (X) ← vertex (X), 2 6 #count{Y : edge(X, Y ), edge(Y, Z), red (Z)}. According to the above approach, the rule can now be split up as follows. Firstly, the aggregate is replaced: good (X) ← vertex (X), 2 6 #count{Y : edge(X, Y ), temp(Y )}, and furthermore, a temporary rule is created as follows: temp(Y ) ← edge(Y, Z), red (Z). The latter rule is now amenable for decomposition via the lpopt algorithm. Note that the above approach allows us to decompose, to a degree, even the insides of an aggregate, which, for large aggregate bodies, can lead to a further significant reduction in the grounding size. 3.5 Correctness The correctness of the above extensions to the original algorithm follows by the same arguments that prove the correctness of the original algorithm proposed in [18], and trivially from the construction for arithmetic expressions and safety. For the latter, note that for domain predicates of a variable X we explicitly select a set of atoms that make the variable safe, and that such a set always exists, since the original rule is safe. For the former two (namely weak constraints and aggregate expressions), the only thing that needs to be examined is the first step: replacing (part of) the body with a temporary predicate. But correctness of this is easy to see. Instead of performing all joins within the weak constraint or aggregate, we perform the join in a new, separate rule and project only relevant variables into a temporary predicate. The weak constraint or aggregate then only needs to consider this temporary predicate since, by construction, all other variables not projected into the temporary predicate do not play a role w.r.t. optimization or aggregation. Finally, the original algorithm from [18] extended to handle arithmetic expressions, for which correctness has already been established, is then applied to this new, separate rule. 3.6 Further Language Extensions The ASP-Core language specification [10], as well as the gringo grounder1 , allow further constructs like variable pooling, aggregates with multiple bodies, or with upper and lower bounds in the same expression, in addition to various extensions that amount to syntactic sugar. These constructs make the above explanations unnecessarily more tedious. However, from a theoretical point of view, all of these additional constructs can be normalized to one of the forms discussed in the previous subsections. Furthermore, as we shall see in the next section, we have implemented the lpopt algorithm to directly treat all standard ASP language constructs and certain other additions, like variable pooling. More details about this general approach, and the exact, but more tedious, algorithm details, can be found in [4]. 4 Implementation A full implementation of the algorithm and its extensions described in Section 3 is now available in the form of the lpopt tool, available with relevant documentation and examples at http://dbai.tuwien.ac.at/proj/lpopt. The following gives a quick outline of how to use the tool. lpopt accepts as its input any form of ASP program that follows the ASP input language specification laid out in [10]. The output of the program in its default configuration is a decomposed program that also follows this specification. In addition, the tool guarantees that no language construct is introduced in the output that was not previously present in the input (cf. Section 3). Therefore, for example, a program without aggregates will not contain any aggregates as a result of rule decomposition. The following is a description of the parameters of the tool: 1 http://potassco.sourceforge.net Usage: lpopt [-idbt] [-s seed] [-f file] [-h alg] [-l file] -d dumb: do not perform optimization -b print verbose and benchmark information -t perform only tree decomposition step -i ignore head variables when decomposing -h alg decomposition algorithm, one of {mcs, mf, miw (def)} -s seed initialize random number generator with seed. -f file the file to read from (default is stdin) -l file output infos (treewidth) to file In what follows, we will briefly describe the most important features of the tool. Tree Decomposition Heuristics. As stated in Section 2, computing an optimal tree decomposition w.r.t. width is an NP-hard problem. We thus make use of several heuristic algorithms, namely the maximum cardinality search (mcs), minimum fill (mf), and minimum induced width (miw) approaches described in [7], that yield tree decompositions that provide good upper bounds on the treewidth (i.e. on an optimal decomposition). It turns out that in practice, since rules in ASP programs are usually not overly large, these heuristics come close to, and often even yield, an optimal tree decomposition for rules. The heuristic algorithm to use for decomposition can be selected using the -h command line parameter. Since these heuristic approaches rely to some degree on randomization, a seed for the pseudo-random number generator can be passed along with the -s command line parameter. Measuring the Treewidth of Rules. Theorem 1 allows us to calculate an upper bound on the size of the grounding of the input program. In order to do this, the maximal treewidth of any rule in an ASP program must be known. The -l switch of the lpopt tool allows this to be calculated. It forces the tool to perform tree decompositions on all rules inside an input ASP program, simply outputting the maximal treewidth (or, more accurately, an upper bound; see above) over all of them into the given file, and then exiting. Clearly, when a single ASP rule is given as input, this switch will output a treewidth upper bound of that single rule. Recommended Usage Assuming that a file enc.lp contains the encoding of a problem as an ASP program and that a file instance.db contains a set of ground facts representing a problem instance, the recommended usage of the tool is as follows: cat enc.lp instance.db | lpopt | grounder | solver In the above command, grounder and solver are programs for grounding and for solving, respectively. One established solver that we will use in the next section for our experimental evaluation is clasp [14]. If clasp is used as a solver together with the lpopt tool, we generally recommend the use of the --sat-prepro flag, which often speeds up the solving process substantially for decomposed rules generated by lpopt (by considering the fact that the truth values of all temporary atoms generated by lpopt are determined exactly by the rule body, and need never be guessed). 5 Experimental Evaluation We have tested our lpopt tool and benchmarked the performance of grounding and solving of programs preprocessed with lpopt against non-preprocessed ones. All benchmarks were made on the instance sets of the fifth answer set programming competition 2014 2 , which, for most problem classes, provides two encodings, one from 2013, and one from 2014. The benchmarks have been run on a 3.5GHz AMD Opteron Processor 6308 with 192 GB of RAM to its disposal. We used the potassco software suite3 , namely gringo verison 4.5.3 as the grounder and clasp version 3.1.3 as the solver. A timeout of 300 seconds was set for solving, and 1000 seconds for grounding. Furthermore, as suggested in the previous section, clasp was called with the --sat-prepro flag enabled. In this paper, we will survey the most important results. Remark. One central aim of our tool is to improve solving performance for handwritten encodings by non-experts of ASP. In the spirit of a truly declarative language, it shouldn’t matter how an encoding is written as long as it is correct (i.e. w.r.t. runtime, there should not be a difference between “good” and “bad” encodings). In this respect, the ASP competition does not offer an optimal benchmark set since all encodings are extensively hand-tuned by ASP experts. However, as to the best of our knowledge there is no better-suited comprehensive benchmark set available, we will show that even for these extensively hand-tuned ASP competition encodings our tool can still find decompositions that decrease grounding size and improve solving performance. However, there are also encodings that are so perfectly hand-tuned that only trivial optimizations are possible with the current version of lpopt. Results. Let us first note that the runtime of lpopt itself, for all encodings in the benchmark set, was always less than what can be accurately measured on a computer system today. Applying our rule decomposition algorithm thus comes virtually for free for hand-written encodings. Out of the 49 encodings provided by the ASP competition, lpopt was able to syntactically rewrite 41 which indicates that, as mentioned above, even extensively hand-tuned programs can be further decomposed in an automated manner. The remaining eight encodings contained rules that were so small that no further decomposition was possible (i.e. their Gaifman graph was a clique of usually 3-4 nodes) and thus the output of lpopt was the original, unmodified encoding in these cases. In 27 of the 41 encodings rewritten by lpopt, the decompositions were trivial and had no significant impact on the solving performance. This is due to the fact that only rules that were already very small (and thus did not contribute much to the grounding size in the first place) could be decomposed. In five cases out of the 41 rewritten encodings, we noticed a decrease in solving performance (see the paragraph on limitations of lpopt below for an explanation) and in the remaining seven cases, the lpopt rewriting was able to speed up the solving process with substantial improvements in three of these seven. Two of those were the stable marriage problem encoding of 2013, and the permutation pattern matching encoding of 2014 which we will take a closer look at below. Full benchmark results for the entire dataset can be found in [4]. 2 3 https://www.mat.unical.it/aspcomp2014/ http://potassco.sourceforge.net (a) (b) Fig. 1: Benchmark results for the stable marriage 2013 instances. The horizontal axis represents the individual test instances, sorted by runtime without rule decomposition. As can be seen in Figure 1, both grounding and solving time decrease dramatically. Notice that the grounding time is, in general, directly correlated with the size of the respective grounding. With lpopt preprocessing, the grounding size decreases dramatically by a factor of up to 65. The grounder is thirty times faster when using preprocessing, and the solver about three times. This is because of the following constraint in the encoding that can be decomposed very well: :- match(M,W1), manAssignsScore(M,W,Smw), W1!=W, manAssignsScore(M,W1,Smw1), Smw>Smw1, match(M1,W), womanAssignsScore(W,M,Swm), womanAssignsScore(W,M1,Swm1), Swm>=Swm1. The constraint rule above is quite intuitive to read: There cannot be a man M and a woman W , such that they would both be better off if they were matched together, instead of being matched as they are (that is, to W 1 and M 1, respectively). It encodes, precisely and straightforwardly, the condition of a stable marriage. The 2014 encoding splits this rule up, making the encoding much harder to understand. However, with lpopt preprocessing, the grounding and solving performance matches that of the hand-tuned 2014 encoding. This again illustrates that the lpopt algorithm allows for efficient processing of rules written by non-experts that are not explicitly hand-tuned. (a) (b) Fig. 2: Benchmark results for permutation pattern matching 2014. The horizontal axis represents the individual test instances, sorted by runtime without rule decomposition. A second example of lpopt’s capabilities is the permutation pattern matching problem illustrated in Figure 2. The grounding time of the largest instance is 980 seconds without preprocessing and 17 seconds with preprocessing. This instance was also impossible to solve within the timeout window of 300 seconds without lpopt preprocessing, but finishing within 88 seconds when lpopt was run first. Other Use Cases. lpopt has also been employed in other works that illustrate its performance benefits. In particular, several solvers for other formalisms rely on a rewriting to ASP in order to solve the original problem. Such rewritings can easily lead to the generation of large rules that current ASP solving systems are generally unable to handle. For example, in [16] ASP rewritings for several problems from the abstract argumentation domain, proposed in [9], are implemented. In Section 4.6 of the thesis, the performance benefits of lpopt are clearly demonstated for these rewritings. Interestingly, these rewritings also make heavy use of aggregates which goes to show that lpopt also handles these constructs well. Another example is [5], where multiple rewritings for ΣP2 and ΣP3 -hard problems are proposed and then benchmarked, again showcasing that without lpopt these rewritings could not be solved by current ASP solvers in all but the most simple cases. Limitations. However, we also want to point out some limitations of the lpopt algorithm. When a domain predicate is used by the algorithm, the selection of atoms that generate this domain predicate is at the moment essentially random, since the greedy selection depends on the order of the atoms appearing in the rule. This approach, as discussed in Section 3, may thus not pick an optimal set of atoms. However, it depends on this selection how many ground rules this domain predicate rule will generate when passed to the grounder. Therefore, it may at the moment be the case that the increased grounding size caused by the domain predicate rules may destroy any benefit caused by splitting up the main rule. This is precisely what caused the increase in solving time for the five encodings out of 49 that lpopt was able to rewrite but where solving performance deteriorated. Clearly, this begs the question of what the best strategy is to select atoms to generate domain predicates. This is part of ongoing work. 6 Conclusions In this paper, we present an algorithm, based on a prototype from [18], that allows the decomposition of large logic programming rules into smaller ones that current state-ofthe-art answer set programming solvers are better equipped to handle. Our implementation handles the entire ASP-Core-2 language [10]. Benchmark results show that in practice, even for extensively hand-tuned ASP programs, our rule decomposition algorithm can improve solving performance significantly. Future work will include implementing this approach directly into state-of-the-art grounders like the gringo grounder used in our benchmarks, as well as further refining the algorithm w.r.t. selection of domain predicate atoms, as discussed at the end of Section 5. Acknowledgments. Funded by the Austrian Science Fund (FWF): Y698, P25607. References 1. Alviano, M., Dodaro, C., Faber, W., Leone, N., Ricca, F.: WASP: A native ASP solver based on constraint learning. In: Proc. LPNMR. pp. 54–66 (2013), http://dx.doi.org/10. 1007/978-3-642-40564-8_6 2. Alviano, M., Faber, W., Leone, N., Perri, S., Pfeifer, G., Terracina, G.: The disjunctive datalog system DLV. In: Datalog Reloaded. Revised Selected Papers. pp. 282–301 (2010), http://dx.doi.org/10.1007/978-3-642-24206-9_17 3. Arnborg, S., Corneil, D.G., Proskurowski, A.: Complexity of finding embeddings in a k-tree. SIAM J. Algeb. Discr. Meth. 8(2), 277–284 (1987), http://dx.doi.org/10.1137/ 0608024 4. Bichler, M.: Optimizing non-ground answer set programs via rule decomposition. BSc Thesis, TU Wien. http://dbai.tuwien.ac.at/proj/lpopt (2015) 5. Bichler, M., Morak, M., Woltran, S.: The power of non-ground rules in answer set programming. In: Proc. ICLP. To appear (2016), https://arxiv.org/abs/1608.01856 6. Bodlaender, H.L.: A linear-time algorithm for finding tree-decompositions of small treewidth. SIAM J. Comput. 25(6), 1305–1317 (1996), http://dx.doi.org/10. 1137/S0097539793251219 7. Bodlaender, H.L., Koster, A.M.C.A.: Treewidth computations i. upper bounds. Inf. Comput. 208(3), 259–275 (2010), http://dx.doi.org/10.1016/j.ic.2009.03.008 8. Brewka, G., Eiter, T., Truszczynski, M.: Answer set programming at a glance. Commun. ACM 54(12), 92–103 (2011), http://doi.acm.org/10.1145/2043174. 2043195 9. Brewka, G., Woltran, S.: GRAPPA: A semantical framework for graph-based argument processing. In: Proc. ECAI. pp. 153–158 (2014), http://dx.doi.org/10.3233/ 978-1-61499-419-0-153 10. Calimeri, F., Faber, W., Gebser, M., Ianni, G., Kaminski, R., Krennwallner, T., Leone, N., Ricca, F., Schaub, T.: ASP-Core-2 Input Language Format v2.03c (2015), https://www. mat.unical.it/aspcomp2013/ASPStandardization, accessed: 2016-06-27 11. Calimeri, F., Gebser, M., Maratea, M., Ricca, F.: Design and results of the fifth answer set programming competition. Artif. Intell. 231, 151–181 (2016), http://dx.doi.org/ 10.1016/j.artint.2015.09.008 12. Elkabani, I., Pontelli, E., Son, T.C.: SmodelsA - A system for computing answer sets of logic programs with aggregates. In: Proc. LPNMR. pp. 427–431 (2005), http://dx. doi.org/10.1007/11546207_40 13. Gebser, M., Kaminski, R., Kaufmann, B., Schaub, T.: Answer Set Solving in Practice. Synthesis Lectures on Artificial Intelligence and Machine Learning, Morgan & Claypool Publishers (2012), http://dx.doi.org/10.2200/S00457ED1V01Y201211AIM019 14. Gebser, M., Kaufmann, B., Schaub, T.: Conflict-driven answer set solving: From theory to practice. Artif. Intell. 187, 52–89 (2012), http://dx.doi.org/10.1016/j. artint.2012.04.001 15. Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. ICLP/SLP. pp. 1070–1080 (1988) 16. Heißenberger, G.: A System for Advanced Graphical Argumentation Formalisms. Master’s thesis, TU Wien (2016), www.dbai.tuwien.ac.at/proj/adf/grappavis/ 17. Marek, V.W., Truszczyński, M.: Stable Models and an Alternative Logic Programming Paradigm. In: The Logic Programming Paradigm – A 25-Year Perspective, pp. 375–398. Springer (1999) 18. Morak, M., Woltran, S.: Preprocessing of complex non-ground rules in answer set programming. In: Proc. ICLP. pp. 247–258 (2012), http://dx.doi.org/10.4230/LIPIcs. ICLP.2012.247
6cs.PL
The challenge of simultaneous object detection and pose estimation: a comparative study Daniel Oñoro-Rubio, Roberto J. López-Sastre, Carolina Redondo-Cabrera and Pedro Gil-Jiménez GRAM, University of Alcalá, Alcalá de Henares, 28805, Spain arXiv:1801.08110v1 [cs.CV] 24 Jan 2018 Abstract Detecting objects and estimating their pose remains as one of the major challenges of the computer vision research community. There exists a compromise between localizing the objects and estimating their viewpoints. The detector ideally needs to be viewinvariant, while the pose estimation process should be able to generalize towards the category-level. This work is an exploration of using deep learning models for solving both problems simultaneously. For doing so, we propose three novel deep learning architectures, which are able to perform a joint detection and pose estimation, where we gradually decouple the two tasks. We also investigate whether the pose estimation problem should be solved as a classification or regression problem, being this still an open question in the computer vision community. We detail a comparative analysis of all our solutions and the methods that currently define the state of the art for this problem. We use PASCAL3D+ and ObjectNet3D datasets to present the thorough experimental evaluation and main results. With the proposed models we achieve the state-of-the-art performance in both datasets. Keywords: Pose estimation, viewpoint estimation, object detection, deep learning, convolutional neural network 1. Introduction Over the last decades, the category-level object detection problem has drawn considerable attention. As a result, much progress has been realized, leaded mainly by international challenges and benchmarking datasets, such as the PASCAL VOC Challenges [1] or the ImageNet dataset [2]. Nevertheless, researchers soon identified the importance of not only localizing the objects, but also estimating their poses or viewpoints, e.g. [3, 4, 5, 6]. This new capability results fundamental to enable a true interaction with the world and its objects. For instance, a robot which merely knows the location of a cup but that cannot find its handle, will not be able to grasp it. In the end, the robotic solution needs to know a viewpoint estimation of the object to facilitate the inference of the visual affordance for the object. Also, in the augmented reality field, to localize and estimate the viewpoint of the objects, is a crucial feature in order to project a realistic hologram, for instance. Technically, given an image, these models can localize the objects, predicting their associated bounding boxes, and are also able to estimate the relative pose of the object instances in the scene with respect to the camera. Figure 1 shows an example, where the viewpoint of the object is encoded using just the azimuth angle. In the image, the target objects are the sofa and the bicycle. Their locations are depicted by their bounding boxes (in green), and their azimuth angles are represented by the blue arrow inside the yellow circle. The computer vision community rapidly detected the necessity of providing the appropriate annotated datasets, in order to Email address: [email protected], [email protected], [email protected] and [email protected] (Daniel Oñoro-Rubio, Roberto J. López-Sastre, Carolina Redondo-Cabrera and Pedro Gil-Jiménez) Preprint submitted to ArXiv Bycicle 180º Sofa 180º 0º 0º Figure 1: Object category detection and pose estimation example. In the image, the sofa and the bicycle are localized by the green bounding boxes. The blue arrow inside the yellow circles shows the azimuth angles of the objects, which is a form of viewpoint annotation. experimentally validate the object detection and pose estimations approaches. To date, several datasets have been released. Some examples are: 3D Object categories [4], EPFL Multiview car [7], ICARO [8], PASCAL3D+ [9] or ObjectNet3D [10]. Thanks to these datasets, multiple models have been experimentally evaluated. It is particularly interesting to observe how all the published approaches can be classified in two groups. In the first one, we find those models that decouple both problems (e.g. [11, 12, 13]), making first a location of the object, to later estimate its pose. In the second group we identify the approaches that solve both tasks simultaneously (e.g. [9, 14, 15]), because they understand that to carry out a correct location reJanuary 25, 2018 quires a good estimation of the pose, and vice versa. But the discrepancies do not end here. Unlike the problem of object detection, where the metric for the experimental evaluation is clear, being this the mean Average Precision (mAP) defined in the PASCAL VOC Challenge, for the problem of object detection and pose estimation, multiple metrics have been adopted. This is motivated by the fact that not all the models understand the viewpoint estimation problem in the same way. Some solutions, i.e. the discrete approaches, consider that this is a classification problem, when others, i.e. the continuous models, understand the pose as a continuous variable, whose estimation must be approached by solving a regression problem. This article is an attempt to provide a comparative study where these issues can be addressed. The main contributions of this work are as follows: must be solved separately [11, 12, 13]. The second group consists of the models where the detection and the viewpoint estimation are fully coupled [9, 14, 15, 16]. Within these two groups, one must note that while some models solve the pose estimation as a classification problem, i.e. the discrete approaches [15, 17], others treat the viewpoint estimation as a regression problem, i.e. the continuous solutions [12, 16, 18]. In this paper, we introduce three novel deep learning architectures for the problem of joint object detection and pose estimation. They all are extensions for the excellent Faster RCNN object detection model [19]. We have designed them to gradually decouple the object localization and pose estimation tasks. Our models significantly differ from previous deep learning based approaches for the same tasks. For instance, if we consider the work of Tulsiani et al. [17], we observe that their solution is based on a detector (using the R-CNN [20]), followed by a pose classification network, fully decoupling both tasks. On the contrary, all our architectures are trained fully end-to-end, performing a joint detection and viewpoint estimation. Moreover, the deep architectures implemented are different. Massa et al. [15] also propose a joint model. However, their approach is completely different. They base their design on the Fast R-CNN detector [21]. Technically, they modify the Fast R-CNN output to provide the detections based on an accumulative sum of scores that is provided by the pose classification for each object category. In a different manner, our solutions are based on the Faster R-CNN, which is a distinct architecture. Moreover, in our work we explore not only a modification of the output of the networks, but multiple architecture designs where we can gradually separate the branches of the network dedicated to the object localization and the viewpoint estimation tasks. Finally, this paper offers a detailed comparative study of solutions for the joint object detection and pose estimation problem. The study included in [22] focus on the different problem of object classification and pose estimation,i.e. they do not consider the object localization task. • We introduce three novel deep learning architectures for the problem of simultaneous object detection and pose estimation. Our models seek to perform a joint detection and pose estimation, trained fully end-to-end. We start with a model that fully integrates the tasks of object localization and object pose estimation. Then, we present two architectures that gradually decouple both tasks, proposing a final deep network where the integration is minimal. All our solutions are detailed in Sections 3.1 and 3.2. • All our architectures have been carefully designed to be able to treat the pose estimation problem from a continuous or from a discrete perspective. We simply need to change the loss functions used during learning. This is detailed in Section 3.3. Therefore, in our experiments, we carefully compare the performance of these two families of methods, reporting results using four different loss functions. Therefore, this paper aims to shed some light on which perspective is more appropriate, keeping the network architecture fixed. • Thanks to the proposed models, we are able to offer an experimental evaluation (see Section 4) designed to carefully analyze how coupled the detection and pose estimation tasks are, being this our final contribution. We also bring a detailed comparison with all the solutions that establish the state-of-the-art for the problem of object category detection and pose estimation. We carefully analyze all the models using two publicly available datasets: PASCAL3D+ [9] and ObjectNet3D [10]. 3. Simultaneous detection and pose estimation models In the following section, we formulate the learning problem for a joint detection and pose estimation. Then, we detail the proposed architectures, named: single-path, specific-path, and specific-network (Figure 2 shows an overview of all our designs). Technically, they all are extensions for the Faster RCNN approach [19]. Finally, we provide a detailed analysis of the loss functions used in our experimental evaluation. 2. Related Work Object category detection and viewpoint estimation is a growing research field. Several are the methods that have contributed to improve the state of the art. Like we just have said, we can organize in two groups all the approaches in the literature. In the first one, we find those models that understand that these two tasks, i.e. object localization and pose estimation, 3.1. Learning model for simultaneous detection and pose estimation Our goal is to learn a strong visual representation that allows the models to: localize the objects, classify them and estimate their viewpoint with respect to the camera. Furthermore, we consider an in the wild setting where multiple objects of a 2 Conv5 RPN ROI POOLING Bbox. Reg. Cls Pooled Features Pose Pose Pred. ... Fc7 Conv1 Fc6 Image of as the composition of a number of convolutional structure functions, which transform the input image to feature maps that are used to solve the target tasks. For the particular problem of simultaneous object detection and viewpoint estimation, our CNN prediction tˆ should be expressed as follows, Detection Faster R-CNN ROIS (a) Single-path architecture. Cls Detection Pooled Features (Pose) Pose ROI POOLING Pooled Features ROIS (b) Specific-path architecture. Image RPN Conv1 (Pose) ... Cls Detection (Det) ROIS Conv5 (Pose) Pose ... Pose Pred. (Det) Conv5 Bbox. Reg. Faster R-CNN Conv1 (1) zθ : X → RD represents the D-dimensional feature mapping that the network performs to the input images. Technically, it consists in the transformation of the input image xi into a feature that is used to feed the output layers of our models. We encode in θ the trainable weights of the deep architecture that allow the network to perform the mapping. In our solutions, the weights in θ define the hidden layers that are shared by all the tasks that the deep network needs to solve. FW corresponds the set of functions of the output layers. They take as input the deep feature map zθ (xi ). For the problem considered in this paper, our set of functions must address three different tasks: classification (y), object localization (β) and viewpoint estimation (φ). Therefore, FW = ( fWy y , fWβ β , fWφ φ ). fWy y with weights W y produces the prediction for the object category, i.e. tˆy . fWβ β predicts the object location tˆβ . Finally, fWφ φ is in charge of the prediction of the viewpoint tˆφ . According to the prediction model detailed in Equation 1, we define the following objective function to learn our multitask neural network: Pose Pred. Pooled Features (Det) ROI POOLING Bbox. Reg. Fc7 (Det) Fc7 (Pose) ROI POOLING Fc7 (Det) RPN Fc7 (Pose) Conv5 Fc6 (Det) ... Fc6 (Pose) Conv1 Fc6 (Det) Image Fc6 (Pose) Faster R-CNN tˆθ,W = FW ◦ zθ (xi ) . VGG-16 (c) Specific-network architecture. Figure 2: Proposed deep learning architectures for simultaneous object detection and pose estimation. arg min L(θ, W, S ) , θ,W variety of categories appear in real-world scenarios, with a considerable variability on the background, and where occlusions and truncations are the rule rather than the exception. Therefore, the supervised learning process starts from a trainN ing set S = {(xi , ti )}i=1 , where N is the number of training samples. For each sample i in the dataset, xi ∈ X represents the input image, and ti ∈ T , with ti = (yi , βi , φi ), encodes the annotations for the three tasks to solve: classification (yi ), object localization (βi ) and pose estimation (φi ). yi ∈ Y with Y = [1, 2, . . . , C, C + 1] describes the object class, being C the total number of object categories. Category C + 1 is used to consider a generic background class. βi ∈ R4 represents the bounding box localization of a particular object within image xi . Finally, φi ∈ R3 encodes the 3D viewpoint annotation for a particular object with respect to the camera position as a tuple of azimuth, elevation and zenith angles. We propose to learn a convolutional neural network (CNN) [23] for simultaneous object detection and pose estimation. Technically, these CNNs are a combination of three main features which let the model achieve a sort of invariance with respect to imaging conditions: local receptive fields, shared convolutional weights, and spatial pooling. Each unit in a layer receives inputs from a set of units located in a small neighborhood of the previous layer. In the forward pass of a CNN, each output feature is computed by the convolution of the input feature from the previous layer. Therefore, these deep networks can be thought (2) where the loss function follows the equation, L(θ, W, S ) = λ1 Ly (θ, W y , S )+λ2 Lβ (θ, W β , S )+λ3 Lφ (θ, W φ , S ) . (3) λi for i ∈ (1, 2, 3) corresponds to the scalar value that controls the importance of a particular loss during training. For the classification loss Ly we use a categorical cross-entropy function. A simple Euclidean loss is used for the object localization task loss Lβ . Finally, for the pose estimation loss Lφ multiple options are considered. We detail them in Section 3.3. 3.2. The proposed architectures 3.2.1. Single-path architecture Our first deep network design is the single-path architecture. It offers a natural extension of the Faster R-CNN model for the problem of simultaneous object detection and pose estimation. Technically, we simply add an extra output layer in order to predict the viewpoint of the object. To understand the extension proposed, we proceed with a description of the original Faster R-CNN pipeline. As it is shown in Figure 2a, the Faster R-CNN consists of three stages. The first stage is performed by the convolutional layers. An input image passes through the convolutional network, to be transformed into a deep feature map. The second stage is represented by the Region Proposal Network (RPN), which serves as 3 an “attention” mechanism during learning. Technically, it is a fully convolutional (sub)network, which takes an image feature map as input, and outputs a set of rectangular object proposals, with their corresponding objectness scores. To go into details, this RPN takes the feature map obtained from the last convolutional layer (e.g. convolution 5 in a VGG16-based architecture), and adds a new convolutional layer which is in charge of learning to generate regions of interest (ROIs). In the third stage, these ROIs are used for pooling those features that are passed to the last two fully-connected (FC) layers. Finally, the responses coming from the last FC layer are used by the model: 1) to classify the ROIs into background or object; and 2) to perform a final bounding box regression for a fine-grained localization of the object. In Figure 2a we represent these two tasks with the blocks named as “Cls” (for classification) and “Bbox. Reg.” (for the bounding box regression). Technically, the “Cls” module is implemented with a softmax layer, and the “Bbox. Reg.” layer is a linear regressor for the four coordinates that define a bounding box. In order to evaluate the capability of the Faster R-CNN for the task of pose estimation, guaranteeing a minimal intervention in the model architecture, we propose the single-path extension. It consists in the incorporation of an additional output layer (see box “Pose” in Figure 2a), connected to the last FC layer as well. The objective of this layer is to cast a prediction for the viewpoint, and to measure the loss for this task, propagating the appropriate gradients to the rest of the network during learning. For training this single-path model, we solve the objective loss function of Equation 2. We give the same weight to each task, i.e. λ1 = λ2 = λ3 = 1. Note that at this point, we do not specify whether the viewpoint estimation will be considered as a classification or regression problem. In this sense, different loss functions will be considered an evaluated in the experiments, in order to attain a high level of understanding of the simultaneous detection and pose estimation problem. the object classification and bounding box regression losses, i.e. λ1 = λ2 = 0 and λ3 = 1. 3.2.3. Specific-network architecture With our third architecture, named specific-network, we attempt to separate as much as possible the detection and pose estimation tasks within the same architecture. The key idea of this design is to provide a model with two networks that can be fully specialized in their respective tasks, while they are learned simultaneously and end-to-end. Consequently, as it is shown in Figure 2c, we design a model made of two independent networks: the detection network and the pose network. The detection network is in charge of fully performing the object localization task, as in the original design of the Faster R-CNN. The pose network must focus on the viewpoint estimation task, without any influence of the detection objective. Therefore, this network has now its own initial convolutional layers. To align the detection and pose estimation, the pose network receives the ROIs generated by the RPN module of the detection network. Technically, an input image is forwarded simultaneously into both convolutional networks. The second stage of the Faster R-CNN, i.e. the generation of ROIs by the RPN, occurs in the detection network only. These ROIs are shared with the pose network. Finally, each network pools its own features from the generated ROIs, feeds its FC layers with these features, and produces its corresponding outputs. Overall, we have an architecture with two specialized networks, that are synchronized to solve the object detection and pose estimation tasks in a single pass. For learning this model we follow the same procedure as for the specific-path. We train our detection network to solve the Equation 2 where λ3 = 0 and λ1 = λ2 = 1. The pose network is solved just for the pose problem, hence, λ1 = λ2 = 0 and λ3 = 1. The main difference with respect the specific-path model is that there are no shared features, so each network is fully specialized to solve its corresponding task. 3.2.2. Specific-path architecture The specific-path is our second approach. Our objective with this architecture is to explore the consequences of a slightly separation of the pose estimation task from the object class detection, learning specific deep features for each task. As it is shown in Figure 2b, the extension we propose for this second approach consists in adding two independent FC layers, which are directly connected to the pose estimation layer. Note that we do not change the rest of the architecture, i.e. both the initial convolutional layers and the RPN module are shared. The pooled features are used to feed the two groups of FC layers that form two types of features: one for the object detection task, and the other for the viewpoint estimation. Therefore, during training, each network FC path learns its specific features based on its gradients, while the rest of layers learn a shared representation. The model is learned solving the objective function shown in Equation 2. For the detection path, λ1 = λ2 = 1, and λ3 = 0. For the pose path we solve the Equation 2 getting rid of 3.2.4. Why have we chosen these designs? All our architectures are extensions of the Faster R-CNN approach [19]. Originally, the Faster R-CNN architecture was proposed to address the problem of object detection only. This model has systematically prevailing on all the detection benchmarks (e.g. PASCAL VOC [1], COCO [24] and ILSVRC detection [2]), where leading results are obtained by Faster R-CNN based models, albeit with deeper features (e.g. using deep residual networks [25]). So, following a simple performance criterion, we believe that the Faster R-CNN with its excellent results is a good choice. Our second criterion for the selection of this Faster R-CNN architecture is related with the main objective of our research: propose and evaluate solutions for the problem of simultaneous object detection and viewpoint estimation. Note that we neither address the problem of pose estimation in a classification setup in isolation (e.g. [22], where the object localization problem is not considered), nor decouple the object detection and pose estimation tasks (e.g. [17]). Our models seek to perform a joint 4 detection and pose estimation, trained fully end-to-end, and the Faster R-CNN architecture is an ideal candidate to extend. All our solutions perform a direct pooling of regions of interests in the images from the internal RPN of the Faster R-CNN. This way, we do not need to use any external process to hypothesize bounding boxes (e.g. Selective Search [26]), hence performing a truly end-to-end simultaneous object detection and pose estimation model, where the weights of the fully convolutional RPN learn to predict object bounds and objectness scores at each position, to maximize not only the object detection accuracy, but also the viewpoint estimation performance. Finally, we want to discuss our main arguments for the concrete extensions proposed in our architectures. Traditionally, the computer vision community working on the problem of pose estimation for object categories has been divided into two groups. Those that understand that the tasks of localizing objects and estimating their poses are decoupled tasks (e.g. [17, 12, 18, 13]), and those that advocate for jointly solving both tasks (e.g. [15, 27, 16, 14]). The architectures proposed in this paper move from a fully integration of both tasks, i.e. in the single-path, towards the specific-network model, where the integration is minimal. In this way, we can design an experimental evaluation to thoroughly analyze how coupled the detection and pose estimation tasks are. Moreover, all our experiments are carried on publicly available dataset which have been designed for the problem of detection and viewpoint estimation, therefore a direct comparison with previous methods that define the state of the art is also possible. orientation angles as points on a unit circle by the following transformation, p(α) = (sin(α), cos(α)), p(α) ∈ R2 . Probably, the simplest way to train the pose regressor is by using an Euclidean loss, as follows: N  2 1 X   φ p li − p fWφ φ ◦ zθ (xi ) . Lφ (θ, W , S ) = 2N i=1 φ A popular alternative to the Euclidean loss, is the Huber loss function, Lφ (θ, W φ , S ) = N   1 X log σlφ ( fWφ φ ◦ zθ (xi ) , i N i=1 1 N    φ  φ 2  1  PN   2 p li − p fW φ ◦ zθ (xi )  φ  φ  i=1    δ p li − p fW φ ◦ zθ (xi ) − 12 δ2     if p liφ − p fWφ φ ◦ zθ (xi ) ≤ δ, otherwise . (6) The advantage of this loss is that it tends to be more robust to outliers than the Euclidean loss. Finally, we propose to also use the continuous cyclic cosine cost function, which is widely used in the natural language processing literature [29]. It is defined as follows,  N p(liφ )p( fWφ φ ◦ zθ (xi )) 1 X  Lφ (θ, W , S ) = 1 − N i=1 p(liφ ) p( fWφ φ ◦ zθ (xi )) φ    . (7) 4. Experiments 4.1. Implementation details To perform our experiments, we have implemented all our models and loss functions using the deep learning framework Caffe [30]. The optimization is done by using the Stochastic Gradient Descent algorithm, with: a momentum of 0.9; a weight decay of 0.0005; and a learning rate of 0.001. The learning rate of the output layer for the pose estimation has been multiplied by a factor of 0.01, so as to guarantee that the network properly converges. We publicly release all our implementations1 . We follow the standard procedure of the Faster R-CNN [19] for training the models in an end-to-end fashion. This way, for each training iteration, just one image is taken and passed through the first set of convolutions. In a second step, a collection of 128 region proposals is generated. These regions are used to build the batch to feed the last set of FC layers. This batch contains 32 samples of foreground samples and 96 samples of background. For the experimental evaluation, we use two publicly available datasets, which have been especially designed for the evaluation of object detection and pose estimation models: PASCAL3D+ [9] and ObjectNet3D [10]. We strictly follow the experimental setup described in these datasets. In the following sections, more details are provided, as well as a thorough analysis of the results and main conclusions obtained. 3.3. Loss functions for pose estimation Unlike the well-defined object detection task, the viewpoint estimation problem has been traditionally considered from two different perspectives: the continuous and the discrete. Most methods in the literature adopt the discrete formulation. That is, they understand the pose estimation as a classification problem, relying on a coarse quantization of the poses for their multi-view object detectors (e.g. [11, 14, 27]). Only a few approaches consider that the pose estimation of categories is ultimately a continuous problem, i.e. a regression problem (e.g. [16, 18, 28]). In this paper, all our architectures are evaluated considering these two perspectives for the viewpoint estimation. When we want our models to consider discrete outputs for the pose estimation (the “Pose” layer in Figure 2), we integrate the following categorical cross-entropy loss function in Equation 2: Lφ (θ, W φ , S ) = − (5) (4) where N is the number of samples, and σlφ is the softmax function for the label liφ . When the pose estimation is considered from the continuous perspective, multiple adequate regression loss functions can be integrated. For all them, it is fundamental to deal with the circularity of the viewpoint. Therefore, we first represent the 4.2. Results in the PASCAL3D+ dataset PASCAL3D+ [9] dataset is one of the largest and most challenging datasets for the problem of object detection and pose 1 The link to download all the models and software to reproduce the results will be inserted once the paper gets accepted. 5 Airplane Bike Boat Car Train Monitor Figure 3: Some images of the PASCAL3D+ dataset. estimation. Technically, it consists of: 1) the images and annotations of the 12 rigid object categories provided with the PASCAL VOC 2012 dataset [1]; and 2) an additional set of 22,394 images taken from the ImageNet [2] dataset, for the same 12 categories. On average, it has more than 3000 instances per object category. The test set has 5823 images directly inherited from the PASCAL VOC 2012 test subset. Figure 3 shows some examples of images. One can clearly observe that the images provided contain objects “in the wild”. The standard PASCAL VOC annotation for all the objects (i.e. category label and bounding box), has been extended to provide a precise 3D pose. This has been done performing a manual alignment of the objects in the images with 3D CAD models. This way, azimuth, elevation and distance from the camera pose in 3D are provided for each object. For our analysis, we follow the official experimental setup of the PASCAL3D+ [9]. The evaluation metric for the object detection and pose estimation is the Average Viewpoint Precision (AVP). This AVP is similar to the Average Precision (AP) for object detection. To compute the AVP, every output of the detector is considered to be correct if and only if the bounding box overlap with the ground truth annotation is larger than 50% and the viewpoint estimation for the azimuth angle is correct. When we consider a discrete space for the viewpoint, the viewpoint estimation is correct if it coincides with the ground truth azimuth label. On the contrary, if the viewpoint belongs to a continuous space, then, two viewpoint labels are correct if the distance between them is smaller than a fixed threshold of 2π v , where v is the number of views. the Faster R-CNN model [19] using only the training set of the PASCAL VOC 2012 dataset. Note that the validation set of the original PASCAL VOC 2012 is now the test set proposed in the PASCAL3D+, therefore, we do not allow the Faster R-CNN to be pre-trained on it.For the rest of model weights that are not covered by the pre-trained models, we basically follow a standard random initialization. Here we simply want to explore what initialization procedure is the best option. Therefore, for this preliminary experiment, we just use our first architecture, the Single-path. The pose estimation is considered as a classification problem, using 360 discrete bins, and we employ the cross-entropy loss defined in Eq. 4. Init. strategy ImageNet PASCAL VOC 2012 mAP 49.5 63.6 mAVP 4 37.6 42.4 mAVP 8 32.0 32.2 mAVP 16 24.6 23.6 mAVP 24 20.2 18.9 Table 1: Effect of the network initialization strategy in the PASCAL3D+ for the Single-path architecture. Table 1 shows the main results using the described initialization strategies. In terms of object detection precision, i.e. mAP, the initialization of our model, using the PASCAL VOC 2012 datasets is the best option, by a considerable margin, with respect to the ImageNet based strategy. Interestingly, the mAP of our model (63.6) improves the state-of-the-art for the object detection task in the official PASCAL3D+ leaderboard 2 , where the best mAP is of 62.5 reported in [15]. In terms of a joint object detection and pose estimation, we also report the mAVP for different sets of views (4, 8, 16 and 24). The ImageNet based initialization reports slightly better results only for the more fine grained setups of 16 and 24 views. When just 4 or 8 views are considered, the initialization process using the PASCAL VOC 2012 is the best option, considering its high detection precision. This first experiment also reveals that it seems to be a trade-off between how good the system is localizing objects and how accurate the pose predictions are. Overall, we conclude that the best initialization strategy is clearly the 4.2.1. Network initialization analysis One of the most common practices in deep learning consists in initializing a deep network architecture with the weights of a model pre-trained in a big dataset, such as ImageNet [2], and then start a fine tunning process for a specific task, typically using a different dataset. For our problem of joint object detection and pose estimation, we also follow this popular recipe. In a nutshell, we fine tune our networks in the PASCAL3D+ dataset, using for the initialization of the weights two pre-trained models: the original VGG16 model [31] trained for the ImageNet dataset, and 2 Official PASCAL3D+ leaderboard is available at http://cvgl. stanford.edu/projects/pascal3d.html 6 Losses mAP mAVP 4 mAVP 8 mAVP 16 mAVP 24 Discrete (Eq. 4) Euclidean (Eq. 5) Huber (Eq. 6) Cyclic Cosine (Eq. 7) 63.6 64.3 64.5 55.6 42.4 47.9 46.1 42.1 32.2 34.7 31.5 32.2 23.6 23.2 20.2 22.5 18.9 17.6 15.2 17.5 of the network. However, we did not explore this option. Instead, we opted for applying the clipping gradient strategy [32], with a threshold value of 5. If we analyze now the mAVP, where both object detection and viewpoint estimation accuracies are considered, we can observe that, in general, the best performance is reported when the Euclidean loss based model is used. Moreover, within the group of continuous viewpoint estimation models, the Euclidean is the clear winner. Therefore, for the rest of the paper, when a continuous viewpoint model is learned, we use the Euclidean loss. Interestingly, the continuous approach wins the discrete model only when 4 and 8 set of views are considered. For 16 and 24 views, the discrete model retrieves a slightly better performance. In our experiments, we have noted that the continuous pose estimation approaches tend to offer smooth predictions that are concentrated around the most frequent viewpoint of the training set. However, the discrete approach, with a Softmax loss, does not suffer that much from this pose annotation bias. Figure 4 shows a detailed comparison of the performance between a discrete and a continuous approach for a pair of representative object categories: car and bus. Car is the class with the largest amount of samples in the PASCAL3D+ dataset, i.e. 1004 instances of non-difficult objects. The annotated views for cars are distributed quite homogeneously across all the poses, although they are slightly biased towards the frontal and rear views. Category bus provides only 301 samples, and the pose is clearly concentrated in the frontal view. For the category Car, Figures 4a and 4b show that the performance of both models (continuous and discrete) are comparable. The continuous pose model tends to get confused with nearby views, while the discrete approach reports more errors with opposite viewpoints. The scenario changes when one inspects the results for the Bus object category. Figures 4c and 4d show that the performance of the continuous model is slightly worse than the one of the discrete model. Like we detail above, the continuous model tends to concentrate its predictions around the pose annotated bias (i.e. the frontal). Observe the bar diagram in 4c, where most of the Rear views are assigned to Frontal views. We want to conclude this analysis, adding an additional dimension to the discussion: the influence (in the performance) of the evaluation metric used. The problem of simultaneous detection and pose estimation has not been associated with either a clear experimental evaluation process or an evaluation metric. Obviously, part of the problem is that discrete and continuous approaches, being of a different nature, have been evaluated in different ways. As a result, multiple evaluation metrics have been proposed, e.g. Pose Estimation Average Precision (PEAP) [5], Average Orientation Similarity (AOS) [33] and AVP [9]. We refer the reader to [34], where an extensive analysis of the different evaluation metrics is presented. We have compared the performance of the AVP and the AOS metrics. Our experiments reveal that the AVP metric tends to favor discrete approaches, while the AOS metric favors the continuous models. For instance, for the category bus, Figure 5 shows the precision-recall curves when the different metrics are used. When the AVP metric is used, the discrete approach (Dis- Table 2: Loss function analysis for the PASCAL3D+ dataset. Object detection and viewpoint estimation performances are reported. one based on the PASCAL VOC 2012 dataset. Therefore, for the rest of experiments, we follow this initialization strategy. 4.2.2. Discrete vs. Continuous approaches analysis As we have discussed in Section 3.3, the pose estimation problem can be treated following either a discrete approach, i.e. as a classification problem, or a continuous approximation, i.e. as a regression problem. One of the main objectives of our study is to shed light on this discussion. We have carefully designed all our architectures, so they all can consider a discrete and a continuous approximation to the pose estimation problem. We simply have to change the Pose estimation layer, and its associated loss function. Up to four different loss functions are analyzed in these experiments, one for the discrete case and three for the continuous approach. When the discrete scenario is considered, we follow the cross-entropy loss function in Equation 4. Technically, our architectures consider 360 different classes for the azimuth angle. For each category in the dataset (except for the background), we learn a specific pose estimator, therefore, we need to define a softmax function with a length of 360×C elements, where C is the number of classes. During learning, we have opted to mask the softmax layer, propagating only the error for the elements that correspond to the pose of the foreground class. For the continuous pose estimation problem, our networks learn to directly perform the regression of the two values corresponding to the conversion to polar coordinates the azimuth angle. We design our deep models to learn a particular regressor for each object category. And again, during learning, only the regressor that corresponds to the associated class label of the sample in the training batch, is allowed to propagate errors. Following this continuous setup, we analyze the three different loss functions introduced in Section 3.3: the Euclidean loss (Eq. 5), the Huber loss (Eq. 6), and the Cyclic cosine loss (Eq. 7). Table 2 shows the main results, when the different loss functions are used. Discrete, Euclidean and Huber losses exhibit a very similar detection performance (mAP). Only when the Cyclic Cosine loss is used, a substantial drop of the detection performance is reported. The reason we find to explain this fact is that during training, the Cyclic Cosine loss can eventually produce larger gradients than the detection loss. This issue causes that the learning process tends to focus more “attention” on the pose estimation task, obtaining a deep model with a worse object localization accuracy. A simple adjustment of the λ values in Eq. 3 did not properly work in our experiments. Another possibility could be to perform a power normalization of the gradients produced by the different losses at the same level 7 (a) Car - Euclidean loss. (b) Car - Softmax loss. (c) Bus - Euclidean loss. (d) Bus - Softmax loss. Figure 4: Viewpoint estimation performance detailed analysis. A comparison between continuous (with Euclidean loss) and discrete (with a Softmax loss) models for categories Car and Bus. (a) and (b) contain the results for the car category, while (c) and (d) show the results for the bus class. First row include pie charts showing the general performance of the models, where it is reported the percentage of: correct detections, confusions with opposite viewpoints, confusions with nearby poses, and the rest of errors (Other). Second row shows a detailed analysis, of the same type of errors, considering 8 set of viewpoints (F: Frontal, R-F: Right-Frontal, F-L: Frontal-Left, RE: Rear, RE-R: Rear-Right, L: Left, L-RE: Left-Rear and R: Right). 1 are more likely to occur in opposite views. Objectively, errors with close poses are not as important as errors associated with opposite poses. We believe that the continuous models could result more attractive for the problem we are dealing with. However, if the amount of training data is not large enough, and is not well balanced in terms of pose annotations, a discrete estimation model,i.e. based on a classifier, is the best option. This is the normal situation in all datasets, and also in the PASCAL3D+. Therefore, for the rest of our study, we opt for a discrete model. 0.9 0.8 0.7 Precision 0.6 0.5 Dis−AP = 0.7975 Dis−AOS = 0.6946 Dis−AVP (pi/12) = 0.6292 Cont−AP = 0.7922 Cont−AOS = 0.7195 Cont−AVP (pi/12) = 0.5799 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 Recall 0.6 0.7 0.8 0.9 1 4.2.3. Independent vs Joint object detection and pose estimation A quick reading of the scientific literature reveals two main models for tackling the problem of detecting and estimating the pose of object categories. On the one hand we find those who decouple both tasks. The detector is trained and executed separately to locate objects in the images. Subsequently, the pose estimator is responsible for associating a pose to the detected object. On the other hand, we have the models that are trained to solve both tasks together. In this section, we analyze the performance of these two families of works. To do so, we offer a detailed comparison of the proposed architectures in Section 3.2, with existing state-of-the-art models that belong to one family or another. We need to start this experimental evaluation making the following observations with respect to the three architecture proposed in this paper. Technically, our 3 network designs present a clear evolution in terms of the degree of coupling of the tasks of detection and pose estimation. Our Single-path approach clearly belongs to the joint family. Note that in this architecture, all the features of the network are shared for both tasks. With the Specific-path architecture we advance one step Figure 5: Detection and pose estimation performance for the bus category. A comparison based on evaluation metrics AOS and AVP, for both continuous (red tonalities) and discrete (blue tonalities) approaches. AVP) obtains a higher average precision, compared to the one reported for the continuous model (Cont-AVP). On the other hand, when the AOS metric is followed, the average precision is slightly superior for the continuous model, i.e. Dis-AOS < Cont-AOS. In any case, taking into account the observations made in [34], we would like to remark that the AOS metric is not an adequate measurement of the object detection and pose estimation problem. In [34], the authors show that this metric is dominated mainly by the detection performance, masquerading the pose estimation precision. Therefore, for the rest of our study, we choose to use an evaluation procedure based only on the AVP metric. Overall, based on these results, we conclude that continuous viewpoint estimation models tend to accumulate errors at nearby poses, while discrete pose estimation approaches errors 8 forward in the decoupling degree. It is a hybrid system, where the convolutional layer features are shared, while the FC layers are split into two paths: one for the object localization and one for the pose estimation. Finally we propose the Specificnetwork. Although it should be considered as an architecture belonging to the group of independent, we cannot forget that it actually proposes a new paradigm, where both networks, specialized in different tasks, can be trained end-to-end. Note that although the networks learn their characteristics in a decoupled way, the ROIs produced by the network in charge of the location are shared with the network for the estimation of the pose, which somehow conditions their learning. This end-toend methodology clearly differs from the rest of state-of-the-art independent models (e.g. [11] ). Table 3 shows the results for all of our architectures in the PASCAL3D+ dataset. Overall, our two independent models report a better performance than the Single-path architecture. For the specific case of 4 set of views, the best performance is given by the Specific-path model, which achieves the best AVP for 6 of 11 categories. For the rest of set of views (8, 16 and 24), the best performance is consistently achieved by our Specificnetwork architecture. The obtained results show that the independent approaches perform better than joint approaches. In Figure 6, we show some qualitative examples produced by our Specific-network architecture. We now compare our best model, i.e. the Specific-network, with the state-of-the-art models in Table 4. First of all, our Specific-network reports the best object detection results: see last column in Table 4. Depending on the the number set of views used for the evaluation in the PASCAL3D+ we can identify different winners, even from different families of methods. For instance, joint models retrieve the best results, in terms of mAVP, for 4, 8 and 24 views. For 16 views, it is the independent model in [11] the one reporting the best performance. Regarding all the results in Table 4 we can conclude that the independent approaches exhibit a better accuracy over most of the joint models. Note that the state-of-the-art for 24 view sets if achieved by the Craft-CNN [15], which uses synthetic CAD models during learning. This is also the case for the RenderCNN [27]. The rest of models, including ours, do not use any extra data in form of CAD models. Note that the Specific-network systematically reports a better performance than the RenderCNN, for instance. The Single-Shot approach [35] is the clear winner for 4 and 8 set of views, and the VP&KP [11] wins for 16 set of views. In all these scenarios, our Specific-network reports a higher detection accuracy than the winner model. This aspect is relevant, because the metric used tends to favor detectors with a lower localization precision. We refer the reader to the study in [34] for more details. In other words, the more detections that are retrieved by a model, the greater the likelihood that the objects for which pose estimations have to be assigned are objects that, being more difficult to detect, appear occluded or truncated, or that are too small, aspects which naturally complicate a correct estimation of the viewpoint. Every model comes with its own detector: VP&KP uses the R-CNN [37], Craft-CNN uses the Fast R-CNN [21], and we follow the Faster R-CNN architecture [19]. How can we evaluate the actual influence of the detector in the viewpoint estimation performance? In order to shed some light on this issue, we have decided to perform an additional experiment. We have taken the code of the VP&KP model provided by the authors. This model defines an independent type architecture, where two completely decoupled and different deep networks are used: one for detection, and one for the pose estimation. We start using our Specific-path model which has the best detection performance, and we run it over the training images. We then collect these detections on the training data to enrich the ground truth data. Note that we only collect those detections whose overlap with the original ground truth is grater than 70%. This is equivalent to the jittering technique applied in the original paper but taking into account the bounding box distribution of the detector. With this extended training data, we proceed to train the original pose estimator in [11]. For the test images, we recover our detections, and apply the described pose estimator on them. We call this pipeline: Improved VP&KP (Imp-VP&KP). Technically, the detector of the original VP&KP has been improved, using the Faster R-CNN now. As we can see in Table 5, our Improved VP&KP systematically reports better results than the original work. Moreover, in Figure 7 we present a comparison between the Imp-VP&KP and the results of the Craft-CNN [15] for 24 views. We can observe how by simply updating the object detector, the model of [11] can easily get the same performance as the Craft-CNN [15]. 4.2.4. The side effect of the pose estimation in the joint system The systems that address the object detection and pose estimation problems simultaneously, in principle, have multiple benefits, compared with the models that decouple both tasks. They are clearly more efficient, in terms of computational cost. Note that during training, for instance, both task are learned simultaneously. Moreover, for a test image, the localization of the object, and the estimation of its pose is obtained at the same time, not needing to process the images with a complex pipeline consisting of a detector followed by a viewpoint estimator. In a joint system, most of the operations are shared between tasks. In spite of these advantages, our experiments reveal that there is a trade-off between doing the object localization accurately and casting a precise estimation for the viewpoint. Ideally, a good detector should be invariant to the different poses of an object, e.g. it should correctly localize frontal and rear views of cars. This would push the detection models to learn representations that are not adequate to discriminate between the different poses, being this what a good pose estimator should learn. In Table 6 we report some results that can help us to understand the mentioned trade-off. The first two rows show the results reported by Massa et al. [15]. They show a comparison between their joint and independent approaches. Their independent solution clearly obtains a better performance for the object detection than the joint model, but also one can observe how the pose estimation precision, in terms of mAVP, decreases. 9 Methods Aero Single-path Specific-path Specific-network 78.1 78.5 77.8 Single-path Specific-path Specific-network 52.4 56.7 58.4 Single-path Specific-path Specific-network 42.9 47.2 51.3 Single-path Specific-path Specific-network 22.8 33.4 36.7 Single-path Specific-path Specific-network 18.1 26.0 22.9 Bike Boat Bus Car Chair Table MBike Sofa AP Object Detection 74.3 47.2 79.7 70.2 28.2 53.0 76.0 52.0 73.1 49.3 79.2 70.3 32.3 52.7 78.0 58.0 74.2 47.9 78.7 70.3 30.7 52.9 78.1 56.5 AVP 4 Views - Joint Object Detection and Pose Estimation 41.7 18.6 66.2 45.3 14.2 26.1 44.7 40.4 54.7 24.1 66.2 50.2 17.3 30.1 55.7 44.0 57.0 23.2 66.3 53.3 16.9 27.9 60.9 41.5 AVP 8 Views - Joint Object Detection and Pose Estimation 28.9 11.1 52.7 38.8 10.5 18.1 32.0 28.3 38.3 16.3 47.2 43.0 12.8 25.5 47.5 33.2 43.2 14.4 54.6 46.1 13.3 21.8 48.4 33.8 AVP 16 Views - Joint Object Detection and Pose Estimation 19.5 7.8 54.4 31.8 6.8 14.0 20.5 15.6 25.9 10.1 51.3 32.7 8.0 20.1 23.8 25.9 30.5 11.7 57.4 39.7 8.9 21.8 29.6 25.5 AVP 24 Views - Joint Object Detection and Pose Estimation 15.3 4.4 44.8 27.2 5.2 11.8 13.7 14.0 18.3 7.7 40.6 29.3 5.2 15.9 18.4 20.3 21.8 8.8 45.0 33.2 7.0 18.2 20.8 16.9 Train Monitor Avg. 79.5 77.9 77.7 60.8 64.6 62.7 63.6 64.9 64.3 63.7 61.6 60.1 52.9 60.4 52.6 42.4 47.4 47.1 50.2 53.4 49.4 40.5 43.5 41.7 32.2 37.1 38.2 42.9 38.0 38.0 23.6 32.5 31.9 23.6 27.4 30.2 36.9 36.7 33.4 16.9 24.4 21.8 18.9 22.1 22.7 Table 3: Object detection and pose estimation results in the PASCAL3D+ dataset. Comparison between all our architectures. In gray color we show our joint solution, i.e. the Single-path architecture. The remaining architectures (Specific-path and Specific-network) can be classified in the group of independent approaches. propose a generalization of the AVP. They basically extend the AVP to consider the prediction of the three angles provided in the annotation: azimuth, elevation and in-plane rotation. Technically, the solutions must provide an estimation for these three variables. Then, the corresponding predicted rotation matrix R̂ is constructed. The difference between the ground truth pose R, and the prediction encoded in R̂ is computed using a geodesic distance as follows: It is also interesting to observe, in the last rows of Table 6, how this trade-off between object detection and pose estimation performances also affects the model of Poirson et al. [35]. We can see that when they try to train their Single-Shot joint model to be more discriminative in terms of poses,i.e. increasing the number of sets of views from 4 to 24, the object detection accuracy tends to decrease. If we now analyze the performance reported by our solutions, from the Single-path to the Specific-network, we note that the detection performance slightly increases for our independent models, but we are able to also report a better performance in terms of pose estimation. We explain this fact with the type of deep architectures we have proposed. Both the Specific-path and the Specific-network can not be categorized as truly independent models: we do not completely decouple the tasks of object localization and pose estimation. Ours is an exercise or relaxing the amount of shared information between these tasks, which defines a training process able to enforce the networks to learn representations that are adequate for both tasks.   1 d(R, R̂) = √ || log R̂T R || . (8) 2 According to Xiang et al. in [10], for the AVP, an estimation is considered to be correct if d(R, R̂) < π6 . With respect to the technical implementation of our models, note that they cast a prediction for the three pose angles (azimuth, elevation and in-plane rotation) simultaneously. We repeat the same initialization procedure, using a pre-trained model on the ImageNet dataset. Again, we use the Stochastic Gradient Descent optimizer, with a momentum of 0.9, and the weight decay is set to 0.0005. This time we fix to 1 all the specific learning rates for each layer. The training is performed in an end-to-end fashion following the Faster R-CNN procedure [19]. 4.3. Results in the ObjectNet3D dataset In this work, we also perform a detailed experimental evaluation of our models in the large scale dataset for 3D object recognition ObjectNet3D [10]. It consists of 100 categories, 90.127 images and more than 200.000 annotated objects. This dataset has been carefully designed for the evaluation of the problems of object detection, classification, and pose estimation. Similarly to the PASCAL3D+, the object pose annotation is the result of the manual alignment of a 3D CAD model with the target object. Figure 8 shows some examples of this dataset. Like we describe in Section 4.1, we strictly follow the experimental setup detailed in [10]. Only the training data is used to learn the models. We then report our results using the validation and test sets. For the evaluation metric, Xiang et al. [10] 4.3.1. Discrete vs. Continuous approaches analysis In our experiments with the PASCAL3D+ dataset, one of the main conclusions obtained has been that the discrete pose estimation models, based on classifiers, give better results than continuous pose estimation models. When the number of training samples is not large enough, and the pose annotations are not well balanced, a discrete estimation model is generally the best option. Now, with the novel ObjectNet3D dataset, which provides more viewpoint annotations for more object categories, we have the opportunity to explore whether we can obtain a better performance for the continuous approaches. 10 Correct Prediction Bad Pose Bad Detection Figure 6: Qualitative results produced by the Specific-network in the PASCAL3D+ dataset. In green, we depict the ground truth annotations, while in red we show the results produced by our model. Rectangles correspond to the bounding boxes, while the arrows depict annotated orientations of the objects. 70 Craft-CNN 4.3.2. Comparison of our architectures In this section, we propose to analyze the performance of all our architectures, i.e. the Single-path, the Specific-path and the Specific-network, in this novel dataset. We only use the training set for learning the models, and the evaluation is carried in the validation set. Figure 9 shows that for this dataset, all our models report a very similar performance. Note how the AP reported for the object localization task is almost identical for the three networks, while for the pose estimation the Specificpath exhibits a slightly superior AVP. In any case, we conclude that for this dataset, there is no clear winner within our models. Therefore, now that the amount of training data in the ObjectNet3D dataset has increased considerably, it seems that there are no major differences between treating the problem of locating objects and estimating their pose jointly or separately. ImpVPKP 60 50 40 30 20 10 0 Figure 7: Comparison of Craft-CNN and the Imp-VP&KP experiment for 24 views. 4.3.3. A comparison with the State-of-the-art In this section, we provide a comparison with the state-ofthe-art models reported by Xiang et al. [10]. For the joint 2D detection and continuous 3D pose estimation task, they propose a modification of the Fast R-CNN [21] model, using two different base architectures: the VGG-16 [31] and the AlexNet [38]. Technically, they add a viewpoint regression FC branch just after the FC7 layer. Their network is trained to jointly solve three tasks: classification, bounding box regression and viewpoint regression. The FC layer for viewpoint regression is of size 3 × 101, i.e. , for each class, it predicts the three angles of azimuth, elevation and in-plane rotation. The smoothed L1 loss is used for viewpoint regression. Table 8 shows the comparison with the state-of-the-art models, but now in the test set of the ObjectNet3D dataset. On the first two rows of the table, we include the results of the VGG16 and the AlexNet based models reported in [9]. The last row shows the performance of our Specific-path model. First, note We follow the same procedure described in Section 4.2.2 for our previous Discrete vs. Continuous approaches analysis. We use our Single-path model, which is trained for a continuous pose estimation task, solving a regression problem using the Euclidean and Huber losses. When the discrete pose estimation problem is tackled, we simply learn a classifier employing the Softmax loss. Table 7 reports the obtained results of our Single-path architecture, trained on the training set, and evaluated over the validation set. In our experiments, we observe a similar performance among all the models, but this time the continuous pose estimation architectures exhibit a small advantage, like we have previously suggested. Therefore, for the rest of the experiments in this dataset, we use the continuous viewpoint architecture, employing the Huber loss. 11 Methods Aero VDPM [9] DPM-VOC+VP [14] Craft-CNN [15] Single-Shot [35] SubCNN [36] RenderCNN [27] VP&KP [11] Specific-network 34.6 37.4 64.6 61.4 50.0 63.1 58.4 VDPM [9] DPM-VOC+VP [14] Craft-CNN [15] Single-Shot [35] SubCNN [36] RenderCNN [27] VP&KP [11] Specific-network 23.4 28.6 58.7 48.8 44.5 57.5 51.3 VDPM [9] DPM-VOC+VP [14] Craft-CNN [15] Single-Shot [35] SubCNN [36] RenderCNN [27] VP&KP [11] Specific-network 15.4 15.9 46.1 28.0 27.5 46.6 36.7 VDPM [9] DPM-VOC+VP [14] Craft-CNN [15] Single-Shot [35] SubCNN [36] RenderCNN [27] VP&KP [11] Specific-network 8.0 9.7 42.4 33.4 20.7 21.5 37.0 22.9 Bike Boat Bus Car Chair Table MBike Sofa AVP 4 Views - Joint Object Detection and Pose Estimation 41.7 1.5 26.1 20.2 6.8 3.1 30.4 5.1 43.9 0.3 48.6 36.9 6.1 2.1 31.8 11.8 62.1 26.8- 70.0 51.4 11.3 40.7 62.7 40.6 60.4 21.1 63.0 48.7 23.8 17.4 60.7 47.8 50.5 15.1 57.1 41.8 15.7 18.6 50.8 28.4 59.4 20.3 69.8 55.2 25.1 24.3 61.1 43.8 57.0 23.2 66.3 53.3 16.9 27.9 60.9 41.5 AVP 8 Views - Joint Object Detection and Pose Estimation 36.5 1.0 35.5 23.5 5.8 3.6 25.1 12.5 40.3 0.2 38.0 36.6 9.4 2.6 32.0 11.0 56.4 19.9 62.4 42.2 10.6 34.7 58.6 38.8 36.3 16.4 39.8 37.2 19.1 13.2 37.0 32.1 41.1 10.1 48.0 36.6 13.7 15.1 39.9 26.8 54.8 18.9 59.4 51.5 24.7 20.5 59.5 43.7 43.2 14.4 54.6 46.1 13.3 21.8 48.4 33.8 AVP 16 Views - Joint Object Detection and Pose Estimation 18.4 0.5 46.9 18.1 6.0 2.2 16.1 10.0 22.9 0.3 49.0 29.6 6.1 2.3 16.7 7.1 39.6 13.6 56.0 36.8 6.4 23.5 41.8 27.0 23.7 10.0 50.8 31.4 14.3 9.4 23.4 19.5 25.8 6.5 45.8 29.7 8.5 12.0 31.4 17.7 42.0 12.7 64.6 42.7 20.8 18.5 38.8 33.5 30.5 11.7 57.4 39.7 8.9 21.8 29.6 25.5 AVP 24 Views - Joint Object Detection and Pose Estimation 14.3 0.3 39.2 13.7 4.4 3.6 10.1 8.2 16.7 2.2 42.1 24.6 4.2 2.1 10.5 4.1 37.0 18.0 59.6 43.3 7.6 25.1 39.3 29.4 29.4 9.2 54.7 35.7 5.5 23.0 30.3 27.6 16.4 7.9 34.6 24.6 9.4 7.6 19.9 20.0 22.0 4.1 38.6 25.5 7.4 11.0 24.4 15.0 33.4 10.0 54.1 40.0 17.5 19.9 34.3 28.9 21.8 8.8 45.0 33.2 7.0 18.2 20.8 16.9 Train Monitor mAVP mAP 10.7 11.1 65.9 55.9 46.1 59.4 60.1 34.7 32.2 61.3 62.3 58.2 55.4 52.6 19.5 23.8 50.7 47.5 39.7 49.1 47.1 26.8 27.0 61.0 60.7 56.9 56.9 64.3 10.9 9.8 61.2 44.4 39.1 53.3 49.4 27.4 28.6 49.7 26.9 46.5 45.6 41.7 18.7 21.5 45.1 31.9 32.9 44.5 38.2 29.9 28.3 60.4 60.7 56.9 56.9 64.3 22.1 20.2 38.8 30.7 29.7 42.5 38.0 16.3 19.9 36.4 27.8 31.4 32.9 31.9 15.6 17.3 33.3 24.5 24.2 36.0 30.2 30.0 28.3 60.0 60.7 56.9 56.9 64.3 20.0 20.7 48.1 44.1 32.7 28.0 43.9 33.4 11.2 12.9 28.4 34.3 18.2 19.8 22.7 21.8 12.1 13.6 34.4 28.8 19.3 19.8 31.1 22.7 29.5 27.1 59.9 59.3 60.7 56.9 56.9 64.3 Table 4: Comparison with the state-of-the-art in the PASCAL3D+ dataset.In gray color we show the joint solutions. that we are able to report a better detection performance than the AlexNet based solution in [9]. Second, although the VGG-16 based architecture of [9] reports the best detection results, if we simultaneously consider the object localization and viewpoint estimation accuracies, i.e. using the AVP metric, our model is the clear winner. This fact is particularly relevant, if we consider that the pose estimation is bounded by the detection performance, according to the evaluation metric used. Overall, this implies that our model is more accurate predicting poses. In a detailed comparison of our solution with the VGG-16 based architecture used in [9], we find the following differences that also help to explain the results obtained. First, while our model is trained fully end-to-end, the approach in [10] consists in training the Region Proposal Network of [19] first, and then using these proposals to fine-tune their model for the object detection and pose estimation tasks. Therefore, their model is mainly trained to optimize the detection performance, which explains why our Specific-path reports a slightly lower mAP. Second, there are significant differences in how the pose estimation is performed. In [10], a regressor is trained to directly predict viewpoint values in degrees. We, instead, decompose each angle into two polar coordinates. This decomposition naturally takes into account the cyclic nature of viewpoint angles. This explains why our Single-path model reports a better per- formance for the pose. We finally show some qualitative results for the ObjectNet3D dataset in Figure 10. 5. Conclusion In this work, we have presented a complete analysis of the state of the art for the problem of simultaneous object detection and pose estimation. We have designed an experimental validation, using the PASCAL3D+ and ObjectNet3D datasets, where we can evaluate the degree of coupling that exists among the tasks of object localization and viewpoint estimation. For doing so, we have introduced three deep learning architectures, which are able to perform a joint detection and pose estimation, where we gradually decouple these two tasks. With the proposed models we have achieved the state-of-the-art performance in both datasets. We have concluded that decoupling the detection from the viewpoint estimation task have benefits on the overall performance of the models. Furthermore, we have extended the comparative analysis of all our approaches considering the pose estimation as a discrete or a continuous problem, according to the two families of work in the literature. In our experiments, we have analyzed the main factors that need to be considered during the system design and 12 Methods Aero VP&KP [11] Imp-VP&KP 63.1 70.8 VP&KP [11] Imp-VP&KP 57.5 63.9 VP&KP [11] Imp-VP&KP 46.6 51.2 VP&KP [11] Imp-VP&KP 37.0 40.7 Bike Boat Bus Car Chair Table MBike Sofa Train AVP 4 Views - Joint Object Detection and Pose Estimation 59.4 20.3 69.8 55.2 25.1 24.3 61.1 43.8 59.4 66.2 37.9 75.5 61.6 17.7 39.5 68.9 49.6 67.0 AVP 8 Views - Joint Object Detection and Pose Estimation 54.8 18.9 59.4 51.5 24.7 20.5 59.5 43.7 53.3 61.4 29.0 63.3 56.2 15.8 32.8 65.3 42.0 60.6 AVP 16 Views - Joint Object Detection and Pose Estimation 42.0 12.7 64.6 42.7 20.8 18.5 38.8 33.5 42.5 43.2 20.4 68.9 47.3 17.7 30.1 40.8 36.5 44.7 AVP 24 Views - Joint Object Detection and Pose Estimation 33.4 10.0 54.1 40.0 17.5 19.9 34.3 28.9 43.9 36.4 15.8 58.5 45.8 10.7 28.5 35.9 28.3 49.5 Monitor Avg. 55.4 62.8 49.1 56.1 45.6 53.6 44.5 49.4 32.9 38.9 36.0 39.6 22.7 26.6 31.1 34.3 Table 5: VP&KP [11] vs. Imp-VP&KP experiment. Fork Iron Car Motorbike Plate Kettle Figure 8: ObjectNet3D image samples. Method mAP 1 mAVP Craft-CNN (AlexNet) [15] Ours Joint - 24 views (Single-path) Independent - 24 views (Specific-path) Independent - 24 views (Specific-network) Single-Shot [35] Joint - 4 views Joint - 8 views Joint - 16 views Joint - 24 views 48.6 51.6 21.1 20.5 63.6 64.9 64.3 18.9 22.1 22.7 61.0 60.4 60.0 59.3 50.7 45.1 33.3 28.8 0.8 0.7 Precision Joint - 24 views Independent - 24 views mAP 59.7 60.5 60.4 0.6 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 Recall 0.6 0.7 0.8 0.9 1 Figure 9: Object detection and pose estimation performance of our Single-path, Specific-path and Specific-network architectures in the ObjectNet3D dataset. Both AP and AVP metrics, with their associated precision-recall curves, are reported. Table 6: Analysis of the trade-off between object detection and pose estimation performance. Losses Discrete (Eq. 4) Euclidean (Eq. 5) Huber (Eq. 6) Single−path AP: 60.4 Single−path AVP: 41.5 Specific−path AP: 60.4 Specific−path AVP: 43.1 Specific−network AP: 59.8 Specific−network AVP: 40.1 0.9 mAVP 40.9 41.2 41.5 training. Despite the similar performance among the different approaches, we have observed a difference between the discrete and the continuous models. We conclude that the continuous approaches are more sensitive to the pose bias in the annotation than the discrete models, hence requiring bigger datasets. Table 7: Loss function analysis for the ObjectNet3D dataset. Object detection and viewpoint estimation performances are reported. 13 Correct Prediction Bad Pose Bad Detection Figure 10: Qualitative results produced by the Specific-path in the ObjectNet3D. In green, we depict the ground truth annotations, while in red we show the results produced by our model. Rectangles correspond to the bounding boxes, while the arrows depict annotated orientations of the objects. Method AlexNet [10] VGG-16 [10] Our mAP 54.2 67.5 64.2 mAVP 35.4 42.6 46.7 [8] R. López-Sastre, C. Redondo-Cabrera, P. Gil-Jiménez, S. MaldonadoBascón, ICARO: Image collection of annotated real-world objects, http://agamenon.tsc.uah.es/Personales/rlopez/data/icaro, 2010. [9] Y. Xiang, R. Mottaghi, S. Savarese, Beyond PASCAL: A benchmark for 3D object detection in the wild, in: IEEE Winter Conference on Applications of Computer Vision (WACV), 2014. [10] Y. Xiang, W. Kim, W. Chen, J. Ji, C. Choy, H. Su, R. Mottaghi, L. Guibas, S. Savarese, ObjectNet3D: A large scale database for 3D object recognition, in: ECCV, 2016. [11] S. Tulsiani, J. Malik, Viewpoints and keypoints, in: CVPR, 2015. [12] D. Glasner, M. Galun, S. Alpert, R. Basri, G. Shakhnarovich, Viewpointaware object detection and continuous pose estimation, Image and Vision Computing 30 (2012) 923–933. [13] C. Redondo-Cabrera, R. Lopez-Sastre, Because better detections are still possible: Multi-aspect object detection with boosted hough forest, in: BMVC, 2015. [14] B. Pepik, M. Stark, P. Gehler, B. Schiele, Teaching 3D geometry to deformable part models, in: CVPR, 2012. [15] F. Massa, R. Marlet, M. Aubry, Crafting a multi-task CNN for viewpoint estimation, in: BMVC, 2016. [16] C. Redondo-Cabrera, R. Lopez-Sastre, T. Tuytelaars, All together now: Simultaneous object detection and continuous pose estimation using a hough forest with probabilistic locally enhanced voting, in: BMVC, 2014. [17] S. Tulsiani, J. Carreira, J. Malik, Pose induction for novel object categories, in: ICCV, 2015. [18] M. Fenzi, L. Leal-Taixé, B. Rosenhahn, J. Ostermann, Class generative models based on feature regression for pose estimation of object categories, in: CVPR, 2013. [19] S. Ren, K. He, R. Girshick, J. Sun, Faster R-CNN: Towards real-time object detection with region proposal networks, in: NIPS, 2015. [20] R. Girshick, J. Donahue, T. Darrell, J. Malik, Rich feature hierarchies for accurate object detection and semantic segmentation, in: CVPR, 2014. [21] R. Girshick, Fast R-CNN, in: ICCV, 2015. [22] M. Elhoseiny, T. El-Gaaly, A. Bakry, A. M. Elgammal, A comparative analysis and study of multiview cnn models for joint object categorization and pose estimation, in: ICML, 2016. [23] Y. LeCun, B. E. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. E. Hubbard, L. D. Jackel, Handwritten digit recognition with a backpropagation network, in: NIPS, 1990, pp. 396–404. [24] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, C. L. Zitnick, Microsoft COCO: Common objects in context, in: ECCV, 2014. Table 8: Comparison with state-of-the-art models in the ObjectNet3D dataset. Acknowledgments This work is supported by project PREPEATE, with reference TEC2016-80326-R, of the Spanish Ministry of Economy, Industry and Competitiveness. We gratefully acknowledge the support of NVIDIA Corporation with the donation of the GPU used for this research. Cloud computing resources were kindly provided through a Microsoft Azure for Research Award. References References [1] M. Everingham, L. Van Gool, C. K. I. Williams, J. Winn, A. Zisserman, The pascal visual object classes (VOC) challenge, International Journal of Computer Vision 88 (2010) 303–338. [2] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, L. Fei-Fei, Imagenet: A large-scale hierarchical image database, in: CVPR, 2009. [3] A. Thomas, V. Ferrari, B. Leibe, T. Tuytelaars, B. Schiele, L. Van Gool, Towards multi-view object class detection, in: CVPR, 2006. [4] L. Savarese, S.and Fei-Fei, View synthesis for recognizing unseen poses of object classes, in: ECCV, 2008. [5] R. J. Lopez-Sastre, T. Tuytelaars, S. Savarese, Deformable part models revisited: A performance evaluation for object category pose estimation, in: ICCV 2011, 1st IEEE Workshop on Challenges and Opportunities in Robot Perception, 2011. [6] S. Yingze-Bao, M. Sun, S. Savarese, Toward coherent object detection and scene layout understanding, Image and Vision Computing 29 (2011) 569 – 579. [7] M. Ozuysal, V. Lepetit, P. Fua, Pose estimation for category specific multiview object localization, in: CVPR, 2009. 14 [25] K. He, X. Zhang, S. Ren, J. Sun, Deep residual learning for image recognition, in: CVPR, 2016. [26] J. Uijlings, K. van de Sande, T. Gevers, A. Smeulders, Selective search for object recognition, International Journal of Computer Vision 104 (2013) 154–171. [27] H. Su, C. R. Qi, Y. Li, L. J. Guibas, Render for CNN: Viewpoint estimation in images using CNNs trained with rendered 3d model views, in: ICCV, 2015. [28] L. Beyer, A. Hermans, B. Leibe, Biternion nets: Continuous head pose regression from discrete training labels, in: Pattern Recognition, volume 9358 of Lecture Notes in Computer Science, Springer, 2015, pp. 157–168. [29] A. Singhal, Modern information retrieval: a brief overview, BULLETIN OF THE IEEE COMPUTER SOCIETY TECHNICAL COMMITTEE ON DATA ENGINEERING 24 (2001) 2001. [30] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, T. Darrell, Caffe: Convolutional architecture for fast feature embedding, arXiv preprint arXiv:1408.5093 (2014). [31] K. Simonyan, A. Zisserman, Very deep convolutional networks for largescale image recognition, CoRR abs/1409.1556 (2014). [32] R. Pascanu, T. Mikolov, Y. Bengio, On the difficulty of training recurrent neural networks, in: ICML, 2013. [33] A. Geiger, P. Lenz, R. Urtasun, Are we ready for autonomous driving? the KITTI vision benchmark suite, in: CVPR, 2012. [34] C. Redondo-Cabrera, R. J. Lopez-Sastre, Y. Xiang, T. Tuytelaars, S. Savarese, Pose estimation errors, the ultimate diagnosis, in: ECCV, 2016. [35] P. Poirson, P. Ammirato, C. Fu, W. Liu, J. Kosecka, A. C. Berg, Fast single shot detection and pose estimation, in: 3DV, 2016. [36] Y. Xiang, W. Choi, Y. Lin, S. Savarese, Subcategory-aware convolutional neural networks for object proposals and detection, in: IEEE Winter Conference on Applications of Computer Vision, 2017. [37] R. Girshick, J. Donahue, T. Darrell, J. Malik, Rich feature hierarchies for accurate object detection and semantic segmentation, in: CVPR, 2014. [38] A. Krizhevsky, I. Sutskever, G. E. Hinton, Imagenet classification with deep convolutional neural networks, in: NIPS, 2012. 15
1cs.CV
Network Sketching: Exploiting Binary Structure in Deep CNNs Yiwen Guo1 , Anbang Yao1 , Hao Zhao2,1 , Yurong Chen1 1 Intel Labs China, 2 Department of Electronic Engineering, Tsinghua University arXiv:1706.02021v1 [cs.NE] 7 Jun 2017 {yiwen.guo,anbang.yao,hao.zhao,yurong.chen}@intel.com Abstract Convolutional neural networks (CNNs) with deep architectures have substantially advanced the state-of-the-art in computer vision tasks. However, deep networks are typically resource-intensive and thus difficult to be deployed on mobile devices. Recently, CNNs with binary weights have shown compelling efficiency to the community, whereas the accuracy of such models is usually unsatisfactory in practice. In this paper, we introduce network sketching as a novel technique of pursuing binary-weight CNNs, targeting at more faithful inference and better trade-off for practical applications. Our basic idea is to exploit binary structure directly in pre-trained filter banks and produce binaryweight models via tensor expansion. The whole process can be treated as a coarse-to-fine model approximation, akin to the pencil drawing steps of outlining and shading. To further speedup the generated models, namely the sketches, we also propose an associative implementation of binary tensor convolutions. Experimental results demonstrate that a proper sketch of AlexNet (or ResNet) outperforms the existing binary-weight models by large margins on the ImageNet large scale classification task, while the committed memory for network parameters only exceeds a little. 1. Introduction Over the past decade, convolutional neural networks (CNNs) have been accepted as the core of many computer vision solutions. Deep models trained on a massive amount of data have delivered impressive accuracy on a variety of tasks, including but not limited to semantic segmentation, face recognition, object detection and recognition. In spite of the successes, mobile devices cannot take much advantage of these models, mainly due to their inadequacy of computational resources. As is known to all, camera based games are dazzling to be operated with object recognition and detection techniques, hence it is eagerly anticipated to deploy advanced CNNs (e.g., AlexNet [15], VGG-Net [25] and ResNet [10]) on tablets and smartphones. Nevertheless, as the winner of ILSVRC-2012 com- Figure 1. Sketching a network model by exploiting binary structure within pre-trained filter banks, after which the full-precision model can be converted to an efficient one with binary (in black and light grey) connections. petition, AlexNet comes along with nearly 61 million realvalued parameters and 1.5 billion floating-point operations (FLOPs) to classify an image, making it resource-intensive in different aspects. Running it for real-time applications would require considerable high CPU/GPU workloads and memory footprints, which is prohibitive on typical mobile devices. The similar situation occurs on the deeper networks like VGG-Net and ResNet. Recently, CNNs with binary weights are designed to resolve this problem. By forcing the connection weights to only two possible values (normally +1 and −1), researchers attempt to eliminate the required floating-point multiplications (FMULs) for network inference, as they are considered to be the most expensive operations. In addition, since the real-valued weights are converted to be binary, these networks would commit much less space for storing their parameters, which leads to a great saving in the memory footprints and thus energy costs [8]. Several methods have been proposed to train such networks [1, 2, 22]. However, the reported accuracy of obtained models is unsatisfactory on large dataset (e.g., ImageNet) [22]. Even worse, since straightforwardly widen the networks does not guarantee any increase in accuracy [14], it is also unclear how we can make a trade-off between the model precision and expected accuracy with these methods. In this paper, we introduce network sketching as a new way of pursuing binary-weight CNNs, where the binary structures are exploited in pre-trained models rather than being trained from scratch. To seek the possibility of yielding state-of-the-art models, we propose two theoretical grounded algorithms, making it possible to regulate the precision of sketching for more accurate inference. Moreover, to further improve the efficiency of generated models (a.k.a., sketches), we also propose an algorithm to associatively implement binary tensor convolutions, with which the required number of floating-point additions and subtractions (FADDs)1 is likewise reduced. Experimental results demonstrate that our method works extraordinarily well on both AlexNet and ResNet. That is, with a bit more FLOPs required and a little more memory space committed, the generated sketches outperform the existing binaryweight AlexNets and ResNets by large margins, producing near state-of-the-art recognition accuracy on the ImageNet dataset. The remainder of this paper is structured as follows. In Section 2, we briefly introduce the related works on CNN acceleration and compression. In Section 3, we highlight the motivation of our method and provide some theoretical analyses for its implementations. In Section 4, we introduce the associative implementation for binary tensor convolutions. At last, Section 5 experimentally demonstrates the efficacy of our method and Section 6 draws the conclusions. appealing speedups (2× to 4×) with acceptable accuracy drop (≤ 1%). 2 Unlike the above mentioned ones, some research works regard memory saving as the top priority. To tackle the storage issue of deep networks, Gong et al. [6], Wu et al. [31] and Lin et al. [18] consider applying the quantization techniques to pre-trained CNNs, and trying to make network compressions with minor concessions on the inference accuracy. Another powerful category of methods in this scope is network pruning. Starting from the early work of LeCun et al’s [17] and Hassibi & Stork’s [9], pruning methods have delivered surprisingly good compressions on a range of CNNs, including some advanced ones like AlexNet and VGGnet [8, 26, 7]. In addition, due to the reduction in model complexity, a fair speedup can be observed as a byproduct. As a method for generating binary-weight CNNs, our network sketching is orthogonal to most of the existing compression and acceleration methods. For example, it can be jointly applied with low-rank based methods, by first decomposing the weight tensors into low-rank components and then sketching them. As for the cooperation with quantization-based methods, sketching first and conducting product quantization thereafter would be a good choice. 3. Network Sketching The deployment problem of deep CNNs has become a concern for years. Efficient models can be learnt either from scratch or from pre-trained models. Generally, training from scratch demands strong integration of network architecture and training policy [18], and here we mainly discuss representative works on the latter strategy. Early works are usually hardware-specific. Not restricted to CNNs, Vanhoucke et al. [28] take advantage of programmatic optimizations to produce a 3× speedup on x86 CPUs. On the other hand, Mathieu et al. [20] perform fast Fourier transform (FFT) on GPUs and propose to compute convolutions efficiently in the frequency domain. Additionally, Vasilache et al. [29] introduce two new FFTbased implementations for more significant speedups. More recently, low-rank based matrix (or tensor) decomposition has been used as an alternative way to accomplish this task. Mainly inspired by the seminal works from Denil et al. [4] and Rigamonti et al. [23], low-rank based methods attempt to exploit parameter redundancy among different feature channels and filters. By properly decomposing pretrained filters, these methods [5, 12, 16, 32, 19] can achieve In general, convolutional layers and fully-connected layers are the most resource-hungry components in deep CNNs. Fortunately, both of them are considered to be overparameterized [4, 30]. In this section, we highlight the motivation of our method and present its implementation details on the convolutional layers as an example. Fullyconnected layers can be operated in a similar way. Suppose that the learnable weights of a convolutional layer L can be arranged and represented as {W(i) : 0 ≤ i < n}, in which n indicates the target number of feature maps, and W(i) ∈ Rc×w×h is the weight tensor of its ith filter. Storing all these weights would require 32 × c × w × h × n bit memory, and the direct implementation of convolutions would require s × c × w × h × n FMULs (along with the same number of FADDs), in which s indicates the spatial size of target feature maps. Since many convolutional models are believed to be informational redundant, it is possible to seek their lowprecision and compact counterparts for better efficiency. With this in mind, we consider exploiting binary structures within L, by using the divide and conquer strategy. We shall first approximate the pre-trained filters with a linear span of certain binary basis, and then group the identical basis tensors to pursue the maximal network efficiency. Details 1 Without ambiguity, we collectively abbreviate floating-point additions and floating-point subtractions as FADDs. 2 Some other works concentrate on learning low-rank filters from scratch [27, 11], which is out of the scope of our paper. 2. Related Works are described in the following two subsections, in which we drop superscript (i) from W because the arguments apply to all the n weight tensors. 3.1. Approximating the Filters As claimed above, our first goal is to find a binary expansion of W that approximates it well (as P illustrated in m−1 Figure 2), which means W ≈ hB, ai = j=0 aj Bj , c×w×h×m in which B ∈ {+1, −1} and a ∈ Rm are the concatenations of m binary tensors {B0 , ..., Bm−1 } and the same number of scale factors {a0 , ..., am−1 }, respectively. We herein investigate the appropriate choice of B and a with a fixed m. Two theoretical grounded algorithms are proposed in Section 3.1.1 and 3.1.2, respectively. Figure 2. Approximate the real-valued weight tensor with a sum of scaled binary tensors. Algorithm 1 The direct approximation algorithm: Input: W: the pre-trained weight tensor, m: the desired cardinality of binary basis. Output: {Bj , aj : 0 ≤ j < m}: a binary basis and a series of scale factors. Initialize j ← 0 and Ŵj ← W. repeat Calculate Bj and aj by Equation (3). Calculate Ŵj+1 = Ŵj −aj Bj and update j ← j +1. until j reaches its maximal number m. under this circumstance, in which function sgn(·) calculates the element-wise sign of the input tensor, and t = c×w ×h. The above algorithm is summarized in Algorithm 1. It is considered to be heuristic (or greedy) in the sense that each Bj is selected to be the current optimum, regardless of whether it will preclude better approximations later on. Furthermore, some simple deductions give the following theoretical result. Theorem 1. For any m ≥ 0, Algorithm 1 achieves a reconstruction error e2 satisfying e2 ≤ kWk2 (1 − 1/t)m . 3.1.1 Direct Approximation For easy understanding, we shall first introduce the direct approximation algorithm. Generally, the reconstruction error (or approximation error, round-off error) e2 := kW − hB, aik2 should be minimized to retain the model accuracy after expansion. However, as a concrete decision problem, directly minimizing e2 seems NP-hard and thus solving it can be very time consuming [3]. In order to finish up in reasonable time, we propose a heuristic algorithm, in which Bj and aj are sequentially learnt and each of them is selected to be the current optimum with respect to the e2 minimization criterion. That is, 2 Bj , aj = arg min Ŵj − aB , (1) B∈B, a∈R in which B := {+1, −1}c×w×h , the norm operator k · k is defined as kXk := hX, Xi1/2 for any 3-D tensor X, and Ŵj indicates the approximation residue after combining all the previously generated tensor(s). In particular, Ŵj = W if j = 0, and j−1 X Ŵj = W − ak Bk (2) k=0 if j ≥ 1. It can be easily known that, through derivative calculations, Equation (1) is equivalent with Bj = sgn(Ŵj ) and aj = hBj , Ŵj i t (3) (4) Proof. Since Bj = sgn(Ŵj ), we can obtain that, X (l) hBj , Ŵj i = |ŵj | ≥ kŴj k, l (5) in which ŵj is an entry of Ŵj , with superscript (l) indicates its index. From Equation (2) and (5), we have kŴj+1 k2 = kŴj k2 − aj hBj , Ŵj i = kŴj k2 1− hBj , Ŵj i2 tkŴj k2 ! (6) ≤ kŴj k2 (1 − 1/t) . The result follows by applying Formula (6) for j varying from 0 to m − 1. 3.1.2 Approximation with Refinement We can see from Theorem 1 that, by utilizing the direct approximation algorithm, the reconstruction error e2 decays exponentially with a rate proportional to 1/t. That is, given a W with small size (i.e., when t is small), the approximation in Algorithm 1 can be pretty good with only a handful of binary tensors. Nevertheless, when t is relatively large, the reconstruction error will decrease slowly and the approximation can be unsatisfactory even with a large number of binary tensors. In this section, we propose to refine the direct approximation algorithm for better reconstruction property. Algorithm 2 Approximation with refinement: Input: W: the pre-trained weight tensor, m: the desired cardinality of binary basis. Output: {Bj , aj : 0 ≤ j < m}: a binary basis and a series of scale factors. Initialize j ← 0 and Ŵj ← W. repeat Calculate Bj and aj by Equation (3) and (7). Update j ← j + 1 and calculate Ŵj by Equation (2). until j reaches its maximal number m. Considering that, in Algorithm 1, both Bj and aj are chosen to minimize e2 with fixed counterparts. However, in most cases, it is doubtful whether B and a are optimal overall. If not, we may need to refine at least one of them for the sake of better approximation. On account of the computational simplicity, we turn to a specific case when B is fixed. That is, suppose the direct approximation has already produced B̂ and â, we hereby seek another scale vector a satisfying kW − hB̂, aik2 ≤ kW − hB̂, âik2 . To achieve this, we follow the least square regression method and get −1 T aj = BjT Bj Bj · vec(W), (7) in which the operator vec(·) gets a column vector whose elements are taken from the input tensor, and Bj gets [vec(B0 ), ..., vec(Bj )]. The above algorithm with scale factor refinement is summarized in Algorithm 2. Intuitively, the refinement operation attributes a memory-like feature to our method, and the following theorem ensures it can converge faster in comparison with Algorithm 1. Theorem 2. For any m ≥ 0, Algorithm 2 achieves a reconstruction error e2 satisfying 2 e ≤ kWk 2 m−1 Y j=0 1 1− t − λ(j, t)  , (8) in which λ(j, t) ≥ 0, for 0 ≤ j ≤ m − 1. Proof. To simplify the notations, let us further denote wj := vec(Wj ) and bj+1 := vec(Bj+1 ), then we can obtain by block matrix multiplication and inverse that,   Φ + Φψψ T Φ/r −Φψ/r T −1 (Bj+1 Bj+1 ) = , (9) −ψ T Φ/r 1/r in which Φ = (BjT Bj )−1 , ψ = BjT bj+1 , and r = bTj+1 bj+1 − ψ T Φψ. Consequently, we have the following equation for j = 0, ..., m − 1, ! Λ(bj+1 bTj+1 ) wj+1 = I − T wj , (10) bj+1 Λbj+1 by defining Λ := I − Bj ΦBjT . As we know, given positive semi-definite matrices X and Y , tr(XY ) ≤ tr(X)tr(Y ). Then, Equation (10) gives, kŴj+1 k2 ≤ kŴj k2 − = kŴj k2 − = kŴj k 2 wjT (bj+1 bTj+1 )Λ(bj+1 bTj+1 )wj (bTj+1 Λbj+1 )2 wjT (bj+1 bTj+1 )wj bTj+1 Λbj+1 1− hBj , Ŵj i2 bTj+1 Λbj+1 kŴj k2 ! . Obviously, it follows that, kŴj+1 k2 ≤ kŴj k2 (1 − 1/(t − λ(j, t))), (11) in which λ(j, t) := bTj+1 (I − Λ)bj+1 . Since λ(j, t) represents the squared Euclidean norm of an orthogonal projection of bj+1 , it is not difficult to prove λ(j, t) ≥ 0, and then the result follows. 3.2. Geometric Interpretation After expanding the pre-trained filters, we can group the identical binary tensors to save some more memory footprints. In this paper, the whole technique is named as network sketching, and the generated binary-weight model is straightforwardly called a sketch. Next we shall interpret the sketching process from a geometric point of view. For a start, we should be aware that, Equation (1) is essentially seeking a linear subspace spanned by a set of t-dimensional binary vectors to minimize its Euclidean distance to vec(W). In concept, there are two variables to be determined in this problem. Both Algorithm 1 and 2 solve it in a heuristic way, and the jth binary vector is always estimated by minimizing the distance between itself and the current approximation residue. What make them different is that, Algorithm 2 takes advantage of the linear span of its previous j−1 estimations for better approximation, whereas Algorithm 1 does not. Let us now take a closer look at Theorem 2. Compared with Equation (4) in Theorem 1, the distinction of Equation (8) mainly lies in the existence of λ(j, t). Clearly, Algorithm 2 will converge faster than Algorithm 1 as long as λ(j, t) > 0 holds for any j ∈ [0, m − 1]. Geometrically speaking, if we consider Bj (BjT Bj )−1 BjT as the matrix of an orthogonal projection onto Sj := span(b0 , ..., bj ), then λ(j, t) is equal to the squared Euclidean norm of a vector projection. Therefore, λ(j, t) = 0 holds if and only if vector bj+1 is orthogonal to Sj , or in other words, orthogonal to each element of {b0 , ..., bj } which occurs with extremely low probability and only on the condition of t ∈ {2k : k ∈ N}. That is, Algorithm 2 will probably prevail over Algorithm 1 in practice. 4. Speeding-up the Sketch Model Using Algorithm 1 or 2, one can easily get a set of mn binary tensors on L, which means the storage requirement of learnable weights is reduced by a factor of 32t/(32m + tm)×. When applying the model, the required number of FMULs is also significantly reduced, by a factor of (t/m)×. Probably, the only side effect of sketching is some increases in the number of FADDs, as it poses an extra burden on the computing units. In this section, we try to ameliorate this defect and introduce an algorithm to further speedup the binary-weight networks. We start from an observation that, yet the required number of FADDs grows monotonously with m, the inherent number of addends and augends is always fixed with a given input of L. That is, some repetitive FADDs exist in the direct implementation of binary tensor convolutions. Let us denote X ∈ Rc×w×h as an input sub-feature map and see Figure 3 for a schematic illustration. Bj1 +1 +1 −1 −1 Bj2 −1 +1 −1 +1 Bj1 ∨ Bj2 −1 0 0 +1 Table 1. Truth table of the element-wise operator ∨. Since Bj0 Y Bj1 produces ternary outputs on each index position, we can naturally regard X ∗ (Bj0 Y Bj1 ) as an iteration of switch ... case ... statements. In this manner, only the entries corresponding to ±1 in Bj0 YBj1 need to be operated in X, and thus acceleration is gained. Assuming that the inner-product of Bj0 and Bj1 equals to r, then (t − r)/2 + 1 and (t + r)/2 + 1 FADDs are still required for calculating Equation (12) and (13), respectively. Obviously, we expect the real number r ∈ [−t, +t] to be close to either t or −t for the possibility of fewer FADDs, and thus faster convolutions in our implementation. In particular, if r ≥ 0, Equation (12) is chosen for better efficiency; otherwise, Equation (13) should be chosen. 4.2. Constructing a Dependency Tree Figure 3. As highlighted in the rounded rectangles, with high probability, repetitive FADD exists in the direct implementation of binary tensor convolutions. 4.1. Associative Implementation To properly avoid redundant operations, we first present an associative implementation of the multiple convolutions X ∗ B0 , ..., X ∗ Bmn−1 on L, in which the connection among different convolutions is fully exploited. To be more specific, our strategy is to perform convolutions in a hierarchical and progressive way. That is, each of the convolution results is used as a baseline of the following calculations. Suppose the j0 -th convolution is calculated in advance and it produces X∗Bj0 = s, then the convolution of X and Bj1 can be derived by using X ∗ Bj1 = s + (X ∗ (Bj0 Y Bj1 )) × 2, (12) or alternatively, X ∗ Bj1 = s − (X ∗ (¬Bj0 Y Bj1 )) × 2, (13) in which ¬ denotes the element-wise not operator, and Y denotes an element-wise operator whose behavior is in accordance with Table 1. Our implementation works by properly rearranging the binary tensors and implementing binary tensor convolutions in an indirect way. For this reason, along with Equations (12) and (13), a dependency tree is also required to drive it. In particular, dependency is the notion that certain binary tensors are linked to specify which convolution to perform first and which follows up. For instance, with the depth-first-search strategy, T in Figure 4 shows a dependency tree indicating first to calculate X∗B1 , then to derive X ∗ B0 from the previous result, then to calculate X ∗ B3 on the base of X ∗ B0 , and so forth. By traversing the whole tree, all mn convolutions will be progressively and efficiently calculated. Figure 4. A dependency tree for our algorithm. It suggests an order under which the associative convolutions are to be performed. In fact, our algorithm works with a stochastically given tree, but a dedicated T is still in demand for its optimum performance. Let G = {V, E} be an undirected weighted graph with the vertex set V and weight matrix E ∈ Rmn×mn . Each element of V represents a single binary tensor, and each element of E measures the distance Algorithm 3 The associative implementation: Input: {Bj : 0 ≤ j < mn}: the set of binary tensors, X: the input sub-feature map, T : the dependency tree. Output: {yj : 0 ≤ j < mn}: the results of convolution. Get z = T .root and calculate yz.key = X ∗ Bz.key . Initialize the baseline value by s ← yz.key . repeat Search the next node of T and update z, s. Calculate yz.key by using Equation (12) or (13). until search ends. between two chosen tensors. To keep in line with the previous subsection, we here define the distance function of the following form   t+r t−r , , (14) d(Bj0 , Bj1 ) := min 2 2 in which r = hBj0 , Bj1 i indicates the inner-product of Bj0 and Bj1 . Clearly, the defined function is a metric on {−1, +1}c×w×h and its range is restricted in [0, t]. Recall that, we expect r to be close to ±t in the previous subsection. In consequence, the optimal dependency tree should have the shortest distance from root to each of its vertices, and thus the minimum spanning tree (MST) of G is what we want. From this perspective, we can use some off-the-shell algorithms to construct such a tree. Prim’s algorithm [21] is chosen in this paper on account of its linear time complexity with respect to |E|, i.e., O(m2 n2 ) on L. With the obtained T , one can implement our algorithm easily and the whole process is summarized in Algorithm 3. Note that, although the fully-connected layers calculate vector-matrix multiplications, they can be considered as a bunch of tensor convolutions. Therefore, in the binary case, we can also make accelerations in the fully-connected layers by using Algorithm 3. 5. Experimental Results In this section, we try to empirically analyze the proposed algorithms. For pragmatic reasons, all experiments are conducted on the famous ImageNet ILSVRC-2012 database [24] with advanced CNNs and the open-source Caffe framework [13]. The training set is comprised of 1.2 million labeled images and the test set is comprised of 50,000 validation images. In Section 5.1 and 5.2, we will test the performance of the sketching algorithms (i.e., Algorithm 1 and 2) and the associative implementation of convolutions (i.e., Algorithm 3) in the sense of filter approximation and computational efficiency, respectively. Then, in Section 5.3, we evaluate the whole-net performance of our sketches and compare them with other binary-weight models. Layer Name Conv1 Conv2 Conv3 Conv4 Conv5 Fc6 Fc7 Fc8 Filters 96 256 384 384 256 1 1 1 Params (b) ∼1M ∼10M ∼28M ∼21M ∼14M ∼1208M ∼537M ∼131M FLOPs ∼211M ∼448M ∼299M ∼224M ∼150M ∼75M ∼34M ∼8M Table 2. Details of the learnable layers in AlexNet [15], in which ”Conv2” is the most computationally expensive one and ”Fc6” commits the most memory (in bits). In all these layers, FLOPs consist of the same number of FADDs and FMULs. 5.1. Efficacy of Sketching Algorithms As a starting experiment, we consider sketching the famous AlexNet model [15]. Although it is the champion solution of ILSVRC-2012, AlexNet seems to be very resource-intensive. Therefore, it is indeed appealing to seek its low-precision and efficient counterparts. As claimed in Section 1, AlexNet is an 8-layer model with 61M learnable parameters. Layer-wise details are shown in Table 2, and the pre-trained reference model is available online 3 . Using Algorithm 1 and 2, we are able to generate binaryweight AlexNets with different precisions. Theoretical analyses have been given in Section 3, so in this subsection, we shall empirically analyze the proposed algorithms. In particular, we demonstrate in Figure 6 how ”energy” accumulates with a varying size of memory P commitment for P different approximators. Defined as 1 − e2 / kW k2 , the accumulative energy is negatively correlated with reconstruction error [32], so the faster it increases, the better. In the figure, our two algorithms are abbreviately named as ”Sketching (direct)” and ”Sketching (refined)”. To compare with other strategies, we also test the stochastically generated binary basis (named ”Sketching random”) as used in [14], and the network pruning technique [8] which is not naturally orthogonal with our sketching method. The scalar factors for ”Sketching (random)” is calculated by Equation (7) to ensure its optimal performance. We can see that, it is consistent with the theoretical result that Algorithm 1 converges much slower than Algorithm 2 on all learnable layers, making it less effective on the filter approximation task. However, on the other hand, Algorithm 1 can be better when compared with ”Sketching (random)” and the pruning technique. With small working memory, our direct approximation algorithm approximates better. However, if the memory size increases, pruning technique may converge faster to its optimum. 3 https://github.com/BVLC/caffe/tree/master/ models/bvlc_alexnet. As discussed in Section 4, parameter m balances the model accuracy and efficiency in our algorithms. Figure 6 shows that, a small m (for example 3) should be adequate for AlexNet to attain over 80% of the accumulative energy in its refined sketch. Let us take layer ”Conv5” and ”Fc6” as examples and see Table 3 for more details. Layer Name Conv2 sketch Fc6 sketch Energy (%) 82.9 94.0 Params (b) ∼0.9M ∼114M FMULs ∼560K ∼12K Table 3. With only 3 bits allocated, the refined sketch of AlexNet attains over 80% of the energy on ”Conv2” and ”Fc6”, and more than 10× reduction in the committed memory for network parameters. Meanwhile, the required number of FMULs is also extremely reduced (by 400× and ∼3000×) on the two layers. 5.2. Efficiency of Associative Manipulations The associative implementation of binary tensor manipulations (i.e., Algorithm 3) is directly tested on the 3-bit refined sketch of AlexNet. To begin with, we still focus on ”Conv2 sketch” and ”Fc6 sketch”. Just to be clear, we produce the result of Algorithm 3 with both a stochastically generated dependency tree and a delicately calculated MST, while the direct implementation results are compared as a benchmark. All the implementations require the same number of FMULs, as demonstrated in Table 3, and significantly different number of FADDs, as compared in Table 4. Note that, in the associative implementations, some logical evaluations and ×2 operations are specially involved. Nevertheless, they are much less expensive than the FADDs and FMULs [22], by at least an order of magnitude. Hence, their cost are not deeply analyzed in this subsection 4 . Implementation Direct Associative (random) Associative (MST) Conv2 sketch ∼672M ∼328M ∼265M Fc6 sketch ∼113M ∼56M ∼49M Table 4. The associative implementation remarkably reduces the required number of FADDs on ”Conv2 sketch” and ”Fc6 sketch”. From the above table, we know that our associative implementation largely reduces the required number of FADDs on ”Conv2 sketch” and ”Fc6 sketch”. That is, it properly ameliorates the adverse effect of network sketching and enables us to evaluate the 3-bit sketch of AlexNet without any unbearably increase in the required amount of computation. In addition, the MST helps to further improve its performance and finally get ∼2.5× and ∼ 2.3× reduc4 Since the actual speedups varies dramatically with the architecture of processing units, so we will not measure it in the paper. Figure 5. The associative implementation of binary tensor convolutions helps to gain 2× to 3× reductions in the required number of FADDs on all learnable layers of ”AlexNet sketch”. tions on the two layers respectively. Results on all learnable layers are summarized in Figure 5. 5.3. Whole-net Performance Having tested Algorithm 1, 2 and 3 on the base of their own criteria, it is time to compare the whole-net performance of our sketch with that of other binary weight models [1, 22]. Inspired by the previous experimental results, we still use the 3-bit (direct and refined) sketches for evaluation, as they are both very efficient and accurate. Considering that the fully-connected layers of AlexNet contain more than 95% of its parameters, we should try sketching them to an extreme, namely 1 bit. Similar with Rastegari et al. [22], we also keep the ’fc8’ layer (or say, the output layer) to be of its full precision and report the top-1 and top5 inference accuracies. However, distinguished from their methods, we sketch the ’conv1’ layer as well because it is also compute-intensive (as shown in Table 1). Model Reference Sketch (ref.) Sketch (dir.) BWN [22] BC [1] Params (b) ∼1951M ∼193M ∼193M ∼190M ∼189M Top-1 (%) 57.2 55.2 54.4 53.8 35.4 Top-5 (%) 80.3 78.8 78.1 77.0 61.0 Table 5. Network sketching technique generates binary-weight AlexNets with the ability to make faithful inference and roughly 10.1× fewer parameters than its reference (in bits). Test accuracies of the competitors are cited from the paper. An updated version of BWN gains significantly improved accuracies (top-1: 56.8% and top-5: 79.4%), but the technical improvement seems unclear. Just to avoid the propagation of reconstruction errors, we need to somehow fine-tune the generated sketches. Naturally, there are two protocols to help accomplish this task; one is known as projection gradient descent and the other is stochastic gradient descent with full precision weight update [1]. We choose the latter by virtue of its better convergency. The training batch size is set as 256 and the momentum is 0.9. We let the learning rate drops every 20,000 iterations from 0.001, which is one tenth of the original Figure 6. Network sketching approximates AlexNet well enough with a much smaller amount of committed memory, and the refinement operation helps to achieve better convergency on all of its learnable layers. value as set in Krizhevsky et al.’s paper [15], and use only the center crop for accuracy evaluation. After totally 70,000 iterations (i.e., roughly 14 epochs), our sketches can make faithful inference on the test set, and the refined model is better than the direct one. As shown in Table 5, our refined sketch of AlexNet achieves a top-1 accuracy of 55.2% and a top-5 accuracy of 78.8%, which means it outperforms the recent released models in the name of BinaryConnect (BC) [1] and Binary-Weight Network (BWN) [22] by large margins, while the required number of parameters only exceeds a little bit. Network pruning technique also achieves compelling results on compressing AlexNet. However, it demands a lot of extra space for storing parameter indices, and more importantly, even the optimal pruning methods perform mediocrely on convolutional layers [8, 7]. In contrast, network sketching works sufficiently well on both of the layer types. Here we also testify its efficacy on ResNet [10]. Being equipped with much more convolutional layers than that of AlexNet, ResNet wins the ILSVRC-2015 classification competition. There are many instantiations of its architecture, and for fair comparisons, we choose the type B version of 18 layers (as with Rastegari et al. [22]). A pre-trained Torch model is available online 5 and we convert it into an equivalent Caffe model before sketching 6 . For the fine-tuning process, we set the training batch size as 64 and let the learning rate drops from 0.0001. After 200,000 iterations (i.e., roughly 10 epochs), the generated 5 https://github.com/facebook/fb.resnet.torch/ tree/master/pretrained. 6 https://github.com/facebook/fb-caffe-exts. sketch represents a top-1 accuracy of 67.8% and a top-5 accuracy of 88.4% on ImageNet dataset. Refer to Table 6 for a comparison of the classification accuracy of different binary-weight models. Model Reference Sketch (ref.) Sketch (dir.) BWN [22] Params (b) ∼374M ∼51M ∼51M ∼28M Top-1 (%) 68.8 67.8 67.3 60.8 Top-5 (%) 89.0 88.4 88.2 83.0 Table 6. Network sketching technique generates binary-weight ResNets with the ability to make faithful inference and roughly 7.4× fewer parameters than its reference (in bits). The test accuracies of BWN are directly cited from its paper. 6. Conclusions In this paper, we introduce network sketching as a novel technology for pursuing binary-weight CNNs. It is more flexible than the current available methods and it enables researchers and engineers to regulate the precision of generated sketches and get better trade-off between the model efficiency and accuracy. Both theoretical and empirical analyses have been given to validate its efficacy. Moreover, we also propose an associative implementation of binary tensor convolutions to further speedup the sketches. After all these efforts, we are able to generate binary-weight AlexNets and ResNets with the ability to make both efficient and faithful inference on the ImageNet classification task. Future works shall include exploring the sketching results of other CNNs. References [1] M. Courbariaux, Y. Bengio, and J.-P. David. BinaryConnect: Training deep neural networks with binary weights during propagations. In Advances in Neural Information Processing Systems (NIPS), 2015. [2] M. Courbariaux, I. Hubara, D. Soudry, R. El-Yaniv, and Y. Bengio. Binarized neural networks: Training deep neural networks with weights and activations constrained to +1 or -1. In arXiv preprint arXiv:1602.02830, 2016. [3] G. Davis, S. Mallat, and M. Avellaneda. Adaptive greedy approximations. Constructive approximation, 13(1):57–98, 1997. [4] M. Denil, B. Shakibi, L. Dinh, M. Ranzato, and N. d. Freitas. Predicting parameters in deep learning. In Advances in Neural Information Processing Systems (NIPS), 2013. [5] E. L. Denton, W. Zaremba, J. Bruna, Y. LeCun, and R. Fergus. Exploiting linear structure within convolutional networks for efficient evaluation. In Advances in Neural Information Processing Systems (NIPS), 2014. [6] Y. Gong, L. Liu, M. Yang, and L. Bourdev. Compressing deep convolutional networks using vector quantization. arXiv preprint arXiv:1412.6115, 2014. [7] Y. Guo, A. Yao, and Y. Chen. Dynamic network surgery for efficient DNNs. In Advances in Neural Information Processing Systems (NIPS), 2016. [8] S. Han, J. Pool, J. Tran, and W. J. Dally. Learning both weights and connections for efficient neural networks. In Advances in Neural Information Processing Systems (NIPS), 2015. [9] B. Hassibi and D. G. Stork. Second order derivatives for network pruning: Optimal brain surgeon. In Advances in Neural Information Processing Systems (NIPS), 1993. [10] K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016. [11] Y. Ioannou, D. Robertson, J. Shotton, R. Cipolla, and A. Criminisi. Training CNNs with low-rank filters for efficient image classification. In International Conference on Learning Representations (ICLR), 2016. [12] M. Jaderberg, A. Vedaldi, and A. Zisserman. Speeding up convolutional neural networks with low rank expansions. In British Machine Vision Conference (BMVC), 2014. [13] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. In ACM Multimedia Conference (MM), 2014. [14] F. Juefei-Xu, V. N. Boddeti, and M. Savvides. Local binary convolutional neural networks. arXiv preprint arXiv:1608.06049, 2016. [15] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems (NIPS), 2012. [16] V. Lebedev, Y. Ganin, M. Rakhuba, I. Oseledets, and V. Lempitsky. Speeding-up convolutional neural networks using fine-tuned CP-decomposition. arXiv preprint arXiv:1412.6553, 2014. [17] Y. LeCun, J. S. Denker, S. A. Solla, R. E. Howard, and L. D. Jackel. Optimal brain damage. In Advances in Neural Information Processing Systems (NIPS), 1989. [18] D. D. Lin, S. S. Talathi, and V. S. Annapureddy. Fixed point quantization of deep convolutional networks. In International Conference on Machine Learning (ICML), 2016. [19] B. Liu, M. Wang, H. Foroosh, M. Tappen, and M. Pensky. Sparse convolutional neural networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015. [20] M. Mathieu, M. Henaff, and Y. LeCun. Fast training of convolutional networks through FFTs. arXiv preprint arXiv:1312.5851, 2013. [21] R. C. Prim. Shortest connection networks and some generalizations. Bell system technical journal, 36(6):1389–1401, 1957. [22] M. Rastegari, V. Ordonez, J. Redmon, and A. Farhadi. XNOR-Net: Imagenet classification using binary convolutional neural networks. arXiv preprint arXiv:1603.05279v2, 2016. [23] R. Rigamonti, A. Sironi, V. Lepetit, and P. Fua. Learning separable filters. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2013. [24] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, and L. Fei-Fei. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision (IJCV), 115(3):211–252, 2015. [25] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In International Conference on Learning Representations (ICLR), 2014. [26] S. Srinivas and R. V. Babu. Data-free parameter pruning for deep neural networks. In British Machine Vision Conference (BMVC), 2015. [27] C. Tai, T. Xiao, Y. Zhang, X. Wang, and W. E. Convolutional neural networks with low-rank regularization. In International Conference on Learning Representations (ICLR), 2016. [28] V. Vanhoucke, A. Senior, and M. Z. Mao. Improving the speed of neural networks on CPUs. In Deep Learning and Unsupervised Feature Learning Workshop, Advances in Neural Information Processing Systems (NIPS Workshop), 2011. [29] N. Vasilache, J. Johnson, M. Mathieu, S. Chintala, S. Piantino, and Y. LeCun. Fast convolutional nets with fbfft: A GPU performance evaluation. In International Conference on Learning Representations (ICLR), 2015. [30] A. Veit, M. Wilber, and S. Belongie. Residual networks are exponential ensembles of relatively shallow networks. In Advances in Neural Information Processing Systems (NIPS), 2016. [31] J. Wu, C. Leng, Y. Wang, Q. Hu, and J. Cheng. Quantized convolutional neural networks for mobile devices. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2016. [32] X. Zhang, J. Zou, X. Ming, K. He, and J. Sun. Efficient and accurate approximations of nonlinear convolutional networks. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015.
9cs.NE
arXiv:1710.00892v1 [cs.LG] 2 Oct 2017 Rényi Differential Privacy Mechanisms for Posterior Sampling Joseph Geumlek University of California, San Diego [email protected] Shuang Song University of California, San Diego [email protected] Kamalika Chaudhuri University of California, San Diego [email protected] October 4, 2017 Abstract With the newly proposed privacy definition of Rényi Differential Privacy (RDP) in [15], we re-examine the inherent privacy of releasing a single sample from a posterior distribution. We exploit the impact of the prior distribution in mitigating the influence of individual data points. In particular, we focus on sampling from an exponential family and specific generalized linear models, such as logistic regression. We propose novel RDP mechanisms as well as offering a new RDP analysis for an existing method in order to add value to the RDP framework. Each method is capable of achieving arbitrary RDP privacy guarantees, and we offer experimental results of their efficacy. 1 Introduction As data analysis continues to expand and permeate ever more facets of life, the concerns over the privacy of one’s data grow too. Many results have arrived in recent years to tackle the inherent conflict of extracting usable knowledge from a data set without over-extracting or leaking the private data of individuals. Before one can strike a balance between these competing goals, one needs a framework by which to quantify what it means to preserve an individual’s privacy. Since 2006, Differential Privacy (DP) has reigned as the privacy framework of choice [6]. It quantifies privacy by measuring how indistinguishable the mechanism is across whether or not any one individual is in or out of the data set. This gave not just privacy semantics, but also robust mathematical guarantees. However, the requirements have been cumbersome for utility, leading to many proposed relaxations. One common relaxation is approximate DP, which allows arbitrarily bad events to occur with probability at most δ. A more recent relaxation is Rényi Differential Privacy (RDP) proposed in [15], which uses the measure of Rényi divergences to smoothly vary between bounding the average and maximum privacy loss. However, RDP has very few mechanisms compared to the more established approximate DP. We expand the RDP repertoire with novel 1 mechanisms inspired by Rényi divergences, as well as re-analyzing an existing method in this new light. Inherent to DP and RDP is that there must be some uncertainty in the mechanism; they can not be deterministic. Many privacy methods have been motivated by exploiting pre-existing sources of randomness in machine learning algorithms. One promising area has been Bayesian data analysis, which focuses on maintaining and tracking the uncertainty within probabilistic models. Posterior sampling is prevalent in many Bayesian methods, serving to introduce randomness that matches the currently held uncertainty. We analyze the privacy arising from posterior sampling as applied to two domains: sampling from exponential family and Bayesian logistic regression. Along with these analyses, we offer tunable mechanisms that can achieve stronger privacy guarantees than directly sampling from the posterior. These mechanisms work via controlling the relative strength of the prior in determining the posterior, building off the common intuition that concentrated prior distributions can prevent overfitting in Bayesian data analysis. We experimentally validate our new methods on synthetic and real data. 2 2.1 Background Privacy Model. We say two data sets X and X0 are neighboring if they differ in the private record of a single individual or person. We use n to refer to the number of records in the data set. Definition 1. Differential Privacy (DP) [6]. A randomized mechanism A(X) is said to be (, δ)differentially private if for any subset U of the output range of A and any neighboring data sets X and X0 , we have p(A(X) ∈ U ) ≤ exp () p(A(X0 ) ∈ U ) + δ. DP is concerned with the difference the participation of a individual might have on the output distribution of the mechanism. When δ > 0, it is known as approximate DP while the δ = 0 case is known as pure DP. The requirements for DP can be phrased in terms of a privacy loss variable, a random variable that captures the effective privacy loss of the mechanism output. Definition 2. Privacy Loss Variable [2]. We can define a random variable Z that measures the privacy loss of a given output of a mechanism across two neighboring data sets X and X0 . Z = log p(A(X) = o) p(A(X0 ) = o) (1) o∼A(X) (, δ)-DP is the requirement that for any two neighboring data sets Z ≤  with probability at least 1 − δ. The exact nature of the trade-off and semantics between  and δ is subtle, and choosing them appropriately is difficult. For example, setting δ = 1/n permits (, δ)-DP mechanisms that always violate the privacy of a random individual. However, there are other ways to specify that a random variable is mostly small. One such way is to bound the Rényi divergence of A(X) and A(X0 ). Definition 3. Rényi Divergence [2]. The Rényi divergence of order λ between the two distributions P and Q is defined as Z 1 Dλ (P ||Q) = log P (o)λ Q(o)1−λ do. (2) λ−1 2 As λ → ∞, Rényi divergence becomes the max divergence; moreover, setting P = A(X) and 1 Q = A(X0 ) ensures that Dλ (P ||Q) = λ−1 log EZ [e(λ−1)Z ], where Z is the privacy loss variable. Thus, a bound on the Rényi divergence over all orders λ ∈ (0, ∞) is equivalent to (, 0)-DP, and as λ → 1, this approaches the expected value of Z equal to KL(A(X)||A(X0 )). This leads us to Rényi Differential Privacy, a flexible privacy notion that covers this intermediate behavior. Definition 4. Rényi Differential Privacy (RDP) [15]. A randomized mechanism A(X) is said to be (λ, )-Rényi differentially private if for any neighboring data sets X and X0 we have Dλ (A(X)||A(X0 )) ≤ . The choice of λ in RDP is used to tune how much concern is placed on unlikely large values of Z versus the average value of Z. One can consider a mechanism’s privacy as being quantified by the entire curve of  values associated with each order λ, but the results of [15] show that almost identical results can be achieved when this curve is known at only a finite collection of possible λ values. 2.2 Posterior Sampling. In Bayesian inference, we have a model class Θ, and are given observations x1 , . . . , xn assumed to be drawn from a θ ∈ Θ. Our goal is to maintain our beliefs about θ given the observational data in the form of the posterior distribution p(θ|x1 , . . . , xn ). This is often done in the form of drawing samples from the posterior. Our goal in this paper is to develop privacy preserving mechanisms for two popular and simple posterior sampling methods. The first is sampling from the exponential family posterior, which we address in Section 3; the second is sampling from posteriors induced by a subset of Generalized Linear Models, which we address in Section 4. 2.3 Related Work. Differential privacy has emerged as the gold standard for privacy in a number of data analysis applications – see [8, 16] for surveys. Since enforcing pure DP sometimes requires the addition of high noise, a number of relaxations have been proposed in the literature. The most popular relaxation is approximate DP [6], and a number of uniquely approximate DP mechanisms have been designed by [1, 3, 7, 17] among others. However, while this relaxation has some nice properties, recent work [13, 15] has argued that it can also lead privacy pitfalls in some cases. Approximate differential privacy is also related to, but is weaker than, the closely related δ-probabilistic privacy [12] and (1, , δ)-indistinguishability [4]. Our privacy definition of choice is Rényi differential privacy [15], which is motivated by two recent relaxations – concentrated DP [9] and z-CDP [2]. Concentrated DP has two parameters, µ and τ , controlling the mean and concentration of the privacy loss variable. Given a privacy parameter α, z-CDP essentially requires (λ, αλ)-RDP for all λ. While [2, 9, 15] establish tighter bounds on the privacy of existing differentially private and approximate DP mechanisms, we provide mechanisms based on posterior sampling from exponential families that are uniquely RDP. RDP is also a generalization of the notion of KL-privacy [20], which has been shown to be related to generalization in machine learning. There has also been some recent work on privacy properties of Bayesian posterior sampling; however most of the work has focused on establishing pure or approximate DP. [5] establishes 3 conditions under which some popular Bayesian posterior sampling procedures directly satisfy pure or approximate DP. [19] provides a pure DP way to sample from a posterior that satisfies certain mild conditions by raising the temperature. [10, 21] provide a simple statistically efficient algorithm for sampling from exponential family posteriors. [14] shows that directly sampling from the posterior of certain GLMs, such as logistic regression, with the right parameters provides approximate differential privacy. While our work draws inspiration from all [5, 14, 19], the main difference between their and our work is that we provide RDP guarantees. 3 RDP Mechanisms based on Exponential Family Posterior Sampling In this section, we analyze the Rényi divergences between distributions from the same exponential family, which will lead to our RDP mechanisms for sampling from exponential family posteriors. 3.1 Background: Exponential Families This section will give a in-depth explanation of exponential families and the properties of them we exploit in our analysis. An exponential family is a family of probability distributions over x ∈ X indexed by the parameter θ ∈ Θ ⊆ Rd that can be written in this canonical form for some choice of functions h : X → R, S : X → Rd , and A : Θ → R: ! n n Y X S(xi )) · θ − n · A(θ) . (3) p(x1 , . . . , xn |θ) = ( h(xi ))exp ( i=1 i=1 We call h the base measure, S the sufficient statistics of x, and A as the log-partition function of this family. Note that the data {x1 , . . . , xn } interact with the parameter θ solely through the dot product of θ and the sum of their sufficient statistics. When the parameter θ is used in this dot product unmodified (as in (3)), we call this a natural parameterization. Our analysis will be restricted to the families that satisfy the following two properties: Definition 5. An exponential family is minimal if the coordinates of the function S are not almost surely linearly dependent, and the interior of Θ is non-empty. Definition 6. For any for ∆ ∈ R, an exponential family is ∆-bounded if ∆ ≥ sup ||S(x) − S(y)||. (4) x,y∈X This constraint can be relaxed with some caveats explored in the appendix. When a family is minimal, the R log-partition function A has many interesting characteristics. It can be defined as A(θ) = log X h(x)exp (S(x) · θ) dx, and serves to normalize the distribution. Its derivatives form the cumulants of the distribution, that is to say ∇A(θ) = κ1 = Ex|θ [S(x)] and ∇2 A(θ) = κ2 = Ex|θ [(S(x) − κ1 )(S(x) − κ1 )| ]. This second cumulant is also the covariance of S(x), which demonstrates that A(θ) must be a convex function since covariances must be positive semidefinite. 4 In Bayesian data analysis, we are interested in finding our posterior distribution over the parameter θ that generated the data. We must introduce a prior distribution p(θ|η) to describe our initial beliefs on θ, where η is a parameterization of our family of priors. p(θ|x1 , . . . , xn , η) ∝ p(x1 , . . . , xn |θ)p(θ|η) ∝( n Y h(xi ))exp ( i=1 n X (5) ! S(xi )) · θ − n · A(θ) p(θ|η) (6) i=1 ! n X ∝ exp ( S(xi ), n) · (θ, −A(θ)) p(θ|η) (7) i=1 (8) Qn Notice that we can ignore the ( i=1 h(xi )) as it is a constant that will be normalized out. If we let our prior take the form of another exponential family p(θ|η) = exp (T (θ) · η − B(η)) where R T (θ) = (θ, −A(θ)) and B(η) = log Θ exp (T (θ) · η) dθ, the we can perform these manipulations, n X p(θ|x1 , . . . , xn , η) ∝ exp ( S(xi ), n) · T (θ) + η · T (θ) − B(η) ! (9) i=1 !   n X ∝ exp η+( S(xi ), n) · T (θ) − B(η) (10) i=1 and see that expression (10) can be written as p(θ|η 0 ) = exp (T (θ) · η 0 − C(η 0 )) (11) Pn where η 0 = η + i=1 (S(xi ), 1) and C(η 0 ) is chosen such that the distribution is normalized. This family of posteriors is precisely the same exponential family that we chose for our prior. We call this a conjugate P prior, and it offers us an efficient way of finding the parameter of our posterior: n ηposterior = ηprior + i=1 (S(xi ), 1). Within this family, T (θ) forms the sufficient statistics of θ, and the derivatives of C(η) give the cumulants of these sufficient statistics. Beta-Bernoulli System. A specific example of an exponential family that we will be interested in is the Beta-Bernoulli system, where an individual’s data is a single i.i.d. bit modeled as a Bernoulli variable with parameter ρ, along with a Beta conjugate prior. p(x1 , . . . , xn |ρ) = n Y ρxi (1 − ρ)1−xi (12) i=1 ρ Letting θ = log( 1−ρ ) and A(θ) = log(1 + exp (θ)) = − log(1 − ρ) , we can rewrite the equation as follows: 5 p(x1 , . . . , xn |ρ) = n Y ( i=1 ρ xi ) (1 − ρ) 1−ρ n X ρ = exp xi log( ) + log(1 − ρ) 1 − ρ i=1 ! n X = exp ( xi ) · θ − A(θ) . (13) ! (14) (15) i=1 This system satisfies the properties we require, as this natural parameterization with θ is both minimal and ∆-bounded for ∆ = 1. As our mechanisms are interested mainly in the posterior, the rest of this section will be written with respect the family specified by equation (11). Now that we have the notation for our distributions, we can write out the expression for the Rényi divergence of two posterior distributions P and Q (parameterized by ηP and ηQ ) from the same exponential family. This expression allows us to directly compute the Rényi divergences of posterior sampling methods, and forms the crux of the analysis of our exponential family mechanisms. Observation 7. Let P and Q be two posterior distributions from the same exponential family that are parameterized by ηP and ηQ . Then, 1 log Dλ (P ||Q) = λ−1 Z ! P (θ)λ Q(θ)1−λ dθ = Θ C(ληP + (1 − λ)ηQ ) − λC(ηP ) + C(ηQ ). (16) λ−1 To help analyze the implication of equation (16) for Rényi Differential Privacy, we define some sets of prior/posterior parameters η that arise in our analysis. R Definition 8. We say a posterior parameter η is normalizable if C(η) = log Θ exp (T (θ) · η)) dθ is finite. Let E denote the set of all normalizable η for the conjugate prior family. Definition 9. Let pset(η0 , n) be the convex hull of all parameters η of the form η0 + n(S(x), 1) for x ∈ X . When n is an integer this represents the hull of possible posterior parameters after observing n data points starting with the prior η0 . Definition 10. Let Dif f be the difference set for the family, where Dif f is the convex hull of all vectors of the form (S(x) − S(y), 0) for x, y ∈ X . Definition 11. Two posterior parameters η1 and η2 are neighboring iff η1 − η2 ∈ Dif f . They are r-neighboring iff (η1 − η2 )/r ∈ Dif f . 3.2 Mechanisms and Privacy Guarantees We begin with our simplest mechanism, Direct Sampling, which samples according to the true posterior. This mechanism is presented as Algorithm 1. Even though Algorithm 1 is generally not differentially private [5], Theorem A.3 suggests that it offers RDP for ∆-bounded exponential families and certain orders λ. 6 Algorithm 1 Direct Posterior Require: η0 , {x1 , . . . , xn } Pn 1: Sample θ ∼ p(θ|η 0 ) where η 0 = η0 + i=1 (S(xi ), 1) Theorem 12. For a ∆-bounded minimal exponential family of distributions p(x|θ) with continuous log-partition function A(θ), there exists λ∗ ∈ (1, ∞] such Algorithm 1 achieves (λ, (η0 , n, λ))-RDP for λ < λ∗ . λ∗ is the supremum over all λ such that all η in the set η0 + (λ − 1)Dif f are normalizable. Corollary 1. For the Beta-Bernoulli system with a prior Beta(α0 , β0 ), Algorithm 1 achieves (λ, )-RDP iff λ > 1 and λ < 1 + min(α0 , β0 ). Notice the implication of Corollary 1: for any η0 and n > 0, there exists finite λ such that direct posterior sampling does not guarantee (λ, )-RDP for any finite . This also prevents (, 0)-DP as an achievable goal as well. Algorithm 1 is inflexible; it offers us no way to change the privacy guarantee. This motivates us to propose two different modifications to Algorithm 1 that are capable of achieving arbitrary privacy parameters. Algorithm 2 modifies the contribution of the data X to the posterior by introducing a coefficient r, while Algorithm 3 modifies the contribution of the prior η0 by introducing a coefficient m. These simple ideas have shown up before in variations: [19] introduces a temperature scaling that acts similarly to r, while [5, 14] analyze concentration constraints for prior distributions much like our coefficient m. Algorithm 2 Diffused Posterior Require: η0 , {x1 , . . . , xn }, , λ 1: Find r ∈ (0, 1] such that ∀r-neighboring ηP , ηQ ∈ pset(η0 , rn), Dλ (p(θ|ηP )||p(θ|ηQ )) ≤  Pn 2: Sample θ ∼ p(θ|η 0 ) where η 0 = η0 + r i=1 (S(xi ), 1) Theorem 13. For any ∆-bounded minimal exponential family with prior η0 in the interior of E, any λ > 1, and any  > 0, there exists r∗ ∈ (0, 1] such that using r ∈ (0, r∗ ] in Algorithm 2 will achieve (λ, )-RDP. Algorithm 3 Concentrated Posterior Require: η0 , {x1 , . . . , xn }, , λ 1: Find m ∈ (0, 1] such that ∀ neighboring ηP , ηQ ∈ pset(η0 /m, n), Dλ (p(θ|ηP )||p(θ|ηQ )) ≤  Pn 2: Sample θ ∼ p(θ|η 0 ) where η 0 = η0 /m + i=1 (S(xi ), 1) Theorem 14. For any ∆-bounded minimal exponential family with prior η0 in the interior of E, any λ > 1, and any  > 0, there exists m∗ ∈ (0, 1] such that using m ∈ (0, m∗ ] in Algorithm 3 will achieve (λ, )-RDP. Theorems 13 and 14 can be interpreted as demonstrating that any RDP privacy level can be achieved by setting r or m arbitrarily close to zero. A small r implies a weak contribution from the data, while a small m implies a strong prior that outweighs the contribution from the data. Setting 7 r = 1 and m = 1 reduces to Algorithm 1, in which a sample is released from the true posterior without any modifications for privacy. We have not yet specified how to find the appropriate values of r or m, and the condition requires checking the supremum of divergences across the possible pset range of parameters arising as posteriors. However, with an additional assumption this supremum of divergences can be efficiently computed. Theorem 15. Let e(ηP , ηQ , λ) = Dλ (p(θ|ηP )||p(θ|ηQ )). For a fixed λ and fixed ηP , the function e is a convex function over ηQ . If for any direction v ∈ Dif f , the function gv (η) = v | ∇2 C(η)v is convex over η, then for a fixed λ, the function fλ (ηP ) = supηQ r−neighboring ηP e(ηP , ηQ , λ) is convex over ηP in the directions spanned by Dif f . Corollary 2. The Beta-Bernoulli system satisfies the conditions of Theorem 15 since the functions gv (η) have the form (v (1) )2 (ψ1 (η (1) )+ψ1 (η (2) −η (1) )), and ψ1 is the digamma function. Both pset and Dif f are defined as convex sets. The expression supr−neighboring ηP ,ηQ ∈pset(η0 ,n) Dλ (p(θ|ηP )||p(θ|ηQ )) is therefore equivalent to the maximum of Dλ (p(θ|ηP )||p(θ|ηQ )) where ηP ∈ η0 + {(0, n), (n, n)} and ηQ ∈ ηP ± (r, 0). The higher dimensional Dirichlet-Categorical system also satsifies the conditions of Theorem 15. This result is located in the appendix. We can do a binary search over (0, 1] to find an appropriate value of r or m. At each candidate value, we only need to consider the boundary situations to evaluate whether this value achieves the desired RDP privacy level. These boundary situations depend on the choice of model, and not the data size n. For example, in the Beta-Bernoulli system, evaluating the supremum involves calculating the Rényi diverengence across at most 4 pairs of distributions, as in Corollary 2. In the d dimensional Dirichlet-Categorical setting, there are O(d3 ) distribution pairs to evaluate. Eventually, the search process is guaranteed to find a non-zero choice for r or m that achieves the desired privacy level, although the utility optimality of this choice is not guaranteed. If stopped early and none of the tested candidate values satisfy the privacy constraint, the analyst can either continue to iterate or decide not to release anything. 3.3 Extension: Public Data for Exponential Families The use of a conjugate prior makes the interaction of observed data versus the prior easy to see. The prior η0 can be expressed as (αχ, α), where χ is a vector expressing the average sufficient statistics of pseudo-observations and α represents a count of these pseudo-observations. After witnessing the n data points, the posterior becomes a prior that has averaged the data sufficient statistics into a new χ and added n to α. If the data analyst had some data in addition to X that was not privacy sensitive, perhaps from a stale data set for which privacy requirements have lapsed, then this data can be used to form a better prior for the analysis. Not only would this improve utility by adding information that can be fully exploited, it would also in most cases improve the privacy guarantees as well. A stronger prior, especially a prior farther from the boundaries where C(η) becomes infinite, will lead to smaller Rényi divergences. This is effectively the same behavior as the Concentrated Sampling mechanism, which scales the prior to imagine more pseudo-observations had been seen. This also could apply to settings in which the 8 analyst can adaptively pay to receive non-private data, since this method will inform us once our prior formed from this data becomes strong enough to sample directly at our desired RDP level. This also carries another privacy implication for partial data breaches. If an adversary learns the data of some individuals in the data set, the Direct Sampling mechanism’s privacy guarantee for the remaining individuals can actually improve. Any contributions of the affected individuals to the posterior become in effect yet more public data placed in the prior. The privacy analysis and subsequent guarantees will match the setting in which this strengthened prior was used. 3.4 Extension: Releasing the result of a Statistical Query Here we are given a sensitive database X = {x1 , . . . , xn } and a predicate φ(·) which maps each xi into thePinterval [0, 1]. Our goal is to release a Rényi DP approximation to the quantity: n F (X) = n1 i=1 φ(xi ). Observe that directly releasing F (X) is neither DP nor Rényi DP, since this is a deterministic algorithm; our goal is to release a random sample from a suitable distribution so that the output is as close to F (X) as possible. The task of releasing a privatized result of a statistical query can be embedded into our BetaBernoulli system. This allows the privatized statistical query release to be done using either Algorithm 2 or Algorithm 3. We can extend the Beta-Bernoulli model to allow the sufficient statistics S(x) to range over the interval [0, 1] instead of just the discrete set {0, 1}. This alteration still results in a ∆-bounded exponential family, and the privacy results hold. The sampled posterior will be a Beta distribution that will concentrate around the mean of the data observations and the pseudo-observations of the prior. The process is described in the Beta-Sampled Statistical Query algorithm. The final transformation maps the natural parameter θ ∈ (−∞, ∞) onto the mean of the distribution ρ ∈ (0, 1). Algorithm 4 Beta-Sampled Statistical Query Require: η0 , {x1 , . . . , xn }, f, , λ 1: Compute Xf = {f (x1 ), . . . , f (xn )}. 2: Sample θ via Algorithm 2 or Algorithm 3 applied to Xf with η0 , , and λ. exp(θ) 3: Release ρ = 1+exp(θ) . 4 RDP for Generalized Linear Models with Gaussian Prior In this section, we reinterpret some existing algorithms in [14] in the light of RDP, and use ideas from [14] to provide new RDP algorithms for posterior sampling for a subset of generalized linear models with Gaussian priors. 4.1 Background: Generalized Linear Models (GLMs) The goal of generalized linear models (GLMs) is to predict an outcome y given an input vector x; y is assumed to be generated from a distribution in the exponential family whose mean depends on x through E [y|x] = g −1 (w> x), where w represents the weight of linear combination of x, and g is 9 called the link function. For example, in logistic regression, the link function g is logit and g −1 is the sigmoid function; and in linear regression, the link functions is the identity function. Learning in GLMs means learning the actual linear combination w.  Specifically, the likelihood of y given x can be written as p(y|w, x) = h(y)exp yw> x − A(w> x) , where x ∈ X , y ∈ Y, A is the log-partition function, and h(y) the scaling constant. Given a dataset D = {(x1 , y1 ), . . . , (xn , yn )} of n examples with xi ∈ X and Qyni ∈ Y, our goal is to learn the parameter w. Let p(D|w) denote p({y1 , . . . , yn }|w, {x1 , . . . , xn }) = i=1 p(yi |w, xi ). We set the prior p(w) as a multivariate Gaussian distribution with covariance Σ = (nβ)−1 I, i.e., p(w) ∼ N (0, (nβ)−1 I). The posterior distribution of w given D can be written as   n nβkwk2 Y p(D|w)p(w) R ∝ exp − p(w|D) = p(yi |w, xi ). (17) 2 p(D|w0 )p(w0 )dw0 Rd i=1 4.2 Mechanisms and Privacy Guarantees First, we introduce some assumptions that characterize the subset of GLMs and the corresponding training data on which RDP can be guaranteed. Assumption 1. 1. X is a bounded domain such that kxk2 ≤ c for all x ∈ X , and xi ∈ X for all (xi , yi ) ∈ D. 2. Y is a bounded domain such that Y ⊆ [ymin , ymax ], and yi ∈ Y for all (xi , yi ) ∈ D.. 3. g −1 has bounded range such that g −1 ∈ [γmin , γmax ]. Then, let B = max{|ymin − γmax |, |ymax − γmin |}. Example: Binary Regression with Bounded X Binary regression is used in the case where y takes value Y = {0, 1}. There arethree common types of binary regression, logistic regression with g −1 (w> x) = 1/(1 + exp −w> x ), probit regression with g −1 (w> x) = Φ(w> x) where Φ  is the Gaussian cdf, and complementary log-log regression with g −1 (w> x) = 1 − exp −exp w> x . In these three cases, Y = {0, 1}, g −1 has range (0, 1) and thus B = 1. Moreover, it is often assumed for binary regression that any example lies in a bounded domain, i.e., kxk2 ≤ c for x ∈ X . Now we establish the privacy guarantee for sampling directly from the posterior in (17) in Theorem 17. We also show that this privacy bound is tight for logistic regression; a detailed analysis is in Appendix. Theorem 16. Suppose we are given a GLM and a dataset D of size n that satisfies Assumption 1, and a Gaussian prior with covariance Σ = (nβ)−1 I, then sampling with posterior in (17) satisfies 2 2 (λ, 2cnβB λ)-RDP for all λ ≥ 1. Notice that direct posterior sampling cannot achieve (λ, )-RDP for arbitrary λ and . We next present Algorithm 5 and 6, as analogous to Algorithm 3 and 2 for exponential family respectively, that guarantee any given RDP requirement. Algorithm 5 achieves a given RDP level by setting a stronger prior, while Algorithm 6 by raising the temperature of the likelihood. Algorithm 5 Concentrated Posterior Require: Dataset D of size n; Gaussian prior with covariance (nβ0 )−1 I; (λ, ). 2 2 B λ 1: Set β = max{ 2c n , β0 } in (17). 2: Sample w ∼ p(w|D) in (17). 10 Algorithm 6 Diffuse Posterior −1 Require: Dataset D of size n; Gaussian prior with covariance (nβ) q I; (λ, ). nβ 1: Replace p(yi |w, xi ) with p(yi |w, xi )ρ in (17) where ρ = min{1, 2c2 B 2 λ }. 2: Sample w ∼ p(w|D) in (17). It follows directly from Theorem 17 that under Assumption 1, Algorithm 5 satisfies (λ, )-RDP. Theorem 17. Suppose we are given a GLM and a dataset D of size n that satisfies Assumption 1, and a Gaussian prior with covariance Σ = (nβ)−1 I, then Algorithm 6 guarantees (λ, )-RDP. In fact, it guarantees (λ̃, λ λ̃)-RDP for any λ̃ ≥ 1. We show that the RDP guarantee in Theorem 16 is tight for logistic regression. Theorem 18. For any d > 1 and any n ≥ 1, there exists neighboring datasets D and D0 , each of size n, there exists λ0 , such that for any λ > λ0 , λ-Rényi Divergence between logistic regression c2 posteriors under D and D0 with Gaussian prior is larger than 2nβ (λ − 1). 2 This implies the tightness of (λ, 2c nβ λ), the RDP guarantee of posterior sampling for logistic regression posterior. 5 Experiments In this section, we present the experimental results for our proposed algorithms for both exponential family and GLMs. Our experimental design focuses on two goals – first, analyzing the relationship between λ and  in our privacy guarantees and second, exploring the privacy-utility trade-off of our proposed methods in relation to existing methods. 5.1 Synthetic Data: Beta-Bernoulli Sampling Experiments In this section, we consider posterior sampling in the Beta-Bernoulli system. We compare three algorithms. As a baseline, we select a modified version of the algorithm in [10], which privatizes the sufficient statistic of the data to create a privatized posterior. Instead of Laplace noise that is used by[10], we use Gaussian noise to do the privatization; [15] shows that if Gaussian noise with 2 variance σ 2 is added, then this offers an RDP guarantee of (λ, λ ∆ σ 2 ) for ∆-bounded exponential families. We also consider the two algorithms presented in Section 3.2 – Algorithm 2 and 3; observe that Algorithm 1 is a special case of both. 500 iterations of binary search were used to select r and m when needed. Achievable Privacy Levels. We plot the (λ, )-RDP parameters achieved by Algorithms 2 and 3 for a few values of r and m. These parameters are plotted for a prior η0 = (6, 18) and the data size n = 100 which are selected arbitrarily for illustrative purposes. We plot over six values {0.1, 0.3, 0.5, 0.7, 0.9, 1} of the scaling constants r and m. The results are presented in Figure 1. Our primary observation is the presence of the vertical asymptotes for our proposed methods. Recall that any privacy level is achievable with our algorithms given small enough r or m; these plots demonstrate the interaction of λ and . As r and m decrease, the  guarantees improve at each λ and even become finite at larger orders λ, but a vertical asymptote still exists. The results for the baseline are not plotted: it achieves RDP along any line of positive slope passing through the origin. 11 2 2 r = 0.1 r = 0.3 r = 0.5 r = 0.7 r = 0.9 direct posterior 1.5 1 m = 0.1 m = 0.3 m = 0.5 m = 0.7 m = 0.9 direct posterior 1.5 1 0.5 0.5 0 0 0 5 10 15 20 0 5 (a) Algorithm 2 10 15 20 (b) Algorithm 3 Figure 1: Illustration of Potential (λ, )-RDP Curves for Exponential Family Sampling. 70 0.2 0 -10 -5 0 (a) KL: λ = 2 < λ∗ Alg. 2 Alg. 3 Gauss.Mech. 0.4 0.2 50 40 30 20 10 0 -10 -5 40 30 20 0 -15 (b) KL: λ = 15 > λ∗ 50 10 0 0 Alg. 2 Alg. 3 Gauss.Mech. True Post. 60 - log-likelihood 0.4 KL divergence KL divergence Alg. 2 Alg. 3 Gauss.Mech. - log-likelihood 0.6 0.6 70 Alg. 2 Alg. 3 Gauss.Mech. True Post. 60 -10 -5 0 (c) − log p(XH ): λ = 2 -15 -10 -5 0 (d) − log p(XH ): λ = 15 Figure 2: Exponential Family Synthetic Data Experiments. Privacy-Utility Tradeoff. We next evaluate the privacy-utility tradeoff of the algorithms by plotting KL(P ||A) as a function of  with λ fixed, where P is the true posterior and A is the output distribution of a mechanism. For Algorithms 2 and 3, the KL divergence can be evaluated in closed form. For the Gaussian mechanism, numerical integration was used to evaluate the KL divergence integral. We have arbitrarily chosen η0 = (6, 18) and data set X with 100 total trials and 38 successful trials. We have plotted the resulting divergences over a range of  for λ = 2 in (a) and for λ = 15 in (b) of Figure 2. When λ = 2 < λ∗ , both Algorithms 2 and 3 reach zero KL divergence once direct sampling is possible. The Gaussian mechanism must always add nonzero noise. As  → 0, Algorithm 3 approaches a point mass distribution heavily penalized by the KL divergence. Due to its projection step, the Gaussian Mechanism follows a bimodal distribution as  → 0. Algorithm 2 degrades to the prior, with modest KL divergence. When λ = 15 > λ∗ , the divergences for Algorithms 2 and 3 are bounded away from 0, while the Gaussian mechanism still approaches the truth as  → ∞. In a non-private setting, the KL divergence would be zero. Finally, we plot log p(XH |θ) as a function of , where θ comes from one of the mechanisms applied to X. Both X and XH consist of 100 Bernoulli trials with proportion parameter ρ = 0.5. This experiment was run 10000 times, and we report the mean and standard deviation. Similar to the previous section, we have a fixed prior of η0 = (6, 18). The results are shown for λ = 2 in (c) and for λ = 15 in (d) of 2. These results agree with the limit behaviors in the KL test. This experiment is more favorable for Algorithm 3, as it degrades only to the log likelihood under the mode of the prior. In this plot, we have included sampling from the true posterior as a non-private baseline. 12 5.2 Real Data: Bayesian Logistic Regression Experiments We now experiment with Bayesian logistic regression with Gaussian prior on three real datasets. We consider three algorithms – Algorithm 5 and 6, as well as the OPS algorithm proposed in [19] as a sanity check. OPS achieves pure differential privacy when the posterior has bounded support; for this algorithm, we thus truncate the Gaussian prior to make its support the L2 ball of radius c/β, which is the smallest data-independent ball guaranteed to contain the MAP classifier. Achievable Privacy Levels. We consider the achievable RDP guarantees for our algorithms and OPS under the same set of parameters β, c, ρ and B = 1. [19] shows that with the truncated prior, 2 2 OPS guarantees 4cβ ρ -differential privacy, which implies (λ, 4cβ ρ )-RDP for all λ ∈ [1, ∞]; whereas 2 2 our algorithm guarantees (λ, 2cnβρ λ)-RDP for all λ ≥ 1. Therefore our algorithm achieves better RDP guarantees at λ ≤ 2n ρ , which is quite high in practice as n is the dataset size. Privacy-Utility: Test Log-Likelihood and Error. We conduct Bayesian logistic regression on three real datasets: Abalone, Adult and MNIST. We perform binary classification tasks: abalones with less than 10 rings vs. the rest for Abalone, digit 3 vs. digit 8 for MNIST, and income ≤ 50K vs. > 50K for Adult. We encode all categorical features with one-hot encoding, resulting in 9 dimensions for Abalone, 100 dimensions for Adult and 784 dimensions in MNIST. We then scale each feature to range from [−0.5, 0.5], and normalize each example to norm 1. 1/3 of the each dataset is used for testing, and the rest for training. Abalone has 2784 training and 1393 test samples, Adult has 32561 and 16281, and MNIST has 7988 and 3994 respectively. For all algorithms, we use an original Gaussian prior with β = 10−3 . The posterior sampling is done using slice sampling with 1000 burn-in samples. Notice that slice sampling does not give samples from the exact posterior. However, a number of MCMC methods are known to converge in total variational distance in time polynomial in the data dimension for log-concave posteriors (which is the case here) [18]. Thus, provided that the burn-in period is long enough, we expect the induced distribution to be quite close, and we leave an exact RDP analysis of the MCMC sampling as future work. For privacy parameters, we set λ = 1, 10, 100 and  ∈ {e−5 , e−4 , . . . , e3 }. Figure 3 shows the test error averaged over 50 repeated runs. More experiments for test log-likelihood presented in the Appendix. We see that both Algorithm 5 and 6 achieve lower test error than OPS at all privacy levels and across all datasets. This is to be expected, since OPS guarantees pure differential privacy which is stronger than RDP. Comparing Algorithm 5 and 6, we can see that the latter always achieves better utility. 6 Conclusion The inherent randomness of posterior sampling and the mitigating influence of a prior can be made to offer a wide range of privacy guarantees. Our proposed methods outperform existing methods in specific situations. The privacy analyses of the mechanisms fit nicely into the recently introduced RDP framework, which continues to present itself as a relaxation of DP worthy of further investigation. 13 0.5 0.4 Concentrated Diffuse OPS True Posterior 0.5 0.4 0.3 Concentrated Diffuse OPS True Posterior 0.5 Test error Concentrated Diffuse OPS True Posterior Test error Test error 0.6 0.4 0.3 0.2 0.3 0.1 0.2 Test error 0.6 0 2 Concentrated Diffuse OPS True Posterior 0.5 0.4 -4 -2 0 2 Concentrated Diffuse OPS True Posterior 0.5 0.4 0.3 -4 0.3 2 Concentrated Diffuse OPS True Posterior 0.5 0.4 -4 -2 0 Concentrated Diffuse OPS True Posterior 0.5 0.4 0.3 0.3 -2 0 (a) Abalone. 2 0.3 0.2 -4 -2 0 2 Concentrated Diffuse OPS True Posterior 0.5 0.4 0.3 0.2 0.1 0.2 -4 2 Concentrated Diffuse OPS True Posterior 0.4 2 Test error Test error 0.6 0 Test error -2 0 0.1 0.2 -4 -2 0.5 Test error -2 Test error -4 -4 -2 0 (b) Adult. 2 -4 -2 0 (c) MNIST 3vs8. Figure 3: Test error vs. privacy parameter . λ = 1, 10, 100 from top to bottom. 14 2 Acknowledgements This work was partially supported by NSF under IIS 1253942, ONR under N00014-16-1-2616, and a Google Faculty Research Award. References [1] M. Bun, K. Nissim, U. Stemmer, and S. Vadhan. Differentially private release and learning of threshold functions. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on, pages 634–649. IEEE, 2015. [2] M. Bun and T. Steinke. Concentrated differential privacy: Simplifications, extensions, and lower bounds. In Theory of Cryptography Conference, pages 635–658. Springer, 2016. [3] K. Chaudhuri, D. Hsu, and S. Song. The large margin mechanism for differentially private maximization. In Neural Inf. Processing Systems, 2014. [4] K. Chaudhuri and N. Mishra. When random sampling preserves privacy. In Annual International Cryptology Conference, pages 198–213. Springer, 2006. [5] C. Dimitrakakis, B. Nelson, A. Mitrokotsa, and B. I. Rubinstein. Robust and private Bayesian inference. In International Conference on Algorithmic Learning Theory, pages 291–305. Springer, 2014. [6] C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor. Our data, ourselves: Privacy via distributed noise generation. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 486–503. Springer, 2006. [7] C. Dwork and J. Lei. Differential privacy and robust statistics. In Proceedings of the forty-first annual ACM symposium on Theory of computing, pages 371–380. ACM, 2009. [8] C. Dwork, A. Roth, et al. The algorithmic foundations of differential privacy, volume 9. Now Publishers, Inc., 2014. [9] C. Dwork and G. N. Rothblum. arXiv:1603.01887, 2016. Concentrated differential privacy. arXiv preprint [10] J. Foulds, J. Geumlek, M. Welling, and K. Chaudhuri. On the theory and practice of privacypreserving bayesian data analysis. arXiv preprint arXiv:1603.07294, 2016. [11] F. Liese and K.-J. Miescke. Statistical decision theory. In Statistical Decision Theory, pages 1–52. Springer, 2007. [12] A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber. Privacy: Theory meets practice on the map. In Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, pages 277–286. IEEE, 2008. [13] F. McSherry. How many secrets do you have? https://github.com/frankmcsherry/blog/ blob/master/posts/2017-02-08.md, 2017. 15 [14] K. Minami, H. Arai, I. Sato, and H. Nakagawa. Differential privacy without sensitivity. In Advances in Neural Information Processing Systems, pages 956–964, 2016. [15] I. Mironov. Rényi differential privacy. arXiv preprint arXiv:1702.07476, 2017. [16] A. D. Sarwate and K. Chaudhuri. Signal processing and machine learning with differential privacy: Algorithms and challenges for continuous data. IEEE signal processing magazine, 30(5):86–94, 2013. [17] A. G. Thakurta and A. Smith. Differentially private feature selection via stability arguments, and the robustness of the lasso. In Conference on Learning Theory, pages 819–850, 2013. [18] S. Vempala. Geometric random walks: a survey. Combinatorial and computational geometry, 52(573-612):2, 2005. [19] Y.-X. Wang, S. E. Fienberg, and A. Smola. Privacy for free: Posterior sampling and stochastic gradient Monte Carlo. Proceedings of The 32nd International Conference on Machine Learning (ICML), pages 2493––2502, 2015. [20] Y.-X. Wang, J. Lei, and S. E. Fienberg. On-average kl-privacy and its equivalence to generalization for max-entropy mechanisms. In International Conference on Privacy in Statistical Databases, pages 121–134. Springer, 2016. [21] Z. Zhang, B. Rubinstein, and C. Dimitrakakis. On the differential privacy of Bayesian inference. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence (AAAI), 2016. 16 A A.1 Appendix Proofs of Exponential Family Sampling Theorems Our proofs will make extensive use of the definitions laid out in Section 3.1. We will however need an additional definition for a modified version of pset, and as well the set of possible updates to the posterior parameter that might arise from the data. Definition A.1. Let lpset(η0 , n, b) = pset(η0 , n) + bDif f . This is the set of posterior parameters that are b-neighboring at least one of the elements of pset(η0 , n) Definition A.2. Let U be the set of posterior updates for an exponential family, where U is the convex hull of all vectors of the form (S(x), 1) for x, y ∈ X . We begin by noting that observing a data set when starting at a normalizable prior η0 must result in a normalizable posterior parameter η 0 . Observation 1. In a minimal exponential family, for any prior parameter η0 , any n > 0, and any posterior update, every possible posterior parameter in the set η0 + nU is also normalizable. As C(η) must be a convex function for minimal families, this must apply to positive non-integer values of n as well. With this observation, we are ready to prove our result on the conditions under which sampling from our posterior gives a finite (λ, )-RDP guarantee. Theorem A.3. For a ∆-bounded minimal exponential family of distributions p(x|θ) with continuous log-partition function A(θ), there exists λ∗ ∈ (1, ∞] such Algorithm 1 achieves (λ, (η0 , n, λ))-RDP for λ < λ∗ . λ∗ is the supremum over all λ such that all η in the set η0 + (λ − 1)Dif f are normalizable. Proof: P Algorithm 1 samples directly from the posterior ηpost = η0 + i (S(xi ), 1). When applied to neighboring data sets X and X0 , it selects posterior parameters that are neighboring. The theorem can be reinterpreted as saying there exists λ∗ such that for λ < λ∗ we have sup Dλ (p(θ|ηP )||p(θ|ηQ )) < ∞. (18) neighboring ηP ,ηQ ∈pset(η0 ,n) For these two posteriors from the same exponential family, we can write out the Rényi divergence in terms of the log-partition function C(η). C(ληP + (1 − λ)ηQ ) − λC(ηP ) + C(ηQ ) (19) λ−1 We wish to show that this is bounded above over all neighboring ηP and ηQ our mechanism might generate, and will do so by showing that |C(η)| must be bounded every where it is applied in equation (19) if λ < λ∗ . To find this bound, we will ultimately show each potential application of C(η) lies within a closed subset of E, from which the continuity of C will imply an upperbound. Let’s begin by observing that ηP and ηQ must lie within pset(η0 , n) as they arise as posteriors for neighboring data sets X and X0 . The point ηL = ληP + (1 − λ)ηQ = ηP + (λ − 1)(ηP − ηQ ) might not lie within pset(η0 , n). However, we know ηP − ηQ lies within Dif f and that ηL − ηP is within (λ − 1)Dif f . This means for any neighboring data sets, ηP , ηQ , and ηL lie inside lpset(η0 , n, λ − 1). Dλ (p(θ|ηP )||p(θ|ηQ )) = 17 If λ < λ∗ , then η0 + (λ − 1)Dif f ⊆ E. The set η0 + (λ − 1)Dif f is potentially an open set, but the closure of this set must be within E as well, since we can always construct λ0 ∈ (λ, λ∗ ) where η0 + (λ0 − 1)Dif f ⊆ E, and the points inside η0 + (λ − 1)Dif f can’t converge to any point outside of η0 + (λ0 − 1)Dif f . Any point in η ∈ lpset(η0 , n, λ−1) can be broken down into three components using the definition of lpset: η = η0 + u + d, where u ∈ nU and d ∈ (λ − 1)Dif f . For any point in this lpset, we can therefore subtract off the component u to reach a point in the set η0 + (λ − 1)Dif f . With Observation 1, we can conclude that η is normalizable if η − u is normalizable, and therefore the closure of lpset(η0 , n, λ − 1) is a subset of E if η0 + (λ − 1)Dif f is a subset of E, which we have shown for λ < λ∗ . As C(η) is a continuous function, we know that the supremum of |C(η)| over the closure of lpset(η0 , n, λ − 1) must be finite. Remember that for any neighboring data sets, ηP ,ηQ , and ηL are inside lpset(η0 , n, λ − 1). Since |C(η)| is bounded over this lpset, so too must our expression for Dλ (p(θ|ηP )||p(θ|ηQ )) in equation (19). Therefore there exists an upper-bound for the order λ Rényi divergence across all pairs of posterior parameters selected by Algorithm 1 on neighboring data sets. This finite upper-bound provides a finite value for (η0 , n, λ) for which Algorithm 1 offers (λ, (η0 , n, λ))-RDP .  To prove our results for Algorithm 2 and Algorithm 3, we’ll need an additional result that bounds the Rényi divergence in terms of the Hessian of the log-partition function and the distance between the two distribution parameters. Lemma 3. For λ > 1, if ||∇2 C(η)|| < H over the set {ηP + x(ηP − ηQ )|x ∈ [−λ + 1, λ − 1]}, then Dλ (p(θ|ηP )||p(θ|ηQ )) ≤ ||ηP − ηQ ||2 Hλ (20) Proof: Define the function g(x) = C(ηP + xv) where x ∈ R and v = ηP − ηQ . This allows us to rewrite the Rényi divergence as g(1 − λ) − λg(0) + g(1) λ−1 Now we will replace g with its first order Taylor expansion Dλ (P ||Q) = g(x) = g(0) + xg 0 (0) + e(x) (21) (22) where e(x) is the approximation error term, satisfying |e(x)| ≤ x2 maxy∈[−x,x] g 00 (y)/2. This results in g(0) + (1 − λ)g 0 (0) + e(1 − λ) − λg(0) + g(0) + g 0 (0) + e(1) λ−1 e(1 − λ) =− + e(1) λ−1 (λ − 1)2 ≤ max g 00 (y)/2 + max g 00 (y)/2 . λ − 1 y∈[−λ+1,λ−1] y∈[−1,1] Dλ (p(θ|ηP )||p(θ|ηQ )) = 18 (23) (24) (25) Further, we can express g 00 in terms of C and v. g 00 (y) = v | ∇2 C(ηP + yv)v 2 (26) 2 ≤ ||ηP − ηQ || ||∇ C(ηP + yv)|| (27) 2 ≤ ||ηP − ηQ || H (28) Plugging in this bound on g 00 gives the desired result. Dλ (p(θ|ηP )||p(θ|ηQ )) ≤ (λ − 1)2 λ−1 max y∈[−λ+1,λ−1] g 00 (y)/2 + max g 00 (y)/2 (29) y∈[−1,1] ≤ (λ − 1)||ηP − ηQ ||2 H/2 + ||ηP − ηQ ||2 H/2 (30) 2 (31) 2 (32) ≤ ||ηP − ηQ || Hλ/2 ≤ ||ηP − ηQ || Hλ  We will also make use of the following standard results about the Hessian of the log-partition function of minimal exponential families, given in [11] as Theorem 1.17 and Corollary 1.19 and rephrased for our purposes. Theorem 4. (Theorem 1.17 from [11]) The log-partition function C(η) of a minimal exponential family is infinitely often differentiable at parameters η in the interior of the normalizable set E. Theorem 5. (Corollary 1.19 from [11]) For minimal exponential family, the Hessian of the logpartition function ∇2 C(η) is nonsingular for every parameter η in the interior of the normalizable set E. These results imply that the Hessian ∇2 C(η) must exist and be continuous over η in the interior of E, as well as having non-zero determinant. Theorem A.4. For any ∆-bounded minimal exponential family with prior η0 in the interior of E, any λ > 1, and any  > 0, there exists r∗ ∈ (0, 1] such that using r ∈ (0, r∗ ] in Algorithm 2 will achieve (λ, )-RDP. Proof: Pn Recall that Algorithm 2 uses the posterior parameter η 0 = η0 + r i (S(x), 1) where the data contribution has been scaled by r. Our first step of this proof is to show that there exists r0 ∈ (0, 1] such that the order λ Rényi divergences of the generated parameters are finite for r < r0 . Similar to the proof of Theorem A.3, we will do so by creating a closed set where C(η) is finite and that must contain ηP , ηQ , and ηL for any choice of neighboring data sets. On neighboring data sets, this generates r-neighboring parameters ηP and ηQ . The point ηL = ληP + (1 − λ)ηQ is therefore r(λ − 1)-neighboring ηP . These points must be contained in the set lpset(η0 , rn, r(λ − 1)) = η0 + rnU + r(λ − 1)Dif f . For any point in this set, we can subtract off the component in rnU to get to a modified prior that is r(λ − 1)-neighboring η0 . By the assumption that η0 is in the interior of E, there exists δ > 0 such that the ball B(η0 , δ) ⊆ E. δ For the choice r0 = 2(λ−1)∆ , for any r ∈ (0, r0 ), the modified prior we constructed for each point in 19 lpset(η0 , rn, r(λ−1)) is within distance r(λ−1)∆ of η0 and therefore within B(η0 , δ/2) ⊂ B(η0 , δ) ⊆ E. Observation 1 then allows us to conclude that every point η in lpset(η0 , rn, r(λ − 1)) has an open neighborhood of radius δ2 where C(η) is finite. This is enough to conclude that the closure of this lpset must also lie entirely within E, and C(η) is finite and continuous over this closed set. As in Theorem A.3, this suffices to show that the supremum of order λ Rényi divergences on neighboring data sets is bounded above. We have thus shown there exists r0 where the  of our (λ, )-RDP guarantee is finite for r < r0 . However, our goal was to achieve a specific  guarantee. Our proof of the existence of r∗ centers around the claim that there must exist a bound H for the Hessian of C(η) over all choices of r ∈ [0, r0 ). We can construct the set D = ∪r∈[0,r0 ] lpset(η0 , rn, r(λ − 1)), which will contain every possible ηP , ηQ , and ηL that might arise from any pair neighboring data sets and any choice of r in that interval. The previous argument still applies: each point in this union must have an open neighborhood of radius δ/2 that is a subset of E. This is enough to conclude that closure of D is also a subset of E. Theorem 4 implies ∇2 C(η) exists and is continuous on the interior of E, and this further implies that there must exist H such that for all η in this closure we have ||∇2 C(η)|| ≤ H. For any value r, we know that ηP and ηQ are r-neighboring, so we know ||ηP − ηQ || ≤ r∆. Since D contains lpset(η0 , rn, r(λ − 1)), the bound H must apply for all η in the set {ηP + x(ηP − ηQ )|x ∈ [−λ + 1, λ − 1]}. This allows us to use Lemma 3 to get the following expression: Dλ (p(θ|ηP )||p(θ|ηQ )) ≤ ||ηP − ηQ ||2 Hλ 2 ≤ r∆ Hλ. (33) (34) If we set r∗ = ∆2Hλ , then for r < r∗ the order λ Rényi divergence of Algorithm 2 is bounded above by , which gives us the desired result.  The concentrated mechanism is a bit more subtle in how it reduces the influence of the data, and so we need this result modified from Lemmas 9 and 10 in the appendix of [10]. These results are presented here in a way that matches our notation. It effectively states that if we start at a prior η0 satisfy mild but technical regularity assumptions, then the Hessians C(kη0 ) must converge to zero as k grows. In practical terms, this implies the covariance of our prior distribution must shrink as we increase the number of pseudo-observations. Definition A.5. Let Tη∗ = T (argmaxθ∈Θ η · T (θ)). This represents the mode of the sufficient statistics under the distribution p(T (θ)|η). Lemma 6. (Lemma 9 from [10]) If A(θ) is continuously differentiable and η0 is in the interior of E, then argmaxθ∈Θ η · T (θ) must be in the interior of Θ. Lemma 7. (Lemma 10 from [10]) If we have a minimal exponential family in which A(θ) is differentiable of all orders, there exists δ1 > 0 such that the ball B(η0 , δ1 ) is a subset of E, there exists δ2 > 0 and a bound L such that all the seventh order partial derivatives of A(θ) on the set Dη0 ,δ1 ,δ2 = {θ| minη∈B(η0 ,δ1 ) ||T (θ) − Tη∗ || < δ2 } are bounded by P , and the determinant of ∇2 A(θ) is bounded away from zero on Dη0 ,δ1 ,δ2 , then there exists real number V, K such that for k > K we have ∀η ∈ B(η0 , δ1 ) ||∇2 C(kη)|| < 20 V . k (35) Theorem A.6. For any ∆-bounded minimal exponential family with prior η0 in the interior of E, for any λ > 1, and any  > 0, there exists m∗ ∈ (0, 1] such that using m ∈ (0, m∗ ] in Algorithm 3 will achieve (λ, )-RDP. Proof: 0 −1 PnFor a fixed value of m, recall that Algorithm 30 selects the posterior parameter η = m η0 + i=1 (S(xi ), 1). For neighboring data sets X and X , the selected posterior parameters ηP , ηQ , and ηL = ληP + (1 − λ)ηQ lie within lpset(m−1 η0 , n, λ − 1) = m−1 η0 + nU + (λ − 1)Dif f . We start by showing that the conditions of Lemma 7 are met. As we assumed η0 is in the interior of E, there exists δ1 > 0 such that we have the ball B(η0 , δ1 ) ⊆ E. By Theorem 4, the log-partition function of the data likelihood A(θ) is differentiable of all orders, and Theorem 5 tells us that the Hessian ∇2 A(θ) is non-singular with non-zero determinant on the interior of Θ. This permits the application of Lemma 6, offering a mapping from η in the interior of E to their mode Tη∗ corresponding to a parameter θ in the interior of Θ. Knowing that A(θ) is infinitely differentiable on the interior of Θ further implies that the seventh order derivatives are well-behaved in a neighborhood around each mode resulting from this mapping. This provides the rest of the requirements for Lemma 7. Therefore there exists V and K such that the following holds ∀η ∈ B(η0 , δ1 ) : ||∇2 C(kη)|| ≤ V . k (36) We wish to show that ||∇2 C(η)|| must be bounded on the expanded set lpset(m−1 η0 , n, λ − 1) = m η0 + nU + (λ − 1)Dif f , and will do so by showing that for small enough m we can use equation (36) to bound the Hessians. Let α(η) denote the last coordinate of η. This represents the pseudo-observation count of this parameter, and notice that ∀u ∈ U : α(u) = 1 and ∀v ∈ Dif f : α(v) = 0. We are going to analyze the scaled set cm · lpset(m−1 η0 , n, λ − 1) where cm is a positive scaling constant that will depend on m. −1 cm · lpset(m−1 η0 , n, λ − 1) = cm m−1 η0 + cm nU + cm (λ − 1)Dif f (37) . For each η in this cm · lpset, we have α(η) = cm m−1 α(η0 ) + cm n · 1 + cm (λ − 1) · 0 = cm (m−1 α(η0 ) + n) . (38) 0) −1 Setting cm = m−1α(η η0 , n, λ − 1) we have α(η0 )+n thus guarantees that for all η in cm · lpset(m α(η) = α(η0 ). We want to know how far the points in this cm ·lpset are from η0 , so we simply subtract η0 to get a set Dm of vectors. These offset vectors have the form cm · lpset(m−1 η0 , n, λ − 1) − η0 and therefore lie in the set Dm = (cm m−1 − 1)η0 + cm nU + cm (λ − 1)Dif f . Using our expression of cm as a function of m, we can see the following limiting behavior: 21 (39) α(η0 ) =0 m−1 α(η0 ) + n m−1 α(η0 ) lim cm m−1 − 1 = lim −1 − 1 = 1 − 1 = 0. m→0 m→0 m α(η0 ) + n lim cm = lim m→0 (40) m→0 (41) These limits lets us take the limit of the size of the vectors in Dm as m → 0: lim sup ||v|| ≤ lim (cm m−1 − 1)||η0 || + cm n sup ||u1 || + cm (λ − 1) m→0 v∈Dm m→0 u1 ∈U ≤ 0 · ||η0 || + 0 · sup ||u1 || + 0 · u1 ∈U sup sup ||u2 || (42) u2 ∈Dif f ||u2 || (43) u2 ∈Dif f ≤ 0. (44) This limit supremum on Dm tells us that as m → 0, the maximum distance between points in the scaled set cm · lpset(m−1 η0 , n, λ − 1) and η0 gets arbitrarily small. This means there exists some m0 such that for m < m0 the scaled set cm · lpset(m−1 η0 , n, λ − 1) lies within B(η0 , δ1 ). This scaling mapping can be inverted, and it implies lpset(m−1 η0 , n, λ − 1) is contained within c1m B(η0 , δ1 ). Being contained within this scaled ball is precisely what we need to use equation (36) with k1 = cm . Equation (36) bounds ||∇2 C(η)|| ≤ Hm = V cm for all η in lpset(m−1 η0 , n, λ − 1), which in turn lets us use Lemma 3 to bound our Rényi divergences. Dλ (p(θ|ηP )||p(θ|ηQ )) ≤ ||ηP − ηQ ||2 Hm λ 2 ≤ ∆ V cm λ. (45) (46) As we have cm → 0 as m → 0, we know there must exist m∗ such that for m < m∗ we have cm ≤ ∆2V λ . This means the order λ Rényi divergences of Algorithm 3 on neighboring data sets is bounded above by , which gives us the desired result.  We have one last theorem to prove, the result claiming the Rényi divergences of order λ between ηP and its neighbors is convex, which greatly simplifies finding the supremum of these divergences over the convex sets being considered. Theorem A.7. Let e(ηP , ηQ , λ) = Dλ (p(θ|ηP )||p(θ|ηQ )). For a fixed λ and fixed ηP , the function e is a convex function over ηQ . If for any direction v ∈ Dif f , the function gv (η) = v | ∇2 C(η)v is convex over η, then for a fixed λ, the function fλ (ηP ) = sup e(ηP , ηQ , λ) (47) ηQ r−neighboring ηP is convex over ηP in the directions spanned by Dif f . Proof: First, we can show that for a fixed ηP and fixed λ, the choice of ηQ in the supremum must lie on the boundary of possible neighbors. This is derived from showing that Dλ (P ||Q) is convex over the choice of ηQ . 22 Consider once again the expression for our Rényi divergence, expressed now as the function e(ηP , ηQ , λ): e(ηP , ηQ , λ) = Dλ (P ||Q) = C(ληP + (1 − λ)ηQ ) − λC(ηP ) + C(ηQ ). λ−1 (48) Let ∇ηQ e(ηP , ηQ , λ) denote the gradient of the divergence with respect to ηQ . 1−λ ∇C(ληP + (1 − λ)ηQ ) λ−1 = ∇C(ηQ ) − ∇C(ληP + (1 − λ)ηQ ). ∇ηQ e(ηP , ηQ , λ) = ∇C(ηQ ) + (49) (50) We can further find the Hessian with respect to ηQ : ∇2ηQ e(ηP , ηQ , λ) = ∇2 C(ηQ ) − (1 − λ)∇2 C(ληP + (1 − λ)ηQ ). (51) By virtue of being a minimal exponential family, we know C is convex and thus ∇2 C is PSD everywhere. Combined with the fact that λ > 1, this is enough to conclude that ∇2ηQ e(ηP , ηQ , λ) is also PSD for everywhere with λ > 1. This means e(ηP , ηQ , λ) is a convex function with respect to ηQ for any fixed ηP and λ. We now wish to characterize the function fλ (ηP ), which takes a supremum over ηQ ∈ ηP + rDif f of e(ηP , ηQ , λ). fλ (ηP ) = sup e(ηP , ηQ , λ) (52) ηQ r−neighboring ηP We re-parameterize this supremum in terms of the offset b = ηQ − ηP . fλ (ηP ) = sup e(ηP , ηP + b, λ) (53) b∈rDif f Now for any fixed offset b, x we can find the expression for the Hessian of ∇2ηP e(ηP , ηP + b, λ). ∇2ηP e(ηP , ηP + b, λ) = ∇2 C(ηP + b) − 1 λ ∇2 C(ηP ) + ∇2 C(ηp + (1 − λ)b) λ−1 λ−1 (54) We wish to show this Hessian is PSD, i.e. for any vector v we have v | ∇2ηP e(ηP , ηP + b, λ)v is non-negative. We can rewrite this in terms of the function gv (η) introduced in the theorem statement. λ 1 v | ∇2ηP e(ηP , ηP + b, λ)v = gv (ηP + b) − gv (ηP ) + gv (ηp + (1 − λ)b) λ−1 λ−1   λ λ−1 1 = gv (ηP + b) − gv (ηP ) + gv (ηp + (1 − λ)b) λ−1 λ λ 23 (55) (56) 120 100 Alg. 2 Alg. 3 Gauss.Mech. True Post. 100 80 80 120 40 100 - log-likelihood 60 60 50 40 30 20 0 -12 -10 -8 -6 -4 -2 0 2 (a) ρ = 1/3 (high match with η0 ) 0 -16 60 40 0 10 -14 80 20 20 -20 -16 Alg. 2 Alg. 3 Gauss.Mech. True Post. 140 70 - log-likelihood - log-likelihood 160 Alg. 2 Alg. 3 Gauss.Mech. True Post. 90 -14 -12 -10 -8 -6 -4 -2 0 (b) ρ = 1/2 2 -20 -16 -14 -12 -10 -8 -6 -4 -2 0 2 (c) ρ = 2/3 (low match with η0 ) Figure 4: Utility Comparison for a fixed η0 but varying true population parameter λ We know λ−1 > 0 and that ηP must lie between ηP + b and ηP − (λ − 1)b. Our assumption that gv (η) is convex over η for all directions v then lets us use Jensen’s inequality to see that the expression (56) must be non-negative. This lets us conclude that v | (∇2ηP e(ηP , ηP + b, λ)v ≥ 0 for all v, and thus this Hessian is PSD for any ηP . This in turn means our divergence e(ηP , ηP + b, λ) is convex over ηP assuming a fixed offset b. We return to fλ (ηP ), and observe that it is a supremum of functions that are convex, and therefore it is convex as well.  A.2 Additional Beta-Bernoulli Experiments The utility of the prior-based methods (Algorithms 2 and 3) depends on how well the prior matches the observed data. Figure 4 shows several additional situations for the experimental procedure of measuring the log-likelihood of the data. In each case, the prior η0 = (6, 18) was used, and both X and XH had 100 data points. λ = 15 was fixed in these additional experiments. The only thing that varies is the true population parameter ρ. In (a), ρ = 1/3 closely matches the predictions of the prior η0 . In (b), ρ = 0.5, presented as an intermediate case where the prior is misleading. Finally, in (c), ρ = 2/3, which is biased in the opposite direction as the prior. In all cases, the proposed methods act conservatively in the face of high privacy, but in (a) this worst case limiting behavior still has high utility. Having a strong informative prior helps these mechanisms. The setting in which the prior is based off of a representative sample of non-private data from the same population as the private data is likely to be beneficial for Algorithms 2 and 3. One other case is presented in Figure 5, where ρ = 0.2 but the prior has been changed to η0 = (1, 2). λ is still 15, and the number of data points is still 100. This prior corresponds to the uniform prior, as it assigns equal probability to all estimated data means on (0, 1). It represents an attractive case on a non-informative prior, but also represents a situation in which privacy is difficult. In particular, λ∗ = 2 in this setting. When Algorithm 3 scales up this prior, it becomes concentrated around ρ = 0.2, so this setting also corresponds to a case where the true population parameter does not match well with the predictions from the prior. 24 140 Alg. 2 Alg. 3 Gauss.Mech. True Post. 120 100 - log-likelihood 80 60 40 20 0 -20 -16 -14 -12 -10 -8 -6 -4 -2 0 2 Figure 5: Utility Experiment for the non-informative uniform prior A.3 A.3.1 Application to other exponential families Dirichlet-Categorical The Categorical family is a higher dimension generalization of the Bernoulli family. Instead of just two possible values, (e.g. "failure" or "success", 0 or 1), a categorical variable is allowed to take any of d discrete values. The parameters of a categorical distribution assign a probability to each of the discrete values. These probabilities are constrained to sum to one in order to be a valid distribution, so this family of distribution can be described with only d − 1 parameters. Our propsed method works with this family as well, but the proof is a little more difficult due to the higher dimensions. Let the space of observations X = {1, 2, . . . , d}. The sufficient statistics of an observation x is a vector of indicator variables, S(x) = {I1 (x), . . . , Id−1 (x)}. Notice that Id (x) is not included, since it can be derived from the other coordinates of S(x). Including this last indicator variable would make Pd the family non-minimal where the sufficient statistics satsify the linear relationship i=1 Ii = 1. The conjugate prior family is the Dirichlet family. Under our construction of the conjugate prior, we want the parameter η to satisfy the relationship ηposterior = ηprior + (S(x), 1). This means that η is d dimensional, and the last coordinate of η measures an effective count of observations. Since each coordinate of S(x) is bounded by one, we also have the relationship that for any posterior, η (d) ≥ η (i) for i ∈ [d]. When d = 2, this derivation exactly matches the one from the Beta-Bernoulli system and it is ∆-bounded for ∆ = 1. √ For d > 2, this family is ∆-bounded for ∆ = 2. For any two observations, S(x) − S(y) is non-zero in atmost two locations, and each location has a difference of at most 1. Further, this Dirichlet-Categorical system satisfies the requirements of Theorem A.7. The necessary requirement is that for any direction v ∈ Dif f , the function gv (η) = v | ∇2 C(η)v is convex over η. For this system, we have an expression for C(η) : ! d−1 d−1     X X C(η) = log Γ(η (k) ) + log Γ(η (d) − η (k) ) − log Γ(η (d) ) (57) k=1 i=k 25 This value is merely the sum of the log-Gamma function applied to the count of observations at each value, Pd−1minus the log-Gamma function applied to the total count of observations. The expression η (d) − i=1 η (i) evaluates to the count of observations located at the implicit dth value, since η (d) carries the total count of observations seen. With this expression, we can calculate the gradient and Hessian. The digamma function ψ0 is the derivative of the log-Gamma function log (Γ(·)), and the trigamma function ψ1 is the derivative of the digamma function.     P ψ0 η (i) − ψ0 η (d) − d−1 η (k) i 6= d   k=1 ∇C(η)(i) = (58)  P d−1 (d) (k) (d) ψ0 η − − ψ0 η i=d k=1 η    Pd−1 (k)  (i) (d)  ψ η + ψ η − i = j 6= d  1 1 k=1 η     Pd−1 (k)   (d) ψ1 η − i 6= j, i 6= d, j 6= d  k=1 η     P d−1 ∇2 C(η)(i,j) = −ψ1 η (d) − k=1 η (k) (59) i 6= j, i = d, j 6= d    Pd−1 (i)   (d)  −ψ1 η − k=1 η i 6= j, i 6= d, j = d       P  d−1 (k) ψ1 η (d) − − ψ1 (η (d) ) i = j = d k=1 η When v ∈ Dif f , the last coordinate of v is zero since changing one observation does not change the total count of observations. This means the expression gv (η) = v | ∇2 C(η)v can ignore the last coordinate of v, as well as the last row and column of ∇2 C(η). This means we are only concerned with the entries matching the first two cases of equation (59). Let ṽ denote the vector formed by the first d − 1 coordinates of v. A careful examination the matrix M equal to the top d − 1 rows and and leftmost d − 1 columns of ∇2 C(η) reveals that M decomposes as ! d−1   X (d) (k) M = ψ1 η − η [1] + diag ψ1 (η (1) ), . . . , ψ1 (η (d−1) ) (60) k=1 where [1] is the d − 1 by d − 1 matrix where all entries are 1, and diag constructs a diagonal matrix from the given values. This means for all v ∈ Dif f , we have the following expression: gv (η) = v | ∇2 C(η)v (61) = ṽ | M ṽ = ṽ | (62) ψ1 (η (d) − d−1 X ! η (k) )[1] + diag(ψ1 (η (1) , . . . , η (d−1) ) ṽ (63) k=1 = ψ1 (η (d) − d−1 X η (k) ) (ṽ | [1]ṽ) + d−1 X ψ1 (η (i) )(ṽ (i) )2 (64) i=1 k=1 (65) With the fact that [1] is PSD and that (ṽ (i) )2 is always positive, the above calculations show that gv (η) is the sum of many applications of the digamma function ψ1 . Each of these applications 26 has a positive coefficient, and the function ψ1 is convex. This concludes the proof that gv (η) is convex over η for any v ∈ Dif f . (When d = 2, this expression for gv in fact matches the one derived from the Beta-Bernoulli system.) This means that the expression for the worst-case Rényi divergence between neighboring posterior parameters is convex, and so the maximum must be located at the boundaries. In this case, the pset is a shifted simplex, so the maximum must occur at one of the vertices. The potential pairs of posterior parameters that must be checked in order to evaluate the RDP guarantee grows as O(d3 ). A.3.2 Gaussian-Gaussian and non-∆-bounded families Another interesting setting is estimating the mean of a Gaussian variable when the variance is known. In this case, the conjugate prior is also a Gaussian distribution. This system satisfies the v | ∇2 C(η)v convexity requirement for Theorem A.7, since the variance 2 ∇ C(η) is constant when the final coordinate (the total count of observations) is fixed. Thus for any v ∈ Dif f , the function gv (η) is constant and therefore convex. However, this setting does not satisfy the ∆-bounded assumption. The observations can be arbitrarily large, and changing a single observation can therefore lead to arbitrarily large changes to posterior parameters and thus also arbitrarily large Rényi divergences between neighboring data sets. The exponential family mathematics behind our results did not directly depend on the ∆boundedness assumption. Instead, this bound was used only to bound the pset of possible posterior parameters in order to bound the distance ||ηP − ηQ || when considering neighboring data sets. This bounded pset then ensured our privacy guarantee was finite. For any given data set X, we can bound the Rényi divergence between the posterior from X and the posterior from any other data set X0 satisfying S(X) − S(X0 ) ≤ ∆. This is true even when the exponential family is not ∆-bounded. This permits two different approaches: we can relax the RDP framework further, protecting only data sets and a select bounded range of neighboring data sets rather than all the neighbors, or we can include a data preprocessing step that projects the observations onto a set with bounded sufficient statistics. The latter approach permits the use of the RDP framework without introducing further relaxations. For example, we could replace the observations X with X̃ = f (X) where the following function f was applied to each observation x in X:   −∆ x ≤ −∆ f (x) = x (66) −∆ < x < ∆   ∆ ∆≤x Although the statistical model still believes arbitrarily large observations are possible, the preprocessing projection step allows us to bound ||ηP − ηQ || ≤ ∆ where ηP is the posterior for f (X) and ηQ is the posterior for f (X0 ) with any neighboring set of observations X0 . This comes with the caveat that our model no longer matches reality, since it is unaware of the distortions introduced by our preprocessing step. We leads to a potential degradation of utility for the mechanism output, but our privacy guarantees will hold. If the data altered by f is sufficiently rare, these distortions should be minimal. 27 A.4 Proofs in Section 4 A.4.1 GLMs Privacy Proof In this section we prove Theorem 16, 17. Here we state and prove a more general version of the theorems. Consider any problem with likelihood in the form ! n X p(D|w) = exp − `(w, xi , yi ) i=1 and posterior of the following form Pn exp (− i=1 ρ`(w, xi , yi )) p(w) Pn , exp (− i=1 ρ`(w0 , xi , yi )) p(w0 )dw0 Rd p(w|D) = R (67) where in the case of logistic regression, ` is the logistic loss function. Then we have the following lemma. Lemma 1. Suppose `(·, x, y) is L-Lipschitz and convex, and − log p(w) is twice differentiable and 2 2 m-strongly convex. Posterior sampling from (67) satisfies (λ, 2ρmL λ)-RDP for all λ ≥ 1. Proof. (of Lemma 1) The proof follows from the same idea as in the proof of Theorem 7 of [14]. The basic idea is that the posterior distribution p(·|D) satisfies Logarithmic Sobolev inequality (LSI), p(w|D) which implies sub-Gaussian concentration on log p(w|D 0 ) ; and sub-Gaussian concentration implies RDP. Before the proof, we define LSI and introduce the relation between sub-Gaussian concentration and LSI. Definition A.8. A distribution µ satisfies the Log-Sobolev Inquality (LSI) with constant C if for any integrable function f ,         Eµ f 2 log f 2 − Eµ f 2 log Eµ f 2 ≤ 2CEµ k∇f k2 . C. Then for every L-Lipschitz Theorem A.9. (Herbst’s Theorem) If µ satisfies LSI with constant  function f , for any λ, E [exp (λ(f − Eµ [f ]))] ≤ exp Cλ2 L2 /2 . Lemma 2. Let U : Rd → R be a twice differential, m-strongly convex and integrable function. Let µ be a probability measure on Rd whose density is proportional to exp (−U ). Then µ satisfies LSI with constant C = 1/m. Now we prove RDP bound of posterior sampling from (67). Firstly, notice that negative of log of the prior, − log p(w), is twiceP differentiable, m-strongly n convex and integrable. And therefore negative of log of the posterior, ρ i=1 `(w, xi , yi ) − log p(w) is m-strongly convex. According to Lemma 2, distribution p(w|D) satisfies LSI with constant 1/m. p(w|D) Then, set f in Theorem A.9 as f (D, D0 , w) = log p(w|D 0 ) . Since the `(·, x, y) is L-Lipschitz, we know that f (D, D0 , w) is 2ρL-Lipschitz. According to Theorem A.9, for any λ ∈ R,     2 2 2 p(w|D) 0 − D (p(w|D)kp(w|D )) ≤ e2λ ρ L /m . Ew∼p(w|D) exp λ log KL p(w|D0 ) 28 Let a = 2ρ2 L2 /m. Equivalently, then for any λ ∈ R,     p(w|D) Ew∼p(w|D) exp λ log ≤ exp aλ2 + λDKL (p(w|D)kp(w|D0 )) . p(w|D0 ) And setting λ to λ − 1, we have     p(w|D) ≤exp a(λ − 1)2 + (λ − 1)DKL (p(w|D)kp(w|D0 )) Ew∼p(w|D) exp (λ − 1) log 0 p(w|D ) ≤exp ((λ − 1) (aλ + DKL (p(w|D)kp(w|D0 )) − a)) . If λ ≥ 1, the expectation is upper bounded by    0 exp (λ − 1) aλ + max D (p(w|D)kp(w|D )) − a . KL 0 d(D,D )=1 According to the definition of zCDP in [2], this implies zCDP with ρ= 2ρ2 L2 , m ξ= max 0 d(D,D )=1 2 DKL (p(w|D)kp(w|D0 )) − 2ρ2 L2 , m 2 2 2 which is equivalent to (λ, 2ρmL λ + maxd(D,D0 )=1 DKL (p(w|D)kp(w|D0 )) − 2ρmL )-RDP for any λ ≥ 1. p(w|D) Finally, we aim at bounding DKL (p(w|D)kp(w|D0 )). Let F (w) = p(w|D 0 ) . According to the definition of KL-divergence, we have DKL (p(w|D)kp(w|D0 )) = Ep(w|D) [log F ] = Ep(w|D0 ) [F log F ] − Ep(w|D0 ) [F ] Ep(w|D0 ) [log F ] , which, by setting f = √ F in Definition A.8 and having C = 1/m, can be upper bounded by DKL (p(w|D)kp(w|D0 )) ≤ h √ i 2 Ep(w|D0 ) k∇ F k22 . m We have k∇ log F k2 =ρk∇ log p(w|D) − ∇ log p(w|D0 )k2 =ρk∇ log(p(D|w)p(w)) − ∇ log(p(D0 |w)p(w))k2 =ρk∇ log p(D|w) − ∇ log p(D0 |w)k2 ≤2ρL, and therefore √ k∇ F k22 = k∇exp  1 log F 2  √ k22 =k F F ∇ log F k22 = k∇ log F k22 ≤ ρ2 L2 F. 2 4 29 (68) So the KL-divergence in (68) is upper bounded by 2ρ2 L2 2ρ2 L2 Ep(w|D0 ) [F ] = . m m 2 2 Therefore Bayesian logistic regression satisfies (λ, 2ρmL λ)-RDP for any λ. For readers familiar with the proof of Theorem 7 in [14], the proof here is exactly the same except that the tail bound of sub-Gaussian concentration in Equation 21 and consequently 25 there are replaced by the moment generating function bound. The reason for not using the tail bound to imply moment generating function bound is because that loses constant factor. For GLMs, we have `(w, x, y) = − log h(y) + A(w> x) − yw> x, and thus ∇w `(w, x, y) = (µ − y)x = (g −1 (w> x) − y)x. Then, by the condition in Theorem 16 and 17, k∇w `(w, x, y)k2 is upper bounded by Bc and `(·, x, y) is Bc-Lipschitz. A.4.2 Logistic Regression Tightness Proof. (of Theorem 18) We aim to upper bound Z Z p(w|D)λ p(D|w)λ dw = p(w) dw × p(w|D0 )λ−1 p(D0 |w)λ−1 R [ p(w)p(D0 |w)dw]λ−1 R [ p(w)p(D|w)dw]λ (69) for all λ > 1. For convenience, here we assume Y = {−1, 1} instead of 0, 1, and thus p(y|w, x) can be written > as 1/(1 + e−yw x ). Let σ 2 = (nβ)−1 denote the variance of the Gaussian prior. Firstly, we consider the case when |D| = 1. We will extend the analysis to |D| > 1 later. Consider any x ∈ Rd with kxk = c. Let D = {(x, y)} and D0 = {(x0 , y 0 )}, where x0 = x and 0 y = −y = −1. Firstly, we prove an equation that will be used later. Let ∗j be the j-th dimension of vector ∗. For any i and d, we have   Z  1 kwk2 exp − exp −iw> x dw (70) √ d 2 2σ d 2πσ 2 R ! Z d Y wj2 1 √ exp − 2 exp (−iwj xj ) dwj = 2σ 2πσ 2 R j=1 !   Z d Y i2 x2j σ 2 1 (wj + ixj σ 2 )2 √ = exp − exp dwj 2σ 2 2 2πσ 2 R j=1 ! d Y i2 x2j σ 2 = exp 2 j=1   2 2 i σ kxk22 . =exp 2 30 Now we will consider the two terms in (69) separately. For the first term, we have Z p(D|w)λ dw p(w) p(D0 |w)λ−1 Rd    Z 1 kwk2 (1 + exp −y 0 w> x0 )λ−1 =√ dw exp − d 2σ 2 (1 + exp (−yw> x))λ 2πσ 2 Rd    Z 1 kwk2 (1 + exp w> x )λ−1 =√ dw exp − d 2σ 2 (1 + exp (−w> x))λ 2πσ 2 Rd    Z 1 kwk2 exp (λ − 1)w> x =√ exp − dw. d 2σ 2 1 + exp (−w> x) 2πσ 2 Rd (71) Let S+ be any half-space of Rd and S− = Rd \S+ . The above equals to       Z Z 1 1 kwk2 exp (λ − 1)w> x kwk2 exp (λ − 1)w> x dw + √ dw exp − exp − √ d d 2σ 2 1 + exp (−w> x) 2σ 2 1 + exp (−w> x) 2πσ 2 S+ 2πσ 2 S− For any x and any w ∈ S− , we have −yw> x = y(−w)> x. By changing variable in the second integral from w to −w, the above equals to       Z Z 1 kwk2 exp (λ − 1)w> x 1 kwk2 exp −(λ − 1)w> x exp − dw + √ exp − dw √ d d 2σ 2 1 + exp (−w> x) 2σ 2 1 + exp (w> x) 2πσ 2 S+ 2πσ 2 S+ !    Z exp −(λ − 1)w> x exp (λ − 1)w> x 1 kwk2 =√ exp − + dw d 2σ 2 1 + exp (−w> x) 1 + exp (w> x) 2πσ 2 S+   λ−1 Z X  1 kwk2 exp −iw> x (−1)i+λ−1 dw =√ exp − d 2 2σ 2πσ 2 S+ i=−λ+1     Z −1 i+λ−1 Z X  (−1) kwk2 kwk2 (−1)λ−1 > = exp −iw x dw + √ dw exp − exp − √ d d 2σ 2 2σ 2 S+ 2πσ 2 2πσ 2 S+ i=−λ+1   λ−1 X (−1)i+λ−1 Z  kwk2 exp − + exp −iw> x dw. √ d 2 2σ S+ 2πσ 2 i=1 The middle term equals to (−1)λ−1 /2. And changing variable from w to −w in the first term, the above equals to   λ−1 X (−1)−i+λ−1 Z  kwk2 = exp − exp −iw> x dw √ d 2 2σ S− 2πσ 2 i=1   λ−1 X (−1)i+λ−1 Z  kwk2 (−1)λ−1 > exp − exp −iw x dw + + √ d 2σ 2 2 S+ 2πσ 2 i=1   Z λ−1 X (−1)−i+λ−1  (−1)λ−1 kwk2 > = exp −iw x dw + . exp − √ d 2σ 2 2 Rd 2πσ 2 i=1 31 Using the equation in (70) with the fact that kxk2 = c, the above equals to λ−1 X (−1) i=1 −i+λ−1  exp i2 σ 2 c2 2   2 2 2 λ−1 X (−1)λ−1 i σ c −i+λ−1 + = . (−1) exp 2 2 i=0 Now we consider the second term in (69). We have   Z Z 1 kwk2 1 p(w)p(D|w)dw = √ exp − dw. d 2 > x) 2σ 1 + exp (−yw d 2πσ 2 R Let S+ be any half-space of Rd and S− = Rd \S+ . The above equals to     Z Z 1 1 1 kwk2 kwk2 1 exp − dw + exp − dw. √ √ d d 2 > x) 2 > x) 2σ 1 + exp (−yw 2σ 1 + exp (−yw 2 2 S+ S− 2πσ 2πσ For any x and any w ∈ S− , we have −yw> x = y(−w)> x. By changing variable in the second integral from w to −w, the above equals to     Z Z kwk2 kwk2 1 1 1 1 exp − exp − dw + dw √ √ d d 2 > 2 2σ 1 + exp (−yw x) 2σ 1 + exp (yw> x) 2πσ 2 S+ 2πσ 2 S+    Z kwk2 1 1 1 exp − =√ + dw d 2σ 2 1 + exp (−yw> x) 1 + exp (yw> x) 2πσ 2 S+   Z 1 kwk2 =√ exp − dw d 2σ 2 2πσ 2 S+ 1 = . 2 Since the above result holds for any dataset D, we know that the second term of (69) equals to 2. Combining the two terms, (69) equals to 2 λ−1 X (−1) −i+λ−1  exp i=0 i2 σ 2 c2 2  . As λ becomes sufficiently large, this is lower bounded by   (λ − 1)2 σ 2 c2 exp . 2 Now we consider the case when |D| > 1. We aim to show that there exists D and D0 , such that the same results hold for them. Let D = {(x, y), (x1 , y 1 ), . . . , (xn−1 , y n−1 )} and D0 = {(x0 , y 0 ), (x1 , y 1 ), . . . , (xn−1 , y n−1 )}, i.e., D and D0 differ in the first example. Let S1 ⊂ [d], |S1 | < d be a set of dimensions and let S2 = [d]\S1 . Let x = x0 be a vector with non-zero dimensions only on S1 , i.e., xi = 0, ∀i ∈ S2 , and kxk2 = c. Let wS∗ denote the dimensions of w that belongs to S∗ . We then have kxS1 k2 = c. Let y 0 = −y = −1. Suppose ∀j ∈ [n − 1], xj has non-zero dimensions only at {1, . . . , d}\S∗ , i.e., xji = 0, ∀i ∈ S∗ . 32 We have Z p(w)p(D|w)dw   Z Y 1 kwk2 1 1 =√ exp − dw d 2 j w > x) j w > xj ) 2σ 1 + exp (−y 1 + exp (−y 2πσ 2 j   Z kwS1 k2 1 1  dwS1 exp − =√ 2 |S1 | 2σ 1 + exp −y j wS>1 xS1 2πσ 2   Z kwS2 k2 Y 1 1   dwS2 exp − ×√ 2 |S2 | 2σ j > j 2πσ 2 j 1 + exp −y wS2 xS2   Z 1 1 kwS2 k2 Y 1   dwS2 exp − = √ 2 2πσ 2 |S2 | 2σ 2 j w > xj 1 + exp −y j S2 S2 where the second step follows from the fact that x is non-zero only at S1 and sj is non-zero only at S2 , and the last step follows from the normalization term of |D| = 1 (second term of (69)). We also have Z p(D|w)λ p(w) dw p(D0 |w)λ−1    Z kwk2 (1 + exp −y 0 w> x0 )λ−1 Y 1 1 exp − =√ dw d 2 > x))λ j w > xj ) 2σ (1 + exp (−yw 1 + exp (−y 2 2πσ j    Z kwk2 (1 + exp w> x )λ−1 Y 1 1 exp − dw =√ d 2 > λ 2σ (1 + exp (−w x)) j 1 + exp (−y j w> xj ) 2πσ 2    Z 1 kwS1 k2 (1 + exp wS>1 xS1 )λ−1  dwS1 =√ exp − |S1 | 2σ 2 (1 + exp −wS>1 xS1 )λ 2πσ 2   Z kwS2 k2 Y 1 1  dwS2  exp − ×√ 2 |S2 | 2σ j > j 2πσ 2 j 1 + exp −y wS1 xS1      Z (λ − 1)2 σ 2 c2 kwS2 k2 Y 1 1   dwS2 ≤exp exp ×√ exp − 2 |S | 2 2 2σ j > j 2πσ 2 j 1 + exp −y wS1 xS1 where the last step follows from the calculation of the first term of |D| = 1 since x0 = x, kxS1 k2 = c. Combining term for xj s cancelled and the Renyi divergence is  them 2together,  the integration (λ−1) σ 2 c2 σ 2 c2 (λ−1) 1 = O( ), the same as that at |D| = 1. λ−1 log 2exp 2 2 A.5 Additional Experiments for GLMs In this section, we present more experimental results on the same datasets. We show the negative log-likelihood at λ ∈ {1, 10, 100} in Figure 6. We can see the same trend as that in test error. Both of our proposed algorithms achieves smaller negative log-likelihood, and the diffused algorithm achieves lower negative log-likelihood than the concentrate algorithm. 33 101 2 100 -2 0 100 -4 -2 0 (a) Abalone. -4 10 2 -2 0 100 -4 10 -2 0 100 -4 -2 0 (b) Adult. Test -log(likelihood) 100 -4 2 -2 0 2 Concentrated Diffuse OPS True Posterior 101 100 2 Concentrated Diffuse OPS True Posterior 1 Concentrated Diffuse OPS True Posterior 101 2 Concentrated Diffuse OPS True Posterior 1 2 Concentrated Diffuse OPS True Posterior 101 100 Test -log(likelihood) 0 Concentrated Diffuse OPS True Posterior -4 Test -log(likelihood) -2 10 Concentrated Diffuse OPS True Posterior 1 -4 Test -log(likelihood) -4 Test -log(likelihood) 10 0 Test -log(likelihood) 101 Test -log(likelihood) Test log(-log(likelihood)) Test -log(likelihood) Concentrated Diffuse OPS True Posterior -2 0 2 Concentrated Diffuse OPS True Posterior 101 100 -4 -2 0 2 (c) MNIST 3vs8. Figure 6: Negative log-likelihood vs. privacy parameter . λ = 1, 10, 100 from top to bottom. y-axis plotted in log scale. 34
2cs.AI
FQAM-FBMC Design and Its Application to Machine Type Communication Yinan Qi, Milos Tesanovic Samsung Electronics R&D Institute UK, Staines, Middlesex TW18 4QE, UK {yinan.qi, m.tesanovic}@samsung.com Abstract—In this paper, we propose a novel waveform design which efficiently combines two air interface components: Frequency and Quadrature-Amplitude Modulation (FQAM) and Filter Bank Multicarrier (FBMC). The proposed approach takes the unique characteristics of FQAM into consideration and exploits the design of prototype filters for FBMC to effectively avoid self-interference between adjacent subcarriers in the complex domain, thus providing improved performance compared with conventional solutions in terms of selfinterference, spectrum confinement and complexity with negligible rate loss. The resulting waveform properties are proven in this paper to be particularly suitable for Machine Type Communications (MTC) devices due to the observed reduced PAPR and lowered energy consumption. MTC has created a new eco-system that gives rise to a plethora of interesting applications and new business opportunities in the fifth-Generation (5G) mobile system and services – the enabling technology for the emerging paradigm of Internet of Things (IoT). Keywords—FQAM; QAM-FBMC; 5G; PHY; waveform design; MTC; IoT; spectral efficiency; PAPR; energy consumption I. INTRODUCTION Within the pivotal objective of developing the overall 5G RAN design, air interface design will play a crucial part since its components directly impact spectrum efficiency, out-ofband emissions, throughput and transmission delay, system capacity and reliability, as well as hardware complexity and energy efficiency [1]-[2]. With ambitious goals set for 5G of supporting services with different (and often diverging) requirements, a highly flexible 5G air interface design will be required to answer this demand. As MTC has been one of key driving forces to 5G, spectrally efficient support for heterogeneous services that have quite different requirements is becoming ever so important. Accordingly, several enabling airinterface design methods have been actively investigated to support flexible spectrum sharing. Machine Type Communication (MTC), also commonly known as Machine-to-Machine (M2M), refers to exchange of information (whether wireless or wired) to and from machines without human involvement [3]-[4]. Two important components of air interface design for MTC devices are waveform and modulation schemes. The choice of waveforms plays a major role in the successful realization of 5G. Cyclic Prefix (CP)-OFDM, as a waveform widely used in current wired/wireless communication systems, has been considered as one of the candidates for 5G waveforms. CP-OFDM achieves perfect orthogonality of subcarrier signals in the complex domain that allows trivial generation of transmit signal through IFFT, trivial separation of the transmitted data symbols at the receiver through FFT, and trivial adoption to MIMO channels [5]-[8]. It is well-localized in time domain and thus suitable for delay critical applications and Time Division Duplexing (TDD) based deployments. However, the spectral efficiency of CPOFDM is reduced because of the usage of CP and it has comparatively high out of band (OOB) leakage. In this regard, FBMC is proposed as an alternative [9]-[10]. FBMC enhances the fundamental spectral efficiency because of the well-localized time/frequency traits adopted from a pulse shaping filter per subcarrier, thus reducing the overhead of guard band required to fit in the given spectrum bandwidth, while meeting the spectrum mask requirement. Furthermore, the effectively increased symbol duration is suitable for handling the multi-path fading channels even without CP overhead. Consequently, the FBMC system can reduce the inherent overheads such as CP and guard-bands in CP-OFDM. FBMC is attractive in specific asynchronous scenarios, where Coordinated Multi-Point Transmission and Reception (CoMP) and Dynamic Spectrum Access (DSA) in a fragmented spectrum are employed to support the much higher traffic demand in 5G. However, to maintain the transmission symbol rate, the conventional FBMC system generally doubles the lattice density either in time or in frequency compared with OFDM while adopting OQAM [11]. In OQAM, in-phase and quadrature-phase modulation symbols are mapped separately with half symbol duration offset. Thus, OQAM-FBMC or SMT causes intrinsic interference that makes it not straightforward to apply conventional pilot designs and corresponding channel estimation algorithms as well as MIMO schemes as in CPOFDM systems. In this regard, QAM-FBMC system which can transmit the QAM symbols is proposed to enable fundamental spectral efficiency enhancement whilst keeping the signal processing complexity low [12]-[14]. Basically, QAM-FBMC use different prototype filters to odd- and even-numbered subcarriers to maintain complex domain orthogonality. QAMFBCM is shown to be able to remove intrinsic interference and thus the implementation of channel estimation and MIMO is straightforward. Another important component is modulation. QAM is envisioned to be adopted in 5G as it provides good Euclidian distance properties and it is easy to demodulate. Instead of the conventional QAM modulation, FQAM as a combination of QAM and Frequency Shift Keying (FSK) has been proposed in conjunction with OFDMA and it has demonstrated a significant performance gain especially for the cell-edge users [15]. With Figure 1 Conventional QAM-FBMC FQAM, the statistical distribution of inter-cell interference is likely to be non-Gaussian, especially for cell-edge users. It is proved that the worst-case additive noise in wireless networks with respect to the channel capacity has a Gaussian distribution. From this observation, one can expect that the channel capacity can be increased by FQAM which makes inter-cell interference non-Gaussian. In addition, the fact that only a small number of sub-carriers are activated in FQAM results in low PAPR so that the energy efficiency is improved, thereby makes it a suitable solution for MTC devices with stringent energy consumption requirements. However, trying to harness the similar benefits by applying FQAM in an FBMC-based system through direct integration of the two might not be able to fulfill the key objectives for modulation and waveform design for MTC devices: 1) low complexity, e.g., computation complexity and implementation complexity, 2) low self-interference, 3) good spectrum confinement, i.e., low out-of-band (OOB) emission, and 4) good frequency localization, i.e., small side-lobe. In this regard, direct implementation of FQAM in current QAMFBMC may cause following problems: • different prototype filters are needed for odd- and even-numbered subcarriers, which increases the implementation complexity; • when the spectrum confinement and frequency localization are good, there is strong selfinterference in the complex domain; • when self-interference is small, spectrum is not well confined. In this paper, we propose a new method to integrate FQAM and FBCM to achieve four main objectives at the expense of only a minor transmission rate loss. The rest of the paper is organized as follows. In section II of this paper, a system model is provided. Then the proposed solutions are introduced in Section III. Section IV is devoted to analyzing the performance of the proposed approach in terms of complexity, self-interference, spectrum confinement and frequency localization. Some numerical results are presented in section V and the paper is concluded in section VI. II. SYSTEM MODEL The conventional QAM-FBMC system separates adjacent subcarriers with B filter-banks keeping near orthogonality in complex domain. The transmitted signal can be expressed as  MB −1 2π n  j s  M /B  x ( n ) =   pb [n − kM ]   Db,s [k ] e  k =−∞ b = 0  s =0    +∞ B −1 (1) where Db,s[k] is the complex data symbol on the (sB+b)-th subcarrier in the k-th symbol, M is the total number of subcarriers and pb[n] is the b-th prototype filter. The time domain filter coefficients pb[n] is given by {n|0≤n<LM}, where L is called an overlapping factor. With L≥2, the QAM-FBMC symbols have duration LM and thus partially overlap. The QAM-FBMC system can be efficiently implemented using M/B-point inverse fast Fourier transform (IFFT), BL-times repetition, and time domain base filtering as shown in Figure 1 [13] for the case of L=2. FQAM is a combination of Frequency Shift Keying (FSK) and Quadrature Amplitude Modulation (QAM) [15]. A (MF, MQ) F-QAM symbol carries log2MF + log2MQ bits, where log2MF bits represent one of the frequency tones, and log2MQ represent one of the QAM symbols as shown in Figure 2. Figure 2 FQAM Three design options are proposed in the current QAMFBMC systems [12]-[13], where different prototype filters are used for odd- and even-numbered subcarriers, i.e., B=2. As a simple extension of the QAM implementations, i.e. without taking other issues (such as spectrum confinement and complexity into consideration), FQAM can be implemented in these solutions as Figure 3 Self-interference in frequency domain for scheme 1 x (n) = +∞ B −1  k =−∞ b = 0  MB −1 2π n  j s  pb [ n − kM ]  δ fb, s ,lb, s Db, s [ k ] e M / B  (2)  s =0     where fb,s∈{0, 1, …, MF-1} is the frequency-tone index based on FSK modulation for the (sB+b)-th subcarrier, lb,s= (sB+b) modulo MF, and δf,l is the Kronecker delta function defined as 1, 0, δ f ,l =  f = l, f ≠ l. (3) III. PROPOSED APPROACH In contrast to the current solution, we propose to use the same prototype filters for all subcarriers, meaning that FQAM can be implemented as x (n) = +∞ M −1  δ k =−∞ m = 0 f m ,lm p [ n − kM ] Dm [ k ] e j 2π n m M (4) where fm∈{0, 1, …, MF-1} is the frequency-tone index based on FSK modulation for the m-th subcarrier, lm= m modulo MF. The use of the same prototype filter for odd- and evennumbered subcarriers significantly reduces implementation complexity. The prototype filter should be carefully designed to provide good spectrum confinement and therefore PHYDYAS filter is employed [9]. In traditional QAM-FBMC, the level of self-interference mainly depends on the filter shape and spacing between two adjacent subcarriers, denoted as Δf. In FQAM-FBMC, only one out of MF subcarriers is activated to carry a QAM symbol and the rest of the subcarriers are deactivated. Therefore, the level of self-interference depends on the spacing between two active subcarriers carrying QAM symbols, which is a multiple of Δf, anywhere between 1×Δf and (MF-1)×Δf. In this regard, two approaches are proposed to eliminate self-interference. A. Scheme 1: FQAM(ASK)-FBMC With PHYDYAS filter, we know that as long as the spacing between two adjacent active subcarriers is larger than 2Δf, the self-interference could be extremely small [9]. As only one out of MF subcarriers is activated to carry a QAM symbol and the rest of the subcarriers are deactivated, it follows that as long as fm≠0 or MF-1, i.e., the subcarriers on the two edges are not activated, no self-interference will be generated from FQAM symbol n to adjacent FQAM symbol n±1 as shown in Figure 3 (a), where the spacing between two activated subcarriers is 5Δf. Therefore, QAM can be used in conjunction with FSK to form a FQAM symbol. On the contrary, if the subcarriers on the edge are activated as shown in Figure 3 (b), strong complex domain selfinterference will occur between two FQAM symbols demonstrated by the overlapping part of two activated edge subcarriers. In such a case, complex domain self-interference cannot be eliminated. Therefore, ASK modulation is proposed to be applied in either real or imaginary domain only on the edge subcarriers that might cause self-interference to ensure complex domain orthogonality and the modulation is therefore FASK. When ASK is applied, the transmission rate in terms of bits/symbol is reduced (since we use ASK instead of QAM) but the rate loss could be small depending on FSK modulation order. B. Scheme 2: Opportunistic FQAM-FBMC In the scheme 1, ASK is applied as long as an active subcarrier is possible to generate self-interference. In scheme 2, the spacing between adjacent active subcarriers are taken into consideration and QAM or ASK modulation is opportunistically applied. By doing this, the rate loss can be further reduced. Instead of only transmitting in real/imaginary domain, we propose that after FSK modulation, if the subcarrier at either edge of one FQAM symbol is activated, its adjacent FQAM symbol will be checked. There is a possibility that the adjacent FQAM symbol does not activate the subcarrier that may cause self-interference as shown in Figure 4. In such a case, QAM symbols can still be applied even when fm=0 or MF, i.e., the edge subcarrier is activated. Only when two adjacent subcarriers are activated at the same time, ASK modulation in real/imaginary domain is employed as in scheme 1. The transmission rate loss is reduced to RΔ = 1 log 2 M Q MF2 ( ) (8) For (MF,MQ)=(4,4), the average rate of the proposed scheme is 3.875 bit/symbol with 3.13% rate loss compared with normal rate 4 bit/symbol. When we have (MF,MQ)=(8,4), the average rate of the proposed scheme is 4.97 bit/symbol with only 0.7% rate loss compared with normal rate 5 bit/symbol. IV. PERFORMACE COMPARISONS There are three existing QAM-FBMC solutions with different prototype filter design: Figure 4 Opportunistic FQAM-FBMC It should be noted that when the new schemes are applied, the difference between eq. (2) and (4) is Dm[k] in (4) could be either QAM modulated complex signal or ASK modulated real/imaginary signal depending on the level of selfinterference generated by the active subcarriers. In addition, the demodulation of opportunistic FQAM-FBMC should take into account the constraints imposed by the modulation. C. Rate Loss Analysis In scheme 1, FSK always carries log2(MF) bits. For edge subcarriers, ASK carries 1/2log2(MQ) and the incidence of applying ASK is 2/MF, giving an average of log2(MQ)/MF bits in total for edge subcarriers. For non-edge subcarriers, QAM carries log2(MQ) and the incidence of such a case is (MF-2)/MF, so that total (MF-2)/MF*log2(MQ) bits can be conveyed on average. Summing the two together, the average transmission rate, in bits per symbol, is given as R = log 2 ( M F ) + M F −1 log 2 M Q MF ( ) (5) The transmission rate will be reduced due to replacing QAM with ASK but the rate loss could be small with increased FSK modulation order. The reduction is • Solution 1: PHYDYAS filter and its block interleaved variant are used for odd- and even-numbered subcarriers, respectively [12]. • Solution 2: Type-I filter is used for both odd- and even-numbered subcarriers [13]. • Solution 3: Two different Type-II filters are used for odd- and even-numbered subcarriers, respectively [14]. We will compare these state-of-the-art QAM-FBMC based solutions with our proposed FQAM-FBMC scheme in terms of self-interference, spectrum confinement and complexity in this section. A. Self-interference Comparisons The signal power and the total self-interference power on (b, s)-th subcarrier can be calculated as Ps = p( b , s ),( b , s ) [0] Pi =  2 L  2 ( b ', s ' ) ≠ ( b , s ) k =− ( L −1) p( b, s ),( b ', s ') [kM ] − p( b , s ),( b, s ) [0] 1 log 2 M Q MF ( ) (6) For example, for the proposed FQAM-FBMC design, when we have (MF,MQ)=(4,4), the rate of the proposed scheme is 3.5 bit/symbol with 12.5% rate loss compared with normal rate 4 bit/symbol. When we have (MF,MQ)=(8,4), the rate of the proposed scheme is 4.75 bit/symbol with only 5% rate loss compared with normal rate 5 bit/symbol. With the opportunistic approach, the transmission rate loss can be further reduced. Using similar analysis as in the first scheme, the transmission rate is given as R = log 2 ( M F ) + M F2 −1 log 2 M Q MF2 ( ) (7) , (9) respectively, and the self-signal-to-interference ratio (self-SIR) can define as γ self = 10 log10 RΔ = 2 Ps (dB) Pi (10) Conventional solution 2 and 3 only achieve around 15 and 20dB self-SIR based on (9) and (10) because of the strong selfinterference. With relatively low self-SIR, only low order modulation schemes can be applied, e.g., 4QAM and 16 QAM. On the contrary, conventional solution 1 can achieve more than 60dB self-SIR and therefore high order modulation, e.g., 64QAM, can be applied. Since it is possible to achieve more than 60dB self-SIR based on (9) and (10), in the proposed scheme the self-interference can be very small, even negligible. This is due to the fast fall-off rate provided by PHYDYAS filter. B. Spectrum Confinement and Frequency Localization Comparisons In the first solution, PHYDYAS filter is used for oddnumbered subcarriers and a block interleaved PHYDYAS filter is used for even-numbered subcarriers for the sake of complex domain orthogonality. However, the block interleaving will severely undermine the spectrum confinement performance as shown in Figure 5. Figure 7 AWGN Channel Figure 5 PSD for the odd-numbered subcarriers The high side-lobe lead to two consequences: 1) high intersubcarrier interference in asynchronous scenario and thus imposes very high requirement for synchronization; 2) more guard band at two edges of the entire spectrum, which will cause low spectral efficiency. Both have negative impacts on the implementation of MTC devices. The second solution uses a prototype filter with PSD similar to that of PHYDYAS filter as shown in Figure 6 and the same filter is used for both even- and odd-numbered subcarriers. Thus its spectrum confinement performance is similar with the proposed scheme. Figure 8 EVA Channel increases the implementation complexity compared to the proposed scheme with only one prototype filter. Therefore, the computation complexity of solution 1 and 3 is higher than the proposed scheme. V. NUMERICAL RESULTS Figure 6 PSD of Type-I and Type-II filters The PSD of Type-II filter in solution 3 is shown in Figure 6 as well. Clearly, it has a larger side-lobe and the spectrum is not confined as well as Type-I filter and the proposed scheme. C. Complexity From the complexity perspective, both solution 1 and solution 3 use two different prototype filters, which clearly In this section, we present numerical results to compare the performance of the proposed approaches with conventional ones. Here we assume M=100, L=4 and zero forcing (ZF) equalization is used for non-Gaussian channel. Uncoded bit error rate (BER) results for both AWGN channel (given as an initial study, applicable to conventional channels with static or low-speed users) and 3GPP Extended Vehicular A (EVA) channel with speed 50 km/h (provided to cover more realistic cases and high speeds) are presented as shown in Figure 7 and 8 [16]. The modulation order of FQAM is (MF,MQ)=(4,4), which is used to for all approaches. As can be seen from the figures, the BER performance of the conventional solutions is determined by self-SIR. Solution with the highest self-SIR (over 60 dB), i.e., solution 1 achieves the best performance and performance of solution 2 and 3 is degraded because of the lower self-SIR (20 and 15 dB). The proposed approach 1, where ASK is used to avoid selfinterference for the edge subcarriers, slightly outperforms the best conventional solution because the self-interference can be completely removed. The proposed approach 2 has slightly higher BER than the conventional solution 1 and achieves the same BER as conventional solution 2. Both new approaches suffer certain level of rate loss but the loss of the second approach is negligible. More importantly, both new approaches have lower complexity and better spectrum confinement. [3] [4] [5] [6] [7] [8] Finally, a qualitative comparison of the above schemes is presented in Table-I. [9] Table-I Comparisons [10] Complexity Selfinterference Spectrum confinement Frequency localization Solution 1 Medium Low Solution 2 Low High Solution 3 High Medium New schemes Low Low Bad Good Medium Good Bad Good Medium Good [11] [12] [13] VI. CONCLUSIONS There are some major requirements for the design of airinterfaces for MTC devices: 1) low complexity, 2) low energy consumption and 3) better spectrum confinement considering MTC devices might need to operate in an asynchronous manner. In this paper, we propose novel approaches to efficiently integrate FQAM and FBMC for MTC devices to fulfill these objectives. The PAPR of FQAM is lower because only 1 subcarrier is activated out of MF subcarriers; this additionally reduces energy consumption. Whereas two different prototype filters are used for odd- and even-numbered subcarriers in conventional QAM-FBMC, only one prototype filter is employed in the new approaches to reduce implementation complexity. In addition, the proposed solutions also achieve low self-interference by utilizing the unique characteristics of FQAM. Better spectrum confinement is achieved using the PHYDYAS prototype filter. ACKNOWLEDGEMENTS This work has been performed in the framework of the H2020 project METIS-II co-funded by the EU. The views expressed are those of the authors and do not necessarily represent the project. The consortium is not liable for any use that may be made of any of the information contained therein. REFERENCES [1] [2] Samsung 5G vision white paper, Feb. 2015, available at: http://www.samsung.com/global/businessimages/insights/2015/Samsung-5G-Vision-0.pdf Milos Tesanovic et.al., “Towards a flexible harmonised 5G air interface with multi-service, multi-connectivity support”, Proc. ETSI Air Interface Workshop, Sophia-Antipolis, January 2016. [14] [15] [16] M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From Today’s INTRAnet of Things to Future INTERnet of Things: A Wireless and Mobility Related View”, IEEE Wireless Communications Magazine, vol. 17, no.6, pp. 44-51, Dec. 2010. Y. Qi, A. Ijaz, M. Webb, Y. Morioka, A. Quddus, Y. Ma, and R. Tafazolli, "On the Physical Layer Design for Low Cost Machine Type Communication in 3GPP LTE," in Proc. of VTC fall 2014. R. Van Nee and R. Prasad, OFDM for Wireless Multimedia Communications, Boston, MA: Artech House, 2000. Y. Li and G. L. Stüber, Eds., Orthogonal Frequency Division Multiplexing for Wireless Communications. New York, NY: SpringerVerlag, 2006. Air Interface for Fixed and Mobile Broadband Wireless Access Systems, IEEE Standard 802.16e, 2005. M. Morelli, C. C. Jay Kuo, and M. O. Pun, “Synchronization techniques for orthogonal frequency division multiple access (OFDMA): A tutorial review,” Proc. IEEE, vol. 95, no. 7, pp. 1394–1427, July 2007. M. Bellanger, et. al, “FBMC physical layer: a primer,” 06 2010. [Online]. Available: http://www.ict-phydyas.org B. Farhang-Boroujeny, “OFDM Versus Filter Bank Multicarrier,” IEEE Signal Processing Magazine, vol. 23, pp. 92-112, May 2011. C. Lele, P. Siohan and R. Legouable, “Channel estimation with scattered pilots in OFDM/OQAM,” in in SPAWC 2008, Recife, Brazil., pp. 286290, Jun. 2008. Hyungju Nam, et.al., “A New Filter-Bank Multicarrier System for QAM Signal Transmission and Reception,” in Proc. IEEE Intern. Conf. Commun. (ICC’14), Jun. 2014, pp. 5227–5232. Y. Yun, C. Kim, K. Kim, Z. Ho, B. Lee, and J. Seol, "A new waveform enabling enhanced QAM-FBMC systems," in Proc. of 2015 IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp.116-120, Stockholm, Sweden, June 2015. K. Kim, Y. H. Yun, C. Kim, Z. Ho, Y. Cho, and J. Seol, “Pre-processing based soft-demapper for per-tone MIMO operation in QAM-FBMC systems,” in Proc. of 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 507-511, Hong Kong, China, Aug. 2015. Sungnam Hong et al., “Frequency and Quadrature- Amplitude Modulation for Downlink Cellular OFDMA Networks,” IEEE Journal on Selected Areas in Communication, vol. 32, no. 6, pp.1256-1267, Jun. 2014. 3GPP TS 36.104. "Base Station (BS) radio transmission and reception." 3rd Generation Partnership Project; Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (EUTRA). URL: http://www.3gpp.org.
7cs.IT
1 An SDR Implementation of a Visible Light Communication System Based on the IEEE 802.15.7 Standard arXiv:1803.07337v1 [eess.SP] 20 Mar 2018 ∗ Centre Jorge Baranda∗ , Pol Henarejos∗ , Ciprian G. Gavrincea∗ Tecnològic de Telecomunicacions de Catalunya (CTTC), Castelldefels, Barcelona (Spain) Email: {jorge.baranda, pol.henarejos, ciprian.gavrincea}@cttc.es Abstract—The aim of this paper is to present an implementation of a functional IEEE 802.15.7 real-time testbed based on the Software Defined Radio (SDR) concept. This implementation is built with low cost commercial off-the-shelf (COTS) analog devices and the use of Universal Software Radio Peripheral version 2 (USRP2) equipment combined with a generic object-oriented framework that takes advantage of several open source software libraries. The prototype is validated in a controlled laboratory environment with an over-the-air measurement campaign. I. I NTRODUCTION Visible Light Communications (VLC) is an emerging research field of free space optic (FSO) communications. The evolution of high-power white light emitting diodes (LEDs) within the last decades has led to the development of low cost lighting devices with better performance in terms of both energy efficiency and life expectancy. LEDs are expected to replace incandescent light bulbs and fluorescent lamps in the next generation illumination systems. Nonetheless, these devices can be used for applications beyond the illumination purpose [1]. The use of a LED to transmit data while serving as an illumination source has captured the interest of the research community as well as global standardization efforts [2]. The use of VLC technology presents many attractive advantages in terms of available bandwidth, non-interference with radio bands (critical especially due to the scarcity in some frequency bands such as ISM), potential spatial reuse, inherent protection against eavesdropping and, all of this with power efficient devices and without high deployment costs. In the last years, the focus of the research community has been centered in improving the data rates achievable by VLC systems, obtaining performances of 1.25 Gb/s [3]. Nevertheless, although there are some standards already published for VLC communications ([4], [5]), proof-of-concept implementation examples based on these standards are scarce. In this paper, we present, to the best of our knowledge, the first implementation of a real-time VLC system prototype based on the IEEE 802.15.7 specification [5] using low cost COTS analog devices. For this development, we have followed an SDR based design approach, similar to the one presented in [6]. The SDR based approach brings a lot of advantages to develop communication system testbeds, regarding a pure hardware (HW) based implementation. Among them, we would like to highlight: flexibility, modularity, reduced financial costs and shorter development time. These advantages are due to the fact that, in an SDR-based implementation, hardware problems are turned into software problems, allowing the use of novel algorithms almost immediately, accelerating the transition from simulation to demonstration. From the variety of available commercial SDR platforms [7], we find attractive the equipment provided by Ettus Research [8], specially the USRP2 and its predecessors, because of its superior tradeoff between price and performance and, the support provided by a large user community. Finally, this paper unveils the performance of the developed VLC system with an over-theair measurement campaign. II. IEEE 802.15.7 PHY LAYER BRIEF OVERVIEW The IEEE 802.15.7 standard [5] defines the physical (PHY) and the medium access control (MAC) layer for short-range optical wireless communications using visible light for indoor and outdoor applications. One of its main distinguishing points compared to other specifications, such as the Japan Electronics and Information Technology Industries (JEITA) specifications [4], is the support for dimming and flickering mitigation techniques [9]. These aspects are very important due to the negative physiological effects that flickering may have in humans and because dimming allows power savings and energy efficiency. The standard presents three different PHY layers which are grouped by their data rates. The operation range of PHY I is from 11.67 kb/s to 266.6 kb/s, PHY II data rates are comprised between 1.25 Mb/s and 96 Mb/s, while PHY III operates from 12 Mb/s to 96 Mb/s. The modulation formats are different among PHY I/II and PHY III. While PHY I and PHY II use on-off keying (OOK) and variable pulse-position modulation (VPPM), PHY III uses a particular modulation format called color shift keying (CSK), in which information is transmitted by means of multiple optical sources. Each PHY mode includes run length limiting (RLL) codes to achieve direct current (DC) balance, avoiding data induced flickering, and forward error correction (FEC) schemes to improve the link reliability for the envisaged environments. PHY I is optimized for low data rate, transmissions over long distances, e.g., outdoor applications such as traffic and vehicle lights; and PHY II/III are designed for high data rate indoor point-to-point applications. FEC schemes proposed by 2 the standard are a combination of Reed-Solomon (RS) and convolutional codes (CC). These schemes work reasonably well in the presence of hard-decisions performed by the clock data recovery circuits (CDR) and make the interface with the proposed RLL codes (Manchester, 4B6B and 8B10B) easier. III. D EVELOPMENT METHODOLOGY The development of this prototype started with the implementation of a reference encoder-decoder model in MATLAB according to the specifications of [5] for PHY I/II operating modes. Regarding the MAC layer, only a set of features of the header specification are included to simplify the communication link. The construction of the model was useful for a better understanding of the specification and constituted an important debugging tool which helped in the posterior implementation under the FlexiCom object-oriented framework. FlexiCom framework is born as an evolution of the uPHYLA framework [10]. As uPHYLA, FlexiCom framework is intended as a tool to implement in software the physical layer of any communication system. Hence, a practical demonstration of novel signal processing and communication algorithms with real digitized signals can be performed within a short development time. Nevertheless, the new created architecture for the FlexiCom framework provides enhanced graphical capabilities and simplicity to users and developers, as depicted in Fig. 1. flow of samples in the GNU Radio environment, the effort is focused on redesigning the encoder/decoder chains, identifying the minimal processing units and introducing low-complexity algorithms which improve the system latency. Finally, we would like to highlight the importance of the testing phase to verify the successive development steps. In the MATLAB programming step, the exhaustive test of all possible combinations allows the functional verification of the encoder and the decoder implementation. Moreover, the information provided by this initial testing phase helps to accelerate the multi-level testing phase (basic block unit testing, module testing and system testing) of the implementation under the FlexiCom framework by means of the CppUnit testing framework [13]. IV. S YSTEM M ODEL The current prototype implementation supports the modulation and demodulation of all the operating and data modes defined for PHY I at [5], both for OOK and VPPM schemes. These modes are included in Table I. Based on the SDR approach used in this implementation, the prototype is divided into two main subsystems: hardware and software subsystem, as shown in Fig. 2. The hardware subsystem is constituted by the elements labeled as LED, Photodiode, USRP TX and USRP RX, while the software subsystem is composed by the elements labeled as FlexiCom TX and FlexiCom RX. TABLE I PHY I O PERATING M ODES Modulation OOK VPPM RLL Code Optical FEC clock rate Outer Code (RS) Inner Code (CC) (15,7) 1/4 (15,11) 1/3 Manchester 200 KHz (15,11) 2/3 (15,11) none none none (15,2) none (15,4) none 4B6B 400 KHz (15,7) none none none Data Operating Rate mode 11.67 kb/s 1 24.44 kb/s 2 48.89 kb/s 3 73.3 kb/s 4 100 kb/s 5 35.56 kb/s 1 71.11 kb/s 2 124.4 kb/s 3 266.6 kb/s 4 A. Hardware Subsystem Fig. 1. Graphical Interface used to configure the VLC communication layout. FlexiCom platform uses Nokia’s Qt library [11] to offer the possibility of choosing among a set of communication system layouts. Each layout presents a customized interface for system configuration and performance metric visualization. Moreover, this framework runs over most operating systems (OS) such as Windows, Linux or Mac OSX. Once the system is configured, FlexiCom uses the GNU Radio library [12] to construct the communication system and to distribute the samples among the involved blocks in a continuous flow. In the second development phase, the MATLAB code is ported to the FlexiCom framework. Due to the stream-based The analog transmitter front-end is constituted by the USRP2 platform equipped with the LFTX daughterboard, an amplification stage, the LED driver circuit and a commercial high power white LED as the light emitting source. The software subsystem generates the stream of bits which are digital to analog (DAC) converted in the USRP2. The modulated signal provided by the SDR platform is amplified to be adjusted to the levels required to control the LED driver circuit. This circuit is composed of a power MOSFET transistor (STD12NF06L) which acts in switching mode, providing the needed current to the LED fixture. The light source is a commercial phosphorescent white LED module (OSTAR R LE CW E2B), consisting of a blue LED covered by a yellow phosphor layer designed for indoor lighting applications. The light source is equipped with a reflector that reduces the 3 viewing angle of the LED and concentrates the light beam. With the current reflector, the viewing angle is reduced to 30◦ (half optical transmitted power is achieved at 15◦ from the axis of the LED device). Fig. 3. Structure of the VLC IEEE 802.15.7 software transmitter. At the transmitter, the PHR and the PSDU units are generated independently according to the system configuration. Each unit passes through a PHY I modulator block, where the corresponding FEC scheme and RLL coding are applied (see Table I). After the modulation, both units are assembled into one stream of data and the TDP pattern is inserted. In the last block, before the USRP2 device, the FLP pattern and the idle pattern are attached to form the entire frame. Fig. 2. IEEE 802.15.7 based VLC Prototype. The analog receiver front-end is constituted by the USRP2 device equipped with the LFRX daughterboard and a commercial photodetector (THORLABS R PDA36A) equipped with a spherical concentrating lens. The detector consists of a PIN silicon photodiode with an active area of 13 mm2 and an optical sensitivity of 0.2-0.4 A/W in the visible range. The PDA36A device is equipped with a transimpedance amplifier (TIA) chain circuit with manual adjustable gain, ranging between 0 and 70 dB. This setting impacts in the receiver bandwidth. But this is not the only bandwidth limiting factor of this setup. Beside the limitations of the LED fabrication process [14], the high amount of current that is required to operate (∼ 700 mA) conditions the switching speed possibilities of the led driver circuit. B. Software Subsystem The software subsystem is constituted by two general purpose processors (GPPs), one for the modulation and one for the demodulation of the signals. An IEEE 802.15.7 frame is composed of three elements: the synchronization header (SHR), the physical header (PHR) and the physical service data unit (PSDU). In order to maintain the level of luminance and to avoid inter-frame flickering, an in-band idle pattern is inserted between frames [9]. The SHR contains the fast locking pattern (FLP) and the topology dependent pattern (TDP), used to lock the CDR circuit and perform the synchronization with the incoming message. The PHR contains frame information related to the length of the data unit, the used modulation and FEC scheme. The PSDU is the data unit, and also contains the MAC Header (MHR) in which parameters such as the sequence length and control format fields are included. As the current implementation features a broadcasting system, it modulates/demodulates the MHR headers according to the format specified in [5] for data frames. The building blocks of the physical layer transmitter and receiver are depicted in Fig. 3 and Fig. 4, respectively. Fig. 4. Structure of the VLC IEEE 802.15.7 software receiver. At the receiver, frame synchronization and timing recovery are performed at the first block. Frame recovery is achieved through the exploitation of repeated patterns at the SHR header. Timing recovery is the procedure to determine the optimum sampling instant required to decide the value of the incoming bits. Due to the limitations of the USRP2 hardware in terms of clock reconfigurability, timing recovery is performed using a non-data aided detector based on the maximum likelihood (ML) algorithm [15]. According to this detector, the optimum sample corresponds to the one that maximizes the energy of the received oversampled sequence of samples. As this prototype works with a binary modulation, many transitions are produced within a frame. The oversampling allows a better reconstruction of the waveform, so the transitions can be easily detected through the maximum energy criterion. Both algorithms have a limited complexity, allowing a feasible implementation in terms of system latency. Moreover, the support of Vector-Optimized Library of Kernels (VOLK) inside the GNU Radio library allows the use of Streaming SIMD Extensions (SSE), which boosts the execution of the synchronization block by a factor of four. Once the incoming flow of bits is synchronized, the PHR and the PSDU units are extracted and demodulated according to the system configuration. Finally the bits are parsed in order to extract the information corresponding to the different units and the validity of the received frame is checked. A frame is declared invalid if there is an error in the cyclic redundancy check (CRC) field, or the frame sequence number does not correspond to the previous frame. Fig. 5 shows the distribution of the relative computational load among the receiving processing blocks obtained with the OProfile tool [16] when using Operation mode 1 and OOK modulation, which is the more demanding operating mode in terms of computer processing. The execution of 4 the receiving chain requires only 25% of the total computer processing power. The synchronization block represents 55% of the processing, while the demodulation (Manchester + CC + RS decoding + Deinterleaver operations) accounts for the 35%. The remaining 10% is required to extract the PHR and the PSDU bit streams and to parse the information included within these units. Fig. 5. Distribution of the computational load among the different receiving processing blocks. V. R ESULTS Once all the system units are tested and validated individually, the last phase of the development is dedicated to characterize the performance of the complete implementation (baseband modulation/demodulation, signal conditioning (DAC/ADC) and analog optical front-ends) using over-the-air measurements in a controlled environment. The transmitter code runs in a PC laptop with 2 GB of RAM and an Intel Core 2 Duo I3 processor clocked at 1.5 GHz. The receiver code runs in a PC laptop with 4 GB of RAM and an Intel Quad-core I5 processor clocked at 2 GHz. Additional details of the test-system are summarized in Table II. TABLE II T ESTBED S YSTEM D ETAILS Feature Operating System Platform QT Version GNU Radio Version USRP2 HW revision USRP2 Firmware version Daugtherboard model Transmitter Windows 7 H.E. FlexiCom 4.8 3.6.2 4 3.0.4 LFTX Receiver Ubuntu 12.04 FlexiCom 4.8 3.6.2 4 3.0.4 LFRX In the first experiment, measurements are taken in a medium-sized room without windows where the transmitter and the receiver are horizontally aligned and separated in order to determine the system bit-error rate (BER) performance versus the distance. In this setup, the transmitter is moved in 50 cm steps and, at least, 50000 frames of 128 bits of data are transmitted to measure the system performance. The amplification of the TIA chain at the receiver is set to 0 dB. The BER performance versus distance for each operating mode of the PHY I specification using OOK modulation is presented in Fig. 6. The points presenting a BER value of 10−6 means that no error was found during the test. 10−6 constitutes the floor of our measurement because the amount of transmitted bits in each repetition is in the order of 106 . Fig. 6. Performance of the VLC IEEE 802.15.7 prototype for different operating modes of PHY I using OOK modulation. Prior to analyze the performance of the system, a comment about the tested distances is worthy to be done. According to Section II, PHY I is thought to be used for outdoor applications. In such scenarios, the light emitter is constituted by an array of LED devices, which are capable of providing much more luminous flux than the current setup herein presented. One must remember that the current setup uses a single luminary with a maximum output of 450 lumens, according to its datasheet, which is suitable for indoor illumination systems. As expected, the system performance degrades with the distance as a consequence of a lower SNR value at the receiver site. Operation mode 1 and 2, which present the strongest channel coding schemes among the considered operating modes (see Table I), obtain the best performance. Nonetheless, as the distance between the transmitter and the receiver increases, the impact of channel coding in less robust schemes disappears and the BER performance becomes almost equivalent to the scheme without channel coding scheme (Op. mode 5), impacting in the achieved effective data rate. We define the effective data rate as the total amount of correct information bits received without taking into account the overhead introduced by the different headers (SHR, PHR and MHR) and the idle-pattern. Table III shows the measured effective data rate for each considered operating mode using OOK modulation at a distance of two meters. TABLE III M EASURED EFFECTIVE DATA RATE AT 2 METERS DISTANCE Operating Mode Op. Mode 1 Op. Mode 2 Op. Mode 3 Op. Mode 4 Op. Mode 5 Effective data rate 7.9 kb/s 18.01 kb/s 24.63 kb/s 32.38 kb/s 35.22 kb/s In the second experiment, we tested the end-to-end performance of our prototype when transmitting and receiving 5 a video coded in MPEG-TS (Transport Stream) format in a medium-sized office room with standard illumination conditions. The transmitter extracts the information from an MPEGTS stream coded at an MPEG2 video compression bit rate of 25 kb/s and audio rate of 16 kb/s, and modulates it according to the frame structure explained in Section IV-B using the coding scheme corresponding to 73.3 kb/s of data rate (see Table I). At the receiver side, the data payload is demodulated and sent through a user data protocol (UDP) socket connection to the VideoLAN streaming software [17]. Additionally, the system clock data rate is set to 500 KHz, 2.5 times faster than the IEEE 802.15.7 specification of PHY I OOK modulation in order to cope with the extra signaling of the MPEG stream and to achieve on-line displaying. The current prototype implementation supports the on-line streaming at a distance of around 1.5 m with an effective measured data rate of about 107 kb/s with a packet error rate (PER) of 1e-3. In this setup, the amplification of the TIA chain at the receiver is set to 20 dB. Fig. 7 presents one captured image from the received video signal, together with some metrics captured with the FlexiCom framework: effective data rate, number of total/lost packets, packet error rate (PER) and quantity of correct/incorrect decoded packets (PHR and PSDU units). Fig. 7. Received video capture, for a 1.5m link (from “Gangnam Style”, PSY, 2012). VI. C ONCLUSIONS AND FUTURE WORK We have presented a functional system prototype implementing all the operating modes of the PHY I specification of the IEEE 802.15.7 standard for VLC. This development is based on the SDR concept, providing the prototype with enough flexibility and modularity to enhance its capabilities without requiring long development time and high financial costs. The prototype is completed with low cost COTS analog devices to perform the transmission and reception of the light signal. The IEEE 802.15.7 standard serves as a promising platform to start developing and introducing VLC solutions into the market for low-medium data rate point-to-point and broadcast systems in the field of intelligent transportation systems (ITS) or smart indoor locating (SIL). Future system development will be focused on two aspects: a) the integration of dimming functionalities into the communication framework when using OOK modulation by inserting compensation symbols within the frame without reducing the range of the communication system; and b) further research into the analog subsystem to improve the system bandwidth and to implement the operating modes of PHY II. From the software point of view, the MATLAB simulator and the FlexiCom modules are easily customizable. ACKNOWLEDGMENT The authors would like to thank Miquel Payaró, Christian Ibars and the Access Technologies area members of CTTC for their support for the implementation of the VLC system prototype. R EFERENCES [1] T. Komine and M. Nakagawa, “Fundamental Analysis for Visible-Light Communication System using LED Lights”, IEEE Transactions on Consumer Electronics, vol. 50, no. 1, pp. 100-107, Feb. 2004. [2] J. Vucic and K.-D. Langer, “High-Speed Visible Light Communications: State-of-the-Art”, in Optical Fiber Communication Conference (OFC’12), Los Angeles, USA, Mar. 2012, OSA Technical Digest (Optical Society of America, 2012). [3] C. Kottke, J. Hilt, K. Habel, J. Vucic and K.-D. Langer, “1.25 Gbit/s Visible Light WDM Link Based on DMT Modulation of a Single RGB LED Luminary”, in Proc. European Conference on Optical Communications, Amsterdam, The Netherlands, Jun. 2012, OSA Technical Digest (Optical Society of America, 2012). [4] Japan Electronics and Information Technology Industries Association (JEITA), Visible Light Communication CP-1221, CP-1222 specifications, Japan, 2007. [5] Institute of Electrical and Electronics Engineers, “Standard for Local and metropolitan area networks, Part 15.7: Short-Range Wireless Optical Communication Using Visible Light”, Rev. 802.15.7-2011, 2011. [6] M. Rahaim, T. Borogovac, T.D.C. Little, A. Mirvakili and V. Joyner, “Demonstration of a Software Defined Visible Light Communication System”, in Demo and Exhibits of International Conference on Mobile Computing and Networking, Las Vegas, USA, Sep. 2011. [7] R. Farrell, M. Sanchez and G. Corley, “Software-Defined Radio Demonstrators: An Example and Future Trends”, International Journal of Digital Multimedia Broadcasting, vol. 2009, Article ID 547650, 12 pages, 2009. doi:10.1155/2009/547650. [8] Ettus Research LLC, “Universal Software Radio Platform” [Online]. Available: http://www.ettus.com, Retrieved: March 11, 2013. [9] R.D. Roberts, S. Rajagopal and S.-K. Lim, “IEEE 802.15.7 Physical Layer Summary”, GLOBECOM Workshops, 2nd IEEE Workshop on Optical Wireless Communications, Houston, USA, Dec. 2011, pp. 772-776. [10] J.Baranda, P.Henarejos, Y.Grunenberger, and M. Nájar, “Prototyping with SDR: a quick way to play with next-gen communications systems”, International Symposium on Wireless Communication Systems (ISWCS’11), Aachen, Germany, Nov. 2011, pp.16-20. [11] “QT Homepage” [Online]. Available: http://qt.nokia.com/products/, Retrieved: March 11, 2013. [12] “GNU Radio, the GNU Software Radio project” [Online]. Available: http://gnuradio.org/redmine/projects/gnuradio/wiki, Retrieved: March 11, 2013. [13] “CppUnit Project Page” [Online]. Available: http://sourceforge.net/projects/cppunit/, Retrieved: March 11, 2013. [14] J. Vucic, C. Kottke, S. Nerreter, A. Bttner, K.-D.Langer, and J.W. Walewski, “ White Light Wireless Transmission at 200+ Mb/s Net Data Rate by Use of Discrete-Multitone Modulation”, IEEE Photon. Technol. Lett. vol.21, no. 20, pp. 1511-13, Oct. 2009. [15] U. Mengali and A.N. D’Andrea, “ Synchronization Techniques for Digital Receivers ”, Plenum Press, NY, 1997. [16] “OProfile Homepage” [Online]. Available: http://oprofile.sourceforge.net/news/, Retrieved: March 11, 2013. [17] “VideoLAN Homepage” [Online]. Available: http://www.videolan.org/index.html, Retrieved: March 11, 2013.
7cs.IT
arXiv: 1706.00679 Testing Gaussian Process with Applications to Super-Resolution arXiv:1706.00679v2 [math.ST] 14 Nov 2017 Jean-Marc Azaïs• , Yohann De Castro?∗ and Stéphane Mourareau◦ • Institut de Mathématiques de Toulouse Université Paul Sabatier, 118 route de Narbonne, 31062 Toulouse, France ? Laboratoire de Mathématiques d’Orsay Univ. Paris-Sud, CNRS, Université Paris-Saclay, 91405 Orsay, France ∗ Équipe MOKAPLAN INRIA, 2 rue Simone Iff, 75012 Paris, France ◦ Laboratoire d’Analyse et de Mathématiques Appliquées Univ. Paris-Est, Champs sur Marne, 77454 Marne La Vallée, France Abstract: This article introduces exact testing procedures on the mean of a Gaussian process X derived from the outcomes of `1 -minimization over the space of complex valued measures. The process X can thought as the sum of two terms: first, the convolution between some kernel and a target atomic measure (mean of the process); second, a random perturbation by an additive (centered) Gaussian process. The first testing procedure considered is based on a dense sequence of grids on the index set of X and we establish that it converges (as the grid step tends to zero) to a randomized testing procedure: the decision of the test depends on the observation X and also on an independent random variable. The second testing procedure is based on the maxima and the Hessian of X in a grid-less manner. We show that both testing procedures can be performed when the variance is unknown (and the correlation function of X is known). These testing procedures can be used for the problem of deconvolution over the space of complex valued measures, and applications in frame of the Super-Resolution theory are presented. As a byproduct, numerical investigations may demonstrate that our grid-less method is more powerful (it detects sparse alternatives) than tests based on very thin grids. MSC 2010 subject classifications: Primary 62E15, 62F03, 60G15, 62H10, 62H15; secondary 60E05, 60G10, 62J05, 94A08. Keywords and phrases: Hypothesis Testing, Gaussian Process, Kac-Rice formula, Super-Resolution. Preprint version of January 8, 2018 1. Introduction 1.1. Grid-less spike detection through the “continuous” LARS New testing procedures based on the outcomes of `1 minimization methods have attracted a lot of attention in the statistical community. Of particular interest is the so-called “Spacing test ”, that we referred to as S ST , based on the Least-Angle Regression Selection (LARS), that measures the significance of the addition of a new active variable along the LARS path, see [16, Chapter 6] for further details. Specifically, one is testing the relative distance between consecutive “knots ” of the LARS, for instance λ1,P and λ2,P . The first knot λ1,P is the maximal correlation between a response variable and P predictors. The second knot λ2,P is then the correlation between some residuals and P − 1 predictors, and so on. This approach is now well 1 Azaïs, De Castro and Mourareau/1 INTRODUCTION 2 referenced among the regularized methods of high-dimensional statistics and it can be linked to minimizing the `1 -norm over P coordinates, see for instance [16, Chapter 6]. In this paper, we focus on `1 -minimization over the space of signed measures and we ask for testing procedures based on these solutions. Indeed, in deconvolution problems over the space of measures [7]—e.g., Super-Resolution or line spectral estimation [8, 14, 12, 20, 11, 3]—one may observe a noisy version of a convolution of a target discrete measure by some known kernel and one may be willing to infer on the discrete measure. In this case, testing a particular measure is encompassed by testing the mean of some “correlation” process, see Section 5 for further details. In particular, remark that there is an uncountable number of predictors—while there were P predictors previously when inferring on vectors of RP —since we are looking at correlations between a response variable and vectors indexed by a continuum, say [0, 2π). For instance, assume that one observes some moments (or Fourier coefficients) of some discrete measure on the torus [0, 2π) and one is willing to infer on its support. A strategy would be to look at correlations between the response variable and the moment curve (1, t, t2 , . . . , tn ) (or (cos(kt) ± ı sin(kt))). In this framework, the LARS algorithm does not return a sequence of entries (among P possible coordinates) and phases as in high-dimensional statistics but rather a sequence of locations (among the continuum [0, 2π)) and phases. In this paper, we invoke the LARS to this framework—we referred to it as “continuous” LARS—for which an uncountable number of active variables may enter the model. We present this extension in Section 6 defining consecutive knots (λ1 , λ2 ). One can wonder: • Can the Spacing test be used in the frame of Super-Resolution? • Is there a grid-less procedure more powerful, in the sense of detecting spikes, than the Spacing tests constructed on thin grids? 1.5 1 0.5 0 -0.5 -1 -1.5 thin grids LARS from the process X(·) ( 1, 2 , R) from the Hessian R and S Rice Grid-less approach LARS from P grid points X(·) ( 1,P , testing procedures 2,P ) from (X(tp ))P p=1 S ST Grid approach Figure 1. The grid-less approach uses the Hessian and the first two “knots” (λ1 , λ2 ) of the “continuous” LARS to build the test statistics S Rice . We compare it to the grid approach that builds a test statistics S ST using the knots (λ1,P , λ2,P ) computed from a P points grid discretization (X(tp ))P p=1 of the continuous process X. Interestingly, as we will prove, the answer is no to the first question if no modifications of the test statistic is done. Furthermore, the way that the Spacing test can be fixed to be extended to a “grid-less” frame gives a new testing procedure S Rice that accounts for the distance between 3 1 INTRODUCTION consecutive knots (λ1 , λ2 ) with respect to value of the Hessian at some maximal point, see Figure 1 for a global view on our approach. 1.2. A comparative study When the predictors are normalized, the Spacing test (ST) statistics is given by the expression S ST (λ1,P , λ2,P ) := Φ(λ1,P ) Φ(λ2,P ) where Φ = 1 − Φ is the Gaussian survival function and Φ the standard normal cumulative distribution function. In the framework of high-dimensional statistics, this statistics is exactly distributed w.r.t. a uniform law on [0, 1] under the global null, namely S ST can be considered as the observed significance [22, 4]. It is clear that one should not use this testing procedure in the Super-Resolution framework since there is no theoretical guarantees in this case. Yet the practitioner may be tempted to replace (λ1,P , λ2,P ) by (λ1 , λ2 ) given by the “continuous” LARS. Unfortunately, this paper shows that the resulting test statistics S ST is non conservative in this frame, i.e., it makes too many false rejections and one should avoid using it in practice, see the green line in Figure 2. 1 1 1 0.9 0.9 0.9 0.8 0.8 0.8 0.7 0.7 0.7 0.6 0.6 0.6 0.5 0.5 0.5 0.4 0.4 0.4 0.3 0.3 0.3 0.2 0.2 0.2 0.1 0.1 0.1 0 0 0 0.2 0.4 0.6 0.8 1 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 Figure 2. [Under the null] Comparison of the empirical cumulative distribution of the two statistics S Rice (blue line, see Theorem 6) and S ST (green line) under the null hypothesis when applied to the consecutive knots (λ1 , λ2 ) given by the “continuous” LARS in both cases. The diagonal (cdf of the uniform) is represented in dotted black line. The model is described by the Super-Resolution framework (see Section 5) with cutoff frequencies fc = 3, 5, 7 from left to right. The new test statistic S Rice is exactly distributed w.r.t. the uniform law on [0, 1] under the null hypothesis. To overcome this disappointing feature, one may be willing to consider thinner and thinner grids and look at the limit as P tends to infinity. In this case, one can show that λ1,P tends to the λ1 of “continuous” LARS, but λ2,P does not converge to λ2 , it converges to λ2 as shown in (6). This results in a limit test that is a randomized version of the Spacing test that we referred to as S Grid and presented in Theorem 3. The second approach is to take a thin grid and to use S ST . This approach is perfectly valid, this test statistics follows a uniform distribution under the null and it should be compared to our new testing procedure S Rice . This numerical investigation has been performed in the frame of Super-Resolution and it is presented in Figure 3, more details can be found in Section 5.2. Figure 3 gives the cumulative distribution functions of the test statistics under “sparse” alternatives, i.e., when true spikes are to be detected. The larger the power, the better the test Azaïs, De Castro and Mourareau/1 INTRODUCTION 4 detects spikes (abscissa represents the level of the test and the ordinate the probability to detect the spike). In these sets of experiments, we can note that the testing procedure S Rice based on some Hessian and the whole process X(·) is uniformly better than the spacing test even if one takes very thin grids. One can see that the power (the ability to detect sparse objects, Dirac masses here) of the grid methods seems to present a limit that is always improved by the continuous approach. 1 1 1 0.9 0.9 0.9 0.8 0.8 0.8 0.7 0.7 0.7 0.6 0.6 0.6 0.5 0.5 0.5 0.4 0.4 0.4 0.3 0.3 0.3 0.2 0.2 0.2 0.1 0.1 0.1 0 0 0 0.2 0.4 0.6 0.8 1 0 0 0.2 0.4 0.6 0.8 1 1 1 1 0.9 0.9 0.9 0.8 0.8 0.8 0.7 0.7 0.7 0.6 0.6 0.6 0.5 0.5 0.5 0.4 0.4 0.4 0.3 0.3 0.3 0.2 0.2 0.2 0.1 0.1 0.1 0 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 0 0 0.2 0.4 0.6 0.8 1 Figure 3. [Under the alternative] Empirical cumulative distribution under the alternative of the Rice test (blue) and the discrete grid tests with size 32 (green) , 102 (red), 322 (purple) and 502 (cyan) . The√alternative is defined by a single atom at a random location with a weight log(N ) = log(2fc + 1) (first row) or N (second row). In columns : fc = 3, 5, 7. 1.3. Toward a functional testing procedure In the seminal paper [21], the authors generalize the LARS test to regularized least squares problems with penalization P being a semi-norm over P coordinates but they do not cover the “continuum” framework under consideration here. On the technical side, their convex dual formulation leads to the study of a linear Gaussian process on which they invoke a Kac-Rice formula while our convex dual formulation involves a functional framework for which Kac-Rice formula cannot be applied. Furthermore, exact testing procedures in High-Dimensional statistics are based on PostSelection Inference techniques. In a nutshell, note that the sub-gradient of the `1 -norm is a vector with entries in [−1, 1] so that, in `1 -minimization, the selection event is described by the signs (sub-gradient entry value {±1}) and the active support (indices for which the sub-gradient is ±1) at the solution point through first order optimality conditions such as the Karun-Kush-Tucker conditions. Post-Selection Inference is then the ability to build a testing procedure that may depend on the aforementioned selection event. This approach 5 1 INTRODUCTION might seem meaningless in the frame of Super-Resolution since the selection events have measure zero—given Gaussian responses and a finite subset S ⊂ [0, 2π), the probability that the output support of `1 minimization is exactly S is zero. Indeed, specifying the location and the phase of the supremum of a Gaussian process is an event with null measure. Remark also that there is an uncountable number of selection events—as many as the number of points in the index of the process. So the tools of Post-Selection Inference cannot be applied here and one need a new theoretical analysis of testing procedures based on the outcomes of `1 -minimisation over the space of signed measures. For the first time, this paper paves the way to build new testing procedures in the framework of Super-Resolution theory (and line spectral estimation). In particular, we prove that we can rightfully construct global null exact testing procedures on the first two knots λ1 and λ2 of the “continuous” LARS when one has a continuum of predictors, see Theorems 3 and 6 and Figure 2. These two new procedures offer the ability to test the mean of any stationary Gaussian process with known correlation function Γ and C 2 -paths. Furthermore, one of these tests is unbiased, see Theorem 3 and they can be both Studentized, see Theorems 4 and 8, when variance σ 2 is unknown. 1.4. Outline The outline of the paper is described by the following (short) table of contents: 2 Notations and problem formulation . . . . . . . . . . . . . . . . . . . 2.1 Hypothesis testing problem . . . . . . . . . . . . . . . . . . . . 2.2 The first and second knots of a Gaussian process . . . . . . . . 2.3 Estimating the variance . . . . . . . . . . . . . . . . . . . . . . 3 Passing to the limit, the grid approach . . . . . . . . . . . . . . . . . 4 The Rice method: a grid-less approach . . . . . . . . . . . . . . . . . 4.1 The known variance case . . . . . . . . . . . . . . . . . . . . . . 4.2 The unknown variance case . . . . . . . . . . . . . . . . . . . . 5 Applications to the Super-Resolution Theory . . . . . . . . . . . . . 5.1 Framework and results . . . . . . . . . . . . . . . . . . . . . . . 5.2 A numerical study . . . . . . . . . . . . . . . . . . . . . . . . . 6 LARS for complex-valued Gaussian processes . . . . . . . . . . . . . 6.1 Cameron-Martin type Assumption on the mean and Notations . 6.2 Description of the LARS . . . . . . . . . . . . . . . . . . . . . . 6.3 The second knot . . . . . . . . . . . . . . . . . . . . . . . . . . 6.4 Illustration: The two first knots of Super-Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 6 7 11 12 12 15 17 17 19 21 21 22 25 25 Notations and the formal problem formulation is described in Section 2. In Section 3, we present the test statistic S Grid which is constructed taking the limit of consecutive LARS knots (λ1,P , λ2,P ) on thinner and thinner grids (namely the number of predictors P tends to infinity). Section 4 is the theoretical construction of our grid-less test based on consecutive knots (λ1 , λ2 ) of the “continuous” LARS. The main result concerning the test statistic S Rice is presented in this section. Applications to spike detection in Super-Resolution are developed in Section 5. The general construction of the “continuous” LARS is given in Section 6. An appendix with the proofs can be found at the end of the paper. Azaïs, De Castro and Mourareau/2 NOTATIONS AND PROBLEM FORMULATION 6 2. Notations and problem formulation 2.1. Hypothesis testing problem In this paper, our purpose is to test the mean value of a stationary complex-valued Gaussian process Z with C 2 -paths indexed by [0, 2π). We assume that Z = A1 + ıA2 where A1 and A2 are two independent and identically distributed real-valued processes with C 2 -paths. Assume that the correlation function Γ of A1 (and A2 ) satisfies ∀t ∈ (0, 2π), |Γ(t)| < 1 (Anorm ) and let σ 2 := Var(A1 (·)) so that Cov(A1 (s), A1 (t)) = σ 2 Γ(t − s) . (1) We denote by T := [0, 2π)2 the 2-dimensional torus. Assume that we observe a real-valued process (X(z))z∈T indexed by T such that  ∀z ∈ T, X(z) := A1 (t) cos θ + A2 (t) sin θ = Re e−ıθ Z(t) , where z = (t, θ) and Re(·) denotes the real part of a complex number. Remark that observing X is equivalent to observe Z since we can recover Z from X and conversely. Furthermore, we may assume that the process (X(z))z∈T satisfies a.s. there is no point z ∈ T s.t. X 0 (z) = 0 and det(X 00 (z)) = 0, (Adegen ) where X 0 (z) and X 00 (z) denote the gradient and the Hessian of X at point z. Note that sufficient conditions for (Adegen ) are given by [5, Proposition 6.5] applied to (X(z))z∈T . In particular if the distribution of X 00 (t) is non degenerated, using [5, Condition (b) of Proposition 6.5], it implies that Assumption (Adegen ) is met. Note also that Assumption (Adegen ) is referred to as “Morse” process in [2]. Remark that (Anorm ) and (Adegen ) are mild assumptions ensuring that Z is a non-pathological process with C 2 -paths. This paper aims at testing the following hypotheses. H0 : “Z is centered ” against H1 : “Z is not centered ” . Subtracting the mean tested by the null hypothesis, remark that this framework encompasses any testing problem whose null hypothesis is a single hypothesis on the mean of Z. 2.2. The first and second knots of a Gaussian process As in high-dimensional statistics, we can define the first and second knots (λ1 , λ2 ) as follows. If we model some spatial correlation by means of the process X, the most correlated point zb ∈ T and the maximal correlation λ1 are respectively the argument maximum and the maximum of X defined by zb := arg max X(z) and λ1 := X(b z) . (2) z∈T Under Assumption (Anorm ), one can check that the argument maximum is almost surely a singleton, see Proposition 16. 7 2 NOTATIONS AND PROBLEM FORMULATION To construct the second knot, given a fixed z ∈ T, one can equivalently consider two regressions of X(y), as follows. • On the one hand, the regression on X(z) that will appear in the grid method of Section 3. Using a convenient normalisation related to the definition of the LARS knots, we set ∀y ∈ T \ {z}, X z (y) := where X(y) − X(z)ρ(z − y) X(y) − X(z) = X(z) + , 1 − ρ(z − y) 1 − ρ(z − y) ∀z ∈ T, ρ(z) := Γ(t) cos θ , is the correlation function of the stationary Gaussian process X. One can check that X z is a Gaussian process indexed by T \ {z} and independent of X(z). • On the other hand, the regression on (X(z), X 0 (z)) will be needed for convergence purposes in Section 4. With the convenient normalization, we set ∀y ∈ T \ {z}, X |z (y) := e −1 X 0 (z)i X(y) − ρ(z − y)X(z) + hρ0 (z − y), Λ . 1 − ρ(z − y) e := −ρ00 (0) is the variance-covariance where ρ0 is the gradient of the correlation function ρ and Λ matrix of the derivative process of X, namely X 0 . Since the derivative at zb is zero, note that X zb(·) = X |bz (·) and we define the second knot λ2 as yb := arg max X zb(y) and λ2 := X zb(b y ) = X |bz (b y) , (3) y∈T\{b z} where we prove that (b y , λ2 ) are well defined and that yb is almost surely unique, see Proposition 16 and Remark 7. Furthermore, the couple (b y , λ2 ) can be equivalently defined using the extension of the LARS to our framework, the interested reader may consult Section 6.3. 2.3. Estimating the variance When the variance σ 2 is unknown in (1), we precise here the assumptions and the estimator we use to estimate the variance. In this section, except for explicit examples, we consider a real valued Gaussian process Y not necessarily stationary defined on the 2-dimensional torus T. Let m ≥ 2 (possibly infinite) and assume that Y admits an order m Karhunen-Loève expansion in the sense that Y = m X i=1 ζi fi with Var(ζi ) = σ and ∀t ∈ T, 2 m X i=1 |fi (t)|2 = 1 , (KL(m)) where the equality holds in L2 (Ω) and (f1 , . . . , fm ) is a system of non-zero functions orthogonal on L2 (T). Through our analysis, we need to consider one of the following assumptions. • If m is finite, ∃(z1 , . . . , zm ) ∈ Tm pairwise distincts s.t. (Y (z1 ), . . . , Y (zm )) is non degenerated. (ND(m)) Azaïs, De Castro and Mourareau/2 NOTATIONS AND PROBLEM FORMULATION 8 • If m = ∞, ∀p ∈ N? , ∃(z1 , . . . , zp ) ∈ Tp pairwise distincts s.t. (Y (z1 ), . . . , Y (zp )) is non degenerated. ( ND(∞)) Recall that a Gaussian vector is called non-degenerated if its variance-covariance matrix is non-degenerated, i.e., it has full rank. Some examples of process Y satisfying (KL(m)) and (ND(m)) with m = ∞ are given by the normalized Brownian motion and any Gaussian stationary process with a spectrum that admits an accumulation point, see [10, Page 203]. For instance, the process corresponding to the Super-Resolution problem satisfies (KL(m)) and (ND(m)) with m finite, namely m is twice the number of observed frequencies, see Section 5. Definition 1. Let Y be a Gaussian process with constant variance σ 2 = Var(Y (·)) and satisfying Assumptions (KL(m)) and (ND(m)) with m finite. The quantity m 2 σ bKL (Y 1 X 2 ) := ζi , m i=1 is called the Karhunen-Loève estimator of σ 2 . 2 Remark 1. An explicit expression of the estimator σ bKL is always possible from some set of 0 pairwise disjoint points z1 , . . . , zm0 with m > m. We only need to check that the variancecovariance matrix of the (Y (z1 ), . . . , Y (zm0 )) has rank m. 2 Remark 2. Sufficiency considerations imply that σ bKL is an optimal unbiased estimator for the mean-squared error by Rao–Blackwell theorem. Given the aforementioned definition, we are now able to construct variance estimators for the process X. We assume that the complex Gaussian process Z that define X satisfies the following hypotheses for some N ∈ N. Z admits a complex Karhunen-Loève expansion of order N (KLZ (N )) and satisfies the following non-degeneracy conditions: ∀(t1 , . . . , tN ) ∈ [0, 2π)N pairwise distincts, (Z(t1 ), Z(t2 ), . . . , Z(tN )) is non degenerated and (NDZ (N )) 0 (Z(t1 ), Z (t1 ), Z(t3 ), . . . , Z(tN )) is non degenerated. Our aim is to build, for each z ∈ T, two estimators of the variance σ 2 independently from X(z) or (X(z), X 0 (z)). Indeed, in the following, we will distinguish two kind of statistics. The first one is the limit of the finite dimensional statistic S Grid , see Section 3. The second one is the case of the maximum over T, see Section 4. Both cases won’t use the same estimation of σ 2 . • In the grid situation, we define z Xnorm (y) := X(y) − ρ(z − y)X(z) p , 1 − ρ2 (z − y) 9 2 NOTATIONS AND PROBLEM FORMULATION where y belongs to T\{z}, ρ(·) denotes the correlation function of the process X and set 2 z σ bz2 := σ bKL Xnorm (·)  which is well defined, independent of X(z) and with constant variance σ 2 . Furthermore, it follows a σ 2 χ2 (2N −1)/(2N −1) distribution where χ2 (2N −1) denotes the chi-square distribution with 2N − 1 degrees of freedom, see Proposition 2. Finally, we consider the variance estimator (4) σ b2 = σ bzb2 , defined at point zb given by (2). • In the continuous case, we define e −1 X 0 (z)i X(y) − ρ(z − y)X(z) + hρ0 (z − y), Λ |z Xnorm (y) := q , e −1 ρ0 (z − y)i 1 − ρ2 (z − y) − hρ0 (z − y), Λ where y belongs to T \ {z} and set 2 2 |z σ b|z := σ bKL Xnorm (·)  which is well defined, independent of (X(z), X 0 (z)) and with constant variance σ 2 . Furthermore, it follows a σ 2 χ2 (2N − 3)/(2N − 3), see Proposition 2. Finally, we consider the variance estimator 2 σ b|2 = σ b|b (5) z, defined at point zb given by (2). Proposition 2. Let Z satisfy (KLZ (N )) and (NDZ (N )) and set z ∈ T then the following claims are true. (a) σ bz2 is well defined and follows a (b) 2 σ b|z is well defined and follows a σ 2 χ2 (2N −1) 2N −1 σ 2 χ2 (2N −3) 2N −3 distribution. distribution. |z z (·)/b σz is independent of σ bz , and the process Xnorm (·)/b σ|z is indepen(c) The process Xnorm dent of the random variable σ b|z . Proof. (a) Fix z = (t1 , θ1 ) ∈ T. Since Z satisfies (NDZ (N )), there exists (t2 , . . . , tN ) ∈ [0, 2π)N −1 pairwise different such that (Z(t1 ), Z(t2 ), . . . , Z(tN )) is non degenerated. Then, considering z1 = z, zN +1 = z + (0, π/2) and ∀i ∈ {2, . . . , N }, zi = (ti , θ1 ) and zN +i = (ti , θ1 + π/2), the vector V1 := (X(z1 ), . . . , X(z2N )) satisfies 2N = rank(X(z1 ), X(z2 ), . . . , X(z2N )) z z = rank(X(z1 ), Xnorm (z2 ), . . . , Xnorm (z2N )) z z = 1 + rank(Xnorm (z2 ), . . . , Xnorm (z2N )) z where rank denotes the rank of the covariance matrix of a random vector. Deduce that Xnorm (·) satisfies (ND(2N − 1)). This, in turn, implies that the 2N functions gi (·) = fi (·) − ρ(z − .)fi (z) Azaïs, De Castro and Mourareau/2 NOTATIONS AND PROBLEM FORMULATION 10 are in fact in a space of dimension 2N − 1 and a Gram-Schmidt orthogonalization in L2 (T) z z z gives (KL(2N − 1)) for the process Xnorm (·). Finally, from (Xnorm (z2 ), . . . , Xnorm (z2N )), we compute σ bz2 that follows the desired distribution. (b) In the case of the regression over (X(z), X 0 (z)), remark that ∂θ X(z) = X(t1 , θ1 + π/2) = X(z2 ) and ∂t X(z) = Re(e−ıθ1 Z 0 (t1 )) where ∂θ (resp. ∂t ) denote the partial derivative with respect to θ (resp. t). Because of hypothesis (NDZ (N )), the two vectors V1 and V2 := (X(z1 ), X(z2 ), Re(e−ıθ1 Z 0 (t1 )), Im(e−ıθ1 Z 0 (t1 )), X(z5 ), . . . , X(z2N )) have rank 2N so both are invertible functions of (Re(ζ1 ), Im(ζ1 ), . . . , Re(ζN ), Im(ζN )). In particular, Im(e−ıθ1 Z 0 (t1 )) is a linear combination of V2 . Let γ1 and γ2 be the coefficients associated to X(z3 ) and X(z4 ). By triangular combination, we deduce that the distribution of (X(z1 ), ∂θ X(z1 ), ∂t X(z1 ), γ1 X(z3 ) + γ2 X(z4 ), X(z5 ), . . . , X(z2N )) is non-degenerated and so that (γ1 , γ2 ) 6= (0, 0). Setting ψ such that γ1 γ2 cos(ψ) = p 2 and sin(ψ) = p 2 2 γ1 + γ2 γ1 + γ22 we get the non-degeneracy of (X(z1 ), ∂θ X(z1 ), ∂t X(z1 ), X(z2N +1 ), X(z5 ), . . . , X(z2N )) where z2N +1 = (t2 , θ1 + ψ). Finally, similarly to the proof of the previous point, regression, |z |z scaling and independence prove that the rank of (Xnorm (z5 ), . . . , Xnorm (z2N +1 )) is 2N − 3 so |z 2 is well defined and distributed that Xnorm (·) satisfies KL(2N −3) and ND(2N −3) and that σ b|z as σ 2 χ2 (2N −3) . 2N −3 (c) This is a direct consequence of the independence of the angle and the norm for each |z z marginal Gaussian vector build from Xnorm or Xnorm . Remark 3. When the complex process Z admits an infinite Karhunen-Loève decomposition, we need the following modified hypothesis ∀p ∈ N? , ∀(t1 , . . . , tp ) ∈ [0, 2π)p pairwise distincts, (Z(t1 ), Z(t2 ), . . . , Z(tp )) is non degenerated and (NDZ (∞)) 0 (Z(t1 ), Z (t1 ), Z(t3 ), . . . , Z(tp )) is non degenerated. Indeed, for every enter p ≥ 1, note that from the observation of the vector (Z(t1 ), Z(t2 ), . . . , Z(tp )) (resp. (Z(t1 ), Z 0 (t1 ), . . . , Z(tp ))) for pairwise disjoint points t1 , . . . , tp , we can construct an es2 (resp. σ 2 ), of the variance σ 2 with distribution σ 2 χ2 (2p − 1)/(2p − 1) (resp. timator, say σ b2p b|2p σ 2 χ2 (2p−3)/(2p−3)). Making p tend to infinity, classical concentration inequalities and Borel2 (resp. σ 2 ) converges almost surely to σ 2 . Thus the variance σ 2 Cantelli lemma prove that σ b2p b|2p 2 ) this observation, is directly observable from the entire path of X. We still denote σ bz2 (resp. σ b|z where z = z1 = (t1 , θ1 ). 11 3 PASSING TO THE LIMIT, THE GRID APPROACH 3. Passing to the limit, the grid approach The main idea of this section is to define a sequence of grids (Gn )n≥1 on T, to construct a sequence of test statistics (Sn )n≥1 from the values of the process X on Gn as in [4] and to pass to the limit as n → ∞. More precisely, we consider Gn to be the grid with mesh ∆n := (2π)2−n on T, zbn := arg max X(z) and λ1,n := max X(z) . z∈Gn z∈Gn It is the maximum of the process X when indexing by the grid. We can also define the maximum of the regression when indexing by the grid, namely λ2,n := max y∈Gn \{b zn } X zbn (y) . The Hessian at the maximum (2) on T is denoted by X 00 := X 00 (b z ). By Assumption (Adegen ), it is a random variable with values in the set of non degenerated negative definite matrices of size 2 × 2. We can define a non degenerated positive quadratic form (i.e., a metric) on R2 by kvkX 00 = −v > X 00 v, for v ∈ R2 . Using this metric, we can consider the corresponding Voronoi tessellation of Z2 . It is a regular partition of R2 by parallelograms, invariant by translations (1, 0) and (0, 1). Denote by Vo ⊂ [−1, 1]2 the Voronoi cell of the origin in this partition and by U := U(Vo ) the uniform distribution on this cell. We understand the law U as a conditional law with respect to X 00 and, conditionally to X 00 , this law is taken independent of (λ1 , λ2 ), see Lemma 12. Conditionally to X 00 , define the randomized statistics ( )  k − 2U  k> λ2 := λ2 ∨ λ1 + sup X 00 , (6) 1 e e 21 kk 2 2 k∈Z \{0} kΛ kk kΛ e 12 is the square root of Λ e = −ρ00 (0) and a ∨ b = max(a, b). A proof of the following where Λ result is given in Appendix A.1. Theorem 3. Under Assumptions (Anorm ) and (Adegen ), the randomized test statistics S Grid := Φ(λ1 /σ) ∼ U([0, 1]) , Φ(λ2 /σ) where Φ denotes the standard Gaussian survival function. Moreover, the test with p-value S Grid is unbiased: under the alternative H1 , it holds P{S Grid 6 α} > α for all α ∈ (0, 1). Theorem 3 shows in particular that the statistics—referred to as the Spacing test statistics in the introduction—given by Φ(λ1 /σ) (7) S ST = Φ(λ2 /σ) does not follows a U([0, 1]) distribution ans leads to a non-conservative test. Indeed, observe that almost surely λ2 ≤ λ2 so that S ST ≥ S Grid almost surely. Note that the two test statistics differ on the event {λ2 6= λ2 } = {λ2 < λ2 }. Now, when the variance σ 2 is unknown, we can build an estimator σ b2 defined in (4) and obtain a Studentized version of the previous theorem. Azaïs, De Castro and Mourareau/4 THE RICE METHOD: A GRID-LESS APPROACH 12 Theorem 4. Assume (Anorm ), (Adegen ), (KLZ (N )) and (NDZ (N )) where 2 6 N < ∞, then the following test statistics T Grid satisfies T Grid := F m−1 (λ1 /b σ)  ∼ U([0, 1]) F m−1 λ2 /b σ under the null hypothesis where m = 2N , Fm−1 is the Student cumulative distribution function b2 is defined by (4). with m − 1 degrees of freedom, F m−1 = 1 − Fm−1 its survival function and σ A proof can be found in Appendix A.2. Remark 4. Only the first point of (NDZ (N )) is required for the proof. Moreover, if m = +∞, the Student distribution is to be replaced by a standard normal distribution. 4. The Rice method: a grid-less approach In this section, we build our test statistic directly on the entire path of the process X in a grid-less manner. We assume that the process X satisfies Assumptions (Anorm ) and (Adegen ), and is centered. As in the preceding section, we consider λ1 and λ2 defined by (2) and (3) respectively. e so that the covariance function of X e is the correlation function ρ of X, We denote X = σ X e is the standardized version of X. Note that, by regression formulas and stationarity, namely X it holds   00 e e 0 (z)) = −Λ e X(z) e e (z) (X(z), X , ∀z ∈ T, E X e by the decomposition so that we can define the process R e 00 (z) = −Λ e X(z) e e X + R(z) e e e = −ρ00 (0) is the variance-covariance where R(z) and X(z) are independent for any z ∈ T and Λ 0 e (t). In particular, observe that matrix of X e z ) + R(b X 00 (b z ) = −ΛX(b z) , e z ). Using the Rice method of [5, Theorem 7.2] (see also [18]), it follows that where R(b z ) = σ R(b the maximum λ1 has for density w.r.t the Lebesgue measure on R+ at point ` > 0   e (cst)(−1)d E det(−ΛX(0) + R(0))1A` X(0) = `, X 0 (0) = 0 σ −1 φ(σ −1 `), where φ denotes the standard Gaussian density, A` is the event {X(y) 6 `, ∀y ∈ T} and (cst), as in the following, denotes a positive constant. The numerical values (cst) may vary from an occurence to another and it may depend on m and σ which are assumed fixed in our framework. 4.1. The known variance case We begin by the known variance case. The main observation is that the method of [5, Theorem 7.2] can be extended to compute the joint distribution of (λ1 , λ2 , R(b z )) as follows. • Denote S the set of symmetric matrices and pick a Borel set B on D := R2 × S. 13 4 THE RICE METHOD: A GRID-LESS APPROACH • For every z ∈ T, recall that ∀y ∈ T \ {z}, X |z (y) := and define e −1 X 0 (z)i X(y) − ρ(z − y)X(z) + hρ0 (z − y), Λ 1 − ρ(z − y) ∀z ∈ T, λz2 := sup X |z (y) . (8) y∈T\{z} Remark that, for fixed z ∈ T, λz2 is a.s. finite by Lemma 9, X |z (·) is independent of (X(z), X 0 (z)) and, by way of consequence, λz2 is independent of (X(z), X 0 (z)). Furthermore, note that since T is without boundary, for z = zb, one has X 0 (z) = 0 and λz2 = λ2 as defined by (3). • Observe that on the event {∀y 6= z, X(y) < X(z)} one has almost surely that z = zb, X(z) = λ1 , λz2 = λ2 and R(z) = R(b z ). Also, a simple computation shows that ∀z ∈ T s.t. X 0 (z) = 0, 1{z=bz } = 1{∀y6=z, X(y)<X(z)} = 1{0<λz2 <X(z)} , almost surely. Hence, by unicity of zb and recalling that the set {z ; X 0 (z) = 0} is finite under (Adegen ), we deduce that X 1{(X(z),λz2 ,R(z))∈B}∩{0<λz2 <X(z)} = 1{(λ1 ,λ2 ,R(bz ))∈B} . z:X 0 (z)=0 (n) • On D define smooth lower approximations ϕB converge when n goes to infinity i.e. ∀(`1 , `2 , r) ∈ Ω, of the indicator function of B that (n) ϕB (`1 , `2 , r) −→ 1{(`1 ,`2 ,r)∈B}∩{0<`2 <`1 } . • Apply Rice formula with weights [5, Theorem 6.4] (see also the proof of [5, Theorem 7.2]) to compute h X i (n) z E ϕB X(z), λ2 , R(z) z:X 0 (z)=0 Z = (cst) ZT = (cst) T h i (n) e E | det(−ΛX(z) + R(z))| ϕB (X(z), λz2 , R(z)) X 0 (z) = 0 dz h i (n) e E | det(−ΛX(z) + R(z))| ϕB (X(z), λz2 , R(z)) dz where the last equality relies on the fact that (X(z), λz2 , R(z)) is independent of X 0 (z). • Combining the previous observations and passing to the monotone limit as n tends to ∞ in the aforementioned Rice formula with weights, we get that   P λ1 , λ2 , R(b z) ∈ B h X i =E 1{(X(z),λz2 ,R(z))∈B}∩{0<λz2 <X(z)} z:X 0 (z)=0 Z h i e E | det(−ΛX(z) + R(z))|1{(X(z),λz2 ,R(z))∈B}∩{0<λz2 <X(z)} dz T h i e = (cst) E | det(−ΛX(0) + R(0))|1{(X(0),λ02 ,R(0))∈B}∩{0<λ02 <X(0)} , h i e = (cst) E det(−ΛX(0) + R(0))1{0<λ02 <X(0)} 1{(X(0),λ02 ,R(0))∈B} , = (cst) (9) Azaïs, De Castro and Mourareau/4 THE RICE METHOD: A GRID-LESS APPROACH 14 by stationarity and using that, on the event {0 < λ02 < X(0)}, the matrix −X 00 (0) = e ΛX(0) − R(0) belongs to the set of positive definite symmetric matrices, namely S+ . Before stating the key result on the joint density of (λ1 , λ2 , R(b z )) we need to introduce a dominating measure. First, recall that X(0) is independent of the pair (λ02 , R(0)). Then, e0 , R(0)) e0 is defined as in (8) for the process X. e e observe that (λ02 , R(0)) = σ × (λ where λ 2 2 0 e e Denote µ1 the law of (λ2 , R(0)) and note that it does not depend on σ. Denote µσ the law of (λ02 , R(0)) and remark that for any Borel set B of R × S, it holds µσ (σB) = µ1 (B). Eventually, remark that The law of (X(0), λ02 , R(0)) is dominated by Leb(R) ⊗ µσ . (10) where Leb(R) denotes the Lebesgue measure on R. As a consequence we can prove the following proposition. Proposition 5. The joint law L((λ1 , λ2 , R(b z ))) of (λ1 , λ2 , R(b z )) satisfies for all (`1 , `2 , r) ∈ 2 R × S, dL((λ1 , λ2 , R(b z ))) e 1 + r)1{0<` <` } σ −1 φ(σ −1 `1 ) , (`1 , `2 , r) = (cst) det(−Λ` 2 1 dLeb(R) ⊗ µσ where Leb(R) ⊗ µσ is defined by (10) and S denotes the set of symmetric matrices. Proof. Observe that the density at point `1 of X(0) with respect to the Lebesgue measure is σ −1 φ(σ −1 `1 ) and recall (10). Now, for any Borel set B of R2 × S, note that h i e E det(−ΛX(0) + R(0))1{(0<λ02 <X(0)} 1{(X(0),λ02 ,R(0))∈B} Z e 1 + r)1{0<` <` } σ −1 φ(σ −1 `1 )d`1 µσ (d(`2 , r)) = det(−Λ` 2 1 B thanks to (9), which prove the result. We can now state our result when the variance is known. Theorem 6. Set + ∀r ∈ S , ∀` > 0, Z +∞ Gr (`) := e + r)φ(uσ −1 )du , det(−Λu ` e denotes the Hessian of the correlation function ρ of X at the origin. Under Assumpwhere Λ tions (Anorm ) and (Adegen ), the test statistic S Rice := GR(bz ) (λ1 ) GR(bz ) (λ2 ) ∼ U([0, 1]) under the null H0 . Proof. Using Proposition 5, we know that the density of λ1 at `1 and conditional to (λ2 , R(b z )) = (`2 , r) is equal to e 1 + r)φ(σ −1 `1 )1{0<` <` } . (cst) det(−Λ` 2 1 4 THE RICE METHOD: A GRID-LESS APPROACH 15 It is well known that, if a random variable Z has for cumulative density function F then F(Z) follows an uniform distribution on [0, 1]. This implies that, conditionally to (λ2 , R(b z )) = (`2 , r), Gr (λ1 ) ∼ U([0, 1]). Gr (`2 ) Since the conditional distribution does not depend on (`2 , r), it is also the non conditional distribution and it yields GR(bz ) (λ1 ) ∼ U([0, 1]) , GR(bz ) (λ2 ) as claimed. 4.2. The unknown variance case e where σ > 0 is unknown. Assume that Z satisHence, suppose that we observe X = σ X fies (KLZ (N )) and (NDZ (N )), and set m = 2N . The regression of the Hessian on (X(z), X 0 (z)) reads now e e ∀z ∈ T, X 00 (z) = −ΛX(z) + σ R(z). because X 0 (z) is independent of (X(z), X 00 (z)) by stationarity. The variance being unknown, we estimate it using σ b|2 which is defined by (5). For fixed z ∈ T, by Claims (b) and (c) of Proposition 2, we know that the following random variables or random processes |z X(z) , X 0 (z) , Xnorm (·) and σ b|z σ b|z |z are mutually independent. As Xnorm (·) = hz (·) X |z (·) where hz (·) is a deterministic function and as Lemma 15 shows that R(z) can be expressed as radial limits of X |z (·) at point z, we get that  X |z (·) R(z)  and σ b|z are mutually independent, , X(z) , X 0 (z) , σ b|z σ b|z and by consequence X(z) , X 0 (z) ,  λz R(z)  2 , and σ b|z are mutually independent. σ b|z σ b|z We turn now to the Rice formula described previously and introduce the notation T2,z := λz2 and T2 := T2,bz . σ b|z Denote Leb(R2 ) the Lebesgue measure on R2 and let µ1 be the joint law of the couple of random variables (T2,0 , R(0)/b σ|0 ). Under H0 , note that X(0) is a centered Gaussian variable 2 with variance σ and σ b|0 /σ is distributed as a chi-distribution with m − 3 degrees of freedom, i.e., the law of density m−3 21− 2 m−4 s fχm−3 (s) = exp(−s2 /2) Γ m−3 2 Azaïs, De Castro and Mourareau/4 THE RICE METHOD: A GRID-LESS APPROACH 16 b|0 /σ, T2,0 , R(0)/b σ|0 ) has a denwhere Γ is the Gamma function. Then the quadruplet (X(0), σ sity with respect to Leb(R2 ) ⊗ µ1 at point (`1 , s, t2 , r) ∈ R3 × S equal to  2  s (m − 3) m−4 (cst) s exp − σ −1 φ(σ −1 `1 ). 2 Using the same method as for the proof of Proposition 5 we have the following proposition. Proposition 7. Assume that Z satisfies (Anorm ), (Adegen ), (KLZ (N )) and (NDZ (N )), and set m = 2N . Then, the joint distribution of λ1 , σ b| /σ, T2 , R(b z )/b σ| has a density with respect to Leb(R2 ) ⊗ µ1 at point (`1 , s, t2 , r) ∈ R3 × S+ equal to  2  s (m − 3) m−4 e (cst) det(−Λ`1 + σsr) s exp − φ(σ −1 `1 )1{0<σst2 <`1 } , 2 where (cst) is a positive constant that may depend on m and σ. Consequently, we derive the following result. Theorem 8. Assume that Z satisfies (Anorm ), (Adegen ), (KLZ (N )) and (NDZ (N )), and set m = 2N . For all r ∈ S+ , define H r (·) as ! r Z +∞  m − 1 e 1 + r fm−1 t1 ∀` > 0, H r (`) := det − Λt dt1 , m−3 ` where fm−1 is the density of the Student distribution with m − 1 degrees of freedom. Under the null H0 , the test statistic H R(bz ) (T1 ) T Rice := ∼ U([0, 1]), H R(bz ) (T2 ) where T1 := λ1 /b σ| , T2 = λ2 /b σ| and σ b| is defined by (5). `1 Proof. First, using Proposition 7 and the change of variable t1 = σs , the joint distribution of the quadruplet (T1 , σ b| /σ, T2 , R(b z )/b σ| )) at point (t1 , s, t2 , r) is given by   2 s (m − 3) m−3 e (cst) det(σs(−Λt1 + r))s exp − φ(st1 )1{0<t2 <t1 } 2   !2 r m − 3 m − 1 e 1 + r)sm−1 exp − s  φ(st1 )1{0<t <t } . = (cst) det(−Λt 2 1 m−1 2 Second, note that if X and Y are two independent random variables of density fX and fY then the density of X/Y satisfies Z fX/Y (z) = fX (zy)yfY (y)dy. R In our case, integrating over s and with the change of variable s ← s p (m − 1)/(m − 3), it 5 APPLICATIONS TO THE SUPER-RESOLUTION THEORY 17 holds  !2 m − 3 m − 1  ds φ(st1 )sm−1 exp − s m−1 2 + R ! r  2  Z m−1 s (m − 1) m−2 ss exp − ds = (cst) φ st1 m−3 2 R+ ! r Z m−1 χm−1 (s)ds φ st1 = (cst) sf √ m−3 m−1 R+ ! r m−1 . = fm−1 t1 m−3  Z r Putting together, the density of (T1 , T2 , R(b z )/b σ ) at point (t1 , t2 , r) is now given by ! r m − 1 e 1 + r)fm−1 t1 (cst) det(−Λt 1{0<t2 <t1 } , m−3 and we conclude using the same trick as the one of Theorem 6. 5. Applications to the Super-Resolution Theory 5.1. Framework and results Deconvolution over the space of complex-valued Radon measure has recently attracted a lot of attention in the “Super-Resolution” community—and its companion formulation in “Line spectral estimation”. A standard aim is to recover fine scale details of an image from few low frequency measurements—ideally the observation is given by a low-pass filter. The novelty in this body of work relies on new theoretical guarantees of the `1 -minimization over the space of Radon measures with finite support. Some recent works on this topic can be found in the papers [11, 7, 20, 8, 3, 13, 6, 12] and references therein. An important example throughout this paper is given by the Super-Resolution problem which can be stated as follows. Let ν 0 ∈ (M([0, 2π), C), k·k1 ) a complex-valued Radon measure on the one dimensional torus identified to [0, 2π) equipped with the natural circle-wise metric. Note that ||·||1 denotes the total variation norm on M([0, 2π)). The space (M([0, 2π), C), k·k1 ) can be defined as the topological dual space of continuous functions on [0, 2π) equipped with the L∞ -norm. Let N = 2fc + 1 where fc ≥ 1 is referred to as the “frequency cut-off”. Denote by DN the Dirichlet kernel defined by ∀t ∈ [0, 2π), DN (t) := sin(N t/2) . sin(t/2) Consider the linear operator FN : M([0, 2π), C) → CN that maps any complex-valued Radon measure ν onto its Fourier coefficients ck (ν) where Z ck (ν) := exp(−ıkx)ν(dx) T Azaïs, De Castro and Mourareau/5 APPLICATIONS TO THE SUPER-RESOLUTION THEORY 18 for integers k such that |k| 6 fc . Consider ζ = (ζk )k where ζk = ζ1,k + ıζ2,k and ζ`,k are i.i.d. standard Gaussian random variables for |k| 6 fc and ` = 1, 2. In the Super-Resolution frame, we observe a perturbed version of the Fourier coefficients, namely 1 y = √ FN (ν 0 ) + σζ . N ? —the dual operator of F , remark that we observe the trigonometric polynomial Applying FN N 1 ? (y) Z := √ FN N which reads as ∀t ∈ [0, 2π), 1 Z(t) = N Z T DN (t − x)ν 0 (dx) + σ fc X k=−fc 1 √ ζk exp(ıkt). N (11) Hence, one observes Z and infers on ν 0 assuming that it has finite support. To this purpose, consider the process X defined for all (t, θ) ∈ T by X(t, θ) := Re(e−ıθ Z(t)) = cos(θ) Re(Z(t)) + sin(θ) Im(Z(t)), (12) where Re and Im denote the real and imaginary part of a complex number. When ν 0 ≡ 0, remark that the processes A1 = Re(Z) and A2 = Im(Z) are two independent and identically distributed real-valued processes with C ∞ -paths. An elementary computation shows that X has correlation function ρ and A1 has correlation function Γ with ρ(z − y) = cos(θ − α)Γ(t − s) where Γ(t − s) = DN (t − s)/N for all z = (t, θ) and y = (s, α) in T. Remark that (Anorm ) holds true for Γ. In this case, we are testing ? H0 : “FN (FN (ν 0 )) ≡ 0 ” ? against H1 : “∃t ∈ [0, 2π), FN (FN (ν 0 ))(t) 6= 0 ” , or equivalently H0 : “ν 0 ≡ 0 ” against H1 : “∃t ∈ [0, 2π), ν 0 (t) 6= 0 ” . Subtracting the known measure ν 0 , remark that this framework encompasses testing problem whose null hypothesis is any single hypothesis H0 : “ν 0 ≡ ν0 ” against alternatives of the form H1 : “∃t ∈ [0, 2π), ν 0 (t) 6= ν0 (t) ”. Furthermore, we have the following propositions. First, we check that we can apply our results to the Super-Resolution process. Proposition 9. The process X defined by (12) satisfies Condition (KL(m)) and Condition (ND(m)) with m = 2N = 4fc + 2. 19 5 APPLICATIONS TO THE SUPER-RESOLUTION THEORY Then, we derive a first result when the noise level σ si known. Proposition 10. Under the null H0 , the test statistic Rice SSR = σ(α1 λ1 + α2 )φ(λ1 /σ) + (α1 σ 2 − α32 )Φ(λ1 /σ) ∼ U([0, 1]), σ(α1 λ2 + α2 )φ(λ2 /σ) + (α1 σ 2 − α32 )Φ(λ2 /σ) where Φ is the standard Gaussian cumulative distribution function , Φ = 1 − Φ its survival function, φ its density function, (λ1 , λ2 ) is defined by ((2), (3)) and  α1 = 31 fc (fc + 1),    fc   b  α = √1 P (k 2 − α ) × Re(y eı(kbt−θ) ), 1 2 k N k=−fc   fc P  b  1  k × Re(yk eı(kbt−θ) ).  α3 = √N k=−fc Finally, we have the following result when the noise level σ is unknown. Proposition 11. Under the null H0 , the test statistic Rice TSR = −1 α2 F α1 F m−3 (T1 ) + (α1 T1 + α2 )fm−3 (T1 ) − γm 3 m−1 (T1 ) ∼ U([0, 1]), −1 2 α1 F m−3 (T2 ) + (α1 T2 + α2 )fm−3 (T2 ) − γm α3 F m−1 (T2 ) where Fd is the Student cumulative distribution function with d degrees of freedom, F d = 1−Fd its survival function, fd its density function, T1 = λ1 /b σ| , T2 = λ2 /b σ| , σ b| is defined by (5) and m−3 m Γ Γ ) ) ( ( 2 2 γm = m−3 m−2 Γ( m−1 )Γ( m−2 ) . 2 2 A proof of these propositions can be found in Appendix A.4. 5.2. A numerical study 5.2.1. Computation of λ2 Rice ), we need To build our test statistic S Rice in the Super-Resolution context (namely SSR to compute three quantities. The first one is λ1 , the maximum of X(.) over the torus T. Its simple form allow us to use classical optimization routines, for instance fminsearch on MATLAB or optim on R both combined with global resolution options on T. The second one is R = R(b z ) which appears in the test statistic through the coefficients α1 , α2 and α3 that are simple functions of the observation y and zb. Finally, the third one is   X(y) − X(b z) zb . λ2 = λ2 = λ1 + max y∈T 1 − ρ(b z − y) Contrary to λ1 , there is some indetermination problem when y is close to zb. In particular, the approximation of zb is by definition not exact and the radial limits of X | are not numerically achieved. A way to get around that is the integral form of the remainder in Taylor’s theorem. In full generality, we compute Z 1  Q P 2   T 00 r Iq   (1 − h) (y − z b ) X (b z + h(y − z b ))(y − z b ) dh   q=0 zb 0 λ2 − λ1 = max Z 1 ' , Q  y∈T  P   T 00 2   (1 − h) (y − zb) ρ (b z + h(y − zb))(y − zb) dh r Jq 0 q=0 Azaïs, De Castro and Mourareau/5 APPLICATIONS TO THE SUPER-RESOLUTION THEORY 20 where Iq and Jq are given by Simpson’s rule [1, Page 886] applied to the numerator (resp. denominator), Q is a tuning parameter that control the approximation error and r = ||y − zb||22 . However, in the Super-Resolution case, elementary trigonometry identities give the following simpler form of the denominator r 2 fc X k=−fc 2 (k cos(α) − sin(α)) × sinc  r(k cos(α) − sin(α)) 2 2 where y − zb = (r cos(α), r sin(α)) and sinc denote the cardinal sine function, i.e.  sin x   x sinc(x) =   1 if x 6= 0, if x = 0, which is a numerically robust function. We conclude the optimization using the same routine as the one of λ1 . 5.2.2. Monte-Carlo experiment In this section we compare the cumulative distribution of several statistics of test in the case where the variance is known, namely • The statistics of the Rice test S Rice , given by Theorem 6, are displayed in blue. • The statistics of the Spacing test S ST , given by (7), are displayed in green. • The statistics of the Spacing test on grids Gn given by Φ(λ1,n )/Φ(λ2,n ) are displayed with a color that take the respective values green, red, purple and cyan for sizes equal to 32 , 102 , 322 , 502 . • The grid test, based on S Grid of Theorem 3 can be viewed as the limit of the discrete grid tests above as the size growths to infinity. As one can see in the figures, there is some evidence that this limit is numerically reached for a size n = 502 . We complete each graph by the diagonal to the cumulative distribution function of the uniform law on [0, 1] displayed in black. All the figures are based on 2000 simulations of the corresponding statistics. The first figure studies the distribution of S Rice and S ST under the Null. This figure is displayed in the introduction (see Figure 2). The second figure deals with the grid statistic and S Rice under various alternatives defined by a single spike and compares the power of the Rice test with the discrete grid tests, see Figure 3. Finally, the third figure performs the same study but with an alternative defined by two atoms, see Figure 4. Discussion Figure 2 suggests that the Spacing test is highly non-conservative which is a major drawback. For instance, when fc = 7, the empirical level of the Spacing test at a nominal level of 5% is in fact 11,3%, showing that this test is very non-conservative. For its part, the Rice test is exact as predicted by the theory. This numerical agreement prove that the numerical algorithm described in Section 5.2.1 is efficient. 21 6 LARS FOR COMPLEX-VALUED GAUSSIAN PROCESSES 1 1 1 0.9 0.9 0.9 0.8 0.8 0.8 0.7 0.7 0.7 0.6 0.6 0.6 0.5 0.5 0.5 0.4 0.4 0.4 0.3 0.3 0.3 0.2 0.2 0.2 0.1 0.1 0.1 0 0 0 0.2 0.4 0.6 0.8 1 0 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 Figure 4. Same as Figure 2 except that (a) fc = 7 , (b) the alternative is defined by two spikes at random √ locations √ √ (with a constraint of separation) (c) the weights are now from left to right (log N, log N ); (log N, N ); ( N , N ). In Figure 3 and 4 we see that the power of the discrete grid tests may seem an increasing function of the number of points of the grid. This power seems to converge since the curves associated to 322 (purple) and 502 (cyan) are almost indistinguishable. This suggests that the Rice test (blue) is always more powerful than the discrete grid test or the limit grid test. Consequently, it seems unbiaised for any choice of alternative. In conclusion the Rice test seems to be the best choice even if we are still not able to prove theoretically that it is unbiased. 6. LARS for complex-valued Gaussian processes 6.1. Cameron-Martin type Assumption on the mean and Notations The algorithm presented here can be used for a large class of complex processes Z. In this section, we introduce new notation and a new set of assumptions. We consider a complexvalued Gaussian process Z indexed on a compact metric space K with covariance function K. Remark 5. Note that this model encompasses our framework setting K = [0, 2π) and K = 2σ 2 Γ with Γ the correlation of A1 defined in Section 2.1. We do not assume that the process is stationary in this section though our method can be applied to stationary processes as for instance in the Super Resolution frame, see Section 6.4. We assume that its covariance K is such that there exists σ > 0 such that ∀s 6= t ∈ K, K(t, t) = 2σ 2 and K(s, t) < 2σ 2 . (13) The scalar 2 accounts for the contribution of the real and the imaginary part of Z and σ 2 is the variance of the real part of Z. We assume that Z has continuous sample paths. We present here the underlying hypothesis on the mean of the Gaussian processes under consideration when using the LARS algorithm. This hypothesis is of Cameron-Martin type. Indeed, the main drawback that should be avoided is when the mean cannot be represented in the RKHS of the Gaussian process. We recall that we can define a reproducing Hilbert space of the covariance K, see [15, Chapter 2.6] for instance. Denote (H, h·, ·iH ) this complex Hilbert space. Also, we can invoke a Karhunen-Loève expansion of the process Z. Namely, there exist Azaïs, De Castro and Mourareau/6 LARS FOR COMPLEX-VALUED GAUSSIAN PROCESSES 22 i.i.d. complex standard normal variables (gj )j≥1 , a real orthonormal system (ej )j≥1 on L2 (K) and σj > 0 such that X X Z − EZ = σj gj ej and σj2 = 2σ 2 < ∞, j j where the identity holds almost surely in the Banach space of continuous functions on K equipped with the L∞ -norm. By Mercer’s theorem, we know that X ∀s, t ∈ K, K(s, t) = σj2 ej (s)ej (t) , j where the identity holds almost surely in the Banach space of continuous functions on K × K equipped with the L∞ -norm. We recall also that the Hilbert space H can be defined as H := nX j aj ej | X |aj |2 j σj2 <∞ o with the inner product X X X aj bj . h aj ej , bj ej iH = σj2 j j j We observe Z and we want to estimate its mean E Z. Remark that almost surely it holds Z − E Z ∈ H, where H is the closure of H in the space of continuous functions equipped with the infinity norm, see e.g. [15, Corollary 2.6.11]. Remark that H is also closed in L2 (K). Denoting by E the L2 orthogonal space of H, one has L2 (K) = H ⊕ E where the sum is orthogonal. We denote by P (resp. P ⊥ ) the orthogonal projection onto H (resp. E). Since almost surely Z − E Z ∈ H, remark that almost surely P ⊥ (Z) = P ⊥ (EZ) and this process can be observed and is deterministic. Without loss of generality, we assume that P ⊥ (EZ) = 0 subtracting P ⊥ (Z) to Z. Also, we assume that P(EZ) ∈ H . (14) Recall that P(EZ) = EZ and Assumption (14) gives that Z ∈ H using Z − E Z ∈ H. 6.2. Description of the “continuous” LARS We assume that Z ∈ H and, as mentioned above, this assumption is equivalent to Assumption (14). Following standard references, e.g., [16, Chapter 5.6], the Least-Angle Regression Selection (LARS) algorithm can be extended to Gaussian processes. To the best of our knowledge, the LARS for complex Gaussian processes has never been introduced and we present its formulation here for the first time. Actually, the presentation given in this section can be applied to any RKHS setting. It results in a description of the LARS in infinite dimensional feature spaces and this framework has been dealt in [19]. However, note that the paper [19] only concerns real signed measures and their “doubling” dimension trick [19, page 546] cannot be used when dealing with complex measures. In particular, their result cannot be invoked in Super-Resolution where it is of utmost importance to deal with complex measures. This section presents the “continuous” LARS for Super-Resolution. 6 LARS FOR COMPLEX-VALUED GAUSSIAN PROCESSES 23 The LARS is a variable selection algorithm giving a sequence ((λk , µk ))k≥1 where the knots are ordered such that λ1 ≥ λ2 ≥ . . . > 0 and µk ∈ (M(K, C), k · k1 ) is a complex-valued measure. We recall that the space (M(K, C), k · k1 ) is defined as the dual space of the space of continuous functions on K equipped with the L∞ -norm. Inspired by the Super-Resolution framework—presented in Section 5, we consider Z as some “correlation process” in the spirit of (11). In particular, the most correlated point can be defined by (2), namely λ1 := max |Z(t)| . t∈K Under Assumption (13), Proposition 16 shows that almost surely there exists a unique point t1 such that λ1 = |Z(t1 )|. Define the “active set” A as A1 = (t1 ). This active set is the support of the second fitted solution µ2 . Set the first fitted solution to µ1 = 0 and the first residual to Z1 = Z for initialization purposes. Observe that (15) Z1 (t1 ) = λ1 eıθ1 , |Z1 (t1 )| = λ1 , ∀t ∈ K, ∀t 6= t1 , Z Z1 (t) = Z(t) − K(u, t)µ1 (du) , K |Z1 (t)| < λ1 . From this point we proceed iteratively. For k ≥ 2, we assume that we have found (λk−1 , µk−1 ) and Ak−1 = (t1 , . . . , tk−1 ) such that Z K(u, t)µk−1 (du) , ∀t ∈ K, Zk−1 (t) := Z(t) − K ∀t ∈ Ak−1 , ∀t ∈ / Ak−1 , |Zk−1 (t)| = λk−1 , |Zk−1 (t)| < λk−1 . We want to add an other point tk to the active set and define a discrete measure µk supported on Ak−1 while keeping the above inequalities true. From this point proceed as follows. ◦ First, we solve the least-squares fit given by a = arg min Zk−1 (·) − c∈Ck−1 k−1 X i=1 ci K(ti , ·) 2 H This program can be solved in closed form since its amounts in fitting k − 1 weights in leastsquares regression. It holds that −1 a = Mk−1 (Zk−1 (t1 ), . . . , Zk−1 (tk−1 )) where we denote Mk−1 = (K(ti , tj ))1≤i,j≤k−1 and we assume that Mk−1 is invertible. If Mk−1 is not invertible then we stop. The complex vector a = (a1 , . . . , ak−1 ) is referred to as the “least-squares direction”. P Remark 6. Note that the function k−1 i=1 ai K(ti , ·) is the regression of Zk−1 onto the finite dimensional space Span{K(ti , ·) ; i = 1, . . . , k − 1}. Azaïs, De Castro and Mourareau/6 ◦ LARS FOR COMPLEX-VALUED GAUSSIAN PROCESSES 24 Then, for any 0 < λ ≤ λk−1 , define µ(λ) := µk−1 + (1 − λ/λk−1 ) k−1 X ai δti i=1 k−1 X Z (λ) (·) := Zk−1 (·) + (λ/λk−1 − 1) i=1 , ai K(ti , ·) , and observe that |Z (λ) (t)| = λ for all t ∈ {t1 , . . . , tk−1 }. Indeed, it holds Z (λ) (tj ) = Zk−1 (tj ) + (λ/λk−1 − 1) k−1 X ai K(ti , tj ) , i=1 > = Zk−1 (tj ) + (λ/λk−1 − 1)a Mk−1 (0, . . . , 0, |{z} 1 , 0, . . . , 0) , jth = λZk−1 (tj )/λk−1 , and recall that |Zk−1 (tj )| = λk−1 . Now, we keep track of the largest value of the “correlation” process |Z (λ) | on the complementary set of Ak−1 while moving λ from λk−1 toward zero. We define λk as the largest value for which there exists a point t ∈ / Ak−1 such that |Z (λ) |(t) = λ. Set  λk := max β > 0 ; ∃ t ∈ / Ak−1 , s.t. |Z (β) |(t) = β , (16) and tk := arg max |Z (λk ) |(s) . s∈A / k−1 If tk is not unique, we add all the solutions of (16) to the active set Ak . For sake of readability, we assume that tk is the only solution to (16). ◦ Update Ak = (t1 , . . . , tk ) , µk = µ(λk ) = µk−1 + (1 − λk /λk−1 ) k−1 X ai δti , i=1 Zk (·) = Z (λk ) (·) = Zk−1 (·) + (λk /λk−1 − 1) where, for all t ∈ K, Zk (t) = Zk−1 (t) + (λk /λk−1 − 1) = Z(t) − = Z(t) − Z K k−1 X k−1 X i=1 ai K(ti , ·) , ai K(ti , t) i=1 K(u, t)µk−1 (du) + (λk /λk−1 − 1) k−1 X ai K(ti , t) , i=1 Z K(u, t)µk (du) , K is the kth residual associated to the kth fitted solution µk . Remark also that ∀t ∈ {t1 , . . . , tk }, ∀t 6= {t1 , . . . , tk }, and update k to k + 1 to iterate the procedure. |Zk (t)| = λk , |Zk (t)| < λk , 25 6 LARS FOR COMPLEX-VALUED GAUSSIAN PROCESSES 6.3. The second knot First, observe that λ1 is defined as in (2) and that the two definitions agree. Indeed, recall that X(t, θ) = Re (e−ıθ Z(t)) so that max X = max |Z| at point zb = (t1 , θ1 ) with t1 as in (15). By optimality, it holds that λ1 = e−ıθ1 Z(t1 ). Then, the case k = 2 is interesting since λ2 is a statistic used in the test statistics described previously. We will see that the two definitions agree here again. For k = 2, it holds Z1 = Z and the least squares direction is given by a = Z(t1 )/(2σ 2 ) and Z (λ) by λ K(t1 , t) − 1)Z(t1 ) , λ1 2σ 2 K(t1 , t) = Z(t) + eıθ1 (λ − λ1 ) 2σ 2 Z (λ) (t) = Z(t) + ( Multiplying by e−ıθ and taking the real part, this latter can be equivalently written as Re (e−ıθ Z (λ) (t)) = X(z) + (λ − λ1 ) cos(θ1 − θ) K(t1 , t) , 2σ 2 where z = (t, θ) ∈ T. Now, recall that ρ(t, θ) := Γ(t) cos θ = cos(θ)K(0, t)/(2σ 2 ) to compute Re (e−ıθ Z (λ) (t)) = X(z) + (λ − λ1 )ρ(z − zb) . We deduce that Re (e−ıθ Z (λ) (t)) ≤ λ ⇔ X(z) − λ1 ρ(z − zb) ≤ λ(1 − ρ(z − zb)) X(z) − X(b z )ρ(z − zb) ⇔ ≤λ 1 − ρ(z − zb) ⇔ X zb(z) ≤ λ showing that the second knot λ2 is exactly the quantity defined in (3). 6.4. Illustration: The two first knots of Super-Resolution The Super-Resolution process is defined in (11). It satisfies Condition (KLZ (N )) and Condition (NDZ (N )) with N = 2fc +1. The first point is given by the maximum of the modulus of Z, see the red curve in Figure 5. Observe that Z1 = Z and the maximum satisfies Z1 (t1 ) = λ1 eıθ1 . Then, we compute λ DN (t1 − t) Z (λ) (t) = Z1 (t) + ( − 1)Z1 (t1 ) , λ1 2N σ 2 where DN denotes the Dirichlet kernel. For λ > λ2 , the maximum of |Z (λ) | is achieved at a unique point, namely t1 . For λ = λ2 , a second point achieves the maximum. This transition defines Z2 := Z (λ2 ) , see Figure 5. From this point, we can iterate fitting the least squares direction on the support {t1 , t2 } and decreasing |Z2 | while a third point achieves the maximum. Given the red curve in Figure 5, it was not obvious that the second knot would have been t2 since other local maxima seemed more significant than t2 on the red curve. Azaïs, De Castro and Mourareau/A PROOFS 26 Figure 5. LARS for Super-Resolution: we fit a Dirichlet kernel at the maximal correlation point t1 until the maximal correlation in the residual is matched at a second point t2 = 6 t1 . Appendix A: Proofs We denote for random variables, Xn = oP (rn ) and Yn = OP (rn ) (for rn 6= 0) means that rn−1 ||Xn || converges to 0 in probability and rn−1 ||Yn || is uniformly tight, respectively. Furthermore, we consider the following processes. • The stationary process X(z) = X(t, θ) defined on T with covariance function given by Cov(X(y), X(z)) = σ 2 ρ(z − y) where we recall the correlation function is given by ρ(z − y) = cos(θ − α)Γ(t − s), • For every z ∈ T, recall the regressions with respect to X(z) X(y) − X(z)ρ(z − y) X(y) − X(z) = X(z) + , 1 − ρ(z − y) 1 − ρ(z − y) X(y) − ρ(z − y)X(z) z p Xnorm (y) = . 1 − ρ2 (z − y) ∀y ∈ T \ {z}, X z (y) = • For every z ∈ T, recall the regressions with respect to (X(z), X 0 (z)) e −1 X 0 (z)i X(y) − ρ(z − y)X(z) + hρ0 (z − y), Λ , 1 − ρ(z − y) e −1 X 0 (z)i X(y) − ρ(z − y)X(z) + hρ0 (z − y), Λ |z Xnorm (y) = q . e −1 ρ0 (z − y)i 1 − ρ2 (z − y) − hρ0 (z − y), Λ ∀y ∈ T \ {z}, X |z (y) = In particular, recall that zb is defined by (2) so X 0 (b z ) = 0 and it yields that X zb = X |bz . A.1. Proof of Theorem 3 Since the variance is known, we consider without loss of generality that σ 2 = 1. Using the metric given by the quadratic form represented by X 00 , we can consider the closest point z n of the grid Gn to zb by z n = arg min kb z − ukX 00 = arg min hb z − u, −X 00 (b z )(b z − u)i . u∈Gn u∈Gn 27 A PROOFS The main claim is that, while it holds λ1,n → λ1 a.s., we don’t have the same result for λ2,n , see Lemma 14. We begin with the following preliminary result, which is related to the result of Azaïs-Chassan (see [9]). Lemma 12. Conditionally to X 00 , ∆−1 z − z n ) follows a uniform distribution on V0 and this n (b distribution is independent from λ1 and λ2 . Proof. Remark that zb has uniform distribution on T by stationarity and this distribution is independent from λ1 and λ2 . Let B be a Borelian in R2 . Remark that zb − z n ∈ ∆n V0 by definition of z n and note that z n ∈ ∆n Z2 . Conditionally to X 00 , it holds P{∆−1 z − z n ) ∈ B} = P{∆−1 z − z n ) ∈ B ∩ V0 } n (b n (b = P{(b z − z n ) ∈ ∆n (B ∩ V0 )} = P{b z ∈ ∆n (B ∩ V0 + Z2 )} . Since zb has uniform distribution on T and since V0 + Z2 is a partition of R2 , it holds that P{b z ∈ ∆n (B ∩ V0 + Z2 )} = P{b z ∈ 2π(B ∩ V0 + Z2 )} = Leb(R2 )(2π(B ∩ V0 )) , Leb(R2 )(2πV0 ) where Leb(R2 ) denotes the Lebesgue measure on R2 . Lemma 13. It holds that (a) X(b zn ) − X(z n ) = oP (∆2n ). (b) P{b zn = 6 z n } → 0 as n goes to ∞. (c) Let F be any measurable function, then F (b zn ) − F (z n ) tends to zero in probability at arbitrary speed. (d) Almost surely, one has z n → zb and zbn → zb as n goes to infinity. Proof. Let ε > 0. By definition of z n and since V0 ⊂ [−1, 1]2 , it holds that √ ||b z − z n || 6 2∆n , (17) almost surely. Since X has C 2 -paths and by Taylor expansion, one has X(b z ) − X(z n ) = (1/2)||b z − z n ||2X 00 + oP (∆2n ) (18) Since −X 00 is positive definite, there exists M > 0 sufficiently large such that (1/M )Id2 4 −X 00 4 M Id2 where 4 denotes the Lowner ordering between symmetric matrices. Then, it holds ∀z ∈ R2 , (1/M )||z||2 ≤ ||z||2X 00 6 M ||z||2 . (19) From (17), (18) and (19), we deduce that 0 6 X(b z ) − X(b zn ) 6 X(b z ) − X(z n ) = OP (∆2n ) , using the optimality of zb and zbn . (20) Azaïs, De Castro and Mourareau/A PROOFS 28 By compactness of T, uniqueness of optimum zb ∈ R2 and C 2 -continuity of X, there exists η > 0 and a neighborhood N0 ⊂ R2 of zb ∈ R2 such that X(b z ) − η > X(z) for any z ∈ / N0 and ∀z ∈ N0 , (1/4)||b z − z||2X 00 6 X(b z ) − X(z) 6 ||b z − z||2X 00 (21) using again a Taylor expansion as in (18). Using (20), it holds that, on an event of probability at least 1 − ε/4 and for n large enough, 0 6 X(b z ) − X(b zn ) ≤ η/2 implying that zbn ∈ N0 . Invoke (19), (20) and (21) to deduce that zb − zbn = OP (∆n ). Using Taylor formula again, we get that X(b z ) − X(b zn ) = (1/2)||b z − zbn ||2X 00 + oP (∆2n ) . (22) By optimality of zbn and z n and using (18) and (22), one gets 0 6 X(b zn ) − X(z n ) ≤ (1/2)(||b z − z n ||2X 00 − ||b z − zbn ||2X 00 ) + oP (∆2n ) . (23) z − zbn ||2X 00 ≤ 0, we get (a). Observing that ||b z − z n ||2X 00 − ||b 00 Conditionally to X and in the metric defined by || · ||X 00 , there exists η 0 > 0, such that the η 0 -neighborhood, denoted by Nη0 , of the boundary ∂V0 of V0 has relative volume (for the Lebesgue measure) less than ε/8. More precisely, Nη0 denotes the set of points in V0 ⊂ R2 with || · ||X 00 -distance less than η 0 to the boundary of V0 . In particular, ∀k ∈ Z2 \ {0}, ∀z ∈ V0 \ Nη0 , ||z||X 00 + η 0 6 ||z − k||X 00 , by Cauchy-Schwarz inequality. Using Lemma 12 and by homogeneity, we deduce that it holds ||b z − z n ||X 00 + η 0 ∆n 6 ||b z − g||X 00 , ∀g ∈ ∆n Z2 \ {0}, with probability at least 1 − ε/8. It follows that z − g||2X 00 , ||b z − z n ||2X 00 + (η 0 )2 ∆2n 6 ||b ∀g ∈ ∆n Z2 \ {0}, using that (a + b)2 > a2 + b2 for a, b > 0. Now, invoke (23) to get that 06− (η 0 )2 2 ∆n 1{z n 6=zbn } + oP (∆2n ) . 2 On these events, we get that, for n sufficiently large, zbn and z n must be equal except on an event of probability at most ε/4 + ε/8 ≤ ε. Furthermore, this result holds unconditionally in X 00 . We deduce that lim sup P{z n 6= zbn } 6 ε, proving (b). Note that (c) is a consequence of the fact that, for n sufficiently large, zbn and z n must be equal except on an event of arbitrarily small size. In particular, it shows that supk>n ||z k − zbk || converges towards zero in probability, which is equivalent to almost sure converge of z n − zbn towards zero. Claim (d) follows when remarking that (17) proves a.s. convergence of z n towards zb. Lemma 14. As n tends to infinity, λ2,n converges in distribution to λ2 . Proof. Let β ∈ R be such that 0 < β < 1/2, say β = 1/4. Let ε ∈ (0, 1). We can write λ2,n = λA,n ∨ λB,n with λA,n := max u∈Gn \{b zn } s.t. λB,n := max u∈Gn s.t. ku−b zn k6∆β n ku−b zn k>∆β n X zbn (u) =: max X zbn (u), u∈Gn,A X zbn (u) =: max X zbn (u). u∈Gn,B 29 A PROOFS We first prove that λB,n → λ2 as n tends to infinity in distribution. By compactness, remark that there exists a constant Cr > 0 such that 1 − ρ(u) > Cr kuk2 . (24) It also holds that X(u) − X(b zn ) , 1 − ρ(u − zbn ) X(u) − X(b z) X zb(u) = X(b z) + . 1 − ρ(u − zb) X zbn (u) = X(b zn ) + (25) (26) Let us look to the rhs of (25) and (26). By Claim (d) of Lemma 13 and the continuous mapping theorem, note that X(b zn ) converges toward λ1 = X(b z ) a.s. and we can omit these terms. It remains to prove that on Gn,B the second terms are equivalent. Because of Lemma 13, 1 − ρ(u − zbn ) converges to 1 − ρ(u − z n ) at arbitrary speed. Remember that (17) gives zb − z n = OP (∆n ) and it holds that ||u − zb|| > ∆βn , on Gn,B . It follows that there exists C > 0 such that 1 − ρ(u − zbn ) > C∆2β n and 1 − ρ(u − zb) > C∆2β n , (27) with probability greater than 1 − ε/2. As for the numerators, Eqs. (20) and (21) show that for all u ∈ Gn,B X(u) − X(b zn ) X(b z ) − X(b zn ) |X(b z ) − X(b zn )| −1 = = (cst) = OP (∆2−2β ) n 2 X(u) − X(b z) X(u) − X(b z) ||u − zb|| In this sense, we say that X(u)−X(b zn ) is uniformly equivalent to X(u)−X(b z ) on the grid Gn,B in probability. Using (27) and noticing that for any u ∈ T |ρ(u − zb) − ρ(u − zbn )| 6 ||ρ0 ||∞ ||b z − zbn || = OP (∆n ) , the same result holds for the denominators, namely 1 − ρ(u − zbn ) is uniformly equivalent to 1 − ρ(u − zb) on the grid Gn,B in probability. We deduce that X zbn (u) is uniformly equivalent to X zbn (u) on the grid Gn,B in probability and, passing tho their maximum, one can deduce that λB,n converges to λ2 in probability. We turn now to the study of the local part λA,n . Again, by Claim (c) of Lemma 13 we can replace zbn by z n in the numerator of the r.h.s in (25) and we forget the first term which limit is clearly λ1 almost surely. We perform a Taylor expansion at zb, it gives that X(u) − X(b z ) = (1/2)(u − zb)> X 00 (u − zb)(1 + oP (1)). for any u ∈ Gn,A . Since z n − zb = OP (∆n ), we also get that X(z n ) − X(b z ) = (1/2)(z n − zb)> X 00 (z n − zb) + oP (∆2n ). As for the denominator, invoke (17), (24) and Claim (c) of Lemma 13 to get that 1 − ρ(u − z n ) > 2Cr ∆2n , 1 − ρ(u − zbn ) = 1 − ρ(u − z n ) + oP (∆2n ),  e − z n ) (1 + oP (1)), and 1 − ρ(u − zbn ) = (1/2) (u − z n )> Λ(u Azaïs, De Castro and Mourareau/A PROOFS 30 e denotes the Hessian at point 0 of ρ. Putting all together yields where −Λ (u − z n )> X 00 (u + z n − 2b z) X(u) − X(b zn ) = (1 + oP (1)), > e 1 − ρ(u − zbn ) (u − z n ) Λ(u − z n ) for any u ∈ Gn,A . Now we know that, in distribution, zb − z n = ∆n U and we know that u − z n = k∆n with k belonging to a certain growing subset of Z2 which limit is Z2 . Finally, conditionally to X 00 , we obtain that max u∈Gn,A \{b zn } X zbn (u) −→ λ1 + k> (k − 2U) X 00 , 1 e 2 kk e 21 kk k∈Z2 \{0} kΛ kΛ sup in distribution. Eventually, consider the test statistic Sn := Φ(λ1,n )/Φ(λ   2,n ) and keep in mind that X u + (0, π) = −X(u) and that if u belongs to Gn , u + (0, π) also belongs. So Theorem 1 of [4] applies showing that, under the alternative, P{Sn 6 α} > α. It suffices to pass to the limit to get the desired result. A.2. Proof of Theorem 4 We use the same grid argument as for the proof of Theorem 3. Let t1 , t2 , . . . , tN be pairwise distinct points of [0, 2π), θ1 ∈ [0, 2π), m = 2N and set z1 = (t1 , θ1 ), . . . , zN = (tN , θ1 ), zN +1 = (t1 , θ1 + π/2), . . . , zm = (tN , θ1 + π/2). Because of the first assumption of (NDZ (N )), the distribution of (X(z1 ), . . . , X(zm )) is non degenerated. Consequently, following the proof of Proposition 2, we know that X z1 satisfies KL(m − 1) and ND(m − 1). Denote g1 , . . . , gm−1 the eigenfunctions of the KarhunenLoève (KL) representation of X (0,0) . Note that X z1 (·) has the same distribution as X (0,0) (.−z1 ) (stationarity) and that both are defined on the same space so the KL-eigenfunctions of X z1 are g1 (. − z1 ), . . . , gm−1 (. − z1 ). Now consider Az1 = (Azi,j1 )1≤i,j≤m−1 the matrix with entries Azi,j1 = gi (zj+1 − z1 ) which is invertible thanks to KL(m − 1) and ND(m − 1) and build so that     X z1 (z2 ) ζ1   .. .  z    = A 1  ..  . . X z1 (zm ) ζm−1 2 (X zbn (G )), the estimator of σ 2 One possible explicit expression, among many others, of σ bKL n norm on the grid Gn , is  X (0,0) (z2 − zbn )   ..   . (0,0) X (zm − zbn )  2 zbn σ bn2 := σ bKL (Xnorm (Gn )) = 1 m−1  Azbn −1 2 , 2 which is a composition of continuous functions of zbn . In particular, as zbn converges a.s. to zb (see Lemma 13, Claim (b)), we deduce that σ bn2 converges a.s. to σ bzb2 as n goes to infinity. 31 A PROOFS Finally, since the KL estimator is unique, this estimator coincide with the estimator σ b22 of [4] and Theorem 3 of [4] implies that  F m−1 λ1,n /b σn  ∼ U([0, 1]). F m−1 λ2,n /b σn Note that λn1 converges almost surely to λ1 and λ2,n converges in distribution to λ2 (see Lemma 14) to complete the proof. A.3. Proof of Proposition 9 (a). We can assume that Z defined by (11) is centered and, in this case, it holds fc σ X ζk exp(ıkt), ∀t ∈ [0, 2π) Z(t) = √ N k=−fc (28) where we recall that N = 2f c + 1 and ζk = ζk,1 + ıζk,2 for k = −fc , . . . , fc are independent standard complex Gaussian variables. Formula (28) shows that Z satisfies (KLZ (N )). (b). Let (t1 , . . . , tN ) ∈ [0, 2π) be pairwise differents, θ ∈ [0, 2π) and set      Z(t1 ) exp(−ıfc t1 ) . . . exp(ıfc t1 ) ζ1     ..   .. .. ..  =   .  =: At1 ,...,tN ζ, . . . Z(tN ) exp(−ıfc tN ) . . . exp(ıfc tN ) ζN where At1 ,...,tN is a Vandermonde matrix, invertible as soon as ti 6= tj for all i 6= j. This prove the first point of NDZ (N ). For the second assertion, consider h > 0 such that h < min1≤i<j≤N −1 (ti − tj ) and the Gaussian vector (Z(t1 ), . . . , Z(tN −1 ), Z(t1 + h))T =: At1 ,...,tN −1 ,t1 +h ζ, where the covariance matrix At1 ,...,tN −1 ,t1 +h satisfies Y det(A∗t1 ,...,t1 +h At1 ,...,t1 +h ) = 1≤i<j≤N −1 N (N −1)/2 =4 | exp(ıti ) − exp(ıtj )|2 Y 2 sin 1≤i<j≤N −1  N −1 Y j=1 ti − tj 2 | exp(ı(t1 + h)) − exp(ıtj )|2  NY −1 j=1 2 sin  tj − (t1 + h) 2  2 = sin (h/2) × gt1 ,...,tN −1 (h) where gt1 ,...,tN −1 (0) 6= 0 if (ti )1≤i≤N −1 are pairwise distincts. Finally, denote by Rh the linear transformation involving the first and the last coordinate such that     Z(t1 ) Z(t1 ) ..     ..     . . = R    h  Z(tN −1 )   Z(tN −1 )  Z(t1 +h)−Z(t1 ) Z(t1 + h) h and remark that sin2 (h/2) 1 = gt1 ,...,tN −1 (0) × 6= 0 2 h→0 h 4 lim det(A∗t1 ,...,t1 +h Rh∗ Rh At1 ,...,t1 +h ) = gt1 ,...,tN −1 (0) × lim h→0 giving the desired non degeneracy condition. Azaïs, De Castro and Mourareau/B AUXILIARY RESULTS 32 A.4. Proof of Proposition 10 and Proposition 11 Easy computations give the following results for φ(·), Z Z +∞ Z +∞ φ(t)dt = Φ(`), tφ(t)dt = φ(`), ` +∞ t2 φ(t)dt = `φ(`) + Φ(`), ` ` for fm−1 (·), Z +∞ fm−1 ` +∞ Z tfm−1 ` Z ! r m−3 m−1 t dt = F m−1 ` , m−1 m−3 !   r √ Γ m−3 (m − 3) m − 3 Γ m m−1 2 2   fm−3 (`), √ t dt = m−3 (m − 2) m − 1 Γ m−1 Γ m−2 2 2 !   r √  Γ m−3 m−1 (m − 3) m − 3 Γ m 2 2   × `fm−3 (`) + F m−3 (`) , √ t dt = m−1 m−2 m−3 (m − 2) m − 1 Γ 2 Γ 2 r +∞ t2 fm−1 ` m−1 m−3 ! r and for R, e z ) + R(b X 00 (b z ) = −ΛX(b z ),     −α2 α3 α1 0 X(b z) + , =− 0 1 α3 0 where  α1 = 31 fc (fc + 1),    fc   b  α = √1 P (k 2 − α ) × Re(y eı(kbt−θ) ), 1 2 k N k=−fc   fc P  b  1  k × Re(yk eı(kbt−θ) ).  α3 = √N k=−fc To conclude, use Proposition 9 to apply Theorem 6 and Theorem 8. Appendix B: Auxiliary results B.1. Regularity of X |z and new expression of R(z) Lemma 15. X |z (y) admits radials limits as y → z. More precisely for all λ in the unit sphere lim X |z (z + uλ) = u→0 Proof. As u tends to zero 1 − ρ(uλ) = λ> R(z)λ . e λ> Λλ u2 > e (λ Λλ + o(1)). 2 Moreover, a Taylor expansion gives X(z + uλ) = X(z) + uXλ0 (z) + u2 00 X (z) + op (u2 ), 2 λ 33 REFERENCES and e + op (u2 ), ρ0λ (uλ) = uρ00λ (0) + op (u2 ) = −uΛ where (Xλ0 , ρ0λ ) and (Xλ00 , ρ00λ ) are directional derivative and directional Hessian. By consequence, |z X (z + uλ) = = which tends to u2 >e 2 X(z)λ Λλ u2 2 e −1 X 0 (z)i + uX 0 (z) + + hρ0 (uλ), Λ λ u2 > e 2 (λ Λλ + o(1))   e + X 00 (z) + op (1) X(z)λ> Λλ λ u2 >e 2 (λ Λλ u2 00 2 Xλ (z) + op (u2 ) + o(1))   e λ> ΛX(z) + X 00 (z) λ e λ> Λλ e as u tends to 0 since Xλ00 (z) = λ> X 00 (z)λ. The result follows from X 00 (z) = −ΛX(z)+R(z). B.2. Maximum of a continuous process The following result is borrowed from [17, Theorem 3] and [23]. Proposition 16. Let {Y (t) ; t ∈ T } be a Gaussian process with continuous sample paths defined on a compact metric space T . Suppose in addition that: There is no two different points s, t ∈ T such that X(s) = X(t) a.s. (29) Then almost surely the maximum of X on T is attained at a single point. Observe that (Anorm ) implies (29). Remark 7. Proposition 16 can be applied to the process X |bz which is not continuous on a compact set. We use the “pumping method” as follows. Use (a) a parameterization of T as [0, 2π)2 , (b) polar coordinates for y ∈ T \ {b z } with origin at zb, (c) the change of parameter y = (ρ, θ) 7→ ((ρ + 1), θ) that transforms the non-compact set T \ {b z } into a compact set (we have inflated the “hole” {b z } into a ball centered around zb with radius one) on which the process X |bz is continuous thanks to Lemma 15. References [1] M. Abramowitz and I. Stegun. Handbook of Mathematical Functions. Dover, New York, fifth edition, 1964. [2] R. J. Adler and J. E. Taylor. Random fields and geometry. Springer Science & Business Media, 2009. [3] J.-M. Azaïs, Y. De Castro, and F. Gamboa. Spike detection from inaccurate samplings. Applied and Computational Harmonic Analysis, 38(2):177–195, 2015. REFERENCES/REFERENCES 34 [4] J.-M. Azaïs, Y. De Castro, and S. Mourareau. Power of the Spacing test for Least-Angle Regression. Bernoulli, 2016. [5] J.-M. Azaïs and M. Wschebor. Level sets and extrema of random processes and fields. John Wiley & Sons Inc., 2009. [6] T. Bendory, S. Dekel, and A. Feuer. Robust recovery of stream of pulses using convex optimization. Journal of Mathematical Analysis and Applications, 442(2):511–536, 2016. [7] K. Bredies and H. K. Pikkarainen. Inverse problems in spaces of measures. ESAIM: Control, Optimisation and Calculus of Variations, 19(01):190–218, 2013. [8] E. J. Candès and C. Fernandez-Granda. Towards a Mathematical Theory of Superresolution. Communications on Pure and Applied Mathematics, 67(6):906–956, 2014. [9] M. Chassan and J.-M. Azais. Discretization error for the maximum of a Gaussian field. Technical report, HAL, 2017. working paper or preprint. [10] H. Cramer and M. Leadbetter. Stationary and Related Stochastic Processes (1967). [11] Y. De Castro and F. Gamboa. Exact reconstruction using beurling minimal extrapolation. Journal of Mathematical Analysis and applications, 395(1):336–354, 2012. [12] V. Duval and G. Peyré. Exact support recovery for sparse spikes deconvolution. Foundations of Computational Mathematics, pages 1–41, 2015. [13] C. Fernandez-Granda. Support detection in super-resolution. In 10th international conference on Sampling Theory and Applications (SampTA 2013), pages 145–148, Bremen, Germany, July 2013. [14] C. Fernandez-Granda. Super-resolution of point sources via convex programming. Information and Inference, page iaw005, 2016. [15] E. Giné and R. Nickl. Mathematical foundations of infinite-dimensional statistical models, volume 40. Cambridge University Press, 2015. [16] T. Hastie, R. Tibshirani, and M. Wainwright. Statistical learning with sparsity: the lasso and generalizations. CRC Press, 2015. [17] M. A. Lifshits. On the absolute continuity of distributions of functionals of random processes. Theory of Probability & Its Applications, 27(3):600–607, 1983. [18] R. Lockhart, J. Taylor, R. J. Tibshirani, and R. Tibshirani. A significance test for the lasso. Annals of statistics, 42(2):413, 2014. [19] S. Rosset, G. Swirszcz, N. Srebro, and J. Zhu. `1 regularization in infinite dimensional feature spaces. Lecture Notes in Computer Science, 4539:544, 2007. [20] G. Tang, B. N. Bhaskar, P. Shah, and B. Recht. Compressed sensing off the grid. Information Theory, IEEE Transactions on, 59(11):7465–7490, 2013. [21] J. E. Taylor, J. R. Loftus, and R. J. Tibshirani. Inference in adaptive regression via the Kac–Rice formula. Ann. Statist., 44(2):743–770, 04 2016. [22] R. J. Tibshirani, J. Taylor, R. Lockhart, and R. Tibshirani. Exact post-selection inference for sequential regression procedures. Journal of the American Statistical Association, 111(514):600–620, 2016. [23] V. Tsirel’Son. The density of the distribution of the maximum of a Gaussian process. Theory of Probability & Its Applications, 20(4):847–856, 1976.
7cs.IT
New avenue to the Parton Distribution Functions: Self-Organizing Maps arXiv:0810.2598v2 [hep-ph] 2 Nov 2008 H. Honkanena,b,∗ , S. Liutia,† a Department of Physics, University of Virginia, P.O. Box 400714, Charlottesville, VA 22904-4714, USA b Department of Physics and Astronomy, Iowa State University, Ames, IA 50011, USA J. Carnahanc , Y. Loitierec , P. R. Reynoldsc c Department of Computer Science, School of Engineering, University of Virginia, P.O. Box 400740 Charlottesville, VA 22904-4740, USA Abstract Neural network algorithms have been recently applied to construct Parton Distribution Function (PDF) parametrizations which provide an alternative to standard global fitting procedures. We propose a technique based on an interactive neural network algorithm using Self-Organizing Maps (SOMs). SOMs are a class of clustering algorithms based on competitive learning among spatially-ordered neurons. Our SOMs are trained on selections of stochastically generated PDF samples. The selection criterion for every optimization iteration is based on the features of the clustered PDFs. Our main goal is to provide a fitting procedure that, at variance with the standard neural network approaches, allows for an increased control of the systematic bias by enabling user interaction in the various stages of the process. PACS numbers: 13.60.Hb, 12.38.Bx, 84.35.+i ∗ † [email protected] [email protected] 1 Introduction Modelling experimental data always introduces bias, in the form of either a theoretical or systematical bias. The former is introduced by researchers with the precise structure of the model they use, which invariably constrains the form of the solutions. The latter form of bias is introduced by algorithms, such as optimization algorithms, which may favour some results in ways which are not justified by their objective functions, but rather depend on the internal operation of the algorithm. In this paper we concentrate on high energy hadronic interactions, which are believed to be described by Quantum Chromodynamics (QCD). Because of the properties of factorization and asymptotic freedom of the theory, the cross sections for a wide number of hadronic reactions can be computed using perturbation theory, as convolutions of perturbatively calculable hard scattering coefficients, with non perturbative Parton Distribution Functions (PDFs) that parametrize the large distance hadronic structure. The extraction of the PDFs from experiment is inherently affected by a bias, which ultimately dictates the accuracy with which the theoretical predictions can be compared to the high precision measurements of experimental observables. In particular, the form of bias introduced by PDFs will necessarily impact the upcoming searches of physics beyond the Standard Model at the Large Hadron Collider (LHC). This situation has in fact motivated an impressive body of work, and continuous, ongoing efforts to both estimate and control PDFs uncertainties. Currently, the established method to obtain the PDFs is the global analysis, a fitting procedure, where initial scale Q0 ∼ 1GeV ≤ Qmin dat ansatze, as a function of the momentum fraction x, for each parton flavour i in hadron h are evolved to higher scales according to the perturbative QCD renormalization group equations. All the available observables e.g. the proton structure function, F2p (x, Q2 ), are composed of the candidate PDFs and comparison with the data is made with the help of some statistical estimator such as the global χ2 , 2 χ = Ne XX (Datai − Theori ) Vij−1 (Dataj − Theorj ) , expt. i,j=1 1 (1) where the error matrix Vij consists of the statistical and uncorrelated systematic errors, as well as of the correlated systematic errors when available. The parameters in the ansatze are then adjusted and the whole process repeated until a global minimum has been found. The modern PDF collaborations (CTEQ [1] and references within , MRST [2– 4], Alekhin [5, 6], Zeus [7] and H1 [8]) also provide error estimates for the PDF sets. They all rely on some kind of variant of the Hessian method (see e.g. [9] for details), which is based on a Taylor expansion of the global χ2 around it’s minimum. When only the leading terms are kept, the displacement of χ2 can be written in terms of Hessian matrix Hij , which consists of second derivatives of χ2 with respect to the parameter displacements, evaluated at the minimum. The error estimate for the parameters themselves, or for any quantity that depends on those parameters, can then be obtained in terms of the inverse of the Hessian matrix, (∆X)2 = ∆χ2 X ∂X ∂yi i,j H −1  ∂X . ij ∂y j (2) For details of PDF uncertainty studies see e.g. Refs. [10, 11]. The global analysis combined with Hessian error estimation is a powerful method, allowing for both extrapolation outside the kinematical range of the data and extension to multivariable cases, such as nuclear PDFs (nPDFs) [12–15]. In principle, when more data become available, the method could also be applied to Generalized Parton Distributions (GPDs), for which only model-dependent [16] or semi model-dependent [17, 18] solutions presently exist. However, there are uncertainties related to the method itself, that are difficult to quantify, but may turn out to have a large effect. Choosing global χ2 as a statistical estimator may not be adequate since the minimum of the global fit may not correspond to a minima of the individual data sets, and as a result the definition of ∆χ2 may be ambiguous. Estimates for the current major global analyses are that ∆χ2 = 50 − 100 is needed to obtain a ∼ 90% confidence interval [1, 2]. In principle this problem could be avoided by using the Lagrange multiplier method (see e.g.[19]), which does not assume quadratic behaviour for the errors around the minimum, instead of the Hessian method, 2 but this is computationally more expensive solution. Introducing a functional form at the initial scale necessarily introduces a parametrization dependence bias and theoretical assumptions behind the fits, such as s, s̄, c quark content, details of the scale evolution (e.g. higher order perturbative corrections, large/small x resummation), higher twists etc. as well as the data selection and treatment, e.g. kinematical cuts, all reflect into the final result of the analysis. Also, there may be systematical bias introduced by the optimization algorithm. The differences between the current global PDF sets tend to be larger than the estimated uncertainties [20], and these differences again translate to the predictions for the LHC observables, such as Higgs [21] or W ± and Z production cross sections [1]. A new, fresh approach to the PDF fitting has recently been proposed by NNPDF collaboration [22, 23] who have replaced a typical functional form ansatz with a more complex standard neural network (NN) solution and the Hessian method with Monte Carlo sampling of the data (see the references within [23] for the nonsinglet PDF fit and the details of the Monte Carlo sampling). Figure 1: Schematic diagram of a feed-forward neural network, from [24]. Neural network can be described as a computing solution that consists of interconnected processing elements, neurons, that work together to produce an output function. In a typical feed-forward NN (see Fig. 1) the output is given by the neurons in the last layer, as a non-linear function of the output of all neurons in the previous layer, which in turn is a function of the output of all neurons in the previous layer, and so on, starting from the first layer, which receives the input. For a NN with L layers and nl neurons in each PL−1 layer, the total number of the parameters is l=1 (nl nl+1 + nl+1 ). 3 In the beginning of the NNPDF fitting procedure a Monte Carlo sample of replicas of the experimental data is generated by jittering the central values of the data withing their errorbars using univariate Gaussian (or some other distribution if desired) random numbers for each independent error source. The number of the replicas is made so large that the Monte Carlo set of replicas models faithfully the probability distribution of the original data. For each replica a Genetic Algorithm (GA) fit is performed by first setting the NN parameters for each parton flavour to be fitted randomly, then making clones of the set of parameters, and mutating each of them randomly (multiple mutations). After scale evolution the comparison with the data is performed for all the clones, and the best clones are selected for a source of new clones, and the process repeated until the minimum for the χ2 has been found. Overfitting of the data is prevented by using only part of the data in the minimizing procedure, and using the other part to monitor the behaviour of the χ2 . When fitting PDFs one thus ends up with Nrep PDF sets, each initial scale parton distribution parametrized by a different NN. The quality of the global fit is then given by the χ2 computed from the averages over the sample of trained neural networks. The mean value of the parton distribution at the starting scale for a given value of x is found by averaging over the replicas, and the uncertainty on this value is the variance of the values given by the replicas. The NNPDF method circumvents the problem of choosing a suitable ∆χ2 , and it relies on GA which works on a population of solutions for each MC replica, thus having a lowered possibility of getting trapped in local minima. NN parametrizations are also highly complex, with large number of parameters, and thus unbiased compared to the ansatze used in global fits. The estimated uncertainties for NNPDF fits are larger than those of global fits, possibly indicating that the global fit uncertainties may have been underestimated. It should, however, be pointed out that the MC sampling of the data is not not tied to use of NNs, and it thus remains undetermined whether the large uncertainties would persist if the MC sampling was used with a fixed functional form. The complexity of NN results may also induce problems, especially when used in a purely automated fitting procedure. Since the effect of modifying individual NN parameters is unknown, the result may exhibit 4 strange or unwanted behaviour in the extrapolation region, or in between the data points if the data is sparse. In such a case, and in a case of incompatible data, the overfitting method is also unsafe to use. Implementation of information not given directly by the data, such as nonperturbative models, lattice calculations or knowledge from prior work in general, is also difficult in this approach. A possible method of estimating the PDF uncertainties could also be provided by Bayesian statistical analysis, as preliminarily studied in [25, 26] and explained in [27], in which the errors for the PDF parameters, or for an observable constructed from the PDFs, are first encapsulated in prior probabilities for an enlarged set of model parameters, and posterior distributions are obtained using computational tools such as Markov Chain Monte Carlo. Similar to NNPDF approach, this method allows for an inclusion of nonGaussian systematic errors for the data. In this introductory paper we propose a new method which relies on the use of Self-Organizing Maps (SOMs), a subtype of neural network. The idea of our method is to create means for introducing “Researcher Insight” instead of “Theoretical bias”. In other words, we want to give up fully automated fitting procedure and eventually develop an interactive fitting program which would allow us to “take the best of both worlds”, to combine the best features of both the standard functional form approach and the neural network approach. In this first step, we solely concentrate on single variable functions, free proton PDFs, but discuss the extension of the model to multivariable cases. In Section 2 we describe the general features of the SOMs, in Sections 3 and 4 we present two PDF fitting algorithms relying on the use of SOMs and finally in Section 5 we envision the possibilities the SOM method has to offer. 2 Self-Organizing Maps The SOM is a visualization algorithm which attempts to represent all the available observations with optimal accuracy using a restricted set of models. The SOM was developed by T. Kohonen in the early 1980’s ([28], see also [29]) to model biological brain functions, but has since then developed 5 into a powerful computational approach on it’s own right. Many fields of science, such as statistics, signal processing, control theory, financial analyses, experimental physics, chemistry and medicine, have adopted the SOM as a standard analytical tool. SOMs have been applied to texture discrimination, classification/pattern recognition, motion detection, genetic activity mapping, drug discovery, cloud classification, and speech recognition, among others. Also, a new application area is organization of very large document collections. However, applications in particle physics have been scarce so far, and mostly directed to improving the algorithms for background event rejection [30–32]. SOM consists of nodes, map cells, which are all assigned spatial coordinates, and the topology of the map is determined by a chosen distance metric Mmap . Each cell i contains a map vector Vi , that is isomorphic to the data samples used for training of the neural network. In the following we will concentrate on a 2-dimensional rectangular lattice for simplicity. A natural choice for the P topology is then L1 (x, y) = 2i=1 |xi − yi |, which also has been proved [33] to be an ideal choice for high-dimensional data, such as PDFs in our case. The implementation of SOMs proceeds in three stages: 1) initialization of the SOM, 2) training of the SOM and 3) associating the data samples with a trained map, i.e. clustering. During the initialization the map vectors are chosen such that each cell is set to contain an arbitrarily selected sample of either the actual data to be clustered, or anything isomorphic to them (see Fig. 2 for an example). The actual training data samples, which may be e.g. subset or the whole set of the actual data, are then associated with map vectors by minimizing a similarity metric Mdata . We choose Mdata = L1 . The map vector each data sample becomes matched against, is then the most similar one to the data sample among all the other map vectors. It may happen that some map vectors do no not have any samples associated with them, and some may actually have many. During the training the map vectors are updated by averaging them with the data samples that fell into the cells within a given decreasing neighbourhood, see Fig. 3. This type of training which is based on rewarding the winning node to become more like data, is called competitive learning. The initial value of a map vector Vi at SOM cell i then changes during the course of 6 Figure 2: A 2D grid SOM which cells get randomly associated with the type of data samples we would like to study, such as nonsinglet PDFs or observables. At this stage each cell gets associated with only one curve, the map vector. training as Vi (t + 1) = Vi (t) (1 − w(t) Nj,i (t)) + Sj (t) w(t) Nj,i(t) (3) where now Vi (t + 1) is the contents of the SOM cell i after the data sample Sj has been presented on the map. The neighbourhood, the radius, within which the map vectors are updated is given by the function Nj,i (t), centered on the winner cell j. Thus even the map vectors in those cells that didn’t find a matching data sample are adjusted, rewarded, to become more like 2 data. Typically Nj,i (t) = e−Mmap (j,i) /r(t) , where r(t) is a monotonously decreasing radius sequence. In the beginning of the training the neighbourhood may contain the whole map and in the end it just consists of the cell itself. Moreover, the updating is also controlled by w(t), which is a monotonously decreasing weight sequence in the range [0, 1]. As the training proceeds the neighbourhood function eventually causes the data samples to be placed on a certain region of the map, where the neighbouring map vectors are becoming increasingly similar to each other, and the weight sequence w(t) furthermore finetunes their position. In the end on a properly trained SOM, cells that are topologically close to each other will have map vectors which are similar to each other. In the final phase the actual data is matched against the map vectors of the trained map, and thus get distributed on the map according to the feature that was used 7 Figure 3: (Colour online) Each data sample Si is associated with the one map vector Vi it is most similar to. As a reward for the match, the winning map vector, as well as its neighbouring map vectors, get averaged with the data associated with the winning cell. as Mdata . Clusters with similar data now emerge as a result of unsupervised learning. For example, a map containing RGB colour triplets would initially have colours randomly scattered around it, but during the course of training it would evolve into patches of colour which smoothly blend with each other, see Fig. 4. This local similarity property is the feature that makes SOM suitable for visualization purposes, thus facilitating user interaction with the data. Since each map vector now represent a class of similar objects, the SOM is an ideal tool to visualize high-dimensional data, by projecting it onto a low-dimensional map clustered according to some desired similar feature. SOMs, however, also have disadvantages. Each SOM, though identical in size and shape and containing same type of data, is different. The clusters may also split in such a way that similar type of data can be found in several different places on the map. We are not aware of any mathematical or computational means of detecting if and when the map is fully trained, and whether there occurs splitting or not, other than actually computing the 8 Figure 4: (Colour online) SOM containing RGB colour triplets getting trained. Adapted from Ref. [34] similarities between the neighbouring cells and studying them. In this work we use the so-called batch-version of the training, in which all the training data samples are matched against the map vectors before the training begins. The map vectors are then averaged with all the training samples within the neighbourhood radius simultaneously. The procedure is repeated Nstep (free parameter to choose) times such that in every training step the same set of training data samples is associated with the evolving map and in Eq.(3) t now counts training steps. When the map is trained, the actual data is finally matched against the map vectors. In our study our training data are always going to be the whole data we want to cluster, and the last training step is thus the clustering stage. The benefit of the batch training compared to the incremental training, described earlier, is that the training is independent of the order in which the training samples are introduced on the map. 3 MIXPDF algorithm In this approach our aim is to both i) to be able to study the properties of the PDFs in a model independent way and yet ii) to be able to implement knowledge from the prior works on PDFs, and ultimately iii) to be able to guide the fitting procedure interactively with the help of SOM properties. At this stage it is important to distinguish between the experimental data 9 and the training data of the SOM. When we are referring to measured data used in the PDF fitting, such as F2 data, we always call it experimental data. The SOM training data in this study is going to be a collection of candidate PDF sets, produced by us, or something composed of them. A PDF set in the following will always mean a set of 8 curves, one for each independent ¯ s = s̄, c = c̄ and b = b̄ in this simplified parton flavour f = (g, uv , dv , ū, d, introductory study), that are properly normalized such that XZ 1 dxxff /p (x, Q2 ) = 1, (4) f 0 and conserve baryon number and charge Z 1 Z 1 2 dxfuv /p (x, Q ) = 2, dxfdv /p (x, Q2 ) = 1. 0 (5) 0 In order to proceed we have to decide how to create our candidate PDF sets, decide the details of the SOMs, details of the actual fitting algorithm, experimental data selection and details of the scale evolution. In this introductory paper our aim is not to provide a finalised SOMPDF set, but rather to explore the possibilities and restrictions of the method we are proposing. Therefore we refrain from using “all the possible experimental data” as used in global analyses, but concentrate on DIS structure function data from H1 [35], BCDMS [36, 37] and Zeus [38], which we use without additional kinematical cuts or normalization factors (except rejecting the data points below our initial scale). The parameters for the DGLAP scale evolution were chosen to be those of CTEQ6 (CTEQ6L1 for lowest order (LO)) [39], the initial scale being Q0 = 1.3 GeV. In next-to-leading order (NLO) case the evolution code was taken from [40] (QCDNUM17 beta release). We will start now with a simple pedagogical example, which we call MIXPDF algorithm, where we use some of the existing PDF sets as material for new candidate PDFs. At first, we will choose CTEQ6 [39], CTEQ5 [41], MRST02 [2, 42], Alekhin [5] and GRV98 [43] sets and construct new PDF sets from them such that at the initial scale each parton flavour in the range x = [10−5 , 1] is randomly selected from one of these five sets (we set the heavy flavours to be zero below their mass thresholds). The sumrules on this new 10 set are then imposed such that the original normalization of uv and dv are preserved, but the rest of the flavours are scaled together so that Eq.(4) is fulfilled. In this study we accept the <few% normalization error which results from the fact that our x-range is not x = [0, 1]. From now on we call these type of PDF sets database PDFs. We randomly initialize a small 5 × 5 map with these candidate database PDFs, such that each map vector Vi consists of the PDF set itself, and of the observables F2p (x, Q20 ) derived from it. Next we train the map with Nstep = 5 batch-training steps with training data that consists of 100 database PDFs plus 5 original “mother” PDF sets, which we will call init PDFs from now on. We choose the similarity criterion to be the similarity of observables F2p (x, Q2 ) with Mdata = L1 . The similarity is tested at a number of x-values (equidistant in logarithmic scale up to x ∼ 0.2, and equidistant in linear scale above that) both at the initial scale and at all the evolved scales where experimental data exist. On every training, after the matching, all the observables (PDFs) of the map vectors get averaged with the observables (PDFs, flavor by flavor) matched within the neighbourhood according to Eq. (3). The resulting new averaged map vector PDFs are rescaled again (such that uv and dv are scaled first) to obey the sumrules. From now on we will call these type of PDF sets map PDFs. The map PDFs are evolved and the observables at every experimental data scale are computed and compared for similarity with the observables from the training PDFs. After the training we have a map with 25 map PDFs and the same 105 PDF sets we used to train the map. The resulting LO SOM is shown in Fig. 5, with just F2p (x, Q20 )’s of each cell shown for clarity. The red curves in the figure are the map F2’s constructed from the map PDFs, black curves are the database F2’s and green curves are the init F2’s constructed from the init PDFs (CTEQ6, CTEQ5, MRST02, Alekhin and GRV98 parametrizations). It is obviously difficult to judge visually just by looking at the curves whether the map is good and fully trained. One hint about possible ordering may be provided by the fact that the shape of the F2p curve must correlate with the χ2 /N against the experimental data. The distribution of the χ2 /N values (no correlated systematic errors are taken into account for simplicity) of the map PDFs, shown in each cell , does indeed seem somewhat organized. 11 1 2 3 4 2.46 2.20 4.36 4.98 3.28 2.49 2.38 1.54 2.59 4.04 3.22 2.51 1.45 2.75 6.55 5.51 4.27 3.26 2.00 9.49 7.24 4.72 4.58 2.32 4 3 2 1 0 0 LO 2.44 1. iteration -5 10 10 -4 -3 10 10 -2 10 -1 1 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 Figure 5: (Colour online) Trained 1. iteration LO map. Red curves are map F2p ’s, green curves init F2p ’s and black curves rest of the database F2p ’s. The number in each cell is the χ2 /N of the map PDF. Table 1 lists the χ2 /N values the original init PDFs obtain within the MIXPDF framework described above. Comparison of these values with the values in Fig. 5 reveals that some of the map PDFs, as also some of the database PDFs, have gained a χ2 /N comparable to or better than that of the init PDFs. Inspired by the progress, we start a second fitting iteration by selecting the 5 best PDF sets from the 25+5+100 PDF sets of the first iteration as our new init PDFs (which are now properly normalized after the first iteration) to generate database PDFs for a whole new SOM. Since the best PDF candidate from the first iteration is matched on this new map as an unmodified init PDF, it is guaranteed that the χ2 /N as a function of the iteration either decreases or remains the same. We keep repeating the iterations until the χ2 /N saturates. Fig. 6 (Case 1) shows the χ2 /N as a function of iterations for the best PDF on the trained map, for the worst PDF on the map and for 12 PDF‡ Alekhin CTEQ6 CTEQ5 CTEQ4 MRST02 GRV98 LO χ2 /N 3.34 1.67 3.25 2.23 2.24 8.47 NLO χ2 /N 29.1 2.02 6.48 2.41 1.89 9.58 Table 1: χ2 /N for different MIXPDF input PDF sets against all the datasets used (H1, ZEUS, BCDMS, N=709). the worst of the 5 PDFs selected for the subsequent iteration as an init PDF. The final χ2 /N of these runs are listed in Table 2 (first row) as Case 1 and Fig. 7 shows these results (black solid line), together with original starting sets at the initial scale (note the different scaling for gluons in LO and in NLO figures). For 10 repeated LO runs we obtain χ¯2 /N=1.208 and σ=0.029. Let us now analyze in more detail how the optimization proceeds. Figs. 8,9 show the LO maps also for the 2. and 3. iterations. On the first iteration the init PDFs, the shapes of which were taken from existing parametrizations, fall in the cells (0,1) (CTEQ5), (1,3) (Alekhin), (1,4) (MRST02), (2,3) (CTEQ6) and (3,0) (GRV98), so the modern sets, Alekhin, MRST02 and CTEQ6, group close to each other, i.e. the shapes of the observables they produce are very similar, as expected. The best 5 PDFs selected as the 2. iteration init PDFs also come from this neighbourhood, 3 of them from the cell (1,3) and the other 2 from the cell (2,3). Two of these selected sets are map PDFs, two are database PDFs and also the original init PDF CTEQ6 survived for the 2. iteration. At the end of the 2. iteration the init PDFs, which originated from the neighbouring cells, are scattered in the cells (0,1), (0.3), (1,0) (CTEQ6), ‡ These are the χ2 /N for the initial scale PDF sets taken from the quoted parametrizations and evolved with CTEQ6 DGLAP settings, the heavy flavours were set to be zero below their mass thresholds, no kinematical cuts or normalization factors for the experimental data were imposed, and no correlated systematic errors of the data were used to compute the χ2 /N . We do not claim these values to describe the quality of the quoted PDF sets. 13 4.0 4.0 LO 3.5 NLO Case 1: best of 5 worst of 5 worst of map 5 5, Nstep=5 3.0 Case 1: Case 2: 3.0 Case 2: 2 2.0 best of 5 worst of 5 worst of map 2.5 2.0 1.5 1.5 1.0 1.0 0.5 0.5 0 1 2 3 4 5 6 7 8 Iteration 0 1 2 3 4 5 6 7 8 Iteration Figure 6: (Colour online) χ2 /N of the MIXPDF runs as a function of the iteration. (2,2) and (2,3) and the best 5 PDFs produced during this iteration are in the cells (4,1) (database PDF), (4,0) (map PDF), (3,2) (map PDF), (2,2) (database PDF) and (3,0) (map PDF). After the 3. iteration the above best 5 PDFs of 2. iteration are in the cells (2,0), (3,1), (0.2), (0.4) and (3,2) and the new best 5 PDFs produced are all map PDFs with 4 of them in neighbouring cell pairs. Map PDFs provide complicated linear combinations of the database PDFs and obviously play an important role in the algorithm. The size of the map dictates how much the neighbouring map vectors differ from each other. Since the PDFs in the same cell are not required to be similar, only the observables constructed from them are, a cell or a neighbourhood may in principle contain a spread of PDFs with a spread of χ2 /N’s. However, since our selection criteria for the init PDFs was based on the best χ2 /N only, it is inevitable that the observables on the map become increasingly similar as the iterations go by, and the χ2 /N flattens very fast as can be seen from Fig. 6. As a consequence we quickly lose the variety in the shapes of the PDFs as the iterations proceed, and on the final iteration all the PDFs on the map end up being very similar. 14 /N best of 5 worst of 5 worst of map 2.5 2 /N 3.5 best of 5 worst of 5 worst of map 5 5, Nstep=5 SOM 5x5 5x5 5x5 5x5 5x5 5x5 5x5 5x5 15x15 15x15 15x15 15x15 Nstep 5 5 5 5 5 5 10 40 5 5 5 5 # init 5 5 10 10 15 20 10 10 5 5 30 30 # database 100 100 100 100 100 100 100 100 900 900 900 900 Case 1 2 1 2 1 1 1 1 1 2 1 2 LO χ2 /N 1.19 1.37 1.16 1.49 1.16 1.17 1.16 1.20 1.22 1.31 1.16 1.25 NLO χ2 /N 1.28 1.44 1.25 1.43 1.45 1.30 1.25 l.53 Table 2: χ2 /N against all the datasets used (H1, ZEUS, BCDMS) for some selected MIXPDF runs. The MIXPDF algorithm obviously has several other weaknesses too. Among them are how the result would change if we started with another first iteration PDF selection, and what are the effects of changing the size of the map, number of the database PDFs and init PDF sets and size of Nstep ? In general, how much the final result depends on the choices that we make during the fitting process? Let us now study some of these questions a bit. Since we have chosen our evolution settings to be those of CTEQ6’s, it necessarily becomes a favoured set (although we don’t impose any kinematical cuts on the experimental data). Therefore we performed another LO and NLO runs, with CTEQ6 now replaced with CTEQ4 [44]. The results of these runs are reported in Table 2 (2. row) and in Fig. 6 (χ2 /N) and Fig. 7 (the PDFs) as Case 2 . The Case 2 clearly produces worse results. Without an input from CTEQ6 we automatically lose all the low gluons at small-x -type of results in NLO, for example. Fig. 10 addresses the issue of choosing different Nstep , for LO Case 1 and Case 2. The solid (dotted) lines show the best (worst) init PDF selected 15 4.0 4.0 Q=1.3 GeV CTEQ6 Alekhin MRST02 GRV98 CTEQ5 CTEQ4 LO 3.5 3.0 0.25*xg 2.5 Q=1.3 GeV CTEQ6 Alekhin MRST02 GRV98 CTEQ5 CTEQ4 NLO 0.45*xg 5 5, Nstep= 5 Case 1 Case 2 5 5, Nstep= 5 Case 1 Case 2 15 15, Nstep= 5 Case 1 Case 2 15 15, Nstep= 5 Case 1 Case 2 3.5 3.0 2.5 2.0 2.0 1.5 1.0 xuV xu 1.5 1.0 xuV xu 0.5 0.0 -5 10 0.5 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 7: (Colour online) MIXPDF results together with the input PDF sets. from each iteration for several Nstep selections. In Case 2 the best results are obtained with small number of training steps, whereas Case 1 does not seem to benefit from a longer SOM training. Keeping the stochastical nature of the process in our minds, we may speculate that the seemingly opposite behaviour for the Case 1 and Case 2 results from the fact that it is more probable to produce a good set of database PDFs in Case 1 than in Case 2. If the database is not so good to begin with, the longer training contaminates all the map PDFs with the low quality part of the database PDFs. Table 2 also showcases best results from a variety of MIXPDF runs where we have tried different combinations of SOM features. It is interesting to notice that increasing the size of the map and database does not necessarily lead to a better performance. Instead the number of the init PDFs on later iterations (always 5 for the first iteration) seem to be a key factor, it has to be sufficiently large to preserve the variety of database the PDFs but small enough to consist of PDFs with good quality. In our limited space of database candidates (∼ 65 = 7776 possibilities) the optimal set of variables 16 1 2 3 4 1.43 1.76 1.70 1.72 1.38 1.59 1.57 1.65 1.51 1.37 1.46 1.53 1.39 1.42 1.35 1.36 1.33 1.41 1.60 1.33 1.47 1.65 1.67 1.67 4 3 2 1 0 0 LO 1.41 2. iteration -5 10 10 -4 -3 10 10 -2 10 -1 1 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 Figure 8: (Colour online) Trained 2. iteration LO map, curves and numbers as in Fig.5. for the MIXPDF run should not be not impossible to map down. The method we used to generate the sample data is very simple indeed. The number of all the possible candidate database PDFs is not very large to begin with, so the quality of the final results strongly depends on the quality of the input for the SOM. Since the map PDFs are obtained by averaging with the training samples, and the non-valence flavours are scaled by a common factor when imposing the sumrules, the map PDFs tend to lie in between the init PDFs. Therefore map PDFs with extreme shapes are never produced, and thus never explored by the algorithm. A method which relies on sampling existing parametrizations on a SOM is inconvenient also because it is not readily applicable to multivariable cases. For the case of the PDFs it is sufficient to have a value for each flavour for a discrete set of x-values, but for a multivariable cases, such as nPDFs, or GPDs the task of keeping track of the grid of values for each flavour in each x for several different values of the additional variables (e.g. A and Z 17 1 2 3 4 1.26 1.26 1.28 1.36 1.35 1.26 1.26 1.31 1.33 1.36 1.29 1.25 1.30 1.37 1.36 1.32 1.27 1.35 1.35 1.41 1.29 1.27 1.30 1.42 4 3 2 1 0 0 LO 1.34 3. iteration -5 10 10 -4 -3 10 10 -2 10 -1 1 1.4 1.2 1.0 0.8 0.6 0.4 0.2 0.0 Figure 9: (Colour online) Trained 3. iteration LO map, curves and numbers as in Fig.5. for nuclei, and the skewness, ξ and the squared 4-momentum transfer, t for GPDs) is computationally expensive. In principle, SOM can keep track of the interrelations of the map vectors, and knowing the parametrization for the init PDFs, it would be possible to construct the parametrization for the map PDFs. That would, however, lead to very complicated parametrizations, and different nPDF, GPD etc. parametrizations are presently not even either measured or defined at the same initial scale. Despite of its problems, on a more basic level, MIXPDF does have the the desirable feature that it allows us to use SOM as a part of the PDF optimization algorithm in such a way that we cluster our candidate PDFs on the map, and select those PDFs which i) minimize a chosen fitness function, e.g. χ2 , when compared against experimental data, and ii) have some desired feature which can be visualized on the map or used as a clustering criterion. Therefore, in the following Section, we keep building on this example. 18 2.2 2.2 LO, 5 5 LO, 5 5 Nstep: Case 1 Case 2 best of 5, solid lines worst of 5, dashed lines 2.0 1.8 1.6 best of 5, solid lines worst of 5, dashed lines 1.4 1.4 1.2 1.2 1.0 1.0 0 1 2 3 4 5 6 7 8 Iteration 0 1 2 3 4 5 6 7 8 Iteration Figure 10: (Colour online) LO χ2 /N for 5 × 5 SOM runs with different Nstep . 4 ENVPDF algorithm Most of the problems with the MIXPDF algorithm originate from the need to be able to generate the database PDFs in an unbiased way as possible, and at the same time to have a variety of PDF candidates available at every stage of the fitting procedure. Yet, one needs to have control over the features of the database PDFs that are created. To accomplish this, we choose, at variance with the “conventional” PDFs sets or NNPDFs, to give up the functional form of PDFs and rather to rely on purely stochastical methods in generating the initial and training samples of the PDFs. Our choice is a GA-type analysis, in which our parameters are the values of PDFs at the initial scale for each flavour at each value of x where the experimental data exist. To obtain control over the shape of the PDFs we use some of the existing distributions to establish an initial range, or envelope, within which we sample the database PDF values. Again, we use the Case 1 and 2 PDF sets (CTEQ6, CTEQ5, CTEQ4, MRST02, Alekhin and GRV98) as an initialization guideline. We construct our initial PDF generator first to, for each flavour separately, select ran19 /N 2 5 10 20 30 40 2 /N 1.8 1.6 Nstep: 5 10 20 30 40 2.0 domly either the range [0.5, 1], [1.0, 1.5] or [0.75, 1.25] times any of the Case 1 (or 2) PDF set. Compared to MIXPDF algorithm we are thus adding more freedom to the scaling of the database PDFs. Next the initial generators generate values for each xdata § using uniform, instead of Gaussian, distribution around the existing parametrizations, thus reducing direct bias from them. Gaussian smoothing is applied to the resulting set of points, and the flavours combined to form a PDF set such that the curve is linearly interpolated from the discrete set of generated points. The candidate PDF sets are then scaled to obey the sumrules as in MIXPDF algorithm. In order to obtain a reasonable selection of PDFs to start with, we reject candidates which have χ2 /N > 10 (computed as in MIXPDF algorithm). To further avoid direct bias from the Case 1 and 2 PDFs, we don’t include the init PDFs into the training set for the first iteration as we did in MIXPDF case. For a N × N SOM we choose the size of the database to be 4N 2 . During the later iterations we proceed as follows: At the end of each iteration we pick from the trained N ×N SOM 2N best PDFs as the init PDFs. These init PDFs are introduced into the training set alongside with the database PDFs, which are now constructed using each of the init PDFs in turn as a center for a Gaussian random number generator, which assigns for all the flavours for each x a value around that same init PDF such that 1 − σ of the generator is given by the spread of the best PDFs in the topologically nearest neighbouring cells. The object of these generators is thus to refine a good candidate PDF found in the previous iteration by jittering it’s values within a range determined by the shape of other good candidate PDFs from the previous iteration. The generated PDFs are then smoothed and scaled to obey the sumrules. Sets with χ2 /N > 10 are always rejected. We learnt from the MIXPDF algorithm that it is important to preserve the variety of the PDF shapes on the map, so we also keep Norig copies of the first iteration generators in our generator mix. Table 3 lists results from a variety of such runs. The results do not seem § To ensure a reasonable large-x behaviour for the PDFs, we also generate with the same method values for them in a few x-points outside the range of the experimental data. We also require the PDFs, the gluons especially, to be positive for simplicity. 20 to be very sensitive to the number of SOM training steps, Nstep , but are highly sensitive to the number of first iteration generators used in subsequent iterations. Although the generators can now in principle produce an infinite number of different PDFs, the algorithm would not be able to radically change the shape of the database PDFs without introducing a random element on the map. Setting Norig > 0 provides, through map PDFs, that element, and keeps the algorithm from getting fixed to a local minimum. The ENVPDF algorithm is now more independent from the initial selection of the PDF sets, Case 1 or 2, than MIXPDF, since no values of e.g. the CTEQ6 set in the original generator are ever introduced on the map directly. SOM Nstep 5x5 5 5x5 10 5x5 20 5x5 30 5x5 40 5x5 5 5x5 20 5x5 5 5x5 10 5x5 15 15x15 5 15x15 5 Norig 2 2 2 2 2 0 0 2 2 2 6 6 Case 1 1 1 1 1 1 1 2 2 2 1 2 LO χ2 /N 1.04 1.10 1.10 1.10 1.08 1.41 1.26 1.14 1.12 1.18 1.00 1.13 NLO χ2 /N 1.08 1.25 1.07 1.18 Table 3: χ2 /N against all the datasets used (H1, ZEUS, BCDMS) for variety of ENVPDF runs. Fig. 11 shows the χ2 /N as a function of iteration for 5x5 LO and NLO, both Case 1 and Case 2, runs, where Nstep = 5 and Norig = 2. Clearly the ENVPDF runs take multiple number of iterations for the χ2 /N to level compared to the MIXPDF runs, and they are therefore more costly in time. With the ENVPDF algorithm, however, the χ2 /N keeps on slowly improving even after all the mother PDFs from the same iteration are equally good fits. For a larger 15x15 SOM the number of needed iterations remains as large. 21 3.0 3.0 LO 2.5 NLO Case 1: 5 5, Nstep=5 Case 1: 5 5, Nstep=5 best of 10 worst of 10 Case 2: Case 2: 2.0 2 best of 10 worst of 10 /N best of 10 worst of 10 2 /N 2.0 2.5 best of 10 worst of 10 1.5 1.5 1.0 1.0 0.5 0.5 0 5 10 15 20 25 30 35 40 45 50 Iteration 0 5 10 15 20 25 30 35 40 45 50 Iteration Figure 11: (Colour online) χ2 /N of the ENVPDF runs as a function of the iteration. Fig. 12 shows some of the Case 1 LO ENVPDF results at the initial scale Q = 1.3 GeV (left panel), and evolved up to Q = 3 GeV (right panel). The reference curves shown are also evolved as in MIXPDF. Although the initial scale ENVPDF results appear wiggly, they smooth out soon because of the additional well known effect of QCD evolution. In fact, the initial scale curves could be made smoother by applying a stronger Gaussian smoothing, but this is not necessary, as long as the starting scale is below the Qmin of the data. The evolved curves preserve the initially set baryon number scaling within 0.5% and momentum sumrule within 1.5% accuracy. Also, the results obtained from a larger map tend to be smoother since the map PDFs get averaged with a larger number of other PDFs. Studying the relation between the redundant wiggliness of our initial scale PDFs and possible fitting of statistical fluctuations of the experimental data is beyond the scope of this paper. The NLO Case 1 and 2 results are presented in Fig. 13. The trend of the results is clearly the same as in MIXPDF case, CTEQ6 is a favoured set, and especially the PDFs with gluons similar to those of CTEQ6’s have good χ2 /N. 22 We did not study the effect of modifying the width or the shape of the envelope in detail here, but choosing the envelope to be the wider or narrower than 1 − σ for the Gaussian generate seem to lead both slower and poorer convergence. Also, since we are clustering on the similarity of the observables, the same cell may in theory contain the best PDF of the iteration and PDFs which have χ2 /N as large as 10. Therefore the shape of the envelope should be determined only by the curves with promising shapes. 4.0 2.5 LO LO 3.5 Q=1.3 GeV CTEQ6 MRST02 CTEQ4 2.0 0.25*xg 1.5 Q=3.0 GeV CTEQ6 MRST02 CTEQ4 0.1*xg 5 5, Nstep= 5 Case 1 Case 2 5 5, Nstep= 5 Case 1 Case 2 15 15, Nstep= 5 Case 1 Case 2 15 15, Nstep= 5 Case 1 Case 2 3.0 2.5 2.0 1.0 1.5 xuV xu 1.0 xu 0.5 xuV 0.5 0.0 -5 10 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 12: (Colour online) LO ENVPDF results at the initial scale, and at Q = 3.0 GeV. Next we want to study the PDF uncertainty using the unique means the SOMs provide to us even for a case of PDFs without a functional form. Since we have only used DIS data in this introductory study, we are only able to explore the small-x uncertainty for now. Figs. 14 (LO) and 15 (NLO) showcase, besides our best results, the spread of all the initial scale PDFs with χ2 /N ≤ 1.2, that were obtained during a 5 × 5 (left panel) and 15 × 15 (right panel) SOM run. Since the number of such PDF sets is typically of the order of thousands, we only plot the minimum and maximum of the bundle 23 4.0 3.0 Q=1.3 GeV CTEQ6 MRST02 CTEQ4 2.5 2.0 15 15, Nstep= 5 Case 1 Case 2 NLO NLO 3.5 Q=3.0 GeV CTEQ6 MRST02 CTEQ4 0.25*xg 5 5, Nstep= 5 Case 1 Case 2 0.85*xg 3.0 5 5, Nstep= 5 Case 1 Case 2 2.5 2.0 1.5 15 15, Nstep= 5 Case 1 Case 2 1.5 1.0 xuV 1.0 xu xuV 0.5 xu 0.0 -5 10 0.5 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 13: (Colour online) NLO ENVPDF results at the initial scale, and at Q = 3.0 GeV. of curves. Since the total number of experimental datapoints used is ∼ 710, the spread ∆χ2 /N ∼ 0.2 corresponds to a ∆χ2 ∼ 140. Expectedly, the smallx gluons obtain the largest uncertainty for all the cases we studied. Even though a larger SOM with a larger database might be expected to have more variety in the shapes of the PDFs, the χ2 /N ≤ 1.2 spreads of the 5 × 5 and 15 × 15 SOMs are more or less equal sized (the apparent differences in sizes at Q = Q0 even out when the curves are evolved). Both maps therefore end up producing the same extreme shapes for the map PDFs although a larger map has more subclasses for them. Remarkably then, a single SOM run can provide a quick uncertainty estimate for a chosen ∆χ2 without performing a separate error analysis. Due to the stochastical nature of the ENVPDF algorithm, we may well also study the combined results from several separate runs. It is especially important to verify the stability of our results, to show that the results are indeed reproducible instead of lucky coincidences. Left panels of Figs 16 (LO) and 24 3.0 3.0 LO LO 2.5 2.5 Q=1.3 GeV CTEQ6 MRST02 2.0 Q=1.3 GeV CTEQ6 MRST02 5 5, Nstep= 5 Case 1 2 /N 1.2 0.25*xg 2.0 15 15, Nstep= 5 Case 1 2 /N 1.2 0.25*xg 1.5 1.5 1.0 1.0 xuV xuV xu xu 0.5 0.0 -5 10 0.5 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 14: (Colour online) LO ENVPDF best result and the χ2 /N ≤ 1.2 spread of results. 17 (NLO) present the best results, and the combined χ2 /N ≤ 1.2 spreads for 10 repeated 5 × 5, Nstep = 5 runs at the initial scale. The average χ2 /N and the standard deviation σ for these runs are in LO (NLO) are 1.065 and 0.014 (1.122 and 0.029), corresponding to ∆χ2 ∼ 10 (20) for LO (NLO). The right panels of the same Figs 16, 17 show the 10 best result curves and the χ2 /N ≤ 1.2 spreads evolved up to Q = 3.0 GeV. Clearly the seemingly large difference between the small-x gluon results at the initial scale is not statistically significant, but smooths out when gluons are evolved. Thus the initial scale wiggliness of the PDFs is mainly only a residual effect from our method of generating them and not linked to the overtraining of the SOM, and we refrain from studying cases where stronger initial scale smoothing is applied. Therefore our simple method of producing the candidate PDFs by jittering random numbers inside a predetermined envelope is surprisingly stable when used together with a complicated PDF processing that SOMs provide. 25 3.5 3.5 Q=1.3 GeV CTEQ6 MRST02 NLO 3.0 NLO 5 5, Nstep= 5 Case 1 2 /N 1.2 2.5 0.85*xg Q=1.3 GeV CTEQ6 MRST02 3.0 15 15, Nstep= 5 Case 1 2 /N 1.2 0.85*xg 2.5 2.0 2.0 1.5 1.5 1.0 1.0 xuV 0.5 xuV xu 0.5 xu 0.0 -0.5 -5 10 0.0 -0.5 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 15: (Colour online) NLO ENVPDF best result and the χ2 /N ≤ 1.2 spread of results. 5 Future of the SOMPDFs So far we have shown a relatively straightforward method of obtaining stochastically generated, parameter-free, PDFs, with an uncertainty estimate for a desired ∆χ2 . On every iteration using our competitive learning algorithm, the selection of the winning PDFs was based on the χ2 /N alone, and the fitting procedure was fully automated. In our MIXPDF algorithm the SOMs were used merely as a tool to create new combinations, map PDFs, of our input database. The ENVPDF algorithm also used the topology of the map to determine the shape of the envelope, within which we sampled the database PDFs. We reiterate that our initial study was aimed at observing and recording the behavior of the SOM as an optimization tool. Many of the features of our results could not in fact be predicted based on general assumptions. The proposed method can be extended much further than that. The automated version of the algorithm could be set to sample a vector consisting of PDF 26 4.0 3.0 LO LO 3.5 2.5 Q=1.3 GeV CTEQ6 MRST02 2.0 0.25*xg Q=3.0 GeV CTEQ6 MRST02 0.1*xg 5 5, Nstep= 5 Case 1 2 /N 1.2 3.0 5 5, Nstep= 5 Case 1 2 /N 1.2 2.5 2.0 1.5 1.5 1.0 xuV 0.5 1.0 xu xu xuV 0.5 0.0 -5 10 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 -5 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 16: (Colour online) LO ENVPDF best results and the χ2 /N ≤ 1.2 spreads of results from 10 separate runs. parameters, instead of values of PDFs in each value of x of the data. That would lead to smooth, continuous type of solutions, either along the lines of global analyses, or NNPDFs using N SOMs for N Monte-Carlo sampled replicas of the data. Since the solution would be required to stay within an envelope of selected width and shape given by the map, no restrictions for the parameters themselves would be required. For such a method, all the existing error estimates, besides an uncertainty band produced by the map, would be applicable as well. What ultimately sets the SOM method apart from the standard global analyses or NNPDF method, however, are the clustering and visualization possibilities that it offers. Instead of setting Mdata = L1 and clustering according to the similarity of the observables, it is possible to set the clustering criteria to be anything that can be mathematically quantified, e.g. the shape of the gluons or the large-x behaviour of the PDFs. The desired feature of the PDFs can then be projected out from the SOM. Moreover, by combining the 27 4.0 3.5 Q=1.3 GeV CTEQ6 MRST02 NLO 3.0 NLO 3.5 5 5, Nstep= 5 Case 1 2 /N 1.2 2.5 Q=3.0 GeV CTEQ6 MRST02 0.25*xg 0.85*xg 3.0 5 5, Nstep= 5 Case 1 2 /N 1.2 2.0 2.5 2.0 1.5 1.0 1.5 xuV 0.5 1.0 xu xu xuV 0.0 -0.5 -5 10 0.5 0.0 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 -5 1 10 2 5 -4 10 2 5 10 -3 2 x 5 -2 10 2 5 -1 10 2 5 1 Figure 17: (Colour online) NLO ENVPDF best results and the χ2 /N ≤ 1.2 spreads of results from 10 separate runs. method with an interactive graphic user interface (GUI), it would be possible to change and control the shape and the width of the envelope as the minimization proceeds, to guide the process by applying researcher insight at various stages of the process. Furthermore, the uncertainty band produced by the SOM as the run proceeds, could help the user to make decisions about the next steps of the minimization. With GUI it would be e.g. possible to constrain the extrapolation of the NN generated PDFs outside the x-range of the data without explicitly introducing terms to ensure the correct smalland large-x behaviour as in NNPDF method (see Eq.(87) in [23]). The selection of the best PDF candidates for the subsequent iteration could then be made based on the user’s preferences instead of solely based on the χ2 /N. That kind of method in turn could be extended to multivariable cases such as nPDFs and even GPDs and other not so well-known cases, where the data is too sparse for stochastically generated, parameter-free, PDFs. Generally, any PDF fitting method involves a large number of flexible points 28 “opportunities for adapting and fine tuning”, which act as a source for both systematical and theoretical bias when fixed. Obvious optimization method independent sources of theoretical bias are the various parameters of the DGLAP equations, inclusion of extra sources of Q2 -dependence beyond DGLAP-type evolution and the data selection, affecting the coverage of different kinematical regions. SOMs themselves, and different SOMPDF algorithm variations naturally also introduce flexible points of their own. We explored a little about the effects of choosing the size of the SOM and the number of the batch training steps Nstep . There are also plenty of other SOM properties that can be modified, such as the shape of the SOM itself. We chose to use a rectangular lattice, but generally the SOM can take any shape desired. For demanding vizualisation purposes a hexagonal shape is an excellent choice, since the meaning of the nearest neighbours is better defined. The SOMPDF method, supplemented with the use of a GUI, will allow us to both qualitatively and quantitatively study the flexible points involved in the PDFs fitting. More complex hadronic matrix elements, such as the ones defining the GPDs, are natural candidates for future studies of cases where the experimental data are not numerous enough to allow for a model independent fitting, and the guidance and intuition of the user is therefore irreplaceable. The method we are proposing is extremely open for user interaction, and the possibilities of such a method are widely unexplored. Acknowledgements We thank David Brogan for helping us to start this project. This work was financially supported by the US National Science Foundation grant no.0426971. HH was also supported by the U.S. Department of Energy, grant no. DE-FG02-87ER40371. SL is supported by the U.S. Department of Energy, grant no. DE-FG02-01ER41200. 29 References [1] P. M. Nadolsky et al., arXiv:0802.0007 [hep-ph]. [2] A. D. Martin, R. G. Roberts, W. J. Stirling and R. S. Thorne, Eur. Phys. J. C 23 (2002) 73 [arXiv:hep-ph/0110215]. [3] A. D. Martin, R. G. Roberts, W. J. Stirling and R. S. Thorne, Phys. Lett. B 604 (2004) 61 [arXiv:hep-ph/0410230]. [4] A. D. Martin, W. J. Stirling, R. S. Thorne and G. Watt, Phys. Lett. B 652 (2007) 292 [arXiv:0706.0459 [hep-ph]]. [5] S. Alekhin, Phys. Rev. D 68 (2003) 014002 [arXiv:hep-ph/0211096]. [6] S. Alekhin, K. Melnikov and F. Petriello, Phys. Rev. D 74 (2006) 054033 [arXiv:hep-ph/0606237]. [7] S. Chekanov et al. [ZEUS Collaboration], Eur. Phys. J. C 42 (2005) 1 [arXiv:hep-ph/0503274]. [8] C. Adloff et al. [H1 Collaboration], Eur. Phys. J. C 30 (2003) 1 [arXiv:hep-ex/0304003]. [9] J. Pumplin et al., Phys. Rev. D 65 (2002) 014013 [arXiv:hepph/0101032]. [10] A. D. Martin, R. G. Roberts, W. J. Stirling and R. S. Thorne, Eur. Phys. J. C 35 (2004) 325 [arXiv:hep-ph/0308087]. [11] A. D. Martin, R. G. Roberts, W. J. Stirling and R. S. Thorne, Eur. Phys. J. C 28 (2003) 455 [arXiv:hep-ph/0211080]. [12] K. J. Eskola, H. Paukkunen and C. A. Salgado, JHEP 0807 (2008) 102 [arXiv:0802.0139 [hep-ph]]. 30 [13] K. J. Eskola, V. J. Kolhinen, H. Paukkunen and C. A. Salgado, JHEP 0705 (2007) 002 [arXiv:hep-ph/0703104]. [14] M. Hirai, S. Kumano and T. H. Nagai, Phys. Rev. C 70 (2004) 044905 [arXiv:hep-ph/0404093]. [15] M. Hirai, S. Kumano and T. H. Nagai, Phys. Rev. C 76 (2007) 065207 [arXiv:0709.3038 [hep-ph]]. [16] M. Vanderhaeghen, P. A. M. Guichon and M. Guidal, Phys. Rev. D 60 (1999) 094017 [arXiv:hep-ph/9905372]. [17] S. Ahmad, H. Honkanen, S. Liuti and S. K. Taneja, Phys. Rev. D 75 (2007) 094003 [arXiv:hep-ph/0611046]. [18] S. Ahmad, H. Honkanen, S. Liuti and S. K. Taneja, arXiv:0708.0268 [hep-ph]. [19] D. Stump et al., Phys. Rev. D 65 (2002) 014012 [arXiv:hep-ph/0101051]. [20] J. Pumplin, AIP Conf. Proc. 792, 50 (2005) [arXiv:hep-ph/0507093]. [21] A. Djouadi and S. Ferrag, Phys. Lett. B 586 (2004) 345 [arXiv:hepph/0310209]. [22] M. Ubiali, arXiv:0809.3716 [hep-ph]. [23] R. D. Ball et al., arXiv:0808.1231 [hep-ph]. [24] L. Del Debbio, S. Forte, J. I. Latorre, A. Piccione and J. Rojo [NNPDF Collaboration], JHEP 0703 (2007) 039 [arXiv:hep-ph/0701127]. [25] W. T. Giele, S. A. Keller and D. A. Kosower, arXiv:hep-ph/0104052. [26] G. Cowan, Prepared for 14th International Workshop on Deep Inelastic Scattering (DIS 2006), Tsukuba, Japan, 20-24 Apr 2006 31 [27] G. D’Agostini, “Bayesian Reasoning in Data Analysis: A Critical Introduction”, World Scientific Publishing, Singapore (2003). [28] T. Kohonen, Self-organizing Maps, Third Edition, Springer (2001). [29] http://www.cis.hut.fi/projects/somtoolbox [30] J. S. Lange, H. Freiesleben and P. Hermanowski, Nucl. Instrum. Meth. A 389 (1997) 214. [31] K. H. Becks, J. Drees, U. Flagmeyer and U. Muller, Nucl. Instrum. Meth. A 426 (1999) 599. [32] J. S. Lange, C. Fukunaga, M. Tanaka and A. Bozek, Nucl. Instrum. Meth. A 420 (1999) 288. [33] Charu C. Aggarwal , Alexander Hinneburg , Daniel A. Keim, Proceedings of the 8th International Conference on Database Theory, p.420-434, January 04-06, 2001 [34] http://www.ai-junkie.com/ann/som/som1.html and http://davis.wpi.edu/~ matt/courses/soms/ [35] C. Adloff et al. [H1 Collaboration], Eur. Phys. J. C 21 (2001) 33 [arXiv:hep-ex/0012053]. [36] A. C. Benvenuti et al. [BCDMS Collaboration], Phys. Lett. B 223 (1989) 485. [37] A. C. Benvenuti et al. [BCDMS Collaboration], Phys. Lett. B 237 (1990) 592. [38] S. Chekanov et al. [ZEUS Collaboration], Eur. Phys. J. C 21 (2001) 443 [arXiv:hep-ex/0105090]. 32 [39] J. Pumplin, D. R. Stump, J. Huston, H. L. Lai, P. Nadolsky and W. K. Tung, JHEP 0207 (2002) 012 [arXiv:hep-ph/0201195]. [40] http://www.nikhef.nl/~ h24/qcdnum/ [41] H. L. Lai et al. [CTEQ Collaboration], Eur. Phys. J. C 12 (2000) 375 [arXiv:hep-ph/9903282]. [42] A. D. Martin, R. G. Roberts, W. J. Stirling and R. S. Thorne, Phys. Lett. B 531 (2002) 216 [arXiv:hep-ph/0201127]. [43] M. Gluck, E. Reya and A. Vogt, Eur. Phys. J. C 5 (1998) 461 [arXiv:hepph/9806404]. [44] H. L. Lai et al., Phys. Rev. D 55, 1280 (1997) [arXiv:hep-ph/9606399]. 33
5cs.CE
Published in Journal of Telematics and Informatics, Vol 4, No 1 (2016): March 2016 Abstract: http://section.iaesonline.com/index.php/JTI/article/view/188 One-Minute Derivation of The Conjugate Gradient Algorithm Muhammad Ali Raza Anjum Army Public College of Management and Sciences Rawalpindi, PAKISTAN e-mail: [email protected] Abstract One of the great triumphs in the history of numerical methods was the discovery of the Conjugate Gradient (CG) algorithm. It could solve a symmetric positive-definite system of linear equations of dimension N in exactly N steps. As many practical problems at that time belonged to this category, CG algorithm became rapidly popular. It remains popular even today due to its immense computational power. But despite its amazing computational ability, mathematics of this algorithm is not easy to learn. Lengthy derivations, redundant notations, and over-emphasis on formal presentation make it much difficult for a beginner to master this algorithm. This paper aims to serve as a starting point for such readers. It provides a curt, easy-to-follow but minimalist derivation of the algorithm by keeping the sufficient steps only, maintaining a uniform notation, and focusing entirely on the ease of reader. Keywords: Conjugate Gradient, Algorithm, Optimization 1. Introduction Importance of the Conjugate Gradient (CG) algorithm can hardly be overemphasized. It is everywhere: in optimization theory [1, 2], in adaptive filtering [3, 4], in machine learning [5, 6], in image processing [7, 8] and in many others [9-11]. Though it is popular, the algorithm is not easy to learn. The chief difficulty lies with its derivation. Reasons for this difficulty are as numerous as the reasons for its popularity. Too many approaches, too much variety in notation and over emphasis on form and presentation are just to name a few. Books do not try to resolve these issues. Research papers avoid resolving these issues. There must be an excellent cause for them to do so but they all essentially miss one point: to convey this fascinating algorithm to the aspiring student in a quick, easy and understandable way. Tutorials have made an attempt in this regard. Though they are scarce as well, two of them are truly remarkable. First one tries to systematically address the above mentioned problems but ends up in a long 64 page document in an attempt to explain “everything” [12]. As a result, derivation is almost impossible to follow. Second one gives a quick explanation to the general philosophy of the algorithm but leaves the derivation entirely to the reader [13]. This paper does not aim to do any of these. It neither attempts to explain the philosophy of algorithm nor “everything” of the algorithm. It will present a quick, easy, and understandable proof of the most difficult part of the algorithm: its mathematical derivation. By following this derivation, readers will acquire at least four benefits. Firstly, they will understand the derivation with minimum background knowledge. Only linear algebra will be required. Secondly, they will grasp it in minimum amount of time. Derivation presented is as short as possible. Thirdly, they will learn it with minimum effort. Onus of making things understandable is on author. Finally, once the derivation is finished, they will be able to implement it in a programming language of their choice. The results will be presented in an easy to program manner. 2. System Model Consider following system of linear equations. is a symmetric × matrix such that this system iteratively. = = . and are (1) × 1 vectors. We attempt to solve Page 1 of 5 Published in Journal of Telematics and Informatics, Vol 4, No 1 (2016): March 2016 Abstract: http://section.iaesonline.com/index.php/JTI/article/view/188 = is the estimate computed in the -th iteration. iteration. is the step-size. 3. Computation of Residues Subtracting the actual solution + (2) is the correction term required in the -th from both sides of Eq. (1), − This results in, = − = + + is the error in the -th iteration. At the startup, we make a guess for is purely arbitrary, there will be a residue . = Or, − = Multiplying both sides of Eq. (3) with , Replacing the result of Eq. (4) in Eq. (5), − Or, − = =− (4) = + (5) =− + (6) = (7) − = for which, . Since our guess for =− 3. First Major Assumption Now we multiply both sides of Eq. (7) with We choose value for − − =0 . This is the first crucial decision we make for CG algorithm. So Eq. (8) becomes, Finally for , 0= − Hence, Eqs. (2) and (7) become, = = (8) (9) (10) (11) = And, (3) + − (12) (13) 4. Second Major Assumption So far we have Eqs. (7) and (11) for the computation of and the respectively. Now we want to derive the from and . Let us define the following relationship between all three. = + (14) Page 2 of 5 Published in Journal of Telematics and Informatics, Vol 4, No 1 (2016): March 2016 Abstract: http://section.iaesonline.com/index.php/JTI/article/view/188 Note that this relationship is quite similar to the pattern in Eq. (12). Now, we multiply both sides of Eq. (14) with . = + Further multiplying both sides of Eq. (15) with We want to choose , = for which, (15) + (16) =0 (17) This is the second crucial decision for the CG algorithm. So Eq. (16) becomes, Finally for 0= , + (18) =− 5. Making the Algorithm Recursive It will be much more efficient if we can compute from because we already have from Eq. (11). For this purpose, we will exploit term in Eq. (18). This can be done by recalling Eq. (7) and multiplying it with on both sides. Now we see = − term on the right hand side of Eq. (19). Being a scalar term, = Substituting our assumption from Eq. (9) in Eq. (19), = 0− Or, =− Using Eq. (20) and remembering that 1 =− Finally, in terms of (22) 1 Substituting the result of Eq. (23) in (18), = , = 1 (20) (21) is symmetric, =− (19) 1 (23) (24) (25) Now we have Eq. (25) to compute from . Only other term required to compute Eq. (25) is . But we already have and from Eq. (13). If we can compute from ’s only, it will not only make Eq. (25) more efficient but also recursive. For this purpose, only the dominator term in Eq. (17) has to be expressed in terms of ’s for this purpose. So we recall (14) and substitute in place of + 1 in it. Multiplying both sides of (26) first with , = + (26) Page 3 of 5 Published in Journal of Telematics and Informatics, Vol 4, No 1 (2016): March 2016 Abstract: http://section.iaesonline.com/index.php/JTI/article/view/188 And then multiplying with = , + = (27) + Employing the assumption of Eq. (17) and re-arranging, = Or, +0 = (31) = Or, (32) = Re-arranging Eq. (32), (29) (30) = Substituting Eq. (30) in Eq. (11), (28) (33) = Eq. (33) fully expresses the denominator of Eq. (25) in terms of ’s. Substituting Eq. (33) in Eq. (25), = 1 = Finally, (35) = Eq. (35) expresses (34) in terms of ’s only and this completes our derivation of CG algorithm. 6. The Algorithm Itself Now we recap the results and list them in the form of an algorithm. 1. Make an initial guess . 2. Take = = − . 3. Compute using Eq. (32). = 4. Update using Eq. (12). 5. Update using Eq. (7). 6. Determine using Eq. (35). = = + − = 7. Update using Eq. (14). = + Page 4 of 5 Published in Journal of Telematics and Informatics, Vol 4, No 1 (2016): March 2016 Abstract: http://section.iaesonline.com/index.php/JTI/article/view/188 7. Conclusion An easy, step-by-step but minimalist derivation of the Conjugate Gradient algorithm is provided in this paper. By following this derivation, the readers, regardless of their background, will not only master this fascinating algorithm in no time but will also be able to program it for their own purposes which will provide them a better understanding of their own problems on which they are working. References [1] C. Li, L. Fang, and X. Cao, "Global Convergence of A Kind of Conjugate Gradient Method," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 11, pp. 544-549, 2013. [2] C. Li, "A Modified Conjugate Gradient Method for Unconstrained Optimization," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 11, pp. 6373-6380, 2013. [3] L. Wang and R. C. de Lamare, "Set-membership constrained conjugate gradient adaptive algorithm for beamforming," Signal Processing, IET, vol. 6, pp. 789-797, 2012. [4] Y. Liu, R. Ranganathan, M. T. Hunter, and W. B. Mikhael, "Complex adaptive LMS algorithm employing the conjugate gradient principle for channel estimation and equalization," Circuits, Systems, and Signal Processing, vol. 31, pp. 1067-1087, 2012. [5] G. Harik, "Method for an optimizing predictive model using gradient descent and conjugate residuals," ed: Google Patents, 2014. [6] J. Ngiam, A. Coates, A. Lahiri, B. Prochnow, Q. V. Le, and A. Y. Ng, "On optimization methods for deep learning," in Proceedings of the 28th International Conference on Machine Learning (ICML-11), 2011, pp. 265-272. [7] W. Huang, Y. Wang, and D. W. Rosen, "Inverse Surfacelet Transform for Image Reconstruction With Constrained-Conjugate Gradient Methods," Journal of Computing and Information Science in Engineering, vol. 14, p. 021005, 2014. [8] S. K. Jain, R. K. Ray, and A. Bhavsar, "A Comparative Study of Iterative Solvers for Image De-noising," in Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2015, pp. 307-314. [9] H. Wu, T. Guilin University of Electronic, G. Wang, T. Guilin University of Electronic, F. Zhang, T. Guilin University of Electronic, et al., "Inversion of Surface Nuclear Magnetic Resonance by Regularization with Simulated Atomic Transition Method," TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 11, pp. 5055-5060, 2013. [10] Z. Chen, H. Li, and M. Rangaswamy, "Conjugate gradient adaptive matched filter," Aerospace and Electronic Systems, IEEE Transactions on, vol. 51, pp. 178-191, 2015. [11] S. Zhao, D. L. Jones, S. Khoo, and Z. Man, "Frequency-domain beamformers using conjugate gradient techniques for speech enhancement," The Journal of the Acoustical Society of America, vol. 136, pp. 1160-1175, 2014. [12] J. R. Shewchuk, "An introduction to the conjugate gradient method without the agonizing pain," ed: Carnegie-Mellon University. Department of Computer Science, 1994. [13] G. Strang, Computational science and engineering vol. 1: Wellesley-Cambridge Press Wellesley, 2007. Page 5 of 5
8cs.DS
arXiv:1511.02534v2 [math.ST] 31 Mar 2017 Order Determination of Large Dimensional Dynamic Factor Model Z. D. Baia , Chen Wangb , Ya Xuec and Matthew Hardingd Northeast Normal Universitya , University of Cambridgeb and University of California, Irvinec,d April 3, 2017 Abstract Consider the following dynamic factor model: Rt = Pq i=0 Λi ft−i + et , t = 1, ..., T , where Λi is an n × k loading matrix of full rank, {ft } are i.i.d. k × 1-factors, and et are independent n × 1 white noises. Now, assuming that n/T → c > 0, we want to estimate the orders k and q respectively. Define a random matrix Φn (τ ) = T 1 X (Rj R∗j+τ + Rj+τ R∗j ), 2T j=1 where τ ≥ 0 is an integer. When there are no factors, the matrix Φn (τ ) reduces to Mn (τ ) = T 1 X (ej e∗j+τ + ej+τ e∗j ). 2T j=1 When τ = 0, Mn (τ ) reduces to the usual sample covariance matrix whose ESD tends to the well known MP law and Φn (0) reduces to the standard spike model. Hence the number k(q + 1) can be estimated by the number of spiked eigenvalues of Φn (0). To obtain separate estimates of k and q , we have employed the spectral analysis of Mn (τ ) and established the spiked model analysis for Φn (τ ). 1 1 Introduction For a p × p random Hermitian matrix A with eigenvalues λj , j = 1, 2, · · · , p, the empirical spectral distribution (ESD) of A is defined as p 1X F (x) = I(λj ≤ x). p j=1 A The limiting distribution F of {F An } for a given sequence of random matrices {An } is called the limiting spectral distribution (LSD). Let {εit } be independent identically distributed (i.i.d) random variables with common mean 0, variance 1. Consider a high dimensional dynamic kP factor model with lag q, that is, Rt = qi=0 Λi ft−i + et , t = 1, ..., T , where Λi is an n×k loading matrix of full rank, {ft } are i.i.d. k × 1-factors with common mean 0, variance 1, whereas et corresponds to the noise component with et = (ε1t , · · · , εnt )′ . In addition, both components of et and ft are assumed to have finite 4th moment. This model can also be thought as an information-plus-noise type model (Dozier & Silverstein, 2007a, b; Bai & Silverstein, 2012). Here both n and T tend to ∞, with n/T → c for some c > 0. Compared with n and T , the number of factors k and that of lags q are fixed but unknown. An interesting and important problem to economists is how to estimate k and PT 1 ∗ ∗ √1 et and Mn (τ ) = q. To this end, define Φn (τ ) = 2T j=1 (Rj Rj+τ + Rj+τ Rj ), γt = 2T PT ∗ ∗ ∗ k=1 (γk γk+τ + γk+τ γk ), τ = 0, 1, · · · . Here stands for the transpose and complex conjugate of a complex number and τ is referred to be the number of lags. Denote Λ = (Λ0 , Λ1 , · · · , Λq )n×k(q+1) ,  fT +τ −1 · · · fτ +1  fT +τ   fT +τ −1 fT +τ −2 · · · fτ  τ F =  .. .. .. ..  . . . .   fT +τ −q fT +τ −1−q · · · fτ +1−q eτ = (eT +τ , eT +τ −1 , · · · , eτ +1 )n×T . Then we have that Φn (τ ) = 1 2T          , k(q+1)×T [(ΛFτ + eτ )(ΛF0 + e0 )∗ + (ΛF0 + e0 )(ΛFτ + eτ )∗ ] and Mn (τ ) = 2 1 2T (eτ e0∗ + e0 eτ ∗ ). Note that essentially, Mn (τ ) and Φn (τ ) are symmetrized auto-cross covariance matrices at lag τ and generalize the standard sample covariance matrices Mn (0) and Φn (0), respectively. The matrix Mn (0) has been intensively studied in the literature and it is well known that the LSD has an MP law (Marčenko and Pastur, 1967). Readers may refer to Jin et al. (2014) and Wang et al. (2015) for more details about the model. To estimate k and q, the following method can be employed. First, note that when τ = 0 and Cov(ft ) = Σf , the population covariance matrix of Rt is a spiked population model (Johnstone (2001), Baik and Silverstein (2006), Bai and Yao (2008)) with k(q+1) spikes. Therefore, k(q+1) can be estimated by counting the number of eigenvalues of Φn (0) that are larger than some phase transition point. Next, the separated estimation of k and q can be achieved by investigating the spectral property of Mn (τ ) for general τ ≥ 1, using the fact that the number of eigenvalues of Φn (τ ) that lie outside the support of the LSD of Mn (τ ) at lags 1 ≤ τ ≤ q is different from that at lags τ > q. Thus, the estimates of k and q can be separated by counting the number of eigenvalues of Φn (τ ) that lie outside the support of the LSD of Mn (τ ) from τ = 0, 1, 2, · · · , q, q + 1, · · · . Note that for the above method to work, the LSD of Mn (τ ) for general τ ≥ 1 must be known. This is derived in Jin et al. (2014). Moreover, it is required that no eigenvalues outside the the support of the LSD of Mn (τ ) so that if an eigenvalue of Φn (τ ) goes out of the support of the LSD of Mn (τ ), it must come from the signal part. Wang et al. (2015) proved such phenomenon theoretically. Both results are included in Section 2 for readers’ reference. The rest of the paper is structured as follows: Some known results are given in Section 2. Section 3 presents truncation of variables and Section 4 estimates k(q + 1). The estimation of q is provided in Section 5, from the which the estimation of k can also be obtained. Section 6 discusses the case when the variance of the noise part is unknown. A simulation study is shown in Section 7 and some proofs are presented in Appendix. Regrading the norm used in this paper, the norm applied to a vector is the usual Euclidean norm, with notation k ∗ k. For a matrix, two kinds of norm have been used. The operator norm, 3 denoted by k ∗ ko, is the largest singular value. For matrices of fixed dimension, the Kolmogorov norm, defined as the largest absolute value of all the entries, has been used, with notation k ∗ kK . 2 Some known results In this section, we present some known results. Lemma 2.1 (Burkholder (1973)). Let {Xk } be a complex martingale difference sequence with respect to the increasing σ-fields {Fn }. Then, for p ≥ 2, we have E| X   X X p/2 X k | p ≤ Kp E E(|Xk |2 |Fk−1) +E |Xk |p . Lemma 2.2 (Lemma A.1 of Bai and Silverstein (1998)). For X = (X1 , · · · , Xn )′ i.i.d. standardized (complex) entries, B n × n Hermitian nonnegative definite matrix, we have, for any p ≥ 1, E|X∗BX|p ≤ Kp  trB where Kp is a constant depending on p only. p  + rE|X1 |2p trBp , Lemma 2.3 (Jin et al. (2014)). Assume: (a) τ ≥ 1 is a fixed integer. (b) ek = (ε1k , · · · , εnk )′ , k = 1, 2, ..., T +τ , are n-dimensional vectors of independent standard complex components with sup1≤i≤n,1≤t≤T +τ E|εit |2+δ ≤ M < ∞ for some δ ∈ (0, 2], and for any η > 0, 1 η 2+δ nT n T +τ X X i=1 t=1 E(|εit |2+δ I(|εit | ≥ ηT 1/(2+δ) )) = o(1). (c) n/(T + τ ) → c > 0 as n, T → ∞. (d) Mn (τ ) = PT ∗ k=1 (γk γk+τ + γk+τ γk∗ ), where γk = 4 √1 2T ek . (2.1) D Then as n, T → ∞, F Mn (τ ) → Fc a.s. and Fc has a density function given by q 2 y 1 1 φc (x) = 2cπ 1+y0 0 − ( 1−c + √1+y )2 , |x| ≤ a, |x| 0 where a=   √ (1−c) 1+y1 , y1 −1 c 6= 1, 2, c = 1,  y0 is the largest real root of the equation: y 3 − (1−c)2 −x2 2 y x2 − 4 y x2 − 4 x2 = 0 and y1 is the only real root of the equation: ((1 − c)2 − 1)y 3 + y 2 + y − 1 = 0 (2.2) such that y1 > 1 if c < 1 and y1 ∈ (0, 1) if c > 1. Further, if c > 1, then Fc has a point mass 1 − 1/c at the origin. Note that as long as τ ≥ 1, Fc does not depend on τ. Lemma 2.4 (Bai and Wang (2015)). Theorem 2.3 still holds with the 2 + δ moment condition weakened to 2nd moment. Lemma 2.5 (Wang et al. (2015)). Assume: (a) τ ≥ 1 is a fixed integer. (b) ek = (ε1k , · · · , εnk )′ , k = 1, 2, ..., T + τ , are n-vectors of independent standard complex components with supi,t E|εit |4 ≤ M for some M > 0. (c) There exist K > 0 and a random variable X with finite fourth order moment such that, for any x > 0, for all n, T n T +τ 1 XX P(|εit | > x) ≤ KP(|X| > x). nT i=1 t=1 (d) cn ≡ n/T → c > 0 as n → ∞. (e) Mn = PT ∗ k=1 (γk γk+τ + γk+τ γk∗ ), where γk = √1 2T ek . (f) The interval [a,b] lies outside the support of Fc , where Fc is defined as in Lemma 2.3. Then P (no eigenvalues of Mn appear in [a, b] for all large n) = 1. 5 (2.3) 3 Truncation, centralization and standardization of variables As proved in Wang et al.(2015), we may assume that the εij ’s satisfy the conditions that |εij | ≤ C, Eεij = 0, E|εij |2 = 1, E|εij |4 < M (3.4) for some C, M > 0. For the truncation of variables in Fτ , first note that for a random variable X with E|X|4 < ∞,  P 2ℓ P |X| > 2ℓ/4 < ∞. Given E|Fτij |4 < ∞, i = 1, · · · , k(q + 1), j = 1, · · · , T , we have ∞ ℓ=1   Fτ , |Fτ | < T 1/4 ,  ij ij define F̂τij = F̂τ = F̂τij and  0, otherwise, Φ̂n (τ ) = 1 [(ΛF̂τ + eτ )(ΛF̂0 + e0 )∗ + (ΛF̂0 + e0 )(ΛF̂τ + eτ )∗ ]. 2T Then we have   P Φn (τ ) 6= Φ̂n (τ ), i.o.   = P Fτ 6= F̂τ , i.o.  ∞ [ ∞ \ = P  [ L=1 T =L i≤k(q+1) j≤T  2ℓ+1 ∞ X  [ ≤ lim P  L→∞ ℓ=L ≤   {|Fτij | ≥ T 1/4 }  [ T =2ℓ +1 i≤k(q+1) j≤2ℓ+1   {|Fτij | ≥ 2ℓ/4 }    ∞ X   [ τ ℓ/4  {|F | ≥ 2 } P ij   L→∞ lim ℓ=L ≤ k(q + 1) lim i≤k(q+1) j≤2ℓ+1 ∞ X ℓ+1 L→∞ → 0. 2 ℓ=L P |Fτ11 | ≥ 2ℓ/4  This completes the proof of truncation. Centralization and standardization can be justified in the 6 same way as in Appendix A of Wang et al. (2015). In what follows, we may assume that |Fτij | < T 1/4 , EFτij = 0, E|Fτij |2 = 1, E|Fτij |4 < M for some M > 0. 4 Estimation of k(q + 1) In this section, we will estimate k(q+1) by an investigation of the limiting properties of eigenvalues of Φn (0). For simplicity, rewrite Φn (0) = Φ(0), F0 = F and e0 = e. With these notations, we have Φ(0) = 1 (ΛF T + e)(ΛF + e)∗ and M(0) = 1 ee∗ . T When Λ = 0, Φ(0) reduces to M(0), which is a standard sample covariance matrix and thus its ESD tends to the famous MP law (Marčenko and Pastur, 1967). Suppose ℓ is an eigenvalue of Φ(0), then we have 0 = det |ℓI − Φ(0)| = det ℓI − M(0) − 1 1 1 ΛFe∗ − eF∗ Λ∗ − ΛFF∗ Λ∗ . T T T (4.1) Let B = (B1 : B2 ) be an n × n orthogonal matrix such that B1 = Λ(Λ∗ Λ)−1/2 and thus Λ∗ B2 = 0k(q+1)×(n−k(q+1)) . Then (4.1) is equivalent to det ℓIk(q+1) − T1 B∗1 (ΛF + e)(F∗ Λ∗ + e∗ )B1 − T1 B∗1 (ΛF + e)e∗ B2 − T1 B∗2 e(F∗ Λ∗ + e∗ )B1 ℓIn−k(q+1) − T1 B∗2 ee∗ B2 =0 (4.2) If we further assume that ℓ is not an eigenvalue of T1 B∗2 ee∗ B2 , then we have det |Ik(q+1) − 1 ∗ B (ΛF + e)D−1 (ℓ)(F∗ Λ∗ + e∗ )B1 | = 0, T 1 where D(ℓ) = ℓIT − T1 e∗ B2 B∗2 e. Denote H(ℓ) = ℓIT − T1 e∗ e, then we obtain  −1 1 1 ∗ −1 1 ∗ −1 ∗ ∗ B1 eD (ℓ)e B1 = I + B1 eH (ℓ)e B1 B∗1 eH−1 (ℓ)e∗ B1 . T T T (4.3) (4.4) Next, we have  1 ∗ 1 ∗ −1 B1 eH (ℓ)e∗ B1 = B1 − T I + ℓT (ℓIn − M(0))−1 B1 T T = −Ik(q+1) + ℓB∗1 (ℓIn − M(0))−1 B1 . 7 (4.5) Substitute (4.5) back to (4.4), and we have 1 ∗ −1 B eD (ℓ)e∗ B1 T 1 −1  −1 1 ∗ B1 (M(0) − ℓIn )−1 B1 = Ik(q+1) − ℓB∗1 (ℓIn − M(0))−1 B1 = Ik(q+1) + ℓ Write B1 = (b1 , · · · , bk(q+1) ), then we have kbi k = 1. By Lemma 6 in Bai, Liu and Wong (2011), we have b∗i (M(0) − ℓIn )−1 bi → m, a.s. b∗i (M(0) − ℓIn )−1 bj → 0, a.s., and for i 6= j where m = m(ℓ) = limn→∞ n1 tr(M(0) − ℓIn )−1 is the Stieltjes transform of the sample covariance with ratio index c = limn→∞ Tn . By Lemma 3.11 of Bai and Silverstein (2010), we have m satisfying p 1 − c − ℓ + (1 − ℓ − c)2 − 4ℓc m(ℓ) = . 2cℓ Therefore, we obtain 1  1 ∗ −1 Ik(q+1) . B1 eD (ℓ)e∗ B1 → 1 + T ℓm Next, we want to show, with probability 1 that 1 ∗ B ΛFD−1 (ℓ)e∗ B1 → 0 T 1 and 1 ∗ −1 B eD (ℓ)F∗ Λ∗ B1 → 0. T 1 Note that 1 ∗ B ΛFD−1 (ℓ)e∗ B1 T 1 −1 1 1 I + B∗1 eH−1 (ℓ)e∗ B1 B∗1 ΛFH−1 (ℓ)e∗ B1 = T T −1 1  ∗ B1 (M(0) − ℓIN )−1 B1 B∗1 ΛFH−1 (ℓ)e∗ B1 = ℓT −1 −1 1  ∗ 1 B1 (M(0) − ℓIN )−1 B1 = B∗1 ΛF ℓIT − e∗ e e∗ B1 . ℓT T 8 (4.6) Recall M(0) = 1 ee∗ . T Fix δ > 0 and let event A = {λmax (M(0)) ≤ (1 + √ c)2 + δ} and Ac be the complement. By Theorem 5.9 of Bai and Silverstein (2010), we have P(Ac ) = o(n−t ) for any t > 0. Suppose ℓ is an eigenvalue of Φ(0) larger than (1 + √ c)2 + 2δ. By the fact that M(0) 1 ∗ e e T have the same set of nonzero eigenvalues, we have, under A, that kℓIT − T1 e∗ eko ≥ −1 ℓ − k T1 e∗ eko ≥ δ > 0, and hence k ℓIT − T1 e∗ e ko ≤ 1δ . and Therefore, for any ε > 0, we have −1 1 1 P(k F ℓIT − e∗ e e∗ B1 kK ≥ ε) T T   −1 1 1 = E P(k F ℓIT − e∗ e e∗ B1 kK ≥ ε) e T T   −1 1 1 ≤ E P(k F ℓIT − e∗ e e∗ B1 kK ≥ ε) e, A + P(Ac ). T T Write F = (F̃1 , · · · , F̃k(q+1) )′ . For the first term, by Lemma 2.2, we have   1 1 ∗ −1 ∗ E P(k F ℓIT − e e e B1 kK ≥ ε) e, A T T   1 1 ∗ −1 ∗ 4r ≤ 4r 4r EE kF ℓIT − e e e B1 kK e, A ε T T h i 1 ∗ −1 ∗ 1 ∗ −1 ∗ 2r 1 ∗ e, A ≤ 4r 4r EE trF ℓIT − e e e B1 B1 e ℓIT − e e F ε T T T h k(q+1) i X −1 −1 2r 1 1 1 e, A F̃∗i ℓIT − e∗ e e∗ B1 B∗1 e ℓIT − e∗ e F̃i = 4r 4r EE ε T T T i=1 k(q+1) i [k(q + 1)]2r−1 h X  ∗ 1 ∗ −1 2r 1 ∗ −1 ∗ ∗ ≤ E e e e e F̃ e B B e ℓI − E e, A F̃ ℓI − i 1 T T 1 i ε4r T 4r T T i=1 k(q+1) K2r [k(q + 1)]2r−1 h X  1 ∗ −1 2r 1 ∗ −1 ∗ ∗ E e e e B B e ℓI − ee + tr ℓI − 1 T T 1 ε4r T 4r T T i=1 −1 −1  i 1 1 E|F11 |4r tr[(ℓIT − e∗ e e∗ B1 B∗1 e ℓIT − e∗ e ]2r A T T i 2r h  K2r [k(q + 1)] 2r ∗ ∗ 4r ∗ ∗ 2r ≤ E tre B1 B1 e + E|F11 | tr(e B1 B1 e) A δ 4r ε4r T 4r √  K2r [k(q + 1)]2r [(1 + c)2 + δ]2r  ∗ 2r 4r ∗ 2r E (trB B ) + E|F | tr(B B ) ≤ 11 1 1 1 1 δ 4r ε4r T 2r √ 2r 2 2r  K2r [k(q + 1)] [(1 + c) + δ] 2r 4 4r−4 4 k(q + 1) ≤ [k(q + 1)] + E|F | T 11 δ 4r ε4r T 2r ≤ 9 which is summable for r ≥ 1. Hence, we have shown with probability 1 that 1 ∗ B1 ΛFD−1 (ℓ)e∗ B1 → 0. T Similarly, we have with probability 1 that 1 ∗ −1 B1 eD (ℓ)F∗ Λ∗ B1 → 0. T Therefore, substituting into (4.3), we have 1 1 det | B∗1 ΛFD−1 (ℓ)F∗ Λ∗ B1 + Ik(q+1) | → 0. T ℓm(ℓ) (4.7) Using Bai, Liu and Wong (2011) again, we have the diagonal elements of the matrix T −1 FD−1 (ℓ)F∗ tend to −m(ℓ) and the off diagonal elements tend to 0. Here m(ℓ) is the Stieltjies transform of the LSD of T1 e∗ e and satisfies m(ℓ) = − 1−c + cm(ℓ). ℓ Thus, if Λ∗ Λ → Q, then (4.7) can be further simplified as det | − Qm(ℓ) + 1 Ik(q+1) | = 0. ℓm(ℓ) (4.8) If α is an eigenvalue of Q, and there is an ℓ belonging to the complement of the support of the LSD of M(0) such that α = 1 , ℓm(ℓ)m(ℓ) then ℓ is a solution of (4.8). From (4.6), we have cℓm2 (ℓ) − (1 − c − ℓ)m(ℓ) + 1 = 0, which implies  1−c + cm(ℓ) ℓ = −(1 − c)m(ℓ) + cℓm2 (ℓ) ℓm(ℓ)m(ℓ) = ℓm(ℓ) − = −(1 − c)m(ℓ) + (1 − c − ℓ)m(ℓ) − 1 = −ℓm(ℓ) − 1 p 1 − c − ℓ + (1 − ℓ − c)2 − 4ℓc = − −1 2c =: g(ℓ). 10 It is easy to verify that g ′ (ℓ) < 0, implying that ℓm(ℓ)m(ℓ) is decreasing. Also note that √ √ 1 > c, then we have ℓ > ℓm(ℓ)m(ℓ) = √1c when ℓ = (1 + c)2 . Therefore, if α = ℓm(ℓ)m(ℓ) √ √ √ (1+ c)2 . This recovers the result of Baik and Silverstein (2006). Note that [(1− c)2 , (1+ c)2 ] √ is the support of the MP law. Hence, if all the eigenvalues of Q are greater than c, we have k(q + 1) sample eigenvalues of Φn (0) goes outside the right boundary of the support of the MP law. Note that although the distribution of rest n − k(q + 1) sample eigenvalues follows the MP law with the largest sample eigenvalue converging to the right boundary, there is still a positive probability that the largest sample eigenvalue goes beyond the right boundary. Therefore, to completely separate the k(q + 1) spiked sample eigenvalues from the rest, the threshold is set √ as (1 + c)2 (1 + 2n−2/3 ). In other words, k(q + 1) can be estimated by the number of sample √ eigenvalues of Φn (0) greater than (1 + c)2 (1 + 2n−2/3 ). Remark 4.1 For factor models, the loading matrix is unknown. This, however, is not a concern in our estimation because compared with the noise matrix, the loading matrix is denominating, √ making the condition easily satisfied that all the eigenvalues of Q are greater than c. Remark 4.2 The rationale of choosing (1+2n−2/3 ) as the buffering factor of the criterion is that, √ according to Tracy-Widom law, the quantity of a non-spiked eigenvalue larger than (1 + c)2 has an order of n−2/3 . Therefore, it is good enough for us to choose (1 + 2n−2/3 ) to completely separate the spikes and the bulk eigenvalues. 5 Estimation of q Next, we want to split k and q. Let τ ≥ 1 be given and assume that ℓ is an eigenvalue of Φn (τ ). For simplicity, write Mn (τ ) = M and for t = 1, 2, · · · , T , define Ft = (ft , ft−1 , · · · , ft−q )′ such 11 that Rt = ΛFt + et . Then we have 0 = det |ℓI − Φn (τ )| T 1 X ΛFj F∗j+τ Λ∗ + ΛF∗j+τ F∗j Λ∗ = det ℓI − M − 2T j=1  +ej F∗j+τ Λ∗ + ΛF∗j+τ e∗j + e∗j+τ F∗j Λ∗ + ΛFj e∗j+τ . (5.1) Define B, B1 and B2 the same as in the last section. Multiplying B∗ from left and B from right to the above matrix and by Λ∗ B2 = 0k(q+1)×(n−k(q+1)) , we have (5.1) equivalent to 0 = det ℓIk(q+1) − S11 −S12 −S21 ℓIn−k(q+1) − S22 = det |ℓI − S22 | det |ℓI − Kn (ℓ)|, where S11 T 1 X ∗ B [(ΛFj + ej )(ΛFj+τ + ej+τ )∗ + (ΛFj+τ + ej+τ )(ΛFj + ej )∗ ]B1 = 2T j=1 1 S12 = T 1 X ∗ B1 (ΛFj e∗j+τ + ΛFj+τ e∗j )B2 + B∗1 MB2 2T j=1 S21 = S∗12 S22 = B∗2 MB2 Kn (ℓ) = S11 + S12 (ℓIn−k(q+1) − S22 )−1 S21 . Therefore, if ℓ is not an eigenvalue of S22 , by the factorization above, ℓ must be an eigenvalue of Kn (ℓ), i.e. det |Kn (ℓ) − ℓI| = 0. PT 1 ∗ ∗ Denote W = 2T j=1 (Fj ej+τ + Fj+τ ej ). By the assumptions of et ’s and Ft ’s, the random vector {Fj e∗j+τ + Fj+τ e∗j , j ≥ 1} is (q + 1)-dependent (see Page 224, Chung 2001). It then follows with probability 1 that WB1 = o(1) B∗1 W∗ = o(1) T 1 X (Fj F∗j+τ + Fj+τ F∗j ) = H(τ ) + o(1), 2T j=1 12 where  0 · · · 1 · · · . .  .. . . 0 1   .. H(τ ) =  . 0 1 0 . .. . . . 1 0  0 ··· 1 ···  0 ..  .   1 , ..   .  0 is of dimension k(q + 1) × k(q + 1) with two bands of 1’s of kτ -distance from the main diagonal. Therefore, we have a.s. S11 = B∗1 ΛH(τ )Λ∗ B1 + B∗1 MB1 + o(1) S12 = B∗1 (M + ΛW)B2 S21 = B∗2 (M + W∗ Λ∗ )B1 . Subsequently, we have a.s.  −1 Kn (ℓ) = B∗1 ΛH(τ )Λ∗ B1 + B∗1 MB1 + B∗1 (M + ΛW)B2 ℓI − B∗2 MB2 B∗2 (M + W∗ Λ∗ )B1 + o(1). Note that  −1 B∗1 MB1 + B∗1 MB2 ℓI − B∗2 MB2 B∗2 MB1 1 1 = B∗1 MB1 + B∗1 M B2 B∗2 M(I − B2 B∗2 M)−1 B1 ℓ ℓ 1 = B∗1 M(I − B2 B∗2 M)−1 B1 ℓ ∗ = ℓB1 M(ℓI − M + B1 B∗1 M)−1 B1  −1 −1 = ℓI − ℓ I + B∗1 M ℓI − M B1  −1 −1 = ℓI − B∗1 ℓI − M B1 13 and  −1 WB2 ℓI − B∗2 MB2 B∗2 W∗ = = T  −1 1 X ∗ ∗ ∗ (Fi γi+τ + Fi+τ γi )B2 ℓI − B2 MB2 B∗2 (γj+τ F∗j + γj F∗j+τ ) 2T i,j=1 T  −1  −1 i 1 Xh ∗ Fj γj+τ B2 ℓI − B∗2 MB2 B∗2 γj+τ F∗j + Fj+τ γj∗ B2 ℓI − B∗2 MB2 B∗2 γj F∗j+τ + 2T j=1 T  −1  −1 i 1 Xh ∗ Fj γj+τ B2 ℓI − B∗2 MB2 B∗2 γj F∗j+τ + Fj+τ γj∗ B2 ℓI − B∗2 MB2 B∗2 γj+τ F∗j + 2T j=1 T  −1 1 X ∗ ∗ (Fj+τ γj+2τ + Fj+2τ γj+τ )B2 ℓI − B∗2 MB2 B∗2 (γj+τ F∗j + γj F∗j+τ ) + 2T j=1 T  −1 1 X ∗ (Fj−τ γj∗ + Fj γj−τ )B2 ℓI − B∗2 MB2 B∗2 (γj+τ F∗j + γj F∗j+τ ) + 2T j=1 1 2T T X i,j=1 i6=j,i6=j±τ  −1 ∗ (Fi γi+τ + Fi+τ γi∗ )B2 ℓI − B∗2 MB2 B∗2 (γj+τ F∗j + γj F∗j+τ ) =: P1 + P2 + P3 + P4 + P5 . Next, we give a lemma on the quadratic form of γj . Lemma 5.1 Let i, j ∈ N be given, we have almost surely and uniformly in i and j that   cm p cm   −c22m2 −c22m2  −1 ≡ Cp , i = j ± pτ 1− 2x 1− 4x 1 1 γi∗ B2 ℓI − B∗2 MB2 B∗2 γj →   0, otherwise. The proof of the lemma is postponed in the Appendix. 14 First, we have E(P1 ) = E[E(P1 |γ1 , · · · , γT +τ )] T  −1 1 X nh ∗ E Fj γj+τ B2 ℓI − B∗2 MB2 = B∗2 γj+τ F∗j + 2T j=1  −1 i o Fj+τ γj∗ B2 ℓI − B∗2 MB2 B∗2 γj F∗j+τ γ1 , · · · , γT +τ T h −1 X i 1 ∗ ∗ ∗ ∗ Etr ℓI − B2 MB2 B2 (γj+τ γj+τ + γj γj )B2 Ik(q+1) = 2T j=1 T −1 1X ∗  Eγj B2 ℓI − B∗2 MB2 B∗2 γj Ik(q+1) = T j=1 = C0 Ik(q+1) + o(1). Similarly, we have 1 C1 H(τ ) + o(1), 2 1 E(P3 ) = C1 HL (τ ) + (C0 HL (2τ ) + C2 Ik(q+1) ) + o(1), 2 1 E(P4 ) = C1 HU (τ ) + (C0 HU (2τ ) + C2 Ik(q+1) ) + o(1). 2 E(P2 ) = Here HL (τ ) and HU (τ ) denote the lower and upper part of H(τ ) with the rest entries being 0. Furthermore, denote HL (0) ≡ HU (0) ≡ Ik(q+1) and hence H(0) = HL (0) + HU (0) = 2Ik(q+1) .   Consider i = j ± pτ for p = 0, 1, · · · , τq . When p = 0, we have E(P1) + E(P2) = 21 C0 H(0) + 12 C1 H(τ ) + o(1). When p = 1, we have E(P3) + E(P4) = 21 C2 H(0) + C1 H(τ ) + 12 C0 H(2τ ) + o(1). When p = 2, we have part of E(P5) is 21 C3 H(τ ) + C2 H(2τ ) + 12 C1 H(3τ ) + o(1). .. . 15 When p = q τ , we have part of E(P5) is q  q  q  1   1 H( τ − τ ) + C q  H( τ ) + C q  H( τ + τ ) + o(1) C q 2 τ +1 τ τ 2 τ −1 τ τ q  q  1   H( = τ − τ ) + C q  H( τ ) + o(1). C q +1 2 τ τ τ τ   When p = τq + 1, we have part of E(P5) is q  q 1   q  1 τ + 2τ ) + C q  H( τ + τ ) + C q  H( τ ) + o(1) C q H( +1 2 τ τ τ 2 τ +2 τ τ q  1   H( = τ ) + o(1). C q 2 τ +2 τ Next, we want to show that Pi → E(Pi ) a.s. Since all the Pi ’s are of finite dimension, it suffices to show the a.s convergence entry-wise. Denote the (u, v)-entry of a matrix A by A(u,v) . For  −1 i = 1, define αj = γj∗ B2 ℓI − B∗2 MB2 B∗2 γj . Then for any positive integer s, applying Lemma 2.1, we have E(|P1(i1,i2) − = E ≤ 2 αj+τ αj δ(i1 ,i2 ) − δ(i1 ,i2 ) |2s ) 2 2 T h n 1 X i α o2s αj+τ j αj+τ (Fj F∗j )(i1 ,i2 ) + αj (Fj+τ F∗j+τ )(i1 ,i2 ) − δ(i1 ,i2 ) − δ(i1 ,i2 ) 2T j=1 2 2 2s−1 T h 1 X i2s αj+τ E αj+τ (Fj F∗j )(i1 ,i2 ) − δ(i1 ,i2 ) + 2T j=1 2 22s−1 E T h 1 X i2s αj αj (Fj+τ F∗j+τ )(i1 ,i2 ) − δ(i1 ,i2 ) 2T j=1 2 T i2s 1 h1 X αj+τ (Fj F∗j )(i1 ,i2 ) − αj+τ δ(i1 ,i2 ) + E = 2 T j=1 T i2s 1 h1 X αj (Fj+τ F∗j+τ )(i1 ,i2 ) − αj δ(i1 ,i2 ) E 2 T j=1 T h io2s 1 n 1 X ∗ h (i1 ,i2 ) i (i1 ,i2 ) = Fj αj+τ Fj − tr αj+τ + E 2 T j=1 T h io2s 1 n 1 X ∗ h (i1 ,i2 ) i (i1 ,i2 ) F α Fj+τ − tr αj E . 2 T j=1 j+τ j 16 (5.2)   Here a(u,v) denotes the matrix with the (u, v)-entry being a and 0 elsewhere. By the truncation of εij and the fact that k(ℓI − B∗2 MB2 )−1 ko ≤ η −1 with η = ℓ − dc > 0, both |αj | and |αj+τ | are bounded from above, say, by C. Also notice that |Fτij | < T 1/4 and E|Fτij |4 < M. Similar to the proof of Lemma 9.1 in Bai and Silverstein (2010), we have T s h i h io2s C 2s X n1 X  (i1 ,i2 ) (i1 ,i2 ) F∗j αj+τ Fj − tr αj+τ M l l2s + l4s E ≤ s T j=1 T l=1 n1 E T T X j=1 F∗j+τ s h i h io2s C 2s X  (i1 ,i2 ) (i1 ,i2 ) M l l2s + l4s . αj Fj+τ − tr αj ≤ s T l=1 Substituting the above back to (5.2) and choosing s ≥ 2, we have P1(i1 ,i2 ) − αj αj+τ δ(i1 ,i2 ) − δ(i1 ,i2 ) = oa.s (1). 2 2 Again, by the almost sure and uniform convergence of αj and αj+τ to C0 , we have αj+τ αj δ(i1 ,i2 ) + δ(i1 ,i2 ) − C0 δ(i1 ,i2 ) = oa.s (1). 2 2 Therefore, we have shown that P1 − E(P1 ) = oa.s. (1). Results for i = 2, 3, 4, 5 can be shown in a similar way. Denote α = − cm 2 2 2 1− c2xm 1 and β = − cm 2 2 2 1− c4xm , then we have Cp = αβ p . Note that H(pτ ) = 0 for 1 17 p > [q/τ ], and we have, with probability 1 that  −1 WB2 ℓI − B∗2 MB2 B∗2 W∗ ∞ X 1 1 3 1 1 1 ( Cp−2 + Cp + Cp+2)H(pτ ) → ( C0 + C2 )H(0) + ( C1 + C3 )H(τ ) + 2 2 2 2 2 2 p=2 = = = ∞ i X αh β p−2 H(pτ ) (1 + β 2 )H(0) + (3β + β 3 )H(τ ) + (1 + β 2 )2 2 p=2 ∞ X i αh (1 + β 2 )H(0) + (3β + β 3 )H(τ ) + (1 + β 2 )2 β p−2 HL (pτ ) + HU (pτ ) 2 p=2 ∞ i X  αh (1 + β 2 )H(0) + (3β + β 3 )H(τ ) + (1 + β 2 )2 β p−2 JL (pτ ) + JU (pτ ) ⊗ Ik 2 p=2 ∞ i X  αh (1 + β 2 )H(0) + (3β + β 3 )H(τ ) + (1 + β 2 )2 β p−2 JpL (τ ) + JpU (τ ) ⊗ Ik 2 p=2  αh (1 + β 2 )H(0) + (3β + β 3 )H(τ ) + (1 + β 2 )2 J2L (τ )(I − βJL (τ ))−1 = 2  i +J2U (τ )(I − βJU (τ ))−1 ⊗ Ik . = Note that 1 [I − (I − βJL (τ ))](I − βJL (τ ))−1 β 1 = [(I − βJL (τ ))−1 − I] β 1 JL (τ )[(I − βJL (τ ))−1 − I] = β 1 1 = [(I − βJL (τ ))−1 − I] − JL (τ ). 2 β β JL (τ )(I − βJL (τ ))−1 = J2L (τ )(I − βJL (τ ))−1 Similarly, 1 JU (τ )[(I − βJU (τ ))−1 − I] β 1 1 [(I − βJU (τ ))−1 − I] − JU (τ ). = 2 β β J2U (τ )(I − βJU (τ ))−1 = 18 Therefore, we have   (1 + β 2 )2 J2L (τ )(I − βJL (τ ))−1 + J2U (τ )(I − βJU (τ ))−1 ⊗ Ik 1 1 = (1 + β 2 )2 2 (I − βJL (τ ))−1 + 2 (I − βJU (τ ))−1 β β   1 2 − 2 I − JL (τ ) + JU (τ ) ⊗ Ik β β   i 2 2h (1 + β ) −1 −1 = (I − βJ (τ )) 2I − βJ (τ ) − βJ (τ ) (I − βJ (τ )) ⊗ Ik L L U U β2 (1 + β 2 )2 (1 + β 2 )2 H(0) − H(τ ) − β2 β (1 + β 2 )2 (1 + β 2 )2 (1 + β 2 )2 =: G(τ ) − H(0) − H(τ ). β2 β2 β Hence, we have a.s.  −1 ∗ ℓI − B2 MB2 B∗2 W∗ Λ∗ B1  (1 + β 2 )2  (1 + β 2 )2  α 1/2 h 3 H(τ ) 1 + β2 − H(0) + 3β + β − Q → 2 β2 β i (1 + β 2 )2 + G(τ ) Q1/2 . β2 B∗1 ΛWB2 Last, we want to show that with probability 1,  −1 B∗1 ΛWB2 ℓI − B∗2 MB2 B∗2 MB1 → 0 and  −1 B∗1 MB2 ℓI − B∗2 MB2 B∗2 W∗Λ∗ B1 → 0. Note that −1  −1  1 B∗1 ΛWB2 ℓI − B∗2 MB2 B∗2 MB1 = B∗1 ΛW I − B2 B∗2 M B1 − B∗1 ΛWB1 ℓ and that −1  −1  1 W∗ Λ∗ B1 − B∗1 W∗Λ∗ B1 . B∗1 MB2 ℓI − B∗2 MB2 B∗2 Λ∗ WB1 = B∗1 I − MB2 B∗2 ℓ 19 Hence, by WB1 = oa.s. (1) and B∗1 W∗ = oa.s. (1), it suffices to show with probability 1 that,  −1 1 B∗1 ΛW I − B2 B∗2 M B1 → 0 ℓ and −1  1 W∗ Λ∗ B1 → 0. B∗1 I − MB2 B∗2 ℓ By B1 = Λ(Λ∗ Λ)−1/2 , we have −1  1 ∗ I − B2 B2 M B1 ℓ −1  1 ∗ ∗ 1/2 Λ(Λ∗ Λ)−1/2 = (Λ Λ) W I − B2 B2 M ℓ  −1 1 1/2 ∗ = Q W I − B2 B2 M ΛQ−1/2 . ℓ B∗1 ΛW By law of large numbers, we have with probability 1 that, = → = = −1  1 Λ W I − B2 B∗2 M ℓ T  −1 1 1 X (Fj ε∗j+τ + Fj+τ ε∗j ) I − B2 B∗2 M Λ 2T j=1 ℓ  −1 1 ∗ ∗ ∗ E(F1 ε1+τ + F1+τ ε1 ) I − B2 B2 M Λ ℓ     −1 1 ∗ ∗ ∗ Λ ε1 , · · · , εT+τ EE (F1 ε1+τ + F1+τ ε1 ) I − B2 B2 M ℓ o(1). Hence, we have with probability 1 B∗1 ΛW  −1 −1  1 1 ∗ ∗ 1/2 I − B2 B2 M B1 = Q W I − B2 B2 M ΛQ−1/2 = o(1). ℓ ℓ Similarly, −1  1 W∗ Λ∗ B1 = oa.s. (1). B∗1 I − MB2 B∗2 ℓ 20 Therefore, ℓ should satisfy  −1 −1 det Q1/2 H(τ )Q1/2 + B∗1 M − ℓI B1 +  (1 + β 2 )2  (1 + β 2 )2  α 1/2 h 2 3 H(τ ) 1+β − H(0) + 3β + β − Q 2 β2 β i (1 + β 2 )2 + G(τ ) Q1/2 → 0. 2 β Recall B1 = Λ(Λ∗ Λ)−1/2 . Our next goal is to find the limit of B∗1 M − ℓI −1 B1 . Define A = M − ℓI and Ak = A − (γk+τ + γk−τ )γk∗ − γk (γk+τ + γk−τ )∗ , then we have the following lemmas, with proofs given in the Appendix. Lemma 5.2 Let x ∈ Cn1 := {x ∈ Cn : kxk = 1} be given. For r ≥ 1, we have 2r E|γk∗ A−1 ≤ KT −r k x| for some K > 0. Lemma 5.3 For any x, y ∈ Cn1 , we have x∗ A−1 y → − x∗ y cm √ +ℓ 1−c2 m2 + 1−c2 m2 a.s. Finally, we have  cm(ℓ) p + ℓ Ik(q+1) 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) h  (1 + β 2 )2  (1 + β 2 )2  α 3 H(τ ) H(0) + 3β + β − + Q1/2 1 + β 2 − 2 β2 β i (1 + β 2 )2 G(τ ) Q1/2 = 0, + β2 det Q1/2 H(τ )Q1/2 −  or equivalently  (1 + β 2 )2  (1 + β 2 )2 α h 2 3 1 + β2 − H(τ ) H(0) + 3β + β − + 2 β2 β α  i  (1 + β 2 )2 cm(ℓ) p + + ℓ Q−1 = 0. G(τ ) − 2 2 2 2 2 β 1 − c m (ℓ) + 1 − c m (ℓ) det 21 (5.3) When τ > q, one has H(τ ) = 0, G(τ ) = 2I and (5.3) reduces to det α(1 + β 2 )I − or det   cm(ℓ) p + ℓ Q−1 = 0, 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) cm(ℓ) p (Q + I) + ℓI = 0. 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) Let λ be an eigenvalue of Q, then we have 1 ℓ cm(ℓ) p 1+ + = 0. λ λ 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) (5.4) When τ = q, (5.3) reduces to     α cm(ℓ) p det α(1 + β 2 )I + 1 + (3β + β 3 ) H(q) − + ℓ Q−1 = 0. 2 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) Writing  0 .  ..  . . H(q) =  .   0  1 ··· .. . .. . .. . 0  · · · 0 1  .. .. . . 0  . . . . ..  . . .  ⊗ Ik ,  . . . . ..  . . .  ··· ··· 0 one can easily verify that the eigenvalues of H(q) are 1, −1 and 0, with multiplicity k, k and k(q − 1), respectively. Suppose that H(q) and Q are commutative, that is, there is a common orthogonal matrix O simultaneously diagnalizing the two matrices, i.e., we have H(q) = ODH O′ and Q = ODQ O′ , where DH = diag[a1 , · · · , ak(q+1) ] and DQ = diag[λ1 , · · · , λk(q+1) ]. Then, (5.3) further reduces to  α (3β + β 3 ) aj 2 1 ℓ cm(ℓ) p 1+ + , = 2 2 2 2 λj λj 1 − c m (ℓ) + 1 − c m (ℓ)  1+ 22 j = 1, · · · , k(q + 1). Substituting α = − cm 2 2 2 1− c2xm 1 aj and β = − cm 2 2 2 1− c4xm 1 1 , for j = 1, · · · , k(q + 1), we have −1 1 p × 2 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) h 1 ℓi cm(ℓ) p 1+ + λj λj 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) =: gj (ℓ). = + (5.5) Notice that (5.4) is a special case of (5.5) for aj = 0. Note that when x is outside the support [−d(c), d(c)] of the LSD of Mn (τ ), m2 (x) 6= 0. Hence, we have cm1 (x)((1 − c − cxm1 (x))2 − c2 x2 m22 (x)) +x(1 − c2 m21 (x) + c2 m22 (x))(1 − c − cxm1 (x)) = 0. Let x ↓ d(c) := d and we have m2 (x) → 0 and m1 (x) → m1 (d) satisfying cm1 (d)(1 − c − cdm1 (d))2 + d(1 − c2 m21 (d))(1 − c − cdm1 (d)) = [1 − c − cdm1 (d)][cm1 (d)(1 − c − cdm1 (d)) + d(1 − c2 m21 (d))] = 0, from which we have m1 (d) = 1−c− √ (1−c)2 +8d2 . 4cd Rewrite cm(ℓ) 1 p 1+ 1 λj − + 2 1 − c2 m2 (ℓ) 1  −1 ℓ 1 p + + 2 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) λj := gj1(ℓ) + gj2 (ℓ). gj (ℓ) = 3 2 1 2 2 c m (ℓ) 2 We will show that gj (ℓ) is increasing over (d(c), ∞) by showing so are gj1 and gj2. By definition, over (d(c), ∞), m is an increasing function taking negative values and m2 is a decreasing function taking positive values. Hence, it is easy to see that gj1(ℓ) is increasing over (d(c), ∞). p For gj2(ℓ), define h(ℓ) = 1 − c2 m2 (ℓ) + 1 − c2 m2 (ℓ) and rewrite gj2 (ℓ) = ℓh(ℓ) h(ℓ) . It is easy λj (1+ 23 2 ) to see that h(ℓ) > 0 and h′ (ℓ) > 0 over (d(c), ∞). Hence we have ′ gj2 (ℓ) = [h(ℓ) + ℓh′ (ℓ)](1 + λj (1 + h(ℓ) )− 2 h(ℓ) 2 ) 2 ′ ℓh(ℓ) h 2(ℓ) = h2 (ℓ) 2 h(ℓ) 2 ) 2 h(ℓ) + ℓh′ (ℓ) + λj (1 + > 0. By symmetry, gj (ℓ) is increasing over (−∞, −d(c)) as well. Therefore, based on the sign of gj (d(c)), we have the following cases to consider. Case I. gj (d(c)) ≥ 0: i. If aj > gj (d(c)), then (5.5) has one solution in (d(c), ∞) and no solution in (−∞, −d(c)). ii. If g(d(c)) ≥ aj ≥ −gj (d(c)) = gj (−d(c)), then (5.5) has no solution in (d(c), ∞) and (−∞, −d(c)). iii. If aj < −gj (d(c)), then (5.5) has one solution in (−∞, −d(c)) and no solution in (d(c), ∞). Case II. gj (d(c)) < 0: i. If aj ≥ −gj (d(c)), then (5.5) has one solution in (d(c), ∞) and no solution in (−∞, −d(c)). ii. If g(d(c)) < aj < −gj (d(c)) = gj (−d(c)), then (5.5) has one solution in (d(c), ∞) and one solution in (−∞, −d(c)). iii. If aj ≤ gj (d(c)), then (5.5) has one solution in (−∞, −d(c)) and no solution in (d(c), ∞). Remark 5.1 In real application, compared with the noise component, the loading matrix Λ dominates. As a result, all the eigenvalues of Q = Λ∗ Λ are large (more precisely, they are of the same order as n). Hence, we can assume that Q−1 = 0. Thus the commutative assumption of H(q) and Q can be relaxed. Moreover, under this case, we always have gj (d(c)) < 0. Remark 5.2 For the same reason as stated before Remark 4.1, dc is replaced by (1 + anb )dc in practice. Simulation indicates a fit of a = 0.1, b = −1/3. Notice that all the eigenvalues of H(q + 1) are 0, while for H(q), k eigenvalues are 1 and k eigenvalues are −1, with the rest being 0. Making use of such difference and applying the above analysis to the cases that τ = q and τ = q + 1 gives an estimate of q. Together with the estimation of k(q + 1), we easily obtain the estimate of k. A numerical demonstration is given in the simulation. 24 6 Estimate of σ 2 The above estimation is based on the assumption that σ 2 , the variance of the noise part is given. In practice, it is often the case that σ 2 is unknown. To this end, we can estimate σ 2 by employing the properties of the MP law. More precisely, we first estimate the left boundary of the support of the MP law by the smallest sample eigenvalue of Φn (0), say λ̂1 (the eigenvalues are arranged in ascending order), and estimate the right boundary by √ (1+ c)2 √ λ̂ . (1− c)2 1 An iteration is then applied. 2 The initial estimator of σ 2 , say σ̂(0) , is obtained as the sample mean of the sample eigenvalues of Φn (0) that lie within the interval [λ̂m+1 , λ̂n−m ], where m ≥ 0 is such that λ̂n−m is the largest eigenvalue of Φn (0) less than √ (1+ c)2 (1+2n−2/3 ) √ λ̂1 . (1− c)2 For i ≥ 1, we obtain the updated estimator 2 σ̂(i) by taking the sample mean of the sample eigenvalues of Φn (0) that lie within the interval √ √ 2 2 2 2 , (1 + c)2 (1 + 2n−2/3 )σ̂(i−1) ]. The iteration stops once we have σ̂(ℓ−1) = σ̂(ℓ) [(1 − c)2 σ̂(i−1) 2 for some ℓ and our estimator σ̂ 2 := σ̂(ℓ) . As shown in the simulation, our estimation of k and q still works well with such estimator. 7 Simulation Table 1 presents a simulation about the result discussed above, displaying the largest 13 absolute values of the eigenvalues for lags τ from 0 to 5. Here Rt = q X Λi ft−i + et , t = 1, ..., T (7.1) i=0 where ft ’s are factors of length k; Λi , i = 0, ..., q is a constant time-invariant matrix of size n × k, et is the error term and q is the lag of the model. In addition, assume that: et are i.i.d.  random variables with et ∼ N (0, σ 2 In ) and ft are i.i.d. random variables with ft ∼ N 0, σf2 Ik , h i independent of et . Λi = Λi1 Λi2 . . . Λik where Λij i = 0, ..., q; j = 1, ..., k is a vector of length n and is given by Λij = β1n + εij where 1n is a vector of 1’s and εij are i.i.d. random variables with εij ∼ N (0, σε2 In ). For n = 450, T = 500, k = 2, q = 2, β = 1.0, 25 σf2 = 4, σ 2 = 1 and σε2 = 0.25, we have c = 0.9, bc = (1 + √ c)2 = 3.7974 and dc = 1.8573. Eigenvalues of Q are from 95 to 285, making Q−1 ∼ 0. When τ = 0, and σ 2 = 1 is known, using the phase transition point bc = (1 + √ c)2 σ 2 = 3.7974, we see that the number of spotted spikes is 6, which estimates k(q + 1). When for τ = q + 1, we have H(τ ) = 0. Moreover, as Q−1 ∼ 0, we have gj (d(c)) ∼ −0.4284 < 0. That is, our Case II (ii) applies for all the k(q + 1) 0 eigenvalues of H(q + 1), making the number of spikes 2k(q + 1) as verified by applying the phase transition point dc = 1.8573. For τ = q, H(τ ) has k eigenvalues of 1, k eigenvalues of −1 and k(q − 1) eigenvalues of 0 with Case II (i),(iii) and (ii) applicable, respectively. Thus, we have k + k + 2k(q − 1) = 2kq < 2k(q + 1) eigenvalues in this case. Again, this agrees with the use of the phase transition point dc = 1.8573. In other words, the number of spikes first jumps to 2k(q + 1) at τ = 3 which estimates q + 1. The estimation of k is obvious. When σ 2 = 1 is unknown, using technique as in Section 6, one has σ̂ 2 = 0.9894. It then √ follows that b̂c = (1 + c)2 (1 + 2n−2/3 )σ̂ 2 = 3.8851, dˆc = 1.8616 (with rescale factor 1 + 0.1n−1/3 ), which gives the same estimates as above. A Some proofs A.1 Proof of Lemma 5.1 Define Mk = M − γk (γk+τ + γk−τ )∗ − (γk+τ + γk−τ )γk∗ , and ∗ ∗ Mk,k+τ,··· ,k+lτ = Mk,k+τ,··· ,k+(l−1)τ − γk+(l+1)τ γk+lτ − γk+lτ γk+(l+1)τ , l ≥ 1. 26 τ =0 τ =1 τ =2 τ =3 τ =4 τ =5 10031.2366 6227.5906 2865.1554 640.5761 155.9377 128.6870 534.5839 363.7782 258.4859 48.9667 46.5224 92.3756 473.1639 325.8391 224.9343 22.7478 46.0225 53.7072 458.2226 305.6334 214.9755 21.6373 45.6650 26.3564 435.2661 13.1683 45.7319 21.3150 25.4884 25.6006 392.6272 11.1482 17.8374 19.2596 18.0820 19.3930 3.6928 9.0674 11.7423 10.3580 15.5876 14.6107 3.5809 7.9537 8.0837 9.9668 12.9088 12.0980 3.5449 1.7375 1.7988 9.5028 10.5568 8.5791 3.4579 1.7326 1.7895 8.5483 4.7840 7.0596 3.4312 1.7015 1.7388 5.5931 4.3896 4.5411 3.3829 1.6957 1.7242 3.5968 4.3843 3.6744 3.3701 1.6751 1.6724 1.8215 1.7944 1.7468 Table 1: Absolute values of the largest eigenvalues of the empirical covariance matrix at various lags with parameters: n = 450, T = 500, k = 2, q = 2, β = 1.0, σf2 = 4, σ 2 = 1 and σε2 = 0.25. √ Note that c = 0.9, bc = (1 + c)2 = 3.7974 and dc = 1.8573. When σ 2 = 1 is unknown, one has σ̂ 2 = 0.9894, b̂c = 3.8851 and dˆc = 1.8616. 27 Suppose that i ≥ j, then we have γi∗ B2  B∗2 MB2 ℓI − −1 B∗2 γj −1  ∗ )B2 B∗2 γj = γi∗ B2 ℓI − B∗2 Mj B2 − B∗2 (γj+τ + γj−τ )γj∗ B2 − B∗2 γj (γj+τ + γj−τ  −1 γi∗ B2 ℓI − B∗2 Mj B2 − B∗2 (γj+τ + γj−τ )γj∗ B2 B∗2 γj =  −1 ∗ 1 − (γj+τ + γj−τ )B2 ℓI − B∗2 Mj B2 − B∗2 (γj+τ + γj−τ )γj∗ B2 B∗2 γj   (ℓI−B∗2 Mj B2 )−1 B∗2 (γj+τ +γj−τ )γj∗ B2 (ℓI−B∗2 Mj B2 )−1 B∗2 γj γi∗ B2 (ℓI − B∗2 Mj B2 )−1 + 1−γj∗ B2 (ℓI−B∗2 Mj B2 )−1 B∗2 (γj+τ +γj−τ )   = (ℓI−B∗2 Mj B2 )−1 B∗2 (γj+τ +γj−τ )γj∗ B2 (ℓI−B∗2 Mj B2 )−1 ∗ ∗ −1 B∗2 γj 1 − (γj+τ + γj−τ )B2 (ℓI − B2 Mj B2 ) + 1−γ ∗ B2 (ℓI−B∗ Mj B2 )−1 B∗ (γj+τ +γj−τ ) j γi∗ B2 =  2 2 (ℓI−B∗2 Mj B2 )−1 +(ℓI−B∗2 Mj B2 )−1 B∗2 (γj+τ +γj−τ )γj∗ B2 (ℓI−B∗2 Mj B2 )−1   B∗2 γj  + oa.s. (1) ∗ 1−(γj+τ +γj−τ )B2 (ℓI−B∗2 Mj B2 )−1 +(ℓI−B∗2 Mj B2 )−1 B∗2 (γj+τ +γj−τ )γj∗ B2 (ℓI−B∗2 Mj B2 )−1 B∗2 γj =        − cm 2 2 2 1− c2xm 1 − cm 2 2 2 1− c2xm 1 + oa.s. (1), i=j γi∗ B2 (ℓI − B∗2 Mj B2 )−1 B∗2 (γj+τ + γj−τ ) + oa.s. (1), otherwise. Next, we have γi∗ B2 (ℓI − B∗2 Mj B2 )−1 B∗2 γj+τ ∗ ∗ = γi∗ B2 (ℓI − B∗2 Mj,j+τ B2 − B∗2 γj+2τ γj+τ B2 − B∗2 γj+τ γj+2τ B2 )−1 B∗2 γj+τ ∗ γi∗ B2 (ℓI − B∗2 Mj,j+τ B2 − B∗2 γj+2τ γj+τ B2 )−1 B∗2 γj+τ = ∗ ∗ 1 − γj+2τ B2 (ℓI − B∗2 Mj,j+τ B2 − B∗2 γj+2τ γj+τ B2 )−1 B∗2 γj+τ   ∗ (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ γj+τ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+τ γi∗ B2 (ℓI − B∗2 Mj,j+τ B2 )−1 + ∗ 1−γj+τ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ   = ∗ (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ γj+τ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 ∗ ∗ −1 B∗2 γj+τ 1 − γj+2τ B2 (ℓI − B2 Mj,j+τ B2 ) + 1−γ ∗ B2 (ℓI−B∗ Mj,j+τ B2 )−1 B∗ γj+2τ j+τ =  2 2  ∗ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+τ γi∗ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 +(ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ γj+τ   ∗ ∗ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+τ 1−γj+2τ B2 (ℓI−B∗2 Mj,j+τ B2 )−1 +(ℓI−B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ γj+τ =        − cm 2 2 2 1− c4xm 1 − cm 2 2 2 1− c4xm 1 + oa.s. (1), i=j+τ γi∗ B2 (ℓI − B∗2 Mj,j+τ B2 )−1 B∗2 γj+2τ + oa.s. (1), 28 otherwise. + oa.s. (1) γi∗ B2 (ℓI − B∗2 Mj B2 )−1 B∗2 γj−τ ∗ ∗ = γi∗ B2 (ℓI − B∗2 Mj,j−τ B2 − B∗2 γj−2τ γj−τ B2 − B∗2 γj−τ γj−2τ B2 )−1 B∗2 γj−τ ∗ γi∗ B2 (ℓI − B∗2 Mj,j−τ B2 − B∗2 γj−2τ γj−τ B2 )−1 B∗2 γj−τ ∗ ∗ 1 − γj−2τ B2 (ℓI − B∗2 Mj,j−τ B2 − B∗2 γj−2τ γj−τ B2 )−1 B∗2 γj−τ   ∗ (ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ γj−τ B2 (ℓI−B∗2 Mj,j−τ B2 )−1 ∗ ∗ −1 γi B2 (ℓI − B2 Mj,j−τ B2 ) + B∗2 γj−τ ∗ 1−γj−τ B2 (ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ   = ∗ (ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ γj−τ B2 (ℓI−B∗2 Mj,j−τ B2 )−1 ∗ B∗2 γj−τ 1 − γj−2τ B2 (ℓI − B∗2 Mj,j−τ B2 )−1 + ∗ ∗ ∗ −1 1−γ B2 (ℓI−B Mj,j−τ B2 ) B γj−2τ = j−τ = γi∗ B2  2 ∗ (ℓI−B∗2 Mj,j−τ B2 )−1 +(ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ γj−τ B2 (ℓI−B∗2 Mj,j−τ B2 )−1  2  B∗2 γj−τ  + oa.s. (1) ∗ ∗ B2 (ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−τ 1−γj−2τ B2 (ℓI−B∗2 Mj,j−τ B2 )−1 +(ℓI−B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ γj−τ = Note that − cm 2 2 2 1− c4xm − cm 2 1− = c2 m2 4x1 a x1 γi∗ B2 (ℓI − B∗2 Mj,j−τ B2 )−1 B∗2 γj−2τ + oa.s. (1). < 1, by induction, we have 1 γi∗ B2 (ℓI − B∗2 Mj B2 )−1 B∗2 γj−τ = oa.s. (1). Then result then follows by induction. By symmetry, it holds when i < j. The proof of the lemma is complete. A.2 Proof of Lemma 5.2 ′ 2 Let A−1 k x = b = (b1 , · · · , bn ) . Noting |εij | < C and E|εij | = 1, we have 2r E(γk∗ A−1 k x) n X 1 εki bi )2r = r r E( 2T i=1 r X X 1 ≤ r rE 2T l=1 1≤j <···<j ≤n i 1 = ≤ 1 2r T r K 2r T r E E r X l X 1 (2r)! i1 i1 εkj1 bj1 · · · εikjl l bijl1 i ! · · · il ! +···+i =2r 1 X l (2r)! i1 i1 εkj1 bj1 · · · εikjl l bijl1 i ! · · · il ! +···+i =2r, 1 X l=1 1≤j1 <···<jl ≤n i1 l i1 ≥2,··· ,il ≥2 r X X X (2r)! |bj1 |i1 · · · |bjl |il . i ! · · · i ! 1 l +···+i =2r, l=1 1≤j1 <···<jl ≤n i1 l i1 ≥2,··· ,il ≥2 29 By Pn j=1 2 |bj |2 = kA−1 k xk and Cauchy-Schwartz inequality, we have X ≤ ≤ (2r)! |bj1 |i1 · · · |bjl |il i ! · · · il ! +···+i =2r, 1 X 1≤j1 <···<jl ≤n i1 l i1 ≥2,··· ,il ≥2 n X X (2r)! ( |bj |2 )r i ! · · · il ! j=1 +···+i =2r, 1 i1 l i1 ≥2,··· ,il ≥2 2r 2r l2r ||A−1 k ||o ||x|| 2r ≤ l . η 2r Here η := ℓ − dc > 0. Therefore, we have 2r E|γk∗ A−1 ≤ KT −r k x| for some K > 0. The proof of the lemma is complete. A.3 Proof of Lemma 5.3 ∗ ∗ P ROOF. Let x, y ∈ Cn1 be given. Define Ak,k+τ = Ak − γk+τ γk+2τ − γk+2τ γk+τ , ∗ Ãk = Ak + γk (γk+τ + γk−τ )∗ and Ãk,k+τ = Ak − γk+2τ γk+τ . First we have x∗ A−1y − Ex∗ A−1 y T X  ∗ (Ek − Ek−1 ) A−1 − A−1 (ℓ) y = x k = k=1 T X k=1 ≡ T X k=1 (Ek − Ek−1 ) − ∗ −1  ∗ −1 x∗ A−1 x∗ Ã−1 k γk (γk+τ + γk−τ ) Ak y k (γk+τ + γk−τ )γk Ãk y − 1 + (γk+τ + γk−τ )∗ A−1 1 + γk∗ Ã−1 k γk k (γk+τ + γk−τ ) (Ek − Ek−1 ) − αk1 − αk2 ). 30 Using Lemma 2.1, we have, for i = 1, 2 E| T X k=1 (Ek − Ek−1 )αki |2l  T X ≤ Kl  E k=1  T X ≤ Kl′ E ≤ 2 Note that l Kl′ k=1  E Ak−1 Ek−1|(Ek − Ek−1 )αki |2 Ek−1 |Ek αki |2 + T X k=1 Ek−1 |αki | = (Ãk,k+τ + 2 !l T X k=1 + !l + T X k=1 Ek−1 |αki |2 T X k=1 ∗ γk+2τ γk+τ )−1  E|(Ek − Ek−1 )αki |2l  !l + T X k=1  E|Ek αki |2l + T X k=1  E|Ek−1 αki |2l  E|αki |2l  . = Ã−1 k,k+τ − (A.1) −1 ∗ Ã−1 k,k+τ γk+2τ γk+τ Ãk,k+τ ∗ Ã−1 1 + γk+τ k,k+τ γk+2τ . Hence, we have ∗ ∗ −1 γk+τ A−1 k = γk+τ Ãk,k+τ − −1 ∗ ∗ γk+τ Ã−1 k,k+τ γk+2τ γk+τ Ãk,k+τ ∗ Ã−1 1 + γk+τ k,k+τ γk+2τ = ∗ γk+τ Ã−1 k,k+τ ∗ Ã−1 1 + γk+τ k,k+τ γk+2τ . Next, we have ∗ ∗ −1 γk+τ Ã−1 k,k+τ = γk+τ Ak,k+τ − ∗ = γk+τ A−1 k,k+τ − −1 ∗ ∗ γk+τ A−1 k,k+τ γk+τ γk+2τ Ak,k+τ ∗ 1 + γk+2τ A−1 k,k+τ γk+τ cm ∗ γ A−1 + Rk1 , 2 k+2τ k,k+τ where Rk1 −1 ∗ ∗ γk+τ A−1 cm ∗ k,k+τ γk+τ γk+2τ Ak,k+τ −1 = γ A − ∗ 2 k+2τ k,k+τ 1 + γk+2τ A−1 k,k+τ γk+τ ! −1 −1 cm ∗ cm ∗ − γ A γ + γ A γ k+τ k,k+τ k+τ 2 2 k+2τ k,k+τ k+τ ∗ γk+2τ A−1 = k,k+τ . −1 ∗ 1 + γk+2τ Ak,k+τ γk+τ Substitute back, we obtain ∗ γk+τ A−1 k y = ∗ γk+τ A−1 k,k+τ y − ∗ A−1 γk+τ k,k+τ γk+τ ∗ A−1 1+γk+2τ k,k+τ γk+τ ∗ A−1 1 + γk+τ k,k+τ γk+2τ − ∗ γk+2τ A−1 k,k+τ y cm ∗ A−1 γ γ 2 k+2τ k,k+τ k+2τ 31 + Rk1 γk+2τ , (A.2) with Rk1 γk+2τ = cm 2 ∗ − γk+τ A−1 k,k+τ γk+τ + cm ∗ γ A−1 γ 2 k+2τ k,k+τ k+τ ∗ A−1 γk+2τ k,k+τ γk+τ 1+ ! ∗ γk+2τ A−1 k,k+τ γk+2τ . Note that lim n→∞ = 1 ∗ γk+τ A−1 k,k+τ γk+τ ∗ A−1 1 + γk+2τ k,k+τ γk+τ cm 2 cm − cm 2 2x1 = cm 2 x1 <1  ∗ A−1 1 + γk+τ k,k+τ γk+2τ − cm ∗ A−1 γ γ 2 k+2τ k,k+τ k+2τ + Rk1 γk+2τ  and ∗ lim 1 + γk+τ A−1 k,k+τ γk+2τ − n→∞ cm ∗ cm cm γk+2τ A−1 , k,k+τ γk+2τ + Rk1 γk+2τ = 1 − 2 2 2x1 −1 ∗ ∗ which is bounded. Using induction, we have |γk+τ A−1 k y| ≤ K|γk+τ Ak,k+τ y|. −1 ∗ ∗ ∗ −1 ∗ −1 Similarly, we have |γk−τ A−1 k y| ≤ K|γk−τ Ak,k−τ y|, |x Ak γk+τ | ≤ K|x Ak,k+τ γk+τ | and ∗ −1 |x∗ A−1 k γk−τ | ≤ K|x Ak,k−τ γk−τ |. 2 ∗ −1 −1 Therefore, by noting (γk+τ + γk−τ )∗ A−1 k γk = oa.s. (1), |εit | < C, E|εit | = 1 and x Ak Āk x being bounded, we have E T X k=1 Ek−1|αk2 |2 T X ≤ KE k=1 !l −1 2 Ek−1 |x∗ A−1 k γk γk+τ Ak y| !l T X 1 −1 2 Ek−1 x∗ Ak−1 Ā−1 = KE k x|γk+τ Ak y| 2T k=1 2l ≤ K max E|γk+τ A−1 k,k+τ y| k ≤ K Tl 32 !l and T X = k=1 T X k=1 E|αk2 |2l −1 2 E |x∗ A−1 k γk γk+τ Ak y| K 2l max E|γk+τ A−1 k,k+τ y| l−1 k T K ≤ T 2l−1 l ≤ −1 For i = 1, by Ã−1 k = Ak − ∗ −1 A−1 k γk (γk+τ +γk−τ ) Ak , −1 ∗ 1+(γk+τ +γk−τ ) Ak γk we have ∗ −1 x∗ Ã−1 k (γk+τ + γk−τ )γk Ãk y   ∗ −1  ∗ −1  A−1 A−1 ∗ −1 k γk (γk+τ + γk−τ ) Ak k γk (γk+τ + γk−τ ) Ak (γ + γ )γ A − y = x∗ A−1 − k+τ k−τ k k k 1 + (γk+τ + γk−τ )∗ A−1 1 + (γk+τ + γk−τ )∗ A−1 k γk k γk ∗ −1 = x∗ A−1 k (γk+τ + γk−τ )γk Ak y (γk+τ + γk−τ )∗ A−1 k (γk+τ + γk−τ ) ∗ −1 x Ak γk γk∗ A−1 k y 1 + (γk+τ + γk−τ )∗ A−1 γ k k γk∗ A−1 ∗ −1 k γk x∗ A−1 − k (γk+τ + γk−τ )(γk+τ + γk−τ ) Ak y −1 ∗ 1 + (γk+τ + γk−τ ) Ak γk γ ∗ A−1 γk (γk+τ + γk−τ )∗ A−1 k (γk+τ + γk−τ ) ∗ −1 + k k x Ak γk (γk+τ + γk−τ )∗ A−1 2 k y −1 ∗ 1 + (γk+τ + γk−τ ) Ak γk =: αk11 − αk12 − αk13 + αk14 − It is easy to see that work on αk11 and αk14 is the same as that on αk2 . For αk12 , by Cauchy-Schwartz’s inequality, we have E T X k=1 ≤ KE Ek−1 |αk12 |2 T X k=1 !l 2 ∗ −1 2 Ek−1|x∗ A−1 k γk | Ek−1 |γk Ak y| !l T X 1 −1 ∗ −1 −1 Ek−1 x∗ A−1 = KE k Āk xEk−1 y Āk Ak y 2 4T k=1 ≤ K Tl 33 !l −1 and by |εit | < C, E|εit |2 = 1 and x∗ A−1 k Āk x being bounded, we have T X k=1 ≤ K E|αk12 |2l T X k=1 2 ∗ −1 2 E |x∗ A−1 k γk | |γk Ak y| K 2l ≤ max E|γk A−1 k y| T l−1 k K . ≤ T 2l−1 l −1 ∗ ∗ ∗ −1 ∗ −1 By the fact that |γk±τ A−1 k y| ≤ K|γk±τ Ak,k±τ y| and |x Ak γk±τ | ≤ K|x Ak,k±τ γk±τ |, the similar result for αk13 follows by the same reason. Substituting all the above results into (A.1) and choosing l large enough, we have x∗ A−1 y − Ex∗ A−1 y → 0 a.s. Next, we want to show the convergence of Ex∗ A−1 y. By A= T X k=1 we have In = T X k=1 ∗ (γk γk+τ + γk+τ γk∗ ) − ℓIn ∗ (γk γk+τ A−1 + γk+τ γk∗ A−1 ) − ℓA−1 . Multiplying x∗ from left and y from right and taking expectation, we obtain ∗ x y = T X k=1 = T X k=1 ∗ (Ex∗ γk γk+τ A−1 y + Ex∗ γk+τ γk∗ A−1 y) − ℓEx∗ A−1 y Ex∗ (γk+τ + γk−τ )γk∗ A−1 y − ℓEx∗ A−1 y. (A.3) By A = Ãk + (γk+τ + γk−τ )γk∗ , Ãk = Ak + γk (γk+τ + γk−τ )∗ , (γk+τ + γk−τ )∗ A−1 k γk = oa.s. (1), 34 γk∗ A−1 k γk = cm 2 + oa.s. (1), we have γk∗ A−1 y γk∗ Ã−1 k y 1 + γk∗ Ã−1 k (γk+τ + γk−τ )   ∗ −1 A−1 k γk (γk+τ +γk−τ ) Ak γk∗ A−1 − y k 1+(γk+τ +γk−τ )∗ A−1 k γk   = ∗ −1 A−1 k γk (γk+τ +γk−τ ) Ak (γk+τ + γk−τ ) 1 + γk∗ A−1 −1 ∗ k − 1+(γ +γ ) A γ = k+τ = = k−τ k k ∗ −1 ∗ −1 γk∗ A−1 k y + γk Ak y(γk+τ + γk−τ ) Ak γk ∗ −1 [1 + (γk+τ + γk−τ )∗ A−1 k γk ][1 + γk Ak (γk+τ + γk−τ )] − cm 2 (γk+τ + γk−τ )∗ A−1 k y + oa.s. (1). c2 m2 1 − 2x1 ∗ −1 − γk∗ A−1 k γk (γk+τ + γk−τ ) Ak y ∗ −1 − γk∗ A−1 k γk (γk+τ + γk−τ ) Ak (γk+τ + γk−τ ) (A.4) Next, we have = = = ∗ ∗ γk+τ A−1 k yx γk+τ −1 −1 −1 ∗ ∗ ∗ ∗  (1 + γk+2τ A−1 k,k+τ γk+τ )γk+τ Ak,k+τ y − γk+τ Ak,k+τ γk+τ γk+2τ Ak,k+τ y −1 ∗ ∗ (1 + γk+2τ A−1 k,k+τ γk+τ )(1 + γk+τ Ak,k+τ γk+2τ ) ∗ ∗ γk+τ A−1 k,k+τ yx γk+τ + oa.s. (1) −1 ∗ ∗ A−1 1 − γk+τ k,k+τ γk+τ γk+2τ Ak,k+τ γk+2τ x∗ A−1 k,k+τ y + oa.s. (1) . 2 2 2T (1 − c4xm1 ) ∗ ∗ Similarly, we can show that γk−τ A−1 k yx γk−τ = − −1 ∗ ∗ γk+τ A−1 k,k+τ γk+τ γk+2τ Ak,k+τ γk+2τ x∗ A−1 k,k−τ y+oa.s. (1) 2 2 2T (1− c4xm )  x∗ γk+τ ∗ ∗ , γk+τ A−1 k yx γk−τ = oa.s. (1) 1 ∗ ∗ ∗ −1 ∗ −1 and γk−τ A−1 k yx γk+τ = oa.s. (1). Next, we will show that Ex Ak,k±τ y − Ex A y = o(1). By writing ∗ −1 ∗ −1 ∗ −1 ∗ −1 ∗ −1 Ex∗ A−1 k,k±τ y − Ex A y = Ex Ak,k±τ y − Ex Ak y + Ex Ak y − Ex A y, ∗ −1 it is sufficient to show Ex∗ A−1 k y − Ex A y = o(1). Note that ∗ −1 Ex∗ A−1 k y − Ex A y ∗ −1  ∗ −1  x∗ A−1 x∗ Ã−1 k γk (γk+τ + γk−τ ) Ak y k (γk+τ + γk−τ )γk Ãk y + E 1 + (γk+τ + γk−τ )∗ A−1 1 + γk∗ Ã−1 k γk k (γk+τ + γk−τ ) = Eαk1 + Eαk2 = E Previous calculation shows that E|αk1 | = o(1) and E|αk2 | = o(1). Substituting these back to (A.3) and (A.4), we finish proving the lemma. 35 References [1] Bai, Z.D., Liu H.X. and Wong, W.K. (2011) Asymptotic properties of eigenmatrices of a large sample covariance matrix. Ann. Appl. Probab. 21, 1994–2015. [2] Bai, Z.D. and Silverstein, J.W. (1998) No eigenvalues outside the support of the limiting spectral distribution of large-dimensional sample covariance matrices. Ann. Probab. 26, 316–345. [3] Bai, Z.D. and Silverstein, J.W. (2010) Spectral Analysis of Large Dimensional Random Matrices, 2nd ed. Springer Verlag, New York. [4] Bai, Z.D. and Yao, J.F. (2008) Central limit theorems for eigenvalues in a spiked population model. Ann. Inst. H. Poincar?????? Probab. Statist. Volume 44, Number 3, 447–474. [5] Bai, Z.D. and Wang, C. (2015) A note on the limiting spectral distribution of a symmetrized auto-cross covariance matrix. Statistics and Probability Letters, 96, 333 – 340. [6] Baik, Jinho and Silverstein, J. W. (2006) Eigenvalues of large sample covariance matrices of spiked population models. J. Multivariate Anal. 97(6), 1382-1408. [7] Burkholder, D.L. (1973) Distribution function inequalities for martingales. Ann. Probab. 1, 19–42. [8] Chung, K.L. (2001) A Course in Probability Theory, 3rd ed. Academic Press, New York. [9] Johnstone, I. (2001) On the distribution of the largest eigenvalue in principal components analysis. Ann. Statist. 29, 295 – 327. [10] Jin, B. S., Wang, C., Bai, Z.D., Nair, K.K. and Harding, M.C. (2014) Limiting spectral distribution of a symmetrized auto-cross covariance matrix. Ann. Appl. Probab. 24, 1199– 1225. 36 [11] Marčenko, V.A. and Pastur, L.A. (1967) Distribution of eigenvalues for some sets of matrices. Mat. Sb. 72, 507 – 536. [12] Wang, C., Jin, B. S., Bai, Z.D., Nair, K.K. and Harding, M.C. (2015) Strong limit of the extreme eigenvalues of a symmetrized auto-cross covariance matrix. Ann. Appl. Probab. 25, 3624 – 3683. 37
10math.ST
Coding-theorem Like Behaviour and Emergence of the Universal Distribution from Resource-bounded Algorithmic Probability Hector Zenil1,2,3∗ Liliana Badillo 4 Santiago Hernández-Orozco 2,3,4 and Francisco Hernández-Quiroz 5 1 Department of Computer Science, University of Oxford, Oxford, U.K. Algorithmic Dynamics Lab, Unit of Computational Medicine, SciLifeLab, Centre for Molecular Medicine, Department of Medicine Solna, Karolinska Institute, Stockholm, Sweden. 3 Algorithmic Nature Group, LABORES, Paris, France. 4 Posgrado en Ciencias e Ingenierı́a de la Computaci,́ Universidad Nacional Autonoma de México (UNAM) 5 Departamento de Matemáticas, Facultad de Ciencias, Universidad Nacional Autónoma de México (UNAM), Ciudad de México, México. arXiv:1711.01711v10 [cs.IT] 23 Mar 2018 2 Abstract Previously referred to as ‘miraculous’ in the scientific literature because of its powerful properties and its wide application as optimal solution to the problem of induction/inference, (approximations to) Algorithmic Probability (AP) and the associated Universal Distribution are (or should be) of the greatest importance in science. Here we investigate the emergence, the rates of emergence and convergence, and the Coding-theorem like behaviour of AP in Turing-subuniversal models of computation. We investigate empirical distributions of computing models in the Chomsky hierarchy. We introduce measures of algorithmic probability and algorithmic complexity based upon resource-bounded computation, in contrast to previously thoroughly investigated distributions produced from the output distribution of Turing machines. This approach allows for numerical approximations to algorithmic (Kolmogorov-Chaitin) complexitybased estimations at each of the levels of a computational hierarchy. We demonstrate that all these estimations are correlated in rank and that they converge both in rank and values as a function of computational power, despite fundamental differences between computational models. In the context of natural processes that operate below the Turing universal level because of finite resources and physical degradation, the investigation of natural biases stemming from algorithmic rules may shed light on the distribution of outcomes. We show that up to 60% of the simplicity/complexity bias in distributions produced even by the weakest of the computational models can be accounted for by Algorithmic Probability in its approximation to the Universal Distribution. Keywords algorithmic coding-theorem; Solomonoff’s induction; information theory; Shannon entropy; lossless compression; Levin’s semi-measure, computable algorithmic complexity; finite-state complexity; transducer complexity; context-free grammar complexity; linear-bounded complexity; time resource-bounded complexity. ∗ Corresponding author: hector.zenil [at] algorithmicnaturelab [dot] org 1 1 Motivation and Significance Algorithmic Probability (AP) and its associated Universal Distribution (UD) predicts the way in which strings distribute when ‘random’ computer programs are run. This algorithmic ‘law’ thus regulates the behaviour of the output distribution of computer programs. The Universal Distribution is the probability distribution that establishes how the output strings from a universal computer running a random computer program distribute. Formally, the Algorithmic Probability of a string AP (s) is defined by: X 1/2|p| APU (s) = (1) p:U (p)=s where the sum is over all halting programs p for which U , a prefix-free universal Turing machine, outputs the string s. A prefix-free universal Turing machine defines a set of valid programs such that the sum is bounded by Kraft’s inequality [17] and not greater than 1 (it is also called a semi-probability measure because some programs will not halt, and thus the sum of the probabilities is never really 1). An invariance theorem establishes that the choice of reference universal Turing machine introduces a vanishing bias as a function of string size: APU (s) ≤ cU,U 0 APU 0 (s) (2) 0 where cU,U 0 is a constant that depends on U and U (think of a compiler size translating in both directions) but is independent of s. Hence the reference U can safely be dropped in the long term. Yet this invariance theorem tells us nothing about the rate of convergence, thus making these numerical experiments more relevant and necessary. The Algorithmic Probability and the Universal Distribution represent the theoretically optimal response to the challenge of induction and inference, according to R. Solomonoff, one of the proponents of algorithmic information theory [33, 34, 35]. More recently, at a panel discussion at the World Science Festival in New York City on Dec 14, 2014, Marvin Minsky, one of the founding fathers of AI, said (own transcription): It seems to me that the most important discovery since Gödel was the discovery by Chaitin, Solomonoff and Kolmogorov of the concept called Algorithmic Probability, which is a fundamental new theory of how to make predictions given a collection of experiences, and this is a beautiful theory, everybody should learn it, but it’s got one problem, that is, that you cannot actually calculate what this theory predicts because it is too hard, it requires an infinite amount of work. However, it should be possible to make practical approximations to the Chaitin, Kolmogorov, Solomonoff theory that would make better 2 predictions than anything we have today. Everybody should learn all about that and spend the rest of their lives working on it. The Universal Distribution has also been characterized as miraculous, because of its performance in inference and prediction [24]. However, the calculation of both AP (s) is not computable. This has meant that for decades after its discovery, few attempts have been made to apply Algorithmic Probability to problems in general science. However, to be more precise AP (s) is upper semi-computable, which means that it can be approximated from below. AP is of fundamental interest to science, as it addresses the most pressing challenges in the areas of complexity, inference and causality, attempting to keep pushing towards better methods for approximating algorithmic probability. A recent new framework and a pipeline of relevant numerical methods have been advanced and have proven successful in many areas, ranging from cognition to graph complexity [9, 12, 7, 40, 41]. There are many properties of m that make it optimal [33, 34, 35, 24]. For example, the same Universal Distribution will work for any problem within a convergent error; it can deal with missing and multidimensional data; the data do not need to be stationary or ergodic; there is no under-fitting or over-fitting because the method is parameter-free and thus the data need not be divided into training and test sets; it is the gold standard for a Bayesian approach in the sense that it updates the distribution in the most efficient and accurate way possible with no assumptions. Several interesting extensions of resource-bounded Universal Search approaches have been introduced in order to make algorithmic probability more useful in practice [28, 29, 20, 14]. Some of these provide some theoretical bounds [1]. Certain of these approaches have explored the effect of relaxing some of the conditions (e.g. universality) on which Levin’s Universal Search is fundamentally based [37] or have introduced domain-specific versions (and thus versions of conditional AP). Here we explore the behaviour of explicitly weaker models of computation– of increasing computational power– in order to investigate asymptotic behaviour and the emergence of the Universal Distribution, and the properties of both the different models with which to approximate it and the actual empirical distributions that such models produce. The so-called Universal Search [15] is based on dovetailing all possible programs and their runtimes such that the fraction of time allocated to program p is 1/2|p| , where |p| is the size of the program (in number of bits). Despite the algorithm’s simplicity and remarkable theoretical properties, a potentially huge constant slowdown factor has kept it from being much used in practice. Some of the approaches to speeding it up have included the introduction of bias and making the search domain specific, which has at the same time limited the power of Algorithmic Probability. There are practical applications of AP that make it very relevant. If one could translate some of the power of Algorithmic Probability to decidable models (thus below Type-0 in the Chomsky hierarchy) without having to deal with the uncomputability of algorithmic complexity and algorithmic probability, it 3 would be effectively possible to trade computing power for predictive power. While trade-offs must exist for this to be possible (full predictability and uncomputability are incompatible), the question of finding a threshold for the coding-theorem to apply would be key to transferring some power through relaxing the computational power of an algorithm. If a smooth trade-off is found before the undecidability border of Turing completeness, it would mean that the partial advantages of Algorithmic Information Theory can be found and partially recovered from simpler models of computation in exchange for accuracy. Such simpler models of computation may model physical processes that are computationally rich but are subject to noise or are bounded by resources. More real-world approaches may then lead to applications such as in the reduction of conformational distributions of protein folding [6, 10] in a framework that may favour or rule out certain paths, thereby helping predict the most likely (algorithmic) final configuration. If the chemical and thermodynamic laws that drive these processes are considered algorithmic in any way, even under random interactions, e.g. molecular Brownian motion, the Universal Distribution may offer insights that may help us quantify the most likely regions if these laws in any sense constitute forms of computation below or at the Turing level that we explore here. This will appear more plausible if one considers the probabilistic bias affecting convergence [19], bearing in mind that we have demonstrated that biological evolution operating in algorithmic space can better explain some phenomenology related to natural selection [11]. 1.1 Uncomputability in complexity Here we explore the middle ground at the boundary and study the interplay between computable and non-computable measures of algorithmic probability connected to algorithmic complexity. Indeed, a deep connection between the algorithmic complexity (or Kolmogorov-Chaitin complexity) of an object s and AP of s was found and formalized by way of the algorithmic Coding theorem. The theorem establishes that the probability of s being produced by a random algorithm is inversely proportional to its algorithmic complexity (up to a constant) [16]: − log AP (s) = K(s) + O(1) (3) Levin proved that the output distribution established by Algorithmic Probability dominates (up to multiplicative scaling) any other distribution produced by algorithmic means as long as the executor is a universal machine, hence giving the distribution its ‘universal’ character (and its name: ‘Universal Distribution’). This so-called Universal Distribution is a signature of Turing-completeness. However, all processes that model or regulate natural phenomena may not necessarily be Turing universal. For example, some models of self-assembly may not be powerful enough to reach Turing-completeness, yet they display similar 4 output distributions to those predicted by the Universal Distribution by way of the algorithmic Coding theorem, with simplicity highly favoured by frequency of production. Noise is another source of power degradation that may preempt universality and therefore the scope and application of algorithmic probability. However, if some subuniversal systems approach the coding-theorem behaviour, these give us great prediction capabilities, and less powerful but computable algorithmic complexity measures. Here we ask whether such distributions can be partially or totally explained by importing the relation established by the coding theorem, and under what conditions non-universal systems can display algorithmic coding-theorem like behaviour. We produce empirical distributions of systems at each of the computing levels of the Chomsky hierarchy, starting from transducers (Type-3) as defined in [18], Context-free grammars (Type-2) as defined in [36], linear-bounded nondeterministic Turing machines (Type-1) as approximations to bounded KolmogorovChaitin complexity and a universal procedure from an enumeration of Turing machines (Type-0) as defined in [5, 21]. We report the results of the experiments and comparisons, showing the gradual coding-theorem-like behaviour at the boundary between decidable and undecidable systems. 2 Methods We will denote by T M (n, k) or simply (n, k) the set of all strings produced by all the Turing machines with n states and k symbols. 2.1 The Chomsky Hierarchy The Chomsky hierarchy is a strict containment hierarchy of classes of formal grammars equivalent to different computational models of increasing computing power. At each of the 4 levels, grammars and automata compute a larger set of possible languages and strings. The four levels, from weaker to stronger computational power, are: Type-3 The most restricted grammars generating the regular languages. They consist of rules with single non-terminal symbols on the left-hand side and strings of terminal symbols followed by at most one non-terminal symbol on the right-hand side. These types of rule are referred to as right linear (but a symmetrical left linear definition works as well). This level is studied by way of finite-state transducers (FST), a generalization of finitestate automata (FSA) that produce an output at every step, generating a relation between input strings and output strings. Though apparently more general, FST-recognized languages are the same as FSA-accepted sets. Hence both can represent this level. We use an enumeration of transducers introduced in [18] where they also proved an invariance theorem, thus demonstrating that the enumeration choice is invariant (up to a constant). 5 Type-2 Grammars that generate the context-free languages. These kinds of grammars are extensively used in linguistics. The languages generated by CFG grammars are exactly the languages that can be recognized by a non-deterministic pushdown automaton. We denote this level by CFG. We generated production rules for 40 000 grammars according to a sound scheme introduced in [36]. Type-1 Grammars that generate the context-sensitive languages. The languages described by these grammars are all languages that can be recognized by a linear-bounded automaton (LBA), a Turing machine whose tape’s length is bounded by a constant times the length of the input. An AP-based variation is introduced here, and we denote it by LBA/AP. Type-0 The least restricted grammar. Generates the languages that can be recognized by Turing machines, also called recursively enumerable languages. This is the level at which Turing-universality is achieved or required. We used previously generated distributions produced and reported in [5, 21] We also explore the consequences of relaxing the halting configuration (e.g. halting state) in models of universal computation (Type-0) when it comes to comparing their output distributions. 2.2 Finite-state complexity Formal language theory and algorithmic complexity had traditionally been at odds as regards the number of states, or the number of transitions in a minimal finite automaton accepting a regular language. In [3] a connection was established by extending the notions of Blum static complexity and encoded function space. The main reason for this lack of connection was that languages are sets of strings, rather than strings used for measures of algorithmic complexity, and a meaningful definition of the complexity of a language was lacking, as well as a definition of Finite-state algorithmic complexity. However, [18] offered a version of algorithmic complexity by replacing Turing machines with finite transducers. The complexity induced is called Finite-state complexity (FSA). Despite the fact that the Universality Theorem (true for Turing machines) is false for finite transducers, rather surprisingly, the invariance theorem holds true for finite-state complexity and, in contrast with descriptional complexities (plain and prefix-free), finite-state complexity is computable. Defined in [18] and analogous to the core concept (Kolmogorov-Chaitin complexity) of Algorithmic Information Theory (AIT)– based on finite transducers instead of Turing machines– finite-state complexity is computable, and there is no a priori upper bound for the number of states used for minimal descriptions of arbitrary strings. Consider a transducer T with the finite set of states Q = {1, . . . , n}. Then the transition function ∆ of T is encoded by a binary string σ (see [18] for details). The transducer T which is encoded by σ is called TσS0 , where S0 is the set of all strings in the form of σ. 6 In [18] it was shown that the set of all transducers could be enumerated by a regular language and that there existed a hierarchy for more general computable encodings. For this experiment we fix S = S0 . As in traditional AIT, where Turing machines are used to describe binary strings, transducers describe strings in the following way: we say that a pair (TσS , p), σ ∈ S, p ∈ B∗ , where B∗ is the set of all finite binary strings, is a description of the string s ∈ B∗ if and only if TσS (p) = s. The size of the description (TσS , p) is defined in the following way ||(TσS , p)|| = |σ| + |p|. Definition 2.1. ([18]) The finite-state complexity of s ∈ B∗ (that we will identify as FSA in the results) with respect to encoding S is defined by CS (s) = min {||(TσS , p)|| : TσS (p) = s}. σ∈S,p∈B∗ An important feature of traditional AIT is the invariance theorem, which states that complexity is optimal up to an additive constant and relies on the existence of a Universal Turing machine (the additive constant is in fact its size). In contrast with AIT, due to the non-existence of a “Universal transducer”, finite-state complexity includes the size of the transducer as part of the encoding length. Nevertheless, the invariance theorem holds true for finite-state complexity. An interesting consequence of the invariance theorem for finite-state complexity is the existence of an upper bound CS (s) ≤ |s| + 8 for all s ∈ B∗ , where 8 is the length of the string σ which encodes the identity transducer. Hence CS is computable. If Sn0 and Sn1 are encodings then CSn0 = f (CSn1 ) for computable function f [18]. An alternative definition of finite-state complexity based on Algorithmic Probability is as follows: Definition 2.2. ([18]) The finite-state complexity (denoted by FSA/AP in the results) of s ∈ B∗ with respect to encoding S is defined by CS (s) = − log Σσ∈S,p∈B∗ {||(TσS , p)|| : TσS (p) = s}. That is, the number of times that a string is accepted by a transducer (in this case, reported in the results, for encodings of size 8 to 22). 2.2.1 Building a finite-state empirical distribution We now define the construction of an empirical distribution using finite-state complexity. We introduce our alternative definition of algorithmic probability using transducers. Definition 2.3. (Finite-state Algorithmic Probability) Let S be the set of encodings of all transducers by a binary string in the form of σ. We then define the algorithmic probability of a string s ∈ B∗ as follows 7 APS (s) = X 2−(|σ|+|p|) . (σ,p):TσS =s For any string s, PS (s) is the algorithmic probability of s, computed for the set of encodings S. In the construction of the empirical distribution for finite-state complexity, we consider the set of strings τ ∈ B∗ such that τ = σ _ p (this is the concatenation of the binary strings σ and p), σ ∈ S, p ∈ B∗ and 8 ≤ |τ | ≤ 22. Hence |τ | = ||(TσS , p)||. Following [23] we define the empirical distribution function DS (n) (i.e. the probability distribution) as Definition 2.4. (Finite-state Distribution, FSA) DS (n) = |{(σ, p) : σ ∈ S, p ∈, 1}∗ , s ∈, 1}∗ , TσS (p) = s}| . |{(σ, p) : σ ∈ S, p ∈ B∗ , ||(TσS , p)|| = n}| In other words, DS (n) considers all strings τ ∈ B∗ of length n and determines whether τ = σ _ p such that σ ∈ S. Then DS (n) computes TσS (p) and counts the number of times that we have TσS (p) = s for every string s described by (σ, p) such that ||(TσS , p)|| = n 1 . We note that in the encoding σ ∈ S, a string ν ∈ B∗ occurring as the output of a transition in TσS contributes 2 · |ν| to the size ||(TσS , p)|| of a description of a string s. The decision to consider strings τ such that 8 ≤ |τ | was made based on the fact that in the encoding of the smallest transducer i.e. the one with the transition function, ∆(1, 0) = ∆(1, 1) = ∆(1, ε) (4) where ε is the empty string, the string ν (which occurs as the output of transitions in TσS ) has length |ν| = 4 and so contributes 2·|ν| = 8 to the size ||(TσS , p)|| of the description of a string s. 2.3 Context-free grammars In [36] Wharton describes an algorithm for a general purpose grammar enumerator which is adaptable to different classes of grammars (i. e. regular, contextfree, etc). We implemented this algorithm in the Wolfram Language with the purpose of enumerating context-free grammars over the terminal vocabulary {0, 1}, which are in Chomsky Normal Form. Before describing the implementation of the algorithm we define the following terminology: • • • • A grammar G is a 4-tuple (N, T, P, X). N is the non-terminal vocabulary. T is the terminal vocabulary. P is the set of productions. 1 Since S is in fact regular we could indeed use an enumeration of S, but in this instance we analyze all binary strings of length n. 8 • X is the start symbol. • V = N ∪ T is the vocabulary of G. • For any grammar G, n, t and p denote the cardinalities of N, T and P respectively. First, we define the structure of a grammar G. Let G be any grammar. Suppose we are given the non-terminal vocabulary N with an arbitrary ordering such that the first non-terminal is the start symbol X. The grammar G has a structure S which consists of a list of n integers. Each integer Si from S is the number of productions having the ith non-terminal on the left-hand side (according to the ordering of N ). Hence the cardinality p of the set of productions P satisfies Σni=0 Si = p. Now, let Γ be a class of grammars over a terminal vocabulary T . By Γc we denote the grammars in Γ with complexity c. We then enumerate Γ by increasing the complexity c. To every complexity class Γc corresponds a set of structure classes which is determined by n and p. Therefore a complexity class Γc is enumerated by enumerating each of its structure classes Γc,S (i. e. every structure S that constitutes Γc ). In addition, we need to define an ordered sequence R which consists of all possible right-hand sides for the production rules. The sequence R is ordered lexicographically (first terminals, then non- terminals) and is defined according to the class of grammars we want to enumerate. For example, suppose we are interested in enumerating the class of Chomsky Normal Form grammars over the terminal vocabulary T = {0, 1} and the non-terminal vocabulary N = {X, Y }, we then set R = {0, 1, XX, XY, Y X, Y Y }. 2.3.1 Implementation Given a complexity c, the algorithm described below (that we implemented in the Wolfram Language running on Mathematica) enumerates all the grammars according to [36] in a structure class Γc,S . 1. The complexity measure c is provided by the following pairing function in p and n: c = ((p + n − 1)(p + n − 2)/2) + n. 2. 3. 4. 5. In other words, given c, we apply the inverse of the above function in order to obtain the values of p and n. This function is implemented by the function pairingInverse[c]. The set of non-terminals N is generated by the function generateSetN[{n, p}]. The ordered sequence R is generated using the set of non-terminals N by the function generateSetR[N ]. The different structure classes Γc,S that correspond to complexity c are generated by the function generateStructureClasses[{n, p}]. All the possible grammars with the structure classes defined in the previous step are then generated. Each grammar has an associated matrix A. This is performed by function generateStructureMatricesA[S, Length[R]]. 9 6. The sequence R is used to generate the rules of the grammars by the function generateGrammars[matricesA, R]. 2.3.2 The CYK algorithm A procedure to decide if a string s is generated by a grammar G in polynomial time was implemented according to the Cocke-Younger-Kasami (CYK) algorithm. The CYK is an efficient worst-case parsing algorithm that operates on grammars in Chomsky normal form (CNF) in O(n3 · |G|), where n is the length of the parsed string and |G| is the size of the CNF grammar G. The algorithm considers every possible substring of the input string and decides s ∈ L(G), where L(G) is the language generated by G. The implementation was adapted from [26]. 2.4 CFG Algorithmic Probability We can now define the Algorithmic Probability of a string according to CFG as follows: Definition 2.5. (Context-free Algorithmic Probability, CFG) We define a CFG empirical distribution in terms of the Universal Distribution as follows: Ds (c) = |{G : s ∈ L(G)}| |{G}| where c = ((p + n − 1)(p + n − 2)/2) + n as defined in 2.3.1, L(G) is the language generated by G and |{G}| denotes the cardinality of the sample set of the grammars considered. For the results here reported |{G}| = 40 000, where all the grammars have a complexity at most c according to a structure class Γc,S [36]. ’Complexity’ here simply means a measure of the grammar size defined as a product of the grammar parameters. 2.5 Linear-bounded complexity In [1] it is shown that the time-bounded Kolmogorov distribution is universal (in the sense of convergence), and they cite the question of an analogue to the algorithmic Coding theorem as an open problem possibly to be tackled by exploiting the universality finding. On the other hand, in [2, 13] it has been shown that the time-bounded algorithmic complexity (being computable) is a Solovay function. These functions are an upper bound of algorithmic complexity (prefix-free version) and they give the same value for almost all strings. In [5, 21] we described a numerical approach to the problem of approximating the algorithmic complexity for short strings. This approach does an exhaustive execution of all deterministic 2-symbol Turing Machines, constructs an output frequency distribution, and then applies the Coding Theorem to approximate the algorithmic complexity of the strings produced. 10 For this experiment we follow the same approach using a less powerful model of computation, namely, linear-bounded automata (LBA). A LBA is basically a single tape Turing Machine which never leaves those cells on which the input was placed [23]. It is well known that the class of languages accepted by LBA is in fact the class of context-sensitive languages [23]. We use the same Turing Machine formalism as [5, 21], which is that of the Busy Beaver introduced by Rado [8], and we use the known values of the Busy Beaver functions. 2.6 Time complexity P T ime or P is the class of Turing Machines that produce an output in polynomial time with respect to the size of its input. When considering empty input strings (in machines with the same number of states), it is easy to see that this class is contained by the class defined by Linear Bounded Automata (LBA): if the number of the transition is bounded by a linear function, so are the number of cells it can visit. But it is important to note that LBA are not time restricted and can use non-deterministic transitions. Whether P T ime is a subset of N SP ACE(O(n)) (LBA) in other cases is an open question. Now, given that Turing Machines can decide context-free grammars in polynomial time (Subsection 2.3.2), P T ime is higher in the hierarchy than Type-2 languages. Within the context of this article, we will represent this class with the set of Turing Machines with 4 states and 2 symbols with no inputs whose execution time is upper-bounded by a fixed constant. We will cap our execution time by 27, 54, 81 and 107 for a total of 44 079 842 304 Turing machines, where 107 is the Busy Beaver value of the set. 2.7 The Chomsky hierarchy bounding execution time The definition of bounded algorithmic complexity is a variation of the unbounded version, as follows: Definition 2.6. (Linear-bounded Algorithmic Complexity, CFG) C t (s) = min{|p| : U (p) = s and U (p) runs in at most t steps} Being bounded by polynomial-sized tapes, the Turing Machines that decide context-sensitive grammars (type-1) can be captured in exponential time by deterministic Turing Machines. Exactly where each class of the Chomsky hierarchy is with respect to the time-based computational complexity classification is related to seminal open problems. For instance, a set equality between the languages recognized by linear-bounded automata and the ones recognized in exponential time would solve the P SP ACE 6= EXP T IM E question. Nevertheless, varying the allowed computation time for the CTM algorithm allows us to capture approximations to the descriptive complexity of an object with fewer computing resources, in a similar fashion to considering each member of the Chomsky hierarchy. 11 2.8 Non-halting models A first comparison between halting Turing machines and non-halting cellular automata was conducted in [39], where it was reported a strong correlation but also some differences, here we further investigate and compare the distributions of halting and non-halting models in connection to the emergence of algorithmic probability and the coding-theorem like behaviour in variations of Turing-complete models. Here, we also consider models with no halting configuration, such as cellular automata (nonH-CA) and Turing machines (nonH-TM) with no halting state as defined in [38], in order to assess whether or not they converge to the Universal Distribution defined over machines with a halting condition. For cellular automata we exhaustively ran all the 256 Elementary Cellular Automata [38] (i.e. closest neighbour and centre cell are taken into consideration) and all 65 536 so-called General Cellular Automata [38] (that is, with 2 neighbours to one side and one to the other, plus the centre cell). For Turing machines, we ran all 4096 (2,2) Turing machines with no halting state, and a sample of 65 536 (same number as CA) Turing machines in (3,2), also with no halting state. 2.9 Consolidating the empirical distributions In order to perform the comparisons among the distributions in each of the Chomsky hierarchy levels, it is necessary to consolidate cases of bias imposed by arbitrary choices of parameter models (e.g. starting from a tape with 0 or 1). This is because, for example, the string 0000 should occur exactly the same number of times as 1111 does and so on, because 0000 and 1111 should have the same algorithmic complexity. If s is the string and f (s) the frequency of production, we thus consolidate the algorithmic probability of s denoted by AP (s) as follows: AP (s) = f (s) + f (r(s)) + f (c(s)) + f (r(c(s)) |g| where |g|, by Burnside’s counting theorem, is the number of non-invariant transformations of s and r(s) is the reversion of s, e.g. 0001 becomes 1000, and c(s) is the negation of s, e.g. 0001 becomes 1110, for all empirical distributions for FSA, CFG, LBA and TM. It is worth noting that c and r do not increase the algorithmic complexity of s except by a very small constant, and thus there is no reason to expect either the model or the complexity of the strings to have been produced or selected to have different algorithmic complexities. More details on the counting method are given in [5]. Notice that this consolidation is not artificially imposed. It would be natural to run each computational model for each possible parameter from the model’s parameter space (e.g. running all TMs once on a ‘blank symbol’ as 0 and then again for the blank as 1) and the distribution would balance itself accordingly. So the application of the consolidating method is only to avoid unnecessary computation. 12 3 Results Here we report the shape and rank of strings in each of the empirical distributions produced by the models of computation, by increasing computational power according to the Chomsky hierarchy and by time computational hierarchy, including comparisons to the performance of classical Shannon entropy (over the bit strings, assuming a uniform distribution) and of lossless compression (using the Compress algorithm), as well as the behaviour of 2 non-halting models of computation. Table 1 reports the number of strings produced by each model. Chomsky Type 3 3 2 (2,0) (2,0) (2,0) 0 0 Computational Model FSA(8-22) FSA/AP(8-22) CFG(40K) LBA(27) LBA(54) LBA(81) LBA 107 = TM(4,2) TM(5,2) No. Strings 294 1038 496 847 1225 1286 1302 8190 Table 1: Strings of at most 12 bits produced at each level from a total of 8190 possible strings (all generated by (5, 2) except 2 [21]). LBA were simulated by halting time cutoffs, which is strictly less powerful than the TM model (Type-0) but strictly greater than CFG (Type-2). Each LBA is followed by its runtime cutoff. The cutoff value of 107 steps is the Busy Beaver for (4,2), and given that LBA are emulated by TM in (4,2) by letting them run up to 107, this means that they have exhausted the full TM space (4,2) and thus are equivalent. The empirical distribution for CFG was obtained by producing 40 000 grammars and checking whether each of the 1302 strings occurring in LBA 107 could be generated by any of these grammars. A Chomsky Type (2,0) means that the model is strictly between Type-0 and Type-2, thus representing Type-1. 3.1 Finite-state complexity The experiment consists of a thorough analysis of all strings τ ∈, 1}∗ that satisfy 8 ≤ |τ | ≤ 22. If the string τ satisfies τ = σ _ p (for some σ ∈ S) then we compute TσS (p) and generate a set of output strings. Then a frequency distribution is constructed from the set of output strings. On the other hand, we compute the finite-state complexity for strings s such that 0 ≤ s ≤ 8 (this is an arbitrary decision). 13 A B C Figure 1: Correlation plots (A) between the 2 models of Algorithmic Probability for FSA using the same enumeration (B) between FSA (both plain and FSA/APbased) and (C) both FSA and FSA/AP separately against Turing machines. 14 A B C D Figure 2: Correlation plots of the four Chomsky hierarchy types. (A) FSA v TM. (B) how FSA approximates TM before converging to a Kendall ranking correlation value below 0.9 (with LBA able to reach 1, see Fig. 5). (C) CFG v TM and (D) LBA v TM. 15 3.1.1 distributions DS (n) produced for 8 ≤ n ≤ 22 The results given in Table 2 indicate how many strings τ satisfy τ = σ _ p (such that σ encodes the transition table of some transducer TσS and p is an input for it) per string length. Running FSA is very fast; there is no halting problem and all stop very quickly. However, while FSA and CFG preserve some of the ranking of superior computational models and accelerate the appearance of ‘jumpers’ (long strings with low complexity), these weak models of computation do not generate the strings with the highest algorithmic complexity that appear in the tail of the distributions of more powerful models, as shown in Fig. 4. Size 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Strings 256 512 1024 2048 4096 8192 16384 32768 65536 131072 262144 524288 1048576 2097152 4194304 Transducers 1 2 6 12 34 68 156 312 677 1354 2814 5628 11474 22948 46332 Table 2: Transducers per string length. For example, of 28 strings in DS (8), there is only one binary string of length 8 that encodes a transducer, which is the transducer with the transition function (4) (we refer to it as the smallest transducer). In the case of DS (9), we found that out of 29 strings, only two encode the smallest transducer with “0” and “1” as input. Again, the only string produced by this distribution is the empty string ε. DS (16) is the first distribution in which one of the strings encodes a transducer with two states. The finite-state complexity CS (s) of the strings produced by DS (16) shows 8 ≤ CS (s) ≤ 12 (see Table 14 and Table 15 in the Supplementary Material). DS (18) consists of 2814 transducers (see Table 3 and Table 4 in the Supplementary Material). The longest string produced is of length 6. The rest of the tables are in the Supplementary Material. The rest of the tables are in the Supplementary Material. 16 String ε 00 11 000 111 0 1 0000 1111 00000 11111 01 10 000000 0101 1010 111111 Probability 0.82800 0.02701 0.02701 0.01990 0.01990 0.01848 0.01848 0.01279 0.01279 0.00426 0.00426 0.00213 0.00213 0.00071 0.00071 0.00071 0.00071 Table 3: Example of a probability distribution for DS (18). Complexity 14 12 13 11 10 9 Frequency 1024 640 512 320 212 106 Table 4: Frequency of Finite-state complexity for strings produced by DS (18). 3.2 Computing finite-state complexity We performed another experiment in order to further analyze the characteristics of the finite-state complexity of all strings of length n. We summarize the results we obtained for computing finite-state complexity for each string s of length 0 ≤ n ≤ 8 in Table 5, while Table 6 shows the strings σ that encode transducers such that TσS (p) = s. 3.3 Context-free grammar distribution We created production rules for 298 233 grammars with up to 26 non-terminal symbols and used the first 40 000 of them to check how many of a set of 155 strings were produced by how many grammars for which we also had distribution numbers at all the other levelsa; FSA, LBA and TM. Table 7 shows the top 20 strings produced. 17 Complexity 4 7 8 9 10 11 12 13 14 15 16 Frequency 1 2 2 4 4 10 22 32 56 126 252 Table 5: Frequency of CS (s) for strings s of length 0 ≤ n ≤ 8. Transducer 0000 000100 0001010110 00010110 0001011100 0001011110 000110 00011100 0001110100 0001110110 0001111100 01000110 Frequency 1 8 1 4 1 1 8 4 1 1 1 480 Table 6: Frequency of the strings σ that encode transducers such that TσS (p) = s. 3.4 3.4.1 Emergence of the Universal Distribution Time-bounded Emergence Fig. 5 shows how LBA asymptotically approximate the Universal Distribution. As the results demonstrate (supported by Fig. 5), by varying the allowed execution time for the space of Turing Machines we can approximate the CTM distribution corresponding to each level of the Chomsky hierarchy. For instance, regular languages (Type-3 grammars) can be decoded in linear time, given that each transition and state in a finite automaton can be encoded by a corresponding state and transition in a Turing Machine. Context-free grammars (Type-2) can be decoded in polynomial time with parsing algorithms such as CYK (Subsection 2.3.2). 18 String 0 00 000 0000 00000 000000 00001 0001 00010 00011 001 0010 00100 00101 0011 00110 00111 01 010 0100 Frequency 5131 5206 5536 5480 5508 5508 2818 2810 2754 2764 2812 2692 2750 2744 2736 2730 2736 2688 2748 2742 Table 7: Top 20 most frequent strings generated by context-free grammars (CFG). Assuming that the algorithmic Coding theorem held, we can then transform the frequency into a computable algorithmic complexity estimation by CFG for purposes of comparisoh. 3.4.2 Rate of convergence of the distributions One opportunity afforded by this analysis is the assessment of the way in which other methods distribute strings by (statistical) randomness, such as Shannon entropy and other means of approximation of algorithmic complexity, such as lossless compression algorithms, in particular one of the most popular such methods, based on LZW (Compress). We can then compare these 2 methods in relation to estimations of a Universal Distribution produced by T M (4, 2). The results (see Fig. 6) of both entropy and Compression conform with the theoretical expectation. Entropy correlates best at the first level of the Chomsky hierarchy, that of FSA, stressing that the algorithmic discriminatory power of entropy to tell apart randomness from pseudo-randomness is limited to statistical regularities of the kind that regular languages would capture. Lossless compression, however, at least as assessed by one of the most popular methods underlying other popular lossless compression formats, outperformed Shannon entropy, but not by much, and it was at best most closely correlated to the output distribution generated by CFG. This does not come as a surprise, given that popular implementations of lossless compression are a variation of Shannon entropy generalized to blocks (variable-width window) that capture repetitions, 19 Figure 3: Comparison of empirical distributions of varying computational power, with TM in log plot (thus the only exponential) followed by LBA and then FSA and CFG when taking their fitting slope coefficients. Running CFG is very expensive because for every string we need to test whether it could be generated by all the grammars produced, which in our case means 1302 × 40 000, and while the CYK algorithm runs in polynomial time, the combinatorial explosion renders the AP-based model by CFG intractable. often followed by a remapping to use shorter codes for values with higher probabilities (dictionary encoding, Huffman coding)–hence effectively a basic grammar based on a simple rewriting rule system. We also found that, while non-halting models approximate the Universal Distribution, they start diverging from TM and remain correlated to LBA with lower runtimes, despite increasing the number of states. This may be expected from the over-representation of strings that non-halting machines would otherwise skip (defined as produced after halting for machines with halting configurations). 4 4.1 Some open questions Tighter bounds and suprema values We have provided upper and lower bounds for each model of computation, but current intervals seem to overlap for some measures of correlation. One question concerns the exact boundaries, especially how much closer to the Universal Distribution each supremum for each model of computation can take us, In other words, can they find the tighter bounds for the intervals at each level? 4.2 Computable error corrections There are some very interesting open questions to explore in the future. For example, whether computable corrections can be made to subuniversal distributions, e.g. as calculated by context-free grammars, in order to correct for trivial (and also computable) biases such as string length. Indeed, while CFG produced an interesting distribution closer to that of LBA and better than FSA, 20 Figure 4: Each model misses the most random strings according to the next most powerful model, with the greatest discrepancy against TM(5,2). For example, FSA and FSA/AP produce the same strings but they assign different values to each string. Here it is shown that FSA/AP outperforms FSA alone by more accurately identifying a greater number of random strings and therefore missing fewer of them compared to the next level (CFG). Moreover, FSA only produces 12 different complexity values among all possible strings produced, while FSA/AP produces 34. The plot also shows that CFG is more powerful than LBA with halting runtime 27 and similar to LBA 54. The progression of LBA towards the full power of TM is also noticeable. there is, for example, an over-representation of trivial long strings which can easily be corrected. The suspicion is that while one can apply these corrections and increase the speed of convergence to TM, the interesting cases are non-computable. A theoretical framework and a numerical analysis would be interesting to develop. 4.3 Sensitivity to choice of enumeration A question equivalent to that of the choice of programming language of the reference universal Turing machine is the question of the stability of the chosen enumerations for the different models of computation, both at the same and at different computational power levels. In [18] it is shown that FSA complexity is invariant to enumeration choice, and an open question is whether this happens at other levels of computational power between FSA and TM, e.g. CFG for some computational models of generative grammars (e.g. the one chosen in this paper). A striking outcome of the results reported here is that not only does the increase in computing power produce better approximations to the distribution produced by Turing machines, but that completely different models of computation—not only in terms of language description but also in terms of computational power— produce similar distributions, thus suggesting a greater independence of the choice of arbitrary parameters, such as enumeration 21 A B C D Figure 5: Trading computational power for accuracy. (A) Number of halting machines per maximum imposed runtime (B) Number of strings produced among all possible, showing that all strings up to length 9 were generated in (4, 2) (C) Output frequency distribution per running time produced in (4, 2) from highest to lowest frequency (D) Smooth density plot maximizing the differences of the output distributions at each runtime approximating the full power of Turing machines in (4, 2) versus strictly lower computational power when bounding the runtime. or model. In [39] we found such convergence in values and ranking in experiments comparing Turing machines, cellular automata and Post tag systems, and moreover these results suggested some sort of ‘natural behaviour’ defined as behaviour that is not artificially introduced with the purpose of producing a different-looking initial distribution (before converging per the invariance theorem for systems with such a property). Thus in [4] we proposed a measure of ‘algorithmicity’ in the sense of the Universal Distribution, quantifying how close or removed a method producing a distribution is from other approximations, in particular that of one of the most standard Turing machine models, the one used for the Busy Beaver [8], that we have shown is not a special case– several other variations of this model and completely different models of computation produce similar output distributions [42, 22, 4], including the results reported in this paper. However, one other open question would entail enumerating systems in different ways and numerically quantifying how many of them are convergent or divergent, to what degree the divergent diverge and for how long and under what conditions, and 22 Figure 6: Coding theorem-like behaviour and emergence of the Universal Distribution. Correlation in rank (distributions were sorted in terms of each other) of empirical output distributions as compared to the output distribution of T M (5, 2) as introduced and thoroughly investigated in [21]. A progression towards greater correlation is noticed as a function of increasing computational power. Bold black labels are placed at their Chomsky level and gray labels are placed within the highest correlated level. Shannon entropy and lossless compression (Compress) distribute values below or at about the first 2 Chomsky types, as expected. It is not surprising to see the LBA with runtime 107 further deviate in ranking, because LBA after 27 steps produced the highest frequency strings, which are expected to converge faster. Eventually LBA 107 (which is none other than TM(4,2)) will converge to TM(5,2). An empirical bound of non-halting models seems to be low LBA even when increasing the number of states (or symbols for CA). whether the convergent dominate. 4.4 Complexity of missing strings from non-halting models We have shown that for halting models of computation, decreasing the power of the computational model has the effect of missing some of the most algorithmically random strings that are produced in the model with the next highest computational power. As we have also seen, non-halting models seem to converge to lower runtime distributions (LBA, which even when they are highly 23 correlated to TMs, do not appear to asymptotically approach TMs but to remain closer to LBA. An interesting question to explore concerns the complexity of the strings missed by non-halting machines or which strings are under or over-represented. As opposed to the strings missed by halting machines below Turing universality, models of computation without halting configurations but still capable of Turing universality (defined on non-halting models) may miss different kinds of strings than those models with halting configurations but strictly weaker computational power (e.g. LBA). Do they miss more or fewer random strings as compared to halting models? 5 Conclusions It is interesting to explore and seek algorithmic Coding-theorem like behaviour in subuniversal systems to better understand the emergence, and rate of emergence, of properties related to algorithmic probability, in particular those established by the algorithmic Coding-theorem from the Universal Distribution–and thus of algorithmic complexity–for types of computational systems of different computational power, in particular below Turing universality. The results reported show that the closer a system is to Turing-completeness, the closer its output distribution is to the empirical distribution produced by a complete set of small Turing machines, and that finite approximations of algorithmic complexity from subuniversal systems [27] produce a gradual emergence of properties related to the Universal Distribution. The results also show improvements over current major tools for approximating algorithmic complexity, such as lossless compression algorithms. To our knowledge, it has not been possible to date to quantify or compare the performance of lossless compression algorithms as estimations of algorithmic complexity, as there was no other standard or alternative. The construction of empirical distributions does provide the means and constitutes an approach to evaluate performance in what we have named an algorithmicity test [39]. Compared to entropic and the most popular lossless compression algorithms, approximations to algorithmic complexity from finite approximations of Algorithmic Probability–even over weak models of computation–constitutes a major improvement over strings that are otherwise assigned a greater randomness content by traditional methods such as common lossless compression, Shannon entropy and equivalent statistical formulations. This algorithmic behavioural exploration is particularly relevant because processes in nature may be weaker than the full power of Turing machines, due to access to finite resources and because of physical degradation. For example, some biological and genetic processes such as DNA translation and RNA transcription can only decode and produce messages and sequences by reading in a single-strand direction and thus may be modelled by Context-free grammars (CFG). The results here suggest that, for example, RNA transcription would not sample uniformly the whole aminoacid space, but would favour the production of simple protein primary structures. In this way the approximation 24 to the Universal Distribution is not only descriptive but does play an active role in active (e.g. biological) processes. Given these types of questions, we also explored non-halting models, as natural processes may not have definite and distinguishable halting states, unlike, e.g., RNA transcription that, exceptionally, has a clear halting condition represented by the RNA polymerase enzyme reading the stop codons. We have shown that up to 60% of the simplicity vs complexity bias produced even by the weakest of the computational models (FST/FSA) in the Chomsky hierarchy (Type-3)–disregarding halting configuration–can be explained by or accounted for by Algorithmic Probability in the model output approximation to the Universal Distribution as tested by empirical distributions compared to the empirical distributions produced by large sets of small Turing machines. On the one hand, while producing empirical distributions from FSA is computationally cheap and produces a large set of strings mostly distributed in the shape of the Universal Distribution, it produces very few strings with different probability/complexity values and thus provides very little discriminatory power. On the other hand, producing strings at the level of CFG (Type-2) with grammars turned out to be computationally very expensive, despite the existence of a polynomial algorithm that can verify string production. However, when a set of strings needs to be checked against a set of grammars, the computational task becomes exponential by a combinatorial argument. Type-2, however, can also be simulated by not only limiting the tape length in LBAs but also forcing them to operate in only one tape direction, which would lead to a simulation similar to that of LBAs. Finally, we have demonstrated that LBAs (Type-1) are both the most direct and the fastest computational model approximating the empirical distributions produced by Turing machines (Type-0) that we generated. Acknowledgements L.B and F.H.-Q. were supported by the grant No. 221341 from SEP-Conacyt CB-2013-01, and H.Z. by grant No. 2015-05299 from the Swedish Research Council (Vetenskapsrådet). References [1] L. Antunes y L. Fortnow, Time-Bounded Universal Distributions, Electronic Colloquium on Computational Complexity, Report No. 144, 2005. [2] L. Bienvenu and R. Downey. Kolmogorov complexity and Solovay functions. In STACS, volume 3 of LIPIcs, pages 147–158. Schloss Dagstuhl- LeibnizZentrum fuer Informatik, 2009. [3] C. Campeanu, K. Culik II, K. Salomaa, S. Yu, State complexity of basic operations on finite languages. In: O. Boldt, H. Jürgensen, (eds.) WIA 1999, LNCS, vol. 2214, pp. 60–70. Springer, Heidelberg, 2001. 25 [4] J.-P. Delahaye, H. Zenil, Towards a stable definition of Kolmogorov-Chaitin complexity, arXiv:0804.3459 [cs.IT], 2008. [5] J.-P. Delahaye and H. Zenil, Numerical Evaluation of the Complexity of Short Strings: A Glance Into the Innermost Structure of Algorithmic Randomness, Applied Mathematics and Computation 219, pp. 63–77, 2012. [6] K. Dingle, S. Schaper, and A.A. Louis, The structure of the genotypephenotype map strongly constrains the evolution of non-coding RNA, Interface Focus 5: 20150053, 2015. [7] N. Gauvrit, F. Soler-Toscano, H. Zenil, Natural Scene Statistics Mediate the Perception of Image Complexity, Visual Cognition, vol. 22:8, pp. 1084– 1091, 2014. [8] T. Rado, “On non-computable functions” Bell System Technical Journal 41:3, 877–884, 1962. [9] N. Gauvrit, H. Zenil, F. Soler-Toscano, J.-P. Delahaye, P. Brugger, Human Behavioral Complexity Peaks at Age 25, PLoS Comput Biol 13(4): e1005408, 2017. [10] S.F. Greenbury, I.G. Johnston, A.A. Louis, S.E. Ahnert, J. R., A tractable genotype-phenotype map for the self-assembly of protein quaternary structure, Soc. Interface 11, 20140249, 2014. [11] S. Hernández-Orozco, H. Zenil, N.A. Kiani, Algorithmically probable mutations reproduce aspects of evolution such as convergence rate, genetic memory, modularity, diversity explosions, and mass extinction, arXiv:1709.00268 [cs.NE] [12] V. Kempe, N. Gauvrit, D. Forsyth, Structure emerges faster during cultural transmission in children than in adults, Cognition, 136, 247–254, 2014. [13] R. Hölzl, T. Kräling, W. Merkle, Time-bounded Kolmogorov complexity and Solovay functions, Theory Comput. Syst. 52:1, 80–94, 2013. [14] M. Hutter, A Theory of Universal Artificial Intelligence based on Algorithmic Complexity, Springer, 2000. [15] L.A Levin, Universal sequential search problems. Problems of Information Transmission, 9:265–266, 1973. [16] L.A. Levin. Laws of information conservation (non-growth) and aspects of the foundation of probability theory, Problems Information Transmission, 10(3):206–210, 1974. [17] L.G. Kraft, A device for quantizing, grouping, and coding amplitude modulated pulses, Cambridge, MA: MS Thesis, Electrical Engineering Department, Massachusetts Institute of Technology, 1949. 26 [18] Calude, C. S., Salomaa, K., & Roblot, T. K. (2011). Finite-state complexity. Theoretical Computer Science, 412(41), 5668-5677. [19] S. Schaper and A.A. Louis, The arrival of the frequent: how bias in genotype-phenotype maps can steer populations to local optima PLoS ONE 9(2): e86635, 2014. [20] B.R. Steunebrink, J. Schmidhuber, Towards an Actual Gödel Machine Implementation. In P. Wang, B. Goertzel, eds., Theoretical Foundations of Artificial General Intelligence, Springer, 2012. [21] Soler-Toscano, F., Zenil, H., Delahaye, J. P. & Gauvrit, N. (2014). Calculating Kolmogorov complexity from the output frequency distributions of small Turing machines. PloS one, 9(5), e96223. [22] F. Soler-Toscano, H. Zenil, J.-P. Delahaye and N. Gauvrit , Correspondence and Independence of Numerical Evaluations of Algorithmic Information Measures, Computability, vol. 2, no. 2, pp 125-140, 2013. [23] J.E. Hopcroft, & J.D. Ullman, Formal languages and their relation to automata, 1969. [24] W. Kirchherr and M. Li and P. Vitányi, The Miraculous Universal Distribution, Mathematical Intelligencer, 19, 7–15, 1997. [25] B.Y. Peled, V.K. Mishra, A.Y. Carmi, Computing by nowhere increasing complexity, arXiv:1710.01654 [cs.IT] [26] J. Rangel-Mondragon, Recognition and Parsing of Context-Free, http:// library.wolfram.com/infocenter/MathSource/3128/ Accessed on Aug 15, 2017. [27] F. Soler-Toscano, H. Zenil, A Computable Measure of Algorithmic Probability by Finite Approximations with an Application to Integer Sequences, Complexity (accepted). [28] J. Schmidhuber, Optimal Ordered Problem Solver, Machine Learning, 54, 211-254, 2004.. [29] J. Schmidhuber, V. Zhumatiy, M. Gagliolo, Bias-Optimal Incremental Learning of Control Sequences for Virtual Robots. In Groen, et al. (eds) Proceedings of the 8th conference on Intelligent Autonomous Systems, IAS8, Amsterdam, The Netherlands, pp. 658–665, 2004. [30] F. Soler-Toscano, H. Zenil, J.-P. Delahaye, and N. Gauvrit, Small Turing Machines with Halting State: Enumeration and Running on a Blank Tape. http://demonstrations.wolfram.com/ SmallTuringMachinesWithHaltingStateEnumerationAndRunningOnAB/. Wolfram Demonstrations Project. Published: January 3, 2013. 27 [31] R.J. Solomonoff. A formal theory of inductive inference: Parts 1 and 2. Information and Control, 7:1–22 and 224–254, 1964. [32] M. Li, and P. Vitányi, An Introduction to Kolmogorov Complexity and Its Applications, 3rd ed, Springer, N.Y., 2008. [33] R.J. Solomonoff, Complexity-Based Induction Systems: Comparisons and Convergence Theorems, IEEE Trans. on Information Theory, vol 24, No. 4, pp. 422–432, 1978. [34] R.J. Solomonoff, The Application of Algorithmic Probability to Problems in Artificial Intelligence, in L.N. Kanal and J.F. Lemmer (eds.), Uncertainty in Artificial Intelligence, pp. 473–491, Elsevier, 1986. [35] Solomonoff, R.J. A System for Incremental Learning Based on Algorithmic Probability, Proceedings of the Sixth Israeli Conference on Artificial Intelligence, Computer Vision and Pattern Recognition, Dec. 1989, pp. 515–527. [36] R.M. Wharton, Grammar enumeration and inference, Information and Control, 33(3), 253–272, 1977. [37] M. Wiering and J. Schmidhuber. Solving, POMDPs using Levin search and EIRA, In Proceedings of the International Conference on Machine Learning (ICML), pages 534–542, 1996. [38] S. Wolfram, A New Kind of Science, Wolfram Media, Champaign, IL., 2002. [39] H. Zenil and J-P. Delahaye, On the Algorithmic Nature of the World, In G. Dodig-Crnkovic and M. Burgin (eds), Information and Computation, World Scientific Publishing Company, 2010. [40] H. Zenil, F. Soler-Toscano, K. Dingle and A. Louis, Correlation of Automorphism Group Size and Topological Properties with Program-size Complexity Evaluations of Graphs and Complex Networks, Physica A: Statistical Mechanics and its Applications, vol. 404, pp. 341–358, 2014. [41] H. Zenil, N.A. Kiani and J. Tegnér, Methods of Information Theory and Algorithmic Complexity for Network Biology, Seminars in Cell and Developmental Biology, vol. 51, pp. 32-43, 2016. [42] H. Zenil, F. Soler-Toscano, J.-P. Delahaye and N. Gauvrit, TwoDimensional Kolmogorov Complexity and Validation of the Coding Theorem Method by Compressibility, PeerJ Computer Science, 1:e23, 2015. 28 Supplementary Material 5.0.1 Empirical distributions < DS (19) for FSA For DS (10) we have it that there are six strings that encode a transducer. In fact, two of them are different from the smallest transducer. However, as in the previous cases, the only string produced is the empty string ε. DS (11) consists of 12 strings with inputs of length one and three but the output of these transducers is ε. DS (12) contains 34 transducers with inputs whose lengths range from two to four. The output distribution still contains only the string ε. DS (13) is a more interesting distribution. It consists of 68 strings whose input has lengths 1, 3 and 5. Table 8 shows the probability distribution of the strings produced by this distribution. The finite-state complexity of the strings that comprise DS (13) is summarized in Table 9. String ε 0 1 Probability 0.94118 0.02941 0.02941 Table 8: Probability distribution of DS (13). Complexity 9 7 8 Frequency 32 20 16 Table 9: Frequency of finite-state complexity for strings produced by DS (13). DS (14) is a richer distribution than the previous one since it contains 156 strings that encode different transducers. Table 10 shows the different strings produced by this distribution. String ε 0 1 00 11 Probability 0.92308 0.02564 0.02564 0.01282 0.01282 Table 10: Probability distribution of DS (14). We note the following facts: • The length of the longest string produced is two. 29 • The string ε remains the one with the highest probability. • The finite-state complexity of the strings produced ranges from 7 to 10 (see Table 11). • DS (14) produces two strings of length 2 out of 22 , that is, “00” and “11”. Complexity 10 8 9 7 Frequency 64 40 32 20 Table 11: Frequency of Finite-state complexity for strings produced by DS (14). DS (15) is quite similar to DS (14) in terms of the strings it produces (see Table 10 and Table 13). String ε 0 1 00 11 000 111 Probability 0.88462 0.03205 0.03205 0.01923 0.01923 0.00641 0.00641 Table 12: Probability distribution of DS (15). Complexity 11 9 10 8 Frequency 128 80 64 40 Table 13: Frequency of Finite-state complexity for strings produced by DS (15). DS (17) shows an even more diverse set of strings produced (see Table 16). We have the following interesting facts, • The longest string produced is of length 5. • For the first time, a distribution produces all strings of length 2. 5.0.2 DS (19),DS (20),DS (21) and DS (22) Here are the strings that comprise each one of these distributions. 30 String ε 0 00 1 11 000 111 0000 1111 Probability 0.87592 0.02363 0.02363 0.02363 0.02363 0.01182 0.01182 0.00295 0.00295 Table 14: Probability distribution of DS (16). Complexity 12 10 11 9 8 Frequency 256 160 128 80 53 Table 15: Frequency of Finite-state complexity for strings produced by DS (16). String ε 0 1 00 11 000 111 0000 1111 00000 01 10 11111 Probability 0.83752 0.02806 0.02806 0.02511 0.02511 0.01773 0.01773 0.00739 0.00739 0.00148 0.00148 0.00148 0.00148 Table 16: Probability distribution of DS (17). String ε 0000 1111 000 111 Probability 0.78630 0.02109 0.02109 0.02066 0.02066 31 00 11 00000 11111 0 1 000000 111111 0000000 1111111 01 10 0101 1010 00000000 11111111 010101 101010 01010101 10101010 001 010 011 100 101 110 000000000 0000000000 00001 00010 00011 00100 00101 00110 00111 01000 01001 01010 0101010101 01011 01100 01101 01110 01111 10000 10001 0.01682 0.01682 0.01665 0.01665 0.01063 0.01063 0.00959 0.00959 0.00331 0.00331 0.00166 0.00166 0.00139 0.00139 0.00122 0.00122 0.00105 0.00105 0.00044 0.00044 0.00026 0.00026 0.00026 0.00026 0.00026 0.00026 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 32 10010 0.00009 10011 0.00009 10100 0.00009 10101 0.00009 1010101010 0.00009 10110 0.00009 10111 0.00009 11000 0.00009 11001 0.00009 11010 0.00009 11011 0.00009 11100 0.00009 11101 0.00009 11110 0.00009 111111111 0.00009 1111111111 0.00009 Table 22: Probability distribution of DS (21). String ε 0000 1111 000 111 00000 11111 000000 111111 00 11 0 1 0000000 1111111 00000000 11111111 0101 1010 01 10 010101 101010 33 Probability 0.78313 0.02180 0.02180 0.01744 0.01744 0.01727 0.01727 0.01442 0.01442 0.01416 0.01416 0.00622 0.00622 0.00587 0.00587 0.00276 0.00276 0.00160 0.00160 0.00138 0.00138 0.00125 0.00125 01010101 10101010 000000000 111111111 0000000000 1111111111 0101010101 1010101010 001 010 011 100 101 110 0001 0010 001001 0011 0100 010010 0110 011011 0111 1000 1001 100100 1011 101101 1100 1101 110110 1110 000000000000 000001 000010 000011 000100 000101 000110 000111 001000 001010 001011 001100 001101 001110 34 0.00073 0.00073 0.00043 0.00043 0.00030 0.00030 0.00026 0.00026 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00009 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 001111 010000 010001 010011 010100 010101010101 010110 010111 011000 011001 011010 011100 011101 011110 011111 100000 100001 100010 100011 100101 100110 100111 101000 101001 101010101010 101011 101100 101110 101111 110000 110001 110010 110011 110100 110101 110111 111000 111001 111010 111011 111100 111101 111110 111111111111 35 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 0.00004 Table 24: Probability distribution of DS (22). 5.0.3 Code in Python for finite-state complexity The program distributionTransducers.py is used to analyze all strings τ of length |τ | = n to determine whether τ satisfies τ = σ _ p (for σ ∈ S), and if so then the program computes TσS (p). This program generates a set of output strings (result-experiment-distribution.csv) from which we can construct an output frequency distribution. Example of execution: • python distributionTransducers.py 8 10 analyzes all strings of length 8 up to length 10. • python distributionTransducers.py 8 8 analyzes all strings of length 8. The file result-experiment-distribution.csv contains the following columns: • • • • • • • string: this corresponds to the strings τ discussed above. valid-encoding: takes value 1 in case τ = σ _ p and 0 otherwise. sigma: corresponds to string σ such that τ = σ _ p. string-p: corresponds to string p such that TσS (p) = s. num-states: number of states of transducer TσS (p). output: corresponds to string s such that TσS (p) = s. output-complexity: finite-state complexity of output string x. The program computeComplexityStrings.py computes the finite-state complexity for all strings of length n up to length m (this is the implementation of the algorithm described in [18]). This program generates the file resultcomplexity.csv which contains the following columns: • s: the string that the program is calculating the finite-state complexity for. • complexity: finite-state complexity of string s. • sigma: string σ such that TσS (p) = s. • string-p, string p such that TσS (p) = s. 36 Complexity 13 11 12 10 9 Frequency 512 320 256 160 106 Table 17: Frequency of finite-state complexity for strings produced by DS (17). String ε 000 111 00 11 0 1 0000 1111 00000 11111 000000 111111 01 10 0101 1010 0000000 001 010 010101 011 100 101 101010 110 1111111 Probability 0.80597 0.02345 0.02345 0.02274 0.02274 0.01812 0.01812 0.01706 0.01706 0.00817 0.00817 0.00284 0.00284 0.00178 0.00178 0.00107 0.00107 0.00036 0.00036 0.00036 0.00036 0.00036 0.00036 0.00036 0.00036 0.00036 0.00036 Table 18: Probability distribution of DS (19). ‘Jumpers’ as defined in [5] and [21] are apparent, those simple strings of relatively much greater length that climb the complexity ladder. 37 Complexity 15 13 14 12 11 10 Frequency 2048 1280 1024 640 424 212 Table 19: Frequency of Finite-state complexity for strings produced by DS (19). 38 String ε 0000 1111 00 000 11 111 0 00000 1 11111 000000 111111 01 10 0101 1010 0000000 1111111 010101 101010 00000000 11111111 0001 0010 0011 0100 01010101 0110 0111 1000 1001 10101010 1011 1100 1101 1110 Probability 0.80024 0.02144 0.02144 0.02092 0.02092 0.02092 0.02092 0.01185 0.01185 0.01185 0.01185 0.00593 0.00593 0.00174 0.00174 0.00157 0.00157 0.00139 0.00139 0.00070 0.00070 0.00035 0.00035 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 0.00017 Table 20: Probability distribution of DS (20). 39 Complexity 16 14 15 13 12 11 10 Frequency 4096 2560 2048 1280 848 424 218 Table 21: Frequency of finite-state complexity for strings produced by DS (20). Complexity 17 15 16 14 13 12 11 Frequency 8192 5120 4096 2560 1696 848 436 Table 23: Frequency of Finite-state complexity for strings produced by DS (21). Complexity 18 16 17 15 14 13 12 11 Frequency 16384 10240 8192 5120 3392 1696 872 436 Table 25: Frequency of Finite-state complexity for strings produced by DS (22). 40
2cs.AI
Analyzing Large Biological Datasets with an Improved Algorithm for MIC Shuliang Wang, Yiping Zhao School of Software, Beijing Institute of Technology, Beijing 100081, China Abstract: A computational framework utilizes the traditional similarity measures for mining the significant relationships in biological annotations is recently proposed by Tatiana V. Karpinets et al. [2]. In this paper, an improved approximation algorithm for MIC (maximal information coefficient) named IAMIC is suggested to perfect this framework for discovering the hidden regularities between biological annotations. Further, IAMIC is the enhanced algorithm for approximating a novel similarity coefficient MIC with generality and equitability, which makes it more appropriate for data exploration. Here it is shown that IAMIC is also applicable for identify the associations between biological annotations. Keywords: IAMIC, biological annotations, data exploration 1. INTRODUCTION With the amount of biological data dramatic increases, more and more research community will be certainly in the process of working on annotations [1]. Many biological databases is currently collecting the annotation information of different biological objects at amazing rate, which requires appropriate analysis tools to put in place. Tatiana V. Karpinets et al. [2] recently proposed a novel approach for mining modular structure, relationships and regularities in lager biological datasets. This method applied the similarity measures, such as Pearson correlation coefficient to discover the hidden associations between pairwise annotations. Here we introduce a new measure to identify the relationship between pairs of annotations. The new measure is called IAMIC, the improved approximation algorithm for maximal information coefficient, which based on the algorithm of Reshef et al. [3], and it is an enhanced solution for detecting the relationships between variables in large data sets with better tradeoffs between equitability and time. In our work, we present a comparison between the proposed algorithm and the traditional similarity measures to uncover novel regularities between biological annotations. The rest of this paper is organized as follows. In section 2, the work that has been done previously in this field is summarized. In section 3, the description of applying IAMIC in the biological annotations is presented. In section 4, the experiment results are compared to the traditional similarity algorithms used by Tatiana V. Karpinets et al. [2]. 2. RELATED WORK To satisfy the increasing requirement of computational methods that process collected biological information into new knowledge, Tatiana V. Karpinets et al. [2] suggested an approach for analyzing the records of collected biological annotations in order to discover the associated annotations. This approach firstly converted the original annotations into the type-value formatted transactions which were conductive for preserving the semantic structure of data, and then calculated the records of annotations co-occurrence in the transactions to formulate a support matrix in which each row or column shown the co-occurrence values between a specific annotation and other annotations. Further, it used the one of the traditional similarity measures Pearson correlation coefficient to mine the relationship of annotations. Tatiana V. Karpinets et al. [2] applied the method to the GOLD datasets and demonstrated the ability to identify the significant relationships between biological annotations that especially do not co-occur with each other. Particularly, they discussed it may had some limitations as other statistical analysis shown, and then expected novel measures of similarity, such as maximal information coefficient (MIC) [3] could be utilized to discover hidden regularities in collected datasets. MIC is an interesting statistical measure proposed by Reshef et al. [3], which has always been attracting the eye of many fields due to its two properties: generality and equitability [4][5]. Compared to traditional similarity measures like Pearson correlation coefficient, MIC was more appropriate for a wide range of associations, not limited to specific relationships, and more equitable for no preference to certain functional types. MIC has been applied to biological terms successfully [6] [7] [8], including clinical data, genomics and virology applications. Although MIC was a great advance, it remained some drawbacks as presented in [9] [10] [11] and was argued less practical than distance correlation [13] [14] and HHG [15]. And then the later study of Reshef et al. [12] suggested that only the approximation algorithm for MIC resulted in these existed limitations rather than the intrinsic feature of MIC. Furthermore, we have been working on the improvement of the standard approximation algorithm for MIC to come more close to the true value of MIC. In this work, we want to apply the improved algorithm for MIC called IAMIC to the framework proposed by Tatiana V. Karpinets et al. [2] to uncover novel associations between biological annotations. 3. MINEING BIOLOGICAL DATASETS WITH IAMIC Here we are going to describe the main steps of mining biological annotations with an improved algorithm for calculating MIC named IAMIC. Firstly, we will introduce the principle of this algorithm for better understanding of whole work in our paper. 3.1 THE PRINCIPLE OF IAMIC Reshef et al.[3] stated that MIC is the metric value for the relationships between two variables. And he provided a MIC calculating algotithm, like a fitting method, which encapsulates the 2D splashes with grid partition. In other words, MIC is the value related to the grid partition that best reflects the true relationship between two variables. This fitting like grid partition method has the property of equitability naturally. It means that MIC will give similar scores to different functional relationships with similar noise levels or similar R2 (coefficient of determination). To calculate the MIC value, the standard algorithm proposed by Reshef et al. [3] simply equipartition on y-axis and then search the optimal grid partition on x-axis. That algorithm seems to reveal the most possible relationship between two variables. But in fact it is just an approximation for real MIC value. And that approximation will lead to a wrong answer. The simplest way to get the real MIC value is to enumerate all the possible grid partition, and find the best fitting one. However, the time expend is too high to follow. Wang et al. [16] proposed a fast and high accuracy method to approximate the real MIC value called IAMIC. This new algorithm attempts to find a better partition on y-axis through quadratic optimization instead of violence search. Specifically, IAMIC utilizes quadratic optimization on the largest value of each row of the characteristic matrix calculated by original algorithm in [3]. It retains the generality and improves the equitability in MIC, thus it is also more appropriate for mining the novel associations hidden in collected datasets than other similarity measures like Pearson correlation coefficient which has limitations for nonlinear relationships. 3.2 THE SIMPLE WORKFLOW OF APPLICATION After brief introduction about new algorithm IAMIC, it can more clearly present the workflow of mining biological annotations with this method. In our work, we will adopt the preprocessing process of datasets introduced by Tatiana V. Karpinets et al. [2]. It transfers the table formatted records to type-value formatted annotations. For each unique annotation, we calculate the values of co-occurrence with all other annotations in input datasets in order to build one row or column of a support matrix which is the object for later analysis by IAMIC. And then make use of new similarity measure IAMIC to quantify the associations between every pairwise annotation by computing their co-occurrence values recorded in the support matrix. Finally use the biological information visualization tool Cytoscape to show the data analysis results. The details of this workflow are presented as Figure 1. Work flow: (a) –step1 (b) –step2 (c) –step3 (d) ID Super-kingdom Group 1 Bacteria Firmicutes 2 Bacteria Firmicutes 3 Bacteria Alphaproteobacteria 4 Bacteria Betaproteobacteria 5 Bacteria Other_Bacteria Gram-stain + - Shape Cocci Rod Rod Rod Spiral (a) Collected table records ID1:{ Super-kingdom: Bacteria , Group: Firmicutes , Gram-stain:+ , Shape: Cocci } ID2:{ Super-kingdom: Bacteria , Group: Firmicutes , Gram-stain:- , Shape: Rod } ID3:{ Super-kingdom: Bacteria , Group: Alphaproteobacteria , Gram-stain:- , Shape: Rod } ID4:{ Super-kingdom: Bacteria , Group: Betaproteobacteria , Gram-stain:- , Shape: Rod } ID5:{ Super-kingdom: Bacteria , Group: Other- bacteria , (b) Type-value formatted records (c) Support matrix (d) Association matrix Gram-stain:- , Shape: Spiral } Figure 1: workflow of applying IAMIC for mining biological annotations In Figure 1, we present the workflow through simple example with four annotation types and five records corresponding to them. Step 1 shows the process of converting the collected table records (Figure 1(a)) to specific type-value formatted records (Figure 1(b)), and then generates a support matrix (Figure 1(c)) for unique annotations as shown in step 2. For instance, the value in the first row and second column of the support matrix refers to the number of records where annotation super_kingdom : Bacteria and annotation Group : Firmicutes co-occur, and especially, the values in the diagonal denote the number of records where annotations co-occur with itself, which are equal to the number of times in collected table recording such annotations. Step 3 uses IAMIC measure to estimate the similarity pairs of annotations by the support matrix produced in step 2 to create an association matrix (Figure 1(d)). 4. RESULTS AND COMPARISONS We apply the method demonstrated in Chapter 3 to analyze the biological annotations document that is sample datasets in program provided by Tatiana V. Karpinets et al. [2]. Simultaneously, we also use the traditional similarity measures such as Pearson correlation coefficient, Spearman’s rank correlation coefficient or Jaccard coefficient respectively to mining the same datasets. In this section, we are going to reveal these comparision results as shown in Figure 2. The results are generated by visualization tool Cytoscape with the association matrix, of which the vertexes refer to the annotations and the edges refer to associations estimated by similarity values between the annotations. There are 6782 collected table records, which contain 1109 unique annotations. We select 308 high frequency annotations that are found more than 6 records in the database during the experiments and screen out 2304 significant associations by setting p-value threshold 0.05. The comparision results from Figure 2 apparently show some advantages for IAMIC. Firstly, the measure IAMIC has better cluster feature than others. And some tight relationships between annotations are closer, unremarkable relations are far away, which bring us a direct information about which annotations are more likely to coexist. That is useful for analyzing the biological annotations. Secondly, it is easy to find that IAMIC lead to less isolated notation. That means IAMIC could mine the deeper relationship, which other method may not. Third, the more similar length between two annotations means a more disinterested measurement. That is to say, no matter what kind of relationships are, linear, curve, or even un-functional, IAMIC reveals their real relevance degree. (a) IAMIC (b) Pearson correlation coefficient (c) Spearman’s rank correlation coefficient (d) Jaccard(cosine) coefficient Figure 2: The comparision of analysis results 5. CONCLUSIONS In this paper, we prefer to use our improved approximation algorithm for MIC called IAMIC to mine the biological annotations with the work provided by Tatiana V. Karpinets et al. [2]. We believe IAMIC is the novel similarity measure which takes advantages of data exploration than traditional approaches of similarity, and verified it is also applicative to biological annotations experimentally. Finally, we hope a more appropriate similarity measure will be proposed in our next research, and it can be more conductive to uncover the hidden associations between increasing biological information. Acknowledgements This work was supported by National Natural Science Fund of China (61173061, 71201120), and Specialized Research Fund for the Doctoral Program of Higher Education (20121101110036). Reference [1] Howe D, Rhee SY et al. (2008) The future of biocuration. Nature 455: 47-50 [2] Karpinets TV, Park BH, Uberbacher EC (2012) Analyzing large biological datasets with association networks. Nucleic Acids Res 40: 17 [3] Reshef DN, Reshef YA, Finucane HK, Grossman SR, McVean G, Turnbaugh P, Lander ES, Mitzenmacher M, Sabeti PC (2011) Detecting novel associations in large data sets. Science 334 (6062): 1518-1524 [4] Speed T (2011) A correlation for the 21st century. Science 334 (6062): 1502-1503 [5] Stolovitzky G, Qiu P, Segal E, Noble B, Troyanskaya O, Simon N, Tibshirani R, Dougherty E (2012) Finding correlations in big data. Nat Biotechnol 30: 334–335 [6] Lin C, Canhao H, Miller T, Dligach D, Plenge RM, Karlson EW, Savova G (2012) Maximal information coefficient for feature selection for clinical document classification. ICML Workshop on Machine Learning for Clinical Data. [7] Das J, Mohammed J, Yu H (2012) Genome-scale analysis of interaction dynamics reveals organization of biological networks. Bioinformatics 28 (14): 1873-1878 [8] Anderson TK, Laegreid WW, Cerutti F, Osorio FA, Nelson EA, Christopher-Hennings J, Goldberg TL (2012) Ranking viruses: measures of positional importance within networks define core viruses for rational polyvalent vaccine development. Bioinformatics 28 (12): 1624-1632 [9] Simon N, Tibshirani R (2012) Comment on “Detecting novel associations in large data sets". Unpublished. http://www-stat.stanford.edu/_tibs/reshef/comment.pdf. Accessed 11 Nov. 2012 [10] Gorfine M, Heller R, Heller Y. (2012) Comment on “Detecting novel associations in large datasets". Unpublished. http://emotion.technion.ac.il/~gorfinm/files/science6.pdf. Accessed 11 Nov 2012 [11] Kinney JB, Atwal GS (2013) Equitability, mutual information, and the maximal information coefficient. ArXiv preprint arXiv:1301.7745 [12] Reshef D, Reshef Y, Mitzenmacher M, Sabeti P (2013) Equitability analysis of the maximal information coefficient, with comparisons. ArXiv preprint arXiv:1301.6314 [cs.LG] [13] Szekely G, Rizzo M, Bakirov N (2007) Measuring and testing independence by correlation of distances. Ann Stat 35: 2769-2794 [14] Szekely GJ, Rizzo ML (2009) Brownian distance covariance. Ann Appl Stat 3 (4): 1236-1265 [15] Heller R, Heller Y, Gorfine M (2012) A consistent multivariate test of association based on ranks of distances. ArXiv preprint arXiv:1201.3522 [stat.ME] [16] Shuliang W, Yiping Z, Yue S, Wenzhong S, (2013) An Improved Approximation Algorithm for MIC.
5cs.CE
THE STATUS OF THE ZASSENHAUS CONJECTURE FOR SMALL GROUPS arXiv:1609.00042v1 [math.RA] 31 Aug 2016 ANDREAS BÄCHLE∗ , ALLEN HERMAN† , ALEXANDER KONOVALOV, LEO MARGOLIS‡ , AND GURMAIL SINGH Abstract. We identify all small groups of order up to 288 in the GAP Library for which the Zassenhaus conjecture on rational conjugacy of units of finite order in the integral group ring cannot be established by an existing method. The groups must first survive all theoretical sieves and all known restrictions on partial augmentations (the HeLP+ method). Then two new computational methods for verifying the Zassenhaus conjecture are applied to the unresolved cases, which we call the quotient method and the partially central unit construction method. To the cases that remain we attempt an assortment of special arguments available for units of certain orders and the lattice method. In the end, the Zassenhaus conjecture is verified for all groups of order less than 144 and we give a list of all remaining cases among groups of orders 144 to 287. The Zassenhaus conjecture for torsion units of integral group rings states that any torsion unit of ZG should be conjugate in CG to a unit of ±G. We will abbreviate the conjecture as ZC1. Though this conjecture was made in the 1960s, it has only been established for a few families of groups. In this article, we study the status of the conjecture for groups of small order. This effort follows an earlier one by Höfert and Kimmerle that dealt with groups of order up to 71 [15]. Using recent theoretical and computational advances, we establish ZC1 for all groups of order less than 144, and give an accurate account of the groups of order 144 to 287 for which ZC1 cannot be established by the methods currently at our disposal (see Table 1.) The first step is to apply theoretical sieves. First we eliminate all nilpotent groups [21], cyclic-by-abelian groups [5], and groups whose derived subgroup is contained in a Sylow subgroup for some prime p [11, Theorem 1.2]. Groups of the form H × C2 for which ZH satisfies ZC1 can also be eliminated [15, Corollary 3.3], since we are inducting on group order. A further type of metabelian group described in [18] can also be sieved. Let ε denote the augmentation map on CG. A unit u of ZG is normalized if ε(u) =P 1. We will denote the normalized units of ZG by V(ZG). The partial augmentation of u = g ug g P on the conjugacy class xG of x ∈ G is εx (u) = y∈xG uy . An important connection between Date: August 31, 2016. 2010 Mathematics Subject Classification. 16U60, 16S34, 20C05, 20C10. Key words and phrases. Integral group ring, groups of units, Zassenhaus conjecture. ∗ This author is a postdoctoral researcher of the FWO (Research Foundation Flanders). † This author’s research has been supported by an NSERC Discovery Grant. ‡ This author’s research has been supported by a Marie Curie grant from EU project 705112-ZC. 1 2 BÄCHLE, HERMAN, KONOVALOV, MARGOLIS, AND SINGH torsion units in V(ZG), established in [18, Theorem 2.5], says that the torsion units satisfying the property: (*) for all n ≥ 0, there is only one conjugacy class xG in G such that εx (un ) 6= 0 are precisely the torsion units that are conjugate in CG to normalized trivial units. This result has inspired an approach that investigates the potential existence of normalized torsion units with more than one nonzero partial augmentation. The Luthar-Passi method [17], its modular extension by Hertweck [12], the Cohn-Livingstone and power congruence criteria (see [4, Remark 6]), and Hertweck’s criteria that εx (u) 6= 0 implies the order of x must divide the order of u [12, Theorem 2.3] produce several restrictions on partial augmentations that a normalized torsion unit of ZG must satisfy. The first and fourth authors recently produced the GAP package help [9] that implements this collection of methods, to which we refer as HeLP+ . After the sieve, the HeLP+ -method is applied to the remaining list of groups. For this step we use the GAP package [9], which utilizes the integer optimization programs normaliz [19] and 4ti2 [20]. Each HeLP+ -solution consists of the lists of partial augmentations for a possible normalized torsion unit and its powers. A nontrivial HeLP+ -solution is one for which εx (u) 6= 0 for more than one conjugacy class xG of G. For each nontrivial HeLP+ solution, we have to show that there is no torsion unit of V(ZG) that produces these partial augmentations. As this is an inductive approach, we can also eliminate a nontrivial HeLP+ solution for G by mapping it modulo a proper normal subgroup N to a nontrivial list of partial augmentations summing in G/N. If a normalized unit u with these partial augmentations exists in ZG, then its image would be a normalized unit with nontrivial partial augmentations in Z[G/N], whose existence would already be ruled out. Elimination by this “quotient method” is quite useful in groups that have several normal subgroups. The HeLP package also gives the spectrum for the torsion unit under each irreducible representation of the group. This information is equivalent to the partial augmentation information. It is used directly in the partially central construction and in the lattice method. In the partially central construction, we directly check if the central components of u in the Wedderburn decomposition of CG lie in the image of ZG. If they do not, the unit cannot be conjugate to an element of ZG. The partially central construction and the quotient method are implemented with software (see [8]). To the groups with nontrivial HeLP+ -solutions that remain after these computational procedures, we check a few more additional criteria available for units of particular orders by hand, and finally check if the lattice method of [3] can be applied. In the end, only a handful of groups of order between 144 and 287 survive all of these tests (see Table 1.) Our notation is based on GAP’s. We will refer to the group identified by SmallGroup(n,r) in GAP’s Small Groups Library as SG(n, r). For brevity we only record one nontrivial HeLP+ -solution in each Aut(G)-orbit. We denote conjugacy classes with their labels in GAP, and also use this notation for partial augmentations, so for example, (4a, 4c, 4f ) = (2, 1, −2) means the partial augmentations of the unit would be 2 on the class of elements of order 4 GAP labels with 4a by GAP, 1 on the class 4c, −2 on the class 4f , and 0 on all other conjugacy classes. ZC FOR SMALL GROUPS 3 Table 1. Unresolved nontrivial HeLP+ -solutions among groups of order up to 287. Structure GAP Id (144,117) C32 ⋊ D16 C32 ⋊ Q16 (144,119) (150,5) C52 ⋊ S3 (160,234) C24 ⋊ D10 (192,955) C24 ⋊ D12 3 (192,973) C2 ⋊ SG(24, 8) (192,974) C23 ⋊ SG(24, 8) (192,975) C23 : SG(24, 8) (192,976) C23 : SG(24, 8) (192,1489) C23 : S4 C23 : S4 (192,1490) (216,33) C33 ⋊ Q8 (216,35) (216,37) C33 ⋊ D8 C33 ⋊ D8 (216,153) (240,91) C32 ⋊ SL(2, 3) A5 ⋊ C4 unresolved cases: PAs[powers] (6b,6d,6e)=(-1,1,1)[2b,3b] (12a,12b,12d)=(1,1,-1)[2a,3a,4a,6a] (10a,10c)=(2,-1)[2a,5a] (2a,2b,2c)=(1,-1,1) (2a,2c,2f)=(1,1,-1),(1,-1,1) (8a,8bc,8d) = (1,-1,1)[2b,4db] (8a,8bc,8d) = (1,-1,1)[2c,4a] (8a,8bc,8d) = (1,-1,1)[2a,4fc] (8a,8bc,8d) = (1,-1,1)[2b,4eb] (8a,8b,8c)=(-1,1,1)[2b,4e] (8a,8b,8c) = (-1,1,1)[2c,4d] (12a,12c,12f) = (1,1,-1)[2a,3a,4a,6a] (0,2,-1)[2a,3c,4c,6c] (12a,12b)=(2,-1)[2c,3c,4d,6e] (6a,6e,6h) = (1,1,-1)[2a,3a], (0,2,-1)[2c,3c] (3a,3d,6a)= (1,-1,1),(-1,1,1)[3c,2a] (4a,4c,4d)=(1,0,-1,1)[2a] Remarks. (i). In Table 1, the nontrivial lists of partial augmentations of the unit u and the conjugacy classes in G of powers ud for d dividing the order o(u) of u are given. Since we only seek a counterexample of minimal unit order, we assume ud is always conjugate to an element of G for any proper divisor d of o(u). We use an order convention for multiple nontrivial solutions; so (8a, 8bc, 8d) = (1, −1, 1)[2a, 4f c] in Table 1 dentoes the information for the two solutions (8a, 8b, 8d) = (1, −1, 1)[2b, 4f ] and (8a, 8c, 8d) = (1, −1, 1)[2a, 4c]. (ii). SG(24, 8) ≃ C3 ⋊ D8 is one of three groups with this structure description. (iii). SG(240, 91) is a (central) quotient of GL(2, 5). ZC1 was verified for GL(2, 5) by Bovdi and Hertweck in [4]. However, it does not follow from their arguments that ZC1 holds for G. 1. Groups of order less than 288 that survive our sieves. We abbreviate the group identified as SmallGroup(n,r) in GAP’s Small Groups Library as SG(n, r). Our first theoretical sieve removes all nilpotent, cyclic-by-abelian, and p-byabelian groups, and groups satisfying case (a) of [18, Main Theorem]. Since we are looking for a minimal counterexample, we can also eliminate groups of the form C2 × H, where the group H is known to satisfy ZC1. After this sieve, 1121 groups of order less than 288 remain. To these groups we apply the HeLP+ method. This leaves a list of 99 groups. Next, we apply the quotient method. If the list of partial augmentations in a nontrivial HeLP+ -solution maps onto a nontrivial list of partial augmentations in any proper quotient 4 BÄCHLE, HERMAN, KONOVALOV, MARGOLIS, AND SINGH of the group, it is eliminated by our inductive argument. This leaves a list of 35 groups, which appear in Table 2. Table 2. Cases remaining after sieves, HeLP+ , and the quotient method. Order 48 72 96 144 150 160 168 192 200 216 240 GAP Id #, (unit order) 30(4) 40(6) 65(8), 186(4), 227(2) 117(6), 119(12), 182(6) 5(10) 234(2,4) 43(6) 182(4), 186(16), 955(2), 958(4,8) 973(8), 974(8), 975(8), 976(8), 987(4), 990(4), 1473(4), 1478(4), 1489(8), 1490(8), 1491(4), 1492(4), 1493(2) 43(10) 33(12), 35(12), 37(6), 153 (3,6), 161 (3) 91(4) Remark. The smallest groups our methods do not cover turn out to have order 144, so it is at order 288 where the quotient method becomes ineffective. 2. Partially central unit constructions The second, third, and fifth authors have developed a computer program that can construct torsion units of CG that have the partial augmentations and powers in a given HeLP-solution (see [8] and [10]). Each nontrivial HeLP+ -solution has accompanying spectral information. A complete set of explicit irreducible representations of the group is used to construct a unit of CG with the desired spectrum, and it follows it is conjugate in CG to any torsion unit with the same partial augmentations and powers. We then take e to be the sum of all the centrally primitive idempotents of CG for which ue is central in CGe. The centrality can be observed directly from the spectral information since u must represent diagonally under these irreducible representations. Finally, we determine a subset of Ge that gives a Z-basis of ZGe, and express ue in this basis. If ue 6∈ ZGe, then no CG-conjugate of u will ever be an element of ZG, and so this HeLP+ -solution will not produce a counterexample to ZC1. When this occurs, we simply say that the unit u is partially central. When constructing units, we write e3abc for the sum of the centrally primitive idempotents of CG corresponding to χ3a , χ3b , and χ3c . If we write e124 , then this means the sum of all centrally primitive idempotents of CG corresponding to all irreducible characters of degrees 1, 2, and 4. We use, for example, g4b to denote a group element in the conjugacy class of G labelled 4b by GAP, χ3d for the 4th irreducible character of degree 3 in GAP. ZC FOR SMALL GROUPS 5 SG(48,30), order 4. There is one Aut(G)-orbit of nontrivial HeLP+ -solutions that survive the quotient method. Its partial augmentations are (4a, 4c, 4d) = (−1, 1, 1), and its square lies in the class 2a. Its spectral information shows the central part of the unit is ue13cd . χ1abcd χ2a χ2b χ3a χ3b χ3c χ3d spec(X(u)) 1, −1, i, −i (i, −i) (1, −1) (1, 1, 1) (−1, −1, −1) (i, i, −i) (i, −i, −i) Using this spectral information and explicit irreducible representations constructed in GAP for each χ ∈ Irr(G), we can construct a representative of u in CG. With our notational conventions, the u our program constructs looks like u = g4b e123cd + g2a e3a − g2a e3b . With our program we then construct an explicit Z-basis of ZGe13cd and write ue13cd in terms of this basis. When we do this the coefficients we get are non-integer rational numbers, so this means u is partially central. So the partially central unit construction completes the verification of ZC1 for this group. As we have implemented this partially central check with our software, we just give a summary of the cases where it works. SG(96,65), order 8: There is one Aut(G)-orbit of nontrivial HeLP+ -solutions that survive the quotient method: (8a, 8d, 8g) = (1, −1, 1), with u2 ∈ 4a, u4 ∈ 2a. The central part of the unit is ue13ef gh and it does not lie in ZGe13ef gh . So ZC1 holds for G. SG(96,186), order 4: There is one Aut(G)-orbit of solutions left to resolve: (4b, 4g, 4h) = (−1, 1, 1), with u2 ∈ 2b. Our calculations show its central part ue13ef gh 6∈ ZGe13ef gh . So ZC1 holds for G. SG(96,227), order 2: One orbit of solutions to resolve: (2b, 2c, 2d) = (1, 1, −1). The unit we construct is partially central. So ZC1 holds for G. SG(192,182), order 4: Only one solution is left to resolve: (4c, 4d, 4g) = (1, 1, −1), u ∈ 2a. Since ue13gh 6∈ ZGe13gh , this verifies ZC1 for G. 2 SG(192,186), order 16: One solution is left to resolve: (16a, 16e, 16k) = (1, −1, 1), u2 ∈ 8a, u4 ∈ 4a, and u8 ∈ 2a. Since ue13ijkℓmnop 6∈ ZGe13ijkℓmnop , ZC1 holds for G. SG(192,955), order 2: There are five Aut(G)-orbits of order 2 solutions left to resolve: (2a, 2b, 2c, 2d, 2f ) = (1, 0, −1, 0, 1), (0, 1, −1, 0, 1), (0, 0, 1, 1, −1), (1, 0, 1, 0, −1), (0, 0, 2, 0, −1). For the first, second, and fourth of these, the central part of the unit we construct for them lies in ZGe, so the partially central method does not resolve them. For the third and fifth, the central part of the unit does not lie in ZGe, so these cases are resolved. The other three nontrivial HeLP+ -solutions for this group remain unresolved. SG(192,958), order 4: One solution left to resolve: (4b, 4g, 4j) = (1, −1, 1), u2 ∈ 2b. The unit we construct for this solution is partially central, so this verifies ZC1 for units of order 4. 6 BÄCHLE, HERMAN, KONOVALOV, MARGOLIS, AND SINGH SG(192,958), order 8: One orbit of solutions left to resolve: (8b, 8h, 8n) = (1, −1, 1), with u2 ∈ 4a, and u4 ∈ 2b. ue13abcdghij 6∈ ZGe13abcdghij , so the unit is partially central. This verifies ZC1 for G. SG(192,987), order 4: There are four Aut(G)-orbits of HeLP+ -solutions remaining to be resolved, which we can summarize as (4abcd, 4e, 4f ) = (1, 1, −1), u2 ∈ 2a. Our construction shows all four of these units are partially central. So this verifies ZC1 for G. SG(192,990), order 4: There are three Aut(G)-orbits of nontrivial solutions to consider: (4abc, 4d, 4e) = (1, 1, −1), with u2 ∈ 2c. All three are shown to be partially central by our program. So ZC1 is verified for G. SG(192,1473), order 4: One orbit of solutions to resolve: (4b, 4h, 4k) = (1, −1, 1), u2 ∈ 2c, which is shown to be partially central by our construction. So this resolves ZC1 for G. SG(192,1478), order 4: One orbit of solutions to resolve: (4c, 4i, 4m) = (1, −1, 1), u ∈ 2b, which is shown to be partially central by our construction. So this resolves ZC1 for G. 2 SG(192,1491), order 4: One orbit of solutions to resolve: (4a, 4d, 4e) = (1, −1, 1), u2 ∈ 2c. The unit our program constructs for this solution is partially central, so this verifies ZC1 for G. SG(192,1492), order 4: There are two orbits of solutions remaining: (4ab, 4c, 4e) = (1, −1, 1), with u2 ∈ 2b. The units our program constructs for these solutions are partially central, so this verifies ZC1 for G. SG(192,1493), order 2: There is one orbit of solutions to resolve, represented by (2a, 2b, 2e) = (−1, 1, 1). The unit our program gives for this solution is partially central, so this verifies ZC1 for G. 3. Methods for units of special order. The first of the special results we can apply is Proposition 4.2 of [11] concerning p-adic conjugacy of units. An easy integral consequence of this p-adic result is the following one, relevant for the p-subgroup version of the Zassenhaus conjecture (p-ZC3): Proposition 1. Let N be a normal p-subgroup of G. Suppose U is a finite subgroup of V(ZG) which maps to 1 under the natural map modulo N. Then U is conjugate in QG to a subgroup of N. SG(160,234), order 2: There are two orbits of solutions to consider: (2a, 2b, 2c) = (1, 1, −1) and (2b, 2c, 2d) = (1, 1, −1). For the latter, the classes 2b, 2c, and 2d are contained in a normal subgroup N of order 16, so we can apply Proposition 1 to resolve it. The other solution remains unresolved. SG(192,955), order 2: The three nontrivial solutions remaining to be resolved are (2a, 2b, 2c, 2f ) = (1, 0, −1, 1), (1, 0, 1, −1), (0, 1, −1, 1). The group has a normal subgroup N of order 32 that contains the classes 2b, 2c, and 2f . An application of Proposition 1 resolves the third of these solutions. The first two remain unresolved. ZC FOR SMALL GROUPS 7 The next lemma we can use is [14, Proposition 2]: Proposition 2. Let N be a normal p-subgroup of G. Suppose u is a torsion unit of ZG with augmentation 1 whose image modulo N has strictly smaller order than u. Then εg (u) = 0 for every g ∈ G whose p-part has strictly smaller order than the p-part of u. SG(72,40), order 6: The nontrivial HeLP+ solutions lie in two distinct Aut(G)-orbits, whose partial augmentations are: (2a, 2c, 6a) = (1, 1, −1), (−1, 1, 1). The group has a normal subgroup N of order 9, and the image of u modulo N in both cases would have order 2. Both of these cases fail the criteria of Proposition 2 at the prime p = 3. SG(144,182), order 6: The same reasoning applies. There are two orbits of nontrivial solutions, with (2a, 2b, 6a) = (1, 1, −1), (−1, 1, 1). There is a normal subgroup N of order 9 for which u mod N has order 2. So these partial augmentations of u also fail Proposition 2. SG(160,234), order 4: There is one orbit of nontrivial solutions to resolve: (2a, 4a) = (2, −1), u2 ∈ 2c. As noted earlier, G has a normal subgroup of order 16 containing g2c but not g2a . Modulo N, u will have order 2, so Proposition 2 applies. So normalized torsion units of order 4 in ZG will be rationally conjugate to elements of G. SG(168,43), order 6: There are ten nontrivial HeLP+ -solutions of order 6: (3a, 3b, 6a, 6b) = (1, 2, −1, −1), (1, −1, −1, 2), (2, 1, −1, −1), (−1, 1, 2, −1), (−1, 1, 1, 0), = (1, −1, 0, 1), (2, 1, −2, 0), (1, 2, 0, −2), (3, 0, −2, 0), (0, 3, 0, −2). The group G has a nontrivial normal subgroup N of order 8 generated by the class 2a. Since |G/N| = 21, any torsion unit u of ZG that has order 6 will be mapped modulo N to an element of order 3. By applying Proposition 2 with p = 2 we can eliminate every nontrivial solution with ε3a (u) 6= 0 or ε3b (u) 6= 0. So this verifies ZC1 for G. SG(200,43), order 10: There are two Aut(G)-orbits of nontrivial HeLP+ -solutions to resolve: (2a, 2c, 10a) = (−1, 1, 1), (1, 1, −1). G has a normal subgroup of order 25, so Proposition 2 tells us the partial augmentations of a normalized torsion unit of ZG with order 10 should vanish on elements of order 2. So these solutions are resolved, and this verifies ZC1 for G. We will need another result [6, Theorem 5.3] where ZC3 for p-subgroups is known. Proposition 3. Let G be a finite solvable group, and suppose L is the last nontrivial term of the lower central series of G. If p is a prime dividing |L| for which p4 does not divide |G|, then any finite p-subgroup of normalized torsion units is rationally conjugate to a subgroup of G. Of course, the last nontrivial term of the lower central series is the smallest normal subgroup L of G for which G/L is nilpotent. SG(216,153), order 3: For this group, if L is the last non-trivial term of the lower central series of G, then |L| = 72. By Proposition 3, normalized units of ZG with 2- or 3-power order are rationally conjugate to elements of G. SG(216,161), order 3: For this group, if L is the last non-trivial term of the lower central series of G, then |L| = 27. By Proposition 3, normalized units of ZG with 3-power order are rationally conjugate to elements of G. This verifies ZC1 for this group. 8 BÄCHLE, HERMAN, KONOVALOV, MARGOLIS, AND SINGH 5. Applying the Lattice Method. Let G = SG(216, 153), the special affine group F23 ⋊ SL(2, 3). After the arguments above there remain four Aut(G)-orbits of possibly non-trivial partial augmentations for units of order 6 in V(ZG). Two of these we will exclude using the lattice method introduced in [3]. We will use parts of the character table of G and the decomposition matrix of G given in table 3. The values of all characters on classes not given in the table are integral. Table 3. Character table of G χ1a χ2a χ3a χ8a 1a 2a 3a 3c 3d 6a 1 1 1 1 1 1 2 -2 -1 -1 -1 1 3 3 0 0 0 0 8 0 2 2 -1 0 Table 4. Decomposition matrix of G for the prime 3 χ1a χ2a χ3a χ8a ϕ1a ϕ2a ϕ3a 1 0 0 0 1 0 0 0 1 1 2 1 2a is the only class of involutions in G and in both possibilities of units we are going to study u2 is rationally conjugate to elements in 3c. Denote by ζ a primitive complex 3rd root of unity. Assume first that (ε3a (u), ε3d (u), ε6a(u)) = (−2, 2, 1). Then for representations D2a and D8a corresponding to the characters χ2a and χ8a respectively we find the following eigenvalues for u. D2a (u) ∼ diag(−ζ, −ζ 2), D8a (u) ∼ diag(ζ, ζ 2, ζ, ζ 2, −1, −1, −1, −1). By a theorem of Fong [16, Corollary 10.13] we may assume that the representations D2a and D8a are realized over a 3-adically complete discrete valuation ring which is unramified over the 3-adic integers. Denote by .̄ the reduction modulo the maximal ideal of R, also with respect to modules, and let k be the residue class field of R. Let L2a and L8a be RG-lattices corresponding to D2a and D8a respectively. Then when viewed as khūi-modules we have − − ∼ + by [3, Proposition 1.3] that L̄2a ∼ = L̄+ 2a ⊕ L̄2a and L̄8a = L̄8a ⊕ L̄8a are such that all the + + − composition factors of L̄2a and L̄8a are trivial while the composition factors of L̄− 2a and L̄8a are non-trivial. Moreover by [3, Propositions 1.3, 1.4] we know that L̄2a is a 2-dimensional indecomposable module while L̄− 8a is the direct sum of four 1-dimensional summands. But − since L̄2a is a sub- or factor module of L̄− 8a by the decomposition numbers in table 4, this contradicts the existence of u. Next assume (ε3a (u), ε3d(u), ε6a (u)) = (2, −2, 1). We will use similar notation as in the paragraph above. Then D3a (u) ∼ diag(1, ζ, ζ 2), D8a (u) ∼ diag(−ζ, −ζ 2, −ζ, −ζ 2 , 1, 1, 1, 1). ZC FOR SMALL GROUPS 9 Then viewed as khūi-modules we conclude, again by [3, Propositions 1.3, 1.4], that L̄+ 3a contains a direct indecomposable summand of dimension at least 2 while L̄+ is the direct 8a sum of four 1-dimensional modules. This again contradicts the decomposition numbers given in table 4. References [1] A. Bächle, A. Herman, A. Konovalov, L. Margolis, and G. Singh, ZCTU Source Code, https://github.com/drallenherman/ZCTU-Source-Code [2] A. Bächle and L. Margolis, HeLP – A GAP-package for torsion units in integral group rings, arXiv:1507.08174v3 [math.RT]. [3] A. Bächle and L. Margolis, Rational conjugacy of torsion units in integral group ring of non-solvable groups, Proc. Edinburgh Math. Soc., to appear; arXiv:1305.7419v3[mathRT]. [4] V. Bovdi and M. Hertweck, Zassenhaus conjecture for central extensions of Sn , J. Group Theory, 11 (1), (2008), 6374. [5] M. Caicedo, L. Margolis, and Á. del Rı́o, Zassenhaus conjecture for cyclic-by-abelian groups, J. London Math. Soc., (2), 88 (1), (2013), 65-78. [6] M. Dokuchaev and S. Juriaans, Finite subgroups in integral group rings, Can. J. Math., 48 (6), 1996), 1170-1179. [7] The GAP Group, GAP – Groups, Algorithms, and Programming, Version 4.7.7; 2015, http://www.gap-system.org. [8] A. Bächle, A. Herman, A. Konovalov, L. Margolis, and G. Singh, ZCTU Source Code, https://github.com/alex-konovalov/ZCTU [9] A. Bächle and L. Margolis, HeLP – A GAP-package for torsion units in integral group rings, arXiv:1507.08174v3 [math.RT]. [10] A. Herman and G. Singh, Revisiting the Zassenhaus Conjecture on torsion units for the integral group rings of small groups, Proceedings. Math. Sciences. Indian Academy of Sciences, 125 (2), (2015), 167172. [11] M. Hertweck, On the torsion units of some integral group rings, Algebra Colloq., 13 (2), (2006), 329-348. [12] M. Hertweck, Partial augmentations and Brauer character values of torsion units in group rings, arXiv:math/0612429v2 [math.RA]. [13] M. Hertweck, Torsion units in integral group rings of certain metabelian groups, Proc. Edinburgh Math. Soc., 51, (2008), 363-385. [14] M. Hertweck, The orders of torsion units in integral group rings of finite solvable groups, Comm. Algebra, 36 (10), (2008), 3585-3588. [15] C. Höfert and W. Kimmerle, On torsion units of integral group rings of groups of small order. Groups, rings and group rings, 243252, Lect. Notes Pure Appl. Math., 248, Chapman & Hall/CRC, Boca Raton, FL, 2006. [16] I. M. Isaacs, Character theory of finite groups. Pure and Applied Mathematics, No. 69. Academic Press, New York-London, 1976. [17] I. S. Luthar and I. B. S. Passi, Zassenhaus conjecture for A5 . Proc. Indian Acad. Sci. Math. Sci. 99 (1989), no. 1, 15. [18] Z. Marciniak, J. Ritter, S. Sehgal, and A. Weiss, Torsion units in integral group rings of some metabelian groups, II, J. Number Theory, 25, (1987), 340-352. [19] normaliz W. Bruns, B. Ichim, and C. Söger, The power of pyramid decomposition in Normaliz. J. Symbolic Comput., 74 (2016), 513536. [20] 4ti2 team, 4ti2 – A software package for algebraic, geometric and combinatorial problems on linear spaces. Available at www.4ti2.de. [21] A. Weiss, Torsion units in integral group rings, J. Reine Angew. Math., 415 (1991), 175-187. 10 BÄCHLE, HERMAN, KONOVALOV, MARGOLIS, AND SINGH Vakgroep Wiskunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium E-mail address: [email protected] Department of Mathematics and Statistics, University of Regina, Regina, Canada S4S 0A2 E-mail address: [email protected] School of Computer Science, University of St. Andrews, North Haugh, St. Andrews, Fife, KY16 SX9, U.K. E-mail address: [email protected] Departamento de matemáticas, Facultad de matemáticas, Universidad de Murcia, 30100 Murcia, Spain E-mail address: [email protected] Department of Mathematics and Statistics, University of Regina, Regina, Canada S4S 0A2 E-mail address: [email protected]
4math.GR
Latent nested nonparametric priors arXiv:1801.05048v1 [math.ST] 15 Jan 2018 Federico Camerlenghi Department of Economics, Management and Statistics, University of Milano–Bicocca and David B. Dunson Department of Statistical Science, Duke University and Antonio Lijoi and Igor Prünster∗ Department of Decision Sciences and BIDSA, Bocconi University and Abel Rodrı́guez Department of Applied Mathematics and Statistics, University of California at Santa Cruz ∗ A. Lijoi and I. Prünster are supported by the European Research Council (ERC) through StG ”N-BNP” 306406 1 Abstract Discrete random structures are important tools in Bayesian nonparametrics and the resulting models have proven effective in density estimation, clustering, topic modeling and prediction, among others. In this paper, we consider nested processes and study the dependence structures they induce. Dependence ranges between homogeneity, corresponding to full exchangeability, and maximum heterogeneity, corresponding to (unconditional) independence across samples. The popular nested Dirichlet process is shown to degenerate to the fully exchangeable case when there are ties across samples at the observed or latent level. To overcome this drawback, inherent to nesting general discrete random measures, we introduce a novel class of latent nested processes. These are obtained by adding common and group-specific completely random measures and, then, normalising to yield dependent random probability measures. We provide results on the partition distributions induced by latent nested processes, and develop an Markov Chain Monte Carlo sampler for Bayesian inferences. A test for distributional homogeneity across groups is obtained as a by product. The results and their inferential implications are showcased on synthetic and real data. Keywords: Bayesian nonparametrics; Completely random measures; Dependent nonparametric priors; Heterogeneity; Mixture models; Nested processes. 1 Introduction Data that are generated from different (though related) studies, populations or experiments are typically characterised by some degree of heterogeneity. A number of Bayesian nonparametric models have been proposed to accommodate such data structures, but analytic complexity has limited understanding of the implied dependence structure across samples. The spectrum of possible dependence ranges from homogeneity, corresponding to full exchangeability, to complete heterogeneity, corresponding to unconditional independence. It is clearly desirable to construct a prior that can cover this full spectrum, leading to a posterior that can appropriately adapt to the true dependence structure in the available data. This problem has been partly addressed in several papers. In Lijoi et al. (2014) a class of random probability measures is defined in such a way that proximity to full exchangeability or independence is expressed in terms of a r0, 1s–valued random variable. In the same spirit, a model decomposable into idiosyncratic and common components is devised in Müller et al. (2004). Alternatively, approaches based on Pólya tree priors are developed in Ma 2 & Wong (2011), Holmes et al. (2015), Filippi & Holmes (2017), while a multi–resolution scanning method is proposed in Soriano & Ma (2017). In Bhattacharya & Dunson (2012) Dirichlet process mixtures are used to test homogeneity across groups of observations on a manifold. A popular class of dependent nonparametric priors that fits this framework is the nested Dirichlet process of Rodrı́guez et al. (2008), which aims at clustering the probability distributions associated to d populations. For d “ 2 this model is ind Xi,1 , Xj,2 | pp̃1 , p̃2 q „ p̃1 ˆ p̃2 pp̃1 , p̃2 q | q̃ „ q̃ 2 , q̃ “ ÿ ωi δGi (1) iě1 where the random elements X` “ pXi,` qiě1 , for ` “ ř 1, 2, take values in a space X, the sequences pωi qiě1 and pGi qiě1 are independent, with iě1 ωi “ 1 almost surely, and the Gi ’s are i.i.d. random probability measures on X such that ÿ iid Gi “ wt,i δθt,i , θt,i „ P (2) tě1 for some non–atomic probability measure P on X. In Rodrı́guez et al. (2008) it is assumed that q̃ and the Gi ’s are realizations of Dirichlet processes while in Rodrı́guez & Dunson (2014) it is assumed they are from a generalised Dirichlet process introduced in Hjort (2000). Due to discreteness of q̃, one has p̃1 “ p̃2 with positive probability allowing for clustering at the level of the populations’ distributions and implying X1 „ X2 in such cases. The nested Dirichlet process has been widely used in a rich variety of applications, but it has an unappealing characteristic that provides motivation for this article. In particular, if X1 and X2 share at least one value, then the posterior distribution of pp̃1 , p̃2 q degenerates on tp̃1 “ p̃2 u, forcing homogeneity across the two samples. This occurs also in nested Dirichlet process mixture models in which the Xi,` are latent, and is not specific to the Dirichlet process but is a consequence of nesting discrete random probabilities. To overcome this major limitation, we propose a more flexible class of latent nested processes, which preserve heterogeneity a posteriori, even when distinct values are shared by different samples. Latent nested processes define p̃1 and p̃2 in (1) as resulting from normalisation of an additive random measure model with common and idiosyncratic components, the latter with nested structure. Latent nested processes are shown to have appealing distributional properties. In particular, nesting corresponds, in terms of the induced partitions, to a convex combination of full exchangeability and unconditional independence, the two extreme cases. This leads naturally to methodology for testing equality of distributions. 3 2 2.1 Nested processes Generalising nested Dirichlet processes via normalised random measures We first propose a class of nested processes that generalise nested Dirichlet processes by replacing the Dirichlet process components with a more flexible class of random measures. The idea is to define q̃ in (1) in terms of normalised completely random measures on the space P of probability measures on X. Let µ̃ be an almost ř surely finite completely random measure without fixed points of discontinuity, i.e. µ̃ “ iě1 Ji δGi where Gi are i.i.d. random probability measures on X with some fixed distribution Q on P. The corresponding Lévy measure on R` ˆ P is assumed to factorise as νpds, dpq “ c ρpsq ds Qpdpq (3) ş8 where ρ is some non–negative function such that 0 mint1, su ρpsq ds ă 8 and c ą 0. Since such a ν characterises µ̃ through its Lévy-Khintchine representation ż8´ ¯ ı ” ı ” ´λµ̃pAq 1 ´ e´λs ρpsq ds “: e´c QpAq ψpλq (4) E e “ exp ´ c QpAq 0 for any measurable A Ă P, we use the notation µ̃ „ CRMrν; Ps. The function ψ in (4) is also referred to as the Laplace exponent of µ̃. For a more extensive treatment ş8 of completely random measures, see Kingman (1993). If one additionally assumes that 0 ρpsq ds “ 8, then µ̃pPq ą 0 almost surely and we can define q̃ in (1) as µ̃ d (5) q̃ “ µ̃pPq This is known as a normalised random measure with independent increments, introduced in Regazzini et al. (2003), and is denoted as q̃ „ NRMIrν; Ps. The baseline measure, Q, of d µ̃ in (3) is, in turn, the probability distribution of q̃0 „ NRMIrν0 ; Xs, with q̃0 “ µ̃0 {µ̃0 pXq and µ̃0 having Lévy measure ν0 pds, dxq “ c0 ρ0 psq ds Q0 pdxq (6) ş8 ş8 for some non–negative function ρ0 such that 0 mint1, su ρ0 psq ds ă 8 and 0 ρ0 psqds “ 8. Moreover, Q0 is a non–atomic probability measure on X and ψ0 is the Laplace exponent of µ̃0 . The resulting general class of nested processes is such that pp̃1 , p̃2 q|q̃ „ q̃ 2 and is indicated by pp̃1 , p̃2 q „ NPpν0 , νq. The nested Dirichlet process of Rodrı́guez et al. (2008) is recovered by specifying µ̃ and µ̃0 to be gamma processes, namely ρpsq “ ρ0 psq “ s´1 e´s , so that both q̃ and q̃0 are Dirichlet processes. 4 2.2 Clustering properties of nested processes A key property of nested processes is their ability to cluster both population distributions and data from each population. In this subsection, we present results on: (i) the prior probability that p̃1 “ p̃2 and the resulting impact on ties at the observations’ level; (ii) equations for mixed moments as convex combinations of fully exchangeable and unconditionally independent special cases; and (iii) a similar convexity result for partially exchangeable partition probability function. The probability distribution of an exchangeable partition depends only on the numbers of objects in each group; the exchangeable partition probability function is the probability of observing a particular partition as a function of the group counts. Partial exchangeability is exchangeability within samples; the partially exchangeable partition probability function depends only on the number of objects in each group that are idiosyncratic to a group and common. Simple forms for the partially exchangeable partition probability function not only provide key insights into the clustering properties but also greatly facilitate computation. Before stating result (i), define ż8 ż8 q ´us p0q s e ρpsq ds, τq puq “ sq e´us ρ0 psq ds, τq puq “ 0 for any u ą 0, and agree that τ0 puq ” 0 p0q τ0 puq ” 1. Proposition 1. If pp̃1 , p̃2 q „ NPpν0 , νq, c “ QpPq and c0 “ Q0 pXq, then ż8 π1 :“ Ppp̃1 “ p̃2 q “ c u e´cψpuq τ2 puq du (7) 0 and the probability that any two observations from the two samples coincide equals ż8 p0q PpXj,1 “ Xk,2 q “ π1 c0 u e´c0 ψ0 puq τ2 puq ds ą 0. (8) 0 This result shows that the probability of p̃1 and p̃2 coinciding is positive, as desired, but also that this implies a positive probability of ties at the observations’ level. Moreover, (7) only depends on ν and not ν0 , since the latter acts on the X space. In contrast, the probability that any two observations Xj,1 and Xk,2 from the two samples coincide given in (8) depends also on ν0 . If pp̃1 , p̃2 q is a nested Dirichlet process, which corresponds to ρpsq “ ρ0 psq “ e´s {s, one obtains π1 “ 1{pc ` 1q and PpX1,1 “ X1,2 q “ π1 {pc0 ` 1q. The following proposition [our result (ii)] provides a representation of mixed moments as a convex combination of full exchangeability and unconditional independence between samples. 5 Proposition 2. If pp̃1 , p̃2 q „ NPpν0 , νq and π1 “ Ppp̃1 “ p̃2 q is as in (7), then ”ż ı E f1 pp1 qf2 pp2 qq̃pdp1 qq̃pdp2 q P2X ż “ π1 ż f1 ppqf2 ppqQpdpq ` p1 ´ π1 q PX (9) ż f1 ppqQpdpq PX f2 ppqQpdpq PX for all measurable functions f1 , f2 : P Ñ R` . This convexity property is a key property of nested processes. The component with weight 1 ´ π1 in (9) accounts for heterogeneity among data from different populations and it is important to retain this component also a posteriori in (1). Proposition 2 is instrumental to obtain our main result (iii) characterizing pn q the partially exchangeable random partition induced by X1 1 “ pX1,1 , . . . , Xn1 ,1 q and pn q X2 2 “ pX1,2 , . . . , Xn2 ,2 q in (1). To fix ideas consider a partition of the ni data of sampn q pn q ple Xi i into ki specific groups and k0 groups shared with sample Xj j (j ‰ i) with corresponding frequencies ni “ pn1,i , . . . , nki ,i q and qi “ pq1,i , . . . , qk0 ,i q. For example, p7q p4q X1 “ p0.5, 2, ´1, 5, 5, 0.5, 0.5q and X2 “ p5, ´2, 0.5, 0.5q yield a partition of n1 ` n2 “ 11 objects into 5 groups of which k1 “ 2 and k2 “ 1 are specific to the first and the second sample, respectively, and k0 “ 2 are shared. Moreover, the frequencies are n1 “ p1, 1q, n2 “ p1q, q1 “ p3, 2q and q2 “ p2, 1q. Let us start by analyzing the two extreme cases. For the fully exchangeable case (in the sense of exchangeability holding true across both samples), one obtains the exchangeable partition probability function ż8 ck0 pN q uN ´1 e´c0 ψ0 puq Φk pn1 , n2 , q1 ` q2 q “ ΓpN q 0 (10) k1 k2 k0 ź ź ź p0q p0q p0q ˆ τnj,1 puq τni,2 puq τqr,1 `qr,2 puq du j“1 r“1 i“1 ř having set N “ n1 ` n2 , k “ k0 ` k1 ` k2 and |a| “ pi“1 ai for any vector a “ pa1 , . . . , ap q P Rp with p ě 2. The marginal exchangeable partition probability functions for the individual sample ` “ 1, 2 are pn q Φk0 ``k` pn` , q` q pc0 qk0 `k` “ Γpn` q ż8 u n` ´1 0 e ´c0 ψ0 puq k ź̀ j“1 6 τnp0q puq j,` k0 ź r“1 τqp0q puq du r,` (11) Both (10) and (11) hold true with the constraints řk` j“1 nj,` ` řk0 r“1 qr,` “ n` and 1 ď k` `k0 ď p0q n` , for each ` “ 1, 2. Finally, the convention τ0 ” pnq pnq of the function Φk is zero, then it reduces to Φk´1 . 1 implies that whenever an argument p6q p6q For example, Φ3 p0, 2, 4q “ Φ2 p2, 4q. Both (10) and (11) solely depend on the Lévy intensity of the completely random measure and can be made explicit for specific choices. We are now ready to state our main result (iii). pn q pn q Theorem 1. The random partition induced by the samples X1 1 and X2 2 drawn from pp̃1 , p̃2 q „ NPpν0 , νq, according to (1), is characterised by the partially exchangeable partition probability function pN q pN q Πk pn1 , n2 , q1 , q2 q “ π1 Φk pn1 , n2 , q1 ` q2 q ` p1 ´ pn `|q |q pn `|q |q π1 q Φk0 1`k1 1 pn1 , q1 qΦk0 2`k2 2 pn2 , q2 q1t0u pk0 q (12) The two independent exchangeable partition probability functions in the second summand on the right–hand side of (12) are crucial for accounting for the heterogeneity across samples. However, the result shows that one shared value, i.e. k0 ě 1, forces the random partition to degenerate to the fully exchangeable case in (10). Hence, a single tie forces the two samples to be homogeneous, representing a serious limitation of all nested processes including the nDP special case. This result shows that degeneracy is a consequence of combining simple discrete random probabilities with nesting. In the following section, we develop a generalisation that is able to preserve heterogeneity in presence of ties between the samples. 3 Latent nested processes To address degeneracy of the partially exchangeable partition probability function in (12), we look for a model that, while still able to cluster random probabilities, can also take into pn q pn q account heterogeneity of the data in presence of ties between X1 1 and X2 2 . The issue is relevant also in mixture models where p̃1 and p̃2 are used to model partially exchangeable latent variables such as, e.g., vectors of means and variances in normal mixture models. To see this, consider a simple density estimation problem, where two-sample data of sizes n1 “ n2 “ 100 are generated from Xi,1 „ 1 1 Np5, 0.6q ` Np10, 0.6q 2 2 Xj,2 „ 7 1 1 Np5, 0.6q ` Np0, 0.6q. 2 2 This can be modeled by dependent normal mixtures with mean and variance specified in terms of a nested structure as in (1). The results, carried out by employing the algorithms detailed in Section 4, show two possible outcomes: either the model is able to estimate well the two bimodal marginal densities, while not identifying the presence of a common component, or it identifies the shared mixture component but does not yield a sensible estimate of the marginal densities, which both display three modes. The latter situation is displayed in Figure 1: once the shared component p5, 0.6q is detected, the two marginal distributions are considered identical as the whole dependence structure boils down to exchangeability across the two samples. (a) (b) Figure 1: Nested σ–stable mixture models: Estimated densities (blue) and true densities p100q p100q (red), for X1 in Panel (a) and for X2 in Panel (b). This critical issue can be tackled by a novel class of latent nested processes. Specifically, we introduce a model where the nesting structure is placed at the level of the underlying completely random measures, which leads to greater flexibility while preserving tractability. In order to define the new process, let M be the space of boundedly finite measures on X and Q the probability measure on M induced by µ̃0 „ CRMrν0 ; Xs, where ν0 is as in (6). 8 Hence, for any measurable subset A of X ż8´ ! ¯ ) ” ı ż ´λ mpAq ´λs ´λµ̃0 pAq e Qpdmq “ exp ´ c0 Q0 pAq 1´e ρ0 psq ds . E e “ M 0 Definition 1. Let q̃ „ NRMIrν; Ms, with νpds, dmq “ cρpsqds Qpdmq. Random probability measures pp̃1 , p̃2 q are a latent nested process if p̃` “ µ` ` µS µ` pXq ` µS pXq ` “ 1, 2, (13) where pµ1 , µ2 , µS q | q̃ „ q̃ 2 ˆ q̃S and q̃S is the law of a CRMrν0˚ ; Xs, where ν0˚ “ γ ν0 , for some γ ą 0. Henceforth, we will use the notation pp̃1 , p̃2 q „ LNPpγ, ν0 , νq. Furthermore, since p̃i “ wi µS µi ` p1 ´ wi q , µi pXq µS pXq where wi “ µi pXq , µS pXq ` µi pXq (14) each p̃i is a mixture of two components: an idiosyncratic component µi {µi pXq and a shared component µS {µS pXq. Here µS preserves heterogeneity across samples even when shared values are present. The parameter γ in the intensity ν0˚ tunes the effect of such a shared CRM. One recovers model (1) as γ Ñ 0. A generalisation to nested completely random measures of the results given in Propositions 1 and 2 is provided in the following proposition, whose proof is omitted. Proposition 3. If pµ1 , µ2 q | q̃ „ q̃ 2 , where q̃ „ NRMIrν; Ms as in Definition 1, then ż8 ˚ π1 “ Ppµ1 “ µ2 q “ c u e´cψpuq τ2 puq du (15) 0 and ”ż E M2 ż ı ˚ f1 pm1 q f2 pm2 q q̃ pdm1 , dm2 q “ π1 f1 pmq f2 pmq Qpdmq 2 M ` p1 ´ π1˚ q 2 ż ź `“1 for all measurable functions f1 , f2 : M Ñ R` . 9 M (16) f` pmq Qpdmq Proposition 4. If pp̃1 , p̃2 q „ LNPpγ, ν0 , νq, then Ppp̃1 “ p̃2 q “ Ppµ1 “ µ2 q. Proposition 4, combined with tp̃1 “ p̃1 u “ tµ1 “ µ2 u Y ptp̃1 “ p̃2 u X tµ1 ‰ µ2 uq, entails Prtp̃1 “ p̃2 u X tµ1 ‰ µ2 us “ 0 namely Pptp̃1 “ p̃2 u X tµ1 “ µ2 uq ` Pptp̃1 ‰ p̃2 u X tµ1 ‰ µ2 uq “ 1 and, then, the random variables 1 tp̃1 “ p̃2 u and 1 tµ1 “ µ2 u coincide almost surely. As a consequence the posterior distribution of 1 tµ1 “ µ2 u can be readily employed to test equality between the distributions of the two samples. Further details are given in Section 5. For analytic purposes, it is convenient to introduce an augmented version of the latent nested process, which includes latent indicator variables. In particular, pXi,1 , Xj,2 q | pp̃1 , p̃2 q „ p̃1 ˆ p̃2 , with pp̃1 , p̃2 q „ LNPpγ, ν0 , νq if and only if ind pXi,1 , Xj,2 q | pζi,1 , ζj,2 , µ1 , µ2 , µS q „ pζ1,i ˆ p2ζ2,j (17) pζi,1 , ζj,2 q | pµ1 , µ2 , µS q „ Bernpw1 q ˆ Bernpw2 q pµ1 , µ2 , µS q | pq̃, q̃S q „ q̃ 2 ˆ q̃S . The latent variables ζi,` indicate which random probability measure between p` and p0 “ pS generates each Xi,` , for i “ 1, . . . , n` . pn q pn q Theorem 2. The random partition induced by the samples X1 1 and X2 2 drawn from pp̃1 , p̃2 q „ LNPpγ, ν0 , νq, as in (17), is characterised by the partially exchangeable partition probability function pN q Πk pn1 , n2 , q1 , q2 q “ π1˚ ż8 ck0 p1 ` γqk ΓpN q k 2 ź̀ ź sN ´1 e´p1`γqc0 ψ0 psq ˆ 0 `“1 j“1 ` p1 ´ π1˚ q ÿ τnp0q psq j,` k0 ź p0q τqj,1 `qj,2 psqds j“1 I2 pn1 , n2 , q1 ` q2 , ζ ˚ q p˚q where ck0 γ k´k̄ I2 pn1 , n2 , q1 ` q2 , ζ q “ Γpn1 qΓpn2 q ż8ż8 un1 ´1 v n2 ´1 e´γc0 ψ0 pu`vq´c0 pψ0 puq`ψ0 pvqq ˚ 0 0 10 (18) k1 ź ˆ τnp0q pu j,1 ` p1 ´ ˚ qvq ζj,1 k2 ź τnp0q pp1 j,2 ´ ˚ qu ζj,2 p0q τqj,1 `qj,2 pu ` vqdudv j“1 j“1 j“1 ` vq k0 ź and the sum in the second summand on the right hand side of (18) runs over all the possible labels ζ ˚ P t0, 1uk1 `k2 . The partially exchangeable partition probability function (18) is a convex linear combination of an exchangeable partition probability function corresponding to full exchangeability across samples and one corresponding to unconditional independence. Heterogeneity across samples is preserved even in the presence of shared values. The above result is stated in full generality, and hence may seem somewhat complex. However, as the following examples show, when considering stable or gamma random measures, explicit expressions are obtained. When γ Ñ 0 the expression (18) reduces to (12), which means that the nested process is achieved as a special case. Example 1. Based on Theorem 2 we can derive an explicit expression of the partition structure of latent nested σ–stable processes. Suppose ρpsq “ σ s´1´σ {Γp1 ´ σq and ρ0 psq “ σ0 s´1´σ0 {Γp1 ´ σ0 q, for some σ and σ0 in p0, 1q. In such a situation it is easy to see that p0q π1˚ “ 1 ´ σ, τq puq “ σ0 p1 ´ σ0 qq´1 uσ0 ´q and ψ0 puq “ uσ0 . Moreover let c0 “ c “ 1, since the total mass of a stable process is redundant under normalization. If we further set ż1 wH1 ´1 p1 ´ wqH2 ´1 dw, Jσ0 ,γ pH1 , H2 ; Hq :“ σ0 ` p1 ´ wqσ0 sH 0 rγ ` w for any positive H1 , H2 and H, and k k0 2 ź̀ ź ź ξa pn1 , n2 , q1 ` q2 q :“ p1 ´ aqnj,` ´1 p1 ´ aqqj,1 `qj,2 ´1 , `“1 j“1 j“1 for any a P r0, 1q, then the partially exchangeable partition probability function in (18) may be rewritten as " p1 ´ σq σ pN q k´1 ` Πk pn1 , n2 , q1 , q2 q “ σ0 Γpkqξσ0 pn1 , n2 , q1 ` q2 q ΓpN q Γpn1 qΓpn2 q , . ÿ ˆ γ k´k̄ Jσ0 ,γ pn1 ´ n̄1 ` k̄1 σ0 , n2 ´ n̄2 ` k̄2 σ0 ; kq . p˚q 11 The sum with respect to ζ ˚ can be evaluated and it turns out that ” Bpk1 σ0 , k2 σ0 q σ0k´1 Γpkq ξσ0 pn1 , n2 , q1 ` q2 q 1 ´ σ ` σγ k0 ` q2 q “ Γpnq Bpn1 , n2 q śk2 ż 1 śk1 ni,2 ´σ0 nj,1 ´σ0 ı q i“1 r1 ` γp1 ´ wqs j“1 p1 ` γw Betapdw; k1 σ0 , k2 σ0 q ˆ ” ık 0 γ ` wσ0 ` p1 ´ wqσ0 pnq Πk pn1 , n2 , q1 where Betap ¨ ; a, bq stands for the beta distribution with parameters a and b, while Bpp, qq is the beta function with parameters p and q. As it is well–known, σ0k´1 Γpkq ξσ0 pn1 , n2 , q1 ` q2 q{ΓpN q is the exchangeable partition probability function of a normalised σ0 –stable process. Details on the above derivation, as well as for the following example, can be found in the Appendix. p0q Example 2. Let ρpsq “ ρ0 psq “ e´s {s. Recall that τq puq “ Γpqq{pu ` 1qq and ψ0 puq “ logp1 ` uq, furthermore π1˚ “ 1{p1 ` cq by standard calculations. From Theorem 2 we obtain the partition structure of the latent nested Dirichlet process " p1 ` γqk 1 pN q k Πk pn1 , n2 , q1 , q2 q “ ξ0 pn1 , n2 , q1 ` q2 qc0 1 ` c pc0 p1 ` γqqN , . k´k̄ ÿ c γ F pc ` n̄ , α, n ; α ` n , β ` n ; 1q ` 3 2 0 2 1 2 1 1`c pαqn2 pβqn1 p˚q where α “ pγ ` 1qc0 ` n1 ´ n̄1 , β “ c0 p2 ` γq and 3 F2 is the generalised hypergeometric function. In the same spirit as in the previous example, the first element in the linear convex combination above ck0 p1 ` γqk ξ0 pn1 , n2 , q1 ` q2 q{pc0 p1 ` γqqN is nothing but the Ewens’ sampling formula, i.e. the exchangeable partition probability function associated to the Dirichlet process whose base measure has total mass c0 p1 ` γq. 4 Markov Chain Monte Carlo algorithm We develop a class of Markov Chain Monte Carlo algorithms for posterior computation in latent nested process models relying on the partially exchangeable partition probability functions in Theorem 2, as they tended to be more effective. Moreover, the sampler is presented in the context of density estimation, where pn1 q Xj,` | pθ1 pn2 q , θ2 ind q „ hp ¨ ; θj,` q 12 ` “ 1, 2 pn1 q pXi,1 , Xj,2 q | pθ1 pn2 q , θ2 ind q „ hp ¨ ; θi,1 q ˆ hp ¨ ; θj,2 q pn q and the vectors θ` ` “ pθ1,` , . . . , θn` ,` q, for ` “ 1, 2 and with each θi,` taking values in Θ Ă Rb , are partially exchangeable and governed by a pair of pp̃1 , p̃2 q as in (17). The pn q pn q discreteness of p̃1 and p̃2 entails ties among the latent variables θ1 1 and θ2 2 that give rise to k “ k1 ` k2 ` k0 distinct clusters identified by pn q pn q pn q pn q • the k1 distinct values specific to θ1 1 , i.e. not shared with θ2 2 . These are denoted ˚ as θ1˚ :“ pθ1,1 , . . . , θk˚1 ,1 q, with corresponding frequencies n1 and labels ζ1˚ ; • the k2 distinct values specific to θ2 2 , i.e. not shared with θ1 1 . These are denoted ˚ , . . . , θk˚2 ,2 q, with corresponding frequencies n2 and labels ζ2˚ ; as θ2˚ :“ pθ1,2 pn q pn q ˚ • the k0 distinct values shared by θ1 1 and θ2 2 . These are denoted as θ0˚ :“ pθ1,0 , . . . , θk˚0 ,0 q, pn q with q` being their frequencies in θ` ` and shared labels ζ0˚ . As a straightforward consequence of Theorem 2, one can determine the joint distribution of the data X, the corresponding latent variables θ and labels ζ as follows pN q f px | θq Πk pn1 , n2 , q1 , q2 q k 2 ź̀ ź ˚ Q0 pdθj,` q (19) `“0 j“1 pN q where Πk ˚ ˚ u, u and Cr,`,0 :“ ti : θi,` “ θr,0 is as in (18) and, for Cj,` :“ ti : θi,` “ θj,` f px | θq “ k 2 ź̀ ź ź ˚ hpxi,` ; θj,` q k0 ź ź ˚ hpxi,` ; θr,0 q. r“1 iPCr,`,0 `“1 j“1 iPCj,` We do now specialise (19) to the case of latent nested σ–stable processes described in pn q Example 1. The Gibbs sampler is described just for sampling θ1 1 , since the structure pn q is replicated for θ2 2 . To simplify the notation, v ´j denotes the random variable v after the removal of θj,1 . Moreover, with T “ pX, θ, ζ, σ, σ0 , φq, weşlet T´θj,1 stand for T after deleting θj,1 , I “ 1tp̃1 “ p̃2 u and Q˚j pdθq “ hpxj,1 ; θq Q0 pdθq{ Θ hpxj,1 ; θq Q0 pdθq. Here φ denotes a vector of hyperparameters entering the definition of the base measure Q0 . The updating structure of the Gibbs sampler is as follows (1) Sample θj,1 from ÿ Ppθj,1 P dθ | T´θj,1 , I “ 1q “ w0 Q˚j,1 pdθq ` 13 wi,0 δtθ˚,´j u pdθq i,0 t ˚,´j i: ζi,0 “ζj,1 u ÿ ÿ wi,1 δtθ˚,´j u pdθq ` ` wi,2 δtθ˚,´j u pdθq i,1 ˚,´j i: ζi,1 “ζj,1 t u i,2 t ˚,´j i: ζi,2 “ζj,1 u ÿ Ppθj,1 P dθ | T´θj,1 , I “ 0q “ w01 Q˚j,1 pdθq ` ” ` 1t0u pζj,1 q w0 9 i,1 ˚,´j “ζj,1 u ti: ζi,1 k0 ı ÿ 1 1 wi,2 δtθ˚,´j u pdθq ` wr,0 δtθ˚,´j u pdθq ÿ i,2 ˚,´j “0u ti: ζi,2 where 1 wi,1 δtθ˚,´j u pdθq γ 1´ζj,1 σ0 k ´r hpxj,1 ; θq, 1`γ r,0 r“1 ˚,´j wi,` 9 pn´j i,` ´ σ0 qhpxj,1 ; θi,` q ` “ 1, 2 ´j ´j ˚,´j wi,0 9 pqi,1 ` qi,2 ´ σ0 qhpxj,1 ; θi,0 q ´j and, with a1 “ n1 ´ pn̄´j 1 ` ζj,1 q ` k̄1 σ0 and a2 “ n2 ´ n̄2 ` k̄2 σ0 , one further has w01 9 γ 1´ζj,1 σ0 k ´j Jσ0 pa1 ` ζj,1 σ0 , a2 ; k ´j ` 1q hpxj,1 ; θq, ˚,´j 1 wi,` 9 Jσ0 pa1 , a2 ; k ´j q pn´j i,` ´ σ0 q hpxj,` ; θj,` q ` “ 1, 2, ´j ´j ˚,´j 1 9 Jσ0 pa1 , a2 ; k ´j q pqi,1 ` qi,2 ´ σ0 q hpxj,1 ; θi,0 q. wi,0 ˚ from (2) Sample ζj,1 ˚ ˚ , I “ 1q “ Ppζj,1 “ x | T´ζj,1 γ 1´x 1`γ ˚ k´kx ´k̄0 ´k̄2 ˚ , I “ 0q 9 γ Ppζj,1 “ x | T´ζj,1 Jσ0 pn1 ´ nx ` kx σ0 , n2 ´ n̄2 ` k̄2 σ0 ; kq where x P t0, 1u, kx :“ x ` |ζ1˚,´j | and nx “ nj,1 x ` |ζ1˚,´j d n´j 1 |, where a d b denotes the component–wise product between two vectors a, b. Moreover, it should be stressed that, ˚ conditional on I “ 0, the labels ζr,0 are degenerate at x “ 0 for each r “ 1, . . . , k0 . (3) Update I from PpI “ 1 | T q “ 1 ´ PpI “ 0 | T q “ p1 ´ σqBpn1 , n2 q p1 ´ σqBpn1 , n2 q ` σJσ0 pā1 , ā2 ; kqp1 ` γqk 14 where ā1 “ n1 ´ n̄1 ` k̄1 σ0 and ā2 “ n2 ´ n̄2 ` k̄2 σ0 . This sampling distribution holds true pn q pn q ˚ ˚ “ 1. If this situation with label ζj,0 whenever θ1 1 and θ2 2 do not share any value θj,0 occurs, then PpI “ 1 | T q “ 1. (4) Update σ and σ0 from f pσ0 | T´σ0 , Iq 9 Jσ1´I pā1 , ā2 ; kq σ0k´1 κ0 pσ0 q 0 k 2 ź̀ ź p1 ´ σ0 qnj,` ´1 `“1 j“1 “ f pσ | T´σ , Iq 9 κpσq p1 ´ σq1t1u pIq ` σ1t0u pIq k0 ź p1 ´ σ0 qqr,1 `qr,2 ´1 r“1 ‰ where κ and κ0 are the priors for σ and σ0 , respectively. (5) Update γ from f pγ | T´γ , Iq 9 γ k´k̄ gpγq ” 1´σ ı 1 pIq ` σ J pā , ā ; kq 1 pIq σ0 1 2 t1u t0u p1 ` γqk where g is the prior distribution for γ. Finally, the updating of the hyperparameters depends on the specification of Q0 that is adopted. They will be displayed in the next section, under the assumption that Q0 is a normal/inverse–Gamma. The evaluation of the integral Jσ0 ph1 , h2 ; hq is essential for the implementation of the Markov Chain Monte Carlo procedure. This can be accomplished through numerical methods based on quadrature. However, computational issues arise when h1 and h2 are both less than 1 and the integrand defining Jσ0 is no longer bounded, although still integrable. For this reason we propose a plain Monte Carlo approximation of Jσ0 based on observing that ) ! 1 , Jσ0 ph1 , h2 ; hq “ Bph1 , h2 q E rγ ` W σ0 ` p1 ´ W qσ0 sh with W „ Betaph1 , h2 q. Then generating an i.i.d. sample tWi uLi“1 of length L, with Wi „ W , we get the following approximation L 1 1ÿ . Jσ0 ph1 , h2 ; hq « Bph1 , h2 q σ0 L i rγ ` Wi ` p1 ´ Wi qσ0 sh 15 5 Illustrations The algorithm introduced in Section 4 is employed here to estimate dependent random densities. Before implementation, we need first to complete the model specification of our latent nested model (13). Let Θ “ R ˆ R` and hp¨; pM, V qq be Gaussian with mean M and variance V . Moreover, as customary, Q0 is assumed to be a normal/inverse–Gamma distribution Q0 pdM, dV q “ Q0,1 pdV qQ0,2 pdM |V q with Q0,1 an inverse–Gamma probability distribution with parameters ps0 , S0 q and Q0,2 a Gaussian with mean m and variance τ V . Furthermore, the hyperpriors are τ ´1 „ Gampw{2, W {2q, m „ Npa, Aq, for some real parameters w ą 0, W ą 0, A ą 0 and a P R. In the simulation studies we have set pw, W q “ p1, 100q, pa, Aq “ ppn1 X̄ ` n2 Ȳ q{pn1 ` n2 q, 2q. The parameters τ and m are updated on the basis of their full conditional distributions, which can be easily derived, and correspond to ki 2 ÿ ˚ ´w k W ÿ pMi,j ´ mq2 ¯ ` , ` , L pτ |T´τ , Iq „ IG ˚ 2 2 2 2Vi,j i“0 j“1 ´R 1 ¯ L pm|T´m , Iq „ N , D D where R“ 2 ki ˚ Mi,j a ÿÿ ` , ˚ A i“0 j“1 τ Vi,j 2 D“ k i 1 1 ÿÿ ` . ˚ A i“0 j“1 τ Vi,j The model specification is completed by choosing uniform prior distributions for σ0 and σ. In order to overcome the possible slow mixing of the Pólya urn sampler, we include the acceleration step of MacEachern (1994) and West et al. (1994), which consists in resampling ˚ ki the distinct values pθi,j qj“1 , for i “ 0, 1, 2, at the end of every iteration. The numerical outcomes displayed in the sequel are based on 50, 000 iterations after 50, 000 burn–in sweeps. pn q pn q Throughout we assume the data X1 1 and X2 2 to be independently generated by two densities f1 and f2 . These will be estimated jointly through the MCMC procedure and the borrowing of strength phenomenon should then allow improved performance. An interesting byproduct of our analysis is the possibility to examine the clustering structure of each distribution, namely the number of components of each mixture. Since the expression 16 of the pEPPF (18) consists of two terms, in order to carry out posterior inference we have defined the random variable I “ 1tµ1 “µ2 u . This random variable allows to test whether the two samples come from the same distribution or not, since I “ 1tp̃1 “p̃2 u almost surely (see also Proposition 4). Indeed, if interest lies in testing H0 : p̃1 “ p̃2 versus H1 : p̃1 ­“ p̃2 , based on the Markov Chain Monte Carlo output, it is straightforward to compute an approximation of the Bayes factor BF “ PpI “ 1|Xq PpI “ 0q Ppp̃1 “ p̃2 |Xq Ppp̃1 ­“ p̃2 q “ Ppp̃1 ­“ p̃2 |Xq Ppp̃1 “ p̃2 q PpI “ 0|Xq PpI “ 1q leading to acceptance of the null hypothesis if BF is sufficiently large. In the following we first consider simulated datasets generated from normal mixtures and then we analyse the popular Iris dataset. 5.1 Synthetic examples pn q pn q We consider three different simulated scenarios, where X1 1 and X2 2 are independent and identically distributed draws from densities that are both two component mixtures of normals. In both cases ps0 , S0 q “ p1, 1q and the sample size is n “ n1 “ n2 “ 100. pn q pn q First consider a scenario where X1 1 and X2 2 are drawn from the same density Xi,1 „ Xj,2 „ 1 1 Np0, 1q ` Np5, 1q. 2 2 The posterior distributions for the number of mixture components, respectively denoted by K1 and K2 for the two samples, and for the number of shared components, denoted by K12 , are reported in Table 1. The maximum a posteriori estimate is highlighted in bold. The model is able to detect the correct number of components for each distribution as well as the correct number of components shared across the two mixtures. The density estimates, not reported here, are close to the true data generating densities. The Bayes factor to test pn q pn q equality between the distributions of X1 1 and X2 2 has been approximated through the Markov Chain Monte Carlo output and coincides with BF “ 5.85, providing evidence in favor of the null hypothesis. pn q pn q Scenario II corresponds to samples X1 1 and X2 2 generated, respectively, from Xi,1 „ 0.9 Np5, 0.6q ` 0.1 Np10, 0.6q Xj,2 „ 0.1 Np5, 0.6q ` 0.9 Np0, 0.6q. 17 scen. # comp. K1 I K2 K12 K1 II K2 K12 K1 III K2 K12 0 1 0 0 0 0 0 0 0 0 0 0 0 0.965 0 0 0 0 0 0.183 2 0.638 0.635 0.754 0.679 0.778 0.034 0.328 0.409 0.645 3 0.232 0.235 0.187 0.232 0.185 0.001 0.322 0.305 0.138 4 0.079 0.083 0.045 0.065 0.032 0 0.188 0.152 0.027 5 0.029 0.029 0.012 0.018 0.004 0 0.089 0.073 0.006 6 0.012 0.011 0.002 0.004 0.001 0 0.041 0.034 0.001 ě7 0.008 0.007 0.001 0.002 0 0 0.032 0.027 0 Table 1: Simulation study: Posterior distributions of the number of components in the first sample (K1 ), in the second sample (K2 ) and shared by the two samples (K12 ) corresponding to the three scenarios. The posterior probabilities corresponding to the MAP estimates are displayed in bold. Both densities have two components but only one in common, i.e. the normal distribution with mean 5. Moreover, the weight assigned to Np5, 0.6q differs in the two cases. The density estimates are displayed in Figure 2. The spike corresponding to the common component (concentrated around 5) is estimated more accurately than the idiosyncratic components (around 0 and 10, respectively) of the two samples nicely showcasing the borrowing of information across samples. Moreover, the posterior distributions of the number of components are reported in Table 1. The model correctly detects that each mixture has two components with one of them shared and the corresponding distributions are highly concentrated around the correct values. Finally the Bayes factor BF to test equality between the two distributions equals 0.00022 and the null hypothesis of distributional homogeneity is rejected. Scenario III consists in generating the data from mixtures with the same components pn q pn q but differing in their weights. Specifically, X1 1 and X2 2 are drawn from, respectively, Xi,1 „ 0.8 Np5, 1q ` 0.2 Np0, 1q Xj,2 „ 0.2 Np5, 1q ` 0.8 Np0, 1q, The posterior distribution of the number of components is again reported in Table 1 and again the correct number is identified, although in this case the distributions exhibit a 18 (a) (b) Figure 2: Estimated densities (blue) and true densities (red) for X in Panel (a) and Y in Panel (b). higher variability. The Bayes factor BF to test equality between the two distributions is 0.54, providing weak evidence in favor of the alternative hypothesis that the distributions differ. 5.2 Iris dataset Finally, we examine the well known Iris dataset, which contains several measurements concerning three different species of Iris flower: setosa, versicolor, virginica. More specifically, we focus on petal width of those species. The sample X has size n1 “ 90, containing 50 observations of setosa and 40 of versicolor. The second sample Y is of size n2 “ 60 with 10 observations of versicolor and 50 of virginica. Since the data are scattered across the whole interval r0, 30s, we need to allow for large variances and this is obtained by setting ps0 , S0 q “ p1, 4q. The model neatly identifies that the two densities have two components each and that one of them is shared as showcased by the posterior probabilities reported in Table 2. As for the Bayes factor, we obtain BF « 0 leading to the unsurprising conclusion that the two samples come from two different 19 distributions. The corresponding estimated densities are reported in Figure 3. # comp. K1 K2 K12 0 1 2 0 0 0.466 0 0.001 0.661 0 0.901 0.093 3 4 5 6 ě7 0.307 0.141 0.055 0.020 0.011 0.248 0.068 0.017 0.004 0.001 0.006 0 0 0 0 Table 2: Real data: Posterior distributions of the number of components in the first sample (K1 ), in the second sample (K2 ) and shared by the two samples (K12 ). The posterior probabilities corresponding to the MAP estimates are displayed in bold. Figure 3: Estimated densities for X (red) and Y (blue). We have also monitored the convergence of the algorithm that has been implemented. Though we here provide only details for the Iris dataset, we have conducted similar analyses also for each of the illustrations with synthetic datasets in Section 5.1. Notably, all the 20 examples with simulated data have experienced even better performances than those we are going to display henceforth. Figure 4 depicts the partial autocorrelation function for the sampled parameters σ and σ0 . The partial autocorrelation function apparently has an exponential decay and after the first lag exhibits almost negligible peaks. (a) (b) Figure 4: Plots of the partial autocorrelation functions for the parameters σ (a) and σ0 (b). We have additionally monitored the two estimated densities near the peaks, which identify the mixtures’ components. More precisely, Figure 5(a) displays the trace plots of the density referring to the first sample at the points 3 and 13, whereas Figure 5(b) shows the trace plots of the estimated density function of the second sample at the points 13 and 21. 6 Concluding remarks We have introduced and investigated a novel class of nonparametric priors featuring a latent nested structure. Our proposal allows flexible modeling of heterogeneous data and deals with problems of testing distributional homogeneity in two-sample problems. Even if our 21 (a) (b) pn q Figure 5: (a): trace plots of the density referring to X1 1 at the points 3 and 13; (b): trace pn q plots of the density referring to X2 2 at the points 13 and 21. treatment has been confined to the case d “ 2, we stress that the results may be formally extended to d ą 2 random probability measures. However, their implementation would be more challenging since the marginalization with respect to pp̃1 , . . . , p̃d q leads to considering all possible partitions of the d random probability measures. While sticking to the same model and framework which has been shown to be effective both from a theoretical and practical point of view in the case d “ 2, a more computationally oriented approach would be desirable in this case. There are two possible paths. The first, along the lines of the original proposal of the nested Dirichlet process in Rodrı́guez et al. (2008), consists in using tractable stick–breaking representations of the underlying random probabilities, whenever available to devise an efficient algorithm. The second, which needs an additional significant analytical step, requires the derivation of a posterior characterization of pp̃1 , . . . , p̃d q that allows sampling of the trajectories of latent nested processes and build up algorithms for which marginalization is not needed. Both will be the object of our future research. 22 Appendix 1 Proof of Proposition 1 Since pp̃1 , p̃2 q „ NPpν0 , νq, one has ż8 ż ż ż 2 µ̃ pdpq 2 “ u E e´uµ̃pPq µ̃2 pdpq du π1 “ E q̃ pdpq “ E 2 0 P P P µ̃ pPq (20) In order to get the result, we extend and adapt the techniques used in James et al. (2006). Indeed, it can be seen that “ ‰ E e´u µ̃pPX q µ̃2 pdpq “ e´c ψpuq c2 Q2 pdpq τ12 puq ` c Qpdpq τ2 puq . (21) ř ř Recall that Q is the probability distribution of the NRMI q̃0 “ jě1 ωj δθ̃j with jě1 ωj “ 1 iid almost surely and θ̃j „ Q0 . This means ř that Q is concentrated on the set of discrete probability measures on X. If p “ jě1 wj δθj P P is fixed, we set Wj,n :“ tωj1 “ w1 , . . . , ωjn “ wn u and Θj,n “ tθ̃j1 “ θ1 , . . . , θ̃jn “ θn u where j “ pj1 , . . . , jn q is a vector of positive integer. Then ´ ¯ ”ď ı Qptpuq “ P q̃0 “ p ď P pWj,n X Θj,n q (22) p˚q where the above union is taken over the set of all vectors j “ pj1 , . . . , jn q P Nn such that j1 ‰ ¨ ¨ ¨ ‰ jn . The upper bound in (22) is clearly equal to 0. This, combined with (21), yields ż ż E e´u µ̃pPX q µ̃2 pdpq “ c e´cψpuq τ2 puq PX Qpdpq “ c e´cψpuq τ2 puq PX and the proof is completed. Proof of Proposition 2 Let f1 “ 1A and f2 “ 1B , for some measurable subsets A and B of P. One has ż E f1 pp1 qf2 pp2 qq̃pdp1 qq̃pdp2 q “ E q̃pAqq̃pBq P2X “ E q̃ 2 pA X Bq ` E q̃pA X Bqq̃pB X Ac q ` E q̃pA X B c qq̃pBq. 23 It can now be easily seen that µ̃2 pA X Bq µ̃2 pPX q ż8 ” ı u e´cψpuq c2 Q2 pA X Bq τ12 puq ` c QpA X Bq τ2 puq du “ E q̃ 2 pA X Bq “ E 0 “ π1 Q2 pA X Bq ` p1 ´ π1 q QpA X Bq. On the other hand, if A X B “ ∅, we get ż8 c2 u e´c ψpuq τ12 puq du “ π1 QpAq QpBq E q̃pAqq̃pBq “ QpAqQpBq 0 To sum up, one finds that E q̃pAqq̃pBq “ π1 QpA X Bq ` p1 ´ π1 q rQ2 pA X Bq ` QpA X BqQpB X Ac q ` QpA X B c qQpBqs which boils down to (9). Now it is easy to prove that (9) is true when f1 and f2 are simple functions and, then, for all positive and measurable functions relying on the monotone convergence theorem. Proof of Theorem 1 pN q The partition probability function Πk pn1 , n2 , q1 , q2 q equals ż E Xk k1 ź n p̃1 j,1 pdx˚j,1 q j“1 k2 ź n p̃2 j,2 pdx˚j,2 q j“1 k0 ź q q p̃1j,1 pdzj˚ qp̃2j,2 pdzj˚ q (23) j“1 obtained by marginalizing with respect to pp̃1 , p̃2 q. Due to ś conditional independence of p̃1 and p̃2 , given q̃, the integrand in (23) can be rewritten as E 2`“1 h` pdx˚` , dz ˚ ; q̃q where, for each ` “ 1, 2, h` pdx˚` , dz ˚ ; q̃q “E k ” ź̀ n p̃` j,1` pdx˚j,` q j“1 ż k ź̀ “ k0 ź ˇ ı q̃ q ˇ p̃`j,` pdzj˚ qˇ j“1 n p` j,` pdx˚j,` q PX j“1 k0 ź j“1 24 q p`j,` pdzj˚ q q̃pdp` q A simple application of the Fubini–Tonelli theorem, then, yields ż ż pN q Πk pn1 , n2 , q1 , q2 q “ E f1 pp1 q f2 pp2 q q̃pdp1 q q̃pdp2 q Xk (24) P2X ś 0 qj,` ś ` nj,` p` pdzj˚ q and agree where, for each ` “ 1, 2, we have set f` pp` q :“ kj“1 p` pdx˚j,` q kj“1 ś0 that j“1 aj ” 1. In view of Proposition 2 the integrand in (24) boils down to ż ż P2X E f1 pp1 q f2 pp2 q q̃pdp1 q q̃pdp2 q “ π1 f1 ppq f2 ppq Qpdpq ` p1 ´ π1 q PX 2 ż ź `“1 f` ppq Qpdpq PX ” ı ” ı” ı “ π1 Ef1 pq̃0 q f2 pq̃0 q ` p1 ´ π1 q Ef1 pq̃0 q Ef2 pq̃0 q . In order to complete the proof it is now enough to note that, due to non–atomicity of Q0 , Ef1 pq̃0 qf2 pq̃0 q “ E k1 ź n q̃0 j,1 pdx˚j,1 q k2 ź n q̃0 j,2 pdx˚j,2 q q q̃0j,1 `qj,2 pdzj˚ q j“1 j“1 j“1 k0 ź is absolutely continuous with respect to Qk0 on Xk and dEf1 pq̃0 qf2 pq̃0 q ˚ ˚ ˚ pN q px1 , x2 , z q “ Φk pn1 , n2 , q1 ` q2 q k dQ0 for any vector px˚1 , x˚2 , z ˚ q whose k components are all distinct, and is zero otherwise. As for the second summand above, from Proposition 3 in James et al. (2009) one deduces that ” k1 k2 k0 ı” ı ź ź ź ˚ ˚ Ef1 pq̃0 q Ef2 pq̃0 q “ Q0 pdxj,1 q Q0 pdxj,2 q Q20 pdzj˚ q j“1 j“1 j“1 p|n |`|q1 |q 1 ˆ Φk0 `k 1 p|n |`|q2 |q 2 pn1 , q1 q Φk0 `k 2 pn2 , q2 q Then it is apparent that rEf1 pq̃0 qs rEf2 pq̃0 qs ! Qk0 and still by virtue of the non–atomicity of Q0 one has d rEf1 pq̃0 qs rEf2 pq̃0 qs ˚ ˚ ˚ p|n1 |`|q1 |q p|n2 |`|q2 |q px1 , x2 , z q “ Φk0 `k pn1 , q1 q Φk0 `k pn2 , q2 q 1t0u pk0 q k 1 2 dQ0 for any vector px˚1 , x˚2 , z ˚ q P Xk whose components are all distinct, and is zero otherwise. Note that if it were k0 ě 1, then some of the infinitesimal factors Q20 pdzj˚ q would not cancel and the above density would be exactly equal to zero. 25 Proof of Proposition 4 ř iid ω̃ δ , with Pp j η̃ j jě1 jě1 ω̃j “ 1q “ 1 and η̃j „ Q. ř ř pjq pjq Furthermore, η̃j is, in turn, a CRM η̃j “ kě1 ω̃k δX pjq where Pp kě1 ω̃k ă `8q “ 1 and Since q̃ „ NRMIrν; Ms, one has q̃ “ ř k pjq iid Xk „ µS “ ř Q0 , for any j “ 1, 2, . . . . An analogous representation holds true also for µS , i.e. p0q kě1 ω̃k δX p0q with the same conditions as above. From the assumptions one deduces k pjq pjq that the sequences pXk qkě1 and pω̃k qkě1 are independent also across different values of j, and Definition 1 entails, with probability 1, ˇ ı ” ˇ P pµ1 , µ2 , µS q P A1 ˆ A2 ˆ A0 ˇ q̃ “ q̃pA1 q q̃pA2 q q̃0 pA0 q which implies ˇ ¯ı µ2 ` µS µ1 ` µS ˇ “ ˇ q̃ µ1 pXq ` µS pXq µ2 pXq ` µS pXq ˇ ¯ ”ÿ ´ η̃j ` µS η̃i ` µS ˇ “E ω̃j ω̃i P “ ˇ q̃ η̃i pXq ` µS pXq η̃j pXq ` µS pXq i­“j ” ´ Ppp̃1 “ p̃2 q “ E P 8 ÿ ` ω̃i2 P i“1 ´ ˇ ¯ı η̃i ` µS η̃i ` µS ˇ “ ˇ q̃ η̃i pXq ` µS pXq η̃i pXq ` µS pXq ”ÿ ´ “E ω̃j ω̃i P i­“j 8 ˇ ¯ı ÿ η̃j ` µS η̃i ` µS ˇ “ ˇ q̃ ` E ω̃i2 . η̃i pXq ` µS pXq η̃j pXq ` µS pXq i“1 ř 2 For the second summand above one trivially has E 8 i“1 ω̃i “ Ppµ1 “ µ2 q. As for the first summand, a simple application of the Fubini–Tonelli theorem and the fact that ω̃j ě 1, for any j, yield the following upper bound ˇ ¯ı ”ÿ ´ η̃i ` µS η̃j ` µS ˇ E ω̃j ω̃i P “ ˇ q̃ η̃i pXq ` µS pXq η̃j pXq ` µS pXq i­“j “ ´ ÿ ” E ω̃j ω̃i P i­“j ÿ ď i­“j ´ P ˇ ¯ı η̃i ` µS η̃j ` µS ˇ “ ˇ q̃ η̃i pXq ` µS pXq η̃j pXq ` µS pXq ¯ η̃i ` µS η̃j ` µS “ . η̃i pXq ` µS pXq η̃j pXq ` µS pXq 26 The proof is completed by showing that this upper bound is zero. To this end, we fix piq piq positive integers i, j and n, consider the n–tuple of atoms pX1 , ¨ ¨ ¨ , Xn q referring to η̃i and correspondingly define the sets ! ) pjq piq pjq pjq Θ` :“ ω P Ω : X1 pωq “ X`1 pωq, . . . , Xnpiq pωq “ X`n pωq , ) ! p0q p0q piq p0q Θ` :“ ω P Ω : X1 pωq “ X`1 pωq, . . . , Xnpiq pωq “ X`n pωq for any ` “ p`1 , ¨ ¨ ¨ , `n q P Nn . It is then apparent that ´ P ¯ ” ı ď η̃j ` µ̃˚0 η̃i ` µ̃˚0 pjq p0q “ ď P pΘ Y Θ q ` ` η̃i pXq ` µ̃˚0 pXq η̃j pXq ` µ̃˚0 pXq `PNn ,` ­“` h1 h2 pjq p0q and this upper bound is equal to 0, because each of the events Θ` and Θ` in the above countable union has 0 probability in view of the non–atomicity of Q0 and independence. Proof of Theorem 2 pn q pn q Consider the partition induced by the sample X1 1 and X2 2 into k “ k1 ` k2 ` k0 groups with frequencies n` “ pn1,` , . . . , nk` ,` q, for ` “ 1, 2, and q̄ “ pq1,1 ` q2,1 , . . . , qk0 ,1 ` qk0 ,2 q. Recalling that p` “ µ` {µ` pXq, for ` “ 1, 2, the conditional likelihood is k 2 ź̀ ź k0 2 ź ź ˚ ˚ ˚ nj,` ζj,` ζ ˚ qr,` p1´ζj,` qnj,` p1´ζr,0 qpqr,1 `qr,2 q ˚ ˚ ˚ p` pdxj,` q pS pdxj,` q pS pdzr q p`r,0 pdzr˚ q r“1 `“1 j“1 `“1 where we take txj,` : j “ 1, . . . , k` u, for ` “ 1, 2, and tzr˚ : r “ 1, . . . , k0 u as the k1 ` k2 ` k0 distinct values in X. If we now let ´pu`vqµS pXq f0 pµS , u, vq :“ e k0 ź µS ˚ p1´ζr,0 qpqr,1 `qr,2 q pdzr˚ q r“1 f1 pµ1 , u, vq :“ e´uµ1 pXq k1 ź ζ ˚ nj,1 µ1j,1 `“1 j“1 pdx˚j,1 q k2 ź k0 ź ζ ˚ qr,1 µ1r,0 pdzr˚ q r“1 j“1 f2 pµ2 , u, vq :“ e´vµ2 pXq k 2 ź̀ ź ζ ˚ nj,2 µ2j,2 pdx˚j,2 q k0 ź r“1 j“1 27 ζ ˚ qr,2 µ2r,0 pdzr˚ q, ˚ qnj,` p1´ζj,` µ0 pdx˚j,` q and further take into account the probability distribution of the labels, conditional on pµS , µ1 , µ2 q, so that the the joint distribution of the random partition and of the corresponding labels ζ ˚˚ “ pζ1˚ , ζ2˚ , ζ0˚ q is pN q Πk pn1 , n2 , q1 , q2 ; ζ ˚˚ q 1 “ Γpn1 qΓpn2 q ż8ż8 u 0 n1 ´1 n2 ´1 v 0 2 ´ź ¯ E fi pµi , u, vq du dv, (25) i“0 where, for simplicity, we have set µ0 “ µS . Now, for any pu, vq P R2` , Proposition 3 implies 2 ź 2 ´ź 2 ˇ ˇ ¯ ¯ ´ ź ˇ ˚ ˇ E fi pµi , u, vq “ E E fi pµi , u, vqˇq̃, q̃ “ E E fi pµi , u, vqˇq̃ i“0 i“0 i“0 ” ı ż “ E f0 pµS , u, vq E f1 pm1 , u, vqf2 pm2 , u, vqq̃pdm1 qq̃pdm2 q M 2 2 ” ı! ” ź ı ı) ź “ E f0 pµS , u, vq π1˚ E E fi pµ̃0 , u, vq fi pµ̃0 , u, vq ` p1 ´ π1˚ q ” i“1 i“1 (26) k̄ Using the properties µS it is easy to show that E f0 pµS , u, vq ! Qk´ , 0 ř řk2 characterise řk1 ˚ that k0 ˚ ˚ where k̄ “ j“1 ζj,1 ` j“1 ζj,2 ` r“1 ζr,0 . Moreover drE f0 pµS , u, vqs k̄ dQk´ 0 pxq “ e ´γ c0 ψ0 pu`vq k̄ γ k´k̄ ck´ 0 2 ź ź τnp0q pu ` vq j,` k0 ź τqr,1 `qr,2 pu ` vq (27) r“1 `“1 j: ζj,` “0 k´k̄ for with all distinct components, and it is zero otherwise. If one notes that ś2 any x P X ˚ E f pµ̃ , u, vq vanishes when at least one of the ζr,0 ’s is non–zero, the other terms in i 0 i“1 (26) can be similarly handled and, after having marginalised with respect to pζ1˚ , ζ2˚ , ζ0˚ q, one has ÿ ÿ pN q Πk pn1 , n2 , q1 , q2 q “ π1˚ I1 pn1 , n2 , q1 ` q2 , ζ ˚˚ q ` p1 ´ π1˚ q I2 pn1 , n2 , q1 ` q2 , ζ ˚ q p˚˚q p˚q where the first sum runs over all vectors ζ ˚˚ “ pζ1˚ , ζ2˚ , ζ0˚ q P t0, 1uk and the second sum is over all vectors ζ ˚ “ pζ1˚ , ζ2˚ q P t0, 1uk´k0 . Moreover, ż8ż8 ck0 γ k´k̄ ˚˚ un1 ´1 v n2 ´1 e´p1`γqc0 ψ0 pu`vq I1 pn1 , n2 , q1 ` q2 , ζ q “ Γpn1 qΓpn2 q 0 0 28 k1 ź ˆ τnp0q pu j,1 ` vq j“1 k2 ź τnp0q pu j,2 ` vq j“1 k0 ź p0q τqj,1 `qj,2 pu ` vqdudv. j“1 One may further note that ÿ ˚˚ I1 pn1 , n2 , q1 ` q2 , ζ q “ k ÿ ÿ k̄“0 tζ ˚ : |ζ ˚ |“k̄u p˚q k1 ź ˆ τnp0q pu j,1 ck0 γ k´k̄ Γpn1 qΓpn2 q ` vq j“1 “ ck0 γ k´k̄ k̄ Γpn1 qΓpn2 q k1 ź ˆ τnp0q pu ` vq j,1 j“1 ˆ 0 τnp0q pu j,2 0 ` vq k0 ź p0q τqj,1 `qj,2 pu ` vq du dv j“1 ż8ż8 k2 ź un1 ´1 v n2 ´1 e´p1`γqc0 ψ0 pu`vq 0 0 τnp0q pu ` vq j,2 j“1 ck0 p1 ` γqk Γpn1 qΓpn2 q k1 ź un1 ´1 v n2 ´1 e´p1`γqc0 ψ0 pu`vq j“1 k ˆ ˙ ÿ k k̄“0 “ k2 ź ż8ż8 k0 ź p0q τqj,1 `qj,2 pu ` vqdudv j“1 ż8ż8 τnp0q pu j,1 un1 ´1 v n2 ´1 e´p1`γqc0 ψ0 pu`vq 0 0 ` vq j“1 k2 ź j“1 τnp0q pu j,2 ` vq k0 ź p0q τqj,1 `qj,2 pu ` vqdudv j“1 and a simple change of variable yields (18). Details on Examples 1 and 2 As for the latent nested σ–stable process, the first term in the expression of the pEPPF (18) turns out to be the EPPF of a σ0 –stable process multiplied by π1˚ “ 1 ´ σ, namely p1 ´ σq k0 2 k ź σ0k´1 Γpkq ź ź̀ p1 ´ σ0 qnj,` ´1 p1 ´ σ0 qqj,1 `qj,2 ´1 . ΓpN q `“1 j“1 j“1 As for the second summand in (18), the term I2 pn1 , n2 , q1 ` q2 , ζ ˚ q equals 29 σ0k γ k´k̄ ξσ pn1 , n2 , q1 ` q2 q Γpn1 qΓpn2 q 0 ż8ż8 un1 ´1 v n2 ´1 ˆ 0 0 exp t´γpu ` vqσ0 ´ uσ0 ´ v σ0 u dudv. pu ` vqN ´n̄1 ´n̄2 ´pk´k̄1 ´k̄2 qσ0 un̄1 ´k̄1 σ0 v n̄2 ´k̄2 σ0 The change of variables s “ u ` v and w “ u{pu ` vq, then, yields I2 pn1 , n2 , q1 ` q2 , ζ ˚ q “ σ0k´1 Γpkqγ k´k̄ ξσ pn1 , n2 , q1 ` q2 q Γpn1 qΓpn2 q 0 ż 1 n1 ´n̄1 `k̄1 σ0 ´1 p1 ´ wqn2 ´n̄2 `k̄2 σ0 ´1 w ˆ dw rγ ` wσ0 ` p1 ´ wqσ0 sk 0 pN q and the obtained expression for Πk follows. As far as the latent nested Dirichlet process is concerned, the first term in (18) coincides with the EPPF of a Dirichlet process having total mass c0 multiplied by π1˚ “ pc ` 1q´1 , i.e. k0 2 k ź rc0 p1 ` γqsk ź ź̀ 1 ¨ Γpnj,` q Γpqj,1 ` qj,2 q. 1 ` c pc0 p1 ` γqqN `“1 j“1 j“1 On the other hand, it can be seen that I2 pn1 , n2 , q1 ` q2 , ζ ˚ q equals k0 2 k ź ck0 γ k´k̄ ź ź̀ Γpnj,` q Γpqj,1 ` qj,2 q Γpn1 qΓpn2 q `“1 j“1 j“1 ż8ż8 un1 ´1 v n2 ´1 ˆ dudv. γc0 `N ´n̄1 ´n̄2 p1 ` uqn̄1 `c0 p1 ` vqn̄2 `c0 0 0 p1 ` u ` vq If p Fq pα1 , . . . , αp ; β1 , . . . , βq ; zq denotes the generalised hypergeometric series, which is defined as 8 ÿ pα1 qk . . . pαp qk z k F pα , . . . , α ; β , . . . , β ; zq :“ , p q 1 p 1 q pβ q . . . pβ q k! 1 k q k k“0 identity 3.197.1 in Gradshteyn & Ryzhik (2007) leads to rewrite I2 pn1 , n2 , q1 ` q2 , ζ ˚ q as follows ck0 γ k´k̄ Γpp1 ` γqc0 ` n1 ´ n̄1 q ξ0 pn1 , n2 , q1 ` q2 q Γpn1 qΓpp1 ` γqc0 ` N ´ n̄1 q 30 ż8 ˆ 0 un1 ´1 2 F1 pc0 ` n̄2 , n2 ; N ´ n̄1 ` c0 p1 ` γq; ´uqdu. p1 ` uqc0 p1`γq`n1 ´n̄2 On view of the formula 2 F1 pα, β; δ; zq “ p1´zq´α 2 F1 pα, δ ´β; δ; z{pz ´1qq and of the change of variable t “ u{p1 ` uq, the integral above may be expressed as ż1 tn1 ´1 p1 ´ tqc0 p1`γq`c0 ´1 ˆ 2 F1 pc0 ` n̄2 , c0 p1 ` γq ` n1 ´ n̄1 ; N ´ n̄1 ` c0 p1 ` γq; tqdt. 0 and, finally, identity 7.512.5 in Gradshteyn & Ryzhik (2007) yields the displayed closed pN q form of Πk . References Bhattacharya, A. & Dunson, D. (2012), ‘Nonparametric Bayes classification and hypothesis testing on manifolds’, J. Multivariate Anal. 111, 1–19. Filippi, S. & Holmes, C. C. (2017), ‘A Bayesian nonparametric approach for quantifying dependence beetween random variables’, Bayesian Analysis 12(4), 919–938. Gradshteyn, I. S. & Ryzhik, I. M. (2007), Tables of integrals, sums, series, and products, 7th edn, Academic Press. Hjort, N. L. (2000), Bayesian analysis for a generalized Dirichlet process prior, Technical report, University of Oslo. Holmes, C., Caron, F., Griffin, J. E. & Stephens, D. A. (2015), ‘Two–sample Bayesian nonparametric hypothesis testing’, Bayesian Analysis 10(2), 297–320. James, L. F., Lijoi, A. & Prünster, I. (2006), ‘Conjugacy as a distinctive feature of the Dirichlet process’, Scandinavian Journal of Statistics 33(1), 105–120. James, L. F., Lijoi, A. & Prünster, I. (2009), ‘Posterior analysis for normalized random measures with independent increments’, Scandinavian Journal of Statistics 36(1), 76–97. Kingman, J. F. C. (1993), Poisson processes, Oxford University Press. Lijoi, A., Nipoti, B. & Prünster, I. (2014), ‘Bayesian inference with dependent normalized completely random measures’, Bernoulli 20(3), 1260–1291. 31 Ma, L. & Wong, W. H. (2011), ‘Coupling optional Pólya trees and the two sample problem’, J. Amer. Statist. Assoc. 106(496), 1553–1565. MacEachern, S. N. (1994), ‘Estimating normal means with a conjugate style Dirichlet process prior’, Comm. Statist. Simulation Comput. 23(3), 727–741. Müller, P., Quintana, F. & Rosner, G. (2004), ‘A method for combining inference across related nonparametric Bayesian models’, J. R. Stat. Soc. Ser. B Stat. Methodol. 66(3), 735– 749. Regazzini, E., Lijoi, A. & Prünster, I. (2003), ‘Distributional results for means of random measures with independent increments’, Ann. Statist 31, 560–585. Rodrı́guez, A. & Dunson, D. B. (2014), ‘Functional clustering in nested designs: modeling variability in reproductive epidemiology studies’, Ann. Appl. Stat. 8(3), 1416–1442. Rodrı́guez, A., Dunson, D. B. & Gelfand, A. E. (2008), ‘The nested Dirichlet process’, J. Amer. Statist. Assoc. 103(483), 1131–1144. Soriano, J. & Ma, L. (2017), ‘Probabilistic multi-resolution scanning for two-sample differences’, J. R. Stat. Soc. Ser. B Stat. Methodol. 79(2), 547–572. West, M., Müller, P. & Escobar, M. D. (1994), Hierarchical priors and mixture models, with application in regression and density estimation, in ‘Aspects of uncertainty’, Wiley, Chichester, pp. 363–386. 32
10math.ST
Equivalence Classes of Optimal Structures in HP Protein Models Including Side Chains arXiv:0910.3848v1 [cs.CE] 20 Oct 2009 Martin Mann, Rolf Backofen, and Sebastian Will University of Freiburg, Bioinformatics, 79110 Freiburg, Germany, {mmann,backofen,will}@informatik.uni-freiburg.de Abstract. Lattice protein models, as the Hydrophobic-Polar (HP) model, are a common abstraction to enable exhaustive studies on structure, function, or evolution of proteins. A main issue is the high number of optimal structures, resulting from the hydrophobicity-based energy function applied. We introduce an equivalence relation on protein structures that correlates to the energy function. We discuss the efficient enumeration of optimal representatives of the corresponding equivalence classes and the application of the results. 1 Introduction Proteins are the central players in the game of life. They are involved in almost all processes in cells and organisms, comprising replication, metabolism, and movement. To be able to perform their specific functions, proteins have to adopt a certain fold or structure, which is encoded by the protein’s sequence. Thus, knowledge of a protein’s structure elucidates the mechanisms it is involved. Currently, it is not possible to calculate a protein’s functional fold from its sequence nor to simulate the whole folding process in detail. Simplified protein models are used to reduce the computational complexity. A common abstraction are lattice proteins [5, 6]. Here, the structure space a protein can adopt is discretized and allows for efficient folding simulations [8, 13]. Nevertheless, it is difficult to determine minimal energy structures, which represent the functional folds in such models. Even in the most simple Hydrophobic-Polar (HP) model [7], the optimal structure prediction problem stays computationally hard (NP-complete) [4]. Despite this complexity, a fast calculation of nonsymmetrical optimal structures in the HP model is possible using constraint programming techniques applied in the Constraint-based Protein Structure Prediction (CPSP) approach [3, 9, 10, 15]. Recently, we have introduced a significantly improved local search scheme for lattice protein folding simulations [14] using a full Miyazawa-Jernigan energy potential [11]. We take advantage of the efficient CPSP approach and initialize the folding simulations with optimal structures from the simpler HP model. This incorporates the phenomenon of hydrophobic collapse of protein structures, a driving force at the beginning of the folding process [1]. The already compact structures from the CPSP application form the starting point of the folding driven by more complex interactions. This scheme outperforms folding simulations using a standard initialization with random structures and yields better results within shorter simulation time [14]. To increase efficiency of local search methods, usually many optimization runs from different starting points are done. Since the set of all HP-optimal structures is usually too large as a starting set, we are interested in a smaller subset that still covers the structural diversity of the whole set as good as possible. We achieve this by enumerating optimal structures that maintain a given minimal distance to each other. Due to the hydrophobicity-focusing energy function, proteins in HP models show on average a huge number of optimal structures. Since polar residues do not contribute to the energy, optimal structures usually show a much higher variation in the placement of polar than hydrophobic residues. Here, we introduce an equivalence relation to partition the set of (optimal) structures into according classes. Two structures are defined to be equivalent, iff they do not differ in the placements of their hydrophobic residues. We introduce an extension to the CPSP approach that enables an efficient calculation of the number of equivalence classes of optimal structures via enumerating one representative per class. The approach is presented for backbone-only and side chain incorporating HP models. We show that a sequence’s number of representatives (later defined as core-degeneracy) is several magnitudes smaller than the overall number of all optimal structures (degeneracy). Thus, the set of optimal representatives is well placed to be used within the combined approach of CPSP and local search [14]. Furthermore, we propose another application of the equivalence classes: Since the equivalence relation is highly correlated to the HP energy function, the number of classes might be a better measure of structural stability than a sequences’ degeneracy [12]. 2 Preliminaries A lattice protein in the HP model is specified by its sequence S ∈ {H, P }n , where H and P denote hydrophobic and polar monomers, respectively. The structure positions are confined to nodes of a regular lattice L ⊆ Z3 . A valid backbone-only structure C ∈ Ln of length n is a self-avoiding walk (SAW) in the underlying lattice L, i.e. it holds connectivity ∀1≤i<n : (Ci − Ci+1 ) ∈ NL and self-avoidance ∀1≤i<j≤n : Ci 6= Cj , where NL denotes the set of distance vectors between neighbored points in L. An example is shown in Fig. 1a). The energy of a lattice protein structure is given by non-consecutive HH-contacts: ( X −1 : (Ci − Cj ) ∈ NL ∧ Si = Sj = H (1) E(S, C) = 0 : otherwise 1≤i<j≤n (i+1)<j An optimal structure minimizes the energy function. The number of optimal structures is denoted as degeneracy of a sequence and is an important measure of structural stability [12]. a) b) Fig. 1. Optimal structures of HPPHHPPPHPHHPHHPPHPHPPHHHPHHPPHPHPH in the facecentered-cubic lattice. (a) backbone-only model with energy -50, (b) side chain model with energy -55. Colors: green - H monomers, gray - P monomers, red - backbone in side chain models. Visualization by HPview from CPSP-package [10]. The CPSP-approach by Backofen and Will [3] enables the calculation of a sequence’s degeneracy without full structure space enumeration [15]. It utilizes the observation that optimal structures show a (nearly) optimal packing of H monomers. Thus, the CPSP-approach can be sketched in two major steps: 1. H-core construction: Given the number nH of H monomers from the target sequence S, all optimal packings of nH monomers are calculated. These optimal H-cores show the maximal number of contacts possible. For a fixed sequence S and the corresponding nH , we denote the set of optimal H-cores with O. The calculation of O is computationally difficult on its own and was solved by us using constraint programming [2, 3]. 2. Structure threading: Given S and O only structures are enumerated where the H monomers of S are confined to an optimal H-core O ∈ O, i.e. they are “threaded” through the H-cores. Since all O show the maximally possible number of contacts between H monomers, each resulting structure is optimal according to Eq. 1 as well. The structure threading is done by solving a Constraint Satisfaction Problem (CSP) for each O ∈ O as given below. Since step 1 depends only on the number of H monomers nH and no further property of any sequence, we can precalculate the H-cores for different nH and store them in a database. This significantly speeds up the approach and reduces the computation time to step 2, i.e. the structure threading. It might happen, that we find no appropriate structure threading for a sequence S and the according set of optimal H-cores O. Thus, we revert to the set of the best suboptimal H-cores O′ that show at least one contact less than an optimal H-core O ∈ O and iterate the procedure. Still it holds: the first successive structure threading is an optimal structure, since no H monomer packing with more contacts was found before. Further details on the CPSP approach in [3]. The CSPs solved in step 2 are given by (X , D, C), where we denote the set of variables X , their domains D, and a set of constraints C. For each monomer Si ∈ S a variable Xi ∈ X is introduced. The SAW is modeled by a sequence of binary neighboring constraints neigh(Xi , Xi+1 ) and a global alldiff(X ) to enforce the self-avoidingness. The optimal H-core O ∈ O is used to define the domains D: ∀i:Si =H : D(Xi ) = O and ∀i:Si =P : D(Xi ) = L \ O. Thus, if we find a solution of such a CSP, i.e. an assignment ai ∈ D(Xi ) for each variable that satisfies all constraints in C, it will minimize the energy function in Eq. 1, i.e. an optimal structure. 3 Representative Optimal Structures Revisiting the CSP we can see, that P monomers are constrained only by the SAW constraints. Imagine a sequence with a long tail of P monomers. Each valid placement of the subchain in front of the tail can be combined with a combinatorial number of possible SAWs of the tail. This leads to the immense degeneracy in the HP model. H Therefore, we set up an equivalence relation ∼ on structures (Eq. 2) that decomposes the set of all (optimal) structures into equivalence classes. In the following, the number of equivalence classes of optimal structures is denoted as core-degeneracy. As given by Eq. 2, structures from different equivalence classes differ in at least one H monomer placement. H C ∼ Ĉ ⇔ ∀i|Si =H : Ci = Ĉi . (2) The representative enumeration (that corresponds to core-degeneracy calculation) can be done via an extension of the CPSP approach presented in Sec. 2. Instead of calculating all optimal structures, we want to calculate only one representative per equivalence class. This has to be ensured at two stages: (I) the solutions of each single CSP for a given H-core have to be different according to Eq. 2, and (II) the solutions from two CSPs for two different H-cores have to H be different as well. The second condition (II) holds by definition, because ∼ is only defined on the H monomer placements that are constrained by different Hcores from O (differing in at least one position). In the following, we will discuss how to achieve the difference for solutions of a single CSP (I). Note that the core-degeneracy, i.e. the number of different placements of Hmonomers, or core-configurations, in optimal structures of a sequence, is not equal to the number of different H-cores, which are the sets of lattice points that are occupied by H-monomers. The latter number is easily obtained from the standard prediction algorithm, described in Sec. 2. It equals the number of cores, where the sequence is successfully threaded on. Restricted Search for Enumeration of Representatives The standard way to solve a CSP is a combination of domain filtering (i.e. constraint propagation) and depth first search. This results in a binary tree where each node represents a subproblem of the initial CSP (root) and edges represent the additional constraints added to derive the two subproblems from its predecessor node (CSP). The constraints c and ¬c added to derive the leave nodes of a certain CSP are often of the form c = (Xi ≡ d) by selecting a variable Xi from X and a value d ∈ D(Xi ) according to some heuristics. The constraint solver traverse the binary tree until a solution was found or an inconsistency of a constraint from C was detected. Therefore, a straightforward way to enumerate only one representative for each equivalence class can be sketched as follows: first, we restrict the search of the solving process onto the H associated variables. Then, we perform a single check for satisfiability, i.e. search for a single assignment of P monomer variables fulfilling all constraints in C. Thus, we get only one P monomer placement for a given H monomer assignment if any exists. The drawback of this approach is that we restrict the variable order of the search heuristics. But the performance of the CPSP approach mainly depends on the search heuristics applied to select a certain variable or value from its domain. It turned out that a mixed assignment of H and P associated variables yields the best runtimes. These heuristics can not be applied within the sketched procedure where we have to first assign H-associated variables, then P-associated ones. Thus, a lower CPSP performance is expected. But, we have to do less search which results in much faster runtimes than enumerating all optimal structures. 4 Representative Optimal Structures with Side Chains Recently, we have introduced the extension of the CPSP approach [9] to HP models including side chains [6]. Here, each amino acid of a protein sequence is represented by two monomers: Cib representing the backbone atoms, and Cis representing the atoms of the side chain. Beneath the SAW condition on the backbone monomers Cib , we constrain each side chain to be neighbored to its backbone, i.e. ∀1≤i≤n : (Cis − Cib ) ∈ NL . An example structure is given in Fig. 1b). The applied energy function E ′ exploits only HH-contacts of side chain monomers Cis : ( X −1 : (Cis − Cjs ) ∈ NL ∧ Si = Sj = H ′ s E (S, C ) = (3) 0 : otherwise 1≤i<j≤n Therefore, the side chain models show an even higher degeneracy than the backbone-only models discussed so far, since all backbone monomers Cib are H unconstrained by the energy function as well. Thus, an equivalence relation ≈ that focuses on the monomers constrained by the energy function is even more H striking in HP models including side chains. The relation ≈ is given by H (C b , C s ) ≈ (Ĉ b , Ĉ s ) ⇔ ∀i:Si =H : Cis = Ĉis (4) Therefore, we will enforce that structures from one equivalence class show the same H monomer side chain positioning. The CPSP approach for HP models including side chains differs only in the CSP formulation from the original approach for backbone-only models [9]. This allows for the application of the same approach discussed in the previous section to enumerate non-equivalent optimal structure representatives. Thus, we restrict search to the H associated side chain variables first and only check for satisfiability on the remaining variables. Fig. 2. Backbone-only models : Histogram of core-degeneracy (green) and degeneracy (red) with cut-off ≤ 106 . (Plots refer to 3D cubic lattice and sequence length 27.) 5 Results and Discussion We exemplify the enumeration of representatives for backbone-only and side chain models. We focus on the comparison of the resulting core-degeneracy of a sequence and its overall number of optimal structures, i.e. degeneracy, because we are interested in a reduced set of optimal structures, e.g. for local search initialization (see introduction). All following results are given for HP-sequences of length 27 in 3D cubic lattice. Since the enumeration and check of all 227 sequences (> 108 ) is computationally not feasible, we restrict each study to a large randomly chosen subset of 105 and 104 sequences, respectively. The program HPrep implements the approach from section 3. It is integrated into the CPSP-tools package [10] version 2.4.0 and available online1 . As discussed in Sec. 2, the structure threading step of the CPSP approach screens through a precomputed list of appropriate H-cores in decreasing number of contacts stored in a database. Therefore, it might occur that the available list from the database is exceeded without any solution, i.e. no optimal structure was computed. Still, the energy of the last H-core tried is a close lower bound on the energy this sequence can adopt. In the following, B denotes the subset of sequences where the current H-core database is not sufficient and thus the CPSP approach can give only a lower bound for now. The number of sequences in B is quite small. It is reasonable to assume that the degeneracy distribution among B is the same as for the remaining sequences or on average even higher. Backbone-only models We tested 105 random sequences in the backbone-only model in the 3D cubic lattice. Here, only 66% show a degeneracy below 106 . B comprises about 4% of the sequences. The remaining 30% can adopt even more than 106 structures with minimal energy. 1 http://cpsp.informatik.uni-freiburg.de Fig. 3. Models with side chains : Histogram of the core-degeneracy (green) and degeneracy (red) with cut-off ≤ 106 . Note: only 408 sequences out of 104 showed a degeneracy below 106 as given in the text. (Plots refer to 3D cubic lattice and sequence length 27.) Figure 2 summarizes the results: in red the degeneracy and in green the coredegeneracy distribution with cut-off 106 is presented. Thus, in red the degeneracy distribution comprises 66% of the sequences as given above. In contrast, all sequences show a number of optimal equivalence classes below 106 (in green)! The average degeneracy is reduced from 124800 (with cutoff 106 ) to a mean core-degeneracy of 4856. This reduction within two orders of magnitude results in reasonably small sets of representative structures e.g. to be utilized in local search initializations. Furthermore, the enumeration of representatives is on average six times faster than the enumeration of all optimal structures with a mean runtime of 2 seconds (Opteron 2356 - 2.3 GHz). This increase of small sets of representatives compared to the complete sets of optimal structures shows the advantage of the approach: core-degeneracy does not show the huge combinatorial explosion of degeneracy. This gets even more striking in HP models including side chains, as shown in the next section. Models including side chains The degeneracy in HP models including side chains is much higher than for backbone-only models. This results from the simple energy function (Eq. 3) that does not constrain the backbone or P monomers. Therefore, an immense number of optimal structures is present. From the 104 HP-sequences tested only 408 show a degeneracy below 106 . B comprises again about 3.1% of the sequences. When investigating core-degeneracy the picture changes completely: All of the sequences tested have less than 106 representatives. Figure 3 summarizes the distribution. The average number of representatives is about 1550, which is again at least three orders of magnitude smaller than the average degeneracy. Since we have only a very rough lower bound of 106 on the average degeneracy (due to the cut-off), the real reduction ratio is expected to be even higher. 6 Conclusions The introduced equivalence relations for HP models enables a energy function driven partitioning of structures. The presented CPSP approach extension en- ables an efficient calculation of representatives for all equivalence classes of optimal structures, i.e. calculation of a sequence’s core-degeneracy. Using our implementation HPrep, we showed that sequences show several orders of magnitudes less optimal equivalence classes than optimal structures. This is most striking in models including side chains. The sets of representatives are usually small. Furthermore, representatives show different hydrophobic core arrangements. Therefore, they are well placed to be used for the initialization of local search procedures that utilize more complex energy functions [14]. This emulates the hydrophobic collapse in the folding process. Since a sequence’s degeneracy is a measure of structural stability [12], we propose another application of our approach. The core-degeneracy might be used as a more reasonable measure of stability in the HP model compared to degeneracy. It ignores the HP model specific degeneracy blow-up due to unconstrained subchains of P monomers (see section 3). Thus, a structural stability analysis could be based on the presented equivalence classes instead of all possible structures. References 1. Vishwas R. Agashe, M. C. R. Shastry, and Jayant B. Udgaonkar. Initial hydrophobic collapse in the folding of barstar. Nature, 377:754–757, 1995. 2. Rolf Backofen and Sebastian Will. Optimally compact finite sphere packings — hydrophobic cores in the FCC. In Proc of CPM’01, volume 2089 of LNCS, pages 257–272, 2001. 3. Rolf Backofen and Sebastian Will. A constraint-based approach to fast and exact structure prediction in three-dimensional protein models. J Constraints, 11(1):5– 30, Jan 2006. 4. Bonnie Berger and Tom Leighton. Protein folding in the hydrophobic-hydrophilic (HP) model is NP-complete. J Comp Biol, 5:27–40, 1998. 5. K. A. Dill, S. Bromberg, K. Yue, K. M. Fiebig, D. P. Yee, P. D. Thomas, and H. S. Chan. Principles of protein folding – a perspective of simple exact models. Protein Science, 4:561–602, 1995. 6. S. Bromberg K. A. Dill. Side-chain entropy and packing in proteins. Protein Sci, 3(7):997–1009, 1994. 7. Kit F. Lau and Ken A. Dill. A lattice statistical mechanics model of the conformational and sequence spaces of proteins. Macromol., 22(10):3986–3997, 1989. 8. Martin Mann, Daniel Maticzka, Rhodri Saunders, and Rolf Backofen. Classifying protein-like sequences in arbitrary lattice protein models using LatPack. HFSP Journal, 2(6):396, 2008. 9. Martin Mann, Cameron Smith, Mohamad Rabbath, Marlien Edwards, Sebastian Will, and Rolf Backofen. CPSP-web-tool : a server for 3D lattice protein studies. Bioinformatics, 25(5):676–677, 2009. 10. Martin Mann, Sebastian Will, and Rolf Backofen. CPSP-tools - exact and complete algorithms for high-throughput 3D lattice protein studies. BMC Bioinformatics, 9:230, 2008. 11. S. Miyazawa and R. L. Jernigan. Residue-residue potentials with a favorable contact pair term and an unfavorable high packing density term, for simulation and threading. J Mol Biol, 256(3):623–44, 1996. 12. David Shortle, Hue S. Chan, and Ken A. Dill. Modeling the effects of mutations on the denatured states of proteins. Prot Sci, 1:201–215, 1992. 13. Kathleen Steinhöfel, Alexandros Skaliotis, and Andreas A. Albrecht. Stochastic protein folding simulation in the d-dimensional HP-model. In Proc of BIRD’07, pages 381–394. Springer, 2007. 14. Abu Dayem Ullah, Leonidas Kapsokalivas, Martin Mann, and Kathleen Steinhöfel. Protein folding simulation by two-stage optimization. In Proc. of ISICA’09, CCIS, Wuhan, China, Oct 2009. Springer. (accepted). 15. Sebastian Will and Martin Mann. Counting protein structures by DFS with dynamic decomposition. In Proc of WCB’06, pages 83–90, 2006.
5cs.CE
Nearest Common Ancestors: Universal Trees and Improved Labeling Schemes arXiv:1707.08807v1 [cs.DS] 27 Jul 2017 Fabian Kuhn∗ Konstantinos Panagiotou† Pascal Su‡ Abstract We investigate the nearest common ancestor (NCA) function in rooted trees. As the main conceptual contribution, the paper introduces universal trees for the NCA function: For a given family of rooted trees, an NCA-universal tree S is a rooted tree such that any tree T of the family can be embedded into S such that the embedding of the NCA in T of two nodes of T is equal to the NCA in S of the embeddings of the two nodes. As the main technical result we give explicit constructions of NCA-universal trees of size n2.318 for the family of rooted n-vertex trees and of size n1.894 for the family of rooted binary n-vertex trees. A direct consequence is the explicit construction of NCA-labeling schemes with labels of size 2.318 log2 n and 1.894 log2 n for the two families of rooted trees. This improves on the best known such labeling schemes established by Alstrup, Halvorsen and Larsen [SODA 2014]. Keywords: Rooted Trees, NCA, Nearest Common Ancestor, Lowest Common Ancestor, Universal Trees, Labeling Schemes, Embedding Schemes 1 Introduction The nearest common ancestori) (NCA) of two vertices u and v of a rooted tree T is the first common vertex of the paths connecting u and v to the root of T . Finding the nearest common ancestor appears as an essential operation in many algorithms and applications (see for example the survey by Alstrup, Gavoille, Kaplan, and Rauhe [2]). NCA-Universal Trees. The present paper introduces the notion of NCA-universal trees as a novel tool to study and algorithmically deal with the NCA function in rooted trees. We define an NCA-universal tree S for a family of rooted trees T as such that every tree T ∈ T can be embedded into S such that the NCA function is preserved by the embedding. More formally, an embedding of T into S is an injective mapping ϕT of V (T ) into V (S) such that the embedding function ϕT and the NCA function commute. ∗ Department of Computer Science, University of Freiburg, Germany. Department for Mathematics, University of Munich, Germany ‡ Department of Computer Science, ETH Zurich, Switzerland. i) In the literature, the nearest common ancestor of two vertices in a rooted tree is sometimes also referred to as the lowest or least common ancestor (LCA). † 1 NCA-Labeling Schemes. As an immediate application of an NCA-universal tree S for a family T of rooted trees, S directly implies an NCA-labeling scheme [2] for the family T . Generally, a labeling scheme is a way to preprocess the structure of a graph to later allow simple and fast queries. A labeling scheme consists of an encoder and a decoder, where the encoder must be able to label a family of graphs such that the decoder can answer queries, given just the labels and no additional information about the underlying graph. More specifically, an NCA-labeling scheme assigns a unique label to each node of a rooted tree T such that given the labels of two vertices u and v of T , it is possible to compute the label of the NCA of u and v in T . If an NCA-univeral tree S for a family T of rooted trees is given, we can get an NCA-labeling scheme for T as follows. Let |S| be the number of vertices of S and assume that the vertices of S are labeled from 0 to |S| − 1 in a arbitrary fixed way. Given an embedding of a tree T ∈ T into S, we then get the labeling of a vertex v of T by using the label of the vertex x of S to which v is embedded. The size of the labels (in bits) of the labeling scheme is therefore exactly dlog |S|e. We remark that throughout the paper, all logarithms are to base 2. Contribution. We show that the family of all rooted trees with at most n vertices has an NCAuniversal tree of size O(n2.318 ) and that the family of all binary rooted trees with at most n vertices has an NCA-univeral tree of size O(n1.894 ). This implies that the families of rooted n-vertex trees and of rooted n-vertex binary trees have labeling schemes with labels of size 2.318 log n and 1.894 log n, respectively. This improves on the best previous NCA-labeling schemes that were developed by Alstrup, Halvorsen and Larsen [3] and which require labels of size 2.772 log n for general rooted trees and of size 2.585 log n for binary rooted trees. In [3], it is also shown that any NCA-labeling scheme for general n-vertex rooted trees requires labels of size at least 1.008 log n. As we show how to explicitly construct the NCA-universal trees, our labeling schemes are constructive. Note that the best NCA-labeling schemes of [3] are not constructive and that the best previous constructive NCA-labeling scheme for n-vertex rooted trees requires labels of size 3 log n. Further, our NCA-labeling schemes are efficient, the embedding of a rooted tree into the constructed NCA-universal tree can be computed efficiently and a single query can be answered in time O(log2 n) (O(log n) for binary trees). We believe that our new NCA-labeling schemes are not only interesting because they improve upon the best existing schemes, but also because our approach leads to more intuitive and significantly simpler constructions. Related Work. Graph labeling schemes are an elegant way to store structural information about a graph. As every vertex is only assigned a small label, the information is stored in a completely distributed way and graph labelings therefore are particularly interesting in a distributed context, where labeling schemes are used for various kinds of graph queries [10, 15]. In addition, labeling schemes can be used in a context where extremely large graphs are processed and where accessing the data is expensive. To answer a pair-wise query, only the two labels of the corresponding vertices need to be accessed. The first labeling schemes that appear in the literature are adjacency labeling schemes (given the labels of two vertices, determine whether the vertices are adjacent). They were introduced among others by Breuer [6] and Folkman [7]. In the context of adjacency labeling schemes, it is well known that they are tightly connected to induced universal graphs. A graph G is an induced universal graph for a graph family H if G contains every graph H ∈ H as an induced subgraph. Induced universal graphs were first described by Rado [17] and Kannan et al. [14] noted the equivalence between adjacency labeling schemes and induced universal graphs. When considering the family of rooted trees we are interested in different queries such as whether 2 a vertex is an ancestor of the other. Ancestry labeling has been studied and labeling schemes of size log(n) + Θ(log(log(n))) are known to be tight [1]. If the tree has low depth, then a scheme of size log(n) + 2 log(d) + O(1) is known, where d is the depth of the tree [8]. For NCA-labeling schemes, a linear-size labeling scheme that answers queries in constant time was introduced by Harel and Tarjan in [12, 13]. In the following, there was a series of significant improvements in [16], [4], [9], [18], [5], [2] and most recently in [3]. In particular in [3], a lower bound for NCA labeling schemes of 1.008 log n is shown, which separates NCA-labelings, that need labels of size log n + Ω(log n), from ancestry labeling schemes, where labels of size log n + O(log log n) are sufficient. There is concurrent work by Gawrychowski and Łopuszański [11] who reach the exact same bounds for labeling schemes and construct almost identical universal trees as we do. The proof method is a bit different and in their paper they also have lowerbounds for the size of a universal tree for the NCA function. Outline. The rest of the paper is organized as follows. In the remainder of this section, we first formally define the problems and state our results in Sections 1.1 and 1.2. In Section 2, we first prove a simpler upper bound of O(n2 ) on the size of NCA-universal trees for the family of binary rooted trees. We extend the construction of Section 2 to obtain the stronger and more general results stated above in Section 3. Finally, in Section 4, we sketch how to efficiently implement our labeling scheme and in Section 5, we conclude the paper and discuss some open issues. 1.1 Definitions We next define the necessary graph-theoretic concepts and notation and we in particular formally introduce the notion of universal trees for the NCA function. In the following let Tn be the family of unlabeled rooted trees with at n vertices and Bn the family of unlabeled rooted binary trees with n vertices. Definition 1.1. In a rooted tree T = (V, E) a vertex u is an ancestor of a vertex v if u is contained in the (unique) path from v to the root of T . Note that according to the above definition, a node u is an ancestor of itself. Definition 1.2. Let T = (V, E) be a rooted tree. For a pair of vertices u and v their nearest common ancestor (NCA) ncaT (u, v) is the unique common ancestor that is furthest from the root of T . With this notation at hand we can define the notion of a universal tree for NCA. Definition 1.3. A rooted tree S is called an NCA-universal tree for a family of rooted trees T , if for every tree T ∈ T there is an embedding function ϕT : V (T ) 7→ V (S) such that ϕT commutes with the NCA function, i.e., for all u, v ∈ V (T ), ϕT (ncaT (u, v)) = ncaS (ϕT (u), ϕT (v)). Hence, the embedding has the property that the NCA of two nodes u and v of T is mapped to the NCA of ϕT (u) and ϕT (v) in S. Note that we do not require the root of T to be embedded to the root of S. In the following, a rooted tree that is universal for the NCA function is also called an NCA-universal tree. Definition 1.4. An NCA-labeling scheme for a family of rooted trees T is a pair of functions called the encoder (f ) and decoder (g) with f : {v|v ∈ T ∈ T } 7→ [m] and g : [m] × [m] 7→ [m] satisfying the following properties. 3 i) for every T ∈ T and every u, v ∈ V (T ), f (u) 6= f (v) and ii) for every T ∈ T and every u, v ∈ V (T ), g(f (u), f (v)) = f (ncaT (u, v)). For a node v ∈ T ∈ T , f (v) is called the label of v. The size of the labeling scheme defined by f and g is dlog me, i.e., the number of bits required to store the largest label. Given an NCA-universal tree S for a family of rooted trees T , we directly obtain an NCA-labeling scheme for T . Observation 1.5. Let S be an N -vertex rooted tree that is universal for the NCA function and the family T of rooted trees. Then, there exists an NCA-labeling scheme of size dlog N e for T . Proof. We assign unique names from 0 to N − 1 to the N vertices of S. Consider a tree T ∈ T and let f be an embedding of T into S. The label of a vertex v of T is the name assigned to vertex f (v) of S. Given the labels xu ∈ {0, . . . , N − 1} and xv ∈ {0, . . . , N − 1} of two nodes u and v of T , the decoder outputs the name xw ∈ {0, . . . , N − 1} of the NCA of the vertices u0 and v 0 with names xu and xv in S. 1.2 Main Results Our main result is an explicit construction of universal trees for the families of all trees and binary trees with n vertices. The same bounds can be found in the concurrent work of Gawrychowski and Łopuszański [11]. Theorem 1.6. Let n ∈ N. Then: • There is a rooted tree Sn of size less than n2.318 that is universal for the NCA function and the set Tn of rooted trees of size n. • There is a rooted tree Snbin of size less than n1.894 which is universal for the NCA function and the set Bn of rooted binary trees of size n. The proof can be found in Section 3. The direct implication of this for labeling schemes is summarized in the following statement. Theorem 1.7. For any n ∈ N there exists an N CA-labeling of size less than 2.318 log n and an N CA-labeling for binary trees of size less than 1.894 log n. This is an improvement of the current best known bound of 2.772 log n from [3]. Further for the specific case of binary trees of particular interest is that the constant is now below 2 and therefore will likely not be an integer. Proof of Theorem 1.7. This is exactly what we have shown in Observation 1.5 and therefore follows from Theorem 1.6. Although this is just an existential proof, from the construction we will see later, it is clear that a reasonably fast algorithmic implementation is possible and we will give a sketch in Section 4. 4 Figure 1: Recursive structure of the basic NCA-universal tree construction for rooted binary trees of size at most n. 2 Basic Universal Tree Construction The NCA-universal trees of Theorem 1.6 are constructed recursively. Before proving the general statements of Theorem 1.6, we describe a simpler, slightly weaker construction that provides an NCA-universal tree of size O(n2 ) for n-vertex binary trees. The full constructions required to prove Theorem 1.6 appears in Section 3. Theorem 2.1. For any n ∈ N there exists a rooted tree Sn of size less than n2 which is universal for the NCA function and the rooted binary trees of size at most n. Our recursive universal tree construction requires two kinds of NCA-universal trees. In addition to ordinary unlabeled rooted trees, we also need to define NCA-universal trees for the family of rooted binary trees where one leaf node is distinct (marked). Recall that Bn denotes the set of all n-vertex unlabeled rooted binary trees, so let Bn0 denote the family of unlabeled rooted binary trees on at most n vertices and with one marked leaf. Definition 2.2. A rooted tree S 0 with one marked leaf vertex w is called a NCA-universal tree for a family of rooted trees T 0 with one marked leaf if for every tree T ∈ T 0 , there exists an embedding function ϕT : V (T ) 7→ V (S 0 ) that maps the marked leaf of T to the marked leaf w of S 0 and where ϕT commutes with the NCA function, i.e., ϕT (ncaT (u, v)) = ncaS (ϕT (v), ϕT (u)) for all u, v ∈ T . As in Definition 1.3, we do not require that the root of T is mapped to the root of S 0 . Overview of the Construction. The construction of the NCA-universal tree for binary rooted trees is done recursively as illustrated in Figure 1. The universal tree Sn for binary trees of size at most n consists of three NCA-universal trees for binary trees of size at most n/2, where one of these three universal trees needs to work for the more general family trees with one marked leaf vertex. Universal trees for the family of n-vertex trees with a marked leaf are constructed recursively in a similar way. They consist of two NCA-universal trees for n/2-vertex binary trees with a marked leaf and of a single NCA-univeral tree for ordinary n − 1-vertex binary trees (see Figure 1). In order to show that the recursive construction of Figure 1 results in an NCA-universal tree we need to argue that any n-vertex binary tree T can be embedded. To achieve this, we show that any 5 rooted tree T has a vertex v such that v splits T into three subtrees of size at most n/2. Vertex v is then embedded to the vertex marked in red in the left part of Figure 1. The three subtrees of T induced by v are then embedded recursively into the three parts of the universal tree construction. Further, we need to show that any rooted tree T with a marked leaf can be partitioned in a similar way to be consistent with the recursive structure in the right part of Figure 1. In the following, we first give the basic technical lemmas required to partition n-vertex trees T into the required smaller subtrees. Based on these partitioning results, we the analyze the recursive NCA-universal tree construction in more detail and prove Theorem 2.1. As the same partitioning lemmas will also be needed in the general NCA-universal tree constructions in Section 3, they are stated more generally than what we require for the simple construction of the present section. Lemma 2.3. For every rooted n-vertex tree T and for every parameter λ ∈ (0, 1], there exists a vertex v ∈ V (T ) such that removing the edges from v to its children splits the tree into components such that each component rooted at a child of v has size at most b(1 − λ) · nc and such the remaining component containing v and the root of T has size at most dλ · ne. Proof. We determine v using the following simple iterative procedure. We initialize v to be the root of T . We stop the procedure as soon as v satisfies the conditions of the lemma. For some vertex u of T , let size(u) be the number of vertices in the subtree rooted at u. If v does not split the tree as required, we let w be the child vertex of v that maximizes size(w) and we set v := w. Since v goes from being the root of T to being a leaf of T during this process, the component containing the root goes from being of size 1 to a set of size n. We claim that for the last vertex v where the connected component of the root is still of size at most dλ · ne, the lemma holds. Clearly, the component with the root is of size at most dλ · ne and it thus suffices to show that all the subtrees of v are of size at most b(1 − λ)nc. Assume for contradiction that v has a child w such that size(w) ≥ 1 + b(1 − λ)nc. Then, removing all subtrees of w from T would result in a component of size at most n − b(1 − λ)nc = dλne and thus v would not be the last vertex for which the connected component of the root is of size at most dλne. For trees with a marked leaf we can get a similar tree splitting lemma. Lemma 2.4. Given a rooted n-vertex tree T with one marked leaf vertex w and a parameter λ ∈ 1 (0, 1]. If n ≥ 1−λ , there exists a vertex v ∈ V (T ) such that when removing the edges connecting v to its children, T is split into components satisfying the following properties. The component containing the root of T and vertex v has size at most dλne, the component containing the marked leaf w has size at most b(1 − λ)nc, and all other components have size at most n − 1. Proof. Let r bet the root vertex of T . We choose v to be last vertex on the path from r to w such that when removing the subtrees of v, the remaining component has size at most dλne. dλne < n, so v cannot be a leaf and thus v 6= w. Let v 0 be the root of the subtree of v containing w. To prove the lemma, it suffices to show that the subtree rooted at v 0 has size size(v 0 ) ≤ b(1 − λ)nc. For the sake of contradiction, assume that size(v 0 ) ≥ b(1 − λ)nc + 1. In this case, the total size of all subtrees of v 0 is at least b(1 − λ)nc and thus removing all subtrees of v 0 would leave a component of size at most dλne. This contradicts the assumption that v is the last vertex on the path from r to w for which this is true. Proof of Theorem 2.1. For every integer n ≥ 1, we show how to construct an NCA-universal tree Sn for the family Bn of n-vertex rooted binary trees and an NCA-universal tree Sn0 for the family Bn0 of n-vertex binary rooted trees with one marked leaf. We will prove by induction on n that |Sn | ≤ n2 and that |Sn0 | ≤ 2n2 − 1 for all n ≥ 1. 6 Figure 2: Embedding of an n-vertex binary tree T into Sn . For the induction base, note that S1 and S10 clearly need to only consist of a single vertex and we thus have |S1 | = |S10 | = 1. Thus, the bounds on |Sn | and |Sn0 | hold for n = 1. For the induction step, assume that n ≥ 2 and that |Sk | ≤ k 2 and |Sk0 | ≤ 2k 2 − 1 for all 1 ≤ k < n. We build the two NCA-universal trees Sn and Sn0 by using smaller NCA-universal trees as given in Figure 1. That 0 is, Sn is composed of one copy of Sdn/2e and two copies of Sbn/2c and Sn0 is composed of one copy 0 0 of Sdn/2e , Sbn/2c , and Sn−1 . We need to show that the constructed trees Sn and Sn0 are in fact NCA-universal trees and that they satisfy the required size bounds. We first show that the trees are or the right size. Using the induction hypothesis, we have Sd0 n e + 2 · Sb n2 c ≤ 2 · |Sn0 | = Sd0 n e + Sb0 n c 2 2 2 l n m2 j n k2 −1+2· ≤ n2 , and 2 2 l n m2 j n k2 + |Sn−1 | ≤ 2 · −1+2· − 1 + (n − 1)2 ≤ 2n2 − 1. 2 2 |Sn | = It thus remains to prove that the recursive construction of Sn and Sn0 allows to find a proper embedding for every T ∈ Bn into Sn and every T 0 ∈ Bn into Sn0 , respectively. To show this, we use Lemma 2.3 and Lemma 2.4. We first show how to construct an embedding ϕT of a binary n-vertex tree T ∈ Bn into Sn . For this purpose, we apply Lemma 2.3 with parameter λ = 1/2 to tree T . Let v ∈ V (T ) be the vertex of T that splits the tree such that the part containing the root of T and v has size at most dn/2e and such that all other components have size at most bn/2c. For the embedding take the splitting vertex v ∈ T given by Lemma 2.3 which will be embedded to the marked vertex of the copy of Sd0 n e (cf. Figure 1). Consider the three components 2 of T after splitting. By the induction hypothesis there is an embedding function to embed the child components (components below the splitting vertex v) into the two copies of Sb n2 c . Then we take the component with the root and the marked vertex to get a tree with a single marked leaf of size at most d n2 e and the induction hypothesis again provides with an embedding function of this component into Sd0 n e . The embedding is depicted in Figure 2. 2 To see that the NCA-function for any two vetices u1 and u2 and the described embedding function ϕT commute, we need that ncaSn (ϕT (u1 ), ϕT (u2 )) = ϕT (ncaT (u1 , u2 )). This can be verified through the following case analysis considering the three components after the splitting process. If u1 and u2 are in the same component, then we have embedded them into the same subtree and by the induction hypothesis, we have ϕT (ncaT (u1 , u2 )) = ncaSn (ϕT (u1 ), ϕT (u2 )). If u1 and u2 are in different child components, we have ncaT (u1 , u2 ) = v and the embedding is therefore also correct because is embedded to the vertex marked in red in Figure 2. Finally, if u1 is from the 7 Figure 3: Embedding of an n-vertex binary tree T 0 with a marked leaf into Sn0 . component containing the root and vertex v and u2 is a vertex from a child component, we have ncaT (u1 , u2 ) = ncaT (u1 , v) and similarly ncaSn (ϕT (u1 ), ϕT (u2 )) = ncaSn (ϕT (u1 ), ϕT (v)) and the embedding is therefore again correct by the induction hypothesis (applied to the partial embedding 0 into the subtree Sdn/2e ). For the family of n-vertex binary trees with a marked leaf, the embedding into the recursively constructed tree Sn0 (cf. Figure 1) works in similar way. Let T 0 be a binary tree of size at most n and with a marked leaf. We apply Lemma 2.4 with parameter λ = 1/2 to T 0 to obtain a vertex v ∈ V (T 0 ) that splits T 0 into a) a subtree of size at most dn/2e that contains the root of T 0 and that contains v as a leaf vertex, b) a subtree size at most bn/2c that is rooted at a child of v and contains the marked leaf of T 0 , and c) a (possibly empty) subtree of size at most n − 1 rooted at a child of v. The tree T 0 is embedded into Sn0 by embedding vertex v to the center red node separating the three recursive subtrees in Figure 1. The three subtrees resulting after splitting T 0 are embedded into the 0 0 three recursively constructed subtrees Sdn/2e , Sbn/2c , and Sn−1 in the natural way. The proof that the embedding is correct is done in the same way as for the embedding of T into Sn . The details of the embedding are illustrated in Figure 3. 3 General Universal Tree Construction The proof of the basic construction was handled in detail. We now adjust the construction to improve on the exponent in the size of Sn and to deal with general rooted trees. Throughout the section, we omit floor and ceiling functions. They do not change the calculations significantly, but hinder the readability of the proof. 8 Figure 4: General recursive construction of an NCA-universal tree for n-vertex rooted binary trees. Proof of Theorem 1.6. As suggested in Lemma 2.3 and Lemma 2.4, the adjustment of the basic construction can be made by choosing λ 6= 1/2 for the size of the splitted components. We start with the binary tree case. We apply the same induction as in the proof of Theorem 2.1. In the general case, we prove that |Sk | ≤ k β and |Sk0 | ≤ c · k β ∀ 1 ≤ k < n and some constants c and β that will be determined later. 0 and attach copies of S(1−λ)n and Sn/2 to the marked For the construction of Sn we take Sλn vertex for some λ ∈ (0, 1/2]. The construction of Sn0 remains the same as in Section 2. For an illustration, see Figure 4. Note that although in Lemma 2.3 the child components can be of size (1 − λ) · n, the two components together can have size at most n, so the smaller of the components is always of size at most n/2. We obtain 0 | + |S |Sn | ≤ |Sλn | ≤ c(λn)β + ((1 − λ)n)β + (1−λ)n | + |S n 2 β β |Sn0 | ≤ |S 0n | + |S 0n | + |Sn | ≤ c n2 + c n2 + nβ 2  n β 2 ! ≤ nβ ! ≤ cnβ . 2 We would like to choose β as small as possible. Note that with the second inequality, we obtain  n β  n β c +c + nβ ≤ cnβ 2 2 and we thus get that c ≥ 1−21β−1 . In our construction we are allowed to freely choose λ ∈ (0, 1/2]. We can thus choose β and λ such that β is minimized and following inequality is still satisfied: (1 − λ)nβ + cλnβ + · nβ ≤ nβ . 2 To achieve this, we choose λ = 0.296149... and the corresponding β ≤ 1.89311.... This proves the claim of Theorem 1.6 about binary rooted trees. In a general tree, a vertex can have many children. Therefore we adjust the construction to deal with this fact as shown in Figure 5. Take any λ ∈ (0, 1/2]. Let Sn be composed of a copy of 0 and attached to the marked vertex of that tree copies of S Sλn (1−λ)n , Sn/2 , Sn/3 , Sn/4 , etc., up to 0 0 S1 . Similarly, let Sn be composed of a copy of Sn/2 and attached to the marked vertex of that tree 0 , S , S copies of Sn/2 n n/2 , Sn/3 , Sn/4 , etc., up to S1 . 9 Figure 5: Construction of an NCA-univeral trees Sn for general rooted trees. For the embedding, note that we can sort the child components by size. Lemma 2.3 states that any child component is of size at most (1−λ)·n. In addition, the total size of all components cannot add up to more than the entire tree of size n. This implies that after ordering the components by size, the ith child component without a marked vertex is of size at most n/i. With the induction hypothesis that |Sk | ≤ k β and |Sk | ≤ c · k β , the recursion gives ! Pn β 0 |+ β β ≤ nβ n |Sn | ≤ |S(1−λ)n | + |Sλn i=2 |S i | ≤ ( (1 − λ)n) + c(λn) + (ζ(β) − 1)n , ! β β P |Sn0 | ≤ |S 0n | + |S 0n | + ni=1 |S ni | ≤ cnβ , ≤ c n2 + c n2 + ζ(β)nβ 2 2 where ζ(β) is the Riemann zeta function (ζ(β) = −β i≥1 i P ). Again we can deduce from the second ζ(β) . 1−2β−1 inequality that c ≥ By using λ = 0.341395..., we get that β ≤ 2.31757... . In both constructions, the fact that the NCA function and the embedding function commute follows in the same way as in the proof of Theorem 2.1. This concludes the proof of Theorem 1.6. 4 Implementation of the NCA-Labeling Scheme Theorem 4.1. The labeling schemes described in Section 3 can be constructed efficiently. Further, given two labels, the label of the nearest common ancestor can be determined in O(log2 n) time (in O(log n) time in the binary tree case). Proof Sketch. For R ∈ R we write [R] := {x : 1 ≤ x ≤ R}. In order to assign labels to the vertices of Sn we proceed as follows. Set s(n) = nβ , and recall that |Sn | ≤ s(n) and |Sn0 | ≤ cs(n). Moreover, as depicted in Figure 5 the tree Sn is composed out of the n + 1 trees 0 T0 = Sλn T1 = S(1−λ)n (1) T` = Sn/` , where 2 ≤ ` ≤ n. Define the corresponding counting sequence t−1 = 0 t0 = c s(λn) t1 = t0 + s((1 − λ)n) t` = t`−1 + s(n/`), where 2 ≤ ` ≤ n. 10 (2) For Sn0 we proceed similarly. As depicted in Figure 5 Sn0 is composed out of the n + 2 trees 0 0 T−1 = Sn/2 0 T00 = Sn/2 T`0 (3) = Sn/` , where 1 ≤ ` ≤ n. and the corresponding counting sequence is given by t0−2 = 0 t0−1 = cs(n/2) t00 = t−1 + cs(n/2) (4) t0` = t`−1 + s(n/`), where 1 ≤ ` ≤ n. Given these sequences, in order to assign labels to the vertices in Sn we assign to the vertices of Ti , 0 ≤ i ≤ n the labels in [ti ] \ [ti−1 ]. The assignment is performed recursively, in the sense that as soon the labels in Ti , 0 ≤ i ≤ n are assigned, they are translated by an additive dti−1 e, so that they all lie (with room to spare) in the required set [ti ] \ [ti−1 ]. The assignment is performed analogously for Sn0 , where we use the corresponding counting sequence instead. Given the label of a vertex in Sn , its location in the tree can be found with this preprocessing in O(log2 n) time. Indeed, in every step we have to decide in which of the at most n+2 subtrees we have to branch to; however, this can be decided with binary search on the sequences (ti )0≤i≤n or (t0i )−1≤i≤n . As the depth of the recursive construction of Sn is O(log n), the claim follows. 5 Conclusion We introduced NCA-universal trees and gave simple recursive constructions of such trees that in particular lead to improved NCA-labeling schemes for rooted trees. The paper leaves several interesting open questions. The current upper bound of 2.318 log n bits per label is still quite far from the 1.008 log n-bit lower bound proven in [3] and it remains an intriguing open problem to close this gap. In addition, given that NCA-universal trees provide an intuitive way to argue about NCA-labeling schemes, it is natural to ask whether the approach can lead to optimal NCA-labeling schemes or whether every NCA-labeling scheme for a given tree family can be turned into an equivalent one that can be characterized by an NCA-universal tree for the tree family. The following observation shows that NCA-universal trees are equivalent to a certain well-structured class of NCA-labeling schemes. We call an NCA-labeling scheme consistent if any three labels can occur together in some tree. More formally, an NCA-labeling scheme is called consistent if it satisfies the following three properties for any 3 possible labels x, y, and z. In the following, g is the decoder function. (I) If g(x, y) = z, then g(x, z) = z and g(y, z) = z (i.e., if z is the NCA of x and y, then z is an ancestor of x and y) (II) If g(x, y) = y and g(y, z) = z, then g(x, z) = z (i.e., if y is an ancestor of x and z an ancestor of y, then also z is an ancestor of x) (III) If g(x, y) = y and g(x, z) = z, then g(y, z) ∈ {y, z} (i.e., if y and z are ancestors of x, then z is an ancestor of y or y is an ancestor of z) 11 Theorem 5.1. Every NCA-universal tree S for a given family T of trees leads to a consistent NCA-labeling scheme for T with labels of size dlog |S|e. Conversely, every consistent NCA-labeling scheme for T and with `-bit labels induces an NCA-universal tree of size 2` for T . Proof. The first claim of the lemma is immediate because S is a tree and therefore any three vertices of S (i.e., any three labels) are consistent. For the second claim, define a directed graph G = (V, E) as follows. The vertex set V of G is the set of labels of the given NCA-labeling scheme. Assume that g is the decoder function of the labeling scheme. We add a directed edge from u ∈ V to v ∈ V if g(u, v) = v and there is no vertex w such that g(u, w) = w and g(w, v) = v (i.e., if v is the parent of u). We claim that G is a rooted tree. First observe that G is acyclic. Otherwise, by using Property (II) several times, we can find three vertices u, v, and w such that g(u, v) = v, g(v, w) = w, and g(w, u) = u. However from Property (II) we then also have g(u, w) = w, a contradiction. Second, we show that the out-degree of each vertex of G is at most 1. For contradiction, assume that there exists a vertex u that has out-going edges to v and w. We then have g(u, v) = v and g(u, w) = w and by Property (III) of consistent labeling schemes, we thus also have g(v, w) = w or g(w, v) = v. Thus, one of the two edges (u, v) and (u, w) cannot be in G. Finally, we show that there can be at most one vertex with out-degree 0. For the sake of contradiction assume that u and v both have out-degree 0 and let g(u, v) = w. By Property (I), we then also have g(u, w) = w and g(v, w) = w. If w 6= u, this implies that u has out-degree at least 1 and if w 6= v, it implies that v has out-degree at least 1. Hence, G is a rooted tree on the set of labels of the labeling scheme. Because the ancestry relationship of G is consistent with the labeling scheme, G is an NCA-universal tree for the family T. References [1] S. Abiteboul, H. Kaplan, and T. Milo. Compact labeling schemes for ancestor queries. In Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’01, pages 547–556, Philadelphia, PA, USA, 2001. Society for Industrial and Applied Mathematics. [2] S. Alstrup, C. Gavoille, H. Kaplan, and T. Rauhe. Nearest common ancestors: A survey and a new distributed algorithm. In Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures, SPAA ’02, pages 258–264, New York, NY, USA, 2002. ACM. [3] S. Alstrup, E. B. Halvorsen, and K. G. Larsen. Near-optimal labeling schemes for nearest common ancestors. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’14, pages 972–982, Philadelphia, PA, USA, 2014. Society for Industrial and Applied Mathematics. [4] M. A. Bender and M. Farach-Colton. The lca problem revisited. In LATIN, volume 1776, pages 88–94. Springer, 2000. [5] O. Berkman and U. Vishkin. Recursive star-tree parallel data structure. SIAM Journal on Computing, 22(2):221–242, 1993. [6] M. Breuer. Coding the vertexes of a graph. IEEE Transactions on Information Theory, 12(2):148–153, April 1966. 12 [7] M. A. Breuer and J. Folkman. An unexpected result in coding the vertices of a graph. Journal of Mathematical Analysis and Applications, 20(3):583 – 600, 1967. [8] P. Fraigniaud and A. Korman. Compact ancestry labeling schemes for xml trees. In Proceedings of the Twenty-first Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’10, pages 458–466, Philadelphia, PA, USA, 2010. Society for Industrial and Applied Mathematics. [9] H. N. Gabow, J. L. Bentley, and R. E. Tarjan. Scaling and related techniques for geometry problems. In Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing, STOC ’84, pages 135–143, New York, NY, USA, 1984. ACM. [10] C. Gavoille and D. Peleg. Compact and localized distributed data structures. Distributed Computing, 16(2):111–120, Sep 2003. [11] P. Gawrychowski and J. Łopuszański. Better labeling schemes for nearest common ancestors through minor-universal trees. arXiv:1707.06011, 2017. [12] D. Harel. A linear time algorithm for the lowest common ancestors problem. In Foundations of Computer Science, 1980., 21st Annual Symposium on, pages 308–319. IEEE, 1980. [13] D. Harel and R. E. Tarjan. Fast algorithms for finding nearest common ancestors. SIAM Journal on Computing, 13(2):338–355, 1984. [14] S. Kannan, M. Naor, and S. Rudich. Implicat representation of graphs. SIAM Journal on Discrete Mathematics, 5(4):596–603, 1992. [15] D. Peleg. Proximity-preserving labeling schemes and their applications. In Proc. 25th Int. Workshop on Graph-Theoretic Concepts in Comp. Sc., pages 30–41, 1999. [16] P. Powell. further improved lca algorithm. Plant Genome Data and Information Center collection on computational molecular biology and genetics, 1990. [17] R. Rado. Universal graphs and universal functions. Acta Arithmetica, 9(4):331–340, 0 1964. [18] B. Schieber and U. Vishkin. On finding lowest common ancestors: Simplification and parallelization. SIAM Journal on Computing, 17(6):1253–1262, 1988. 13 A A.1 Appendix Induction Basis For n equals one through four it is simple to find a universal tree of size at most n2 . For example: Figure 6: The root is always the top most vertex but the root of T ∈ Bn does not have to be embedded to the root of Sn Sn0 shall have size at most 2n2 . We want for any n a large tree Sn0 with a marked leaf such that we can embed any tree on n vertices with a marked leaf with the nca-function commuting. Again as example and induction basis: Figure 7: The larger red vertex is the marked leaf. It is easy to check that ∀T ∈ Bl and ∀T 0 ∈ Bl0 the NCA-query is equivalent to the NCA-query in Sl or Sl0 ∀l ∈ {1, .. , 4} resp. 14
8cs.DS
On computing tree and path decompositions with metric constraints on the bags Guillaume Ducoffe1,2 , Sylvain Legay3 , and Nicolas Nisse2,1 arXiv:1601.01958v1 [cs.CC] 8 Jan 2016 1 Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, 06900 Sophia Antipolis, France 2 INRIA, France 3 LRI, Univ Paris Sud, Université Paris-Saclay, 91405 Orsay, France Abstract We here investigate on the complexity of computing the tree-length and the tree-breadth of any graph G, that are respectively the best possible upper-bounds on the diameter and the radius of the bags in a tree decomposition of G. Path-length and path-breadth are similarly defined and studied for path decompositions. So far, it was already known that tree-length is NP-hard to compute. We here prove it is also the case for tree-breadth, path-length and path-breadth. Furthermore, we provide a more detailed analysis on the complexity of computing the tree-breadth. In particular, we show that graphs with tree-breadth one are in some sense the hardest instances for the problem of computing the tree-breadth. We give new properties of graphs with tree-breadth one. Then we use these properties in order to recognize in polynomial-time all graphs with tree-breadth one that are planar or bipartite graphs. On the way, we relate tree-breadth with the notion of k-good tree decompositions (for k = 1), that have been introduced in former work for routing. As a byproduct of the above relation, we prove that deciding on the existence of a k-good tree decomposition is NP-complete (even if k = 1). All this answers open questions from the literature. Keywords: tree-length; tree-breadth; path-length; path-breadth; k-good tree decompositions. 1 Introduction Context. It is a fundamental problem in metric graph theory [7] to embed a graph into a simpler metric space while minimizing the (multiplicative) distortion of the distances in the graph. In particular, minimum distortion embeddings of a graph into a tree or a path have practical applications in computer vision [48], computational chemistry and biology [38] as well as in network design and distributed protocols [36]. The two problems to embed a graph into a tree or a path with minimum distortion are NP-hard [2, 8, 43]. However, there exists a nice setting in order to approximate these two problems. More precisely, a series of graph parameters has been introduced in recent work in order to measure how much the distance distribution of a graph is close to a tree metric or a path metric [26, 29, 30]. We refer to [28, 30] for details about the relationships between these parameters and the two above-mentioned embedding problems. Here we study the complexity of computing these parameters, thereby solving open problems in the literature. The parameters that are considered in this note can be defined using the terminology of Robertson and Seymour tree decompositions [46]. Informally, a tree decomposition is a dividing of a graph G into “bags”: that are overlapping subgraphs that can be pieced together in a tree-like manner (formal definitions will be given in the technical sections of the paper). The shortestpath metric of G is “tree-like” when each bag of the tree decomposition has bounded diameter and bounded radius, where the distance taken between two vertices in a same bag is their distance in G. The tree-length [26] and the tree-breadth [29] of G are respectively the best possible upper-bounds on the diameter and the radius of the bags in a tree decomposition of G. Path-length [49] and path-breadth [30] are defined in the same fashion as tree-length and tree-breadth for path decompositions. In this paper, we focus on the complexity of computing the four parameters tree-length, tree-breadth, path-length and path-breadth. 1 Recent studies suggest that some classes of real-life networks – including biological networks and social networks – have bounded tree-length and tree-breadth [1]. This metric tree-likeness can be exploited in algorithms. For instance, bounded tree-length graphs admit compact distance labeling scheme [25] as well as a PTAS for the well-known Traveling Salesman problem [41]. Furthermore, the diameter and the radius of bounded tree-length graphs can be approximated up to an additive constant in linear-time [19]. In contrast to the above result, we emphasize that under classical complexity assumptions the diameter of general graphs cannot be approximated up to an additive constant in subquadratic-time, that is prohibitive for very large graphs [17]. Note that a large amount of the literature about tree decompositions rather seeks to minimize the size of the bags than their diameter. The tree-width [46] of a graph G is the best possible upperbound on the size of the bags in a tree decomposition of G. However, tree-length and the other parameters that are considered in this paper can differ arbitrarily from tree-width; we refer to [22] for a global picture on the relations between tree-length and tree-width. Furthermore, one aim of this paper is to complete the comparison between tree-width and path-width on one side, and treelength, tree-breadth, path-length and path-breadth on the other side, from the complexity point of view. Let us remind that computing the tree-width (resp. the path-width) is NP-hard [4, 39], however for every fixed k ≥ 1 there is a linear-time algorithm to decide whether a graph has tree-width at most k (resp., path-width at most k) [10, 14]. Related work. The complexity of computing tree-length, tree-breadth, path-length and pathbreadth has been left open in several works [26, 29, 30]. So far, it has been solved only for tree-length, that is NP-hard to compute. Tree-length and tree-breadth. It is NP-complete to decide whether a graph has tree-length at most k for every constant k ≥ 2 [42]. However, the reduction used for tree-length goes through weighted graphs and then goes back to unweighted graphs using rather elegant gadgets. It does not seem to us these gadgets can be easily generalized in order to apply to the other parameters that are considered in this note. On a more positive side, there exists a 3-approximation algorithm for tree-length [26]. In this aspect, it looks natural to investigate on the complexity of computing the tree-breadth, since any polynomial-time algorithm would imply an improved 2-approximation algorithm for tree-length. Path-length and path-breadth. There exist constant-factor approximation algorithms for pathlength and path-breadth [30]. Recently, the minimum eccentricity shortest-path problem – that is close to the computation of path-length and path-breadth – has been proved NP-hard [31]. Let us point out that for every fixed k, it can be decided in polynomial-time whether a graph admits a shortest-path with eccentricity at most k [31]. Our results will show the situation is different for path-length and path-breadth than for the minimum eccentricity shortest-path. Our contributions. On the negative side, we prove that tree-breadth, path-length and pathbreadth are NP-hard to compute. More precisely: • recognizing graphs with tree-breadth one is NP-complete; • recognizing graphs with path-length two is NP-complete; • recognizing graphs with path-breadth one is NP-complete. It is remarkable the last two results (for path-length and path-breadth) are obtained using the same reduction. Our reductions have distant similarities with the reduction that was used for tree-length. However, they do not need any detour through weighted graphs. We next focus our work on tree-breadth (although part of the results may extend to the three other parameters that are considered in this note). We give a more in-depth analysis on the complexity of computing this parameter. In particular, we prove it is equally hard to compute tree-breadth as to recognize graphs with tree-breadth one. Therefore, graphs with tree-breadth one are in some sense the hardest instances for the problem of computing the tree-breadth. The latter partly answers an open question from [29], where it was asked for a characterization of graphs with tree-breadth one. We also prove a few properties of graphs with tree-breadth one. In particular, graphs with tree-breadth one are exactly those graphs admitting a 1-good tree decomposition, that is a tree decomposition whose each bag has a spanning star. The more general notion of k-good tree decompositions was introduced in [40] to obtain new compact routing schemes. Note that as a byproduct of the above relation between 1-good tree decompositions and graphs with tree-breadth 2 one, we obtain that deciding on the existence of a k-good tree decomposition is an NP-complete problem even when k = 1. Finally, on the algorithmic side, we show how to recognize in polynomial time all graphs of tree-breadth one that are planar or bipartite. In particular, our recognition algorithm for planar graphs of tree-breadth one relies upon deep structural properties of these graphs. Definitions and useful notations are given in Section 2. All our results of NP-completeness are listed and proved in Section 3. Sections 4 and 5 are devoted to the computation of tree-breadth. In particular, in Section 5 we present and we prove correctness of an algorithm to recognize planar graphs with tree-breadth one. Finally, we discuss about some open questions in the conclusion (Section 6). 2 Definitions and preliminary results We refer to [24] for a survey on graph theory. Graphs in this study are finite, simple, connected and unweighted. Let G = (V, E) be a graph. For any X ⊆ V , let G[X] denote the subgraph of G induced by X. For any subgraph H of G, let NH (v) denote the set of neighbors of v ∈ V in H, and let NH [v] = NH (v) ∪ {v}. The distance distH (u, v) between two vertices u, v ∈ V in H is the minimum length (number of edges) of a path between u and v in a subgraph H of G. In what follows, we will omit the subscript when no ambiguity occurs. A set S ⊆ V is a dominating set of G if any vertex of V \ S has a neighbor in S. The dominating number γ(G) of a graph G is the minimum size of a dominating set of G. Tree decompositions and path decompositions of a graph. A tree decomposition (T, X ) of G is a pair consisting of a tree T and of a family X = (Xt )t∈V (T ) of subsets of V indexed by the nodes of T and satisfying: S • t∈V (T ) Xt = V ; • for any edge e = {u, v} ∈ E, there exists t ∈ V (T ) such that u, v ∈ Xt ; • for any v ∈ V , the set of nodes t ∈ V (T ) such that v ∈ Xt induces a subtree, denoted by Tv , of T . The sets Xt are called the bags of the decomposition. If no bag is contained into another one, then the tree decomposition is called reduced. Starting from any tree decomposition, a reduced tree decomposition can be obtained in polynomial-time by contracting any two adjacent bags with one contained into the other until it is no more possible to do that. In the following we will make use of the Helly property in our proofs: Lemma 1. [6, Helly property] T Let T be a tree and let T1 , T2 , . . . , Tk be a finite family of pairwise intersecting subtrees. Then, ki=1 Ti 6= ∅, or equivalently there is a node contained in all the k subtrees. Finally, let (T, X ) be a tree decomposition, it is called a path decomposition if T induces a path. Metric tree-likeness and path-likeness. All graph invariants that we consider in the paper can be defined in terms of tree decompositions and path decompositions. Let (T, X ) be any tree decomposition of a graph G. For any t ∈ V (T ), • the diameter of bag Xt equals maxv,w∈Xt distG (v, w); • the radius ρ(t) of a bag Xt equals minv∈V maxw∈Xt distG (v, w). The length of (T, X ) is the maximum diameter of its bags, while the breadth of (T, X ) is the maximum radius of its bags. The tree-length and the tree-breadth of G, respectively denoted by tl(G) and tb(G), are the minimum length and breadth of its tree decomposition, respectively. Let k be a positive integer, the tree decomposition (T, X ) is called k-good when each bag contains a dominating induced path of length at most k − 1. It is proved in [40] every graph G has a k-good tree decomposition for k = ch(G) − 1, with ch(G) denoting the size of a longest induced cycle of G. Finally, path-length, path-breadth and k-good path decompositions are similarly defined and 3 studied for the path decompositions as tree-length, tree-breadth and k-good tree decompositions are defined and studied for the tree decompositions. The path-length and path-breadth of G are respectively denoted by pl(G) and pb(G). It has been observed in [29, 30] that the four parameters tree-length, tree-breadth and pathlength, path-breadth are contraction-closed invariants. We will use the latter property in our proofs. Lemma 2 ( [29, 30]). For every G = (V, E) and for any edge e ∈ E: tl(G/e) ≤ tl(G), tb(G/e) ≤ tb(G) and pl(G/e) ≤ pl(G), pb(G/e) ≤ pb(G). Furthermore, it can be observed that for any graph G, tb(G) ≤ tl(G) ≤ 2 · tb(G) and similarly pb(G) ≤ pl(G) ≤ 2 · pb(G). Moreover, if a graph G admits a k-good tree decomposition, then tb(G) ≤ bk/2c + 1 and tl(G) ≤ k + 1. Before we end this section, let us prove the stronger equivalence, tb(G) = 1 if and only if G admits a 1-good tree decomposition. This result will be of importance in the following. Since a tree decomposition is 1-good if and only if each bag contains a spanning star, we will name the 1-good tree decompositions star-decompositions in the following. Definition 1. Let G = (V, E) be a connected graph, a star-decomposition is a tree decomposition (T, X ) of G whose each bag induces a subgraph of dominating number one, i.e., for any t ∈ V (T ), γ(G[Xt ]) = 1. Clearly, if a graph admits a star-decomposition, then it has tree-breadth at most one. Let us prove that the converse also holds. Lemma 3. For any graph G with tb(G) ≤ 1, every reduced tree decomposition of G of breadth one is a star-decomposition. In particular: • any tree decomposition of G of breadth one can be transformed into a star-decomposition in polynomial-time; • similarly, any path decomposition of G of breadth one can be transformed into a 1-good path decomposition in polynomial-time. Proof. Let (T, X ) be any reduced tree decomposition of G of breadth one. We will prove it is a star-decomposition. To prove it, let Xt ∈ X be arbitrary and let v ∈ V be such that maxw∈Xt distG (v, w) = 1, which exists because Xt has radius one. We now show that v ∈ Xt . Indeed, since the subtree Tv and the subtrees Tw , w ∈ Xt , pairwise intersect, then it comes by the T Helly Property (Lemma 1) that Tv ∩ w∈Xt Tw 6= ∅ i.e., there is some bag containing {v}∪Xt . As a result, we have that v ∈ Xt because (T, X ) is a reduced tree decomposition, hence γ(G[Xt ]) = 1. The latter implies that (T, X ) is a star-decomposition because Xt is arbitrary. Now let (T, X ) be any tree decomposition of G of breadth one. It can be transformed in polynomial-time into a reduced tree decomposition (T 0 , X 0 ) so that X 0 ⊆ X . Furthermore, (T 0 , X 0 ) has breadth one because it is the case for (T, X ), therefore (T 0 , X 0 ) is a star-decomposition. In particular, if (T, X ) is a path decomposition then so is (T 0 , X 0 ). Corollary 1. For any graph G, tb(G) ≤ 1 if and only if G admits a star-decomposition. 3 3.1 Intractability results Path-length and path-breadth This section is devoted to the complexity of all path-like invariants that we consider in this paper. Theorem 1. Deciding whether a graph has path-length at most k is NP-complete even if k = 2. In contrast to Theorem 1, graphs with path-length one are exactly the interval graphs [30], i.e., they can be recognized in linear-time. Theorem 2. Deciding whether a graph has path-breadth at most k is NP-complete even if k = 1. From the complexity result of Theorem 2, we will also prove the hardness of deciding on the existence of k-good path decompositions. 4 Theorem 3. Deciding whether a graph admits a k-good path decomposition is NP-complete even if k = 1. Proof. The problem is in NP. By Lemma 3, a graph G admits a 1-good path decomposition if and only if pb(G) ≤ 1, therefore it is NP-hard to decide whether a graph admits a 1-good path decomposition by Theorem 2. All of the NP-hardness proofs in this section will rely upon the same reduction from the Betweenness problem, defined below. The Betweenness problem, sometimes called the Total Ordering problem, is NP-complete [44]. In [34], it was used to show that the Interval Sandwich problem is NP-complete. What we here prove is that the Interval Sandwich problem remains NP-complete even if the second graph is a power of the first one, where the kth power Gk of any graph G is obtained from G by adding an edge between every two distinct vertices that are at distance at most k in G for every integer k ≥ 1. Indeed, a graph G has path-length at most k if and only if there is an Interval Sandwich between G and Gk (we refer to [42] for the proof of a similar equivalence between tree-length and the Chordal Sandwich problem). Problem 1 (Betweenness). Input: a set S of n elements, a set T of m ordered triples of elements in S. Question: Is there a total ordering of S such that for every triple t = (si , sj , sk ) ∈ T , either si < sj < sk or sk < sj < si ? Now, given an instance (S, T ) of the Betweenness problem, we will construct from S and T a graph GS,T as defined below. We will then prove that pl(GS,T ) ≤ 2 (resp. pb(GS,T ) ≤ 1) if and only if (S, T ) is a yes-instance of the Betweenness problem. Definition 2. Let S be a set of n elements, let T be a set of m ordered triples of elements in S. The graph GS,T is constructed as follows: • For every element si ∈ S, 1 ≤ i ≤ n, there are two adjacent vertices ui , vi in GS,T . The vertices ui are pairwise adjacent i.e., the set U = {ui | 1 ≤ i ≤ n} is a clique. • For every triple t = (si , sj , sk ) ∈ T , let us add in GS,T the vi vj -path (vi , at , bt , vj ) of length 3, and the vj vk -path (vj , ct , dt , vk ) of length 3. • Finally, for every triple t = (si , sj , sk ) ∈ T let us make adjacent at , bt with every ul such that l 6= k, similarly let us make adjacent ct , bt with every ul such that l 6= i. It can be noticed from Definition 2 that for any 1 ≤ i ≤ n, the vertex ui is adjacent to any vertex but those vj such that j 6= i, those at , bt such that si is the last element of triple t and those ct , bt such that si is the first element of triple t. We refer to Figure 1 for an illustration (see also Figure 2). Observe that GS,T has diameter 3 because the clique U dominates GS,T , therefore pl(GS,T ) ≤ 3 and we will show that it is hard to distinguish graphs with path-length two from graphs with path-length three. Similarly, the clique U dominates GS,T hence pb(GS,T ) ≤ 2, thus we will show that it is hard to distinguish graphs with path-breadth one from graphs with path-breadth two. Lemma 4. Let S be a set of n elements, let T be a set of m ordered triples of elements in S. If (S, T ) is a yes-instance of the Betweenness problem then pb(GS,T ) ≤ 1 and pl(GS,T ) ≤ 2, where GS,T is the graph that is defined in Definition 2. Proof. Since pl(GS,T ) ≤ 2 · pb(GS,T ) then we only need to prove that pb(GS,T ) ≤ 1. For convenience, let us reorder the elements of S so that for every triple (si , sj , sk ) ∈ T either i < j < k or k < j < i. It is possible to do that because by the hypothesis (S, T ) is a yes-instance of the Betweenness problem. If furthermore k < j < i, let us also replace (si , sj , sk ) with the inverse triple (sk , sj , si ). This way, we have a total ordering of S such that si < sj < sk for every triple (si , sj , sk ) ∈ T . Then, let us construct a path decomposition (P, X ) with n bags, denoted X1 , X2 , . . . , Xn , as follows. For every 1 ≤ i ≤ n, U ⊆ Xi and vi ∈ Xi . For every t = (si , sj , sk ) ∈ T , we add both at , bt into the bags Xl with i ≤ l ≤ j, similarly we add both ct , dt into the bags Xl with j ≤ l ≤ k. By construction, the clique U is contained in any bag of P and for every triple t = (si , sj , sk ) ∈ T we have at , bt , vi ∈ Xi and at , bt , ct , dt , vj ∈ Xj and ct , dt , vk ∈ Xk , therefore (P, X ) is indeed a path decomposition of GS,T . We claim that for every i, Xi ⊆ N [ui ], that will prove the lemma. Indeed if it were not the case for some i then by Definition 2 there should exist t ∈ T , j, k such that: either t = (si , sj , sk ) ∈ T 5 u1 t = (s i , s j , s k ), ... u3 u4 u i-1 c3 v1 c1 a1 d1 v2 b2 v3 d3 ui v5 at b4 bt a4 vj b3 uj ct dt d4 u i+1 u i+2 vk c4 U ... a3 v4 vi ... a2 d2 c2 b1 i<j<k u1 u2 u3 u5 u2 u k-1 uk uk+1 uk+2 ... Figure 1: The graph GS,T for S = [|1, 5|] and T = {(i, i + 1, i + 2) | 1 ≤ i ≤ 4}. Each colour corresponds to a given triple of T . For ease of reading, the adjacency relations between the vertices ui and the colored vertices at , bt , ct , dt are not drawn. un Figure 2: Adjacency relations in GS,T for one given triple t = (si , sj , sk ). and ct , dt ∈ Xi ; or t = (sk , sj , si ) ∈ T and at , bt ∈ Xi . But then by construction either at , bt are only contained in the bags Xl for k ≤ l ≤ j, or ct , dt are only contained in the bags Xl for j ≤ l ≤ k, thus contradicting the fact that either at , bt ∈ Xi or ct , dt ∈ Xi . Lemma 5. Let S be a set of n elements, let T be a set of m ordered triples of elements in S. If pb(GS,T ) ≤ 1 or pl(GS,T ) ≤ 2 then (S, T ) is a yes-instance of the Betweenness problem, where GS,T is the graph that is defined in Definition 2. Proof. Since pl(GS,T ) ≤ 2 · pb(GS,T ) then we only need to consider the case when pl(GS,T ) ≤ 2. Let (P, X ) be a path decomposition of length two, that exists by the hypothesis. Since the vertices vi are pairwise at distance 3 then the subpaths Pvi that are induced by the bags containing vertex vi are pairwise disjoint. Therefore, starting from an arbitrary endpoint of P and considering each vertex vi in the order that it appears in the path decomposition, this defines a total ordering over S. Let us reorder the set S so that vertex vi is the ith vertex to appear in the path-decomposition. We claim that for every triple t = (si , sj , sk ) ∈ T , either i < j < k or k < j < i, that will prove the lemma. By way of contradiction, let t = (si , sj , sk ) ∈ T such that either j < min{i, k} or j > max{i, k}. By symmetry, we only need to consider the case when j < i < k. In such case by construction the path between Pvj and Pvk in P contains Pvi . Let B ∈ Pvi , by the properties of a tree decomposition it is a vj vk -separator, so it must contain one of ct , dt . However, vertex vi ∈ B is at distance 3 from both vertices ct , dt , thus contradicting the fact that (P, X ) has length 2. We are now able to prove Theorems 1 and 2. Proof of Theorem 1. To prove that a graph G satisfies pl(G) ≤ k, it suffices to give as a certificate a tree decomposition of G with length at most k. Indeed, the all-pairs-shortest-paths in G can be computed in polynomial-time. Therefore, the problem of deciding whether a graph has path-length at most k is in NP. Given an instance (S, T ) of the Betweenness problem, let GS,T be as defined in Definition 2. We claim that pl(GS,T ) ≤ 2 if and only if the pair (S, T ) is a yes-instance of the Betweenness problem. This will prove the NP-hardness because our reduction is polynomial and the Betweenness problem is NP-complete. To prove the claim in one direction, if (S, T ) is a yesinstance then by Lemma 4 pl(GS,T ) ≤ 2. Conversely, if pl(GS,T ) ≤ 2 then (S, T ) is a yes-instance by Lemma 5, that proves the claim in the other direction. Proof of Theorem 2. To prove that a graph G satisfies pb(G) ≤ k, it suffices to give as a certificate a tree decomposition of G with breadth at most k. Indeed, the all-pairs-shortest-paths in G can be computed in polynomial-time. Therefore, the problem of deciding whether a graph has pathbreadth at most k is in NP. Given an instance (S, T ) of the Betweenness problem, let GS,T be as defined in Definition 2. We claim that pb(GS,T ) ≤ 1 if and only if the pair (S, T ) is a yes-instance 6 of the Betweenness problem. This will prove the NP-hardness because our reduction is polynomial and the Betweenness problem is NP-complete. To prove the claim in one direction, if (S, T ) is a yes-instance then by Lemma 4 pb(GS,T ) ≤ 1. Conversely, if pb(GS,T ) ≤ 1 then (S, T ) is a yes-instance by Lemma 5, that proves the claim in the other direction. To conclude this section, we strenghten the above hardness results with two inapproximability results. Indeed, it has to be noticed that for any graph parameter param, an α-approximation algorithm for param with α < 1 + k1 is enough to separate the graphs G such that param(G) ≤ k from those such that param(G) ≥ k + 1. Therefore, the two following corollaries follow from our polynomial-time reduction. Corollary 2. For every ε > 0, the path-length of a graph cannot be approximated within a factor 3 − ε unless P=NP. 2 Proof. Let GS,T be the graph of the reduction in Theorem 1. By Definition 2, it has diameter at most 3 and so pl(G  S,T ) ≤ 3. Since it is NP-hard to decide whether pl(GS,T ) ≤ 2, therefore it does not exist a 32 − ε -approximation algorithm for path-length unless P=NP. Corollary 3. For every ε > 0, the path-breadth of a graph cannot be approximated within a factor 2 − ε unless P=NP. Proof. Let GS,T be the graph of the reduction in Theorem 2. By Definition 2, the set U is a dominating clique and so pb(GS,T ) ≤ 2. Since it is NP-hard to decide whether pb(GS,T ) ≤ 1, therefore it does not exist a (2 − ε)-approximation algorithm for path-breadth unless P=NP. So far, there exists a 2-approximation algorithm for path-length and a 3-approximation algorithm for path-breadth [30]. Therefore, we let open whether there exist 23 -approximation algorithms for path-length and 2-approximation algorithms for path-breadth. 3.2 Tree-breadth We prove next that computing the tree-breadth is NP-hard. Theorem 4. Deciding whether a graph has tree-breadth at most k is NP-complete even if k = 1. Theorem 5. Deciding whether a graph admits a k-good tree decomposition is NP-complete even if k = 1. Proof. The problem is in NP. By Corollary 1, a graph G admits a star-decomposition if and only if tb(G) ≤ 1, therefore it is NP-hard to decide whether a graph admits a 1-good path decomposition by Theorem 4. In order to prove Theorem 4, we will reduce from the Chordal Sandwich problem (defined below). In [42], the author also proposed a reduction from the Chordal Sandwich problem in order to prove that computing tree-length is NP-hard. However, we will need different gadgets than in [42], and we will need different arguments to prove correctness of the reduction. Problem 2 (Chordal Sandwich). Input: graphs G1 = (V, E1 ) and G2 = (V, E2 ) such that E1 ⊆ E2 . Question: Is there a chordal graph H = (V, E) such that E1 ⊆ E ⊆ E2 ? The Chordal Sandwich problem is NP-complete even when the 2n = |V | vertices induce a perfect matching in Ḡ2 (the complementary of G2 ) [13, 35]. Perhaps surprisingly, the later constriction on the structure of Ḡ2 is a key element in our reduction. Indeed, we will need the following technical lemma. Lemma 6. Let G1 = (V, E1 ), G2 = (V, E2 ) such that E1 ⊆ E2 and Ḡ2 (the complementary of G2 ) is a perfect matching. Suppose that hG1 , G2 i is a yes-instance of the Chordal Sandwich problem. Then, there exists a reduced tree decomposition (T, X ) of G1 such that for every forbidden edge {u, v} ∈ / E2 : Tu ∩ Tv = ∅, Tu ∪ Tv = T , furthermore there are two adjacent bags Bu ∈ Tu and Bv ∈ Tv such that Bu \ u = Bv \ v. 7 Proof. Let H = (V, E) be any chordal graph such that E1 ⊆ E ⊆ E2 (that exists because hG1 , G2 i is a yes-instance of the Chordal Sandwich problem by the hypothesis) and the number |E| of edges is maximized. We will prove that any clique-tree (T, X ) of H satisfies the above properties (given in the statement of the lemma). To prove it, let {u, v} ∈ / E2 be arbitrary. Observe that Tu ∩ Tv = ∅ (else, {u, v} ∈ E, that would contradict that E ⊆ E2 ). Furthermore, let Bu ∈ Tu minimize the distance in T to the subtree Tv , let B be the unique bag that is adjacent to Bu on a shortest-path between Bu and Tv in T . Note that B ∈ / Tu by the minimality of distT (Bu , Tv ), however B may belong to Tv . Removing the edge {Bu , B} in T yields two subtrees T1 , T2 with Tu ⊆ T1 and Tv ⊆ T2 . In addition, we have that for every x ∈ V \ u such that Tx ∩ T1 6= ∅, {u, x} ∈ E2 since x 6= v and Ḡ2 is a perfect matching by the hypothesis. Similarly, we have that for every y ∈ V \ v such that Ty ∩ T2 6= ∅, {v, y} ∈ E2 . Therefore, by maximality of the number |E| of edges, it follows that T1 = Tu and T2 = Tv , and so, Tu ∪ Tv = T . In particular, B = Bv ∈ Tv . Finally, let us prove that Bu \ u = Bv \ v. Indeed, assume for the sake of contradiction that Bu \ u 6= Bv \ v. In particular, (Bu \ Bv ) \ u 6= ∅ or (Bv \ Bu ) \ v 6= ∅. Suppose w.l.o.g. that (Bu \ Bv ) \ u 6= ∅. Let H 0 = (V, E 0 ) be obtained from H by adding an edge between vertex v and every vertex of (Bu \ Bv ) \ u. By construction |E 0 | > |E|. Furthermore, H 0 is chordal since a clique-tree of H 0 can be obtained from (T, X ) by adding a new bag (Bu \ u) ∪ {v} in-between Bu and Bv . However, for every x ∈ (Bu \ Bv ) \ u we have that {x, v} ∈ E2 since x 6= u and Ḡ2 is a perfect matching by the hypothesis. As a result, E 0 ⊆ E2 , thus contradicting the maximality of the number |E| of edges in H. Proof of Theorem 4. The problem is in NP. To prove the NP-hardness,let hG1 , G2 i be any input of the Chordal Sandwich problem such that Ḡ2 is a perfect matching. The graph G0 is constructed from G1 as follows. First we add a clique V 0 of 2n = |V | vertices in G0 . Vertices v ∈ V are in one-to-one correspondance with vertices v 0 ∈ V 0 . Then, for every forbidden edge {u, v} ∈ / E2 , vertices u, v are respectively made adjacent to all vertices in V 0 \ v 0 and V 0 \ u0 . Finally, we add a distinct copy of the gadget Fuv in Figure 3, and we make adjacent suv and tuv to the two vertices u0 , v 0 (see also Figure 4 for an illustration). We will prove tb(G0 ) = 1 if and only if hG1 , G2 i is a yesinstance of the Chordal Sandwich problem. This will prove the NP-hardness because our reduction is polynomial and the Chordal Sandwich problem is NP-complete even when the 2n = |V | vertices induce a perfect matching in Ḡ2 (the complementary of G2 ) [13, 35]. u xuv suv tuv cuv yuv wuv zuv v Figure 3: The gadget Fuv . In one direction, assume tb(G0 ) = 1, let (T, X ) be a star-decomposition of G0 . Let H = (V, {{u, v} | Tu ∩ Tv 6= ∅}), that is a chordal graph such that E1 ⊆ E(H). To prove that hG1 , G2 i is a yes-instance of the Chordal Sandwich problem, it suffices to prove that Tu ∩ Tv = ∅ for every forbidden edge {u, v} ∈ / E2 . More precisely, we will prove that Tsuv ∩ Ttuv 6= ∅, for we claim that the latter implies Tu ∩ Tv = ∅. Indeed, assume Tsuv ∩ Ttuv 6= ∅ and Tu ∩ Tv 6= ∅. Since suv and tuv are both adjacent to u and v, therefore the four subtrees Tu , Tv , Tsuv , Ttuv pairwise intersect. By the Helly property (Lemma 1) Tu ∩ Tv ∩ Tsuv ∩ Ttuv 6= ∅, hence there is a bag containing u, v, suv , tuv but then it contradicts the fact that (T, X ) is a star-decomposition because no vertex dominates the four vertices. Therefore, Tsuv ∩ Ttuv 6= ∅ implies Tu ∩ Tv = ∅. Let us prove that Tsuv ∩ Ttuv 6= ∅. By contradiction, assume Tsuv ∩ Ttuv = ∅. Every bag B onto the path between Tsuv and Ttuv must contain cuv , xuv , furthermore N [cuv ] ∩ N [xuv ] = {suv , tuv }. Since, (T, X ) is a star-decomposition, the latter implies either suv ∈ B and B ⊆ N [suv ] or tuv ∈ B and B ⊆ N [tuv ]. 8 Consequently, there exist two adjacent bags Bs ∈ Tsuv , Bt ∈ Ttuv such that Bs ⊆ N [suv ] and Bt ⊆ N [tuv ]. Furthermore, Bs ∩ Bt is an suv tuv -separator by the properties of a tree decomposition. In particular, Bs ∩ Bt must intersect the path (yuv , wuv , zuv ) because yuv ∈ N (suv ) and zuv ∈ N (tuv ). However, Bs ⊆ N [suv ], Bt ⊆ N [tuv ] but N [suv ] ∩ N [tuv ] ∩ {yuv , wuv , zuv } = ∅, hence Bs ∩ Bt ∩ {yuv , wuv , zuv } = ∅, that is a contradiction. As a result, Tsuv ∩ Ttuv 6= ∅ and so, Tu ∩ Tv = ∅. x' yuv V' u' v' u v suv xuv wuv cuv tuv zuv G 1 x Figure 4: The graph G0 (simplified view). Conversely, assume that hG1 , G2 i is a yes-instance of the Chordal Sandwich problem. Since Ḡ2 is a perfect matching by the hypothesis, by Lemma 6 there exists a reduced tree decomposition (T, X ) of G1 such that for every forbidden edge {u, v} ∈ / E2 : Tu ∩ Tv = ∅, Tu ∪ Tv = T and there are two adjacent bags Bu ∈ Tu , Bv ∈ Tv so that Bu \ u = Bv \ v. Let us modify (T, X ) in order to obtain a star-decomposition of G0 . In order to achieve the result, we first claim that for every edge {t, t0 } ∈ E(T ), the bags Xt , Xt0 differ in exactly one vertex, that is, |Xt \ Xt0 | = 1 and similarly |Xt0 \ Xt | = 1. Indeed, Xt \ Xt0 6= ∅ because (T, X ) is reduced, so, let utt0 ∈ Xt \ Xt0 . Let vtt0 ∈ V be the unique vertex satisfying {utt0 , vtt0 } ∈ / E2 , that is well-defined because Ḡ2 is a perfect matching by the hypothesis. Note that vtt0 ∈ Xt0 because utt0 ∈ / Xt0 and Tutt0 ∪ Tvtt0 = T . Furthermore, vtt0 ∈ / Xt because utt0 ∈ Xt and Tutt0 ∩ Tvtt0 = ∅. By construction of (T, X ), there are two adjacent bags Butt0 ∈ Tutt0 , Bvtt0 ∈ Tvtt0 such that Butt0 \ utt0 = Bvtt0 \ vtt0 . Since utt0 ∈ Xt \ Xt0 and vtt0 ∈ Xt0 \ Xt , therefore, Xt = Butt0 and Xt0 = Bvtt0 , and so, Xt \ Xt0 = {utt0 } and Xt0 \ Xt = {vtt0 }. In the following, we will keep the above notations utt0 , vtt0 for every edge {t, t0 } ∈ E(T ) (in particular, utt0 = vt0 t and vtt0 = ut0 t ). Let us construct the star-decomposition (T 0 , X 0 ) of G0 as follows. S • For every node t ∈ V (T ), let St = Xt ∪ V 0 ∪ ( t0 ∈NT (t) {sutt0 vtt0 , tutt0 vtt0 }) (in particular, |St | = 2n + |Xt | + 2 · degT (t)). We will first construct a path decomposition of G0 [St ] whose bags are the sets Ytt0 = Xt ∪ V 0 ∪ {sutt0 vtt0 , tutt0 vtt0 } for every edge {t, t0 } ∈ E(T ) (note that the bags can be linearly ordered in an arbitrary way in the path decomposition). Furthermore, for every edge {t, t0 } ∈ E(T ), Ytt0 ⊆ N [u0tt0 ], where u0tt0 ∈ V 0 is the corresponding vertex to utt0 ∈ V in the clique V 0 (see Figure 5 for an illustration). Therefore, the above constructed path decomposition is a 1-good path decomposition. C v1 u2 C u3 u4 u1 v 2 u3 u4 u1 u 2 u3 s u1v1 u4 u1v1 u1 u 2 C u1 u 2 s u2v2 C t V' V' V' C t u2v2 u3 u4 s u3v3 C u1 u 2 t u3v3 u3 u4 V' s u4v4 C u1 u 2 t u4v4 u3 u4 C u1 u 2 u3 u4 C u3 v4 u1 u 2 v3 u4 Figure 5: The 1-good path decomposition (right) obtained from the central bag with degree four (left). • Then, we will connect the 1-good path decompositions together. More precisely, let us add an edge between the two bags Ytt0 and Yt0 t for every edge {t, t0 } ∈ E(T ) (see Figure 6 for an illustration). S In so doing, we claim that one obtains a star-decomposition of G0 [ t∈V (T ) St ]. Indeed, it is a tree decomposition since: – the clique V 0 is contained in all bags; 9 – for every {t, t0 } ∈ E(T ) the two vertices sutt0 vtt0 , tutt0 vtt0 are only contained in the two 0 0 0 adjacent bags Ytt0 and Yt0 t , furthermore utt0 , u0tt0 , vtt 0 ∈ Ytt0 and vtt0 , utt0 , vtt0 ∈ Yt0 t ; 0 – last, each vertex v ∈ V is contained in {Ytt0 | v ∈ Xt and t ∈ NT (t)} which induces a subtree since (T, X ) is a tree decomposition of G1 . Since in addition every bag Ytt0 , with {t, t0 } ∈ E(T ), is dominated by u0tt0 ∈ V 0 , this proves the claim that one obtains a star-decomposition. V' V' s ... u1v1 u1v1 u4 u1 u 2 s u2v2 C u1v1 u1 u 2 u2v2 u3 s u3v3 C t u4 u1 u 2 u4 v3 V' V' V' s ... C u3v3 u3 u1v1 u3v3 t v1 u 2 t s ... C t u3v3 u3 V' s u4v4 C t u4 u1 u 2 C t u4v4 u4 u3 u1 u 2 V' V' s ... u2v2 u2v2 u1 v 2 s ... C t u4 u3 u4v4 u4v4 u3 ... C t u1 u 2 u4 u3 v4 Figure 6: Connection of the 1-good path decomposition in Figure 5 to the neighbouring 1-good path decompositions. • In order to complete the construction, let us observe that for every forbidden edge {u, v} ∈ / E2 , there is a star-decomposition of Fuv \{u, v} with three leaf-bags {xuv , suv , tuv }, {yuv , suv , wuv } and {zuv , suv , wuv } and one internal bag of degree three Buv = {cuv , suv , tuv , wuv }. For every {t, t0 } ∈ E(T ), we simply connect the above star-decomposition of Futt0 vtt0 \ {utt0 , vtt0 } by making the internal bag Butt0 vtt0 adjacent to one of Ytt0 or Yt0 t (see Figure 7 for an illustration). s t u1v1 s s t 1 1 wu v s zu v t u1v1 3 3 zu v 3 3 3 3 1 1 s u1v1 2 2 s ... C v1 u 2 s V' V' s u1v1 3 3 u3v3 wu v 1 1 u1v1 wu v u3v3 c u1v1 wu v t t u3v3 c ... u3v3 yu v wu v wu v 1 1 t 3 3 1 1 1 1 u3v3 xu v u3v3 u1v1 yu v s t u3v3 u1v1 xu v u1v1 u3v3 t u3v3 u3 u4 u4v4 ... C u1 u 2 yu v 4 4 wu v 4 4 v3 s u4 u4v4 t xu v s u4v4 4 4 u4v4 V' V' s u1v1 t u1v1 s u2v2 C u1 u 2 V' u2v2 u3 s u3v3 C t u4 t u3v3 u1 u 2 u3 u4 u4v4 u4v4 u4 u2v2 u2v2 u1 v 2 t u2v2 s u4v4 t u4v4 u3 s u4v4 t u4v4 4 4 u3 wu v u4 4 4 V' ... C t t zu v u1 u 2 V' s ... u4v4 C t u3 c 4 4 V' s C u1 u 2 wu v u4 ... C u1 u 2 u3 v4 u2v2 c u2v2 t zu v 2 2 wu v 2 2 s u2v2 u2v2 wu v 2 2 s t u2v2 wu v yu v 2 2 2 2 u2v2 xu v 2 2 Figure 7: The respective star-decompositions of the gadgets Fui vi are connected to the other bags. By construction, the resulting tree decomposition (T 0 , X 0 ) of G0 is a star-decomposition, hence tb(G0 ) = 1. Recall that we can use our reduction from Definition 2 in order to prove that computing pathlength and path-breadth is NP-hard. By contrast, our reduction from Theorem 4 cannot be used to prove that tree-length is NP-hard to compute (in fact, the graph G0 resulting from the reduction has tree-length two). Finally, as in the previous Section 3.1, let us strenghten Theorem 4 with an inapproximability result. Corollary 4. For every ε > 0, the tree-breadth of a graph cannot be approximated within a factor 2 − ε unless P=NP. 10 4 General properties of graphs with tree-breadth one In Section 3.2, we prove that computing the tree-breadth is NP-hard. In particular, the recognition of graphs with tree-breadth one is NP-complete. In light of this result, we focus on graphs with tree-breadth one (in order to obtain a better understanding of what makes the problem difficult) Problem 3 (1-tree-breadth). Input: a connected graph G = (V, E) Question: tb(G) ≤ 1 ? In Lemma 7, we show that the problem of recognizing graphs with tree-breadth at most one is equivalent to the problem of computing tree-breadth. This further motivates our study of these graphs. Then, we will prove necessary conditions for a graph to be of tree-breadth one. • One is that all graphs with a star-decomposition have a domination elimination ordering (see Section 4.1). We will outline a few implications of this property. • Second, we will prove in Lemma 9 that if a graph G admits a star-decomposition then so do all the blocks of G, where the blocks here denote a particular case of induced subgraphs of G (e.g., see Definition 4). Finally, we will obtain from the latter result a polynomial-time algorithm to decide whether a bipartite graph has tree-breadth at most one (e.g., see Section 4.3). Definition 3. Let G be a graph with n vertices, denoted by v1 , v2 , . . . , vn , and let r be a positive integer. The graph G0r is obtained from G by adding a clique with n vertices, denoted by U = {u1 , u2 , . . . , un }, so that for every 1 ≤ i ≤ n, vertex ui is adjacent to BG (vi , r) = {x ∈ V (G) | distG (vi , x) ≤ r}. Lemma 7. For every graph G, for every positive integer r, let G0r be as defined in Definition 3, tb(G) ≤ r if and only if tb(G0r ) ≤ 1. Proof. If tb(G) ≤ r then we claim that starting from any tree decomposition (T, X ) of G with breadth at most r, one obtains a star-decomposition of G0r by adding the clique U in every bag Xt , t ∈ V (T ). Indeed, in such case for every bag Xt , t ∈ V (T ), by the hypothesis there is vi ∈ V (G) such that maxx∈Xt distG (vi , x) ≤ r, whence Xt ∪ U ⊆ NG0r [ui ]. Conversely, if tb(G0r ) ≤ 1 then we claim that starting from any tree decomposition (T 0 , X 0 ) of G0r with breadth at most one, one obtains a tree decomposition of G with breadth at most r by removing every vertex of the clique U from every bag Xt0 , t ∈ V (T 0 ). Indeed, in such case for every bag Xt0 , t ∈ V (T 0 ), by the hypothesis there is y ∈ V (G0r ) such that Xt0 ⊆ NG0r [y]. Furthermore, y ∈ {ui , vi } for some 1 ≤ i ≤ n, and so, since NG0r [vi ] ⊆ NG0r [ui ] by construction, therefore Xt0 \ U ⊆ NG0r (ui ) \ U = {x ∈ V (G) | distG (vi , x) ≤ r}. 4.1 Existence of specific elimination orderings Independently from the remaining of the section, let us prove some interesting properties of graphs with tree-breadth one in terms of elimination orderings. More precisely, a domination elimination ordering [23] of a graph G is a total ordering of its vertex-set, denoted by v1 , v2 , . . . , vn , so that for every 1 ≤ i < n, there is j > i satisfying that NG (vi ) ∩ {vi+1 , vi+2 , . . . , vn } ⊆ NG [vj ]. The existence of domination elimination orderings in some graph classes and their algorithmic applications has been studied in [18]. Let us prove that graphs with tree-breadth one all admit a domination elimination ordering. Lemma 8. Let G be such that tb(G) ≤ 1, G admits a domination elimination ordering. Proof. Assume G has at least two vertices (or else, the lemma is trivial). To prove the lemma, it suffices to prove the existence of u, v ∈ V (G) distinct such that N (v) ⊆ N [u] and tb(G \ v) ≤ 1 (then, the lemma follows by induction on the order of the graph). If G admits a universal vertex u, then one can pick v ∈ V (G) \ u arbitrary, N (v) ⊆ N [u] because u is universal in G, furthermore tb(G \ v) ≤ 1 because G \ v admits a universal vertex u. Else, G does not admit any universal vertex, let (T, X ) be a reduced tree decomposition of G of breadth one, that is a star-decomposition by Lemma 3. Let Xt , t ∈ V (T ) be a leaf. Since the tree decomposition is reduced, there must be v ∈ Xt satisfying Tv = {Xt }. Now there are two cases. 11 • Suppose there is u ∈ Xt \ v such that Xt ⊆ N [u]. Then, N (v) ⊆ Xt ⊆ N [u], and tb(G \ v) ≤ 1 because G \ v can be obtained from G by contracting the edge {u, v} and tree-breadth is contraction-closed by Lemma 2. • Else, Xt ⊆ N [v], and for every x ∈ Xt \ v, Xt 6⊆ N [x]. Let t0 ∈ V (T ) be the unique node adjacent to node t in T , that exists because G does not admit any universal vertex and so, T has at least two bags. Let us assume that for every x ∈ Xt \ v, x ∈ Xt ∩ Xt0 (for otherwise, N (x) ⊆ N [v] and tb(G \ x) ≤ 1 because G \ x can be obtained from G by contracting the edge {v, x} to v and tree-breadth is contraction-closed by Lemma 2). In particular, let u ∈ Xt0 satisfy Xt0 ⊆ N [u]. Then, N (v) = Xt ∩ Xt0 ⊆ N [u], furthermore tb(G \ v) ≤ 1 because (T \ t, X \ Xt ) is a star-decomposition of G \ v. Note that for a graph to have tree-breadth one, it must satisfy the necessary condition of Lemma 8 and this can be checked in polynomial-time. However, the existence of some domination elimination ordering is not a sufficient condition for the graph to have tree-breadth one. Indeed, every grid has a domination elimination ordering but the tree-length of the n×m grid is at least min{n, m}−1 [26] (recall that tl(G) ≤ 2tb(G) for any graph G). The existence of a domination elimination ordering has some interesting consequences about the graph structure. Let us recall one such a consequence about the cop-number of the graph. Corollary 5. For any graph G with tb(G) ≤ 1, G has cop-number ≤ 2 and the upper-bound is sharp. Proof. By Lemma 8, G admits a domination elimination ordering. Therefore, by [21, Theorem 4] G has cop-number ≤ 2. One can prove the sharpness of the upper-bound by setting G := C4 , the cycle with four vertices. 4.2 Properties of particular decompositions In the following, it will be useful not only to constrain the properties of the star-decomposition whose existence we are interested in, but also to further constrain the properties of the graph G that we take as input. Let us first remind basic terminology about graph separators. Definition 4. Let G = (V, E) be connected, a separator of G is any subset S ⊆ V such that G \ S has at least two connected components. In particular, a full component for S is any connected component C of G\S satisfying N (C) = S. A block is any induced subgraph G[C ∪ S] with S being a separator and C being a full component for S. Finally, a minimal separator is a separator with at least two full components. Our objective is to prove that if a graph G has tree-breadth one then so do all its blocks. In fact, we will prove a slightly more general result: Lemma 9. Let G = (V, E) be a graph, S ⊆ V be a separator, and W ⊆ V \ S be the union of some connected components of G \ S. If tb(G) = 1 and W contains a full component for S, then tb(G[W ∪ S]) = 1. More precisely if (T, X ) is a tree decomposition of G of breadth one, then (T, {Xt ∩ (W ∪ S) | Xt ∈ X }) is a tree decomposition of G[W ∪ S] of breadth one. Proof. Let (T, X ) be a tree decomposition of breadth one of G. Let us remove all vertices in V \(W ∪S) from bags in (T, X ), which yields a tree decomposition (T 0 , X 0 ) of the induced subgraph G[W ∪ S]. To prove the lemma, we are left to prove that (T 0 , X 0 ) has breadth one. Let Xt be a bag of (T 0 , X 0 ). By construction, Xt is fully contained into some bag of (T, X ), so it has radius one in G. Let v ∈ V be such that Xt ⊆ NG [v]. If v ∈ W ∪ S, then we are done. Else, since for all x∈ / S ∪ W, N (x) ∩ (S ∪ W ) ⊆ S (because S is a separator by the hypothesis), we must have that Xt ⊆ S. Let A ⊆ W be a full component for S, that exists by the hypothesis, and let TA be the subtree that is induced by the bags intersecting the component. Since we have that the subtree TA and the subtrees Tx , x ∈ Xt pairwise intersect — because for all x ∈ Xt ,x ∈ S and so, x has a T neighbour in A —, then by the Helly property (Lemma 1) TA ∩ x∈Xt Tx 6= ∅ i.e., there exists a bag in (T, X ) containing Xt and intersecting A. Moreover, any vertex dominating this bag must be either in S or in A, so in particular there exists u ∈ A ∪ S dominating Xt , which proves the lemma. 12 Lemma 9 implies that, under simple assumptions, a graph of tree-breadth one can be disconnected using any (minimal) separator, and the components must still induce subgraphs with treebreadth one. The converse does not hold in general, yet there are interesting cases when it does. Lemma 10. Let G = (V, E) be a graph, S ⊆ V be a clique-minimal-separator and A be a full component for S. Then, tb(G) = 1 if and only if both tb(G[A ∪ S]) = 1 and tb(G[V \ A]) = 1. Proof. By the hypothesis V \ (A ∪ S) contains a full component because S is a minimal separator. Therefore, if G has tree-breadth one, then so do G[A ∪ S] and G[V \ A] by Lemma 9. Conversely, suppose that we have both tb(G[A ∪ S]) = 1 and tb(G[V \ A]) = 1. Let (T 1 , X 1 ) be a tree decomposition of G[A ∪ S] with breadth one, let (T 2 , X 2 ) be a tree decomposition of G[V \ A] with i breadth one. Then for every i ∈ {1, 2} we have that since T S isi a clique the subtrees Ts , s ∈ S, pairwise intersect, so by the Helly Property (Lemma 1) s∈S Ts 6= ∅ i.e., S is fully contained into some bag of (T 1 , X 1 ) and it is fully contained into some bag of (T 2 , X 2 ). Moreover, (A ∪ S) ∩ (V \ A) = S, therefore a tree decomposition of G with breadth one can be obtained by adding an edge between some bag of (T 1 , X 1 ) containing S and some bag of (T 2 , X 2 ) containing S. Recall that computing the clique-minimal-decomposition of a graph G can be done in O(nm)time, where m denotes the number of edges [9]. By doing so, one replaces a graph G with the maximal subgraphs of G that have no clique-separator, a.k.a. atoms. Therefore, we will assume in the remaining of the proofs that there is no clique-separator in the graphs that we will study, we will call them prime graphs. 4.3 Application to bipartite graphs In this section, we describe an O(nm)-time algorithm so as to decide whether a prime bipartite graph has tree-breadth one. This combined with Lemma 10 proves that it can be decided in polynomial-time whether a bipartite graph has tree-breadth one. We will first describe a more general problem and how to solve it in polynomial-time. Tree decompositions with constrained set of bags. Our algorithm for bipartite graphs makes use of the correspondance between tree decompositions and triangulations of a graph. Indeed, recall that any reduced tree decomposition (T, X ) of a graph G is a clique-tree for some chordal supergraph H of G whose maximal cliques are the bags of X . Conversely, for any chordal supergraph H of G, every clique-tree of H is a tree decomposition of G whose bags are the maximal cliques of H [33]. Therefore as shown below, the following subproblem can be solved in polynomial-time: Problem 4. Input: a graph G, a family X of subsets of V (G). Question: Does there exist a tree T such that (T, X ) is a tree decomposition of G ? Let us assume w.l.o.g. that no subset of X is properly contained into another one. To solve Problem 4.3, it suffices to make every subset X ∈ X a clique in G, then to verify whether the resulting supergraph H of G is a chordal graph whose maximal cliques are exactly the sets in X . Since chordal graphs can be recognized in linear-time, and so can be enumerated their maximal cliques [32], therefore Problem 4.3 can be solved in polynomial-time. The algorithm for bipartite graphs. Now, given a bipartite graph G, we aim to exhibit a family X so that tb(G) = 1 if and only if there is a star-decomposition of G whose bags are X . By doing so, we will reduce the recognition of bipartite graph with tree-breadth at most one to the more general Problem 4.3. Lemma 11. Let G = (V0 ∪ V1 , E) be a prime bipartite graph with tree-breadth one. There is (T, X ) a star-decomposition of G such that either X = {N [v0 ] | v0 ∈ V0 }, or X = {N [v1 ] | v1 ∈ V1 }. Proof. Let (T, X ) be a star-decomposition of G, that exists by Lemma 3, minimizing the number |X | of bags. Suppose there is some v0 ∈ V0 , there is t ∈ V (T ) such that Xt ⊆ NG [v0 ] (the case when there is some v1 ∈ V1 , there is t ∈ V (T ) such that Xt ⊆ NG [v1 ] is symmetrical to this one). We claim that for every t0 ∈ V (T ), there exists v00 ∈ V0 satisfying Xt0 ⊆ NG [v00 ]. By contradiction, 13 let v0 ∈ V0 , v1 ∈ V1 , let t, t0 ∈ V (T ) be such that Xt ⊆ NG [v0 ], Xt0 ⊆ NG [v1 ]. By connectivity of the tree T we may assume w.l.o.g. that {t, t0 } ∈ E(T ). Moreover, NG (v0 ) ∩ NG (v1 ) = ∅ because G is bipartite. Therefore, Xt ∩ Xt0 ⊆ {v0 , v1 }, and in particular if Xt ∩ Xt0 = {v0 , v1 } then v0 , v1 are adjacent in G. However, by the properties of a tree decomposition this implies that Xt ∩ Xt0 is a clique-separator (either an edge or a single vertex), thus contradicting the fact that G is prime. Now, let v0 ∈ V0 be arbitrary. We claim that there is a unique bag Xt , t ∈ V (T ), containing v0 . Indeed, any such S bag Xt must satisfy Xt ⊆ NG [v0 ], whence the subtree Tv0 can be contracted into a single bag t∈Tv Xt without violating the property for the tree decomposition to be a star0 decomposition. As a result, the unicity of the bag Xt follows from the minimality of |X |. Finally, since Xt is unique and Xt ⊆ NG [v0 ], therefore Xt = NG [v0 ] and so, X = {N [v0 ] | v0 ∈ V0 }. We can easily deduce from Lemma 11 the following algorithm for deciding whether a prime bipartite graph G has tree-breadth one. Let (V0 , V1 ) be the (unique) bipartition of the vertex-set of G into two stable sets. Let X0 = {N [v0 ] | v0 ∈ V0 }, let X1 = {N [v1 ] | v1 ∈ V1 }. By Lemma 11, tb(G) = 1 if and only if one of (G, X0 ), (G, X1 ) is a yes-instance of Problem 4.3. 5 Algorithm for planar graphs We are now ready to present our main result. In this section, we describe a quadratic-time algorithm for deciding whether a prime planar graph has tree-breadth one. Overall, we claim that it gives us a quadratic-time algorithm for deciding whether a general planar graph has tree-breadth one. Indeed, the clique-decomposition of a planar graph takes O(n2 )-time to be computed, furthermore the disjoint union of the atoms has O(n + m) vertices [9], that is O(n) for planar graphs. Roughly, we will construct a star-decomposition of the graph by increments. The main principle of the recursive algorithm is to find a particular vertex, called leaf-vertex. Informally, it extracts a new bag of the star-decomposition from some ball around the leaf-vertex. Then, depending on the case, either the leaf-vertex vertex is removed or some edge is added or contracted. In both cases, the resulting graph remains prime and planar and has tree-breadth one if and only if the initial one has tree-breadth one. We prove that each inductive step takes a linear time. Moreover, we prove that there are at most a linear number of recursive iterations (Lemma 27). There are three kinds of leaf-vertices (e.g., see Figure 8). Definition 5. Let G = (V, E) be a graph. A vertex v is a leaf-vertex if one of the following conditions hold. Type 1. N (v) induces an av bv -path for some av , bv ∈ V \ {v}, denoted by Πv , of length at least 3 and there exists dv ∈ V \ {v} such that N (v) ⊆ N (dv ), i.e., dv dominates Πv . Type 2. N (v) induces a path, denoted by Πv = (av , bv , cv ), of length 2. Type 3. N (v) consists of two non adjacent vertices av and cv , and there exists bv ∈ (N (av ) ∩ N (cv )) \ {v}. av dv cv av bv av v v Type 1 cv Type 2 Figure 8: The three kinds of leaf-vertices. We are now ready to describe the algorithm. 14 bv v Type 3 cv 5.1 Algorithm Leaf-BottomUp Let G = (V, E) be prime planar graph. Assume G has at least 7 vertices (else, it is easy to conclude). Step 1 The first step is to find a leaf-vertex in G. In Section 5.4.1, we describe how to decide whether G has a leaf-vertex in linear-time. • if G has no leaf-vertex, then, by Theorem 7, no minimal separator of G induces a path of length 2. Therefore, by Lemma 20, tb(G) = 1 only if G has a star-decomposition with at most 2 bags. In that case, Algorithm Leaf-BottomUp checks whether it exists a star-decomposition with at most 2 bags, which can be done in quadratic time (see Lemma 26). If it exists, then tb(G) = 1. Otherwise, tb(G) > 1. • otherwise, let v be a leaf-vertex of G and go to Step 2 if v is of Type 1 and go to Step 3 otherwise. Step 2 Case v is of Type 1. Let Πv and dv be defined as in Definition 5. If V = N [v] ∪ {dv } then trivially tb(G) = 1. Else by Theorem 8, G0 is prime and planar, where G0 is the graph obtained from G \ v by contracting the internal nodes of Πv to a single edge, and tb(G) = 1 if and only if tb(G0 ) = 1. In that case, Algorithm Leaf-BottomUp is recursively applied on G0 . Step 3 Case v is of Type 2 or 3. Let av , bv , cv be defined as in Definition 5. In that case, Algorithm Leaf-BottomUp checks whether G \ v is prime. By Theorem 6, for any clique minimal separator S of G \ v (if any), there exists uv ∈ V \ {av , bv , cv , v} such that S = {bv , uv }. Therefore, this can be checked in linear time (by checking with a Depth-FirstSearch whether there is a cut-vertex of G \ {av , bv , cv , v} in the neighbors of bv ). If G \ v is prime then go to Step 3.1, else go to Step 3.2. Step 3.1 Case v is of Type 2 or 3 and G\v is prime. There are 4 cases that can be determined in linear-time. (a) Case |N (av ) ∩ N (cv )| ≥ 3 in G \ v, or there exists a minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S. By Theorem 9, tb(G) = 1 if and only if tb(G \ v) = 1. Since, moreover, G \ v is planar and prime, then Algorithm Leaf-BottomUp is recursively applied on G \ v. (b) Case: |N (av ) ∩ N (cv )| < 3 in G \ v and there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v such that {av , cv } ⊆ S. i Subcase: |N (av ) ∩ N (cv )| = 1 in G \ v. In that subcase, N (av ) ∩ N (cv ) = {v, bv } and, by Theorem 10, tb(G) = 1 if and only if G = C4 , a cycle with four vertices. Note that here it implies that tb(G) > 1 because G has at least 7 vertices. ii Subcase: |N (av ) ∩ N (cv )| = 2 in G \ v. In that subcase, let N (av ) ∩ N (cv ) = {v, bv , uv }. By Theorem 11, since G has more than 5 vertices, the graph G0 obtained from G by adding edges {v, uv } and {bv , v} is planar and prime, and moreover tb(G) = 1 if and only if tb(G0 ) = 1. In that case, Algorithm Leaf-BottomUp is recursively applied on G0 . Step 3.2 Case v is of Type 2 or 3 and G \ v has a clique separator. As mentioned in Step 3, in that case, there exists uv ∈ V \ {av , bv , cv , v} such that S = {bv , uv } is a minimal clique separator of G \ v. Moreover, by Theorem 6, G \ {av , bv , cv , v} is connected. By Theorem 12, tb(G) = 1 if and only if tb(G0 ) = 1 where G0 is obtained from G by adding the edge {v, bv } (if it were not already there). Moreover, G0 is prime and planar. Hence, we may assume that {v, bv } ∈ E (if not Algorithm Leaf-BottomUp adds it). Furthermore by Theorem 6, since G has more than 5 vertices, uv ∈ / N (av ) ∩ N (cv ). In the latter case, let us assume w.l.o.g. that uv ∈ / N (av ), that is either uv ∈ / N (av ) ∪ N (cv ) or uv ∈ N (cv ) \ N (av ). There are several cases to be considered. (a) Case uv ∈ / N (av ) ∪ N (cv ), or (N (uv ) ∩ N (av )) ∪ {v, cv } does not separate uv and av in G. By Theorem 13, G/vav is prime and planar, and tb(G) = 1 if and only if tb(G/vav ) = 1. In that case, Algorithm Leaf-BottomUp is recursively applied on G/vav , the graph obtained from G by contracting the edge {v, av }. 15 (b) Case uv ∈ N (cv ) \ N (av ), and (N (uv ) ∩ N (av )) ∪ {v, cv } separates uv and av in G. In that case, recall that G has at least 7 vertices. Again, Algorithm Leaf-BottomUp distinguishes several subcases. i Subcase N (bv ) = {v, av , cv , uv }. In that subcase, by Theorem 14, we can find in linear-time a vertex x ∈ (N (av ) ∩ N (uv )) \ {bv } such that G0 is planar, where G0 is obtained from G by adding the edge {bv , x}. Moreover, by Theorem 15, G0 /bv x (obtained by contracting {bv , x}) is prime and tb(G) = 1 if and only if tb(G0 /bv x) = 1. In that case, Algorithm Leaf-BottomUp is recursively applied on G0 /bv x. ii Subcase {v, av , cv , uv } ⊂ N (bv ) and N (bv )∩N (av )∩N (uv ) 6= ∅. In that subcase, |N (bv ) ∩ N (av ) ∩ N (uv )| = 1 by Lemma 23 and let x be this common neighbor. By Theorem 15, G/bv x (obtained by contracting {bv , x}) is prime and tb(G) = 1 if and only if tb(G/bv x) = 1. In that case, Algorithm Leaf-BottomUp is recursively applied on G/bv x. iii Subcase {v, av , cv , uv } ⊂ N (b) and N (bv ) ∩ N (av ) ∩ N (uv ) = ∅. In that subcase, by Theorem 16, there must be a unique x ∈ (N (av ) ∩ N (uv )) \ {bv } such that N (bv ) ∩ N (x) is a bv x-separator of G and |N (bv ) ∩ N (x)| ≥ 3 (or else, tb(G) > 1). • Suppose there is a leaf-vertex ` ∈ N (bv ) ∩ N (x). By Lemma 24, ` is of Type 1 or G \ ` is prime. In that case, go to Step 2 if ` is of Type 1, and go to Step 3.1 if ` has Type 2 or 3 (in both cases, ` takes the role of v). Note that we never go back to Step 3.2 in such case, so the algorithm cannot loop. • Otherwise, by Theorem 17, there exist y, z ∈ N (bv )∩N (x) two non-adjacent vertices, such that G0 is prime and planar, and tb(G) = 1 if and only if tb(G0 ) = 1, where G0 is obtained from G by adding the edge {x, y}. In that case, Algorithm Leaf-BottomUp is recursively applied on G0 . 5.2 5.2.1 Properties of prime planar graphs with tree-breadth one General lemmas We will first investigate on general properties of prime planar graphs. In particular, the following properties do not depend on the existence of a star-decomposition, therefore we do not use tree decompositions in our proofs. However, note that we refer to Definition 5 in Theorem 6. For clarity, we will separate the properties that hold for every biconnected planar graph from those that only hold for prime planar graphs. Properties of biconnected planar graphs. In order to obtain these properties, we will mostly rely on the notion of intermediate graphs, defined below. Definition 6. [15, Definition 6] Let G = (V, E) be a planar graph. We fix a plane embedding of G. Let F be the set of faces of this embedding. The intermediate graph GI = (V ∪ F, EI ) has vertex-set V ∪ F , furthermore E ⊆ EI and we add an edge in GI between an original vertex v ∈ V and a face-vertex f ∈ F whenever the corresponding vertex and face are incident in G (see Figure 9). Figure 9: A plane embedding of some planar graph (left) and the corresponding intermediate graph (right). Face-vertices are coloured in red. Note that an intermediate graph is planar. Furthermore, since a plane embedding can be constructed in linear-time [37], therefore so can be an intermediate graph. This is important for the quadratic-time complexity of Algorithm Leaf-BottomUp. To prove the correctness of Algorithm Leaf-BottomUp in the following, we will rely upon the following property of intermediate graphs. 16 Lemma 12. [15, Proposition 9] Let S be a minimal separator of some biconnected planar graph G = (V, E) and let C be a full component of G \ S. We fix a plane embedding of G. Then S corresponds to a cycle vS (C) of GI , of length 2|S| and with V ∩ vS (C) = S, and such that GI \ vS (C) has at least two connected components. Moreover, the original vertices of one of these components are exactly the vertices of C. In the following, we will rely upon two properties which both follow from Lemma 12. The first one is the following structural property of minimal separators of planar graphs. Corollary 6. Let S be a minimal separator of a biconnected planar graph G = (V, E). Then, S either induces a cycle or a forest of paths. Proof. Let us fix a plane embedding of G, let GI be the corresponding intermediate graph. Then, let CS be a smallest cycle of GI such that V ∩ CS = S, that exists by Lemma 12. To prove the corollary, it suffices to prove that CS is an induced cycle of GI . By contradiction, assume the existence of a chord xy of CS . Note that x ∈ S or y ∈ S because face-vertices are pairwise nonadjacent in GI . Therefore assume w.l.o.g. that x ∈ S. Let us divide CS in two cycles C1 , C2 such that C1 ∩ C2 = {x, y}. By the minimality of CS , S intersects both C1 \ C2 and C2 \ C1 . Therefore, let z1 , z2 ∈ S such that z1 ∈ C1 \ C2 and z2 ∈ C2 \ C1 . Finally, let A, B be two full components of G \ S. Observe that (A ∪ B) ∩ (C1 ∪ C2 ) = ∅ because V ∩ CS = S. Let us contract C1 , C2 in order to obtain the two triangles (z1 , x, y) and (z2 , x, y). In such case, there is a K3,3 -minor of GI with {A, B, y} and {x, z1 , z2 } being the respective sides of the bipartition, thus contradicting the fact that GI is planar. Therefore, CS is an induced cycle of GI and so, S induces a subgraph of a cycle in G, that is either a cycle or a forest of path. On the algorithmic side, one can also deduce from Lemma 12 the following corollary. Corollary 7. Let G be a biconnected planar graph, let S be a minimal separator of G. There is a planar supergraph GS of G with same vertex-set so that S either induces an edge (if |S| = 2) or a cycle of GS , and it can be constructed in linear-time. Figure 10: Addition of edges in a planar graph G so as to make a minimal separator of G induce a cycle. Proof. Let us fix a plane embedding of G, let GI be the corresponding intermediate graph. For every face-vertex f of GI , let us consider Sf = S ∩NGI (f ). We first claim that |Sf | ≤ 2. Indeed, let A, B be two full components of G \ S, let us contract them to any two vertices a ∈ A, b ∈ B. Then, there is a K3,|Sf | -minor of GI with {a, b, f } and Sf being the respective parts of the bipartition. Since GI is planar by construction, therefore, |Sf | ≤ 2. Now, the graph GS is constructed from G as follows (we refer to Figure 10 for an illustration of the proof). For every face-vertex f of GI , if Sf = (x, y) then we add the edge {x, y} in GS . Note that GS is a minor of GI and so, it is a planar graph. Moreover, by Lemma 12 there is a cycle of GI whose original vertices are exactly S and so, S induces a connected subgraph of GS . In particular if |S| = 2, then it must be an edge. Else, |S| > 2 and the connected subgraph GS [S] contains a cycle by construction. Since S is a minimal separator of GS by construction and GS [S] is not acyclic, it follows from Corollary 6 that S induces a cycle of GS . We will often make use of the routine of Corollary 7 in order to prove the quadratic-time complexity of Algorithm Leaf-BottomUp. Properties of prime planar graphs. Unlike the above Corollaries 6 and 7 (which hold for every biconnected planar graph), the following results only hold for prime planar graphs. We will make use of the following structural properties of prime planar graphs in order to prove the correctness of Algorithm Leaf-BottomUp. Lemma 13. Let G = (V, E) be a prime graph that is K3,3 -minor-free. Let v ∈ V , for every minimal separator S ⊆ NG (v) of the subgraph G \ v, S consists of two non-adjacent vertices. 17 Proof. Let S ⊆ NG (v) be a minimal separator of G \ v. There must exist two full components A and B of S in G \ (S ∪ {v}). Let us remove all nodes of the components of G \ (S ∪ {v}) but the ones in A or B. Then, let us contract A (resp., B) in a single vertex a (resp., b). We get a K3,|S| as a minor of G where {a, b, v} is one part of the bipartition, and so |S| ≤ 2. Finally, since S ∪ {v} is also a separator of G, then |S| ≥ 2 because otherwise S ∪ {v} would be an edge-separator. Therefore, |S| = 2 and it is a stable set because otherwise there would be a clique-separator of size 3 in G. Lemma 14. Let G be a prime planar graph, let the path Π = (a, b, c) be a separator of G, and let C be a component of G \ Π. Then, there is at most one common neighbour of a, b in C. Proof. First note that Π is induced or else it would be a clique-separator of G. Furthermore, a, c ∈ N (C 0 ) for every component C 0 of G \ (Π ∪ C) or else N (C 0 ) would be a clique-separator of G (either a vertex-separator or an edge-separator). In particular, it is always possible to make vertices a, c adjacent by contracting an arbitrary component of G \ (Π ∪ C). G\C a c b Q Q' u u' Figure 11: Case where the paths Q and Q0 are internally vertex-disjoint paths. By contradiction, let u, u0 ∈ N (a) ∩ N (b) ∩ C be distinct. We claim that there exists a uc-path Q in C ∪ {c} that does not contain u0 , because else the triangle a, b, u0 would separate u from Π, that contradicts the fact that G is prime. By symmetry, there also exists a u0 c-path Q0 in C ∪ {c} that does not contain u. There are two cases. • Q and Q0 are internally vertex-disjoint paths (see Figure 11 for an illustration). Let us contract Q \ c, Q0 \ c to the vertices u, u0 , let us contract an arbitrary component of G \ (Π ∪ C) in order to make vertices a, c adjacent, then let us contract a path from Q to Q0 in C (that exists, because C is connected by the hypothesis) in order to make vertices u, u0 adjacent. Then one obtains from a, b, c, u, u0 a K5 -minor, which contradicts the fact that G is planar. G\C a c b R y u Q Q' u' Figure 12: Case where the paths Q and Q0 intersect. • Q and Q0 intersect (see Figure 12 for an illustration). Let y ∈ (Q ∩ Q0 ) \ c be such that the uy-subpath of Q does not intersect Q0 . Let R be the yc-subpath of Q0 . We may assume w.l.o.g. that R ⊆ Q ∩ Q0 for the remaining of the proof, whence Q ∩ Q0 = R. Let us contract Q\R, Q0 \R, R\c in order to make vertices u, u0 , c adjacent to vertex y, then let us contract an arbitrary component of G \ (P ∪ C) in order to make vertices a, c adjacent. One obtains from a, b, c, u, u0 , y a K3,3 -minor with {a, b, y} being one side of the bipartition, that contradicts the fact that G is planar. 18 Lemma 15. Let G be a prime planar graph, let the path Π = (a, b, c) be a separator of G, and let C be a component of G \ Π. Suppose there is some vertex v ∈ C that is a common neighbour of a, b, c. Then, either C is reduced to v, or (a, v, c) is a separator of G. Furthermore, in the latter case, the path (a, v, c) separates vertex b from C \ v. Proof. Let us assume that C \ v 6= ∅. Let D be a connected component of G[C \ v]. Note that v ∈ N (D) because C is a connected component of G \ Π by the hypothesis. To prove the lemma, it suffices to prove that b ∈ / N (D). By contradiction, suppose that b ∈ N (D) (see Figure 13 for an illustration). Since v, b, a and v, b, c are pairwise adjacent and G has no clique-separator by the hypothesis, then necessarily N (D) = {a, b, c, v}. G\C a b D c v Figure 13: Existence of a component D ⊆ C \ v that is adjacent to b. Let us contract the component D to a single vertex x. Then, let C 0 be any component of G \ (Π ∪ C). We have that a, c ∈ N (C 0 ) or else N (C 0 ) would be a clique-separator of G (either a vertex-separator or an edge-separator). So, let us contract the component C 0 onto vertex a in order to make a and c adjacent. One obtains from a, b, c, v, x a K5 -minor, which contradicts the fact that G is planar. We recall that the gist of Algorithm Leaf-BottomUp is (informally) to try to remove a leaf-vertex v from G then to apply recursively the algorithm on G \ v. Because the algorithm is strongly dependent on the fact that G is prime, it is important to characterize the cases when G \ v is also prime. Indeed, new clique-decompositions are needed when G \ v is not prime, which may provoke a combinatorial explosion of the number of subgraphs to be considered. Therefore, before we conclude this section, let us characterize whenever there may be clique-separators in G \ v with v being a leaf-vertex. This will first require the following lemma. Lemma 16. Let G = (V, E) be a graph and let the path Π = (a, b, c) be a separator of G. Let C be the union of some components of G \ Π and let S be a separator of G[C ∪ Π]. Then, S is a separator in G or S separates a and c in G[C ∪ Π]. Moreover, in the latter case, G[C ∪ Π] \ S has exactly two components Ca and Cc containing a and c respectively. Proof. There are two cases. • Suppose there exists a component D of G[C ∪ Π] \ S such that NG (D) ⊆ C ∪ Π. Since D ∩ S = ∅, S 6= V \ D and NG (D) ⊆ S therefore S is a separator of G with D being a component of G \ S. • Else, every component D of G[C ∪ Π] \ S has a neighbour in V \ (C ∪ Π). The latter implies that D ∩ Π 6= ∅ for every component D of G[C ∪ Π] \ S because C is a union of components of G\Π by the hypothesis. In particular, since there exist at least two components of G[C ∪Π]\S then there must be one containing an endpoint of Π. W.l.o.g. assume there is a component Ca of G[C ∪ Π] \ S such that a ∈ Ca . Let Cc be any component of G[C ∪ Π] \ (S ∪ Ca ). We have that Cc ∩ N [Ca ] = ∅ because S separates Ca and Cc in G[C ∪ Π]. Therefore, a, b ∈ / Cc and so, c ∈ Cc because Cc ∩ Π 6= ∅. This finally proves that G[C ∪ Π] \ S has exactly two components Ca and Cc containing a and c respectively. Theorem 6. Let G = (V, E) be a prime planar graph, let v be a leaf-vertex of Type either 2 or 3 and let Πv = (av , bv , cv ) be as defined in Definition 5. Suppose that there exists a minimal separator S in G \ v that is a clique. Then, S = {uv , bv }, uv ∈ / Πv and the following hold: • V \ (Πv ∪ {v}) is a full component of G \ Πv . 19 • If uv ∈ N (av ) (resp. uv ∈ N (cv )), then av (resp. cv ) is simplicial in G \ v with neighbours {uv , bv }; • Furthermore uv ∈ / N (av ) ∩ N (cv ) unless V = Πv ∪ {uv , v}; uv av bv uv cv av v bv uv cv av v bv cv v Figure 14: Existence of a clique-separator in G \ v. Proof. Note that the subgraph G\v is planar and S is a minimal separator of G\v by the hypothesis, therefore by Corollary 6 either S induces a cycle or a forest of path. Since in addition S is a clique by the hypothesis, it follows that S either induces a singleton, an edge or a triangle. Since S is a clique and G is prime, S is not a separator of G, so by Lemma 16 with C = V \ (Πv ∪ {v}), S is an av cv -separator of G \ v. This both implies that bv ∈ S and S 0 := S ∪ {v} is a minimal av cv -separator of G. In particular, S being a strict subset of some minimal separator of G it cannot induce a cycle (by Corollary 6), hence it must induce either a singleton or an edge. Furthermore, still by Lemma 16 with C = V \(Πv ∪{v}) there exist exactly two components Ca , Cc of G\(S∪{v}), with av ∈ Ca , cv ∈ Cc . As a result, S \ bv 6= ∅, or else {av , bv }, {bv , cv } would be edge-separators of G, thus contradicting the hypothesis. Let S = {uv , bv }, uv ∈ / Πv ∪ {v}. If uv ∈ N (av ), then Ca \ av = ∅ (and so, av is simplicial in G \ v), for otherwise (av , uv , bv ) would be a clique-separator of G. Similarly, if uv ∈ N (cv ) then Cc \ cv = ∅ (and so, cv is simplicial in G \ v). In particular if uv ∈ N (av ) ∩ N (cv ) then Πv ∪ {uv , v} = V . Last, as there exists an av cv -path in every component C 0 of G \ (Πv ∪ {v}) because G has no clique-separator by the hypothesis, therefore uv ∈ C 0 . This implies that V \ (Πv ∪ {v}) is a full component of G \ Πv . 5.2.2 Constrained star-decompositions In the following, it will be useful to impose additional structure on the star-decompositions. In order to do that, we will prove properties on some pairs of vertices in the graph. Namely, we will prove that when x, y ∈ V satisfy a few technical conditions, then it can be assumed that Tx ∪ Ty is a subtree of the star-decomposition (T, X ). Lemma 17. Let G be a connected graph with tb(G) = 1, let x, y ∈ V (G) be non-adjacent (and x 6= y). Suppose the pair (x, y) satisfies that for every xy-separator S of G, if there is z ∈ / {x, y} that dominates S then z ∈ NG (x) ∩ NG (y). Then, there is a star-decomposition (T, X ) of G with Bx , By ∈ X , x ∈ Bx , y ∈ By and either Bx = By or Bx , By are adjacent in T . Moreover, in the latter case, Bx ⊆ N [x], By ⊆ N [y]. Proof. Consider a star-decomposition (T, X ) of G, that exists by Lemma 3. If x and y are not in a same bag, let Bx and By be the bags containing respectively x and y and as close as possible in T . By the properties of a tree decomposition, N (x) ∩ N (y) ⊆ Bx ∩ By . Hence, for any bag B between Bx and By in T , N (x) ∩ N (y) ⊆ B. • Case 1: If Bx and By are not adjacent in T , let B be any bag in the path between Bx and By in T . By the properties of a tree decomposition, B is an xy-separator. Moreover, let z ∈ B dominate the bag, by the hypothesis z ∈ N (x) ∩ N (y) because x, y ∈ / B. As a result, adding x and y in each bag B between Bx and By achieves a star-decomposition of G that has a bag containing both x, y. • Case 2: Now, let us assume that Bx and By are adjacent in T . Note that, if Bx ⊆ N [z] for some z ∈ N (x) ∩ N (y) (resp., if By ⊆ N [z] for some z ∈ N (x) ∩ N (y)) the result holds. Indeed, adding y in Bx (resp., x in By ) achieves a star-decomposition of G that has a bag containing both x, y. 20 So, let us consider the case when none of the two bags Bx , By is dominated by a vertex of N (x) ∩ N (y). Then, Bx \ x and By \ y are xy-separators by the properties of a tree decomposition. Let zx ∈ Bx , zy ∈ By satisfy Bx ⊆ N [zx ] and By ⊆ N [zy ]. By the hypothesis, zx ∈ {x} ∪ (N (x) ∩ N (y)) and zy ∈ {y} ∪ (N (x) ∩ N (y)). Thus it follows that zx = x and zy = y (or else, we are back to Case 1). Note that Bx ∩ By = N (x) ∩ N (y) in such a case. We will mostly use the following two weaker versions of Lemma 17 in our proofs. Corollary 8. Let G be a connected graph with tb(G) = 1, let x, y ∈ V (G) be non-adjacent (and x 6= y). Suppose there exists a minimal separator S ⊆ (N (x) ∩ N (y)) ∪ {x, y} in G and {x, y} ⊆ S. Then, there is a star-decomposition (T, X ) of G with Bx , By ∈ X , x ∈ Bx , y ∈ By and either Bx = By or Bx , By are adjacent in T . Moreover, in the latter case, Bx ⊆ N [x], By ⊆ N [y]. Proof. We claim that for every xy-separator S 0 of G, if there is z ∈ / {x, y} such that S 0 ⊆ N [z] then z ∈ N (x) ∩ N (y). Observe that if the claim holds, then the corollary follows from Lemma 17. To prove the claim, let S ⊆ (N (x) ∩ N (y)) ∪ {x, y} be a separator of G and {x, y} ⊆ S, that exists by the hypothesis. Note that for any full component C of G\S, the xy-separator S 0 must contain some vertex in C. Since there are at least two full components of G\S, then z ∈ S \(x, y) ⊆ N (x)∩N (y), that finally proves the claim. So far, the two above results in this section (Lemma 17 and Corollary 8) apply to general graphs with tree-breadth one. However, we will need the fact that the graph is planar for the following corollary. Corollary 9. Let G be a connected graph with tb(G) = 1, let x, y ∈ V (G) be non-adjacent (and x 6= y). Suppose G is K3,3 -minor-free and |NG (x) ∩ NG (y)| ≥ 3. Then, there is a star-decomposition (T, X ) of G with Bx , By ∈ X , x ∈ Bx , y ∈ By and either Bx = By or Bx , By are adjacent in T . Moreover, in the latter case, Bx ⊆ N [x], By ⊆ N [y]. Proof. We claim that for every xy-separator S of G, if there is z ∈ / {x, y} such that S ⊆ N [z] then z ∈ N (x) ∩ N (y). Observe that if the claim holds, then the corollary follows from Lemma 17. To prove the claim, first recall that |N (x) ∩ N (y)| ≥ 3. Since vertex z dominates S and S is an xy-separator, therefore, z dominates N (x) ∩ N (y) because N (x) ∩ N (y) ⊆ S. In such case, z ∈ N (x) ∩ N (y), or else, G admits a K3,|N (x)∩N (y)| -minor with {x, y, z} and N (x) ∩ N (y) being the respective of the bipartition, which contradicts the hypothesis. Before we conclude this section, let us emphasize a useful consequence of Corollary 8 regarding minimal 2-separators. Lemma 18. Let G = (V, E) with tb(G) = 1, let x, y ∈ V be non-adjacent such that S = {x, y} is a minimal separator of G (x 6= y). For every full component C of G\S, we have that N (x)∩N (y)∩C 6= ∅. Proof. Let (T, X ) be a star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between the subtrees Tx and Ty (respectively induced by the bags containing x and y). There are two cases. • First, suppose that Tx ∩ Ty 6= ∅. For any full component C of G \ S, let TC be the subtree that is induced by all bags intersecting C. Because C is a full component, there must be an edge between x and a vertex of C, and this edge is in a bag of Tx ∩ TC . Similarly, there must be an edge between y and a vertex of C, and this edge is in a bag of Ty ∩ TC . As a result, the subtrees Tx , Ty , TC are pairwise intersecting, and so by the Helly property (Lemma 1) Tx ∩ Ty ∩ TC 6= ∅ i.e., there exists a bag Xt which contains S and it intersects C. Let z ∈ Xt dominate the bag. Note that z ∈ C ∪ S because it has to dominate some vertices in C and so, it cannot be in V \ (C ∪ S). Furthermore, recall that x, y are non-adjacent by the hypothesis. Therefore, z ∈ C ∩ N (x) ∩ N (y), and the result holds for any full component C of G \ S. 21 • Else, since S = {x, y} is a minimal separator and we assume (T, X ) to minimize the distance in T between Tx and Ty , by Corollary 8 there are two adjacent bags Bx , By such that x ∈ Bx \By dominates Bx , y ∈ By \ Bx dominates By . Since Bx ∩ By is an xy-separator by the properties of a tree-decomposition, then Bx ∩ By ∩ C 6= ∅ for every full component C of G \ S, that is N (x) ∩ N (y) ∩ C 6= ∅. 5.2.3 Bounded Treewidth Independently from Algorithm Leaf-BottomUp, let us introduce in this section another property of (not necessarily prime) planar graphs with tree-breadth one. More precisely, we prove these graphs have bounded treewidth. To prove this property, we will use the same terminology as for the previous subsections. Lemma 19. Let G be planar with tb(G) ≤ 1. Then, tw(G) ≤ 4 and the upper-bound is sharp. b u x y a v Figure 15: A planar graph G with tb(G) = 1 and tw(G) = 4. Proof. The treewidth of G is the maximum treewidth of its atoms [12], so, let us assume G to be a prime planar graph. Let (T, X ) be any star-decomposition of G, the graph H = (V, {{u, v} | Tu ∩Tv 6= ∅}) is chordal. Furthermore, if H 0 is a chordal graph with same vertex-set V and such that E(G) ⊆ E(H 0 ) ⊆ E(H) then any clique-tree of H 0 is still a star-decomposition of G. Therefore, we will assume w.l.o.g. that H is a minimal triangulation of G and (T, X ) is a clique-tree of H (in particular, (T, X ) is reduced). Additional properties of (T, X ) will be deduced from the latter assumption about H by using the results from [16]. Let us now prove the lemma by induction on |V (G)| (the base-case of the graph with a single vertex is trivial). • If |X | = 1, then G has some universal vertex u. Furthermore, since G is planar therefore, G \ u is outerplanar [47]. Consequently, tw(G \ u) ≤ 2 [11], so, tw(G) ≤ 3. • Suppose |X | = 2. Let X = {B, B 0 }. Since (T, X ) is assumed to be a clique-tree of some minimal triangulation H of G, therefore, B ∩ B 0 is a minimal separator [16]. Let us remind that by Corollary 7 there is a planar supergraph G0 of G with same vertex-set so that B ∩ B 0 induces either an edge or a cycle of G0 . Furthermore (T, X ) is also a star-decomposition of G0 , so, tb(G0 ) ≤ 1. In addition, tw(G) ≤ tw(G0 ). Recall that we can further assume G0 to be prime (or else, we apply the induction hypothesis on the atoms of G0 ), hence B ∩ B 0 induces a cycle of G0 of length at least four. Let B∆B 0 = (B \ B 0 ) ∪ (B 0 \ B). Since H is assumed to be a minimal triangulation and B, B 0 are leaves of a clique-tree of H, therefore, B \ B 0 is a (nonempty) dominating clique of the subgraph G[B], and similarly B 0 \ B is a (nonempty) dominating clique of the subgraph G[B 0 ] [16]. Thus, every vertex u ∈ B∆B 0 satisfies B ∩ B 0 ∈ N (u). Since |B ∩ B 0 | ≥ 4 because B ∩ B 0 induces a cycle of G0 of length at least four, therefore, |B∆B 0 | ≤ 2 or else there would be a K3,3 -minor of G0 with any three vertices of B ∩ B 0 being one part of the bipartition. As a result, since B ∩ B 0 induces a cycle, tw(G) ≤ tw(G0 ) ≤ 2 + |B∆B 0 | = 4. • Finally, suppose |X | ≥ 3. Let t ∈ V (T ) be an internal node, by the properties of a tree decomposition the bag Xt is a separator of G. Let b ∈ Xt satisfy Xt ⊆ NG [b]. Since G is prime and so, biconnected, therefore Xt \ b is a separator of G \ b. In such case, let us remind by Lemma 13 that there exist a, c ∈ Xt \ b non-adjacent such that {a, c} is a minimal separator of G \ b. In particular, the path Π = (a, b, c) is a separator of G. Let C1 , C2 , . . . , Cl 22 be the components of G \ Π. For every 1 ≤ i ≤ l, let Gi be obtained from G[Ci ∪ Π] by making the two endpoints a, c of Π adjacent. Note that Gi can be obtained from G by edge-contractions (because G is prime and so, a, c ∈ N (Cj ) for every 1 ≤ j ≤ l), therefore, tb(Gi ) ≤ 1 because tree-breadth is stable under edge-contractions (Lemma 2). In addition, tw(G) ≤ maxi tw(Gi ) because Π induces a triangle in every graph Gi by construction. As a result, for every 1 ≤ i ≤ l, since |V (Gi )| < |V (G)| by construction, therefore tw(Gi ) ≤ 4 by the induction hypothesis, whence tw(G) ≤ 4. Let G be constructed from the cycle (u, v, x, y) of length four by adding two vertices a, b such that NG (a) = NG (b) = {u, x, v, y} (see Figure 15 for an illustration). Since there exists a stardecomposition of G with two bags (respectively dominated by a, b), tb(G) ≤ 1. Moreover, G is 4-regular by construction, therefore tw(G) ≥ 4 [12]. This proves the sharpness of the upperbound. Note that since it is well-known that many difficult problems can be solved on bounded-treewidth graphs in linear-time, therefore, it may be the case that the recognition of planar graphs with treebreadth at most one can be simplified by using Lemma 19. However, we were unable to find a way to use it in our proofs (actually, the star-decomposition that can be computed using our algorithm may have unbounded width — because of leaf-vertices of Type 1). 5.3 5.3.1 Correctness of Algorithm Leaf-BottomUp Existence of a P3 -separator As a first step to prove correctness of Algorithm Leaf-BottomUp, let us prove correctness of Step 1. That is, we will prove that for every planar graph G with tb(G) = 1, G contains a leaf-vertex or G admits a star-decomposition with at most two bags. To prove this step, we will prove additional properties of the minimal separators of prime planar graphs with tree-breadth one. In the following, let P3 (G) be the set of (not necessarily minimal) separators of G that induce paths of length 2 (we will call them P3 -separators since they have three vertices). We will distinguish the case when P3 (G) 6= ∅ from the case when P3 (G) = ∅. Theorem 7. Let G be a prime planar graph with tb(G) = 1. If P3 (G) 6= ∅, then G has a leaf-vertex. Proof. Let Π = (a, b, c) ∈ P3 (G) minimize the size of a smallest component of G \ Π. We recall that {a, c} ∈ / E(G) because G is assumed to be prime by the hypothesis (the latter fact will be used in the following). Let C be any component of G \ Π of minimum size. Our aim is to prove the existence of some leaf-vertex v ∈ C (the latter dominating the component C), that will prove Theorem 7. Claim 1. There do not exist Π0 ⊆ Π ∪ C, C 0 ⊂ C such that Π0 ∈ P3 (G) and C 0 is a component of G \ Π0 . Proof. The claim follows from the minimality of C.  We will often use Claim 1 in the remaining of the proof. Let (T, X ) be a star-decomposition of G, that exists by Lemma 3. In particular, let Ta , Tc be the subtrees that are respectively induced by the bags containing a or c. Assume w.l.o.g. that (T, X ) minimizes the distance in T between the subtrees Ta and Tc . We will distinguish the case Ta ∩ Tc 6= ∅ from the case Ta ∩ Tc = ∅. Case Ta ∩ Tc 6= ∅. In such case, the subtrees Ta , Tb , Tc are pairwise intersecting and so, by the Helly property (Lemma 1) Ta ∩ Tb ∩ Tc 6= ∅. Let us remove all vertices in V \ (Π ∪ C) from bags in (T, X ). Let us call (T, X C ) the resulting tree decomposition of G[Π ∪ C]. Claim 2. (T, X C ) has breadth one. Proof. There are two cases to be considered. • If b has some neighbour in C, then C must be a full component of G \ Π, or else one of {a, b}, {b, c} should be a clique-separator thus contradicting the fact that G is prime by the hypothesis. In such case, the claim follows from Lemma 9. 23 • Else, b has no neighbour in C, and let D be the connected component of b in G \ (a, c). Let H be obtained from G by contracting D to b. By Lemma 2, tb(H) = 1. Let (T, X H ) be the tree decomposition of breadth one of H where for every t ∈ V (T ), XtH = Xt if Xt ∩D = ∅, XtH = (Xt \D)∪{b} else. Moreover, since b has no neighbour in C, D∩NG [C] = ∅ and so, H[C ∪ Π] = G[C ∪ Π] by construction. Finally, since {b} is a full component of H \ (a, c), therefore, by Lemma 9 applied to H, the tree decomposition (T, X C ) is indeed a tree decomposition of breadth one of G[C ∪ Π].  Let (T 0 , X 0 ) be any reduced tree decomposition obtained from (T, X C ). We point out that 6= ∅ by construction (because Ta ∩ Tb ∩ Tc 6= ∅). Furthermore, since by Claim 2 (T, X C ) has breadth one, therefore (T 0 , X 0 ) is a star-decomposition of G[C ∪ Π] by Lemma 3. Ta0 ∩ Tb0 ∩ Tc0 We will prove that C contains a leaf-vertex by contradiction. Informally, we will show, using the properties of the star-decomposition (T 0 , X 0 ), that if it is not the case that C contains a leaf-vertex, then P3 (G[C ∪ Π]) ∩ P3 (G) 6= ∅ and the latter contradicts Claim 1. In order to prove this, first note that a has at least one neighbour in C because G is prime by the hypothesis (indeed, (b, c) cannot be an edge-separator of G). We now distinguish between several subcases. • Case 1. There is u ∈ C such that u ∈ N (a) ∩ N (b) ∩ N (c) (e.g., see Figure 16). By Lemma 15, either C is reduced to u or there exist Π0 = (a, u, c) ∈ P3 (G), C 0 ⊆ C \ u and C 0 is a component of G \ Π0 . The latter case contradicts Claim 1, therefore, C is reduced to u and so u is a leaf-vertex of Type 2. G\ C a c b u C Figure 16: Case 1 Thus, from now on let us assume that no such vertex u exists. • Case 2. By contradiction, assume N (a)∩C ⊆ N (b)∩C. By Lemma 14, |N (a)∩N (b)∩C| ≤ 1, so, |N (a) ∩ C| = 1. Let u ∈ N (a) ∩ N (b) ∩ C be the unique neighbour of vertex a in C (see Figure 17). Since in such case we can assume that u ∈ / N (c) (for otherwise, we are back to Case 1), and vertex c has some neighbour in C because G is prime (and so, (a, b) cannot be an edge-separator of G), therefore, C is not reduced to vertex u. Then, Π0 = (u, b, c) ∈ P3 (G) because it separates a from C \ u, and so there is at least one component of G \ Π0 that is strictly contained into C by construction. This contradicts Claim 1, so, Case 2 cannot occur. G \C a c b u C Figure 17: Case 2 • Case 3. There is u ∈ C satisfying u ∈ N (a)\N (b). By the properties of a tree decomposition, there is some bag B 0 ∈ Ta0 ∩ Tu0 . Let v ∈ B 0 dominate the bag B 0 . By construction, v 6= b because u ∈ B 0 \ N (b), similarly v 6= c because a ∈ B 0 \ N (c). We will also prove later that v 6= a. Moreover, Π \ N [v] 6= ∅ (or else, we are back to Case 1), hence Π \ B 0 6= ∅. So let B be the bag adjacent to B 0 onto the unique path in T 0 from B 0 to Ta0 ∩ Tb0 ∩ Tc0 (we remind that the latter subtree is nonempty by construction). By the properties of the tree decomposition (T 0 , X 0 ), B ∩ B 0 is a separator of G[C ∪ Π]. Furthermore, a ∈ B ∩ B 0 . More generally Π ∩ B 0 ⊆ B ∩ B 0 by construction, therefore B ∩ B 0 is also a separator of G by Lemma 16. Let w ∈ B dominate this bag. Observe that w 6= c because a ∈ B ∩ B 0 . 24 We will prove that v ∈ C and v is a leaf-vertex. In order to prove these two results, we will need to prove that C ∪ Π is fully contained into the two adjacent bags B, B 0 (Claim 7). The latter will require intermediate claims. Claim 3. c ∈ B ∩ B 0 . Proof. Assume for the sake of contradiction that c ∈ / B ∩ B 0 (see Figure 18). Then, c ∈ / B0 0 0 because Π ∩ B ⊆ B ∩ B by construction. We will prove that the latter contradicts Claim 1. Indeed, first observe that G \ w is connected because G is prime and so, biconnected, by the hypothesis. In addition (B ∩ B 0 ) \ w is a (not necessarily minimal) separator of G \ w because it separates B 0 \ B from c. Let S ⊆ (B ∩ B 0 ) \ w be a minimal separator of G \ w. By Lemma 13, there exist x, y ∈ (B ∩ B 0 ) \ w non-adjacent such that S = {x, y}, and so, Π0 = (x, w, y) ∈ P3 (G). Note that Π0 6= Π, because we assume that c ∈ / B ∩ B 0 and so 0 0 c∈ / {x, y}. Moreover, since (T , X ) is a star-decomposition of G[C ∪ Π] by construction we have that Π0 ⊆ Π ∪ C, therefore x ∈ C or y ∈ C, because c ∈ / {x, y} and a, b are adjacent whereas x, y are non-adjacent. W.l.o.g. let x ∈ C. c b u x a v w y ... B B' Figure 18: Case c ∈ / B ∩ B0 Subclaim 3.1. Π0 is not an ac-separator. Proof. We refer to Figure 19 for an illustration of the proof. Let C 0 be any component of G \ (Π ∪ C). Observe that C 0 is fully contained into some component D of G \ Π0 , because Π0 ⊆ Π ∪ C. In addition, a, c ∈ N (C 0 ) because G is prime by the hypothesis (and so, neither a nor b nor c nor (a, b) nor (b, c) can be a separator of G). In particular, since we assume c∈ / B ∩ B 0 and so, c ∈ / Π0 , therefore, c ∈ D. As a result, either a ∈ Π0 or a, c ∈ D, that finally proves the subclaim. ◦ B' u v a y Π' w b D Π c C' Figure 19: Π0 is not an ac-separator. Let D be the component of G \ Π0 such that c ∈ D, that exists because we assume c ∈ / B ∩ B0 0 0 and so, c ∈ / Π . Since b, c are adjacent and Π is not an ac-separator by Claim 3.1, therefore, Π ⊆ Π0 ∪ D. Moreover, let us show that Claim 3.1 implies the existence of some D0 ⊂ C being a component of G \ Π0 , thus contradicting Claim 1. Indeed, let D0 be any component of G \ (Π0 ∪ D). Since G is prime by the hypothesis, x has some neighbour in D0 and so, D0 ∩ C 6= ∅ because x ∈ C and Π ∩ D0 = ∅ by construction. But then, D0 ⊆ C \ x, for the existence of some z ∈ D0 \ C would imply that D0 ∩ Π 6= ∅. To sum up, we conclude that it must be the case that c ∈ B ∩ B 0 .  We will use Claim 3 to prove that v ∈ C, as follows: Claim 4. v ∈ C. Furthermore, the two vertices b, v are non-adjacent. Proof. Recall that v ∈ C ∪ Π because (T 0 , X 0 ) is a star-decomposition of G[C ∪ Π] by construction. So we will only need to prove that v ∈ / Π. First, since a ∈ B ∩B 0 by construction 0 0 and c ∈ B ∩ B by Claim 3, therefore, a, c ∈ B ⊆ N [v]. The latter implies that v ∈ / {a, c} because a, c ∈ N [v] whereas a, c are non-adjacent. Furthermore, this implies b ∈ / N [v] because 25 we assume that Π 6⊆ N [v] (for otherwise, we are back to Case 1). As a result, v ∈ / Π, whence v ∈ C.  Then, we will need the following technical claim in order to prove that w = b (Claim 6). Claim 5. G[C ∪ Π] is prime. Proof. Suppose by contradiction there exists a clique-separator S of G[C ∪ Π]. Then, S could not be a separator of G because G is prime by the hypothesis. By Lemma 16, the latter implies that S is an ac-separator of G[C ∪ Π]. Therefore, the two vertices b, v ∈ N (a) ∩ N (c) must be in S, and so, since b, v are non-adjacent by Claim 4, the latter contradicts the fact that S is a clique.  Claim 6. w = b. Proof. Assume for the sake of contradiction w 6= b (see Figure 20). We will prove that it contradicts Claim 1. Indeed, the graph G[C ∪ Π] \ w is connected because G[C ∪ Π] is prime by Claim 5 and so, biconnected. In addition, (B ∩ B 0 ) \ w is a (not necessarily minimal) separator of G[C ∪ Π] \ w because it separates b from B 0 \ B (recall that b, v are non-adjacent by Claim 3, and so, b ∈ / B 0 ⊆ N [v]). Let S ⊆ (B ∩ B 0 ) \ w be a minimal separator of G[C ∪ Π] \ w. By Lemma 13, there exist x, y ∈ (B ∩ B 0 ) \ w non-adjacent such that S = {x, y}, and so, Π0 = (x, w, y) ∈ P3 (G[C ∪ Π]). Furthermore, b ∈ / Π0 ⊆ (B ∩ B 0 ) ∪ {w} ⊆ N [v] ∪ {w} and so, 0 Π cannot be an ac-separator of G[C ∪ Π], whence by Lemma 16 Π0 is a separator of G, and so, Π0 ∈ P3 (G). u a=x v b w c=y ... B B' Figure 20: Case c ∈ B ∩ B 0 and w 6= b. Let D ⊆ C ∪ Π be the component of G[C ∪ Π] \ Π0 containing vertex b. Note that Π ⊆ D ∪ Π0 because Π0 is not an ac-separator of G[C ∪Π]. Let D0 be any component of G[C ∪Π]\(Π0 ∪D), that exists because Π0 ∈ P3 (G[C ∪ Π]). Since N (D0 ) ⊆ C ∪ Π by construction, D0 ∩ Π = ∅ by construction and D0 is a component of G[C ∪ Π] \ Π0 , therefore, D0 is also a component of G \ Π0 . The latter contradicts Claim 1 because D0 ⊂ C.  Let S = {v, b} ∪ (B ∩ B 0 ). We are now able to prove that S = C ∪ Π (Claim 7). That is, C ∪ Π is fully contained in the two adjacent bags B, B 0 (respectively dominated by b, v). Claim 7. S = C ∪ Π. Proof. Assume by contradiction S 6= C ∪ Π, let D be a component of G[C ∪ Π] \ S (see Figure 21). Note that D ⊂ C because Π ⊂ S by construction. Furthermore, v, b ∈ / B ∩ B0 0 because w = b by Claim 6 and b ∈ / N (v) by Claim 3, so, B ∩ B is a (minimal) vb-separator of G[C ∪Π]. The latter implies v ∈ / N (D) or b ∈ / N (D) because D induces a connected subgraph, D ∩ B ∩ B 0 = ∅ by construction, and B ∩ B 0 is a bv-separator of G[C ∪ Π]. As a result, there exists z ∈ {v, b} such that N (D) \ z ⊆ B ∩ B 0 . x v a b c y D B' B ... Figure 21: Case z = v. Moreover let {z, z 0 } = {v, b}. G[C ∪ Π] \ z is connected because G|C ∪ Π] is prime by Claim 5, and so, biconnected. In addition, N (D) \ z is a minimal separator of G[C ∪ Π] \ z because it separates D from z 0 and N (D) \ z ⊆ B ∩ B 0 ⊆ N (z 0 ) by construction. By Lemma 13, one 26 obtains the existence of two non-adjacent vertices x, y ∈ B ∩ B 0 such that N (D) \ z = {x, y}, whence N (D) ⊆ {x, y, z}. Then, by construction Π0 = (x, z, y) ∈ P3 (G) with D ⊂ C being a component of G \ Π0 , that contradicts Claim 1.  By Claim 7, C ∪ Π = S (see Figure 22). Note that it implies that C ⊆ N [v] because C \ v = (B ∩ B 0 ) \ (a, c). In order to conclude that v is a leaf-vertex, we will finally prove in Claim 8 that either B ∩ B 0 = {a, c} or B ∩ B 0 induces a path. a v G \C b c Figure 22: Case c ∈ B ∩ B 0 , w = b and C ∪ Π = {v, b} ∪ (B ∩ B 0 ). Claim 8. If B ∩ B 0 6= {a, c}, then G[B ∩ B 0 ] is a path. Proof. Recall that b, v ∈ / B ∩ B 0 because w = b by Claim 6 and b ∈ / N (v) by Claim 3. Hence by the properties of a tree decomposition, B ∩ B 0 is a bv-separator of G[C ∪ Π]. Since v ∈ C by Claim 4, a ∈ B ∩ B 0 by construction and c ∈ B ∩ B 0 by Claim 3, therefore B ∩ B 0 is also a vb-separator of G. In particular, B ∩ B 0 is a minimal bv-separator of G because B ∩ B 0 ⊆ N (v) ∩ N (w) = N (v) ∩ N (b) (indeed, recall that w = b by Claim 6). By Corollary 6, B ∩ B 0 either induces a cycle or it induces a forest of paths. Subclaim 8.1. B ∩ B 0 does not induce a cycle. Proof. By contradiction, let B ∩ B 0 induce a cycle. Recall that B ∩ B 0 contains the pair of non-adjacent vertices a, c (because a ∈ B ∩ B 0 by construction and c ∈ B ∩ B 0 by Claim 3). Therefore, one can contract B ∩ B 0 until one obtains an induced quadrangle (a, x, c, y). Let us contract an arbitrary component of G \ (Π ∪ C) so as to obtain a vertex z. Note that a, c ∈ N (z) because G is prime by the hypothesis (indeed, neither a nor b nor c nor (a, b) nor (a, c) can be a separator of G). Then, let us contract the edge {a, z} to a. By doing so, one obtains a K3,3 -minor with {a, b, v} being one part of the bipartition and {x, y, c} being the other part. This contradicts the fact that G is planar by the hypothesis, therefore B ∩ B 0 does not induce a cycle. ◦ It follows from Claim 8.1 that B ∩ B 0 induces a forest of paths. Suppose for the sake of contradiction that B ∩B 0 induces a forest of at least two paths. Let x ∈ / {a, c} be the endpoint of some path in the forest, that exists because we assume that B 6= {a, c}. Observe that |N (x)| ≥ 2 because b, v ∈ N (x), and |N (x)| = |N (x) ∩ (C ∪ Π)| ≤ 3 because x is the endpoint of some path of B ∩ B 0 and x ∈ C. Furthermore, N (x) \ (b, v) ⊆ B ∩ B 0 ⊆ N (b) ∩ N (v), and so, if |N (x)| = 3 then N (x) induces a path. Let Π0 = N (x) if |N (x)| = 3, else Π0 = (b, a, v). By construction, Π0 ⊆ Π ∪ C is a separator of G with {x} ⊂ C being a component of G \ Π0 , thus contradicting Claim 1. Consequently, B ∩ B 0 induces a path.  By Claim 8, either B ∩ B 0 = {a, c} or B ∩ B 0 induces a path. Furthermore, B ∩ B 0 = N (v) because v ∈ C (Claim 4) and C ∪ Π = {v, b} ∪ (B ∩ B 0 ) (Claim 7). In particular, if B ∩ B 0 = {a, c} then v is a leaf-vertex of Type 3. Else, B ∩ B 0 induces a path and the latter implies that |B ∩ B 0 | ≥ 4 or else the path B ∩ B 0 would be a separator of G with {v} being a component of G \ (B ∩ B 0 ), thus contradicting Claim 1. As a result, since we also have that B ∩ B 0 ⊆ N (b) and b, v are non-adjacent by Claim 4, therefore, v is a leaf-vertex of Type 1. Case Ta ∩ Tc = ∅. Since Π is a separator of G and G is prime by the hypothesis, one of Π or Π \ b must be a minimal separator of G. Therefore, since (T, X ) is assumed to minimize the distance in T between Ta and Tc , by Corollary 8 there exist two bags Ba , Bc that are adjacent in T and such that a ∈ Ba \ Bc and c ∈ Bc \ Ba . Furthermore, a dominates Ba while c dominates Bc . Note that Ba ∩ Bc = N (a) ∩ N (c), so, b ∈ Ba ∩ Bc . In particular, by the properties of a tree decomposition this implies that S = N (a) ∩ N (c) is a minimal ac-separator of G. We will prove that C is reduced to a vertex (Claim 10), the latter being a leaf-vertex. Claim 9. C ⊆ S. 27 Proof. Assume for the sake of contradiction that C 6⊆ B ∩ B 0 . By the properties of a tree decomposition it comes that some vertex y ∈ C is separated from a or c by the set S = B ∩ B 0 = N (a) ∩ N (c). Say w.l.o.g. that S is an yc-separator. Let C 0 ⊂ C be the connected component containing y in G \ (S ∪ {a}). Since we have that G \ a is connected because G is prime by the hypothesis (and so, biconnected), that c ∈ / C 0 and N (C 0 ) \ a ⊆ S ∩ (C ∪ Π) ⊆ N (c) ∩ (C ∪ Π), then 0 it comes that N (C ) \ a is a minimal yc-separator of G \ a. So, by Lemma 13 there exist x0 , y 0 ∈ S such that N (C 0 ) \ a = {x0 , y 0 }. Therefore, Π0 = (x0 , a, y 0 ) ∈ P3 (G) and C 0 ⊂ C is a component of G \ Π0 , that contradicts Claim 1.  By Claim 9, C ⊆ S (see Figure 23 for an illustration). Since S is an ac-separator and for any component C 0 of G \ (Π ∪ C), a, c ∈ N (C 0 ) because G is prime, therefore S ∩ C 0 6= ∅. One thus obtains the following chain of strict subset containment relations C ⊂ C ∪ {b} ⊂ S. Furthermore, by Corollary 6, S either induces a cycle or a forest of paths, so, C being a strict connected subset of S, it must induce a path. In particular, C ∪ {b} also being a strict subset of S, either it induces a path or it is the union of the path induced by C with the isolated vertex b. b a c ... C Bc Ba Figure 23: Case Ta ∩ Tc = ∅. Claim 10. |C| = 1. Proof. Assume for the sake of contradiction that |C| ≥ 2. Since C induces a path, let us pick an endpoint v ∈ C that is not adjacent to vertex b (recall that C ∪ {b} being a strict subset of S, it does not induce a cycle). In such a case, N (v) induces a path Π0 ∈ P3 (G), with a, c ∈ Π0 and {v} ⊂ C is a component of G \ Π0 , thus contradicting Claim 1.  By Claim 10, C is reduced to a vertex v, that is either a leaf-vertex of Type 2 (if v ∈ N (b)) or of Type 3 (if v ∈ / N (b)). Note that in some cases, there may only exist leaf-vertices of only one Type (i.e., see respectively Figure 24, 25 and 26 for Types 1,2 and 3). Therefore, there is none of the three Types of leaf-vertices that can be avoided in our algorithm. v1 v1 v2 d v4 v2 d v1 v4 v2 d v4 v3 v3 v3 Figure 24: A planar graph G with tb(G) = 1 and all of its four leaf-vertices v1 , v2 , v3 , v4 of Type 1. Figure 25: A planar graph G with tb(G) = 1 and all of its four leaf-vertices v1 , v2 , v3 , v4 of Type 2. Figure 26: A planar graph G with tb(G) = 1 and all of its four leaf-vertices v1 , v2 , v3 , v4 of Type 3. Examples of planar graphs G with tb(G) = 1 and P3 (G) = ∅ include C4 , the cycle with four vertices. To prove correctness of Step 1, it now suffices to prove that all these graphs (with P3 (G) = ∅) admit a star-decomposition with at most two bags. Lemma 20. For any prime planar graph G, if tb(G) = 1 and P3 (G) = ∅, then G admits a star-decomposition with at most 2 bags. 28 Proof. By contradiction, let (T, X ) be a star-decomposition of G with at least three bags. Let t ∈ V (T ) be an internal node, by the properties of a tree decomposition the bag Xt is a separator of G. Let u ∈ Xt satisfy Xt ⊆ NG [u]. Since G is biconnected, therefore Xt \ u is a separator of G \ u. By Lemma 13, there exist x, y ∈ Xt \ u non-adjacent such that {x, y} is a minimal separator of G \ u. In such case, (x, u, y) ∈ P3 (G), which contradicts the fact that P3 (G) = ∅. 5.3.2 Case of leaf-vertex v of Type 1 Lemma 21. Let G be a prime planar graph and v be a leaf-vertex of Type 1. Let Πv be the path induced by N (v) and let av , cv be the ends of Πv . Suppose V (G) 6= N [v] ∪ {dv }. Then Π0 = (av , dv , cv ) ∈ P3 (G) and N [v] \ {av , cv } is a component of G \ Π0 . Proof. Let C be a component of G \ (N [v] ∪ {dv }), that exists by the hypothesis. By construction, v ∈ / N [C], so, N (C) ⊆ N (v) ∪ {dv } separates v from C. Furthermore, since G is prime by the hypothesis, there exist x, y ∈ N (C) non-adjacent. Note that dv ∈ / {x, y} because N (v) ⊆ N (dv ) by the hypothesis, hence x, y ∈ N (v). We claim that {x, y} = {av , cv }. By contradiction, suppose x ∈ / {av , cv }. Let us write Πv = (P, x, Q, y, R) with P, Q non-empty subpaths of Πv and R a (possibly empty) subpath of Πv . In such a case, the connected subsets S1 := {v}∪P, S2 := {dv }, S3 := {x}, S4 := Q and S5 := {y}∪C induce a K5 -minor of G, that contradicts the hypothesis that G is planar. Therefore, the claim is proved, that is, {x, y} = {av , cv }. To prove the lemma, it now suffices to prove that N (C) ∩ N (v) = {av , cv } for in such a case the result will hold for any component C 0 of G \ (N [v] ∪ {dv }). By contradiction, let x0 ∈ (N (C) ∩ N (v)) \ (av , cv ). Since |N (v)| ≥ 4 because v is a leaf-vertex of Type 1 by the hypothesis, therefore, x0 and av are non-adjacent or x0 and cv are non-adjacent. Let y 0 ∈ {av , cv } be non-adjacent to x0 . Since x0 , y 0 ∈ N (C) ∩ N (v) are non-adjacent, therefore, by the same proof as for the above claim {x0 , y 0 } = {av , cv }, that would contradict the assumption that x0 ∈ / {av , cv }. As a result, N (C) ⊆ (av , dv , cv ) and so, since the result holds for any component C 0 of G \ (N [v] ∪ {dv }), Π0 = (av , dv , cv ) ∈ P3 (G) with N [v] \ {av , cv } being a full component of G \ Π0 . Theorem 8. Let G be a prime planar graph and v be a leaf-vertex of Type 1. Let Πv be the path induced by N (v) and let av , cv be the ends of Πv . Suppose V (G) 6= N [v] ∪ {dv }. Then, the graph G0 , obtained from G \ v by contracting the internal vertices of Πv to a single edge, is prime and planar, and tb(G) = 1 if and only if tb(G0 ) = 1. av dv av cv cv dv x y v Figure 27: Contraction of the internal vertices of Πv to a single edge and removal of v. Proof. For the remaining of the proof, let Π0v = (av , x, y, cv ) be the path resulting from the contraction of the internal vertices of Πv to the edge {x, y} in G0 . By Lemma 21 (av , dv , cv ) ∈ P3 (G) with (N [v] \ (av , cv )) being a full component of G \ (av , dv , cv ). Consequently, NG0 (x) = {av , dv , y} and NG0 (y) = {cv , dv , x}. The graph G0 is a minor of G, that is a planar graph by the hypothesis, so, G0 is also planar. In order to prove that G0 is prime, by contradiction, let S be a minimal clique-separator of G0 . There are two cases to be considered. • Suppose x ∈ S or y ∈ S. In such case, S ⊆ (av , x, dv ), or S ⊆ (x, dv , y), or S ⊆ (y, dv , cv ). By Lemma 21 (av , dv , cv ) ∈ P3 (G) with(N [v] \ (av , cv )) being a full component of G \ (av , dv , cv ), and so, for every component C of G0 \ (Π0v ∪ {dv }) = G \ (N [v] ∪ {dv }) av , cv ∈ N (C) because G is prime by the hypothesis. In such case, since av ∈ / S or cv ∈ / S, therefore, G0 \ S is connected, that contradicts the assumption that S is a clique-separator of G0 . 29 • Else, x, y ∈ / S. Since av ∈ / S or cv ∈ / S because av and cv are non-adjacent in G0 , therefore, S 0 must be a separator of G \ (x, y) or else G0 \ S would be connected because Π0v induces a path of G0 (thus contradicting the assumption that S is a separator of G0 ). In such a case, since by Lemma 21 (av , dv , cv ) ∈ P3 (G) with(N [v] \ (av , cv )) being a full component of G \ (av , dv , cv ), since S is a separator of G0 \ (x, y) = G \ (N [v] \ (av , cv )) and since S is not a separator of G because G is prime by the hypothesis, therefore, by Lemma 16 there are exactly two components Ca , Cc in G0 \(S ∪{x, y}) with av ∈ Ca and cv ∈ Cc . However, Π0v is an av cv -path of G0 \ S, thus contradicting the assumption that S is a separator of G0 . As a result, G0 is a prime planar graph. Finally, let us prove tb(G) = 1 if and only if tb(G0 ) = 1. • If tb(G) = 1 then tb(G \ v) = 1 because N (v) ⊆ N (dv ) by the hypothesis, and so, tb(G0 ) = 1 because G0 is obtained from G \ v by edge-contractions and tree-breadth is contraction-closed (Lemma 2). • Conversely, let us prove that tb(G) = 1 if tb(G0 ) = 1. To prove this, let (T 0 , X 0 ) be a reduced star-decomposition of G0 , that exists by Lemma 3, minimizing the distance in T 0 between the two subtrees Ta0 v and Tc0v . In order to prove tb(G) = 1, it suffices to show how to construct a star-decomposition of G from (T 0 , X 0 ). We will prove as an intermediate claim that Ta0 v ∩ Tc0v 6= ∅. By contradiction, suppose Ta0 v ∩ Tc0v = ∅. Since by Lemma 21 (av , dv , cv ) ∈ P3 (G) with (N [v] \ (av , cv )) being a full component of G \ (av , dv , cv ), therefore, (av , dv , cv ) ∈ P3 (G0 ) with {x, y} being a full component of G0 \ (av , dv , cv ). Since we proved that G0 is prime, it follows that one of (av , cv ) or (av , dv , cv ) is a minimal separator of G0 . In such a situation, since (T 0 , X 0 ) is assumed to minimize the distance in T 0 between Ta0 v and Tc0v , therefore, by Corollary 8 there are two adjacent bags Ba0 v , Bc0 v such that av ∈ Ba0 v \ Bc0 v and cv ∈ Bc0 v \ Ba0 v respectively dominate Ba0 v and Bc0 v in G0 . However by the properties of a tree decomposition this implies that Ba0 v ∩ Bc0 v = N (av ) ∩ N (cv ) is an av cv -separator of G0 , thus contradicting the existence of the av cv -path Π0v . Therefore, the claim is proved and Ta0 v ∩ Tc0v 6= ∅. Recall that Ta0 v ∩Td0 v 6= ∅ and similarly Tc0v ∩Td0 v 6= ∅ by the properties of a tree decomposition. Hence, the subtrees Ta0 v , Tc0v , Td0 v are pairwise intersecting, and so, by the Helly property (Lemma 1), Ta0 v ∩ Td0 v ∩ Tc0v 6= ∅. Let us now proceed as follows so as to obtain a stardecomposition of G. Let us remove x, y from all bags in X 0 , that keeps the property for (T 0 , X 0 ) to be a star-decomposition because x and y are dominated by dv in G0 . Then, let us add two new bags B1 = N [v], B2 = N (v) ∪ {dv }, and finally let us make B1 , B2 pairwise adjacent and let us make B2 adjacent to some bag of Ta0 v ∩ Td0 v ∩ Tc0v . By construction, the resulting tree decomposition is indeed a star-decomposition of G, whence tb(G) = 1. 5.3.3 Proof of Step 3.1 (a) In the following three subsections ( 5.3.3, 5.3.4 and 5.3.5) we will prove correctness of the algorithm for the case of a leaf-vertex v of Type 2 or 3 and G \ v is prime ( Step 3.1). Our proofs in these subsections will mostly rely on Lemma 17. Let us first show how we can use Lemma 17 in order to prove correctness of Step 3.1 (a). Note that since we are in the case when G \ v is prime, we needn’t prove it in the following Theorem 9. Theorem 9. Let G = (V, E) be a prime planar graph, let v be a leaf-vertex of Type 2 or 3, and let Πv = (av , bv , cv ) be as in Definition 5. Suppose that |N (av ) ∩ N (cv )| ≥ 3 in G \ v, or there exists a minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S. Then, tb(G) = 1 if and only if tb(G \ v) = 1. Proof. First we prove that tb(G) = 1 implies that tb(G \ v) = 1, that is the easy part of the result. Let (T, X ) be a tree decomposition of G of breadth one, let (T, X 0 ) be such that for every node t ∈ V (T ), Xt0 = Xt \ v. Observe that (T, X 0 ) is a tree decomposition of G \ v. Furthermore, we claim that it has breadth one, indeed, for every t ∈ V (T ) such that Xt ⊆ NG [v], Xt0 ⊆ NG [bv ] because NG (v) ⊆ NG [bv ]. As a result, tb(G \ v) = 1. 30 Conversely, we prove that tb(G \ v) = 1 implies that tb(G) = 1. Let (T 0 , X 0 ) be a stardecomposition of G \ v minimizing the distance in T 0 between the subtrees Ta0 v and Tc0v . There are two cases. If Ta0 v ∩ Tc0v 6= ∅, then the subtrees Ta0 v , Tb0v , Tc0v are pairwise intersecting, hence by the Helly property (Lemma 1) Ta0 v ∩ Tb0v ∩ Tc0v 6= ∅, and so it suffices to make adjacent to any bag of Ta0 v ∩ Tb0v ∩ Tc0v the new bag NG [v] ⊆ {av , bv , cv , v} so as to obtain a star-decomposition of G. Else Ta0 v ∩ Tc0v = ∅ and so, by Corollary 9 if |N (av ) ∩ N (cv )| ≥ 3 in G \ v or by Corollary 8 else, there are two adjacent bags Ba0 v , Bc0 v such that av ∈ Ba0 v \ Bc0 v , bv ∈ Ba0 v ∩ Bc0 v ⊆ N (av ) ∩ N (cv ) and cv ∈ Bc0 v \ Ba0 v . Furthermore, av dominates Ba0 v while cv dominates Bc0 v . One obtains a star-decomposition of G simply by adding vertex v into bags Ba0 v and Bc0 v . 5.3.4 Proof of Step 3.1 (b) i The proof of this step is more involved than the proof of previous Step 3.1 (a). We will need the following intermediate lemma. Lemma 22. Let G = (V, E) be a prime graph with tb(G) = 1, let v be a leaf-vertex of Type 2 or 3 and let Πv = (av , bv , cv ) be as in Definition 5. Suppose that N (av ) ∩ N (cv ) = {v, bv } and V 6= Πv ∪ {v}. Then, NG [bv ] \ (av , cv , v) is an av cv -separator of G \ v. Proof. Let (T, X ) be a star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between the subtrees Tav and Tcv . We claim that Tav ∩ Tcv 6= ∅, i.e., av , cv are in a same bag of the decomposition. By contradiction, let Tav ∩Tcv = ∅. Since G is prime and Πv is a separator of G, therefore, one of Πv or Πv \ bv is a minimal separator of G. Since (T, X ) minimizes the distance in T between Tav and Tcv , therefore, by Corollary 8 there exist two adjacent bags Bav , Bcv such that av ∈ Bav \ Bcv and cv ∈ Bcv \ Bav . Furthermore, vertices av and cv respectively dominate the bags Bav and Bcv . This implies Bav ∩ Bcv = NG (av ) ∩ NG (cv ) and so, NG (av ) ∩ NG (cv ) is a minimal av cv -separator of G by the properties of the tree decomposition. However, let C be any component of G \ (Πv ∪ {v}), that exists because V 6= Πv ∪ {v} by the hypothesis. Since G is prime, therefore, av , cv ∈ N (C) (or else, one of the cliques av or bv or cv or (av , bv ) or (bv , cv ) would be a clique-separator of G, thus contradicting the assumption that G is prime). Then, the av cv -separator NG (av ) ∩ NG (cv ) must contain some vertex of C, which contradicts the fact that NG (av ) ∩ NG (cv ) = {v, bv } by the hypothesis. As a result, we proved that Tav ∩ Tcv 6= ∅. Let H be the chordal supergraph of G such that (T, X ) is a clique-tree of H. Equivalently, every two vertices x, y ∈ V are adjacent in H if and only if they are in a same bag of X . In particular, av , cv are adjacent in H. Let S := NH (av ) ∩ NH (cv ). We claim that S is an av cv -separator of G. By contradiction, if it is not an av cv -separator of G, then there exists an av cv -path Pav cv of G which does not intersect S. Furthermore, Pav cv is a path of H because H is a supergraph of G, and it has length at least two because av , cv are non-adjacent in G. So, let Qav cv be taken of minimum length amongst all av cv -paths of length at least two in H that do not intersect S (the existence of such a path follows from the existence of Pav cv ). Observe that Qav cv may be not a path in G. By minimality of Qav cv , the vertices of Qav cv induce a cycle of H because av , cv are adjacent in H. Therefore, the vertices of Qav cv induce a triangle because H is chordal. However, this contradicts the fact that Qav cv does not intersect S = NH (av ) ∩ NH (cv ), so, the claim is proved. Finally, let us prove that S \ v ⊆ NG [bv ] \ (av , cv , v), that will conclude the proof that NG [bv ] \ (av , cv , v) is an av cv -separator of G \ v. For every vertex x ∈ S \ v, x ∈ NH (av ) ∩ NH (cv ), therefore, Tav ∩ Tx 6= ∅ and Tcv ∩ Tx 6= ∅ by construction of H. Since the subtrees Tav , Tcv , Tx are pairwise intersecting, by the Helly property (Lemma 1) Tav ∩ Tcv ∩ Tx 6= ∅, or equivalently there is some bag B ∈ Tav ∩ Tcv ∩ Tx . Let z ∈ B dominate the bag. Clearly, x ∈ NG [z]. Furthermore, z ∈ NG (av ) ∩ NG (cv ) because av , cv are non-adjacent in G. As a result, either z = bv or z = v. Since x 6= v and NG (v) ⊆ NG [bv ], we have that x ∈ NG [bv ] in both cases. Theorem 10. Let G = (V, E) be a prime planar graph with tb(G) = 1, v be a leaf-vertex of Type 2 or 3, and let Πv = (av , bv , cv ) be as in Definition 5. Suppose N (av ) ∩ N (cv ) = {bv , v}, and G \ v is prime, and there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v such that {av , cv } ⊆ S. Then, G = C4 , a cycle with four vertices. Proof. By contradiction, assume G 6= C4 . Since G is prime by the hypothesis, G has at least five vertices (the single other graph with four vertices and a leaf-vertex of Type 2 or 3 is the diamond, which is not prime). Equivalently, V 6= Πv ∪ {v}. By Lemma 22, this implies that N [bv ] \ (av , cv , v) is an av cv -separator of G \ v. Since G \ v is prime by the hypothesis, and so, biconnected, therefore, 31 G \ (bv , v) is connected, and so, N (bv ) \ (av , cv , v) 6= ∅ is an av cv -separator of G \ (bv , v). In particular, av , bv , cv ∈ N (V \ (Πv ∪ {v})). Moreover, we claim that V \ (Πv ∪ {v}) induces a connected subgraph (note that the latter implies that V \ (Πv ∪ {v}) is a full component of G \ Πv ). By contradiction, let C1 , C2 be distinct components of V \ (Πv ∪ {v}). Since G is prime, av , cv ∈ NG (C1 ) ∩ NG (C2 ) (or else, one of the cliques av or bv or cv or (av , bv ) or (bv , cv ) would be a clique-separator of G, thus contradicting the assumption that G is prime). Therefore, bv ∈ NG (C1 ) ∩ NG (C2 ) because N [bv ] \ (av , cv , v) is an av cv -separator of G \ v. It follows that Πv is a minimal separator of G \ v, that contradicts the hypothesis that there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S. Consequently, V \ (Πv ∪ {v}) induces a connected subgraph. Let S 0 ⊆ N (bv ) \ (av , cv , v) be a minimal av cv -separator of G \ (bv , v). By Lemma 13, there exist x, y ∈ N (bv ) \ (av , cv , v) non-adjacent such that S 0 = {x, y}. Finally, let Π0 = (x, bv , y) and let A, C be the respective components of av , cv in G \ (Π0 ∪ {v}). Note that x, y ∈ N (A) ∩ N (C) because G \ v is prime by the hypothesis (indeed, neither x nor bv nor y nor (bv , x) nor (bv , y) can be a separator of G \ v). Let P be an xy-path of V \ (Πv ∪ {v}), that exists because V \ (Πv ∪ {v}) is connected. Also, let A0 ⊆ A and C 0 ⊆ C be the respective components of av , cv in G\(P ∪Π0 ∪{v}). Note that the subpath P \ (x, y) lies onto a unique component of G \ (Π0 ∪ {v}) because it does not intersect Πv ∪ {v} by construction, so, A0 = A or C 0 = C. By symmetry, assume that C 0 = C. There are two cases to consider. • Assume A0 = A (see Figure 28 for an illustration). Let us contract the internal vertices of P so as to make vertices x, y adjacent. Then, let us contract the components A, C to the two vertices av , cv , respectively. Finally, let us contract v to either av or cv . By construction, the five vertices av , bv , cv , x, y now induce a K5 , that contradicts the fact that G is planar by the hypothesis. P \ (x,y) P x y C av x A A y C C A av cv cv bv bv v v Figure 28: Case A0 = A (left). A K5 -minor is drawn (right), with edges resulting from contractions labeled in red. • Else, A0 6= A. Equivalently, P ⊆ A ∪ {x, y} (see Figure 29 for an illustration). Since A is connected, N (A0 ) ∩ (P \ (x, y)) 6= ∅. Let z ∈ N (A0 ) ∩ P . Let us contract the internal vertices of P to vertex z. Then, let us contract the components A0 and C 0 = C to the two vertices av , cv , respectively. Finally let us contract v to either av or cv . By construction, there is a K3,3 -minor whose sides of the bipartition are {av , x, y} and {bv , cv , z}, respectively, that contradicts the fact that G is planar by the hypothesis. P A\A' x P[x,z] y z A' z C av A' cv y x C P[z,y] C av cv bv bv v v Figure 29: Case A0 6= A (left). A K3,3 -minor is drawn (right), with each side of the bipartition being coloured differently. Edges resulting from contractions are labeled in red. Since both cases contradict the hypothesis that G is planar, therefore, G = C4 . 32 5.3.5 Proof of Step 3.1 (b) ii Theorem 11. Let G = (V, E) be a prime planar graph, let v be a leaf-vertex of Type 2 or 3, and let Πv = (av , bv , cv ) be as in Definition 5. Suppose that all of the following statements hold: • N (av ) ∩ N (cv ) = {v, bv , uv } with uv ∈ / {v} ∪ Πv ; • V 6= {av , bv , cv , uv , v}; • there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S. Let G0 be the graph obtained from G by adding edges {v, uv } and {bv , v}, then tb(G) = 1 if and only if tb(G0 ) = 1. Moreover, G0 is planar and prime. uv av cv bv v Figure 30: Case of a leaf-vertex v of Type 3 with G \ v is prime and N (av ) ∩ N (cv ) = {uv , bv , v}. Red edges are those added by Algorithm Leaf-BottomUp. Proof. We will first prove that G \ v is prime. By contradiction, let S 0 be a minimal cliqueseparator of G \ v. By Theorem 6, there is wv 6= v such that S 0 = {bv , wv }, and by Lemma 16, S 0 must be an av cv -separator of G \ v. Then, it follows that wv = uv ∈ N (av ) ∩ N (cv ), whence V = {av , bv , cv , uv , v} by Theorem 6, that contradicts the hypothesis. Therefore, G \ v is prime. Let us prove that tb(G) = 1 implies that tb(G0 ) = 1. Let (T, X ) be a star-decomposition of G, which exists by Lemma 3, minimizing the distance in T between the subtrees Tav and Tcv . Since NG (v) ⊆ NG [bv ] then removing v from all bags leaves a tree decomposition of G \ v of breadth one. Up to reducing the tree decomposition, let (T 0 , X 0 ) be any reduced tree decomposition of G \ v that is obtained from (T, X ) by first removing v from the bags. Note that (T 0 , X 0 ) is a star-decomposition of G \ v by Lemma 3. Now, there are two cases. • Suppose Ta0 v ∩Tc0v 6= ∅. We will need to prove in this case that the two subtrees Ta0 v ∩Tb0v ∩Tc0v and Ta0 v ∩ Tu0 v ∩ Tc0v are nonempty and disjoint. Claim 11. bv , uv are non-adjacent in G. Proof. By contradiction, if it were the case that bv , uv are adjacent, then by Lemma 15, either uv is an isolated vertex of G \ (Πv ∪ {v}) — in which case, Πv ∈ P3 (G \ v) because we assume V 6= {av , bv , cv , uv , v} by the hypothesis —, or (av , uv , bv ) ∈ P3 (G \ v). Since G \ v is prime, it follows that one of Πv or Πv \ bv must be a minimal separator of G \ v, similarly one of (av , uv , cv ) or (av , cv ) must be a minimal separator of G \ v. Therefore, both cases contradict the hypothesis that there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S, which proves that bv , uv are non-adjacent.  Recall that we are in the case when Ta0 v ∩ Tc0v 6= ∅. The subtrees Ta0 v , Tc0v , Tu0 v are pairwise intersecting, similarly the subtrees Ta0 v , Tc0v , Tb0v are pairwise intersecting. Therefore, by the Helly property (Lemma 1) Ta0 v ∩ Tb0v ∩ Tc0v 6= ∅ and Ta0 v ∩ Tu0 v ∩ Tc0v 6= ∅. Furthermore, Tav ∩ Tbv ∩ Tcv ∩ Tuv = ∅, because since bv , uv are non-adjacent by Claim 11 no vertex dominates all of {av , bv , cv , uv } in G, and so, Ta0 v ∩ Tb0v ∩ Tc0v ∩ Tu0 v = ∅. Claim 12. The subtrees Ta0 v ∩ Tb0v ∩ Tc0v and Ta0 v ∩ Tu0 v ∩ Tc0v are adjacent in T 0 . Proof. By contradiction, let B be an internal bag onto the path between both subtrees in T 0 , let z ∈ B dominate the bag. Note that av , cv ∈ B by the properties of the tree decomposition, z∈ / {av , cv } because av , cv are non-adjacent, and so, z ∈ N (av ) ∩ N (cv ) \ v = {uv , bv }. This 33 contradicts the fact that B ∈ / Ta0 v ∩ Tb0v ∩ Tc0v and B ∈ / Ta0 v ∩ Tu0 v ∩ Tc0v , therefore, the subtrees 0 0 0 0 0 0 Tav ∩ Tbv ∩ Tcv and Tav ∩ Tuv ∩ Tcv are adjacent in T 0 .  Finally, let B ∈ Ta0 v ∩ Tb0v ∩ Tc0v , B 0 ∈ Ta0 v ∩ Tu0 v ∩ Tc0v be adjacent, that exist by Claim 12. Observe that bv dominates B, uv dominates B 0 . To obtain a star-decomposition of G0 from (T 0 , X 0 ), it now suffices to add vertex v in B and B 0 , whence tb(G0 ) = 1. • Else, Ta0 v ∩Tc0v = ∅. This implies Tav ∩Tcv = ∅. Since the tree decomposition (T, X ) minimizes the distance in T between Tav and Tcv , G is planar and |N (av ) ∩ N (cv )| ≥ 3, therefore by Corollary 9, the subtrees Tav and Tcv are adjacent in T , whence the subtrees Ta0 v , Tc0v are also adjacent in T 0 . In particular, by Corollary 9 there exist two adjacent bags Ba0 v , Bc0 v ∈ X 0 such that av ∈ Ba0 v \ Bc0 v , Ba0 v ∩ Bc0 v = NG (av ) ∩ NG (cv ) \ v = {uv , bv }, cv ∈ Bc0 v \ Ba0 v . Furthermore, av dominates Ba0 v while cv dominates Bc0 v . Therefore, in order to obtain a star-decomposition of G0 from (T 0 , X 0 ), it now suffices to add vertex v in Ba0 v and Bc0 v – that yields exactly (T, X ) –, whence tb(G0 ) = 1. Before we can prove the equivalence, i.e., tb(G) = 1 if and only if tb(G0 ) = 1, we need to prove first that G0 is prime and planar. Claim 13. G0 is prime. Proof. Let S 0 be a clique-separator of G0 . Note that v ∈ S 0 by construction of G0 . Therefore, S 0 \ v is a clique-separator of G \ v, that contradicts the fact that G \ v is prime. Consequently, G0 is prime.  Claim 14. G0 is planar. Proof. Let us fix a plane embedding of G. By Jordan Theorem, the cycle induced by (av , bv , cv , uv ) separates the plane into two regions. Let G1 , G2 be respectively the subgraphs of G that are induced by all the vertices in each region. uv av c1 cv c2 bv Figure 31: Proof that the graph G0 of Theorem 11 is planar. We claim that either V \ (av , bv , cv , uv , v) ⊆ V (G1 ), or V \ (av , bv , cv , uv , v) ⊆ V (G2 ). Note that it will prove that G0 is planar, because then drawing vertex v onto the region that does not contain the set V \ (av , bv , cv , uv , v) yields a planar embedding of G0 . By contradiction, let C1 ⊆ V (G1 ), C2 ⊆ V (G2 ) be connected components of V \ (av , bv , cv , uv , v). Let Π0v = (av , uv , cv ). If one of Πv or Π0v belongs to P3 (G\v), then, there exists a minimal separator S ⊆ (N (av )∩N (cv ))∪ {av , cv } in G \ v and since G \ v is prime, {av , cv } ⊆ S. This would contradict the hypothesis, so, Πv , Π0v ∈ / P3 (G \ v). As a result, since (av , bv , cv , uv ) = Πv ∪ Π0v separates C1 from C2 , therefore, uv , bv ∈ N (C1 ) ∩ N (C2 ) (or else, Πv ∈ P3 (G \ v) or Π0v ∈ P3 (G \ v)). Let us remove all other components of V \ (av , bv , cv , uv , v) but C1 and C2 , and let us remove all edges between {av , cv } and C1 ∪ C2 if any (see Figure 31). Finally, let us contract C1 , C2 to the two vertices x1 , x2 . The cycle induced by (uv , x1 , bv , x2 ) separates the plane into two regions with av , cv being into different regions by construction. Vertex v must belong to one of the regions, but then it is a contradiction because v ∈ N (av ) ∩ N (cv ) by the hypothesis.  To conclude the proof, let us prove that conversely, tb(G0 ) = 1 implies that tb(G) = 1. Let (T 0 , X 0 ) be a star-decomposition of G0 minimizing the distance in T 0 between the subtrees Ta0 v and Tc0v . As an intermediate step, we claim that if removing vertex v from all bags of X 0 leaves a tree decomposition of G \ v of breadth one, then it implies that tb(G) = 1. To prove the claim, there are two cases to be considered. • If Ta0 v ∩ Tc0v 6= ∅, then the subtrees Ta0 v , Tb0v , Tc0v are pairwise intersecting, hence by the Helly property (Lemma 1) Ta0 v ∩ Tb0v ∩ Tc0v 6= ∅. Equivalently there is bag containing Πv , and so it suffices to remove v from all bags and then to make any bag containing Πv adjacent to the new bag NG [v] in order to obtain a tree decomposition of G of breadth one. 34 • Else, Ta0 v ∩ Tc0v = ∅. Since (T 0 , X 0 ) minimizes the distance in T 0 between the subtrees Ta0 v and Tc0v , G0 is planar by Claim 14 and av , cv have three common neighbours in G0 , therefore, by Corollary 9 there must exist two adjacents bags Ba0 v , Bc0 v such that av ∈ Ba0 v \Bc0 v , Ba0 v ∩Bc0 v = N (av ) ∩ N (cv ) and cv ∈ Bc0 v \ Ba0 v . Furthermore, vertex av dominates the bag Ba0 v , while vertex cv dominates the bag Bc0 v . As a result, removing vertex v from all bags but Ba0 v , Bc0 v leads to a tree decomposition of G of breadth one. Consequently, we are left to modify the tree decomposition (T 0 , X 0 ) so as to ensure that none of the bags is only dominated by vertex v in G0 , for if it is the case then removing v from all bags does leave a tree decomposition of G \ v of breadth one. We will call the latter property the removal property. Observe that if it is the case that (T 0 , X 0 ) does not satisfy the removal property, then there must be a bag B fully containing NG0 (v) because any strict subset of NG0 (v) is dominated by some vertex of G \ v. In particular, B = NG0 [v] because only vertex v dominates NG0 (v) in G0 , and so we can further assume that Tv0 = {B} without violating the property for (T 0 , X 0 ) to be a tree decomposition of G0 of breadth one. Therefore in the following, assume that (T 0 , X 0 ) is a reduced star-decomposition of G0 and Tv0 = {B}, that is always possible to achieve by Lemma 3 and above remarks. Since V 6= {av , bv , cv , uv , v} = NG0 [v] by the hypothesis, therefore, X 0 \ B 6= ∅. Let B 0 be adjacent to B in T 0 . Note that B ∩ B 0 6= {av , bv , cv , uv } because no other vertex than v dominates the subset {av , bv , cv , uv } in G0 . By the properties of a tree decomposition, B ∩ B 0 is a separator of G0 . Consequently, B ∩ B 0 is not a clique because G0 is prime by Claim 13. Furthermore, since B ∩ B 0 6= {av , bv , cv , uv } it holds that B \ (B 0 ∪ {v}) 6= ∅, consequently B ∩ B 0 is also a separator of G \ v. Since G \ v is prime, B ∩ B 0 cannot be any of (av , cv ), Πv or Π0v because by the hypothesis there is no minimal separator S ⊆ (N (av ) ∩ N (cv )) ∪ {av , cv } in G \ v and {av , cv } ⊆ S. It follows that B ∩ B 0 ⊆ {av , bv , uv } or B ∩ B 0 ⊆ {bv , cv , uv }. Let us substitute the bag B with the two adjacent bags B1 = {av , uv , bv , v}, B2 = {bv , cv , uv , v}, then we make adjacent all bags B 00 that were formerly adjacent to B to some bag amongst B1 , B2 containing B ∩B 00 . Note that B1 ⊆ N [av ] and that B2 ⊆ N [cv ]. Therefore, the resulting tree decomposition is a tree decomposition of G of breadth one such that v dominates no bag. 5.3.6 Case of leaf-vertex v of Type 2 or 3 and G \ v not prime The remaining subsections will be devoted to the proof of correctness of Step 3.2. In particular, this subsection is devoted to the proof that when G \ v is not prime one can only consider the case when the leaf-vertex v is of Type 2, i.e., v and bv are adjacent in G. Note that when v is of Type 3, then in general one cannot add an edge between v and bv without violating the property for the graph G to be planar, as shown in Figure 32. We will now prove that whenever we are in the conditions of Step 3.2, it is always possible to do so while preserving the planarity of the graph G and the property to be of tree-breadth one. bv av bv cv av v cv v Figure 32: A planar graph G with tb(G) = 1 (left), and a leaf-vertex v of Type 3 so that adding an edge between v and bv violates the property for the graph to be planar (right). In the latter case, one side of the bipartition of the K3,3 -minor is coloured red. Theorem 12. Let G be a prime planar graph. Let v be a leaf-vertex of Type 3 such that G \ v is not prime. Finally, let Πv = (av , bv , cv ) be as in Definition 5. Let G0 be obtained from G by adding the edge {v, bv }. Then, G0 is prime and planar, and tb(G) = 1 if and only if tb(G0 ) = 1. Proof. First, we prove that G0 is prime and planar. 35 • In order to prove that G0 is prime, by contradiction let S be a clique-separator of G0 . Since G0 is a supergraph of G, therefore S is a separator of G but it does not induce a clique in G. Hence, S contains the edge {v, bv }, and so either S ⊆ {av , bv , v} or S ⊆ {bv , cv , v}. Let C = V \ (Πv ∪ {v}), by Theorem 6, C is a full component of G \ Πv because G \ v is not prime. In particular, C is connected and av , cv ∈ N (C), that contradicts the fact that G0 \ S is unconnected. • Then in order to prove that G0 is planar, let us fix a plane embedding of G. The cycle induced by (av , bv , cv , v) separates the plane into two regions. To prove that G0 is planar, we claim that it suffices to prove that all vertices in C = V \ (Πv ∪ {v}) are in the same region, for then drawing the edge {bv , v} in the other region leads to a plane embedding of G0 . By contradiction, let x, y ∈ C be in different regions. By [15, Proposition 8], the cycle (av , bv , cv , v) is an xy-separator of G, that contradicts the fact that C is connected. Let us now prove that tb(G) = 1 implies that tb(G0 ) = 1. Let (T, X ) be a star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between the subtrees Tav and Tcv . Let us remove vertex v from all bags, that leads to a tree decomposition (T, X−v ) of G \ v of breadth one because NG (v) ⊆ NG (bv ). Then, let (T 0 , X 0 ) be any reduced tree decomposition that is obtained from (T, X−v ), that is a star-decomposition of G \ v by Lemma 3. Now, there are two cases. If Ta0 v ∩Tc0v 6= ∅, then the subtrees Ta0 v , Tb0v , Tc0v are pairwise intersecting and so, by the Helly property (Lemma 1) Ta0 v ∩ Tb0v ∩ Tc0v 6= ∅. Hence one obtains a star-decomposition of G0 simply by making some bag of Ta0 v ∩ Tb0v ∩ Tc0v adjacent to the new bag NG0 [v] = {av , bv , cv , v}. Else, Ta0 v ∩ Tc0v = ∅, so, Tav ∩ Tcv = ∅. Since Πv ∈ P3 (G) and G is prime by the hypothesis, therefore, one of Πv or Πv \ bv must be a minimal separator of G. As a result, since (T, X ) is assumed to minimize the distance in T between the subtrees Tav and Tcv , by Corollary 8 there exist two adjacent bags Bav , Bcv ∈ X so that av ∈ Bav \ Bcv and cv ∈ Bcv \ Bav respectively dominate the bags Bav and Bcv . In such case, Bav ∩ Bcv = NG (av ) ∩ NG (cv ) and so, since bv , v ∈ Bav ∩ Bcv , (T, X ) is also a star-decomposition of G0 . So, in conclusion, tb(G0 ) = 1 in both cases. Conversely, let us prove that tb(G0 ) = 1 implies that tb(G) = 1. Let (T 0 , X 0 ) be a stardecomposition of G0 , that exists by Lemma 3, minimizing the distance in T 0 between the subtrees 0 Ta0 v and Tc0v . Let us remove vertex v from all bags, that leads to a tree decomposition (T 0 , X−v ) 0 of G \ v = G \ v of breadth one because NG0 [v] ⊆ NG0 [bv ]. Then, let (T, X ) be any reduced tree 0 decomposition that is obtained from (T 0 , X−v ), that is a star-decomposition of G \ v by Lemma 3. There are two cases. If Tav ∩ Tcv 6= ∅, then one obtains a star-decomposition of G simply by making some bag of Tav ∩ Tcv adjacent to the new bag NG [v] = {av , cv , v}. Else, Tav ∩ Tcv = ∅, so, Ta0 v ∩ Tc0v = ∅. Since Πv ∈ P3 (G0 ) and G0 is also prime, therefore, one of Πv or Πv \ bv must be a minimal separator of G0 . As a result, since (T 0 , X 0 ) is assumed to minimize the distance in T 0 between the subtrees Ta0 v and Tc0v , by Corollary 8 there exist two adjacent bags Ba0 v , Bc0 v ∈ X 0 so that av ∈ Ba0 v \ Bc0 v and cv ∈ Bc0 v \ Ba0 v respectively dominate the bags Ba0 v and Bc0 v . In such case, one obtains a star-decomposition of G by adding v in the two bags Ba0 v , Bc0 v . So, in conclusion, tb(G) = 1 in both cases. 5.3.7 Proof of Step 3.2 (a) Theorem 13. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose av and uv are non-adjacent, and either cv and uv are non-adjacent or the subset NG (av ) ∩ NG (uv ) is not an av uv -separator in the subgraph G \ (cv , v). Then, G/vav (obtained by contracting {v, av }) is planar and prime and tb(G) = 1 if and only if tb(G/vav ) = 1. Proof. The graph G/vav is a contraction of the planar graph G, therefore it is planar. Let us prove that G/vav is prime. By contradiction, let S be a minimal clique-separator of G/vav . Since G/vav is a supergraph of G \ v, S is also a separator of G \ v. Furthermore, it is not an av cv -separator because av , cv are adjacent in G/vav , therefore, by Lemma 16 S is a separator of G. Since G is prime by the hypothesis, S does not induce a clique of G, whence av , cv ∈ S. However, since (bv , uv ) is not a separator of G because G is prime by the hypothesis, therefore by Lemma 16 (uv , bv ) is an av cv -separator of G \ v. So, NG (av ) ∩ NG (cv ) ⊆ {v, bv , uv }, that implies NG (av ) ∩ NG (cv ) = {v, bv } 36 uv av uv cv bv av v bv cv v uv uv av bv cv av v bv cv v Figure 33: Cases when Theorem 13 applies and the edge {v, av } can be contracted to av . because av and uv are non-adjacent by the hypothesis. In such a case S ⊆ Πv , but then V \(Πv ∪{v}) cannot be a full component of G \ Πv , thus contradicting Theorem 6. As a result, the graph G/vav is planar and prime. If tb(G) = 1 then tb(G/vav ) = 1 because tree-breadth is contraction-closed by Lemma 2. Conversely, let us prove that tb(G/vav ) = 1 implies tb(G) = 1. To show this, let (T, X ) be a stardecomposition of G/vav , that exists by Lemma 3, minimizing the number of bags |X | (in particular, (T, X ) is a reduced tree decomposition). Assume moreover (T, X ) to minimize the number of bags that are not contained into the closed neighbourhood of some vertex in G w.r.t. this property. Note that there is a bag of (T, X ) containing Πv , because since it is a clique of G/vav the subtrees Tav , Tbv , Tcv are pairwise intersecting and so, by the Helly property (Lemma 1), Tav ∩ Tbv ∩ Tcv 6= ∅. So, we can add in (T, X ) a new bag NG [v], and by making this bag adjacent to any bag of Tav ∩ Tbv ∩ Tcv one obtains a tree decomposition of G (not necessarily a star-decomposition). Consequently, we claim that to prove that tb(G) = 1, it suffices to prove that (T, X ) is a star-decomposition of G\v, for then the above construction leads to a star-decomposition of G. By contradiction, suppose it is not the case that (T, X ) is a star-decomposition of G \ v. Since G/vav and G \ v only differ in the edge {av , cv }, there must be a bag B of Tav ∩ Tcv that is only dominated by some of av , cv . We make the stronger claim that the bag B has a unique dominator, that is either av or cv . Since B is only dominated by some of av , cv , then in order to prove the claim by contradiction we only need to consider the case when B ⊆ NG/vav [av ] ∩ NG/vav [cv ]. Recall that NG/vav [av ]∩NG/vav [cv ] = {av , bv , cv } by the above remarks (because (uv , bv ) is an av cv -separator of G \ v), therefore either B = {av , bv , cv } or B = {av , cv }. In the first case (B = {av , bv , cv }) we have that B ⊆ N [bv ], thus contradicting the fact that B is only dominated by some of av , cv . However in the second case (B = {av , cv }) the bag B is strictly contained in any bag of the nonempty subtree Tav ∩ Tbv ∩ Tcv , thus contradicting the fact that (T, X ) is a reduced tree decomposition by minimality of |X |. Therefore, the claim is proved and so, the bag B has a unique dominator, that is either av or cv . Note that if B ⊆ NG/vav [cv ] then we may further assume that cv , uv are nonadjacent, or else by Theorem 6 NG/vav [cv ] = {av , bv , cv , uv } ⊆ N [bv ] and so, B ⊆ N [bv ], that would contradict the claim that B is only dominated by some of av , cv . In addition, since av and cv play symmetrical roles in the case when uv , cv are nonadjacent, let us assume w.l.o.g. that vertex av is the sole dominator of the bag B. In such a case, NG/vav (av ) ∩ NG/vav (cv ) = {bv } because (uv , bv ) is an av cv -separator of G \ v, so, since N (cv ) \ (Πv ∪ {v}) 6= ∅ because G is prime by the hypothesis, the existence of a bag B 0 containing vertex cv and adjacent to B follows. By the properties of a tree decomposition, B ∩ B 0 is a separator of G/vav Now, let Ca be the component of vertex av in G \ (bv , uv , v). Observe that cv ∈ / Ca because (uv , bv ) is an av cv -separator of G \ v. Since B ∩ B 0 ⊆ NG/vav [av ] ⊆ Ca ∪ Πv , therefore, B ∩ B 0 ∩ Ca 6= ∅ or else B ∩ B 0 would be a clique-separator in G/vav (impossible since it is a prime graph). There are several cases to be considered depending on the dominators of bag B0. • If av dominates B 0 then B, B 0 can be merged into one, thus contradicting the minimality of |X |; • Else, B 0 must be dominated by one of bv or uv because B ∩ B 0 ∩ Ca 6= ∅, cv ∈ (B ∩ B 0 ) \ Ca and (bv , uv ) separates cv from Ca . In fact, we claim that it cannot be dominated by vertex 37 uv . By contradiction, suppose that it is the case. Since av and uv are non-adjacent, therefore, av ∈ B \ B 0 and uv ∈ B 0 \ B. So, it follows by the properties of a tree decomposition that B ∩ B 0 is an av uv -separator of G/vav . However, B ∩ B 0 ⊆ N (av ) ∩ N (uv ), that contradicts the hypothesis that NG (av ) ∩ NG (uv ) is not an av uv -separator in the subgraph G \ (cv , v). Therefore, bv ∈ B 0 dominate the bag. Observe that if it were the case that there are at least two bags that are both adjacent to B and dominated by bv , then they could all be merged into one without violating the property for (T, X ) to be a star-decomposition. As a result, by minimality of |X |, B 0 is the unique bag that is both adjacent to B and dominated by bv , whence it is also the unique bag adjacent to B containing vertex cv . Let us substitute the two bags B, B 0 with B \ cv , B 0 ∪ {av }. Since NG/vav (av ) ∩ NG/vav (cv ) = {bv }, it is still a star-decomposition of G/vav with equal number of bags |X |. Furthermore, there is one less bag that is not contained in the closed neighbourhood of some vertex in G, thus contradicting the minimality of (T, X ). 5.3.8 Proof of Step 3.2 (b) i and Step 3.2 (b) ii In order to deal with all remaining cases, it will require us to further study the neighbourhood of vertex bv in the graph. Observe that in the following Theorem 14 we needn’t prove that the resulting graph G0 is prime because it will be proved in Theorem 15. Theorem 14. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ N (cv ) \ N (av ), N (av ) ∩ N (uv ) is an av uv -separator of G \ (cv , v), and N (bv ) = {av , cv , uv , v}. Then, there exists x ∈ (N (av ) ∩ N (uv )) \ bv such that the graph G0 , obtained from G by adding the edge {bv , x}, is planar and satisfies tb(G0 ) = 1 if tb(G) = 1. Moreover, the vertex x can be found in linear-time. x av uv bv uv x cv av bv v v uv cv av bv x cv v Figure 34: Cases when one of Theorem 14 or Theorem 15 applies and vertex bv can be eventually contracted to another vertex. Proof. First, we claim that (av , uv ) is a minimal 2-separator of G. Indeed, by the hypothesis cv and uv are adjacent, therefore, by Theorem 6 NG (cv ) = {bv , uv , v}. In addition, N (bv ) = {av , cv , uv , v} by the hypothesis. Last, since G is prime by the hypothesis, therefore, N (av ) \ (Πv ∪ {v}) 6= ∅, and so, since av and uv are non-adjacent by the hypothesis, V (G) \ (av , bv , cv , uv , v) 6= ∅. As a result, (av , uv ) is a minimal 2-separator of G with {bv , cv , v} being a full component of G \ (av , uv ). Since N (av ) ∩ N (uv ) is an av uv -separator of G \ (cv , v) by the hypothesis, therefore, N (av ) ∩ N (uv )\bv 6= ∅, for it has to contain a vertex from every component of G\(av , bv , cv , uv , v). For now, let x ∈ N (av ) ∩ N (uv ) \ bv be arbitrary. Let us prove that tb(G) = 1 implies that tb(G0 ) = 1 where G0 is obtained by adding an edge between bv and x (for now, G0 may not be planar, depending on the choice for x). To prove this, let (T, X ) be a star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between the subtrees Tav and Tuv . We claim that Tav ∩ Tuv 6= ∅. By contradiction, if Tav ∩ Tuv = ∅, then by Corollary 8, there are two bags Bav , Buv that are adjacent in T and such that av ∈ Bav \ Buv , uv ∈ Buv \ Bav respectively dominate Bav , Buv . However, this implies by the properties of a tree decomposition that Bav ∩ Buv ⊆ N (av ) ∩ N (uv ) is an av uv -separator of G. Since the av uv -path (av , v, cv , uv ) does not intersect N (av ) ∩ N (uv ), that is clearly a contradiction, and so, Tav ∩ Tuv 6= ∅. Furthermore, since there is a full component of G\(av , uv ) in the subgraph G\(bv , cv , v), therefore, by Lemma 9 the removal of vertices bv , cv , v from all bags in X leads to a tree decomposition (T, X − ) of breadth one of G \ (bv , cv , v). Let (T 0 , X 0 ) be a reduced star-decomposition obtained from (T, X − ), thar exists by Lemma 3. Since the subtrees Ta0 v , Tx0 , Tu0 v are pairwise intersecting 38 (because x ∈ N (av ) ∩ N (uv ) and Tav ∩ Tuv 6= ∅), therefore by the Helly property (Lemma 1) Ta0 v ∩ Tx0 ∩ Tu0 v 6= ∅. Let B ∈ Ta0 v ∩ Tx0 ∩ Tu0 v . To obtain a star-decomposition of G0 , it now suffices to make the bag B adjacent to the new bag NG0 [bv ] = {av , bv , cv , uv , v, x}. The above result holds for any choice of vertex x ∈ (NG (av )∩NG (uv ))\bv . Let us finally prove that one such a vertex x exists so that G0 is planar. Indeed, since N (av ) ∩ N (uv ) is an av uv -separator of G \ (cv , v) by the hypothesis, therefore, S := (N (av ) ∩ N (uv )) ∪ {v} is an av uv -separator of G, and in particular it is a minimal av uv -separator (because for every vertex s ∈ S, there is an av uv -path that intersects S only in s). By Corollary 7, it can be computed in linear-time a planar supergraph GS of G so that S induces a cycle of GS . Then, let NGS (bv ) ∩ S = {x, v}, by construction the graph G0 is planar for such a choice of vertex x. In Theorem 14, we show conditions so that vertex bv can be made adjacent to some other vertex of NG (av ) ∩ NG (uv ). Lemma 23 completes the picture by proving that if it is the case that NG (av ) ∩ NG (uv ) ∩ NG (bv ) 6= ∅, then |NG (av ) ∩ NG (uv ) ∩ NG (bv )| = 1 and vertex bv has exactly five neighbours. Lemma 23. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ NG (cv ) \ NG (av ) and there exists x ∈ NG (av ) ∩ NG (uv ) ∩ NG (bv ). Then, NG (bv ) = {av , cv , uv , v, x}. uv x C bv cv av v Figure 35: Case when NG (bv ) 6= {av , cv , uv , v, x}. Proof. By contradiction, let C be a component of G \ (av , bv , cv , uv , v, x) such that bv ∈ N (C) (see Figure 35 for an illustration). By Theorem 6 NG (cv ) = {bv , uv , v}, therefore, cv , v ∈ / N (C). It follows that N (C) is a separator of G. In particular, N (C) ⊆ {av , bv , uv , x}, so, av , uv ∈ N (C) or else N (C) should be a clique-separator of the prime graph G. As a result, there is a K3,3 -minor with {av , bv , uv } and {C, x, {cv , v}} being the two sides of the bipartition. It contradicts the fact that G is planar by the hypothesis. Theorem 15. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ N (cv ) \ N (av ), N (av ) ∩ N (uv ) is an av uv -separator of G \ (cv , v), and either N (bv ) = {av , cv , uv , v} or N (bv ) ∩ N (av ) ∩ N (uv ) 6= ∅. Then, there is x ∈ N (av ) ∩ N (uv ) such that one of the following must hold: • V (G) = {av , bv , cv , uv , v, x}, and G admits a star-decomposition with two bags NG [bv ], NG [x]; • or Π0 = (av , x, uv ) ∈ P3 (G), and let G0 be obtained from G by adding the edge {bv , x} (if it is not already present) then contracting this edge. The graph G0 is planar and prime, furthermore tb(G) = 1 if and only if tb(G0 ) = 1. Moreover, vertex x can be computed in linear-time. Proof. There are two cases. If NG (bv ) = {av , cv , uv , v}, then let x be set as in the statement of Theorem 14. Else, let x be the unique vertex of N (bv ) ∩ N (av ) ∩ N (uv ), that is well-defined by Lemma 23. Note that in both cases, vertex x can be computed in linear-time. In addition, N (bv ) ⊆ {av , cv , uv , v, x} (the latter property following from Lemma 23 when bv and x are adjacent, and being trivial else). Suppose for the proof that V (G) 6= {av , bv , cv , uv , v, x} (else, Theorem 15 is trivial). We claim that {bv , cv , v} is a component of G \ Π0 . Indeed, N (bv ) ⊆ Π0 ∪ {cv , v} by the hypothesis, and by Theorem 6 NG (cv ) = {bv , uv , v}. Since V (G) 6= {av , bv , cv , uv , v, x}, then it indeed follows that Π0 ∈ P3 (G), with {bv , cv , v} being a component of G \ Π0 . Let us prove that G0 is prime and planar. By Theorem 14, adding an edge between bv and x if it is not already present does not violate the property for the graph G to be planar. Therefore, G0 39 is planar because it is obtained by an edge-contraction from some planar graph. To prove that G0 is prime, by contradiction suppose the existence of a minimal clique-separator S 0 of G0 . Let us denote by x0 the vertex resulting from the contraction of the edge {bv , x}. Let S := S 0 if x0 ∈ / S 0 , S := (S 0 \ x0 ) ∪ {bv , x} else. By construction, S is a separator of G. In particular, S is not a clique because G is prime by the hypothesis. Therefore, S 6= S 0 , whence x0 ∈ S 0 or equivalently, x, bv ∈ S. We now claim that cv ∈ S ∩ S 0 or v ∈ S ∩ S 0 (possibly, v, cv ∈ S ∩ S 0 ). There are two cases. • Suppose that S \ bv is a separator of G. Then, S \ bv is not a clique because G is prime by the hypothesis. Since S \ (bv , x) = S 0 \ x0 is a clique, there must be some vertex of S \ (bv , x) = S ∩ S 0 that is adjacent to x0 in G0 but non-adjacent to x in G. Consequently, v ∈ S ∩ S 0 or cv ∈ S ∩ S 0 . • Else, S \ bv is not a separator of G. Recall that by construction, S is a separator of G. In particular, there must be two neighbours of bv in G that are separated by S in G. Since NG (bv ) \ x induces the path (av , v, cv , uv ), it follows that S must contain an internal node of the path, whence cv ∈ S ∩ S 0 or v ∈ S ∩ S 0 . However, in such case S 0 must be contained in one of (av , x0 , v), (v, x0 , cv ) or (cv , x0 , uv ), for it is a clique of G0 . In particular, let z ∈ {av , uv } \ S 0 . Since z has a neighbour in every component C 0 of G \ Π0 , {z} ∪ C 0 is not disconnected by S 0 in G0 . Furthermore, let us contract C 0 to z so as to make av and uv adjacent, S 0 intersects the resulting cycle (av , uv , cv , v) either in an edge (different from {av , uv }) or a single vertex because it is a clique of G0 , therefore, (av , uv , cv , v) \ S 0 is not disconnected by S 0 . Altogether, this contradicts the fact that S 0 is a separator of G0 , and so, G0 is prime. Finally, let us prove that tb(G0 ) = 1 if and only if tb(G) = 1. If tb(G) = 1, then let us assume bv and x to be adjacent (if they are not, then Theorem 14 ensures we can add the edge without violating the property for the graph to be of tree-breadth one). Then, tb(G0 ) = 1 because it is obtained by an edge-contraction from some graph with tree-breadth one and that tree-breadth is contraction-closed by Lemma 2. Conversely, let us prove that tb(G0 ) = 1 implies that tb(G) = 1. To prove this, let (T, X ) be a star-decomposition of G0 , that exists by Lemma 3, minimizing the distance in T between the subtrees Tav and Tuv . We claim that Tav ∩ Tuv 6= ∅. By contradiction, suppose Tav ∩ Tuv = ∅. Recall that (av , x0 , uv ) ∈ P3 (G0 ) (because Π0 ∈ P3 (G)) and G0 is prime, therefore one of (av , x0 , uv ) or (av , uv ) is a minimal separator of G0 . Since we assume the distance in T between Tav and Tuv to be minimized, by Corollary 8, there are two bags Bav , Buv that are adjacent in T so that av ∈ Bav \ Buv , uv ∈ Buv \ Bav respectively dominate Bav , Buv . However, by the properties of a tree decomposition Bav ∩ Buv ⊆ N (av ) ∩ N (uv ) is an av uv -separator of G0 , that is impossible due to the existence of the path (av , v, cv , uv ) in G0 that does not intersect N (av ) ∩ N (uv ). Therefore, Tav ∩ Tuv 6= ∅. Hence the subtrees Tav , Tx0 , Tuv are pairwise intersecting and so, by the Helly Property (Lemma 1), Tav ∩Tx0 ∩Tuv 6= ∅. Furthermore, NG0 [cv ]∪NG0 [v] ⊆ NG0 [x0 ] by construction. So, let us construct a tree decomposition of G of breadth one as follows. First, let us remove cv and v from all bags in X . Since NG0 [cv ] ∪ NG0 [v] ⊆ NG0 [x0 ], one obtains a tree decomposition of G0 \ (cv , v) of breadth one. Then let us replace x0 with x in all bags. Note that in so doing, one obtains a tree decomposition of G \ (bv , cv , v) of breadth one. Finally, let us make adjacent the new bag NG [bv ] with any bag of Tav ∩ Tx ∩ Tuv . The result is indeed a tree decomposition of G0 because NG [bv ] ⊆ {av , bv , cv , uv , v, x} and NG [cv ] ∪ NG [v] ⊆ NG [bv ]. 5.3.9 Proof of Step 3.2 (b) iii Theorem 16. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ N (cv ) \ N (av ), N (av ) ∩ N (uv ) is an av uv -separator in the subgraph G \ (cv , v), N (bv ) 6= {av , cv , uv , v} and N (av ) ∩ N (bv ) ∩ N (uv ) = ∅. Then it can be computed in linear-time (a unique) x ∈ N (av ) ∩ N (uv ) such that if tb(G) = 1, N (bv ) ∩ N (x) is a bv x-separator and |N (bv ) ∩ N (x)| ≥ 3. Proof. Let W = (N (av ) ∩ N (uv )) ∪ {av , cv , uv , v}. By the hypothesis, N (bv ) 6= {av , cv , uv , v} and N (av ) ∩ N (bv ) ∩ N (uv ) = ∅, therefore, it exists a component C0 of G \ W such that bv ∈ N (C0 ). 40 We claim that there is x ∈ N (av ) ∩ N (uv ) ∩ N (C0 ) satisfying that N (C0 ) ⊆ (av , bv , x) or N (C0 ) ⊆ (uv , bv , x). Indeed, first observe that v, cv ∈ / N (C0 ) because by Theorem 6 NG (cv ) = {bv , uv , v}. Furthermore, av ∈ / N (C0 ) or uv ∈ / N (C0 ) because N (av ) ∩ N (uv ) is an av uv -separator of G \ (cv , v) by the hypothesis. So, let {z, z 0 } = {av , uv } satisfy z 0 ∈ / N (C0 ). Since G is prime by the hypothesis, and so, biconnected, G \ z is connected. Furthermore, N (C0 ) \ z ⊆ N (z 0 ) (by the definition of W ), therefore, N (C0 ) \ z is a minimal separator of G \ z. By Lemma 13 there exist s, t ∈ N (av ) ∩ N (uv ) non-adjacent such that N (C0 ) \ z = {s, t}. Since bv ∈ N (C0 ) by construction, therefore, let us set {s, t} = {bv , x}, that finally proves the claim. We claim in addition that x does not depend on the choice of the component C0 . By contradiction, let C, C 0 be two components of G \ W such that bv ∈ N (C) ∩ N (C 0 ) and let x, x0 ∈ N (av ) ∩ NG (uv ) be distinct and such that x ∈ N (C), x0 ∈ N (C 0 ). Then, there exists a K3,3 -minor with {av , bv , uv } and {{cv , v}, C ∪ {x}, C 0 ∪ {x0 }} being the sides of the bipartition, that contradicts the hypothesis that G is planar. Thus from now on, let x ∈ N (av ) ∩ N (uv ) \ bv be the unique vertex satisfying that for every component C of G \ W , if bv ∈ N (C) then x ∈ N (C). x uv C0 bv av cv v Figure 36: Component C0 such that bv , x ∈ N (C0 ). Recall that C0 is a fixed component of G \ W such that bv , x ∈ N (C0 ) (see Figure 36 for an illustration). Finally, assume for the remaining of the proof that tb(G) = 1 and let us prove that N (bv ) ∩ N (x) is a bv x-separator and |N (bv ) ∩ N (x)| ≥ 3. To prove it, we will only need to prove that N (bv ) ∩ N (x) is a bv x-separator of G. Indeed, in such a case N (bv ) ∩ N (x) ∩ C0 6= ∅, and so, |N (bv ) ∩ N (x)| ≥ 3 because av , uv ∈ N (bv ) ∩ N (x) and av , uv ∈ / C0 . Let (T, X ) be star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between the subtrees Tbv and Tx . We claim that Tbv ∩ Tx = ∅. By contradiction, suppose Tbv ∩ Tx 6= ∅. Let us prove as an intermediate subclaim that Tav ∩ Tuv 6= ∅. By contradiction, let Tav ∩ Tuv = ∅. By the properties of a tree decomposition, every bag B onto the path in T between Tav and Tuv must contain N (av ) ∩ N (uv ) and at least one of v or cv . If cv ∈ B then B ⊆ N [uv ] since N (cv ) = {bv , uv , v} and x ∈ B. Similarly if v ∈ B then B ⊆ N [av ] since N (v) = {av , bv , cv } and x ∈ B. Consequently, there are two adjacent bags Bav , Buv such that av ∈ Bav \ Buv and uv ∈ Buv \ Bav respectively dominate Bav and Buv . However, by the properties of a tree decomposition, Bav ∩ Buv = N (av ) ∩ N (uv ) is an av uv -separator of G, thus contradicting the existence of the path (av , v, cv , uv ) in G. Therefore, it follows that Tav ∩ Tuv 6= ∅, that proves the subclaim. If Tav ∩ Tuv 6= ∅ and Tbv ∩ Tx 6= ∅ then the subtrees Tav , Tbv , Tuv , Tx are pairwise intersecting and so, it implies Tav ∩ Tuv ∩ Tbv ∩ Tx 6= ∅ by the Helly property (Lemma 1). However, let B 0 ∈ Tav ∩ Tuv ∩ Tbv ∩ Tx , no vertex in G can dominate B 0 because N (bv ) ∩ N (av ) ∩ N (uv ) = ∅ by the hypothesis, thus contradicting the fact that (T, X ) is a star-decomposition. As a result, we proved the claim that Tbv ∩ Tx = ∅. Finally, since there exists S ⊆ (N (bv ) ∩ N (x)) ∪ {bv , x} a minimal separator of G such that bv , x ∈ S (namely, S := N (C0 )), and (T, X ) is assumed to minimize the distance in T between Tbv and Tx , by Corollary 8 there exist two adjacent bags Bbv , Bx such that bv ∈ Bbv \ Bx , x ∈ Bx \ Bbv respectively dominate Bbv and Bx . By the properties of a tree decomposition, Bbv ∩ Bx = N (bv ) ∩ N (x) is indeed a bv x-separator of G. Lemma 24. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ N (cv ) \ N (av ), N (av ) ∩ N (uv ) is an av uv -separator in the subgraph G \ (cv , v), N (bv ) 6= {av , cv , uv , v} and N (av ) ∩ N (bv ) ∩ N (uv ) = ∅. Assume furthermore that there is x ∈ N (av ) ∩ N (uv ), and there exists a leaf-vertex l ∈ N (bv ) ∩ N (x). Then, l is a leaf-vertex of Type 1, or l is a leaf-vertex of Type 2 or 3 and G \ l is prime. 41 uv x uv x av bv cv uv x l l l av cv bv av v v bv cv v Figure 37: Existence of a leaf-vertex in N (bv ) ∩ N (x). Proof. Suppose for the proof that l is not of Type 1 (else, Lemma 24 is trivial). Then, l is of Type 2 or 3, let Πl be as in Definition 5. Note that l 6= av because v, bv , x ∈ N (av ) do not induce a path, similarly l 6= uv because bv , cv , x ∈ N (uv ) do not induce a path. Furthermore by the hypothesis, bv and x are the two endpoints of Πl . Suppose by way of contradiction that there is a minimal clique-separator S of G \ l. Since G is prime by the hypothesis, by Lemma 16 S is a bv x-separator of G \ l. However, it implies that av , uv ∈ S, that contradicts the fact that S is a clique. As a result, G \ l is prime. Equipped with Lemma 24, we can assume from now on that there is no leaf-vertex that is adjacent to both vertices bv , x, or else it could be immediately processed by the algorithm. Theorem 17. Let G be a prime planar graph, let v be a leaf-vertex of Type 2, Πv = (av , bv , cv ) be as in Definition 5, and let uv ∈ / Πv ∪ {v} be such that (bv , uv ) is an edge-separator of G \ v. Suppose uv ∈ N (cv ) \ N (av ), N (av ) ∩ N (uv ) is an av uv -separator in the subgraph G \ (cv , v), N (bv ) 6= {av , cv , uv , v} and N (av ) ∩ N (bv ) ∩ N (uv ) = ∅. Assume furthermore that there is x ∈ N (av ) ∩ N (uv ) such that N (bv ) ∩ N (x) is a bv x-separator, |N (bv ) ∩ N (x)| ≥ 3, and there is no leaf-vertex in N (bv ) ∩ N (x). Then, there exist y, z ∈ N (bv ) ∩ N (x) non-adjacent such that the graph G0 , obtained from G by making y, z adjacent, is planar and prime, and it holds tb(G) = 1 if and only if tb(G0 ) = 1. Furthermore, the pair y, z can be computed in linear-time. uv x y z av bv cv v Figure 38: Illustration of Theorem 17. Proof. Let us first show how to find the pair y, z. Let W = {av , cv , v, uv }∪(N (av )∩N (uv )). Choose any component C0 of G \ W such that bv , x ∈ N (C0 ) and N (C0 ) ⊆ (av , bv , x) or N (C0 ) ⊆ (uv , bv , x) (the existence of such a component has been proved in Theorem 16). Note that N (bv )∩N (x)∩C0 6= ∅ since N (bv ) ∩ N (x) is a bv x-separator of G by the hypothesis. Then, let S := N (bv ) ∩ N (x). By the hypothesis S is a minimal separator of G and |S| ≥ 3, therefore, by Corollary 7 there is a planar supergraph GS of G so that S induces a cycle of GS . Furthermore, GS can be computed in linear-time. Let P be an av uv -path of the cycle GS [S] that intersects C0 . Since by the above claim av ∈ / NG (C0 ) or uv ∈ / NG (C0 ), therefore, there is y ∈ C0 ∩ V (P ), there is z adjacent to vertex y in P so that either z ∈ C1 for some component C1 of G \ (W ∪ C0 ) or z ∈ {av , uv } \ NG (C0 ). In particular, z ∈ / NG [C0 ] = C0 ∪ NG (C0 ). Moreover, the graph G0 , obtained from G by adding an edge between y and z, is planar by construction. Claim 15. G0 is prime. Proof. By contradiction, let X be a minimal clique-separator of G0 . Since G0 is a supergraph of G, X is a separator of G. As a result, y, z ∈ X because G is prime by the hypothesis. Let us prove as an intermediate step that N (y) ∩ N (z) = {bv , x}. There are two cases. If z ∈ {av , uv }, then let {z, z 0 } = {av , uv }. Since N (C0 ) ⊆ (z 0 , bv , x) (because z ∈ / NG (C0 )) and z, z 0 are non-adjacent by the 42 hypothesis, therefore, the claim immediately follows in this case. Else, z ∈ / {av , uv }. Let C1 be the component of G\(W ∪C0 ) containing z. In such case, bv , x ∈ N (C1 ) because z ∈ S by construction. Therefore, N (C1 ) ⊆ (av , bv , x) or N (C1 ) ⊆ (uv , bv , x) because the respective roles of components C0 , C1 are symmetrical in this case. Suppose by way of contradiction N (C0 ) = N (C1 ) = {s, bv , x} for some s ∈ {av , uv } and let {s, t} = {av , uv }. Then, there is a K3,3 -minor of G with {bv , x, s} and {C0 , C1 , {cv , v, t}} being the sides of the bipartition, that contradicts the hypothesis that G is planar. As a result, N (C0 ) ∩ N (C1 ) = {bv , x}, that finally proves the claim. Since X is assumed to be a clique of G0 and y, z ∈ X, it follows X ⊆ {bv , y, z} or X ⊆ {x, y, z}. Consequently, G[W \ X] is connected because av , uv ∈ / X is a dominating pair of W , bv , x ∈ N (av ) ∩ N (uv ) and bv ∈ / X or x ∈ / X. However, since y, z ∈ X and NG (y) ⊆ W ∪ C0 , then in such case there must be a component A of G \ X so that A ⊂ C0 . Since z ∈ / NG [C0 ] by construction, NG (A) ⊆ X \ z is a clique-separator of G, thus contradicting the hypothesis that G is prime. As a result, G0 is prime.  Now, let us prove tb(G) = 1 if and only if tb(G0 ) = 1. If tb(G) = 1, then let (T, X ) be star-decomposition of G, that exists by Lemma 3, minimizing the distance in T between Tav and Tuv . Let us prove that (T, X ) is a star-decomposition of G0 , whence tb(G0 ) = 1. To prove it, it is sufficient to prove Ty ∩ Tz 6= ∅. We will prove as an intermediate claim that Tav ∩Tuv 6= ∅. By contradiction, assume Tav ∩Tuv = ∅. Observe that Π0 = (av , bv , uv ) ∈ P3 (G) with {cv , v} being a full component of G \ Π0 . Therefore, since G is prime by the hypothesis, one of Π0 or Π0 \ bv is a minimal separator of G. Since (T, X ) is assumed to minimize the distance in T between Tav and Tuv , therefore, by Corollary 8 there are two adjacent bags Bav , Buv such that av ∈ Bav \Buv and uv ∈ Buv \Bav respectively dominate Bav and Buv . However, by the properties of a tree decomposition Bav ∩ Buv = N (av ) ∩ N (uv ) is an av uv -separator of G, that contradicts the existence of the path (av , v, cv , uv ) in G. Consequently the claim is proved, hence Tav ∩ Tuv 6= ∅. The latter claim implies Tbv ∩ Tx = ∅, for if Tbv ∩ Tx 6= ∅ then the subtrees Tav , Tbv , Tuv , Tx are pairwise intersecting, hence Tav ∩ Tbv ∩ Tx ∩ Tuv 6= ∅ by the Helly property (Lemma 1), that would contradict the fact that (T, X ) is a star-decomposition because N (av ) ∩ N (uv ) ∩ N (bv ) = ∅ by the hypothesis. Finally, since (x, y, bv , z) induces a cycle of G and Tbv ∩ Tx = ∅, therefore, by the properties of a tree decomposition Ty ∩ Tz 6= ∅, and so, (T, X ) is indeed a star-decomposition of G0 . Conversely, let us prove tb(G0 ) = 1 implies tb(G) = 1. To prove it, let (T 0 , X 0 ) be a stardecomposition of G0 , that exists by Lemma 3, minimizing the number |X 0 | of bags. Assume furthermore (T 0 , X 0 ) to minimize the number of bags B ∈ X 0 that are not contained into the closed neighbourhood of some vertex in G w.r.t. the minimality of |X 0 |. In order to prove tb(G) = 1, it suffices to prove that (T 0 , X 0 ) is a star-decomposition of G. We will start proving intermediate claims. Claim 16. av , uv ∈ / NG (y). Proof. By contradiction, assume the existence of z 0 ∈ {av , uv } so that z 0 and y are adjacent in G. In particular, z 0 6= z (since z ∈ / NG [C0 ]) and NG (C0 ) = {bv , x, z 0 } since either NG (C0 ) ⊆ {bv , x, av } or NG (C0 ) ⊆ {bv , x, uv }. Hence, the path (bv , z 0 , x) is a separator of G. Since y ∈ NG (bv ) ∩ NG (z 0 ) ∩ NG (x), by Lemma 15 either C0 is reduced to y or (bv , y, x) ∈ P3 (G) separates z 0 from C0 \ y. The case C0 \ y = ∅ implies that y is a leaf-vertex of Type 2, that contradicts the hypothesis that there is no leaf-vertex in NG (bv ) ∩ NG (x). Therefore, let (bv , y, x) ∈ P3 (G) separates z 0 from C0 \ y in G, and let C00 ⊆ C0 \ y be a component of G \ (bv , y, x) (such a component C00 exists because NG (C0 ) = {z 0 , bv , x}). Since G is prime, bv , x ∈ NG (C00 ) (indeed, neither bv nor y nor x nor (bv , y) nor (y, x) can be a separator of G). Therefore, NG (bv ) ∩ NG (x) ∩ C00 6= ∅ because NG (bv ) ∩ NG (x) is a bv x-separator of G by the hypothesis. Furthermore, y ∈ NG (C00 ) because C0 is connected. However in such case, there is a K3,3 -minor of G0 with {bv , x, y} and {av , C00 , uv } being the sides of the bipartition, that contradicts the fact that G0 is planar.  Claim 17. There is no vertex dominating the cycle (av , bv , uv , x) in G0 . Proof. By contradiction, if it were the case that such a vertex exists, then, since NG (bv ) ∩ NG (av ) ∩ NG (uv ) = ∅ by the hypothesis, the dominator should be y and furthermore z ∈ {av , uv }. In particular, y ∈ NG (bv ) ∩ NG (x) ∩ NG (z 0 ) with {z, z 0 } = {av , uv }, thus contradicting Claim 16.  Claim 18. Ta0 v ∩ Tu0 v 6= ∅. Proof. By contradiction, let Ta0 v ∩ Tu0 v = ∅. By the properties of a tree decomposition, every bag B onto the path in T 0 between Ta0 v and Tu0 v (including the endpoints) must contain NG0 (av ) ∩ 43 NG0 (uv ) and at least one of v or cv . Then, if cv ∈ B then B ⊆ NG0 [uv ] and so, B ∈ Tu0 v , since NG0 (cv ) = {bv , uv , v} and x ∈ B. Similarly if v ∈ B then B ⊆ NG0 [av ] and so, B ∈ Ta0 v , since NG0 (v) = {av , bv , cv } and x ∈ B. Consequently, there are two adjacent bags Bav , Buv such that av ∈ Bav \ Buv and uv ∈ Buv \ Bav respectively dominate Bav and Buv in G0 . However, by the properties of a tree decomposition, Bav ∩ Buv = NG0 (av ) ∩ NG0 (uv ) is an av uv -separator of G0 , thus contradicting the existence of the path (av , v, cv , uv ) in G0 . Therefore, it follows that Ta0 v ∩ Tu0 v 6= ∅, that proves the claim.  Claim 19. Tb0v ∩ Tx0 = ∅ Proof. Suppose for the sake of contradiction that Tb0v ∩ Tx0 6= ∅. By Claim 18, Ta0 v ∩ Tu0 v 6= ∅, and so, the subtrees Ta0 v , Tb0v , Tu0 v , Tx0 are pairwise intersecting. Hence by the Helly property (Lemma 1), Ta0 v ∩ Tb0v ∩ Tu0 v ∩ Tx0 6= ∅. However in such case, since (T 0 , X 0 ) is a star-decomposition of G0 there must be a vertex dominating the cycle (av , bv , uv , x) in G0 , thereby contradicting Claim 17.  As a result, Ta0 v ∩ Tu0 v 6= ∅ by Claim 18 and Tb0v ∩ Tx0 = ∅ by Claim 19. Finally, suppose by way of contradiction (T 0 , X 0 ) is not a star-decomposition of G. In such case, since G and G0 only differ in the edge {y, z}, there must exist B ∈ Ty0 ∩ Tz0 that is uniquely dominated by some of y, z in G0 . More precisely, let us prove that only one of y, z can dominate B. By contradiction, suppose B ⊆ NG0 [y]∩NG0 [z] = {bv , x, y, z} (indeed, y ∈ C0 whereas z ∈ / NG [C0 ]). Since Tb0v ∩ Tx0 = ∅ by Claim 19, B ⊆ {bv , y, z} or B ⊆ {x, y, z, }. Therefore, B is a clique of G0 . However, since B 6= V (G0 ), there is a bag B 0 adjacent to B and by the properties of a tree decomposition B ∩ B 0 is a clique-separator of G0 , thus contradicting the fact that G0 is prime by Claim 15. Consequently, either B ⊆ NG0 [y] or B ⊆ NG0 [z], and either B 6⊆ NG0 [y] or B 6⊆ NG0 [z]. In the following, let {s, t} = {y, z} satisfy B ⊆ NG0 [s], that is well-defined. Let B 0 be any bag adjacent to B so that t ∈ B 0 (such bag exists because y, z ∈ N (bv ) ∩ N (x), and bv ∈ / B or x ∈ /B because Tb0v ∩ Tx0 = ∅). There are three cases. • Suppose no vertex of bv , x, y, z dominates B 0 in G0 (see Figure 39 for an illustration). Since bv ∈ / B or x ∈ / B because Tb0v ∩ Tx0 = ∅, therefore, (B ∩ B 0 ) \ (bv , x, y, z) 6= ∅, or else by the properties of a tree decomposition that would be a clique-separator of G0 , thus contradicting the fact that G0 is prime by Claim 15. Let t0 ∈ (B∩B 0 )\(bv , x, y, z). Note that t0 and t are nonadjacent in G0 because t0 ∈ NG0 [s] and NG0 [y] ∩ NG0 [z] = {bv , x, y, z}. Let s0 ∈ B 0 dominate this bag. Note that s0 and s are non-adjacent in G0 because we assume s0 ∈ / {bv , x, y, z}, t ∈ NG0 (s0 ) and NG0 [y] ∩ NG0 [z] = {bv , x, y, z}. In particular, s0 6= t0 and (s, t0 , s0 , t) induces a path in G. By construction, y ∈ C0 and z ∈ / NG [C0 ], hence there must be some of s0 , t0 in NG (C0 ). Since NG (C0 ) ⊆ {av , bv , uv , x} and s0 , t0 ∈ / {bv , x, y, z}, therefore the pairs {s0 , t0 } and {av , uv } intersect. However, by Claim 16 av , uv ∈ / NG (y), similarly av , uv ∈ / NG (z), that contradicts the existence of the path (s, t0 , s0 , t) in G. Consequently, assume in the remaining cases that there is some vertex of bv , x, y, z dominating B 0 in G0 . t s t' B s' B' Figure 39: B ⊆ NG0 [s], B 0 ⊆ NG0 [s0 ]. • Suppose B 0 is dominated by one of y, z in G0 . We claim that B and B 0 are dominated by the same vertex of y, z, for if it were not the case B ∩ B 0 ⊆ NG0 [y] ∩ NG0 [z] = {bv , x, y, z}, and so, since by the properties of a tree decomposition B ∩ B 0 is a separator of G0 , and bv ∈ / B or x ∈ / B because Tb0v ∩ Tx0 = ∅, B ∩ B 0 should be a clique-separator of G0 , thus contradicting the fact that G0 is prime by Claim 15. However, in such a case bags B, B 0 could be merged into one while preserving the property for the tree decomposition to be a star-decomposition of G0 , that would contradict the minimality of |X 0 |. • Therefore, B 0 is dominated by some of bv , x. We claim that there is a unique such bag B 0 that is adjacent to B. By contradiction, let B 00 6= B 0 be adjacent to B and such that B 00 is also dominated by some of bv , x. In particular, if B 00 ∪ B 0 ⊆ N [bv ] or B 00 ∪ B 0 ⊆ N [x] then both bags B 0 , B 00 could be merged into one without violating the property for the tree decomposition to be a star-decomposition of G0 , that would contradict the minimality of |X 0 |. 44 Else, w.l.o.g. B 0 ⊆ N [bv ] and B 00 ⊆ N [x]. Since Tb0v ∩ Tx0 = ∅, av , uv ∈ N (bv ) ∩ N (x) and B 0 , B 00 are adjacent to B, therefore, by the properties of the tree decomposition av , uv ∈ B. However, av , uv ∈ / NG [y] by Claim 16, av and uv are non-adjacent, and either z ∈ {av , uv } or av , uv ∈ / NG [z] (by the same proof as for Claim 16), thus contradicting the fact that either B ⊆ NG0 [y] or B ⊆ NG0 [z]. Hence, the claim is proved and B 0 is assumed to be the unique bag adjacent to B such that B ⊆ N [bv ] or B ⊆ N [x]. In particular, B 0 is the unique bag adjacent to B containing vertex t (recall that {s, t} = {y, z} and B ⊆ NG0 [s], B 6⊆ NG0 [t]). Let us substitute the bags B, B 0 with B \ t, B 0 ∪ {s}. We claim that this operation keeps the property for (T 0 , X 0 ) to be a star-decomposition of G0 . To prove the claim, first note that the operation only modifies bags B and B 0 , furthermore B \ t ⊆ N [s] and B 0 ∪ {s} ⊆ N [bv ] or B 0 ∪ {s} ⊆ N [x]. Consequently, to prove the claim, it suffices to prove that the operation keeps the property for (T 0 , X 0 ) to be a tree decomposition of G0 (for in such a case, it is always a star-decomposition). Since Tt0 \ B is connected because B 0 is the only bag containing vertex t that is adjacent to the bag B, therefore, we are left to prove that there is no w ∈ NG0 (t) \ s such that Tw0 ∩ Tt0 = {B}. By contradiction, let w ∈ NG0 (t) \ s satisfy Tw0 ∩ Tt0 = {B}. Since w ∈ B ⊆ NG0 [s], therefore w ∈ NG0 (s)∩NG0 (t) = NG (y)∩NG (z) = {bv , x}. Moreover, w ∈ / B0 because t ∈ B 0 and we assume that Tw0 ∩ Tt0 = {B}. In such a case, since it is assumed that B 0 ⊆ N [bv ] or B 0 ⊆ N [x], and in addition Tx0 ∩ Tb0v = ∅, let us write {w, w0 } = {bv , x} such that w ∈ B \ B 0 , w0 ∈ B 0 \ B and B 0 ⊆ NG0 [w0 ]. By the properties of a tree decomposition, B ∩ B 0 is a bv x-separator of G0 , so, av , uv ∈ B ∩ B 0 . However, av , uv ∈ / NG (y) by Claim 16 and similarly av , uv ∈ / NG (z), that contradicts the fact that B ⊆ NG0 [s] for some s ∈ {y, z}. This finally proves the claim that substituting the bags B, B 0 with B \ t, B 0 ∪ {s} keeps the property for (T 0 , X 0 ) to be a star-decomposition of G0 . However, the above operation does not increase the number of bags |X 0 |, furthermore there is one less bag that is not contained in the closed neighbourhood of some vertex in G. This contradicts the minimality of (T 0 , X 0 ) w.r.t. these two properties. As a result, we proved by contradiction that (T 0 , X 0 ) is a star-decomposition of G, hence tb(G) = 1. 5.4 Complexity of Algorithm Leaf-BottomUp To complete this section, let us emphasize on some computational aspects of Algorithm Leaf-BottomUp, that will ensure the quadratic-time complexity of the algorithm. We here assume that the planar graph G is encoded with adjacency lists. Note that the adjacency lists can be updated in linear-time before each recursive call to the algorithm. We will need as a routine to test whether two vertices are adjacent in constant-time. In order to achieve the goal, the following result (relying upon the bounded degeneracy of planar graphs) will be used: Lemma 25 ( [20]). There exists a data structure such that each entry in the adjacency matrix of a planar graph can be looked up in constant time. The data structure uses linear storage, and can be constructed in linear time. 5.4.1 Finding a leaf-vertex At each call to the algorithm, it is first required to decide whether a leaf-vertex exists. If that is the case, then one such a vertex must be computed. Here is a way to achieve the goal in linear-time. Let us start computing the degree sequence of G, then let us order the vertices of the graph G by increasing degree. Finding a leaf-vertex of Type 1. Let v be any vertex of degree at least four. We claim that a necessary condition for v to be a leaf-vertex of Type 1 is that all but at most two neighbours of v have degree four. Indeed, if v is a leaf-vertex of Type 1, then let Πv , dv be defined as in Definition 5. By Lemma 21, either V (G) = N [v] ∪ {dv } or Π0 = (av , dv , cv ) ∈ P3 (G) and N [v] \ (av , cv ) is a full component of G \ Π0 . In both cases, all neighbours in N (v) \ (av , cv ) have degree four. • Therefore, let us count the number of neighbours of degree four in N (v), that can be done in O(deg(v))-time simply by traversing the adjacency list of vertex v (recall that the degree sequence of G has been computed). 45 • If there are all but at most two neighbours in N (v) that have degree four, then we claim that one can construct the induced subgraph G[N (v)] in O(deg(v))-time. Indeed, for every neighbour u ∈ N (v) that has degree four, let us test in constant-time for each of its four neighbours whether they are adjacent to vertex v — we only keep those for which it is the case in the adjacency list of u in G[N (v)]. Then, for every u ∈ N (v) that does not have degree four (there are at most two such vertices), let us construct the adjacency list of u in G[N (v)] simply by testing to which vertices in N (v) \ u it is adjacent — the latter takes constant-time by neighbour. • Once G[N (v)] has been computed, it is easy to check whether it is a path in O(|N (v)|) = O(deg(v))-time. • Finally, let u ∈ N (v) have degree four. Let us pick in constant-time any neighbour dv ∈ N (u) \ N (v) (note that such a vertex is unique if G[N (v)] induces a path). In order to decide whether v is a leaf-vertex of Type 1, it is now sufficient to test whether vertex dv is adjacent to every vertex in N (v) — that takes constant-time by neighbour. Finding a leaf-vertex of Type 2. Recall that a vertex is a leaf-vertex of Type 2 if and only if it has degree three and its three neighbours induce a path. Given any vertex of degree three, three adjacency tests are enough in order to determine whether its three neighbours induce a path — and each adjacency tests takes constant-time. Therefore, it can be checked in constant-time whether a vertex is a leaf-vertex of Type 2. Finding a leaf-vertex of Type 3. By Definition 5, a vertex v is a leaf-vertex of Type 3 if and only if it has degree two and its two neighbours are non-adjacent and they have at least two common neighbours (including v). Note that given a degree-two vertex, it can be checked whether its two neighbours are non-adjacent in constant-time. We now distinguish three cases. 1. First, suppose there is a vertex v such that N (v) = {x, y} and neighbour x is a degree-two vertex. In such case, let N (x) = {v, z}, in order to decide whether v is a leaf-vertex of Type 3, it is sufficient to test in constant-time whether y, z are adjacent. 2. Second, suppose there are two degree-two vertices v, v 0 that share the same two non-adjacent neighbours (i.e., N (v) = N (v 0 ) = {x, y} and x, y are non-adjacent). In such case, both vertices v, v 0 are leaf-vertices of Type 3 (this case may happen if for instance, G = K2,q with q ≥ 2). In order to check whether this case happens, it is sufficient to sort the pairs N (v) with v being a degree-two vertex in linear-time (for instance, using a bucket-sort). 3. Else, let V 0 contain every degree-two vertex v with two non-adjacent neighbours of degree at least three (if one of the two neighbours of v has degree two, we fall in the first case) W.l.o.g., every vertex v ∈ V 0 is uniquely determined by the pair N (v) composed of its two neighbours (or else, we fall in the second case). In such case, let us contract every v ∈ V 0 to one of its two neighbours. By doing so, we remove v and we make the two vertices in N (v) adjacent. Note that all these edge-contractions are pairwise independent. Let us call G0 the graph resulting from all edge-contractions, and let us call “virtual edges” any new edge resulting from an edge-contraction. Then, let us list all triangles in the resulting graph G0 , it can be done in linear-time [45]. By construction, v ∈ V 0 is a leaf-vertex of Type 3 if and only if the virtual edge resulting from its contraction belongs to a triangle in which it is the unique virtual edge. P Overall, finding a leaf-vertex in G takes O( v∈V deg(v))-time, that is O(n)-time because G is planar. 5.4.2 Existence of a star-decomposition with two bags Lemma 26. Let G be a planar graph, it can be decided in quadratic-time whether G admits a star-decomposition with one or two bags. Proof. G admits a star-decomposition with one bag if and only if there is a universal vertex in G, hence it can be decided in linear-time. Assume for the remaining of the proof that G does not admit a star-decomposition with less than two bags. We will consider two necessary conditions for some fixed pair x, y to be the dominators of the only two bags in some star-decomposition of G. For each of the two conditions, we will prove that all pairs satisfying the condition can be computed in quadratic-time. Then, we will conclude the proof by showing that the two conditions are sufficient to ensure the existence of a star-decomposition of G with two bags. 46 1. Recall that if it exists a star-decomposition of G with two bags, then by the properties of a tree decomposition every vertex of G must be contained in at least one bag. Therefore, if x, y are the only two dominators of the bags in some star-decomposition of G, they must be a dominating pair of G. It can be decided in O(deg(x) + deg(y))-time whether a fixed pair x, y is a dominating pair. So, overall, it takes O(n2 )-time to compute all dominating pairs of G with n being the order of the graph, for the graph is planar and so, it is a sparse graph. 2. Furthermore, recall that if it exists a star-decomposition of G with two bags, then by the properties of a tree decomposition every edge of G must be contained in at least one bag. Therefore, if there is a star-decomposition of G with two bags that are respectively dominated by x and y, then it must be the case that there does not exist any edge e = {u, v} so that u ∈ N [x] \ N [y] and v ∈ N [y] \ N [x] (else, such an edge could not be contained in any of the two bags). In order to decide whether the latter condition holds for some fixed pair x, y, it suffices to test whether every vertex of N [x] \ N [y] is non-adjacent to all vertices in N [y] \ N [x] — it takes constant-time per test and so, O(deg(x) · deg(y))-time in total. As P a result, computing all pairs x, y satisfying the condition requires O( x,y deg(x) · deg(y)) = P P O([ x deg(x)][ y deg(y)]) = O(n2 )-time because the graph G is planar and so, it is a sparse graph. Finally, let x, y satisfy the two above necessary conditions. We claim that (T, X ) with T being an edge and X = {N [x], N [y]} is a star-decomposition of G. Indeed, every vertex is contained into a bag because the pair x, y satisfies the first necessary condition. Furthermore, every edge has its both ends contained into a common bag because the pair x, y satisfies the second necessary condition. Last, all the bags containing a common vertex induce a subtree because there are only two bags. As a result, (T, X ) is a tree decomposition of G. Since each bag of X is respectively dominated by x or y, therefore (T, X ) is indeed a star-decomposition of G, that proves the claim, hence the lemma. Note that in any execution of Algorithm Leaf-BottomUp, it is verified at most once whether some planar graph admits a star-decomposition with one or two bags. 5.4.3 Upper-bound on the number of steps in the algorithm Lemma 27. Let G be a prime planar graph with n vertices and m edges. Then, there are at most 5n − m recursive calls to the Algorithm Leaf-BottomUp, that is O(n). Proof. First note that since G is planar by the hypothesis, 5n − m ≥ 0 and 5n − m = O(n). Let G0 with n0 vertices and m0 edges so that Algorithm Leaf-BottomUp is recursively applied on G0 when G is the input. Since there is at most one such a graph G0 (i.e., there is no more than one recursive call at each call of the algorithm), furthermore G0 is prime and planar, therefore, in order to prove the lemma it suffices to prove that 5n0 − m0 < 5n − m. To prove it, let us consider at which step of the algorithm the recursive call occurs. • If it is at Step 2, then G0 is obtained by removing a leaf-vertex of Type 1, denoted by v, and then contracting all the internal vertices in the path Πv (induced by N (v)) to a single edge. Therefore, n0 = n−deg(v)+3, m0 = m−3deg(v)+8 and so, 5n0 −m0 = 5n−m−(2deg(v)−7) < 5n − m because deg(v) ≥ 4. Thus, from now on let us assume we fall in Step 3, i.e., a leaf-vertex of Type 2 or 3 is considered, denoted by v. • If the recursion happens at Step 3.1 (a), then G0 is obtained by removing v. Therefore, n0 = n − 1 and either m0 = m − 3 (if v is of Type 2) or m0 = m − 2 (if v is of Type 3), hence m0 ≥ m − 3 and so, 5n0 − m0 ≤ 5n − m − 2 < 5n − m. • If it is at Step 3.1 (b), then we fall in Step 3.1 (b) ii (no recursion occurs in Step 3.1 (b) i), thus G0 is obtained by making v adjacent to the two vertices in (N (av ) ∩ N (cv )) \ v (including bv in the case when v is of Type 3). Therefore, n0 = n and either m0 = m + 1 (if v is of Type 2) or m0 = m+2 (if v is of Type 3), hence m0 ≥ m+1 and so, 5n0 −m0 ≤ 5n−m−1 < 5n−m. • Else, the recursion happens at Step 3.2. Recall that in such case, there exists a vertex uv such that (bv , uv ) is a clique-separator of G \ v. Adding an edge between v and bv if it does not exist, decreases 5n − m by 1, therefore from now on let us assume that v is a leaf-vertex of Type 2. 47 – if it is at Step 3.2 (a), then G0 is obtained by contracting the edge {v, av }. Therefore, n0 = n − 1, m0 = m − 2, hence 5n0 − m0 = 5n − m − 3 < 5n − m. – If it is at Step 3.2 (b) i, then G0 is obtained by adding an edge between bv and some vertex x ∈ (N (av )∩N (uv ))\bv then contracting this edge. Furthermore, N (bv ) = {av , cv , uv , v} in such case and cv , v ∈ / N (x). Therefore, n0 = n − 1, m0 = m − 2 and so, 5n0 − m0 = 5n − m − 3 < 5n − m. – If it is at Step 3.2 (b) ii, then G0 is obtained by contracting the edge {bv , x} where x ∈ N (av ) ∩ N (uv ) ∩ N (bv ). Furthermore, N (bv ) = {av , cv , uv , v, x} in such case and cv , v ∈ / N (x). Therefore, n0 = n − 1, m0 = m − 3 and so, 5n0 − m0 = 5n − m − 2 < 5n − m. – Finally, in all other cases the recursive call happens at Step 3.2 (b) iii. Then, G0 is obtained by adding an edge between two vertices y, z ∈ N (bv ) ∩ N (x) for some x ∈ (N (av )∩N (uv ))\bv . Therefore, n0 = n, m0 = m+1 and so, 5n0 −m0 = 5n−m−1 < 5n−m. 6 Conclusion and Open questions On the negative side, we proved the NP-hardness of computing five metric graph invariants (namely, tree-breadth, path-length, path-breadth, k-good tree and path decompositions) whose complexity has been left open in several works [26, 29, 30]. These results add up to the proof in [42] that it is NP-hard to compute the tree-length. We leave as a future work further study on the border between tractable and intractable instances for the problem of computing the above metric graph invariants. Especially, what are the graph classes for which it can be decided in polynomial-time whether a graph admits a star-decomposition ? In this paper, we partially answer to this question by proving that it is the case for bipartite graphs and planar graphs. Based on these two positive results, we conjecture that the problem is FixedParameter Tractable when it is parameterized by the clique-number of the graph (note that there is a large clique in all the graphs obtained from our polynomial-time reductions). Intermediate challenges could be to determine whether the problem is Fixed-Parameter Tractable when it is parameterized by the genus, the tree-width or the Hardwiger number. Finally, we notice that all our NP-hardness results imply that the above metric graph invariants cannot be approximated below some constant-factor. There remains a gap between our inapproximability results and the constant-ratio of the approximation algorithms in [26, 30]. Therefore, we leave as an interesting open question whether we can fill in this gap. References [1] M. Abu-Ata and F. Dragan. Metric tree-like structures in real-world networks: an empirical study. Networks, pages n/a–n/a, 2015. [2] R. Agarwala, V. Bafna, M. Farach, M. Paterson, and M. Thorup. On the approximability of numerical taxonomy (fitting distances by tree metrics). SIAM Journal on Computing, 28(3):1073–1085, 1998. [3] D. Aingworth, C. Chekuri, P. Indyk, and R. Motwani. Fast estimation of diameter and shortest paths (without matrix multiplication). SIAM Journal on Computing, 28(4):1167–1181, 1999. [4] S. Arnborg, D. Corneil, and A. Proskurowski. Complexity of finding embeddings in ak-tree. SIAM Journal on Algebraic Discrete Methods, 8(2):277–284, 1987. [5] P. Austrin, T. Pitassi, and Y. Wu. Inapproximability of treewidth, one-shot pebbling, and related layout problems. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 13–24. Springer, 2012. [6] R. Balakrishnan and K. Ranganathan. A textbook of graph theory. Springer Science & Business Media, 2012. [7] H.-J. Bandelt and V. Chepoi. Metric graph theory and geometry: a survey. Contemporary Mathematics, 453:49–86, 2008. 48 [8] M. BÇŐdoiu, K. Dhamdhere, A. Gupta, Y. Rabinovich, H. Räcke, R. Ravi, and A. Sidiropoulos. Approximation algorithms for low-distortion embeddings into low-dimensional spaces. In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, pages 119–128. Society for Industrial and Applied Mathematics, 2005. [9] A. Berry, R. Pogorelcnik, and G. Simonet. An introduction to clique minimal separator decomposition. Algorithms, 3(2):197–215, 2010. [10] H. Bodlaender. A linear-time algorithm for finding tree-decompositions of small treewidth. SIAM J. Comput., 25(6):1305–1317, 1996. [11] H. Bodlaender. A partial k-arboretum of graphs with bounded treewidth. Theoretical computer science, 209(1):1–45, 1998. [12] H. Bodlaender. Discovering treewidth. In SOFSEM 2005: Theory and Practice of Computer Science, 31st Conference on Current Trends in Theory and Practice of Computer Science, Liptovský Ján, Slovakia, January 22-28, 2005, Proceedings, pages 1–16, 2005. [13] H. Bodlaender, M. Fellows, and T. Warnow. Two strikes against perfect phylogeny. In Automata, Languages and Programming, 19th International Colloquium, ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings, pages 273–283, 1992. [14] H. Bodlaender and T. Kloks. Efficient and constructive algorithms for the pathwidth and treewidth of graphs. Journal of Algorithms, 21(2):358–402, 1996. [15] V. Bouchitté, F. Mazoit, and I. Todinca. Chordal embeddings of planar graphs. Discrete Mathematics, 273(1):85–102, 2003. [16] V. Bouchitté and I. Todinca. Listing all potential maximal cliques of a graph. Theoretical Computer Science, 276(1):17–32, 2002. [17] S. Chechik, D. Larkin, L. Roditty, G. Schoenebeck, R. Tarjan, and V. Vassilevska Williams. Better approximation algorithms for the graph diameter. In Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, pages 1041–1052. SIAM, 2014. [18] V. Chepoi. On distance-preserving and domination elimination orderings. SIAM Journal on Discrete Mathematics, 11(3):414–436, 1998. [19] V. Chepoi, F. Dragan, B. Estellon, M. Habib, and Y. Vaxès. Diameters, centers, and approximating trees of delta-hyperbolicgeodesic spaces and graphs. In Proceedings of the Twentyfourth Annual Symposium on Computational Geometry, SCG ’08, pages 59–68, New York, NY, USA, 2008. ACM. [20] M. Chrobak and D. Eppstein. Planar orientations with low out-degree and compaction of adjacency matrices. Theor. Comput. Sci., 86(2):243–266, 1991. [21] N. Clarke and R. Nowakowski. Tandem-win graphs. Discrete Mathematics, 299(1):56–64, 2005. [22] D. Coudert, G. Ducoffe, and N. Nisse. Diameter of Minimal Separators in Graphs. Research Report RR-8639, Inria Sophia Antipolis ; I3S ; INRIA, Nov. 2014. [23] E. Dahlhaus, P. Hammer, F. Maffray, and S. Olariu. On domination elimination orderings and domination graphs. In Graph-Theoretic Concepts in Computer Science, 20th International Workshop, WG ’94, Herrsching, Germany, June 16-18, 1994, Proceedings, pages 81–92, 1994. [24] R. Diestel. Graph Theory, 4th Edition, volume 173 of Graduate texts in mathematics. Springer, 2012. [25] Y. Dourisboure, F. Dragan, C. Gavoille, and Y. Chenyu. Spanners for bounded tree-length graphs. Theor. Comput. Sci., 383(1):34–44, 2007. [26] Y. Dourisboure and C. Gavoille. Tree-decompositions with bags of small diameter. Discrete Mathematics, 307(16):2008–2029, 2007. [27] R. Downey and M. Fellows. Parameterized complexity. Springer Science & Business Media, 2012. [28] F. Dragan. Tree-like structures in graphs: A metric point of view. In Graph-Theoretic Concepts in Computer Science - 39th International Workshop, WG 2013, Lübeck, Germany, June 19-21, 2013, Revised Papers, pages 1–4, 2013. [29] F. Dragan and E. Köhler. An approximation algorithm for the tree t-spanner problem on unweighted graphs via generalized chordal graphs. Algorithmica, 69(4):884–905, 2014. 49 [30] F. Dragan, E. Köhler, and A. Leitert. Line-distortion, bandwidth and path-length of a graph. In Algorithm Theory–SWAT 2014, pages 158–169. Springer, 2014. [31] F. Dragan and A. Leitert. On the minimum eccentricity shortest path problem. In Algorithms and Data Structures, pages 276–288. Springer, 2015. [32] F. Gavril. Algorithms for minimum coloring, maximum clique, minimum covering by cliques, and maximum independent set of a chordal graph. SIAM Journal on Computing, 1(2):180–187, 1972. [33] F. Gavril. The intersection graphs of subtrees in trees are exactly the chordal graphs. Journal of Combinatorial Theory, Series B, 16(1):47–56, 1974. [34] M. Golumbic, H. Kaplan, and R. Shamir. On the complexity of dna physical mapping. Advances in Applied Mathematics, 15(3):251–261, 1994. [35] M. Golumbic, H. Kaplan, and R. Shamir. Graph sandwich problems. Journal of Algorithms, 19(3):449–473, 1995. [36] M. Herlihy, F. Kuhn, S. Tirthapura, and R. Wattenhofer. Dynamic analysis of the arrow distributed protocol. Theory of Computing Systems, 39(6):875–901, 2006. [37] J. Hopcroft and R. Tarjan. Efficient planarity testing. Journal of the ACM (JACM), 21(4):549– 568, 1974. [38] P. Indyk. Algorithmic applications of low-distortion geometric embeddings. In Proceedings of the 42Nd IEEE Symposium on Foundations of Computer Science, FOCS ’01, pages 10–, Washington, DC, USA, 2001. IEEE Computer Society. [39] T. Kashiwabara and T. Fujisawa. Np-completeness of the problem of finding a minimumclique-number interval graph containing a given graph as a subgraph. In Proc. Symposium of Circuits and Systems, 1979. [40] A. Kosowski, B. Li, N. Nisse, and K. Suchan. k-Chordal Graphs: from Cops and Robber to Compact Routing via Treewidth. Algorithmica, 72(3):758–777, 2015. [41] R. Krauthgamer and J. Lee. Algorithms on negatively curved spaces. In Foundations of Computer Science, 2006. FOCS’06. 47th Annual IEEE Symposium on, pages 119–132. IEEE, 2006. [42] D. Lokshtanov. On the complexity of computing treelength. Discrete Applied Mathematics, 158(7):820–827, 2010. [43] B. Monien. The bandwidth minimization problem for caterpillars with hair length 3 is npcomplete. SIAM Journal on Algebraic Discrete Methods, 7(4):505–512, 1986. [44] J. Opatrny. Total ordering problem. SIAM Journal on Computing, 8(1):111–114, 1979. [45] C. Papadimitriou and M. Yannakakis. The clique problem for planar graphs. Inf. Process. Lett., 13(4/5):131–133, 1981. [46] N. Robertson and P. Seymour. Graph minors. ii. algorithmic aspects of tree-width. Journal of algorithms, 7(3):309–322, 1986. [47] M. Sysło. Characterizations of outerplanar graphs. Discrete Mathematics, 26(1):47–53, 1979. [48] J. Tenenbaum, V. De Silva, and J. Langford. A global geometric framework for nonlinear dimensionality reduction. Science, 290(5500):2319–2323, 2000. [49] K. Umezawa and K. Yamazaki. Tree-length equals branch-length. Discrete Mathematics, 309(13):4656–4660, 2009. 50
8cs.DS
Robustness analysis of a Maximum Correntropy framework for linear regression arXiv:1703.04829v2 [cs.SY] 31 Aug 2017 Laurent Bako a a Laboratoire Ampère – Ecole Centrale de Lyon – Université de Lyon, France Abstract In this paper we formulate a solution of the robust linear regression problem in a general framework of correntropy maximization. Our formulation yields a unified class of estimators which includes the Gaussian and Laplacian kernel-based correntropy estimators as special cases. An analysis of the robustness properties is then provided. The analysis includes a quantitative characterization of the informativity degree of the regression which is appropriate for studying the stability of the estimator. Using this tool, a sufficient condition is expressed under which the parametric estimation error is shown to be bounded. Explicit expression of the bound is given and discussion on its numerical computation is supplied. For illustration purpose, two special cases are numerically studied. Key words: robust estimation, system identification, maximum correntropy, outliers. 1 Introduction Given a set of empirical observations generated by a system along with a class of parameterized candidate models, a parameter estimator is a function which maps the available data to the parameter space associated with the model class. A very desirable property for an estimator is that of robustness which characterizes a relative insensitivity of the estimator to deviations of the observed data from the assumed model. More specifically, this property is central in situations where the data are prone to non Gaussian noise or disturbances of possibly arbitrarily large amplitude (often called outliers). The quest for robust estimators has led to the development of many estimators such as the Least Absolute Deviation (LAD) [17,14,4,2], the least median of squares [16], the least trimmed squares [17], the class of M-estimators [11]. Evaluating formally to what extent a given estimator is robust requires setting a quantitative measure of robustness. Incidentally such a measure can serve as comparison criterion between different robust estimators. Generally, the robustness is assessed in term of the maximum proportion of outliers in the total data set that the estimator can handle while remaining stable (see for example the concept of breakdown point [17]). More recently the maximum correntropy [18,12,15] has Email address: [email protected] (Laurent Bako). 1 This paper was not presented at any IFAC meeting. Corresponding author L. Bako. Tel.: +33 472 186 452. Preprint submitted to Automatica emerged as an information-theoretic estimation framework which induces some robustness properties with respect to outliers. Although maximum correntropy estimation is closely related to M-estimation, its discovery has broadened the horizon of possibilities for designing robust identification schemes. As a matter of fact, it has been successfully applied to a variety of estimation problems such as linear/nonlinear regression, filtering, face recognition in computer vision [9,7,10]. Contribution. Although the maximum correntropy based estimators have been gaining an increasing success, the formal analysis of its robustness properties is still a largely open research question. In this paper we propose such an analysis for a class of maximum correntropy based estimators applying to linear regression problems. More precisely, the contribution of the current paper is articulated around the following three questions: • To what extent the maximum correntropy estimation framework is robust to outliers? By robustness, it is meant here a certain insensitivity of the estimator to large errors of possibly arbitrarily large magnitude. To address this question, we derive parametric estimation error bounds induced by the estimator in function of both the degree of richness of the regression data and on the fraction of outliers. In summary, we show that if the regression data enjoy some richness properties and if the number of outliers is reasonably small, then the parametric estimation error remains stable. September 4, 2017 Indeed the proportion of outliers that the estimator is capable to correct depends on how rich the regressor matrix is. Moreover, the estimation error appears to be a decreasing function of the richness measure. • How does richness of the training data set influence the robustness of the estimator and how to characterize it? We provide an appropriate characterization of the richness in terms of the cardinality of the regressor vectors which are strongly correlated to any vector of the regression space. As such however, this quantitative measure of richness is not computable at an affordable price. To alleviate this difficulty the paper proposes some estimates of this measure thus allowing for the approximation of the parametric estimation error bounds. • Does the maximum correntropy estimator (MCE) possess the exact recovery property? We show that unlike the LAD estimator, the MCE is not able to return exactly the true parameter vector once the measurement is affected by a single arbitrary nonzero error. The proof is given for the Gaussian kernel based estimator. 2 2.1 Robust regression problem The data-generating system Let {xt }t∈N and {yt }t∈N be some stochastic processes taking values respectively in Rn and R. They are assumed to be related by an equation of the form o yt = x⊤ t θ + vt , (1) where {vt }t∈N represent an unobserved error sequence; θo ∈ Rn is an unknown parameter vector. Eq. (1) may describe a static (memoryless) system or a dynamic one. In the latter case, we will conveniently assume that the so-called regressor (or explanatory vector) xt has the following structure xt = [ut ut−1 · · · ut−(n−1) ]⊤ , i.e., (1) is an FIR-type (Finite Impulse Response) system, with ut then denoting its input signal at time t. Assumption 1 The joint stochastic process {(xt , vt )}t∈N is independently and identically distributed. We note that an analysis of robustness of the maximum correntropy has been presented recently in [5,6]. However the analysis there is limited to the Gaussian kernel based correntropy and to a single parameter estimation problem. Moreover these works do not make clear how the properties of the data contribute to the robustness of the estimator. While this assumption can hold naturally for a static system, it might not be satisfied in some practical situations. For example, if (1) is a dynamic system (for instance, of FIR-type), this assumption is not satisfied 2 . But as will be seen, its only role is to highlight the correntropic origin of the estimation framework considered in this paper. Outline. The rest of this paper is organized as follows. Section 2 presents the robust regression problem and define the class of maximum correntropy estimators whose properties are to be studied in the paper. It also introduces the general setting of the paper. The main analysis results are developed in Section 3. In Section 4 we run numerical experiments to illustrate the richness measure and the evolution of the derived error bounds with respect to the amount of noise. Finally, Section 5 contains concluding remarks concerning this work. Assumption 2 The noise sequence {vt } satisfies the following: there is ε ≥ 0 such that if we define the index sets Iε0 = {t : |vt | ≤ ε} and Iεc = {t : |vt | > ε}, then the cardinality of Iε0 is "much larger" than that of |Iεc |. We will formalize latter in the paper what "much larger" can mean. Similarly as in [2], we can assume that vt is of the form vt = ft + et where {ft } is a sparse noise sequence in the sense that only a few elements of it are different from zero. However its nonzero elements are allowed to take on arbitrarily large values (called in this case, outliers). As to {et }, it is assumed to be a bounded and dense (i.e., not necessarily sparse) noise sequence of rather moderate amplitude. Notations. R is the set of real numbers; R+ is the set of real nonnegative numbers; N is the set of natural integers; C denotes the set of complex numbers. N will denote the number of data points and I = {1, . . . , N } the associated index set. For any finite set S, |S| refers to the cardinality of S. However, whenever x is a real (respectively complex) number, |x| will refer to the absolute value (respectively modulus) of x. For x = [x1 · · · xn ]⊤ ∈ Rn , kxkp will denote the p-norm N Problem. Given a finite collection Z N = {(xt , yt )}t=1 of measurements obeying the system equation (1), the robust regression problem of interest here is the one of finding a reliable estimate of the parameter vector θo despite the effect of arbitrarily large errors. of x defined by kxkp = (|x1 |p + · · · + |xn |p )1/p , for p ∈ {1, 2}, kxk∞ = maxi=1,...,n |xi |. The exponential of a real number z will be denoted exp(z) or ez according to visual convenience; ln(z) is the natural logarithm function. For a square and positive semi-definite matrix A, λmin (A) and λmax (A) denote respectively the minimal and maximal eigenvalues of A. Let θ denote a candidate parameter vector (PV) which we would like, ideally, to coincide with the true PV θo . Given xt and θ, the prediction we can make of yt is 2 Indeed this assumption can be relaxed to an appropriate notion of stationarity and ergodicity for the joint process {(xt , vt )} 2 ŷt (θ) = x⊤ t θ. It is then the goal of the estimation method to select θ such that yt and ŷt (θ) are close in some sense for any t. Closeness will be be measured in term of the so-called maximum correntropy between the measured output yt and the predicted value ŷt (θ). 2.2 PROOF. That ℓp satisfies P1-P3 is an obvious fact. As to Property P4, it follows from convexity. In effect the convexity of ℓp implies that for all (a, b) ∈ R2 , p |a + b| /2p = ℓp ((a + b)/2) ≤ 1/2ℓp (a) + 1/2ℓp(b). Multiplying by 2 gives 1/2p−1ℓp (a+b) ≤ ℓp (a)+ℓp (b), which by replacing a with a − b can be seen to be equivalent to P4 with αℓ = 1/2p−1 . ✷ Maximum correntropy estimation The correntropy is an information-theoretic measure of similarity between two arbitrary random variables [18,12]. More specifically, consider two random variables Y and Ŷ defined on the same probability space, and taking values in R. Let φℓ : R×R → R be a positive-definite kernel function on R (see e.g., [19, Chap. 2, p. 30] for a definition). The correntropy Vφℓ (Y, Ŷ ) between Y and Ŷ with respect to a kernel function φℓ , is defined by The correntropy maximization is an estimation framework where one tries to maximize the correntropy. In the regression problem stated above, we aim to find the parameter vector θ that maximizes 3 Vφℓ (yt , ŷt (θ)), the correntropy between yt and ŷt (θ) with respect to the kernel φℓ . In practice however the distribution 4 pxt ,yt is generally unknown so that one cannot evaluate the exact correntropy. As a consequence of this difficulty one would be content in practice with maximizing a sample estimate of the correntropy. Assume that we are given a N set Z N = {(xt , yt )}t=1 of data points sampled independently from the joint distribution pxt ,yt . Then in virtue of Assumption 1, an estimate of the correntropy is given by   Vφℓ (Y, Ŷ ) = EY,Ŷ φℓ (Y, Ŷ ) , where EY,Ŷ [·] refers to the expected value with respect to the joint distribution of (Y, Ŷ ). In a more explicit form, we have Z Z φℓ (y, ŷ)pY,Ŷ (y, ŷ)dydŷ (2) Vφℓ (Y, Ŷ ) = R N 1 X b φℓ (yk , ŷk (θ)) Vφℓ (yt , ŷt (θ)) = N k=1 R N   1 X exp −γℓ(yk − x⊤ = k θ) N with pY,Ŷ being the joint probability density function of (Y, Ŷ ). The correntropy constitutes a similarity measure between Y and Ŷ through the kernel φℓ . Although the original definition of correntropy in [18] fixes φℓ to be the Gaussian kernel, it is indeed possible to extend it to any positive definite kernel function. k=1 for all t ∈ I , {1, . . . , N }. Hence the maximum correntropy estimator (MCE) studied in this paper is the possibly set-valued map Ψmce : (Rn × R)N → Rn which maps the data to a parameter space, We consider in this paper a kernel function of the form φℓ (y, ŷ) = exp(−γℓ(y − ŷ)), (4) Ψmce (Z N ) = arg max Vbφℓ (yt , ŷt (θ)). (5) θ∈Rn (3) In the form (4)-(5) the MCE can be viewed as a particular instance of the prediction error estimation scheme  [13, Chap. 7] with prediction error measured by exp −γℓ(yk − x⊤ k θ) . Also, the performance index (4) is reminiscent of the risk-sensitive estimation cost which is used in control, adaptive filtering and parameter estimation [3,8]. But this latter approach, which roughly consists in the minimization of a sum of exponential of positive error terms, is not suitable for handling the effects of impulsive noise such as outliers. Although the focus of this paper is the analysis of the properties of the estimator (5), let us mention in passing that the underlying optimization problem in (5) is non convex. This implies that solving (5) numerically can be where γ > 0 is a user-specified parameter and ℓ : R → R+ is a function which satisfies the following properties: P1. ℓ is positive-definite: ℓ(a) ≥ 0 ∀a and ℓ(a) = 0 if and only if a = 0. P2. ℓ is symmetric: ℓ(−a) = ℓ(a). P3. ℓ is nondecreasing on R+ : ℓ(a) ≤ ℓ(b) whenever |a| ≤ |b|. P4. There exists αℓ > 0 such that ℓ(a − b) ≥ αℓ ℓ(a) − ℓ(b) ∀(a, b) ∈ R2 . Property P4 can be interpreted as a relaxed version of the triangle inequality property for ℓ. We can characterize a family of functions ℓ satisfying P1-P4 as follows. 3 By Assumption 1, Vφℓ (yt , ŷt (θ)) is indeed constant i.e., independent of t. Hence t refers here to an arbitrary time index. 4 To be precise, the interest is in pyt ,ŷt (θ) but this follows from pxt ,yt . Lemma 3 (Examples of functions obeying P1-P4) For any real number p ≥ 1, the function ℓp : R → R+ p defined by ℓp (x) = |x| satisfies the properties P1-P4. In particular, P4 is satisfied with αℓ = 1/2p−1. 3 challenging. However it can be interpreted iteratively as a weighted least squares problem in the case for example where φℓ is taken to be the Gaussian kernel. We will get back to this in Section 4. 3 We will refer to it as the correlation measure of the matrix X at the level α. It appears intuitively that ρα (X) is a decreasing function of α. Clearly, we get ρα (X) = 0 for α = 1 for finite N while ρα (X) = 1 for α = 0. For a given matrix, it would be interesting to be able to evaluate numerically the quantitative measure ρα (X) of richness. Indeed, this value will be required for numerical assessment of the error bound to be derived in Section 3.2. However computing exactly the value of ρα (X) is a hard combinatorial problem. Robustness properties of the MCE As discussed in the introduction, an estimator of the form (5) is intuitively thought (and empirically shown) to be endowed with some robustness properties. By this, we mean that it is able to keep behaving reasonably well when a certain fraction of the available data points are affected by noise components vt of possibly arbitrarily large magnitude. The question of main interest in this paper is to characterize quantitatively up to what extent the estimator defined in (5) can be insensitive to outliers. 3.1 We therefore discuss how to reach estimates of ρα (X) at an affordable cost. To this end, let X̃ = [x̃1 · · · x̃N ] ∈ Rn×N be the matrix obtained from X by normalizing its columns to unit 2-norm, i.e., x̃t = xt / kxt k2 for all t. Then introduce the number n o (9) σ(X) = minn X̃ ⊤ η ∞ s. t. kηk2 = 1 Data informativity η∈R As will be seen, the robustness property is inherited from both the structure of the estimator and the richness of the regression data. We are therefore interested in formalizing as well that richness and how it contributes to the robustness properties of the estimator. which is solely a function of the matrix X, hence the notation. Note that the so-defined σ(X) lies necessarily in the real interval [0, 1]. Moreover, it can be usefully √ 1/2 1/2 observed that σ(X) ≥ λmin (X̃ X̃ ⊤ )/ N , with λmin (·) referring to the square root of the minimum eigenvalue. Now for any t ∈ I consider the following index set o n p (10) 1 − δ2 Jt,α (X) = k ∈ I : |x̃⊤ k x̃t | ≥ To proceed with the analysis, let us introduce some notations. For convenience we make the following assumption. Assumption 4 The regressor sequence {xt } satisfies: xt 6= 0 for all t ∈ I. p √ where δ = 1 − α2 − 1 − σ(X)2 . It is assumed in the definition (10) that σ(X) ≥ α so that δ ≥ 0. For a given t, Jt,α (X) collects the indices of the regressors which are the most correlated to x̃t in the sense that the √ cosine of the angle they form with x̃t is larger than 1 − δ 2 . Finally, let Note that Assumption 4 is without loss of generality. Under this assumption, let us pose rx = min kxt k2 > 0, t∈I (6) with k·k2 denoting Euclidean norm. Upon dividing the system equation (1) by kxt k2 , we can even assume that rx = 1. Let α ∈ [0, 1] be a real number. For any η ∈ Rn , define the index set  Iα (X, η) = t ∈ I : |x⊤ (7) t η| ≥ α kxt k2 kηk2 vα (X) = 1 inf |Jt,α (X)| N t∈I (11) be the ratio between the minimum cardinality of the finite set Jt,α (X) over all t living in I and the number N of columns in X. Then we can estimate ρα (X) as follows. Proposition 5 Let X ∈ Rn×N be a real matrix. Then, for all α ∈ ]0, 1] with α ≤ σ(X), with X = [x1 · · · xN ] ∈ Rn×N a matrix formed with all the regressors. Finally, let ρα (X) be the ratio between the minimum cardinality that Iα (X, η) can attain over all possible values of η, and the number N of columns in X, i.e., 1 |Iα (X, η)| . (8) ρα (X) = infn η∈R N The number ρα (X) measures somehow the richness (or informativity/genericity) of the regression data. Intuitively, ρα (X) reflects a dense spanning of all directions of the vector space Rn by the vectors {xt }. For a given α > 0, it is desired that ρα (X) be as large as possible.  λ (X̃ X̃ ⊤ )  min vα (X) ≤ ρα (X) ≤ min 1, N α2 (12) with λmin (X̃ X̃ ⊤ ) denoting the minimum eigenvalue of the matrix X̃ X̃ ⊤ . The proof of this proposition uses the following lemma. Lemma 6 [20, Thm 5.14] Let x, y, z ∈ Cn be such that 4 x∗ x = y ∗ y = z ∗ z = 1 with x∗ denoting the conjugate transpose of x. Then inf η∈Rn p p p 1 − |x∗ y|2 ≤ 1 − |x∗ z|2 + 1 − |z ∗ y|2 . The key benefit of Proposition 5 is that it provides a method for estimating the measure ρα (X) defined in (8) at an affordable cost. Note however that while the upper bound in (12) can be computed easily, obtaining the lower bound vα (X) is still challenging. The reason is that this bound involves the number σ(X) in (9) whose numerical evaluation requires solving a nonconvex optimization problem. Nevertheless, it can be approximated through some heuristics, e.g. by solving a sequence of linear programs. Equality holds if and only if there exists β ∈ C such that either z = βx or z = βy. PROOF. [Proof of Proposition 5] The upper bound is immediate. To see this, let η0 6= 0 be the eigenvector associated with the smallest eigenvalue of X̃ X̃ ⊤ . Then 2 λmin (X̃ X̃ ⊤ ) kη0 k2 = ≥ N X t=1 Remark 7 In comparison to the classical concept of persistence of excitation (PE) in system identification, the richness property requiring that ρα (X) be large is a stronger property. In finite time, the quantitative persistence of excitation (called specifically sufficiency of excitation in this case) asks for the condition number 1/2 1/2 λmax (XX ⊤ )/λmin (XX ⊤ ) of XX ⊤ to be as close to 1 as possible. The PE condition appears to be a global property of the matrix X while the richness condition introduced here is a somewhat local property as it is basically counting the number of vectors xt pointing in any direction of the regression space. 2 (x̃⊤ t η0 ) X 2 (x̃⊤ t η0 ) 1 |Iα (X, η)| = ρα (X). ✷ N . t∈Iα (X,η0 ) ≥ |Iα (X, η0 )| α2 kη0 k22 It follows that ρα (X) = 1/N inf η∈Rn |Iα (X, η)| ≤ 1/N |Iα (X, η0 )| ≤ λmin (X̃ X̃ ⊤ )/(N α2 ). The upper inequality in (12) follows by additionally taking into consideration the obvious fact that ρα (X) ≤ 1. 3.2 We now prove the inequality vα (X) ≤ ρα (X). To begin with, note from (9) that for any η ∈ Rn satisfying kηk2 = 1, there exists t(η) ∈ I such that |η ⊤ x̃t(η) | ≥ σ(X). Consider an index k ∈ I, such that |x̃⊤ k x̃t(η) | ≥ h for some h ∈ [0, 1]. Then observe that |x̃⊤ η| ≥ α is equivalent to k Main results Equipped with the measure of informativity introduced above, we can now state the main result of this paper, which stands as follows. q p 2 1 − (x̃⊤ 1 − α2 . k η) ≤ Theorem 8 Let Iε0 = {t ∈ I : |vt | ≤ ε} and Iεc = {t ∈ I : |vt | > ε} with {vt } denoting the noise sequence in (1). Let ℓ be a function obeying P1-P4. Assume that the following condition is satisfied for some α ∈ ]0, 1], q q q 2 2 ≤ ⊤ x̃ 2+ 1 − (x̃⊤ 1 − (η 1 − (x̃⊤ η) ) t(η) k x̃t(η) ) k p p ≤ 1 − σ(X)2 + 1 − h2 . 0 1 −γℓ(ε) |Iε | > 1. (13) ρ (X) + e α N 1 + e−γℓ(ε)  Then for any θ⋆ ∈ Ψmce Z N with Z N being generated by system (1), it holds that On the other hand, by applying Lemma 6, we can write It follows that for |x̃⊤ k η| ≥ α to hold, it is sufficient that ℓ(αrx kθ⋆ − θo k2 ) ≤ p p p 1 − σ(X)2 + 1 − h2 ≤ 1 − α2 , √ which is equivalent to h ≥ 1 − δ 2 with √ in turn p 2 2 δ = 1 − α − 1 − σ(X) ∈ [0, 1] by the assumption that σ(X) ≥ α. Hence, for |x̃⊤ k η| to be greater √ than 1 − δ2. or equal to α, it is enough that |x̃⊤ x̃ | ≥ k t(η) This means that for a given t, k being in the index set Jt(η),α (X) defined in (10) is a sufficient condition n for |x̃⊤ k η| ≥ α for all η ∈ R such that kηk2 = 1. Therefore Jt(η),α (X) ⊂ Iα (X, η) hence implying that Jt(η),α (X) ≤ |Iα (X, η)|. Taking now the in1 Jt(η),α (X) ≤ fimum produces vα (X) ≤ inf η∈Rn N 1 ln(1/µℓ ), γαℓ (14) where µℓ = 1 + e−γℓ(ε) |Iε0 | N  1 ρ (X) −γℓ(ε) α 1 + e + ρα (X) − 1  0 −γℓ(ε) |Iε | −1 +e N (15) If in addition, ℓ is strictly increasing on R+ , then 1 −1 ℓ kθ − θ k2 ≤ αrx ⋆ 5 o   1 ln(1/µℓ ) . γαℓ (16) observations into the above inequality yields o  n 0   Iε exp − γℓ(ε) − |Iεc | exp − γℓ(ε)   ≤ Iε0 ∩ Iα (X, η ⋆ ) exp − γαℓ ℓ(αrx kη ⋆ k2 ) PROOF. Let  θ⋆ ∈ Ψmce Z N = arg max Vbφℓ (yt , ŷt (θ)). θ∈Rn Then for any θ ∈ Rn , it holds that N X t=1 + Iε0 ∩ Iαc (X, η ⋆ ) . N  X    ⋆ exp − γℓ(yt − x⊤ θ) ≤ exp − γℓ(yt − x⊤ t t θ ) By observing that Iε0 ∩ Iαc (X, η ⋆ ) = |Iε0 |− Iε0 ∩ Iα0 (X, η ⋆ ) , we can rearrange the above inequality in the form   e−γℓ(ε) Iε0 e−γℓ(ε) + Iε0 − N − Iε0 n o   ≤ Iε0 ∩ Iα (X, η ⋆ ) exp − γαℓ ℓ(αrx kη ⋆ k2 ) − 1 (17) Now by exploiting the definition of ρα (X), we can observe that t=1 Taking in particular θ = θo and invoking the system equation (1), it follows that X t∈Iε0   X   exp − γℓ(vt ) + exp − γℓ(vt ) t∈Iεc ≤ X t∈Iε0 +   ⋆ exp − γℓ(vt − x⊤ t η ) X t∈Iεc  exp − γℓ(vt − |Iε0 ∩ Iα (X, η ⋆ )| = |Iε0 | + |Iα (X, η ⋆ )| − |Iε0 ∪ Iα (X, η ⋆ )| ≥ |Iε0 | + N ρα (X) − N.  ⋆ x⊤ t η ) Moreover since where we have posed η ⋆ = θ⋆ − θo . This implies that X t∈Iε0 N ρα (X) + |Iε0 | ≥     X ⋆ c exp − γℓ(vt − x⊤ exp − γℓ(vt ) ≤ t η ) + |Iε | t∈Iε0 the assumption (13) guarantees that |Iε0 | + N ρα (X) − N > 0. Therefore since the term on the right hand side of (17) is negative, it holds that With |vt | ≤ ε for any t ∈ Iε0 , we have −γℓ(vt ) ≥ −γℓ(ε) by the symmetry of ℓ.As  properties P Pand nondecreasing a consequence, t∈I 0 exp − γℓ(vt ) ≥ t∈I 0 exp − ε ε  γℓ(ε) . On the other hand, by the fourth property of ⋆ ⊤ ⋆ the function ℓ, ℓ(vt − x⊤ t η ) ≥ αℓ ℓ(xt η ) − ℓ(vt ) ≥ ⊤ ⋆ ⋆ αℓ ℓ(xt η ) − ℓ(ε) hence implying that −γℓ(vt − x⊤ t η ) ≤ ⊤ ⋆ −γαℓ ℓ(xt η ) + γℓ(ε). Combining these observations allows us to write X   exp − γℓ(ε) − |Iεc | Then direct algebraic calculations lead to   µℓ ≤ exp − γαℓ ℓ(αrx kη ⋆ k2 ) ≤ 1 where µℓ is defined as in (15). Indeed, in virtue of the assumption (13), µℓ is positive. Hence we have    X ⋆ exp − γαℓ ℓ(x⊤ ≤ exp γℓ(ε) t η )  t∈Iε0 X t∈Iε0 ∩Iα (X,η ⋆ )  + exp γℓ(ε) X   ⋆ exp − γαℓ ℓ(x⊤ t η ) t∈Iε0 ∩Iαc (X,η ⋆ ) n o Iε0 e−γℓ(ε) + Iε0 − N − Iε0 o   n exp − γαℓ ℓ(αrx kη ⋆ k2 ) − 1 ≤ |Iε0 | + N ρα (X) − N e−γℓ(ε) t∈Iε0   = exp γℓ(ε) 1 N ρα (X) + e−γℓ(ε) |Iε0 |, 1 + e−γℓ(ε) ℓ(αrx kη ⋆ k2 ) ≤   ⋆ exp − γαℓ ℓ(x⊤ t η ) 1 ln(1/µℓ ). γαℓ Of course, if ℓ is monotonically increasing on R+ then it is invertible and the error bound in (16) follows. ✷ In the last equality we have partitioned the set Iε0 into Iε0 ∩Iα (X, η ⋆ ) and Iε0 ∩Iαc (X, η ⋆ ) with Iαc (X, η ⋆ ) being the complement of Iα (X, η ⋆ ) in I. Note from (7) that ⋆ ⋆ for all t ∈ Iε0 ∩ Iα (X, η ⋆ ), ℓ(x⊤ t η ) ≥ ℓ(αrx kη k2 ) so ⊤ ⋆ ⋆ that −γαℓ ℓ(xt η ) ≤ −γαℓ ℓ(αrx kη k2 ). Plugging these A few comments follow from this result. A key assumption of the theorem is condition (13). What it requires is on the one hand, that the proportion of outliers be somehow small and on the other hand, that the regression data X be rich in the sense that ρα (X) be large enough for a given nonzero α ∈ ]0, 1]. An important teaching of this condition is that the richer the data matrix X, the larger the number of outliers that can be corrected by the estimator. We can interpret (13) as a sufficient con- 6 dition for the stability of the estimator since it guarantees a bounded estimation error. We now discuss some special instances of Theorem 8 corresponding to two kernels which are frequently used for estimation. For convenience of the discussion, let us introduce the following notation. Let µ : R3+ → R+ A second comment concerns the amplitude of the error bound given in (16). For the purpose of making this bound small, we need the constant µℓ to be close to one. Again we see that this is favored by a small number of outliers and a rich data set. An interesting special case is when ℓ(ε) = 0, which occurs when the data are only affected by some outliers (ε = 0) and no dense noise. In this case the number µℓ defined in (15) reduces to µℓ = 1 − |Iε0 | N 1− µ(z, ε, α) = N whenever e−z 0 otherwise. |Iε0 | N which tend to suggest, since µℓ 6= 1, that no exact recovery might be achieved once the data are affected by a single outlier unless we consider in (16) the limit case when γ → +∞. A similar observation was made in [6] in a comparable context. We will prove below that the MCE does not possess the exact recovery property, at least in the case when ℓ(a) = a2 . In contrast, a robust estimator such as the LAD estimator (see, e.g., [1,2]) is able to achieve exact recovery under a relatively significant proportion of nonzero errors. 3.3 φ1 (y, ŷ) = exp (−γ1 |y − ŷ|) . Corollary 11 (Laplacian kernel) Let Iε0 be defined as in Theorem 8. Assume that the following condition is satisfied 0 1 −γ1 ε |Iε | ρ (X) + e >1 α −γ ε 1+e 1 N  − θ )) . Note that where wt (θ) = exp − γℓ(vt − the matrix on the left hand side of the equation above is finite regardless of the value of θ. Hence, in the event that θo ∈ Ψmce (Z N ), we would have t∈Iεc X (18) It is straightforward to see that the properties P1-P4 are satisfied by ℓ with αℓ = 1. Theorem 8 can be specialized to this case as follows. t∈Iεc wt (θo )vt xt = Laplacian kernel The Maximum Laplacian Correntropy estimator (MCEL) corresponds to the case where the function ℓ in (3) is taken to be such that ℓ(a) = |a|. As a result, the function φℓ takes the form PROOF. We start by observing that with ℓ being the square function, the cost V̂φℓ (yt , ŷt (θ)) is differentiable. Therefore, a necessary condition for θ to be in Ψmce (Z N ) is that ∇V̂φℓ (yt , ŷt (θ)) = 0, where ∇ refers to the gradient. This, by using the system equation (1) and exploiting the assumption that vt = 0 for t ∈ Iε0 , can be translated into ! N X X ⊤ wt (θ)xt xt (θ − θo ) = wt (θ)vt xt , X + 1+e1−z ρα (X)− 1 > 0 and µ(z, ε, α) = subject to α ≤ σ(X) and condition (13). Although such a minimum might not be easy to compute exactly, one can make the error bound a little tighter by performing for example some grid search. In the same manner one can envision optimizing the parameter γ of the estimator. Proposition 9 Let Assumption 4 hold and assume that for any t ∈ Iε0 , vt = 0. Take the function ℓ in (4) to be the square function, ℓ(a) = a2 . For all ε > 0, if |Iεc | ≥ 1 then there exists a sequence {vt } such that θo ∈ / Ψmce (Z N ) N when Z is generated from (1) under the action of {vt }. x⊤ t (θ |Iε0 | N Remark 10 The bound (16) allows for some degree of freedom in the choice of the parameter α. For a given function ℓ assumed to be invertible on R+ , a better bound can, in principle, be obtained as    1 −1 1 1 min ℓ ln γαℓ µ(γℓ(ε), ε, α) α∈]0,1] αrx + ρα (X) − 1 t=1 h i 0 1 −z |Iε | ρ (X)+e −1 α −z N + ρα (X) − 1 1 + e 1 + e−z |Iε0 | o (19) for some α ∈ ]0, 1]. Then for any θ⋆ ∈ arg maxθ∈Rn Vbφ1 (yt , ŷt (θ)) with φ1 defined as in (18), it holds that λt xt = 0 kθ⋆ − θo k2 ≤ t∈Iεc with λt = exp(−γℓ(vt ))vt . Clearly, it is possible to find a nonzero sequence {vt } which does not meet this condition. Hence θo cannot be in Ψmce (Z N ) for an arbitrary {vt : t ∈ Iεc } no matter how small the cardinality of Iεc is. ✷ 3.4   1 1 ln γ1 αrx µ(γ1 ε, ε, α) (20) Gaussian kernel The most used form of correntropy is the one based on the Gaussian kernel which, by omitting the normalizing 7 which can be written in the form (1) with θo = [0.5 −1 0.2]⊤ and xt = [ut ut−1 ut−2 ]⊤ . For the data- factor, can be written in the form φ2 (y, ŷ) = exp(−γ2 (y − ŷ)2 ) (21) iid generation experiment, assume that {ut } ∼ N (0, 1) i.e., {ut } is sampled independently and identically from a zero-mean Gaussian distribution of unit variance. As for the noise signal {vt }, it is defined as vt = et + ft with γ2 > 0. We will refer to the associated estimator as the maximum Gaussian correntropy estimator (MCEG). Here, the function ℓ is defined by ℓ(a) = a2 and according to Lemma 3, it satisfies the properties P1-P4. In particular, P4 is satisfied with αℓ = 1/2. Moreover ℓ is clearly monotonic on R+ . As a consequence, we get a corollary of Theorem 8 as follows. iid with {et } ∼ U([−ε, ε]) where U refers to the uniform distribution and {ft } is a sequence of sparse noise with only a few nonzero elements (which are otherwise not constrained in magnitude); the nonzero elements of {ft } are here sampled from N (50, 10). Corollary 12 (Gaussian kernel) Let Iε0 be defined as in Theorem 8. Assume that the following condition is satisfied 0 1 −γ2 ε2 |Iε | >1 2 ρα (X) + e −γ ε N 1+e 2 4.1 We generate N = 300 data pairs (xt , yt ) and carry out a comparison between three estimators: on the one hand, the maximum Laplacian correntropy estimator (MCEL) and the maximum Gaussian correntropy estimator (MCE-G) and on the other hand, the Least Absolute Deviation (LAD) estimator (which is also called ℓ1 estimator). Recall that MCE-G and MCE-L involve non convex optimization. Here they are heuristically implemented as a reweighted iterative least squares estimator and as a reweighted ℓ1 estimator respectively. The results are represented in Figure 1 in term of average estimation error. What this suggests is that for fixed values of the design parameters γ1 and γ2 (see Eqs (18) and (21) for the roles of these parameters), LAD and MCE-L enjoy a similar performance for small amount of noise. But as the noise level increases, LAD shows better stability capabilities than the MCE-L. Note that overall MCE-G tends to perform best in the setting of this experiment as long as the magnitude of the dense noise is reasonable (SNR larger than 2.8 dB). A possible justification for this is that squaring errors that contain outliers as in (21) cancel out their influence more forcefully than just taking their absolute value as in (18). (22) for some α ∈ ]0, 1]. Then for any θ⋆ ∈ arg maxθ∈Rn Vbφ2 (yt , ŷt (θ)), it holds that  1/2  2 1 1 . ln kθ − θ k2 ≤ αrx γ2 µ(γ2 ε2 , ε, α) ⋆ 3.5 o (23) A remark on the error-in-variables scenario We now consider the situation where only a noisy observation x̄t = xt + wt of the regressor vector xt in (1) is available for prediction. This scenario is referred to as the robust error-in-variable (EIV) regression problem. Then the predictor output is given by ŷt (θ) = x̄⊤ t θ. Indeed Theorem 8 remains valid for this case. To see this note that the system equation (1) can be rewritten as 4.2 where v̄t = vt − wt⊤ θo . Then clearly the theorem applies to the EIV scenario with {xt } and {vt }, replaced respectively by {x̄t } and {v̄t }. One limitation however in this case is that for a given ε ≥ 0, the cardinality of the set Iε0 = {t ∈ I : |v̄t | ≤ ε} is likely to be much smaller than in the situation where the regressors are noise-free. Numerical experiments The purpose of this section is to provide a numerical illustration of the richness measure (8) and of the estimation error bound (16). The system example considered for the experiment is of an FIR-type and is given by yt = 0.5ut − ut−1 + 0.2ut−2 + vt Estimation of richness measure ρα (X) We provide a graphical representation of how the informativity measure ρα (X) may, for a given data matrix X ∈ Rn×N , evolve with respect to the dimensions N/n of X and the demanded degree α of richness (See Figure 2). The estimated range for ρα (X) is based on Eq. (12). Here X is formed from an FIR-type of regressors with an input sampled from a zero-mean and unit variance Gaussian distribution. Our experiments in this specific study tend to suggest that ρα (X) is a non decreasing function of the ratio N/n and a decreasing function of α. Moreover, the estimated range (gray regions in Fig. 2) gets wider when n is large. o yt = x̄⊤ t θ + v̄t 4 Illustration of estimates 4.3 Estimates of error bounds The goal here is twofold: (i) illustrate the variation of the estimation error bounds with respect to the magnitude of the dense noise in the special cases (20) and (23); (24) 8 increasing rate of the bound corresponding to MCE-L is larger than that of MCE-G for the current setting. Note that the computation of bounds made here is not connected to the experiment of Section 4.1. placements 0.6 LAD 0.5 MCE-L MCE-G 2.5 0.4 0.3 Bound MCE-L Bound MCE-G 2 0.2 Bounds Error 0.7 0.1 1.5 1 0 0 0.2 0.4 0.6 0.8 1 1.2 ε 1.4 1.6 PSfrag replacements 0.5 Bounds Figure 1. Comparison of the estimators MCE-L, MCE-G and LAD. Evolution of the (average) estimation error in function of the level ε of noise. The range [0, 1.6] of ε corresponds indeed to a range of about [2, +∞] for the signal-to-noise ratio in this experiment. The results are obtained from a Monte-Carlo simulation of size 1000. For each experiment, the proportion of outliers is maintained fixed and equal to 50%. Design parameters: γ1 = 0.5 and γ2 = 0.25. 0 0 0.05 0.1 0.15 0.2 ε Figure 3. Illustration of increasing rates of the error bounds. Results obtained by assuming that γℓ(ε) = 0.2, |Iε0 |/N = 0.8, ρα (X) = 0.8, α = 0.6 in both cases. These values are chosen independently of a specific data matrix X but in such a way that (19) and (22) are satisfied. 1 Comparing theoretical bounds and empirical errors. It might be instructive to see how far away the theoretical error bounds may be from the empirical values. To study this aspect, let us consider a numerical experiment with a similar data-generating process as described in the beginning of Section 4. The dense noise level is set to ε = 0.05 which gives an SNR of about 25 dB and the proportion of outliers is set to 10% (which is small enough to enforce condition (13)). One difficulty in evaluating the theoretical bounds is that this requires evaluating ρα (X) which, as already discussed in Section 3.1, is a hard problem. Hence, ρα (X) is replaced here with the mean value of the lower and upper estimates displayed in (12). We then let the number N of data vary from 500 to 5000 and plot the empirical errors along with the bounds from (20) and (23) in Figure 4. ρα (X) 0.8 g replacements 0.6 0.4 0.2 0 0.2 0.4 α 0.6 0.8 (a) X ∈ R2×200 1 ρα (X) 0.8 g replacements 0.6 0.4 It is fair to observe that the theoretical bounds are conservative in the sense that they are generally higher than the true empirical errors. Here the ratio between the bounds and the true errors is about 30. Conservativeness is indeed a common feature for these types of results due to the various inequalities employed for the derivation. Nevertheless, the main interest of Theorem 8 is that it provides a sufficient condition for the robustness of the maximum correntropy estimator, a condition that depends explicitly on the degree of informativity of the regression data and on the proportion of outliers. Moreover, by expressing error bounds which involve explicitly the design parameters, the theorem gives insights into how to tune those parameters with the aim to improve estimation performance. A further remark one can make is that the general formula for the error bound in (16) has a kind of universal 0.2 0 0.2 0.4 α 0.6 0.8 (b) X ∈ R3×6000 Figure 2. Estimates of ρα (X) as a function of α ∈ [0, 1]. The true values of ρα (X) lie in the region depicted in gray color. (ii) assess how conservative the derived theoretical error bounds may be with respect to the empirical errors. Increasing rates of the bounds. If for each level ε of noise, we select the parameter γ such that the product γℓ(ε) is kept constant, then the error bounds corresponding to both MCE-L and MCE-G have a linear rate of change with respect to ε as depicted in Figure 3. The 9 [3] R. K. Boel, M. R. James, and I. R. Petersen. Robustness and risk-sensitive filtering. IEEE Transactions on Automatic Control, 47:451–461, 2002. 0 log10 (kθ ⋆ − θ o k2 ) -0.5 MCE-L MCE-G Bound MCE-L Bound MCE-G -1 -1.5 placements [4] E. Candès and P. A. Randall. Highly robust error correction by convex programming. IEEE Transactions on Information Theory, 54:2829–2840, 2006. [5] B. Chen, X. Liu, H. Zhao, N. Zheng, and J. Principe. Insights into the robustness of minimum error entropy estimation. IEEE Transactions on Neural Networks and Learning Systems (To appear), 2016. -2 [6] B. Chen, L.Xing, H. Zhao, B. Xu, and J. C. Principe. Robustness of maximum correntropy estimation against large outliers. https://arxiv.org/abs/1703.08065, 2017. -2.5 [7] B. Chen, L. Xing, J. Liang, N. Zheng, and J. C. Principe. Steady-state mean-square error analysis for adaptive filtering under the maximum correntropy criterion. IEEE Signal Processing Letters, 21:880–884, 2014. -3 0 1000 2000 3000 4000 5000 N [8] S. Dey and J. B. Moore. Risk-sensitive filtering and smoothing via reference probability methods. IEEE Transactions on Automatic Control, 42:1587–1591, 1997. Figure 4. Comparison of theoretical bounds and empirical errors kθ⋆ − θo k2 . Results obtained with an estimate of ρα (X) for α = 0.6, ε = 0.05 (i.e., SNR = 25 dB), γℓ(ε) = 0.2, |Iε0 |/N = 0.9. The results are obtained from a Monte-Carlo simulation of size 1000. [9] Y. Feng, X. Huang, L. Shi, Y. Yang, and J. A.K. Suykens. Learning with the maximum correntropy criterion induced losses for regression. Journal of Machine Learning Research, 16:993–1034, 2015. feature in the following sense: since the bound does not involve the magnitude of the true θo (for an FIR-type system for example), it is in principle valid regardless of θo . Hence the relative error will be as smaller as the norm of the to-be-estimated parameter vector θo is larger. [10] R. He, W.-S. Zheng, and B.-G. Hu. Maximum correntropy criterion for robust face recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33:1561–1576, 2011. [11] P. J. Huber and E. M. Ronchetti. Robust Statistics. A. John Wiley & Sons, Inc. Publication (2nd Ed), 2009. 5 Conclusion [12] W Liu, P. P. Pokharel, and J. C. Principe. Correntropy: Properties and aplications in non-gaussian signal processing. IEEE Transactions on Signal Processing, 55(11):5286–5298, 2007. In this paper we have proposed an analysis of the robustness properties of a correntropy maximization framework for regression problems. The class of estimators considered is quite general and include the Gaussian and Laplacian kernels as special cases. The contribution of the work consists in (i) deriving an appropriate notion of richness for the regression data; (ii) proving stability of the considered class of estimators under the derived richness condition when the data are subject to dense and sparse noise (outliers). Our main result states that if the regression data are rich enough and if the number of outliers is small in some sense, then the parametric estimation error is bounded. The results come with explicit bounds which, in default of being exactly computable, can be estimated with computable estimates. [13] L. Ljung. System Identification: Theory for the user (2nd Ed.). PTR Prentice Hall., Upper Saddle River, USA, 1999. [14] R. A. Maronna, R. D. Martin, and V. J. Yohai. Robust Statistics: Theory and Methods. John Wiley & Sons, Inc., 2006. [15] J. C. Principe, editor. Information Theoretic Learning: Renyi’s Entropy and Kernel Perspectives. New York: Springer Verlag, 2010. [16] P. J. Rousseeuw. Least median of squares regression. Journal of the American Statistical Association, 79:871–880, 1984. [17] P. J. Rousseeuw and A. M. Leroy. Robust Regression and Outlier Detection. John Wiley & Sons, Inc., 2005. [18] I. Santamaria, P. P. Pokharel, and J. C. Principe. Generalized correlation function: definition, properties, and application to blind equalization. IEEE Transactions on Signal Processing, 54:2187–2197, 2006. Acknowledgements [19] B. Schölkopf and A. J. Smola. Learning with Kernels Support Vector Machines, Regularization, Optimization and Beyond. MIT Press, Cambridge, MA, 2002. The author is grateful to the Associate Editor and the anonymous reviewers for constructive feedback. [20] F. Zhang. Matrix Theory: Basic Results and Techniques. Springer: New York, 1999. References [1] L. Bako. On a class of optimization-based robust estimators. IEEE Transactions on Automatic Control (To appear), 2017. [2] L. Bako and H. Ohlsson. Analysis of a nonsmooth optimization approach to robust estimation. Automatica, 66:132–145, 2016. 10
3cs.SY
Generating Natural Language Inference Chains Vladyslav Kolesnyk and Tim Rocktäschel and Sebastian Riedel University College London London, UK arXiv:1606.01404v1 [cs.CL] 4 Jun 2016 [email protected], {t.rocktaschel,s.riedel}@cs.ucl.ac.uk Abstract The ability to reason with natural language is a fundamental prerequisite for many NLP tasks such as information extraction, machine translation and question answering. To quantify this ability, systems are commonly tested whether they can recognize textual entailment, i.e., whether one sentence can be inferred from another one. However, in most NLP applications only single source sentences instead of sentence pairs are available. Hence, we propose a new task that measures how well a model can generate an entailed sentence from a source sentence. We take entailment-pairs of the Stanford Natural Language Inference corpus and train an LSTM with attention. On a manually annotated test set we found that 82% of generated sentences are correct, an improvement of 10.3% over an LSTM baseline. A qualitative analysis shows that this model is not only capable of shortening input sentences, but also inferring new statements via paraphrasing and phrase entailment. We then apply this model recursively to input-output pairs, thereby generating natural language inference chains that can be used to automatically construct an entailment graph from source sentences. Finally, by swapping source and target sentences we can also train a model that given an input sentence invents additional information to generate a new sentence. 1 Introduction The ability to determine entailment or contradiction between natural language text is essential for improving the performance in a wide range of natural language processing tasks. Recognizing Textual Entailment (RTE) is a task primarily designed to determine whether two natural language sentences are independent, contradictory or in an entailment relationship where the second sentence (the hypothesis) can be inferred from the first (the premise). Although systems that perform well in RTE could potentially be used to improve question answering, information extraction, text summarization and machine translation [6], only in few of such downstream NLP tasks sentence-pairs are actually available. Usually, only a single source sentence (e.g. a question that needs to be answered or a source sentence that we want to translate) is present and models need to come up with their own hypotheses and commonsense knowledge inferences. The release of the large Stanford Natural Language Inference (SNLI) corpus [2] allowed end-to-end differentiable neural networks to outperform feature-based classifiers on the RTE task [3, 4, 12, 15, 17]. In this work, we go a step further and investigate how well recurrent neural networks can produce true hypotheses given a source sentence. Furthermore, we qualitatively demonstrate that by only training on input-output pairs and recursively generating entailed sentence we can generate natural language inference chains (see Figure 1 for an example). Note that every inference step is interpretable as it is mapping one natural language sentence to another one. Our contributions are fourfold: (i) we propose Young blond woman putting her foot into a water fountain → A person is dipping her foot into water. → A person is wet. Figure 1: Example of a natural language inference chain that is generated from the first sentence. an entailment generation task based on the SNLI corpus (§2.1), (ii) we investigate a sequence-tosequence model and find that 82% of generated sentences are correct (§3.2), (iii) we demonstrate the ability to generate natural language inference chains trained solely from entailment pairs (§3.3), and finally (iv) we can also generate sentences with more specific information by swapping source and target sentences during training (§3.4). 2 Method In the section, we briefly introduce the entailment generation task and our sequence-to-sequence model. 2.1 Entailment Generation To create the entailment generation dataset, we simply filter the Stanford Natural Language Inference corpus for sentence-pairs of the entailment class. This results in a training set of 183, 416 sentence pairs, a development set of 3, 329 pairs and a test of 3, 368 pairs. Instead of a classification task, we can now use this dataset for a sequence transduction task. 2.2 Sequence-to-Sequence Sequence-to-sequence recurrent neural networks [14] have been successfully employed for many sequence transduction tasks in NLP such as machine translation [1, 5], constituency parsing [16], sentence summarization [13] and question answering [7]. They consist of two recurrent neural networks (RNNs): an encoder that maps an input sequence of words into a dense vector representation, and a decoder that conditioned on that vector representation generates an output sequence. Specifically, we use long short-term memory (LSTM) RNNs [8] for encoding and decoding. Furthermore, we experiment with wordby-word attention [1], which allows the decoder to search in the encoder outputs to circumvent the LSTM’s memory bottleneck. We use greedy decoding at test time. The success of LSTMs with attention in sequence transduction tasks makes them a natural choice as a baseline for entailment generation, and we leave the investigation of more advanced models to future work. 2.3 Optimization and Hyperparameters We use stochastic gradient descent with a minibatch size of 64 and the ADAM optimizer [9] with a first momentum coefficient of 0.9 and a second momentum coefficient of 0.999. Word embeddings are initialized with pre-trained word2vec vectors [10]. Out-of-vocabulary words (10.5%) are randomly initialized √ √ by sampling values uniformly from [− 3, 3] and optimized during training. Furthermore, we clip gradients using a norm of 5.0. We stop training after 25 epochs. 3 Experiments and Results We present results for various tasks: (i) given a premise, generate a sentence that can be inferred from the premise, (ii) construct inference chains by recursively generating sentences, and (iii) given a sentence, create a premise that would entail this sentence, i.e., make a more descriptive sentence by adding specific information. 3.1 Quantitative Evaluation We train an LSTM with and without attention on the training set. After training, we take the best model in terms of BLEU score [11] on the development set and calculate the BLEU score on the test set. To our surprise, we found that using attention yields only a marginally higher BLEU score (43.1 vs. 42.8). We suspect that this is due to the fact that generating entailed sentences has a larger space of valid target sequences, which makes the use of BLEU problematic and penalizes correct solutions. Hence, we manually annotated 100 random test sentences and decided whether the generated sentence can indeed be inferred from the source sentence. We found that sentences generated by an LSTM with attention are substantially more accurate (82% accuracy) than those generated from an LSTM baseline (71.7%). To gain more insights into the model’s capabilities, we turn to a thorough qualitative 1. He is driving a beautiful red car. → A man is driving a car. 2. Two men and a woman finishing a meal and drinks. → Three people are eating together. 3. A father holds a new born baby. → A man holds his baby. Figure 2: Valid sentences generated by the model. 1. A female gymnast in black and red being coached on bar skills. → A female is in a bar. 2. A dog drops a yellow disc on a beach. → The dog drops a red disc. 1. First time a computer Go program has beaten a 9-dan professional without handicaps. → A person is using a computer. 2. Competitors must be dressed in suitable ten nis attire that is almost entirely white. → The tennis player is wearing white. 3. The athletes run by the harbour during the Haspa Hamburg marathon. → The runners are outside. 4. Space travellers gaze up and strain to find the blue dot in their sky. → There are people looking at the sky. Figure 4: Generated sentences from external sources: (1) Wikipedia, (2) wimbledon.com, (3) a news article, (4) ”The Frontier is Everywhere” by Carl Sagan. Figure 3: Invalid sentences generated by the model. analysis of the attention LSTM model in the remainder of this paper. 3.2 Example Generations Figure 2 shows examples of generated sentences from the development set. Syntactic simplification of the input sentence seems to be the most common approach. The model removes certain parts of the premise such as adjectives, resulting in a more abstract sentence (see Figure 2.1). Figure 2.2 demonstrates that the system can recognize the number of subjects in the sentence and includes this information in the generated sentence. However, we did not observe such ’counting’ behavior for more than four subjects, indicating that the system memorized frequency patterns from the training set. Furthermore, we found predictions that hint to common-sense assumptions: if a sentence talks about a father holding a newborn baby, it is most likely that the newborn baby is his own child (Example 2.3). Limitations Two reappearing limitations of the proposed model are related to dealing with words that have a very different meaning but similar word2vec embeddings (e.g. colors), as well as ambiguous words. For instance, ’bar’ in Figure 3.1 refers to pole vault and not a place in which you can have a drink. Substituting one color by another one (Figure 3.2) is a common mistake. Out-of-Corpus Examples The SNLI corpus might not reflect the variety of sentences that can be encountered in downstream NLP tasks. In Figure 4 we present generated sentences for randomly selected examples of out-of-domain textual resources. They demonstrate that the model generalizes well to out-of-domain sentences, making it a potentially very useful component for improving systems for question answering, information extraction, sentence summarization etc. 3.3 Inference Chain Generation Next, we test how well the model can generate inference chains by repeatedly passing generated output sentences as inputs to the model. We stop once a sentence has already been generated in the chain. Figure 5 shows that this works well despite that the model was only trained on sentence-pairs. Furthermore, by generating inference chains for all sentences in the development set we construct an entailment graph. In that graph we found that sentences with shared semantics are eventually mapped to the same sentence that captures the shared meaning. 1. Two girls sit by a lake. → Two girls are sitting on a ledge in front of a lake. 1. People are celebrating a victory on the square. → People are celebrating. → People are happy. → The people are smil ing. ← People are smiling. ← Some people smiling. ← couple smiling ← A bride and groom smiles. ← A wedding party looks happy on the picture. 2. The athletes run at the start of the Haspa Hamburg marathon. → The runners are at the race. → There are runners at the race. → There are people running. → People are running. ← People are running outside. ← People are running away from the bear. Figure 5: Examples of inference chains where two premises (underlined) converge to the same sentence (highlighted). Figure 6: Topology of the generated entailment graph. A visualization of the topology of the entailment graph is shown in Figure 6. Note that there are several long inference chains, as well as large clusters of sentences (nodes) that are mapped (links) to the same shared meaning. 3.4 Inverse Inference By swapping the source and target sequences for training, we can train a model that given a sentence invents additional information to generate a new sentence (Figure 7). We believe this might prove useful to increase the language variety and 2. Two girls are playing chess → Two girls playing chess in a restaurant. 3. A woman is outside. → A woman is walking down a street in a city. → A woman in a black skirt walks down a city street. Figure 7: Generated sentences for the inverse task. complexity of AI unit tests such as the Facebook bAbI task [18], but we leave this for future work. 4 Conclusion and Future Work We investigated the ability of sequence-tosequence models to generate entailed sentences from a source sentence. To this end, we trained an attentive LSTM on entailment-pairs of the SNLI corpus. We found that this works well and generalizes beyond in-domain sentences. Hence, it could become a useful component for improving the performance of other NLP systems. We were able to generate natural language inference chains by recursively generating sentences from previously inferred ones. This allowed us to construct an entailment graph for sentences of the SNLI development corpus. In this graph, the shared meaning of two related sentences is represented by the first natural language sentence that connects both sentences. Every inference step is interpretable as it maps a natural language sentence to another one. Towards high-quality data augmentation, we experimented with reversing the generation task. We found that this enabled the model to learn to invent specific information. For future work, we want to integrate the presented model into larger architectures to improve the performance of downstream NLP tasks such as information extraction and question answering. Furthermore, we plan to use the model for data augmentation to train expressive neural networks on tasks where only little annotated data is available. Another interesting research direction is to investigate methods for increasing the diversity of the generated sentences. Acknowledgments We thank Guillaume Bouchard for suggesting the reversed generation task, and Dirk Weissenborn, Isabelle Augenstein and Matko Bosnjak for comments on drafts of this paper. This work was supported by Microsoft Research through its PhD Scholarship Programme, an Allen Distinguished Investigator Award, and a Marie Curie Career Integration Award. References [1] D. Bahdanau, K. Cho, and Y. Bengio. Neural machine translation by jointly learning to align and translate. In ICLR, 2015. [2] S. R. Bowman, G. Angeli, C. Potts, and C. D. Manning. A large annotated corpus for learning natural language inference. In EMNLP, 2015. [3] S. R. Bowman, J. Gauthier, A. Rastogi, R. Gupta, C. D. Manning, and C. Potts. A fast unified model for parsing and sentence understanding. In ACL, 2016. [4] J. Cheng, L. Dong, and M. Lapata. Long short-term memory-networks for machine reading. arXiv preprint arXiv:1601.06733, 2016. [5] K. Cho, B. Van Merriënboer, C. Gulcehre, D. Bahdanau, F. Bougares, H. Schwenk, and Y. Bengio. Learning phrase representations using rnn encoder-decoder for statistical machine translation. arXiv preprint arXiv:1406.1078, 2014. [6] I. Dagan, O. Glickman, and B. Magnini. The pascal recognising textual entailment challenge. In Machine learning challenges. evaluating predictive uncertainty, visual object classification, and recognising tectual entailment, pages 177–190. Springer, 2006. [7] K. M. Hermann, T. Kocisky, E. Grefenstette, L. Espeholt, W. Kay, M. Suleyman, and P. Blunsom. Teaching machines to read and comprehend. In NIPS, pages 1684–1692, 2015. [8] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9 (8):1735–1780, 1997. [9] D. Kingma and J. Ba. Adam: A method for stochastic optimization. In ICLR, 2015. [10] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean. Distributed representations of words and phrases and their compositionality. In NIPS, pages 3111–3119, 2013. [11] K. Papineni, S. Roukos, T. Ward, and W.-J. Zhu. Bleu: a method for automatic evaluation of machine translation. In ACL, pages 311–318, 2002. [12] T. Rocktäschel, E. Grefenstette, K. M. Hermann, T. Kočiskỳ, and P. Blunsom. Reasoning about entailment with neural attention. In ICLR, 2016. [13] A. M. Rush, S. Chopra, and J. Weston. A neural attention model for abstractive sentence summarization. In EMNLP, 2015. [14] I. Sutskever, O. Vinyals, and Q. V. Le. Sequence to sequence learning with neural networks. In NIPS, pages 3104–3112, 2014. [15] I. Vendrov, R. Kiros, S. Fidler, and R. Urtasun. Order-embeddings of images and language. In ICLR, 2016. [16] O. Vinyals, L. Kaiser, T. Koo, S. Petrov, I. Sutskever, and G. Hinton. Grammar as a foreign language. In NIPS, pages 2755–2763, 2015. [17] S. Wang and J. Jiang. Learning Natural Language Inference with LSTM. In NAACL, 2016. [18] J. Weston, A. Bordes, S. Chopra, and T. Mikolov. Towards ai-complete question answering: A set of prerequisite toy tasks. In ICLR, 2016.
9cs.NE
Approximating LZ77 via Small-Space Multiple-Pattern Matching Johannes Fischer∗1 , Travis Gagie2 , Pawel Gawrychowski†3 , and Tomasz Kociumaka‡3 arXiv:1504.06647v2 [cs.DS] 10 Sep 2015 1 TU Dortmund, Germany [email protected] 2 Helsinki Institute for Information Technology (HIIT), Department of Computer Science, University of Helsinki, Finland [email protected] 3 Institute of Informatics, University of Warsaw, Poland {gawry,kociumaka}@mimuw.edu.pl March 27, 2018 Abstract We generalize Karp-Rabin string matching to handle multiple patterns in O(n log n + m) time and O(s) space, where n is the length of the text and m is the total length of the s patterns, returning correct answers with high probability. As a prime application of our algorithm, we show how to approximate the LZ77 parse of a string of length n. If the optimal parse consists of z phrases, using only O(z) working space we can return a parse consisting of at most (1+ε)z phrases in O(ε−1 n log n) time, for any ε ∈ (0, 1]. As previous quasilinear-time algorithms for LZ77 use Ω(n/poly log n) space, but z can be exponentially small in n, these improvements in space are substantial. 1 Introduction Multiple-pattern matching, the task of locating the occurrences of s patterns of total length m in a single text of length n, is a fundamental problem in the field of string algorithms. The algorithm by Aho and Corasick [2] solves this problem using O(n+m) time and O(m) working space in addition to the space needed for the text and patterns. To list all occ occurrences rather than, e.g., the leftmost ones, extra O(occ) time is necessary. When the space is limited, we can use a compressed Aho-Corasick automaton [11]. In extreme cases, one could apply a linear-time constant-space single-pattern matching algorithm sequentially for each pattern in turn, at the cost of increasing the running time to O(n · s + m). Well-known examples of such algorithms include those by Galil and Seiferas [8], Crochemore and Perrin [5], and Karp and Rabin [13] (see [3] for a recent survey). It is easy to generalize Karp-Rabin matching to handle multiple patterns in O(n + m) expected time and O(s) working space provided that all patterns are of the same length [10]. To do this, we store the fingerprints of the patterns in a hash table, and then slide a window over the text maintaining the fingerprint of the fragment currently in the window. The hash table lets us check if the fragment is an occurrence of a pattern. If so, we report it and update the hash table so that every pattern is returned at most once. This is a very ∗ Supported by Academy of Finland grant 268324. done while the author held a post-doctoral position at Warsaw Center of Mathematics and Computer Science. ‡ Supported by Polish budget funds for science in 2013-2017 as a research project under the ‘Diamond Grant’ program. † Work 1 simple and actually applied idea [1], but it is not clear how to extend it for patterns with many distinct lengths. In this paper we develop a dictionary matching algorithm which works for any set of patterns in O(n log n + m) time and O(s) working space, assuming that read-only random access to the text and the patterns is available. If required, we can compute for every pattern its longest prefix occurring in the text, also in O(n log n + m) time and O(s) working space. In a very recent independent work Clifford et al. [4] gave a dictionary matching algorithm in the streaming model. In this setting the patterns and later the text are scanned once only (as opposed to read-only random access) and an occurrence needs to be reported immediately after its last character is read. Their algorithm uses O(s log `) space and takes O(log log(s + `)) time per character where ` is the length of the longest pattern ( m s ≤ ` ≤ m). Even though some of the ideas used in both results are similar, one should note that the streaming and read-only models are quite different. In particular, computing the longest prefix occurring in the text for every pattern requires Ω(m log min(n, |Σ|)) bits of space in the streaming model, as opposed to the O(s) working space achieved by our solution in the read-only setting. As a prime application of our dictionary matching algorithm, we show how to approximate the LempelZiv 77 (LZ77) parse [18] of a text of length n using working space proportional to the number of phrases (again, we assume read-only random access to the text). Computing the LZ77 parse in small space is an issue of high importance, with space being a frequent bottleneck of today’s systems. Moreover, LZ77 is useful not only for data compression, but also as a way to speed up algorithms [15]. We present a general approximation algorithm working in O(z) space for inputs admitting LZ77 parsing with z phrases. For any ε ∈ (0, 1], the algorithm can be used to produce a parse consisting of (1 + ε)z phrases in O(ε−1 n log n) time. To the best of our knowledge, approximating LZ77 factorization in small space has not been considered before, and our algorithm is significantly more efficient than methods producing the exact answer. A recent sublinear-space algorithm, due to Kärkkäinen et al. [12], runs in O(nd) time and uses O(n/d) space, for any parameter d. An earlier online solution by Gasieniec et al. [9] uses O(z) space and takes O(z 2 log2 z) time for each character appended. Other previous methods use significantly more space when the parse is small relative to n; see [7] for a recent discussion. Structure of the paper. Sect. 2 introduces terminology and recalls several known concepts. This is followed by the description of our dictionary matching algorithm. In Sect. 3 we show how to process patterns of length at most s and in Sect. 4 we handle longer patterns, with different procedures for repetitive and non-repetitive ones. In Sect. 5 we extend the algorithm to compute, for every pattern, the longest prefix occurring in the text. Finally, in Sect. 7, we apply the dictionary matching algorithm to construct an approximation of the LZ77 parsing, and in Sect. 6 we explain how to modify the algorithms to make them Las Vegas. Model of computation. Our algorithms are designed for the word-RAM with Ω(log n)-bit words and assume integer alphabet of polynomial size. The usage of Karp-Rabin fingerprints makes them Monte Carlo randomized: the correct answer is returned with high probability, i.e., the error probability is inverse polynomial with respect to input size, where the degree of the polynomial can be set arbitrarily large. With some additional effort, our algorithms can be turned into Las Vegas randomized, where the answer is always correct and the time bounds hold with high probability. Throughout the whole paper, we assume readonly random access to the text and the patterns, and we do not include their sizes while measuring space consumption. 2 Preliminaries We consider finite words over an integer alphabet Σ = {0, . . . , σ − 1}, where σ = poly(n + m). For a word w = w[1] . . . w[n] ∈ Σn , we define the length of w as |w| = n. For 1 ≤ i ≤ j ≤ n, a word u = w[i] . . . w[j] is called a subword of w. By w[i..j] we denote the occurrence of u at position i, called a fragment of w. A fragment with i = 1 is called a prefix and a fragment with j = n is called a suffix. 2 A positive integer p is called a period of w whenever w[i] = w[i + p] for all i = 1, 2, . . . , |w| − p. In this case, the prefix w[1..p] is often also called a period of w. The length of the shortest period of a word w is |w| denoted as per(w). A word w is called periodic if per(w) ≤ |w| 2 and highly periodic if per(w) ≤ 3 . The well-known periodicity lemma [6] says that if p and q are both periods of w, and p + q ≤ |w|, then gcd(p, q) is also a period of w. We say that word w is primitive if per(w) is not a proper divisor of |w|. Note that the shortest period w[1.. per(w)] is always primitive. 2.1 Fingerprints Our randomized construction is based on Karp-Rabin fingerprints; see [13]. Fix a word w[1..n] over an alphabet Σ = {0, . . . , σ−1}, a constant c ≥ 1, a prime number p > max(σ, nc+4 ), and choose x ∈ Zp uniformly at random. We define the fingerprint of a subword w[i..j] as Φ(w[i..j]) = w[i]+w[i+1]x+. . .+w[j]xj−i mod p. With probability at least 1 − n1c , no two distinct subwords of the same length have equal fingerprints. The situation when this happens for some two subwords is called a false-positive. From now on when stating the results we assume that there are no false-positives to avoid repeating that the answers are correct with high probability. For dictionary matching, we assume that no two distinct subwords of w = T P1 . . . Ps have equal fingerprints. Fingerprints let us easily locate many patterns of the same length. A straightforward solution described in the introduction builds a hash table mapping fingerprints to patterns. However, then we can only guarantee that the hash table is constructed correctly with probability 1 − O( s1c ) (for an arbitrary 1 constant c), and we would like to bound the error probability by O( (n+m) c ). Hence we replace hash table with a deterministic dictionary as explained below. Although it increases the time by O(s log s), the extra term becomes absorbed in the final complexities. Theorem 1. Given a text T of length n and patterns P1 , . . . , Ps , each of length exactly `, we can compute the the leftmost occurrence of every pattern Pi in T using O(n + s` + s log s) total time and O(s) space. Proof. We calculate the fingerprint Φ(Pj ) of every pattern. Then we build in O(s log s) time [16] a deterministic dictionary D with an entry mapping Φ(Pj ) to j. For multiple identical patterns we create just one entry, and at the end we copy the answers to all instances of the pattern. Then we scan the text T with a sliding window of length ` while maintaining the fingerprint Φ(T [i..i + ` − 1]) of the current window. Using D, we can find in O(1) time an index j such that Φ(T [i..i + ` − 1]) = Φ(Pj ), if any, and update the answer for Pj if needed (i.e., if there was no occurrence of Pj before). If we precompute x−1 , the fingerprints Φ(T [i..i + ` − 1]) can be updated in O(1) time while increasing i. 2.2 Tries A trie of a collection of strings P1 , . . . , Ps is a rooted tree whose nodes correspond to prefixes of the strings. The root represents the empty word and the edges are labeled with single characters. The node corresponding to a particular prefix is called its locus. In a compacted trie unary nodes that do not represent any Pi are dissolved and the labels of their incidents edges are concatenated. The dissolved nodes are called implicit as opposed to the explicit nodes, which remain stored. The locus of a string in a compacted trie might therefore be explicit or implicit. All edges outgoing from the same node are stored on a list sorted according to the first character, which is unique among these edges. The labels of edges of a compacted trie are stored as pointers to the respective fragments of strings Pi . Consequently, a compacted trie can be stored in space proportional to the number of explicit nodes, which is O(s). Consider two compacted tries T1 and T2 . We say that (possibly implicit) nodes v1 ∈ T1 and v2 ∈ T2 are twins if they are loci of the same string. Note that every v1 ∈ T1 has at most one twin v2 ∈ T2 . Lemma 2. Given two compacted tries T1 and T2 constructed for s1 and s2 strings, respectively, in O(s1 +s2 ) total time and space we can find for each explicit node v1 ∈ T1 a node v2 ∈ T2 such that if v1 has a twin in T2 , then v2 is its twin. (If v1 has no twin in T2 , the algorithm returns an arbitrary node v2 ∈ T2 ). 3 Proof. We recursively traverse both tries while maintaining a pair of nodes v1 ∈ T1 and v2 ∈ T2 , starting with the root of T1 and T2 satisfying the following invariant: either v1 and v2 are twins, or v1 has no twin in T2 . If v1 is explicit, we store v2 as the candidate for its twin. Next, we list the (possibly implicit) children of v1 and v2 and match them according to the edge labels with a linear scan. We recurse on all pairs of matched children. If both v1 and v2 are implicit, we simply advance to their immediate children. The last step is repeated until we reach an explicit node in at least one of the tries, so we keep it implicit in the implementation to make sure that the total number of operations is O(s1 + s2 ). If a node v ∈ T1 is not visited during the traversal, for sure it has no twin in T2 . Otherwise, we compute a single candidate for its twin. 3 Short Patterns To handle the patterns of length not exceeding a given threshold `, we first build a compacted trie for those patterns. Construction is easy if the patterns are sorted lexicographically: we insert them one by one into the compacted trie first naively traversing the trie from the root, then potentially partitioning one edge into two parts, and finally adding a leaf if necessary. Thus, the following result suffices to efficiently build the tries. Lemma 3. One can lexicographically sort strings P1 , . . . , Ps of total length m in O(m + σ ε ) time using O(s) space, for any constant ε > 0. √ Proof. We separately sort the m + σ ε/2 longest strings and all the remaining strings, and then merge both sorted lists. Note these longest strings can be found in O(s) time using a linear time selection algorithm. Long strings are sorted using insertion sort. If the longest common prefixes between adjacent (in the sorted order) strings are computed and stored, inserting Pj can be done in O(j + |Pj |) time. In more detail, let S1 , S2 , . . . , Sj−1 be the sorted list of already processed strings. We start with k := 1 and keep increasing k by one as long as Sk is lexicographically smaller than Pj while maintaining the longest common prefix between Sk and Pj , denoted `. After increasing k by one, we update ` using the longest common prefix between Sk−1 and Sk , denoted `0 , as follows. If `0 > `, we keep ` unchanged. If `0 = `, we try to iteratively increase ` by one as long as possible. In both cases, the new value of ` allows us to lexicographically compare Sk and Pj in√constant time. Finally, `0 < ` guarantees that Pj < Sk and √ we may terminate the procedure. Sorting the m + σ ε/2 longest strings using this√approach takes O(m + ( m + σ ε/2 )2 ) = O(m + σ ε ) time. The remaining strings are of length at most m each, and if there are any, then s ≥ σ ε/2 . We sort these strings by iteratively applying radix sort, treating each symbol from Σ as a sequence of 2ε symbols from {0, 1, . . . , σ ε/2 − 1}. Then a single radix sort takes time and space proportional to the number of strings involved plus the alphabet size, which is O(s + σ ε/2 ) = O(s). Furthermore, because the numbers of strings √ involved in the subsequent radix sorts sum up to m, the total time complexity is O(m+σ ε/2 m) = O(m+σ ε ). Finally, the merging takes time linear in the sum of the lengths of all the involved strings, so the total complexity is as claimed. Next, we partition T into O( n` ) overlapping blocks T1 = T [1..2`], T2 = T [` + 1..3`], T3 = T [2` + 1..4`], . . .. Notice that each subword of length at most ` is completely contained in some block. Thus, we can consider every block separately. The suffix tree of each block Ti takes O(` log `) time [17] and O(`) space to construct and store (the suffix tree is discarded after processing the block). We apply Lemma 2 to the suffix tree and the compacted trie of patterns; this takes O(` + s) time. For each pattern Pj we obtain a node such that the corresponding subword is equal to Pj provided that Pj occurs in Ti . We compute the leftmost occurrence Ti [b..e] of the subword, which takes constant time if we store additional data at every explicit node of the suffix tree, and then we check whether Ti [b..e] = Pj using fingerprints. For this, we precompute the fingerprints of all patterns, and for each block Ti we precompute the fingerprints of its prefixes in O(`) time and space, which allows to determine the fingerprint of any of its subwords in constant time. 4 In total, we spend O(m + σ ε ) for preprocessing and O(` log ` + s) for each block. Since σ = (n + m)O(1) , for small enough ε this yields the following result. Theorem 4. Given a text T of length n and patterns P1 , . . . , Ps of total length m, using O(n log ` + s n` + m) total time and O(s + `) space we can compute the leftmost occurrences in T of every pattern Pj of length at most `. 4 Long Patterns To handle patterns longer than a certain threshold, we first distribute them into groups according to the value of blog4/3 |Pj |c. Patterns longer than the text can be ignored, so there are O(log n) groups. Each group is handled separately, and from now on we consider only patterns Pj satisfying blog4/3 |Pj |c = i. We classify the patterns into classes depending on the periodicity of their prefixes and suffixes. We set ` = d(4/3)i e and define αj and βj as, respectively, the prefix and the suffix of length ` of Pj . Since 4 2 3 (|αj | + |βj |) = 3 ` ≥ |Pj |, the following fact yields a classification of the patterns into three classes: either Pj is highly periodic, or αj is not highly periodic, or βj is not highly periodic. The intuition behind this classification is that if the prefix or the suffix is not repetitive, then we will not see it many times in a short subword of the text. On the other hand, if both the prefix and suffix are repetitive, then there is some structure that we can take advantage of. Fact 5. Suppose x and y are a prefix and a suffix of a word w, respectively. If |x| + |y| ≥ |w| + p and p is a period of both x and y, then p is a period of w. Proof. We need to prove that w[i] = w[i + p] for all i = 1, 2, . . . , |w| − p. If i + p ≤ |x| this follows from p being a period of x, and if i ≥ |w| − |y| + 1 from p being a period of y. Because |x| + |y| ≥ |w| + p, these two cases cover all possible values of i. To assign every pattern to the appropriate class, we compute the periods of Pj , αj and βj using small space. Roughly the same result has been proved in [14], but for completeness we provide the full proof here. Lemma 6. Given a read-only string w one can decide in O(|w|) time and constant space if w is periodic and if so, compute per(w). Proof. Let v be the prefix of w of length d 12 |w|e and p be the starting position of the second occurrence of v in w, if any. We claim that if per(w) ≤ 12 |w|, then per(w) = p − 1. Observe first that in this case v occurs at a position per(w) + 1. Hence, per(w) ≥ p − 1. Moreover p − 1 is a period of w[1..|v| + p − 1] along with per(w). By the periodicity lemma, per(w) ≤ 21 |w| ≤ |v| implies that gcd(p − 1, per(w)) is also a period of that prefix. Thus per(w) > p − 1 would contradict the primitivity of w[1.. per(w)]. The algorithm computes the position p using a linear time constant-space pattern matching algorithm. If it exists, it uses letter-by-letter comparison to determine whether w[1..p − 1] is a period of w. If so, by the discussion above per(w) = p − 1 and the algorithm returns this value. Otherwise, 2 per(w) > |w|, i.e., w is not periodic. The algorithm runs in linear time and uses constant space. 4.1 Patterns without Long Highly Periodic Prefix Below we show how to deal with patterns with non-highly periodic prefixes αj . Patterns with non-highly periodic suffixes βj can be processed using the same method after reversing the text and the patterns. Lemma 7. Let ` be an arbitrary integer. Suppose we are given a text T of length n and patterns P1 , . . . , Ps such that for 1 ≤ j ≤ s we have ` ≤ |Pj | < 43 ` and αj = Pj [1..`] is not highly periodic. We can compute the leftmost and the rightmost occurrence of each pattern Pj in T using O(n + s(1 + n` ) log s + s`) time and O(s) space. 5 The algorithm scans the text T with a sliding window of length `. Whenever it encounters a subword equal to the prefix αj of some Pj , it creates a request to verify whether the corresponding suffix βj of length ` occurs at the appropriate position. The request is processed when the sliding window reaches that position. This way the algorithm detects the occurrences of all the patterns. In particular, we may store the leftmost and rightmost occurrence of each pattern. We use the fingerprints to compare the subwords of T with αj and βj . To this end, we precompute Φ(αj ) and Φ(βj ) for each j. We also build a deterministic dictionary D [16] with an entry mapping Φ(αj ) to j for every pattern (if there are multiple patterns with the same value of Φ(αj ), the dictionary maps a fingerprint to a list of indices). These steps take O(s`) and O(s log s), respectively. Pending requests are maintained in a priority queue Q, implemented using a binary heap1 as pairs containing the pattern index (as a value) and the position where the occurrence of βj is anticipated (as a key). Algorithm 1: Processing patterns with non-highly periodic αj . 1 2 3 4 5 6 7 8 for i = 1 to n − ` + 1 do h := Φ(w[i..i + ` − 1]) foreach j : Φ(αj ) = h do add a request (i + |Pj | − `, j) to Q foreach request (i, j) ∈ Q at position i do if h = Φ(βj ) then report an occurrence of Pj at i + ` − |Pj | remove (i, j) from Q Algorithm 1 provides a detailed description of the processing phase. Let us analyze its time and space complexities. Due to the properties of Karp-Rabin fingerprints, line 2 can be implemented in O(1) time. Also, the loops in lines 3 and 5 takes extra O(1) time even if the respective collections are empty. Apart from these, every operation can be assigned to a request, each of them taking O(1) (lines 3 and 5-6) or O(log |Q|) (lines 4 and 8) time. To bound |Q|, we need to look at the maximum number of pending requests. Fact 8. For any pattern Pj just O(1 + pending. n `) requests are created and at any time at most one of them is Proof. Note that there is a one-to-one correspondence between requests concerning Pj and the occurrences of αj in T . The distance between two such occurrences must be at least 13 `, because otherwise the period of αj would be at most 13 `, thus making αj highly periodic. This yields the O(1 + n` ) upper bound on the total number of requests. Additionally, any request is pending for at most |Pj | − ` < 13 ` iterations of the main for loop. Thus, the request corresponding to an occurrence of αj is already processed before the next occurrence appears. Hence, the scanning phase uses O(s) space and takes O(n + s(1 + n` ) log s) time. Taking preprocessing into account, we obtain bounds claimed in Lemma 7. 4.2 Highly Periodic Patterns Lemma 9. Let ` be an arbitrary integer. Given a text T of length n and a collection of highly periodic patterns P1 , . . . , Ps such that for 1 ≤ j ≤ s we have ` ≤ |Pj | < 34 `, we can compute the leftmost occurrence of each pattern Pj in T using O(n + s(1 + n` ) log s + s`) total time and O(s) space. The solution is basically the same as in the proof of Lemma 7, except that the algorithm ignores certain shiftable occurrences. An occurrence of x at position i of T is called shiftable if there is another occurrence 1 Hash tables could be used instead of the heap and the deterministic dictionary. Although this would improve the time complexity in Lemma 7, the running time of the algorithm in Thm. 12 would not change and failures with probability inverse polynomial with respect to s would be introduced; see also a discussion before Thm. 1. 6 of x at position i − per(x). The remaining occurrences are called non-shiftable. Notice that the leftmost occurrence is always non-shiftable, so indeed we can safely ignore some of the shiftable occurrences of the patterns. Because 2 per(Pj ) ≤ 32 |Pj | ≤ 89 ` < `, the following fact implies that if an occurrence of Pj is non-shiftable, then the occurrence of αj at the same position is also non-shiftable. Fact 10. Let y be a prefix of x such that |y| ≥ 2 per(x). Suppose x has a non-shiftable occurrence at position i in w. Then, the occurrence of y at position i is also non-shiftable. Proof. Note that per(y) + per(x) ≤ |y| so the periodicity lemma implies that per(y) = per(x). Let x = ρk ρ0 where ρ is the shortest period of x. Suppose that the occurrence of y at position i is shiftable, meaning that y occurs at position i − per(x). Since |y| ≥ per(x), y occurring at position i − per(x) implies that ρ occurs at the same position. Thus w[i − per(x)..i + |x| − 1] = ρk+1 ρ0 . But then x clearly occurs at position i − per(x), which contradicts the assumption that its occurrence at position i is non-shiftable. Consequently, we may generate requests only for the non-shiftable occurrences of αj . In other words, if an occurrence of αj is shiftable, we do not create the requests and proceed immediately to line 5. To detect and ignore such shiftable occurrences, we maintain the position of the last occurrence of every αj . However, if there are multiple patterns sharing the same prefix αj1 = . . . = αjk , we need to be careful so that the time to detect a shiftable occurrence is O(1) rather than O(k). To this end, we build another deterministic dictionary, which stores for each Φ(αj ) a pointer to the variable where we maintain the position of the previously encountered occurrence of αj . The variable is shared by all patterns with the same prefix αj . It remains to analyze the complexity of the modified algorithm. First, we need to bound the number of non-shiftable occurrences of a single αj . Assume that there is a non-shiftable occurrence αj at positions i0 < i such that i0 ≥ i − 21 `. Then i − i0 ≤ 12 ` is a period of T [i0 ..i + ` − 1]. By the periodicity lemma, per(αj ) divides i − i0 , and therefore αj occurs at position i0 − per(αj ), which contradicts the assumption that the occurrence at position i0 is non-shiftable. Consequently, the non-shiftable occurrences of every αj are at least 12 ` characters apart, and the total number of requests and the maximum number of pending requests can be bounded by O(s(1 + n` )) and O(s), respectively, as in the proof of Lemma 7. Taking into the account the time and space to maintain the additional components, which are O(n + s log s) and O(s), respectively, the final bounds remain the same. 4.3 Summary Theorem 11. Given a text T of length n and patterns P1 , . . . , Ps of total length m, using O(n log n + m + s n` log s) total time and O(s) space we can compute the leftmost occurrences in T of every pattern Pj of length at least `. Proof. The algorithm distributes the patterns into O(log n) groups according to their lengths, and then into three classes according to their repetitiveness, which takes O(m) time and O(s) space in total. Then, it applies either Lemma 7 or Lemma 9 on every class. It remains to show that the running times of all those calls sum up to the claimed bound. Each of them can be seen as O(n) plus O(|Pj | + (1 + |Pnj | ) log s) per every pattern Pj . Because ` ≤ |Pj | ≤ n and there are O(log n) groups, this sums up to O(n log n+m+s n` log s). Using Thm. 4 for all patterns of length at most min(n, s), and (if s ≤ n) Thm. 11 for patterns of length at least s, we obtain our main theorem. Theorem 12. Given a text T of length n and patterns P1 , . . . , Ps of total length m, we can compute the leftmost occurrence in T of every pattern Pj using O(n log n + m) total time and O(s) space. 5 Computing Longest Occurring Prefixes In this section we extend Thm. 12 to compute, for every pattern Pj , its longest prefix occurring in the text. A straightforward extension uses binary search to compute the length `j of the longest prefix of Pj occurring 7 in T . All binary searches are performed in parallel, that is, we proceed in O(log n) phases. In every phase we check, for every j, if Pj [1..1 + `j ] occurs in T using Thm. 12 and then update the corresponding `j accordingly. This results in O(n log2 n + m) total time complexity. To avoid the logarithmic multiplicative overhead in the running time, we use a more complex approach requiring a careful modification of all the components developed in Sections 3 and 4. Short patterns. We proceed as in Sect. 3 while maintaining a tentative longest prefix occurring in T for every pattern Pj , denoted Pj [1..`j ]. Recall that after processing a block Ti we obtain, for each pattern Pj , a node such that the corresponding substring is equal to Pj provided that Pj occurs in Ti . Now we need a stronger property, which is that for any length k, `j ≤ k ≤ |Pj |, the ancestor at string depth k of that node (if any) corresponds to Pj [1..k] provided that Pj [1..k] occurs in Ti . This can be guaranteed by modifying the procedure described in Lemma 2: if a child of v1 has no corresponding child of v2 , we report v2 as the twin of all nodes in the subtree rooted at that child of v1 . (Notice that now the string depth of v1 ∈ T1 might be larger than the string depth of its twin v2 ∈ T2 , but we generate exactly one twin for every v1 ∈ T1 .) Using the stronger property we can update every `j by first checking if Pj [1..`j ] occurs in Ti , and if so incrementing `j as long as possible. In more detail, let Ti [b..e] denote the substring corresponding to the twin of Pj . If |Ti [b..e]| < `j , there is nothing to do. Otherwise, we check whether Ti [b..(b + `j − 1)] = Pj [1..`j ] using fingerprints, and if so start to naively compare Ti [b + `j ..e] and Pj [`j + 1..|Pj |]. Because in the end P n j `j ≤ m, updating every `j takes O(s ` + m) additional total time. Theorem 13. Given a text T of length n and patterns P1 , . . . , Ps of total length m, using O(n log `+s n` +m) total time and O(s + `) space we can compute the longest prefix occurring in T for every pattern Pj of length at most `. Long patterns. As in Sect. 4, we again distribute all patterns of length at least ` into groups. However, now for patterns in the i-th group (satisfying blog4/3 |Pj |c = i), we set gi = d(4/3)i e and additionally require that Pj [1..gi ] occurs in T . To verify that this condition is true, we process the groups in the decreasing order of the index i and apply Thm. 1 to prefixes Pj [1..gi ]. If for some pattern Pj the prefix fails to occur in T , we replace Pj setting Pj := Pj [1..gi − 1]. Observe that this operation moves Pj to a group with a smaller index (or makes Pj a short pattern). Additionally, note that in subsequent steps the length of Pj decreases geometrically, so the total length of patterns for which we apply Thm. 1 is O(m) and thus the total running time of this preprocessing phase is O(n log n + m) as long as ` ≥ log s. Hence, from now on we consider only patterns Pj belonging to the i-th group, i.e., such that gi ≤ |Pj | < 34 gi and Pj [1..gi ] occurs in T . As before, we classify patterns depending on their periodicity. However, now the situation is more complex, because we cannot reverse the text and the patterns. As a warm-up, we first describe how to process patterns Pj with a non-highly periodic prefix αj = Pj [1..`]. While not used in the final solution, this step allows us to gradually introduce all the required modifications. Then we show to process all highly periodic patterns, and finally move to the general case, where patters are not highly periodic. Patterns with a non-highly periodic prefix. We maintain a tentative longest prefix occurring in T for every pattern Pj , denoted Pj [1..`j ] and initialized with `j = `, and proceed as in Algorithm 1 with the following modifications. In line 4, the new request is (i + `j − ` + 1, j). In line 6, we compare h with Φ(Pj [(`j +2−`)..(`j +1)]). If these two fingerprints are equal, we have found an occurrence of Pj [1..`j +1]. In such case we try to further extend the occurrence by naively comparing Pj [`j +1..|Pj |] with the corresponding fragment of T and incrementing `j as long as the corresponding characters match. For every Pj we also need to maintain Φ(Pj [(`j + 2 − `)..(`j + 1)]), which can be first initialized in O(`) time and then updated in O(1) time whenever `j is incremented. Because at any time at most one request is pending for every pattern Pj (and thus, while updating `j no such request is pending), this modified algorithm correctly determines the longest occurring prefix for every pattern with non-highly periodic αj . Lemma 14. Let ` be an arbitrary integer. Suppose we are given a text T of length n and patterns P1 , . . . , Ps such that, for 1 ≤ j ≤ s, we have ` ≤ |Pj | < 43 ` and αj = Pj [1..`] is not highly periodic. We can compute 8 the longest prefix occurring in T for every pattern Pj using O(n + s(1 + n` ) log s + s`) total time using O(s) space. Highly periodic patterns. As in Sect. 4.2, we observe that all shiftable occurrences of the longest prefix of Pj occurring in T can be ignored, and therefore it is enough to consider only non-shiftable occurrences of αj (by the same argument, because that longest prefix is of length at least |αj |). Therefore, we can again use Algorithm 1 with the same modifications. As for non-highly periodic αj , we maintain a tentative longest prefix Pj [1..`j ] for every pattern Pj . Whenever a non-shiftable occurrence of αj is detected, we create a new request to check if `j can be incremented. If so, we start to naively compare Pj [1..`j + 1] with the corresponding fragment of T . The total time and space complexity remain unchanged. Lemma 15. Let ` be an arbitrary integer. Given a text T of length n and a collection of highly periodic patterns P1 , . . . , Ps such that, for 1 ≤ j ≤ s, we have ` ≤ |Pj | < 43 `, we can compute the longest prefix occurring in T for every pattern Pj using O(n + s(1 + n` ) log s + s`) total time and O(s) space. General case. Now we describe how to process all non-highly periodic patterns Pj . This will be an extension of the simple modification described for the case of non-highly periodic prefix αj . We start with the following simple combinatorial fact. Fact 16. Let ` ≥ 3 be an integer and w be a non-highly periodic word of length at least `. Then there exists i such that w[i..i+`−1] is not highly periodic and either i = 1 or w[1..i+`−2] is highly periodic. Furthermore, such i can be found in O(|w|) time and constant space assuming read-only random access to w. Proof. If per(w[1..`]) > 31 `, we are done. Otherwise, choose largest j such that per(w[1..j]) = per(w[1..`]). Since w is not highly periodic, we have j < |w|. Thus per(w[1..j]) ≤ 31 ` but per(w[1..j + 1]) > 13 `. We claim that i = j + 2 − ` can be returned. We must argue that per(w[j + 2 − `..j + 1]) > 13 `. Otherwise, the periods of both w[1..j] and w[j + 2 − `..j + 1] are at most 31 `. But these two substrings share a fragment of length ` − 1 ≥ 23 `, so by the periodicity lemma their periods are in fact the same, and then the whole w[1..j + 1] has period at most 31 `, which is a contradiction. Regarding the implementation, we compute per(w[1..`]) using Lemma 6. Then we check how far the period of w[1..`] extends in the whole w naively in O(|w|) time and constant space. For every non-highly periodic pattern Pj we use Fact 16 to find its non-highly periodic substring of length `, denoted Pj [kj ...kj + ` − 1], such that kj = 1 or Pj [1..kj + ` − 2] is highly periodic. We begin with checking if Pj [1..kj + ` − 1] occurs in T using Lemma 7 (if kj = 1, it surely does because of how we partition the patterns into groups). If not, we replace Pj setting Pj := Pj [1..kj + ` − 2], which is highly periodic and can be processed as already described. From now on we consider only patterns Pj such that Pj [kj ..kj + ` − 1] is not highly periodic and Pj [1..kj + ` − 1] occurs in T . We further modify Algorithm 1 to obtain Algorithm 2 as follows. We scan the text T with a sliding window of length ` while maintaining a tentative longest occurring prefix Pj [1..`j ] for every pattern Pj , initialized by setting `j = kj + ` − 1. Whenever we encounter a substring equal to Pj [kj ..kj + ` − 1], i.e., Pj [kj ..kj + ` − 1] = T [i..i + ` − 1], we want to check if Pj [1..kj + ` − 1] = T [i − kj + 1..i + ` − 1] by comparing fingerprints of αj = Pj [1..`] and the corresponding fragment of T . This is not trivial as that fragment is already to the left of the current window. Hence we conceptually move two sliding windows of length `, corresponding to w[i + 31 `..i + 43 ` − 1] and w[i..i + ` − 1], respectively. Because kj ≤ |Pj | − ` ≤ 13 `, whenever the first window generates a request (called request of type I), the second one is still far enough to the left for the request to be processed in the future. Furthermore, because Pj [kj ..kj + ` − 1] is non-highly periodic and the distance between the sliding windows is 13 `, each pattern Pj contributes at most one pending request of type I at any moment and O(1 + n` ) such requests in total. Then, whenever a request of type I is successfully processed, we know that Pj [1..kj + ` − 1] matches with the corresponding fragment of T . We want to check if the occurrence of Pj [1..kj + ` − 1] can be extended to an occurrence of Pj [1..`j + 1]. To this end, we create another request (called request of type II) to check if Pj [`j +2−`..`j +1] matches the corresponding fragment of T . This request can be processed using the second window and, again because per(Pj [1..kj + ` − 1]) > 13 `, 9 Algorithm 2: Processing patterns with non-highly periodic Pj [kj ..kj + `−1]. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 for j = 1 to s do `j := kj + ` − 1 for i = 1 − 31 ` to n − ` + 1 do h1 := Φ(w[i + 13 `..i + 34 ` − 1]) h2 := Φ(w[i + `..i + ` − 1]) foreach j : Φ(Pj [kj ..kj + ` − 1]) = h1 do add a request (i + 13 ` − kj + 1, j) to Q1 foreach request (i, j) ∈ Q1 at position i do if h2 = Φ(P [1..`]) then add a request (i − ` + `j + 1, j) to Q2 remove (i, j) from Q1 foreach request (i − `, j) ∈ Q2 at position i do if h2 = Φ(Pj [`j + 2 − `..`j + 1]) then oj := i + ` − `j − 1 increment `j as long as Pj [`j + 1] = T [oj + `j ] remove (i, j) from Q2 each pattern contribues at most one pending request of type II at any moment and O((1 + n` )) such request in total. Finally, whenever a request of type II is successfully processed, we know that the corresponding `j can be incremented. Therefore, we start to naively compare the characters of Pj [`j + 1..|Pj ]] and the corresponding fragment of T . Since at that time no other request of type II is pending for Pj , such modified algorithm correctly computes all values `j (and the corresponding positions oj ). Lemma 17. Let ` be an arbitrary integer. Suppose we are given a text T of length n and patterns P1 , . . . , Ps such that, for 1 ≤ j ≤ s, we have ` ≤ |Pj | < 34 ` and Pj is non-highly periodic. We can compute the longest prefix occurring in T for every pattern Pj in O(n + s(1 + n` ) log s + s`) total time using O(s) space. By combining all the ingredients, we get the following theorem. Theorem 18. Given a text T of length n and patterns P1 , . . . , Ps of total length m, we can compute the longest prefix occurring in T for every pattern Pj using O(n log n + m) total time and O(s) space. Proof. We proceed as in Thm. 11 and 12, except that now we use Thm. 13, Lemma 15 and Lemma 17 instead of Thm. 4, Lemma 9 and Lemma 7, respectively. Additionally, we need O(n log n + m) time to distribute the long patterns into groups, which is absorbed in the final complexity. Finally, let us note that it is straightforward to modify the algorithm so that we can specify for every pattern Pj an upper bound rj on the starting positions of the occurrences. Theorem 19. Given a text T of length n, patterns P1 , . . . , Ps of total length m, and integers r1 , . . . , rs , we can compute for each pattern the maximum length `j and a position oj ≤ rj such that Pj [1..`j ] = T [oj ..(oj + `j − 1)], using O(n log n + m) total time and O(s) space. 6 Las Vegas Algorithms As shown below, it is not difficult to modify our dictionary matching algorithm so that it always verifies the correctness of the answers. Assuming that we are interested in finding just the leftmost occurrence of every pattern, we obtain an O(n log n + m)-time Las Vegas algorithm (with inverse-polynomial failure probability). In most cases, it suffices to naively verify in O(|Pj |) time whether the leftmost occurrence of Pj detected by the algorithm is valid. If it is not, we are guaranteed that the fingerprints Φ admit a false-positive. Since this event happens with inverse-polynomial probability, a failure can be reported. 10 This simple solution remains valid for short patterns and non-highly periodic long patterns. For highly periodic patterns, the situation is more complicated. The algorithm from Lemma 9 assumes that we are correctly detecting all occurrences of every αj so that we can filter out the shiftable ones. Verifying these occurrences naively might take too much time, because it is not enough check just one occurrence of every αj . Recall that per(αj ) ≤ 31 `. If the previous occurrence of αj was at position i ≥ i − 21 `, we will check if per(αj ) is a period of T [i0 ..i + ` − 1]. If so, either both occurrences (at position i0 and at position i) are false-positives, or none of them is, and the occurrence at position i0 can be ignored. Otherwise, at least one occurrence is surely false-positive, and we declare a failure. To check if per(αj ) is a period of T [i0 ..i + ` − 1], we partition T into overlapping blocks T1 = [1.. 32 `], T2 = [ 13 ` + 1.. 43 `], . . .. Let Tt = T [(t − 1) 13 ` + 1..(t + 1) 13 `] be the rightmost such block fully inside T [1..i + ` − 1]. We calculate the period of Tt using Lemma 6 in O(`) time and O(1) space, and then calculate how far the period extends to the left and to the right, terminating if it extends very far. Formally, we calculate the largest e < (t + 2) 31 ` and the smallest b > (t − 2) 13 ` − 12 ` such that per(Tt ) is a period of T [b..e]. This takes O(`) time for every t summing up to O(n) total time. Then, to check if per(αj ) is a period of T [i0 ..i + ` − 1] we check if it divides the period of per(Tt ) and furthermore r ≥ i + ` − 1 and ` ≤ i0 . Finally, we naively verify the the reported leftmost occurrences of Pj . Consequently, Las Vegas randomization suffices in Thoerem 12. For Thm. 18, we run the Las Vegas version of Thm. 12 with Pj [1..`j ] and Pj [1..`j + 1] as patterns to make sure that the former occur in T but the latter do not. For Thm. 19 we also use Thm. 12, but this time we need to see where the reported leftmost occurrences start compared to bounds rj . 7 Approximating LZ77 in Small Space A non-empty fragment T [i..j] is called a previous fragment if the corresponding subword occurs in T at a position i0 < i. A phrase is either a previous fragment or a single letter not occurring before in T . The LZ77-factorization of a text T [1..n] is a greedy factorization of T into z phrases, T = f1 f2 . . . fz , such that each fi is as long as possible. To formalize the concept of LZ77-approximation, we first make the following definition. Definition 20. Let w = g1 g2 . . . ga be a factorization of w into a phrases. We call it c-optimal if the fragment corresponding to the concatenation of any c consecutive phrases gi . . . gi+c−1 is not a previous fragment. A c-optimal factorization approximates the LZ77-factorization in the number of factors, as the following observation states. However, the stronger property of c-optimality is itself useful in certain situations. Observation 21. If w = g1 g2 . . . ga is a c-optimal factorization of w into a phrases, and the LZ77factorization of w consists of z phrases, then a ≤ c · z. We first describe how to use the dictionary matching algorithm described in Thm. 12 to produce a 2optimal factorization of w[1..n] in O(n log n) time and O(z) working space. Then, the resulting parse can be further refined to produce a (1 + ε)-optimal factorization in O(ε−1 n log n) additional time and the same space using the extension of the dictionary matching algorithm from Thm 18. 7.1 7.1.1 2-Approximation Algorithm Outline. Our algorithm is divided into three phases, each of which refines the factorization from the previous phase: Phase 1. Create a factorization of T [1..n] stored implicitly as z chains consisting of O(log n) phrases each. Phase 2. Try to merge phrases within the chains to produce an O(1)-optimal factorization. Phase 3. Try to merge adjacent factors as long as possible to produce the final 2-optimal factorization. 11 abbbabaabaabaabbbabaabbbbaabbab$ 1 0 0 0 1 1 0 0 1 1 0 0 1 0 0 0 0 1 1 0 0 0 1 0 0 1 0 0 0 0 1 0 1 1 1 0 1 0 0 0 Figure 1: An illustration of Phase 1 of the algorithm, with the “cherries” depicted in thicker lines. The horizontal lines represent the LZ77-factorization and the vertical lines depict factors induced by the tree. Longer separators are drawn between chains, whose lengths are written in binary with the least significant bits on top. Every phase takes O(n log n) time and uses O(z) working space. In the end, we get a 2-approximation of the LZ77-factorization. Phases 1 and 2 use the very simple multiple pattern matching algorithm for patterns of equal lengths developed in Thm. 1, while Phase 3 requires the general multiple pattern matching algorithm obtained in Thm. 12. 7.1.2 Phase 1. To construct the factorization, we imagine creating a binary tree on top the text T of length n = 2k – see also Fig. 1 (we implicitly pad w with sufficiently many $’s to make its length a power of 2). The algorithm works in log n rounds, and the i-th round works on level i of the tree, starting at i = 1 (the children of the root). On level i, the tree divides T into 2i blocks of size n/2i ; the aim is to identify previous fragments among these blocks and declare them as phrases. (In the beginning, no phrases exist, so all blocks are unfactored.) To find out if a block is a previous fragment, we use Thm. 1 and test whether the leftmost occurrence of the corresponding subword is the block itself. The exploration of the tree is naturally terminated at the nodes corresponding to the previous fragments (or single letters not occurring before), forming the leaves of a (conceptual) binary tree. A pair of leaves sharing the same parent is called a cherry. The block corresponding to the common parent is induced by the cherry. To analyze the algorithm, we make the following observation: Fact 22. A block induced by a cherry is never a previous fragment. Therefore, the number of cherries is at most z. Proof. The former part follows from construction. To prove the latter, observe that the blocks induced by different cherries are disjoint and hence each cherry can be assigned a unique LZ77-factor ending within the block. Consequently, while processing level i of the tree, we can afford storing all cherries generated so far on a sorted linked list L. The remaining already generated phrases are not explicitly stored. In addition, we also store a sorted linked list Li of all still unfactored nodes on the current level i (those for which the corresponding blocks are tested as previous fragments). Their number is bounded by z (because there is a cherry below every node on the list), so the total space is O(z). Maintaining both lists sorted is easily accomplished by scanning them in parallel with each scan of T , and inserting new cherries/unfactored nodes at their correct places. Furthermore, in the i-th round we apply Thm. 1 to at most 2i patterns of length Plog n n/2i , so the total time is i=1 O(n + 2i log(2i )) = O(n log n). Next, we analyze the structure of the resulting factorization. Let hx−1 hx and hy hy+1 be the two consecutive cherries. The phrases hx+1 . . . hy−1 correspond to the right siblings of the ancestors of hx and to the left siblings of the ancestors of hy (no further than to the lowest common ancestor of hx and hy ). This naturally partitions hx hx+1 . . . hy−1 hy into two parts, called an increasing chain and a decreasing chain to depict the behaviour of phrase lengths within each part. Observe that these lengths are powers of two, so the 12 structure of a chain of either type is determined by the total length of its phrases, which can be interpreted 0 as a bitvector with bit i0 set to 1 if there is a phrase of length 2i in the chain. Those bitvectors can be created while traversing the tree level by level, passing the partially created bitvectors down to the next level Li+1 until finally storing them at the cherries in L. At the end we obtain a sequence of chains of alternating types, see Fig. 1. Since the structure of each chain follows from its length, we store the sequence of chains rather the actual factorization, which might consist of Θ(z log n) = ω(z) phrases. By Fact 22, our representation uses O(z) words of space and the last phrase of a decreasing chain concatenated with the first phrase of the consecutive increasing chain never form a previous fragment (these phrases form the block induced by the cherry). 7.1.3 Phase 2. In this phase we merge phrases within the chains. We describe how to process increasing chains; the decreasing are handled, mutatis mutandis, analogously. We partition the phrases h` . . . hr within a chain into groups. For each chain we maintain an active group, initially consisting of h` , and scan the remaining phrases in the left-to-right order. We either append a phrase hi to the active group gj , or we output gj and make gj+1 = hi the new active group. The former action is performed if and only if the fragment of length 2|hi | starting at the same position as gj is a previous fragment. Having processed the whole chain, we also output the last active group. Fact 23. Within every chain every group gj forms a valid phrase, but no concatenation of three adjacent groups gj gj+1 gj+2 form a previous fragment. Proof. Since the lengths of phrases form an increasing sequence of powers of two, at the moment we need to decide if we append hi to gj we have |gj | ≤ |h` . . . hi−1 | < |hi |, so 2|hi | > |gj hi |, and thus we are guaranteed if we append gj , then gj hi is a previous factor. Finally, let us prove the aforementioned optimality condition, i.e., that gj gj+1 gj+2 is not a previous fragment for any three consecutive groups. Suppose that we output gj while processing hi , that is, gj+1 = hi . . . hi0 . We did not append hi to gj , so the fragment of length 2|hi | starting at the same position as gj is not a previous fragment. However, |gj gj+1 gj+2 | > |gj+1 gj+2 | ≥ |hi hi+1 | > 2|hi |, so this immediately implies that gj gj+1 gj+2 is not a previous fragment. The procedure described above is executed in parallel for all chains, each of which maintains just the length of its active group. In the i-th round only chains containing a phrase of length 2i participate (we use bit operations to verify which chains have length containing 2i in the binary expansion). These chains provide fragments of length 2i+1 and Thm. 1 is applied to decide which of them are previous fragments. The chains modify their active groups based on the answers; some of them may output their old active groups. These groups form phrases of the output factorization, so the space required to store them is amortized by the size of this factorization. As far as the running time is concerned, we observe that no more than min(z, 2ni ) Plog n chains participate in the i-th round . Thus, the total running time is i=1 O(n + 2ni log 2ni ) = O(n log n). To bound the overall approximation guarantee, suppose there are five consecutive output phrases forming a previous fragment. By Fact 22, these fragments cannot contain a block induced by any cherry. Thus, the phrases are contained within two chains. However, by Fact 23 no three consecutive phrases obtained from a single chain form a previous fragment. Hence the resulting factorization is 5-optimal. 7.1.4 Phase 3. The following lemma achieves the final 2-approximation: Lemma 24. Given a c-optimal factorization, one can compute a 2-optimal factorization using O(c · n log n) time and O(c · z) space. Proof. The procedure consists of c iterations. In every iteration we first detect previous fragments corresponding to concatenations of two adjacent phrases. The total length of the patterns is up to 2n, so this takes 13 O(n log n + m) = O(n log n) time and O(c · z) space using Thm. 12. Next, we scan through the factorization and merge every phrase gi with the preceding phrase gi−1 if gi−1 gi is a previous fragment and gi−1 has not been just merged with its predecessor. We shall prove that the resulting factorization is 2-optimal. Consider a pair of adjacent phrases gi−1 gi in the final factorization and let j be the starting position of gi . Suppose gi−1 gi is a previous fragment. Our algorithm performs merges only, so the phrase ending at position j − 1 concatenated with the phrase starting at position j formed a previous fragment at every iteration. The only reason that these factors were not merged could be another merge of the former factor. Consequently, the factor ending at position j − 1 took part in a merge at every iteration, i.e., gi−1 is a concatenation of at least c phrases of the input factorization. However, all the phrases created by the algorithm form previous fragments, which contradicts the c-optimality of the input factorization. 7.2 Approximation Scheme The starting point is a 2-optimal factorization into a phrases, which can be found in O(n log n) time using the previous method. The text is partitioned into 2ε a blocks corresponding to 2ε consecutive phrases. Every block is then greedily factorized into phrases. The factorization is implemented using Thm. 19 to compute the longest previous fragments in parallel for all blocks as follows. Denote the starting positions of the blocks by b1 < b2 < . . . and let ij be the current position in the i-th block, initially set to bi . For every i, we find the longest previous fragment starting at ij and fully contained inside T [ij ..bj+1 − 1] by computing the longest prefix of T [ij ..bj+1 − 1] occurring in T and starting in T [1..ij − 1], denoted T [ij ..ij + `j − 1]. Then we output every T [ij ..ij + `j − 1] as a new phrase and increase ij by `j . Because every block, by definition, can be factorized into 2ε phrases and the greedy factorization is optimal, this requires O( 1ε n log n) time in total. To bound the approximation guarantee, observe that every phrase inside the block, except possibly for the last one, contains an endpoint of a phrase in the LZ77-factorization. Consequently, the total number of phrases is at most z + 2ε a ≤ (1 + ε)z. Theorem 25. Given a text T of length n whose LZ77-factorization consists of z phrases, we can factorize T into at most 2z phrases using O(n log n) time and O(z) space. Moreover, for any ε ∈ (0, 1] in O(ε−1 n log n) time and O(z) space we can compute a factorization into no more than (1 + ε)z phrases. Acknowledgments. The authors would like to thank the participants of the Stringmasters 2015 workshop in Warsaw, where this work was initiated. We are particularly grateful to Marius Dumitran, Artur Jeż, and Patrick K. Nicholson. References [1] Rabin–Karp algorithm — Wikipedia, The Free Encyclopedia. [2] A. V. Aho and M. J. Corasick. Efficient string matching: An aid to bibliographic search. Commun. ACM, 18(6):333–340, 1975. [3] D. Breslauer, R. Grossi, and F. Mignosi. Simple real-time constant-space string matching. Theor. Comput. Sci., 483:2–9, 2013. [4] R. Clifford, A. Fontaine, E. Porat, B. Sach, and T. Starikovskaya. Dictionary matching in a stream. In N. Bansal and I. Finocchi, editors, ESA 2015, volume 8737 of LNCS, pages 361–372. Springer, Heidelberg, 2015. [5] M. Crochemore and D. Perrin. Two-way string matching. J. ACM, 38(3):651–675, 1991. [6] N. J. Fine and H. S. Wilf. Uniqueness theorems for periodic functions. P. Am. Math. Soc., 16(1):109–114, 1965. 14 [7] J. Fischer, T. I, and D. Köppl. Lempel Ziv computation in small space (LZ-CISS). In F. Cicalese, E. Porat, and U. Vaccaro, editors, Combinatorial Pattern Matching - 26th Annual Symposium, CPM 2015, Ischia Island, Italy, June 29 - July 1, 2015, Proceedings, volume 9133 of Lecture Notes in Computer Science, pages 172–184. Springer, 2015. [8] Z. Galil and J. I. Seiferas. Time-space-optimal string matching. J. Comput. Syst. Sci., 26(3):280–294, 1983. [9] L. Gasieniec, M. Karpinski, W. Plandowski, and W. Rytter. Efficient algorithms for Lempel-Ziv encoding (extended abstract). In R. G. Karlsson and A. Lingas, editors, SWAT 1996, volume 1097 of LNCS, pages 392–403. Springer, Heidelberg, 1996. [10] B. Gum and R. J. Lipton. Cheaper by the dozen: Batched algorithms. In V. Kumar and R. L. Grossman, editors, SDM 2001, pages 1–11. SIAM, Philadelphia, 2001. [11] W. Hon, T. Ku, R. Shah, S. V. Thankachan, and J. S. Vitter. Faster compressed dictionary matching. Theor. Comput. Sci., 475:113–119, 2013. [12] J. Kärkkäinen, D. Kempa, and S. J. Puglisi. Lightweight Lempel-Ziv parsing. In V. Bonifaci, C. Demetrescu, and A. Marchetti-Spaccamela, editors, SEA 2013, volume 7933 of LNCS, pages 139–150. Springer, Heidelberg, 2013. [13] R. M. Karp and M. O. Rabin. Efficient randomized pattern-matching algorithms. IBM J. Res. Dev., 31(2):249–260, 1987. [14] T. Kociumaka, T. Starikovskaya, and H. W. Vildhøj. Sublinear space algorithms for the longest common substring problem. In A. S. Schulz and D. Wagner, editors, ESA 2014, volume 8737 of LNCS, pages 605–617. Springer, Heidelberg, 2014. [15] M. Lohrey. Algorithmics on SLP-compressed strings: A survey. Groups Complexity Cryptology, 4(2):241– 299, 2012. [16] M. Ružić. Constructing efficient dictionaries in close to sorting time. In L. Aceto, I. Damgård, L. A. Goldberg, M. M. Halldórsson, A. Ingólfsdóttir, and I. Walukiewicz, editors, ICALP 2008, volume 5125, pages 84–95. Springer, Heidelberg, 2008. [17] E. Ukkonen. On-line construction of suffix trees. Algorithmica, 14(3):249–260, 1995. [18] J. Ziv and A. Lempel. A universal algorithm for sequential data compression. IEEE Trans. Inform. Theory, 23(3):337–343, 1977. 15
8cs.DS
Going Deeper in Spiking Neural Networks: VGG and Residual Architectures Abhronil Sengupta 1 Yuting Ye 2 Robert Wang 2 Chiao Liu 2 Kaushik Roy 1 arXiv:1802.02627v1 [cs.CV] 7 Feb 2018 Abstract Over the past few years, Spiking Neural Networks (SNNs) have become popular as a possible pathway to enable low-power event-driven neuromorphic hardware. However, their application in machine learning have largely been limited to very shallow neural network architectures for simple problems. In this paper, we propose a novel algorithmic technique for generating an SNN with a deep architecture, and demonstrate its effectiveness on complex visual recognition problems such as CIFAR-10 and ImageNet. Our technique applies to both VGG and Residual network architectures, with significantly better accuracy than the state-of-the-art. Finally, we present analysis of the sparse event-driven computations to demonstrate reduced hardware overhead when operating in the spiking domain. 1. Introduction Spiking Neural Networks (SNNs) are a significant shift from the standard way of operation of Artificial Neural Networks (Farabet et al., 2012). Most of the success of deep learning models of neural networks in complex pattern recognition tasks are based on neural units that receive, process and transmit analog information. Such Analog Neural Networks (ANNs) (Diehl et al., 2015), however, disregard the fact that the biological neurons in the brain (the computing framework after which it is inspired) processes binary spike-based information. Driven by this observation, the past few years have witnessed significant progress in the modeling and formulation of training schemes for SNNs as a new computing paradigm that can potentially replace ANNs as the next generation of Neural Networks. In addition to the fact that SNNs are inherently more biologically plausible, they offer the prospect of event-driven hardware operation. Spiking Neurons process input informa1 Department of Electrical and Computer Engineering, Purdue University, West Lafayette, IN, USA 2 Oculus Research, Facebook Research, Redmond, WA, USA. Correspondence to: Abhronil Sengupta <[email protected]>. tion only on the receipt of incoming binary spike signals. Given a sparsely-distributed input spike train, the hardware overhead (power consumption) for such a spike or eventbased hardware would be significantly reduced since large sections of the network that are not driven by incoming spikes can be power-gated (Chen et al., 1998). However, the vast majority of research on SNNs have been limited to very simple and shallow network architectures on relatively simple digit recognition datasets like MNIST (LeCun et al., 1998) while only few works report their performance on more complex standard vision datasets like CIFAR-10 (Krizhevsky & Hinton, 2009) and ImageNet (Russakovsky et al., 2015). The main reason behind their limited performance stems from the fact that SNNs are a significant shift from the operation of ANNs due to their temporal information processing capability. This has necessitated a rethinking of training mechanisms for SNNs. 2. Related Work Broadly, there are two main categories for training SNNs – supervised and unsupervised. Although unsupervised learning mechanisms like Spike-Timing Dependent Plasticity (STDP) are attractive for the implementation of lowpower on-chip local learning, their performance is still outperformed by supervised networks on even simple digit recognition platforms like the MNIST dataset (Diehl & Cook, 2015). Driven by this fact, a particular category of supervised SNN learning algorithms attempts to train ANNs using standard training schemes like backpropagation (to leverage the superior performance of standard training techniques for ANNs) and subsequently convert to event-driven SNNs for network operation (Cao et al., 2015; Zhao et al., 2015; Pérez-Carrasco et al., 2013; Diehl et al., 2015). This can be particularly appealing for NN implementations in low-power neuromorphic hardware specialized for SNNs (Merolla et al., 2014; Akopyan et al., 2015) or interfacing with silicon cochleas or event-driven sensors (Posch et al., 2014; 2011). Our work falls in this category and is based on the ANN-SNN conversion scheme proposed by authors in Ref. (Diehl et al., 2015). However, while prior work considers the ANN operation only during the conversion process, we show that considering the actual SNN operation during the conversion step is crucial for achieving minimal loss in classification accuracy. To Going Deeper in Spiking Neural Networks: VGG and Residual Architectures that effect, we propose a novel weight-normalization technique that ensures that the actual SNN operation is in the loop during the conversion phase. Note that this work tries to exploit neural activation sparsity by converting networks to the spiking domain for power-efficient hardware implementation and are complementary to efforts aimed at exploring sparsity in synaptic connections (Han et al., 2015a). 3. Main Contributions The specific contributions of our work are as follows: (i) As will be explained in later sections, there are various architectural constraints involved for training ANNs that can be converted to SNNs in a near-lossless manner. Hence, it is unclear whether the proposed techniques would scale to larger and deeper architectures for more complicated tasks. We provide, for the first time, proof of concept experiments that deep SNNs (extending from 16 to 34 layers) can provide competitive accuracies over complex datasets like CIFAR-10 and ImageNet. (ii) We propose a new ANN-SNN conversion technique that statistically outperforms state-of-the-art techniques. We report a classification error of 8.45% on the CIFAR-10 dataset which is the best-performing result reported for any SNN network, till date. For the first time, we report an SNN performance on the ImageNet 2012 validation set. We achieve a 30.04% top-1 error rate and 10.99% top-5 error rate for VGG-16 architectures. (iii) We explore Residual Network (ResNet) architectures as a potential pathway to enable deeper SNNs. We present insights and design constraints that are required to ensure ANN-SNN conversion for ResNets. We report a classification error of 12.54% on the CIFAR-10 dataset and a 34.53% top-1 error rate and 13.67% top-5 error rate on the ImageNet validation set. This is the first work that attempts to explore SNNs with residual network architectures. (iv) We demonstrate that SNN network sparsity significantly increases as the network depth increases. This further motivates the exploration of converting ANNs to SNNs for event-driven operation to reduce compute overhead. 4. Preliminaries 4.1. Input and Output Representation The main difference between ANN and SNN operation is the notion of time. While ANN inputs are static, SNNs operate based on dynamic binary spiking inputs as a function of time. The neural nodes also receive and transmit binary spike input signals in SNNs, unlike in ANNs, where the inputs and outputs of the neural nodes are analog values. In this work, we consider a rate-encoded network operation where the average number of spikes transmitted as input to the network over a large enough time window is approximately proportional to the magnitude of the original ANN inputs (pixel intensity in this case). The duration of the time window is dictated by the desired network performance (for instance, classification accuracy) at the output layer of the network. A Poisson event-generation process is used to produce the input spike train to the network. Every time-step of SNN operation is associated with the generation of a random number whose value is compared against the magnitude of the corresponding input. A spike event is triggered if the generated random number is less than the value of the corresponding pixel intensity. This process ensures that the average number of input spikes in the SNN is proportional to the magnitude of the corresponding ANN inputs and is typically used to simulate an SNN for recognition tasks based on datasets for static images (Diehl et al., 2015). Given a Poisson-generated spike train being fed to the network, spikes will be produced at the network outputs. Inference is based on the cumulative spike count of neurons at the output layer of the network over a given time-window. 4.2. ANN and SNN Neural Operation ANN to SNN conversion schemes usually consider Rectified Linear Unit (ReLU) as the ANN neuron activation function. For a neuron receiving inputs xi through synaptic weights wi , the ReLU neuron output y is given by, ! X y = max 0, wi .xi (1) i Although ReLU neurons are typically used in a large number of machine learning tasks at present, the main reason behind their usage for ANN-SNN conversion schemes is that they bear functional equivalence to an Integrate-Fire (IF) Spiking Neuron without any leak and refractory period (Cao et al., 2015; Diehl et al., 2015). Note that this is a particular type of Spiking Neuron model (Izhikevich, 2003). Let us consider the ANN inputs xi encoded in time as a spike train Xi (t), where E[Xi (t)] ∝ xi (for the rate encoding network being considered in this work). The IF Spiking Neuron keeps track of its membrane potential, vmem , which integrates incoming spikes and generates an output spike whenever the membrane potential cross a particular threshold vth . The membrane potential is reset to zero at the generation of an output spike. All neurons are reset whenever a spike train corresponding to a new image/pattern in presented. The IF Spiking Neuron dynamics as a function of time-step, t, can be described by the following equation, X vmem (t + 1) = vmem (t) + wi .Xi (t) (2) i Going Deeper in Spiking Neural Networks: VGG and Residual Architectures Let us first consider the simple case of a neuron being driven by a single input X(t) and a positive synaptic weight w. Due to the absence of any leak term in the neural dynamics, it is intuitive to show that the corresponding output spiking rate of the neuron is given by E[Y(t)] ∝ E[X(t)], with the proportionality factor being dependent on the ratio of w and vth . In the case when the synaptic weight is negative, the output spiking activity of the IF neuron is zero since the neuron is never able to cross the firing potential vth , mirroring the functionality of a ReLU. The higher the ratio of the threshold with respect to the weight, the more time is required for the neuron to spike, thereby reducing the neuron spiking rate, E[Y(t)], or equivalently increasing the time-delay for the neuron to generate a spike. A relatively high firing threshold can cause a huge delay for neurons to generate output spikes. For deep architectures, such a delay can quickly accumulate and cause the network to not produce any spiking outputs for relatively long periods of time. On the other hand, a relatively low threshold causes the SNN to lose any ability to distinguish between different magnitudes of the spike inputs P being accumulated to the membrane potential (the term i wi .Xi (t) in Eq. 2) of the Spiking Neuron, causing it to lose evidence during the membrane potential integration process. This, in turn, results in accuracy degradation of the converted network. Hence, an appropriate choice of the ratio of the neuron threshold to the synaptic weights is essential to ensure minimal loss in classification accuracy during the ANN-SNN conversion process (Diehl et al., 2015). Consequently, most of the research work in this field has been concentrated on outlining appropriate algorithms for threshold-balancing, or equivalently, weight normalizing different layers of a network to achieve near-lossless ANN-SNN conversion. 4.3. Architectural Constraints 4.3.1. B IAS IN N EURAL U NITS Typically neural units used for ANN-SNN conversion schemes are trained without any bias term (Diehl et al., 2015). This is due to the fact that optimization of the bias term in addition to the spiking neuron threshold expands the parameter space exploration, thereby causing the ANNSNN conversion process to be more difficult. Requirement of bias less neural units also entails that Batch Normalization technique (Ioffe & Szegedy, 2015) cannot be used as a regularizer during the training process since it biases the inputs to each layer of the network to ensure each layer is provided with inputs having zero mean. Instead, we use dropout (Srivastava et al., 2014) as the regularization technique. This technique simply masks portions of the input to each layer by utilizing samples from a Bernoulli distribution where each input to the layer has a specified probability of being dropped. 4.3.2. P OOLING O PERATION Deep convolutional neural network architectures typically consist of intermediate pooling layers to reduce the size of the convolution output maps. While various choices exist for performing the pooling mechanism, the two popular choices are either max-pooling (maximum neuron output over the pooling window) or spatial-averaging (twodimensional average pooling operation over the pooling window). Since the neuron activations are binary in SNNs instead of analog values, performing max-pooling would result in significant information loss for the next layer. Consequently, we consider spatial-averaging as the pooling mechanism in this work (Diehl et al., 2015). 5. Deep Convolutional SNN Architectures: VGG As mentioned previously, our work is based on the proposal outlined by authors in Ref. (Diehl et al., 2015). In order to ensure that a spiking neuron threshold is sufficiently high to distinguish different magnitude of the spike inputs, a worst case solution would be to set the threshold of a particular layer to the maximum of the summation of all the positive synaptic weights of neurons in that layer. However, such a “Model-Based Normalization” technique is highly pessimistic since all the fan-in neurons are not supposed to fire at every time-step (Diehl et al., 2015). In order to circumvent this issue, authors in Ref. (Diehl et al., 2015) proposed a “Data-Based Normalization” Technique wherein the neuron threshold of a particular layer is set equal to the maximum activation of all ReLUs in the corresponding layer (by passing the entire training set through the trained ANN once after training is completed). Such a “Data-Based” technique performed significantly better than the “Model-Based” algorithm in terms of the final classification accuracy and latency of the converted SNN (three-layered fully connected and convolutional architectures) for a digit recognition problem on the MNIST dataset (Diehl et al., 2015). Note that, this process is referred to as “weight-normalization” and “threshold-balancing” interchangeably in this text. As mentioned before, the goal of this work is to optimize the ratio of the synaptic weights with respect to the neuron firing threshold, vth . Hence, either all the synaptic weights preceding a neural layer are scaled by a normalization factor wnorm equal to the maximum neural activation and the threshold is set equal to 1 (“weight-normalization”), or the threshold vth is set equal to the maximum neuron activation for the corresponding layer with the synaptic weights remaining unchanged (“threshold-balancing”). Both operations are exactly equivalent mathematically. Going Deeper in Spiking Neural Networks: VGG and Residual Architectures 5.1. Proposed Algorithm: S PIKE-N ORM Driven by this observation, we propose a weightnormalization technique that adaptively balances the threshold of each layer by considering the actual operation of the SNN in the loop during the ANN-SNN conversion process. The algorithm normalizes the weights of the network sequentially for each layer. Given a particular trained ANN, the first step is to generate the input Poisson spike train for the network over the training set for a large enough time-window. The Poisson spike train allows us to record thePmaximum summation of weighted spike-input (the term i wi .Xi (t) in Eq. 2) that would be received by the first neural layer of the network. In order to minimize the temporal delay of the neuron and simultaneously ensure that the neuron firing threshold is not too low, we weightnormalize the first layer depending on the maximum spikebased input received by the first layer. After the threshold of the first layer is set, we are provided with a representative spike train at the output of the first layer which enables us to generate the input spike-stream for the next layer. The process is continued sequentially for all the layers of the network. The main difference between our proposal and prior work (Diehl et al., 2015) is the fact that the proposed weight-normalization scheme accounts for the actual SNN operation during the conversion process. As we will show in the Results section, this scheme is crucial to ensure nearlossless ANN-SNN conversion for significantly deep architectures and for complex recognition problems. 6. Extension to Residual Architectures 6.1. Architecture Constraints Residual network architectures were proposed as an attempt to scale convolutional neural networks to very deep Spatial Convolution No timedelay Spatial Convolution Same Threshold ReLU ReLU Spatial Convolution Spatial Convolution Time-Delay Addition Addition ReLU Output Output (a) Maximum SNN Activation However, the above algorithm leads us to the question: Are ANN activations representative of SNN activations? Let us consider a particular example, where the case of maximum activation is shown for a single ReLU. The neuron receives two inputs, namely 0.5 and 1. Let us consider unity synaptic weights in this scenario. Since the maximum ReLU activation is 1.5, the neuron threshold would be set equal to 1.5. However, when this network is converted to the SNN mode, both the inputs would be propagating binary spike signals. The ANN input, equal to 1, would be converted to spikes transmitting at every time-step while the other input would transmit spikes approximately 50% of the duration of a large enough time-window. Hence, the actual summation of spike inputs received by the neuron per time-step would be 2 for a large number of samples, which is higher than the spiking threshold (1.5). Clearly, some information loss would take place due to the lack of this evidence integration. ReLU of previous layer Input 14 12 10 8 6 4 2 0 0 (b) 5 10 #Layer 15 20 (c) Figure 1. (a) The basic ResNet functional unit, (b) Design constraints introduced in the functional unit to ensure near-lossless ANN-SNN conversion, (c) Typical maximum SNN activations for a ResNet having junction ReLU layers but the non-identity and identity input paths not having the same spiking threshold. While this is not representative of the case with equal thresholds in the two paths, it does justify the claim that after a few initial layers, the maximum SNN activations decay to values close to unity due to the identity mapping. layered stacks (He et al., 2016a). Although different variants of the basic functional unit have ben explored, we will only consider identity shortcut connections in this text (shortcut type-A according to the paper (He et al., 2016a)). Each unit consists of two parallel paths. The non-identity path consists of two spatial convolution layers with an intermediate ReLU layer. While the original ResNet formulation considers ReLUs at the junction of the parallel nonidentity and identity paths (He et al., 2016a), recent formulations do not consider junction ReLUs in the network architecture (He et al., 2016b). Absence of ReLUs at the junction point of the non-identity and identity paths was observed to produce a slight improvement in classification accuracy on the CIFAR-10 dataset1 . Due to the presence of the shortcut connections, important design considerations need to be accounted for to ensure near-lossless ANNSNN conversion. We start with the basic unit, as shown in Fig. 1(a), and point-wise impose various architectural constraints with justifications. 1 http://torch.ch/blog/2016/02/04/resnets.html Going Deeper in Spiking Neural Networks: VGG and Residual Architectures 6.1.1. R E LU S AT EACH JUNCTION POINT As we will show in the Results section, application of our proposed S PIKE-N ORM algorithm on such a residual architecture resulted in a converted SNN that exhibited accuracy degradation in comparison to the original trained ANN. We hypothesize that this degradation is attributed mainly to the absence of any ReLUs at the junction points. Each ReLU when converted to an IF Spiking Neuron imposes a particular amount of characteristic temporal delay (time interval between an incoming spike and the outgoing spike due to evidence integration). Due to the shortcut connections, spike information from the initial layers gets instantaneously propagated to later layers. The unbalanced temporal delay in the two parallel paths of the network can result in distortion of the spike information being propagated through the network. Consequently, as shown in Fig. 1(b), we include ReLUs at each junction point to provide a temporal balancing effect to the parallel paths (when converted to IF Spiking Neurons). An ideal solution would be to include a ReLU in the parallel path, but that would destroy the advantage of the identity mapping. 6.1.2. S AME THRESHOLD OF ALL FAN - IN LAYERS As shown in the next section, direct application of our proposed weight-normalization scheme still resulted in some amount of accuracy loss in comparison to the baseline ANN accuracy. Note that the weight-normalization scheme was applied by considering the immediate fan-in layer, i.e. the junction neuron layer is threshold balanced according to the activity of the non-identity neuron path. However, this layer also receives inputs from the previous junction neuron layer. Since the output spiking activity of a particular neuron is also dependent on the neuron threshold, all the fan-in neuron layers should have the same threshold to ensure that input spike information to the next layer is rate-encoded appropriately. However, the spiking threshold of the neuron layer in the non-identity path is dependent on the activity of the neuron layer at the previous junction. An observation of the typical threshold-balancing factors for the network without using this constraint (shown in Fig. 1(c)) reveal that the threshold-balancing factors mostly lie around unity after a few initial layers. This occurs mainly due to the identity mapping. The maximum summation of spike inputs received by the neurons in the junction layers are dominated by the identity mapping (close to unity). From this observation, we heuristically choose both the thresholds of the non-identity ReLU layer and the identity-ReLU layer equal to 1. However, the accuracy is still unable to approach the baseline ANN accuracy, which leads us to the third design constraint. 6.1.3. I NITIAL N ON -R ESIDUAL P RE -P ROCESSING L AYERS An observation of Fig. 1(c) reveals that the thresholdbalancing factors of the initial junction neuron layers are significantly higher than unity. This can be a primary reason for the degradation in classification accuracy of the converted SNN. We note that the residual architectures used by authors in Ref. (He et al., 2016a) use an initial convolution layer with a very wide receptive field (7 × 7 with a stride of 2) on the ImageNet dataset. The main motive behind such an architecture was to show the impact of increasing depth in their residual architectures on the classification accuracy. Inspired by the VGG-architecture, we replace the first 7 × 7 convolutional layer by a series of three 3 × 3 convolutions where the first two layers do not exhibit any shortcut connections. Addition of such initial non-residual pre-processing layers allows us to apply our proposed weight-normalization scheme in the initial layers while using a unity weight-normalization/thresholdbalancing factor for the later residual layers. As shown in the Results section, this scheme significantly assists in achieving classification accuracies close to the baseline ANN accuracy since after the initial layers, the maximum neuron activations decay to values close to unity because of the identity mapping. 7. Experiments 7.1. Datasets and Implementation We evaluate our proposals on standard visual object recognition benchmarks, namely the CIFAR-10 and ImageNet datasets. Experiments performed on networks for the CIFAR-10 dataset are trained on the training set images with per-pixel mean subtracted and evaluated on the testing set. We also present results on the much more complex ImageNet 2012 dataset that contains 1.28 million training images and report evaluation (top-1 and top-5 error rates) on the 50, 000 validation set. 224 × 224 crops from the input images are used for this experiment. We use VGG-16 architecture (Simonyan & Zisserman, 2014) for both the datasets. ResNet-20 configuration outlined in Ref. (He et al., 2016a) is used for the CIFAR-10 dataset while ResNet-34 is used for experiments on the ImageNet dataset. As mentioned previously, we do not utilize any batch-normalization layers. For VGG networks, a dropout layer is used after every ReLU layer except for those layers which are followed by a pooling layer. For Residual networks, we use dropout only for the ReLUs at the non-identity parallel paths but not at the junction layers. We found this crucial for achieving training convergence. Our implementation is derived from the Facebook ResNet implementation code for CIFAR and ImageNet datasets Going Deeper in Spiking Neural Networks: VGG and Residual Architectures available publicly2 . We use similar image pre-processing steps and scale and aspect-ratio augmentation techniques as used in (Szegedy et al., 2015). We report single-crop testing results while the error rates can be further reduced with 10-crop testing (Krizhevsky et al., 2012). Networks used for the CIFAR-10 dataset are trained on 2 GPUs with a batchsize of 256 for 200 epochs, while ImageNet training is performed on 8 GPUs for 100 epochs with a similar batchsize. The initial learning rate is 0.05. The learning rate is divided by 10 twice, at 81 and 122 epochs for CIFAR-10 dataset and at 30 and 60 epochs for ImageNet dataset. A weight decay of 0.0001 and a momentum of 0.9 is used for all the experiments. Proper weight initialization is crucial to achieve convergence in such deep networks without batch-normalization. For a non-residual convolutional layer (for both VGG and ResNet architectures) having kernel size k × k with n output channels, the weights are initialized from a normal distribution and q standard deviation k22n . However, for residual convolutional layers, the √standard deviation used for the normal distribution was k22n . We observed this to be important for achieving training convergence and a similar observation was also outlined in Ref. (Hardt & Ma, 2016) although their networks were trained without both dropout and batch-normalization. 7.2. Experiments for VGG Architectures Our VGG-16 model architecture follows the implementation outlined in 3 except that we do not utilize the batchnormalization layers. We used a randomly chosen minibatch of size 256 from the training set for the weightnormalization process on the CIFAR-10 dataset. While the entire training set can be used for the weight-normalization process, using a representative subset did not impact the results. We confirmed this by running multiple independent runs for both the CIFAR and ImageNet datasets. The standard deviation of the final classification error rate after 2500 time-steps was ∼ 0.01. All results reported in this article represent the average of 5 independent runs of the spiking network (since the input to the network is a random process). No notable difference in the classification error rate was observed at the end of 2500 time-steps and the network outputs converged to deterministic values despite being driven by stochastic inputs. For the SNN model based weight-normalization scheme (S PIKE-N ORM algorithm) we used 2500 time-steps for each layer sequentially to normalize the weights. Table 1 summarizes our results for the CIFAR-10 dataset. The baseline ANN error rate on the testing set was 8.3%. Since the main contribution of this work is to minimize the 2 3 https://github.com/facebook/fb.resnet.torch https://github.com/szagoruyko/cifar.torch loss in accuracy during conversion from ANN to SNN for deep-layered networks and not in pushing state-of-the-art results in ANN training, we did not perform any hyperparameter optimization. However, note that despite several architectural constraints being present in our ANN architecture, we are able to train deep networks that provide competitive classification accuracies using the training mechanisms described in the previous subsection. Further reduction in the baseline ANN error rate is possible by appropriately tuning the learning parameters. For the VGG-16 architecture, our implementation of the ANNmodel based weight-normalization technique, proposed by Ref. (Diehl et al., 2015), yielded an average SNN error rate of 8.54% leading to an error increment of 0.24%. The error increment was minimized to 0.15% on applying our proposed S PIKE-N ORM algorithm. Note that we consider a strict model-based weight-normalization scheme to isolate the impact of considering the effect of an ANN versus our SNN model for threshold-balancing. Further optimizations of considering the maximum synaptic weight during the weight-normalization process (Diehl et al., 2015) is still possible. Previous works have mainly focused on much shallower convolutional neural network architectures. Although Ref. (Hunsberger & Eliasmith, 2016) reports results with an accuracy loss of 0.18%, their baseline ANN suffers from some amount of accuracy degradation since their networks are trained with noise (in addition to architectural constraints mentioned before) to account for neuronal response variability due to incoming spike trains (Hunsberger & Eliasmith, 2016). It is also unclear whether the training mechanism with noise would scale up to deeper layered networks. Our work reports the best performance of a Spiking Neural Network on the CIFAR-10 dataset till date. Our network is the deepest convolutional architecture explored so far and our proposed algorithm statistically outperforms state-of-the-art algorithms for ANN-SNN conversion schemes in such architectures. The impact of our proposed algorithm is much more apparent on the more complex ImageNet dataset. The rates for the top-1 (top-5) error on the ImageNet validation set are summarized in Table 2. Note that these are single-crop results. The accuracy loss during the ANN-SNN conversion process is minimized by a margin of 0.57% by considering SNN-model based weight-normalization scheme. It is therefore expected that our proposed S PIKE-N ORM algorithm would significantly perform better than an ANNmodel based conversion scheme as the pattern recognition problem becomes more complex since it accounts for the actual SNN operation during the conversion process. This is the first work that reports competitive performance of a Spiking Neural Network on the entire 50, 000 ImageNet Going Deeper in Spiking Neural Networks: VGG and Residual Architectures Table 1. Results for CIFAR-10 Dataset ANN Error - SNN Error 10.68% Error Increment - 8-layered networks (Hunsberger & Eliasmith, 2016) 16.28% 16.46% VGG-16 (ANN model based conversion) 8.3% VGG-16 (S PIKE-N ORM) 8.3% 3-layered networks (Esser et al., 2016) Network Architecture ANN Error SNN Error Error Increment 29.48% (10.61%) 30.61% (11.21%) 1.13% (0.6%) 0.18% VGG-16 (ANN model based conversion) 8.54% 0.24% VGG-16 (S PIKE-N ORM) 29.48% (10.61%) 30.04% (10.99%) 0.56% (0.38%) 8.45% 0.15% 100 4 7.3. Experiments for Residual Architectures On the ImageNet dataset, we use the deeper ResNet-34 model outlined in Ref. (He et al., 2016a). The initial 7 × 7 convolutional layer is replaced by three 3 × 3 convolutional layers where the initial two layers are non-residual plain units. The baseline ANN is trained with an error of 29.31% while the converted SNN error is 34.53% at the end of 2500 timesteps. The results are summarized in Table. 3 and convergence plots for all our networks are provided in Fig. 3. It is worth noting here that the main motivation of exploring Residual Networks is to go deeper in Spiking Neural Networks. We explore relatively simple ResNet architecRef. (Hunsberger & Eliasmith, 2016) reports a performance of 48.2%(23.8%) on the first 3072-image test batch of the ImageNet 2012 dataset. 60 Basic Architecture 40 Constraint 2 20 0 0 Constraint 3 1000 2000 Timesteps Figure 2. Impact of the architectural constraints for Residual Networks. “Basic Architecture” does not involve any junction ReLU layers. “Constraint 1” involves junction ReLUs while “Constraint 2” imposes equal unity threshold for all residual units. Network accuracy is significantly improved with the inclusion of “Constraint 3” that involves pre-processing weight-normalized plain convolutional layers at the network input stage. 100 Error (%) Our residual networks for CIFAR-10 and ImageNet datasets follow the implementation in Ref. (He et al., 2016a). We first attempt to explain our design choices for ResNets by sequentially imposing each constraint on the network and showing their corresponding impact on network performance in Fig. 2. The “Basic Architecture” involves a residual network without any junction ReLUs. “Constraint 1” involves junction ReLUs without having equal spiking thresholds for all fan-in neural layers. “Constraint 2” imposes an equal threshold of unity for all the layers while “Constraint 3” performs best with two pre-processing plain convolutional layers (3 × 3) at the beginning of the network. The baseline ANN ResNet20 was trained with an error of 10.9% on the CIFAR10 dataset. Note that although we are using terminology consistent with Ref. (He et al., 2016a) for the network architectures, our ResNets contain two extra plain pre-processing layers. The converted SNN according to our proposal yielded a classification error rate of 12.54%. Weight-normalizing the initial two layers using the ANNmodel based weight-normalization scheme produced an average error of 12.87%, further validating the efficiency of our weight-normalization technique. 4 Constraint 1 80 Error (%) 2012 validation set. Table 2. Results for ImageNet Dataset 50 VGG-16 ResNet-20 CIFAR-10 100 Error (%) Network Architecture 80 VGG-16 ResNet-34 ImageNet 60 40 0 0 1000 2000 Timesteps 0 2000 1000 Timesteps Figure 3. Convergence plots for the VGG and ResNet SNN architectures for CIFAR-10 and ImageNet datasets are shown above. The classification error reduces as more evidence is integrated in the Spiking Neurons with increasing time-steps. Note that although the network depths are similar for CIFAR-10 dataset, the ResNet-20 converges much faster than the VGG architecture. The delay for inferencing is higher for ResNet-34 on the ImageNet dataset due to twice the number of layers as the VGG network. tures, as the ones used in Ref. (He et al., 2016a), which have an order of magnitude lower parameters than standard VGG-architectures. Further hyper-parameter optimizations or more complex architectures are still possible. While the accuracy loss in the ANN-SNN conversion process is more for ResNets than plain convolutional architectures, yet further optimizations like including more pre-processing initial layers or better threshold-balancing schemes for the residual units can still be explored. This work serves as the first work to explore ANN-SNN conversion schemes for Total Number of Spikes per Neuron Total Number of Spikes per Neuron Going Deeper in Spiking Neural Networks: VGG and Residual Architectures 10 VGG-16 5 0 6 4 1 3 9 11 7 5 Number of Layers 13 ResNet-34 2 0 20 30 10 Number of Layers Figure 4. Average cumulative spike count generated by neurons in VGG and ResNet architectures on the ImageNet dataset as a function of the layer number. 500 timesteps were used for accumulating the spike-counts for VGG networks while 2000 time-steps were used for ResNet architectures. The neural spiking sparsity increases significantly as network depth increases. Residual Networks and attempts to highlight important design constraints required for minimal loss in the conversion process. 7.4. Computation Reduction Due to Sparse Neural Events ANN operation for prediction of the output class of a particular input requires a single feed-forward pass per image. For SNN operation, the network has to be evaluated over a number of time-steps. However, specialized hardware that accounts for the event-driven neural operation and “computes only when required” can potentially exploit such alternative mechanisms of network operation. For instance, Fig. 4 represents the average total number of output spikes produced by neurons in VGG and ResNet architectures as a function of the layer for ImageNet dataset. A randomly chosen minibatch was used for the averaging process. We used 500 timesteps for accumulating the spikecounts for VGG networks while 2000 time-steps were used for ResNet architectures. This is in accordance to the convergence plots shown in Fig. 3. An important insight obtained from Fig. 4 is the fact that neuron spiking activity becomes sparser as the network depth increases. Hence, benefits from event-driven hardware is expected to increase as the network depth increases. While an estimate of the actual energy consumption reduction for SNN mode of operation is outside the scope of this current work, we provide an intuitive insight by providing the number of computations per synaptic operation being performed in the ANN versus the SNN. The number of synaptic operations per layer of the network can be easily estimated for an ANN from the architecture Table 3. Results for Residual Networks Dataset Network tecture CIFAR-10 ImageNet ResNet-20 ResNet-34 Archi- ANN Error SNN Error 10.9% 29.31% (10.31%) 12.54% 34.53% (13.67%) for the convolutional and linear layers. For the ANN, a multiply-accumulate (MAC) computation takes place per synaptic operation. On the other hand, a specialized SNN hardware would perform an accumulate computation (AC) per synaptic operation only upon the receipt of an incoming spike. Hence, the total number of AC operations occurring in the SNN would be represented by the layerwise product and summation of the average cumulative neural spike count for a particular layer and the corresponding number of synaptic operations. Calculation of this metric reveal that for the VGG network the ratio of SNN AC operations to ANN MAC operations is 1.975 while the ratio is 2.4 for the ResNet (the metric includes only ReLU/IF spiking neuron activations in the network). However, note the fact that a MAC operation involves an order of magnitude more energy consumption than an AC operation. For instance, Ref. (Han et al., 2015b) reports that the energy consumption in a 32-bit floating point MAC operation is 3.2pJ while the energy consumption is only 0.1pJ for an AC operation in 45nm technology. Hence, the energy consumption reduction for our SNN implementation is expected to be 16.2× for the VGG network and 13.3× for the ResNet in comparison to the original ANN implementation. 8. Conclusions and Future Work This work serves to provide inspiration to the fact that SNNs exhibit similar computing power as their ANN counterparts. This can potentially pave the way for the usage of SNNs in large scale visual recognition tasks, which can be enabled by low-power neuromorphic hardware. However, there are still open areas of exploration for improving SNN performance. A significant contribution to the present success of deep NNs is attributed to Batch-Normalization (Ioffe & Szegedy, 2015). While using bias less neural units constrain us to train networks without BatchNormalization, algorithmic techniques to implement Spiking Neurons with a bias term should be explored. Further, it is desirable to train ANNs and convert to SNNs without any accuracy loss. Although the proposed conversion technique attempts to minimize the conversion loss to a large extent, yet other variants of neural functionalities apart from ReLU-IF Spiking Neurons could be potentially explored to further reduce this gap. Additionally, further optimizations to minimize the accuracy loss in ANN-SNN conversion for ResNet architectures should be explored to scale SNN performance to even deeper architectures. Going Deeper in Spiking Neural Networks: VGG and Residual Architectures References Akopyan, Filipp, Sawada, Jun, Cassidy, Andrew, AlvarezIcaza, Rodrigo, Arthur, John, Merolla, Paul, Imam, Nabil, Nakamura, Yutaka, Datta, Pallab, Nam, Gi-Joon, et al. Truenorth: Design and tool flow of a 65 mw 1 million neuron programmable neurosynaptic chip. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(10):1537–1557, 2015. Cao, Yongqiang, Chen, Yang, and Khosla, Deepak. Spiking deep convolutional neural networks for energyefficient object recognition. International Journal of Computer Vision, 113(1):54–66, 2015. Chen, Zhanping, Johnson, Mark, Wei, Liqiong, and Roy, W. Estimation of standby leakage power in cmos circuit considering accurate modeling of transistor stacks. In Low Power Electronics and Design, 1998. Proceedings. 1998 International Symposium on, pp. 239–244. IEEE, 1998. Diehl, Peter U and Cook, Matthew. Unsupervised learning of digit recognition using spike-timing-dependent plasticity. Frontiers in computational neuroscience, 9, 2015. Diehl, Peter U, Neil, Daniel, Binas, Jonathan, Cook, Matthew, Liu, Shih-Chii, and Pfeiffer, Michael. Fast-classifying, high-accuracy spiking deep networks through weight and threshold balancing. In Neural Networks (IJCNN), 2015 International Joint Conference on, pp. 1–8. IEEE, 2015. Esser, Steven K, Merolla, Paul A, Arthur, John V, Cassidy, Andrew S, Appuswamy, Rathinakumar, Andreopoulos, Alexander, Berg, David J, McKinstry, Jeffrey L, Melano, Timothy, Barch, Davis R, et al. Convolutional networks for fast, energy-efficient neuromorphic computing. Proceedings of the National Academy of Sciences, pp. 201604850, 2016. Farabet, Clément, Paz, Rafael, Pérez-Carrasco, Jose, Zamarreño-Ramos, Carlos, Linares-Barranco, Alejandro, LeCun, Yann, Culurciello, Eugenio, SerranoGotarredona, Teresa, and Linares-Barranco, Bernabe. Comparison between frame-constrained fix-pixel-value and frame-free spiking-dynamic-pixel ConvNets for visual processing. Frontiers in neuroscience, 6, 2012. Han, Song, Mao, Huizi, and Dally, William J. Deep compression: Compressing deep neural networks with pruning, trained quantization and huffman coding. arXiv preprint arXiv:1510.00149, 2015a. Han, Song, Pool, Jeff, Tran, John, and Dally, William. Learning both weights and connections for efficient neural network. In Advances in neural information processing systems, pp. 1135–1143, 2015b. Hardt, Moritz and Ma, Tengyu. Identity matters in deep learning. arXiv preprint arXiv:1611.04231, 2016. He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun, Jian. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016a. He, Kaiming, Zhang, Xiangyu, Ren, Shaoqing, and Sun, Jian. Identity mappings in deep residual networks. In European Conference on Computer Vision, pp. 630–645. Springer, 2016b. Hunsberger, Eric and Eliasmith, Chris. Training spiking deep networks for neuromorphic hardware. arXiv preprint arXiv:1611.05141, 2016. Ioffe, Sergey and Szegedy, Christian. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In International Conference on Machine Learning, pp. 448–456, 2015. Izhikevich, Eugene M. Simple model of spiking neurons. IEEE Transactions on neural networks, 14(6): 1569–1572, 2003. Krizhevsky, Alex and Hinton, Geoffrey. Learning multiple layers of features from tiny images. 2009. Krizhevsky, Alex, Sutskever, Ilya, and Hinton, Geoffrey E. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pp. 1097–1105, 2012. LeCun, Yann, Bottou, Léon, Bengio, Yoshua, and Haffner, Patrick. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278– 2324, 1998. Merolla, Paul A, Arthur, John V, Alvarez-Icaza, Rodrigo, Cassidy, Andrew S, Sawada, Jun, Akopyan, Filipp, Jackson, Bryan L, Imam, Nabil, Guo, Chen, Nakamura, Yutaka, et al. A million spiking-neuron integrated circuit with a scalable communication network and interface. Science, 345(6197):668–673, 2014. Pérez-Carrasco, José Antonio, Zhao, Bo, Serrano, Carmen, Acha, Begona, Serrano-Gotarredona, Teresa, Chen, Shouchun, and Linares-Barranco, Bernabé. Mapping from Frame-Driven to Frame-Free Event-Driven Vision Systems by Low-Rate Rate Coding and Coincidence Processing–Application to Feedforward ConvNets. IEEE transactions on pattern analysis and machine intelligence, 35(11):2706–2719, 2013. Posch, Christoph, Matolin, Daniel, and Wohlgenannt, Rainer. A QVGA 143 dB dynamic range frame-free Going Deeper in Spiking Neural Networks: VGG and Residual Architectures PWM image sensor with lossless pixel-level video compression and time-domain CDS. IEEE Journal of SolidState Circuits, 46(1):259–275, 2011. Posch, Christoph, Serrano-Gotarredona, Teresa, LinaresBarranco, Bernabe, and Delbruck, Tobi. Retinomorphic event-based vision sensors: bioinspired cameras with spiking output. Proceedings of the IEEE, 102(10):1470– 1484, 2014. Russakovsky, Olga, Deng, Jia, Su, Hao, Krause, Jonathan, Satheesh, Sanjeev, Ma, Sean, Huang, Zhiheng, Karpathy, Andrej, Khosla, Aditya, Bernstein, Michael, et al. Imagenet large scale visual recognition challenge. International Journal of Computer Vision, 115(3):211–252, 2015. Simonyan, Karen and Zisserman, Andrew. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. Srivastava, Nitish, Hinton, Geoffrey E, Krizhevsky, Alex, Sutskever, Ilya, and Salakhutdinov, Ruslan. Dropout: a simple way to prevent neural networks from overfitting. Journal of machine learning research, 15(1):1929–1958, 2014. Szegedy, Christian, Liu, Wei, Jia, Yangqing, Sermanet, Pierre, Reed, Scott, Anguelov, Dragomir, Erhan, Dumitru, Vanhoucke, Vincent, and Rabinovich, Andrew. Going deeper with convolutions. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 1–9, 2015. Zhao, Bo, Ding, Ruoxi, Chen, Shoushun, LinaresBarranco, Bernabe, and Tang, Huajin. Feedforward categorization on AER motion events using cortex-like features in a spiking neural network. IEEE transactions on neural networks and learning systems, 26(9):1963– 1978, 2015.
1cs.CV
arXiv:1702.00561v1 [math.GR] 2 Feb 2017 Autocommuting probability of a finite group Parama Dutta and Rajat Kanti Nath∗ Department of Mathematical Sciences, Tezpur University, Napaam-784028, Sonitpur, Assam, India. Emails: [email protected] and [email protected] Abstract Let G be a finite group and Aut(G) the automorphism group of G. The autocommuting probability of G, denoted by Pr(G, Aut(G)), is the probability that a randomly chosen automorphism of G fixes a randomly chosen element of G. In this paper, we study Pr(G, Aut(G)) through a generalization. We obtain a computing formula, several bounds and characterizations of G through Pr(G, Aut(G)). We conclude the paper by showing that the generalized autocommuting probability of G remains unchanged under autoisoclinism. Key words: Automorphism group, Autocommuting probability, Autoisoclinism. 2010 Mathematics Subject Classification: 20D60, 20P05, 20F28. 1 Introduction Let G be a finite group and Aut(G) be its automorphism group. For any x ∈ G and α ∈ Aut(G) the element x−1 α(x), denoted by [x, α], is called an autocommutator in G. We write S(G, Aut(G)) to denote the set {[x, α] : x ∈ G and α ∈ Aut(G)} and K(G) := hS(G, Aut(G))i. We also write L(G) := {x : [x, α] = 1 for all α ∈ Aut(G)}. Note that K(G) and L(G) are characteristic subgroups of G known as the autocommutator subgroup and absolute center of G. It is easy to see that K(G) contains the commutator subgroup G′ and L(G) is contained in the center Z(G) of G. Further, L(G) = ∩ CG (α), where CG (α) = {x ∈ G : [x, α] = 1} is a subgroup of α∈Aut(G) G known as acentralizer of α ∈ Aut(G). The subgroups K(G) and L(G) were defined and studied by Hegarty in [6]. Let CAut(G) (x) := {α ∈ Aut(G) : α(x) = x} for x ∈ G then CAut(G) (x) is a subgroup of Aut(G) and CAut(G) (G) = {α ∈ Aut(G) : α(x) = x for all x ∈ G}. It follows that CAut(G) (G) = ∩ CAut(G) (x). x∈G ∗ Corresponding author 1 Let G be a finite group acting on a set Ω. In the year 1975, Sherman [13] introduced the probability that a randomly chosen element of Ω fixes a randomly chosen element of G. We denote this probability by Pr(G, Ω). If Ω = Aut(G) then Pr(G, Aut(G)) is nothing but the probability that the autocommutator of a randomly chosen pair of elements, one from G and the other from Aut(G), is equal to 1 (the identity element of G). Thus Pr(G, Aut(G)) = |{(x, α) ∈ G × Aut(G) : [x, α] = 1}| . |G|| Aut(G)| (1.1) Pr(G, Aut(G)) is called autocommuting probability of G. Sherman [13] considered the case when G is abelian and Ω = Aut(G). Note that if we take Ω = Inn(G), the inner automorphim group of G, then Pr(G, Inn(G)) gives the probability that a randomly chosen pair of elements of G commute. Pr(G, Inn(G)) is known as commuting probability of G. It is also denoted by Pr(G). The study of Pr(G) was initiated by Erdös and Turán [4]. After Erdös and Turán many authors have worked on Pr(G) and its generalizations (conf. [3] and the references therein). Somehow the study of Pr(G, Aut(G)) was neglected for long time. At this moment we have only a handful of papers on Pr(G, Aut(G)) (see [2], [8], [12]). In this paper, we study Pr(G, Aut(G)) through a generalization. In the year 2008, Pournaki and Sobhani [10] have generalized Pr(G) and considered the probability that the commutator of a randomly chosen pair of elements of G equals a given element g ∈ G. We write Prg (G) to denote this probability. Motivated by their work, in this paper, we consider the probability that the autocommutator of a randomly chosen pair of elements, one from G and the other from Aut(G), is equal to a given element g ∈ G. We write Prg (G, Aut(G)) to denote this probability. Thus, Prg (G, Aut(G)) = |{(x, α) ∈ G × Aut(G) : [x, α] = g}| . |G|| Aut(G)| (1.2) Notice that Pr1 (G, Aut(G)) = Pr(G, Aut(G)). Hence Prg (G, Aut(G)) is a generalization of Pr(G, Aut(G)). Clearly, Prg (G, Aut(G)) = 1 if and only if K(G) = {1} and g = 1 if and only if G = L(G) and g = 1. Also, Prg (G, Aut(G)) = 0 if and only if g ∈ / S(G, Aut(G)). Therefore, we consider G 6= L(G) and g ∈ S(G, Aut(G)) throughout the paper. In Section 2, we obtain a computing formula for Prg (G, Aut(G)) and deduce some of its consequences. In Section 3, we obtain several bounds for Prg (G, Aut(G)). In Section 4, we obtain some characterizations of G through Pr(G, Aut(G)). Finally, in the last section, we show that Prg (G, Aut(G)) is an invariant under autoisoclinism of groups. 2 A computing formula For any x, g ∈ G let Tx,g denotes the set {α ∈ Aut(G) : [x, α] = g}. Note that Tx,1 = CAut(G) (x). The following two lemmas play a crucial role in obtaining the computing formula for Prg (G, Aut(G)). Lemma 2.1. Let G be a finite group. If Tx,g 6= φ then Tx,g = σCAut(G) (x) for some σ ∈ Tx,g . Hence, |Tx,g | = |CAut(G) (x)|. 2 Proof. Let σ ∈ Tx,g and β ∈ σCAut(G) (x). Then β = σα for some α ∈ CAut(G) (x). We have [x, β] = [x, σα] = x−1 σ(α(x)) = [x, σ] = g. Therefore, β ∈ Tx,g and so σCAut(G) (x) ⊆ Tx,g . Again, let γ ∈ Tx,g then γ(x) = xg. We have σ −1 γ(x) = σ −1 (xg) = x and so σ −1 γ ∈ CAut(G) (x). Therefore, γ ∈ σCAut(G) (x) which gives Tx,g ⊆ σCAut(G) (x). Hence, the result follows. We know that Aut(G) acts on G by the action (α, x) 7→ α(x) where α ∈ Aut(G) and x ∈ G. Let orb(x) := {α(x) : α ∈ Aut(G)} be the orbit of x ∈ G. Then by orbit-stabilizer theorem, we have | orb(x)| = | Aut(G)| . |CAut(G) (x)| (2.1) Lemma 2.2. Let G be a finite group. Then Tx,g 6= φ if and only if xg ∈ orb(x). Proof. The result follows from the fact that α ∈ Tx,g if and only if xg ∈ orb(x). Now we state and prove the main theorem of this section. Theorem 2.3. Let G be a finite group. If g ∈ G then Prg (G, Aut(G)) = 1 |G|| Aut(G)| X |CAut(G) (x)| = x∈G xg∈orb(x) Proof. We have {(x, α) ∈ G × Aut(G) : [x, α] = g} = 1 |G| X x∈G xg∈orb(x) 1 . | orb(x)| ⊔ ({x} × Tx,g ), where ⊔ x∈G represents the union of disjoint sets. Therefore, by (1.2), we have X |G|| Aut(G)|Prg (G, Aut(G)) = | ⊔ ({x} × Tx,g )| = |Tx,g |. x∈G x∈G Hence, the result follows from Lemma 2.1, Lemma 2.2 and (2.1). Taking g = 1, in Theorem 2.3, we get the following corollary. Corollary 2.4. Let G be a finite group. Then Pr(G, Aut(G)) = X 1 | orb(G)| |CAut(G) (x)| = |G|| Aut(G)| x∈G |G| where orb(G) = {orb(x) : x ∈ G}. Corollary 2.5. Let G be a finite group. If CAut(G) (x) = {I} for all x ∈ G \ {1}, where I is the identity element of Aut(G), then Pr(G, Aut(G)) = 1 1 1 + − . |G| | Aut(G)| |G|| Aut(G)| Proof. By Corollary 2.4, we have |G|| Aut(G)| Pr(G, Aut(G)) = X |CAut(G) (x)| = | Aut(G)| + |G| − 1. x∈G Hence, the result follows. 3 P We also have |{(x, α) ∈ G × Aut(G) : [x, α] = 1}| = |CG (α)| and hence α∈Aut(G) Pr(G, Aut(G)) = 1 |G|| Aut(G)| X |CG (α)|. (2.2) α∈Aut(G) We conclude this section with the following two results. Proposition 2.6. Let G be a finite group. If g ∈ G then Prg−1 (G, Aut(G)) = Prg (G, Aut(G)). Proof. Let A = {(x, α) ∈ G × Aut(G) : [x, α] = g} and B = {(y, β) ∈ G × Aut(G) : [y, β] = g −1 }. Then (x, α) 7→ (α(x), α−1 ) gives a bijection between A and B. Therefore |A| = |B|. Hence the result follows from (1.2). Proposition 2.7. Let G and H be two finite groups such that gcd(|G|, |H|) = 1. If (g, h) ∈ G × H then Pr(g,h) (G × H, Aut(G × H)) = Prg (G, Aut(G))Prh (H, Aut(H)). Proof. Let X = {((x, y), αG×H ) ∈ (G × H) × Aut(G × H) : [(x, y), αG×H ] = (g, h)}, Y = {(x, αG ) ∈ G × Aut(G) : [x, αG ] = g} and Z = {(y, αH ) ∈ H × Aut(H) : [y, αH ] = h}. Since gcd(|G|, |H|) = 1, by [1, Lemma 2.1], we have Aut(G × H) = Aut(G) × Aut(H). Therefore, for every αG×H ∈ Aut(G × H) there exist unique αG ∈ Aut(G) and αH ∈ Aut(H) such that αG×H = αG × αH , where αG × αH ((x, y)) = (αG (x), αH (y)) for all (x, y) ∈ G × H. Also, for all (x, y) ∈ G × H, we have [(x, y), αG×H ] = (g, h) if and only if [x, αG ] = g and [y, αH ] = h. These leads to show that X = Y × Z. Therefore |X | |Y| |Z| = · . |G × H|| Aut(G × H)| |G|| Aut(G)| |H|| Aut(H)| Hence, the result follows from (1.1). 3 Some bounds We begin with the following lower bounds. Proposition 3.1. Let G be a finite group. Then |CAut(G) (G)|(|G|−|L(G)|) |G|| Aut(G)| (a) Prg (G, Aut(G)) ≥ |L(G)| |G| (b) Prg (G, Aut(G)) ≥ |L(G)||CAut(G) (G)| |G|| Aut(G)| + if g 6= 1. 4 if g = 1. Proof. Let C := {(x, α) ∈ G × Aut(G) : [x, α] = g}. (a) We have (L(G) × Aut(G)) ∪ (G × CAut(G) (G)) ⊆ C and |(L(G) × Aut(G)) ∪ (G × CAut(G) (G))| is equal to |L(G)|| Aut(G)| + |CAut(G) (G)||G| − |L(G)||CAut(G) (G)|. Hence, the result follows from (1.2). (b) Since g ∈ S(G, Aut(G)) we have C is non-empty. Let (y, β) ∈ C then (y, β) ∈ / L(G) × CAut(G) (G) otherwise [y, β] = 1. It is easy to see that the coset (y, β)(L(G) × CAut(G) (G)) having order |L(G)||CAut(G) (G)| is a subset of C. Hence, the result follows from (1.2). Proposition 3.2. Let G be a finite group. Then Prg (G, Aut(G)) ≤ Pr(G, Aut(G)). The equality holds if and only if g = 1. Proof. By Theorem 2.3, we have Prg (G, Aut(G)) = ≤ 1 |G|| Aut(G)| X |CAut(G) (x)| x∈G xg∈orb(x) X 1 |CAut(G) (x)| = Pr(G, Aut(G)). |G|| Aut(G)| x∈G The equality holds if and only if xg ∈ orb(x) for all x ∈ G if and only if g = 1. Proposition 3.3. Let G be a finite group and p the smallest prime dividing | Aut(G)|. If g 6= 1 then 1 |G| − |L(G)| < . Prg (G, Aut(G)) ≤ p|G| p Proof. By Theorem 2.3, we have Prg (G, Aut(G)) = 1 |G| X x∈G\L(G) xg∈orb(x) 1 | orb(x)| (3.1) noting that for x ∈ L(G) we have xg ∈ / orb(x). Also, for x ∈ G \ L(G) and xg ∈ orb(x) we have | orb(x)| > 1. Since | orb(x)| is a divisor of | Aut(G)| we have | orb(x)| ≥ p. Hence, the result follows from (3.1). The remaining part of this section is devoted in obtaining some lower and upper bounds for Pr(G, Aut(G)). The following theorem is an improvement of [8, Theorem 2.3 (ii)]. Theorem 3.4. Let G be a finite group and p the smallest prime dividing | Aut(G)|. Then |L(G)| p(|G| − |XG | − |L(G)|) + |XG | Pr(G, Aut(G)) ≥ + |G| |G|| Aut(G)| and (p − 1)|L(G)| + |G| |XG |(| Aut(G)| − p) Pr(G, Aut(G)) ≤ − , p|G| p|G|| Aut(G)| where XG = {x ∈ G : CAut(G) (x) = {I}}. 5 Proof. We have XG ∩ L(G) = φ. Therefore X |CAut(G) (x)| = |XG | + | Aut(G)||L(G)| + x∈G X |CAut(G) (x)|. x∈G\(XG ∪L(G)) For x ∈ G \ (XG ∪ L(G)) we have {I} 6= CAut(G) (x) 6= Aut(G) which implies p ≤ |CAut(G) (x)| ≤ | Aut(G)| . Therefore p X |CAut(G) (x)| ≥ |XG | + | Aut(G)||L(G)| + p(|G| − |XG | − |L(G)|) (3.2) x∈G and X |CAut(G) (x)| ≤ |XG | + | Aut(G)||L(G)| + x∈G | Aut(G)|(|G| − |XG | − |L(G)|) . (3.3) p Hence, the result follows from Corollary 2.4, (3.2) and (3.3). We have the following two corollaries. Corollary 3.5. Let G be a finite group. If p and q are the smallest primes dividing | Aut(G)| and |G| respectively then Pr(G, Aut(G)) ≤ In particular, if p = q then Pr(G, Aut(G)) ≤ p+q−1 . pq 2p−1 p2 ≤ 43 . Proof. Since G 6= L(G) we have |G : L(G)| ≥ q. Therefore, by Theorem 3.4, we have   p+q−1 p−1 1 +1 ≤ . Pr(G, Aut(G)) ≤ p |G : L(G)| pq Corollary 3.6. Let G be a finite group and p, q be the smallest primes dividing | Aut(G)| and |G| respectively. If G is non-abelian then Pr(G, Aut(G)) ≤ In particular, if p = q then Pr(G, Aut(G)) ≤ q2 + p − 1 . pq 2 p2 +p−1 p3 ≤ 58 . Proof. Since G is non-abelian we have |G : L(G)| ≥ q 2 . Therefore, by Theorem 3.4, we have   1 q2 + p − 1 p−1 Pr(G, Aut(G)) ≤ +1 ≤ . p |G : L(G)| pq 2 Theorem 3.7. Let G be a finite group. Then   1 |S(G, Aut(G))| − 1 Pr(G, Aut(G)) ≥ 1+ . |S(G, Aut(G))| |G : L(G)| The equality holds if and only if orb(x) = xS(G, Aut(G)) for all x ∈ G \ L(G). 6 Proof. For all x ∈ G \ L(G) we have α(x) = x[x, α] ∈ xS(G, Aut(G)). Therefore orb(x) ⊆ xS(G, Aut(G)) and so | orb(x)| ≤ |S(G, Aut(G))| for all x ∈ G \ L(G). Now, by Corollary 2.4, we have   X 1  X 1 1  Pr(G, Aut(G)) = + |G| | orb(x)| | orb(x)| x∈G\L(G) x∈L(G) |L(G)| 1 ≥ + |G| |G| X x∈G\L(G) 1 . |S(G, Aut(G))| Hence, the result follows. The following lemma is useful in obtaining the next corollary. Lemma 3.8. Let G be a finite group. Then, for any two integers m ≥ n, we have     n−1 1 m−1 1 1+ ≥ 1+ . n |G : L(G)| m |G : L(G)| If L(G) 6= G then equality holds if and only if m = n. Proof. The proof is an easy exercise. Corollary 3.9. Let G be a finite group. Then   |K(G)| − 1 1 1+ . Pr(G, Aut(G)) ≥ |K(G)| |G : L(G)| If G 6= L(G) then the equality holds if and only if K(G) = S(G, Aut(G)) and orb(x) is equal to S(G, Aut(G)) for all x ∈ G \ L(G). Proof. Since |K(G)| ≥ |S(G, Aut(G))|, the result follows from Theorem 3.7 and Lemma 3.8. Note that the equality holds if and only if equality holds in Theorem 3.7 and Lemma 3.8. This lower bound is also obtained in [2]. Note that the lower bound in Theorem 3.7 is better than that in Corollary 3.9. Also   p(|G| − |L(G)|) |K(G)| − 1 |L(G)| 1 + . 1+ ≥ |K(G)| |G : L(G)| |G| |G|| Aut(G)| Hence, the lower bound in Theorem 3.7 is also better than that in [8, Theorem 2.3(ii)]. 4 Some Characterizations In [2], Arora and Karan obtain a characterization of a finite group G if equality holds in Corollary 3.9. In this section, we obtain some characterizations of G if equality holds in Corollary 3.5 and Corollary 3.6. We begin with the following result. 7 Proposition 4.1. Let G be a finite group with Pr(G, Aut(G)) = p+q−1 for some pq primes p and q. Then pq divides |G|| Aut(G)|. If p and q are the smallest primes dividing | Aut(G)| and |G| respectively, then G ∼ = Zq . L(G) In particular, if G and Aut(G) are of even order and Pr(G, Aut(G)) = Z2 . 3 4 then G L(G) ∼ = Proof. By (1.1), we have (p + q − 1)|G|| Aut(G)| = pq|{(x, α) ∈ G × Aut(G) : [x, α] = 1}|. Therefore, pq divides |G|| Aut(G)|. If p and q are the smallest primes dividing | Aut(G)| and |G| respectively then, by Theorem 3.4, we have   p+q−1 1 p−1 ≤ +1 pq p |G : L(G)| which gives |G : L(G)| ≤ q. Hence, G L(G) ∼ = Zq . 2 +p−1 Proposition 4.2. Let G be a finite non-abelian group with Pr(G, Aut(G)) = q pq 2 for some primes p and q. Then pq divides |G|| Aut(G)|. If p and q are the smallest primes dividing | Aut(G)| and |G| respectively then G ∼ = Zq × Zq . L(G) In particular, if G and Aut(G) are of even order and Pr(G, Aut(G)) = Z2 × Z2 . 5 8 then G L(G) ∼ = Proof. By (1.1), we have (q 2 + p − 1)|G|| Aut(G)| = pq 2 |{(x, α) ∈ G × Aut(G) : [x, α] = 1}|. Therefore, pq divides |G|| Aut(G)|. If p and q are the smallest primes dividing | Aut(G)| and |G| respectively then, by Theorem 3.4, we have   1 p−1 q2 + p − 1 ≤ + 1 pq 2 p |G : L(G)| which gives |G : L(G)| ≤ q 2 . Since G is non-abelian we have |G : L(G)| = 6 1, q. Hence, G ∼ Z × Z . = q q L(G) We conclude this section with the following partial converses of Proposition 4.1 and 4.2. Proposition 4.3. Let G be a finite group. Let p, q be the smallest prime divisors of | Aut(G)| and |G| respectively and | Aut(G) : CAut(G) (x)| = p for all x ∈ G \ L(G). (a) If G ∼ = Zq then Pr(G, Aut(G)) = p+q−1 . L(G) (b) If G L(G) pq ∼ = Zq × Zq then Pr(G, Aut(G)) = 8 q 2 +p−1 . pq 2 Proof. Since | Aut(G) : CAut(G) (x)| = p for all x ∈ G \ L(G) we have |CAut(G) (x)| = | Aut(G)| for all x ∈ G \ L(G). Therefore, by Corollary 2.4, we have p Pr(G, Aut(G)) = = 1 |L(G)| + |G| |G|| Aut(G)| |CAut(G) (x)| x∈G\L(G) |L(G)| |G| − |L(G)| + . |G| p|G| Thus Pr(G, Aut(G)) = 1 p   p−1 +1 . |G : L(G)| (4.1) ∼ . = Zq then (4.1) gives Pr(G, Aut(G)) = p+q−1 pq q 2 +p−1 ∼ = Zq × Zq then (4.1) gives Pr(G, Aut(G)) = pq2 . (b) If G L(G) G L(G) 5 Autoisoclinism of groups (a) If X In the year 1940, Hall defined isoclinism between two groups (see [5]). In the year 1995, Lescot [7] showed that the commuting probability of two isoclinic finite groups are same. Later on Pournaki and Sobhani [10] showed that Prg (G) = Prβ(g) (H) if (α, β) is an isoclinism between the finite groups G and H. Following Hall, Moghaddam et al. [9] have defined autoisoclinism between two groups. Recall that two groups G G H and H are said to be autoisoclinic if there exist isomorphisms ψ : L(G) → L(H) , β : K(G) → K(H) and γ : Aut(G) → Aut(H) such that the following diagram commutes G L(G) ψ×γ × Aut(G) − −−−−→  a(G,Aut(G)) y K(G) where the maps a(G,Aut(G)) : Aut(H) → K(H) are given by G L(G) β − −−−−→ H L(H) × Aut(H)  a(H,Aut(H)) y K(H) × Aut(G) → K(G) and a(H,Aut(H)) : H L(H) × a(G,Aut(G)) (xL(G), α1 ) = [x, α1 ] and a(H,Aut(H)) (yL(H), α2 ) = [y, α2 ] respectively. In this case, the pair (ψ × γ, β) is called an autoisoclinism between the groups G and H. Recently, in [12], Rismanchain and Sepehrizadeh have shown that Pr(G, Aut(G)) = Pr(H, Aut(H)) if G and H are autoisoclinic finite groups. We conclude this paper with the following generalization of [12, Lemma 2.5]. Theorem 5.1. Let G and H be two finite groups and (ψ × γ, β) an autoisoclinism between them. Then Prg (G, Aut(G)) = Prβ(g) (H, Aut(H)). G Proof. Let Sg = {(xL(G), α1 ) ∈ L(G) ×Aut(G) : [x, α1 ] = g} and Tβ(g) = {(yL(H), α2 ) H ∈ L(H) × Aut(H) : [y, α2 ] = β(g)}. Since (ψ × γ, β) an autoisoclinism between G and 9 H, the mapping λ : Sg → Tβ(g) given by (xL(G), α1 ) 7→ (ψ(xL(G)), γ(α1 )) gives an one to one correspondence between Sg and Tβ(g) . Hence, |Sg | = |Tβ(g) |. Also |{(x, α1 ) ∈ G × Aut(G) : [x, α1 ] = g}| = |L(G)||Sg | (5.1) |{(y, α2 ) ∈ H × Aut(H) : [y, α2 ] = β(g)}| = |L(H)||Tβ(g) |. (5.2) and Therefore, by (1.1) and (5.1), we have Prg (G, Aut(G)) = |L(G)||Sg | . |G|| Aut(G)| Since |G/L(G)| = |H/L(H)| and | Aut(G)| = | Aut(H)| we have Prg (G, Aut(G)) = |L(H)||Tβ(g) | . |H|| Aut(H)| Hence, the result follows from (5.2) and (1.1). References [1] J. H. Christopher and L. R. Darren, Automorphism of finite abelian groups, Amer. Math. Monthly, 114, 917–923. [2] H. Arora and R. Karan, What is the probability an automorphism fixes a group element?, Comm. Algebra, 45(3), 1141–1150 (2017). [3] A. K. Das, R. K. Nath and M. R. Pournaki, A survey on the estimation of commutativity in finite groups, Southeast Asian Bull. Math., 37(2), 161–180 (2013). [4] P. Erdös and P. Turán, On some problems of a statistical group-theory. IV, Acta. Math. Acad. Sci. Hungar., 19, 413–435 (1968). [5] P. Hall, The classification of prime power groups, J. Reine Angew. Math., 182, 130–141 (1940). [6] P. V. Hegarty, The absolute centre of a group, J. Algebra, 169(3), 929–935 (1994). [7] P. Lescot, Isoclinism classes and commutativity degrees of finite groups, J. Algebra, 177, 847–869 (1995). [8] M. R. R. Moghaddam, F. Saeedi and E. Khamseh, The probability of an automorphism fixing a subgroup element of a finite group, Asian-Eur. J. Math. 4(2), 301308 (2011). [9] M. R. R. Moghaddam, M. J. Sadeghifard and M. Eshrati, Some properties of autoisoclinism of groups, Fifth International group theory conference, Islamic Azad University, Mashhad, Iran, 13-15 March 2013. [10] M. R. Pournaki and R. Sobhani, Probability that the commutator of two group elements is equal to a given element, J. Pure Appl. Algebra, 212, 727–734 (2008). [11] R. Rezaei, A. Erfanian and P. Lescot, A note on the relative commutativity degree of finite groups, Asian-Eur. J. Math., 7 (2014), DOI: 10.1142/S179355711450017X. [12] M. R. Rismanchian and Z. Sepehrizadeh, Autoisoclinism classes and autocommutativity degrees of finite groups, Hacet. J. Math. Stat. 44(4), 893–899 (2015). [13] G. J. Sherman, What is the probability an automorphism fixes a group element?, Amer. Math. Monthly, 82, 261–264 (1975). 10
4math.GR
A tight lower bound for Vertex Planarization on graphs of bounded treewidth Marcin Pilipczuk∗ arXiv:1511.08283v1 [cs.DS] 26 Nov 2015 Abstract In the Vertex Planarization problem one asks to delete the minimum possible number of vertices from an input graph to obtain a planar graph. The parameterized complexity of this problem, parameterized by the solution size (the number of deleted vertices) has recently attracted significant attention. The state-of-the-art algorithm of Jansen, Lokshtanov, and Saurabh [SODA 2014] runs in time 2O(k log k) · n on n-vertex graph with a solution of size k. It remains open if one can obtain a single-exponential dependency on k in the running time bound. One of the core technical contributions of the work of Jansen, Lokshtanov, and Saurabh is an algorithm that solves a weighted variant of Vertex Planarization in time 2O(w log w) · n on graphs of treewidth w. In this short note we prove that the running time of this routine is tight under the Exponential Time Hypothesis, even in unweighted graphs and when parameterizing by treedepth. Consequently, it is unlikely that a potential single-exponential algorithm for Vertex Planarization parameterized by the solution size can be obtained by merely improving upon the aforementioned bounded treewidth subroutine. 1 Introduction In the Vertex Planarization problem, given an undirected graph G and an integer k, our goal is to delete at most k vertices from the graph G to obtain a planar graph. If (G, k) is a YES-instance to Vertex Planarization, then we say that G is a k-apex graph. Since many algorithms for planar graphs can be easily generalized to near-planar graphs — k-apex graphs for small values of k — this motivates us to look for efficient algorithms to recognize k-apex graphs. In other words, we would like to solve Vertex Planarization for small values of k. By a classical result of Lewis and Yannakakis [8], Vertex Planarization is NP-hard when k is part of the input. Since one can check if a given graph is planar in linear time [4], Vertex Planarization can be trivially solved in time O(nk+1 ), where n = |V (G)|, that is, in polynomial time for every fixed value of k. However, such an algorithm is impractical even for small values of k; a question for a faster algorithm brings us to the realms of parameterized complexity. In the parameterized complexity, every problem comes with a parameter, being an additional complexity measure of input instances. The central notion is a fixed-parameter algorithm: an algorithm that solves an instance x with parameter k in time f (k)|x|O(1) for some computable function f . Such a running time bound, while still super-polynomial (the function f is usually exponential), is considered significantly better than say O(|x|k ), as it promises much faster algorithms for moderate values of k and large instances. We refer to recent textbooks [1, 2] for a more broad introduction to parameterized complexity. Due to the aforementioned motivation, it is natural to consider the solution size k as a parameter for Vertex Planarization, and ask for a fixed-parameter algorithm. Since, for a fixed value of k, the class of all k-apex graphs is closed under taking minors, the graph minor theory of Roberston and Seymour immediately yields a fixed-parameter algorithm, but with enormous dependency on the parameter in the running time bound.1 The quest for an explicit and faster fixed-parameter algorithm for Vertex Planarization has attracted significant attention in the parameterized complexity community ∗ Institute of Informatics, University of Warsaw, Poland, [email protected] this algorithm is non-uniform, that is, it requires an external advice depending on the parameter only. However, we can obtain a uniform algorithm using the techniques of Fellows and Langston [3]. 1 Formally, 1 in the recent years. First, Marx and Schlotter [12] obtained a relatively simple algorithm, with doublyexponential dependency on the parameter and n2 dependency on the input size in the running time bound. Later, Kawarabayashi [7] obtained a fixed-parameter algorithm with improved linear dependency on the input size, at the cost of worse dependency on the parameter. Finally, Jansen, Lokshtanov, and Saurabh [6] developed an algorithm with running time bound 2O(k log k) · n, improving upon all previous results. As noted in [6], a simple reduction shows that Vertex Planarization cannot be solved in time 2o(k) · nO(1) unless the Exponential Time Hypothesis fails. Informally speaking, the Exponential Time Hypothesis (ETH) [5] asserts that the satisfiability of 3-CNF formulae cannot be verified in time subexponential in the number of variables. In the recent years, a number of tight bounds for fixed-parameter algorithms have been obtained using ETH or the closely related Strong ETH; we refer to [9, 11] for an overview. In this light, it is natural to ask for tight bounds for fixed-parameter algorithms for Vertex Planarization. In particular, [6] asks for a single-exponential (i.e., with running time bound 2O(k) nO(1) ) algorithm. The core subroutine of the algorithm of Jansen, Lokshtanov, and Saurabh, is an algorithm that solves Vertex Planarization in time 2O(w log w) · n on graphs of treewidth w. A direct way to obtain a single-exponential algorithm for Vertex Planarization parameterized by the solution size would be to improve the running time of this bounded treewidth subroutine to 2O(w) · nO(1) . In this short note we show that such an improvement is unlikely, as it would violate the Exponential Time Hypothesis. Theorem 1. Unless the Exponential Time Hypothesis fails, there does not exist an algorithm that solves Vertex Planarization on n-vertex graphs of treewidth at most w in time 2o(w log w) nO(1) . In fact, our lower bound holds even for a more restrictive parameter of treedepth, instead of treewidth. While Theorem 1 does not exclude the possibility of a 2O(k) nO(1) -time algorithm for Vertex Planarization, it shows that to obtain such a running time one needs to circumvent the usage of boundedtreewidth subroutine on graphs of treewidth Ω(k) in the algorithm of Jansen, Lokshtanov, and Saurabh. The remainder of this paper is devoted to the proof of Theorem 1. 2 Lower bound We base our reduction on the framework for proving superexponential lower bounds introduced by Lokshtanov, Marx, and Saurabh [10]. For an integer k, by [k] we denote the set {1, 2, . . . , k}. Consequently, [k] × [k] is a k × k table of elements with rows being subsets of the form {i} × [k], and columns being subsets of the form [k] × {i}. We start from the following auxiliary problem. k × k Permutation Clique Parameter: k Input: An integer k and a graph G with vertex set [k] × [k]. Question: Is there a k-clique in G with exactly one element from each row and exactly one element from each column? As proven in [10], an 2o(k log k) -time algorithm for k × k Permutation Clique would violate ETH. Hence, to prove Theorem 1, it suffices to prove the following. Lemma 2. There exists a polynomial time algorithm that, given an instance (G, k) of k × k Permutation Clique, outputs an equivalent instance (H, `) of Vertex Planarization where the treedepth of the graph H is bounded by O(k). That is, as announced in the introduction, we in fact prove a stronger variant of Theorem 1, refuting an existence of a 2o(w log w) nO(1) -time algorithm for Vertex Planarization parameterized by the treedepth of the input graph. Recall that the treedepth of a graph G, denoted td(G), is always not smaller than the treewidth of G, and satisfies the following recursive formula. Lemma 3 ([13]). The treedepth of an empty graph is 0, and the treedepth of a one-vertex graph equals 1. The treedepth of a disconnected graph G equals the maximum of the treedepth of the connected components of G. The treedepth of a connected graph G is equal to td(G) = 1 + min td(G − {v}). v∈V (G) 2 Figure 1: Choice gadget C4 . The vertices ai are black and the vertices bj are white. A minimum solution that leaves b3 undeleted is marked with dashed circles. We refer to the textbook [14] for more information on treedepth. The rest of this section is devoted to the proof of Lemma 2. 2.1 One-in-many gadget We begin with a description of a gadget that allows us to encode a choice among many options. Given two vertices x and y, by introducing a K5 -edge xy we mean the following operation: we introduce three new vertices z1 , z2 and z3 and make x, y, z1 , z2 , z3 a clique. Note that in every solution to Vertex Planarization, at least one of the vertices of the set {x, y, z1 , z2 , z3 } needs to be deleted. As we do not add any more edges incident to any vertex zi , i = 1, 2, 3, we may safely restrict ourselves to solutions to Vertex Planarization that contain x or y and do not contain any of the vertices zi , i = 1, 2, 3. That is, we treat the vertices zi as undeletable vertices, and henceforth by a “solution to Vertex Planarization” we mean a solution not containing any such vertex. For an integer s ≥ 1, we define an s-choice gadget Cs as follows. We start with 3s+2 vertices denoted ai for 0 ≤ i ≤ 2s + 1 and bj for 1 ≤ j ≤ s. Then, for each 0 ≤ i < 2s + 1 we introduce a K5 -edge ai ai+1 and for each 1 ≤ j < s we introduce two K5 -edges bj a2j−1 and bj a2j . Any choice gadget created in the construction will be attached to the rest of the graph using the vertices bj ; informally speaking, in any optimal solution, exactly one vertex bj remains undeleted. We summarize the properties the s-choice gadget in the following lemma; see Figure 1 for an illustration. Lemma 4. For an s-choice gadget Cs , the following holds. 1. A minimum solution to Vertex Planarization on Cs consists of 2s vertices. 2. For every 1 ≤ j ≤ s there exists a minimum solution X to Vertex Planarization on Cs that contains all vertices bj 0 for j 0 6= j. 3. In every minimum solution to Vertex Planarization on Cs , at least one vertex bj remains undeleted. 4. The treedepth of the s-choice gadget is O(log s). Furthermore, the same treedepth bound holds for a graph constructed from an s-choice gadget by, for every 1 ≤ j ≤ s, introducing a constant-size graph Gj and identifying one vertex of Gj with the vertex bj . Proof. First, note that for every 1 ≤ j ≤ s, the set {bj 0 : j 0 6= j} ∪ {a2j 0 −1 : 1 ≤ j 0 ≤ j} ∪ {a2j 0 : j ≤ j 0 ≤ s} is a solution to Vertex Planarization on Cs of size 2s that contains all vertices bj 0 except for bj . Moreover, observe that, due to K5 -edges, for every 1 ≤ j ≤ s, any solution to Vertex Planarization on Cs needs to delete at least two vertices from the set {a2j−1 , a2j , bj }, and consequently has size at least 2s. This settles the first two claims. For the third claim, note that any vertex cover of a path of length 2s + 1 needs to contain at least s + 1 vertices, and consequently a solution to Vertex Planarization on Cs \ {bj : 1 ≤ j ≤ s} needs to contain at least s + 1 vertices. Thus, any solution to Vertex Planarization on Cs that contains {bj : 1 ≤ j ≤ s} contains at least 2s + 1 vertices. This settles the third claim. We prove the last claim by induction on s. For s = O(1), the gadget and the attached graphs Gj are of constant size, and the treedepth is constant. Otherwise, for an s-choice gadget Cs , we delete the three vertices z1 , z2 , z3 from the K5 -edge between a2bs/2c and a2bs/2c+1 . Note that the gadget splits into two connected components, both being subgraphs of a graph in question constructed from a ds/2e-choice gadget. The treedepth bound O(log s) follows from Lemma 3. 3 f1 uL 1 uL 2 v01 v11 v21 v31 u10 u11 u12 u13 uR 1 uR 2 f2 uL 3 v02 v12 v22 v32 uR 3 uL 4 u20 u21 u22 u23 uR 4 f3 uL 5 uL 6 v03 v13 v23 v33 u30 u31 u32 u33 uR 5 uR 6 f4 Figure 2: Part of the frame graph HF with its unique embedding. 2.2 Construction We now give a construction of the Vertex Planarization instance (H, `), given a k ×k Permutation Clique instance (G, k). Let m = |E(G)| and assume k ≥ 2. First, we introduce a frame graph HF . A ladder of length n is a 2n-vertex graph that consists of two paths v1 , v2 , . . . , vn and u1 , u2 , . . . , un together with edges vi ui for 1 ≤ i ≤ n. A cycle ladder of length n additionally contains edges vn v1 and un u1 , that is, v1 , v2 , . . . , vn and u1 , u2 , . . . , un are in fact cycles. The frame graph HF consists of two cycle ladders of length 2k, with vertex sets {viΓ , uΓi : 1 ≤ i ≤ 2k} for Γ ∈ {L, R}, and of k ladders of length 4 with vertex sets {viα , uα i : 0 ≤ i ≤ 3} for 1 ≤ α ≤ k, L L α R R α u0 , v2α−1 v3α , v2α u3 for each 1 ≤ α ≤ k (see Figure 2). Note that HF is connected with edges v2α−1 v0α , v2α 3-edge-connected and hence has a unique planar embedding. By f α we denote the face of the embedding of HF that is incident to all vertices viα , 0 ≤ i ≤ 3. Second, we introduce k vertices xβ , 1 ≤ β ≤ k. Our intention is to ensure that in any solution to Vertex Planarization on (H, `), no vertex xβ nor no vertex from the frame HF will be deleted, and each vertex xβ will be embedded into a different face f α . The choice of which vertex xβ is embedded into which face will correspond to a choice of the vertices of the clique in the instance (G, k) of k × k Permutation Clique. We now force such a behavior with some gadgets. For each i = 1, 2, 3, perform the following construction. For every 1 ≤ α, β ≤ k, introduce a vertex yiα,β incident to viα and xβ . Moreover, for every 1 ≤ β ≤ k, introduce a k-choice gadget C i,β and for each 1 ≤ α ≤ k identify the vertex bα of C i,β with yiα,β . See Figure 3. Informally speaking, by the properties of the k-choice gadget, each vertex xβ needs to select one face f α that will contain it in the planar embedding. The fact that the construction is performed three times ensures that no face f α is chosen by two vertices xβ , as otherwise a K3,3 -minor will be left in the graph. Let us now move to the description of the encoding of the edges of G. For an edge e ∈ E(G), let e = (p(e), γ(e))(q(e), δ(e)) where p(e) < q(e) (note that edges e with p(e) = q(e) are irrelevant to the problem, and hence we may assume there are no such edges). For 1 ≤ p < q ≤ k, we define E(p, q) = {e ∈ E(G) : (p(e), q(e)) = (p, q)}. For each edge e ∈ E(G), we introduce in H three vertices 4 vi1 vi2 vi3 vi4 C i,4 C i,1 x1 C i,2 C i,3 x2 x3 x4 Figure 3: Connections between the frame and vertices xβ that ensure that every vertex xβ is embedded into a different face f α . Vertices yiα,β are depicted white. xγ(e) xδ(e) c` e ce p(e) ca e q(e) v0 v0 Figure 4: Gadget introduced for an edge e ∈ E(G). The vertex c`e , marked white, is part of the choice gadget Ĉ p(e),q(e) . p(e) q(e) c`e , ce , cae , four edges v0 c`e , xγ(e) c`e , v0 cae , xδ(e) cae and two K5 -edges c`e ce and cae ce (see Figure 4). Moreover, for every 1 ≤ p < q ≤ k, introduce a |E(p, q)|-choice gadget Ĉ p,q and for every e ∈ E(p, q) identify c`e with a distinct vertex bj of Ĉ p,q . Informally speaking, for each edge e we need either to delete c`e and cae or only ce ; however, the second option is only possible if xγ(e) is embedded into fp(e) and at the same time xδ(e) is embedded into fq(e) . The choice gadget Ĉ p,q ensures that we can choose the second, cheaper option only once per each pair (p, q). We set ` = 3m + 6k 2 . This completes the description of the instance (H, `). Note that the budget ` is tight: it allows only to choose a minimum solution in all introduced choice gadgets, and one endpoint of each K5 -edge cae ce . 2.3 Treedepth bound Lemma 5. The treedepth of H is O(k). Proof. We use the recursive formula of Lemma 3. First, we delete from H all vertices of the frame HF and all vertices xβ . Note that we have deleted only 17k vertices in this manner. By Lemma 3, it suffices to show that every connected component of the remaining graph has treedepth O(k); we will in fact show a stronger bound of O(log k). Observe that the remaining graph contains two types of connected components. The first type are the k-choice gadgets C i,β for 1 ≤ i ≤ 3 and 1 ≤ β ≤ k; by Lemma 4, every such gadget has treedepth O(log k). The second type are the |E(p, q)|-choice gadgets Ĉ p,q for 1 ≤ p < q ≤ k, together with the vertices c`e , ce , cae and the K5 -edges between them. As |E(p, q)| ≤ k 2 for every 1 ≤ p < q ≤ k, by Lemma 4 the treedepth of these connected components is also O(log k). This finishes the proof of the lemma. 2.4 Equivalence In the following two lemmata we show the equivalence of the constructed Vertex Planarization instance (H, `) and the input k × k Permutation Clique instance (G, k), completing the proof of Lemma 2 and of Theorem 1. Lemma 6 (Completeness). If (G, k) is a YES-instance to k × k Permutation Clique, then (H, `) is a YES-instance to Vertex Planarization. 5 Proof. Let ρ : [k] → [k] be a solution to k×k Permutation Clique on (G, k), that is, ρ is a permutation of [k] and K := {(p, ρ(p)) : 1 ≤ p ≤ k} is a clique in G. Consider the following set X ⊆ V (H). 1. For each i = 1, 2, 3 and 1 ≤ α ≤ k, X contains a minimum solution (i.e., of size 2k) to Vertex α0 ,ρ(α) Planarization in the gadget C i,ρ(α) that contains all vertices yi for 1 ≤ α0 ≤ k except for α,ρ(α) yi . 2. For each 1 ≤ p < q ≤ k, denote by e(p, q) the unique edge in E(p, q) such that e(p, q) = (p, ρ(p))(q, ρ(q)). Then X contains a minimum solution to Vertex Planarization in the gadget Ĉ p,q that contains all vertices c`e for e ∈ E(p, q) except for c`e(p,q) , the vertex ce(p,q) and all vertices cae for e ∈ E(p, q) except for cae(p,q) . Note that we have introduced 3 · k · 2k = 6k 2 vertices in the first step and 3m vertices in the second step. Hence, |X| = 3m + 6k 2 = `. We now argue that H \ X is planar. It suffices to prove it for each 2-connected component of H \ X. Note that the claim is trivial or follows from Lemma 4 for each 2-connected component of H \ X except for the one that contains the frame HF . Consider the unique planar embedding of HF and embed into each face f α the vertex xρ(α) . Note that each vertex xβ is embedded into a different face. It is straightforward to verify that xρ(α) can be α,ρ(α) embedded into f α together with vertices yi for i = 1, 2, 3 and the vertices c`e or cae that correspond to the edges of G[K] incident to (α, ρ(α)). Note that all other vertices of H \ X lie in different 2-connected components than HF and, consequently, H \ X is planar. Lemma 7 (Soundness). If (H, `) is a YES-instance to Vertex Planarization, then (G, k) is a YESinstance to k × k Permutation Clique. Proof. Let X ⊆ V (H) be such that |X| ≤ ` and H \ X is planar. By Lemma 4, X needs to contain at least 2k vertices from each gadget C i,β for i = 1, 2, 3 and 1 ≤ β ≤ k; note that there are 3k such gadgets. Moreover, X needs to contain at least 2|E(p, q)| vertices from each gadget Ĉ p,q for 1 ≤ p < q ≤ k, which totals to at least 2m vertices. Finally, for each 1 ≤ i ≤ m, X needs to contain at least one vertex of the K5 -edge ce cae . As |X| ≤ ` = 6k 2 + 3m, we infer that |X| = ` and X contains a minimum solution to Vertex Planarization on each introduced choice gadget, and exactly one vertex from the pair {ce , cae } for each 1 ≤ i ≤ m. In particular, X does not contain any vertex of the frame graph HF , nor any vertex xβ , 1 ≤ β ≤ k. α(i,β),β By the properties of the choice gadget C i,β , there exists α(i, β) such that yi ∈ / X. Recall that X does not contain any vertex of HF , and HF is 3-edge-connected and, hence, admits a unique planar embedding depicted on Figure 2. As X does not contain xβ , we infer that α(i, β) = α(i0 , β) for every i, i0 ∈ {1, 2, 3}. Hence, we may suppress the argument i and henceforth analyze function α(β) such that α(β),β yi ∈ / X for every 1 ≤ β ≤ k and i = 1, 2, 3. Note that xβ needs to be embedded into the face f α(β) of HF in any planar embedding of H \ X. We now argue that α(·) is a permutation. By contradiction, let α(β) = α(β 0 ) for some β 6= β 0 . It is straightforward to verify that the following sets form a model of a K3,3 minor in H \ X, contradicting its planarity. 0 1. {viα , yiα,β , yiα,β } for i = 1, 2, 3; 0 2. {xβ } and {xβ }; α α 3. {uα 1 , u2 , u3 }. We infer that α(·) is a permutation of [k]. We claim K := {(α(β), β) : 1 ≤ β ≤ k} induces a clique in G. That is, that ρ := α−1 is a solution to k × k Permutation Clique on (G, k). Pick arbitrary 1 ≤ p < q ≤ k. Our goal is to prove that (p, ρ(p))(q, ρ(q)) ∈ E(G). Consider the choice gadget Ĉ p,q . By Lemma 4, there exists e ∈ E(p, q) such that c`e ∈ / X. Consequently, ce ∈ X due to the K5 -edge c`e ce , and thus cae ∈ / X. As c`e is adjacent to both v0p and xγ(e) , we infer that xγ(e) is embedded into the face f p and, consequently, α(γ(e)) = p. Symmetrically, we infer that α(δ(e)) = q. Thus, e = (p, ρ(p))(q, ρ(q)) ∈ E(G) and the lemma is proven. 6 Acknowledgements We thank Tomasz Kociumaka for numerous discussions on the complexity of vertex deletion problems to minor-closed graph classes. Research supported by Polish National Science Centre grant DEC-2012/05/D/ST6/03214. References [1] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015. [2] R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Texts in Computer Science. Springer, 2013. [3] M. R. Fellows and M. A. Langston. On search, decision, and the efficiency of polynomial-time algorithms. J. Comput. Syst. Sci., 49(3):769–779, 1994. [4] J. E. Hopcroft and R. E. Tarjan. Efficient planarity testing. J. ACM, 21(4):549–568, 1974. [5] R. Impagliazzo, R. Paturi, and F. Zane. Which problems have strongly exponential complexity? J. Comput. Syst. Sci., 63(4):512–530, 2001. [6] B. M. P. Jansen, D. Lokshtanov, and S. Saurabh. A near-optimal planarization algorithm. In C. Chekuri, editor, Proceedings of the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, Portland, Oregon, USA, January 5-7, 2014, pages 1802–1811. SIAM, 2014. [7] K. Kawarabayashi. Planarity allowing few error vertices in linear time. In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, October 25-27, 2009, Atlanta, Georgia, USA, pages 639–648. IEEE Computer Society, 2009. [8] J. M. Lewis and M. Yannakakis. The node-deletion problem for hereditary properties is NP-complete. J. Comput. Syst. Sci., 20(2):219–230, 1980. [9] D. Lokshtanov, D. Marx, and S. Saurabh. Lower bounds based on the exponential time hypothesis. Bulletin of the EATCS, 105:41–72, 2011. [10] D. Lokshtanov, D. Marx, and S. Saurabh. Slightly superexponential parameterized problems. In D. Randall, editor, SODA, pages 760–776. SIAM, 2011. [11] D. Marx. What’s next? Future directions in parameterized complexity. In H. L. Bodlaender, R. Downey, F. V. Fomin, and D. Marx, editors, The Multivariate Algorithmic Revolution and Beyond - Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday, volume 7370 of Lecture Notes in Computer Science, pages 469–496. Springer, 2012. [12] D. Marx and I. Schlotter. Obtaining a planar graph by vertex deletion. Algorithmica, 62(3-4):807–822, 2012. [13] J. Nešetřil and P. O. de Mendez. Tree-depth, subgraph coloring and homomorphism bounds. Eur. J. Comb., 27(6):1022–1041, 2006. [14] J. Nešetřil and P. O. de Mendez. Sparsity - Graphs, Structures, and Algorithms, volume 28 of Algorithms and combinatorics. Springer, 2012. 7
8cs.DS
arXiv:1711.02953v1 [math.GR] 8 Nov 2017 Classification of pro-p PD2 pairs and the pro-p curve complex Gareth Wilkes November 9, 2017 Abstract We classify pro-p Poincaré duality pairs in dimension two. We then use this classification to build a pro-p analogue of the curve complex and establish its basic properties. Introduction A key object in the study of self-homeomorphisms of a surface Σ is the curve complex, a simpicial complex whose simplices are isotopy classes of certain multicurves on Σ. When working with the curve complex one often simplifies matters by assuming that a class of multicurves is in some simple standard form, and asserts that this is acceptable by noting that every multicurve may be taken to a standard form by means of some self-homeomorphism of Σ. One proves this by cutting Σ along the multicurve and using the classification of surfaces with boundary. Thus the curve complex may be viewed as built using this classification as a foundation. In this paper we will carry out this program in the realm of pro-p groups. The notions of ‘relative (co)homology’ and ‘Poincaré duality pair’ for profinite groups were defined and developed in the author’s paper [Wil17a]. In the first part of this paper we will classify those pro-p group pairs which are Poincaré duality pairs of dimension 2. The end result (Theorem 3.3) is closely related to (and indeed relies upon) the classification of Demushkin groups completed by Demushkin, Serre, and Labute [Dem61, Dem63, Ser62, Lab67]. In Section 4 we use this classification to classify the ways that the pro-p completion G of π1 Σ (for Σ a compact orientable surface) may split as a graph of pro-p groups with edge stabilisers Zp and show that, up to automorphism, the only possible splittings are the obvious geometric ones. Considering splittings as being dual to ‘simple closed curves’ this analysis yields a ‘pro-p curve complex’— a profinite space, containing the abstract curve complex, on which OutpGq has a natural action. This raises the question of what properties of automorphisms can be deduced from the action on this pro-p curve complex—in particular, is it possible for a pseudo-Anosov automorphism of π1 Σ to fix a point in the pro-p curve complex? It is perhaps somewhat amusing to compare the order of this program with the classification of discrete PD2 groups and PD2 pairs. In the discrete realm, the PD2 groups were shown to be precisely the surface groups by Bieri, Eckmann, Müller and Linnell [BE78, EM80, EL83]. As noted in Section 11 of [BE78] 1 this implies the classification of PD2 pairs via the classification of splittings of surface groups. In our present case the PD2 pairs are classified first, and then applied to study splittings. The author would like to thank his supervisor Marc Lackenby for his support. The author was supported by the EPSRC. Conventions. In this paper we adopt the following conventions. • The symbol p will denote a prime number unless otherwise specified. The symbol Zp denotes the p-adic integers and Fp the field with p elements. • Any appearance of p8 for p a prime should be interpreted as zero. • All groups will be pro-p groups and all subgroups closed unless otherwise specified. All homomorphisms will be continuous. • For group elements x and y, the conjugate y ´1 xy will be denoted xy and the commutator rx, ys will mean x´1 y ´1 xy “ x´1 xy . • Let G be a pro-p group and let M be a finite p-primary G-module. Then M ˚ will denote the Pontrjagin dual HompM, Qp {Zp q with action pg ¨ f qpmq “ f pg ´1 mq. • The automorphism group AutpZp q will be denoted Up . • For a pro-p group G and a homomorphism ρ : G Ñ Up we will denote the the module with underlying abelian group Zp and G-action χ by Zp pχq. The module Z{pm with action given by ρ will be denoted Mm pρq and its Pontrjagin dual by Im pρq. 1 Preliminaries 1.1 Automorphisms of Zp In this section we set up some notation and preliminaries concerning automorphisms of the p-adic integers and their quotient groups. First recall the structure of the automorphism group. Theorem 1.1 (Theorem 4.4.7 of [RZ00]). Let p be a prime. • If p ‰ 2 then Up “ Zˆp – Cp´1 ˆ Zp where the second factor is generated by the automorphism 1 ÞÑ 1 ` p. • U2 “ Zˆ2 – C2 ˆ Z2 “ x´1y ˆ x1 ÞÑ 1 ` 4y Note that for p ‰ 2 the image of any homomorphism from a pro-p group to Up meets Cp´1 trivially. Following [Lab67] we give the following notation to the pro-p subgroups of these automorphism groups. For 1 ď k ď 8 an integer set k Upkq p “ x1 ÞÑ 1 ` p y ď Up , rk`1s U2 “ x1 ÞÑ ´1 ` 2k`1 y ď U2 Let G be a pro-p group and let χ : G Ñ Up be a homomorphism. Note that since Zp has a unique subgroup of index pm for any m there is an induced map from G to AutpZ{pm q. We may define an invariant qpχq to be the highest power 2 pm of p such that G Ñ AutpZ{pm q is trivial. If this maximum does not exist (i.e. χ is trivial) then by convention we set qpχq “ p8 “ 0. Note that for any pro-p group G and any χ : G Ñ Up the image of G in AutpFp q is trivial. pmq One may easily show that if qpχq “ pm ‰ 2 then impχq “ Up . If qpχq “ 2 rf s pf q then the image of χ may be either x´1y ˆ U2 or U2 where f ě 2 or f “ 8. p1q r2s Note that U2 “ U2 . 1.2 Lower central q-series Let G be a pro-p group and let q “ pm for some 1 ď m ď 8. The lower central q-series of G is the sequence of closed subgroups of G defined by G1 “ G, Gj`1 “ Gqj rGj , Gs We may define grj pGq “ Gj {Gj`1 , grpGq “ ÿ grj pGq jě1 The fact that rGi , Gj s Ď Gi`j implies that grpGq is a graded Lie algebra over Zp {qZp , with Lie bracket induced by the commutator on homogeneous elements of grpGq. If q ‰ 0 then x ÞÑ xq induces a linear mapping φi : grj pGq Ñ grj`1 pGq for all j. If π denotes an indeterminate over Zp {qZp we may let the polynomial ring Zp {qZp rπs act on grpGq by defining π ¨ ξ “ φj pξq when ξ P grj pGq. By convention we extend this to the q “ 0 case by setting π “ 0 P Zp . This makes grpGq into an algebra over ř Zp {qZp rπs. It is a Lie algebra provided q “ 0 or p ‰ 2. When p “ 2 only ją1 grj pGq is a Lie algebra. This issue will not be of concern to us. All the identities concerning grj pGq are derived from commutator identites. We will record some here for later use. The proofs are elementary. Let u, v, w P G and k P Z. • ruv, ws “ ru, wsrru, ws, vsrv, ws • ru, vws “ ru, wsru, vsrru, vs, ws • for u P Gi , v P Gj we have ruk , vs ” ru, vsk ” ru, v k s modulo Gi`j`1 . 1.3 PDn groups and PDn pairs It would be neither necessary nor expedient to give a full account of the theory of profinite PDn groups at a prime p. For a proper discussion for profinite groups see [SW00], and for pro-p groups see [Ser13], Section I.4.5. Depending on your viewpoint the following is either a definition or a theorem. Definition 1.2. Let G be a pro-p group. Then G is a PDn group if • dim H k pG, Fp q is finite for all k; • dim H n pG, Fp q “ 1; and • for all k the cup product H k pG, Fp q ˆ H n´k pG, Fp q Ñ H n pG, Fp q is a non-degenerate bilinear form. 3 One may show (see Proposition 30 of [Ser13] or Theorem 4.5.6 of [SW00]) that these conditions are enough to guarantee a more extensive duality as follows. There is a unique homomorphism χ : G Ñ Up called the orientation character with the following properties. Let Ip pGq “ pZp pχqq˚ denote Qp {Zp equipped with the G action dual to χ. Then H n pG, Ip pGqq “ Qp {Zp and the cup product H k pG, M q b H n´k pG, HompM, Ip pGqqq Ñ H n pG, Ip pGqq induces isomorphisms H k pG, M q – H n´k pG, HompM, Ip pGqqq˚ – Hn´k pG, Zp pχq b M q for any finite p-primary G-module M . Here the last isomorphism is induced by Pontrjagin duality (see for example Proposition 6.3.6 of [RZ00]), together with the identity HompM, Zp pχq˚ q “ pZp pχq b M q˚ The theory of the (co)homology of a profinite group relative to a collection of subgroups was defined and studied in [Wil17a]. We will just state a restricted version of the definition here and leave it to the curious reader to read further. Definition 1.3 (Definition 2.1 of [Wil17a]). Let G be a pro-p group and S “ tS0 , . . . , Sb u be a finite family of closed subgroups pb ě 0q. Consider the short exact sequence b à 0 Ñ ∆G,S Ñ Zp rrG{Si ss Ñ Zp Ñ 0 i“0 where the final map is the augmentation. Then define K H‚`1 pG, S; M q “ TorG ‚ p∆G,S , M q, H ‚`1 pG, S, Aq “ Ext‚G p∆G,S , Aq where M is an inverse limit of finite p-primary G-modules, A is a direct limit of such modules and ∆K G,S denotes ∆G,S when considered as a right module via δ ¨ g “ g ´1 δ. The definition can actually be made for certain infinite families of subgroups as well. However in the case of duality pairs the family of peripheral subgroups is forced to be finite (Proposition 5.4 of [Wil17a]) so we will not concern ourselves with this. If we replace each Si by a conjugate Sigi then this leaves the cohomology invariant up to natural isomorphism by Proposition 2.9 of [Wil17a]. This cohomology theory is natural with respect to maps of pro-p group pairs. If pG, Sq and pG1 , S 1 q are pro-p group pairs with S “ tS0 , . . . , Sb u and S 1 “ tS01 , . . . , Sb1 1 u, then a map of pairs pG, Sq Ñ pG1 , S 1 q consists of a function f : t1, . . . , bu Ñ t1, . . . , b1 u and a group homomorphism φ : G Ñ G1 such that φpSi q Ď Sf1 piq for all i. In this circumstance one obtains natural maps H‚ pG, S; M q Ñ H‚ pG1 , S 1 ; M q, H ‚ pG1 , S 1 ; M q Ñ H ‚ pG, S; M q for any G1 -module M , regarded as a G-module via φ. See Proposition 2.6 of [Wil17a]. Two important facts we will use freely are Pontrjagin duality H k pG, S; M ˚ q “ Hk pG, S; M q˚ 4 and the existence of a cup product H k pG, S; M q b H n´k pG, N q Ñ H n pG, S; Lq for (direct limits of) finite p-primary G-modules L, M and N and a pairing M b N Ñ L. Again the following definition is more properly a theorem. Definition 1.4 (Theorem 5.15 of [Wil17a]). Let G be a pro-p group and S a collection of closed subgroups of G. Then pG, Sq is a PDn pair if • dim H k pG, S; Fp q is finite for all k; • dim H n pG, S; Fp q “ 1; and • for all k the cup product H k pG, S; Fp q ˆ H n´k pG, Fp q Ñ H n pG, S; Fp q is a non-degenerate bilinear form. Again for a PDn pair pG, Sq there exits a unique orientation character χ : G Ñ Up with similar properties to above. Namely if Ip pG, Sq “ Zp pχq˚ denotes Qp {Zp equipped with the G action dual to χ, then H n pG, S; Ip pG, Sqq “ Qp {Zp and the cup product H k pG, S; M q b H n´k pG, HompM, Ip pG, Sqqq Ñ H n pG, S; Ip pG, Sqq with respect to the evaluation pairing induces isomorphisms H k pG, S; M q – H n´k pG, HompM, Ip pG, Sqqq˚ – Hn´k pG, Zp pχq b M q for any finite p-primary G-module M . See Section 5.1 of [Wil17a] for more details on PDn pairs. Let us now state the immediate consequences of being a PD2 pair. Proposition 1.5. Let pG, Sq be a PD2 pair with orientation character χ. Then G is a finitely generated free pro-p group and S is a finite family of infinite procyclic subgroups of G. Moreover χ vanishes on each element of S. Proof. By Proposition 5.4 of [Wil17a], S is a finite family S “ tS0 , . . . , Sb u with each Si a PD1 group with orientation character χ|Si . The only pro-p PD1 group is Zp , which is orientable and so each Si is cyclic with χ|Si “ 1. Furthermore by Corollary 5.8 in [Wil17a] we find cdp pGq “ 1, so by (for example) Theorem 7.7.4 of [RZ00] G is a free pro-p group. It is finitely generated since H 1 pG, Fp q is finite. Proposition 1.6. Let pG, Sq be a PD2 pair with S “ tS0 , . . . , Sb u. Fix a generator s0 of S0 . Then the rank of G is n ` b for some n ě 0 and we may choose a basis tx1 , . . . , xn , s1 , . . . , sb u of G such that • si is a generator of Si for all i • s0 ” s1 ¨ ¨ ¨ sb modulo Gp rG, Gs 5 • ζi ps0 q “ 1 for all i, where ζi is the projection G Ñ Zp obtained by killing all the elements of our chosen basis other than si . Proof. By the long exact sequence in relative cohomology and duality (Proposition 3.5, Theorem 5.6 and Proposition 5.7 of [Wil17a]) we have a commuting diagram (with coefficients in Fp ) H 0 pGq p1,...,1q H2 pG, Sq Àb i“1 H 0 pSi q Àb H1 pSi q i“0 – whence Àb – i“0 H1 pGq H1 pSi q injects into H1 pGq. Therefore there is a basis B “ tx1 , . . . , xn , s1 , . . . , sb u of G where si is a generator of Si and s0 ” s1 ¨ ¨ ¨ sb modulo Gp rG, Gs. It follows that modulo rG, Gs we have s0 ” n ź i ¨ xpµ i b ź sλi i i“1 i“1 where the λi lie in Zˆp . Replacing each si by the generator sλi i of Si we may guarantee that ζi ps0 q “ 1 for all i. Note that the properties in the conclusion of the above theorem do not change if we replace each si (and Si ) a conjugate of itself for 1 ď i ď b. We will be needing a tool to identify their orientation character of a PD2 pair. Proposition 1.7. Let pG, Sq be a PDn pair at the prime p and let ρ : G Ñ Up . Then ρ coincides with the orientation character χ of pG, Sq if and only if |H n pG, S; Im pρqq| “ pm for every m P N Proof. By duality we have H n pG, S; Im pρqq˚ – HomG pIm pρq, Ip pG, Sqq “ HomG pZp pχq, Mm pρqq “ HomG pMm pχq, Mm pρqq Now if χ “ ρ then every group homomorphism from Z{pm to itself is an element of HomG pMm pχq, Mm pρqq so this group has size pm . Conversely if the size is pm then the identity map on Z{pm is an element of HomG pMm pχq, Mm pρqq, whence ρ and χ agree modulo pm . If they agree modulo pm for all m then χ “ ρ. 1.4 Demushkin groups Definition 1.8. A pro-p group G is a Demushkin group if • dim H 1 pG, Fp q ď 8 • dim H 2 pG, Fp q “ 1 6 • the cup product H 1 pG, Fp q ˆ H 1 pG, Fp q Ñ H 2 pG, Fp q is a non-degenerate bilinear form. The first two conditions may be rephrased as ‘G is a finitely generated onerelator pro-p group’. We call an element r of a finitely generated free pro-p group F a Demushkin word if F {xxryy is a Demushkin group. Demushkin groups were classified by Demushkin [Dem61, Dem63] (for p ‰ 2), by Serre [Ser62] (when p “ 2 and the rank of G is odd) and by Labute [Lab67] for the remaining cases. The only Demushkin group which is not a PD2 group is Z{2, although some authors do not admit Z{2 as a Demushkin group. The missing constraint to force G to be PD2 is that G has cohomological dimension 2. This follows from the definition of a Demushkin group provided G is infinite— see Section 9.1 of [Ser62]. By convention we declare the orientation character of Z{2Z to be the natural inclusion Z{2 Ñ x´1y Ď U2 . The classification may be stated as follows. Theorem 1.9. Let F be a finitely generated free pro-p group and let r be a Demushkin word in F . Let G “ F {xxryy and let χ : G Ñ Up be the orientation character of the PD2 group G. Then there is a basis x1 , . . . , xn of F such that r takes one of the following forms. • If q ‰ 2 then n is even and r “ xq1 rx1 , x2 s ¨ ¨ ¨ rxn´1 , xn s rf s • If q “ 2, n is even and impχq “ U2 for some f ě 2 then f r “ x2`2 rx1 , x2 s ¨ ¨ ¨ rxn´1 , xn s 1 pf q • If q “ 2, n is even and impχq “ x´1y ˆ U2 for some f ě 2 then f r “ x21 rx1 , x2 sx23 rx3 , x4 s ¨ ¨ ¨ rxn´1 , xn s pf q • If q “ 2, n is odd and impχq “ x´1y ˆ U2 for some f ě 2 then f r “ x21 x22 rx2 , x3 s ¨ ¨ ¨ rxn´1 , xn s Conversely all these forms of words are Demushkin words and the corresponding Demushkin groups have orientation characters as stated. 2 Capping off peripheral subgroups We will attack the classification problem by reducing the number of boundary components in order to make use of the classification of Demushkin groups as a base case. We do this largely because computing an explicit formula for the cup product on H 1 pG, Sq b H 1 pGq in terms of the Si is rather awkward, and it is easier to deal with the induction. We will need the following basic proposition concerning non-degeneracy of bilinear forms. The proof is an exercise in undergraduate algebra. 7 Proposition 2.1. Let V, W be vector spaces over a field F , and let B : V ˆW Ñ F be a bilinear form. Assume that we have direct sum decompositions V “ V 1 ‘ V 2, W “ W1 ‘ W2 and that Bpv 1 , w2 q “ 0 for all v 1 P V 1 , w2 P W 2 . Then B is non-degenerate if and only if the two bilinear forms B1 : V 1 ˆ W 1 Ñ F, B2 : V 2 ˆ W 2 Ñ F obtained by restriction from B are non-degenerate. We will first deal with the case b ě 1 as this only involves relative cohomology. Theorem 2.2. Let G be a free pro-p group of rank n ` b where n ě 0, b ě 1 and let S “ tSi ubi“0 be a family of cyclic subgroups of G. Suppose there exist generators si for the Si such that (1) s1 , . . . , sb generate a free factor of G and (2) s0 ” s1 ¨ ¨ ¨ sb modulo Gp rG, Gs. (3) Si X xxSb yy “ t1u for i ‰ b Define G to be the quotient of G by the normal subgroup generated by Sb , let φ : G Ñ G be the quotient map and let S i “ φpSi q for 0 ď i ă b. Let S “ tS i ub´1 i“0 . Note that pG, Sq satisfy the conditions (1) and (2) above. Then pG, Sq is a PD2 pair if and only if pG, Sq is a PD2 pair. When they are both PD2 pairs then their orientation characteristics χ, χ satisfy χ “ χφ. Remark. The assumption that Si X xxSb yy “ t1u for i ‰ b is equivalent to Si Ę xxSb yy since G is free, hence torsion-free. This is automatic for b ą 1 by the conditions (1) and (2). For the case when b “ 1 and S0 Ď xxS1 yy see Proposition 2.3. Proof. Extend s1 , . . . , sb to a free basis px1 , . . . , xn , s1 , . . . sb q for G and take px1 , . . . , xn , s1 , . . . sb´1 q as basis for G. There is a map of pairs pG, Sq Ñ pG, Sq induced by φ where we regard Sb as sent to 1 P Sb´1 . This gives a commutative diagram of long exact sequences in relative cohomology with Fp -coefficients. The set-up of the theorem and the fact that the coefficients are a field allow one to easily write down all the groups and maps in this sequence explicitly. In particular one finds that the natural map – Fp – H 2 pG, Sq ÝÑ H 2 pG, Sq – Fp is an isomorphism and that there are splittings H 1 pG, Sq “ H 0 pSb q ‘ H 1 pG, Sq, H 1 pGq “ H 1 pSb q ‘ H 1 pGq Here the maps from H 0 pSb q and H 1 pG, Sq to H 1 pG, Sq are the natural maps from the commutative diagram and the maps from H 1 pGq and H 1 pSb q to H 1 pGq are respectively induced by φ and by the retraction G Ñ Sb which kills all the elements in our chosen basis other than sb . 8 Since cup products are natural with respect to maps of pairs (Proposition 3.1 of [Wil17a]), the cup product on H 1 pG, Sq b H 1 pGq is the restriction of the cup product on H 1 pG, Sq b H 1 pGq. Furthermore Equation 3.6 in Section 3.2 of [Wil17a] gives a commutative pentagon H 0 pSb q b H 1 pGq H 0 pSb q b H 1 pSb q ! H 1 pG, Sq b H 1 pGq H 1 pSb q ! – 2 H pG, Sq This shows firstly that the restriction of the cup product on H 1 pG, Sq b H 1 pGq to H 0 pSb q b H 1 pSb q via the direct sum decompositions above agrees with the cup product on Sb and that the cup product of an element of H 0 pSb q with an element of H 1 pGq vanishes. We may now apply Proposition 2.1 to conclude that pG, Sq is a PD2 pair if and only if pG, Sq is a PD2 pair. We move on to consideration of the orientation characters. Since χpSb q “ 1 there is a unique map ρ : G Ñ Up such that χ “ ρφ. We must show that ρ is the orientation character of G. Let m be a natural number. Note that our choices of bases give a splitting G “ G > Sb . Let φ! : G Ñ G be the inclusion map and note that φφ! “ idG . Note also that χ|G “ ρ. By excision (Theorem 4.8 of [Wil17a]) the map φ! induces an isomorphism H 1 pG, Sb ; Im pχqq Ñ H 1 pG, 1; Im pρqq. Therefore since φφ! is the identity, φ induces an isomorphism in the other direction. Let S 1 “ tS0 . . . Sb´1 u. The map of pairs pG, S 1 q Ñ pG, Sq and Propositions 2.4 and 2.6 of [Wil17a] give a commutative diagram (with coefficients in Im pχq on the top row and Im pρq on the bottom row): H 1 pG, Sb q – H 1 pG, 1q H 1 pS 1 q H 2 pG, Sq 0 H 2 pG, S \ 1q 0 – H 1 pSq which demonstrates that |H 2 pG, S; Im pρqq| “ |H 2 pG, S \ 1; Im pρqq| “ |H 2 pG, S; Im pχqq| and we are done by Proposition 1.7. Proposition 2.3. Let G be a free pro-p group of rank n ` 1 where n ě 0 and let S “ tS0 , S1 u be a family of cyclic subgroups of G. Suppose there exist generators si for the Si such that (1) s1 generates a free factor of G and (2) s0 ” s1 modulo Gp rG, Gs. Assume further that S0 X xxS1 yy ‰ 1. If pG, Sq is a PD2 pair then n “ 0, hence G “ S0 “ S1 . Conversely if n “ 0 and G “ S0 “ S1 then pG, Sq is a PD2 pair. 9 Proof. Let G “ G{xxS1 yy. By considering the commuting diagram of long exact sequences for the map of pairs pG, Sq Ñ pG, t1u \ t1uq one may readily show that the maps H 1 pG, t1u \ t1uq Ñ H 1 pG, Sq, H 1 pGq Ñ H 1 pGq with coefficients Fp are respectively an isomorphism and an injection. Since G is free, H 2 pG, t1u \ t1uq “ 0 and the cup product on pG, t1u \ t1uq vanishes. Therefore the cup product of any element of H 1 pG, Sq with the n-dimensional subspace H 1 pGq of H 1 pGq is zero. This cup product is non-degenerate so n “ 0 as claimed. The converse statement is a case of Proposition 6.16 of [Wil17a]. We now tackle the somewhat more fiddly case when we ‘cap off’ the only peripheral subgroup. Theorem 2.4. Let G be a free pro-p group of rank n ą 0 and let S Ď rG, GsGp be a cyclic subgroup. Let G “ G{xxSyy and let φ be the quotient map. Then pG, Sq is a PD2 pair if and only if G is a Demushkin group. When this occurs the orientation characters χ and χ of pG, Sq and G are related by χ “ χφ. Proof. Firstly note that G is Demushkin if and only if H 2 pG, 1; Fp q “ Fp and the cup product H 1 pG, 1; Fp q b H 1 pG, Fp q Ñ H 2 pG, 1; Fp q is non-degenerate. This follows immediately from the natural isomorphisms H 1 pG, 1; Fp q – H 1 pG, Fp q, H 1 pG, 1; Fp q – H 2 pG, Fp q Now note that in our situation we have H 2 pG; Fp q – Fp unless S is trivial, in which case we are done. This follows since G is not free (since H 1 pGq “ H 1 pGq, if G were free the map φ would be an isomorphism and S trivial) so has nontrivial cohomology in dimension two (see Theorem 7.7.4 of [RZ00]). Furthermore the dimension of H 2 pGq is at most one since G is a one-relator pro-p group. See Section I.4.3 of [Ser13]. From the condition S Ď rG, GsGp and long exact sequences in cohomology one easily deduces that the natural map H 1 pG, 1; Fp q Ñ H 1 pG, S; Fp q is an isomorphism. Once we know that the corresponding map on H 2 is an isomorphism the first part of the theorem follows immediately. The long exact sequence implies that H 2 pG, Sq is also isomorphic to Fp . Verifying that the natural map H 2 pG, 1q Ñ H 2 pG, Sq is itself an isomorphism is rather technical and we delay it to the end of the proof. For now we move onto verifying that the orientation characters of pG, Sq and G agree. Let m be a natural number. We will make use of the Five Term Exact Sequence for the extension 1 Ñ R Ñ G Ñ G Ñ 1 (Corollary 7.2.5 of [RZ00]). Here the relevant portion takes the form H 1 pG, Im pρφqq Ñ H 1 pR, Z{pm qG Ñ H 2 pG, Im pρqq Ñ 0 (1) where R “ xxSyy and ρ : G Ñ Up is any homomorphism. Taking ρ “ 1 shows that the middle term is finite (using H 2 pG; Fp q “ Fp and dévissage to prove 10 that H 2 pG, Z{pm q is finite). Now consider varying ρ. By Proposition 1.7 the modulus of the final term attains its unique maximum when ρ agrees with χ modulo pm . On the other hand if there is a ρ such that the first map in (1) vanishes then this ρ will maximise the size of the final term, hence this ρ agrees with χ modulo pm . In particular, since χ|S vanishes we may write χ “ ρ0 φ for some ρ0 . There is now a commutative diagram induced by Poincaré duality – H 1 pG, Im pχqq H1 pG, S; Z{pm q H 1 pR, Z{pm qG 0 – H 1 pS, Z{pm q H0 pS; Z{pm q where the fact that the rightmost map is zero follows from the long exact sequence in relative homology, and the fact that the lower left map is injective is the statement that any G-invariant homomorphism from xxSyy to Z{pm which vanishes on S is trivial. We have also used the fact that Zp pχq b Im pχq is isomorphic to the trivial module Z{pm . It follows that the upper left map vanishes and therefore ρ0 agrees with χ and χ agrees with χφ modulo pm for every m as required. We must now tackle the final verification we have been avoiding, that the natural map H 2 pG, 1q Ñ H 2 pG, Sq is an isomorphism. Here and for the rest of the proof the coefficient group is assumed to be Fp . We approach H 2 pGq using the Five Term Exact Sequence as above, so it will be necessary to understand the cohomology of R. Firstly note that the full five term exact sequence in this case is tg – 0 Ñ H 1 pGq ÝÑ H 1 pGq Ñ H 1 pRqG ÝÑ H 2 G Ñ 0 So that the transgression map tg is an isomorphism. By the Corollary to Proposition 26 of [Ser13] we know H 1 pRqG – Fp , and as above the natural map H 1 pRqG Ñ H 1 pSq is injective, hence it is an isomorphism. We may also consider the long exact sequence in cohomology for the pair pG, Rq with coefficients in Fp . This is a sequence of vector spaces so applying any additive functor—for instance the functor p´qG taking G-invariants—preserves exactness. From the Five Lemma and the data already collected we find that the natural map from the resulting sequence to the long exact sequence for pG, Sq is an isomorphism. We now have a diagram of maps H 1 pRqG H 1 pRqG tg – H 2 pGq – δ – – φ ˚ H 2 pG, RqG H 1S – H 2 pG, Sq where the right hand square commutes. Here the bottom left horizontal map is induced by the map of pairs pG, Rq Ñ pG, 1q and the isomorphism H 2 pG, 1q “ H 2 pGq. Our aim is therefore to show that the composition along the bottom row is an isomorphism. It only remains to show that the left hand square actually commutes (in fact it will turn out that it commutes up to sign, but this is enough). This verification takes place on the level of chain complexes. 11 For a pro-p group H and a subgroup K, let C‚ pHq be the (inhomogeneous) bar resolution of H over Zp . See Section 6.2 of [RZ00]. For our purposes it is enough to recall that the lower stages are given by d d 1 0 Zp rrHssrrH 2 ss ÝÑ Zp rrHssrrHss ÝÑ Zp rrHss where the boundary maps are given on the basis elements rh1 , h2 s P H 2 and rhs P H by d1 prh1 , h2 sq “ h1 rh2 s ´ rh1 h2 s ` rh1 s, d0 prhsq “ h ´ 1 Furthermore there is a natural chain map indK H pC‚ pKqq ãÑ C‚ pHq which is an isomorphism on the zero level. Each quotient module C‚ pH, Kq is projective; indeed it is a free Zp rrHss-module on the pointed profinite space obtained by collapsing the closed subset K n Ď H n to a point. See Section 5.2 of [RZ00] for information on free modules on pointed profinite spaces. The long exact sequence in homology for the short exact sequence of chain complexes qt 0 Ñ indK H pC‚ pKqq ÝÑ C‚ pHq ÝÑ C‚ pH, Kq Ñ 0 shows that the final term is a resolution for ∆H,K (shifted by one degree). In our case of interest this gives us standard chain complexes which may be used to compute the various cohomology groups in play. In particular we have an identification C‚ pG, 1q ” C‚`1 pGq and the obvious map (of G-modules) qt C‚ pGq ÝÑ C‚ pG, Rq ÝÑ C‚ pGq gives the map H ˚ pGq Ñ H ˚ pG, Rq. Now let ζ : R Ñ Fp be a G-invariant homomorphism giving a generator of H 1 pRqG . Let σ : G Ñ G be a continuous section of the quotient map such that σp1q “ 1 and let πpgq “ gσpgRq´1 be the retraction G Ñ R so defined. The section σ exists by Proposition 2.2.2 of [RZ00]. The transgression tgpζq is defined in the following manner (see [Lab67], Section 1.4). The cochain ζπd2 : C2 pGq Ñ Fp may be shown to factor through C2 pGq, and this cochain gives tgpζq. It therefore also factors through C2 pG, Rq giving a cochain representing φ˚ tgpζq. Now let us compute the map δ : H 1 pRqG Ñ H 2 pG, Rq. Applying the Horseshoe Lemma (see [Wei95], Lemma 2.2.8) gives the commuting diagram of (par- 12 tial) resolutions C2 pG, Rq C2 pG, Rq ‘ C1 pGq ¨ ˝ d1 C1 pG, Rq qt 0 d0 ‚ C1 pG, Rq ‘ C0 pGq d0 C0 pGq pi˝d0 q‘ǫ d0 ∆G,R d1 C1 pGq ˛ i Zp rrG{Rss ǫ Zp The central column has a chain map to the standard resolution given by C2 pG, Rq ‘ C1 pGq C1 pG, Rq ‘ C0 pGq α‘β Zp rrGssrrRss Zp rrG{Rss ν‘id Zp rrGss Zp rrG{Rss where νprgsq “ σpgRq ´ 1 and αprg1 , g2 sq “ g1 g2 rπ̃pg2 qs ´ g1 g2 rπ̃pg1 g2 qs ` g1 rπ̃pg1 qs ´ g1 r1s where π̃pgq “ g ´1 σpgSq “ pπpgq´1 qg for some map β (which is irrelevant to what follows). We now readily see that δpζq “ ζα : C2 pG, Rq Ñ Fp is induced by the cochain ζ π̃d2 : C2 pGq Ñ Fp . As ζ π̃ “ ´ζπ we are done. 3 Classification In this section we will prove the main classification theorem. Definition 3.1. Let pG, Sq be a PD2 pair with S “ tS0 , . . . , Sb u. A basis for G in standard form (or simply standard form basis) is an ordered free generating set B “ tx1 , . . . , xn , s1 , . . . , sb u such that si generates some conjugate of Si for each i. Note that when b ě 1 any standard form basis of G{xxSb yy is the image of the first n ` b ´ 1 elements of some standard form basis of G. Definition 3.2. For integers n, b let G be a free group of rank n ` b on a generating set B “ tx1 , . . . , xn , s1 , . . . , sb u Let χ : G Ñ Up be a homomorphism vanishing on the si . Define the standard word r1 pn, b, χ; Bq P G according to the following cases. • If n is even and qpχq ‰ 2 then r1 pn, b, χ; Bq “ xq1 rx1 , x2 s ¨ ¨ ¨ rxn´1 , xn ss1 ¨ ¨ ¨ sb 13 rf s • If qpχq “ 2, n is even and impχq “ U2 for some f ě 2 then f r1 pn, b, χ; Bq “ x2`2 rx1 , x2 s ¨ ¨ ¨ rxn´1 , xn ss1 ¨ ¨ ¨ sb 1 pf q • If qpχq “ 2, n is even and impχq “ x´1y ˆ U2 for some f ě 2 then f r1 pn, b, χ; Bq “ x21 rx1 , x2 sx23 rx3 , x4 s ¨ ¨ ¨ rxn´1 , xn ss1 ¨ ¨ ¨ sb pf q • If qpχq “ 2, n is odd and impχq “ x´1y ˆ U2 for some f ě 2 then f r1 pn, b, χ; Bq “ x21 x22 rx2 , x3 s ¨ ¨ ¨ rxn´1 , xn ss1 ¨ ¨ ¨ sb If none of these cases holds we leave r1 pn, b, χ, Bq undefined. Note that whether or not r1 is defined depends only on n and impχq, not on b or B. When the basis B or the invariants pn, b, χq are clear from context we will omit them from the notation. The main theorem of this paper is the following classification theorem. Theorem 3.3. Let G be a free pro-p group of rank n ` b and S “ tS0 , . . . , Sb u be a finite family of closed procyclic subgroups where b ě 0, n ě 0 and n ` b ě 1. Fix a generator s0 of S0 . Then pG, Sq is a PD2 pair with orientation character χ if and only there exists a standard form basis B “ tx1 , . . . , xn , s1 , . . . , sb u of G such that s0 “ r1 pn, b, χ; Bq. Remark. Implicit in the final sentence is the statement that r1 pn, b, χq is not undefined. The backwards implication—that these forms of words do genuinely give PD2 pairs—follows immediately by an induction using Theorems 2.2 and 2.4 and Proposition 2.3 taken together with the classification of Demushkin groups (Theorem 1.9). The forwards implication will proceed in two steps. First we will use the results of the previous section to find a basic form for the word s0 . Then we will use the method of successive approximation to erode this word down to one of the forms above. From now on let G be a free pro-p group of rank n ` b and S “ tS0 , . . . , Sb u be a finite family of closed procyclic subgroups where b ě 0, n ě 0 and n ` b ě 1 and assume pG, Sq is a PD2 pair with orientation character χ. Set q “ qpχq and let pGj q be the lower central q-series. Fix the generator s0 of S0 . Proposition 3.4. For some basis B of G in standard form we have s0 ” r1 pn, b, χ; Bq modulo G3 (and r1 pn, b, χq is well-defined). Proof. We prove this by induction on b. The base cases are b “ 0—which holds by Theorem 2.4 and Theorem 1.9—and b “ 1, n “ 0, which holds by Proposition 2.3. Suppose that b ą 1 and that n ‰ 0 if b “ 1. Then we may apply Theorem 2.2 and an induction hypothesis to show that for some standard form basis B we have s0 P r1 pn, b ´ 1, χ; Bqxxsb yyG3 14 Let y be some element of xxsb yy such that s0 ” r1 pn, b ´ 1, χ; Bqy modulo G3 By Proposition 1.6, replacing sb by a power sµb for some µ P Zˆp we may assume that ζb pyq “ 1 where ζb is the projection of G onto Sb given by killing the other elements of B. We claim that modulo G3 we may write y as an element of the form sgb for some g P G. Consider an expression of G{G3 as an inverse limit of finite p-group quotients lim ÐÝ Pk . Let ψk : G{G3 Ñ Pk be the quotient map. For each k we have ψk pyq P xxψk psb qyy and since ζb pyq “ 1 we have ψk pyq ” ψk psb q modulo rPk , Pk s. Now since Pk is finite, we have ψk pyq P xxψk psb qyy. That is, there are gi P Pk and mi P Z (1 ď i ď r) such that ψk pyq “ “ r ź i“1 r ź pψk psb qmi qgi ψk psb qmi rψk psb qmi , gi s i“1 ř mi ś gi “ ψk psb q “ ψk psb q r ź rψk psb q, gimi s i“1 mi Here we have used the fact ř that ψk pyq ” ψk psb q modulo rPk , Pk s in the final line to show that ψk psb q mi “ ψk psb q. We have made frequent use of commutator identities and the fact that Pk was a quotient of G{G3 hence all third commutators in Pk vanish. Hence ψk pyq lies in the conjugacy class ψk psb qPk of sb for all k. Since these conjugacy classes form a surjective inverse system with inverse limit sG b , there does indeed exist g P G such that y “ sgb . Now replace sb by sgb so that s0 ” r1 pn, b ´ 1, χqsb “ r1 pn, b, χq modulo G3 . This concludes the proof. We will now use the method of successive approximation to improve congruence modulo G3 to equality. We will first examine the q ‰ 2 case to illustrate the method. The q “ 2 case simply requires more notation, together with some extra tidying up at the end. Proof of Theorem 3.3, q ‰ 2 case. Recall from Theorem 1.9 that if q ‰ 2 then n “ 2N is even. If q ‰ 0 then n ą 0. Let B “ tx1 , . . . , xn , s1 , . . . , sb u be a basis of G in standard form. If t “ pt1 , . . . , tn`b q P pGj´1 qn`b for j ě 3 then we may define t t B 1 “ B 1 ptq “ tx1 t1 , . . . , xn tn , s1n`1 , . . . , sbn`b u which is also a basis in standard form. One easily verifies that r1 pB 1 q ” r1 pBq modulo Gj 1 B so that there is a unique element dB j´1 ptq P Gn such that r1 pB q “ r1 pBqdj´1 ptq. Let the images of xi and si in gr1 pGq be denoted ξi and σi , let the image of ti in grj´1 pGq be τi and let the image of t in grj´1 pGqn`b be τ . Then the image 15 of dB j´1 ptq in grj pGq is ˆ ˙ b N ÿ ` ˘ ÿ q B δj´1 pτ q “ π ¨ τ1 ` rσi , τn`i s rτ2i´1 , ξ2i s ` rξ2i´1 , τ2i s ` rτ1 , ξ1 s ` 2 i“1 i“1 B as one may readily compute using commutator identities. This δj´1 is a Zp {qZp n`b linear homomorphism grj´1 pGq Ñ grj pGq. Up to certain minus signs in the σi terms and reordering some coordinates of grj´1 pGqn`b this is in fact the same as the map δj´1 described in Proposition 5 of [Lab67]. Hence by that B proposition we have impδj´1 q “ grj pGq. Therefore suppose that we have chosen a standard form basis Bj´1 such that s0 ” r1 pBj´1 q modulo Gj´1 Then s0 “ r1 pBj´1 qz for some z P Gj . There exists t P pGj´1 qn`b such that Bj´1 ptq equals the image of z in grj pGq. Form the new standard form basis δj´1 1 Bj “ Bj´1 ptq as above. Then Ş s0 ” r1 pBj q modulo Gj Since Gj “ t1u and since Bj´1 and Bj agree modulo Gj , for each i the sequence comprising the ith elements of the Bj converges to a limit in G as j Ñ 8. One may easily see that the set of limits B is a standard basis for G and s0 “ r1 pBq as required. We now move on to the q “ 2 case. The principle is the same, but the notation is more involved. Proof of Theorem 3.3, q “ 2 case. Let B “ tx1 , . . . , xn , s1 , . . . , sb u be a basis of G in standard form. For j ě 3, t “ pt1 , . . . , tn`b q P pGj´1 qn`b and ǫ P t0, 1ub and define j´1 B 1 “ B 1 pt, ǫq “ tx1 t1 , . . . , xn tn , ps1`2 1 ǫ1 tn`1 q j´1 , . . . , ps1`2 b ǫb tn`b q u which is again a basis in standard form. Again we have r1 pB 1 q ” r1 pBq modulo Gj , so that there exists a unique element dB j´1 pt, ǫq P Gj such that r1 pB 1 q “ r1 pBqdB j´1 pt, ǫq One may readily compute that the image of dB j´1 pt, ǫq in grj pGq is B δj´1 pτ q “ π ¨ τ1 ` rτ1 , ξ1 s ` N ÿ ` ˘ rτ2i´1 , ξ2i s ` rξ2i´1 , τ2i s i“1 ` b ÿ ` ˘ rσi , τn`i s ` ǫi π ¨ σi i“1 when n “ 2N is even and B δj´1 pτ q “ π ¨ τ1 ` rτ1 , ξ1 s ` N ÿ ` ˘ rτ2i , ξ2i`1 s ` rξ2i , τ2i`1 s i“1 ` b ÿ ` ˘ rσi , τn`i s ` ǫi π ¨ σi i“1 16 when n “ 2N ` 1 is odd—using the same notation as in the q ‰ 2 case. For either parity of n, Proposition 5 of [Lab67]—with minor notational tweaks— B shows that the image of δj´1 together with the elements π j´1 ¨ ξi generates grj pGq. Actually the cited proposition is slightly more precise than this, but we won’t need this precision here as it will be folded into the last step of the proof. As one final piece of notation, for λ P p4Z2 qn set epB, λq “ xλ1 1 ¨ ¨ ¨ xλnn Note that for any t, ǫ as above we have epB 1 pt, ǫq, λq ” epB, λq modulo Gj`1 where the extra precision modulo Gj`1 follows since the λi are divisible by 4. Now suppose that j ě 3 there is a basis Bj of G in standard form and some λj´1 P p4Z2 qn such that s0 “ epB, λqr1 pBqz where z P Gj . This holds for j “ 3 by Proposition 3.4. From above there exist t, ǫ and α such that j´1 z ” x12 α1 j´1 ¨ ¨ ¨ xn2 αn B dj´1 pt, ǫq modulo Gj`1 1 If Bj “ Bj´1 pt, ǫq then we have s0 j´1 ” epB, λj´1 qr1 pBqx12 α1 ” epBj , λj´1 ` 2j´1 αqr1 pBj q j´1 ¨ ¨ ¨ xn2 αn B dj´1 pt, ǫq modulo Gj`1 . As before the Bj converge to a standard basis for G; furthermore λj converges to some λ P p4Z2 qn . So passing to the limit we have found a standard-form basis B8 such that s0 “ epB8 , λj´1 qr1 pB8 q “ epB8 , λj´1 qr1 pn, 0, χ; X qs1 ¨ ¨ ¨ sb Here we have written B8 “ X \ Y where X denotes the first n elements of B8 . Now by Theorems 2.2 and 2.4 we find that epB8 , λj´1 qr1 pn, 0, χ; X q is in fact a Demushkin word in the free group G1 “ xX y, and moreover the image of the orientation character of G1 equals the image of χ. Therefore by Theorem 1.9 there is a free basis X 1 of G1 such that epB8 , λj´1 qr1 pn, 0, χ; X q “ r1 pn, 0, χ; X 1 q Then if B “ X 1 \Y then B is a basis of G in standard form and s0 “ r1 pn, b, χ; Bq as required. 4 Splittings and the pro-p curve complex An important tool in the study of surface automorphisms is the curve complex, which is a simplicial complex whose vertices are isotopy classes of essential simple closed curves on the surface. Translating into the language of group theory this may be rephrased as ‘a complex whose vertices are splittings of the 17 surface group over Z’. In this section we will define an analogous object for the pro-p completion of a surface group, on which the automorphism group of the pro-p group will act. One could no doubt study such an object for an arbitrary Demushkin group, but it is simpler and perhaps more interesting to restrict to the case of an orientable Demushkin group (i.e. the pro-p completion of an orientable surface group). For the rest of the section let Σ be a compact orientable surface which is not p ppq be the pro-p completion a sphere, disc or cylinder. Let Γ “ π1 Σ and let G “ Γ of Γ. Let S be a family of subgroups of G comprising the pro-p completion of one representative of the fundamental group of each boundary component. Definition 4.1. Define the relative automorphism group AutB pGq to be the group of automorphisms of G which send every S P S to a conjugate of itself. One may check that AutB pGq is a closed subgroup of AutpGq containing InnpGq. Define OutB pGq “ AutB pGq{ InnpGq. Similarly for Γ. Definition 4.2. Let ‫ג “ ג‬pΣq be the set of all equivalence classes of pairs pT, ρq with the following properties. • T is a pro-p tree and ρ : G Ñ AutpT q is a continuous left action of G on T by graph automorphisms such that GzT is finite. • For every e P EpT q the edge stabiliser stabρ peq is isomorphic to Zp • If GzT is not a loop, then for every vertex v P V pT q and every edge e incident to v the edge stabiliser stabρ peq is properly contained in the vertex stabiliser stabρ pvq. • Every S P S fixes a vertex of T , but does not fix any edge of T . Two such objects are regarded as equivalent if there is a G-equivariant graph isomorphism from one to another. The automorphism group AutB pGq acts on ‫ג‬pΣq on the right by pT, ρq ¨ ψ “ pT, ρ ˝ ψq where ψ P AutB pGq. Note that if ψ is an inner automorphism of G, then pT, ρq ¨ ψ is equivalent to pT, ρq so the action descends to an action of OutB pGq on ‫ג‬pΣq. The object ‫ג‬pΣq will be referred to as the pro-p curve complex of Σ. At present it is merely a set, but later we shall see that it has a topology making it into a profinite space such that the action of AutB pGq is continuous. We will usually abuse notation by ignoring the fact that elements of ‫ג‬pΣq are really equivalence classes and simply deal with the pairs pT, ρq themselves. Note that if one replaces G with Γ and ‘pro-p tree’ with ‘simplicial tree’ in the above definition then one recovers the curve complex CpΣq of Σ. For our purposes we will adopt the following definition. Definition 4.3. Given a set X, a simplicial structure on X is a partial ordering ď on X such that: • For every x P X there exist only finitely many y P X such that y ď x • Let X pnq be the set of elements x P X such that there are n ` 1 minimal elements of X which are smaller than or equal to x. Then for each x P X pnq , x is the join of these elements and the subposet ty P X | y ď xu is isomorphic to the face poset of an n-simplex. We refer to x P X pnq as an n-simplex of X. 18 The curve complex CpΣq has a natural AutB pΓq-equivariant simplicial structure which may be described as follows. For collections of isotopy classes of closed curves x, y P CpΣq, we say y ď x if y may be obtained by deleting some of the isotopy classes of closed curves in x. In terms of the action on dual trees, this corresponds to a Γ-equivariant epimorphism of trees. Therefore we define a poset structure on ‫ג‬pΣq as follows. Definition 4.4. For pT, ρq and pT 1 , ρ1 q in ‫ג‬pΣq, we declare pT, ρq ě pT 1 , ρ1 q if and only if there is a G-equivariant epimorphism of graphs T Ñ T 1 . Definition 4.5. We define a decomposition graph of Σ to be a finite connected graph X with two labelling functions n‚ , b‚ : V pXq Ñ N such that: ř • vPV pXq bv is the number of boundary components of Σ ř • rk Γ “ vPV pXq pnv ` bv q ` 2p1 ´ χpXqq ´ ǫ where ǫ is 1 if Σ has boundary or 0 if Σ is closed. • For a vertex v, if n “ 0 then either X is a loop and Σ is a torus or bv ` valpvq ą 2 Let D “ DpΣq be the set of decomposition graphs modulo isomorphism of labelled graphs. We will be aiming to prove the following theorem. Here we regard AutB pΓq as a subgroup of AutB pGq in the natural way. Theorem 4.6. Let Σ be a compact orientable surface and let CpΣq be the curve complex of Σ. There is an AutB pπ1 Σq-equivariant function i : CpΣq Ñ ‫ג‬pΣq such that: (1) i is an injection. If x, y P CpΣq then x ď y if and only if ipxq ď ipyq. Furthermore if z P ‫ג‬pΣq and z ď ipyq then z “ ipxq for some x ď y. (2) ď is a simplicial structure on ‫ג‬pΣq and i preserves the simplicial structure (3) There is a natural diagram of bijections i CpΣq{ AutB pΓq d¯ ‫ג‬pΣq{ AutB pGq δ̄ DpΣq Remark. Part (3) of the theorem is perhaps the most interesting part, and may be paraphrased as ‘any splitting of G with edge groups Zp is equivalent under AutB pGq to a geometric splitting’. Construction of i. Let x be an n-simplex in the curve complex—that is, an isotopy class of collections of n ` 1 disjoint essential simple closed curves on Σ which may be made disjoint. Such a collection (together with various choices of base-points) induces a graph-of-groups splitting of Γ where all edge groups are copies of Z, where peripheral subgroups are conjugate into vertex groups but not edge groups, and where edge groups are not equal to adjacent vertex groups except in the case of a torus with a single non-separating simple closed curve. 19 This splitting is p-efficient (that is, well-behaved in the pro-p topology on Γ) by, for instance, Proposition 3.8 of [Wil17b]. Therefore by Propositions 6.5.3 and 6.5.4 of [Rib17] there is an induced splitting of G as an injective graph of pro-p groups with procyclic edge groups. The standard tree dual to this splitting (see Theorem 6.5.2 of [Rib17]) is a representative of an element ipxq of ‫ג‬pΣq. Taking different choices of basepoints does not affect the equivalence class of ipxq in ‫ג‬pΣq. Furthermore the abstract tree T abs dual to the splitting of π1 Σ along x is naturally embedded as an abstract subgraph of T which is dense in the topology on T by Proposition 6.5.4 of [Rib17]. Construction of d and δ. There is a function d : CpΣq Ñ DpΣq defined as follows. Given a representative of an element of the curve complex (i.e. a collection C of disjoint essential simple closed curves on Σ) there is a graph X dual to these curves, with one vertex in each component of the complement of these curves and one edge for each curve. For a component v of Σ r C set nv to be half the genus of v and bv to be the number of boundary components of Σ lying in v. One easily verifies that this is a decomposition graph for Σ. This defines the map d. Clearly d is AutB pΓq-invariant and therefore gives a map d : CpΣq{ AutB pΓq Ñ DpΣq. By the standard theory of surfaces this is a bijection. We may also define a map δ : ‫ג‬pΣq Ñ DpΣq. Let pT, ρq represent an element of ‫ג‬pΣq. Then GzT “ X is a finite connected graph. Choose a maximal subtree Y of X and a function s : X Ñ T which is a section of the quotient map and such that sd0 pxq “ d0 pspxqq for all x P X and sd1 pxq “ d1 spxq for all x P Y . Such a map s is a fundamental 0-section in the language of [Rib17]. Given s we may form a graph of groups G “ pX, G‚ q as in Section 6.6 of [Rib17], whose vertex and edge groups Gx are the stabilisers of the points spxq. This is an injective graph of pro-p groups whose fundamental pro-p group is G. Every S P S is conjugate into exactly one of the Gv . Replace every S by some such conjugate and for v P V pXq let Sv be the collection of elements of S lying in Gv . Further let Ev be the collection of edge groups of G incident to v. Since pG, Sq is a PD2 pair, Theorem 5.18 of [Wil17a] shows that pGv , Sv Y Ev q is also an orientable PD2 pair for every v P V pxq. Therefore Gx is a free pro-p group of rank nv ` |Sv | ` |Ev | ´ 1 for some nv P N. Set bv “ |Sv |. We have now defined a decomposition graph δpT, ρq. One may also characterise these invariants as follows: |Ev | is the number of Gv -orbits of edges of T incident to spvq, and bv is the number of Gv -conjugacy classes of the conjugates of elements of S that lie in Gv . Finally nv is defined as rk Gv ´ |Sv | ´ |Ev | ` 1 as before. This shows not only that δpT, ρq is independent of the choices of Y and s but is also AutB pGq-invariant. Hence we also have a map δ : ‫ג‬pΣq{ AutB pGq Ñ DpΣq. Proof of (3). The first characterisation of δ in terms of graphs of groups shows immediately that δ ˝ i “ d. This immediately shows that δ is a surjection. So to show that i induces the required bijection it remains to show that δ is an injection. For a finite graph X let DX pΣq be the set of decomposition graphs whose underlying graph is X, and let ‫ג‬X pΣq be the set of elements pT, ρq of ‫ג‬pΣq with GzT – X. Then δ breaks into a disjoint union of maps ‫ג‬X pΣq{ AutB pGq Ñ DX pΣq and it suffices to prove that each of these is an injection. We do this 20 by induction on the number of edges of X, over all surfaces Σ simultaneously. The idea of the induction is simple. Each action on a tree may be represented by a graph of groups, which may be thought of as a smaller graph of groups plus one additional edge. The induction hypothesis allows us to identify the smaller graphs of groups, and we may then glue back up to recover the full decompositions. The precise proof requires much notation. Let pT, ρq, pT 1 , ρ1 q P ‫ג‬X pΣq and suppose δpT, ρq “ δpT 1 , ρ1 q. Choose an edge e of X and let the component(s) of X r e be X1 (and X2 ). If e is separating we order the indices so that d0 peq P X1 . Further choose graphs of groups as above corresponding to T and T 1 . Let the fundamental pro-p groups of the restricted graphs of groups over X1 (and X2 ) be G1 and G11 (and G2 and G12 respectively). After replacing the S P S by conjugates if necessary each member of S lies in exactly one of G1 or G2 . Let S1 consist of d0 pGe q (and d1 pGe q if e is non-separating) together with those elements of S lying in G1 . If e is separating then set S2 to be the elements of S lying in G2 together with d1 pGe q. Similarly define Si1 . Finally choose generators s0 and s10 of Ge and G1e . If e is non-separating denote a choice of stable letter for the HNN extension G1 >Ge by t so that t´1 d0 ps0 qt “ d1 ps0 q. Similarly for t1 . By collapsing X1 and X2 and applying Theorem 5.18 of [Wil17a] we find that pGi , Si q is a PD2 pair. The rank and number of boundary components may be read off immediately from δpT, ρq “ δpT 1 , ρ1 q. Both pairs are orientable so the classification of PD2 pairs (Theorem 3.3) shows that pGi , Si q and pG1i , Si1 q are both isomorphic as pairs (after possibly changing the peripheral groups by conjugacies) to the pro-p completion of the fundamental group of some compact r surface Σ. r of Now over Xi we have graph of groups decompositions Ui , Ui1 P ‫ג‬Xi pΣq pGi , Si q and pG1i , Si1 q. Since δpT, ρq “ δpT 1 , ρ1 q and the graphs of groups are restrictions of those for pG, Sq it follows that δpU q “ δpU 1 q. By induction we therefore have an isomorphism ψi : Gi Ñ G1i (relative to Si and Si1 ) such that ψi pGx q is a Gi -conjugate of G1x for each x P Xi . Applying an inner automorphism we may assume ψ1 pd0 ps0 qq “ d0 ps10 q and, if e is separating, that ψ2 pd1 ps0 qq “ d1 ps10 q. When e is separating we may therefore glue these maps together (by the universal property of amalgamated free products) to give ψ P AutB pGq such that ψpGx q is a G-conjugate of G1x for all x P X. Therefore the two graphs of groups decompositions pX, ψpG‚ qq and pX, G1‚ q differ only by the choice of 0-section, which does not affect the Bass-Serre tree (see Section 6.6 of [Rib17]). Therefore pT, ρq ¨ ψ “ pT 1 , ρ1 q as required. It only remains to show that in the case when e is separating we must show that the automorphism ψ of G1 extends across the HNN extension to give an automorphism of G. The construction above ensured that ψ1 pd0 ps0 qq “ d0 ps10 q and that ψ1 pd1 ps0 qq “ pd1 ps10 qλ qg for some λ P Up and g P G1 . We must show that λ “ 1, for then t ÞÑ t1 g gives the required extension of ψ1 to ψ P AutB pGq. 21 We have a diagram of maps ψ˚ – H1 pd0 pGe qq – conjptq H1 pd1 pGe qq H2 pG1 , S1 q ψ˚ – H1 pd0 pG1e qq H2 pG11 , S11 q – conjpt1 q conjpg´1 q˝ψ˚ – H1 pd1 pG1e qq with coefficients in Zp . Here conjpxq denotes a map induced by conjugacy by x P G. The two triangles in this diagram commute because of the segment ‹ H2 pG, S1 q ÝÑ H2 pG1 , S1 q ÝÑ H1 pGe q of the (dual of) the long exact sequence in Theorem 4.11 of [Wil17a], where the starred map is the composition d´1 ´d´1 0 H2 pG1 , S1 q Ñ H1 pS1 q Ñ H1 pd0 pGe qq ‘ H1 pd1 pGe qq ÝÝ1ÝÝÝÝ Ñ H1 pGe q Therefore the entire diagram commutes. Tracing d0 ps0 q around the outer rectangle shows that λ “ 1 as required. Proof of (1). Let us prove that i is an injection. Now suppose ipxq ď ipyq. Let the discrete tree dual to x be T abs and that dual to y be U abs , and let T and U be the trees for ipxq and ipyq. As mentioned above, T abs is embedded in T (and similarly for U ). Take a G-equivariant isomorphism f : T Ñ U “ X and identify GzT with GzU via f . Take a maximal subtree Y of X and fundamental 0-sections s : X Ñ T abs , s1 : X Ñ U abs lifting Y —which of course also provide 0-sections for T and U . Then f s and s1 are both fundamental 0-sections for U lifting the same tree Y . Then by Theorem 6.6.1 (or rather its proof) there is a Gequivariant isomorphism h : U Ñ U taking f s to s1 . Then since T abs “ Γ ¨ spXq and U abs “ Γ ¨ s1 pXq the map hf restricts to an equivariant graph isomorphism T abs Ñ U abs and we are done. To show that x ď y implies ipxq ď ipyq note that the graph of groups decomposition of Γ corresponding to x is obtained from the decomposition corresponding to y by collapsing some sub-graphs-of-groups; therefore the same is true of ipxq and ipyq, and this collapse gives the required equivariant epimorphism of trees as required. Also, if z ď ipyq then at at the level of graphs of groups z is obtained from ipyq by collapsing some sub-graphs-of-groups; such collapses are precisely those induced by collapses of the graph of discrete groups corresponding to y. This shows that z “ ipxq for some (unique) x ď y. Proof of (2). Part (2) follows from (1) and (3). For the notion of simplicial structure consists of conditions on ty P ‫ג‬pΣq | y ď xu for x P ‫ג‬pΣq. Part (1) and the simplicial structure on CpΣq show that these conditions hold when x P ipCpΣqq. Since the partial order is AutB pGq-invariant and every point in ‫ג‬pΣq may be translated to a point in ipCpΣqq via the action of AutB pGq this shows that the simplicial structure conditions hold at every point of ‫ג‬pΣq. This proves (2). 22 Notice that ‫ג‬pΣq has a natural topology making it into a profinite space on which AutB pGq acts continuously. For choosing any lift s : DpΣq Ñ ‫ג‬pΣq splitting the quotient map defines a surjection AutB pGq ˆ DpΣq Ñ ‫ג‬pΣq, to which we may give the quotient topology. This is homeomorphic to the disjoint union ğ ‫ג‬pΣq “ stabpspzqqz AutB pGq zPDpΣq so that ‫ג‬pΣq is a profinite space. Because DpΣq is finite this topology does not depend on the choice of s. References [BE78] Robert Bieri and Beno Eckmann. Relative homology and Poincaré duality for group pairs. Journal of Pure and Applied Algebra, 13(3):277– 319, 1978. [Dem61] S. P. Demushkin. The group of a maximal p-extension of a local field. Izvestiya Rossiiskoi Akademii Nauk. Seriya Matematicheskaya, 25(3):329–346, 1961. [Dem63] S. Demushkin. On 2-extensions of a local field. Sibirsk. Mat. Zh, 4(4):951–955, 1963. [EL83] Beno Eckmann and Peter Linnell. Poincaré duality groups of dimension two, II. Commentarii Mathematici Helvetici, 58(1):111–114, 1983. [EM80] Beno Eckmann and Heinz Müller. Poincaré duality groups of dimension two. Commentarii Mathematici Helvetici, 55(1):510–520, 1980. [Lab67] John P. Labute. Classification of Demushkin groups. Canad. J. Math, 19(1):106–132, 1967. [Rib17] Luis Ribes. Profinite Graphs and Groups, volume 66 of A Series of Modern Surveys in Mathematics. Springer, 2017. [RZ00] Luis Ribes and Pavel Zalesskii. Profinite groups. Springer, 2000. [Ser62] Jean-Pierre Serre. Structure de certains pro-p-groupes. Séminaire Bourbaki, 8:145–155, 1962. [Ser13] Jean-Pierre Serre. Galois cohomology. Springer Science & Business Media, 2013. [SW00] Peter Symonds and Thomas Weigel. Cohomology of p-adic analytic groups. In New horizons in pro-p groups, volume 184, pages 347–408. Birkhäuser Boston, 2000. [Wei95] Charles A. Weibel. An introduction to homological algebra. Number 38 in ‘Cambridge studies in advanced mathematics’. Cambridge university press, 1995. [Wil17a] Gareth Wilkes. Relative cohomology theory for profinite groups. arxiv preprint arXiv:1710.00730, 2017. 23 [Wil17b] Gareth Wilkes. Virtual pro-p properties of 3-manifold groups. Journal of Group Theory, 20(5):999–1023, 2017. 24
4math.GR
Asymptotics of selective inference arXiv:1501.03588v2 [math.ST] 4 Aug 2016 Xiaoying Tian, Jonathan Taylor∗ Department of Statistics Stanford University Sequoia Hall Stanford, CA 94305, USA e-mail: [email protected] [email protected] Abstract: In this paper, we seek to establish asymptotic results for selective inference procedures removing the assumption of Gaussianity. The class of selection procedures we consider are determined by affine inequalities, which we refer to as affine selection procedures. Examples of affine selection procedures include selective inference along the solution path of the LASSO, as well as selective inference after fitting the LASSO at a fixed value of the regularization parameter. We also consider some tests in penalized generalized linear models. Our result proves asymptotic convergence in the high dimensional setting where n < p, and n can be of a logarithmic factor of the dimension p for some procedures. Our method of proof adapts a method of Chatterjee (2005). AMS 2000 subject classifications: Primary 62M40; secondary 62J05. Keywords and phrases: selective inference, non-gaussian error, highdimensional inference, LASSO. 1. Introduction Selective inference is a recent research topic that studies valid inference after a statistical model is suggested by the data Fithian et al. (2014), Lee et al. (2013), Taylor et al. (2014, 2013). Classical inference tools break down at this point as the data used for the hypothesis test is allowed to be the data used to suggest the hypothesis. Specifically, instead of being given a priori, the hypothesis to test is dependent on the data, thus random. Formally, denoted by E ∗ = E ∗ (y, X) is the model selection procedure, which generates a set of hypotheses to test, or perhaps parameters for which to form intervals. It is useful to think of E ∗ as a point process with values in S, where S is some collection of questions of possible interest. Consider the following example, Suppose y|X ∼ G with y ∈ Rn , X ∈ Rn×p , X fixed. For any E ⊂ {1, . . . , p} define the functionals βj,E (G) = eTj argmin EG (ky − XE βE k2 |X) j ∈ E, β where ej is the unit vector with only the j-th entry being 1. Such functionals βj,E is essentially the best linear coefficients within the model consisting of only ∗ Supported in part by NSF grant DMS 1208857 and AFOSR grant 113039. 1 Tian and Taylor/Asymptotics of selective inference 2 variables in E. Then the collection of possily interesting questions are   S = {βj,E , j ∈ E} : E ⊂ {1, . . . , p} . The data (y, X) will then suggest a subset of interesting variables E, and E ∗ (y, X) designates the target for inference to be {βj,E , j ∈ E}, the best linear coefficient within a model consisting of only the variables in E. Previous literature has studied inference after different model selection procedures E ∗ . Notably Lee et al. (2013) proposed an exact test within the model suggested by LASSO, that is E ∗ = {βj,E , j ∈ E}, where E is the active set of the LASSO solution. The test is based upon a pivotal quantity which the authors prove to be distributed as Unif(0, 1) if the hypothesis to be tested is true. Thus such quantity Pj (y) can be used to test the hypothesis H0j : βj,E = 0, and control the “Type-I error” at level α, P (Pj (y) ≤ α | H0j is true) ≤ α. (1) By inverting such tests, Lee et al. (2013) can also construct valid confidence intervals for βj,E . It is of course worth noticing that either the hypothesis H0j or the parameters βj,E are random as E is suggested by the data. So the “Type-I error” (1) is not the classical Type-I error definition where the hypotheses are given a priori. Such inference framework is first considered in Berk et al. (2013), and we leave the philosophical discussions of such approach to Fithian et al. (2014). The means by which Lee et al. (2013) controls the “Type-I error” is through constructing the p-value functions Pj . Such construction is highly dependent on the assumption of normality of the error distribution. Other works like Lockhart et al. (2013), Taylor et al. (2014) used similar approaches. Compared to these previous work, we seek to remove the Gaussian assumption on the errors and establish asymptotic distributions of Pj in this work. We state the conditions under which Pj will be asymptotically distributed as Unif(0, 1), and thus Pj can be used as p-values to test the hypotheses and asymptotically control the “Type-I error” in (1). This allows asymptotically valid inference in the linear regression setting without normality assumptions. It also allows application of covariance test (Lockhart et al. 2013) in generalized linear models. 1.1. Related works Tibshirani et al. (2015) also considers uniform convergence of the statistics proposed by Taylor et al. (2014), but focuses mainly on the low dimensional case. In the high dimensional case, they have a negative result on the uniform convergence of the pivot. In this paper, we instead focus on the high dimensional case and state the conditions in which the pivot will converge. More specifically, n is allowed to be of a logarithmic factor of the dimension p for two common procedures introduced in Section 4. Tian and Taylor/Asymptotics of selective inference 3 In the works of Belloni et al. (2012), Meinshausen et al. (2012), Zhang & Zhang (2014), Javanmard & Montanari (2015), the authors proposed various ways of constructing confidence regions for the underlying parameters in the high-dimensional setting. One major difference between these works and our framework is that they try to achieve full model inference without using the data to choose a hypothesis. The advantage of such approach is robustness. But in the highdimensional setting, with tens of thousands of potential variables, it is natural to use the data to select hypotheses of interest and perform valid inference only for those hypotheses. In addition, some of the full model inference works require conditions of linear underlying model Meinshausen et al. (2012), Javanmard & Montanari (2015) which the framework of selective inference does not require. For more philosophical discussions on the comparisons of the two approaches, see Fithian et al. (2014). 1.2. Organization of the paper In Section 2, we formally introduce the methods for selective inference with certain model selection procedures, which we call affine selection procedures. In Section 3, we state the main theorem that will allow asymptotically valid inference. In Section 4, we will illustrate the applications of our results to two selective inference problems, selective inference after solving the LASSO at a fixed λ, and the covariance test for testing the global null in generalized linear models. We collect all the proofs in Section 5 and dicuss the directions of future research in Section 6. 2. Selective inference with affine selection procedures Suppose we have a design matrix X ∈ Rn×p , considered fixed, and ind yi |xi ∼ G(µ(xi ), σ 2 (xi )) (2) where xi is the i-th row of the matrix X and G(µ, σ 2 ) denotes any one-dimensional distribution with mean µ and variance σ 2 . We also denote µ(X) = (µ(x1 ), . . . , µ(xn )) and Σ(X) = diag(σ 2 (xi ), . . . , σ 2 (xn )), a diagonal matrix with σ 2 (xi ) as the diagonal entries. Some feature selection procedure is then applied on the data to select a subet E ⊆ {1, 2, . . . , p} and the target of inference will be E ∗ (y, X) = {βj,E , j ∈ E}. In general, we consider certain selection procedures called the affine selection procedures, Definition 1 (Affine selection procedure). Suppose a model selection procedure E ∗ : Rn × Rn×p → S, where S is a finite set of models, S = {E1 , . . . , E|S| }. We call E ∗ an affine selection procedure, if the selection event can be written as an affine set in the first argument of E ∗ . Formally, E ∗ is an affine selection Tian and Taylor/Asymptotics of selective inference 4 procedure if for each potential model to be selected E ∈ S, {E ∗ (z, X) = E} = {A(E, X)z ≤ b(E, X)} , (z, X) ∈ Rn × Rn×p . (3) where A ∈ Rk×n , b ∈ Rk and k ∈ N are dependent only on E and X. Moreover, the sets {A(Ei , X)z ≤ b(Ei , X)} ⊆ Rn , i = 1, . . . , |S| are disjoint or their intersections have measure 0 under the Lebesgue measure on Rn . Examples of affine selection procedures include selection procedures that are based on E, the set of variables chosen by the data and usually some other information1 . Various algorithms can be used to select E, e.g. E as the active set of the LASSO solution at a fixed λ (Lee et al. 2013), E as the first variable to enter the LASSO or LARS path (Lockhart et al. 2013), (more generally any ℓ1 penalized generalized linear models) or E as the k variables included at the k-th step of forward stepwise selection (Taylor et al. 2014). The works of Lee et al. (2013), Lockhart et al. (2013), Taylor et al. (2014, 2013) have constructed valid p-values when the family G is the Gaussian family. Formally, the pivotal function depends on the following quantities, 2.1. Notations The pivotal function is determined by the following functions. For any A ∈ Rk×n , b ∈ Rk , Σ ∈ Rn×n and η ∈ Rn , we define AΣη , η T Ση bj − (Az)j + αj η T z L(z; A, b, Σ, η) = max , αj <0 αj α = α(A, b, Σ, η) = bj − (Az)j + αj η T z . αj >0 αj U (z; A, b, Σ, η) = min (4) (5) (6) Furthermore, we define F (x; σ 2 , m, a, b) = Φ((x − m)/σ) − Φ((a − m)/σ) Φ((b − m)/σ) − Φ((a − m)/σ) which is the CDF of the univariate Gaussian law N (m, σ 2 ) truncated to the interval [a, b]. 2.2. A pivotal quantity with Gaussian errors Theorem 1 provides the construction of a pivotal function when the data is normally distributed and E ∗ is an affine selection procedure. We denote the 1 See Section 4 for details Tian and Taylor/Asymptotics of selective inference 5 response variables to be Y when G is the Gaussian family to distinguish it from y where G is a more general location-scale family. Note all distributions in this paper are conditional on X, that is the law we consider are either L(Y|X) or L(y|X). All random variables have access to X as if it were a constant. Theorem 1 (Lee et al. (2013)). Suppose X ∈ Rn×p and Y ∼ N (µ(X), Σ(X)), µ(X) ∈ Rn , Σ(X) ∈ Rn×n and E ∗ is an affine selection procedure on Rn ×Rn×p . Then any for any η : Rn → Rn measurable with respect to σ(E ∗ ) we have F (η(E ∗ )T Y; η(E ∗ )T Ση(E ∗ ), η(E ∗ )T µ, LE ∗ (Y), UE ∗ (Y)) E ∗ (Y, X) = E ∼ Unif(0, 1), (7) where E ∗ (z, X) = E ⇐⇒ A(E, X)z ≤ b(E, X) and LE (z) = L(z, A(E, X), b(E, X), Σ, η(E)) UE (z) = U (z, A(E, X), b(E, X), Σ, η(E)). (8) (9) Moreover, marginalizing over the selection procedure E ∗ , we have the following F (η(E ∗ )T Y; η(E ∗ )T Ση(E ∗ ), η(E ∗ )T µ, LE ∗ (Y), UE ∗ (Y)) ∼ Unif(0, 1). (10) The significance of Theorem 1 is that assuming the diagonal matrix Σ is known, the only unknown parameter for the pivotal quantity (10) is η T µ. To test the hypothesis H0 : η T µ = 0, we just need to plug in the value and then compute (10), which then can be used as a p-value to accept/reject the hypothesis. For example, if we take T η = XE (XE XE )−1 ej , (11) where ej is the unit vector with only the j-th entry being 1, η T µ = βj,E . The quantity in (10) is pivotal and can be used to test the hypothesis H0j : βj,E = 0, and control the “Type-I errpr” (1). Since X is fixed, we use the shorthand E ∗ (z) = E ∗ (z, X), A(E) = A(E, X), b(E) = b(E, X). 3. Asymptotics with non-Gaussian error Now if we remove the assumption that the error L(Y|X) = N (µ(X), Σ), the conclusion of Theorem 1 does not hold any more. The best we can hope for is a weak convergence result that the same pivotal quantities (10) would converge to Unif(0, 1) (as n → ∞). This requires some conditions on both the distribution L(y|X) and the selection procedure E ∗ . Our main contribution in this work, Theorem 3 establishes conditions on L(y|X) and E ∗ under which the pivotal quantity (10) is asymptotically distributed as Unif(0, 1). The main approach is to compare the distribution of the pivots (10) under the distribution L(y|X) with that under Gaussian distribution L(Y|X). In the latter case, the exact distribution is derived in Theorem 1. In the following, we establish the conditions where the above two distributions are comparable. Tian and Taylor/Asymptotics of selective inference 6 3.1. Bounding the influence function Note the pivotal quantity in (10) depends on y either through the linear functions η T y or the maximum/minimum of linear functions LE ∗ (y), UE ∗ (y). In approximating the exact Gaussian theory with asymptotic results a quantity analogous to a Lipschitz constant (in y) will be necessary, expressing the changes in η T y as well as the upper and lower bounds LE ∗ and UE ∗ . This, in some sense, describes the influence each yi can have on the pivotal quantity (10). For an affine selection procedure E ∗ : Rn × Rn×p → S, without loss of generality suppose E ∗ is surjective. Since E ∗ is affine, for any model E ∈ S, there are the associated A(E) and b(E) as defined in (3). We define M (E, η) = max 1≤i≤nrow(A(E)) 1≤j≤n A(E)ij + kη(E)k∞ , (A(E)Ση(E))i (12) ∗ M (E , η) = max M (E, η). E∈S We also define r(E) = nrow(A(E)), r(E ∗ ) = max nrow(A(E)). E∈S (13) The quantity M (E ∗ , η) measures the maximal influence any yi has on a smoothed version of the triple (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)). As M (E ∗ , η) and r(E ∗ ) are critical in bounding the difference between L(y|X) and L(Y|X), it is important to get a sense of their size. Typically r(E ∗ ) is less than p, and we discuss the typical size of M (E ∗ , η) through the following simple example: Example 3.1. Suppose the design matrix X ∈ Rn×p is generated in the following way: we first generate each row independently from a distribution on Rp , and then normalize the column of X to have length 1. Suppose instead of using data to select a model, we just arbitrarily choose a subset E. This is equal to no selection at all, thus M (E, η) = kη(E)k∞ . If we want to perform inference for βj,E , we take T η = XE (XE XE )−1 ej , where ej is the unit vector with only the j-th coordinate being 1. Since we normalT ize the columns, it is not hard to verify (XE XE )−1 = Op (1), and maxij (Xij ) = −1/2 Op (n ), thus if the selected variables set always satisfies |E| ≪ n, η = Op (n−1/2 ). Therefore M (E ∗ , η) = Op (n−1/2 ). This is a very simple example which does not involve selection. In reality we will some meaningful selection procedure that uses the data so M (E ∗ , η) would involve A(E ∗ ) and b(E ∗ ) as well. However, we will see through examples in Section 4 that it is still reasonable to assume M (E ∗ , η) = O(n−1/2 ). The following theorem compares the distribution of (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) under L(y|X) and its Gaussian counterpart. Theorem 2. Fix X ∈ Rn×p . Suppose (y, Y) are defined conditionally independent given X on a common probability space such that Tian and Taylor/Asymptotics of selective inference 7 • L(y|X) has independent entries with mean vector µ and covariance matrix variance Σ and finite third moments bounded by γ; • L(Y|X) = N (µ, Σ). Suppose we are given η ∈ σ(E ∗ ), then given any bounded function W ∈ C (R3 ; R) with bounded derivatives satisfying ( ≥ 0 if v ≤ u ≤ w W (u, v, w) = = 0 else 3 there exists N = N (M (E ∗ , η), |S|, r(E ∗ ), W ), such that the following holds for n, p ≥ N ,     EW η(E ∗ )T y, LE ∗ (y), UE ∗ (y) − EW η(E ∗ )T Y, LE ∗ (Y), UE ∗ (Y)  15    4 ∗ ∗ 3 ≤ C(W, γ) log r(E )|S| nM (E , η) (14) where C(W, γ) is a constant depending only on the derivatives of W and γ, and η(E ∗ ) is η(E ∗ (y)) or η(E ∗ (Y)) depending on the context. As it is reasonable to assume M (E ∗ , η) = O(n−1/2 ), it is reasonable to assume the RHS of (14) goes to zero. Thus the distribution of (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) is close to that of (η(E ∗ )T Y, LE ∗ (Y), UE ∗ (Y)). In the following, we discuss the conditions under which the pivotal quantity (10) converges. 3.2. Smoothness of the pivot Note the bound in (14) also depends on C(W, γ), the derivatives of W . Thus besides the influence of each yi on (10), it is also necessary to control the smoothness of the (10). In particular, the pivot in (10) takes the form of a truncated Gaussian cdf. Moreover, the smoothness (derivatives) of the truncated Gaussian cdf F (x; σ 2 , m, a, b) can depend heavily on the truncation interval [a, b]. More specifically, a lower bound on the denominator of F (x; σ 2 , m, a, b) puts some constraints on the width of the interval [a, b] as well as its distance to the origin. In our context, a, b corresponds to the upper and lower bounds appearing in (10). Formally, we assume the following assumption: Assumption 1. Suppose we have Xn ∈ Rn×pn and yn ∈ Rn is generated according to (2), and Yn is generated independently (conditional on Xn ) from N (µ(Xn ), Σ(Xn )) a Gaussian distribution with the same means and variances. We also have affine selection procedures E ∗ = En∗ . We assume there exists δn → 0 such that P(UE ∗ (yn ) − LE ∗ (yn ) < δn ) → 0, P(UE ∗ (Yn ) − LE ∗ (Yn ) < δn ) → 0, P(min(|UE ∗ (yn )|, |LE ∗ (yn )|) > 1/δn ) → 0, P(min(|UE ∗ (Yn )|, |LE ∗ (Yn )|) > 1/δn ) → 0. (15) Tian and Taylor/Asymptotics of selective inference 8 The first two conditions in (15) puts a lower bound on the width of the truncation interval (LE ∗ (yn ), UE ∗ (yn )). The last two conditions makes sure the truncation will not appear too far from the origin and thus we will have reasonable behavior in the tail. δn is the rate at which the truncation interval will shrink (or the distance of the truncation interval to the origin). This rate will appear in the RHS of (14) and thus we impose a condition on (δn , M (En∗ , ηn ), r(En∗ ), |Sn |) to ensure the convergence of the pivot (10). 3.3. Main result Suppose we have Xn ∈ Rn×pn and yn ∈ Rn is generated according to (2). We denote its distribution as L(yn |Xn ). The convergence mentioned below is under this sequence of distributions {L(yn |Xn )}∞ n=1 . Theorem 3 (Convergence of the pivot). Suppose we have a sequence of yn generated as above with means µn = µ(Xn ), and variances Σn = Σ(Xn ) and have finite third moments. We also assume Assumption 1 is satisfied with a sequence of δn . Furthermore, let En∗ be a sequence of affine selection procedures, ηn = η(En∗ ), and the corresponding M (En∗ , ηn ), r(En∗ ) and Sn properly defined as in Section 3.1. Then if     4 1/δn6 · M (En∗ , ηn )3 · n log r(En∗ ) + log |Sn | → 0, as n → ∞, we have d P (ηnT yn ; ηnT Σn ηn , ηnT µn , LEn∗ , UEn∗ ) → Unif(0, 1), n → ∞, (16) where P (x; σ 2 , m, a, b) = 2 min(F (x; σ 2 , m, a, b), 1 − F (x; σ 2 , m, a, b)) is the twosided pivot. In the following section, we apply Theorem 3 to different selection procedures. 4. Examples We give two examples in this section as the applications of Theorem 3. The first example is to perform selective inference after solving the LASSO and the second is to test the global null in generalized linear models. In these two examples, we will explain why the selection procedure is affine, what is the data distribution L(yn |Xn ) and the quantities (δn , M (En∗ , ηn ), r(En∗ ), |Sn |). To ease the notations, we suppress the dependencies on n whenever possible. It is helpful to keep in mind that yn ∈ Rn , Xn ∈ Rn×pn . 4.1. Inference for LASSO with non-Gaussian errors Consider the linear model y = Xβ 0 + ǫ, iid X ∈ Rn×p , ǫi ∼ G(0, σ 2 ), (17) Tian and Taylor/Asymptotics of selective inference 9 where σ is known and the distribution G has finite third moments, but is not necessarily Gaussian. Tibshirani (1996) proposed the now famous LASSO. We get a sparse solution β̂ by solving 1 β̂ = minimize ky − Xβk22 + λkβk1 , (18) β∈Rp 2 where λ > 0 is the fixed regularization parameter. We choose λ as in Negahban et al. (2012). If we normalize √ the columns of X to have norm 1, Negahban et al. (2012) chooses λ to be O( log p). 4.1.1. Affine selection procedure As in Lee et al. (2013), we solve (18) and get a solution β̂. Now we consider the selection procedure based on (E, zE ), where E = supp(β̂), zE = sign(β̂E ), where β̂E is β̂ restricted to the active set E. Note this is different from the selection procedure based only on E but is closely related, for detailed discussion see Lee et al. (2013). The authors in Lee et al. (2013) proved such selection procedure is equivalent to the affine constraints A(E, zE )y ≤ b(E, zE ), where T T A(E, zE ) = −diag(zE )(XE XE )−1 XE , T b(E, zE ) = −λdiag(zE )(XE XE )−1 zE . (19) To test the hypothesis H0j : βj,E = 0 for any j ∈ E, we choose η to be as in (11). In this case, a simple calculation will put the number of possible states at |S| = 2p , which will √ cause the bound in (14) to blow up when p > n. However, the choice of λ = O( log p) (Negahban et al. 2012) together with other conditions will ensure |S| is polynomial in p with high probability. √ 4.1.2. Number of states |S| for λ = O( log p) Suppose X is column standardized to be mean zero and norm 1, we first introduce the restricted strong convexity condition for matrix X. Definition 2 (Restricted strong convexity Negahban et al. (2012)). We say X ∈ Rn×p satisfies the restricted strong convexity condition for index set A with constant m > 0 if kXvk22 ≥ mkvk22 , for all v ∈ {∆ ∈ Rp : k∆Ac k1 ≤ 3k∆A k1 }. Now we define the assumptions needed to ensure |S| is polynomial in p with high probability. Tian and Taylor/Asymptotics of selective inference 10 Assumption 2. X satisfies the restriced convexity condition for A = supp(β 0 ) with constant m, and φmax , the biggest eigenvalue of X T X is bounded by a constant Q. Assumption 3. ǫi are sub-Gaussian errors with known variance σ 2 . Assumption 4. The signal is sparse. More specifically, k = |supp(β 0 )| is bounded by a constant K. Following Negahban et al. (2012), Lemma 1 shows with the above assumptions, the effective size of |S| is polynomial in p with high probability. √ Lemma 1. With Assumptions 2-4, if we solve (18) with λ ≥ 4σ log p and get active set E, then with probability at least 1 − c1 exp(−c1 λ2 ), |E| ≤ 16Q2 ·K m2 where c1 is some constant that depends on m and the subgaussian constant of the error ǫ. Thus, with probability 1 − c1 exp(−c1 λ2 ), |S| ≤ pcK , c= 16Q2 . m2 The proof of Lemma 1 is deferred to the appendix. Having controlled |S|, now we need to get a bound for the influences. 4.1.3. Bounding the influence M (E ∗ , η) Assume we have normalized the design matrix X columnwise so that each column has norm 1. We further assume the following assumption on X, Assumption 5. Suppose we solve problem (18) with X and get the active set E. Let φmin be the smallest eigenvalue for submatrices of size less than n × |E|, more specifically, kXvk22 . φmin = min v∈Rp ,kvk0 ≤|E| kvk2 2 We assume φmin ≥ ν > 0. Lemma 2. Suppose X satisfies Assumption 5, then T T max (XE XE )−1 XE i,j  ij ≤ |E| · max |Xij |. i,j ν2 4.1.4. Choice of δn in Assumption 1 √ If we normalize the columns of X to have norm 1 and choose λ = O( log p) et al. (2012). Then we assume Assumption 1 is satisfied in (18) as in Negahban √ with δn = O(( log pn )−1−κ ), for any small κ > 0. Tian and Taylor/Asymptotics of selective inference 11 To avoid long passage and stay focused on the main topic, we illustrate that Assumption 1 is satisfied with such δn ’s in the following simplified setup. However, the approach can be adapted to include more general cases. Lemma 3. Suppose Assumption 2-4 are satisfied. We further assume that zE = T 1 and the matrix (XE XE )−1 is equicorrelated, i.e.   T T XE )−1 jj = τ > 0, (XE XE )−1 ii = (XE  T (XE XE )−1 ij  > 0, ∀i, j ∈ E, i 6= j. ρ= T X )−1 (XE E ii ), for Then if kβn0 k∞ = O(λn ), Assumption 1 is satisfied with δn = O(λ−1−κ n any κ > 0. Remark 1. Note if we do not assume zE = 1, the last two conditions in As) and the first two conditions sumption 1 are still satisfied with δn = O(λ−1−κ n can be satisfied with further assumptions. But we do not pursue the technical details here. 4.1.5. Convergence of selective tests in the Lasso problems Suppose we solve the Lasso problem (18) and get active set E, and want to test the hypotheses H0j : βj,E = 0, we can simply take η to be as in (11). Now we summarize the above results and apply Theorem 3 to get the following corollary √ Lemma 4. Suppose we solve the Lasso problem (18) with λn = 4σ log pn , and Assumption 1-5 are satisfied and the δn ’s in Assumption 1 is chosen as √ 1 1 1 (log pn )− 2 − 2 κ . If we further assume max |Xij | = O(n− 2 ), kβ 0 k∞ = O( log pn ), and there exists κ > 0 such that n−1/2 (log pn )(7+3κ) → 0, then the pivot in (16) calculated with the appropriate (ηn , LEn∗ , UEn∗ ) converges to Unif(0, 1). Furthermore, we can construct a test for βj,E based on this pivot that controls “Type-I error” (1) asymptotically. 4.2. Covariance test for ℓ1 -penalized generalized linear models One of the first results in selective inference was the covariance test Lockhart et al. (2013) which provided an asymptotic limiting distribution for the first step of the Lasso or LARS path. An exact version of this test under Gaussian errors was described in Taylor et al. (2013). In the following, we generalize the covariance test for generalized linear models. Suppose L(y|x) is in an exponential family. More specifically, p(y|x; β 0 ) = b(y) exp[(xT β 0 )y − Λ(xT β 0 )], (20) Tian and Taylor/Asymptotics of selective inference 12 where β 0 and x are p-dimensional vectors and Λ(η) is the cumulant generating function of the distribution. Suppose yi |xi are independently distributed according to the law above, where xi ’s are considered fixed. Then the ℓ1 penalized generalized linear regression can be expressed as X β̂λ∗ = argmin − log p(yi |xi ; β) + λkβk1 . (21) β∈Rp 1≤i≤n The covariance test for the global null H0 : β 0 = 0 is based upon the the first knot on the solution path of (21), which is largest score statistic (in absolute values) at β 0 = 0, n o λ1 = sup λ : β̂λ∗ 6= 0 = kX T (y − ∇Λ(0))k∞ . (22) The variable to achieve the maximum in (22) will be the first variable to enter the solution path. The covariance test can also be viewed as a test for the coefficient with (potentially) the largest absolute values. A guess for such variable is the first variable to enter the solution path of (21). In other words, covariance tests select the target of inference based on (j ∗ , s∗ ), where   ∗ ∗ T T (j , s ) = argmax |xj (y − ∇Λ(0))|, sign(xj ∗ (y − ∇Λ(0))) , (23) j and the test statistic is λ1 = |xTj∗ (y − ∇Λ(0))|. 4.2.1. Affine selection procedure The selection procedure is based on (j ∗ , s∗ ) defined in (23), it is easy to see that it is equivalent to xTk (y − ∇Λ(0)) ≤ s∗ xTj∗ (y − ∇Λ(0)), −xTk (y − ∇Λ(0)) ≤ s∗ xTj∗ (y − ∇Λ(0)), k = 1, . . . , p, k = 1, . . . , p. Writing in the form of A(j ∗ , s∗ )y ≤ b(j ∗ , s∗ ), we have  T   T  x1 − s∗ xTj∗ (x1 − s∗ xTj∗ )∇Λ(0) ..   ..       .  T .∗ T   T   xp − s xj ∗   (xp − s∗ xTj∗ )∇Λ(0)     . A= T b= ∗ T , T ∗ T  −x1 − s xj ∗  −(x1 + s xj ∗ )∇Λ(0)     .. ..     . . −xTp − s∗ xTj∗ −(xTp + s∗ xTj∗ )∇Λ(0) We notice that λ1 = s∗ xTj∗ (y − ∇Λ(0)). Thus to test the global H0 : β 0 = 0, we simply take η = s∗ xj ∗ . Tian and Taylor/Asymptotics of selective inference 13 The challenge in establishing a result for the covariance test for GLM is the lack of Gaussianity in the data distribution. The tools we develop in this paper, however, can circumvent this. But we first need to establish the resulting pivot ind which we can use to test the hypothesis H0 : β 0 = 0. Note that yi | xi ∼ 2 G(µ(xi ), σ(xi ) ), thus if G were normal distribution, we will have an exact pivot by applying Theorem 1. This result is also given in Taylor et al. (2013). Formally, we have the following corollary. ind Corollary 1 (Global test for Gaussian errors). Suppose Yi ∼ N (µi , σi2 ), X ∈ Rn×p fixed, define µ = (µ1 , . . . , µn ), Σ = diag{σ12 , . . . , σn2 }. After getting the first knot on the solution path of (21), we get (j ∗ , s∗ ) as defined in (23) and λ1 = |xTj∗ (Y − µ)|. Furthermore, we also define Θjk = xTj Σxk and L(j ∗ ,s∗ ) = s(xk − Θj ∗ k /Θj ∗ j ∗ xj ∗ )T (Y − µ) , 1 − ss∗ Θj ∗ k /Θj ∗ j ∗ (s,k):s∈{−1,1},k6=j ∗ , sup 1−ss∗ Θj∗ k /Θj∗ j∗ >0 U(j ∗ ,s∗ ) = Then, inf ∗ s(xk − Θj ∗ k /Θj ∗ j ∗ xj ∗ )T (Y − µ) , 1 − ss∗ Θj ∗ k /Θj ∗ j ∗ , (s,k):s∈{−1,1},k6=j 1−ss∗ Θj∗ k /Θj∗ j∗ <0     Φ UΘ(jj∗∗,sj∗∗ ) − Φ Θjλ∗1j∗     ∼ Unif(0, 1) Φ UΘ(jj∗∗,sj∗∗ ) − Φ LΘ(jj∗∗,sj∗∗ ) (24) Corollary 1 gives a pivot (24) which we can use to test the global null H0 : β 0 = 0 and control the “Type-I error” (1). In practice, we often normalized the columns of the design matrix X. In addition we may assume the observations yi ’s are independently distributed with the same marginal variance, i.e. Σ = σ 2 I, then U(j ∗ ,s∗ ) = ∞ and L(j ∗ ,s∗ ) simplifies to the second knot in the solution path λ2 , thus we have: 1 − Φ(λ1 ) ∼ Unif(0, 1). (25) 1 − Φ(λ2 ) For the pivot (25) to converge to Unif(0, 1), we need to consider the number of states |S|, the bound on the influence M (j ∗ , s∗ ) as well as the choice of δn in Assumption 1. 4.2.2. The conditions for the pivot to converge Since j ∗ ∈ {1, . . . , p}, and s∗ ∈ {−1, 1}, the number of possible states |S| are naturally bounded by 2p and r(E ∗ ) = 2p. We assume Σ = σ 2 I, and X are normalized columnwise to have norm 1. We first introduce the following condition on the design matrix X, which states that any two columns of X cannot be too correlated. Tian and Taylor/Asymptotics of selective inference 14 Assumption 6. Suppose there exists ρ > 0, such that xTi xj ≤ ρ2 < 1, ∀ i 6= j, i, j ∈ {1, 2, . . . , p}. Under Assumption 6, it is not hard to verify M (j ∗ , s∗ ) ≤ 2 maxij |Xij | . 1 − ρ2 Now we need √ to pick the δn ’s such that Assumption 1 holds. In particular, we choose δn = ( log pn )−1−κ , for some κ > 0. Now if we apply Theorem 3, we have the following result, Corollary 2. Suppose y|X is generated independently coordinate-wise through the distribution in (20) with the same marginal variance. Assume the columns 1 of X have norm 1, Assumption 6 is satisfied and maxij |Xij | = O(n− 2 ). Then if 7+3κ − 1 n 2 → 0, log pn the pivot converges to Unif(0, 1) under the global null H0 : β 0 = 0, 1 − Φ(λ1 ) d → Unif(0, 1). 1 − Φ(λ2 ) 5. Proof of the theorems Without loss of generality, we restrict our interest to the case µ = µ(X) = 0, Σ = Σ(X) = I. This is possible since any affine selection procedure E ∗ applied to data with mean µ(X) 6= 0 is equivalent to a centered affine selection procedure E ∗,0 applied to the centered data. Specifically, the linear part of E ∗,0 is the same as E ∗ and the offsets are related by b0 (E) = b(E) − A(E)µ. Further, note that all quantities in the theorems above are independent of b. Scaling of the errors is handled in a similar fashion. 5.1. Proof of Theorem 1 Analogous to the proof in Lee et al. (2013), we prove Theorem 1. Proof. To lighten notations, we suppress all dependencies on X as it is assumed known. Note that {E ∗ (Y) = E} = {A(E)Y ≤ b(E)}. Thus     d T ∗ T L η(E) Y|E (Y) = E = L η(E) Y|A(E)Y ≤ b(E) . Tian and Taylor/Asymptotics of selective inference 15 Dropping the dependence on E for the moment, {AY ≤ b} = {AY − E[AY|η T Y] ≤ b − E[AY|η T Y]}, = {E[AY|η T Y] ≤ b − (AY − E[AY|η T Y])} = {αη T Y ≤ b − AY + αη T Y} = {αj η T Y ≤ bj − (AY)j + αj η T Y, j = 1, . . . , k}. In other words, {AY ≤ b} = {A(E)Y ≤ b(E)} = {LE (Y) ≤ η T Y ≤ UE (Y)}, and     d T ∗ T T L η(E) Y|E (Y) = E = L η(E) Y | LE (Y) ≤ η(E) Y ≤ UE (Y) , Note also from the derivation above that (LE (Y), UE (Y)) is independent of η T Y for each E. Thus if we condition on E ∗ , UE ∗ (Y) and LE ∗ (Y), η(E ∗ )T Y is distributed as a Gaussian r.v. with mean 0 and variance kη(E ∗ )k2 truncated at UE ∗ and LE ∗ . Therefore, F (η T Y; kηk2 , 0, LE ∗ (Y), UE ∗ (Y))|E ∗ = E, LE ∗ (Y), UE ∗ (Y) ∼ Unif(0, 1). Considering that conditional on E ∗ , η(E ∗ )T Y is independent of UE ∗ and LE ∗ , we have (7). 5.2. Smoothing the maxima of affine functions In the proof of Theorem 2 and the related lemmas and corollaries, a technique developed by Chatterjee (2005) is frequently used. Roughly speaking, we want to study convergence of functions like LE and UE which can be expressed as maxima or minima of affine functions. These non-smooth functions are replaced by a smoothed surrogate at the cost of a factor appearing in their derivatives depending on the smoothing parameter. Specifically, we are interested in how this smoothing affects the following quantities. Definition 3. For any f ∈ C 3 (Rn ; Rq ), define ) ( r/p p n . λr (f ) = sup |∂l fk (x)| , 1 ≤ p ≤ r, l = 1, . . . , n, k = 1, . . . , q, x ∈ R (26) For any finite collection F of functions define λr (F ) = max λr (f ). f ∈F 3 Definition 4. For any g ∈ C (D, R) where D ⊆ R3 and any multi-index α = (α1 , α2 , α3 ), we define for r = 1, 2, 3, ) # " ( r/|α| ∂ |α| g(u, v, w) , (u, v, w) ∈ D, |α| ≤ r , 1 . Cr (g) = max sup ∂uα1 ∂v α2 ∂wα3 Tian and Taylor/Asymptotics of selective inference 16 Now we define the smoothed maxima operator. Definition 5. Let f : Rn → R3 and define f = maxv∈F v, where  F = z 7→ vj (z), vj ∈ C 3 (Rn , R3 ) is a finite collection of thrice differentiable functions vj ’s. The maximum is taken coordinate-wise. We define the smoothed maxima operator with parameter β as   X 1 exp (βvj ) ∈ C 3 (Rn , R3 ), (27) Γ(f, β) = log  β vj ∈F where the operators log and exp are applied coordinate-wise. Suppose the range of f, Γ(f, β), denoted as R(f ), R(Γ(f, β)) ⊆ D and let h = g ◦ f , hβ = g ◦ Γ(f, β), then Lemma 5 gives a bound on kh − hβ k∞ and λ3 (hβ ). Lemma 5. Assume the same notations as above, s = |F |, then for β ≥ 1 3 log s, β λ3 (hβ ) ≤ 13c · β 2 C3 (g)λ3 (F ), kh − hβ k∞ ≤ C1 (g) · (28) (29) where c is a universal constant. The proof of Lemma 5 will refer to the following lemma whose proof we leave in the Appendix. Lemma 6. For any f ∈ C 3 (Rn ; R3 ) and g ∈ C 3 (R3 , R), r = 1, 2, 3 λr (g ◦ f ) ≤ cCr (g) · λr (f ), ∀l = 1, 2, . . . , n, x ∈ Rn , where c is a universal constant. Now we prove Lemma 5. Proof. Note that for any u ∈ Rs    1 log exp β max uj 1≤j≤s β   s X 1 exp (βuj ) ≤ log  β j=1    1 ≤ log s exp β max uj ) 1≤j≤s β 1 = log s + max uj . 1≤j≤s β max uj = 1≤j≤s (30) Tian and Taylor/Asymptotics of selective inference 17 We take h = g ◦ f , and hβ = g ◦ Γ(f, β), |h(z) − hβ (z)| = |g ◦ f (z) − g ◦ Γ(f, β)(z)| ≤ 3C1 (g)kf (z) − Γ(f, β)(z)k∞ 1 ≤ 3C1 (g) · log s, β where the ∞ norm is the element-wise maximum absolute value. Thus we proved (28). Now let f = (f1 , f2 , f3 ) and vj = (v1j , v2j , v3j ), and define  Fi = z 7→ vij (z), vij ∈ C 3 (Rn , R) , i = 1, 2, 3. Theorem 1.3 in Chatterjee (2005) proved that λ3 (Γ(fi , β)) ≤ 13β 2 λ3 (Fi ), ∀β ≥ 1, i = 1, 2, 3. (31)   Note λ3 Γ(f, β) = maxi=1,2,3 λ3 Γ(fi , β) , and that λ3 (F ) = maxi=1,2,3 λ3 (Fi ), thus λ3 (Γ(f, β)) ≤ 13β 2 λ3 (F ). (32) This combined with Lemma 6 proves (29). 5.3. Proof of Theorem 2 To prove Theorem 2, we first prove the following lemma. Recall our reduction to the standard Gaussian N (0, I) in the beginning of Section 5.1. Lemma 7 is a simple adaption of Lindberg’s proof of the CLT. Lemma 7. Assuming the same notation as in Theorem 2, for any smooth function h ∈ C 3 (Rn ), |Eh(y) − Eh(Y)| ≤ 1 λ3 (h)n max(γ, E(|Yl |3 )) l 6 (33) We will prove Lemma 7 now. Proof. The proof proceeds by following the Lindberg proof of the CLT for h. Define y l = (y1 , y2 , . . . , yl , Yl+1 , . . . , Yn ), Y l = (y1 , y2 , . . . , yl−1 , Yl , . . . , Yn ), W l = (y1 , y2 , . . . , yl−1 , 0, Yl+1 , . . . , Yn ). We can break the absolute difference of the two expectations into n parts, |Eh(y) − Eh(Y)| ≤ n X l=1 |Eh(y l ) − Eh(Y l )|. (34) Tian and Taylor/Asymptotics of selective inference 18 Note that 1 h(y l ) − h(W l ) = ∂l h(W l )yl + ∂l2 h(W l )yl2 + Rl , 2 1 h(Y l ) − h(W l ) = ∂l h(W l )Yl + ∂l2 h(W l )Yl2 + T l , 2 where |Rl | ≤ 16 k∂l3 hk∞ |yl |3 , |T l | ≤ 61 k∂l3 hk∞ |Yl |3 . Moreover, because yl ’s and Yl ’s are independent, W l is independent of both yl and Yl . Continuing, we see the first and second order differences cancel out, |Eh(y l ) − Eh(Y l )| 1 2 E∂ h(W l )(yl2 − Yl2 ) + E|Rl − T l | 2 l 1 =|E∂l h(W l )E(yl − Yl )| + E∂l2 h(W l )E(yl2 − Yl2 ) + E|Rl − T l | 2 ≤|E∂l h(W l )(yl − Yl )| + =E|Rl − T l |. Combining the n parts, we have |Eh(y) − Eh(Y)| ≤ n X   1 λ3 (h) E(|Yl |3 ) + E(|yl |3 ) 6 l=1 1 ≤ λ3 (h)n max(γ, E(|Yl |3 )) l 6 Now we turn to the proof of Theorem 2. Proof. Note that since {A(Ei , X)y ≤ b(Ei )}, 1 ≤ i ≤ |S| are disjoint and for any state E {A(E, X)y ≤ b(E)} = {LE (y) ≤ η(E)T y ≤ UE (y)}. Therefore the quantity of interest is W (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) = max W (η(Ei )T y, LEi (y), UEi (y)) 1≤i≤|S| If we knew the above quantity was smooth with respect to the data, we can apply Lemma 7 directly. However, there are two non smooth expressions above: the maximum function over the states and in LEi and UEi . We smooth each and optimize over the smoothing parameter. Tian and Taylor/Asymptotics of selective inference 19 We first smooth over UE and LE . Note that ∀z ∈ Rn b(E)j − (A(E)z)j + αj η T z αj <0 αj LE (z) = max = max{v|v ∈ FL }, b(E)j − (A(E)z)j + αj η T z αj >0 αj UE (z) = min = min{v|v ∈ FU }, where FL , FU are the collections of affine functions     b(E)j − (A(E)z)j + αj η T z αj < 0 FL = vj : z 7→ αj     b(E)j − (A(E)z)j + αj η T z FU = vj : z 7→ αj > 0 . αj Finally, note that max(λ3 (FL ), λ3 (FU )) ≤ M (E, η)3 . (35) We define the smoothing parameter β = 1/δ, for some 0 < δ < 1. Then     X v (z) j , exp L̃E,δ (z) = Γ(LE (z), 1/δ) = δ log  δ vj ∈FL   (36)   X v (z) j , ŨE,δ (z) = −Γ(−UE (z), 1/δ) = −δ log  exp − δ vj ∈FU By Lemma 5, for any selection state E and z ∈ Rn , we see |LE (z) − L̃E,δ (z)| ≤ δ log r(E ∗ ) |UE (z) − ŨE,δ (z)| ≤ δ log r(E ∗ ) (37) Based on (37) and Lemma 5, we have |EW (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) − EW (η(E ∗ )T Y, LE ∗ (Y), UE ∗ (Y))| ≤|EW (η(E ∗ )T y, L̃E ∗ ,δ (y), ŨE ∗ ,δ (y)) − EW (η(E ∗ )T Y, L̃E ∗ ,δ (Y), ŨE ∗ ,δ (Y))| + 12δC1 (W ) log r(E ∗ ) =|E max W (η(Ei )T y, L̃Ei ,δ (y), ŨEi ,δ (y)) − E max W (η(Ei )T Y, L̃Ei ,δ (Y), ŨEi ,δ (Y))| Ei Ei ∗ + 12δC1 (W ) log r(E ) (38) The equality follows from the fact that UE ≥ ŨE,δ and LE ≤ L̃E,δ , for any state E and that W is supported on D = {(u, v, w)|v ≤ u ≤ w}. Therefore, W (η(E ∗ )T y, L̃E ∗ ,δ (y), ŨE ∗ ,δ (y)) = maxEi W (η(Ei )T y, L̃Ei ,δ (y), ŨEi ,δ (y)). Tian and Taylor/Asymptotics of selective inference 20 Next, we smooth the maximum over states. Define WE (z) = W (η T z, L̃E,δ (z), ŨE,δ (z)) E ∈ S, z ∈ Rn . We also define the smoothed maxima for max1≤i≤|S| WEi (z), " #  X WEi (z) . exp Hδ (z) = Γ( max WEi (z), 1/δ) = δ log δ 1≤i≤|S| i Thus by Lemma 5, |EW (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) − EW (η(E ∗ )T Y, LE ∗ (Y), UE ∗ (Y))| ≤12δ log |S| + 12δC1 (W ) log r(E ∗ ) + |EHδ (y) − EHδ (Y)|, (39) For any state E, define feδ,E : z 7→ (η(E)T z, L̃E,δ (z), ŨE,δ (z)). Theorem 1.3 in Chatterjee (2005) states that λ3 (Hδ ) ≤ 13 max λ3 (W ◦ feδ,Ei ). δ2 i (40) Per Lemma 5 and inequality (35) 13c λ3 (W ◦ feδ,E ) ≤ 2 C3 (W )M (E ∗ , η)3 . δ (41) From (33) in Lemma 7 together with (40) and (41), we have |EHδ (y) − EHδ (Y)| ≤ 169c C3 (W )nM (E ∗ , η)3 max(γ, E[Yl3 ]) 6δ 4 (42) All the above combined, we have |EW (η(E ∗ )T y, LE ∗ (y), UE ∗ (y)) − EW (η(E ∗ )T Y, LE ∗ (Y), UE ∗ (Y))| 169c 1 ≤12δ [log |S| + C1 (W ) log r(E ∗ )] + · C3 (W )nM (E ∗ , η)3 max(γ, E[Yl3 ]). 6 δ4 Notice that for the last inequality to hold, we require δ ≤ 1. But the optimal δ 5 = O(nM (E ∗ , η)3 /[log |S| + log r(E ∗ )]), which will go to 0 since the numerator shrinks to 0 while the denominator goes to ∞ as n, p → ∞. Therefore, the inequality holds. Optimizing over δ yields (14). 5.4. Proof of Theorem 3 Now let’s turn to the proof of our main result, Theorem 3, Proof. For the convenience of notation, we denote P (x; σ 2 , m, a, b) by P (x; a, b), omitting σ 2 , m in the following proof. Define D(δ) = {(x, a, b) : a ≤ x ≤ b, b − a ≥ δ, min(|b|, |a|) ≤ 1/δ} . Tian and Taylor/Asymptotics of selective inference We claim that for any small function Peδ such that 1 4 21 > δ > 0, we can find a thrice differentiable Peδ is supported on the set {a ≤ x ≤ b} Peδ − P ∞ ≤ (K1 + 1)δ on the set D(δ), 1 on the set D(δ), δ6 where K1 and K3 are defined in Corollary 3. The proof of the existence of such a function Peδ is left to Lemma 9 in the Appendix. Then for any positive, bounded function Ψ ∈ C 3 (R+ ; R+ ), Ψ(0) = 0, with bounded third derivatives, we have: C3 (Peδ ) ≤ K3 · |EΨ ◦ Peδ (y; LE ∗ , UE ∗ ) − EΨ ◦ P (y; LE ∗ , UE ∗ )|   ′ ≤ kΨ k∞ (K1 + 1)δ + 2 kΨk∞ · P UE ∗ (y) − LE ∗ (y) < δ   +2 kΨk∞ · P min(|UE ∗ (y)|, |LE ∗ (y)|) > 1/δ , |EΨ ◦ Peδ (Y; LE ∗ , UE ∗ ) − EΨ ◦ P (Y; LE ∗ , UE ∗ )|   ≤ kΨ′ k∞ (K1 + 1)δ + 2 kΨk∞ P UE ∗ (Y) − LE ∗ (Y) < δ   +2 kΨk∞ P min(|UE ∗ (Y)|, |LE ∗ (Y)|) > 1/δ , (43) On the other hand, we plug in Ψ ◦ Peδ as the W in Theorem 2, then for any sequence of Peδn ,  15  1 ∗ 4 ∗ 3 e e |EΨ ◦ Pδn (y) − EΨ ◦ Pδn (Y)| ≤ C K3 · 6 (log r(E )|S|) nM (E , η) . (44) δn If we choose a subsequence δn → 0, such that the right hand side of (44) goes to zero, then |EΨ ◦ P (y) − EΨ ◦ P (Y)| ≤|EΨ ◦ Peδn (y) − EΨ ◦ Peδn (Y)| + 2 kΨ′ k∞ (K1 + 1)δn   +2 kΨk∞ P UE ∗ (y) − LE ∗ (y) < δn   +2 kΨk∞ P min(|UE ∗ (y)|, |LE ∗ (y))| > 1/δn   +2 kΨk∞ P UE ∗ (Y) − LE ∗ (Y) < δn   +2 kΨk∞ P min(|UE ∗ (Y)|, |LE ∗ (Y)|) > 1/δn → 0. (45) Tian and Taylor/Asymptotics of selective inference 22 Note that the right hand side of (45) goes to 0 because of Assumption 1. Thus d we have the conclusion that P (y) → P (Y) ∼ Unif(0, 1). 6. Discussion This work proves a generic framework in which asymptotic results hold for many selective inference problems. It is, however, not directly applicable to some other procedures. Further work may include, 1. Fixed λ for generalized linear model. Our work derives a theory for inference after the affine selection procedure. However, inference for a fixed λ for the generalized linear regression is not an affine selection procedure. A plausible solution will be to approximate the loss function of GLM by a quadratic form and bound the difference between the quadratic form and the GLM loss function. However, this is still an open question. 2. Apply the result to nonparametric problems. It is a big step to remove the Gaussian assumptions required by Lee et al. (2013) which restricts our attention to Gaussian families. Without the Gaussian constraints, we can consider some exponential families and potentially some nonparametric problems as well. Acknowledgements We thank Jason Lee for the proof of Lemma 1 provides a polynomial bounds on the number of selection states. We also thank Will Fithian and Rob Tibshirani for discussions on potential applications of our result. We also thank the anonymous reviewer who has read our paper so carefully and provide constructive advice for reorganization. References Belloni, A., Chen, D., Chernozhukov, V. & Hansen, C. (2012), ‘Sparse models and methods for optimal instruments with an application to eminent domain’, Econometrica 80(6), 2369–2429. Berk, R., Brown, L., Buja, A., Zhang, K. & Zhao, L. (2013), ‘Valid post-selection inference’, The Annals of Statistics 41(2), 802–837. URL: http://projecteuclid.org/euclid.aos/1369836961 Chatterjee, S. (2005), ‘A simple invariance theorem’, arXiv preprint math/0508213 . Fithian, W., Sun, D. & Taylor, J. (2014), ‘Optimal inference after model selection’, arXiv:1410.2597 [math, stat] . arXiv: 1410.2597. URL: http://arxiv.org/abs/1410.2597 Javanmard, A. & Montanari, A. (2015), ‘De-biasing the lasso: Optimal sample size for gaussian designs’, arXiv preprint arXiv:1508.02757 . Lee, J. D., Sun, D. L., Sun, Y. & Taylor, J. E. (2013), ‘Exact inference after model selection via the lasso’, arXiv preprint arXiv:1311.6238 . Tian and Taylor/Asymptotics of selective inference 23 Lockhart, R., Taylor, J. E., Tibshirani, R. J. & Tibshirani, R. (2013), ‘A significance test for the lasso’, arXiv: 1301.7161 . Meinshausen, N., Meier, L. & Bühlmann, P. (2012), ‘P-values for highdimensional regression’, Journal of the American Statistical Association . Negahban, S. N., Ravikumar, P., Wainwright, M. J. & Yu, B. (2012), ‘A unified framework for high-dimensional analysis of MM-Estimators with decomposable regularizers’, Statistical Science 27(4), 538–557. URL: http://projecteuclid.org/euclid.ss/1356098555 Taylor, J., Lockhart, R., Tibshirani, R. J. & Tibshirani, R. (2014), ‘Postselection adaptive inference for least angle regression and the lasso’, arXiv:1401.3889 [stat] . URL: http://arxiv.org/abs/1401.3889 Taylor, J., Loftus, J., Tibshirani, R. & Tibshirani, R. (2013), ‘Tests in adaptive regression via the kac-rice formula’, arXiv preprint arXiv:1308.3020 . Tibshirani, R. (1996), ‘Regression shrinkage and selection via the lasso’, Journal of the Royal Statistical Society. Series B (Methodological) pp. 267–288. Tibshirani, R. J., Rinaldo, A., Tibshirani, R. & Wasserman, L. (2015), ‘Uniform asymptotic inference and the bootstrap after model selection’, arXiv preprint arXiv:1506.06266 . Zhang, C.-H. & Zhang, S. S. (2014), ‘Confidence intervals for low dimensional parameters in high dimensional linear models’, Journal of the Royal Statistical Society: Series B (Statistical Methodology) 76(1), 217–242. Appendix A: Proof of Lemma 6 Proof. Using the chain rules, we have the second derivatives with respect to xl , l = 1, 2, . . . , n as   X 3 3 X ∂g ∂ 2 fi ∂2g ∂fi ∂fj ∂2g ◦ f + = ∂x2l ∂fi ∂fj ∂xl ∂xl ∂fi ∂x2l i=1 i,j=1 (46) and the third derivatives with respect to xl , l = 1, 2, . . . , n as    2  3 3 X X ∂ 2g ∂fi ∂fj ∂fk ∂ fi ∂fj ∂3g ∂3g ◦ f +3 = ∂x3l ∂fi ∂fj ∂fk ∂xl ∂xl ∂xl ∂fi ∂fj ∂x2l ∂xl i,j=1 i,j,k=1 3 X ∂g ∂ 3 fi + . ∂fi ∂x3l i=1 (47) For r = 1, the conclusion is obviously true with the constant c = 3. For r = 2, the terms involving the partial derivatives of f are ∂ 2 fi ∂fi ∂fj · or , ∀i, j = 1, 2, . . . , n. ∂xl ∂xl ∂x2l Tian and Taylor/Asymptotics of selective inference 24 Note the first type of terms are bounded by λ2 (f )1/2 · λ2 (f )1/2 and the second type of terms are bounded by λ2 (f ). If we take c = 12, |∂l2 g ◦ f | ≤ cC2 (g)λ2 (f ). On the other hand, #2 " 3 X ∂g ∂fi 1 1 2 (48) ≤ [3C2 (g) 2 λ2 (f ) 2 ]2 ≤ 9C2 (g)λ2 (f ). |∂l g ◦ f | ≤ ∂f ∂x i l i=1 For r = 3, an equation similar to (48) will give us |∂l g ◦ f |3 ≤ 27C3 (g)λ3 (f ). Meanwhile,  3   X  2  2 3  3  2 X ∂g ∂ g ∂f ∂f ∂ f j i i  |∂l2 g ◦ f | =  + 2 ∂f ∂f ∂x ∂x ∂f ∂x i j l l i l i=1 i,j=1 3 2 h i 23 2 1 1 1 2 ≤ 9C3 (g) 3 (λ3 (f ) 3 · λ3 (f ) 3 ) + 3C3 (g) 3 (λ3 (f ) 3 ) 3 = 12 2 C3 (g)λ3 (f ). For the third derivatives ∂l3 g ◦ f , the terms that involve f are, ∂fi ∂fj ∂fk ∂ 2 fi ∂fj ∂ 3 fi · · or or · 2 ∂xl ∂xl ∂xl ∂xl ∂xl ∂x3l which are all bounded by λ3 (f ) and therefore λ3 (g ◦ f ) ≤ 57C3 (g)λ3 (f ). In summary, we can take c = 57. Appendix B: Existence of smooth approximation Pe We prove the existence of such functions as claimed in the proof of Theorem 3. Define P (x, a, b) = P (x; σ 2 , m, a, b). We first prove the following lemma, Lemma 8. Define   D(δ) = (x, a, b) : a ≤ x ≤ b, b − a ≥ min δ, 1 min(|b|, |a|)  . Then, on D(δ) for any δ < 1/4 we have 2 max 2 2 e−x /2 e−a /2 e−b /2 , , Φ(b) − Φ(a) Φ(b) − Φ(a) Φ(b) − Φ(a) !  ≤ C max δ −1 , min(|a|, |b|) for some universal constant C. Proof. Note that for any δ > 0 on D(δ) ∩ {(x, a, b) : sign(a) = sign(b)} we have e−x 2 /2 ≤ max(e−a 2 /2 2 , e−b /2 ) Tian and Taylor/Asymptotics of selective inference 25 so it suffices to prove that 2 2 max e−b /2 e−a /2 , Φ(b) − Φ(a) Φ(b) − Φ(a) ! ≤ Cδ −1 on D(δ) for δ < 1/4 as well as 2 e−x /2 ≤ Cδ −1 . (x,a,b)∈D(δ)∩{(x,a,b):sign(a)6=sign(b)} Φ(b) − Φ(a) sup Let’s consider this latter case first. For any δ > 0 on the set D(δ)∩{(x, a, b) : sign(a) 6= sign(b)} we have 2 e−x /2 1 ≤ Φ(b) − Φ(a) Φ(b) − Φ(a) 1 inf (a,b):sign(a)6=sign(b),b−a≥δ Φ(b) − Φ(a) √ 2π ≤ −δ2 /2 . δe ≤ Continuing, we further split the first case into two cases, i.e. D(δ)∩{(x, a, b) : sign(a) 6= sign(b)} and D(δ) ∩ {(x, a, b) : sign(a) = sign(b)}. For the first part, analogous to the analysis above, we have ! 2 2 1 e−a /2 e−b /2 ≤ max , Φ(b) − Φ(a) Φ(b) − Φ(a) Φ(b) − Φ(a) 1 inf (a,b):sign(a)6=sign(b),b−a≥δ Φ(b) − Φ(a) √ 2π ≤ −δ2 /2 . δe ≤ Now, we reduce to the case D(δ) ∩ {(x, a, b) : sign(a) = sign(b)} and without loss of generality, we consider the case where 0 < a < b. Note that for any δ > 0 on D(δ) ∩ {(x, a, b) : sign(a) = sign(b)} ∩ {0 < a < b} ! 2 2 2 e−a /2 e−a /2 e−b /2 ≤ sup max , , Φ(b) − Φ(a) Φ(b) − Φ(a) a:a<1/δ Φ(a + δ) − Φ(a) ! 2 2 2 e−a /2 e−b /2 e−a /2 ≤ sup , , max Φ(b) − Φ(a) Φ(b) − Φ(a) a:a>1/δ Φ(a + 1/a) − Φ(a) For δ < 1/4 and 0 < a < 1/δ, (2π)1/2 (Φ(a + δ) − Φ(a)) ≥ δe−(a+δ) = δe−a 2 2 /2 /2 −aδ−δ 2 /2 e Tian and Taylor/Asymptotics of selective inference Or, 26 2 2 e−a /2 ≤ δ −1 (2π)1/2 eaδ+δ /2 Φ(a + δ) − Φ(a) ≤ C1 δ −1 , where C1 = (2π)1/2 e1+1/32 . Similarly, for 0 < 1/δ < a, 1 −(a+1/a)2 /2 e a 2 2 1 = e−a /2 e−1−1/(2a ) a (2π)1/2 (Φ(a + 1/a) − Φ(a)) ≥ Or, 2 2 e−a /2 ≤ a(2π)1/2 e1+1/(2a ) Φ(a + 1/a) − Φ(a) ≤ a(2π)1/2 e1+1/(2a ≤ a(2π)1/2 e 1/2 1+1/32 where C1 = (2π) {0 < a < b}, e ) 1+ 12 δ 2 ≤ C1 a . Therefore, we have on D(δ)∩{(x, a, b) : sign(a) = sign(b)}∩ 2 max 2 2 e−a /2 e−b /2 , Φ(b) − Φ(a) Φ(b) − Φ(a) ! ≤ max   1 , min(|a|, |b|) . δ Remark 2. If we take D(δ) = {(x, a, b) : a ≤ x ≤ b, b − a ≥ δ, min(|a|, |b|) ≤ 1/δ} , then 2 max 2 2 e−x /2 e−a /2 e−b /2 , , Φ(b) − Φ(a) Φ(b) − Φ(a) Φ(b) − Φ(a) ! ≤ Cδ −1 , where C is a universal constant. Corollary 3. For δ < 1/4 and any multi-index α = (α1 , α2 , α3 ) we have sup (x,a,b)∈D(δ) C|α| (P ) ≤ K|α| δ −|α| . for constants Kl , l ≥ 1. Proof. We prove for α = (0, 0, 1), and similar proofs can be extend to other multi-index α as well. Since P (x, a, b) = 2 min(F (x; a, b), 1 − F (x; a, b)), we only need to prove for F (x; a, b). 1 Φ(x) − Φ(a) ∂F · √ · exp(−b2 /2). =− 2 ∂b [Φ(b) − Φ(a)] 2π Tian and Taylor/Asymptotics of selective inference 27 Therefore, Φ(x) − Φ(a) exp(−b2 /2) 1 1 ∂F ≤C . ≤√ · · ∂b δ 2π Φ(b) − Φ(a) Φ(b) − Φ(a) Finally, we put the lemma and the corollary together and prove the following lemma. Lemma 9. There exists a thrice differentible approximation Pe to P that satisfies, • Pe(x, a, b) is supported on {(x, a, b) : a ≤ x ≤ b}, 1 • C3 (Pe ) ≤ K3 6 on the set D(δ), δ • Pe ≤ (K1 + 1)δ on the set D(δ). ∞ Proof. Let Pδ be the smoothed version of P for the minimum function in P = 2 min(F, 1 − F ), and kPδ − P k∞ ≤ δ. Let Peδ = Pδ Iδ2 (x, a, b), where Iδ2 (x, a, b) is the smoothed version of the indicator function on {a ≤ x ≤ b}. Iδ2 (x, a, b) also satifies the condition that   x < a, or x > b, 0 2 Iδ (x, a, b) = 1 a + δ2 ≤ x ≤ b − δ2,   [0, 1] else. 1 , for some universal constant C. Thus it is δ6 not hard to verify that C3 (Peδ ) ≤ K3 δ16 . Iδ2 (x, a, b) also satisfies C3 (Iδ2 ) ≤ Peδ − P ∞ ≤ kP − P Iδ2 k∞ + kPδ Iδ2 − P Iδ2 k∞ ≤ sup a≤x≤a+δ 2 , or b−δ 2 ≤x≤b kP k∞ + δ ≤ C1 (P ) · δ 2 + δ ≤ (K1 + 1)δ. Appendix C: LASSO related proofs C.1. Proof of Lemma 1 We first introduce the following Lemma in Negahban et al. (2012). Tian and Taylor/Asymptotics of selective inference 28 Lemma 10. If we assume the same assumptions and notations as in Lemma 1, then with probability at least 1 − c1 exp(−c1 λ2 ), the following two inequalities hold: λ ≥ 2kXǫk∞, r 8 k log p 0 , kβ̂ − β k2 ≤ m n (49) (50) where k is the number of nonzero entries in β 0 and β̂ is the solution to (18) Proof of Lemma 1, Proof. According to the KKT conditions, ( xTj (y − X β̂) = λsign(β̂), |xTj (y − X β̂)| ≤ λ if j ∈ A, if j ∈ 6 A. According to Lemma 10, we assume both (49) and (50) hold. This happens with probability 1 − c1 exp(−c1 λ2 ). For any j, xTj (y − X β̂) = xTj (Xβ 0 − X β̂ + ǫ) = xTj X(β 0 − β̂) + xTj ǫ λ ≥ xTj X(β 0 − β̂) − . 2 Thus for j ∈ A, λ , 2 3λ . |xTj X(β̂ − β 0 )| ≤ 2 |xTj X(β̂ − β 0 )| ≥ kX T X(β̂ − β 0 )k22 = ≥ ≥ X j∈A X j∈A 2 X  2 xj X(β̂ − β 0 ) + xj X(β̂ − β 0 ) 2 xj X(β̂ − β 0 ) j6∈A λ2 |supp(β̂)|. 4 Also, kX T X(β̂ − β 0 )k22 ≤ kX T Xk22 kβ̂ − β 0 k22 2 1 2 4kλ kXk · 2 n2 m2 2 4kλ ≤ φ2max 2 . m ≤ Tian and Taylor/Asymptotics of selective inference 29 Combining the two inequalities, we have that |supp(β̂)| ≤ 16kφ2max m2 holds with probability 1 − c1 exp(−c1 λ2 ). C.2. Proof of Lemma 2 † T T Proof. Note XE = (XE XE )−1 XE . According to the assumption assumed in Lemma 2, φmin > ν. Thus for any possible active set E,   T max | (XE XE )−1 ij | ≤ 1/ν 2 . i,j The above result can be easily obtained using Singular Value Decomposition on XE . Therefore, we have † max |XE |ij ≤ |E|/ν 2 max |Xij | i,j i,j C.3. Proof of Lemma 3 Proof. Without loss of generality, we assume β 0 = 0. We first see that for any fixed E, and ηn chosen as in (11), the upper and lower bound simplies to UE = ∞, LE = max k∈E,k6=j λ · τ [1 + (|E| − 1)ρ] − β̄k,E + β̄j,E , ρ where β̄E ∈ R|E| is the least square estimator with the E variables, T T β̄E = (XE XE )−1 XE y. Note that the first two equations of (15) are automatically satisfied in this case. Without loss of generality, we assume LE ∗ > 0, and noticing LE ∗ ≤ maxE LE , we have P(LE ∗ (yn ) > 1/δn ) ≤ P(max LE (yn ) > 1/δn ). E Since maxE LE (yn ) is the maximum of at most pcK sub-Gaussian variables, thus κ the RHS is bounded by O(e−λn ) = O(p−κ ), which goes to 0. C.4. Proof of Lemma 4 Proof. Per Lemma 1, we have |En | ≤ cK, |Sn | ≤ pcK , Tian and Taylor/Asymptotics of selective inference 30 with probability at least 1 − c1 exp(−c1 λ2n ). We modify the selection procedure En∗ on the small probability event. More specifically, we define Een∗ as ( En∗ (yn , Xn ), if |En | ≤ cK, ∗ Een (yn , Xn ) = no selection, else. It is easy to see that Een∗ is also an affine selection procedure. which differs from En∗ only on the event {|En | > cK}. Thus the pivots formed with En∗ and Een∗ converge in probability,  P P (ηnT yn ; ηnT Σn ηn , ηnT µn , LEn∗ , UEn∗ )  c1 6= P (ηnT yn ; ηnT Σn ηn , ηnT µn , LEe∗ , UEe∗ ) ≤ c1 → 0. n n p Therefore, we only need to consider the asymptotic distribution of the pivot with Een∗ as the selection procedure. Note that for Een∗ , M (Een∗ , ηn ) ≤ cK · max |Xij |, ν2 r(Een∗ ) ≤ p, |Sn | ≤ pcK . Now with our choice of δn ’s, it is easy to rewrite the condition in Theorem 3 as n−1/2 (log pn )7+3κ → 0.
10math.ST
DeepMovie: Using Optical Flow and Deep Neural Networks to Stylize Movies Alexander G. Anderson1 , Cory P. Berg1 , Daniel P. Mossing1 , and Bruno A. Olshausen1 arXiv:1605.08153v1 [cs.CV] 26 May 2016 1 Redwood Center for Theoretical Neuroscience, University of California, Berkeley May 27, 2016 Abstract A recent paper by Gatys et al. [1] describes a method for rendering an image in the style of another image. First, they use convolutional neural network features to build a statistical model for the style of an image. Then they create a new image with the content of one image but the style statistics of another image. Here, we extend this method to render a movie in a given artistic style. The naive solution that independently renders each frame produces poor results because the features of the style move substantially from one frame to the next. The other naive method that initializes the optimization for the next frame using the rendered version of the previous frame also produces poor results because the features of the texture stay fixed relative to the frame of the movie instead of moving with objects in the scene. The main contribution of this paper is to use optical flow to initialize the style transfer optimization so that the texture features move with the objects in the video. Finally, we suggest a method to incorporate optical flow explicitly into the cost function. 1 Introduction and Related Research Automatic image stylization is a popular feature in image editors like Adobe Photoshop and social networking services like Instagram. However, many of these styles are limited in their complexity. Recent work has shown that we can use statistical correlations of neural network features to describe complex styles. Furthermore, these models can be then used to create new images with the same statistics. But a question remains: how do we apply these complex styles to video? This task is additionally challenging because the textures need to move smoothly with the objects in the scene to obtain an pleasing video. In this section, we review past work that motivated our approach of using optical flow in combination with neural network features to stylize movies. In a seminal paper on texture generation, Heeger and Bergen built a statistical model of textures using an image pyramid and then developed a method to render new images with those same statistics [2]. While this approach produces good results, the method is limited due to the use of hand-designed features. For alternative methods of texture synthesis, we direct the reader to a pair of papers on texturizing images and a more recent review [3, 4, 5]. Recent research on artificial neural networks has shown that the features produced by task-driven learning are better than hand-designed features. In particular, convolutional neural networks trained on image classification (e.g. AlexNet trained on IMAGENET [6], [7]) extract image features that are useful for many tasks such as fine grained image recognition, scene recognition, and image retrieval [8]. In order to understand the information captured by neural network features, a number of papers have used backpropagation to find an image that has a given set of neural network features [9, 10]. These advances in building useful image features and learning how to manipulate them has led to an explosion of research into generating artistic images using deep neural networks. Two recent notable examples 1 are Google’s post on inceptionism [11] and the pair of papers from Gatys et al. [12, 1]. Since then, there have been a number of papers that have sought to explore various aspects of the idea and to speed up the rendering (e.g. using an adversarial network approach) [13, 14, 15, 16, 17, 18, 19]. In order to apply these methods to movies, the textures that these methods overlay onto an image must move with the objects in the scene. The problem of detecting the motion of objects in a scene is well-studied in the field of computer vision and is often referred to as computing the optical flow. Thus we can use the optical flow fields in order to move the textures with the objects as they move in the movie. This paper is organized as follows. First, we review previous research, including the formulation of the Gatys et al. style transfer paper. Next, we extend this method using optical flow to encourage temporal continuity. Then we present our results on rendering a naturalistic movie and assess the success of our method as well as techniques for improving it. Finally, we end with some discussion and conclusions. 2 Theoretical Formulation First, we review the approach taken by Gatys et al. [1]. While past work used hand-designed features to build statistical models of textures, Gatys et al. had the idea to use neural network features instead. To be more precise, suppose that we have a convolutional neural network such as VGG-19 [20]. Denote the input image to the network as x (with the individual pixels of the image denoted as xu,v ) and the activations of l the lth convolutional layer for feature map j and pixel i as Fi,j (x) (suppose that there are J l feature maps l and I pixels in that layer). Then define the Gram matrix Glj,j 0 (x) = 1 X l l F (x)Fi,j 0 (x). I l i i,j (1) We can think of this matrix as computing the second order statistics between different neural network features because we are averaging over the spatial dimensions of the feature maps of a convolutional network. Part of the intuition of this approach is that complex, higher-order, statistics in the image space can be captured using second order correlations in the neural network feature space. The style transfer objective function takes in two images xs and xc , the style and content images, respectively and renders an image, xr : xr = argminx E(x) c (2) s E(x) = Lcontent (x, x ) + Lstyle (x, x ) + Ltv (x) X 1 X l l Lcontent (x, xc ) = λlc l l (F (x) − Fi,j (xc ))2 I J i,j i,j (3) (4) l 1 X l (G 0 (x) − Glj,j 0 (xs ))2 (J l )2 0 j,j j,j l X Ltv (x) = λtv (xu+1,v − xu,v )2 + (xu,v+1 − xu,v )2 Lstyle (x, xs ) = X λls (5) (6) u,v where λlc,s,tv are weights that determine the relative strength of the style, content, and total variation costs and xu,v denotes a pixel of the image. Now we describe several methods for extending this work to movies. Suppose that we have a movie, whose frames are xt for t = 0, 1, . . .. Since the Gram matrix cost is spatially invariant, there are many ways to overlay a texture onto the scene. In the language of optimization, there are many local minima and the initialization has a strong impact on the result of a gradient descent minimization procedure. We exploit this property to obtain temporal continuity in our movie. Let y = ST (x0 , xc , xs ) denote the output of a gradient descent based minimization of the style transfer objective function that uses x0 as the initialization point for the optimization, xc as the content image, and xs as the style image. Alternative methods for applying art style to movies that we implemented (the first two methods are baselines and the third method is the optical flow based method that works better than the baseline methods): 2 • Independent Initialization: yt = ST (xt , xt , xs ). • Rendered Previous Frame Initialization: yt = ST (yt−1 , xt , xs ). • Optical Flow Initialization: yt = ST (yt0 , xt , xs ), yt0 = F LOW (yt−1 , Ft−1,t ) where Ft−1,t denotes the optical flow field taking xt−1 to xt and F LOW applies an optical flow field to an image. This approach is summarized in Fig. 1. Additional methods for applying art style to movies that may improve results, but that we have not implemented yet: • Optical Flow Initialization and Loss: In addition to doing the above, we can add a term l(x, yt0 ) that penalizes the distance between the image that we want to render and the optical flowed version of the previous frame of the movie. For l, we can either use a robust loss or a squared error loss following the optical flow literature (eg. [21]). • Optical Flow with Back-Tracking: Instead of sequentially optimizing each frame, one can imagine creating an objective function that jointly optimizes over all frames. For instance, we can add the following term: X Lof,t (xt ) = l(xt , F LOW (yt0 , Ft0 ,t )) (7) t0 ∈N (t) where N (t) = {t − 1, t + 1}. The full objective function can be descended by pre-computing the optical flow fields and then descending with respect to each image sequentially and then doing additional passes to clean up the images. 3 Results In order to show the generality of our technique, we test our approach on a short clip from Star Wars: Episode V - The Empire Strikes Back. This clip has a number of properties that are interesting and challenging for our algorithm: 1. There are parts of the video where there is both large motion of the camera and large motion of the objects in the scene. 2. Surfaces are revealed and hidden as time flows forward. 3. There are special effects such as rapid flashes of light that create large variations in the overall brightness of the scene, temporarily occlude objects, and break the brightness constancy assumption. A video summary of our results can be found at https://youtu.be/nOrXeFBkP04. In Fig. 2, we show that our algorithm handles large camera and image motions well in comparison to two baselines: independent rendering of each frame, and initialization using the previous rendered frame. In the case of independent initialization, strokes in adjacent frames show little or no apparent relationship. The previous frame initialization method generates a video where characters appear to melt into the background as the camera pans. In the case of the flowed previous frame initialization, the strokes appear to move smoothly with the characters. In Fig. 3, we show that occluded surfaces are rendered properly. Also we see that special effects (here, the screen lighting up due to a laser blast) are lost to some extent, but the results still look reasonable. 4 Discussion and Conclusions Compared to many machine learning tasks that have clear benchmarks, computer generated art is a subjective task. On one hand, a quantitative (and arguably objective) measure of a stylized video is the sum of the squares of the difference between the flowed version of one frame and the next frame. Relatedly, we hypothesize that we could obtain more temporally consistent results by adding an explicit term in the cost function to regularize the style transfer. On the other hand, some variability from frame to frame contributes to the artistic effect. For instance, a video directed by Boris Seewald makes good use of a combination of temporal continuity in content but discontinuity in style http://www.thisiscolossal.com/2016/03/ 3 Style Transfer Algorithm In: Initialization, Content Image, Style Image Out: Styled Image Optical Flow Algorithm In: Frame k, Frame k+1 Out: Flow Field Image Flow Algorithm In: Flow Field, Image Out: Flowed Image Style Transfer Algorithm In: Initialization, Content Image, Style Image Out: Styled Image Time Figure 1: Overview of Our Approach: We begin by applying the style transfer algorithm to the first frame of the movie using the content image as the initialization. Next, we calculate the optical flow field that takes the first frame of the movie to the second frame. We apply this flow-field to the rendered version of the first frame and use that as the initialization for the style transfer optimization for the next frame. Note, for instance, that a blue pixel in the flow field image means that the underlying object in the video at that pixel moved to the left from frame one to frame two. Intuitively, in order to apply the flow field to the styled image, you move the parts of the image that have a blue pixel in the flow field to the left. 4 Figure 2: Initialization using optical flow improves results relative to baseline methods during camera panning: Each row shows several adjacent frames of the movie rendered according to a different method. Row One: Frames from the original movie at 10 Hz. Row Two: Independent Initialization - strokes in adjacent frames show little or no apparent relationship. Row Three: Previous Rendered Frame Initialization - brush strokes stay fixed relative to the frame of the movie and the characters appearing to melt into the background as the camera pans. Row Four: Flowed Previous Rendered Frame Initialization - strokes appear to move smoothly with the characters. 5 Figure 3: Optical Flow Method During Occlusions and Special Effects: Top: The content cost appropriately stylizes a surface that is gradually revealed due to a moving occluder. Bottom: The resulting rendered video does not capture the special effect and gets warped as a result. rotoscoped-music-video-boris-seewald-disco/. Continued work in this field will benefit from input from artists as to what are desirable properties of stylized movies. Along the lines of developing artistically pleasing results, one of the major limitations of this approach is that all of the different style attributes are wrapped up in a model of style that has many parameters, making it difficult to manipulate. For instance, simple properties such as the overall light-level of an image are entangled in the thousands of parameters in the gram-matrix texture model. We experimented with one approach of addressing this issue. In the supplementary figures, we use histogram matching to rescale the style image and then compute a new gram matrix (see Fig. 5). From a practical (eg. for artists) and theoretical perspective, it would be beneficial to figure out how to disentangle simple image properties from the more complex properties (such as brush strokes) that the neural style features capture. Another limitation is that in order to make these algorithms commercially useful, the rendering algorithm must be optimized, possibly adapting the approaches suggested in [15] or [13]. The current approach requires a relatively costly gradient descent procedure to render each frame. In conclusion, our work demonstrates that we can improve the temporal coherence of an artistically styled movie by making use of optical flow. While statistics based methods of rendering textures are promising, much work needs to be done in order to tease apart simple image properties to make these rendering algorithms useful for artists. 5 Statement on Contribution This project benefited from the collaboration of a number of people. AGA did the literature review, came up with the idea to stylize movies, and implemented the majority of the code (based on rewriting https: //github.com/anishathalye/neural-style). BAO originally suggested using optical flow to make the rendered image more temporally coherent. CPB helped in the debugging of the main algorithm, and ran the controls. DPM used histogram matching to better handle the special effects and contributed to the write-up. We thank Brian Cheung and Dylan Paiton from the Redwood Center for Theoretical Neuroscience 6 and Richard Zhang and Alyosha Efros from the Berkeley Computer Vision Group for useful feedback. References [1] Leon A Gatys, Alexander S Ecker, and Matthias Bethge. A neural algorithm of artistic style. arXiv preprint arXiv:1508.06576, 2015. [2] David J Heeger and James R Bergen. Pyramid-based texture analysis/synthesis. In Proceedings of the 22nd annual conference on Computer graphics and interactive techniques, pages 229–238. ACM, 1995. [3] Alexei A Efros and Thomas K Leung. Texture synthesis by non-parametric sampling. In Computer Vision, 1999. The Proceedings of the Seventh IEEE International Conference on, volume 2, pages 1033– 1038. IEEE, 1999. [4] Alexei A Efros and William T Freeman. Image quilting for texture synthesis and transfer. In Proceedings of the 28th annual conference on Computer graphics and interactive techniques, pages 341–346. ACM, 2001. [5] Li-Yi Wei, Sylvain Lefebvre, Vivek Kwatra, and Greg Turk. State of the art in example-based texture synthesis. In Eurographics 2009, State of the Art Report, EG-STAR, pages 93–117. Eurographics Association, 2009. [6] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. [7] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, et al. Imagenet large scale visual recognition challenge. International Journal of Computer Vision, 115(3):211–252, 2015. [8] Ali Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. Cnn features off-the-shelf: an astounding baseline for recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 806–813, 2014. [9] Aravindh Mahendran and Andrea Vedaldi. Understanding deep image representations by inverting them. In Computer Vision and Pattern Recognition (CVPR), 2015 IEEE Conference on, pages 5188– 5196. IEEE, 2015. [10] M Cimpoi, S Maji, and A Vedaldi. Deep filter banks for texture recognition and segmentation. Computer Vision and Pattern Recognition (CVPR), 2015 IEEE Conference on, pages 3828–3836, 2015. [11] Alexander Mordvintsev, Michael Tyka, and Christopher Olah. Inceptionism: Going deeper into neural networks, google research blog. Retreived June, 17, 2015. [12] Leon A. Gatys, Alexander S. Ecker, and Matthias Bethge. Texture Synthesis Using Convolutional Neural Networks. Nips, pages 1–10, 2015. [13] Justin Johnson, Alexandre Alahi, and Li Fei-Fei. Perceptual Losses for Real-Time Style Transfer and Super-Resolution. 2016. [14] Dmitry Ulyanov, Vadim Lebedev, Andrea Vedaldi, and Victor Lempitsky. Texture networks: Feedforward synthesis of textures and stylized images. arXiv preprint arXiv:1603.03417, 2016. [15] Chuan Li and Michael Wand. Combining markov random fields and convolutional neural networks for image synthesis. arXiv preprint arXiv:1601.04589, 2016. [16] Tsung-Yu Lin and Subhransu Maji. Visualizing and understanding deep texture representations. arXiv preprint arXiv:1511.05197, 2015. 7 [17] Yang Lu, Song-Chun Zhu, and Ying Nian Wu. Learning frame models using cnn filters for knowledge visualization. arXiv preprint arXiv:1509.08379, 2015. [18] Rujie Yin. Content aware neural style transfer. arXiv preprint arXiv:1601.04568, 2016. [19] Emily L Denton, Soumith Chintala, Rob Fergus, et al. Deep generative image models using a laplacian pyramid of adversarial networks. In Advances in Neural Information Processing Systems, pages 1486– 1494, 2015. [20] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. CoRR, abs/1409.1556, 2014. [21] Deqing Sun, Stefan Roth, and Michael J Black. Secrets of optical flow estimation and their principles. In Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, pages 2432–2439. IEEE, 2010. [22] Martı́n Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. Software available from tensorflow.org. [23] Diederik Kingma and Jimmy Ba. arXiv:1412.6980, 2014. Adam: A method for stochastic optimization. arXiv preprint [24] Dong C Liu and Jorge Nocedal. On the limited memory bfgs method for large scale optimization. Mathematical programming, 45(1-3):503–528, 1989. [25] Thomas Brox and Jitendra Malik. Large displacement optical flow: descriptor matching in variational motion estimation. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 33(3):500–513, 2011. 6 Supplementary Methods 1. The core style transfer algorithm was implemented using TensorFlow [22]. We used a pretrained version of VGG-19 [20] available from http://www.vlfeat.org/matconvnet/models/imagenet-vgg-verydeep-19. mat. 2. Experimentally we found that quasi-second order methods perform better than vanilla gradient descent. In particular, we use Adam with about 1000 iterations to optimize the objective function for each frame of the movie [23]. Others papers use L-BFGS [24] (eg. [1]). 3. For all experiments, we use conv4 2 for the content layer and conv1 1, conv2 1, conv3 1, conv4 1, conv5 1 for the style layers along the lines of [1]. However, we use different weight values. Roughly speaking, we set the weights so that each term in the cost function contributed at least five percent to the total cost. During optimization, we found that the content cost would still dominate. 4. In order to generate optical flow fields, we use a pre-compiled binary from T. Brox and J. Malik [25]. We note that these dense flow fields are much better than those produced by the built-in optical flow methods in OpenCV. Our results could be improved even more using a better optical flow algorithm. 5. We use the content image to initialize the optimization in the case of the first frame of the video or in the presence of manually detected scene cuts. 6. The movies are rendered at 10 frames per second. 8 7 7.1 Supplementary Figures Histogram matching improves color coherence across scenes In contrast to a static content image, a movie scene might have colors and textures which change in time. In extending style transfer from images to movies, one might wish to stylistically match the reference image with each frame, or with the movie scene as a whole. For example if the scene is brightly illuminated in one frame and dark in another, one might wish to match the two frames to light and dark colors in the image’s palette, respectively, rather than capturing the entire color palette in both. Further, the same object or character might appear as relatively dark or light compared with the background. However, for ease of recognition, one might wish to consistently render them with similar colors. Matching histograms between movie and image could allow one to capture a large part of the perceptually important color statistics. As an example, we first transfer the RGB histogram of the style image to that of the entire content video. Thus, we allow the colors to vary from frame to frame, while still matching the movie as a whole to the full range of colors. Subsequently, we transfer the histogram of each histogramtransferred video frame back to the original style image in order to allow the colors of the target style to vary in time. This procedure is outlined in Fig. 5a. This allows us, for example, to preserve the brightness of special effect blaster fire as in Fig. 5b, and the rendering of characters’ skin and hair color as in Fig. 5c. The improvement in color coherence comes at the price of a less diverse array of colors and reduction in image quality due to two successive histogram transfers. For related reasons, it also seems to disrupt continuity between frames due to artifactual changes in brightness. This could be improved by using source images with greater color depth. Additionally, similar effects could possibly be obtained without explicit histogram matching using a joint optimization approach as suggested in section 2. 9 Figure 4: Movie Frames and Optical Flow: Top: frames of the movie. Middle: Optical flow field of the movie. Bottom: Applying optical flow to the frames of the movie. 10 (a) (b) (c) Figure 5: a. In order to allow individual rendered frames to vary in their color palette as they do in the original, we apply histogram matching. First, we transfer the histogram of “Starry Night” to the entire movie viewed as an image (i.e., the histogram of the entire movie is matched to that of the painting). Then, we transfer the histogram of each frame of the transformed movie, to a frame of the new “style movie.” Thus, each frame of the style movie captures a subset of the painting’s original histogram. b. This allows us to capture brightness changes, as in special effects. From left to right, the original movie frame; the frame rendered using the optical flow approach; and the frame rendered using the optical flow approach with histogram matching. c. Similarly, we can preserve the color of objects and characters reappearing over the course of the movie. From left to right, two original frames depicting the same character; the frames rendered using the optical flow approach; and the frames rendered using optical flow and histogram matching. 11
9cs.NE
Asymptotic properties of a componentwise ARH(1) plug-in predictor Javier Álvarez-Liébana1 , Denis Bosq2 and M. Dolores Ruiz-Medina1 arXiv:1706.06498v1 [math.ST] 20 Jun 2017 2nd April 2018 1 Department of Statistics and O. R., University of Granada, Spain. LSTA, Université Pierre et Marie Curie-Paris 6, Paris, France. E-mail: [email protected] 2 Summary This paper presents new results on prediction of linear processes in function spaces. The autoregressive Hilbertian process framework of order one (ARH(1) process framework) is adopted. A componentwise estimator of the autocorrelation operator is formulated, from the moment-based estimation of its diagonal coefficients, with respect to the orthogonal eigenvectors of the auto-covariance operator, which are assumed to be known. Mean-square convergence to the theoretical autocorrelation operator, in the space of Hilbert-Schmidt operators, is proved. Consistency then follows in that space. For the associated ARH(1) plug-in predictor, mean absolute convergence to the corresponding conditional expectation, in the considered Hilbert space, is obtained. Hence, consistency in that space also holds. A simulation study is undertaken to illustrate the finite-large sample behavior of the formulated componentwise estimator and predictor. The performance of the presented approach is compared with alternative approaches in the previous and current ARH(1) framework literature, including the case of unknown eigenvectors. Key words: ARH(1) processes; consistency; functional prediction; mean absolute and quadratic convergence 1 Introduction. In the last few decades, an extensive literature on statistical inference from functional random variables has emerged, motivated, in part, by the statistical analysis of high-dimensional data, as well as data with a continuous (infinite-dimensional) nature (see [11, 12, 19, 25, 44, 45, 52, 53], among others). A selected set of new developments and branches of the functional statistical theory can be found in [10]. Particularly, in the current literature, we refer to the recent books [34] and [35], surveys [15], and Special Issue [29], and the references therein. These references include a nice summary on the statistics theory for functional data, contemplating covariance operator theory and eigenfunction expansion, perturbation theory, smoothing and regularization, probability measures on a Hilbert spaces, functional 1 principal component analysis, functional counterparts of the multivariate canonical correlation analysis, the two sample problem and the change point problem, functional linear models, functional test for independence, functional time series theory, spatially distributed curves, software packages and numerical implementation of the statistical procedures discussed, among other topics. In the functional regression model context, we particularly refer to the case where the predictor is a random function, and the response is scalar, since this topic has been widely developed. Different specifications of the regression operator arise, in several applied fields, such as chemometrics, biology, economics and climatology. An active research area in the literature is devoted to estimate the regression operator. To avoid the computational (high-dimensionality) limitations of the nonparametric approach, several parametric and semi-parametric methods have been proposed (see, for example, [23], and the refereces therein). In particular, in [23], to avoid the problem of high dimensionality, a combination of a spline approximation and the one-dimensional Nadaraya-Watson approach is proposed. The generalizations in the case of more regressors (all functional, or both functional and real) have been addressed in the nonparametric, semi-parametric, and parametric frameworks (see for an overview [1], [22], and [26]). For functional response and covariate, in the nonparametric regression framework, we refer to [24], where a functional version of the Nadaraya-Watson estimator is proposed for the estimation of the regression operator. Its pointwise asymptotic normality is derived as well. Resampling ideas are applied to overcome the difficulties arising in the estimation of the asymptotic bias and variance. Semifunctional partial linear regression, introduced in [2], allows the prediction of a real-valued random variable from a set of real explanatory variables, and a time-dependent functional explanatory variable. The asymptotic, and practical properties in real-data applications, of the estimators derived are studied as well. Motivated by genetic and environmental applications, in [14], a semi-parametric maximum likelihood method for the estimation of odds ratio association parameters is also developed in a high dimensional data framework. In the autoregressive Hilbertian time series framework, several estimation and prediction procedures have been proposed with the derivation of the corresponding asymptotic theory. In [39], the weakconvergence to the normal distribution of the estimator of the autocorrelation operator studied, based on projection into the theoretical eigenvectors, is established, under suitable conditions. In [11] and [13], the problem of prediction of linear processes in function spaces is addressed. In particular, sufficient conditions for the consistency of the empirical auto- and cross- covariance operators are obtained. The asymptotic normal distribution of the empirical auto-covariance operator is also derived. Projection into the empirical eigenvectors is considered, in the formulation of a componentwise estimator of the autocorrelation operator, in absence of information about the theoretical ones. Asymptotic properties of the empirical eigenvalues and eigenvectors are also analyzed. In [31], the efficiency of a componentwise estimator of the autocorrelation operator, based on projection into the empirical eigenvector system of 2 the auto-covariance operator, is obtained. In [40], consistency, in the space of bounded linear operators, of the formulated estimator of the autocorrelation operator, and of its associated ARH(1) plug-in predictor is proved. Sufficient conditions for the weak-convergence of the ARH(1) plug-in predictor to a Hilbert-valued Gaussian random variable are derived in [41]. High deflection results or large and moderate deviations for infinite-dimensional autoregressive processes are derived in [42]. The law of the iterated logarithm for the covariance operator estimator is obtained in [43]. The main properties for the class of autoregressive Hilbertian processes with random coefficients are investigated in [47]. Interesting extensions of the autoregressive Hilbertian framework can be found in [36], who offers a new estimate, based on the spectral decomposition of the autocorrelation operator, and not of the auto-covariance operator. The first generalization on autoregressive processes of order greater than one is proposed in [46], in order to improve prediction. ARHX (1) models, i.e., autoregressive Hilbertian processes with exogenous variables are formulated in [17]. In [30] and [31] a doubly stochastic formulation of the autoregressive Hilbertian process is studied. The ARHD model is introduced in [38], taking into account the regularity of trajectories through the derivatives. Recently, [16] introduced the conditional autoregressive Hilbertian processes (CARH processes), as a new class of processes, and developed parallel projection estimation methods to predict such processes. In the Banach-valued context, we refer to the papers by [6, 20, 50, 51], among others. In this paper, we assume that the autocorrelation operator belongs to the Hilbert-Schmidt class, and admits a diagonal spectral decomposition in terms of the orthogonal eigenvector system of the auto-covariance operator. That is the case, for example, of an autocorrelation operator defined as a continuous function of the autocovariance operator (see Remark 1 below). A componentwise estimator of the autocorrelation operator is formulated in terms of such an eigenvector system. In the derivation of the results presented in this paper we assume that the eigenvectors (φj , j ≥ 1) of the autocovariance operator C are known. That is the case, for example, of defining our random initial condition as the solution, in the mean-square sense, of a stochastic differential equation driven by white noise (e.g., the Wiener measure). However, beyond this case, the sparse representation and whitening properties of wavelet bases can be exploited to obtain a diagonal representation of the autocovariance and crosscovariance operators (see Remark 3 below), in terms of a common and known wavelet basis. Smoothing functional data with a suitable penalization norm in terms of wavelets also could lead to an empirical regularized diagonal approximation of the autocorrelation operator in terms of wavelets. Finally, we refer to shrinkage estimation of the autocovariance and cross covariance operators in terms of a suitable common wavelet basis, allowing a diagonal empirical approximation of both operators, in terms of such a basis (see also Section 6). Under the setting of assumptions established in this paper (see Section 2), convergence to the auto- 3 correlation operator, in L2 -sense in the space of Hilbert-Schmidt operators S (H) , i.e., convergence in the space L2S(H) (Ω, A, P) , is derived, for the formulated componentwise estimator. Consistency then follows in S (H) (see Section 3.1). Under the same setting of conditions, consistency in H of the associated ARH(1) plug-in predictor is obtained as well, from its convergence in the L1 -sense in the Hilbert space H, i.e., in the space L1H (Ω, A, P) (see Section 3.2). The Gaussian framework is analyzed in Section 4. In that framework, the numerical examples studied in Section 5 illustrate the behavior of the formulated componentwise autocorrelation operator estimator and associated predictor for large sample sizes. A comparative study with alternative ARH(1) prediction techniques (even in a non-diagonal scenario), based on componentwise parameter estimators of the autocorrelation operator (including the case of empirical eigenvectors), as well as based on kernel (nonparametric) functional estimators, and penalized, spline and wavelet, estimators, is also performed. Final conclusions and some guidelines for the application of the proposed approach from real-data are provided in Section 6. 2 Preliminaries. The preliminary definitions and lemmas, that will be applied in the derivation of the main results of this paper, in the context of ARH(1) processes, are now provided. In the following, let us denote by H a real separable Hilbert space. Recall that a zero-mean ARH(1) process X = (Xn , n ∈ Z) satisfies the equation (see [11], among others) Xn = ρ (Xn−1 ) + εn , n ∈ Z, (1) where ρ denotes the autocorrelation operator of process X, which belongs to the space L(H) of bounded linear operators, such that kρk kL(H) < 1, for k ≥ k0 , and for certain k0 ≥ 1, with k · kL(H) denoting the norm in the space L(H). The Hilbert-valued innovation process ε = (εn , n ∈ Z) is considered to be strong-white noise, i.e., ε is a Hilbert-valued zero-mean stationary process, with independent and identically distributed components in time, and with σε2 = Ekεn k2H < ∞, for all n ∈ Z. We restrict our attention here to the case where ρ is such that kρkL(H) < 1. The following assumptions will be made: Assumption A1. The autocovariance operator C = E[Xn ⊗ Xn ] = E[X0 ⊗ X0 ], for every n ∈ Z, is a positive self-adjoint and trace operator. It then admits the following 4 diagonal spectral representation, in terms of its eigenvectors (φj , j ≥ 1) C= ∞ X j=1 where ∞ X j=1 creasing Cj φj ⊗ φj , (2) Cj < ∞, with (Cj , j ≥ 1) denoting the system of real positive eigenvalues of C, arranged in deorder of their magnitudes C1 ≥ C2 ≥ · · · ≥ Cj ≥ Cj+1 ≥ · · · > 0. Assumption A2. The autocorrelation operator ρ is a self-adjoint and Hilbert-Schmidt operator, admitting the following diagonal spectral decomposition: ρ= ∞ X j=1 ρj φj ⊗ φj , ∞ X j=1 ρ2j < ∞, (3) where (ρj , j ≥ 1) is the system of eigenvalues of the autocorrelation operator ρ, with respect to the orthonormal system of eigenvectors (φj , j ≥ 1) of the autocovariance operator C. Note that, under Assumption A2, kρkL(H) = sup ρj < 1. j≥1 Remark 1 Assumption A2 holds, in particular, when operator ρ is defined as a continuous function of operator C (see [18], pp. 119-140). See also Remark 3 below. In the following, for any n ∈ Z, let D = E[Xn ⊗ Xn+1 ] = E[X0 ⊗ X1 ] be the cross-covariance operator of the ARH(1) process X = (Xn , n ∈ Z). Under Assumptions A1-A2, by projection of equation (1) into the orthonormal system (φj , j ≥ 1), we obtain, for each j ≥ 1, the following AR(1) equation: Xn,j = ρj Xn−1,j + εn,j , n ∈ Z, (4) where Xn,j = hXn , φj iH and εn,j = hεn , φj iH , for all n ∈ Z. Under Assumptions A1-A2, from equation (4), for each j ≥ 1, ρj = ρ(φj )(φj ) = φj , DC −1 (φj ) = hD(φj ), φj iH C = −1 (φj ), φj D E [Xn,j Xn−1,j ]  2  = j, Cj E Xn−1,j 5 H H ∀n ∈ Z, (5)  −1  2 ] and Xn,j = hXn , φj iH , j ≥ 1, since where Dj = hD(φj ), φj iH = E [Xn,j Xn−1,j ] , Cj−1 = [E Xn−1,j D= ∞ X j=1 Dj φj ⊗ φj , Dj = ρj Cj , j ≥ 1. (6) Let us now consider the Banach space L2H (Ω, A, P) of the classes of equivalence established in L2H (Ω, A, P) , the space of zero-mean second-order Hilbert-valued random variables (H-valued random variables) with finite seminorm given by kZkL2 H (Ω,A,P) = q E kZk2H , ∀Z ∈ L2H (Ω, A, P) . (7) That is, for Z, Y ∈ L2H (Ω, A, P) , Z and Y belong to the same equivalence class if and only if E kZ − Y kH = 0. In the next section, we will consider, in particular, H = S(H), the Hilbert space of Hilbert-Schmidt operators on a Hilbert space H, i.e., we will consider, the space L2S(H) (Ω, A, P) with the seminorm kY k2L2 S(H) (Ω,A,P) = E kY k2S(H) , ∀Y ∈ L2S(H) (Ω, A, P) . (8) For each n ∈ Z, let us consider the following biorthogonal representation of the functional value Xn of the ARH(1) process X = (Xn , n ∈ Z) , as well as of the functional value εn of its innovation process ε = (εn , n ∈ Z) : Xn = εn = ∞ ∞ X X p hXn , φj iH p Cj p Cj ηj (n)φj , φj = Cj j=1 j=1 ∞ X j=1 where ηj (n) = hXn ,φj iH √ Cj ∞ σj X hεn , φj iH σj ηej (n)φj , φj = σj j=1 X = √n,j and ηej (n) = Cj (9) hεn ,φj iH σj = εn,j σj , (10) for every n ∈ Z, and for each j ≥ 1. Here, under Assumptions A1-A2, for Rε = E[εn ⊗ εn ] = E[ε0 ⊗ ε0 ], n ∈ Z, Rε φj = σj2 φj , j ≥ 1, where, as before, (φj , j ≥ 1) denotes the system of eigenvectors of the autocovariance operator C, and X σj2 = σε2 = Ekεn k2H , for all n ∈ Z. j≥1 The following lemma provides the convergence, in the seminorm of L2H (Ω, A, P), of the series expan6 sions (9)-(10). Lemma 1 Let X = (Xn , n ∈ Z) be a zero-mean ARH(1) process. Under Assumptions A1-A2, for any n ∈ Z, the following limit holds 2 bn,M lim E Xn − X M→∞ bn,M = where X H = 0, (11) M X p Cj ηj (n)φj . Furthermore, j=1 E lim M→∞ h i   bn,M bn,M ⊗ Xn − X Xn − X 2 S(H) = 0. (12) Similar assertions hold for the biorthogonal series representation εn = ∞ X ∞ σj j=1 X hεn , φj iH σj ηej (n)φj . φj = σj j=1 Proof.  bn,M Under Assumption A1, from the trace property of C, the sequence X satisfies, for M sufficiently large, and L > 0, arbitrary,  M X p = Cj ηj (n)φj , M ≥ 1 j=1 2 bn,M+L − X bn,M k2 2 b b kX L (Ω,A,P ) = EkXn,M+L − Xn,M kH H = M+L X M+L X j=M+1 k=M+1 = M+L X j=M+1 since, under Assumption A1, ∞ X j=1 M+L X  bn,M X  Cj → 0, when M → ∞,  Cj < ∞, hence,  Cj converges to zero when M j=M+1 p p Cj Ck E[ηj (n)ηk (n)] hφj , φk iH M X j=1 (13)  Cj , M ≥ 1 is a Cauchy sequence. Thus, → ∞, for L > 0, arbitrary. From equation (13),  M X p Cj ηj (n)φj , M ≥ 1 is also a Cauchy sequence in L2H (Ω, A, P ). Thus, the sequence = j=1  bn,M , M ≥ 1 has finite limit in L2 (Ω, A, P ), for all n ∈ Z. X H 7 Furthermore, 2 bn,M lim E Xn − X M→∞ + lim M→∞ −2 lim H 2 = E kXn kH M X M X p p Cj Ch E [ηj (n)ηh (n)] hφj , φh iH j=1 h=1 M→∞ M M X X p 2 Cj = 0. Cj E [hXn , ηj (n)φj iH ] = σX − lim M→∞ j=1 j=1 (14) In the derivation of the identities in (13) and (14), we have applied that, for every j, h ≥ 1, Cφj = E [ηj (n)ηh (n)] = 2 σX = EkXn k2H = Cj φj , δj,h , ∞ X Cj < +∞, j=1  E hXn , hφj , φh iH = δj,h ,  p ηj (n)φj iH = Cj . (15) Moreover, from identities in (15), E = h i   bn,M bn,M ⊗ Xn − lim X Xn − lim X E[Xn ⊗ Xn ] + lim M→∞ −2 lim M→∞ = = M→∞ M→∞ M X j=1 M X M X j=1 h=1 2 S(H) p p Cj Ch φj ⊗ φh E[ηj (n)ηh (n)] p E[Xn ⊗ Cj ηj (n)φj ] 2 S(H)   M M X X E[Xn ⊗ Xn ] + lim  Cj φj ⊗ φj − 2 Cj φj ⊗ φj  M→∞ E[Xn ⊗ Xn ] − lim M→∞ j=1 M X j=1 j=1 2 S(H) 2 = 0. Cj φj ⊗ φj (16) S(H) In a similar way, we can derive convergence to εn , in L2H (Ω, A, P), of the series ∞ X j=1 σj ηej (n)φj , for every n ∈ Z, since ε is assumed to be strong-white noise, and hence, its covariance operator Rε is in the trace class. We can also obtain an analogous to equation (16).  8 In equations (9)-(10), for every n ∈ Z, E[ηj (n)] = 0, E[ηj (n)ηh (n)] = δj,h , j, h ≥ 1, n∈Z (17) E[e ηj (n)] = 0, E[e ηj (n)e ηh (n)] = δj,h , j, h ≥ 1, n ∈ Z. (18) Note that, from Assumption A2 for each j ≥ 1, (Xn,j , n ∈ Z) in equation (4) defines a stationary and invertible AR(1) process. In addition, from equations (9) and (15), for every n ∈ Z, and j, p ≥ 1, Xn = E [Xn,j Xn,p ] = 2 E kXn kH which implies that Cj = = σj2 , 1−ρ2j ∞ X Xn,j φj , j=1 ∞ X ∞ ∞ X X 2 ρkj ρhp E [εn−k,j εn−h,p ] = δj,p ρ2k j σj k=0 h=0 k=0 ∞ ∞ ∞ X X  2  X hC (φj ) , φj iH = Cj = E Xn,j = j=1 j=1 j=1 = δj,p σj2 , 1 − ρ2j 2 σX < ∞, (19) for each j ≥ 1. In particular, we obtain, for each j ≥ 1, and for every n ∈ Z, E [ηj (n)ηj (n + 1)] = " Xn,j Xn+1,j p E p Cj Cj = ∞ X ∞ X = ∞ X # = E [Xn,j Xn+1,j ] Cj ρk+h E [εn−k,j εn+1−h,j ] j k=0 h=0 Cj ρ2k+1 σj2 j k=0 = Cj σj2 ρj = ρj , Cj 1 − ρ2j Remark 2 From equation (4) and Lemma 1, keeping in mind that Cj = n ∈ Z. σj2 , 1−ρ2j (20) for each j ≥ 1, the following invertible and stationary AR(1) process can be defined as ηj (n) = ρj ηj (n − 1) + q 1 − ρ2j ηej (n), 0 < ρ2j ≤ ρj < 1, (21) where, for each j ≥ 1, (ηj (n), n ∈ Z) and (e ηj (n), n ∈ Z) are respectively introduced in equations (9)i h (10). In the following, for each j ≥ 1, we assume that E (e ηj (n))4 < ∞, for every n ∈ Z, to ensure ergodicity for all second-order moments, in the mean-square sense (see, for example, [33], pp. 192-193). 9 Furthermore, D = E[Xn ⊗ Xn+1 ] = = = ∞ X ∞ X j=1 p=1 ∞ X ∞ X   E hXn , φj iH hXn+1 , φp iH φj ⊗ φp   p p E hXn , φj iH hXn+1 , φp iH p p Cj Cp φj ⊗ φp Cj Cp j=1 p=1 ∞ X ∞ X p p Cj Cp E [ηj (n)ηp (n + 1)] φj ⊗ φp . j=1 p=1 (22) Remark 3 In particular, Assumption A2 holds if the following orthogonality condition is satisfied E [ηj (n)ηp (n + 1)] = δj,p , j, p ≥ 1, n ∈ Z, (23) where δj,p denotes the Kronecker Delta function. In practice, unconditional bases, like wavelet bases, lead to a sparse representation for functional data (see, for example, [48, 49, 56] for statistically-oriented treatments). Wavelet bases are also designed for sparse representation of kernels defining integral operators, in L2 spaces with respect to a suitable measure (see [37]). The Discrete Wavelet Transform (DWT) approximately decorrelates or whitens data (see [56]). In particular, operators C and D could admit an almost diagonal representation with respect to the self-tensorial tensorial product of a suitable wavelet basis. 3 Estimation and prediction results. A componentwise estimator of the autocorrelation operator, and of the associated ARH(1) plug-in predictor is formulated in this section. Their convergence to the corresponding theoretical functional values, in the spaces L2S(H) (Ω, A, P ) and LH (Ω, A, P ), is respectively derived as well. Their consistency in the spaces S(H) and H then follows. From equation (5), for each j ≥ 1, and for a given sample size n ≥ 1, one can consider the usual b n,j and C bn,j of Dj and Cj , in the AR(1) framework, given by respective moment-based estimators D b n,j D = n−2 1 X Xi,j Xi+1,j , n − 1 i=0 10 n−1 X bn,j = 1 C X2 . n i=0 i,j (24) The following truncated componentwise estimator of ρ is then formulated: ρbkn = kn X j=1 ρbn,j φj ⊗ φj , (25) where, for each j ≥ 1, ρbn,j b n,j D = = bn,j C 1 n−1 n−2 X Xi,j Xi+1,j i=0 n−1 X 2 1 Xi,j n i=0 n = n−1 n−2 X Xi,j Xi+1,j i=0 n−1 X 2 Xi,j i=0 . (26) Here, the truncation parameter kn indicates that we have considered the first kn eigenvectors associated with the first kn eigenvalues, arranged in decreasing order of their modulus magnitude. Furthermore, kn is such that kn < 1, n lim kn = ∞, n→∞ n > 1. (27) The following additional condition will be assumed on kn for the derivation of the subsequent results: Assumption A3. √ lim Ckn n = ∞. The truncation parameter kn in (25) is such that n→∞ Remark 4 Assumption A3 has also been considered in p. 217 of [11], to ensure weak consistency of the proposed estimator of ρ, as well as, in [39] (see Proposition 4, p. 902), in the derivation of asymptotic normality. From Remark 2, for each j ≥ 1, ηj = (ηj (n), n ∈ Z) in equation (21) defines a stationary and invertible AR(1) process, ergodic in the mean-square sense (see, for example, [5]). Therefore, in view of equations (17) and (20), for any j ≥ 1, there exist two positive constants Kj,1 and Kj,2 such that the following identities hold: lim " E 1− 1 n n→∞ lim n→∞ " E ρj − n−1 X #2 ηj2 (i) i=0 1 n 1 n−1 n−2 X (28) #2 ηj (i)ηj (i + 1) i=0 1 n 11 = Kj,1 , = Kj,2 . (29) Equations (28)-(29) imply, for n sufficiently large, Var Var ! n−1 e j,1 K 1X 2 ηj (i) ≤ , n i=0 n (30) ! n−2 e j,2 K 1 X ηj (i)ηj (i + 1) ≤ , n − 1 i=0 n (31) e j,1 and K e j,2 , for each j ≥ 1. Equivalently, for n sufficiently large, for certain positive constants K !2  n−1 X 1 η 2 (i)  ≤ E 1− n i=0 j  !2  n−1 X 1 E  ρj − ηj (i)ηj (i + 1)  ≤ n − 1 i=0  e j,1 K , n (32) e j,2 K , n (33) The following assumption is now considered. Assumption A4.   e j,1 + K e j,2 < ∞. S = sup K j≥1 Remark 5 From equation (26), applying Cauchy–Schwarz’s inequality, we obtain, for each j ≥ 1, |b ρn,j | = ≤ n n−1 n−2 X Xi,j Xi+1,j i=0 n−1 X 2 Xi,j i=0 n n−1 ≤ v un−2 X uX 2 n−2 2 t Xi+1,j Xi,j i=0 i=0 n−1 X 2 Xi,j i=0 v u n−2 uX u 2 Xi+1,j u n u n u i=0 ≤ a.s. u n−1 n − 1u X n−1 2 t Xi,j (34) i=0 3.1 Convergence in L2S(H) (Ω, A, P) In the following proposition, convergence of ρbkn to ρ, in the space L2S(H) (Ω, A, P) , is derived, under the setting of conditions formulated in the previous sections. Proposition 1 Let X = (Xn , n ∈ Z) be a zero-mean standard ARH(1) process. Under Assumptions A1-A4, the following limit holds: 2 lim kρ − ρbkn kL2 n→∞ S(H) 12 (Ω,A,P) = 0. (35) Specifically, kρ − 2 ρbkn kL2 (Ω,A,P) S(H) ≤ g(n), with g(n) = O 1 Ck2n n ! , n → ∞. (36) Remark 6 Corollary 4.3, in [11], p. 107, can be applied to obtain weak convergence results, in terms of weak expectation, using the empirical eigenvectors (see definition of weak expectation at the beginning of Section 1.3, in p. 27, in [11]). Proof. For each j ≥ 1, the following almost surely inequality is satisfied: b n,j Dj D − bn,j Cj C |ρj − ρbn,j | = b n,j b n,j − C bn,j D bn,j − D b n,j Cj + C bn,j D bn,j − D b n,j Cj Dj C Dj C = bn,j bn,j Cj C Cj C = b n,j bn,j − Cj D b n,j Dj − D C + bn,j Cj Cj C   1 b n,j . bn,j + Dj − D |b ρn,j | Cj − C ≤ Cj = (37) Thus, under Assumptions A1–A2, from equation (34), for each j ≥ 1, 2 (ρj − ρbn,j ) ≤ ≤ ≤ 2 1  b n,j bn,j + Dj − D |b ρ | C − C n,j j Cj2   2  2  2 2 bn,j + Dj − D b n,j (b ρ ) C − C n,j j Cj2 ! 2   2 2  2 n b n,j bn,j + Dj − D a.s., Cj − C Cj2 n−1 (38) which implies, for each j ≥ 1, i h 2 E (ρj − ρbn,j )2 ≤ 2 Cj  n n−1 2 !   2  2  b n,j bn,j . + E Dj − D E Cj − C Under Assumption A2, from equations (25) and (39), 13 (39) kρ − ρbkn k2L2 2 S(H) = E kρ − ρbkn kS(H) = (Ω,A,P) kn X ≤ j=1 +E 2 Cj2   n n−1 kn X j=1 2 b n,j Dj − D ∞ i h X   2 E ρ2j E (ρj − ρbn,j ) + j=kn +1  2  b E Cj − Cn,j 2  + ∞ X ρ2j j=kn +1 2   2  2 n b E C − C j n,j Ck2n j=1 n − 1  ∞ 2  X b n,j + ρ2j E Dj − D kn  X ≤ + 2 ≤  n n−1 Ck2n 2 j=kn +1  kn   ∞ 2  2  X X b b ρ2j . + + E Dj − Dn,j E Cj − Cn,j j=1 j=kn +1 (40) Furthermore, from (9) and (26), for j ≥ 1, bn,j C n−1 n−1 1X 1X 2 Xi,j = Cj ηj2 (i), n i=0 n i=0 = b n,j D (41) n−2 n−2 1 X 1 X Xi,j Xi+1,j = Cj ηj (i)ηj (i + 1), n − 1 i=0 n − 1 i=0 = (42) where, considering equation (6), Dj = E [Xn,j Xn+1,j ] = Cj E [ηj (n)ηj (n + 1)] = Cj ρj , (43) for each j ≥ 1. Equations (40)–(43) then lead to kρ − ρbkn k2L2 S(H) (Ω,A,P) ≤ +  2   !2  n−1 X 1 Cj2 E  1 − ηj2 (i)  n j=1 i=0  !2  n−2 X 1 ηj (i + 1)ηj (i)  +E  ρj − n − 1 i=0 2 n n−1 Ck2n ∞ X ρ2j . j=kn +1 14 kn X (44) For each j ≥ 1, and for n sufficiently large, considering equations (32)–(33), under Assumption A4 E kρ − 2 ρbkn kS(H) 2 ≤  n n−1 Ck2n 2S ≤ 2  n n−1 Ck2n n kn X e j,1 + K e j,2 K n Cj2 j=1 2 kn X Cj2 + j=1 ∞ X ! + ∞ X ρ2j j=kn +1 ρ2j . j=kn +1 (45) From the trace property of operator C, lim n→∞ kn X Cj2 = ∞ X j=1 j=1 Cj2 < ∞, (46) and from the Hilbert-Schmidt property of ρ, lim n→∞ ∞ X ρ2j = 0. (47) j=kn +1 Thus, in view of equations (45)–(47), kρ − 2 ρbkn kL2 (Ω,A,P) S(H) = E kρ − where 2S g(n) =  n n−1 Ck2n n 2 ρbkn kS(H) 2 kn X ≤ g(n) = O Ck2n n ! , n → ∞, (48) Cj2 + j=1 1 ∞ X ρ2j . (49) j=kn +1 Under Assumption A3, equations (48) and (49) imply lim kρ − ρbkn k2L2 n→∞ as we wanted to prove. S(H) (Ω,A,P) = 0,  Note that consistency of ρbkn in the space S (H) directly follows from equation (35) in Proposition 1. Corollary 1 Let X = (Xn , n ∈ Z) be a zero-mean standard ARH(1) process. Under Assumptions A1-A4, as n → ∞, kρ − ρbkn kS(H) →p 0, where, as usual, →p denotes the convergence in probability. 15 (50) 3.2 Consistency of the ARH(1) plug-in predictor. Let us consider L (H) , as before, denoting the space of bounded linear operators on H, with the norm kAkL(H) = sup X∈H kA (X)kH , kXkH (51) for every A ∈ L (H) . In particular, for each X ∈ H, kA (X)kH ≤ kAkL(H) kXkH . (52) bn = ρbkn (Xn−1 ) X (53) In the following, we denote by the ARH(1) plug-in predictor of Xn , as an estimator of the conditional expectation E[Xn |Xn−1 ] = bn = ρbkn (Xn−1 ) in H. ρ (Xn−1 ) . The following proposition provides the consistency of X Proposition 2 Let X = (Xn , n ∈ Z) be a zero-mean standard ARH(1) process. Under Assumptions A1-A4, lim E k(ρ − ρbkn ) (Xn−1 )kH = 0. (54) n→∞ Specifically, In particular, E k(ρ − ρbkn ) (Xn−1 )kH ≤ h (n) , h (n) = O  1 √ Ckn n  , n → ∞. k(ρ − ρbkn ) (Xn−1 )kH →p 0, (55) (56) where, as usual, →p denotes the convergence in probability. Proof. From (52) and Proposition 1, for n sufficiently large, the following almost surely inequality holds: bn ρ (Xn−1 ) − X H ≤ kρ − ρbkn kL(H) kXn−1 kH , bn = ρbkn (Xn−1 ) . Thus, where, as given in equation (53), X bn E ρ (Xn−1 ) − X H h i ≤ E kρ − ρbkn kL(H) kXn−1 kH . (57) (58) From Cauchy-Schwarz’s inequality, keeping in mind that, for a Hilbert-Schmidt operator K, it always 16 holds that kKkL(H) ≤ kKkS(H) , we have from equation (58), q q 2 2 bn E Xn − X ≤ E kρ − ρbkn kL(H) E kXn−1 kH H q q q 2 ≤ E kρ − ρbkn kS(H) E kXn−1 k2H = E kρ − ρbkn k2S(H) σX , 2 where, as before, σX = E kXn−1 k2H = ∞ X j=1 (59) Cj < ∞, for each n ∈ Z (see equation (15)). Since from Proposition 1 (see equation (36)), kρ − 2 ρbkn kL2 (Ω,A,P) S(H) ≤ g(n), 1 with g(n) = O Ck2n n ! , n → ∞, from equation (59), we obtain, where h (n) = σX E k(ρ − ρbkn ) (Xn−1 )kH ≤ h (n) , (60) lim E k(ρ − ρbkn ) (Xn−1 )kH = 0, (61) p g (n), with g (n) being given in (49). In particular, under Assumption A3, n→∞ which implies that bn k(ρ − ρbkn ) (Xn−1 )kH = ρ (Xn−1 ) − X H →p 0, n → ∞. (62)  4 The Gaussian case. In this section, we restrict our attention to the Gaussian ARH(1) context. In that context, we prove that, under Assumptions A1-A2 and Assumption A4 holds. From equation (17),  n−1  X 2 ηj (i)    i=0    = 1, E  n   We now compute the variance of n−1 X n ≥ 1. (63) ηj2 (i) i=0 n , applying the theory of quadratic forms for Gaussian vectors with correlated components. Specifically, for each j ≥ 1, and n ≥ 2, the n × 1 random vector ηjT = (ηj (0), . . . , ηj (n − 1)) is Multivariate Normal distributed, with null mean vector, and covariance 17 matrix  Σn×n where, under  1   ρ  j   = 0   .  ..   0 Assumptions ρj 0 ... ... 1 ρj 0 ... ρj .. . 1 .. . ρj .. . ... .. . ... 0 0 ρj A1–A2, we  0   0     0   ..  .    1 , (64) n×n have applied (20), i.e., E[ηj (i)ηj (i + 1)] = ρj , for every i ∈ Z, and j ≥ 1. It is well-known (see, for example, [32]) that the variance of a quadratic form defined from a multivariate Gaussian vector y ∼ N (µ, Λ), and a symmetric matrix Q is given by:   Var yT Qy = 2tr [QΛQΛ] + 4µT QΛQµ, (65) where tr denotes the trace. For each j ≥ 1, applying equation (65), with y = ηj , Λ = Σn×n , in (64), and Q = In×n , the n × n identity matrix, we obtain   Var ηjT In×n ηj = Var "n−1 X # ηj2 (i) i=0  = 2tr [Σn×n Σn×n ] = 2 n + 2(n − 1)ρ2j . (66) Furthermore, from equation (66), for each j ≥ 1,  n−1  X 2 ηj (i)      i=0    = 2 n + 2(n − 1)ρ2j = 2 + 4 1 − 1 ρ2j . Var    n2 n n n n2   (67) From equation (67), we then obtain   n−1 X 2 ηj (i)     i=0   lim Var   n→∞ n   2   ηj2 (i)       i=0   1 − = lim E    n→∞  n       = 2 +4 n→∞ n lim 18 n−1 X  1 1 − 2 n n  ρ2j = 0. (68) Equation (68) leads to lim n→∞  n−1  X 2 η (i)    i=0 j   Var    n   = 2 + 4ρ2j . 1 n (69) Hence, for each j ≥ 1, Kj,1 in equation (28) is given by Kj,1 = 2 + 4ρ2j ,   n−1 X 2 η (i)    i=0 j   ≤ 2+4  and, from equation (67), Var   n   1 n − 1 n2  (70) e j,1 ρ2j ≤ 2 + 4ρ2j ≤ 6. Thus, for every j ≥ 1, K in equation (30) satisfies e j,1 ≤ 6. K (71) Remark 7 Note that, from Lemma 1, for each j ≥ 1,   E ηej4 (i) = 3, ∀i ∈ Z. (72) Thus, the assumption considered in Remark 2 holds, and for each j ≥ 1, the AR(1) process ηj = (ηj (n), n ∈ Z) is ergodic for all second-order moments, in the mean-square sense (see pp. 192–193 of [33]). For n ≥ 2, and for each j ≥ 1, we are now going to compute Kj,2 in (29). The (n − 1) × 1 T T random vectors ηj⋆ = (ηj (0), . . . , ηj (n − 2)) and ηj⋆⋆ = (ηj (1), . . . , ηj (n − 1)) are Multivariate Normal distributed, with null mean vector, and covariance matrix  e (n−1)×(n−1) Σ       =      1 ρj 0 ... ... ρj 1 ρj 0 ... 0 .. . ρj .. . 1 .. . ρj .. . ... .. . 0 ... 0 0 ρj From equation (20), for each j ≥ 1, 19  0   0     0   ..  .    1 (n−1)×(n−1) . (73) E "n−2 X # ηj (i)ηj (i + 1) = i=0 n−2 X i=0   ρj = (n − 1)ρj = tr E ηj⋆ [ηj⋆⋆ ]T , (74) where     E ηj⋆ [ηj⋆⋆ ]T = E ηj⋆ ⊗ ηj⋆⋆ = ρj I(n−1)×(n−1) , (75) with, as before, I(n−1)×(n−1) denoting the (n − 1) × (n − 1) identity matrix. However, the variance of n−2 X ηj (i)ηj (i+1) depends greatly on the distribution of ηj⋆ and ηj⋆⋆ . In the Gaussian case, keeping in mind i=0 that ηj⋆ = (ηj (0), . . . , ηj (n − 2))T and ηj⋆⋆ = (ηj (1), . . . , ηj (n − 1))T are zero-mean multivariate Normal e (n−1)×(n−1) given in (73), and having cross-covariance matrix distributed vectors with covariance matrix Σ n−2 X ηj (i)ηj (i + 1), from (74)-(75), as follows: (75), we can compute the variance of i=0     Var [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆ = E [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆ [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆ 2  − E [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆ = n−2 X X n−2 i=0 p=0 = n−2 X E [ηj (i)ηj (i + 1)] i=0 + 2  E [ηj (i)ηj (i + 1)ηj (p)ηj (p + 1)] − E [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆ n−2 X n−2 X n−2 X E [ηj (p)ηj (p + 1)] p=0 E [ηj (i)ηj (p)] E [ηj (i + 1)ηj (p + 1)] i=0 p=0 + n−2 X n−2 X i=0 p=0 2  E [ηj (i)ηj (p + 1)] E [ηj (i + 1)ηj (p)] − E [ηj⋆ ]T I(n−1)×(n−1) ηj⋆⋆   2  e (n−1)×(n−1) Σ e (n−1)×(n−1) = tr E[ηj⋆ ⊗ ηj⋆⋆ ] + tr Σ  2  T   − tr E[ηj⋆ ⊗ ηj⋆⋆ ] +tr E[ηj⋆ ⊗ ηj⋆⋆ ] E[ηj⋆ ⊗ ηj⋆⋆ ]       e (n−1)×(n−1) Σ e (n−1)×(n−1) + tr E[η ⋆ ⊗ η ⋆⋆ ] E[η ⋆ ⊗ η ⋆⋆ ] T = tr Σ j j j j = (n − 1) + 2(n − 2)ρ2j + (n − 1)ρ2j , where, from (75),        ⋆ ⋆⋆ ⋆ ⋆⋆ T E[ηj ⊗ ηj ] E[ηj ⊗ ηj ] =     ρ2j 0 ... ... 0 0 .. . ρ2j .. 0 .. . 0 .. . 0 ... ... .. . .. . From (76), 20 . .. . ρ2j       = ρ2j I(n−1)×(n−1) .    (76)  n−2  X ηj (i)ηj (i + 1)    i=0  (n − 1) + 2(n − 2)ρ2j + (n − 1)ρ2j = Var  .   n−1 (n − 1)2   Therefore, for each j ≥ 1, lim n→∞  n−2  X ηj (i)ηj (i + 1)    i=0    Var   n−1   1/n Thus, for each j ≥ 1, Kj,2 in (29) is given by Kj,2 = 1 + 3ρ2j . (77) (78)   n−2 X ηj (i)ηj (i + 1)     i=0 2 ≤  = 1+3ρj . From equation (77), Var  n−1    e j,2 in equation (31) satisfies 1 + 3ρ2j ≤ 4. Thus, for every j ≥ 1, K e j,2 ≤ 4. K (79) From equations (71) and (79), the constant S in Assumption A4 is such that S ≤ 6 + 4 = 10. 5 Simulations. A simulation study is undertaken to illustrate the behavior of the formulated componentwise estimator of the autocorrelation operator, and of its associated ARH(1) plug-in predictor for large sample sizes, in Section 5.1. By implementation of alternative ARH(1) plug-in prediction techniques, from the previous and current literature, a comparative study is also developed in Section 5.2. In the subsequent sections, we restrict our attention to the Gaussian ARH(1) framework. bn for large sample sizes 5.1 Behavior of ρb and X In this subsection, the empirical functional mean-squared errors, associated with the proposed componentwise estimator of the autocorrelation operator, and associated ARH(1) plug-in predictor are evaluated from repeated generations of a sequence of samples with increasing, sufficiently large, sizes. In the simulation of that samples, from an ARH(1) process, operators ρ, C and Rε are defined within the family of fractional elliptic polynomials, with constant coefficients, of the Dirichlet negative Laplacian operator on an interval. Let us first consider the Dirichlet negative Laplacian operator on an interval (a, b), (−∆)(a,b) , given by 21 (−∆)(a,b) (f ) (x) f (a) = − d2 f (x) , dx2 x ∈ (a, b) ⊂ R, = f (b) = 0. (80)   The eigenvectors (φj , j ≥ 1) , and eigenvalues λj (−∆)(a,b) , j ≥ 1 of (−∆)(a,b) satisfy, for each j ≥ 1,  = λj (−∆)(a,b) φj (x) , (−∆)(a,b) φj (x) x ∈ (a, b), φj (a) = φj (b) = 0. (81) For each j ≥ 1, the solution to equation (81) is given by (see [27], p. 6): φj (x) λj (−∆)(a,b)   2 πjx , sin b−a b−a π2 j 2 , j ≥ 1. (b − a)2 =  = ∀x ∈ [a, b] , j ≥ 1, (82) (83) We consider here operator C defined as (see Remark 1) C = (−∆)(a,b) −δ1 /2 , δ1 > 1. (84) From [18], pp. 119-140, the eigenvectors of C coincide with the eigenvectors of (−∆)(a,b) , and its eigenvalues (Cj , j ≥ 1) are given by:  −δ1 /2 Cj = λj (−∆)(a,b) =  π2 j 2 (b − a)2 −δ1 /2 = aj −δ1 , a=  π b−a −δ1 , δ1 > 1. (85) Additionally, considering ρ= " λ1 (−∆)(a,b)  (−∆)(a,b) − ǫ #−δ2 /2 , 1 < δ2 < 2, (86)  for certain positive constant ǫ < λ1 (−∆)(a,b) close to zero, ρ is a positive self-adjoint Hilbert-Schmidt operator (with a non extremely fast decay rate), whose eigenvectors coincide with the eigenvectors of (−∆)(a,b) , and whose eigenvalues (ρj , j ≥ 1) are such that ρj < 1, for every j ≥ 1, and ρ2j =  !−δ2 λj (−∆)(a,b)  , λ1 (−∆)(a,b) − ǫ ρ2j ∈ (0, 1) , 22 1 < δ2 < 2, j ≥ 1, (87) where, as before,    0 < λ1 (−∆)(a,b) ≤ λ2 (−∆)(a,b) ≤ · · · ≤ λj (−∆)(a,b) ≤ . . . .  From (19), the eigenvalues σj2 , j ≥ 1 of Rε are then defined, for each j ≥ 1, as σj2 = Cj 1 − ρ2j  = [λj −(δ1 /2+δ2 )  −δ1 /2 λj (−∆)(a,b) (−∆)(a,b) ] −  −δ2 . λ1 (−∆)(a,b) − ǫ (88) Note that Rε is in the trace class, since the trace property of C, and the fact that ρj < 1, for every j ≥ 1, implies ∞ X σj2 = ∞ X j=1 j=1 ∞  X Cj < ∞. Cj 1 − ρ2j < j=1 For this particular example of operator C, we have considered truncation parameter kn of the form kn = n1/α , (89) for a suitable α > 0, which, in particular, allows verification of (27). From equation (85),  −δ1 /2 √ √ Ckn n = λkn −∆(a,b) n=  πkn (b − a) −δ1 √ n, δ1 > 1. (90) From equation (89), Assumption A3 is then satisfied if 1/2 − δ1 > 0, α i.e., if α > 2δ1 > 2, since δ1 > 1. (91) Let us fix δ1 = 2.4 and δ2 = 1.1. Then, from equation (91), α > 48/10. In particular, the values α1 = 5 and α2 = 6 have been tested, in Table 1 below, for H = L2 ((a, b)), and (a, b) = (0, 4), where L2 ((a, b)) denotes the space of square integrable functions on (a, b). Generations have been performed under Assumptions A1–A4, for our particular choice of C and selection of kn in a diagonal scenario. The computed empirical truncated functional mean square error EMSEρbkn of the estimator ρbkn of ρ, with n being, as before, the sample size, is given by: EMSEρbkn ρbw n,j = = N kn 2 1 XX , ρj − ρbw n,j N w=1 j=1 bw D n,j = bw C n,j 23 1 n−1 1 n n−2 X w w Xi,j Xi+1,j i=0 n−1 X i=0 (92)  w 2 Xi,j , (93) where N denotes the number of simulations, and for each j = 1, . . . , kn , ρbw n,j represents the estimator of ρj , w w w based on the wth generation of the values X0,j , . . . , Xn−1,j , with Xi,j = hXiw , φj iH , for w = 1, . . . , 700, bn = ρbkn (Xn−1 ) , we compute the empirical version and i = 0, . . . , n − 1. For the plug-in predictor X UB(EMAEXbnkn ) of the derived upper bound (59), which, for each n ∈ Z, is given by UB(EMAEXbnkn ) = = 2 where σ bX = kn X v u kn N X u1 X 2 2 \ w t ρj − ρbw E Xn−1 n,j H N w=1 j=1 v u kn N X q u1 X 2 2 t σ b = ρj − ρbw EMSEρbkn σ bX , X n,j N w=1 j=1 (94) Cj . j=1 From N = 700 realizations, for each one of the values of the sample sizes (nt , t = 1, . . . , 20) = (15000 + 20000(t − 1), t = 1, . . . , 20) , the EMSEρbkn and UB(EMAEXbnkn ) values, for α = 5 and α = 6, are displayed in Table 1, where the abbreviated notations M SEρbkn,1 , for EMSEρbkn , and UBXb k n n,1 UB(EMAEXbnkn ), are used (see also Figures 1-2). 24 , for n kn,1 M SEρbkn,1 n1 = 15000 6 3.74 (10) n2 = 35000 8 n3 = 55000 UBXb k n n,1 −4 2.87 (10) 2.15 (10) −4 8 1.34 (10)−4 n4 = 75000 9 1.09 (10) n5 = 95000 9 9.48 (10)−5 n6 = 115000 10 8.31 (10) n7 = 135000 10 n8 = 155000 −4 kn,2 −2 4 2.45 (10) 2.21 (10) −2 5 1.75 (10)−2 1.35 (10) −4 1.71 (10) 6 1.03 (10)−4 1.51 (10)−2 1.57 (10) −2 6 7.55 (10) 1.29 (10) 1.47 (10)−2 6 5.86 (10)−5 1.14 (10)−2 −2 6 5.16 (10) 6.81 (10) −5 1.25 (10) −2 7 10 6.37 (10)−5 1.21 (10)−2 n9 = 175000 11 6.14 (10) n10 = 195000 11 5.34 (10)−5 n11 = 215000 11 4.67 (10) n12 = 235000 11 n13 = 255000 −5 −2 −2 −2 −5 1.07 (10) 4.86 (10) −5 1.04 (10) 7 3.88 (10)−5 9.66 (10)−3 1.19 (10) −2 7 3.87 (10) 9.65 (10) 1.11 (10)−2 7 3.42 (10)−5 8.79 (10)−3 −2 7 3.40 (10) −5 1.03 (10) 4.66 (10) −5 1.03 (10) −2 7 12 4.53 (10)−5 1.02 (10)−2 n14 = 275000 12 4.24 (10) n15 = 295000 12 3.72 (10)−5 n16 = 315000 12 3.62 (10) n17 = 335000 12 n18 = 355000 −5 −2 −2 −3 −5 8.74 (10) 2.92 (10) −5 8.12 (10) 7 2.77 (10)−5 7.95 (10)−3 9.95 (10) −3 8 2.77 (10) 7.94 (10) 9.32 (10)−3 8 2.67 (10)−5 7.76 (10)−3 −3 8 2.55 (10) −5 9.21 (10) 3.39 (10) −5 8.91 (10) −3 8 12 3.34 (10)−5 8.86 (10)−3 n18 = 375000 13 3.34 (10) n20 = 395000 13 3.12 (10)−5 −5 k n n,2 2.25 (10) 1.39 (10) −5 UBXb −4 −5 −5 M SEρbkn,2 −5 −3 −3 −3 −5 7.64 (10) 2.28 (10) −5 7.04 (10) 8 2.20 (10)−5 7.04 (10)−3 8.86 (10) −3 8 2.04 (10) 6.84 (10) 8.56 (10)−3 8 1.92 (10)−5 6.65 (10)−3 −5 Table 1: EM SEρbkn (here, M SEρbkn,i ), and UB(EMAEXbnkn ) (here, UBXb k n n,i −3 −3 −3 ) values, in (92)–(94), based on N = 700 simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000+20000(t−1), t = 1, . . . , 20, and the corresponding kn,1 and kn,2 values, for α1 = 5 and α2 = 6 25 −4 8 −4 x 10 8 x 10 EMCE for operator, α = 5 1/T EMCE for operator, α = 6 1/T 3/4 3/4 (1 / T) (1 / T) 7 7 6 6 5 5 4 4 3 3 2 2 1 1 0 0 0.5 1 1.5 2 n 2.5 3 3.5 0 4 0 0.5 1 1.5 5 x 10 2 n 2.5 3 3.5 4 5 x 10 Figure 1: EM SEρbkn values (blue line), in (92)–(93), based on N = 700 simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes T = nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and the corresponding kn,1 and kn,2 values, for α1 = 5 (left-hand side) and α2 = 6 (right-hand side), against (1/T )3/4 = (1/nt )3/4 (black dot line) and 1/T = (1/nt ) (red dot line) 0.07 0.07 EMCE for predictor, α = 5 EMCE for predictor, α = 6 (1 / T)1/2 (1 / T)1/2 1/3 1/3 (1 / T) (1 / T) 0.06 0.06 0.05 0.05 0.04 0.04 0.03 0.03 0.02 0.02 0.01 0.01 0 0 0.5 1 1.5 2 n 2.5 3 3.5 0 4 5 x 10 0 0.5 1 1.5 2 n 2.5 3 3.5 4 5 x 10 Figure 2: UB(EMAEXbnkn ) values (blue line), in (94), based on N = 700 simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes T = nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and the corresponding kn,1 and kn,2 values, for α1 = 5 (left-hand side) and α2 = 6 (right-hand side), against (1/T )1/2 = (1/nt )1/2 (red dot line) and (1/T )1/3 = (1/nt )1/3 (black dot line) In the example considered, a one-parameter model of kn is selected depending on parameter α. In Example 2, in p. 286 in [31], with the same spirit, for an equivalent spectral class of operators C, a three parameter model is established for kn , to ensure convergence in quadratic mean in the space L(H) of the componentwise estimator of ρ constructed from the known eigenvectors of C. The numerical results displayed in Table 1 and Figures 1-2 illustrate the fact that the proposed componentwise estimator ρbkn presents a velocity of convergence to ρ, in quadratic mean in S(H), faster than n−1/3 , which corresponds to the optimal case for the componentwise estimator of ρ proposed in [31], in the case of known eigenvectors of C (see, in particular, Theorem 1, Remark 2 and Example 2 in [31]). For lager values of the parameters δ1 than 2.4, and α than 6, a faster velocity of convergence of ρbkn to ρ, in quadratic mean in the space S(H), will be obtained. However, larger sample sizes are required for larger values of α, in 26 order to estimate a given number of coefficients of ρ. A more detailed discussion about comparison of the rates of convergence of the ARH(1) plug-in predictors proposed in [4], [9], [11] and [31] can be found in the next subsection. 5.2 A comparative study In this section, the performance of our approach is compared with those ones given in [4, 9, 11, 31], including the case of unknown eigenvectors of C. In the last case, our approach and the approaches presented in [11] and [31] are implemented in terms of the empirical eigenvectors (see section 5.2.2). 5.2.1 Theoretical-eigenvector-based componentwise estimators Let us first compare the performance of our ARH(1) plug-in predictor, defined in (53), and the ones formulated in [11] and [31], in terms of the theoretical eigenvectors (φj , j ≥ 1) of C. Note that, in this first part of our comparative study, we consider the previous generated Gaussian ARH(1) process, with autocovariance and autocorrelation operators defined from equations (85) and (87), for different rates of convergence to zero of parameters Cj and ρ2j , j ≥ 1, with both sequences being summable sequences. Since we restrict our attention to the Gaussian case, conditions A1 , B1 and C1 , formulated in [11], pp. 211–212, are satisfied by the generated ARH(1) process. Similarly, Conditions H1 –H3 in p. 283 of [31] are satisfied by our generated Gaussian ARH(1) process. The estimators of ρ from [11] and [31] we are going to test here are given as follows. In Section 8.2 of [11] the following estimator of ρ is proposed ρbn (x) ρbn,l (x) = =  kn  X −1 kn b (x) = ρbn,l (x)φl , Π Dn Cn Π kn l=1 x ∈ H, n−2 kn 1 1 XX hφ , xiH Xi,j Xi+1,l , bn,j j n − 1 i=0 j=1 C (95) (96) in the finite dimensional subspace Hkn = sp (φ1 , . . . , φkn ) of H, where Πkn is the orthogonal projector over Hkn , and, as before, Xi,j = hXi , φj iH , for j ≥ 1. A modified estimator of ρ is studied in [31], Section 2, given by ρbn,a (x) ρbn,a,l (x) −1 bn,a where C (x) = kn X j=1 = kn   X −1 kn bn,a (x) = ρbn,a,l (x)φl , Π Πkn Dn C l=1 = x ∈ H, n−1 kn 1 1 XX  hφj , xiH Xi,j Xi+1,l ,  n − 1 i=1 j=1 max C bn,j , an (97) (98) 1  hφj , xiH φj (a.s.). Here, (an , n ∈ N) is such that (see Theorem 1  bn,j , an max C 27 in [31]) α Ckγn ≤ an ≤ βλkn , nε α > 0, 0 < β < 1, ε < 1/2, γ ≥ 1. (99) Tables 2-3 below display results for ρbkn = ρbkn , where ρbkn is given in equations (25)-(26) (see third column), ρbkn = ρbn , where ρbn is given in equations (95)–(96) (see fourth column), and ρbkn = ρbn,a , where ρbn,a is defined in (97)–(98) (see fifth column). Specifically, Tables 2-3 below provide the truncated, for two different kn rules, empirical values of Ekρ (Xn−1 ) − ρbkn (Xn−1 )kH , based on N = 700 generations of each one of the functional samples considered with size nt = 15000 + 20000(t − 1), t = 1, . . . , 20, when Cj and ρ2j , j ≥ 1, are defined as done above in equations (85) and (87). Specifically, in Table 2, the following parameter values have been considered: δ1 = 2.4 δ2 = 1.1, and kn = n1/α , for α = 6, according to our Assumption A3, (which is also considered in p. 217 of [11], to ensure weak consistency of the proposed estimator of ρ). While, in Table 3, the same empirical values are displayed for δ1 = 61 60 , δ2 = 1.1, and kn is selected according to Example 2, in p. 286 in [31]. Thus, in Table 3, 1−2ǫ kn = n δ1 (4+2γ) , γ ≥ 1, ǫ < 1/2. (100) In particular we have chosen γ = 2, and ǫ = 0.04δ1 . Note that, from Theorem 1 and Remark 1 in [31], for the choice made of kn in Table 3, convergence to ρ, in quadratic mean in the space L(H), holds for ρbn,a given in (98). 28 n kn Our Approach n1 = 15000 4 2.25 (10) n2 = 35000 5 n3 = 55000 Bosq (2000) −2 2.57 (10) 1.71 (10) −2 6 1.51 (10)−2 n4 = 75000 6 1.29 (10) n5 = 95000 6 1.14 (10) n6 = 115000 6 1.07 (10) n7 = 135000 7 n8 = 155000 Guillas (2001) −2 2.36 (10) 1.72 (10) −2 1.84 (10) 1.65 (10)−2 1.53 (10)−2 −2 1.46 (10) −2 1.20 (10) −2 1.10 (10) 1.04 (10) −2 7 9.66 (10)−3 n9 = 175000 7 9.65 (10) n10 = 195000 7 8.79 (10) n11 = 215000 7 8.74 (10) n12 = 235000 7 n13 = 255000 −2 −2 −2 1.37 (10) −2 1.16 (10) −2 1.11 (10) 1.06 (10) −2 1.07 (10) 9.91 (10)−3 1.01 (10)−2 −3 9.79 (10) −3 9.12 (10) −3 8.79 (10) 8.12 (10) −3 7 7.95 (10)−3 n14 = 275000 8 7.94 (10) n15 = 295000 8 7.76 (10) n16 = 315000 8 7.64 (10) n17 = 335000 8 n18 = 355000 −2 −2 −2 −2 −3 9.68 (10) −3 8.93 (10) −3 8.83 (10) 8.69 (10) −3 8.75 (10) 8.53 (10)−3 8.73 (10)−3 −3 8.52 (10) −3 8.49 (10) −3 7.88 (10) 7.04 (10) −3 8 7.04 (10)−3 n19 = 375000 8 6.84 (10) n20 = 395000 8 6.65 (10) −3 −3 −3 −3 −3 8.58 (10) −3 8.36 (10) −3 8.13 (10) 7.24 (10) −3 7.59 (10) 7.23 (10)−3 6.92 (10)−3 −3 6.89 (10) −3 6.67 (10) −3 −3 −3 −3 −3 6.90 (10) −3 −3 6.85 (10) −3 Table 2: Truncated empirical values of Ekρ (Xn−1 ) − ρbkn (Xn−1 )kH , for ρbkn given in equations (25)-(26) (third column), in equations (95)–(96) (fourth column), and in equations (97)–(98) (fifth column), based on N = 700 simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000+20000(t−1), t = 1, . . . , 20, and the corresponding kn = n1/α values, for α = 6 (from Assumption A3), assuming that (φj , j ≥ 1) are known. 29 n kn Our Approach n1 = 15000 2 9.91 (10) n2 = 35000 3 n3 = 55000 Bosq (2000) −3 1.39 (10) 8.78 (10) −3 3 7.89 (10)−3 n4 = 75000 3 6.49 (10) n5 = 95000 3 6.36 (10) n6 = 115000 3 6.14 (10) n7 = 135000 3 n8 = 155000 Guillas (2001) −2 1.26 (10) 1.34 (10) −2 1.24 (10) 1.15 (10)−2 1.14 (10)−2 −3 1.01 (10) −3 9.09 (10) −3 7.65 (10) 5.91 (10) −3 3 5.73 (10)−3 n9 = 175000 3 5.44 (10) n10 = 195000 3 5.10 (10) n11 = 215000 4 5.01 (10) n12 = 235000 4 n13 = 255000 −2 −2 −2 8.58 (10) −3 8.29 (10) −3 7.26 (10) 7.03 (10) −3 6.69 (10) 6.77 (10)−3 6.54 (10)−3 −3 6.74 (10) −3 6.69 (10) −3 6.48 (10) 4.85 (10) −3 4 4.17 (10)−3 n14 = 275000 4 4.64 (10) n15 = 295000 4 4.55 (10) n16 = 315000 4 4.48 (10) n17 = 335000 4 n18 = 355000 −3 −3 −3 −3 −3 6.16 (10) −3 5.97 (10) −3 5.94 (10) 6.45 (10) −3 5.83 (10) 6.17 (10)−3 5.68 (10)−3 −3 5.99 (10) −3 5.94 (10) −3 5.69 (10) 4.38 (10) −3 4 4.16 (10)−3 n19 = 375000 4 3.91 (10) n20 = 395000 4 3.86 (10) −3 −3 −3 −3 −3 5.60 (10) −3 5.58 (10) −3 5.50 (10) 5.58 (10) −3 5.44 (10) 5.45 (10)−3 5.42 (10)−3 −3 5.34 (10) −3 5.29 (10) −3 −3 −3 −3 −3 5.32 (10) −3 −3 5.26 (10) −3 Table 3: Truncated empirical values of Ekρ (Xn−1 )− ρbkn (Xn−1 )kH , for ρbkn given in equations (25)–(26) (third column), in equations (95)–(96) (fourth column), and in equations (97)–(98) (fifth column), based 61 and δ2 = 1.1, considering the sample sizes nt = 15000 + 20000(t− 1), on N = 700 simulations, for δ1 = 60 t = 1, . . . , 20, and the corresponding kn given in (100). It can be observed in Table 2 a similar performance of the three methods compared with the truncation order kn satisfying our Assumption A3, with slightly worse results being obtained from the estimator defined in equations (97)–(98), specially for the sample size n8 = 155000. Furthermore, in Table 3, a better performance of our approach is observed for the smallest sample sizes (from n1 = 15000 until n4 = 75000). While, for the remaining largest sample sizes, slightly differences are observed, with a better performance of our approach, very close to the other two approaches presented in [11] and [31]. 30 5.2.2 Empirical-eigenvector-based componentwise estimators In this section, we address the case where (φj , j ≥ 1) are unknown, as usually it occurs in real-data problems. Specifically, an empirical version of the estimators of ρ formulated in equations (25)–(26), (95)–(96) and (97)–(98), consisting of replacing the theoretical eigenvectors (φj , j ≥ 1) by their empirical n−1 X Xi ⊗ Xi , n ≥ 1, is now studied. (random) counterparts (φn,j , j ≥ 1) , the eigenvectors of Cn = n1 i=0 Specifically, taking (Cn,j , j ≥ 1) as the eigenvalues of Cn , we consider 1 n−1 ρen,j = ρen (x) = ρen,a (x) = ρen,l (x) ρen,a,l (x) 1 n n−2 X ei+1,j ei,j X X i=0 n−1 X i=0 ei,j X 2 , ρekn = kn X j=1 ρen,j φn,j ⊗ φn,j , kn   X e kn (x) = e kn Dn Cn−1 Π Π ρen,l (x)φn,l , l=1 = n,a l=1 = x ∈ H, n−2 kn 1 XX 1 ei+1,l , ei,j X hφn,j , xiH X n − 1 i=0 j=1 Cn,j kn   X e kn (x) = e kn Dn C −1 Π ρen,a,l (x)φn,l , Π (101) (102) x ∈ H, n−2 kn 1 1 XX ei+1,l, ei,j X hφn,j , xiH X n − 1 i=0 j=1 max (Cn,j , an ) (103) ei,j = hXi , φn,j i , Π e kn denotes the orthogonal projector into the space where, for i ∈ Z, and j ≥ 1, X H e kn = sp (φn,1 , . . . , φn,kn ) . The Gaussian ARH(1) process is generated under Assumptions A1–A2, H as well as C1′ in p. 218 in [11]. Note that conditions A1 and B1′ in [11] already hold. Moreover, as given in Theorem 8.8 and Example 8.6, in p. 221 in [11], for Cj , ρ2j , j ≥ 1, defined as above in equations (85) and (87), with, in particular, δ1 = 2.4, and δ2 = 1.1, the estimator ρen converges almost surely to ρ under the condition 2 nCkn 2 −→ ∞,  kn X Log(n)  bj  j=1 √ √   −1 where b1 = 2 2 (C1 − C2 ) and bj = 2 2 max (Cj−1 − Cj )−1 , (Cj − Cj+1 )−1 , for j ≥ 2. Particularly, in Table 4 the truncation criteria from Assumption A3 is used, and in Table 4, kn ≃ Log(n) has been tested (see Example 8.6, in [11], p. 221). 31 n kn n1 = 15000 9 8.42 (10) n2 = 35000 10 5.51 (10) n3 = 55000 10 Our approach Bosq (2000) Guillas (2001) −2 1.0614 1.0353 −2 1.0186 1.0052 −2 1.0174 0.9986 −2 1.0153 0.9951 −2 1.0127 0.9883 −2 1.0113 0.9627 4.75 (10) n4 = 75000 11 4.43 (10) n5 = 95000 11 3.68 (10) n6 = 115000 11 3.51 (10) n7 = 135000 11 3.23 (10) −2 1.0081 0.9247 n8 = 155000 11 2.95 (10)−2 1.0066 0.9119 n9 = 175000 12 2.94 (10) −2 1.0057 0.9113 n10 = 195000 12 2.80 (10) −2 0.9948 0.8912 n11 = 215000 12 2.71 (10) −2 0.9017 0.8615 n12 = 235000 12 2.59 (10) −2 0.8896 0.8201 n13 = 255000 12 2.58 (10)−2 0.8783 0.8004 n14 = 275000 12 2.35 (10) −2 0.8719 0.7832 −2 0.8602 0.7780 −2 0.8424 0.7469 n15 = 295000 12 2.28 (10) n16 = 315000 12 2.27 (10) n17 = 335000 12 2.16 (10) −2 0.8217 0.7140 n18 = 355000 12 2.14 (10)−2 0.8001 0.7066 n19 = 375000 12 2.09 (10) −2 0.7778 0.6872 n20 = 395000 12 2.06 (10) −2 0.7693 0.6621 Table 4: Truncated empirical values of E kρ (Xn−1 ) − ρekn (Xn−1 )kH , for ρekn = ρekn given in equation (101) (third column), ρekn = ρen defined in equation (102) (fourth column) and ρekn = ρen,a defined in equation (103) (fifth column), based on N = 700 simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and kn = Log(n). The time discretization step is assumed as ht = 0.08. A better performance of our estimator (101) in comparison with estimator (102), formulated in [11], and estimator (103), formulated in [31] (see Example 4 and Remark 4, in p. 291 in [31]) is observed below in Table 4. Note that, in particular, in Example 4 and Remark 4, in [31], p. 291, smaller values of kn than Log(n) are required for a given sample size n, to ensure convergence in quadratic mean, and, in particular, weak-consistency. However, considering a smaller discretization step size, applying truncation at kn = n1/6 , (i.e., α = 6), we obtain (see Table 5), for the same parameter values δ1 = 2.4 and δ2 = 1.1, better results than in Table 4, since a smaller number of coefficients of ρ (parameters) to be estimated is considered in Table 5, from a richer sample information coming from the smaller discretization step size considered. In particular, it can be observed in Table 5 below, a similar performance of the three 32 approaches studied, with a worse performance of the approach presented in [31], for n1 = 15000, since a too large number of coefficients of ρ to be estimated is required, for the smallest sample size. To illustrate this fact, in Table 6, the value kn = ⌈e′ n1/(8δ1 +2) ⌉, e′ = 17 10 proposed, in Example 4 and Remark 4, in [31], p. 291, is considered to compute the truncated empirical values of Ekρ(Xn−1 ) − ρekn (Xn−1 )kH , for ρekn defined in equation (101) (third column), for ρekn = ρen given in equation (102) (fourth column), and for ρekn = ρen,a in equation (103) (fifth column). With this truncation rule, requiring a smaller number of coefficients of ρ to be estimated for a given sample size, a better performance of the estimator proposed in [31] is obtained for the largest sample size tested n20 = 395000, with a similar performance of the three approaches tested, for the rest of sample sizes considered, with such a truncation rule. n kn Our approach n1 = 15000 4 9.88 (10) n2 = 35000 5 9.52 (10) n3 = 55000 6 9.12 (10) n4 = 75000 6 n5 = 95000 Bosq (2000) −2 9.25 (10) −2 9.07 (10) −2 8.92 (10) 8.48 (10) −2 6 7.61 (10)−2 n6 = 115000 6 7.05 (10) n7 = 135000 7 6.99 (10) n8 = 155000 7 6.70 (10) n9 = 175000 7 n10 = 195000 Guillas (2001) −2 0.1059 −2 9.86 (10) −2 9.39 (10) 8.64 (10) −2 8.98 (10) 8.30 (10)−2 8.46 (10)−2 −2 7.96 (10) −2 7.84 (10) −2 7.45 (10) 6.49 (10) −2 7 5.88 (10)−2 n11 = 215000 7 5.63 (10) n12 = 235000 7 5.30 (10) n13 = 255000 7 5.05 (10) n14 = 275000 8 n15 = 295000 −2 −2 −2 −2 8.04 (10) −2 7.82 (10) −2 7.40 (10) 7.03 (10) −2 7.07 (10) 6.74 (10)−2 6.80 (10)−2 −2 6.46 (10) −2 6.28 (10) −2 6.19 (10) 4.88 (10) −2 8 4.58 (10)−2 n16 = 315000 8 4.24 (10) n17 = 335000 8 3.86 (10) n18 = 355000 8 3.70 (10) n19 = 375000 8 n20 = 395000 8 −2 −2 −2 −2 −2 6.57 (10) −2 6.37 (10) −2 6.24 (10) 5.99 (10) −2 6.15 (10) 5.74 (10)−2 6.04 (10)−2 −2 5.52 (10) −2 5.24 (10) −2 5.02 (10) 3.55 (10) −2 3.46 (10)−2 −2 −2 −2 −2 −2 5.93 (10) −2 −2 5.70 (10) −2 5.53 (10) 4.88 (10) −2 5.36 (10) 4.70 (10)−2 5.23 (10)−2 −2 −2 −2 Table 5: Truncated empirical values of E kρ (Xn−1 ) − ρekn (Xn−1 )kH , for ρekn defined in equation (101) (third column), for ρekn = ρen given in equation (102) (fourth column), and for ρekn = ρen,a in equation (103) (fifth column), based on N = 200 (due to high-dimensionality) simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and kn = n1/6 . The time discretization step size is now ht = 0.015. 33 n kn Our approach n1 = 15000 2 6.78 (10) n2 = 35000 2 n3 = 55000 Bosq (2000) −2 8.77 (10) 6.72 (10) −2 2 6.46 (10)−2 n4 = 75000 2 6.24 (10) n5 = 95000 2 5.42 (10) n6 = 115000 2 4.84 (10) n7 = 135000 2 n8 = 155000 Guillas (2001) −2 6.64 (10) 8.61 (10) −2 6.30 (10) 8.48 (10)−2 6.17 (10)−2 −2 8.20 (10) −2 7.84 (10) −2 7.34 (10) 4.27 (10) −2 2 3.64 (10)−2 n9 = 175000 3 3.51 (10) n10 = 195000 3 3.38 (10) n11 = 215000 3 3.16 (10) n12 = 235000 3 n13 = 255000 −2 −2 −2 5.76 (10) −2 5.03 (10) −2 4.56 (10) 6.95 (10) −2 3.94 (10) 6.60 (10)−2 3.65 (10)−2 −2 6.52 (10) −2 6.16 (10) −2 5.78 (10) 2.98 (10) −2 3 2.83 (10)−2 n14 = 275000 3 2.50 (10) n15 = 295000 3 2.23 (10) n16 = 315000 3 2.15 (10) n17 = 335000 3 n18 = 355000 −2 −2 −2 −2 −2 3.42 (10) −2 3.24 (10) −2 2.85 (10) 5.53 (10) −2 2.60 (10) 5.15 (10)−2 2.34 (10)−2 −2 4.85 (10) −2 4.46 (10) −2 4.30 (10) 2.06 (10) −2 3 1.98 (10)−2 n19 = 375000 3 1.89 (10) n20 = 395000 3 1.82 (10) −2 −2 −2 −2 −2 2.05 (10) −2 1.83 (10) −2 1.58 (10) 4.14 (10) −2 1.40 (10) 3.95 (10)−2 1.24 (10)−2 −2 3.77 (10) −2 3.70 (10) −2 −2 −2 −2 −2 1.05 (10) −2 −2 9.93 (10) −3 Table 6: Truncated empirical values of E kρ (Xn−1 ) − ρekn (Xn−1 )kH , for ρekn defined in equation (101) (third column), for ρekn = ρen given in equation (102) (fourth column), and for ρekn = ρen,a in equation (103) (fifth column), based on N = 200 (due to high-dimensionality) simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and kn = ⌈e′ n1/(8δ1 +2) ⌉, e′ = 17 10 . The time discretization step size is now ht = 0.015. 5.2.3 Kernel-based non-parametric and penalized estimation In practice, curves are observed in discrete times, and should be approximated by smooth functions. In [9], the following optimization problem is considered: bi = argmin LX bi X 2 L2 bi (tj ) = Xi (tj ), , X j = 1, . . . , p, i = 0, . . . , n − 1, (104) where L is a linear differential operator of order d. Our interpolation is computed by Matlab smoothingspline method. Non-linear kernel regression is then considered, in terms of the smoothed functional 34 data, solution to (104), as follows: b hn X n n−2 X i=0 = ρbhn (x) = ρbhn (Xn−1 ),  bi+1 K  X  n−2 X i=0   K bi − x X 2 L2 hn bi − x X 2 L2 hn     , (105)   where K is the usual Gaussian kernel, and bi − x X 2 L2 = Z bi (t) − x(t))2 dt, (X i = 0, . . . , n − 2. Alternatively, in [9], prediction, in the context of Functional Autoregressive processes (FAR(1) processes), under the linear assumption on ρ, which is considered to be a compact operator, with kρk < 1, b1 , . . . , X bn , solving the optimization problem is also studied, from smooth data X  p n−1 2 1 X 1 X  b q,l (tj ) + l D2 X b q,l min Xi (tj ) − X i i bi ∈Hq n p X j=1 i=0 2 L2  , (106) where l is the smoothing parameter, Hq is the q-dimensional functional subspace spanned by the leading eigenvectors of the autocovariance operator C associated with its largest eigenvalues. Thus, smoothness and rank constrain is considered in the computation of the solution to the optimization problem (106). Such a solution is obtained by means of functional PCA. The following regularized empirical estimators of C and D are then considered, with inversion of C in the subspace Hq : n−1 X bq,l = 1 bi ⊗ X bi , C X n i=0 b q,l = D n−2 1 X b bi+1 . Xi ⊗ X n − 1 i=0 Thus, the regularized estimator of ρ is given by b−1 , b q,l C ρbq,l = D q,l and the predictor bnq,l = ρbq,l Xn−1 . X Due to computational cost limitations, in Table 7, the following statistics are evaluated to compare the performance of the two above-referred prediction methodologies: EM AE hbn = Xn p 2 1 X b hn (tj ) , Xn (tj ) − X n p j=1 35 (107) q,l EM AEX b = n p 2 1 X bnq,l (tj ) . Xn (tj ) − X p j=1 h n h (108) q,l EM AEX b EM AEXbn,1 EM AEXbn,2 −2 −2 8.85 (10) 8.99 (10) −2 8.43 (10) −2 8.69 (10) −2 −2 n n n −2 n1 = 750 8.57 (10) n2 = 1250 7.67 (10) n3 = 1750 7.15 (10) 7.12 (10) 8.05 (10) n4 = 2250 7.09 (10)−2 6.87 (10)−2 7.59 (10)−2 n5 = 2750 6.87 (10) n6 = 3250 6.52 (10) n7 = 3750 6.20 (10) n8 = 4250 −2 6.67 (10) −2 5.92 (10) −2 5.56 (10) 6.06 (10) −2 n9 = 4750 5.67 (10)−2 n10 = 5250 5.24 (10) n11 = 5750 5.01 (10) n12 = 6250 4.90 (10) n13 = 6750 4.87 (10) −2 −2 −2 7.31 (10) −2 7.28 (10) −2 7.13 (10) 5.32 (10) −2 7.06 (10) 5.25 (10)−2 6.47 (10)−2 −2 5.12 (10) −2 4.82 (10) −2 4.49 (10) −2 3.87 (10) −2 −2 −2 −2 −2 6.08 (10) −2 −2 5.75 (10) −2 5.33 (10) −2 4.97 (10) −2 −2 −2 h q,l Table 7: EM AEXbn,i , i = 1, 2, and EM AEX bn values (see (107) and (108), respectively), with q = 7, n based on N = 200 simulations, for δ1 = 2.4 and δ2 = 1.1, considering now the sample sizes nt = 750 + 500(t − 1), t = 1, . . . , 13, hn,1 = 0.1 and hn,2 = 0.3 It can be observed a similar performance of the kernel-based and penalized FAR(1) predictors, from smooth functional data, which is also comparable, considering one realization, to the performance obtained in Table 6, from the empirical eigenvectors. 5.2.4 Wavelet-based prediction for ARH(1) processes The approach presented in [4] is now studied. Specifically, wavelet-based regularization is applied to obtain smooth estimates of the sample paths. The projection onto the space VJ , generated by translations of the scaling function φJk , k = 0, . . . , 2J − 1, at level J, associated with a multiresolution analysis of H, is first considered. For a given primary resolution level j0 , with j0 < J, the following wavelet decomposition at J − j0 resolution levels can be computed for any projected curve ΦVJ Xi , in the space VJ , for i = 0, . . . , n − 1 : ΦVJ Xi = j0 2X −1 cij0 k φj0 k dijk ψjk , j=j0 k=0 k=0 cij0 k + j −1 J−1 X 2X = hΦVJ Xi , φj0 k iH , 36 dijk = hΦVJ Xi , ψjk iH . (109) For i = 0, . . . , n − 1, the following variational problem is solved to obtain the smooth estimate of the curve Xi : inf i f ∈H  ΦVJ Xi − f i 2 L2 + λ ΦVj⊥ f  ; f ∈H , 2 0 (110) where ΦVj⊥ denotes the orthogonal projection operator of H onto the orhogonal complement of Vj0 , and 0 for i = 0, 1 . . . n − 1, j0 2X −1 i f = j αij0 k φj0 k + −1 ∞ 2X X i βjk ψjk . j=j0 k=0 k=0 Using the equivalent sequence of norms of fractional Sobolev spaces of order s with s > 1/2, on a suitable interval (in our case, s = δ1 ), the minimization of (110) is equivalent to the optimization problem, for i = 0, . . . , n − 1, j0 2X −1 (αij0 k k=0 − cij0 k )2 + j j −1 J−1 X 2X (dijk − j=j0 k=0 i 2 βjk ) + −1 ∞ 2X X i 2 λ2js [βjk ] . (111) j=j0 k=0 The solution to (111) is given by, for i = 0, . . . , n − 1, i αd j0 k i βd j0 k i βd j0 k cij0 k , = k = 0, 1, . . . , 2j0 − 1, dijk = (1 + λ22sj ) = 0, (112) j = j0 , . . . , J − 1, k = 0, 1, . . . , 2j − 1, , j ≥ J, k = 0, 1, . . . , 2j − 1. (113) (114) In particular, in the subsequent computations, we have considered the following value of the smoothing parameter λ (see [3]): bM = λ    M M X X  σj2   Cj  j=1 j=1 n . The following smoothed data are then computed e bM = X i,λ removing the trend e an,λbM = 1 n n−1 X i=0 j0 2X −1 k=0 i φ αd j0 k j0 k + j −1 J−1 X 2X j=j0 k=0 i βd j0 k ψjk , e bM to obtain X i,λ e bM − e Yei,λbM = X an,λbM , i,λ 37 i = 0, . . . , n − 1, (115) for the computation of ρen,λbM (x) = ρen,λbM ,l (x) =  kn  X e kn D e bM C e−1 Π e kn (x) = Π ρen,λbM ,l (x)φeM l , x ∈ H, bM n,λ bM bM λ kn X j=1 e bM C n,λ = n,λ 1 n−1 n−2 X i=0 λ l=1 1 e bM Ye bM , hφeM j , xiH Yi,λ ,j i+1,λ ,l e Cn,λbM ,j n−1 1Xe Y bM ⊗ Yei,λbM , n i=0 i,λ (116) (117) E D E D e bM = C e bM φb bM . Table 8 displays the empirical truncated where Yei,λbM ,j = Yei,λbM , φbj,λbM , and C n,λ ,j n,λ j,λ approximation of Eke ρn,λbM (Xn−1 )−ρ(Xn−1 )kH , applying our approach and the above-described approach presented in [4], for kni = n1/αi , i = 1, 2, with α1 = 6, according to our Assumption A3, and α2 > 4δ1 , according to H4 : nCk4n → ∞ in p. 149 in [4]. In particular, we have considered δ1 = 2.4, and α2 = 10. From the results displayed in Table 8, it can be observed a similar performance for the two truncation rules implemented, and approaches compared, for the small sample sizes tested. A similar performance is also displayed by the approaches presented in [9], for such small sample sizes (see Table 7). n kn,1 O.A. [4] kn,2 O.A. [4] n1 = 750 3 0.0702 0.0911 1 0.0636 0.0589 n2 = 1250 3 0.0550 0.0873 2 0.0509 0.0429 n3 = 1750 3 0.0473 0.0803 2 0.0455 0.0394 n4 = 2250 3 0.0414 0.0795 2 0.0409 0.0377 n5 = 2750 3 0.0365 0.0734 2 0.0355 0.0349 n6 = 3250 3 0.0343 0.0719 2 0.0333 0.0307 n7 = 3750 3 0.0330 0.0675 2 0.0325 0.0293 n8 = 4250 4 0.0328 0.0672 2 0.0313 0.0286 n9 = 4750 4 0.0317 0.0664 2 0.0309 0.0256 n10 = 5250 4 0.0309 0.0636 2 0.0276 0.0229 n11 = 5750 4 0.0298 0.0598 2 0.0203 0.0196 n12 = 6250 4 0.0283 0.0583 2 0.0166 0.0153 n13 = 6750 4 0.0276 0.0555 2 0.0148 0.0137 Table 8: Truncated empirical values of Ekρ(Xn−1 ) − ρekn (Xn−1 )kH , with ρekn defined in equation (101), and of Eke ρn,λbM (Xn−1 ) − ρ(Xn−1 )kH ,, based on N = 200 simulations, for δ1 = 2.4 and δ2 = 1.1, bM , M = 50, and the corresponding considering the sample sizes nt = 750+500(t−1), t = 1, . . . , 13, using λ 1/αi kn,i = n , for α1 = 6 and α2 = 10. Here, O.A. means Our Approach and [4] means The approach presented in [4] 38 5.2.5 Non-diagonal autocorrelation operator The methodology proposed can still be applied in the case of a non-diagonal autocorrelation operator ρ, with respect to the autocovariance eigenvector system (Cj , j ≥ 1), with coefficients close to zero outside of the main diagonal. This fact is illustrated below in Table 9, where the Gaussian ARH(1) process generated has autocorrelation operator ρ, with coefficients ρj,h with respect to the basis (φj ⊗ φh , j, h ≥ 1) , given by ρ2j,j = ρ2j,j+a =   −δ2 λj (−∆)(a,b)     , λ1 (−∆)(a,b) − ǫ  0.01 , a = 1, 2, 3, 4, 5, 5a2 ρ2j+a,j = (118) 0.02 , a = 1, 2, 3, 4, 5, 5a2 (119) where ρ2j,h = 0 when h 6= j − 1, j, j + 1, and ρ2j,j+a = ρ2j+a,j = 0 when a ≥ 6. The coefficients of the auto-covariance operator Rε of the innovation process ε, with respect to the mentioned basis (φj ⊗ φh , j, h ≥ 1) , are defined as follows: 2 σj,j = 2 σj,j+a =  Cj 1 − ρ2j,j , (120) 0.015 , a = 1, 2, 3, 4, 5, 5a2 2 σj+a,j = 0.01 , a = 1, 2, 3, 4, 5, 5a2 (121) 2 2 2 where σj,h = 0 when h 6= j − 1, j, j + 1, and σj,j+a = σj+a,j = 0 when a ≥ 6. In Table 9, we have considered kn = ⌈n1/α ⌉, with α = 6, δ1 = 2.4, δ2 = 1.1 and time discretization step ht = 0.015. As expected, it can be observed a better performance of the approaches presented in [11] and [31] against our approach, in terms of the theoretical eigenvectors, for this non-diagonal autocorrelation operator case. Although the performance of our approach is not too bad for the announced case where the coefficients of ρ, with respect to (φj ⊗ φh , j, h ≥ 1), j 6= h, are close to zero. Hence, in the general non-diagonal autocorrelation operator case, our approach can be applied, when smoothing of data has been previously implemented, considering, for example, suitable penalized wavelet nonparametric regression (see, for instance, [3] and [4]), leading to a sparse, almost diagonal, representation of bn and D b n , in terms of suitable wavelet bases (see comments given in the next section). C 39 n kn Our approach Bosq (2000) n1 = 15000 4 0.5812 8.94 (10) n2 = 35000 5 0.5604 n3 = 55000 6 n4 = 75000 Guillas (2001) −2 0.1055 7.05 (10) −2 9.49 (10) 0.5480 6.67 (10)−2 9.14 (10)−2 6 0.5322 6.24 (10) n5 = 95000 6 0.5115 5.89 (10) n6 = 115000 6 0.4975 5.62 (10) n7 = 135000 7 0.4946 n8 = 155000 7 n9 = 175000 −2 −2 8.85 (10) −2 −2 8.47 (10) −2 8.04 (10) 5.57 (10) −2 7.66 (10) 0.4810 5.28 (10)−2 7.24 (10)−2 7 0.4735 5.01 (10) n10 = 195000 7 0.4608 4.90 (10) n11 = 215000 7 0.4424 4.69 (10) n12 = 235000 7 0.4250 n13 = 255000 7 n14 = 275000 −2 −2 −2 −2 6.78 (10) −2 −2 6.30 (10) −2 6.07 (10) 4.45 (10) −2 5.82 (10) 0.4106 4.25 (10)−2 5.54 (10)−2 8 0.4080 4.14 (10) n15 = 295000 8 0.3808 4.09 (10) n16 = 315000 8 0.3604 3.85 (10) n17 = 335000 8 0.3489 n18 = 355000 8 n19 = 375000 n20 = 395000 −2 −2 −2 −2 5.16 (10) −2 −2 4.81 (10) −2 4.53 (10) 3.56 (10) −2 4.29 (10) 0.3302 3.29 (10)−2 3.98 (10)−2 8 0.3204 2.90 (10) 8 0.3177 2.62 (10) −2 −2 −2 −2 3.75 (10) −2 −2 3.44 (10) −2 D D Table 9: Truncated empirical values of E ρ(Xn−1 ) − ρbN bN given in equations kn (Xn−1 ) H , for ρ kn (25)–(26) (third column), in equations (95)–(96) (fourth column), and in equations (97)–(98) (fifth column), from the non-diagonal data generated by equations (118)-(121), based on N = 200 (due to high-dimensionality) simulations, for δ1 = 2.4 and δ2 = 1.1, considering the sample sizes nt = 15000 + 20000(t − 1), t = 1, . . . , 20, and the corresponding kn = ⌈n1/α ⌉, α = 6 values (truncation criteria from Assumption A3), assuming that (φj , j ≥ 1) are known. The time discretization step is assumed as ht = 0.015. 6 Final comments. The present paper proves that, under Assumptions A1–A4, the formulated componentwise estimator ρbkn converges to ρ, in the space L2S(H) (Ω, A, P ). Its associated ARH(1) plug-in predictor converges, in the space L1H (Ω, A, P ), to the predictor E[Xn |Xn−1 ] = ρ(Xn−1 ). Therefore, both, componentwise functional parameter estimator and plug-in predictor, are consistent. In the numerical examples considered, for the special family of covariance operators studied, and for 40 the particular selection of kn made, the empirical truncated functional mean-square errors of ρbkn display a rate of convergence to zero faster than (1/n)3/4 , and slower than (1/n), for the large sample sizes bn present a decay studied. Furthermore, the empirical truncated functional mean absolute errors of X velocity faster than (1/n)3/8 (or, as displayed, faster than (1/n)3/9 ), and slower than (1/n)1/2 , for the large sample sizes studied. In practice, our approach can be implemented when the eigenvectors of the autocovariance operator C are known. In the situation pointed out in Remark 1, where ρ and C share the same eigenvector system, we refer to the case of physical phenomena, whose dynamics is described from a random initial condition satisfying a given stochastic differential equation, in the mean-square sense, with driven process defined by a white noise process in time (e.g., Gaussian white noise process). In this case, the system of eigenvectors of the auto-covariance operator is known, since coincide with the eigenvectors of the differential operator defining such a stochastic differential equation. Otherwise, as illustrated in the simulation study undertaken, they must be approximated by some empirical eigenvectors (e.g., the eigenvectors of the empirical autocovariance operator). We comment here some alternatives to obtain a suitable basis of empirical eigenvectors satisfying Assumptions A1-A2. Since wavelet bases are well suited for sparse representation of functions, recent work has considered combining them with sparsityinducing penalties, both for semiparametric regression ([57]), and for regression with functional or kernel predictors (see [57], [58] and [59], among others). The latter papers focused on l1 penalization, also known as the lasso (see [54]), in the wavelet domain. Alternatives to the lasso include the SCAD penalty (see [21]), and the adaptive lasso (see, for example, [60]). The l1 penalty in the elastic net criterion has the effect of shrinking small coefficients to zero. This can be interpreted as imposing a prior that favors a sparse estimate. The above mentioned smoothing techniques, based on wavelets, can be applied b1 , . . . X bn of the functional data X1 , . . . , Xn , whose empirical to obtain a smooth sparse representation X auto-covariance operator and cross-covariance operator n−1 X bi ⊗ X bi bn = 1 X C n i=0 bn = D n−2 1 X b bi+1 Xi ⊗ X n − 1 i=0 admits a diagonal representation in terms of wavelets. On the other hand, estimating a covariance matrix is an important task in applications where the number of variables is larger than the number of observations. In the literature, shrinkage approaches for estimating a high-dimensional covariance matrix are employed to circumvent the limitations of the sample covariance matrix. Particularly, a new family of nonparametric Stein-type shrinkage covariance estimators is proposed in [55] (see also references therein), whose members are written as a convex linear 41 combination of the sample covariance matrix and of a predefined invertible diagonal target matrix. These results can be applied to our framework, considering the shrinkage estimator of the auto-covariance C and cross-covariance operator D, with respect to a common suitable wavelet function basis, which can lead to a empirical diagonal representation of both operators, in terms of such wavelet basis. Acknowledgments This work has been supported in part by project MTM2015–71839–P (co-funded by Feder funds), of the DGI, MINECO, Spain. References [1] G. Aneiros-Pérez and P. Vieu, Semi-functional partial linear regression, Stat. Probab. Letters 76, 2006, pp. 1102–1110. [2] G. Aneiros-Pérez and P. Vieu, Nonparametric time series prediction: A semi-functional partial linear modeling, J. Multivariate Anal. 99, 2008, pp. 834–857. [3] C. Angelini, D. De Canditiis and F. Leblanc, Wavelet regression estimation in nonparametric mixed effect models, J. Multivariate Anal. 85, 2003, pp. 267–291. [4] A. Antoniadis and T. Sapatinas, Wavelet methods for continuous-time prediction using Hilbert-valued autoregressive processes, J. Multivariate Anal. 87, 2003, pp. 133–158. [5] M. S. Bartlett, On the theoretical specification and sampling properties of autocorrelated time series, Supplement to the Journal of the Royal Statistical Society 8, 1946, pp. 27–41. [6] N. Bensmain and T. Mourid, Estimateur ”sieve” de l’opérateur d’un processus ARH(1), C. R. Acad. Sci. Paris Sér. I Math. 332, 2001, pp. 1015–1018. [7] P. C. Besse and H. Cardot, Approximation spline de la prévision d’un processus fonctionnel autorégressif d’ordre 1, Canad. J. Statist. 24, 1996, pp. 467–487. [8] P. C. Besse, H. Cardot and F. Ferraty, Simultaneous non-parametric regressions of unbalanced longitudinal data, Comp. Stat. Data Anal. 24, 1997, pp. 255–270. [9] P. C. Besse, H. Cardot and D. B. Stephenson, Autoregressive Forecasting of Some Functional Climatic Variations, Scand. J. Statist. 27, 2000, pp. 673–687. [10] E. G. Bongiorno, A. Goia, E. Salinelli and P. Vieu, Contributions in infinite-dimensional statistics and related topics, Societá Editrice Esculapio, Bologna 2014. 42 [11] D. Bosq, Linear Processes in Function Spaces, Springer-Verlag, New York 2000. [12] D. Bosq, General linear processes in Hilbert spaces and prediction, J. Stat. Plann. Inference 137, 2007, pp. 879–894. [13] D. Bosq and D. Blanke, Inference and Predictions in Large Dimensions, John Wiley, Chichester 2007. [14] J. Chen, D. Lin and H. Hochner, Semiparametric maximum likelihood methods for analyzing genetic and environmental effects with case-control motherchild pair data, Biometrics 68, 2012, pp. 869–877. [15] A. Cuevas, A partial overview of the theory of statistics with functional data, J. Stat. Plann. Infer. 147, 2014, pp. 1–23. [16] J. Cugliari, Prévision non paramétrique de processus à valeurs fonctionnelles. Application à la consommation d’électricité, PhD thesis, University of Paris-Sud 11, Paris 2011. [17] J. Damon and S. Guillas, Estimation and simulation of autoregressive processes with exogenous variables, Stat. Inference 8, 2005, pp. 185–204. [18] R. Dautray and J. -L. Lions, Mathematical Analysis and Numerical Methods for Science and Technology Volume 3: Spectral Theory and Applications, Springer, New York 1990. [19] J. Dedecker and F. Merlevede, The conditional central limit theorem in Hilbert spaces, Stochastic processes and their applications 108, 2003, pp. 229–262. [20] H. Dehling and O. S. Sharipov, Estimation of mean and covariance operator for Banach space valued autoregressive processes with dependent innovations, Stat. Inference Stoch. Process. 8, 2005, pp. 137–149. [21] J. Fan and R. Li, Variable selection via nonconcave penalized likelihood and its oracle properties, J. Amer. Statist. Assoc. 96, 2001, pp. 1348–1360. [22] M. Febrero-Bande and W. Gonzalez-Manteiga, Generalized additive models for functional data, Test 22, 2013, pp. 278–292. [23] F. Ferraty, A. Goia, E. Salinelli and P. Vieu, Functional projection pursuit regression, Test 22, 2013, pp. 293–320. [24] F. Ferraty, I. V. Keilegom and P. Vieu, Regression when both response and predictor are functions, J. Multivariate Anal. 109, 2012, pp. 10–28. [25] F. Ferraty and P. Vieu, Nonparametric functional data analysis. Springer Series in Statistics, Springer, New York 2006. 43 [26] F. Ferraty and P. Vieu, Additive prediction and boosting for functional data, Comp. Stat. Data Anal. 53, 2009, pp. 1400–1413. [27] D. S. Grebenkov and B. T. Nguyen, Geometrical structure of Laplacian eigenfunctions, SIAM Review 55, 2013, pp. 601–667. [28] U. Grenander, Abstract Inference, Wiley, New York 1981. [29] A. Goia and P. Vieu, An introduction to recent advances in high/infinite dimensional statistics, J. Multivariate Anal. 146, 2016, pp. 1–6. [30] S. Guillas, Noncausality and functional discretization, limit theorems for an ARHX(1) process, C. R. Acad. Sci. Paris Sér. I Math. 331, 2000, pp. 91–94. [31] S. Guillas, Rates of convergence of autocorrelation estimates for autoregressive Hilbertian processes, Stat. Prob. Lett. 55, 2001, pp. 281–291. [32] J. Gurland, Quadratic forms in normally distributed random variables, Sankhya 17, 1956, pp. 37–50. [33] J. D. Hamilton, Time Series Analysis, Princeton University Press, Princenton 1994. [34] L. Horváth and P. Kokoszka, Inference for Functional Data with Applications, in: Springer Series in Statistics, Springer, New York 2012. [35] T. Hsing and R. Eubank, Theoretical Foundations of Functional Data Analysis, with an Introduction to Linear Operators, Wiley Series in Probability and Statistics, John Wiley & Sons, United Kingdom 2015. [36] V. Kargin and A. Onatski, Curve forecasting by functional autoregression, J. Multivariate Anal. 99, 2008, pp. 2508–2526. [37] S. Mallat, A Wavelet Tour of Signal Processing: The Sparse Way, 3rd ed. Academic Press, Burlington, MA 2009. [38] J. -M. Marion and B. Pumo, Comparison of ARH(1) and ARHD(1) models on physiological data, Ann. I.S.U.P. 48, 2004, pp. 29–38. [39] A. Mas, Normalité asymptotique de l’estimateur empirique de l’opérateur d’autocorrélation d’un processus ARH(1), C. R. Acad. Sci. Paris Sér. I Math. 329, 1999, pp. 899–902. [40] A. Mas, Consistance du prédicteur dans le modèle ARH(1): le cas compact, Ann. I.S.U.P. 48, 2004, pp. 39–48. 44 [41] A. Mas, Weak-convergence in the functional autoregressive model, J. Multivariate Anal. 98, 2007, pp. 1231–1261. [42] A. Mas and L. Menneteau, Large and moderate deviations for infinite dimensional autoregressive processes, J. Multivariate Anal. 87, 2003, pp. 241–260. [43] L. Menneteau, Some laws of the iterated logarithm in Hilbertian autoregressive models, J. Multivariate Anal. 92, 2005, pp. 405–425. [44] F. Merlevede, Lois des grands nombres et loi du logarithme itéré compacte pour des processus linéaires à valeurs dans un espace de Banach de type 2, C. R. Acad. Sci. Paris Sér. I Math. 323, 1996, pp. 521–524. [45] F. Merlevede, Résultats de convergence presque sûre pour l’estimation et la prévision des processus linéaires hilbertiens, C. R. Acad. Sci. Paris Sér. I Math. 324, 1997, pp. 573–576. [46] T. Mourid, Processus autorégressifs banachiques d’ordre supérieur, C. R. Acad. Sci. Paris Sér. I Math. 317, 1993, pp. 1167–1172. [47] T. Mourid, Processus autorégressifs hilbertiens à coefficients aléatoires, Ann. I.S.U.P. 48, 2004, pp. 79–85. [48] G. P. Nason, Wavelet methods in Statistics with R, Springer 2008. [49] R. T. Ogden, Essential Wavelets for Statistical Applications and Data Analysis, Birkhauser, Boston, MA 1997. [50] B. Pumo, Estimation et prévision de processus autorégressifs fonctionnels, PhD thesis, University of Paris 6, Paris 1992. [51] B. Pumo, Prediction of continuous time processes by C[0,1] -valued autoregressive process, Stat. Inference Stoch. Process. 1, 1998, pp. 297–309. [52] J. O. Ramsay and B. W. Silverman, Functional data analysis, second ed. Springer Series in Statistics. Springer, New York 2005. [53] M. D. Ruiz-Medina, Spatial functional prediction from spatial autorregresive Hilbertian processes, Environmetrics 23, 2012, pp. 119–128. [54] R. Tibshirani, Regression shrinkage and selection via the lasso, J. Roy. Statist. Soc. Ser. B, 58, pp. 267–288. [55] A. Touloumis, Nonparametric Stein-type Shrinkage Covariance Matrix Estimators in HighDimensional Settings, Comp. Stat. Data Anal. 83, 2015, pp. 251–261. 45 [56] B. Vidakovic, Nonlinear wavelet shrinkage with Bayes rules and Bayes factors, J. Amer. Statist. Assoc. 93, 1998, pp. 173–179. [57] M. P. Wand and J. T. Ormerod, Penalized wavelets: Embedding wavelets into semiparametric regression, Electron. J. Stat. 5, 2011, pp. 1654–1717. [58] Y. Zhao, H. Chen and R. T. Ogden, Wavelet-based weighted LASSO and screening approaches in functional linear regression, J. Comput. Graph. Statist., 2015, to appear. [59] Y. Zhao, R. T. Ogden and P. T. Reiss, Wavelet-based lasso in functional linear regression, J. Comput. Graph. Statist. 21, 2012, pp. 600–617. [60] H. Zou, The adaptive lasso and its oracle properties, J. Amer. Statist. Assoc. 101, 2006, pp. 1418– 1429. 46
10math.ST
arXiv:cs/0603028v1 [cs.PL] 8 Mar 2006 On the tree-transformation power of XSLT Wim Janssen Alexandr Korlyukovd Jan Van den Bussche∗ Abstract XSLT is a standard rule-based programming language for expressing transformations of XML data. The language is currently in transition from version 1.0 to 2.0. In order to understand the computational consequences of this transition, we restrict XSLT to its pure tree-transformation capabilities. Under this focus, we observe that XSLT 1.0 was not yet a computationally complete tree-transformation language: every 1.0 program can be implemented in exponential time. A crucial new feature of version 2.0, however, which allows node sets over temporary trees, yields completeness. We provide a formal operational semantics for XSLT programs, and establish confluence for this semantics. 1 Introduction XSLT is a powerful rule-based programming language, relatively widely used, for expressing transformations of XML data, and is developed by the W3C (World Wide Web Consortium) [2, 8, 17]. An XSLT program is run on an XML document as input, and produces another XML document as output. (XSLT programs are actually called “stylesheets”, as one of their main uses is to produce stylised renderings of the input data, but we will continue to call them programs here.) The language is actually in a transition period: the current standard, version 1.0, is being replaced by version 2.0. It is important to understand what the new features of 2.0 really add. In the present paper, we focus on the tree-transformation capabilities of XSLT. Indeed, XML documents are essentially ordered, node-labeled trees. ∗ Wim Janssen and Jan Van den Bussche are with the University of Hasselt, Belgium. Alexandr Korlyukov, who was with Grodno State University, Belarus, sadly passed away shortly after we agreed to write a joint paper. 1 From the perspective of tree-transformation capabilities, the most important new feature is that of “node sets over temporary trees”. We will show that this feature turns XSLT into a computationally complete treetransformation language. Indeed, as we will also show, XSLT 1.0 was not yet complete in this sense. Specifically, any 1.0 program can be implemented within exponential time in the worst case. Some programs actually express PSPACE-complete problems, because we will show that any linear-space turing machine can be simulated by an XSLT 1.0 program. To put our results in context, we note that the designers of XSLT will most probably regard the incompleteness of their language as a feature, rather than a defect. Indeed, in the requirements document for 2.0, turning XSLT into a general-purpose programming language is explicitly stated as a “non-goal” [3]. In that respect, our result on the completeness of 2.0 exposes (albeit in a narrow sense) a failure to meet the requirements! At this point we should be a little clearer on what we mean by “focusing on the tree-transformation capabilities of XSLT”. As already mentioned, XML documents are essentially trees where the nodes are labeled by arbitrary strings. We make abstraction of this string content by regarding the node labels as coming from some finite alphabet. Accordingly, we strip XSLT of its string-manipulation functions, and restrict its arithmetic to arbitrary polynomial-time functions on counters, i.e., integers in the range {1, 2, . . . , n} with n the number of nodes in the input tree. It is, incidentally, quite easy to see that XSLT 1.0 without these restrictions can express all computable functions on strings (or integers). Indeed, rules in XSLT can be called recursively, and we all know that arbitrary recursion over the strings or the integers gives us completeness. We will provide a formal operational semantics for the substantial fragment of XSLT discussed in this paper. A formal semantics has not been available, although the W3C specifications represent a fine effort in defining it informally. Of course we have tried to make our formalisation faithful to those specifications. Our semantics does not impose an order on operations when there is no need to, and as a result the resulting transition relation is non-deterministic. We establish, however, a confluence property, so that any two terminating runs on the same input yield the same final result. Confluence was not yet proven rigorously for XSLT, and can help in providing a formal justification for alternative processing strategies that XSLT implementations may follow for the sake of optimisation. 2 a b c a c b Figure 1: A data tree. 2 2.1 Data model Data trees Let Σ be a finite alphabet, including the special label doc. By a data tree we simply mean a finite ordered tree, in which the nodes are labeled by elements of Σ. Up to isomorphism, we can describe a data tree t by a string string (t) over the alphabet Σ extended with the two symbols { and }: if the root of t is labeled a and its sequence of top-level subtrees is t1 , . . . , tk , then string (t) = a{string (t1 ) . . . string(tk )} Thus, for the data tree shown in Figure 1, the string representation equals a{b{}c{a{}b{}}c{}}. A data forest is a finite sequence of data trees. Forests arise naturally in XSLT, and for uniformity reasons we need to be able to present them as data trees. This can easily be done as follows: Definition 1 (maketree). Let F be a data forest. Then maketree(F ) is the data tree obtained by affixing a root node on top of F , and labeling this root node with doc.1 2.2 Stores and values Let T be a supply of tree variables, including the special tree variable Input. We define: 1 The root node added by maketree models what is called the “document root” in the XPath data model [6], although we do not model it entirely faithfully, as we do not formally distinguish “document nodes” from “element nodes”. This is only for simplicity; it is no problem to incorporate this distinction in our formalism, and our technical results do not depend on our simplification. 3 Definition 2. A store is a finite set S of pairs of the form (x, t), where x ∈ T and t is a data tree, such that (1) Input occurs in S; (2) no tree variable occurs twice in S; and (3) all data trees occurring in S have disjoint sets of nodes. The tree assigned to Input is called the input tree; the other trees are called the temporary trees. Definition 3. A value over S is a finite sequence consisting of nodes from trees in S, and counters over S. Here, a counter over S is an integer in the range {1, 2, . . . , n}, where n is the total number of nodes in S. Values as defined above formalise the kind of values that can be returned by XPath expressions. XPath [1, 5] is a language that is used as a sublanguage in XSLT for the purpose of selecting nodes from trees. But XPath expressions can also return numbers, which is useful as an aid in making node selections (e.g., the i-th child of a node, or the i-th node of the tree in preorder). We limit these numbers to counters, in order to concentrate on pure tree transformations. 3 XPath abstraction Since the language XPath is already well understood [27, 13, 7, 14], and its study in itself is not our focus, we will work with an abstraction of XPath, which we denote by X . For our purposes it will suffice to divide the X -expressions in only two different types, which we denote by nodes and mixed. A value is of type nodes if it consists exclusively of nodes; otherwise it is of type mixed. In order to define the semantics of X , we need some definitions, which reflect those from the XPath specification. Let V be a supply of value variables, disjoint from T . Definition 4. An environment over S is a finite set E of pairs of the form (x, v), where x ∈ V and v is a value over S, such that no value variable occurs twice in E. Definition 5. A context triple over S is a triple (z, i, k) where z is a node from S or a counter over S, and i and k are counters over S such that i 6 k. We call z the context item, i the context position, and k the context size. Definition 6. A context is a triple (S, E, c) where S is a store, E is an environment over S, and c is a context triple over S. 4 If we denote the universe of all possible contexts by Contexts, the semantics of X is now given by a partial function eval on X × Contexts, such that whenever defined, eval (e, C) is a value over C’s store, and this value has the same type as e. Remark 3.1. A static type system, based on XML Schema [4, 25], can be put on contexts to ensure definedness of expressions [7], but we omit that as safety is not the focus of the present paper. In general we do not assume much from X , except for the availability of the following basic expressions, also present in real XPath: ˆ An expression ‘/*’, such that eval (/*, C) equals the root node of the input tree in C’s store. ˆ An expression ‘child::*’, such that eval (child::*, C) is defined whenever C’s context item is a node n, and then equals the list of children of n. 4 Syntax In this section, we define the syntax of a sizeable fragment of XSLT 2.0. The reader familiar with XSLT will notice that we have simplified and cleaned up the language in a few places. These modifications are only for the sake of simplicity of exposition, and our technical results do not depend on them. We discuss our deviations from the real language further in Section 5.5. Also, the concrete syntax of real XSLT is XML-based and rather unwieldy. For the sake of presentation, we therefore give a syntax of our own, which is non-XML, but otherwise follows the same lines as the real syntax. The grammar is shown in Figure 2. The only typing condition we need is that in an apply-statement or in a vcopy-statement, expr must be of type nodes. Also, no two different rules can have the same name, and the name in a call-statement must be the name of some rule. We will often identify a template M with its syntax tree. This tree consists of all occurrences of statements in M and represents how they follow each other and how they are nested in each other; we omit the formal definition. Observe that only cons-, foreach-, tree-, and if-statements can have children. Note also that, since a template is a sequence of statements, the syntax “tree” is actually a forest, i.e., a sequence of trees, but we will still call it a tree. 5 Program → Rule* Rule → template name match expr (mode name)? { Template } Template → Statement* Statement → cons label { Template } | apply expr (mode name)? | call name | foreach expr { Template } | val value variable expr | tree tree variable { Template } | vcopy expr | tcopy tree variable | if expr { Template } else { Template } Figure 2: Our syntax. The terminal symbol expr stands for an X expression; label stands for an element of our alphabet Σ; value variable and tree variable stand for elements of V and T , respectively; and name is self-explanatory. As usual we use * to denote repetition, ? to denote optionality, and use ( and ) for lexical grouping. Variable definitions happen through val- and tree-statements. We will need the notion of a statement being in the scope of some variable definition; this is defined in the standard way as follows. Definition 7. Let M be a template, and let S1 and S2 be two statements occurring in M . We say that S2 is in the scope of S1 if S2 is a right sibling of S1 in the syntax tree of M , or a descendant of such a right sibling. An illustration is in Figure 3. One final definition: Definition 8. Template M ′ is called a subtemplate of template M if M ′ consists of a sequence of consecutive sibling statements occurring in M . 5 Operational semantics Fix a program P and a data tree t. We will describe the semantics of P on input t as a rewrite relation ⇒ among configurations. Definition 9. A configuration consists of a template M together with a partial function that assigns a context to some of the statements of M (more 6 Figure 3: Depiction of a syntax tree. The nodes in the scope of the black node are those that are striped. precisely, the nodes of its syntax tree). The statements that have a context are called active; we require that the descendants of an inactive node are inactive too. Cons-statements are never active. We use the following notation concerning configurations: ˆ S ✁ γ denotes that S is a statement occurring in the template of configuration γ. ˆ If S ✁ γ, then γ(S) = C denotes that S is active in γ, having context C. ˆ If M is a subtemplate of a configuration γ, then M itself can be taken as a configuration by inheriting all the context assignments done by γ. We call such a configuration a subconfiguration. ˆ If M is a subconfiguration of γ, and γ ′ is another configuration, then γ(M ← γ ′ ) denotes the configuration obtained from γ by replacing M by γ ′ . The initial configuration is defined as follows. Definition 10. 1. The initial context equals  {(Input, t)}, ∅, (r, 1, 1) where r is the root of t. 2. The initial template equals the single statement ‘apply /*’. 3. The initial configuration consists of the initial template, whose single statement is assigned the initial context. 7 ˆ S = if e { Mtrue } else { Mfalse } ✁ γ γ(S) = C eval (e, C) 6= ∅ if γ ⇒ γ(S ← Mtrue ) ˆ S = if e { Mtrue } else { Mfalse } ✁ γ γ(S) = C eval (e, C) = ∅ if γ ⇒ γ(S ← Mfalse) Figure 4: Semantics of if-statements; ∅ denotes the empty sequence. The goal will be to rewrite the initial configuration into a terminal template; this is a configuration consisting exclusively of cons-statements. Observe that terminal templates can be viewed as data forests; indeed, simply by removing the cons’s from a terminal template, we obtain the string representation of a data forest. For the rewrite relation ⇒ we are going to define, terminal configurations will be normal forms, i.e., cannot be rewritten further. If, for two configurations γ0 and γ1 , we have γ0 ⇒ · · · ⇒ γ1 and γ1 is a normal form, we denote that by γ0 ⇒! γ1 . The relation ⇒ will be defined in such a way that if γ0 is the initial configuration and γ0 ⇒! γ1 , then γ1 will be terminal. Moreover, we will prove in Theorem 1 that each configuration γ0 has at most one such normal form γ1 . We thus define: Definition 11. Given P and t, let γ0 be the initial configuration and let γ0 ⇒! γ1 . Then the final result tree of applying P to t is defined to be maketree(γ1 ). In the above definition, we can indeed apply maketree, defined on data forests (Definition 1), to γ1 , since γ1 is terminal and we just observed that terminal templates describe forests. Note that the final result tree is only determined up to isomorphism. 5.1 If-statements If-statements are the only ones that generate control flow, so we treat them if by a separate rewrite relation ⇒, defined by the semantic rules shown in Figure 4. 8 if It is not difficult to show that ⇒ is terminating and locally confluent, whence confluent, so that every configuration has a unique normal form if w.r.t. ⇒ [26]. This normal form no longer contains any active if-statements. (Quite obviously, the most efficient way to get to this normal form is to work if out the if-statements top-down.) We write γ ⇒ ! γ ′ to denote that γ ′ is the if normal form of γ w.r.t. ⇒. Remark 5.1. Our main rewrite relation ⇒ is not terminating in general. The reason why we treat if-statements separately is to avoid nonsensical rewritings such as where we execute a non-terminating statement in the else-branch of an if-statement whose test evaluates to true. 5.2 Apply-, call-, and foreach-statements For the semantics of apply-statements, we need the following definitions. Definition 12 (ruletoapply). Let C be a context, let n be a node, and let m be a name. Then ruletoapply (C, n) (respectively, ruletoapply (C, n, m)) equals the template belonging to the first rule in P (respectively, with mode name equal to m) whose expr satisfies n ∈ eval (expr, C). If no such rule exists, both ruletoapply (C, n) and ruletoapply (C, n, m) default to the single-statement template ‘apply child::*’. Definition 13 (init). Let M be a template, and let C be a context. Then init(M, C) equals the configuration obtained from M by assigning context C to every statement in M , except for all statements in the scope of any variable definition, and all statements that are below a foreach-statement; all those statements remain inactive. We are now ready for the semantic rule for apply-statements, shown in Figure 5. We omit the rule for an apply-statement with a mode m: the only difference with the rule shown is that we use ruletoapply (ni , C, m). The semantic rule for foreach-statements is very similar to that for applystatements, and is also shown in Figure 5. For call-statements, we need the following definition. Definition 14 (rulewithname). For any name, let rulewithname (name) denote the template of the rule in P with that name. The semantic rule for a call-statement is then again shown in Figure 5. 9 ˆ S = apply e ✁ γ γ(S) = C = (S, E, c) eval (e, C) = (n1 , . . . , nk ) ruletoapply (ni , C) = Mi for i = 1, . . . , k init(Mi , (S, E, (ni , i, k))) = γi for i = 1, . . . , k if γ(S ← γ1 . . . γk ) ⇒ ! γ ′ γ ⇒ γ′ ˆ S = foreach e { M } ✁ γ γ(S) = C = (S, E, c) eval (e, C) = (z1 , . . . , zk ) init(M, (S, E, (zi , i, k))) = γi γ(S ← γ1 . . . γk ) γ ⇒ γ′ if ⇒! for i = 1, . . . , k γ′ ˆ S = call name ✁ γ γ(S) = C rulewithname (name) = M init(M, C) = γ1 if γ(S ← γ1 ) ⇒ ! γ ′ γ ⇒ γ′ Figure 5: Semantics of apply-, call-, and foreach-statements. 10 ˆ S = val x e ✁ γ γ(S) = C C(x : eval(e, C)) = C ′ updateset (γ, S) = M init(M, C ′ ) = γ1 if γ(SM ← γ1 ) ⇒ ! γ ′ γ ⇒ γ′ ˆ S = tree y { M } ✁ γ M is terminal γ(S) = C C(y : maketree (M )) = C ′ updateset (γ, S) = M ′ init(M ′ , C ′ ) = γ3 if γ(SM ′ ← γ3 ) ⇒ ! γ ′ γ ⇒ γ′ Figure 6: Semantics of variable definitions. 5.3 Variable definitions For a context C = (S, E, c), a value variable x, a value v, a tree variable y, and a data tree t, we denote by ˆ C(x : v) the context obtained from C by updating E with the pair (x, v); and by ˆ C(y : t) the context obtained from C by updating S with the pair (y, t). We also define: Definition 15 (updateset). Let γ be a configuration and let S ✁ γ. Let M be the template underlying γ. Let S1 , . . . , Sk be the right siblings of S in M , in that order. Let j be the smallest index for which Sj is active in γ; if all the Si are inactive, put j = k + 1. Then the template S1 . . . Sj−1 is denoted by updateset (γ, S). If j = 1 then this is the empty template. We are now ready for the semantic rules for variable definitions, shown in Figure 6. 11 c n4 a b n1 c n2 c a b a n3 b  ttemp forest ((n4 , n1 , n2 , n3 , n1 ), S) = cons cons cons cons cons c b c a b { cons a {} cons b {} } {} { cons a {} cons b {} } {} {} Figure 7: Illustration of Definitions 16 and 17. 5.4 Copy-statements The following definitions are illustrated in Figure 7. Definition 16 (forest). Let S be a store, and let (n1 , . . . , nk ) be a sequence of nodes from S. For i = 1, . . . , k, let ti be the data subtree rooted at ni . Then forest ((n1 , . . . , nk ), S) equals the data forest (t1 , . . . , tn ). Definition 17 (ttemp). Let F be a data forest. Then ttemp(F ) equals the terminal template describing F . We also need: Definition 18 (choproot). Let t be a data tree with top-level subtrees t1 , . . . , tk , in that order. Then choproot (t) equals the data forest (t1 , . . . , tk ). The semantic rules for copy-statements are now shown in Figure 8. 5.5 Discussion The final result of applying P to t (Definition 11) may be undefined for two very different reasons. The first, fundamental, reason is that the rewriting may be nonterminating. The second reason is that the rewriting may abort because the evaluation of an X -expression is undefined, or the tree variable in a tcopy-statement is not defined in the store. This second reason can easily be avoided by a type system on X , as already mentioned in Remark 3.1, together with scoping rules to keep track of which variables are visible in the XSLT program and which variables are used in the X -expressions. Such 12 ˆ S = vcopy e ✁ γ γ(S) = C = (S, E, c) eval (e, C) = (n1 , . . . , nk )  ttemp forest((n1 , . . . , nk ), S) = M γ ⇒ γ(S ← M ) ˆ S = tcopy y ✁ γ γ(S) = (S, E, c) (y, t) ∈ S ttemp(choproot (t)) = M γ ⇒ γ(S ← M ) Figure 8: Semantics of copy-statements. scoping rules are entirely standard, and indeed are implemented in the XSLT processor SAXON [16]. In the same vein, we have simplified the parameter passing mechanism of XSLT, and have omitted the feature of global variables. On the other hand, our mechanism for choosing the rule to apply (Definition 12) is more powerful than the one provided by XSLT, as ours is context-dependent. It is actually easier to define that way. As already mentioned at the beginning of Section 4, none of our technical results depend on the modifications we have made. Finally, we note that the XSLT processor SAXON evaluates variable definitions lazily, whereas we simply evaluate them eagerly. Again, lazy evaluation could have been easily incorporated in our formalism. Some programs may terminate on some inputs lazily, while they do not terminate eagerly, but for programs that use all the variables they define there is no difference. 5.6 Confluence Recall that we call a rewrite relation confluent if, whenever we can rewrite a configuration γ1 to γ2 as well as to γ3 , then there exists γ4 such that we can further rewrite both γ2 and γ3 into γ4 . Confluence guarantees that all terminating runs from a common configuration also end in a common configuration [26]. Since, for our rewrite relation ⇒, either all runs on some input are nonterminating, or none is, the following theorem implies that the same final result of a program P on an input t, if defined at all, will be 13 obtained regardless of the order in which we process active statements. Theorem 1. Our rewrite relation ⇒ is confluent. Proof. The proof is a very easy application of a basic theorem of Rosen about subtree replacement systems [24]. A subtree replacement system R is a (typically infinite) set of pairs of the form φ → ψ, where φ and ψ are descriptions up to isomorphism of ordered, node-labeled trees, where the node labels come from some (again typically infinite) set V . Let us refer to such trees as V -trees. Such a system R naturally induces a rewrite system ⇒R on V -trees: we have t ⇒R t′ if there exists a node n of t and a pair φ → ψ in R such that the subtree t/n is isomorphic to φ, and t′ = t(n ← ψ). Here, we use the notation t/n for the subtree of t rooted at n, and the notation t(n ← ψ) for the tree obtained from t by replacing t/n by a fresh copy of ψ. Rosen’s theorem states that if R is “unequivocal” and “closed”, then ⇒R is confluent. “Unequivocal” means that for each φ there is at most one ψ such that φ → ψ is in R. The definition of R being “closed” is a bit more complicated. To state it, we need the notion of a residue map from φ to ψ. This is a mapping r from the nonroot nodes of φ to sets of nonroot nodes of ψ, such that for m ∈ r(n) the subtrees φ/n and ψ/m are isomorphic. Moreover, if n1 and n2 are independent (no descendants of each other), then all nodes in r(n1 ) must also be independent of all nodes in r(n2 ). Now R being closed means that we can assign a residue map r[φ, ψ] to every φ → ψ in R in such a way that for any φ0 → ψ0 in R, and any node n of φ0 , if there exists a pair φ0 /n → ψ in R, then the pair φ0 (n ← ψ) → ψ0 (r[φ0 , ψ0 ](n) ← ψ) is also in R. Denoting the latter pair by φ1 → ψ1 , we must moreover have for each node p of φ0 that is independent of n, that r[φ1 , ψ1 ](p) = r[φ0 , ψ0 ](p). To apply Rosen’s theorem, we view configurations (Definition 9) as V trees, where V = Statements ∪ (Statements × Contexts). Here, Statements is the set of all possible syntactic forms of statements. So, given a configuration, we take the syntax tree of the underlying template, and label every inactive node by its corresponding statement, and every active node by its corresponding statement and its context in the configuration. (Since templates are sequences, we actually get V -forests rather than V -trees, but that is a minor fuss.) Now consider the subtree replacement system R consisting of all pairs γ → γ ′ for which γ ⇒ γ ′ as defined by our semantics, where γ consists of a single statement S0 , and the active statement being processed to get γ ′ is a direct child of S0 . Since our semantics always substitutes siblings 14 for siblings, it is clear that ⇒R then coincides with our rewrite relation ⇒. Since the processing of every individual statement is always deterministic (up to isomorphism of trees), R as just defined is clearly unequivocal. We want to show that R is closed. Thereto, we define residue maps r[γ, γ ′ ] as follows. The case where γ → γ ′ is the processing of an apply- or call-statement, is depicted in Figure 9 (top). The node being processed is shown in black. The subtemplates to the left and right are left untouched. Referring to the notation used in Figure 5, the newly substituted subtemplate γnew is such if if that γ1 . . . γk ⇒ ! γnew (for apply) or γ1 ⇒ ! γnew (for call). Indeed, since we if apply ⇒ ! at the end of every processing step, γ itself does not contain any active if-statements. We define r = r[γ, γ ′ ] as follows: ˆ For nodes n in γleft or γright , we put r(n) := {n′ }, where n′ is the corresponding node in γ ′ . ˆ For the black node b, we put r(b) := ∅. The main condition for closedness is clearly satisfied, because statements can be processed independently. Note that the black node has no children, let alone active children, which allows us to put r(b) = ∅. The condition on p’s is also satisfied, because both r[φ0 , ψ0 ] and r[φ1 , ψ1 ] will set r(p) to {p′ }. The case where γ → γ ′ is the processing of a foreach-statement is depicted in Figure 9 (middle). This case is analogous to the previous one. The only difference is that the black node now has descendants (M in the figure). Because the init function (Definition 13) always leaves descendants of a foreach node inactive, however, the nodes in M are inactive at this time, and we can put r(n) := ∅ for all of them. The case where γ → γ ′ is the processing of a val-statement is depicted in Figure 9 (bottom). Since all nodes in the update set are inactive by definition (Definition 15), we can again put r(n) := ∅ for all nodes in the update set. The case of a tree-statement is similar; now the black node again has descendants, but again these are all inactive (they are all consstatements). The case where γ → γ ′ is the processing of a copy-statement, finally, is again analogous. 6 Computational completeness As defined in Definition 11, an XSLT program P expresses a partial function from data trees to data forests, where the output forest is represented by a 15 γ′ γ → γright γleft γnew γleft γright apply/call γ′ γ → foreach γleft γright γleft γnew γright M γ′ γ → γleft updateset γright γleft γnew γright val Figure 9: Illustration to the proof of Theorem 1. tree by affixing a root node labeled doc on top (Definition 1). The output is defined up to isomorphism only, and P does not distinguish between isomorphic inputs. This leads us to the following definition: Definition 19. A tree transformation is a partial function from data trees to data trees with root labeled doc, mapping isomorphic trees to isomorphic trees. Using the string representation of data trees defined in Section 2.1, we further define: Definition 20. A tree transformation f is called computable if the string function f˜: string (t) 7→ string(f (t)) is computable in the classical sense. Up to now, we have assumed from our XPath abstraction X only the availability of the expressions ‘/*’ and ‘child::*’. For our proof of the following theorem, we need to assume the availability of a few more very simple expressions, also present in real XPath: ˆ y/*, for any tree variable y, evaluates to the root of the tree assigned to y. 16 ˆ //* evaluates to the sequence of all nodes in the store (it does not matter in which order). ˆ child::*[1] evaluates to the first child of the context item (which should be a node). ˆ following-sibling::*[1] evaluates to the immediate right sibling of the context node, or the empty sequence if the context node has no right siblings. ˆ Increment, decrement, and test on counters: the constant expression ‘1’, and the expressions ‘x+1’, ‘x-1’, and ‘x=1’ for any value variable x, which should consist of a single counter. If x has the maximal counter value, then x+1 need not be defined, and if x has value 1, then x-1 need not be defined. The test x=1 yields any nonempty sequence for true and the empty sequence for false. ˆ name()=’a’, for any a ∈ Σ, returning any nonempty sequence if the label of the context node is a, and the empty sequence otherwise. ˆ () evaluates to the empty sequence. We establish: Theorem 2. Every computable tree transformation f can be realised by a program. Proof. We can naturally represent any string s over some finite alphabet as a flat data tree over the same alphabet. We denote this flat tree by flattree (s). Its root is labeled doc, and has k children, where k is the length of s, such that the labels of the children spell out the string s. There are no other nodes. The proof now consists of three parts: 1. Program the transformation t 7→ flattree (string (t)). 2. Show that every turing machine (working on strings) can be simulated by some program working on the flattree representation of strings. 3. Program the transformation flattree (string (t)) 7→ t. The theorem then follows by composing these three steps, where we simulate a turing machine for f˜ in step 2. Note that the composition of three programs can be written as a single program, using a temporary tree to 17 template tree2string match (//*) { cons a { } cons lbrace { } apply (child::*) cons rbrace { } } Figure 10: From t to flattree (string (t)). pass the intermediate results, and using modes to keep the rules from the different programs separate. The programs for steps 1 and 3 are shown in Figures 10 and 11. For simplicity, they are for an alphabet consisting of a single letter a, but it is obvious how to generalise the programs. The real XSLT versions are given in the Appendix. We point out that these programs are actually 1.0 programs, so it is only for step 2 of the proof that we need XSLT 2.0. For step 2, we can represent a configuration of a turing machine A by two temporary trees left and right. At each step, variable right holds (as a flat tree) the content of the tape starting at the head position and ending in the last tape cell; variable left holds the reverse of the tape portion left of the head position. To keep track of the current state of the machine, we use value variables q for each state q of A, such that at each step precisely one of these is nonempty. (This is why we need the X -expression ().) Changing the symbol under the head to an a amounts to assigning a new content to right by putting in cons a {}, followed by copies of the nodes in the current content of right, where we skip the first one. Moving the head a cell to the right amounts to assigning a new content to left by putting in a node labeled with the current symbol, followed by copies of the nodes in the current content of left. We also assign a new content to right in the now obvious way; if we were at the end of the tape we add a new node labeled blank. Moving the head a cell to the left is simulated analogously. The only X -expressions we need here are the ones we have assumed to be available. The simulation thus consists of repeatedly calling a big if-then-else that tests for the transition to be performed, and performs that transition. We may assume A is programmed in such a way that the final output is produced starting from a designated state. In this way we can build up the final output string in a fresh temporary tree and pass it to step 3. 18 template doc match (/*) { apply (child::*[1]) } template string2tree match (//*) { cons a { apply (following-sibling::*[1]) mode dochildren } val counter (1) call searchnextsibling } template dochildren match (//*) mode dochildren { if name()=’lbrace’ { apply (following-sibling::*[1]) mode dochildren } else { if name()=’a’ { call string2tree } else { } } } template searchnextsibling match (//*) mode search { if name()=’lbrace’ { val counter (counter + 1) apply (following-sibling::*[1]) mode search } else { if name()=’a’ { apply (following-sibling::*[1]) mode search } else { val counter (counter - 1) if counter = 1 { apply (following-sibling::*[1]) mode dochildren } else { apply (following-sibling::*[1]) mode search } } } } Figure 11: From flattree (string (t)) to t. 19 7 XSLT 1.0 In this section we will show that every XSLT 1.0 program can be implemented in exponential time, in sharp contrast to the computational completeness result of the previous section. A fundamental difference between XSLT 1.0 and 2.0 is that in 1.0, X expressions are “input-only”, defined as follows. Definition 21. 1. Let C = (S, E, (z, i, k)) be a context. Let the input tree in S be t. Then we call C input-only if every value appearing in E is already a value over the store {(Input, t)}, and also (z, i, k) is like that. 2. By Ĉ, we mean the context ({(Input, t)}, E, (z, i, k)). So, Ĉ equals C where we have removed all temporary trees. 3. Now an X -expression e is called input-only if for any input-only context C for which eval (e, C) is defined, we have eval (e, C) = eval (e, Ĉ), and this must be a value over C’s input tree only. In other words, input-only expressions are oblivious to the temporary trees in the store; they only see the input tree. We further define: Definition 22. An input-only X -expression e is called polynomial if for each input-only context C, the computation of eval (e, C) can be done in time polynomial in the size of C’s input tree. We now define: Definition 23. A program is called 1.0 if it only uses input-only, polynomial X -expressions. Essentially, 1.0 programs cannot do anything with temporary trees except copy them using tcopy statements. We note that real XPath 1.0 expressions are indeed input-only and polynomial; actually, real XPath 1.0 is much more restricted than that, but for our purpose we do not need to assume anything more. In order to establish an exponential upper bound on the time-complexity of 1.0 programs, we cannot use an explicit representation of the output tree. Indeed, 1.0 programs can produce result trees of size doubly exponential in the size of the input tree. For example, using subsets of input nodes, ordered lexicographically, as depth counters, we can produce a full binary 20 a a a b c b c b b a b b a b Figure 12: Left, a data tree, and right, a DAG representation of it. tree of depth 2n from an input tree with n nodes. Obviously a doubly exponentially long output could never be computed in singly exponential time. We therefore use a DAG representation of trees: an old and well-known trick [22] that is also used in tree transduction [18], and that has recently found new applications in XML [10]. Formally, a DAG representation is a collection G of trees, where trees in G can have special leafs which are not labeled, and from which a pointer departs to the root of another tree in G. On condition that the resulting pointer graph is acyclic, starting from a designated “root tree” in G we can naturally obtain a tree by unfolding along the pointers. An illustration is shown in Figure 12. We establish: Theorem 3. Let P be an 1.0 program. Then the following problem is solvO(1) time: able in exponential, i.e., 2n Input: a data tree t Output: a DAG representation of the final result tree of applying P to t, or a message signaling non-termination if P does not terminate on t. Proof. We will generate a DAG representation G by applying modified versions of the semantic rules from Section 5. We initialise G with all the subtrees of t. These trees have no pointers. Each tree that will be added to G will be a configuration, which still has to be developed further into a final data tree with pointers, using the same modified rules. Because we will have to point to the newly added configurations later, we identify each 21 added configuration by a pair (name, C) where name is the name of a template rule in P and C is a context. In the description below, whenever we say that we “add” a configuration to G, identified by some pair (name, C), we really mean that we add it unless a configuration identified by that same pair already exists in G. The modifications are now the following. 1. When executing an apply-statement, we do not directly insert copies of the templates belonging to the rules that must be applied (the γi ’s in Figure 5). Rather, we add, for i = 1, . . . , k, the configuration γi′ to if G, where γi ⇒ ! γi′ . We identify γi′ by the pair (name i , Ci ), with name i the name of the rule γi comes from, and Ci = (S, E, (ni , i, k)) using the notation of Figure 5. Moreover, in place of the apply-statement we insert a sequence of k pointer nodes pointing to (name 1 , C1 ), . . . , (name k , Ck ), respectively. 2. When executing a call-statement call name under context C, we again do not insert γ1 (compare Figure 5), but add the configuration γ1′ to if G, where γ1 ⇒ ! γ1′ , and identify it by the pair (name, C). We then replace the statement by a pointer node pointing to that pair. 3. By making template rules from the bodies of all foreach-statements in P , we may assume without loss of generality that the body of every foreach-statement is a single call-statement. A foreach-statement is then processed analogously to apply- and call-statements. 4. As we did with foreach-statements, we may assume that the body of each tree-statement is a single call-statement. When executing a treestatement, we may assume that the call-statement has already been turned into a pointer to some pair (name 0 , C0 ). We then assign that pair directly to y in the new context C ′ (compare Figure 6); we no longer apply maketree. So, in the modified kind of store we use, we assign name–context pairs, rather than fully specified temporary trees, to tree variables. 5. Correspondingly, when executing a statement tcopy y, we now directly turn it into a pointer to the pair assigned to y. 6. Finally, when executing a vcopy-statement, we do not insert the whole forest generated by (n1 , . . . , nk ) in the configuration (compare Figure 8), but merely insert a sequence of k pointers to the input subtrees rooted at n1 , . . . , nk , respectively. 22 We initiate the generation of G by starting with the initial configuration as always. Processing that configuration will add the first tree to G, which serves as the root tree of the DAG representation. When all trees in G have been fully developed into data trees with pointer nodes, the algorithm terminates. In case P does not terminate on t, however, that will never happen, and we need a way to detect nontermination. Thereto, recall that every context consists of an environment E and a context triple c on the one hand, and a store S on the other hand. Since all X -expressions used are input-only, and thus oblivious to the store-part of a context (except for the input tree, which does not change), we are in an infinite loop from the moment that there is a cycle in G’s pointer graph where we ignore the store-part of the contexts. More precisely, this happens when from a pointer node in a tree identified by (name, C1 ) we can follow pointers and reach a pointer to a pair (name, C2 ) with the same name and where C1 and C2 are equal in their (E, c)-parts. As soon as we detect such a cycle, we terminate the algorithm and signal nontermination. Note that thus the algorithm always terminates. Indeed, since only inputonly X -expressions are used, all contexts that appear in the computation are input-only, and there are only a finite number of possible (E, c)-parts of input-only configuration over a fixed input tree. Let us analyse the complexity of this algorithm. Since all X -expressions used are polynomial, there is a natural number K such that each value that appears in a context is at most nK long, where n equals the number of nodes in t. Each element of such a length-nK sequence is a node or a counter over t, K so there are at most (2n)n different values. There are a constant c1 number K of different value variables in P , so there are at most ((2n)n )c1 different environments. Likewise, the number of different context triples is (2n)3 , K′ K so, ignoring the stores, there are in total at most (2n)3 · (2n)c1 n 6 2n different contexts, for some natural number K ′ > K. With a constant c2 number of different template names in P , we get a maximal number of K′ c2 2n different configurations that can be added to G before the algorithm will surely terminate. It remains to see how long it takes to fully rewrite each of those configurations into a data tree with pointers. A configuration initially consists of at most a constant c3 number of statements. The evaluation of X -expressions, which are polynomial, takes at most c3 nK time in total. Processing an apply- or a foreach-statement takes at most c3 nK modifications to the configuration and to G; for the other statements this takes at most c3 such operations. Each such operation, however, involves the handling of con23 texts, whose stores can become quite large if treated naively. Indeed, treestatements assign a context to a tree variable, yielding a new context which may then again be assigned to a tree variable, and so on. To keep this under control, we do not copy the contexts literally, but number them consecutively in the order they are introduced in G. A map data structure keeps track of this numbering. The stores then consist of an at most constant c4 number of assignments of pairs (name, context number) to tree variables. ′ K′ As there are at most 2n different contexts, each number is at most nK bits long. Looking up whether a given context is already in G, and if so, ′ K′ finding its number, takes O(log 2n ) = O(nK ) time using a suitable map data structure. K′ We conclude that the processing of G takes a total time of c2 2n · O(1) ′ O(nK ) = 2n , as had to be proven. A legitimate question is whether the complexity bound given by Theorem 3 can still be improved. In this respect we can show that, even within the limits of real XSLT 1.0, any linear-space turing machine can be simulated by a 1.0 program. Note that some PSPACE-complete problems, such as QBF-SAT [21], are solvable in linear space. This shows that the time complexity upper bound of Theorem 3 cannot be improved without showing that PSPACE is properly included in EXPTIME (a famous open problem). The simulation gets as input a flat tree representing an input string, and uses the n child nodes to simulate the n tape cells. For each letter a of the tape alphabet, a value variable cell a holds the nodes representing the tape cells that have an a. A value variable head holds the node representing the cell seen by the machine’s head. The machine’s state is kept by additional value variables state q for each state q, such that state q is nonempty iff the machine is in state q. Writing a letter in a cell, moving the head left or right, or changing state, are accomplished by easy updates on the value-variables, which can be expressed by real XPath 1.0 expressions. Choosing the right transition is done by a big if-then-else statement. Successive transitions are performed by recursively applying the simulating template rule until a halting state is reached. Remark 7.1. A final remark is that our results imply that XSLT 1.0 is not closed under composition. Indeed, building up a tree of doubly exponential size (as we already remarked is possible in XSLT 1.0), followed by the building up of a tree of exponential size, amounts to building up a tree of triply exponential size. If that would be possible by a single program, then a DAG representation of a triply exponentially large tree would be com- 24 putable in singly exponential time. It is well known, however, that a DAG representation cannot be more than singly exponentially smaller than the tree it represents. Closure under composition is another sharp contrast between XSLT 1.0 and 2.0, as the latter is indeed closed under composition as already noted in the proof of Theorem 2. 8 Conclusions W3C recommendations such as the XSLT specifications are no Holy scriptures. Theoretical scrutinising of W3C work, which is what we have done here, can help in better understanding the possibilities and limitations of various newly proposed programming languages related to the Web, eventually leading to better proposals. A formalisation of the full XSLT 2.0 language, with all the dirty details both concerning the language itself as concerning the XPath 2.0 data model, is probably something that should be done. We believe our work gives a clear direction how this could be done. Note also that XSLT contains a lot of redundancies. For example, foreach-statements are eliminable, as are call-statements, and the match attribute of template rules. A formalisation such as ours can provide a rigorous foundation to prove such redundancies, or to prove correct various processing strategies or optimisation techniques XSLT implementations may use. A formal tree transformation model denoted by TL, in part inspired by XSLT, but still omitting many of its features, has already been studied by Maneth and his collaborators [9, 19]. The TL model can be compiled into the earlier formalism of “macro tree transducers” [12, 23]. It is certainly an interesting topic for further research to similarly translate our XSLT formalisation (even partially) into macro tree transducers, so that techniques already developed for these transducers can be applied. For example, under regular expression types [15] (known much earlier under the name of “recognisable tree languages”), exact automated typechecking is possible for compositions of macro tree transducers, using the method of “inverse type inference” [20]. This method has various other applications, such as deciding termination on all possible inputs [19]. Being able to apply this method to our XSLT 1.0 formalism would improve the analysis techniques of Dong and Bailey [11], which are not complete. 25 Acknowledgment We are indebted to Frank Neven for his initial participation in this research. References [1] XML path language (XPath) version 1.0. November 1999. W3C Recommendation, [2] XSL transformations (XSLT) version 1.0. November 1999. W3C Recommendation, [3] XSLT requirements version 2.0. W3C Working Draft, February 2001. [4] XML schema. W3C Recommendation, October 2004. [5] XML path language (XPath) version 2.0. W3C Working Draft, April 2005. [6] XQuery 1.0 and XPath 2.0 data model. W3C Working Draft, April 2005. [7] XQuery 1.0 and XPath 2.0 formal semantics. W3C Working Draft, June 2005. [8] XSL transformations (XSLT) version 2.0. W3C Working Draft, April 2005. [9] G.J. Bex, S. Maneth, and F. Neven. A formal model for an expressive fragment of XSLT. Information Systems, 27(1):21–39, 2002. [10] P. Buneman, M. Grohe, and C. Koch. Path queries on compressed XML. In J.C. Freytag, P.C. Lockemann, et al., editors, Proceedings 29th International Conference on Very Large Data Bases, pages 141– 152. Morgan Kaufmann, 2003. [11] C. Dong and J. Bailey. Static analysis of XSLT programs. In K.D. Schewe and H.E. Williams, editors, Database technologies—Proceedings ADC 2004, pages 151–160. Australian Computer Society, 2004. [12] J. Engelfriet and H. Vogler. Macro tree transducers. Journal of Computer and System Sciences, 31(1):71–146, 1985. 26 [13] G. Gottlob, C. Koch, and R. Pichler. XPath processing in a nutshell. SIGMOD Record, 32(2):21–27, 2003. [14] J. Hidders, J. Paredaens, R. Vercammen, et al. A light but formal introduction to XQuery. In Z. Bellahsène, T. Milo, M. Rys, et al., editors, Database and XML Technologies—Proceedings XSym, volume 3186 of Lecture Notes in Computer Science, pages 5–20. Springer, 2004. [15] H. Hosoya and B.C. Pierce. XDuce: A statically typed XML processing language. ACM Transactions on Internet Technology, 3(2):117–148, 2003. [16] M. Kay. SAXON: The http://saxon.sourceforge.net. XSLT and XQuery processor. [17] M. Kay. XSLT 2.0 Programmer’s Reference. Wrox, 3rd edition, 2004. [18] S. Maneth. The complexity of compositions of deterministic tree transducers. In M. Agrawal and A. Seth, editors, FST TCS 2002 Proceedings, volume 2556 of Lecture Notes in Computer Science, pages 265–276. Springer, 2002. [19] S. Maneth, A. Berlea, T. Perst, and H. Seidl. XML type checking with macro tree transducers. In Proceedings 24th ACM Symposium on Principles of Database Systems, pages 283–294. ACM Press, 2005. [20] T. Milo, D. Suciu, and V. Vianu. Typechecking for XML transformers. Journal of Computer and System Sciences, 66(1):66–97, 2003. [21] C.H. Papadimitriou. Computational Complexity. Addison-Wesley, 1994. [22] M.S. Paterson and M.N. Wegman. Linear unification. Journal of Computer and System Sciences, 16(2):158–167, 1978. [23] T. Perst and H. Seidl. Macro forest transducers. Information Processing Letters, 89(3):141–149, 2004. [24] B.K. Rosen. Tree-manipulating systems and Church-Rosser theorems. Journal of the ACM, 20(1):160–187, 1973. [25] J. Siméon and P. Wadler. The essence of XML. In Proceedings 30th ACM Symposium on Principles of Programming Languages, pages 1–13. ACM Press, 2003. [26] Terese. Term Rewriting Systems. Cambridge University Press, 2003. 27 [27] P. Wadler. A formal semantics of patterns in XSLT and XPath. Markup Languages: Theory and Practice, 2(2):183–202, 2000. 28 A A.1 Real XSLT programs Figure 10 in real XSLT <xsl:transform xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0"> <xsl:template name="tree2string" match="//*"> <a/> <lbrace/> <xsl:apply-templates select="child::*"/> <rbrace/> </xsl:template> </xsl:transform> A.2 Figure 11 in real XSLT <xsl:transform xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="1.0"> <xsl:template match="/doc"> <xsl:apply-templates select="child::*[1]"/> </xsl:template> <xsl:template name="string2tree" match="/doc//*"> <a> <xsl:apply-templates select="following-sibling::*[1]" mode="dochildren"/> </a> <xsl:call-template name="searchnextsibling"> <xsl:with-param name="counter" select="1"/> </xsl:call-template> </xsl:template> <xsl:template match="//*" mode="dochildren"> 29 <xsl:if test="name()=’lbrace’"> <xsl:apply-templates select="following-sibling::*[1]" mode="dochildren"/> </xsl:if> <xsl:if test="name()=’a’"> <xsl:call-template name="string2tree"/> </xsl:if> </xsl:template> <xsl:template name="searchnextsibling" match="//*" mode="search"> <xsl:param name="counter"/> <xsl:if test="name()=’lbrace’"> <xsl:apply-templates select="following-sibling::*[1]" mode="search"> <xsl:with-param name="counter" select="$counter + 1"/> </xsl:apply-templates> </xsl:if> <xsl:if test="name()=’a’"> <xsl:apply-templates select="following-sibling::*[1]" mode="search"> <xsl:with-param name="counter" select="$counter"/> </xsl:apply-templates> </xsl:if> <xsl:if test="name()=’rbrace’"> <xsl:if test="$counter=2"> <xsl:apply-templates select="following-sibling::*[1]" mode="dochildren"/> </xsl:if> <xsl:if test="$counter>2"> <xsl:apply-templates select="following-sibling::*[1]" mode="search"> <xsl:with-param name="counter" select="$counter - 1"/> </xsl:apply-templates> </xsl:if> </xsl:if> </xsl:template> </xsl:transform> 30
2cs.AI
arXiv:1711.01090v1 [math.GR] 3 Nov 2017 FACTORIZATIONS OF ALMOST SIMPLE GROUPS WITH A FACTOR HAVING MANY NONSOLVABLE COMPOSITION FACTORS CAI HENG LI AND BINZHOU XIA Abstract. This paper classifies the factorizations of almost simple groups with a factor having at least two nonsolvable composition factors. This together with a previous classification result of the authors reduces the factorization problem of almost simple groups to the case where both factors have a unique nonsolvable composition factor. Key words: factorizations; almost simple groups MSC2010: 20D40, 20D06, 20D08 1. Introduction For a group G, an expression G = HK with subgroups H and K of G is called a factorization of G, where H and K are called factors. Factorizations of groups play an important role not only in group theory but also in other branches of mathematics such as Galois theory [7, 9] and graph theory [14, 17]. A group G is almost simple with socle L if L 6 G 6 Aut(L) for some finite nonabelian simple group L. To study factorizations of finite groups, it is crucial to study those of almost simple groups. In 1987, Hering, Liebeck and Saxl [10] classified factorizations of exceptional groups of Lie type. A factorization G = HK is called a maximal factorization of G if both H and K are maximal subgroups of G. In 1990, Liebeck, Praeger and Saxl published the landmark work [15] classifying maximal factorizations of almost simple groups. Furthermore, when the socle is an alternating group, all the factorizations of such a group were determined in [15, Theorem D]. Based on the maximal factorizations in [15, Theorem C], Giudici [8] in 2006 determined the factorizations of sporadic groups. In 2010, all factorizations of almost simple groups for which one factor is maximal and the intersection of the two factors is trivial have been determined [17] by Liebeck, Praeger and Saxl. In [14], factorizations of almost simple groups with a solvable factor are classified. As a counter part, we classify in this paper (Theorem 1.1) factorizations of almost simple groups with a factor having at least two nonsolvable composition factors (counted with multiplicity). These two classification results then reduce the factorization problem of almost simple groups to the case where both factors have a unique nonsolvable composition factor (Corollary 1.2). Theorem 1.1. Let G be an almost simple group with socle L. Suppose that G has a factorization G = HK, where H has at least two nonsolvable composition factors and K is core-free in G. Then either (a) or (b) below holds. (a) An 6 G 6 Sn with n > 10, and one of the following holds: (a.1) H is a transitive permutation group of degree n, and An−1 6 K 6 Sn−1 ; 1 2 LI AND XIA (a.2) n = 10, H is a transitive permutation group of degree 10 such that (A5 × A5 ).2 6 H 6 S5 ≀ S2 , and K = SL2 (8) or SL2 (8).3; (a.3) n = 12, A7 × A5 6 H 6 S7 × S5 , and K = M12 ; (a.4) n = 24, A19 × A5 6 H 6 S19 × S5 , and K = M24 . (b) L is a symplectic group or an orthogonal group of plus type, and the triple (L, H ∩ L, K ∩ L) lies in Table 1 or Table 2, respectively, where Q 6 2. Table 1. row L H ∩L (Sp2a (2f b ) × Sp2a (2f b )).R.2, Sp4ℓ (2f ), f ℓ > 2 ab = ℓ and R 6 b × b (G2 (2f ℓ ) × G2 (2f ℓ )).R.2, Sp12ℓ (2f ) R6ℓ×ℓ Sp4ℓ (4), ℓ > 2 Sp2 (4) × Sp4ℓ−2 (4) Sp4ℓ (4), ℓ > 2 (Sp2 (4) × Sp2ℓ (4)).P , P 6 2 Sp8ℓ (2) (Sp2 (4) × Sp2ℓ (4)).P , P 6 [8] Sp4 (2f ), f > 3 odd (Sp2 (2f ) × Sp2 (2f )).P , P 6 2 U × Sp4 (2f ), Sp6 (2f ), f > 2 U nonsolvable and U 6 Sp2 (2f ) Sp12 (4) Sp2 (4) × Sp10 (4) Sp12 (4) (Sp2 (4) × G2 (4)).P , P 6 2 Sp24 (2) (Sp2 (4) × G2 (4)).P , P 6 [8] K ∩L Ex. 1 f Ω− 4ℓ (2 ).Q 3.2 2 3 4 5 6 7 8 9 10 f Ω− 12ℓ (2 ).Q 3.3 Sp2ℓ (16).Q Ω− 4ℓ (4).Q Ω− 8ℓ (2).Q Sz(2f ) max 3.7 3.8 max G2 (2f ) 3.12 G2 (16).Q Ω− 12 (4).Q Ω− 24 (2).Q 3.14 3.15 3.17 Table 2. row L K ∩L Ex. 1 Ω4ℓ−1 (q) 3.5 2 3 4 5 6 H ∩L (U × PSp2ℓ (q)).P , U nonsolvable, PΩ+ 4ℓ (q), ℓ > 2, q > 4 U 6 PSp (q) and P 6 gcd(2, ℓ, q − 1) 2 Ω+ (Sp2 (4) × Sp2ℓ (4)).P , P 6 22 8ℓ (2) (Sp2 (4c ) × Sp2ℓ (16)).P , Ω+ 8ℓ (4) c = 1 or 2 and P 6 22 U × G2 (2f ), f ), f > 2 Ω+ (2 12 U nonsolvable and U 6 Sp2 (2f ) + Ω24 (2) (Sp2 (4) × G2 (4)).P , P 6 22 (Sp2 (4c ) × G2 (16)).P , Ω+ 24 (4) c = 1 or 2 and P 6 22 Sp8ℓ−2 (2) 3.10 Sp8ℓ−2 (4) 3.11 Sp10 (2f ) 3.13 Sp22 (4) 3.16 Sp22 (4) 3.18 Here are some remarks on Theorem 1.1. (i) For each factorization G = HK described in Theorem 1.1, K ∩ L is almost simple, and either H has exactly two nonsolvable composition factors or (a.1) occurs. (ii) It is easy to see that each case in part (a) of Theorem 1.1 gives rise to a factorization G = HK. Also, for each row of Table 1 and Table 2 there is an example for such factorization G = HK, which can be found in the last column: the label 3.k indicates that such an example is given in Example 3.k while the label max indicates that there exists a maximal factorization (see Lemma 3.1). FACTORIZATIONS OF ALMOST SIMPLE GROUPS 3 Corollary 1.2. Let G be an almost simple group. Suppose G = HK with core-free subgroups H and K of G. Then interchanging H and K if necessary, one of the following holds. (a) H is solvable, and (G, H, K) is described in [14, Theorem 1.1]. (b) H has at least two nonsolvable composition factors, and (G, H, K) is described in Theorem 1.1. (c) Both H and K have a unique nonsolvable composition factor. The proof of Theorem 1.1 is sketched in Section 4 and completed in Sections 5 and 6. In Section 3, we construct factorizations as described in Table 1 and Table 2. Acknowledgements. This work was supported by NSFC grants 11231008 and 11771200. The second author is very grateful to South University of Science and Technology for the financial support of his visit to the first author. 2. Strategy of proof Hereafter, all the groups are assumed to be finite. The group-theoretic notation in this paper mostly follows [15]. There are several equivalent conditions for a group factorization as in Lemma 2.1 below. Lemma 2.1. Let H and K be subgroups of G. Then the following are equivalent. (a) G = HK. (b) G = H x K y for any x, y ∈ G. (c) |H ∩ K||G| = |H||K|. (d) |G| 6 |H||K|/|H ∩ K|. (e) H acts transitively on [G : K] by right multiplication. (f) K acts transitively on [G : H] by right multiplication. Remark. Lemma 2.1 is easy to prove but plays a fundamental role in the study of group factorizations: (i) due to part (b) we will consider conjugacy classes of subgroups when studying factorizations of a group;. (ii) given a group G and its subgroups H and K, in order to inspect whether G = HK we only need to compute the orders of G, H, K and H ∩ K by part (c) or (d), which enables us to search factorizations of a group efficiently in Magma [3]. Here are more observations about group factorizations. Lemma 2.2. Let H and K be subgroups of G, and L be a normal subgroup of G. If G = HK, then we have the following divisibilities. (a) |G| divides |H||K|. (b) |G| divides |H ∩ L||K||G/L|. (c) |L| divides |H ∩ L||K|. (d) |L| divides |H ∩ L||K ∩ L||G/L|. Lemma 2.3. Let H, K and M be subgroups of G. If G = HK and H 6 M, then M = H(K ∩ M). 4 LI AND XIA Lemma 2.4. Let H, K and M be subgroups of G. Suppose H 6 M and M = H(K ∩ M). Then G = HK if and only if G = MK. To construct more factorizations from existing ones, we introduce some diagrams for convenience: for any group G and subgroups H, K and M of G, the diagram ⑥⑥ ⑥⑥ ⑥⑥ ⑥ ⑥ H G❆ ❆❆ ❆❆ ❆❆ ❆ K means G = HK, while the diagram K H ❇❇ ❇❇ ❇❇ ❇❇ M ⑤ ⑤⑤ ⑤⑤ ⑤ ⑤⑤ means H ∩ K = M. Then the diagram ④ ④④ ④④ ④ ④④ G❈ ❈❈ ❈❈ ❈❈ ❈ H1 ❆ ❆❆ ❆❆ ❆❆ ❆ ... ⑥ ⑥⑥ ⑥⑥ ⑥ ⑥⑥ K1 ❆ ❆❆ ❆❆ ❆❆ ❆ ❆❆ ❆❆ ❆❆ ❆❆ ❆ Hℓ ... ⑥ ⑥⑥ ⑥⑥ ⑥ ⑥ ⑥⑥ ❆❆ ❆❆ ❆❆ ❆❆ ❆ Kℓ implies G = H1 K1 = H1 H2 K2 = · · · = H1 H2 · · · Hℓ Kℓ = H1 Kℓ . As mentioned in the Introduction, the maximal factorizations of almost simple groups have been classified by Liebeck, Praeger and Saxl [15]. In order to apply this result to investigate the general factorizations of an almost simple group G, say, we need to embed a given factorization G = HK to the a maximal factorization G = AB. This may be easily accomplished by taking arbitrary maximal subgroups A and B of G containing H and K respectively. However, such maximal subgroups A and B are not necessarily core-free even if H and K are core-free. For example, if HL < G then the maximal subgroup of G containing HL (and thus containing H) is not core-free in G. In fact, HL = G if and only if all maximal subgroup of G containing H are core-free in G. Lemma 2.5. Suppose that G is an almost simple group with socle L and G = HK with core-free subgroups H and K. Then there exist L E G∗ 6 G and a factorization G∗ = H ∗ K ∗ such that H ∗ ∩ L = H ∩ L, K ∗ ∩ L = K ∩ L and H ∗ L = K ∗ L = G∗ . Proof. Take G∗ = HL ∩ KL, H ∗ = H ∩ G∗ and K ∗ = K ∩ G∗ . Then L E G∗ 6 G, H ∗ ∩L = H ∩L and K ∗ ∩L = K ∩L. It follows that H ∗ and K ∗ are both core-free in G∗ since H and K are both core-free in G. By [16, Lemma 2(i)], we have G∗ = H ∗ K ∗ and H ∗ L = K ∗ L = G∗ . Thus, G∗ = H ∗ K ∗ is a factorization as desired.  FACTORIZATIONS OF ALMOST SIMPLE GROUPS 5 To describe a factorization G = HK of an almost simple group G with H and K core-free, if we are concerned with H ∩ Soc(G) and K ∩ Soc(G) instead of H and K, then Lemma 2.5 allows us to assume HL = KL = G. This is equivalent to assume that any maximal subgroups of G containing H and K, respectively, are core-free in G. Furthermore, the following lemma help to determine the factors H and K once we know H ∩ Soc(G) and K ∩ Soc(G) for a factorizations G = HK. Lemma 2.6. Suppose that G is an almost simple group with socle L and G = HK with core-free subgroups H and K. Then there exists a factorization G/L = H K such that H = (H ∩ L).H and K = (K ∩ L).K. Proof. Let H = HL/L and K = KL/L. Then by modulo L, we derive from G = HK that G/L = H K. Moreover, since H = HL/L ∼ = H/(H ∩ L) and ∼ K = KL/L = K/(K ∩ L), we have H = (H ∩ L).H and K = (K ∩ L).K. Hence the lemma follows.  Remark. In an alternative way, one may embed a factorization G = HK of an almost simple group G with H and K core-free into a factorization of G with both factors maximal among core-free subgroups of G. The latter is called a max− factorization of G and is classified in [16]. Suppose that G is an almost simple group with socle L, and G = HK is a factorization of G with H having at least two nonsolvable composition factors and K core-free. We first prove Theorem 1.1 in the case where L is a non-classical simple group. Lemma 2.7. If L is a non-classical simple group, then L = An with n > 10 and one of the following holds: (a) H is a transitive permutation group of degree n, and An−1 6 K 6 Sn−1 ; (b) n = 10, H is a transitive permutation group of degree 10 such that (A5 × A5 ).2 6 H 6 S5 ≀ S2 , and K = SL2 (8) or SL2 (8).3; (c) n = 12, A7 × A5 6 H 6 S7 × S5 , and K = M12 ; (d) n = 24, A19 × A5 6 H 6 S19 × S5 , and K = M24 . Proof. Let L be a non-classical simple group satisfying the assumption of Theorem 1.1. Consulting the classification of factorizations of exceptional groups of Lie type in [10], one sees that L is not an exceptional group of Lie type as H has at least two nonsolvable composition factors. Similarly, L is not a sporadic simple group by [8]. We thus have L = An acting naturally on a set Ω of n points. Since G has a subgroup H which has at least two nonsolvable composition factors, we know that n > 10. Then according to Theorem D and its Remark 2 in [15], one of the following cases appears. (i) H is k-homogeneous on Ω and An−k 6 K 6 Sn−k × Sk for some 1 6 k 6 5. (ii) An−k 6 H 6 Sn−k × Sk and K is k-homogeneous on Ω for some 1 6 k 6 5. (iii) n = 10, H is a transitive subgroup of S10 such that A5 × A5 ⊳ H 6 S5 ≀ S2 , and K = SL2 (8) or SL2 (8).3. Note that all the k-homogeneous permutation groups with k > 2 are known: the k-transitive permutation groups are listed, for example in [5, Tables 7.3 and 7.4], and the k-homogeneous but not k-transitive groups are classified in [12]. 6 LI AND XIA First assume case (i) appears. If k > 2, then the classification of k-homogeneous permutation groups shows that H has at most one nonsolvable composition factor, a contradiction. Hence k = 1 as in part (a). Next assume that case (ii) appears. Then k = 5 because H has at least two nonsolvable composition factors. As K An , we conclude from the classification of 5-homogeneous permutation groups [5, 12] that (n, K) = (12, M12 ) or (24, M24 ). This is described in part (c) or (d), respectively, of Theorem 1.1. Finally, case (iii) leads to part (b). Thus the lemma is true.  To complete the proof of Theorem 1.1, we may assume that L is a classical group of Lie type due to Lemma 2.7. Let A and B be maximal subgroups of G containing H and K, respectively. Then we may assume that A and B are both core-free in G by virtue of Lemma 2.5. We write these assumptions in the following hypothesis for later convenience. Hypothesis 2.8. Let G be an almost simple group with socle L classical of Lie type. Suppose that G = HK is a factorization of G with H having at least two nonsolvable composition factors and K core-free, and A and B are core-free maximal subgroups of G containing H and K, respectively. Notice that A has at least one nonsolvable composition factor since the subgroup H of A is nonsolvable. In Section 5, we deal with the case where A has at least two nonsolvable composition factors. Then in Section 6, we deal with the case where A has exactly one nonsolvable composition factor. In this case, the primitive prime divisors will play an important role in our analysis. Given positive integers a and n, a prime number r is called a primitive prime divisor of the pair (a, n) if r divides an − 1 but does not divide ai − 1 for any positive integer i < n. In other words, a primitive prime divisor of (a, n) is a prime number r such that a has order n in F× r . In particular, we have the observation in the next lemma, which will be used repeatedly (and sometimes implicitly) in this paper. Lemma 2.9. If r is a primitive prime divisor of (a, m), then m r −1 and so r > m. By an elegant theorem of Zsigmondy (see for example [2, Theorem IX.8.3]), (a, n) has a primitive prime divisor whenever a > 2 and n > 3 with (a, n) 6= (2, 6). For any positive integers a > 2 and n > 3, denote the set of primitive prime divisors of (a, n) by ppd(a, n) if (a, n) 6= (2, 6), and set ppd(2, 6) = {7}. For any positive integer m and prime number p, denote by mp the largest p-power that divides m. 3. Examples Let S be a classical group defined on a vector space V . If Z is the center of S such that S/Z is simple group and X is a subgroup of GL(V ) containing S as a normal subgroup, then for any subgroup Y of X, denote by ˆY the subgroup (Y ∩ S)Z/Z of S/Z. If S is a linear group, define Pk [S] to be the stabilizer of a k-space in S. Next assume that S is a symplectic, unitary or orthogonal group. (i) If S is transitive on the totally singular k-spaces, then let Pk [S] be the stabilizer of a totally singular k-space in S. FACTORIZATIONS OF ALMOST SIMPLE GROUPS 7 (ii) If S is not transitive on the totally singular k-spaces, then let Pk−1 [S] and Pk [S] be the stabilizers of totally singular k-spaces in the two different orbits of S. (iii) If S is not transitive on the totally singular k-spaces, then let Pk−1,k [S] be the stabilizer of a totally singular (k − 1)-space in S. (iv) If S is not transitive on the totally singular k-spaces, then let P1,k−1 [S] be the intersection P1 [S] ∩ Pk−1 [S], where the 1-space stabilized by P1 [S] lies in the k-space stabilized by Pk−1 [S]. (v) If S is not transitive on the totally singular k-spaces, then let P1,k [S] be the intersection P1 [S] ∩ Pk [S], where the 1-space stabilized by P1 [S] lies in the k-space stabilized by Pk [S]. For any non-degenerate k-space W , denote (i) Nk [S] = SW if either S is symplectic or unitary, or S is orthogonal of even dimension with k odd; (ii) Nεk [S] = SW for ε = ± if S is orthogonal and W has type ε; (iii) Nεk [S] = SW for ε = ± if S is orthogonal of odd dimension and W ⊥ has type ε. + For the above defined groups Pk [S], Pi,j [S], Nk [S], N− k [S] and Nk [S], we will simply − + write Pk , Pi,j , Nk , Nk and Nk , respectively, if the classical group S is clear from the context. Let G be an almost simple group with socle classical simple, and assume that no element of G induces a triality automorphism if Soc(G) = PΩ+ 8 (q). In [1], Aschbacher defined eight families C1 –C8 of subgroups of G. These groups are now called geometric subgroups of G, and described in more details by Kleidman and Liebeck [13]. The following lemma can be read off from Tables 1–4 of [15]. Lemma 3.1. Let G be an almost simple group with socle L classical. If G = AB is a maximal factorization of G such that A has at least two nonsolvable composition factors and B is core-free in G, then A has exactly two nonsolvable composition factors and (L, A ∩ L, B ∩ L) = (L, X, Y ) as in Table 3. Conversely, for any triple (L, X, Y ) in Table 3, there exists a maximal factorization G = HK satisfying Soc(G) = L, H ∩ L = X and K ∩ L = Y . Table 3. row 1 2 3 4 5 6 7 8 L Sp4ℓ (2f ), f ℓ > 2 Sp4ℓ (4), ℓ > 2 Sp4 (2f ), f > 3 odd Sp6 (2f ), f > 2 PΩ+ 4ℓ (q), ℓ > 3, q > 4 PΩ+ 8 (q), q > 5 odd Ω+ (2) 8 Ω+ 8 (4) X (Sp2ℓ (2f ) × Sp2ℓ (2f )).2 Sp2 (4) × Sp4ℓ−2 (4) (Sp2 (2f ) × Sp2 (2f )).2 Sp2 (2f ) × Sp4 (2f ) (PSp2 (q) × PSp2ℓ (q)). gcd(2, ℓ, q − 1) (PSp2 (q) × PSp4 (q)).2 (SL2 (4) × SL2 (4)).22 (SL2 (16) × SL2 (16)).22 Y f O− 4ℓ (2 ) Sp2ℓ (16).2 Sz(2f ) G2 (2f ) Ω4ℓ−1 (q) Ω7 (q) Sp6 (2) Sp6 (4) 8 LI AND XIA f Example 3.2. Let G = Sp4ℓ (2f ) with f ℓ > 2, and K = O− 4ℓ (2 ) < G. Then for any positive integers a and b such that ab = ℓ, there exists a subgroup H = Sp2a (2f b ) ≀ S2 = ((Sp2a (2f b ) × Sp2a (2f b )):2 of G such that G = HK, as in row 1 of Table 1. fb In fact, let M = Sp4a (2f b ):b be a C3 -subgroup of G. Then M ∩ K = O− 4a (2 ).b, and so |M ∩ K|||G| = |M||K|. It follows that G = MK by Lemma 2.1, and then we have the diagram Sp4ℓ (2f ) ▼▼▼ ▼▼▼ ▼▼▼ ▼ ♦♦ ♦♦♦ ♦♦♦ ♦ ♦ ♦ f O− 4ℓ (2 ) Sp4a(2f b):b ♣♣♣ ♣♣♣ ♣ ♣ ♣♣♣ ❖❖❖ ❖❖❖ ❖❖❖ ❖❖ Sp4a (2f b) ◆◆◆ ♦ ♦ ♦♦♦[15, Theorem A]◆◆◆◆ ♦ ♦ ◆◆◆ ♦♦ ◆ ♦♦♦ ♦ ♦♦♦ ♦♦♦ ♦ ♦ ♦♦ qq qqq q q qqq fb O− 4a (2 ):b fb O− 4a (2 ) Sp2a(2f b) ≀ S2 This gives a subgroup H = Sp2a (2f b ) ≀ S2 = ((Sp2a (2f b ) × Sp2a (2f b )):2 of G such that G = HK, proving Example 3.2. f Example 3.3. Let G = Sp12ℓ (2f ) and K = O− 12ℓ (2 ) < G. Then there exists a subgroup H = G2 (2f ℓ ) ≀ S2 = (G2 (2f ) × G2 (2f )):2 of G such that G = HK, as in row 2 of Table 1. To show that Example 3.3 holds, we first note Sp6 (2f ℓ ) = G2 (2f ℓ )Oε6 (2f ℓ ) for ε = ± by [15, Theorem A]. This implies that fℓ + fℓ Sp6 (2f ℓ ) × Sp6 (2f ℓ ) = (G2(2f ℓ ) × G2 (2f ℓ )(O− 6 (2 ) × O6 (2 )) + fℓ fℓ and so Sp6 (2f ℓ ) ≀ S2 = (G2 (2f ℓ ) ≀ S2 )(O− 6 (2 ) × O6 (2 )). Then the diagram Sp12ℓ(2f ) ▼▼▼ ♦ ▼▼ ♦♦♦ ♦♦♦ [15, Theorem A] ▼▼▼▼▼ ♦ ♦ ▼ ♦♦ f O− 12ℓ(2 ) Sp12(2f ℓ):ℓ ❧❧ ❧❧❧ ❧❧❧ ❧❧❧ ❧ ❧ ❧ Sp12 (2f ℓ) ❦ ❦❦❦ ❦❦❦ ❦❦❦ ❦ ❦ ❦❦ G2 (2f ℓ) ≀ S2 ❙❙❙ ❙❙❙ ❙❙❙ ❙❙❙ ❙❙ fℓ O− 6 (2 ) q qqq qqq q q q fℓ O− 12 (2 ):ℓ ♦ ♦♦♦ ♦♦♦ ♦ ♦ ♦♦ fℓ O− 12 (2 ):ℓ Sp6(2f ℓ) ≀ S2 ♥♥♥ ♥♥♥ ♥♥♥ ♥♥♥ ❘❘❘ ❘❘❘ ❘❘❘ ❘❘❘ ❘❘ ❖❖❖ ❖❖❖ ❖❖❖ ❖❖ × ❧ ❧❧❧ ❧❧❧ ❧❧❧ ❧❧❧ fℓ O+ 6 (2 ) This gives a factorization G = HK with H = G2 (2f ℓ ) ≀ S2 = (G2 (2f ) × G2 (2f )):2. Lemma 3.4. Let W be a 2-dimensional symplectic space over Fq with the nondegenerate symplectic form α and a standard basis w1 , w2 , and V be a 2m-dimensional symplectic space over Fq with the non-degenerate symplectic form β and a standard FACTORIZATIONS OF ALMOST SIMPLE GROUPS 9 basis u1 , v1 , . . . , um , vm . Define a quadratic form Q on W ⊗ V with the associated bilinear form: (W ⊗ V ) × (W ⊗ V ) → Fq , (w ⊗ v, w ′ ⊗ v ′ ) 7→ α(w, w ′)β(v, v ′) such that Q(w ⊗ v) = 0 for any w ∈ W and v ∈ V . Let B be the stabilizer in PΩ(W ⊗ V, Q) of hw1 ⊗ u1 + w2 ⊗ v1 i, and M = PSp2m (q) be a subgroup of PΩ(W ⊗ V, Q) that stabilizes W ⊗ V and acts trivially on W . Then, for m > 2 and q > 4, M ∩ B = {h ∈ PSp2ℓ (q) | uh1 = λu1, v1h = λv1 , λ2 = 1, λ ∈ F∗q }. Proof. Direct calculation shows that M ∩ B = {h ∈ PSp2m (q) | w1 ⊗ uh1 + w2 ⊗ v1h = λ(w1 ⊗ u1 + w2 ⊗ v1 ), λ ∈ F∗q } = {h ∈ PSp2m (q) | w1 ⊗ (uh1 − λu1 ) = w2 ⊗ (λv1 − v1h ), λ ∈ F∗q } = {h ∈ PSp2m (q) | uh1 = λu1 , v1h = λv1 , λ ∈ F∗q } = {h ∈ PSp2m (q) | uh1 = λu1 , v1h = λv1 , β(uh1 , v1h ) = β(u1 , v1 ), λ ∈ F∗q } = {h ∈ PSp2m (q) | uh1 = λu1 , v1h = λv1 , λ2 = 1, λ ∈ F∗q }, completing the proof.  Example 3.5. Let G = PΩ+ 4ℓ (q) with ℓ > 2 and q > 4, and K = N1 [G] = Sp4ℓ−2 (q). Then for any U 6 PSp2 (q), there exists a subgroup H = U × PSp2ℓ (q) of G such that G = HK, as in row 1 of Table 2. In fact, let W , V , Q, B and M be as defined in Lemma 3.4 with m = ℓ. Let G = PΩ(W ⊗ V, Q) and K = B (as there is only one conjugacy class of subgroups N1 [G] in G). Take H = U × M to be a subgroup of G stabilizing W ⊗ V which acts on W and V as U and M = PSp2ℓ (q), respectively. To prove G = HK, we only need to prove G = MK since M 6 H. By Lemma 3.4, we have |M ∩ K||G| = |{h ∈ PSp2ℓ (q) | uh1 = λu1 , v1h = λv1 , λ2 = 1, λ ∈ F∗q }||G| = |Sp2ℓ−2 (q)||G| = |PSp2ℓ (q)||K| = |M||K|. This shows that G = MK, proving Example 3.5. By [15, Theorem A], there is a maximal factorization G = AK with G = ΓSp4ℓ (4), − A = ΓO+ 4ℓ (4) and K = ΓO4ℓ (4). We generalize this in the next lemma by showing that A can be replaced by a smaller group Ω+ 4ℓ (4).2. Lemma 3.6. Let G = L ⋊ hφi = ΓSp4ℓ (4) with ℓ > 2, where L = Sp4ℓ (4) and φ is a field automorphism of order 2, and K = ΓO− 4ℓ (4) < G. Then there exists M = Ω+ (4) < L such that G = (M ⋊ hφi)K and (M ⋊ hφi) ∩ K = N1 [M]. 4ℓ Proof. From [15, 3.2.4(e)] we see that there is a subgroup A = ΓO+ 4ℓ (4) of G such that G = AK, A = (A∩L)⋊hφi and A∩K = N1 [A∩L] = Sp4ℓ−2 (4)×2. Taking M = + Soc(A ∩ L), we have M = Ω+ 4ℓ (4) < L, A ∩ L = O4ℓ (4) and A = (M ⋊ hφi)N1 [A ∩ L]. This implies that A = (M ⋊ hφi)(A ∩ K), and so G = (M ⋊ hφi)K by Lemma 2.4. Moreover, (M ⋊ hφi) ∩ K = (M ⋊ hφi) ∩ (A ∩ K) since M ⋊ hφi < A. Hence (M ⋊ hφi) ∩ K = (M ⋊ hφi) ∩ N1 [(A ∩ L)] = N1 [M], completing the proof.  10 LI AND XIA Example 3.7. Let G = ΓSp4ℓ (4) with ℓ > 2, and K = ΓO− 4ℓ (4) < G. Then there exists a subgroup H = (Sp2 (4) × Sp2ℓ (4)):2 of G such that G = HK, as in row 4 of Table 1. In fact, let φ and M be as in Lemma 3.6 with G = (M ⋊hφi)K and (M ⋊hφi)∩K = N1 [M]. As M = Ω+ 4ℓ (4), there is a maximal subgroup H = (Sp2 (4)⊗Sp2ℓ (4))⋊hφi of M ⋊ hφi. Then H = (Sp2 (4) × Sp2ℓ (4)):2, M ⋊ hφi = HM, and M = (H ∩ M)N1 [M] by [15, Theorem A]. It follows that M ⋊ hφi = H(H ∩ M)N1 [M] = HN1 [M]. Hence we have G = HK as shown in the diagram ΓSp4ℓ (4) ♥ ♥♥♥ ♥♥♥ ♥ ♥ ♥♥♥ ▼▼▼ ▼▼▼ ▼▼▼ ▼ PPP PPP PPP PPP q qqq qqq q q qq ΓO− 4ℓ (4) Ω+ 4ℓ (4) ⋊ hφi ❥❥ ❥❥❥❥ ❥❥❥❥ ❥ ❥ ❥ ❥❥❥ (Sp2(4) ⊗ Sp2ℓ(4)) ⋊ hφi N1 [Ω+ 4ℓ(4)] Example 3.8. Let G = Sp8ℓ (2) and K = O− 8ℓ (2) < G. Then there exists a subgroup H = (Sp2 (4) × Sp2ℓ (4)):2 of G such that G = HK, as in row 5 of Table 1. This is shown in the diagram Sp8ℓ(2) ❑❑ rr ❑❑ r r r r [15, Theorem A] ❑❑❑❑ r r ❑ rr (Sp2 (4) × ΓSp4ℓ(4) O− 8ℓ (2) ▲▲▲ ❧ t ❧ ❧ t ▲ ❧ t ❧ ▲ ❧❧❧ Example 3.7 ▲▲▲▲[15, 3.2.1(d)]tttt ❧❧❧ ▲ tt ❧❧❧ − Sp2ℓ(4)):2 ΓO4ℓ(4) Before stating the next lemma, recall from [15, Theorem A] that there is a maximal + factorization G = AK with G = Ω+ 4m (2), A = ΓO2m (4) and K = N1 [G]. We generalize this by showing in the lemma below that A can be replaced by a smaller group Ω+ 2m (4).2. Lemma 3.9. Let G = Ω+ 4m (2) with m > 2, K = N1 [G] = Sp4m−2 (2), A = + ΓO2m (4) < G and M = Soc(A) ⋊ hφi < G, where φ is the field automorphism of F4 of order 2. Then A∩K 6 O+ 2m (4), G = MK and M ∩K = N1 [Soc(A)] = Sp2m−2 (4). Proof. Let V be a 2m-dimensional orthogonal space over F4 with a non-degenerate quadratic form P of plus type, and let e1 , f1 , . . . , em , fm be a standard basis of V . Take A = O(V, P ) ⋊ hφi, so that M = Ω(V, P ) ⋊ hφi and φ fixes each of e1 , f1 , . . . , em , fm . Define a map Q from V to F2 by putting Q(u) = P (u) + P (u)2 for each u ∈ V . Then Q is a non-degenerate quadratic form of plus type on V while V is considered as a 4m-dimensional orthogonal space over F2 with respect to Q. Regard G as Ω(V, Q) and regard K as the stabilizer in G of e1 + ωf1 , where ω is a 2 2 generator of F× 4 . (Note that Q(e1 +ωf1 ) = P (e1 +ωf1 )+P (e1 +ωf1 ) = ω +ω = 1.) 2 Then A < G since both O(V, P ) and φ preserve P (u) + P (u) for each u ∈ V . FACTORIZATIONS OF ALMOST SIMPLE GROUPS 11 We first prove A ∩ K 6 O(V, P ). To see this, suppose on the contrary that there exists g ∈ O(V, P ) \ (A ∩ K). Then since A = O(V, P ) ⋊ hφi, we conclude that P gφ ∈ K. Writing (e1 + ωf1 )g = 2ℓ i=1 (ai ei + bi fi ) with a1 , b1 , . . . , a2ℓ , b2ℓ ∈ F4 , we deduce that !φ 2ℓ 2ℓ X X e1 + ωf1 = (e1 + ωf1 )gφ = (ai ei + bi fi ) = (a2i ei + b2i fi ). i=1 a21 = 2 b21 a2i i=1 b2i This means 1, = ω and = = 0 for 2 6 i 6 2ℓ, which is equivalent to a1 = 1, b1 = ω and ai = bi = 0 for 2 6 i 6 2ℓ. Now (e1 + ωf1 )g = 2ℓ X (ai ei + bi fi ) = e1 + ω 2f1 , i=1 2 but P (e1 +ωf1 ) = ω 6= ω = P (e1 +ω 2 f1 ), contradicting g ∈ O(V, P ). Consequently, A ∩ K 6 O(V, P ) = O+ 2m (4). By the above conclusion we know that M ∩ K 6 O(V, P ), and so M ∩ K = O(V, P ) ∩ M ∩ K = Ω(V, P ) ∩ K = N1 [Soc(A)] = Sp2m−2 (4). As a consequence, |M ∩ K||G| = |M||K|. This yields G = MK by Lemma 2.1.  Example 3.10. Let G = Ω+ 8ℓ (2) and K = N1 [G] = Sp8ℓ−2 (2). Then there exists a subgroup H = (Sp2 (4) × Sp2ℓ (4)):2 of G such that G = HK, as in row 2 of Table 2. In fact, let φ and M be as in Lemma 3.9 with m = 2ℓ, so that G = MK and M ∩ K = N1 [Soc(M)] = Sp4ℓ−2 (4). Taking H = (Sp2 (4) ⊗ Sp2ℓ (4)) ⋊ hφi to be a maximal subgroup of M = Ω+ 4ℓ (4) ⋊ hφi, we have H = (Sp2 (4) × Sp2ℓ (4)):2, M = HSoc(M), and Soc(M) = (H ∩ Soc(M))N1 [Soc(M)] by [15, Theorem A]. It follows that M = H(H ∩ Soc(M))N1 [Soc(M)] = HN1 [Soc(M)], and then the diagram ♥♥♥ ♥♥♥ ♥ ♥ ♥ ♥♥♥ Ω+ 8ℓ (2) ◆◆◆ ◆◆◆ ◆◆◆ ◆◆ Ω+ 4ℓ (4) ⋊ hφi ❥❥❥❥ ❥❥❥❥ ❥ ❥ ❥ ❥ ❥❥❥❥ PPP PPP PPP PPP Sp8ℓ−2(2) ♣♣♣ ♣♣♣ ♣ ♣ ♣♣♣ N1[Ω+ 4ℓ(4)] (Sp2 (4) ⊗ Sp2ℓ (4)) ⋊ hφi shows that G = HK. Example 3.11. Let G = ΓO+ 8ℓ (4) and K = N1 [G]. Then there exists a subgroup H = (Sp2 (4) × Sp2ℓ (16)):4 of G such that G = HK, as in row 3 of Table 2. Let W , V , Q and M be as in Lemma 3.4 with m = 2ℓ and q = 4, and take ei = w1 ⊗ ui , fi = w2 ⊗ vi , ei+2ℓ = w1 ⊗ vi and fi+2ℓ = w2 ⊗ ui for 1 6 i 6 2ℓ. Then e1 , f1 , . . . , e4ℓ , f4ℓ is a standard basis of the orthogonal space W ⊗ V . Let φ be the field automorphism of order 2 fixing each of e1 , f1 , . . . , e4ℓ , f4ℓ . Then we can regard G as O(W ⊗ V, Q) ⋊ hφi and regard K as the stabilizer in G of 12 LI AND XIA he1 + f1 i. Let A = (C × M) ⋊ hφi be the subgroup of G stabilizing W ⊗ V , where C = Sp2 (4) acts on V trivially, and denote the actions of A on W and V by π1 and π2 respectively. It is evident that Aπ1 = ΓSp2 (4) and Aπ2 = ΓSp4ℓ (4). Take D = Sp2ℓ (16):2 to be a C3 -subgroup of M such that (D ⋊ hφi)π2 = ΓSp2ℓ (16). Then there exists an element σ of M with (D ⋊ hφi)π2 = Soc(D) ⋊ hσφiπ2 = Sp2ℓ (16):4. As (σφ)π1 = φπ1 has order 2 and (σφ)π2 has order 4, we see that σφ has order 4. / Soc(D). Furthermore, σφ normalizes Also, hσφi ∩ Soc(D) = 1 since ((σφ)2 )π2 ∈ C × Soc(D) since both σ and φ normalize C × Soc(D). Thus we have a subgroup H = (C × Soc(D)) ⋊ hσφi = (Sp2 (4) × Sp2ℓ (16)):4 of A. We claim that (A ∩ K)π2 contains the stabilizer in Aπ2 of the non-degenerate 2space hu1 , v1 i. Since A ∩ K > hφi, it suffices to show that (A ∩ K)π2 contains the stabilizer of hu1, v1 i in M π2 = Sp4ℓ (4). Let g be an arbitrary element of M π2 that stabilizes hu1, v1 i. Then ug1 = au1 + bv1 and v1g = cu1 + dv1 for some a, b, c, d ∈ F4 with ad + bc = 1. Take x ∈ C and y ∈ M such that w1x = dw1 + cw2, w2x = bw1 + aw2 and y π2 = g, and let k = xy ∈ A. It is straightforward to verify that k π2 = g and k fixes e1 + f1 , which means k ∈ A ∩ K. This proves our claim. Now we have H π2 > Soc(D) ⋊ hσφiπ2 = (D ⋊ hφi)π2 = ΓSp2ℓ (16) and (A ∩ K)π2 > N2 [Aπ2 ]. It follows from [15, Theorem A] that Aπ2 = ΓSp4ℓ (4) has a factorization Aπ2 = H π2 (A ∩ K)π2 . Then since A contains C = ker(π2 ), we deduce that A = H(A ∩ K). Therefore, the diagram G = ΓO+ 8ℓ (4) ❖❖❖ ✐ ✐ ✐ ✐ ❖❖ ✐ ✐ ✐✐✐ [15, Theorem A] ❖❖❖❖❖ ✐ ✐ ✐ ❖❖ ✐✐✐✐ A = (Sp2 (4) × Sp4ℓ(4)):2 H ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯❯ ❦ ❦❦❦ ❦❦❦ ❦ ❦ ❦ ❦❦❦ ❦❦❦ K = N1 A∩K ♥ ♥♥♥ ♥♥♥ ♥ ♥ ♥♥♥ shows that G = HK, proving Example 3.11. Example 3.12. Let L = Sp6 (2f ) with f > 2, G be an almost simple group with socle L, H = U ×Sp4 (2f ) 6 N2 [L] with U 6 Sp2 (2f ), and K be a maximal subgroup of G such that K ∩ L = G2 (2f ). Then G = HK, as in row 7 of Table 1. By [19, 4.3], there is a 6-dimensional vector space V over F2f with basis x1 , x2 , x3 , x6 , x7 , x8 and a bilinear form β on V with Gram matrix 1        1 1 1 1 1        FACTORIZATIONS OF ALMOST SIMPLE GROUPS 13 such that L := Sp(V, β) = Sp6 (2f ) has a subgroup N = G2 (2f ) generated by r : (x1 , x2 , x3 , x6 , x7 , x8 ) 7→ (x1 , x3 , x2 , x7 , x6 , x8 ), s : (x1 , x2 , x3 , x6 , x7 , x8 ) 7→ (x2 , x1 , x6 , x3 , x8 , x7 ), T (λ, µ) : (x1 , x2 , x3 , x6 , x7 , x8 ) 7→ (λx1 , µx2 , λµ−1x3 , λ−1 µx6 , µ−1 x7 , λ−1 x8 ), A(α) : x7 7→ x7 + αx1 , x8 7→ x8 + αx2 and F (α) : x2 7→ x2 + αx1 , x6 7→ x6 + α2 x3 , x8 7→ x8 + αx7 , where λ runs over F∗2f , µ runs over F∗2f and α runs over F2f . Let M be the subgroup of L generated by s, (rs)3 , T (λ, µ), A(α), F (α), and φ be the semilinear transformation of V defined by (α1 x1 +α2 x2 +α3 x3 +α6x6 +α7 x7 +α8 x8 )φ = α12 x1 +α22x2 +α32x3 +α62x6 +α72x7 +α82x8 for α1 , α2 , α3 , α6 , α7 , α8 ∈ F2f . Then we can write G = L⋊hφe i and K = N ⋊hφe i for some divisor e of f . Moreover, M stabilizes hx3 , x6 i and hx1 , x2 , x7 , x8 i, respectively. Let A be the stabilizer in G of hx3 , x6 i whose actions on hx3 , x6 i and hx1 , x2 , x7 , x8 i are denoted by π1 and π2 , respectively. It follows that K ∩ L = G2 (2f ), and A ∩ L = (A ∩ L)π1 × (A ∩ L)π2 with (A ∩ L)π1 = Sp2 (2f ) and (A ∩ L)π2 = Sp4 (2f ). Note that f M 6 A ∩ K ∩ L while M = Ω+ 4 (2 ) is a maximal subgroup of K ∩ L. We conclude that A ∩ K ∩ L = M since K ∩ L does not stabilize hx3 , x6 i. Now as |A ∩ K ∩ L||L| = |M||L| = |A ∩ L||K ∩ L|, we have L = (A ∩ L)(K ∩ L) by Lemma 2.1. Regard H = U × (A ∩ L)π2 6 A ∩ L, U being a subgroup of (A ∩ L)π1 . Note that the subgroup of M generated by (rs)3 , T (λ, 1), F (α), where λ runs over F∗2f and α runs over F2f , acts on hx3 , x6 i as Sp2 (2f ). We have M π2 > (A ∩ L)π1 and so (A ∩ K ∩ L)π1 = (A ∩ L)π1 . Accordingly, H(A ∩ K ∩ L) > (A ∩ L)π2 (A ∩ K ∩ L) = (A ∩ L)π2 (A ∩ K ∩ L)π1 = (A ∩ L)π2 (A ∩ L)π1 = A ∩ L, which means A ∩ L = H(A ∩ K ∩ L). This together with H 6 A ∩ L and L = (A∩L)(K∩L) implies that L = H(K∩L). Hence HK = H(K∩L)hφe i = Lhφe i = G, which proves Example 3.12. f f Example 3.13. Let G = Ω+ 12 (2 ) with f > 2, and K = N1 [G] = Sp10 (2 ). Then for f f any U 6 Sp2 (2 ), there exists a subgroup H = U × G2 (2 ) of G such that G = HK, as in row 4 of Table 2. Let W , V , Q, B and M be as defined in Lemma 3.4 with m = 3 and q = 2f . Then we may let G = Ω(W ⊗ V, Q) and K = B. It follows from Lemma 3.4 that M ∩ K = Sp4 (2f ) < N2 [M]. Hence |M ∩ K||G| = |M||K|, and so G = MK by Lemma 2.1. Let N = G2 (2f ) < M, and H = U ⊗ N be a subgroup of G stabilizing W ⊗ V which acts on W and V as U and N, respectively. To prove that G = HK, it suffices to prove G = NK since N 6 H. In fact, Example 3.12 shows that M = N(M ∩ K), which together with G = MK leads to G = NK by Lemma 2.4. 14 LI AND XIA This implies G = HK, proving Example 3.13. We remark that here M is contained in a maximal subgroup A = Sp2 (2f ) ⊗ Sp6 (2f ) of G, so that we have the diagram qqq qqq q q qq qqq M H ⑤ ⑤⑤ ⑤⑤ ⑤ ⑤⑤ ✉ ✉✉ ✉✉ ✉✉ ✉ ✉✉ A ▼▼▼ ■■ ■■ ■■ ■■ ■ ▼▼▼ ▼▼▼ ▼▼ G ❍❍ ❍❍ ❍❍ ❍❍ ❍❍ ✈✈ ✈✈ ✈✈ ✈ ✈✈ K A∩K qq qqq q q qqq M ∩K Example 3.14. Let G = ΓSp12 (4) and H = N2 [G] = (Sp2 (4) × Sp10 (4)):2. Then there exists a subgroup K = G2 (16):4 of G such that G = HK, as in row 8 of Table 1. Let B = ΓSp6 (16) be a C3 -subgroup of G. According to [15, 3.2.1(a)] we have G = HB with H ∩ B = H ∩ Soc(B) = Sp2 (4) × Sp4 (16). Take K = G2 (16):4 to be a maximal subgroup of B (see [4, Table 8.29]). Then B = Soc(B)K and K ∩ Soc(B) = G2 (16). Moreover, Soc(B) = (H ∩ Soc(B))(K ∩ B) as Example 3.12 shows. Thereby we deduce B = (H ∩ Soc(B))K and thus B = (H ∩ B)K. This implies G = HK as shown in the diagram G = ΓSp12(4) H = N2 ❥❥ ❥❥❥❥ ❥❥❥❥ ❥ ❥ ❥ ❥❥❥❥ ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯ ❚❚❚❚ ❚❚❚❚ ❚❚❚❚ ❚❚❚❚ ❚ ✐ ✐✐✐✐ ✐✐✐✐ ✐ ✐ ✐ ✐ ✐✐✐✐ H ∩ B = Sp2(4) × Sp4 (16) B = ΓSp6 (16) ❘❘❘ ❘❘❘ ❘❘❘ ❘❘❘ ❘ K = G2(16):4 proving Example 3.14. Example 3.15. Let G = ΓSp12 (4) and K = ΓO− 12 (4) < G. Then there exists a subgroup H = (Sp2 (4) × G2 (4)):2 of G such that G = HK, as in row 9 of Table 1. Let φ and M be as in Lemma 3.6 with ℓ = 3, so that G = (M ⋊ hφi)K and (M ⋊ hφi) ∩ K = N1 [M]. Following the proof of Example 3.13 we obtain a subgroup H ∗ = Sp2 (4)×G2 (4) of M such that M = H ∗ N1 [M] and H ∗ is normalized by φ. Take H = H ∗ ⋊ hφi < M ⋊ hφi. We have H = (Sp2 (4) × G2 (4)):2 and M ⋊ hφi = HM. It follows from Lemma 2.4 that M ⋊ hφi = HN1 [M] since H ∩ M = H ∗ and FACTORIZATIONS OF ALMOST SIMPLE GROUPS 15 M = H ∗ N1 [M]. This implies G = HK as shown in the diagram G = ΓSp12(4) ❘❘❘ ❘❘❘ ❘❘❘ ❘❘❘ ❘ ❥❥❥❥ ❥❥❥❥ ❥ ❥ ❥ ❥❥❥❥ K = ΓO− 12 (4) M ⋊ hφi = Ω+ 12 (4):2 H ♥♥ ♥♥♥ ♥♥♥ ♥ ♥ ♥♥ ♥♥♥ ❚❚❚❚ ❚❚❚❚ ❚❚❚❚ ❚❚❚❚ ❚ N1 [M] ❧❧❧ ❧❧❧ ❧❧❧ ❧ ❧ ❧❧❧ proving Example 3.15. Example 3.16. Let G = Ω+ 24 (2) and K = N1 [G] = Sp22 (2). Then there exists a subgroup H = (Sp2 (4) × G2 (4)):2 of G such that G = HK, as in row 5 of Table 2. In fact, let φ and M be as in Lemma 3.9 with m = 6, so that G = MK and M ∩ K = N1 [Soc(M)]. Following the proof of Example 3.13 we obtain a subgroup H ∗ = Sp2 (4) × G2 (4) of Soc(M) such that Soc(M) = H ∗N1 [Soc(M)] and H ∗ is normalized by φ. Take H = H ∗ ⋊ hφi < M. We have H = (Sp2 (4) × Sp2ℓ (4)):2 and M = HSoc(M). This implies M = HN1 [Soc(M)] by Lemma 2.4 since H ∩Soc(M) = H ∗ and Soc(M) = H ∗ N1 [Soc(M)]. Then the following diagram shows that G = HK. G = Ω+ 24 (2) ♠ ♠♠♠ ♠♠♠ ♠ ♠ ♠ ♠♠♠ PPP PPP PPP PPP ◗◗◗ ◗◗◗ ◗◗◗ ◗◗◗ ◗ ♥ ♥♥♥ ♥♥♥ ♥ ♥ ♥♥♥ M = Ω+ 12(4):2 H rr rrr r r rr rrr K = N1 [G] N1[Soc(M)] Example 3.17. Let G = Sp24 (2) and K = O− 24 (2) < G. Then there exists a subgroup H = (Sp2 (4) × G2 (4)):2 of G such that G = HK, as in row 10 of Table 1. This is shown in the diagram Sp (2) O+ 24 (2) qq qqq q q qqq Ω+ 24(2) ▼ ♠ ▼▼▼ ♠ ♠ ♠ ♠ ▼ Example 3.16 ▼▼▼▼ ♠♠♠ ♠ ♠ ▼ ♠♠♠ (Sp2(4) × G2 (4)):2 24 ▼▼▼ ♦♦ ♦♦♦[15, Theorem A]▼▼▼▼ ♦ ♦ ▼▼▼ ♦ ♦♦♦ O− 24 (2) ❖❖❖ ❖❖❖ qqq ❖❖❖ [15, 3.2.4(e)] qqqq ❖❖ qqq + N1 [O24(2)] ♦♦ ♦ ♦ ♦ ♦♦♦ ♦♦♦ N1[Ω+ 24(2)] Example 3.18. Let G = ΓO+ 24 (4) and K = N1 [G]. Then there exists a subgroup H = (Sp2 (4) × G2 (16)):4 of G such that G = HK, as in row 6 of Table 2. 16 LI AND XIA Let W , V , Q and M be as in Lemma 3.4 with m = 6 and q = 4, and take ei = w1 ⊗ ui , fi = w2 ⊗ vi , ei+6 = w1 ⊗ vi and fi+6 = w2 ⊗ ui for 1 6 i 6 6. Then e1 , f1 , . . . , e12 , f12 is a standard basis of the orthogonal space W ⊗ V . Let φ be the field automorphism of order 2 fixing each of e1 , f1 , . . . , e12 , f12 . Then we can regard G as O(W ⊗ V, Q) ⋊ hφi and regard K as the stabilizer in G of he1 + f1 i. Let A = (C × M) ⋊ hφi be the subgroup of G stabilizing W ⊗ V , where C = Sp2 (4) acts on V trivially, and denote the actions of A on W and V by π1 and π2 respectively. It is evident that Aπ1 = ΓSp2 (4) and Aπ2 = ΓSp12 (4). Following the proof of Example 3.14 we see that there is a subgroup D = G2 (16):2 of M = Sp12 (4) with (D⋊hφi)π2 = G2 (16):4 and Aπ2 = (D⋊hφi)π2 N2 [Aπ2 ]. Accordingly, there exists an element σ of M such that (D ⋊ hφi)π2 = Soc(D) ⋊ hσφiπ2 = G2 (16):4. Since (σφ)π1 = φπ1 has order 2 and (σφ)π2 has order 4, we conclude that σφ has order 4. Also, hσφi ∩ Soc(D) = 1 as ((σφ)2 )π2 ∈ / Soc(D). Furthermore, σφ normalizes C × Soc(D) since both σ and φ normalize C × Soc(D). Thus we have a subgroup H = (C × Soc(D)) ⋊ hσφi = (Sp2 (4) × G2 (16)):4 of A. As in the proof of Example 3.11 we know that (A ∩ K)π2 contains the stabilizer in Aπ2 of the non-degenerate 2-space hu1, v1 i. Now (A ∩ K)π2 > N2 (Aπ2 ) and Aπ2 = H π2 N2 [Aπ2 ]. It follows that Aπ2 = H π2 (A ∩ K)π2 , and so A = H(A ∩ K) since A contains C = ker(π2 ). Therefore, the diagram G = ΓO+ 24 (4) ❖❖❖ ✐ ❖❖ ✐✐✐✐ ✐ ✐ ✐ ✐ ✐ [15, Theorem A] ❖❖❖❖❖ ✐ ✐ ✐ ✐ ❖❖ ✐ ✐✐ A = (Sp2(4) × Sp12(4)):2 H ❦❦❦ ❦❦❦ ❦❦❦ ❦ ❦ ❦❦❦ ❦❦❦ ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯❯❯❯ ❯❯❯ K = N1 A∩K ♥♥ ♥♥♥ ♥♥♥ ♥ ♥ ♥♥ shows that G = HK, proving Example 3.18. Corollary 3.19. For each L as in the second column of Table 1, there exist an almost simple group G with socle L and a factorization G = HK such that H ∩ L and K ∩ L are as described in the same row as L in Table 1. Proof. For row 3 and row 6 of Table 1, there is a maximal factorization G = HK (corresponding to row 2 and row 3 of Table 3 respectively) as Lemma 3.1 shows. For the other rows of Table 1, the assertion is true by the example indicated in the last column of Table 1.  4. At least two nonsolvable composition factors of A In this section we prove that under Hypothesis 2.8, if A has at least two nonsolvable composition factors then (L, H ∩L, K ∩L) lies in Table 1 or Table 2, as part (b) of Theorem 1.1 asserts. For Sp4 (2f ) 6 G 6 ΓSp4 (2f ) with f > 2, we have factorizations G = XY with f f f X ∩ Soc(G) = O− 4 (2 ) or Sz(2 ) and Y ∩ L = Sp2 (2 ) ≀ S2 (see [15, Theorem A]). The lemma below shows that, however, G = XY does not hold if Y is replaced by its index 2 subgroup N2 [G]. FACTORIZATIONS OF ALMOST SIMPLE GROUPS 17 Lemma 4.1. Let L = Sp4 (2f ) with f > 2, and L 6 G 6 ΓSp4 (2f ). Suppose G = XN2 [G] for some subgroup X of G. Then X > L. Proof. Let Y be a maximal subgroup of G containing T := N2 [G]. We have Y ∩ L = Sp2 (2f ) ≀ S2 and G = XY . It then follows from [15, Theorem A] that one of the following cases appears. (i) X > L. f (ii) X ∩ L 6 O− 4 (2 ). (iii) f is odd and X ∩ L 6 Sz(2f ). f If case (ii) appears, then the factorization G = XT would imply that ΓO− 4 (2 ) is transitive on the nonsingular 2-dimensional symplectic subspaces, which is not true. Suppose that case (iii) appears. Let Z be a maximal subgroup of G containing X such that Z ∩ L = Sz(2f ). According to [18], Z ∩ L contains an element g whose matrix with respect to a standard basis e1 , f1 , e2 , f2 for Sp4 (2f ) is   0 1  1 0 .   0 1 1 0 By the equivalence of statements (a) and (b) of Lemma 2.1, we may assume that T fixes he1 , f1 i. Thus Z ∩ T > hgi and so |Z ∩ T |2 > 2. Since G/L 6 f has odd order, we have |Z|2 = |Z ∩ L|2 and |T |2 = |T ∩ L|2 . Moreover, the factorization G = XT indicates G = ZT since X 6 Z. Thus we derive that |Z|2 |T |2 |Z ∩ L|2 |T ∩ L|2 |Z ∩ T |2 = = |G|2 |G|2 |Sz(2f )|2 |Sp2 (2f ) × Sp2 (2f )|2 = = 1, |Sp4 (2f )|2 a contradiction. Hence X > L as the lemma asserts.  We also need the following two technical lemmas. Lemma 4.2. Let L = Sp2ℓ (2f ) with f ℓ > 2, and L 6 G 6 ΓSp2ℓ (2f ). Suppose G = RX = RY for some nonsolvable subgroup R and subgroups X and Y such − f f fk that X ∩ L = O+ 2ℓ (2 ) and Y ∩ L = O2ℓ (2 ). Then either Sp2ℓ/k (2 ) 6 R ∩ L 6 Sp2ℓ/k (2f k ).k for some integer k dividing ℓ, or G2 (2f ℓ/3 ) 6 R ∩ L 6 G2 (2f ℓ/3 ).(ℓ/3) with ℓ divisible by 3. Proof. We use induction on ℓ. First suppose ℓ = 1. Take any r ∈ ppd(2, 2f ). Then r divides |G|/|X|, and so r divides |R| since G = RX. As r > f and |R|/|R ∩ L| 6 f , it follows that r divides |R ∩ L|. Thus, from the classification of subgroups of Sp2 (2f ) = SL2 (2f ) (see for example [11, II §8]) we conclude that R ∩ L = Sp2 (2f ) as R ∩ L is an nonsolvable subgroup of Sp2 (2f ) of order divisible by r. Next suppose that ℓ > 1 and the lemma holds for each smaller ℓ. Let T be a maximal subgroup of G containing R, and assume that T is core-free in G in view of Lemma 2.5. It follows that G = T X = T Y . Then by [15, Theorem A], either T ∩ L = Sp2a (2f b ).b with ab = ℓ and b prime, or T ∩ L = G2 (2f ) with ℓ = 3. Case 1. T ∩L = Sp2a (2f b ).b, where ab = ℓ and b is a prime divisor of ℓ. In this case, T is an almost simple group with socle Sp2a (2f b ), and we deduce from Lemma 2.3 18 LI AND XIA fb that T = R(X ∩T ) = R(Y ∩T ). Furthermore, it is clear that X ∩Soc(T ) = O+ 2a (2 ) − fb and Y ∩ Soc(T ) = O2a (2 ). Then by our inductive hypothesis, either (i) Sp2a/d (2f bd ) 6 R ∩ Soc(T ) 6 Sp2a/d (2f bd ).d for some divisor d of a, or (ii) G2 (2f ba/3 ) 6 R ∩ Soc(T ) 6 G2 (2f ba/3 ).(a/3) with a divisible by 3. Note R∩Soc(T ) 6 R∩L 6 (R∩Soc(T )).((T ∩L)/Soc(T )) = (R∩Soc(T )).b. For (i), we obtain by writing k = bd that Spℓ/k (2f k ) 6 R ∩ L 6 (Spℓ/k (2f k ).d).b = Spℓ/k (2f k ).k. For (ii), we have G2 (2f ℓ/3 ) 6 R ∩ L 6 (G2 (2f ℓ/3 ).(a/3)).b = G2 (2f ℓ/3 ).(ℓ/3). Hence the conclusion of the lemma holds. Case 2. ℓ = 3 and T ∩ L = G2 (2f ). In this case, G2 (2f ) 6 T 6 G2 (2f ).f , and T = R(X ∩T ) with X ∩T ∩L = SL3 (2f ).2 (see [15, 5.2.3(b)]). Since R is nonsolvable, we conclude R > Soc(T ) by [10], which implies R ∩ L = G2(2f ). This satisfies the conclusion of the lemma. The proof is thus completed.  Lemma 4.3. Let G be an almost simple group with socle L = PSp2ℓ (q), where ℓ > 3 and q > 4. Suppose G = XN2 [G] for some subgroup X of G. Then one of the following holds. (a) (b) (c) (d) X > L. ℓ = 3, q is even and X ∩ L = G2 (q). ℓ is even, q = 4 and Spℓ (q 2 ) 6 X ∩ L 6 Spℓ (q 2 ).2. ℓ = 6, q = 4 and G2 (q 2 ) 6 X ∩ L 6 G2 (q 2 ).2. Proof. If X is not core-free in G, then part (a) of the lemma holds. In the remaining of the proof we assume that X is core-free in G. Let T be a maximal subgroup of G containing X and let Y = N2 [G]. It follows from G = XY that G = T Y . By Lemma 2.5 we may assume that T is core-free in G. Then appealing to [15, Theorem A] we have the following two cases. (i) ℓ = 3, q is even and T ∩ L = G2 (q). (ii) ℓ is even, q = 4 and T ∩ L = Spℓ (q 2 ).2. Note that T = X(T ∩ Y ) by Lemma 2.3. First assume that case (i) appears. Here T is almost simple with socle G2 (q) and T ∩ Y ∩ L = Sp2 (q) × Sp2 (q) (see [15, 5.2.3(b)]). According to [10], the factorization T = X(T ∩ Y ) implies that X > Soc(T ). Consequently, X ∩ L = G2 (q) as described in part (b) of the lemma. Next assume that case (ii) appears. In this case, Spℓ (q 2 ) 6 T 6 ΓSpℓ (q 2 ) and T ∩ Y 6 N2 [T ] (see [15, 3.2.1(a)]). If X is not core-free in T , then part (c) of the lemma holds. Now assume that X is core-free in T . Then by [15, Theorem A], ℓ = 6 and X ∩ Soc(T ) 6 G2 (q). Applying the same argument as in case (i) (with G therein replaced by T here) to the factorization T = XN2 [T ] we conclude that X ∩ Soc(T ) = G2 (q). This implies G2 (q 2 ) 6 X ∩ L 6 G2 (q 2 ).2, as in part (d) of the lemma.  Now we can prove the main result of this section. FACTORIZATIONS OF ALMOST SIMPLE GROUPS 19 Lemma 4.4. Suppose Hypothesis 2.8 and that A has at least two nonsolvable composition factors, then (L, H ∩ L, K ∩ L) lies in Table 1 or Table 2. Proof. By Lemma 3.1, (L, A ∩ L, B ∩ L) = (L, X, Y ) as in Table 3. Let G = L.O with O 6 Out(L). We discuss the eight rows of Table 3 in order. Row 1. In this row, O 6 f and A ∩ L = (C × D).2 with C ∼ = D = Sp2ℓ (2f ). Let M = (C ×D).O = N2ℓ [G] be the subgroup of index 2 in A such that M ∩L = C ×D. − f f Since A ∩ B = (O+ 2ℓ (2 ) × O2ℓ (2 )).O (see [15, 3.2.4(b)]), we have A ∩ B 6 M. Applying Lemma 2.3, we deduce from G = HB that A = H(A ∩ B) and then M = (H ∩ M)(A ∩ B). Note that M 6 (C.O) × (D.O). Let π+ and π− be the projections from M to C.O and D.O respectively. Then M πε = (H ∩ M)πε (A ∩ B)πε for ε = ±. f If H 6 M, then G = N2ℓ [G]B, which implies that B = O− 4ℓ (2 ).O is transitive on the nonsingular symplectic subspaces of dimension 2ℓ, a contradiction. Hence there exists g ∈ H such that C g = D and so (H ∩ C)g = H ∩ D. As a consequence, (H∩(C×D))π+ ∼ = (H∩(C×D))π− = U for some U 6 Sp2ℓ (2f ), and (H∩M)πε 6 U.O for ε = ±. Since M πε = (H ∩ M)πε (A ∩ B)πε and (A ∩ B)πε = Oε2ℓ (2f ).O for ε = ±, we conclude from Lemma 4.2 that either Sp2ℓ/k (2f k ) 6 U 6 Sp2ℓ/k (2f k ).k for some integer k dividing ℓ, or G2 (2f ℓ ) 6 U 6 G2 (2f ℓ/3 ).(ℓ/3) with ℓ divisible by 3. In particular, U is an almost simple group. This implies H ∩(C ×D) > Soc(U)×Soc(U) as H has at least two nonsolvable composition factors. It follows that H ∩ L = (H ∩ (C × D)).2 = (Soc(U) × Soc(U)).R.2, where either Soc(U) = Sp2ℓ/k (2f k ) and R 6 k × k with k dividing ℓ, or Soc(U) = G2 (2f ℓ/3 ) and R 6 (ℓ/3) × (ℓ/3) with ℓ divisible by 3. Next we show that K ∩ L > f Ω− 4ℓ (2 ) and thus either row 1 or row 2 of Table 1 appears. f Suppose K ∩ L Ω− 4ℓ (2 ). Then we have a factorization B = (A ∩ B)K with f K core-free in B. Moreover, B is an almost simple group with socle Ω− 2ℓ (2 ), and + − f f A ∩ B = (O2ℓ (2 ) × O2ℓ (2 )).O is a maximal subgroup of B. However, inspection of [15, Tables 1–3] shows that no such factorization exists. This contradiction proves f that K ∩ L > Ω− 4ℓ (2 ), as desired. Row 2. From [15, Table 1] we see that G = L.2 and A = (C ×D).2 < (C.2)×(D.2), where C = Sp2 (4) and D = Sp4ℓ−2 (4). Let ϕ be the projection from A to D.2. Then since A = H(A ∩ B) by Lemma 2.3, we have Aϕ = H ϕ (A ∩ B)ϕ . Moreover, Aϕ is an almost simple group with socle Sp4ℓ−2 (4), and (A ∩ B)ϕ 6 N2 [Aϕ ]. Suppose that H ϕ is core-free in Aϕ . Then as Aϕ = H ϕ N2 [Aϕ ], we conclude from [15, Theorem A] that ℓ = 2 and H ϕ 6 G2 (4).2. Consequently, H ∩ L 6 C × M with M = G2 (4) < D. Applying Lemma 2.2 to the factorization G = HB we see that |H ∩ L| is divisible by |L|/|B| = |Sp8 (4)|/|Sp4 (16).4| = 4|G2(4)| = 4|M|. Since the smallest index of proper subgroups of M = G2 (4) is 416 (see [6]), which is larger than |C|/4, it follows that H ∩L > M. This in turn forces H ∩L = C ×M in order that H has at least two nonsolvable composition factors. However, A ∩ B > C (see [15, 3.2.1(a)]), whence |H ∩ B| > |C| > |C| |C||M||B| |H ∩ L||B| |H||B| = = > , 4 |L| |L| |G| contradicting the factorization G = HB. Thus, H ϕ is not core-free in Aϕ , and so H ∩ L > D. As H has at least two nonsolvable composition factors, we thereby 20 LI AND XIA obtain H ∩ L = C × D = Sp2 (4) × Sp4ℓ−2 (4). If K ∩ L > Sp2ℓ (16), then row 3 of Table 1 appears. Now assume K ∩ L Sp2ℓ (16). Note that B is almost simple with socle Sp2ℓ (16) and A ∩ B = Sp2 (4) × Sp2ℓ−2 (16) < N2 [B]. We have B = N2 [B]K with K core-free in B. Thereby we conclude from Lemma 4.3 that ℓ = 3 and G2 (16) 6 K ∩ L 6 G2 (16).2. This leads to row 8 of Table 1. Row 3. In this row, O 6 f and A ∩ L = (C × D).2 with C ∼ = D = Sp2 (2f ). Applying Lemma 2.2 to the factorization G = HB we see that f |H ∩ L| is divisible by |L|/|B ∩ L| = 22f (22f − 1)(2f + 1). Consequently, as |H ∩ L|/|H ∩ (C × D)| divides |A ∩ L|/|C × D| = 2, f |H ∩ (C × D)| is divisible by 22f −1 (22f − 1)(2f + 1). Moreover, |H ∩ (C × D)| divides |H ∩ C||D| = |H ∩ C||Sp2 (2f )|. It follows that f |H ∩ C| is divisible by 22f −1 (22f − 1)(2f + 1)/|Sp2 (2f )| = 2f −1 (2f + 1). Then by the classification of subgroups of Sp2 (2f ) we conclude that H ∩ C = Sp2 (2f ). For the same reason, H ∩ D = Sp2 (2f ). Therefore, H ∩ L > C × D, which means that H ∩ L = (C × D).P = (Sp2 (2f ) × Sp2 (2f )).P with P 6 2. Since G = AK, by Lemma 2.3 we have B = (A ∩ B)K. Note that B is almost simple with socle Sz(2f ) and A ∩ B = D2(2f −1) .O (see [15, 5.1.7(b)]). We then infer from [10] that K > Soc(B). Hence K ∩ L = Sz(2f ), as in row 6 of Table 1. Row 4. Let N, M, φ, A, π1 and π2 be as in the proof of Example 3.12. Since G has a unique conjugacy class of maximal subgroups isomorphic to B, we may assume that B = hN, φe i by Lemma 2.1(b), where e = |O|. Then A ∩ B = M ⋊ hφe i. By Lemma 2.3, we derive from G = HB and H 6 A that A = H(A ∩ B), so Aπ2 = H π2 (A ∩ B)π2 . Note that Aπ2 = Sp4 (2f ) has a graph automorphism fusing f its C2 -subgroups with C8 subgroups, and M π2 = Ω+ 4 (2 ). We thereby obtain a factorization Aπ2 γ = H π2 γ N2 [Aπ2 γ ] for some automorphism γ of Aπ2 . Hence by Lemma 4.1, H π2 > Soc(Aπ2 ) = Sp4 (2f ), and so H ∩ L = U × Sp4 (2f ) for some subgroup U of (A ∩ L)π1 = Sp2 (2f ). Moreover, U is nonsolvable because H ∩ L has at least two nonsolvable composition factors. Next we show that K ∩ L = G2 (2f ) and thus (L, H ∩ L, K ∩ L) lies in row 7 of Table 1. Suppose K ∩ L < B ∩ L = G2 (2f ). Then is K core-free in B. By Lemma 2.3, we derive from G = AK and K 6 B that B = (A ∩ B)K. However, as B is an almost simple group with socle G2 (2f ) and A ∩ B = (Sp2 (2f ) × Sp2 (2f )).O, it is seen in [10] that no such factorization B = (A ∩ B)K exists. This contradiction yields K ∩ L = G2 (2f ), as desired. Rows 5 and 6. In these two rows, L = PΩ+ 4ℓ (q) with either ℓ > 3 and q > 4 or ℓ = 2 and q > 5. Putting c = gcd(2, ℓ, q −1), we have A∩L = (C ×D).c with C = PSp2 (q) and D = PSp2ℓ (q). Let M be the subgroup of index c in A such that M ∩L = C ×D. Then A ∩ B 6 M and M 6 (C.O) × (D.O). Denote by ϕ the projection from M to D.O. Applying Lemma 2.3, we deduce from G = HB that A = H(A ∩ B) and then M = (H ∩ M)(A ∩ B). Thereby we have M ϕ = (H ∩ M)ϕ (A ∩ B)ϕ . Moreover, M ϕ /CM ϕ (D) is almost simple with socle D = PSp2ℓ (q) and (A ∩ B)ϕ 6 N2 [M ϕ ] FACTORIZATIONS OF ALMOST SIMPLE GROUPS 21 (see [15, 3.6.1(d)]). It follows that M ϕ = (H ∩ M)ϕ N2 [M ϕ ], and so one of the following four cases appears by Lemma 4.3 . (i) (H ∩ M)ϕ > D. (ii) ℓ = 3, q is even and (H ∩ M)ϕ ∩ D = G2 (q). (iii) ℓ is even, q = 4 and Spℓ (q 2 ) 6 (H ∩ M)ϕ ∩ D 6 Spℓ (q 2 ).2. (iv) ℓ = 6, q = 4 and G2 (q 2 ) 6 (H ∩ M)ϕ ∩ D 6 G2 (q 2 ).2. Note that H ∩ L has at least two nonsolvable composition factors as H has at least two nonsolvable composition factors. If case (i) appears, then H ∩ L = (U × PSp2ℓ (q)).P with P 6 gcd(2, ℓ, q − 1), where U is an nonsolvable subgroup of PSp2 (q). If case (ii) appears, then H ∩ L = U × G2 (q) with ℓ = 3 and q even, where U is an nonsolvable subgroup of Sp2 (q). For case (iii), H ∩ L = (Sp2 (4) × Spℓ (16)).P with ℓ even, q = 4 and P 6 2. For case (iv) we have H ∩ L = (Sp2 (4) × G2 (16)).P with ℓ = 6, q = 4 and P 6 2. Next we show that K ∩ L = Ω4ℓ−1 (q) and thus cases (i)–(iv) lead to rows 1, 4, 3, 6, respectively, of Table 2. Suppose K ∩ L 6= B ∩ L = Ω4ℓ−1 (q). From G = AK we derive that |K| is divisible by |G|/|A|, whence any prime in ppd(q, 4ℓ − 2) ∪ ppd(q, 2ℓ − 1) ∪ ppd(q, 4ℓ − 4) divides |K|. However, by Lemma 2.3 we have B = (A ∩ B)K, and [15, Theorem A] shows that no such group K satisfies these conditions. This contradiction implies K ∩ L = Ω4ℓ−1 (q), as desired. 2 Row 7. Here L = Ω+ 8 (2), H ∩ L 6 (SL2 (4) × SL2 (4)).2 and K ∩ L 6 Sp6 (2). In order that H ∩ L has at least two nonsolvable composition factors, we have H ∩L = (SL2 (4)×SL2 (4)).P with P 6 22 . Furthermore, computation in Magma [3] shows K ∩ L = Sp6 (2) in order that G = HK. Thus row 2 (with ℓ = 1) of Table 2 appears. 2 Row 8. In this row, L = Ω+ 8 (4), A∩L = (SL2 (16)×SL2 (16)).2 and B∩L 6 Sp6 (4). Then |O| divides 4, and thus Lemma 2.2 implies that |L| divides 4|K ∩ L||H ∩ L|. In particular, |L| divides 4|B ∩ L||H ∩ L|, which indicates that |H ∩ L| is divisible by 17. Then as H ∩ L is a subgroup of A ∩ L = (SL2 (16) × SL2 (16)).22 with at least two nonsolvable composition factors, we conclude that either H ∩ L = (SL2 (4) × SL2 (16)).P with P 6 2, or H ∩ L = (SL2 (16) × SL2 (16)).P with P 6 2 . For the former, since 4|K∩L| is divisible by |L|/|(SL2 (4)×SL2 (16)).2| = 217 · 33 · 52 · 7 · 13 · 17, we have K ∩ L = Sp6 (4), which leads to row 3 (with c = 1 and ℓ = 1) of Table 2. Now assume that H ∩ L = (SL2 (16) × SL2 (16)).P with P 6 22 . It follows that 4|K ∩ L| is divisible by |L|/|(SL2 (16) × SL2 (16)).22| = 214 · 33 · 52 · 7 · 13. Therefore, K ∩L = Sp6 (4) or G2 (4). If K ∩L = G2 (4), then |K| divides |Out(L)||K ∩ 2 L| = 4|G2(4)| = |Ω+ 8 (4)|/|(SL2 (16) × SL2 (16)).2 | = |L|/|A ∩ L| = |G|/|A|, which implies that A ∩ K = 1. However, there exists no such factorization G = AK according to [17, Theorem 1.1]. Thus we have K ∩ L = Sp6 (4), and so row 3 (with c = 2 and ℓ = 1) of Table 2 appears.  2 5. Exactly one nonsolvable composition factor of A In this section we deal with the case where the group A in Hypothesis 2.8 has exactly one nonsolvable composition factor. For a group X, the solvable radical of 22 LI AND XIA X, denoted by Rad(X), is the product of all the solvable normal subgroups of X. Note that if X has exactly one nonsolvable composition factor then X/Rad(X) is almost simple. Hence from the factorization A = H(A∩B) we obtain a factorization A/Rad(A) = (HRad(A)/Rad(A))((A ∩ B)Rad(A)/Rad(A)) of the almost simple group A/Rad(A) with the factor HRad(A)/Rad(A) still having at least two composition factors. We shall see in Lemma 5.1 that the other factor (A ∩ B)Rad(A)/Rad(A) is core-free. For a group X, let X (∞) be the smallest normal subgroup of X such that X/X (∞) is solvable. Lemma 5.1. Suppose that G is an almost simple group with socle classical of Lie type, and G = AB with subgroups A and B maximal and core-free in G. If A has exactly one nonsolvable composition factor and R = Rad(A), then A/R is almost simple and (A ∩ B)R/R is core-free in A/R. Proof. Let S be the unique nonsolvable composition factor of A. Then A/R is an almost simple group with socle S. Suppose for a contradiction that (A ∩ B)R/R contains Soc(A/R) = (A/R)(∞) = A(∞) R/R. We deduce that (A ∩ B)R > A(∞) R. Then since |(A ∩ B)R| divides |A ∩ B||R|, it follows that |A ∩ B||R| is divisible by |A(∞) R|. From G = AB we have |G| |A| |A||R| = = . |B| |A ∩ B| |A ∩ B||R| Therefore, |G|/|B| divides |A||A(∞) ∩ R| |A||Rad(A(∞) )| |A| |A||R| = = = (∞) . (∞) (∞) (∞) |A R| |A | |A | |A /Rad(A(∞) )| Since A(∞) /Rad(A(∞) ) is also an almost simple group with socle S, we see that |A(∞) /Rad(A(∞) )| is divisible by |S| and so |G|/|B| divides |A|/|S|. However, one concludes from [15, Theorem A] that no such factorization G = AB exists with |G|/|B| dividing |A|/|S|. Hence (A ∩ B)R/R does not contain Soc(A/R), which means that (A ∩ B)R/R is core-free in A/R.  The following lemma is needed later. + Lemma 5.2. Let Ω+ 4m (4) 6 G 6 O4m (4) with m > 2, and H be a subgroup of G such that G = HN1 [G]. If H is contained in a C4 -subgroup of G, then H > Sp2m (4). Proof. Let W , V , Q and M be as in Lemma 3.4 with q = 4, and regard G as + Ω(W ⊗ V, Q) or O(W ⊗ V, Q) according to G = Ω+ 4m (4) or O4m (4), respectively. Let A be the maximal C4 -subgroup of G containing H. Then G = AN1 [G], and so by [15, Theorem A] we may regard A as the subgroup of G stabilizing W ⊗ V . From [13] we see that A < Soc(G) and thus A = Sp2 (4) × M. Denote the projection of A onto M by ϕ. Since G = HN1 [G] and H 6 A, we deduce from Lemma 2.3 that A = H(A ∩ N1 [G]), which yields M = Aϕ = H ϕ (A ∩ N1 [G])ϕ . As (A ∩ N1 [G])ϕ 6 N2 [M] (see [15, 3.6.1(d)]), we further deduce that M = H ϕ N2 [M]. According to [15, Theorem A], M = Sp2m (4) has no maximal factorization with a factor N2 [M]. Hence H ϕ = M. This implies H > Sp2m (4) as H 6 A = Sp2 (4) × Sp2m (4).  FACTORIZATIONS OF ALMOST SIMPLE GROUPS 23 Based on the results above, we are able to prove Theorem 1.1 by induction on the order of G. The inductive hypothesis is as follows. Hypothesis 5.3. Suppose that for each almost simple group G1 of order properly dividing |G|, if G1 = H1 K1 is a factorization of G1 with H1 having at least two nonsolvable composition factors and K1 core-free, then (G1 , H1 , K1 ) is described in Theorem 1.1. Suppose both Hypothesis 2.8 and Hypothesis 5.3 in the rest of this section. We first give the candidates for (L, A ∩ L, B ∩ L) in the case where A has exactly one nonsolvable composition factor. Lemma 5.4. Either A has at least two nonsolvable composition factors, or the triple (L, A ∩ L, B ∩ L) lies in Table 4. Table 4. row 1 2 3 4 5 6 L Sp4ℓ (2f ), ℓ > 2 Sp8ℓ (2), ℓ > 1 Sp4ℓ (4), ℓ > 2 Ω+ 8ℓ (2), ℓ > 2 Ω+ 8ℓ (4), ℓ > 2 f Ω+ 8 (2 ), f > 2 A∩L B∩L fb f Sp4a (2 ).b with ab = ℓ and b prime O− 4ℓ (2 ) + − O8ℓ (2) O8ℓ (2) + O4ℓ (4) O− 4ℓ (4) + 2 Ω4ℓ (4).2 Sp8ℓ−2 (2) 2 Ω+ Sp8ℓ−2 (4) 4ℓ (16).2 f Sp6 (2 ) Sp6 (2f ) Proof. The maximal factorizations G = AB are classified by [15, Theorem A] and described in Tables 1–4 of [15]. Since H is nonsolvable, A is nonsolvable too. Thus, either A has at least two nonsolvable composition factors, or A has precisely one nonsolvable composition factor. Assume in the following that A has precisely one nonsolvable composition factor. Denote R = Rad(A), A = A/R, H = HR/R and A ∩ B = (A ∩ B)R/R. Then A is an almost simple group, and H has at least two nonsolvable composition factors. Moreover, applying Lemma 2.3 we derive from G = HB and H 6 A that A = H(A ∩ B). Hence A = H A ∩ B with A ∩ B core-free in A as Lemma 5.1 asserts. Now by Hypothesis 5.3, either Soc(A) = An for some n > 10, or Soc(A) lies in the second column of Table 1 or Table 2. Checking this condition of A for factorizations G = AB in Tables 1–4 of [15], we deduce that either (L, A ∩ L, B ∩ L) lies in Table 5 or one of the following cases appears. (i) L = Sp2m (2f ), A ∩ L = Sp2a (2f b ).b with ab = m and b prime, and B ∩ L = f O− 2m (2 ). − (ii) L = Sp2m (2), A ∩ L = O+ 2m (2), and B ∩ L = O2m (2). + (iii) L = Sp2m (4), A ∩ L = O2m (4), and B ∩ L = O− 2m (4). f f (iv) L = Sp6 (2 ), A ∩ L = P1 , and B ∩ L = G2 (2 ). (v) G = L = Sp8 (2), A = S10 , B = O− 8 (2). + f (vi) L = Ω2m (2 ) with m > 6 even, A ∩ L = N1 , and B ∩ L = ˆGUm (q).2. f + f 2 (vii) L = Ω+ 2m (2 ) with m > 6 even and f 6 2, A∩L = Ωm (4 ).2 , and B∩L = N1 . (viii) L = Ω− 10 (2), A ∩ L = A12 , and B ∩ L = P1 . f f f (ix) L = Ω+ 8 (2 ) with f > 2, A ∩ L = Ω7 (2 ), and B ∩ L = Ω7 (2 ). 24 LI AND XIA + (x) L = PΩ+ 8 (3), A ∩ L = Ω8 (2), and B ∩ L = Ω7 (3). Table 5. L PSLn (q) A∩L NL (PSpn (q)) B∩L P1 or Pn−1 PSLn (q) NL (PSpn (q)) Stab(V1 ⊕ Vn−1 ) PSp2m (q) PSp2m (q) PSp2a (q b ).b P1 P1 PSp2a (q b ).b PSp2m (2f ) Sp2a (2f b ).b f PSp2m (2f ) O+ 2m (2 ) PSp2m (2f ) Spm (4f ).2 f O+ 2m (2 ) Sp2a (2f b ).b N2 PSp2m (2) N2 PSp2m (4f ) Sp2m (2f ) Spm (4).2 f O− 2m (4 ) PSp8 (2) PSU2m (q) f PΩ− 2m (2 ) PΩ− 2m (2) PΩ− 2m (4) f PΩ+ 2m (2 ) + PΩ2m (2f ) PΩ+ 2m (q) f PΩ+ 2m (2 ) f PΩ+ 2m (2 ) O+ 8 (2) NL (PSp2m (q)) N1 N1 N1 N1 N1 P1 N1 N1 PSL2 (17) N1 ˆGUm (2f ) Ω− m (4).2 Ω− m (16).2 Pm or Pm−1 NL (Sp2 (2f ) ⊗ Spm (2f )) ˆGUm (q).2 ˆGLm (q).2 f 2 Ω+ m (4 ).2 PΩ+ 2m (4) f PΩ+ 16 (2 ) f PΩ+ 16 (2 ) + PΩ24 (2) f PΩ+ 8 (2 ) + f PΩ8 (2 ) f PΩ+ 8 (2 ) + f PΩ8 (4 ) PΩ+ 8 (3) PΩ+ 8 (3) Ω+ (4) 8 N+ 2 Ω9 (2f ).a N1 N1 Ω7 (2f ) Ω7 (2f ) Ω7 (2f ) Ω7 (4f ) Ω+ 8 (2) Ω+ 8 (2) Ω7 (4) ˆGUm (4).2 N1 Ω9 (2f ).a Co1 P1 , P3 or P4 f ˆ((2f + 1) × Ω− 6 (2 )).2 + f f ˆ((2 − 1) × Ω6 (2 )).2 f Ω− 8 (2 ) P1 , P3 or P4 P13 , P14 or P34 (SL2 (16) × SL2 (16)).22 condition n > 4 even and (n, q) 6= (6, 2) n > 4 even and (n, q) 6= (6, 2) m > 2a > 4 m > 3 and (m, q) 6= (4, 2) m > 2a > 4 m>4 m > 4 even and f 6 2 m > 6 even f 6 2 and mf 6= 3 (m, q) 6= (3, 2) m > 5 odd m > 6 even m > 4 even m>5 m > 6 even m > 6 even m>5 m > 6 even and f 6 2 m > 6 even a62 a62 f >2 f >2 f >2 e n n 2m 2m − 2 2m 2m − 2 2m 2m − 2 m 3 2m 2m − 2 2m − 2 2m − 2 2m − 2 2m − 2 2m − 4 2m − 2 2m − 2 2m − 4 8 14 22 6 3 6 6 6 6 6 Suppose that (L, A ∩ L, B ∩ L) lies in Table 5, so that L = PSLn (q), PSp2m (q), PSU2m (q) or PΩ± 2m (q). For each row in Table 5, take e to be the number as in the last column and take r ∈ ppd(q, e). Then one can verify that r divides |G|/|B| but not |R|. It follows that r divides H due to the factorization G = HB, and then r divides H. Further, r divides H ∩ Soc(A) as r does not divide |Out(Soc(A))|. FACTORIZATIONS OF ALMOST SIMPLE GROUPS 25 However, Hypothesis 5.3 requires H ∩ Soc(A) to be in the third column of Table 1 or Table 2, which implies that |H ∩ Soc(A)| is not divisible by r. This contradiction shows that (L, A ∩ L, B ∩ L) does not lie in Table 5. Thus, we only need to consider cases (i)–(x) in the following. First assume that case (i) appears. From Hypothesis 5.3 we deduce that either a is even, or a = 3 and H ∩ Soc(A) 6 Sp4 (2f b ) × Sp2 (2f b ). The former immediately leads to row 1 of Table 4, so we assume the latter now. Take r ∈ ppd(2, 3f b). Then as r is coprime to both |H| and |R|, r is coprime to |H|. However, r divides f |Sp6b (2f )|/|O− 6b (2 )| = |L|/|B ∩ L|, contradicting the factorization G = HB by Lemma 2.2. For case (ii), we deduce from Hypothesis 5.3 that m is divisible by 4, and so row 2 of Table 4 appears. For case (iii), we deduce from Hypothesis 5.3 that m is even, and so row 3 of Table 4 appears. Suppose that case (iv) occurs. Then either f > 2 and Soc(A) = Sp4 (2f ), or f = 1 and Soc(A) = A6 . From Hypothesis 5.3 we deduce that f > 2 and any prime r in ppd(2, 4f ) is coprime to |H|. It follows that r does not divide |H| since r does not divide |R|. However, r divides |Sp6 (2f )|/|G2(2f )| = |L|/|B ∩ L|, contradicting the factorization G = HB by Lemma 2.2. Suppose that case (v) occurs. Since G = HB and H 6 A, we have the factorization A = H(A ∩ B) by Lemma 2.3. However, A ∩ B = S7 × S3 by [15, 5.1.9], which implies that the factorization A = H(A ∩ B) does not satisfy Theorem 1.1. This is contrary to Hypothesis 5.3. Next suppose that case (vi) occurs. Then as 2m − 2 > 10, we deduce from Hypothesis 5.3 that 2m − 2 is divisible by 4, contrary to the condition that m is even. For case (vii), we deduce from Hypothesis 5.3 that m is divisible by 4, whence row 4 or 5 of Table 4 appears. Suppose that case (viii) occurs. In this case, we have (G, A) = (Ω− 10 (2), A12 ) or − (O10 (2), S12 ). Since G = HB and H 6 A, we have the factorization A = H(A ∩ B) by Lemma 2.3. However, A ∩ B = S8 × S4 by [15, 5.2.16], which implies that the factorization A = H(A ∩ B) does not satisfy Theorem 1.1. This is contrary to Hypothesis 5.3. For case (ix), in view of Ω7 (2f ) ∼ = Sp6 (2f ) we see that row 6 of Table 4 appears. Finally suppose that (x) occurs. Since G = HB and H 6 A, we have the factorization A = H(A ∩ B) by Lemma 2.3. However, A ∩ B ∩ L = 26 .A7 by [15, 5.1.15], which implies that the factorization A = H(A ∩ B) does not satisfy Theorem 1.1. This is contrary to Hypothesis 5.3.  In the forthcoming Lemmas 5.5–5.10, we analyze the six candidates for the triple (L, A ∩ L, B ∩ L) in Table 4 to show that (L, H ∩ L, K ∩ L) lies in Table 1 or Table 2. Note that we have A = H(A ∩ B) and B = (A ∩ B)K from the factorization G = HK. Moreover, we see in Table 4 that both A and B have exactly one nonsolvable composition factor, so both A/Rad(A) and B/Rad(B) are almost simple. Lemma 5.5. Suppose (L, A ∩ L, B ∩ L) lies in row 1 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 1. 26 LI AND XIA f Proof. Here L = Sp4ℓ (2f ), A ∩ L = Sp4a (2f b ).b and B ∩ L = O− 4ℓ (2 ) with ab = ℓ − fb and b prime. Since A = H(A ∩ B) and A ∩ B ∩ L = O4a (2 ).b, we infer from Hypothesis 5.3 that Soc(A) is described in the second column of row 1, 2, 4, 5, 9 or 10 of Table 1. Take any r ∈ ppd(2, 4f ℓ). Since B = (A ∩ B)K and B is almost f simple with socle Ω− 4ℓ (2 ), we derive from [15, Theorem A] that either K > Soc(B) or K 6 N1 [B]. For the latter, r divides |H ∩L| because r divides |L| but not |N1 [B]|. Case 1. Let Soc(A) = Sp4a (2f b ) lie in the second column of row 1 of Table 1. In this case, H ∩ Soc(A) = (Sp2a0 (2f bb0 ) × Sp2a0 (2f bb0 )).R0 .2 with R0 6 b0 × b0 , where a0 and b0 are positive integers such that a = a0 b0 . Let a1 = a0 and b1 = b0 b. Then a1 b1 = a0 b0 b = ab = ℓ and H ∩ L = (Sp2a1 (2f b1 ) × Sp2a1 (2f b1 )).R.2 with R 6 b1 × b1 . In particular, |H ∩ L| is not divisible by r, and so K > Soc(B) by the conclusion of f the previous paragraph. It follows that K ∩ L = Ω− 4ℓ (2 ).Q with Q 6 2, and thus (L, H ∩ L, K ∩ L) is as described in row 1 of Table 1. Case 2. Let Soc(A) = Sp4a (2f b ) lie in the second column of row 2 of Table 1. Here a = 3a1 for some integer a1 and H ∩ Soc(A) = (G2 (2f ba1 ) × G2 (2f ba1 )).R1 .2 with R1 6 a1 × a1 . Let ℓ1 = a1 b. It follows that ℓ = ab = 3a1 b = 3ℓ1 , L = Sp12ℓ1 (2f ) and H ∩ L = (G2 (2f ℓ1 ) × G2 (2f ℓ1 )).R.2 with R 6 ℓ1 × ℓ1 . In particular, |H ∩ L| is f not divisible by r, which implies that K > Soc(B). Thus, K ∩ L = Ω− 4ℓ (2 ).Q = f Ω− 12ℓ1 (2 ).Q with Q 6 2, and so (L, H ∩ L, K ∩ L) is as described in row 2 of Table 1. Case 3. Let Soc(A) = Sp4a (2f b ) lie in the second column of row 4 of Table 1. Here a > 2, b = 2, f = 1 and H ∩ Soc(A) = (Sp2 (4) × Sp2a (4)).P with P 6 2. Thus, L = Sp4ℓ (2) = Sp8a (2). Since (H ∩ L)/(H ∩ Soc(A)) ∼ = (H ∩ L)Soc(A)/Soc(A) 6 (A ∩ L)/Soc(A) = b, we have Sp2 (4) × Sp2a (4) 6 H ∩ L 6 (Sp2 (4) × Sp2a (4)).[4]. In particular, |H ∩ L| is not divisible by r, and so K > Soc(B). Then we conclude that K ∩ L = Ω− 4ℓ (2).Q = Ω− (2).Q with Q 6 2 and (L, H ∩ L, K ∩ L) is as described in row 5 of Table 1. 8a fb Case 4. LetSoc(A) = Sp4a (2 ) lie in the second column of row 5 or 10 of Table 1. In this case we have f b = 1, contrary to the condition that b is prime. Case 5. Let Soc(A) = Sp4a (2f b ) lie in the second column of row 9 of Table 1. In this case, a = 3, b = 2, f = 1 and H ∩ Soc(A) = (Sp2 (4) × G2(4)).P with P 6 2. As H ∩ Soc(A) 6 H ∩ L 6 (H ∩ Soc(A)).b, we derive that H ∩ L = (Sp2 (4) × G2 (4)).P1 , where P1 6 22 . It follows that |H ∩ L| is not divisible by r, and then K > Soc(B). − Thus, K ∩ L = Ω− 4ℓ (2).Q = Ω24 (2).Q with Q 6 2, and so (L, H ∩ L, K ∩ L) lies in row 10 of Table 1.  Lemma 5.6. Suppose (L, A ∩ L, B ∩ L) lies in row 2 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 1. − Proof. Here G = Sp8ℓ (2), A = O+ 8ℓ (2) and B = O8ℓ (2). Since A = H(A ∩ B) and A ∩ B = Sp8ℓ−2 (2) × 2 = N1 [A] (see [15, 3.2.4(e)]), Hypothesis 5.3 implies that Soc(A) is described in the second column of row 2 or 5 of Table 2. Take any r ∈ ppd(2, 8ℓ − 2). Since B = (A ∩ B)K and B is almost simple with socle Ω− 8ℓ (2), we derive from [15, Theorem A] that either K > Soc(B) or K ∩ Soc(B) 6 Ω− (4).2. 4ℓ For the latter, r divides |H ∩ L| because r divides |L| but not |Ω− 4ℓ (4).2|. Case 1. Let Soc(A) = Ω+ 8ℓ (2) lie in the second column of row 2 of Table 2. In this case, H ∩ Soc(A) = (Sp2 (4) × Sp2ℓ (4)).P with P 6 22 . Then since (H ∩ L)/(H ∩ Soc(A)) ∼ = (H ∩ L)Soc(A)/Soc(A) 6 (A ∩ L)/Soc(A) = 2, FACTORIZATIONS OF ALMOST SIMPLE GROUPS 27 we have Sp2 (4) × Sp2ℓ (4) 6 H ∩ L 6 (Sp2 (4) × Sp2ℓ (4)).[8]. In particular, |H ∩ L| is not divisible by r, which implies K > Soc(B) by the conclusion of the previous paragraph. Hence K ∩ L = Ω− 8ℓ (2).Q with Q 6 2 and so (L, H ∩ L, K ∩ L) lies in row 5 of Table 1. Case 2. Let Soc(A) = Ω+ 8ℓ (2) lie in the second column of row 5 of Table 2. In this case, ℓ = 3 and H ∩ Soc(A) = (Sp2 (4) × G2 (4)).P with P 6 22 . Since H ∩ Soc(A) 6 H ∩ L 6 (H ∩ Soc(A)).2, we have Sp2 (4) × G2 (4) 6 H ∩ L 6 (Sp2 (4) × G2 (4)).[8]. In particular, |H ∩ L| is not divisible by r, and so K > Soc(B). It follows that − K ∩ L = Ω− 8ℓ (2).Q = Ω24 (4).Q with Q 6 2, and thus (L, H ∩ L, K ∩ L) lies in row 10 of Table 1.  Lemma 5.7. Suppose (L, A ∩ L, B ∩ L) lies in row 3 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 1. − Proof. Here ℓ > 2 and (G, A, B) = (ΓSp4ℓ (4), ΓO+ 4ℓ (4), ΓO4ℓ (4)) according to [15, Theorem A]. Since A = H(A ∩ B) and A ∩ B = N1 [A ∩ L] = Sp4ℓ−2 (4) × 2 (see [15, 3.2.4(e)]), we derive from Hypothesis 5.3 that Soc(A) lies in the second column of row 1, 3, 4 or 6 of Table 2. Take any r ∈ ppd(4, 4ℓ − 2). Since B = (A ∩ B)K and B is almost simple with socle Ω− 4ℓ (4), it follows from [15, Theorem A] that either K > Soc(B) or K ∩ Soc(B) 6 Ω− 2ℓ (16).2. For the latter, r divides |H ∩ L| because r divides |L| but not |Ω− (16).2|. 2ℓ Case 1. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 1 of Table 2. In this case, H ∩ Soc(A) = U × Sp2ℓ (4), where U is an nonsolvable subgroup of Sp2 (4). Therefore, U = Sp2 (4) and H ∩ Soc(A) = Sp2 (4) × Sp2ℓ (4). Since (H ∩ L)/(H ∩ Soc(A)) ∼ = (H ∩ L)Soc(A)/Soc(A) 6 (A ∩ L)/Soc(A) = 2, we deduce that Sp2 (4) × Sp2ℓ (4) 6 H ∩ L 6 (Sp2 (4) × Sp2ℓ (4)).2. In particular, |H ∩ L| is not divisible by r, and so K > Soc(B) by the conclusion of the previous paragraph. Hence K ∩ L = Ω− 4ℓ (4).Q with Q 6 2, and thus (L, H ∩ L, K ∩ L) lies in row 4 of Table 1. Case 2. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 3 or 6 of Table 2. In this case we have ℓ = 2ℓ1 for some integer ℓ1 . Moreover, either H ∩ Soc(A) = (Sp2 (4c ) × Sp2ℓ1 (16)).P , or ℓ1 = 3 and H ∩ Soc(A) = (Sp2 (4c ) × G2 (16)).P , where c = 1 or 2 and P 6 22 . As A ∩ B = N1 [A ∩ L] < A ∩ L (see [15, 3.2.4(e)]) and A = H(A ∩ B), we have a factorization A ∩ L = (H ∩ L)N1 [A ∩ L] ∗ ∗ of A ∩ L = O+ 8ℓ1 (4). By Lemma 2.5, there exist groups A and H such that + ∗ ∗ ∗ ∗ ∗ ∗ Ω+ 8ℓ1 (4) 6 A 6 O8ℓ1 (4), A = H Soc(A) = H N1 [A ] and H ∩Soc(A) = H∩Soc(A). Let M be a maximal subgroup of A∗ containing H ∗ . Then A∗ = MN1 [A∗ ], and M is core-free in A∗ . From Hypothesis 5.3 we see that M cannot have a linear, unitary or plus type orthogonal group as its unique nonsolvable composition factor. Thus one of the following occurs by [15, Theorem A]. (i) M ∩ Soc(A∗ ) = Sp2 (4) ⊗ Sp4ℓ1 (4). (ii) M ∩ Soc(A∗ ) = Ω4ℓ1 (16).22 . (iii) ℓ1 = 2 and M ∩ Soc(A∗ ) = Sp8 (4).a with a 6 2. (iv) ℓ1 = 1 and M ∩ Soc(A∗ ) = Sp6 (4). (v) ℓ1 = 1 and M ∩ Soc(A∗ ) = (Sp2 (16) × Sp2 (16)).22 . 28 LI AND XIA If (i) occurs, then H ∗ > Sp4ℓ1 (4) by Lemma 5.2, which is not possible since we have either H ∗ ∩ Soc(A) = (Sp2 (4c ) × Sp2ℓ1 (16)).P or ℓ1 = 3 and H ∗ ∩ Soc(A) = (Sp2 (4c )×G2 (16)).P . If M ∩Soc(A∗ ) is as described in (ii) or (v), then the argument in [15, 3.6.1(c)] shows that A∗ 6= MN1 [A∗ ], a contradiction. If (iii) occurs, then we see from Hypothesis 5.3 and the third column of Table 1 that H ∗ cannot have Sp2 (4c ) × Sp2ℓ1 (16) = Sp2 (4c ) × Sp4 (16) as a normal subgroup, a contradiction. Finally, suppose that (iv) occurs. Then M ∩ N1 [A∗ ] has a normal subgroup G2 (4) by [15, 5.1.15] while H ∗ has a normal subgroup Sp2 (4c ) × Sp2 (16). By Lemma 2.3, we deduce from A∗ = H ∗ N1 [A∗ ] and H ∗ 6 M that M = H ∗ (M ∩ N1 [A∗ ]). However, M does not have such a factorization according to Hypothesis 5.3, a contradiction. Case 3. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 4 of Table 2. In this case, ℓ = 3 and H ∩ Soc(A) = (Sp2 (4) × G2 (4)). Since H ∩ Soc(A) 6 H ∩ L 6 (H ∩Soc(A)).2, we have Sp2 (4) ×G2 (4) 6 H ∩L 6 (Sp2 (4) ×G2 (4)).2. In particular, − |H∩L| is not divisible by r, and so K > Soc(B). Hence K∩L = Ω− 4ℓ (4).Q = Ω12 (4).Q with Q 6 2, and then (L, H ∩ L, K ∩ L) lies in row 9 of Table 1.  Lemma 5.8. Suppose (L, A ∩ L, B ∩ L) lies in row 4 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 2. + 2 Proof. Here L = Ω+ 8ℓ (2) with ℓ > 2, A ∩ L = Ω4ℓ (4).2 and B ∩ L = Sp8ℓ−2 (2). Furthermore, we have G = L in order that A is maximal in G. By Lemma 3.9, A ∩ B = Sp4ℓ−2 (4) × 2 < O+ 4ℓ (4). Then as A = H(A ∩ B), we derive from Hypothesis 5.3 that Soc(A) is described in the second column of row 1, 3, 4 or 6 of Table 2. Since B = (A ∩ B)K and |A ∩ B| has no prime divisor in the set ppd(2, 8ℓ − 2) ∪ ppd(2, 8ℓ − 6) ∪ ppd(2, 4ℓ − 1), we conclude that |K| is divisible by each prime in ppd(2, 8ℓ − 2) ∪ ppd(2, 8ℓ − 6) ∪ ppd(2, 4ℓ − 1). Hence by [15, Theorem A], the factorization B = (A ∩ B)K implies that K > Soc(B), and so K ∩ L = Sp8ℓ−2 (2). Case 1. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 1 of Table 2. In this case, H ∩ Soc(A) = U × Sp2ℓ (4), where U is an nonsolvable subgroup of Sp2 (4). Thus, U = Sp2 (4) and H ∩ Soc(A) = Sp2 (4) × Sp2ℓ (4). Since (H ∩ L)/(H ∩ Soc(A)) ∼ = (H ∩ L)Soc(A)/Soc(A) 6 (A ∩ L)/Soc(A) = 22 , we deduce that Sp2 (4) × Sp2ℓ (4) 6 H ∩ L 6 (Sp2 (4) × Sp2ℓ (4)).22. Therefore, (L, H ∩ L, K ∩ L) lies in row 2 of Table 2. Case 2. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 3 or 6 of Table 2. Since A = H(A ∩ B) and A ∩ B = Sp4ℓ−2 (4) × 2 6 N1 [O+ 4ℓ (4)], we derive that + + + O+ 4ℓ (4) = (H ∩ O4ℓ (4))(A ∩ B) = (H ∩ O4ℓ (4))N1 [O4ℓ (4)]. Then one obtains a contradiction along the same lines as in Case 2 of the proof of Lemma 5.7. Case 3. Let Soc(A) = Ω+ 4ℓ (4) lie in the second column of row 4 of Table 2. In this case, ℓ = 3 and H ∩ Soc(A) = (Sp2 (4) × G2 (4)). As H ∩ Soc(A) 6 H ∩ L 6 (H ∩ Soc(A)).22 , we have Sp2 (4) × G2 (4) 6 H ∩ L 6 (Sp2 (4) × G2 (4)).22 . Thus, (L, H ∩ L, K ∩ L) lies in row 5 of Table 2.  Lemma 5.9. Suppose (L, A ∩ L, B ∩ L) lies in row 5 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 2. + 2 Proof. Here L = Ω+ 8ℓ (4) with ℓ > 2, A∩L = Ω4ℓ (16).2 and B ∩L = Sp8ℓ−2 (4). Since A = H(A ∩ B) and A ∩ B ∩ L = Sp4ℓ−2 (16), we derive from Hypothesis 5.3 that FACTORIZATIONS OF ALMOST SIMPLE GROUPS 29 Soc(A) is described in the second column of row 1 or 4 of Table 2. As B = (A∩B)K and |A ∩ B| has no prime divisor in ppd(4, 8ℓ − 2) ∪ ppd(4, 8ℓ − 6) ∪ ppd(4, 4ℓ − 1), we conclude that |K| is divisible by each prime in ppd(4, 8ℓ − 2) ∪ ppd(4, 8ℓ − 6) ∪ ppd(4, 4ℓ − 1). Then by [15, Theorem A], the factorization B = (A ∩ B)K implies that K ∩ L = Sp8ℓ−2 (4). Case 1. Let Soc(A) = Ω+ 4ℓ (16) lie in the second column of row 1 of Table 2. In this case, H ∩ Soc(A) = U × Sp2ℓ (16), where U is an nonsolvable subgroup of Sp2 (16). It follows that U = Sp2 (4) or Sp2 (16), and then H ∩ Soc(A) = Sp2 (4c ) × Sp2ℓ (16) with c = 1 or 2. Since (H ∩ L)/(H ∩ Soc(A)) ∼ = (H ∩ L)Soc(A)/Soc(A) 6 (A ∩ L)/Soc(A) = 22 , we have Sp2 (4c ) × Sp2ℓ (4) 6 H ∩ L 6 (Sp2 (4c ) × Sp2ℓ (4)).22 . Thus, (L, H ∩ L, K ∩ L) lies in row 3 of Table 2. Case 2. Let Soc(A) = Ω+ 4ℓ (16) lie in the second column of row 4 of Table 2. In this case, ℓ = 3 and H ∩ Soc(A) = Sp2 (4c ) × G2 (16) with c = 1 or 2. As H ∩ Soc(A) 6 H ∩L 6 (H ∩Soc(A)).22 , we have Sp2 (4c )×G2 (16) 6 H ∩L 6 (Sp2 (4c )×G2 (16)).22. Hence (L, H ∩ L, K ∩ L) lies in row 6 of Table 2.  Lemma 5.10. Suppose (L, A ∩ L, B ∩ L) lies in row 6 of Table 4. Then (L, H ∩ L, K ∩ L) lies in Table 2. f f ∼ Proof. Here L = Ω+ 8 (2 ) with f > 2 and A ∩ L = B ∩ L = Sp6 (2 ). Since A = H(A ∩ B) and A ∩ B ∩ L = G2 (2f ) (see [15, 5.1.15]), we derive from Hypothesis 5.3 that A ∩ L is described in the second column of row 7 of Table 1. It follows that H ∩ L = H ∩ (A ∩ L) = U × Sp4 (2f ), where U is an nonsolvable subgroup of Sp2 (2f ). In particular, |H ∩ L| is not divisible by any prime in ppd(2, 6f ) ∪ ppd(2, 3f ). In view of the factorization B = (A ∩ B)K we deduce from [15, Theorem A] that − f f f either K ∩ L = Sp6 (2f ), or K ∩ L is contained in O+ 6 (2 ), O6 (2 ), P1 [Sp6 (2 )] or N1 [Sp6 (2f )]. For the latter, there exists r ∈ ppd(2, 6f ) ∪ ppd(2, 3f ) dividing |L|/|K ∩ L|, which indicates that r divides |H ∩ L| by Lemma 2.2, a contradiction. Therefore, K ∩ L = Sp6 (2f ), and so (L, H ∩ L, K ∩ L) lies in row 1 of Table 2.  Now we are in the position to complete the proof of Theorem 1.1. Proof of Theorem 1.1. Suppose that G is an almost simple group with socle L and G = HK, where H has at least two nonsolvable composition factors and K is corefree. We prove Theorem 1.1 by induction on |G|. By Lemma 2.7 we may assume that L is a classical group. Moreover, by virtue of Lemma 2.5 we may let A and B be maximal subgroups of G containing H and K, respectively. Thus we have both Hypothesis 2.8 and Hypothesis 5.3. Then according to Lemma 5.4, either A has at least two nonsolvable composition factors, or the triple (L, A ∩ L, B ∩ L) lies in Table 4. If A has at least two nonsolvable composition factors, then Lemma 4.4 asserts that (L, H ∩ L, K ∩ L) lies in Table 1 or Table 2. If (L, A ∩ L, B ∩ L) lies in Table 4, then it follows from Lemmas 5.5–5.10 that (L, H ∩ L, K ∩ L) lies in Table 1 or Table 2. Hence Theorem 1.1 is true.  References [1] M. Aschbacher, On the maximal subgroups of the finite classical groups, Invent. Math., 76 (1984), no. 3, 469–514. 30 LI AND XIA [2] N. Blackburn and B. Huppert, Finite groups II, Springer-Verlag, Berlin-New York, 1982. [3] W. Bosma, J. Cannon and C. Playoust, The magma algebra system I: The user language, J. Symbolic Comput., 24 (1997), no. 3-4, 235–265. [4] J. N. Bray, D. F. Holt and C. M. Roney-Dougal, The maximal subgroups of the low-dimensional finite classical groups, Cambridge University Press, Cambridge, 2013. [5] P. J. Cameron, Permutation groups, London Mathematical Society Student Texts, 45, Cambridge University Press, Cambridge, 1999. [6] J. H. Conway, R. T. Curtis, S. P. Norton, R. A. Parker and R. A. Wilson, Atlas of finite groups: maximal subgroups and ordinary characters for simple groups, Clarendon Press, Oxford, 1985. [7] M. Fried, R. Guralnick and J. Saxl, Schur covers and Carlitz’s conjecture, Israel J. Math. 82 (1993), no. 1-3, 157–225. [8] M. Giudici, Factorisations of sporadic simple groups, J. Algebra, 304 (2006), no. 1, 311–323. [9] R. M. Guralnick and J. Saxl, Monodromy groups of polynomials, Groups of Lie type and their geometries (Como, 1993), 125–150, London Math. Soc. Lecture Note Ser., 207, Cambridge Univ. Press, Cambridge, 1995. [10] C. Hering, M. W. Liebeck and J. Saxl, The factorizations of the finite exceptional groups of lie type, J. Algebra, 106 (1987), no. 2, 517–527. [11] B. Huppert, Endliche Gruppen. I, Die Grundlehren der Mathematischen Wissenschaften, Band 134, Springer-Verlag, Berlin-New York 1967. [12] W. M. Kantor, k-homogeneous groups, Math. Z., 124 (1972), 261–265. [13] P. B. Kleidman and M. W. Liebeck, The subgroup structure of the finite classical groups, Cambridge University Press, Cambridge, 1990. [14] C. H. Li and B. Xia, Factorizations of almost simple groups with a solvable factor, and Cayley graphs of solvable groups, submitted. Available online at https://arxiv.org/abs/1408.0350. [15] M. Liebeck, C. E. Praeger and J. Saxl, The maximal factorizations of the finite simple groups and their automorphism groups, Mem. Amer. Math. Soc., 86 (1990), no. 432. [16] M. W. Liebeck, C. E. Praeger and J. Saxl, On factorizations of almost simple groups, J. Algebra, 185 (1996), no. 2, 409–419. [17] M. Liebeck, C. E. Praeger and J. Saxl, Regular subgroups of primitive permutation groups, Mem. Amer. Math. Soc., 203 (2010), no. 952. [18] M. Suzuki, A new type of simple groups of finite order, Proc. Nat. Acad. Sci. U.S.A., 46 (1960), 868–870. [19] R. Wilson, The finite simple groups, Graduate Texts in Mathematics, 251. Springer, 2009. (Li) Department of Mathematics, South University of Science and Technology, Shenzhen, Guangdong 518055, P. R. China E-mail address: [email protected] (Xia) School of Mathematics and Statistics, The University of Melbourne, Parkville, VIC 3010, Australia E-mail address: [email protected]
4math.GR
Accepted by VLDB 2018 Model-Free Control for Distributed Stream Data Processing using Deep Reinforcement Learning Teng Li, Zhiyuan Xu, Jian Tang and Yanzhi Wang {tli01, zxu105, jtang02, ywang393}@syr.edu arXiv:1803.01016v1 [cs.DC] 2 Mar 2018 Department of Electrical Engineering and Computer Science Syracuse University Syracuse, NY 13244 ABSTRACT ∗ framework can quickly reach a good scheduling solution during online learning, which justifies its practicability for online control in DSDPSs. In this paper, we focus on general-purpose Distributed Stream Data Processing Systems (DSDPSs), which deal with processing of unbounded streams of continuous data at scale distributedly in real or near-real time. A fundamental problem in a DSDPS is the scheduling problem (i.e., assigning workload to workers/machines) with the objective of minimizing average end-to-end tuple processing time. A widelyused solution is to distribute workload evenly over machines in the cluster in a round-robin manner, which is obviously not efficient due to lack of consideration for communication delay. Model-based approaches (such as queueing theory) do not work well either due to the high complexity of the system environment. We aim to develop a novel model-free approach that can learn to well control a DSDPS from its experience rather than accurate and mathematically solvable system models, just as a human learns a skill (such as cooking, driving, swimming, etc). Specifically, we, for the first time, propose to leverage emerging Deep Reinforcement Learning (DRL) for enabling model-free control in DSDPSs; and present design, implementation and evaluation of a novel and highly effective DRL-based control framework, which minimizes average end-to-end tuple processing time by jointly learning the system environment via collecting very limited runtime statistics data and making decisions under the guidance of powerful Deep Neural Networks (DNNs). To validate and evaluate the proposed framework, we implemented it based on a widely-used DSDPS, Apache Storm, and tested it with three representative applications: continuous queries, log stream processing and word count (stream version). Extensive experimental results show 1) Compared to Storm’s default scheduler and the state-of-the-art model-based method, the proposed framework reduces average tuple processing by 33.5% and 14.0% respectively on average. 2) The proposed 1. INTRODUCTION In this paper, we focus on general-purpose Distributed Stream Data Processing Systems (DSDPSs) (such as Apache Storm [48] and Google’s MillWheel [3]), which deal with processing of unbounded streams of continuous data at scale distributedly in real or near-real time. Their programming models and runtime systems are quite different from those of MapReduce-based batch processing systems, such as Hadoop [22] and Spark [46], which usually handle static big data in an offline manner. To fulfill the real or near-real time online processing requirements, average end-to-end tuple processing time (or simply average tuple processing time [52]) is the most important performance metric for a DSDPS. A fundamental problem in a DSDPS is the scheduling problem (i.e., assigning workload to workers/machines) with the objective of minimizing average tuple processing time. A widely-used solution is to distribute workload over machines in the cluster in a round-robin manner [48], which is obviously not efficient due to lack of consideration for communication delay among processes/machines. We may be able to better solve this problem if we can accurately model the correlation between a solution and its objective value, i.e., predict/estimate average tuple processing time for a given scheduling solution. However, this is very hard and has not yet been well studied in the context of DSDPS. In distributed batch processing systems (such as MapReducebased systems), an individual task’s completion time can be well estimated [53], and the scheduling problem can be well formulated into a Mixed Integer Linear Programming (MILP) problem with the objective of minimizing the makespan of a job [13, 55]. Then it can be tackled by optimally solving the MILP problem or using a fast polynomial-time approximation/heuristic algorithm. However, in a DSDPS, a task or an application never ends unless it is terminated by its user. A scheduling solution makes a significant impact on the average tuple processing time. But their relationship is very subtle and complicated. It does not even seem possible to have a mathematical programming formulation for the scheduling problem if its objective is to directly minimize average tuple processing time. Queueing theory has been employed to model distributed stream database systems [34]. However, it does not work for ∗Accepted by VLDB 2018 1 DSDPSs due to the following reasons: 1) The queueing theory can only provide accurate estimations for queueing delay under a few strong assumptions (e.g, tuple arrivals follow a Poisson distribution, etc), which, however, may not hold in a complex DSDPS. 2) In the queueing theory, many problems in a queueing network (rather than a single queue) remain open problems, while a DSDPS represents a fairly complicated multi-point to multi-point queueing network where tuples from a queue may be distributed to multiple downstream queues, and a queue may receive tuples from multiple different upstream queues. In addition, a model-based scheduling framework has been proposed in a very recent work [25], which employs a model to estimate (end-to-end) tuple processing time by combing delay at each component (including processing time at each Processing Unit (PU) and communication delay between two PUs) predicted by a supervised learning method, Support Vector Regression (SVR) [14]. However, this model-based approach suffers from two problems: 1) In a very complicated distributed computing environment such as a DSDPS, (end-to-end) tuple processing time (i.e., end-to-end delay) may be caused by many factors, which are not fully captured by the proposed model. 2) Prediction for each individual component may not be accurate. 3) A large amount of high-dimensional statistics data need to be collected to build and update the model, which leads to high overhead. Hence, we aim to develop a novel model-free approach that can learn to well control a DSDPS from its experience rather than accurate and mathematically solvable system models, just as a human learns a skill (such as cooking, driving, swimming, etc). Recent breakthrough of Deep Reinforcement Learning (DRL) [33] provides a promising technique for enabling effective model-free control. DRL [33] (originally developed by a startup DeepMind) enables computers to learn to play games, including Atari 2600 video games and one of the most complicated games, Go (AlphaGo [45]), and beat the best human players. Even though DRL has made tremendous successes on game-playing that usually has a limited action space (e.g., moving up/down/left/right), it has not yet been investigated how DRL can be leveraged for control problems in complex distributed computing systems, such as DSDPSs, which usually have sophisticated state and huge action spaces. We believe DRL is especially promising for control in DSDPSs because: 1) It has advantages over other dynamic system control techniques such as model-based predictive control in that the former is model-free and does not rely on accurate and mathematically solvable system models (such as queueing models), thereby enhancing the applicability in complex systems with randomized behaviors. 2) it is capable of handling a sophisticated state space (such as AlphaGo [45]), which is more advantageous over traditional Reinforcement Learning (RL) [49]. 3) It is able to deal with time-variant environments such as varying system states and user demands. However, direct application of the basic DRL technique, such as Deep Q Network (DQN) based DRL proposed in the pioneering work [33], may not work well here since it is only capable of handling control problems with a limited action space but the control problems (such as scheduling) in a DSDPS usually have a sophisticated state space, and a huge action (worker threads, worker processes, virtual/physical machines, and their combinations) space (See Section 3.2 for greater details). Moreover, the exist- ing DRL methods [33] usually need to collect big data (e.g., lots of images for the game-playing applications) for learning, which are additional overhead and burden for an online system. Our goal is to develop a method that only needs to collect very limited statistics data during runtime. In this paper, we aim to develop a novel and highly effective DRL-based model-free control framework for a DSDPS to minimize average data processing time by jointly learning the system environment with very limited runtime statistics data and making scheduling decisions under the guidance of powerful Deep Neural Networks (DNNs). We summarize our contributions in the following: • We show that direct application of DQN-based DRL to scheduling in DSDPSs does not work well. • We are the first to present a highly effective and practical DRL-based model-free control framework for scheduling in DSDPSs. • We show via extensive experiments with three representative Stream Data Processing (SDP) applications that the proposed framework outperforms the current practice and the state-of-the-art. To the best of our knowledge, we are the first to leverage DRL for enabling model-free control in DSDPSs. We aim to promote a simple and practical model-free approach based on emerging DRL, which, we believe, can be extended or modified to better control many other complex distributed computing systems. The rest of the paper is organized as follows: We give a brief background introduction in Section 2. We then present design and implementation details of the proposed framework in Section 3. Experimental settings are described, and experimental results are presented and analyzed in Section 4. We discuss related work in Section 5 and conclude the paper in Section 6. 2. BACKGROUND In this section, we provide a brief background introduction to DSDPS, Storm and DRL. 2.1 Distributed Stream Data Processing System (DSDPS) In a DSDPS, a stream is an unbounded sequence of tuples. A data source reads data from external source(s) and emits streams into the system. A Processing Unit (PU) consumes tuples from data sources or other PUs, and processes them using code provided by a user. After that, it can pass it to other PUs for further processing. A DSDPS usually uses two levels of abstractions (logical and physical) to express parallelism. In the logical layer, an application is usually modeled as a directed graph, in which each vertex corresponds to a data source or a PU, and direct edges show how data tuples are routed among data sources/PUs. A task is an instance of a data source or PU, and each data source or PU can be executed as many parallel tasks on a cluster of machines. In the physical layer, a DSDPS usually includes a set of virtual or physical machines that actually process incoming data, and a master serving as the central control unit, which distributes user code around the cluster, scheduling tasks, and monitoring them for failures. At runtime, an application graph is executed on multiple worker processes running on multiple (physical or virtual) machines. Each machine is usually configured to have multiple slots. The number of slots indicates the number of worker processes that can be run on this machine, and can be pre-configured by the cluster operator based on hardware constraints (such as the number of CPU cores). Each worker process occupies a slot, which uses one or multiple threads to actually process data tuples using user code. Normally, a task is mapped to a thread at runtime (even it does not have to be this way). Each machine also runs a daemon that listens for any work assigned to it by the master. In a DSDPS, a scheduling solution specifies how to assign threads to processes and machines. Many DSDPSs include a default scheduler but allow it to be replaced by a custom scheduler. The default scheduler usually uses a simple scheduling solution, which assigns threads to pre-configured processes and then assigns those processes to machines both in a roundrobin manner. This solution leads to almost even distribution of workload over available machines in the cluster. In addition, a DSDPS usually supports several ways for grouping, which defines how to distribute tuples among tasks. Typical grouping policies include: fields grouping (based on a key), shuffle grouping (random), all grouping (one-to-all) and global grouping (all-to-one). When the message ID of a tuple coming out of a spout successfully traverses the whole topology, a special acker is called to inform the originating data source that message processing is complete. The (end-to-end) tuple processing time is the duration between when the data source emits the tuple and when it has been acked (fully processed). Note that we are only interested in processing times of those tuples emitted by data sources since they reflect the total end-to-end processing delay over the whole application. To ensure fault tolerance, if a message ID is marked failure due to acknowledgment timeout, data processing will be recovered by replaying the corresponding data source tuple. The master monitors heartbeat signals from all worker processes periodically. It re-schedules them when it discovers a failure. 2.2 Apache Storm Since we implemented the proposed framework based on Apache Storm [48], we briefly introduce it here. Apache Storm is an open-source and fault-tolerant DSDPS, which has an architecture and programming model very similar to what described above, and has been widely used by quite a few companies and institutes. In Storm, data source, PU, application graph, master, worker process and worker thread are called spout, bolt, topology, Nimbus, worker and executor, respectively. Storm uses ZooKeeper [54] as a coordination service to maintain it’s own mutable configuration (such as scheduling solution), naming, and distributed synchronization among machines. All configurations stored in ZooKeeper are organized in a tree structure. Nimbus (i.e., master) provides interfaces to fetch or update Storm’s mutable configurations. A Storm topology contains a topology specific configuration, which is loaded before the topology starts and does not change during runtime. 2.3 Deep Reinforcement Learning (DRL) A DRL agent can be trained via both offline training and online deep Q-learning [33, 45]. It usually adopts a DNN (known as DQN) to derive the correlation between each state-action pair (s, a) of the system under control and its value function Q(s, a), which is the expected cumulative (with discounts) reward function when system starts at state s and follows action a (and certain policy thereafter). Q(s, a) is given as: Q(s, a) = E ∞ hX i λk rt (st , at ) s0 = s, a0 = a , (2.1) t=0 where rt (·) is the reward, and λ < 1 is the discount factor. The offline training needs to accumulate enough samples of value estimates and the corresponding state-action pair (s, a) for constructing a sufficiently accurate DNN using either a model-based (a mathematical model) procedure or actual measurement data (model-free) [33]. For example, in game-playing applications [33], this procedure includes preprocessing game playing samples, and obtaining state transition samples and Q-value estimates (e.g., win/lose and/or the score achieved). The deep Q-learning is adopted for the online learning and dynamic control based on the offlinebuilt DNN. More specifically, at each decision epoch t, the system under control is at a state st . The DRL agent performs inference using the DNN to select action at , either the one with the highest Q-value estimate, or with a certain degree of randomness using the ǫ-greedy policy [41]. Using a neural network (or even a DNN) as a function approximator in RL is known to suffer from instability or even divergence. Hence, experience replay and target network were introduced in [33] to improve stability. A DRL agent updates the DNN with a mini-batch from the experience replay buffer [33], which stores state transition samples collected during training. Compared to using only immediately collected samples, uniformly sampling from the replay buffer allows the DRL agent to break the correlation between sequential generated samples, and learn from a more independently and identically distributed past experiences, which is required by most of training algorithms, such as Stochastic Gradient Descent (SGD). So the use of experience replay buffer can smooth out learning and avoid oscillations or divergence. Besides, a DRL agent uses a separate target network (with the same structure as the original DNN) to estimate target values for training the DNN. Its parameters are slowly updated every C > 1 epochs and are held fixed between individual updates. The DQN-based DRL only works for control problems with a low-dimensional discrete action space. Continuous control has often been tackled by the actor-critic-based policy gradient approach [44]. The traditional actor-critic approach can also be extended to use a DNN (such as DQN) to guide decision making [26]. A recent work [26] from DeepMind introduced an actor-critic method, called Deep Deterministic Policy Gradient (DDPG), for continuous control. The basic idea is to maintain a parameterized actor function and a parameterized critic function. The critic function can be implemented using the above DQN, which returns Q value for a given state-action pair. The actor function can also be implemented using a DNN, which specifies the current policy by mapping a state to a specific action. Both the experience replay and target network introduced above can also be integrated to this approach to ensure stability. 3. DESIGN AND IMPLEMENTATION OF THE PROPOSED FRAMEWORK In this section, we present the design and implementation details of the proposed framework. 3.1 Overview Master Custom Scheduler Machine Machine Processes DSDPS Processes Process …... Process Thread Thread Thread Thread State and Reward DRL-based Control Thread Database Transition Samples DRL Agent Scheduling Solution Figure 1: The architecture of the proposed DRLbased control framework We illustrate the proposed framework in Figure 1, which can be viewed to have two parts: DSDPS and DRL-based Control. The architecture is fairly simple and clean, which consists of the following components: 1) DRL Agent (Section 3.2): it is the core of the proposed framework, which takes the state as input, applies a DRL-based method to generating a scheduling solution, and pushes it to the custom scheduler. 2) Database: It stores transition samples including state, action and reward information for training (See Section 3.2 for details). 3) Custom Scheduler: It deploys the generated scheduling solution on the DSDPS via the master. Our design leads to the following desirable features: 1) Model-free Control: Our design employs a DRL-based method for control, which learns to control a DSDPS from runtime statistics data without relying on any mathematically solvable system model. 2) Highly Effective Control: The proposed DRL-based control is guided by DNNs, aiming to directly minimize average tuple processing time. Note that the current practise evenly distributes workload over machines; and some existing methods aim to achieve an indirect goal, (e.g., minimizing inter-machine traffic load [52]), with the hope that it can lead to minimum average tuple processing time. These solutions are obviously less convincing and effective than the proposed approach. 3) Low Control Overhead: The proposed framework only needs to collect very limited statistics data, i.e., just the average tuple processing time, during runtime for offline training and online learning (see explanations in Section 3.2), which leads to low control overhead. 4) Hot Swapping of Control Algorithms: The core component of the proposed framework, DRL agent, is external to the DSDPS, which ensures minimum modifications to the DSDPS, and more importantly, makes it possible to replace it or its algorithm at runtime without shutting down the DSDPS. 5) Transparent to DSDSP users: The proposed framework is completely transparent to DSDSP users, i.e., a user does not have to make any change to his/her code in order to run his/her application on the new DSDPS with the proposed framework. We implemented the proposed framework based on Apache Storm [48]. In our implementation, the custom scheduler runs within Nimbus, which has access to various information regarding executors, supervisors and slots. A socket is implemented for communications between the custom scheduler and the DRL agent. When an action is generated by the DRL agent, it is translated to a Storm-recognizable scheduling solution and pushed to the custom scheduler. Upon receiving a scheduling solution, the custom scheduler first frees the executors that need to be re-assigned and then adds them to the slots of target machines. Note that during the deployment of a new scheduling solution, we try to make a minimal impact to the DSDPS by only re-assigning those executors whose assignments are different from before while keeping the rest untouched (instead of deploying the new scheduling solution from scratch by freeing all the executors first and assigning executors one by one as Storm normally does). In this way, we can reduce overhead and make the system to re-stabilize quickly. In addition, to make sure of accurate data collection, after a scheduling solution is applied, the proposed framework waits for a few minutes until the system re-stabilizes to collect the average tuple processing time and takes the average of 5 consecutive measurements with a 10-second interval. 3.2 DRL-based Control In this section, we present the proposed DRL-based control, which targets at minimizing the end-to-end average tuple processing time via scheduling. Given a set of machines M, a set of processes P, and a set of threads N , a scheduling problem in a DSDPS is to assign each thread to a process of a machine, i.e., to find two mappings: N 7→ P and P 7→ M. It has been shown [52] that assigning threads from an application (which usually exchange data quite often) to more than one processes on a machine introduces inter-process traffic, which leads to serious performance degradation. Hence, similar as in [52, 25], our design ensures that on every machine, threads from the same application are assigned to only one process. Therefore the above two mappings can be merged into just one mapping: N 7→ M, i.e., to assign each thread to a machine. Let a scheduling solution be X =< xij >, i ∈ {1, · · · , N }, j ∈ {1, · · · , M }, where xij = 1 if thread i is assigned to machine j; and N and M are the numbers of threads and machines respectively. Different scheduling solutions lead to different tuple processing and transfer delays at/between tasks at runtime thus different end-to-end tuple processing times [25]. We aim to find a scheduling solution that minimizes the average end-to-end tuple processing time. We have described how DRL basically works in Section 2.3. Here, we discuss how to apply DRL to solving the above scheduling problem in a DSDPS. We first define the state space, action space and reward. State Space: A state s = (X, w) consists of two parts: the scheduling solution X, i.e., the current assignment of executors, and the workload w, which includes the tuple arrival rate (i.e., the number of tuples per second) of each data source. The state space is denoted as S. Workload is included in the state to achieve better adaptivity and sensitivity to the incoming workload, which has been validated by our experimental results. Action Space: An action is defined as a =< aij >, ∀i ∈ PM {1, ..., N }, ∀j ∈ {1, ..., M }, where j=1 aij = 1, ∀i, and aij = 1 means assigning thread i to machine j. The action space A is the space P that contains all feasible actions. Note that the constraints M j=1 aij = 1, ∀i ensure that each thread i can only be assigned to a single machine, and the size of action space |A| = M N . Note that an action can be easily translated to its corresponding scheduling solution. Reward : The reward is simply defined to be the negative average tuple processing time so that the objective of the DRL agent is to maximize the reward. Note that the design of state space, action space and reward is critical to the success of a DRL method. In our case, the action space and reward are straightforward. However, there are many different ways for defining the state space because a DSDPS includes various runtime information (features) [25], e.g., CPU/memory/network usages of machines, workload at each executor/process/ machine, average tuple processing delay at each executor/PU, tuple transfer delay between executors/PUs, etc. We, however, choose a simple and clean way in our design. We tried to add additional system runtime information into the state but found that it does not necessarily lead to performance improvement. Different scheduling solutions lead to different values for the above features and eventually different average end-to-end tuple processing times; and the tuple arrival rates reflect the incoming workload. These information turns out to be sufficient for representing runtime system state. We observed that based on our design, the proposed DNNs can well model the correlation between the state and the average end-to-end tuple processing time (reward) after training. A straightforward way to apply DRL to solving the scheduling problem is to directly use the DQN-based method proposed in the pioneering work [33]. The DQN-based method uses a value iteration approach, in which the value function Q = Q(s, a; θ) is a parameterized function (with parameters θ) that takes state s and the action space A as input and return Q value for each action a ∈ A. Then we can use a greedy method to make an action selection: πQ (s) = argmax Q(s, a; θ) (3.1) a∈A If we want to apply the DQN-based method here, we need to restrict the exponentially-large action space A described above to a polynomial-time searchable space. The most natural way to achieve this is to restrict each action to assigning only one thread to a machine. In this way, the size of the action space can be significantly reduced to |A| = N × M , which obviously can be searched in polynomial time. Specifically, as mentioned above, in the offline training phase, we can collect enough samples of rewards and the corresponding state-action pairs for constructing a sufficiently accurate DQN, using a model-free method that deploys a randomlygenerated scheduling solution (state), and collect and record the corresponding average tuple processing time (reward). Then in the online learning phase, at each decision epoch t, the DRL agent obtains the estimated Q value from the DQN for each at with the input of current state st . Then ǫgreedy policy [41] is applied to select the action at according to the current state st : with (1 − ǫ) probability, the action with the highest estimated Q value is chosen, or an action is randomly selected with probability ǫ. After observing immediate reward rt and next state st+1 , a state transition sample (st , at , rt , st+1 ) is stored into the experience replay buffer. At every decision epoch, the DQN is updated with a mini-batch of collected samples in the experience replay buffer using SGD. Although this DQN-based method can provide solutions to the scheduling problem and does achieve model-free control for DSDPSs, it faces the following issue. On one hand, as described above, its time complexity grows linearly with |A|, which demands an action space with a very limited size. On the other hand, restricting the action space may result in limited exploration of the entire exponentially-large action space and thus suboptimal or even poor solutions to the scheduling problem, especially for the large cases. The experimental results in Section 4 validate this claim. 3.2.1 The Actor-critic-based Method for Scheduling In this section, we present a method that can better explore the action space while keeping time complexity at a reasonable level. AK â f (·) Q(·) Figure 2: The actor-critic-based method We leverage some advanced RL techniques, including actor-critic method [49, 6] and the deterministic policy gradient [44], for solving the scheduling problem. Note that since these techniques only provide general design frameworks, we still need to come up with a specific solution to our problem studied here. The basic idea of the proposed scheduling method is illustrated in Figure 2, which includes three major components: 1) an actor network that takes the state as input and returns a proto-action â, 2) an optimizer that finds a set AK of K Nearest Neighbors (K-NN) of â in the action space, and 3) a critic network that takes the state and and AK as input and returns Q value for each action a ∈ AK . Then an action with the highest Q value can be selected for execution. The basic design philosophy of this method is similar to that of a rounding algorithm, which finds a continuous solution by solving a relaxed version of the original integer (i.e., discrete) problem instance and then rounds the continuous solution to a “close” feasible integer solution that hopefully offers an objective value close to the optimal. Specifically, the actor network f (s; θπ ) = â N is a function parameterized by θπ and f : S 7→ RM . â is returned as a proto-action that takes continuous values so â ∈ / A. In our design, we use a 2-layer fully-connected feedforward neural network to serve as the actor network, which includes 64 and 32 neurons in the first and second layer respectively and uses the hyperbolic tangent function tanh(·) for activation. Note that we chose this activation function because our empirical testing showed it works better than the other commonly-used activation functions. The hardest part is to find the K-NN of the proto-action, which has not been well discussed in related work before. Even though finding K-NN can easily be done in linear time, the input size is M N here, which could be a huge number even in a small cluster. Hence, enumerating all actions in A and doing a linear search to find the K-NN may take an exponentially long time. We introduce an optimizer, which finds the K-NN by solving a series of Mixed-Integer Quadratic Programming (MIQP) problems presented in the following: MIQP-NN: min : a s.t.: M X ka − âk22 aij = 1, ∀i ∈ {1, · · · , N }; (3.2) j=1 Similar to the actor network f (·), we employ a 2-layer fullyconnected feedforward neural network to serve as the critic network, which includes 64 and 32 neurons in the first and second layer respectively and uses the hyperbolic tangent function tanh(·) for activation. Note that the two DNNs (one for actor network and one for critic network) are jointly trained using the collected samples. Algorithm 1 The actor-critic-based method for scheduling 1: Randomly initialize critic network Q(·) and actor network f (·) with weights θQ and θπ respectively; ′ 2: Initialize target networks Q′ and f ′ with weights θQ ← Q π′ π θ ,θ ←θ ; 3: Initialize experience replay buffer B; /**Offline Training**/ 4: Load the historical transition samples into B, train the actor and critic network offline; /**Online Learning**/ 5: Initialize a random process R for exploration; 6: Receive a initial observed state s1 ; /**Decision Epoch**/ 7: for t = 1 to T do 8: Derive proto-action â from the actor network f (·); 9: Apply exploration policy to â: R(â) = â + ǫI; 10: Find K-NN actions AK of â by solving a series of MIQP-NN problems (described above); 11: Select action at = argmaxa∈AK Q(st , a); 12: Execute action at by deploying the corresponding scheduling solution, and observe the reward rt ; 13: Store transition sample (st , at , rt , st+1 ) into B; 14: Sample a random mini-batch of H transition samples (si , ai , ri , si+1 ) from B; 15: yi := ri +γ maxa∈Ai+1,K Q′ (si+1 , a), ∀i ∈ {1, · · · , H}, where Ai+1,K is the set of K-NN of f ′ (si+1 ); 16: Update the critic network Q(·) by minimizing the loss: H P 1 L(θQ ) = H [yi − Q(si , ai )]2 ; i=1 17: aij ∈ {0, 1}, ∀i ∈ {1, · · · , N }, ∀j ∈ {1, · · · , M }. In this formulation, the objective is to find the action a that is the nearest neighbor of the proto-action â. The constraints ensure that action a is a feasible action, i.e., a ∈ A. To find the K-NN, the MIQP-NN problem needs to be iteratively solved K times. Each time, one of the KNN of the proto-action will be returned, the corresponding values < aij > are fixed, then the MIQP-NN problem is updated and solved again to obtain the next nearest neighbor until all the K-NN are obtained. Note that this simple MIQP problem can usually be efficiently solved by a solver as long as the input size is not too large. In our tests, we found our MIQP-NN problem instances were all solved very quickly (within 10ms on a regular desktop) by the Gurobi Optimizer [19]. For very large cases, the MIQP-NN problem can be relaxed to a convex programming problem [11] and a rounding algorithm can be used to obtain approximate solutions. The set AK of K-NN actions are further passed to the critic network to select the action. The critic network Q(s, a; θQ ) is a function parameterized by θQ , which returns Q value for each action a ∈ AK , just like the above DQN. The action can then be selected as follows: πQ (s) = argmax Q(s, a; θQ ). a∈AK (3.3) Update the weights θπ of actor network f (·) using the sampled gradient: H P 1 ∇θ π f ≈ H ∇â Q(s, â)|â=f (si ) · ∇θ π f (s)|si ; i=1 18: Update the corresponding target networks: ′ ′ θQ := τ θQ + (1 − τ )θQ ; ′ ′ θπ := τ θπ + (1 − τ )θπ 19: end for We formally present the actor-critic-based method for scheduling as Algorithm 1. First, the algorithm randomly initializes all the weights θπ of actor network f (·) and θQ of critic network Q(·) (line 1). If we directly use the actor and critic networks to generate the training target values < yi > (line 15), it may suffer from unstable and divergence problems as shown in paper [6]. Thus, similar as in [6, 26], we create the target networks to improve training stability. The target networks are clones of the original actor or critic ′ networks, but the weights of the target networks θQ and ′ θπ are slowly updated, which is controlled by a parameter τ . In our implementation, we set τ = 0.01. To robustly train the the actor and critic networks, we adopt the experience replay buffer B [33]. Instead of training network using the transition sample immediately collected at each decision epoch t (from line 8 to line 12), we first store the sample into a replay buffer B, then randomly select a mini-batch of transition samples from B to train the actor and critic networks. Note that since the size of B is limited, the oldest sample will be discarded when B is full. The sizes of replay buffer and mini-batch were set to |B| = 1000 and H = 32 respectively in our implementation. The online exploration policy (line 9) is constructed as R(â) = â+ǫI, where ǫ is an adjustable parameter just as the ǫ in the ǫ-greedy method [41], which determines the probability to add a random noise to the proto-action rather than take the derived action from the actor network. ǫ decreases with decision epoch t, which means with more training, more derived actions (rather than random ones) will be taken. In this way, ǫ can tradeoff exploration and exploitation. The parameter I is a uniformly distributed random noise, each element of which was set to a random number in [0, 1] in our implementation. The critic network Q(·) is trained by the mini-batch samples from B as mentioned above. For every transition sample (si , ai , ri , si+1 ) in the mini-batch, first we obtain the proto-action âi+1 of the next state si+1 from the target actor network f ′ (si+1 ); second, we find K-NN actions Ai+1,K of the proto-action âi+1 by solving a series of MIQP-NN problems presented above; then we obtain the highest Q-value from the target critic network, maxa∈Ai+1,K Q′ (si+1 , a). To train critic network Q(si , ai ), the target value yi for input si and ai is given by the sum of the immediate reward ri and the discounted max Q-value (line 15). The discount factor γ = 0.99 in our implementation. A common loss function L(·) is used to train the critic network (line 16). The actor network f (·) is trained by the deterministic policy gradient method [44] (line 17). The gradient is calculated by the chain rule to obtain the expected return from the transition samples in the mini-batch with respect to the weights θπ of the actor network. The actor and critic networks can be pre-trained by the historical transition samples, so usually the offline training (line 4) is performed first, which is almost the same as online learning (lines 13–18). In our implementation, we first collected 10, 000 transition samples with random actions for each experimental setup and then pre-trained the actor and critic networks offline. In this way, we can explore more possible states and actions and significantly speed up online learning. 4. We implemented three popular and representative SDP applications (called topologies in Storm) to test the proposed framework: continuous queries, log stream processing and word count (stream version), which are described in the following. These applications were also used for performance evaluation in [25] that presented the state-of-the-art modelbased approach; thus using them ensures fair comparisons. Continuous Queries Topology (Figure 3): This topology represents a popular application on Storm. It is a select query that works by initializing access to a database table created in memory and looping over each row to check if there is a hit [8]. It consists of a spout and two bolts. Randomly generated queries are emitted continuously by the spout and sent to a Query bolt. The database tables are placed in the memory of worker machines. After taking queries from the spout, the Query bolt iterates over the database table to check if there is any matching record. The Query bolt emits the matching record to the last bolt named the File bolt, which writes matching records into a file. In our experiments, a database table with vehicle plates and their owners’ information including their names and SSNs was randomly generated. We also randomly generated queries to search the database table for owners of speeding vehicles, while vehicle speeds were randomly generated and attached to every entry. To perform a comprehensive evaluation, we came up with 3 different setups for this topology: small-scale, mediumscale and large-scale. In the small-scale experiment, a total of 20 executors were created, including 2 spout executors, 9 Query bolt executors and 9 File bolt executors. In the medium-scale experiment, we had 50 executors in total, including 5 spout executors, 25 Query bolt executors and 20 File bolt executors. For the large-scale experiment, we had a total of 100 executors, including 10 spout executors, 45 Query bolt executors and 45 File bolt executors. Continuous Queries Topology Spout Query Bolt File Bolt Output File Database Table PERFORMANCE EVALUATION In this section, we describe experimental setup, followed by experimental results and analysis. 4.1 Experimental Setup We implemented the proposed DRL-based control framework over Apache Storm [48] (obtained from Storm’s repository on Apache Software Foundation) and installed the system on top of Ubuntu Linux 12.04. We also used Google’s TensorFlow [50] to implement and train the DNNs. For performance evaluation, we conducted experiments on a cluster in our data center. The Storm cluster consists of 11 IBM blade servers (1 for Nimbus and 10 for worker machines) connected by a 1Gbps network, each with an Intel Xeon Quad-Core 2.0GHz CPU and 4GB memory. Each worker machine was configured to have 10 slots. Figure 3: Continuous Queries Topology Log Stream Processing Topology (Figure 4): Being one of the most popular applications for Storm, this topology uses an open-source log agent called LogStash [29] to read data from log files. Log lines are submitted by LogStash as separate JSON values into a Redis [39] queue, which emits the output to the spout. We used Microsoft IIS log files collected from computers at our university as the input data. The LogRules bolt performs rule-based analysis on the log stream, delivering values containing a specific type of log entry instance. The results are simultaneously delivered to two separate bolts: one is the Indexer bolt performing index actions and another is the Counter bolt performing counting actions on the log entries. For the testing purpose, we slightly revised the original topology to include two more bolts, two Database bolts, after the Indexer and Counter bolts respectively. They store the results into separate collections in a Mongo database for verification purpose. In our experiment, the topology was configured to have a total of 100 executors, including 10 spout executors, 20 LogRules bolt executors, 20 Indexer bolt executors, 20 Counter bolt executors and 15 executors for each Database bolt. Log Files Log Stream Processing Topology Redis Spout LogRules Bolt Log Stash Indexer Bolt Database Bolt Counter Bolt Database Bolt Mongo DB Figure 4: Log Stream Processing Topology Word Count Topology (stream version) (Figure 5): The original version of the topology is widely known as a classical MapReduce application that counts every word’s number of appearances in one or multiple files. The stream version used in our experiments runs a similar routine but with a stream data source. This topology consists of one spout and three bolts with a chain-like structure. LogStash [29] was used to read data from input source files. LogStash submits input file lines as separate JSON values into a Redis [39] queue, which are consumed and emitted into the topology. The text file of Alice’s Adventures in Wonderland [1] was used as the input file. When the input file is pushed into the Redis queue, the spout produces a data stream which is first directed to the SplitSentence bolt, which splits each input line into individual words and further sends them to the WordCount bolt. This bolt then counts the number of appearances using fields grouping. The Database bolt finally stores the results into a Mongo database. In the experiment, the topology was configured to have a total of 100 executors, including 10 spout executors, 30 SplitSentence bolt executors, 30 WordCount executors and 30 Database bolt executors. Input File Word Count Topology Redis Spout SplitSentence Bolt WordCount Bolt Database Bolt Mongo DB Log Stash Figure 5: Word Count Topology (stream version) 4.2 Experimental Results and Analysis In this section, we present and analyze experimental results. To well justify effectiveness of our design, we compared the proposed DRL-based control framework with the actor-critic-based method (labeled as “Actor-critic-based DRL”) with the default scheduler of Storm (labeled as “Default”) and the state-of-the-art model-based method proposed in a very recent paper [25] (labeled as “Model-based”) in terms of average (end-to-end) tuple processing time. Moreover, we included the straightforward DQN-based DRL method (described in Section 3.2) in the comparisons (labeled as “DQN-based DRL”). For the proposed actor-critic-based DRL method and the DQN-based DRL method, both the offline training and online learning were performed to train the DNNs to reach certain scheduling solutions, which were then deployed to the Storm cluster described above. The figures presented in the following show the average tuple processing time corresponding to the scheduling solutions given by all these methods in the period of 20 minutes. In addition, we show the performance of the two DRL methods over the online learning procedure in terms of the reward. For illustration and comparison purposes, we normalize and smooth the reward r−rmin values using a commonly-used method rmax (where r −rmin is the actual reward, rmin and rmax are the minimum and maximum rewards during online learning respectively) and the well-known forward-backward filtering algorithm [20] respectively. Note that in Figures 6, 8 and 10, time 0 is the time when a scheduling solution given by a well-trained DRL agent is deployed in the Storm. It usually takes a little while (10-20 minutes) for the system to gradually stabilize after a new scheduling solution is deployed. This process is quite smooth, which has also been shown in [25]. So these figures do not show the performance of the DRL methods during training processes but the performance of the scheduling solutions given by well-trained DRL agents. The rewards given by the DRL agents during their online learning processes are shown in Figures 7, 9 and 11. This process usually involves large fluctuations, which have also been shown in other DRL-related works such as [23, 26]. Continuous Queries Topology (Figure 3): We present the corresponding experimental results in Figures 6 and 7. As mentioned above, we performed experiments on this topology using three setups: small-scale, medium-scale and largescale, whose corresponding settings are described in the last subsection. From Figure 6, we can see that for all 3 setups and all the four methods, after a scheduling solution is deployed, the average tuple processing time decreases and stabilizes at a lower value (compared to the initial one) after a short period of 8 − 10 minutes. Specifically, in Figure 6(a) (small-scale), if the default scheduler is used, it starts at 3.71ms and stabilizes at 1.96ms; if the model-based method is employed, it starts at 3.22ms and stabilizes at 1.46ms; if the DQN-based DRL method is used, it starts at 3.20ms and stabilizes at 1.54ms; and if the actor-critic-based DRL method is applied, it starts at 2.94ms and stabilizes at 1.33ms. In this case, the actor-critic-based DRL method reduces the average tuple processing time by 31.4% compared to the default scheduler and by 9.5% compared to the model-based method. The DQN-based DRL method performs slightly worse than the model-based method. From Figure 6(b) (medium-scale), we can see that the average tuple processing times given by all the methods slightly go up. Specifically, if the default scheduler is used, it stabilizes at 2.08ms; if the model-based method is employed, it stabilizes at 1.61ms; if the DQN-based DRL method is used, it stabilizes at 1.59ms; and if the actor-critic-based DRL method is applied, it stabilizes at 1.43ms. Hence, in this case, the actor-critic-based DRL method achieves a performance improvement of 31.2% over the default scheduler 4 3.5 3 2.5 2 1.5 1 0 5 10 Running time (min) 15 4.5 Default Model−based DQN−based DRL Actor−critic−based DRL 3.5 Average tuple processing time (ms) Default Model−based DQN−based DRL Actor−critic−based DRL Average tuple processing time (ms) Average tuple processing time (ms) 4 3 2.5 2 1.5 1 0 20 (a) Small-scale 5 10 Running time (min) 15 (b) Medium-scale 20 Default Model−based DQN−based DRL Actor−critic−based DRL 4 3.5 3 2.5 2 1.5 0 5 10 Running time (min) 15 20 (c) Large-scale Figure 6: Average tuple processing time over the continuous queries topology 0.7 Actor−critic−based DRL DQN−based DRL 0.65 Normalized reward 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0 500 1000 Decision epoch 1500 2000 Figure 7: Normalized reward over the continuous queries topology (large-scale) and 11.2% over the model-based method. The performance of DQN-based DRL method is still comparable to the modelbased method. From Figure 6(c) (large-scale), we can observe that the average tuple processing times given by all the methods increase further but still stabilize at reasonable values, which essentially shows that the Storm cluster undertakes heavier workload but has not been overloaded in this large-scale case. Specially, if the default scheduler is used, it stabilizes at 2.64ms; if the model-based method is employed, it stabilizes at 2.12ms; if the DQN-based DRL method is used, it stabilizes at 2.45ms; and if the actor-critic-based DRL method is applied, it stabilizes at 1.72ms. In this case, the actor-critic-based DRL method achieves a more significant performance improvement of 34.8% over the default scheduler and 18.9% over the model-based method. In addition, the performance of the DQN-based DRL method is noticeably worse than that of the model-based method. In summary, we can make the following observations: 1) The proposed actor-critic-based DRL method consistently outperforms all the other three methods, which well justifies the effectiveness of the proposed model-free approach for control problems in DSDPSs. 2) The performance improvement (over the default scheduler and the model-based method) offered by the proposed actor-critic-based DRL method become more and more significant with the increase of input size, which shows that the proposed model-free method works even better when the distributed computing environment becomes more and more sophisticated. 3) Direct application of DQN-based DRL method does not work well, especially in the large case. This method lacks a carefully-designed mechanism (such as the proposed MIQPbased mechanism presented in Section 3.2.1) that can fully discover the action space and make a wise action selection. Hence, in large cases with huge action spaces, random selection of action may lead to a suboptimal or even poor decision. We further exploit how the two DRL methods behave during online learning by showing how the normalized reward varies over time within T = 2000 decision epochs in Figure 7. We performed this experiment using the large-scale setup described above. From this figure, we can observe that both methods start from similar initial reward values. The DQN-based DRL method keeps fluctuating during the entire procedure and ends at an average award value of 0.44 (the average over the last 200 epochs); while the actor-criticbased DRL method experiences some fluctuations initially, then gradually climbs to a higher value. More importantly, the actor-critic-based DRL method consistently offers higher rewards compared to the DQN-based method during online learning. These results further confirm superiority of the proposed method during online learning. Moreover, we find that even in this large-scale case, the proposed actorcritic-based DRL method can quickly reach a good scheduling solution (whose performance have been discussed above) without going though a really long online learning procedure (e.g., several million epochs) shown in other applications [33]. This justifies the practicability of the proposed DRL method for online control in DSPDSs. Log Stream Processing Topology (Figure 4): We performed a large-scale experiment over the log stream processing topology, whose settings have been discussed in the last subsection too. We show the corresponding results in Figures 8 and 9. This topology is more complicated than the previous continuous queries topology, which leads to a longer average tuple processing time no matter which method is used. Default Model−based DQN−based DRL Actor−critic−based DRL 11 10 9 8 7 0 5 10 15 20 Figure 8: Average tuple processing time over the log processing topology (large-scale) 0.9 Actor−critic−based DRL DQN−based DRL Normalized reward 0.8 0.75 0.7 0.65 0.6 0.55 0.5 0 500 1000 1500 Decision epoch Figure 9: Normalized reward over the log processing topology (large-scale) Average tuple processing time (ms) 4.5 Default Model−based DQN−based DRL Actor−critic−based DRL 4 3.5 3 2.5 2 1.5 0 0.55 0.5 0.45 0.4 Running time (min) 0.85 Actor−critic−based DRL DQN−based DRL Normalized reward Average tuple processing time (ms) 12 5 10 Running time (min) 15 20 Figure 10: Average tuple processing time over the word count topology (large-scale) 0 500 1000 1500 Decision epoch Figure 11: Normalized reward over the word count topology (large-scale) In Figure 8, if the default scheduler is used, it stabilizes at 9.61ms; if the model-based method is employed, it stabilizes at 7.91ms; if the DQN-based DRL method is used, it stabilizes at 8.19ms; and if the actor-critic-based DRL method is applied, it stabilizes at 7.20ms. As expected, the proposed actor-critic-based DRL method consistently outperforms the other three methods. Specifically, it reduces the average tuple processing time by 25.1% compared to the default scheduler and 9.0% compared to the model-based method. Furthermore, the DQN-based DRL method performs worse than the model-based method, which is consistent with the results related to the continuous queries topology. Similarly, we show how the normalized reward varies over time within T = 1500 decision epochs in Figure 9. From this figure, we can make a similar observation that the actor-critic-based DRL method consistently leads to higher rewards compared to the DQN-based method during online learning. Obviously, after a short period of online learning, the proposed actor-critic-based DRL method can reach a good scheduling solution (discussed above) in this topology too. Word Count Topology (stream version) (Figure 5): We performed a large-scale experiment over the word count (stream version) topology and show the corresponding results in Figures 10 and 11. Since the complexity of this topology is similar to that of the continuous queries topology, all the four methods give similar average time processing times. In Figure 10, if the default scheduler is used, it stabilizes at 3.10ms; if the model-based method is employed, it stabilizes at 2.16 ms; if the DQN-based DRL method is used, it stabilizes at 2.29ms; and if the actor-critic-based DRL method is applied, it stabilizes at 1.70ms. The actor-critic-based DRL method results in a performance improvement of 45.2% over the default scheduler and 21.3% improvement over the model-based method. The performance of the DQN-based DRL method is still noticeably worse than the model-based method. We also show the performance of the two DRL methods during online learning in Figure 11, from which we can make observations similar to those related to the first two topologies. In addition, we compared the proposed model-free method with the model-based method under significant workload 10 4 4 Model−based Actor−critic−based DRL 3.5 3 2.5 2 1.5 0 10 20 30 Running time (min) 40 (a) Continuous queries topology 50 Model−based Actor−critic−based DRL 9.5 Average tuple processing time (ms) Average tuple processing time (ms) Average tuple processing time (ms) Model−based Actor−critic−based DRL 9 8.5 8 7.5 7 0 10 20 30 Running time (min) 40 50 (b) Log stream processing topology 3.5 3 2.5 2 1.5 0 10 20 30 Running time (min) 40 50 (c) Word count topology Figure 12: Average tuple processing time over 3 different topologies (large-scale) under significant workload changes changes on 3 different topologies (large-scale). For the continuous queries topology (large-scale), we can see from Figure 12(a) that when the workload is increased by 50% at 20 minute, the average tuple processing time of the actor-criticbased DRL method rises sharply to a relatively high value then gradually stabilizes at 1.76ms, while the model-based method rises sharply too and then stabilizes at 2.17ms. The spikes are caused by the adjustment of the scheduling solution. However, we can observe that once the system stabilizes, the proposed method leads to a very minor increase on average tuple processing time. Hence, it is sensitive to the workload change and can quickly adjust its scheduling solution accordingly to avoid performance degradation. This result well justifies the robustness of the proposed method in a highly dynamic environment with significant workload changes. Moreover, during the whole period, we can see that the proposed method still consistently outperforms the model-based method. We can make similar observations for the other two topologies from Figures 12(b)–12(c). 5. RELATED WORK In this section, we provide a comprehensive review for related systems and research efforts. Distributed Stream Data Processing Systems (DSDPS): Recently, a few general-purpose distributed systems have been developed particularly for SDP in a large cluster or in the cloud. Storm [48] is an open-source, distributed and fault-tolerant system that was designed particularly for processing unbounded streams of data in real or near-real time. Storm provides a directed graph based model for programming as well as a mechanism to guarantee message processing. S4 [42] is another general-purpose DSDPS that has a similar programming model and runtime system. MillWheel [3] is a platform designed for building lowlatency SDP applications, which has been used at Google. A user specifies a directed computation graph and application code for individual nodes, and the system manages persistent states and continuous flows of data, all within the envelope of the framework’s fault-tolerance guarantees. TimeStream [38] is a distributed system developed by Microsoft specifically for low-latency continuous processing of stream data in the cloud. It employs a powerful new abstraction called resilient substitution that caters to specific needs in this new computation model to handle failure recovery and dynamic reconfiguration in response to load changes. Spark Streaming [47] is a DSDPS that uses the core Spark API and its fast scheduling capability to perform streaming analytics. It ingests data in mini-batches and performs RDD transformations on those mini-batches of data. Other DSDPSs include C-MR [7], Apache Flink [16], Google’s FlumeJava [12], M3 [2], WalmartLab’s Muppet [24], IBM’s System S [32] and Apache Samza [43]. Modeling and scheduling have also been studied in the context of DSDPS and distributed stream database system. In an early work [34], Nicola and Jarke provided a survey of performance models for distributed and replicated database systems, especially queueing theory based models. In [30], scheduling strategies were proposed for a data stream management system, aiming at minimizing the tuple latency and total memory requirement. In [51], Wei et al. proposed a prediction-based Quality-of-Service (QoS) management scheme for periodic queries over dynamic data streams, featuring query workload estimators that predict the query workload using execution time profiling and input data sampling. The authors of [40] described a decentralized framework for pro-actively predicting and alleviating hot-spots in SDP applications in real-time. In [5], Aniello et al. presented both offline and online schedulers for Storm. The offline scheduler analyzes the topology structure and makes scheduling decisions; the online scheduler continuously monitors system performance and reschedules executors at runtime to improve overall performance. Xu et al. presented T-Storm in [52], which is a traffic-aware scheduling framework that minimizes inter-node and inter-process traffic in Storm while ensuring no worker nodes were overloaded, and enables fine-grained control over worker node consolidation. In [9], Bedini et al. presented a set of models that characterize a practical DSDPS using the Actor Model theory. They also presented an experimental validation of the proposed models using Storm. In [10], a general and simple technique was presented to design and implement priority-based resource scheduling in flow-graph-based DSDPSs by allowing application developers to augment flow graphs with priority metadata and by introducing an extensive set of priority schemas. In [31], a novel technique was proposed for resource usage estimation of SDP workloads in the cloud, which uses mixture density networks, a combined structure of neural networks and mixture models, to estimate the whole spectrum of resource usage as probability density functions. In a very recent work [25], Li et al. presented a topology-aware method to accurately predict the average tuple processing time for a given scheduling solution, according to the topology of the application graph and runtime statistics. For scheduling, they presented an effective algorithm to assign threads to machines under the guidance of the proposed prediction model. Unlike them, we aim to develop a model-free control framework for scheduling in DSDPSs to directly minimize the average tuple processing time by leveraging the state-of-the-art DRL techniques, which has not been done before. Deep Reinforcement Learning (DRL): DRL has recently attracted extensive attention from both industry and academia. In a pioneering work [33], Mnih et al. proposed Deep Q Network (DQN), which can learn successful policies directly from high dimensional sensory inputs. This work bridges the gap between high-dimensional sensory inputs and actions, resulting in the first artificial agent that is capable of learning to excel at a diverse array of challenging gaming tasks. The authors of [23] proposed double Q-learning as a specific adaptation to the DQN, which is introduced in a tabular setting and can be generalized to work with a large-scale function approximation. The paper [17] considered a problem of multiple agents sensing and acting with the goal of maximizing their shared utility, based on DQN. The authors designed agents that can learn communication protocols to share information needed for accomplishing tasks. In order to further extend DRL to address continuous actions and large discrete action spaces, Duan et al. [15] presented a benchmark suite of control tasks to quantify progress in the domain of continuous control; and Lillicrap et al. [26] proposed an actor-critic, model-free algorithm based on the policy gradient that can operate over continuous action spaces. Gu et al. [18] presented normalized advantage functions to reduce the sample complexity of DRL for continuous tasks. Arnold et al. [6] extended the methods proposed for continuous actions to make decisions within a large discrete action space. In [36], the authors employed a DRL framework to jointly learn state representations and action policies using game rewards as feedback for text-based games, where the action space contains all possible text descriptions. It remains unknown if and how the emerging DRL can be applied to solving complicated control and resource allocation problems in DSDPSs. In addition, RL/DRL has been applied to control of big data and cloud systems. In [35], the authors proposed a novel MapReduce scheduler in heterogeneous environments based on RL, which observes the system state of task execution and suggests speculative re-execution of the slower tasks on other available nodes in the cluster. An RL approach was proposed in [37] to enable automated tuning configuration of MapReduce parameters. Liu et al. [27] proposed a novel hierarchical framework for solving the overall resource resource allocation and power management problem in cloud computing systems with DRL. The control problems in MapReduce and cloud systems are quite different from the problem studied here. Hence, the methods proposed in these related works cannot be directly applied here. 6. CONCLUSIONS In this paper, we investigated a novel model-free approach that can learn to well control a DSDPS from its experience rather than accurate and mathematically solvable system models, just as a human learns a skill. We presented design, implementation and evaluation of a novel and highly effective DRL-based control framework for DSDPSs, which minimizes the average end-to-end tuple processing time. The proposed framework enables model-free control by jointly learning the system environment with very limited runtime statistics data and making decisions under the guidance of two DNNs, an actor network and a critic network. We implemented it based on Apache Storm, and tested it with three representative applications: continuous queries, log stream processing and word count (stream version). Extensive experimental results well justified the effectiveness of our design, which showed: 1) The proposed framework achieves a performance improvement of 33.5% over Storm’s default scheduler and 14.0% over the state-of-the-art model-based method on average. 2) The proposed DRL-based framework can quickly reach a good scheduling solution during online learning. 7. ACKNOWLEDGEMENT This research was supported in part by AFOSR grants FA9550-16-1-0077 and FA9550-16-1-0340. The information reported here does not reflect the position or the policy of the federal government. 8. REFERENCES [1] Alice’s Adventures in Wonderland, http://www.gutenberg.org/files/11/11-pdf.pdf [2] A.M. Aly, A. Sallam, B.M. Gnanasekaran, L. Nguyen-Dinh, W.G. Aref, M. Ouzzani, and A. Ghafoor, M3: Stream Processing on Main-Memory MapReduce, Proceedings of IEEE ICDE’2012, pp.1253–1256, 2012. [3] T. Akidau, A. Balikov, K. Bejiroglu, S. Chernyak, J. Haberman, R. Lax, S. McVeety, D. Mills, P. Nordstrom and S. Whittle, MillWheel: fault-tolerant stream processing at internet scale. PVLDB, 6(11): 1033–1044, 2013. [4] Q. Anderson, Storm real-time processing cookbook, PACKT Publishing, 2013. [5] L. Aniello, R. Baldoni and L. Querzoni, Adaptive online scheduling in Storm, Proceedings of ACM DEBS’2013. [6] G. D. Arnold, R. Evans, H. v. Hasselt, P. Sunehag, T. Lillicrap, J. Hunt, T. Mann, T. Weber, T. Degris and B. Coppin, Deep reinforcement learning in large discrete action spaces, arXiv: 1512.07679, 2016. [7] N. Backman, K. Pattabiraman, R. Fonseca and U. Cetintemel, C-MR: continuously executing MapReduce workflows on multi-core processors, Proceedings of MapReduce’12. [8] P. Bakkum and K. Skadron, Accelerating SQL database operations on a GPU with CUDA, Proceedings of the 3rd Workshop on General-Purpose Computation on GPU (GPGPU’10), pp. 94–103. [9] Ivan Bedini, Sherif Sakr, Bart Theeten, Alessandra Sala, Peter Cogan, Modeling performance of a parallel [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] streaming engine: bridging theory and costs, Proceedings of IEEE ICPE’2013, pp. 173–184. P. Bellavista, A. Corradi, A. Reale and N. Ticca, Priority-based resource scheduling in distributed stream processing systems for big data applications, Proceedings of IEEE/ACM International Conference on Utility and Cloud Computing, 2014, pp. 363–370. S. Boyd and L. Vandenberghe, Convex Optimization Cambridge University Press, 2004. C. Chambers, A. Raniwala, F. Perry, S. Adams, R. Henry, R. Bradshaw and N. Weizenbaum, FlumeJava: easy, efficient data-parallel pipelines, Proceedings of ACM PLDI’2010, pp. 363–375. F. Chen, M. Kodialam and T. V. Lakshman, Joint scheduling of processing and shuffle phases in MapReduce systems, Proceedings of IEEE Infocom’2012, pp. 1143–1151. H. Drucker, C. Burges, L. Kaufman, A. Smola and V. Vapnik, Support vector regression machines, Proceedings of NIPS’1996, pp. 155–161. Y. Duan, X. Chen, R. Houthooft, J. Schulman and P. Abbeel, Benchmarking deep reinforcement learning for continuous control, Proceedings of ICML’2016. Apache Flink, https://flink.apache.org/ J. N. Foerster, Y. M. Assael, N. d. Freitas and S. Whiteson, Learning to communicate with deep multi-agent reinforcement learning, Proceedings of NIPS’2016. S. Gu, T. Lillicrap, I. Sutskever and S. Levine, Continuous deep Q-Learning with model-based acceleration, Proceedings of ICML’2016. Gurobi Optimizer, http://www.gurobi.com/ F. Gustafsson, Determining the initial states in forward-backward filtering, IEEE Transactions on Signal Processing, Vol. 44, No. 4, 1996, pp. 988–992. J. Han, M. Kamber and J. Pei, Data Mining: Concepts and Techniques (3rd Edition), Morgan Kaufmann, 2011. Apache Hadoop, http://hadoop.apache.org/ H. v. Hasselt, A. Guez, and D. Silver, Deep reinforcement learning with double Q-learning, Proceedings of AAAI’2016. W. Lam, L. Liu, S. Prasad, A. Rajaraman, Z. Vacheri and A. Doan, Muppet: MapReduce-style processing of fast data, PVLDB, 5(12): 1814–1825, 2012. T. Li, J. Tang and J. Xu, Performance modeling and predicitive scheduling for distributed stream data processing, IEEE Transactions on Big Data, 2(4): 353–364, 2016. T. P. Lillicrap, J. J. Hunt, A. Pritzel, N. Heess, T. Erez, Y. Tassa, D. Silver and D. Wierstra, Continuous control with deep reinforcement learning, Proceedings of ICLR’2016. N. Liu, Z. Li, J. Xu, Z. Xu, S. Lin, Q. Qiu, J. Tang and Y. Wang, A hierarchical framework of cloud resource allocation and power management using deep reinforcement learning, Proceedings of ICDCS’2017. S. Loesing, M. Hentschel, T. Kraska and D. Kossmann, Stormy: an elastic and highly available streaming service in the cloud, Proceedings of the 2012 ACM Joint EDBT/ICDT Workshops, pp. 55–60. [29] Logstash - Open Source Log Management, http://logstash.net/ [30] Q. Jiang and S. Chakravarthy, Scheduling strategies for a data stream management system, Technical Report CSE-2003-30. [31] A. Khoshkbarforoushha, R. Ranjan, R. Gaire, P. P. Jayaraman, J. Hosking and E. Abbasnejad, Resource usage estimation of data stream processing workloads in datacenter clouds, 2015, http://arxiv.org/abs/1501.07020. Proceedings of ACM STOC’1997, pp. 654–663. [32] V. Kumar, H. Andrade, B. Gedik, and K.-L. Wu, Deduce: at the intersection of Mapreduce and stream processing, Proceedings of ACM EDBT’2010, pp. 657–662. [33] V. Mnih, et al. , Human-level control through deep reinforcement learning, Nature, 518(7540): 529–533, 2015. [34] M. Nicola and M. Jarke, Performance modeling of distributed and replicated databases, IEEE Transactions on Knowledge Discovery and Data Engineering, 12(4): 645–672, 2000. [35] N. Naik, A. Negi and V. Sastry, Performance improvement of MapReduce framework in heterogeneous context using reinforcement learning, Procedia Computer Science, 50: 169–175, 2015. [36] K. Narasimhan, T. D Kulkarni and R. Barzilay, Language understanding for text-based games using deep reinforcement learning, Proceedings of Conference on Empirical Methods in Natural Language Processing, 2015. [37] C. Peng, C. Zhang, C. Peng and J. Man, A reinforcement learning approach to map reduce auto-configuration under networked environment, International Journal of Security and Networks, 12(3): 135–140, 2017. [38] Z. Qian, et al. , Timestream: reliable stream computation in the cloud, Proceedings of EuroSys’2013. [39] Redis, http://redis.io [40] T. Repantis and V. Kalogeraki, Hot-spot prediction and alleviation in distributed stream processing applications, Proceedings of IEEE DSN’2008, pp. 346–355. [41] M. Restelli, Reinforcement learning - exploration vs exploitation, 2015, http://home.deib.polimi.it/restelli/MyWebSite/pdf/ rl5.pdf [42] Apache S4, http://incubator.apache.org/s4/ [43] Apache Samza, http://samza.apache.org/ [44] D. Silver, G. Lever, N. Heess, T. Degris, D. Wierstra and M. Riedmiller, Deterministic policy gradient algorithms, Proceedings of ICML’2014. [45] D. Silver, et al. , Mastering the game of Go with deep neural networks and tree search Nature, 529: 484–489, 2016. [46] Apache Spark, http://spark.apache.org/ [47] Spark Streaming — Apache Spark, http://spark.apache.org/streaming/ [48] Apache Storm, http://storm.apache.org/ [49] R. Sutton and A. Barto, Reinforcement learning: an introduction, MIT press Cambridge, 1998. [50] TensorFlow, https://www.tensorflow.org/ [51] Y. Wei, V. Prasad, S. Son and J. Stankovic, Prediction-based QoS management for real-time data streams, Proceedings of IEEE RTSS’2006. [52] J. Xu, Z. Chen, J. Tang and S. Su, T-Storm: traffic-aware online scheduling in Storm, Proceedings of IEEE ICDCS’2014, pp. 535–544. [53] M. Zaharia, A. Konwinski, A. D. Joseph, R. Katz, I. Stoica, Improving MapReduce performance in heterogeneous environments, Proceedings of OSDI’2008. [54] Apache Zookeeper, https://zookeeper.apache.org/ [55] Y. Zhu, et al. , Minimizing makespan and total completion time in MapReduce-like systems, Proceedings of IEEE Infocom’2014, pp. 2166–2174.
2cs.AI
УДК 004.9:66.013.512 В.В. Мигунов, Р.Р. Кафиятуллов ЗАЩИТА ИНФОРМАЦИИ В КОМПЛЕКСНОЙ САПР РЕКОНСТРУКЦИИ ПРОМЫШЛЕННЫХ ПРЕДПРИЯТИЙ Введение. По мере перехода к электронному представлению информации, которое делает возможным ее хранение и транспортировку на все более компактных носителях и передачу со все большими скоростями по каналам связи, задача защиты информации (ЗИ) в электронном виде приобретает особую актуальность. Возникающие здесь проблемы и методы очень разнообразны: от законодательных, административных и организационных до таких аспектов технической защиты, как предотвращение внедрения программвирусов или физическая защита помещений (п. 5.1.3. [1]). Теория и практика ЗИ в нашей стране развиваются как путем распространения глубоко разработанных методов защиты сведений, составляющих государственную тайну, на конфиденциальные сведения [1], так и на основе относительно новых разработок в сфере защиты коммерческой тайны [2, 3]. При этом в первую очередь рассматривается ЗИ от умышленных действий. Например, в п. 5.1.2. [1] говорится: "Основными направлениями защиты информации являются: обеспечение защиты информации от хищения, утраты, утечки, уничтожения, искажения и подделки за счет НСД и специальных воздействий; обеспечение защиты информации от утечки по техническим каналам при ее обработке, хранении и передаче по каналам связи" (НСД - несанкционированный доступ). В [3]: "В настоящей работе предпринята попытка возможно более полного охвата угроз безопасности субъектов информационных отношений. Однако следует иметь в виду, что научнотехнический прогресс может привести к появлению принципиально новых видов угроз и что изощренный ум злоумышленника способен придумать новые способы преодоления систем безопасности, НСД к данным и дезорганизации работы информационных систем". Лишь во вторую очередь принято рассматривать угрозы от неумышленных действия. В частности, для САПР эти угрозы и методы борьбы с ними изучены мало. В противоположность подходам к ЗИ, акцентированным на противодействии злому умыслу, настоящая работа посвящена изучению угроз информации, возникающих вследствие непредумышленных действий пользователей САПР, и методов ЗИ, ограниченных сферой влияния программного обеспечения САПР. В основе рассмотрения лежит практический опыт развития комплексной САПР реконструкции предприятий TechnoCAD GlassX, эксплуатируемой в проектно-конструкторском подразделении крупного предприятия химической промышленности [4] в течение 10 лет. Из особенностей такой САПР, охарактеризованных в [5], существенной для ЗИ явилась комплексность. Отметим, что именно непредумышленные действия являются основными угрозами информации. По сведениям из [2]: "... в 1998 году. Основные причины повреждений электронной информации распределились следующим образом: неумышленная ошибка человека - 52% случаев, умышленные действия человека - 10% случаев, отказ техники - 10% случаев, повреждения в результате пожара - 15% случаев, повреждения водой 10% случаев". В [3] приводятся данные, относящиеся к более позднему времени: "Согласно статистики, 65% потерь - следствие непреднамеренных ошибок. Пожары и наводнения можно считать пустяками по сравнению с безграмотностью и расхлябанностью". Угрозы информации в сфере влияния САПР. В первую очередь беспокоящие проектировщика угрозы информации в САПР – это угрозы порчи или утраты электронных документов (файлов с чертежами), приводящие к необходимости повторно выполнять уже сделанную работу. По опыту эксплуатации САПР выделены 4 угрозы, которые в первую очередь отмечаются пользователями: 1. Случайное удаление, изменение элементов чертежа. 2. Утеря результатов работы за период с последнего сохранения чертежа на диск вследствие отказов: сети электроснабжения, узлов компьютера, операционной системы и самой САПР. 3. Случайная подмена чертежа другим с тем же именем файла. Для идентификации чертежей проектировщики часто употребляют номер проектируемого корпуса. При этом монтажный чертеж трубопровода и схема автоматизации, созданные на разных рабочих местах, могут иметь одно и то же имя файла. При передаче чертежей между рабочими местами возникает угроза неумышленной замены чертежа. 4. Утрата уверенности в целостности чертежа, возникающая при отсутствии системы ответственного электронного архивирования (хранения) файлов чертежей. Чертеж может измениться в результате неосторожных действий при его просмотре или печати, при использовании его как заготовки для создания другого чертежа. Реализация ЗИ в САПР от этих угроз далее описана соответственно как "Откат", "Автосохранение", "Автоматическое резервное копирование" и "Электронная подпись". Откат. Откат, или возврат изменений (команды "Отменить" и "Вернуть") широко применяемый метод борьбы с 1й угрозой. Его теория глубоко развита для баз данных [6] как работа с транзакциями. В условиях комплексной САПР возникает специфика, связанная с тем, что при выходе на довольно продолжительное время в режим работы в специализированном проблемноориентированном расширении [7] пользователь занимается параметрическим проектированием, не имеет связи с чертежом и накапливает информацию не в нем, а в создаваемом параметрическом представлении (ПП). Примеры таких расширений: проектирование профилей наружных сетей водоснабжения и канализации, молниезащиты зданий и сооружений. Функции отката рассмотрим сначала для чертежа, затем для ПП его частей. Все операции разработки чертежа удается свести к двум первичным, атомарным - добавление и удаление элемента чертежа. Изменение типа линии, слоя, цвета и др. рассматриваются как удаление и последующее добавление в чертеж измененного элемента. Операции над множеством элементов (сдвиг, растяжение и др.) моделируются как множество одинаковых операций, каждая из которых выполняется над одним элементом. Вводится понятие "шаг изменения", которое включает все операции, проведенные пользователем над однократно выбранными элементами. Тем самым достигается соответствие интуитивного представления об "изменении" и количества возвращаемых за один шаг атомарных изменений - аналог транзакций в базах данных. На рис.1 каждый шаг обозначен параллелограммом, "стабильные" состояния чертежа флажками, а стрелки показывают направление изменений. Последовательность шагов при возврате изменений существенна, иначе: может потребоваться удаление элементов, которых в чертеже нет; пользователь не будет знать, какое изменение возвратится в первую очередь. Учитываются изменения чертежа в последнем сеансе работы с ним, возврат возможен до завершения сеанса. Рис.1. Модель пошаговых изменений - транзакций В рабочий файл последовательно записываются удаляемые и добавляемые геометрические элементы вместе с признаком - добавлен или удален элемент. В результате, как показано на рис.2, один шаг представляется в виде сцепленных в железнодорожный состав различных геометрических элементов, образующих как бы сумму атомарных изменений. Внутри одного шага последовательность элементов несущественна, если все элементы разные. Если же для удобства программирования приходится в один шаг включать, например, удаление и последующее восстановление одного и того же элемента, то порядок следования атомарных изменений при возврате должен быть строго обратным. Рис.2. Общая структура одного шага изменения чертежа Для возврата изменения делается проход по файлу, пока номер изменения совпадает с нужным. Для каждого из найденных элементов с этим номером изменения производится следующее: если он был удален, он добавляется в чертеж; если он был добавлен, то в чертеже ищется совпадающий с ним и удаляется из чертежа. Применяя команды "Отменить" и "Вернуть", можно как угодно долго перебирать состояния чертежа в текущем сеансе работы. ПП части чертежа есть комплекс ее свойств, или информационная модель. Видимая геометрическая часть генерируется по ПП. С точки зрения отката наиболее существенное отличие работы с ПП от работы непосредственно с чертежом заключается в интеллектуальных связях элементов друг с другом. При удалении одной трубы из ПП аксонометрической схемы трубопроводной системы автоматически удаляются все нанесенные на нее обозначения трубопроводной арматуры, элементов трубопроводов, тексты и сноски, указывающие на трубу и удаленные обозначения, выносные линии размеров. В этих условиях система отката не имеет явно очерченных границ того, что же изменяется за один шаг. Верхней границей является ПП полностью. В рамках модульной технологии разработки расширений САПР все ПП преобразуются к единой компактной форме, задаваемой адресом в памяти и длиной [7], поэтому заменяемым объектом выбрано все ПП. Это решение универсально для различных расширений САПР. При любом изменении новая версия ПП записывается в рабочий файл. Операции над множеством здесь возможны, но их не надо выражать в множестве актов удаления и добавления, каждому шагу изменений соответствует одно ПП. Отмена изменений и возврат реализуются путем перехода к предыдущей или к следующей версии ПП с полной его заменой. Ситуации соответствует рис.1 без детализации каждого шага по рис.2. Последовательность шагов изменения роли не играет, каждая записанная версия ПП дает полный комплект всех сведений для генерации изображения. Возможен скачок через несколько шагов. Автосохранение. Для борьбы с угрозой 2 применяется широко распространенный метод автоматического сохранения информации через заданный промежуток времени - автосохранение. Специфика комплексной САПР приводит к необходимости автосохранения не только чертежа, но и текущих параметрических представлений. С интервалом не менее заданного на диске автоматически создаются копии чертежа и ПП текущей задачи, предыдущая копия с диска удаляется. При нормальном завершении задачи или работы с чертежом автоматически созданные копии удаляются. В случае некорректного завершения работы (например, из-за отключения электропитания) эти копии остаются, и при следующей загрузке пользователю будет предложено восстановить чертеж и ПП задачи. Автоматическое резервное копирование. Защита от случайной подмены файла чертежа обеспечивается путем автоматического резервного копирования всех файлов, подвергшихся изменению за период с предыдущего копирования, в отдельный каталог диска с именем, определяемым датой создания резервных копий. Пользователь назначает дни недели, в которые следует проводить автоматическое резервное копирование, и при первом запуске САПР в эти дни оно осуществляется. Забота об удалении ставших ненужными резервных копий лежит на пользователе. Электронная подпись. Для сохранения и контроля целостности чертежа (борьба с угрозой 4) применяется метод электронной подписи. Он состоит в том, что при наличии хотя бы одной подписи запрещено любое изменение чертежа. Подписи защищены личными паролями. Наличие подписи на чертеже гарантирует совпадение его содержания с тем, что было в момент подписания. Снять подпись может любой пользователь, после чего чертеж можно изменять. Но при этом будет видно, что чертеж не подписан. Заключение. Описанные четыре угрозы информации и методы ее защиты в комплексной САПР реконструкции предприятий являются в значительной степени общими и для других программных средств редактирования пользовательских файлов, поскольку состав угроз определен практическими потребностями. Индивидуальные особенности реализация ЗИ продиктованы прежде всего комплексностью САПР, поддерживающей несколько информационных моделей объектов проектирования. БИБЛИОГРАФИЧЕСКИЙ СПИСОК 1. Специальные требования и рекомендации по технической защите конфиденциальной информации (СТР-К). Решение Коллегии Гостехкомиссии России № 7.2/02.03.01г. [Электронный ресурс] – Режим доступа: http://www.confidentiality.strongdisk.ru, свободный. – Загл. с экрана. – Яз. рус. 2. Беляев А.В. "Методы и средства защиты информации" (курс лекций). – ЧФ СПбГТУ, 2000. [Электронный ресурс] – Режим доступа: http://www.citforum.ru/internet/infsecure/its2000_03.shtml, свободный. – Загл. с экрана. – Яз. рус. 3. Домарев В.В. Безопасность информационных технологий. Системный подход. – Киев: ООО ТИД «Диасофт», 2004. – 992с. 4. Мигунов В.В. TechnoCAD GlassX − отечественная САПР реконструкции предприятия//САПР и графика, 2004, №№ 4, 5, 6. 5. Мигунов В.В. Особенности комплексной САПР реконструкции промышленных предприятий//Труды Международных научно-технических конференций "Интеллектуальные системы (IEEE AIS'04)" и "Интеллектуальные САПР (CAD-2004)". Научное издание в 3-х томах. – М: Из*д-во Физико-математической литературы, 2004, т.2, С.70-75. 6. Дейт, К.Дж. Введение в системы баз данных.: Пер с англ. – 6-е изд. – Киев: Диалектика, 1998. – 784с. 7. Мигунов В.В. Модульная технология разработки проблемноориентированных расширений САПР реконструкции предприятия//Известия Тульского государственного университета. Серия "Экономика. Управление. Стандартизация. Качество". – Вып. 1. – Тула: Изд-во ТулГУ, 2004. – С.56-66.
5cs.CE
AptaTRACE: Elucidating Sequence-Structure Binding Motifs by Uncovering Selection Trends in HT-SELEX Experiments Phuong Dao1,? , Jan Hoinka1,? , Yijie Wang1 , Mayumi Takahashi2 , Jiehua Zhou2 , Fabrizio Costa3 , John Rossi2 , John Burnett2 , Rolf Backofen3 , and Teresa M.Przytycka1 arXiv:1604.03081v1 [q-bio.QM] 5 Apr 2016 1 National Center of Biotechnology Information, National Library of Medicine, NIH, Bethesda MD 20894, USA [email protected] 2 Department of Molecular and Cellular Biology, Beckman Research Institute of City of Hope, CA, USA 3 Bioinformatics Group, Department of Computer Science, University of Freiburg, Georges-Kohler-Allee 106, 79110 Freiburg, Germany Abstract. Aptamers, short synthetic RNA/DNA molecules binding specific targets with high affinity and specificity, are utilized in an increasing spectrum of bio-medical applications. Aptamers are identified in vitro via the Systematic Evolution of Ligands by Exponential Enrichment (SELEX) protocol. SELEX selects binders through an iterative process that, starting from a pool of random ssDNA/RNA sequences, amplifies target-affine species through a series of selection cycles. HT-SELEX, which combines SELEX with high throughput sequencing, has recently transformed aptamer development and has opened the field to even more applications. HT-SELEX is capable of generating over half a billion data points, challenging computational scientists with the task of identifying aptamer properties such as sequence structure motifs that determine binding. While currently available motif finding approaches suggest partial solutions to this question, none possess the generality or scalability required for HT-SELEX data, and they do not take advantage of important properties of the experimental procedure. We present AptaTRACE, a novel approach for the identification of sequence-structure binding motifs in HT-SELEX derived aptamers. Our approach leverages the experimental design of the SELEX protocol and identifies sequence-structure motifs that show a signature of selection. Because of its unique approach, AptaTRACE can uncover motifs even when these are present in only a minuscule fraction of the pool. Due to these features, our method can help to reduce the number of selection cycles required to produce aptamers with the desired properties, thus reducing cost and time of this rather expensive procedure. The performance of the method on simulated and real data indicates that AptaTRACE can detect sequence-structure motifs even in highly challenging data. ? Equal contribution, these authors are listed in alphabetical order 1 Introduction Aptamers are short RNA/DNA molecules capable of binding, with high affinity and specificity, a specific target molecule via sequence and structure features that are complementary to the biochemical characteristics of the target’s surface. The utilization of aptamers in a multitude of biotechnological and medical sciences has recently dramatically increased. While only 80 aptamer related publications were added to Pubmed in the year 2000, this number has since roughly doubled every 5 years, with 207 records added in 2005 alone, 565 additional inclusions in 2010, and as many as 957 new manuscripts indexed in 2014. This astonishing trend is in part attributable to the considerable diversity of possible targets which span from small organic molecules [1], over transcription factors [2] and other proteins or protein complexes [3], to the surfaces of viruses [4] and entire cells [5]. This broad range of targets makes aptamers suitable candidates for a variety of applications ranging from molecular biosensors [6], to drug delivery systems [7], and antibody replacement [8] to just name a few. While the specifics vary depending on the target, aptamers are typically identified through the Systematic Evolution of Ligands by Exponential Enrichment (SELEX) protocol [9]. SELEX leverages the well established paradigm of in vitro selection by repetitively enriching a pool of initially random sequences (species) with those that strongly bind a target of interest. Specifically, based on the assumption that a large enough initial pool of randomized (oligo)nucleotides contains some species with favorable sequence and structure allowing for binding to the target, these binders are then selected for through a series of selection cycles. Each such cycle involves (a) incubating the pool with the target molecules, (b) partitioning target-bound species from non-binders and (c) removing the latter from the pool, followed by (d) elution of the bound fraction from the target, and (e) amplifying the remaining sequences via polymerase chain reaction (PCR) to form the input for the subsequent round. After a target-specific number of selection cycles, the final pool is then used to extract dominating, putatively high-affinity species, via traditional cloning experiments, computational analysis, and binding affinity assays. Depending on their intended application, favorable binders are often further post-processed in vitro to meet additional requirements such as improved structural stability or reducing the size of the aptamer to the relevant binding region. Another reason for the resurgence of interest in aptamer research relates to the utilization of affordable next-generation sequencing technologies along with traditional SELEX. This novel protocol, called HT-SELEX, combines Systematic Evolution of Ligands by Exponential Enrichment with high-throughput sequencing. In HT-SLELEX, after certain (or all) rounds of selection (including the initial pool), aptamer pools are split into two samples, the first of which serves as the starting point for the next cycle whereas the latter is sequenced. The resulting sequencing data, consisting of 2-50 million sequences per round, is then analyzed in silico in order to identify candidates that experience exponential enrichment throughout the selection [10,11]. The massive amount of sequencing data produced by HT-SELEX opens the opportunity for the study of many aspects of the protocol that were either not accessible in traditional SELEX or that could be realized more accurately given hundreds of millions of data points. One of the most challenging of these problems is the discovery of aptamer properties that facilitate binding to the target. However, development of universal methods for the analysis of HT-SELEX data is challenged by the vast diversity of selection conditions such as temperature, salt concentration and the number of targets in the solution to just name a few. Further, each of the stages (a-e) comprising one selection cycle can be accomplished by a variety of technologies. For instance, choosing between open PCR and droplet PCR for the amplification step has been shown to 1 have a great impact on the diversity of the amplification product [12,13,14]. Even more importantly, the complexity of the target molecule is also of great relevance. As a case in point, it has been shown that in vitro selection against transcription factors, and other molecules that are evolutionary optimized to efficiently recognize specific DNA/RNA targets, requires only a small number of rounds in order to produce high quality aptamers [15,2]. On the other side of the spectrum, in the case of CELL-SELEX, a variation of SELEX in which the pool is incubated with entire cells, the number of required selection cycles and the amount of non-specific binders that emerge during selection is significantly larger. Indeed, such a target can in general accommodate a multitude of binding sites, each exposing different binding preferences and leading to a parallel selection towards unrelated binding motifs. Current motif finding algorithms however, have not been designed with these challenges in mind and the need for the development of novel approaches that address the characteristics specific to the SELEX protocol has become highly relevant. Traditionally, motif discovery has been defined as the problem of finding a set of common sub-sequences that are statistically enriched in a given collection of DNA, RNA, or protein sequences. To date, a large variety of computational methods in this area has been published (see [16,17,18] for a comprehensive review). In one of the earlier works, Lawrence and Reilly [19] introduced an Expectation Maximization (EM) based algorithm for finding motifs from protein sequences. This approach has been consequently adopted by various other methods [20,21] including MEME [22] – one of the most widely used programs in this category. Lawrence et al. also introduced a Gibbs sampling approach for motif identification [23] which laid the grounds for other methods such as AlignACE [24], MotifSampler [25], and BioProspector [26] based on this general technique. In addition, numerous approaches have been designed based on efficient counting of all possible k-mers in a data set followed by a statistical analysis of their enrichment. Representatives for this category include Weeder [27], DREME [28], YMF [29], MDScan [30], and Amadeus [31]. Kuang et al. designed a kernel based technique around a set of similar k-mers with a small number of mismatches to extract short motifs in protein sequences [32]. Another group of algorithms that also allows for elucidation of motifs with mismatches is built on suffix tree techniques (Sagot [33], Pavesi et al. [34], and Leibovich [35]). Furthermore, regression based methods have been developed that take additional information, such as the affinity of the input sequences or the genomic regulatory contexts into account. These include, but are not limited to MatrixREDUCE [36], PREGO [37], ChIPMunk [38], and SeqGL [39]. For more information, we refer the reader to Weirauch et al. [40] for a comprehensive evaluation of many of the above techniques. Finally, a number of approaches for the identification of sequence motif in HT-SELEX data targeting transcription factors (TF-SELEX) have been published. One representative of this category is BEEML [41], which is, to our knowledge, the first computational method for finding motifs on this type of high-throughput sequencing data. Assuming the existence of a single binding motif, the method aims at fitting a binding energy model to the data which combines independent attributes from each position in the motif with higher order dependencies. Another method by Jolma et al. approaches the problem by using k-mers to construct a position weight matrix in order to infer the binding models [2,42]. Similarly, Orenstein et al. [43] also uses a k-mer approach based on frequencies from a single round of selection to identify binding motifs for transcription factor HT-SELEX data. Notably, despite of HT-SELEX’ capability of generating data from multiple rounds of selection, all currently existent methods are based on the analysis of only a single selection cycle. However, choosing the round for optimal motif elucidation is not always trivial, and while some effort has been made to address this question (see 2 for example Orenstein and Shamir [43], Jolma et al. [2]) this decision is ultimately left to the user. The search for motifs in the context of RNA sequences faces another dimension in complexity as binding of ssDNA and RNA molecules is known to be sequence and structure dependent. In particular, it has been proposed that binding regions in those molecules tend to be predominantly single stranded [44]. MEMERIS [45], for instance, leverages this assumption by weighting nucleotides according to their likelihood of being unpaired. These positional weights then guide MEME to focus the motif search on loop regions. In contrast, RNAcontext [46] divides the single stranded contexts into known secondary substructures such as hairpins, bulge loops, inner loops, and stems. Consequently, RNAcontext is capable of reporting the relative preference of the structural context along with the primary structure of the potential motif. Recently, Hoinka et al. introduced AptaMotif [47] a method to discover sequence–structure motifs from SELEX derived aptamers. This method utilizes information about the structural ensemble of aptamers obtained by enumerating of all possible structures within a user-defined energy range from the Minimum Free Energy (MFE) structure. By representing each aptamer by the set of its unique substructures (i.e. hairpins, bulge-loops, inner-loops, and multibranch loops), AptaMotif applies an iterative sampling approach combined with sequence-structure alignment techniques to identify high-scoring seeds which are consequently extended to motifs over the full data set. However, AptaMotif was designed for sequencing data obtained from traditional SELEX, under the assumption that this data predominantly consists of motif containing sequences. Subsequently, APTANI [48] extended AptaMotif to handle larger sequence collections via a set of parameter optimizations and sampling techniques, but it also expects a high ratio of motif occurrences. Still, none of the above mentioned methods address the full spectrum of challenges when analyzing data from HT-SELEX selections. First, none of these approaches, as currently implemented, scales well with the data sizes produced by modern high throughput sequencing experiments. Next, only a few of the methods consider the existence of secondary motifs while the majority operates under the assumption that only a singe primary motif is present in the data. This assumption might apply to TF-SELEX, but it cannot be generalized to common purpose HT-SELEX but where one should consider many motifs of possibly similar strength. Furthermore, secondary structure information, which has proven effective in guiding the motif search to biologically relevant binding sites, is not included in most of these methods. A notable exception is RNAContext which can handle relatively large data sets but suffers from the single motif assumption that cannot be easily removed. Finally, none of these approaches attempt to utilize the full scope of the information produced by modern HT-SELEX experiments that includes sequencing data from multiple rounds of selection. In order to close this gap, we have developed AptaTRACE, a method for the identification of sequence-structure motifs for HT-SELEX that utilizes the available data from all sequenced selection rounds, and which is robust enough to be applicable to a broad spectrum of RNA/ssDNA HT-SELEX experiments, independent of the target’s properties. Furthermore, AptaTRACE is not limited to the detection of a single motif but capable of elucidating an arbitrary number of binding sites along with their corresponding structural preferences. AptaTRACE approaches the sequence-structure motif finding problem in a novel and unique way. Unlike previous methods, it does not rely on aptamer frequency or its derivative - cycle-to-cycle enrichment. Aptamer frequency has been recently shown to be a poor predictor of aptamer affinity [10,49,50], and while cycle-to-cycle enrichment has shown a somewhat better performance, 3 the choice of the cycles to compare is not obvious and does not always allow for extraction of sequence-structure motifs. In contrast, our method builds on tracing the dynamics of the SELEX process itself to uncover motif-induced selection trends. We applied AptaTRACE to sequencing data obtained from realistically simulating SELEX over 10 rounds of selection (4 million sequences per round) with known binding motifs as well as to an in vitro cell-SELEX experiment over 9 selection cycles (40 million sequences per cycle). In both cases, our method was successful in extracting highly significant sequence-structure motifs while scaling well with the 10-fold increase in data size. 2 Results We start with a high-level outline of the method, followed by a more detailed description. Next, we use simulated data produced with a novel, extended version of our AptaSim program [51] to compare the performance of AptaTRACE to other methods that can handle similar data sizes or incorporate secondary structure into their models. Finally, we show our results of applying AptaTRACE to an in vitro selection consisting of high-throughput data from 9 rounds of cellSELEX [14]. 2.1 Top Level Description of the Algorithm Our method builds on accepted assumptions regarding the general HT-SELEX procedure. First, we assume that the affinity and specificity of aptamers are mainly attributed to a combination of localized sequence and structural features that exhibit complementary biochemical properties to a target’s binding site. Given a large number of molecules in the initial pool it is expected that such binding motifs are embedded in multiple, distinct aptamers. Consequently, during the selection process, aptamers containing these highly target-affine sequence-structure motifs will become enriched as compared to target non-specific sequences. Notably, under these assumptions, aptamers that contain only the sequence motif without the appropriate structural context are either not enriched at all or enriched to a much lower degree. The second critical assumption we make is the existence of a multitude of sequence-structure binding motifs that either compete for the same binding site, or are binding to different surface regions of the target [6]. Leveraging the above properties of the SELEX protocol, AptaTRACE detects sequencestructure motifs by identifying sequence motifs which undergo selection towards a particular secondary structure context. Specifically, we expect that in the initial pool the structural contexts of each k-mer are distributed according to a background distribution that can be determined from the data. However, for sequence motifs involved in binding, in later selection cycles, this distribution becomes biased towards the structural context favored by the binding interaction with the target site. Consequently, AptaTRACE aims at identifying sequence motifs whose tendency of residing in a hairpin, bugle loop, inner loop, multiple loop, danging end, or of being paired converges to a specific structural context throughout the selection. To achieve this, for each sequenced pool we compute the distribution of the structural contexts of all possible k-mers (all possible nucleotides sequences of length k) in all aptamers. Next, we use the relative entropy (KL-divergence) to estimate, for every k-mer, the change in the distribution of its secondary structure contexts (K-context distribution, for short) between any cycle to a later cycle. The sum of these KL-divergence scores over all pairs of selection cycles defines the context shifting score for a given k-mer. The context shifting score is thus an estimate of the selection towards the preferred structure(s). Complementing the context shifting 4 score is the K-context trace, which summarizes the dynamics of the changes in the K-context distribution over consecutive selection cycles. In order to assess the statistical significance of these context shifting scores, we additionally compute a null distribution consisting of context shifting scores derived from k-mers of all low-affinity aptamers in the selection. This background is used to determine a p-value for the structural shift for each k-mer. Predicted motifs are then constructed by aggregating overlapping k-mers under the restriction that the structural preferences in the overlapped region are consistent. Finally, Position Specific Weight Matrices (PWM), specifically their sequence logos representing these motifs, along with their motif context traces (the average k-context traces of the k-mers used in the PWM construction) are reported to the user. 2.2 Detailed Description of AptaTRACE AptaTRACE takes as input the sequencing results from all, or a subset of selection cycles from an HT-SELEX experiment and outputs a list of position specific weight matrices (PWMs) along with a visual representation of the motifs structural context shift throughout the selection. K-context and K-context Distribution. Any individual occurrence of a k-mer in an aptamer has a specific secondary structure context called K-context that depends on the structure of that particular aptamer. In what follows, let Ki be the i-th k-mer (using an arbitrary indexing of all 4k possible k-mers over the alphabet Ωs = {A, C, G, T }). In addition, let Rx be the set of unique aptamers sequenced in selection round x that have a frequency above a threshold α (this facilitates noise reduction - see computation of p-value below and Fig. 1, A). First, for every aptamer a of fixed length n in Rx , we use SFold [52] to estimate the probability for each nucleotide in a of being part of a hairpin (H), an inner loop (I), a bulge loop (B), a multi-loop (M), a dangling end (D), or being paired (P) (Fig. 1, B). Each aptamer a is hence associated with a matrix of dimension |ΩC | × n, where ΩC = {H, I, B, M, D, P }, in which rows correspond to a particular context C while each column contains the context probabilities of the corresponding nucleotide in a. Next, we define the K-context of a k-mer occurrence in aptamer a as the row-wise mean of the context probabilities over the matrix columns corresponding to the location of that k-mer in the aptamer sequence. Recall, that the main idea behind AptaTRACE is to track the changes in secondary structure preferences of k-mers over the selection cycles. Capturing these secondary structure preferences should therefor take the entirety of K-contexts from all occurrences of a k-mer in a particular selection cycle into account. Thus, we define the K-context distribution of a k-mer Ki in round x as the averaged secondary structure profile of all K-contexts of Ki over all aptamers in Rx . Formally, let Pxi (C), where C ∈ ΩC , be the average probability of the structural context C over all occurrences of the k-mer Ki in all aptamers that meet the threshold criteria in round x. Then, the K-context distribution of Ki in round x is the vector Pxi = [Pxi (H), Pxi (B), Pxi (I), Pxi (M ), Pxi (D), Pxi (P )], normalized such that all entries sum up to one. (Fig. 1 C). Analysis of the Shift of K-context Distributions during Selection. If a k-mer forms part of a sequence-structure binding motif, its K-context distribution is expected to shift towards the context C that is preferred for the binding interaction throughout the selection. In contrast, if a k-mer is not affected by selection, we expect little to no change in its context distribution over consecutive rounds. We can capture this dynamics for any k-mer Ki by its 5 Fig. 1. Schematic overview of our AptaTRACE method. (A) For each cycle, all sequences with frequency above a user defined threshold α are selected as input. (B) Computation of secondary structure probability profiles for each aptamer using SFOLD. For each nucleotide the profile describes the probability of residing in a hairpin, bugle loop, inner loop, multiple loop, danging end, or of being paired. (C) K-context and K-context distribution calculation for each k-mer. (D) Generation of the K-context trace for each k-mer. (E-G) K-mer ranking and statistical significance estimation. Given any two selection cycles the relative entropy (KL-divergence) is used to estimate the change in the distribution of its K-context distribution. The sum of these KL-divergence scores over all pairs of selection cycles defines the context shifting score for a given k-mer. In order to assess the statistical significance of these context shifting scores, a null distribution is computed consisting of context shifting scores derived from k-mers of all low-affinity aptamers in the selection (frequency ≤ α). This background is used to determine a p-value for the structural shift for each k-mer. Top scoring k-mers are selected as seeds. (H) Predicted motifs are constructed by aggregating k-mers overlapping with the seed under the restriction that the structural preferences in the overlapped region are consistent. (I) Position Specific Weight Matrices representing these motifs, along with their K-context traces are reported to the user. 6 so called K-context trace Ki = [P0i , P1i , . . . , Pm i ], defined as a vector tracking the K-context distribution over all m selection cycles (Fig 1 D). Our method consequently quantifies such shifts in the K-context distribution using the Kullback–Leibler divergence (relative entropy) – a measure for the difference between two probability distributions. Here, for any k-mer Ki the first distribution corresponds to the K-context distribution Pxi of an earlier round x and the second to the K-context distribution Pyi of a later selection cycle y. The KL-divergence between two appropriately chosen selection cycles might suffice, at least for some scenarios such as TF-SELEX, to capture the shifts in K-context distributions. In practice however, for larger and more complex targets the selection landscape tends to be more complicated with various aptamers achieving peak enrichment at different selection cycles. Thus makes it rather difficult to confidently chose such two presumably most informative cycles while ignoring remaining information. Therefore we compute the cumulative KL-divergence between all pairs of sequenced pools. In summary, we define the context shifting score score(ki ) for k-mer Ki as score(Ki ) = m−1 X m X DKL (Pyi kPxi ) x=1 y=x+1 = m−1 X m X  X  x=1 y=x+1 C∈ΩC  y P (C)  Pyi (C) × log xi Pi (C) where DKL (P kQ) is the Kullback–Leibler divergence between two discrete distributions P and Q. To ensure statistical accuracy, the context shifting scores are only calculated for all k-mers with a count of at least β individual occurrences in each pool (here, β = 100). Significance Estimation and p-value Computation. While the context shifting score establishes a ranking of the k-mers in order of their overall change in secondary structure context, it does not provide any information over the statistical significance of that shift, i.e. it cannot distinguish between changes in response to the true selection pressure and changes associated with background noise such as non-binding species. These background species however are expected to occur in very low numbers throughout the selection. We leverage this property by using the context shifting scores of the k-mers from these low-count aptamers to construct a null distribution that is used to identify the significant context shifting scores for the full data set. In detail, we include all k-mer occurrences from aptamers that are not included in the previous generation of the context profiles, i.e. all aptamers below or equal to the user defined threshold α. We note that the resulting null follows a log-normal distribution in our in vitro experiment as well as for the simulation data presented in this study (see Section 2.4). The above described procedure hence allows for the computation of a p-value for each Kcontext trace and we only retain those K-context traces with p-value below a user specifiable threshold (the default value is 0.01) (Fig.1 E-G). Elucidating Sequence-Structure Motifs and Sequence Logos. In the last step, AptaTRACE proceeds to extract the final motifs by clustering similar and overlapping k-mers with correlating, statistically significant structural shifts together (Fig 1 H). This allows to uncover sequence-structure motifs that might extend over the chosen k-mer size and to build PWMs that summarize the motifs. Motif construction is accomplished iteratively. Until all k-mers have 7 Table 1. Sequence-structure motifs identified by AptaTRACE from virtual SELEX given all 10 selection cycles including the initial pool as input. AptaTRACE was able to recover all 5 motifs. Shown here are the identified sequence logos, the k-mer that scored highest in significance used for construction of each motif (seed) and its p-value, the abundance of the motif in the final selection round (Frequency), the first cycle at which the motif was detected (C ∗ ), as well as the motif context trace throughout the selection from the initial pool to round 10. Sequence Logos Logo Seed Seed p-Value Frequency C∗ Motif Context Trace 0 1 2 3 4 5 6 7 8 9 10 TCGG GTGTACTA GTTAA GGAGCG GGAACTC AG G CC T TA AGTCGG 4.37E-36 24% 5 CC AT TA A D D D D D D D D D D D GTGTAC 1.91E-32 17.3% 5 CG G AA T G C T G B B B B M B M M M M M TGGTTA 2.19E-23 4.6% 9 D D D D D D D D D D D GGAGCG 2.83E-25 3.6% 8 T A G T M M M M M M M M M M M D D D D D GGAACT 1.12E-27 1.9% T C 10 D D D PPPPPPPPHHH HHHHHHHHPP P I I I I I I I I I I I M M M M M M M M M M M A C A PPPPPPPPPPP HHHHHHHHHHH I I I I I I I I I I I B B B B B B B B B B B GT A G TG HHH M M M M M M M M M M M B B B B B B B B B B B A AA PPPPPPPPPP P HHHHHHHH I I I I I I I I I I I C CC T D D D D D D D D D D D T A HHHHHH P I I I I I I I I I I I B B B B B B M M M M M C A H M M M M M M M M M M M B B B B B B B B B B B C TG T C A G C P PPPPPPPPPP HH HHHH PPPPPPP HPPP HHHHHHHH I I I I I I I I I I I B D D D B B B B B B B D D D B B B D D D D D been assigned to a cluster, the most significant k-mer is first selected as seed, and all similar and highly overlapping k-mers with a p-value below the defined threshold and with comparable structural context are aggregated to the cluster. The details of this relatively straightforward procedure are described in the Supplemenary Materials and Methods section B. In a last step, the resulting motifs are reported to the user via their PWMs, sequence logos and their motif context traces, defined as the averaged K-context traces of those k-mers constituting the PWM. The set of aptamer candidates that satisfy both, the primary and secondary structure properties of the motifs, sorted by their statistical significance or frequency of occurrence is also included in the output (Fig. 1 I). 2.3 Results on Simulated Data To test our new approach, we applied AptaTRACE to a data set generated by means of in-silico SELEX as no benchmarking set that could be used as a gold standard is currently available. To this end, we used an extension to our AptaSim program [51] designed to realistically simulate target-specific selection including, among other factors, species affinity, polymerase amplification and polymerase errors, and the effects of sampling from the selection pools for sequencing. Our current extension additionally allows for implanting sequence-structure motifs with well defined properties. We generated a data set of 4 million sequences per round containing 5 motifs (denoted here as motifs (a)-(e)), 5-8 nucleotides in length located predominantly in unpaired regions. Note that the motif sequence also occurs randomly in the background sequences, albeit in arbitrary structural contexts, and is hence not over-represented in the initial pool.Each motif was initially present in 100 different target-affine aptamer species and consequently selected for over 10 rounds of SELEX. A complete description of the simulation as well as the parameters used during in silico SELEX are available in Supplementary Material and Methods Sections A and E, respectively. We applied AptaTRACE, as well as DREME and RNAcontext to the data set to compare their capability of extracting these motifs. Since DREME and RNAcontext can only be applied to one selection round at a time, we provided these two approaches with data from the last selection 8 cycle alone, choosing the initial pool as background when required. AptaTRACE was applied to both, the reduced data set, as well as to all selection cycles. Notably, neither DREME nor RNAcontext are capable of handling 4 million sequences in a reasonable time frame, prompting us to sample 10% of aptamers from the last and the unselected round as the input for DREME, and the 10000 most frequent and least frequent sequences of the last selection cycle for RNAcontext. The full scope of parameters used for these methods during the comparison are detailed in Supplementary Material and Methods E. Since RNAcontext’s model assumes a single motif in the data, a direct comparison would not be fair for that software. Nonetheless, we examined the possibility of the method of identifying at least one binding site due to the large abundance of implanted motif (a) in the final selection round, however without success. Tab. 2 summarizes the results of AptaTRACE when applied to the full dataset, as well as the to last selection cycle only, compared to DREMEs performance. While DREME failed to identify the low-affinity motif (e) as well as the shorter but more targetaffine motif (c), AptaTRACE was able to recover all motifs in both test scenarios. A more detailed summary of the sequence logos extracted by our approach on the full data set, including their motif context traces and statistical significance, is available in Tab. 1. Interestingly, a visual inspection of the motif context trace (last column, Tab. 1) points to the possibility of capturing most of these motifs at earlier cycles. Indeed, computing the selection round in which a motif was first detected by AptaTRACE (column C ∗ , Tab.1), confirmed this expectation. Table 2. Comparison of AptaTRACE against other methods based on simulated data. AptaTRACE was applied to the entire dataset as well as to the last selection cycle only. While our method successfully identified all implanted motifs, DREME was only able of extracting 3 out of 5. We show the implanted motifs, their binding affinity used throughout the selection (B.A.) in the first two columns. The output PWMs produced by the tested methods that correspond to the implanted motifs are displayed in the remaining columns. (a) Motif B.A. GTGTACTA 75% AptaTRACE (all cycles) TCGG GTGTACTA TATGTC TAGGGC GGAGCG AG G CC T TA (b) AGTCGG 70% CC AT TA C TG CG G AA T T C A G C A (c) GTTAA 60% T (d) (e) GGAACTC GGAGCG 55% 50% A C T A 2.4 AptaTRACE (last cycle) DREME (last cycle) GTGTACTA GTGTACTA AGTCGG T C A G C A GC G TCG AA T C TCGG GTTAA G AACT GGAGCG AG G T CC TA CC AT TA G C T G C T A G T C T C T A AC T C A A G G G AA C T TA GGAACTC G A T T A AGC Results on Cell-SELEX Data Next, we applied AptaTRACE to the results of an in-vitro HT-SELEX experiment where the initial pool as well as 7 of 9 selection rounds have been sequenced, averaging 40 million aptamers per cycle (see Section C for a detailed description of the experimental procedure). We did not challenge DREME with this task, since this data set is 10-fold larger in size compared to the simulated selection, and even in the latter case DREME managed to only handle 10% of the data. AptaTRACE was able to successfully extract a total of 25 motifs, the five most frequent of which are shown in Tab. 3, and a full list is given in Supplementary Tab. 4. 9 Table 3. Five most frequent sequence-structure motifs as produced by AptaTRACE on CELL-SELEX data. The sequence logo as well as the most frequent k-mer constituting the logo (Logo Seed) and its p-value are depicted for each motif. The motif context trace for the sequenced cycles (0,1,3,5,6,7,8,9) is shown in the last column. Sequence Logo Logo Seed Seed p-Value Frequency Motif Context Trace 0 TGTGC TTATT GTTT A ATGTT GTGTCC C G CTGTG 5.31E-03 32.98 % G C T A T TTATT 7.16E-03 25.14 % G G C T C T MMMMM PPP HPPPPP HH MH H H I H H I I I I I I I M D D D D D D GTTTA 9.71E-03 16.77 % MMMPM PPP HPPPMP HH MH H H H H I I I I I I I I M M B B B B B B B B D D D D ATGTT 3.66E-03 15.27 % D D D D PPPPPPPP HHHMMMMM I H H H I H H I I M I I I I M M B B B B B B B B D D D D D D D GTGTC 6.61E-03 13.95 % G A HH M G A HHHHH PPP HPPPPP D D CA C 9 B B B B B B B B A T A CT 8 M M M AA G 7 B B B B B A A 6 M M M M M C CA C 5 B B I I I I B I GC A 3 I I I T A G G C 1 PPPPPPPP B B B I B B I H I B I I I I H M M M M I M B B H H H H H M H M M The context trace of these motifs hints towards two properties of the selection process. First, a clear selection towards single stranded regions for every extracted motif can be observed. It has always been stipulated that ssDNA/RNA binding motifs are most likely located in loop regions [44]. Indeed, this assumption was leveraged by MEMERIS, by imposing structural priors directing the motif search towards single stranded regions. In the case of AptaTRACE, no prior assumption of this type was made. The fact that despite a lack of such priors, motifs detected by AptaTRACE conform with the expected properties of RNA sequence-structure binding sites support their relevance for binding. Next, the trend of the structural preferences of these motifs emerges relatively early during the selection process indicating that, in conjunction with our method, the identification of biologically relevant binding sites in general purpose HT-SELEX data might be possible with fewer selection cycles. 3 Conclusion Aptamers have a broad spectrum of applications and are increasingly being used to develop new therapeutics and diagnostics. HT-SELEX, in contrast to the traditional protocol, provides data for a global analysis of the selection properties and for simultaneous discovery of an large number of candidates. This extensive amount of information has utility only in conjunction with suitable computational methods to analyze the data. Unlike in traditional SELEX, where only a handful of potential binders are retrieved and exhaustively tested experimentally, HT-SELEX returns a massive amount of sequencing data sampled from some, or all, selection rounds. This data consequently serves as the basis for the challenging task of identifying suitable binding candidates and for deriving their sequencestructure properties that are key for binding affinity and specificity. Except for the special case of TF binding aptamers, no previous tool addressing this task existed. The realization that a naive relationship between aptamer frequency and their binding affinity is not universally valid, further complicates this task. Several potential factors during any stage of the selection contribute to this complexity, including polymerase amplification biases, sequencing biases, contamination of foreign sequences, and non-specific binding. These factors prompted aptamer experts to consider cycle-to-cycle enrichment instead of frequency counts as a predictor for binding affinity. While cycle-to-cycle enrichment did increase the predictive power of these methods, it cannot bypass 10 problems related to amplification bias nor can it identify aptamer properties that drive binding affinity and specificity. In contrast, AptaTRACE is specifically designed to identify sequence-structure binding motifs in HT-SELEX data and thus to predict the features behind binding affinity and specificity. Importantly, rather than using quantitative information, it directly leverages the experimental design of the SELEX protocol and identifies motifs that are under selection through appropriately designed scoring functions. By focusing on local motifs that are selected for, AptaTRACE bypasses global biases such as the PCR bias which is typically related to more universal sequence properties such as the CG content. In addition, because AptaTRACE measures selection towards a given sequence-structure motif by the shift in the distribution of the structural context and not based on abundance, it can uncover statistically significant motifs that are selected for even when these only form a small fraction of the pool. This is an important property that can ultimately help to shorten the number of cycles needed for selection and thus to reduce the overall cost of the procedure. In testing on simulated data, AptaTRACE outperformed other methods, in part because these methods models were not specifically designed to handle these sort of sequences. Furthermore, no competitors exist that could be tested on in vitro data as none of the current programs scale to the amount of data points produced by HT-SELEX. While we currently have no gold standard for experimental data to measure the quality of the identified motifs, it is reassuring that the motifs converge structurally to loop regions, consistent with the accepted view where such binding sites reside. Sequence logos provide a convenient visualization of the selected motifs. For TF-binding, information used to derive these logos can be used to estimate binding energy [53,54]. However, for general HT-SELEX this connection is less immediate as one has to take into account the energy contribution from the structure component [55]. Perhaps even more importantly, aptamers binding to large cell surfaces are likely to be exposed to more binding opportunities than aptamers binding to single receptors and thus the number of resulting motifs can be expressed as a function of interaction probability and binding affinity. We hypothesize that the here presented K-context trace will be helpful in untangling some of these contributions. Finally, analysis of the K-context trace indicates that the selection signal can be identified at very early cycles. This suggests that, with deep enough sequencing, only a limited number of selection cycles might be required. Yet, this analysis also shows that the dynamics of Kcontext traces is not the same for all sequence-structure motifs. While most trends essentially stabilize at a relatively early cycle, some continue to grow. We hypothesize that this type of information can aid the identification of the most promising binders. Note that while we defined the K-context shifting score on all pairs of sequenced selection pools, it can also be used to focus the analysis to any part of the selection as long as it includes at least two cycles and hence to center on additional details of the selection dynamics. Other variants of the K-context shifting score (e.g. always using the initial pool as background/reference in the summation) can also prove informative, however full elucidation of this dynamic will require concerted computational and experimental effort. AptaTRACE is not only a powerful method to detect emerging sequence-structure motifs but also, a flexible tool to interrogate such selection dynamics. 11 References 1. Y. S. Kim and M. B. Gu. Advances in Aptamer Screening and Small Molecule Aptasensors. Advances in biochemical engineering/biotechnology, Jul 2013. PMID: 23851587. 2. A. Jolma, T. Kivioja, J. Toivonen, L. Cheng, G. Wei, M. Enge, M. Taipale, J. M. Vaquerizas, J. Yan, M. J. Sillanpaa, M. Bonke, K. Palin, S. Talukder, T. R. Hughes, N. M. Luscombe, E. Ukkonen, and J. Taipale. Multiplexed massively parallel SELEX for characterization of human transcription factor binding specificities. Genome Res., 20(6):861–873, Jun 2010. 3. A. Berezhnoy, C. A. Stewart, 2nd Mcnamara, J. O., William Thiel, Paloma Giangrande, Giorgio Trinchieri, and Eli Gilboa. Isolation and optimization of murine IL-10 receptor blocking oligonucleotide aptamers using high-throughput sequencing. Molecular therapy: the journal of the American Society of Gene Therapy, 20(6):1242–1250, Jun 2012. PMID: 22434135. 4. J. M. Binning, T. Wang, P. Luthra, R. S. Shabman, D. M. Borek, G. Liu, W. Xu, D. W. Leung, C. F. Basler, and G. K. Amarasinghe. Development of RNA aptamers targeting Ebola virus VP35. Biochemistry, Sep 2013. PMID: 24067086. 5. H. Shi, W. Cui, X. He, Q. Guo, K. Wang, X. Ye, and J. Tang. Whole Cell-SELEX Aptamers for Highly Specific Fluorescence Molecular Imaging of Carcinomas In Vivo. PloS one, 8(8):e70476, 2013. PMID: 23950940. 6. R. Zichel, W. Chearwae, G. S. Pandey, B. Golding, and Z. E. Sauna. Aptamers as a sensitive tool to detect subtle modifications in therapeutic proteins. PloS one, 7(2):e31948, 2012. PMID: 22384109. 7. R. K. Upadhyay. Nucleic Acid Aptamer-Guided Cancer Therapeutics and Diagnostics: the Next Generation of Cancer Medicine. Theranostics, 5(1):32–42, Jan 2015. 8. Macugen. Fda approves new drug treatment for age-related macular degeneration. 9. A. D. Ellington and J. W. Szostak. In vitro selection of RNA molecules that bind specific ligands. Nature, 346(6287):818–822, Aug 1990. PMID: 1697402. 10. J. Hoinka, A. Berezhnoy, Z.E. Sauna, E. Gilboa, and T.M. Przytycka. AptaCluster - A Method to Cluster HT-SELEX Aptamer Pools and Lessons from its Application. Res Comput Mol Biol., 8394(1):115–128, Jan 2014. 11. K. K. Alam, J. L. Chang, and D. H. Burke. FASTAptamer: A Bioinformatic Toolkit for High-throughput Sequence Analysis of Combinatorial Selections. Mol Ther Nucleic Acids, e230, Mar 2015. 12. M. U. Musheev and S. N. Krylov. Selection of aptamers by systematic evolution of ligands by exponential enrichment: addressing the polymerase chain reaction issue. Anal Chim Acta., 564(1):91–96, Mar 2005. 13. R. Yufa, S. M. Krylova, C. Bruce, E. A. Bagg, C. J. Schofield, and S. N. Krylov. Emulsion PCR significantly improves nonequilibrium capillary electrophoresis of equilibrium mixtures-based aptamer selection: allowing for efficient and rapid selection of aptamer to unmodified ABH2 protein. Anal Chem., 87(2):1441–1449, Jan 2005. 14. M. Takahashi, J. Zhou, J. J. Rossi, and J. C. Burnett. A Comparative Study for Aptamer Selection and PCR Bias Using Droplet Digital PCR versus Open PCR. Manuscript in Preparation, Oct. 15. G. V. Kupakuwana, 2nd Crill, J. E., M. P. McPike, and P. N. Borer. Acyclic identification of aptamers for human alpha-thrombin using over-represented libraries and deep sequencing. PloS one, 6(5):e19395, 2011. PMID: 21625587. 16. M. Tompa, N. Li, T. L. Bailey, G. M. Church, B. De Moor, E. Eskin, A. V. Favorov, M. C. Frith, Y. Fu, W. J. Kent, V. J. Makeev, A. A. Mironov, W. S. Noble, G. Pavesi, G. Pesole, M. Regnier, N. Simonis, S. Sinha, G. Thijs, J. van Helden, M. Vandenbogaert, Z. Weng, C. Workman, C. Ye, and Z. Zhu. Assessing computational tools for the discovery of transcription factor binding sites. Nat. Biotechnol., 23(1):137–144, Jan 2005. 17. M. K. Das and H. K. Dai. A survey of DNA motif finding algorithms. BMC Bioinformatics, 8 Suppl 7:S21, 2007. 18. F. Zambelli, G. Pesole, and G. Pavesi. Motif discovery and transcription factor binding sites before and after the next-generation sequencing era. Brief. Bioinformatics, 14(2):225–237, Mar 2013. 19. C. E. Lawrence and A. A. Reilly. An expectation maximization (EM) algorithm for the identification and characterization of common sites in unaligned biopolymer sequences. Proteins, 7(1):41–51, 1990. 20. S. Sinha, M. Blanchette, and M. Tompa. PhyME: a probabilistic algorithm for finding motifs in sets of orthologous sequences. BMC Bioinformatics, 5:170, Oct 2004. 21. J. E. Reid and L. Wernisch. STEME: efficient EM to find motifs in large data sets. Nucleic Acids Res., 39(18):e126, Oct 2011. 22. T. L. Bailey and C. Elkan. Unsupervised learning of multiple motifs in biopolymers using expectation maximization. Machine Learning, 21:51, 1995. 12 23. C. E. Lawrence, S. F. Altschul, M. S. Boguski, J. S. Liu, A. F. Neuwald, and J. C. Wootton. Detecting subtle sequence signals: a Gibbs sampling strategy for multiple alignment. Science, 262(5131):208–214, Oct 1993. 24. F. P. Roth, J. D. Hughes, P. W. Estep, and G. M. Church. Finding DNA regulatory motifs within unaligned noncoding sequences clustered by whole-genome mRNA quantitation. Nat. Biotechnol., 16(10):939–945, Oct 1998. 25. G Thijs, K Marchal, Lescotm M, S Rombauts, B. De Moor, Rouzé. P., and Y. Moreau. A gibbs sampling method to detect overrepresented motifs in the upstream regions of coexpressed genes. Journal of Computational Biology, 9(2), 2002. 26. X. Liu, D. L. Brutlag, and J. S. Liu. BioProspector: discovering conserved DNA motifs in upstream regulatory regions of co-expressed genes. Pac Symp Biocomput, pages 127–138, 2001. 27. G. Pavesi, P. Mereghetti, G. Mauri, and G. Pesole. Weeder Web: discovery of transcription factor binding sites in a set of sequences from co-regulated genes. Nucleic Acids Res., 32(Web Server issue):199–203, Jul 2004. 28. T. L. Bailey. DREME: motif discovery in transcription factor ChIP-seq data. Bioinformatics, 27(12):1653– 1659, Jun 2011. 29. S. Sinha and M. Tompa. Discovery of novel transcription factor binding sites by statistical overrepresentation. Nucleic Acids Res., 30(24):5549–5560, Dec 2002. 30. X. S. Liu, D. L. Brutlag, and J. S. Liu. An algorithm for finding protein-DNA binding sites with applications to chromatin-immunoprecipitation microarray experiments. Nat. Biotechnol., 20(8):835–839, Aug 2002. 31. C. Linhart, Y. Halperin, and R. Shamir. Transcription factor and microRNA motif discovery: the Amadeus platform and a compendium of metazoan target sets. Genome Res., 18(7):1180–1189, Jul 2008. 32. R. Kuang, E. Ie, K. Wang, K. Wang, M. Siddiqi, Y. Freund, and C. Leslie. Profile-based string kernels for remote homology detection and motif extraction. J Bioinform Comput Biol, 3(3):527–550, Jun 2005. 33. M.F. Sagot. Spelling approximate repeated or common motifs using a suffix tree. In LATIN: Latin American Symposium on Theoretical Informatics, 1998. 34. G. Pavesi, G. Mauri, and G. Pesole. An algorithm for finding signals of unknown length in DNA sequences. Bioinformatics, 17 Suppl 1:S207–214, 2001. 35. L. Leibovich, I. Paz, Z. Yakhini, and Y. Mandel-Gutfreund. DRIMust: a web server for discovering rank imbalanced motifs using suffix trees. Nucleic Acids Res., 41(Web Server issue):W174–179, Jul 2013. 36. B. C. Foat, A. V. Morozov, and H. J. Bussemaker. Statistical mechanical modeling of genome-wide transcription factor occupancy data by MatrixREDUCE. Bioinformatics, 22(14):e141–149, Jul 2006. 37. A. Tanay. Extensive low-affinity transcriptional interactions in the yeast genome. Genome Res., 16(8):962– 972, Aug 2006. 38. I. V. Kulakovskiy, V. A. Boeva, A. V. Favorov, and V. J. Makeev. Deep and wide digging for binding motifs in ChIP-Seq data. Bioinformatics, 26(20):2622–2623, Oct 2010. 39. M. Setty and C. S. Leslie. SeqGL Identifies Context-Dependent Binding Signals in Genome-Wide Regulatory Element Maps. PLoS Comput. Biol., 11(5):e1004271, May 2015. 40. M. T. Weirauch, A. Cote, R. Norel, M. Annala, Y. Zhao, T. R. Riley, J. Saez-Rodriguez, T. Cokelaer, A. Vedenko, S. Talukder, H. J. Bussemaker, Q. D. Morris, M. L. Bulyk, G. Stolovitzky, T. R. Hughes, P. Agius, A. Arvey, P. Bucher, C. G. Callan, C. W. Chang, C. Y. Chen, Y. S. Chen, Y. W. Chu, J. Grau, I. Grosse, V. Jagannathan, J. Keilwagen, S. M. Kie?basa, J. B. Kinney, H. Klein, M. B. Kursa, H. Lahdesmaki, K. Laurila, C. Lei, C. Leslie, C. Linhart, A. Murugan, A. My?ickova, W. S. Noble, M. Nykter, Y. Orenstein, S. Posch, J. Ruan, W. R. Rudnicki, C. D. Schmid, R. Shamir, W. K. Sung, M. Vingron, and Z. Zhang. Evaluation of methods for modeling transcription factor sequence specificity. Nat. Biotechnol., 31(2):126– 134, Feb 2013. 41. Y. Zhao, D. Granas, and G. D. Stormo. Inferring binding energies from selected binding sites. PLoS Comput. Biol., 5(12):e1000590, Dec 2009. 42. A. Jolma, J. Yan, T. Whitington, J. Toivonen, K. R. Nitta, P. Rastas, E. Morgunova, M. Enge, M. Taipale, G. Wei, K. Palin, J. M. Vaquerizas, R. Vincentelli, N. M. Luscombe, T. R. Hughes, P. Lemaire, E. Ukkonen, T. Kivioja, and J. Taipale. DNA-binding specificities of human transcription factors. Cell, 152(1-2):327–339, Jan 2013. 43. Y. Orenstein and R. Shamir. Hts-ibis: fast and accurate inference of binding site motifs from ht-selex data. bioRxiv, 2015. 44. C. Schudoma, P. May, V. Nikiforova, and D. Walther. Sequence-structure relationships in RNA loops: establishing the basis for loop homology modeling. Nucleic Acids Res., 38(3):970–980, Nov 2009. 45. M. Hiller, R. Pudimat, A. Busch, and R. Backofen. Using RNA secondary structures to guide sequence motif finding towards single-stranded regions. Nucleic Acids Res., 34(17):e117, 2006. 13 46. H. Kazan, D. Ray, E. T. Chan, T. A. Hughes, and Morris Q. RNAcontext: A New Method for Learning the Sequence and Structure Binding Preferences of RNA-Binding Proteins. PLOS CB, 2010. 47. J. Hoinka, E. Zotenko, A. Friedman, Z. E. Sauna, and T. M. Przytycka. Identification of sequence-structure RNA binding motifs for SELEX-derived aptamers. Bioinformatics, 28(12):i215–223, Jun 2012. 48. J. Caroli, C. Taccioli, A. De La Fuente, P. Serafini, and S. Bicciato. APTANI: a computational tool to select aptamers through sequence-structure motif analysis of HT-SELEX data. Bioinformatics, Sep 2015. 49. M. Cho, Y. Xiao, J. Nie, R. Stewart, Csordas A. T., Oh S. S., J. A. Thomson, and H. T. Soh. Quantitative selection of DNA aptamers through microfluidic selection and high-throughput sequencing. Proceedings of the National Academy of Sciences, 107:15373–15378, Jul 2010. 50. W. H. Thiel, T. Bair, A. S. Peek, X. Liu, J. Dassie, K. R. Stockdale, M. A. Behlke, F. J. Miller Jr, and P. H. Giangrande. Rapid Identification of Cell-Specific, Internalizing RNA Aptamers with Bioinformatics Analyses of a Cell-Based Aptamer Selection. PLOS one, Sep 2012. 51. J. Hoinka, A. Berezhnoy, P. Dao, Z. E. Sauna, E. Gilboa, and T. M. Przytycka. Large scale analysis of the mutational landscape in HT-SELEX improves aptamer discovery. Nucleic Acids Res, 43(12):5699–5707, Jul 2015. 52. Y. Ding and C. E. Lawrence. Statistical prediction of single-stranded regions in RNA secondary structure and application to predicting effective antisense target sites and beyond. Nucleic Acids Res., 29(5):1034–1046, Mar 2001. 53. P. V. Benos, A. S. Lapedes, and Stormo G. D. Probabilistic code for DNA recognition by proteins of the EGR family. J Mol Biol., 323(4):701–727, Nov 2002. 54. P. V. Benos, M. L. Bulyk, and G. D. Stormo. Additivity in protein-DNA interactions: how good an approximation is it? Nucleic Acids Res., 30(20):4442–4451, Oct 2002. 55. T. M. Przytycka and D. Levens. Shapely DNA attracts the right partner. Proc Natl Acad Sci U S A., 112(15):4516–4517, Apr 2015. 14 Supplementary Material And Methods A SELEX Simulation Details In order to create data sets with properties comparable to in-vitro HT-SELEX experiments, we designed a simulation scheme capable of mimicking target-specific selection, error-prone amplification, as well as the stochastic nature of partitioning each cycle into sequencing set and selection set. Furthermore, our simulation allows for the introduction of an arbitrary number of sequence-structure motifs of different sizes and affinities, and provides control over the binding strength of background sequences. The simulation builds on our AptaSIM software [51] and extends it to take secondary structure into account. For each aptamer a, we use |a|, to denote its frequency and abind to denote its biding affinity. For a user-defined pool size, a set of aptamers containing sequence-structure motifs of desired length is first produced using a second order hidden Markov model (HMM) trained with sequences from an in vitro HT-SELEX experiment. To this end, we generate a sequence from the HMM, predict its secondary structure and identify all single-stranded regions larger or equal to the motif size. Next, we substitute the nucleotides in one of these unpaired regions with the motif and verify, using SFold, that the secondary structure profile of the motif region is predominantly single stranded. If the average probability of any of the single stranded secondary structure contexts in the motif region falls below 60%, we discard this sequence, and otherwise add it to the pool. This procedure is repeated as many times as required to create the desired number of sequences containing the motifs. The remaining aptamers are sampled directly from the training data in order to ensure realistic secondary structure properties that sequences generated from the HMM might not necessarily possess. Using this set of sequences as input, we perform a weighted sampling without replacement according to the aptamers count and affinity. I.e., until the desired sample size is reached, we compute a weight w(a) for each aptamer a as |a| ∗ abind , a∈Rx |a| ∗ abind w(a) = P (1) sample a sequence according to this distribution and adjust the weights to account for the removed aptamer. The resulting pool is then amplified by means of virtual PCR in which the amplification efficiency of the polymerase, as well as the mutation rate is adjustable. In order to simulate the sampling effect, we inject a user-defined percentage of singleton aptamers with low affinity, sampled from the training data, into the pool, and reduce the pool size to its original size by weighted sampling without replacement where the weights are generated according to the aptamer counts. After each cycle, the pool is stored in fastq format and used as input for our AptaTRACE algorithm. B Generating Motif Logos and Choosing k A k-mer does not necessarily cover the motif completely. In addition, aptamers can contain slightly modified sequences in the same structural context. Such motif variants can arise in15 dependently or as a result of polymerase errors during the amplification stages of the SELEX protocol. Therefor, our method clusters these elements in an iterative manner. First, k-mers with significant context shift scores are sorted in decreasing order according to their k-mer frequencies in the last selection cycle. We then select the top k-mer as a cluster seed, iterate through each of the remaining k-mers, and use the following decision scheme to choose whether or not to include the k-mer into to the cluster. Fully overlapping k-mers must have at most one mismatch with the seed. For partially overlapping k-mers and k ≤ 6, the longest common substring (LCS) with the seed must be at least 4 nucleotides in length, while the LCS is required to be at least 5 for k ≥ 7. Furthermore, their K-context trace must also satisfy similar structural shifts that correlate with the seed to be included in the cluster. To examine the similarities of the context shifts, for each Ki , we identify the specific structural context C 0 that changes the most over the selection rounds: m−1 m X X 0 C = arg max f (C) = Pyi (C) − Pxi (C) C If C0 x=1 y=x+1 coincides with the dominant context of the seed, we include the K-context to the cluster. The number of clusters that results from this approach can also serve as a measure for an appropriate choice of the k-mer size for a particular data set. By choosing k such that it maximizes the number of the resulting clusters we ensure to capture all non-overlapping motifs in the pool. C CELL-SELEX Experimental Details Cell-based SELEX was performed using an RNA library containing a randomized 30-nt region flanked by fixed primer sequences. Cell-based selection was performed as previously described [1], by employing open PCR for DNA amplification during each selection round. Positive selection was performed on Hela cells transduced with a bicistronic lentiviral vector expressing the target surface receptor and GFP, while unmodified Hela cells, which lack expression of the target receptor, were used for negative selection. High throughput sequencing (HTS) was performed on the positive selection at rounds 0, 1, 3, 5, 6, 7, 8, and 9. Significant molecular enrichment of receptor-specific aptamers was observed after five rounds of selection. D AptaTRACE Results on in vitro Data Table 4: Full set of the sequence-structure motifs as produced by AptaTRACE on CELL-SELEX data. The sequence logo as well as the most frequent k-mer constituting the logo (Logo Seed) and its p-value are depicted for each motif. The K-context trace for the sequenced cycles (0,1,3,5,6,7,8,9) is shown in the last column. Sequence Logo Logo Seed Seed p-Value Frequency Motif Context Trace 0 TGTGC TTATT C G T A A 5.31E-03 32.98 % G 3 5 6 7 8 9 HHHHH PPP HPPPPP HH I I I T A T G C CTGTG G C 1 B B I I I I B I M M M M M M M M B B B B B TTATT 7.16E-03 25.14 % GC C CA A MMMMM PPP HPPPPP HH MH H H I H H I I I I I I I M M B B B B B B B B D D D D D D D D 16 T T TA ATGTT G A C GTTTA 9.71E-03 16.77 % A T A G ATGTT 3.66E-03 15.27 % D D D D PPPPPPP P HHHMMMMM I H H H I H H I I M I I I I M M CA C D D D G G HH B B B B B B B B D C CT MMMPM PPP HPPPMP MH H H H H I I I I I I I I M M AA G B B B B B B B B D D D D D D D TGTCC G T A G GTGTC 6.61E-03 13.95 % T C A PPPPPPPP B B B I B B I H I B I I I I H M M M M I M B B H H H H H M H M M AATTG TGGCC C GCTGC TAATGT ATTAA TGCGCC C GC T A AATAT CTTTG TGGTGC GTAAA GCGTG T TAAGT ATAA GTTAG ATAGT A AATTG 3.10E-03 12.76 % A G T CTGGC 2.46E-03 12.55 % A T T T G I TG A CAA G G CGCTG 7.07E-03 11.30 % A A G TAATG 5.70E-04 10.12 % ATTAA 2.64E-03 10.11 % T I I TGCGC 3.25E-04 9.73 % CTGCA 1.49E-03 7.61 % AATAT 1.90E-03 7.21 % T C C A C G C T G A I I I CTTTG 8.74E-03 6.59 % T G C PPPPPP PP HHMMMM H MH I H I H H H I I I I M M M I I B D B B B D D B D D D D B B B D TGGTG 4.65E-03 5.22 % HHHHH PPPP PPPP HH H I I I I I I I I M B M B B B B B B M B M M M M M GTAAA 2.85E-03 4.79 % MMMMM PPPP PPP HHH P I H H HHH I I I I I M M M I I B B B B B B B D D D D D D GCGTG 3.87E-03 4.08 % B D D HHHHH PPPP PPPP H HH I I I I I I I I B B B M M M M M M B B M B M B B TAAGT 8.04E-03 3.95 % MMMMM PPPP P HHH PPP I H H HHH I I I I I M M M C I I B B B B B B B B D D D D D D CATAA 8.02E-03 3.74 % T C G A HHHMMMMM PPPPPPPP MH HHHH I I I I I M M D A G T B D A G T TA A C M B B B B B B B B D D D D D D C A H M M G G H B C G G HHHH PPPP HPPPP H I I I B B M B M M A T M M M M M M I B I B I I I M B G T B B B B B M T A HHHHH PPP HPPPPP HH I I I I I I B I I B B M M G CC HHHMMMMM PPPHHHHH MPPPPP I I I I I I M M D C G A G I I I D AA C HHHPPPPP B B B B B B B B D D D D D D TA C PPPMMMMM MHHHHH I I I I I M M AG A TG G H D T C HHHHH PPPP PPPP H H I I I B B B B B B B B D D D D D D D G G D M M M T G M D B B B B B G T GG B B M M D I I B M I M I I M M B B M C CC M M D D A C AC A HHHHH PPPP PPPP HHH I I I M A C G D B I I B I I B B B B M M G A I I I I D D G C A HHHPPPPP B B B B B B B B D D D D D G C PPPMMMMM MH I I HHHH I I M M A CG D HHHMMMMM PPPPPHHH M H H PPP I I I I I I M M I I B B B B B B B B D D D D D D D D GTTAG 8.60E-03 3.70 % AC G PPPPPP PP HHMMMMM H H I H H H H I I I I I M I I M M C B B B B B B B B D D D D D D ATAGT 6.15E-03 2.91 % A CC MMMMM PPP HPPPP HH P M H HHHH I I I I I M M G I I I B B B B B B B B D D D D D D D 17 D TGCCGC T G CG C AA T TGCCG 2.78E-04 2.61 % C AA HHHHH PPPP PPPP H H I I I H TG I I I I I B B M M M B M M M M B B M B B B TGCTC GTATG CCTAT A A T T C A C G TGCTC 6.10E-03 2.52 % PPP PPPP P MMMM HH HM I H H H H H I I M I I I I I M B B B B B B B B M D D D D D D D GTATG 9.05E-03 2.30 % PPPPPPP P HHHMMMMM I HHHHH I I M M M I I I I I B B B B B B B B D D D D CCTAT 2.27E-03 1.53 % T M I I H H H M H H M B I I I I G I D D D D B D D B D B B B A D E D D PHP PPPPP HPHMMMMM I B B Parameters used in this Study AptaTRACE: We define all aptamers as low count that have a frequency lower than 3, i.e. we define α = 3. Simulation: We created a simulated dataset of 4 million sequences over 10 selection cycles. The initial round was designed to contain 5 motifs between 5-8 nucleotides in length and with binding affinities of 50%, 55%, 60%, 70%, and 75% respectively (the background affinities were randomly assigned in a range of 1-25%). Each motif was initially represented a total of 100 times in the pool. In each cycle, we sample a total of 40% of the pool, amplify the selected aptamers with an efficiency of 95% and a mutation rate of 5%, and introduce a total of 50% background sequences into the mix. Comparison with other Methods: The k-mer size for DREME was restricted to the range k = 5, . . . , 8 and we limited it to output the top 100 PWM models with an e-value of at most 0.01. For RNAcontext, we utilized the log of the frequency of each sequence to represent their binding affinities. Finally, we report the consensus sequence for each output PWM from DREME, RNAcontext and AptaTRACE. To compute the value for C ∗ , we consider a PWM as a matching an implanted motif if the sequence of the implanted motif is a substring of the consensus sequence of the PWM. F Implementation Details and Runtime Our AptaTRACE pipeline is implemented as a modular system in C++ and Java. RNA secondary structure profiles for all aptamers in the pool were predicted in parallel on the server farm at the National Center for Biotechnology Information, NIH, using 1000 Cores and 200MB or RAM per job. The simulated data required about 5 hours of wall clock time, whereas the in vitro selection data finished in roughly 4 days. The enumeration of k-mers and consequent extraction of k-contexts was implemented as a multi-threaded C++ library and is capable of processing the here presented results in approximately 10 hours for all choices of k between 5-8 on a large memory server with 100 CPUs. Finally, the context shifting scores, k-mer extraction, and clustering is implemented as a multi-threaded JAVA program requiring 3-4 hours, depending on the data size, for its completion. The source code, is currently available on request and will be hosted online at: www.ncbi.nlm.nih.gov/CBBresearch/Przytycka/index.cgi#aptatools 18
5cs.CE
arXiv:1602.08268v1 [q-bio.PE] 26 Feb 2016 Construction of Gene and Species Trees from Sequence Data incl. Orthologs, Paralogs, and Xenologs Marc Hellmuth University of Greifswald Department of Mathematics and Computer Science Walther- Rathenau-Strasse 47, D-17487 Greifswald, Germany, and Saarland University Center for Bioinformatics Building E 2.1, P.O. Box 151150, D-66041 Saarbrücken, Germany Email: [email protected] Nicolas Wieseke Leipzig University Parallel Computing and Complex Systems Group Department of Computer Science Augustusplatz 10, D-04109 Leipzig, Germany Email: [email protected] Abstract Phylogenetic reconstruction aims at finding plausible hypotheses of the evolutionary history of genes or species based on genomic sequence information. The distinction of orthologous genes (genes that having a common ancestry and diverged after a speciation) is crucial and lies at the heart of many genomic studies. However, existing methods that rely only on 1:1 orthologs to infer species trees are strongly restricted to a small set of allowed genes that provide information about the species tree. The use of larger gene sets that consist in addition of non-orthologous genes (e.g. so-called paralogous or xenologous genes) considerably increases the information about the evolutionary history of the respective species. In this work, we introduce a novel method to compute species phylogenies based on sequence data including orthologs, paralogs or even xenologs. 1 1 Introduction Sequence-based phylogenetic approaches heavily rely on initial data sets to be composed of 1:1 orthologous sequences only. To this end alignments of protein or DNA sequences are employed whose evolutionary history is believed to be congruent to that of the respective species, a property that can be ensured most easily in the absence of gene duplications or horizontal gene transfer. Phylogenetic studies thus judiciously select families of genes that rarely exhibit duplications (such as rRNAs, most ribosomal proteins, and many of the housekeeping enzymes). In the presence of gene duplications, however, it becomes necessary to distinguish between the evolutionary history of genes (gene trees) and the evolutionary history of the species (species trees) in which these genes reside. Recent advances in mathematical phylogenetics, based on the theory of symbolic ultrametrics [7], have indicated that gene duplications can also convey meaningful phylogenetic information provided orthologs and paralogs can be distinguished with a degree of certainty [24, 27, 28]. Here, we examine a novel approach and explain the conceptional steps for the inference of species trees based on the knowledge of orthologs, paralogs or even xenologs [24, 27, 28]. 2 Preliminaries We give here a brief summary of the main definitions and concepts that are needed. Graphs, Gene Trees and Species Trees An (undirected) graph G is a pair (V, E) with non-empty vertex set V and edge set E containing two-element subsets of V . A class of graphs that will play an important role in this contribution are cographs. A graph G = (V, E) is a cograph iff G does not contain an induced path on four vertices, see [12, 13] for more details. A tree T = (V, E) is a connected, cycle-free graph. We distinguish two types of vertices in a tree: the leaves which are contained in only one edge and the inner vertices which are contained in at least two edges. In order to avoid uninteresting trivial cases, we will usually assume that T has at least three leaves. A rooted tree is a tree in which one special (inner) vertex is selected to be the root. The least common ancestor lcaT (x, y) of two vertices x and y in a rooted tree T is the first (unique) vertex that lies on the path from x to the root and y to the root. We say that a tree T contains the triple xy|z if x, y, and z are leaves of T and the path from x to y does not intersect the path from z to the root of T . A set of triples R is consistent if there is a rooted tree that contains all triples in R. An event-labeled tree, usually denoted by the pair (T, t), is a rooted tree T together with a map t : V → M that assigns to each inner vertex an event m ∈ M . For two leaves x and y of an event-labeled tree (T, t) its least common ancestor lcaT (x, y) is therefore marked with an event t(lcaT (x, y)) = m, which we denote for simplicity by lcaT (x, y) = t m. ∧ 2 In what follows, the set S will always denote a set of species and the set G a set of genes. We write x ∈ X if a gene x ∈ G resides in the species X ∈ S. A species tree (for S) is a rooted tree T with leaf-set S. A gene tree (for G) is an event-labeled tree (T, t) that has as leaf-set G. We refer the reader to [43] for an overview and important results on phylogenetics. Binary Relations and its Graph- and Tree-Representations A (binary) relation R over (an underlying set) G is a subset of G × G. We will write ⌊G × G⌋irr := (G × G) \ {(x, x) | x ∈ G} to denote the irreflexive part of G × G. Each relation R has a natural representation as a graph GR = (G, ER ) with vertex set G and edges connecting two vertices whenever they are in relation R. In what follows, we will always deal with irreflexive symmetric relations, which we call for simplicity just relations. Therefore, the corresponding graphs GR can be considered as undirected graphs without loops, that is, {x} 6∈ ER and, additionally, {x, y} ∈ ER iff (x, y) ∈ R (and thus, (y, x) ∈ R). While Graph-Representations GR of R are straightforward and defined for all binary relations, tree-representations of R are a bit more difficile to derive and, even more annoying, not every binary relation does have a tree-representation. For each tree representing a relation R over G the leaf-set L(T ) is G and a specific event-label is chosen so that the least common ancestor of two distinct elements x, y ∈ G is labeled in a way that uniquely determines whether (x, y) ∈ R or not. That is, an eventlabeled tree (T, t) with events “0” and “1” on its inner vertices represents a (symmetric irreflexive) binary relation R if for all (x, y) ∈ ⌊G × G⌋irr it holds that lcaT (x, y) = t 1 if and only if (x, y) ∈ R. The latter definitions can easily be extended to arbitrary disjoint (irreflexive symmetric) relations R1 , . . . , Rk over G: An edge-colored graph GR1 ,...,Rk = (G, E := ∪ki=1 ERi ) represents the relations R1 , . . . , Rk if it holds that (x, y) ∈ Ri if and only if {x, y} ∈ E and the edge {x, y} is colored with “i”. Analogously, an event-labeled tree (T, t) with events “0” and “1, . . . , k” on its inner vertices represents the relations R1 , . . . , Rk if for all (x, y) ∈ ⌊G × G⌋irr it holds that lcaT (x, y) = t i if and only if (x, y) ∈ Ri , 1 ≤ i ≤ k. The latter implies that for all pairs (x, y) that are in none of the relations Ri we have lcaT (x, y) = t 0. In practice, the disjoint relations correspond to the evolutionary relationship between genes contained in G, as e.g. the disjoint relations Ro and Rp that comprise the pairs of orthologous and paralogous genes, respectively. ∧ ∧ ∧ Paralogy, Orthology, and Xenology The current flood of genome sequencing data poses new challenges for comparative genomics and phylogenetics. An important topic in this context is the reconstruction of large families of homologous proteins, RNAs, and other genetic elements. The distinction between orthologs, paralogs, and xenologs is a key step in any research program of this type. The distinction between orthologous 3 and paralogous gene pairs dates back to the 1970s: two genes whose least common ancestor in the gene tree corresponds to a duplication are paralogs; if the least common ancestor was a speciation event and the genes are from different species, they are orthologs [17]. The importance of this distinction is two-fold: On the one hand, it is informative in genome annotation and, on the other hand, the orthology (or paralogy) relation conveys information about the events corresponding to internal nodes of the gene tree [24] and about the underlying species tree [27, 28]. We are aware of the controversy about the distinction between orthologous and paralogous genes and their consequence in the context of gene function, however, we adopt here the point of view that homology, and therefore also orthology and paralogy, refer only to the evolutionary history of a gene family and not to its function [22, 20]. In contrast to orthology and paralogy, the definition of xenology is less well established and by no means consistent in the biological literature. Xenology is defined in terms of horizontal gene transfer (HGT), that refers to the transfer of genes between organisms in a manner other than traditional reproduction and across species. The most commonly used definition stipulates that two genes are xenologs if their history since their common ancestor involves horizontal gene transfer of at least one of them [18, 32]. In this setting, both orthologs and paralogs may at the same time be xenologs [32]. Importantly, the mathematical framework established for evolutionary “event”-relations, as the orthology relation [7, 24], naturally accommodates more than two types of events associated with the internal nodes of the gene tree. It is appealing, therefore, to think of a HGT event as different from both speciation and duplication, in line with [23] where the term “xenologous” was originally introduced. In this contribution, we therefore will consider a slight modification of the terms orthologs, paralogs and xenologs, so-called lca-orthologs, lcaparalogs and lca-xenologs. To this end, note that for a set of genes G, the evolutionary relationship between two homologous genes contained in G is entirely explained by the true evolutionary gene-history of these genes. More precisely, if T is a (known) tree reflecting the true genehistory together with the events that happened, that is, the labeling t that tags the inner vertices of T as a speciation, duplication or HGT event, respectively, then we can determine the three disjoint relations Ro , Rp and Rx comprising the pairs of so-called lca-orthologous, lca-paralogous and lca-xenologous genes, respectively, as follows: Two genes x, y ∈ G are • lca-orthologous, if lcaT (x, y) = t speciation; ∧ • lca-paralogous, if lcaT (x, y) = t duplication and ∧ • lca-xenologous, if lcaT (x, y) = t HGT. ∧ The latter also implies the edge-colored graph representation GRo ,Rp ,Rx , see Figure 1 for an illustrative example. In the absence of horizontal gene transfer, the relations lca-orthologs and lca-paralogs are equivalent to orthologs and paralogs as defined by Fitch [18]. We are aware of the fact that this definition of lca-“events” leads to a loss of information of the direction of the HGT event, i.e., the information 4 Ro = {dv | v ∈ {ab1 , ac2 , b1 c2 , b2 c2 } G \ {d}} ∪ Rx = {b3 c1 } Rp = ⌊G × G⌋irr \ (Ro ∪ Rx ) xy ∈ R⋆ means that (x, y)(y, x) ∈ R⋆ , with ⋆ ∈ {o, p, x} b2 b1 b3 a d c1 c3 c2 Figure 1: Example of an evolutionary scenario showing the “true” evolution of a gene family evolving along the species tree (shown as blue tube-like tree). The corresponding true gene tree T appears embedded in the species tree S. The speciation vertices in the gene tree (red circuits) appear on the vertices of the species tree (blue ovals), while the duplication vertices (blue squares) and the HGT-vertices (green triangles) are located on the edges of the species tree. Gene losses are represented with “x”. The true gene-tree T uniquely determines the relationships between the genes by means of the event at lcaT (x, y) of distinct genes x, y ∈ G. The pairs of lca-orthologous, -paralogous and -xenologous genes are comprised in the relations Ro , Rp and Rx , respectively. The graphrepresentation GRo ,Rp ,Rx is shown in the lower left part. Non-drawn edges indicate the paralogous genes. This graph clearly suggests that the orthologyrelation Ro is not a complete subgraph, and thus, does not cluster or partition the input gene set G. However, in all cases the subgraphs GRo , GRp and GRx are so-called cographs, cf. Thm. 1. 5 of donor and acceptor. However, for the proposed method and to understand the idea of representing estimates of evolutionary relationships in an event-labeled tree this information is not necessarily needed. Nevertheless, generalizations to tree-representations of non-symmetric relations or a mathematical framework for xenologs w.r.t. the notion of Fitch might improve the proposed methods. Remark 1. If there is no risk of confusion and if not stated differently, we call lca-orthologs, lca-paralogs, and lca-xenologs simply orthologs, paralogs and xenologs, respectively. Clearly, evolutionary history and the events of the past cannot be observed directly and hence, must be inferred, using algorithmic and statistical methods, from the genomic data available today. Therefore, we can only deal with estimates of the relations Ro , Rp and Rx . In this contribution, we use those estimates to reconstruct (a hypothesis of) the evolutionary history of the genes and, eventually, the history of the species the genes reside in. We wish to emphasize that the three relations Ro , Rp and Rx (will) serve as illustrative examples and the cases Rp = ∅ or Rx = ∅ are allowed. In practice, it is possible to have more than these three relations. By way of example, the relation containing the pairs of paralogous genes might be more refined, since gene duplications have several different mechanistic causes that are also empirically distinguishable in real data sets. Thus, instead of heaving a single relation Rp that comprises all paralogs, we could have different types of paralogy relations that distinguish between events such as local segmental duplications, duplications by retrotransposition, or whole-genome duplications [50]. 3 From Sequence Data to Species Trees In this section, we provide the main steps in order to infer event-labeled gene trees and species trees from respective estimated event-relations. An implementation of these steps by means of integer linear programming is provided in the software tool ParaPhylo [27]. The starting point of this method is an estimate of the (true) orthology relation Ro . From this estimate the necessary information of the eventlabeled gene trees and the respective species trees will be derived. 3.1 Orthology Detection The inference of the orthology relation Ro and lies at the heart of many reconstruction methods. Orthology inference methods can be classified based on the methodology they use to infer orthology into tree-based and graph-based methods, for an overview see e.g. [2, 14, 21, 34, 46]. Tree-based orthology inference methods rely on the reconciliation of a constructed gene tree (without event-labeling) from an alignment of homologous sequences and a given species tree, see e.g. [4, 19, 29, 47, 49]. Although tree-based approaches are often considered as very accurate given a species tree, it suffers from high computational costs and is hence 6 limited in practice to a moderate number of species and genes. A further limitation of those tree-reconciliation methods is that for many scenarios the species tree is not known with confidence and, in addition, all practical issues that complicate phylogenetic inference (e.g. variability of duplication rates, mistaken homology, or HGT) limit the accuracy of both the gene and the species trees. Intriguingly, with graph-based orthology inference methods it is possible in practice to detect the pairs of orthologous genes with acceptable accuracy without constructing either gene or species trees. Many tools of this type have become available over the last decade. To name only a few, COG [45], OMA [42, 3], eggNOG [31], OrthoMCL [37, 11], InParanoid [40], Roundup 2.0 [16], EGM2 [39] or ProteinOrtho [35] and its extension PoFF [36]. Graph-based methods detect orthologous genes for two (pairwise) or more (multiple) species. These methods consist of a graph construction phase and, in some cases, a clustering phase [46]. In the graph construction phase, a graph is inferred where vertices represent genes, and (weighted) edges the (confidence of) orthology relationships. The latter rely on pairwise sequence similarities (e.g., basic local alignment search tool (BLAST) or Smith-Waterman) calculated between all sequences involved and an operational definition of orthology, for example, reciprocal best hit (RBH), bi-directional best hit (BBH), symmetrical best hit (SymBeT) or reciprocal smallest distance (RSD). In the clustering phase, clusters or groups of orthologs are constructed, using e.g., single-linkage, complete-linkage, spectral clustering or Markov Cluster algorithm. However, orthology is a symmetric, but not a transitive relation, i.e., it does in general not represent a partition of the set of genes G. In particular, a set G′ of genes can be orthologous to another gene g ∈ G \ G′ but the genes within G′ are not necessarily orthologous to each other. In this case, the genes in G′ are called co-orthologs to gene g [33]. It is important to mention that, therefore, the problem of orthology detection is fundamentally different from clustering or partitioning of the input gene set. In addition to OMA and ProteinOrtho only Synergy, EGM2, and InParanoid attempt to resolve the orthology relation at the level of gene pairs. The latter two tools can only be used for the analysis of two species at a time, while Synergy is not available as standalone tool and therefore cannot be applied to arbitrary user-defined data sets. In particular, the use of orthology inference tools is often limited to the species offered through the databases published by their authors. An exception is provided by ProteinOrtho [35] and its extension PoFF [36], methods that we will use in our approach. These standalone tools are specifically designed to handle large-scale user-defined data and can be applied to hundreds of species containing millions of proteins at ones. In particular, such computations can be performed on off-the-shelf hardware [35]. ProteinOrtho and PoFF compare similarities of given gene sequences (the bit score of the blast alignment) that together with an an E-value cutoff yield an edgeweighted directed graph. Based on reciprocal best hits, an undirected subgraph is extracted (graph construction phase) on which spectral clustering methods are applied (clustering phase), to determine significant groups of orthologous genes. To enhance the prediction accuracy, the relative order of genes (synteny) can be used as additional feature for the 7 discrimination between orthologs and paralogs. To summarize, graph-based methods have in common, that the output is a set of (pairs of) putative orthologous genes. In addition, orthology detection tools often report some weight or confidence value w(x, y) for x and y to be orthologs or not. This gives rise to a symmetric, irreflexive binary relation bo = {(x, y) | x, y ∈ G are estimated orthologs} R (1) = {(x, y) | lcaT (x, y) = t speciation (in the estimated gene tree T )}. (2) ∧ 3.2 Construction of Gene Trees Characterization of Evolutionary Event Relations Assume we have given a “true” orthology relation Ro over G, i.e., Ro comprises all pairs of “true” orthologs, that is, if the true evolutionary history (T, t) of the genes would be known, then (x, y) ∈ Ro if and only if lcaT (x, y) = t speciation. As we will show, given such a true relation without the knowledge of the gene tree (T, t), it is possible to reconstruct the “observable discriminating part” of (T, t) using the information contained in Ro , resp., Rp only, at least in the absence of xenologous genes [24, 25]. In the presence of HGT-events, but given the “true” relations Ro and Rp it is even possible to reconstruct (T, t) using the information contained in Ro and Rp only [24, 25]. Note, for the set of pairs of (lca)xenologs Rx we have ∧ Rx = ⌊G × G⌋irr \ (Ro ∪ Rp ). Clearly, since we do not know the true evolutionary history with conbo , R bp , R bx of these true relations fidence, we always deal with estimates R Ro , Rp , Rx . In order to understand under which conditions it is possible bo , R bp , R bx , to infer a gene tree (T, t) that represents the disjoint estimates R we characterize in the following the structure of their graph-representation bo ∪ R bp ∪ R bx = ⌊G × G⌋irr , then G b b b is a comGRbo ,Rb p ,Rbx . Note, if R Ro , Rp , Rx plete edge-colored graph, i.e., for all distinct x, y ∈ G there is an edge {x, y} ∈ E s.t. {x, y} is colored with with “⋆” if and only if (x, y) ∈ R⋆ , ⋆ ∈ {o, p, x} The following theorem is based on results established by Böcker and Dress [7] and Hellmuth et al. [24]. Theorem 1 ([7, 24]). Let GR1 ,...,Rk be the graph-representation of the relations R1 , . . . , Rk over some set G. There is an event-labeled gene tree representing R1 , . . . , Rk if and only if (i) the graph GRi = (G, ERi ) is a cograph for all i ∈ {1, . . . , k} and (ii) for all three distinct genes x, y, z ∈ G the three edges {x, y}, {x, z} and {y, z} in GR1 ,...,Rk have at most two distinct colors. bp = ⌊G × G⌋irr \ R bo , Clearly, in the absence of xenologs and thus, if R we can ignore condition (ii), since at most two colors occur in GRbo ,Rbp . In the latter case, GRbo , resp., GRbp alone provide all information of the underlying gene tree. 8 bo or R bp , R bx and Theorem 1 implies that whenever we have estimates R we want to find a tree (T, t) that represents these relations we must ensure that neither GRbo , GRbp nor GRbx contains an induced path on four vertices and that there is no triangle (a cycle on three vertices) in GRbo ,Rb p ,Rbx where each edge is colored differently. However, due to noise in the data or mispredicted events of pairs of genes, the graph GRbo ,Rbp ,Rbx will usually violate condition (i) or (ii). A particular difficulty arises from the fact, bo only, and do not know how to that we usually deal with the estimate R distinguish between the paralogs and xenologs. bo , R bp , R bx to the One possibility to correct the initial estimates R ∗ ∗ ∗ “closest” relations Ro , Rp , Rx so that there is a tree representation of Ro∗ , Rp∗ , Rx∗ , therefore, could be the change of a minimum number of edgecolors in GRbo ,Rbp ,Rb x so that GR∗o ,R∗p ,R∗x fulfills Condition (i) and (ii). This problem was recently shown to be NP-complete [25, 26, 38]. Inference of Local Substructures of the Gene Tree Assume we have given (estimated or true) relations Ro , Rp , Rx so that the graphrepresentation GRo ,Rp ,Rx fulfills Condition (i) and (ii) of Theorem 1. We show now briefly, how to construct the tree (T, t) that represents Ro , Rp , Rx . Here we utilize the information of triples that are extracted from the graph GRo ,Rp ,Rx and that must be contained in any gene-tree (T, t) representing Ro , Rp , Rx . More precisely, given the relations R1 , . . . , Rk we define the set of triples TR1 ,...,Rk as follows: For all three distinct genes x, y, z ∈ G we add the triple xy|z to TR1 ,...,Rk if and only if the colors of the edge {y, z} and {x, z} are identical but distinct from the color of the edge {x, y} in GR1 ,...,Rk . In other words, for the given evolutionary relations Ro , Rp , Rx the triple xy|z is added to TRo ,Rp ,Rx iff the two genes x and z, as well as y and z are in the same evolutionary relationship, but different from the evolutionary relation between x and y. Theorem 2 ([7, 24]). Let GR1 ,...,Rk be the graph-representation of the relations R1 , . . . , Rk . The graph GR1 ,...,Rk fulfills conditions (i) and (ii) of Theorem 1 (and thus, there is a tree representation of R1 , . . . , Rk ) if and only if there is a tree T that contains all the triples in TR1 ,...,Rk . The importance of the latter theorem lies in the fact, that the wellknown algorithm BUILD [1, 43] can be applied to TR1 ,...,Rk to determine whether the set of triples TR1 ,...,Rk is consistent, and, if so, constructs a tree representation in polynomial-time. To obtain a valid event-label for such a tree T we can simply set t(lcaT (x, y)) = ⋆ if the color of the edge {x, y} in GRo ,Rp ,Rx is “⋆”, ⋆ ∈ {o, p, x} [24]. It should be stressed that the evolutionary relations do not contain the full information on the event-labeled gene tree, see Fig. 2. Instead, the constructed gene trees (T, t) are homeomorphic images of the (possibly true) observable gene tree (T ′ , t′ ) by collapsing adjacent events of the same type [24]. That is, in the constructed tree (T, t) all inner vertices that are connected by an edge will have different event-labels, see Fig 2. Those trees are also known as discriminating representation, cf. [7]. However, these discriminating representations contain and provide 9 the necessary information to recover the input-relations, are unique (up to isomorphism), and do not pretend a higher resolution than actually supported by the data. 3.3 Construction of Species Trees While the latter results have been established for (lca)-orthologs, -paralogs and -xenologs, we restrict our attention in this subsection to orthologous and paralogous genes only and assume that there are no HGT-events in the gene trees. We shall see later, that in practical computation the existence of xenologous genes does not have a large impact on the reconstructed species history, although the theoretical results are established for gene histories without xenologous genes. In order to derive for a gene-tree (T, t) (that contains only speciation and duplication events) a species tree S with which (T, t) can be reconciled with or simply spoken “embedded” into, we need to answer the question under which conditions there exists such a species tree for a given gene tree. A tree S = (W, F ) with leaf set S is a species tree for a gene tree T = (V, E) with leaf set G if there is a reconciliation map µ : V → W ∪ F that map the vertices in V to vertices or edges in W ∪ F . A reconciliation map µ maps the genes x ∈ G in T to the respective species X ∈ S in S the gene x resides in so that specific constraints are fulfilled. In particular, the inner vertices of T with label “speciation” are mapped to the inner vertices of S, while the duplication vertices of T are mapped to the edges in W so that the relative “evolutionary order” of the vertices in T is preserved in S. We refer to [28] for the full definition of reconciliation maps. In Fig. 1, the reconciliation map µ is implicitly given by drawing the species tree superimposed on the gene tree. Hence, for a given gene tree (T, t) we wish to efficiently decide whether there is a species tree in which (T, t) can be embedded into, and if so, construct such a species tree together with the respective reconciliation map. We will approach the problem of deriving a species tree from an event-labeled gene tree by reducing the reconciliation map from gene tree to species tree to rooted triples of genes residing in three distinct species. To this end we define a species triple set S derived from (T, t) that provides all information needed to efficiently decide whether there is a species tree S for (T, t) or not. Let Ro (T ) be the set of all triples ab|c that are contained in T s.t. a, b, c ∈ G reside in pairwise different species and lcaT (a, b, c) = t speciation, then set ∧ S := {AB|C : ∃ab|c ∈ Ro (T ) with a ∈ A, b ∈ B, c ∈ C}. It should be noted that by results established in [7, 24] it is possible to derive the triple set S directly from the orthology relation Ro without constructing a gene tree, cf. [24]: AB|C ∈ S if and only if (I) A, B and C are pairwise different species and there are genes a ∈ A, b ∈ B, c ∈ C so that either 10 a b1 b2 c2 b3 c1 c3 d A B C D Figure 2: Left, the homeomorphic image (T, t) of the observable gene tree (T ′ , t′ ) in Fig. 1 is shown. The true gene tree in Fig. 1 represents all extant as well extinct genes, all duplication, HGT and speciation events. Not all of these events are observable from extant genes data, however. In particular, extinct genes cannot be observed. Thus, the observable gene tree (T ′ , t′ ) is obtained from the original gene tree in Fig. 1 by removing all vertices marked with “x” together with their incident edges and, thereafter, removing all inner vertices that are contained in only two edges. The homeomorphic image (T, t) is obtained from (T ′ , t′ ) by contraction of the edge that connect the two consecutive duplication events. The species triple set S is {AB|C2 , AB|D3 , AC|D3 , BC|D9 }, where indices indicate the number of gene triples in Ro (T ) that support the respective species triple. In this example, the (unique, and thus minimally resolved) species tree S that contains all triples in S is shown in the right part. The species tree S is identical to the true species tree shown in Fig. 1 11 (IIa) (a, c), (b, c) ∈ Ro and (a, b) 6∈ Ro or (IIb) (a, c), (b, c), (a, b) ∈ Ro and there is a gene d ∈ G with (c, d) ∈ Ro and (a, d), (b, d) ∈ / Ro . Thus, in order to infer species triples a sufficient number of duplication events must have happened. The following important result was given in [28]. Theorem 3. Let (T, t) be a given gene tree that contains only speciation and duplication events. Then there is a species tree S for (T, t) if and only if there is any tree containing all triples in S. In the positive case, the species tree S and the reconciliation between (T, t) and S can be found in polynomial time. Interestingly, the latter theorem implies that the gene tree (T, t) can be embedded into any tree that contains the triples in S. Hence, one usually wants to find a species tree with a least number of inner vertices, as those trees constitute one of the best estimates of the phylogeny without pretending a higher resolution than actually supported by the data. Such trees are also called minimally resolved tree and computing such trees is an NP-hard problem [30]. Despite the variance reduction due to cograph editing, noise in the data, as well as the occasional introduction of contradictory triples as a consequence of horizontal gene transfer is unavoidable. The species triple set S collected from the individual gene families thus will not always be consistent. The problem of determining a maximum consistent subset of an inconsistent set of triples is NP-hard and also APX-hard, see [9, 48]. Polynomial-time approximation algorithms for this problem and further theoretical results are reviewed in [10]. The results in this subsection have been established for the reconciliation between event-labeled gene trees without HGT-events and inferred species. Although there are reconciliation maps defined for gene trees that contain xenologs and respective species trees [5, 6], a mathematical characterization of the species triples S and the existence of species trees for those gene trees, which might help also to understand the transfer events itself, however, is still an open problem. 3.4 Summary of the Theory The latter results show that it is not necessary to restrict the inference of species trees to 1:1 orthologs. Importantly, orthology information alone is sufficient to reconstruct the species tree provided that (i) the orthology is known without error and unperturbed by horizontal gene transfer and (ii) the input data contains a sufficient number of duplication events. Although species trees can be inferred in polynomial time for noise-free data, in a realistic setting, three NP-hard optimization problems need to be solved. We summarize the important working steps to infer the respective gene and species trees from genetic material. (W1) bo and set R bp = ⌊G × G⌋irr \ R bo . Compute the estimate R 12 (W2) Edit the graph GRbo to the closest cograph with a minimum number of edge edits to obtain the graph GRo . Note, Rp = ⌊G×G⌋irr \Ro . (W3) Compute the tree representation (T, t) w.r.t. Ro , Rp . (W4) Extract the species triple set Sb from Ro (T ). (W5) b Extract a maximal consistent triple set S from S. (W6) Compute a minimally resolved species tree S that contains all triples in S, and, if desired, the reconciliation map µ between (T, t) and S (cf. Thm. 3). In the presence of horizontal transfer, in Step (W1) the xenologous genes x, y are either predicted as orthologs or paralogs. Furthermore, in Step (W2) it suffices to edit the graph GRbo only, since afterwards the graph representation GRp with Rp = ⌊G × G⌋irr \ Ro and, thus GRo ,Rp fulfills the conditions of Thm. 1 [12, 24]. In particular, the graphs GRo ,Rp and GRp have then been obtained from GRbo ,Rbp , resp., GRbp with a minimum number of edge edits. The latter is due to the fact that the complement GRb o is the graph GRbp [12]. To extract the species triple set Sb in Step (W4), it suffices to choose the respective species triples using Condition (I) and (IIa)/(IIb), without constructing the gene trees and thus, Step (W3) can be ignored if the gene history is not of further interest. 4 Evaluation In [27] it was already shown that for real-life data sets the paralogy-based method produces phylogenetic trees for moderately sized species sets. The resulting species trees are comparable to those presented in the literature that are constructed by “state-of-the-art” phylogenetic reconciliation approaches as RAxML [44] or MrBayes [41]. To this end, genomic sequences of eleven Aquificales and 19 Enterobacteriales species were analyzed. Based on the NCBI gene annotations of those species, an orthology prediction was performed using ProteinOrtho. From that prediction, phylogenetic trees were constructed using the aforementioned orthology-paralogy-based approach (working steps (W2)-(W6)) implemented as integer linear program in ParaPhylo [27]. The advantage of this approach is the computation of exact solutions, however, the runtime scales exponentially with the number of input genes per gene family and the number of species. However, as there is no gold standard for phylogenetic tree reconstruction, three simulation studies are carried out to evaluate the robustness of the method. Using the Artificial Life Framework (ALF) [15], the evolution of generated gene sequences was simulated along a given branch length-annotated species tree, explicitly taking into account gene duplication, gene loss, and horizontal transfer events. For realistic species trees, the γ-proteobacteria tree from the OMA project [3] was randomly pruned to a size of 10 species while conserving the branch lengths. For additional details on the simulation see [27]. The reconstructed trees are then compared with the initial species trees, using the software TreeCmp [8]. In the provided box-blots (Fig. 3), tree distances are computed according to 13 the triple metric and normalized by the average distance between random Yule trees, see [27] for further evaluations. 0.8 0.4 0.0 tree distance gene families 100 paralogous noise 0.4 0.8 orthologous noise 0.0 tree distance homologous noise 300 500 # gene families 15 20 % noise ProteinOrtho 25 5 10 15 20 % noise lca xenology 25 5 10 15 20 % noise Fitch xenology 25 0.4 0.8 10 0.0 tree distance 5 0/ 0 5.5/ 15.7 10.6/ 15.3/ 0/ 5.5/ 10.6/ 15.3/ 0/ 28.7 39.4 0 15.7 28.7 39.4 0 % HGT events / % xenologous pairs of genes 5.5/ 15.7 10.6/ 15.3/ 28.7 39.4 Figure 3: Accuracy of reconstructed species trees (10 species) in simulated data sets; (Top) Dependence on the number of gene families; (Middle) Dependence of different noise models; (Down) Dependence on noise by HGT. The three simulation studies are intended to answer three individual questions. 1. How much data is needed to provide enough information to reconstruct accurate species trees? (cf. Fig. 3 (top)) 2. How does the method perform with noisy data? (cf. Fig. 3 (middle)) 3. What is the impact of horizontal gene transfer on the accuracy of the method? (cf. Fig. 3 (down)) To construct accurate species trees, the presented method requires a sufficient amount of duplicated genes. Assuming a certain gene duplication rate, the amount of duplicated genes correlates directly with the number of genes per species, respectively the number of gene families. The first simulation study (Fig. 3 (top)) is therefore performed with several numbers of gene families, varying from 100 to 500. The simulation 14 with ALF was performed without horizontal gene transfer and the phylogenetic trees are computed based on the unaltered orthology/paralogy relation obtained from the simulation, that is, the orthologs and paralogs can directly be derived from the simulated gene trees. It turned out that with an duplication rate of 0.005, which corresponds to approximately 8% of paralogous pairs of genes, 500 gene families are sufficient to produce reliable phylogenetic trees. With less gene families, and hence less duplicated genes, the trees tend to be only poorly resolved. For the second study the simulated orthology/paralogy relation of 1000 gene families was perturbed by different types of noise. (i) insertion and deletion of edges in the orthology graph (homologous noise), (ii) insertion of edges (orthologous noise), and (iii) deletion of edges (paralogous noise), see Fig. 3 (middle). In the three models an edge is inserted or removed with probability p ∈ {0.05, 0.1, 0.15, 0.2, 0.25}. It can be observed that up to noise of approximately 10% the method produces trees which are almost identical to the initial trees. Especially, in the case of orthology overprediction (orthologous noise) the method is robust even if 25% of the input data was disturbed. Finally, in the third analysis, data sets are simulated with different rates of horizontal gene transfer, see Fig. 3 (down). The number of HGT events in the gene trees are varied up to 15.3%, which corresponds to 39.4% of all pairs of genes (x, y) having at least one HGT event on the path from x to y in the generated gene tree, i.e., x and y are xenologous with respect to the definition of Fitch [18]. Firstly, the simulated gene sequences are analyzed using ProteinOrtho and the tree reconstruction is then performed based on the resulting orthology/paralogy prediction (Fig. 3 (down/left)). Secondly, we used both definitions of xenology, i.e., lca-xenologous and the notion of Fitch. Note, so far the reconstruction of species trees with ParaPhylo requires that pairs of genes are either orthologous or paralogous. Hence, we used the information of the lcaorthologs, -paralogs and -xenologs derived from the simulated gene trees. Fig. 3 (down/center) shows the accuracy of reconstructed species trees under the assumption that all lca-xenologs are “mispredicted” as lcaorthologs, in which case all paralogous genes are identified correctly. Fig. 3 (down/right) shows the accuracy of reconstructed species trees under the assumption that all xenologs w.r.t. the notion of Fitch are interpreted as lca-orthologs. The latter amounts to the “misprediction” of lca-xenologs and lca-paralogs, as lca-orthologs. However, all remaining lca-paralogs, are still correctly identified. For the orthology/paralogy prediction based on ProteinOrtho, it turned out that the resulting trees have a distance of approximately 0.3 to 0.4 to the initial species tree. Thereby, a distance of 1 refers not to a maximal distance, but to the average distance between random trees. However, the accuracy of the constructed trees appears to be independent from the amount of horizontal gene transfer. Hence, ProteinOrtho is not able to either identify the gene families correctly, or mispredicts orthologs and paralogs (due to, e.g., gene loss). In case that all paralogous genes are identified correctly, ParaPhylo produces more accurate trees. We obtain even more accurate species trees, when predicting all pairs of Fitch-xenologous genes as lca-orthologs, even with a large amount of HGT events. 15 5 Concluding Remarks The restriction to 1:1 orthologs for the reconstruction of the evolutionary history of species is not necessary. Even more, it has been shown that the knowledge of only a few correct identified paralogs allows to reconstruct accurate species trees, even in the presence of horizontal gene transfer. The information of paralogs is strictly complementary to the sources of information used in phylogenomics studies, which are always based on alignments of orthologous sequences. Hence, paralogs contain meaningful and valuable information about the gene and the species trees. Future research might therefore focus on improvements of orthology and paralogy infence tools, and mathematical frameworks for tree-representations of non-symmetric relations (since HGT is naturally a directed event), as well as a characterization of the reconciliation between gene and species trees in the presence of HGT. References [1] A. V. Aho, Y. Sagiv, T. G. Szymanski, and J. D. Ullman. Inferring a tree from lowest common ancestors with an application to the optimization of relational expressions. SIAM J. Comput., 10:405–421, 1981. [2] A M Altenhoff and C. Dessimoz. Phylogenetic and functional assessment of orthologs inference projects and methods. PLoS Comput Biol., 5:e1000262, 2009. [3] Adrian M. Altenhoff, Adrian Schneider, Gaston H. Gonnet, and Christophe Dessimoz. OMA 2011: orthology inference among 1000 complete genomes. Nucleic Acids Research, 39(suppl 1):D289–D294, 2011. [4] Lars Arvestad, Ann-Charlotte Berglund, Jens Lagergren, and Bengt Sennblad. Bayesian gene/species tree reconciliation and orthology analysis using mcmc. Bioinformatics, 19(suppl 1):i7–i15, 2003. [5] Mukul S. Bansal, Eric J. Alm, and Manolis Kellis. Efficient algorithms for the reconciliation problem with gene duplication, horizontal transfer and loss. Bioinformatics, 28(12):i283–i291, 2012. [6] Mukul S. Bansal, Eric J. Alm, and Manolis Kellis. Reconciliation revisited: Handling multiple optima when reconciling with duplication, transfer, and loss. Journal of Computational Biology, 20(10):738–754, 2013. [7] Sebastian Böcker and Andreas W. M. Dress. Recovering symbolically dated, rooted trees from symbolic ultrametrics. Adv. Math., 138:105– 125, 1998. [8] D. Bogdanowicz, K. Giaro, and B. Wróbel. Treecmp: Comparison of trees in polynomial time. Evolutionary Bioinformatics Online, 8:475, 2012. [9] J. Byrka, P. Gawrychowski, K. T. Huber, and S. Kelk. Worst-case optimal approximation algorithms for maximizing triplet consistency within phylogenetic networks. J. Discr. Alg., 8:65–75, 2010. 16 [10] J. Byrka, S. Guillemot, and J. Jansson. New results on optimizing rooted triplets consistency. Discr. Appl. Math., 158:1136–1147, 2010. [11] Feng Chen, Aaron J. Mackey, Christian J. Stoeckert, and David S. Roos. Orthomcl-db: querying a comprehensive multi-species collection of ortholog groups. Nucleic Acids Research, 34(suppl 1):D363– D368, 2006. [12] D. G. Corneil, H. Lerchs, and L. Steward Burlingham. Complement reducible graphs. Discr. Appl. Math., 3:163–174, 1981. [13] D. G. Corneil, Y. Perl, and L. K. Stewart. A linear recognition algorithm for cographs. SIAM J. Computing, 14:926–934, 1985. [14] Daniel A. Dalquen, Adrian M. Altenhoff, Gaston H. Gonnet, and Christophe Dessimoz. The impact of gene duplication, insertion, deletion, lateral gene transfer and sequencing error on orthology inference: A simulation study. PLoS ONE, 8(2):e56925, 02 2013. [15] Daniel A. Dalquen, Maria Anisimova, Gaston H. Gonnet, and Christophe Dessimoz. ALF–a simulation framework for genome evolution. Mol. Biol. Evol., 29(4):1115–1123, 2012. [16] Todd F. DeLuca, Jike Cui, Jae-Yoon Jung, Kristian Che St. Gabriel, and Dennis P. Wall. Roundup 2.0: Enabling comparative genomics for over 1800 genomes. Bioinformatics, 28(5):715–716, 2012. [17] W M Fitch. Distinguishing homologous from analogous proteins. Syst Zool, 19:99–113, 1970. [18] Walter M. Fitch. Homology: a personal view on some of the problems. Trends Genet., 16:227–231, 2000. [19] Shi G., M.-C. Peng, and T. Jiang. Multimsoar 2.0: An accurate tool to identify ortholog groups among multiple genomes. PLoS ONE, 6(6):e20892, 2011. [20] T. Gabaldón and EV. Koonin. Functional and evolutionary implications of gene orthology. Nat. Rev. Genet., 14(5):360–366, 2013. [21] Toni Gabaldón. Large-scale assignment of orthology: back to phylogenetics? Genome Biology, 9(10):235, 2008. [22] John Gerlt and Patricia Babbitt. Can sequence determine function? Genome Biology, 1(5):reviews0005.1–reviews0005.10, 2000. [23] G S Gray and W M Fitch. Evolution of antibiotic resistance genes: the DNA sequence of a kanamycin resistance gene from Staphylococcus aureus. Mol Biol Evol, 1:57–66, 1983. [24] M. Hellmuth, M. Hernandez-Rosales, K. T. Huber, V. Moulton, P. F. Stadler, and N. Wieseke. Orthology relations, symbolic ultrametrics, and cographs. Journal of Mathematical Biology, 66(1-2):399–420, 2013. [25] M. Hellmuth and N. Wieseke. On symbolic ultrametrics, cotree representations, and cograph edge decompositions and partitions. In Dachuan Xu, Donglei Du, and Dingzhu Du, editors, Computing and Combinatorics, volume 9198 of Lecture Notes in Computer Science, pages 609–623. Springer International Publishing, 2015. 17 [26] M. Hellmuth and N. Wieseke. On tree representations of relations and graphs: Symbolic ultrametrics and cograph edge decompositions. CoRR, abs/1509.05069, 2015. submitted to J. Comb. Opt. (Springer). [27] M. Hellmuth, N. Wieseke, M. Lechner, H.-P. Lenhof, M. Middendorf, and P. F. Stadler. Phylogenomics with paralogs. Proceedings of the National Academy of Sciences, 112(7):2058–2063, 2015. [28] M. Hernandez-Rosales, M. Hellmuth, N. Wieseke, K. T. Huber, V. Moulton, and P. F. Stadler. From event-labeled gene trees to species trees. BMC Bioinformatics, 13(Suppl 19):S6, 2012. [29] T. J. Hubbard and et al. Ensembl 2007. Nucleic Acids Research, 35(suppl 1):D610–D617, 2007. [30] J. Jansson, R.S. Lemence, and A. Lingas. The complexity of inferring a minimally resolved phylogenetic supertree. SIAM J. Comput., 41:272–291, 2012. [31] Lars Juhl Jensen, Philippe Julien, Michael Kuhn, Christian von Mering, Jean Muller, Tobias Doerks, and Peer Bork. eggnog: automated construction and annotation of orthologous groups of genes. Nucleic Acids Research, 36(suppl 1):D250–D254, 2008. [32] Roy A Jensen. Orthologs and paralogs – we need to get it right. Genome Biol, 2:8, 2001. [33] Eugene V. Koonin. Orthologs, paralogs, and evolutionary genomics1. Annual Review of Genetics, 39(1):309–338, 2005. PMID: 16285863. [34] David M. Kristensen, Yuri I. Wolf, Arcady R. Mushegian, and Eugene V. Koonin. Computational methods for gene orthology inference. Briefings in Bioinformatics, 12(5):379–391, 2011. [35] Marcus Lechner, Sven Findeiß, Lydia Steiner, Manja Marz, Peter F. Stadler, and Sonja J. Prohaska. Proteinortho: detection of (co)orthologs in large-scale analysis. BMC Bioinformatics, 12:124, 2011. [36] Marcus Lechner, Maribel Hernandez-Rosales, D. Doerr, N. Wiesecke, A. Thevenin, J. Stoye, Roland K. Hartmann, Sonja J. Prohaska, and Peter F. Stadler. Orthology detection combining clustering and synteny for very large datasets. PLoS ONE, 9(8):e105015, 08 2014. [37] Li Li, Christian J Stoeckert, and David S Roos. OrthoMCL: identification of ortholog groups for eukaryotic genomes. Genome research, 13(9):2178–2189, 2003. [38] Yunlong Liu, Jianxin Wang, Jiong Guo, and Jianer Chen. Complexity and parameterized algorithms for cograph editing. Theoretical Computer Science, 461(0):45 – 54, 2012. [39] Khalid Mahmood, Geoffrey I. Webb, Jiangning Song, James C. Whisstock, and Arun S. Konagurthu. Efficient large-scale protein sequence comparison and gene matching to identify orthologs and co-orthologs. Nucleic Acids Research, 40(6):e44–e44, 2012. [40] Gabriel Östlund, Thomas Schmitt, Kristoffer Forslund, Tina Köstler, David N Messina, Sanjit Roopra, Oliver Frings, and Erik LL Sonnhammer. InParanoid 7: new algorithms and tools for eukaryotic orthology analysis. Nucleic acids research, 38(suppl 1):D196– D203, 2010. 18 [41] F. Ronquist, M. Teslenko, P. van der Mark, D. L. Ayres, A. Darling, S. Hohna, B. Larget, L. Liu, M. A. Suchard, and J. P. Huelsenbeck. MrBayes 3.2: efficient Bayesian phylogenetic inference and model choice across a large model space. Syst. Biol., 61(3):539–542, 2012. [42] Adrian Schneider, Christophe Dessimoz, and Gaston H. Gonnet. Oma browserexploring orthologous relations across 352 complete genomes. Bioinformatics, 23(16):2180–2182, 2007. [43] Charles Semple and Mike Steel. Phylogenetics, volume 24 of Oxford Lecture Series in Mathematics and its Applications. Oxford University Press, Oxford, UK, 2003. [44] Alexandros Stamatakis. RAxML version 8: A tool for phylogenetic analysis and post-analysis of large phylogenies. Bioinformatics, 2014. [45] Roman L. Tatusov, Michael Y. Galperin, Darren A. Natale, and Eugene V. Koonin. The cog database: a tool for genome-scale analysis of protein functions and evolution. Nucleic Acids Research, 28(1):33– 36, 2000. [46] Kalliopi Trachana, Tomas A. Larsson, Sean Powell, Wei-Hua Chen, Tobias Doerks, Jean Muller, and Peer Bork. Orthology prediction methods: A quality assessment using curated protein families. BioEssays, 33(10):769–780, 2011. [47] Rene van der Heijden, Berend Snel, Vera van Noort, and Martijn Huynen. Orthology prediction at scalable resolution by phylogenetic tree analysis. BMC Bioinformatics, 8(1):83, 2007. [48] L. van Iersel, S. Kelk, and M. Mnich. Uniqueness, intractability and exact algorithms: reflections on level-k phylogenetic networks. J. Bioinf. Comp. Biol., 7:597–623, 2009. [49] Ilan Wapinski, Avi Pfeffer, Nir Friedman, and Aviv Regev. Automatic genome-wide reconstruction of phylogenetic gene trees. Bioinformatics, 23(13):i549–i558, 2007. [50] Jianzhi Zhang. Evolution by gene duplication: an update. Trends Ecol. Evol., 18:292–298, 2003. 19
8cs.DS
3D Face Reconstruction from Light Field Images: A Model-free Approach Mingtao Feng 1,2 Syed Zulqarnain Gilani1 Yaonan Wang 2 Ajmal Mian1 1 School of Computer Science and Software Engineering, The University of Western Australia arXiv:1711.05953v3 [cs.CV] 12 Jan 2018 {zulqarnain.gilani,ajmal.mian}@uwa.edu.au 2 College of Electrical and Information Engineering, Hunan University {mintfeng,yaonan}@hnu.edu.cn Abstract Reconstructing 3D facial geometry from a single RGB image has recently instigated wide research interest. However, it is still an ill-posed problem and most methods rely on prior models hence undermining the accuracy of the recovered 3D faces. In this paper, we exploit the Epipolar Plane Images (EPI) obtained from light field cameras and learn CNN models that recover horizontal and vertical 3D facial curves from the respective horizontal and vertical EPIs. Our 3D face reconstruction network (FaceLFnet) comprises a densely connected architecture to learn accurate 3D facial curves from low resolution EPIs. To train the proposed FaceLFnets from scratch, we synthesize photorealistic light field images from 3D facial scans. The curve by curve 3D face estimation approach allows the networks to learn from only 14K images of 80 identities, which still comprises over 11 Million EPIs/curves. The estimated facial curves are merged into a single pointcloud to which a surface is fitted to get the final 3D face. Our method is model-free, requires only a few training samples to learn FaceLFnet and can reconstruct 3D faces with high accuracy from single light field images under varying poses, expressions and lighting conditions. Comparison on the BU-3DFE and BU-4DFE datasets show that our method reduces reconstruction errors by over 20% compared to recent state of the art. Figure 1. Proposed pipeline for 3D face reconstruction from a single light field image. Using synthetic light field face images, we train two FaceLFnets for regressing 3D facial curves over their respective horizontal and vertical EPIs. The estimated depth maps are combined, using camera parameters, into a single pointcloud to which a surface is fitted to get the final 3D face. cation [15] and face animation [9, 49]. Reconstructing 3D facial geometry from RGB images is, therefore, receiving a significant interest from the research community. However, using a single RGB image to recover the 3D face is an ill-posed problem [31] since the depth information is lost during the projection process. In fact, many different 3D shapes can result in similar 2D projections. The scale and bas-relief ambiguities [6] are common examples. Most existing methods have resorted to the use of prior models such as the Basal Face Model (BFM) [43] and the Annotated Face Model(AFM) [12] to generate synthetic data with ground truth to train CNN [11, 40] models and to recover the model parameters at test time. However, model- 1. Introduction Three dimensional face analysis has the potential to address the challenges that confound its two dimensional counterpart such as variations in illumination, pose and scale [4]. This modality has achieved state-of-the-art performances on applications such as face recognition [14, 36, 39], syndrome diagnosis [16, 17, 47, 55], gender classifi1 based approaches are inherently biased and constrained to the space of the training data of the prior models. A 4D light field image captures the RGB color intensities at each pixel as well as the direction of incoming light rays. High resolution plenoptic cameras [2, 3] are now commercially available. Plenoptic cameras use an array of microlenses to capture many sub-aperture images arranged in an equally spaced rectangular grid. Unlike most 3D scanners that use active light projection and are hence restricted to indoor use, plenoptic cameras are passive and can instantly acquire light field images outdoors as well, in a single photographic exposure. The sub-aperture light field images have been exploited to improve the performance of many applications such as saliency detection [32], hyperspectral light field imaging [57], material classification [53], image segmentation [62] and image restoration [50, 56] and in particular, depth estimation [26, 48, 34, 52, 46]. This paper focuses on reconstructing 3D faces from light field images under a wide range of pose, expression and illumination variations. Various methods have been proposed to solve the illposed problem of reconstructing 3D facial geometry from a single RGB image [31, 40, 11, 51, 44, 29]. These methods all use one or more common techniques. For instance, Shape from Shading (SfS) uses the shading variation to reconstruct 3D faces but the caveat is that the method is sensitive to lighting and RGB image texture and even under near ideal conditions, suffers from the bas-relief ambiguity [6]. 3D Morphable Models (3DMM) [11, 40] project the 3D faces in a low-dimensional subspace. However, the models are confined to the linear space of their training data and do not generalize well to all face shapes [13]. Landmark based methods use facial keypoints to guide the reconstruction process but rely heavily on accurate localization of the landmarks. We propose a model-free approach (see Fig. 1) to reconstruct 3D faces directly from light field images using Convolutional Neural Networks (CNN). Our technique does not rely on model fitting or landmark detection. Training a CNN requires massive amount of photo-realistic labeled data. However, there is no publicly available 4D light field face dataset with corresponding ground truth 3D face models. We address this problem and propose a method of generating the training data. We use the BU-3DFE [58] and BU-4DFE datasets [60] to generate light field images from their ground truth 3D models. Figure 2 shows some examples. We randomly vary the light intensity and pose to make our dataset more realistic. Our dataset comprises approximately 19K photo-realistic light field images with ground truth depth maps 1 . Furthermore, we show that our method requires fewer training samples (facial identities) as it cap1 We use depth map to represent disparity map as they are related by light field camera parameters [22]. italizes on reconstructing 3D facial curves rather than the complete face at once. We believe that our synthesized dataset of 4D light field images with corresponding 3D facial scans can be applied to many other facial analysis problems such as pose estimation, recognition and alignment. Equipped with a rich light field image dataset, we propose a densely connected CNN architecture (FaceLFnet) to learn 3D facial curves from Epipolar Plane Images (EPIs). We train two networks separately using horizontal and vertical EPIs to increase the accuracy of depth estimation. The densenet architecture is preferred as it can accurately learn the subtle slopes in low resolution EPIs2 . FaceLFnets are trained using our synthetic light field face images for which the ground truth depth data is available. Once the face curve estimates are obtained independently from the horizontal and vertical FaceLFnets, we merge them into a single pointcloud based on the camera parameters and then use a surface fitting method to recover the final 3D face. The core idea of our work is a model-free approach, where the solution is not restricted to any statistical face space. This is possible by exploiting the shape information present in the Epipolar Plane Images. Our contribution are: (1) A model-free approach for 3D face reconstruction from a single light field image. Our method does not require face alignment or landmark detection and is robust to facial expressions, pose and illumination variations. Being model-free, our method also estimates the peripheral regions of the face such as hair and neck. (2) A training technique that does not require massive number of facial identities. Exploiting the EPIs, we demonstrate that the proposed FaceLFnet can learn from only a few identities (80) and still outperform the state-of-the-art methods by a margin of 26%. (3) A data syntheses technique for generating a light field face image dataset which, to the best of our knowledge, is the first of its kind. This dataset will contribute to solving other face analysis problems as well. 2. Related Work 3D face reconstruction from a single image has attracted significant attention recently. Shape-from-shading (SfS) has been a popular approach for this task [61, 37, 18]. For example, WenYi et al. [61] proposed a symmetric SfS method to obtain illumination-normalized image and developed a face recognition system. Roy et al. [37] proposed an improved SfS method to enhance the depth map combining the RGB image and rough depth image to create more details. Yudeog et al. [18] estimated lighting variations with both global and local light models. SfS approach was then applied with the estimated lighting models for accurate shape reconstruction. Reconstruction using SfS re2 Higher slope of lines in EPI corresponds to lower depth values. quires priors of reflectance properties and lighting conditions and suffers from the bas-relief ambiguity [6]. A 3D Morphable Model (3DMM) was introduced by Blanz and Vetter [7] which represents a 3D face as a linear combination of orthogonal basis vectors obtained by PCA over 100 male and 100 female identities. James et al. [8] extended the concept and proposed a statistical model combined with a texture model for fitting the 3DMM on face images in the wild. 3DMM has also been used in [38, 5, 42, 30] for face reconstruction. The main limitation of such methods is that the 3DMM cannot model every possible face. Moreover, it is unable to extract facial details like wrinkles and folds because such details are not encoded in the linear subspace. Recently, various attempts were made to integrate 3DMMs with CNN for facial geometry reconstruction from a single image. Elad et al. [40] employed an iterative CNN trained with synthetic data to estimate 3DMM vectors. The predicted geometry was then refined by the real-time shape-from-shading method. Matan et al. [41] extended the work [40] and introduced an end-to-end CNN framework that recovers the coarse facial shape using a CoarseNet, followed by a FineNet to refine the facial details. The two net parts are connected by a novel layer that renders the depth image from 3D mesh. Pengfei Dou et al. [11] proposed an end-to-end 3D face reconstruction method from a single RGB image. They trained a fusion-CNN with multi-task learning loss to simplify 3D face reconstruction into neutral and expressive 3D facial parameters estimation. Jourabloo et al. [29] proposed a 3DMM fitting method for face alignment, which uses a cascaded CNN to regress camera matrix and 3DMM parameters. Tuan Tran et al. [51] used multi image 3DMM estimates as ground truth and then trained a CNN to regress 3DMM shape and texture parameters from an input image. Kemelmacher el at. [31] used the input image as a guide to build a single reference model to align with the face image and then refined the reference model using SfS method. Tal et al. [19] used a 3D neutral face as reference model to approximate the RGB image for face frontalization. Matan et al. [44] proposed a translation network that learns two maps (a depth image and a correspondence map), used for non-rigid registration with a template face, from a single RGB image. Fine-tuning is then performed for reconstructing facial details. In contrast to SfS and model fitting based face reconstruction methods, we learn 3D face curves from EPIs of the light field image. Our method does not require face alignment, dense correspondence or model fitting steps and is robust to facial pose, expressions and illumination. To the best of our knowledge none of the existing methods is model-free and uses a prior face model at some stage of the reconstruction process. On the other hand our method is completely model-free. Similarly, we are unaware of any Figure 2. Central view examples of our rendered light field images. The ground truth 3D scans are aligned with the central view. To make the dataset rich in variations, the generated light field images use random backgrounds and differ extensively in ethnicity, gender, age, pose and illumination. existing technique that uses light field images for 3D face reconstruction. However, literature points to some research in shape reconstruction from light field images using deep learning. Heber et al. [20] presented a method for reconstructing the shape from light field images that applies a CNN for pixel wise depth estimation from EPI patches. Although this method produces accurate scene depth, it uses a carefully designed dataset containing drastic slope changes in the EPIs. This method is unsuitable for non-rigid facial geometry reconstruction as faces are generally smooth and their EPIs contain only subtle slope variations. Heber et al. [21] proposed a U-shaped network architecture that automatically learns from EPIs to reconstruct their corresponding disparity images. However, training the network requires disparity maps of all the light field sub-views as labels, which is unrealistic for real datasets. Our approach differs in three ways. Firstly, we use one full EPI as input and its corresponding depth values as labels to overcome the problem of inaccurate depth estimation in the presence of subtle slope variations in the EPIs. Secondly, we train networks using horizontal EPIs and vertical EPIs separately to obtain a more accurate combined 3D pointcloud. Finally, our method does not require disparity maps of all the light field sub-views. 3. Facial Light Field Image Dataset Generation The key to the success of CNN-based 3D face reconstruction from a single RGB image lies in the availability of large training datasets. However, there is no large scale dataset available that provides RGB face images and their corresponding high quality 3D models. Similarly, training a light field face reconstruction network requires a large-scale Figure 3. EPIs corresponding to the 3D face curves. (a) Horizontal and vertical EPIs are obtained between the central view and sub-aperture images that are in the same row and column. (b) and (c) Visualization of the relationship between depth curves and slopes of lines in horizontal and vertical EPIs respectively. light field face dataset with corresponding ground truth 3D facial scans. Over the past few years, the computer vision community has made considerable efforts to collect light field images [22, 53, 33, 35, 1] for different applications. The only public light field face dataset [45] captured by Lytro IllumTM camera consists of 100 identities with 20 samples per person. However, depth maps of this dataset are generated using the Lytro Desktop SoftwareTM and have low resolution as well as low depth accuracy. Therefore, this dataset is not suitable for training a network. In the absence of large-scale 4D light field face datasets, we propose to generate a dataset of light field face images with ground truth 3D models. For this purpose, we use the public BU-3DFE [58] and BU-4DFE [60] databases to generate light field face images. The former is used for training and testing whereas the latter is used only for testing only. The BU-3DFE dataset consists of 2,500 3D scans from 100 identities (56% female, 44% male), with an age range from 18 to 70 years and multiple ethnicities. Each subject is scanned in one neutral and 6 non-natural expressions each with four intensity levels. The BU-4DFE dataset contains 3D video sequences of 101 identities (58 female and 43 male) in six different facial expressions. We select the most representative frame of each expression sequence. As a result, our dataset contains 606 3D scans. These models contain shape details such as wrinkles of not only the fiducial area, but also the hair, ears and neck area which pose challenges for conventional 3D face reconstruction methods. All 3D models have RGB texture. To generate plausible synthetic light field face images, it is crucial to control the light field camera parameters, background and illumination properly during rendering. We use the open source Blender3 software and the light field camera tool proposed by Katrin Honauer et al. [22] for this purpose. We place a virtual light field camera in Blender with 15×15 3 http://www.blender.org Figure 4. Examples of EPIs and their corresponding 3D face curves.(a) Horizontal EPIs. (b) Vertical EPIs. micro-lenses and set its field of view to capture the 3D facial scans. Both BU-3DFE and BU-4DFE databases provide 3D facial models in the near frontal pose. We load the 3D models along with their textures in Blender and apply two rigid rotations (±15◦ ) in pitch and four in yaw (±15◦ and ±30◦ ). To synthesize photo realistic light field images, we apply randomly selected indoor and outdoor images as backgrounds. We place two lamps at different locations in the scene and randomly change their intensities to achieve lighting variations. The angular resolution of the synthetic light field image is 15 × 15 and the spatial resolution is 400×400. The ground truth depth maps are aligned with the central view of light field image. Examples of our synthetic light field images are shown in Figure 2. We implement a Python script4 in Blender on a 3.4 GHz machine with 8GB RAM to automatically generate the light field facial images. The process of synthesizing light field images can be parallelized since each sub-aperture image is rendered independently. In total, we use 80 identities from BU-3DFE dataset to synthesize 14,000 light field images with ground truth disparity maps. The remaining 20 subjects from BU-3DFE and all 101 subjects from the BU4DFE dataset are used as test data to generate 1,451 light field facial images for evaluation. 4. Proposed Method An overview of the proposed method for reconstructing facial geometry from light field image is shown in Figure 1 and the details follow. 4.1. Training Data A 4D light field image can be parameterized as L(u, v, x, y), where (x, y) and (u, v) represent the spatial and angular coordinates respectively [54]. When we fix v and y, then L(u, v ∗ , x, y ∗ ) defines a 2D horizontal EPI. Similarly the 2D vertical EPI can be represented as 4 The script for light field facial image synthesis will be made public. Figure 5. Our proposed FaceLFnet for learning 3D face curves from EPIs. It contains 4 dense blocks, followed by two fully connected layers. The layers between two neighboring blocks are defined as transition layers and change feature map sizes via convolution and pooling [23]. L(u∗ , v, x∗ , y) when we keep u and x constant. As shown in Figure 3, 2D EPIs demonstrate the linear characteristic of the light field image. The orientations of lines within the EPIs can infer the disparity of the corresponding 3D space points [54, 28, 59, 20, 21]. Equation (1) shows the relationship between the slope of the line and the disparity value where f is the light field camera parameter and k is the slope of the line. Z = −f × k, (1) As shown in Figure 3(b) and (c), EPIs correspond to the 3D facial curves from the ground truth. Different line slopes in the EPI indicate different curve shapes. We use 14,000 synthetic light field images corresponding to the 80 identities of BU-3DFE for training. All together we extract 11.2 Million horizontal and vertical EPIs as training samples. Figure 4 shows some example EPIs and their corresponding curves. Using EPI images as training data removes the need for a huge number of identities. Since each 3D face curve can be learned independently from its corresponding EPI, we are able to generate massive training data from a small number of 3D face scans. Note that we do not need any further data augmentation such as image inversion or multiple crops as our networks learn from the full EPIs. 4.2. FaceLFnet Architecture Each EPI in our case corresponds to a 3D face curve as shown in Figure 3 and 4. The goal is to predict the full 3D curve from the EPIs using deep learning. CNNs can learn slope information of the pixels from individual EPIs, however, pixel wise prediction is very challenging. Heber et al. [20] divided each EPI into patches for 3D scene estimation. The authors estimated the depth value from each EPI patch independently as it contained the information pertaining to a single line at the center of the patch. In our case, pixel wise estimation is not practical as our network must learn the inter-relationship between the lines in one full EPI to estimate the complete 3D curve. Furthermore, in case of light field images for faces, some EPI patches especially in the quasi planar facial areas are devoid of lines and hence do not contain enough depth information leading to inaccurate depth estimation. Therefore, we propose using a complete EPI for depth prediction in order to exploit the correlations of adjacent pixels and mitigate the problem of inaccurate depth estimation due to pixel wise prediction. The dimensions of each input EPI are 15 × 400 × 3 (horizontal/vertical sub-aperture images × horizontal/vertical image pixels × RGB channels). Such a low resolution in the first dimension and size disparity in the first two dimensions pose challenges as the information of the input EPIs will reduce rapidly in one dimension than the other when passed through a deep network. To extenuate this problem and inspired by the success of Gao et al. [23], we propose a light field face network for estimating facial geometry from EPIs. The architecture of our network is illustrated in Figure 5. It is based on DenseNet that consists of multiple dense blocks and transition layers. We use four dense blocks and change the softmax classifier to a regressor. Before passing the EPIs through the first dense block, a 16 channels convolution layer with 3 × 3 kernel size is used. For each dense block, we use three convolutional layers and set the growth rate to 12. We also use convolution followed by average pooling as transition layers between two adjacent dense blocks. The sizes of feature-map in the four dense blocks are 15 × 400, Layers Convolution Dense Block 1 Dense Block 4 Output Size 15 × 400 15 × 400 15 × 400 8 × 200 8 × 200 8 × 200 4 × 100 4 × 100 4 × 100 2 × 50 2 × 50 Regression Layer 400 Transition Layer 1 Dense Block 2 Transition Layer 2 Dense Block 3 Transition Layer 3 FaceLFnet 3 × 3 conv, stride 1 [3 × 3 conv, stride 1]×3 3 × 3 conv, stride 1 2 × 2 average pool, stride 2 [3 × 3 conv, stride 1]×3 3 × 3 conv, stride 1 2 × 2 average pool, stride 2 [3 × 3 conv, stride 1]×3 3 × 3 conv, stride 1 2 × 2 average pool, stride 2 [3 × 3 conv, stride 1]×3 4096 fully-connected 400 fully-connected EuclideanLoss Table 1. Our proposed FaceLFnet architecture. Note that each convolutional layer in the dense block corresponds to the sequence BN-ReLU. The growth rate of the four blocks is k = 12. Figure 6. Pose invariance. Columns one to four in each row respectively depict the input central view of the light field image, the ground truth 3D face, the reconstructed 3D face by our proposed method and the last two overlaid on each other. Figure 7. Expression invariance. As shown, our method can handle exaggerated expressions. Columns one to four in each row respectively depict the input central view of the light field image, the ground truth 3D face, the reconstructed 3D face by our proposed method and the last two overlaid on each other. 8 × 200, 4 × 100 and 2 × 50 respectively. The details of network configurations are given in Table 1. Both horizontal and vertical FaceLFnets are trained from scratch using the Caffe deep learning framework [27]. The initial learning rate is set to 0.0003 which is divided by 10 at 30000 and 50000 iterations. Our networks require only one epoch for convergence. The caffe model for the trained networks will be made public. 4.3. 3D Face Reconstruction The output of our horizontal and vertical FaceLFnets are 3D facial curves that together make up a 3D face. We combine all the horizontal and vertical curves (in our case 400 each) of a face to form a horizontal and a vertical depth map separately. The next step is to reconstruct a 3D face from the two depth maps. A naive way to reconstruct the face is to take the average of both depth maps. However, such a methodology results in reconstruction error as each curve was learned independently. To mitigate this problem we propose a technique to project the depth maps on a 2D surface. First of all, we convert both the depth maps to 3D pointclouds, using the camera parameters. Next we give a slight jitter to the horizontal pointcloud by translating it 1mm to the left on x-axis only. We fit a single surface of the form z(x, y) to both 3D pointclouds simultaneously using the gridfit algorithm [10]. Our method ensures that a smooth surface is fitted to the horizontal and vertical Figure 8. Invariance to illumination and skin color. Our method is robust to illumination variations and also works well in the case of dark skin (second row). pointclouds taking into account the correlation between the curves resulting in a smooth reconstructed 3D face. Figure 9. Qualitative results. The columns contain (in order) central view image, the ground truth 3D face, 3D face reconstructed by our method and 3D face reconstructed by Sela et al. [44]. 5. Experimental Results We now present the evaluation of our method for 3D face reconstruction from a single light field image on the 3D scans of the remaining 20 subjects from BU-3DFE and all 101 subjects from the BU-4DFE dataset. We compare our subjective results with the recent state-of-the-art algorithm [44] for qualitative evaluation. We also present quantitative comparison with VRN-Guided [25] and other stateof-the-art methods [44, 41, 64, 31, 63, 24] on both datasets. Note that the VRN-Guided method incorporates facial landmarks in their proposed VRN architecture whereas we follow a marker-less strategy. 5.1. Qualitative Evaluation For qualitative evaluation, we show our reconstruction results on light field images synthesized from BU3DFE [58] and BU-4DFE [60] databases. We also show the ground truth and predicted 3D face shapes overlaid on each other using the Scanalyze software. Figure 6 shows the reconstructed 3D faces under different poses to demonstrate that our method is robust to pose variations. Unlike model based algorithms for 3D face reconstruction [11, 44] from a single RGB image, our method can recover the 3D model of the full head including the peripheral regions such as hair and neck and sometimes even part of the clothing. Figure 7 shows our results under exaggerated expressions while Figure 8 shows our results under illumination changes. Note that our method is robust to variations in pose, expressions and illumination. We use the code provided by Sela et al. [44] for qualitative comparison of the reconstructed faces. Figure 9 shows 3D faces reconstructed from light field images using our method and 3D faces reconstructed from single central view RGB images using the recent state-of-the-art method proposed by Sela et al. [44]. Since [44] estimate only the facial region, we also crop our reconstructed faces for better visual comparison. As demonstrated, our method produces more visually accurate reconstructions in the global geometry compared to [44]. As compared to methods based on fine-tuning, our method can not capture fine details since we use the output of our network directly without complex post-processing steps. Our proposed method performs better than [44] because, firstly, [44] relies on a face detector and crops the input RGB image based on the detected coordinates while our method does not need any face detection or cropping. Secondly, [44] synthesized their training data from 3DMM parameters and thus their training images do not have the neck and hair regions etc. When the input images are far from the model space, the global face shape will be unsatisfactory at some key facial regions like mouth, nose and eyes as can be seen in Figure 9. Finally, Sela et al. [44] use non-rigid registration to fit the 3DMM to the coarse output of the proposed network. The model fitting process deforms the facial shape when the model and the coarse shape estimated by the network are quite different. 5.2. Quantitative Evaluation For quantitative comparison, we evaluate the 3D reconstruction on 3,500 light field images of 20 subjects from BU-3DFE [58] and 1,400 light field images of 101 subjects from the BU-4DFE dataset. To measure the affect of pose on the reconstruction accuracy, we use the 3,500 light field images from BU-3DFE dataset. There are 500 light field images for each pose. We use the Root Mean Square Error (RMSE) between the 3D point clouds of the estimated and ground truth reconstructions as a quantitative measure. Results of RMSE for different poses are depicted in Figure 10. Our method is robust to pose variations as the RMSE error increases by only 0.31mm when the pose is varied by 30 degrees. To measure the affect of facial expressions on reconstruction accuracy, we synthesize frontal images in different expressions (Angry, Disgust, Fear, Happy, Sad and Surprise) from the BU-4DFE dataset and measure the reconstruction errors. Figure 11 shows that the RMSE of 3D face reconstruction from our method is small even in the presence of exaggerated expressions. We compare the absolute depth error of our proposed method with the state-of-the-art in Table 2, which shows that our proposed 3D reconstruction outperforms all existing methods. We report depth errors evaluated by mean, standard deviation, median and the average ninety percent largest error. Note that for a fair comparison with Sela et al. [44] we report the results obtained on the same dataset directly from their paper instead of calculating the reconstruction errors from our implementation of their work. We also compare the results of our method with VRNGuided [25], 3DDFE [63] and EOS [24] methods using the BU-4DFE dataset [60]. We use the Normalized Mean Error (NME) metric proposed by Aarson [25] to report the results for comparison with existing methods. NME is defined as the average per vertex Euclidean distance between the estimated and the ground truth reconstruction normalized by the outer 3D interocular distance: n 1 X kxk − yk k2 , (2) NME = n d k=1 where n is the total number of vertices per facial mesh and d is the interocular distance. xk and yk represent the coordinates of vertices from the estimated and ground truth meshes respectively. The NME is calculated on the face region only. As shown in Table 3, our method outperforms the state-of-the-art. 6. Conclusion We presented a model-free approach for recovering the 3D facial geometry from a single light field image. We proposed FaceLFnet, a densely connected network architecture Figure 10. Reconstruction errors for different facial poses on the BU-3DFE dataset [58]. Note that the RMSE increases from 2.62 to 2.93 (by 0.31 mm only) under extreme pose variations. Figure 11. Reconstruction errors for different facial expressions on the BU-4DFE dataset [60]. The RMSE increases from 2.49 to 2.98 (by only 0.49 mm) under extreme expression variations. Sad has the highest error whereas surprise has the lowest because of more edges around the lips which favors EPI based reconstruction. Error in mm Mean SD Median 90% largest Kemelmacher et al. [31] 3.89 4.14 2.94 7.34 Zhu et al. [64] 3.85 3.23 2.93 7.91 Richardson et al. [41] 3.61 2.99 2.72 6.82 Matan et al. [44] 3.51 2.69 2.65 6.59 Ours 2.78 2.04 1.73 5.30 Table 2. Comparative results on the BU-3DFE dataset [58]. The absolute RMSE between ground truth and predicted shapes evaluated by mean, standard deviation, median and the average ninety percent largest error of the different methods are presented. NME 3DDFA[63] 5.14 EOS[24] 5.33 VRN-Guided[25] 4.71 Ours 3.72 Table 3. Reconstruction errors on the BU-4DFE dataset [60] in terms of NME defined in Eq. (2). ICP has been used to align the reconstructed face to the ground truth similar to [25]. that regresses the 3D facial curves over the Epipolar Plane Images. Using a curve by curve reconstruction approach, our method needs only a few training samples and yet generalizes well to unseen faces. We proposed a photo-realistic light field image synthesis method to generate a large-scale EPI dataset from a relatively small number of real facial identities. Our results show that 3D face reconstruction from light field images is more accurate and allows the use of a model-free approach which is robust to changes in pose, facial expressions, ethnicities and illumination. We conclude that light field cameras are a more appropriate choice as a passive sensor for 3D face reconstruction since they enjoy similar advantages to conventional RGB cameras in that they are point and shoot, portable and have low cost. These cameras are especially a better choice for medical applications where higher accuracy and model-free approaches are desirable. We will make our trained networks and dataset public which will become the first photo-realistic light field face dataset with ground truth 3D facial scans. Acknowledgments This research was supported by ARC grant DP160101458. The Titan Xp used for this research was donated by NVIDIA Corporation. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] http://lightfield.stanford.edu/. 4 https://www.lytro.com/. 2 https://www.raytrix.com/. 2 A. F. Abate, M. Nappi, D. Riccio, and G. Sabatino. 2D and 3D face recognition: A survey. Pattern Recognition Letters, 28(14):1885–1906, 2007. 1 O. Aldrian and W. A. Smith. Inverse rendering of faces with a 3d morphable model. IEEE transactions on pattern analysis and machine intelligence, 35(5):1080– 1093, 2013. 3 P. N. Belhumeur, D. J. Kriegman, and A. L. Yuille. The bas-relief ambiguity. International Journal of Computer Vision, 35(1):33–44, Nov 1999. 1, 2 V. Blanz and T. Vetter. A morphable model for the synthesis of 3d faces. In Proceedings of the 26th annual conference on Computer graphics and interactive techniques, pages 187–194. ACM Press/AddisonWesley Publishing Co., 1999. 3 J. Booth, E. Antonakos, S. Ploumpis, G. Trigeorgis, Y. Panagakis, and S. Zafeiriou. 3d face morphable models ”in-the-wild”. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 3 C. Cao, Y. Weng, S. Lin, and K. Zhou. 3d shape regression for real-time facial animation. ACM Transactions on Graphics (TOG), 32(4):41, 2013. 1 J. D́Erico. Surface fitting using gridfit. In MATLAB Central File Exchange, 2008. 6 P. Dou, S. K. Shah, and I. A. Kakadiaris. End-to-end 3d face reconstruction with deep neural networks. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 1, 2, 3, 7 [12] T. Fang, X. Zhao, O. Ocegueda, S. K. Shah, and I. A. Kakadiaris. 3d/4d facial expression analysis: An advanced annotated face model approach. Image and vision Computing, 30(10):738–749, 2012. 1 [13] S. Z. Gilani, A. Mian, and P. Eastwood. Deep, dense and accurate 3D face correspondence for generating population specific deformable models. Pattern Recognition, 69:238–250, 2017. 2 [14] S. Z. Gilani, A. Mian, F. Shafait, and I. Reid. Dense 3D face correspondence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017. 1 [15] S. Z. Gilani, K. Rooney, F. Shafait, M. Walters, and A. Mian. Geometric facial gender scoring: Objectivity of perception. PloS one, 9(6), 2014. 1 [16] P. Hammond. The use of 3d face shape modelling in dysmorphology. In Archives of disease in childhood, page 92(12), 2007. 1 [17] P. Hammond, C. Forster-Gibson, A. Chudley, et al. Face–brain asymmetry in autism spectrum disorders. Molecular Psychiatry, 13(6):614–623, 2008. 1 [18] Y. Han, J.-Y. Lee, and I. So Kweon. High quality shape from a single rgb-d image under uncalibrated natural illumination. In Proceedings of the IEEE International Conference on Computer Vision, pages 1617–1624, 2013. 2 [19] T. Hassner, S. Harel, E. Paz, and R. Enbar. Effective face frontalization in unconstrained images. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4295–4304, 2015. 3 [20] S. Heber and T. Pock. Convolutional networks for shape from light field. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3746–3754, 2016. 3, 5 [21] S. Heber, W. Yu, and T. Pock. U-shaped networks for shape from light field. In BMVC, 2016. 3, 5 [22] K. Honauer, O. Johannsen, D. Kondermann, and B. Goldluecke. A dataset and evaluation methodology for depth estimation on 4d light fields. In Asian Conference on Computer Vision, pages 19–34. Springer, 2016. 2, 4 [23] G. Huang, Z. Liu, L. van der Maaten, and K. Q. Weinberger. Densely connected convolutional networks. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 5 [24] P. Huber, G. Hu, R. Tena, P. Mortazavian, P. Koppen, W. J. Christmas, M. Ratsch, and J. Kittler. A multiresolution 3d morphable face model and fitting framework. In Proceedings of the 11th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications, 2016. 7, 8 [25] A. S. Jackson, A. Bulat, V. Argyriou, and G. Tzimiropoulos. Large pose 3d face reconstruction from a single image via direct volumetric cnn regression. In The IEEE International Conference on Computer Vision (ICCV), Oct 2017. 7, 8 [26] H.-G. Jeon, J. Park, G. Choe, J. Park, Y. Bok, Y.-W. Tai, and I. So Kweon. Accurate depth map estimation from a lenslet light field camera. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1547–1555, 2015. 2 [27] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. In Proceedings of the 22nd ACM international conference on Multimedia, pages 675–678. ACM, 2014. 6 [28] O. Johannsen, A. Sulc, and B. Goldluecke. What sparse light field coding reveals about scene structure. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3262– 3270, 2016. 5 [29] A. Jourabloo and X. Liu. Pose-invariant face alignment via cnn-based dense 3d model fitting. International Journal of Computer Vision, pages 1–17, 2017. 2, 3 [30] V. Kazemi, C. Keskin, J. Taylor, P. Kohli, and S. Izadi. Real-time face reconstruction from a single depth image. In 3D Vision (3DV), 2014 2nd international conference on, volume 1, pages 369–376. IEEE, 2014. 3 [31] I. Kemelmacher-Shlizerman and R. Basri. 3d face reconstruction from a single image using a single reference face shape. IEEE transactions on pattern analysis and machine intelligence, 33(2):394–405, 2011. 1, 2, 3, 7, 8 [32] N. Li, B. Sun, and J. Yu. A weighted sparse coding framework for saliency detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5216–5223, 2015. 2 [33] N. Li, J. Ye, Y. Ji, H. Ling, and J. Yu. Saliency detection on light field. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2014. 4 [34] H. Lin, C. Chen, S. Bing Kang, and J. Yu. Depth recovery from light field using focal stack symmetry. In Proceedings of the IEEE International Conference on Computer Vision, pages 3451–3459, 2015. 2 [35] K. Marwah, G. Wetzstein, Y. Bando, and R. Raskar. Compressive light field photography using overcomplete dictionaries and optimized projections. ACM Transactions on Graphics (TOG), 32(4):46, 2013. 4 [36] A. Mian, M. Bennamoun, and R. Owens. An efficient multimodal 2d-3d hybrid approach to automatic face recognition. IEEE transactions on pattern analysis and machine intelligence, 29(11), 2007. 1 [37] R. Or-El, G. Rosman, A. Wetzler, R. Kimmel, and A. M. Bruckstein. Rgbd-fusion: Real-time high precision depth recovery. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5407–5416, 2015. 2 [38] A. Patel and W. A. Smith. 3d morphable face models revisited. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 1327–1334. IEEE, 2009. 3 [39] C. Queirolo, L. Silva, O. Bellon, and M. Segundo. 3D face recognition using simulated annealing and the surface interpenetration measure. IEEE TPAMI, 32(2):206–219, 2010. 1 [40] E. Richardson, M. Sela, and R. Kimmel. 3d face reconstruction by learning from synthetic data. In 3D Vision (3DV), 2016 Fourth International Conference on, pages 460–469. IEEE, 2016. 1, 2, 3 [41] E. Richardson, M. Sela, R. Or-El, and R. Kimmel. Learning detailed face reconstruction from a single image. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 3, 7, 8 [42] J. Roth, Y. Tong, and X. Liu. Adaptive 3d face reconstruction from unconstrained photo collections. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 4197–4206, 2016. 3 [43] A. Savran, N. Alyüz, H. Dibeklioğlu, O. Çeliktutan, B. Gökberk, B. Sankur, and L. Akarun. Bosphorus database for 3d face analysis. Biometrics and identity management, pages 47–56, 2008. 1 [44] M. Sela, E. Richardson, and R. Kimmel. Unrestricted facial geometry reconstruction using image-to-image translation. In The IEEE International Conference on Computer Vision (ICCV), Oct 2017. 2, 3, 7, 8 [45] A. Sepas-Moghaddam, V. Chiesa, P. L. Correia, F. Pereira, and J.-L. Dugelay. The ist-eurecom light field face database. In Biometrics and Forensics (IWBF), 2017 5th International Workshop on, pages 1–6. IEEE, 2017. 4 [46] H. Sheng, P. Zhao, S. Zhang, J. Zhang, and D. Yang. Occlusion-aware depth estimation for light field using multi-orientation epis. Pattern Recognition, 2017. 2 [47] D. W. Tan, S. Z. Gilani, M. T. Maybery, A. Mian, A. Hunt, M. Walters, and A. J. Whitehouse. Hypermasculinised facial morphology in boys and girls with autism spectrum disorder and its association with symptomatology. Scientific Reports, 7(1):9348, 2017. 1 [48] M. W. Tao, P. P. Srinivasan, J. Malik, S. Rusinkiewicz, and R. Ramamoorthi. Depth from shading, defocus, and correspondence using light-field angular coherence. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 1940– 1948, 2015. 2 [49] J. Thies, M. Zollhofer, M. Stamminger, C. Theobalt, and M. Nießner. Face2face: Real-time face capture and reenactment of rgb videos. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2387–2395, 2016. 1 [50] J. Tian, Z. Murez, T. Cui, Z. Zhang, D. Kriegman, and R. Ramamoorthi. Depth and image restoration from light field in a scattering medium. In The IEEE International Conference on Computer Vision (ICCV), Oct 2017. 2 [51] A. Tuan Tran, T. Hassner, I. Masi, and G. Medioni. Regressing robust and discriminative 3d morphable models with a very deep neural network. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 2, 3 [52] T.-C. Wang, A. A. Efros, and R. Ramamoorthi. Occlusion-aware depth estimation using light-field cameras. In Proceedings of the IEEE International Conference on Computer Vision, pages 3487–3495, 2015. 2 [53] T.-C. Wang, J.-Y. Zhu, E. Hiroaki, M. Chandraker, A. A. Efros, and R. Ramamoorthi. A 4d light-field dataset and cnn architectures for material recognition. In European Conference on Computer Vision, pages 121–138. Springer, 2016. 2, 4 [54] S. Wanner and B. Goldluecke. Variational light field analysis for disparity estimation and super-resolution. IEEE transactions on pattern analysis and machine intelligence, 36(3):606–619, 2014. 4, 5 [55] A. J. Whitehouse, S. Z. Gilani, F. Shafait, A. Mian, D. W. Tan, M. T. Maybery, J. A. Keelan, R. Hart, D. J. Handelsman, M. Goonawardene, et al. Prenatal testosterone exposure is related to sexually dimorphic facial morphology in adulthood. In Proc. R. Soc. B, volume 282. The Royal Society, 2015. 1 [56] G. Wu, M. Zhao, L. Wang, Q. Dai, T. Chai, and Y. Liu. Light field reconstruction using deep convolutional network on epi. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 2 [57] Z. Xiong, L. Wang, H. Li, D. Liu, and F. Wu. Snapshot hyperspectral light field imaging. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 2 [58] L. Yin, X. Wei, Y. Sun, J. Wang, and M. J. Rosato. A 3d facial expression database for facial behavior re- search. In Automatic face and gesture recognition, 2006. FGR 2006. 7th international conference on, pages 211–216. IEEE, 2006. 2, 4, 7, 8 [59] S. Zhang, H. Sheng, C. Li, J. Zhang, and Z. Xiong. Robust depth estimation for light field via spinning parallelogram operator. Computer Vision and Image Understanding, 145:148–159, 2016. 5 [60] X. Zhang, L. Yin, J. F. Cohn, S. Canavan, M. Reale, A. Horowitz, and P. Liu. A high-resolution spontaneous 3d dynamic facial expression database. In Automatic Face and Gesture Recognition (FG), 2013 10th IEEE International Conference and Workshops on, pages 1–6. IEEE, 2013. 2, 4, 7, 8 [61] W. Y. Zhao and R. Chellappa. Illuminationinsensitive face recognition using symmetric shapefrom-shading. In Computer Vision and Pattern Recognition, 2000. Proceedings. IEEE Conference on, volume 1, pages 286–293. IEEE, 2000. 2 [62] H. Zhu, Q. Zhang, and Q. Wang. 4d light field superpixel and segmentation. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), July 2017. 2 [63] X. Zhu, Z. Lei, X. Liu, H. Shi, and S. Z. Li. Face alignment across large poses: A 3d solution. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 146–155, 2016. 7, 8 [64] X. Zhu, Z. Lei, J. Yan, D. Yi, and S. Z. Li. Highfidelity pose and expression normalization for face recognition in the wild. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 787–796, 2015. 7, 8
1cs.CV
Group Decision Simulation 1 Evolutionary perspectives on collective decision making: Studying the implications of diversity and social network structure with agent-based simulations Hiroki Sayama Collective Dynamics of Complex Systems Research Group Departments of Bioengineering & Systems Science and Industrial Engineering Binghamton University, State University of New York, Binghamton, New York Phone: (607) 777-4439 Fax: (607) 777-5780 Email: [email protected] Shelley D. Dionne Center for Leadership Studies, School of Management Binghamton University, State University of New York, Binghamton, New York Francis J. Yammarino Center for Leadership Studies, School of Management Binghamton University, State University of New York, Binghamton, New York Abstract Collective, especially group-based, managerial decision making is crucial in organizations. Using an evolutionary theory approach to collective decision making, agent-based simulations were conducted to investigate how collective decision making would be affected by the agents’ diversity in problem understanding and/or behavior in discussion, as well as by their social network structure. Simulation results indicated that groups with consistent problem understanding tended to produce higher utility values of ideas and displayed better decision convergence, but only if there was no group-level bias in collective problem understanding. Simulation results also indicated the importance of balance between selection-oriented (i.e., exploitative) and variation-oriented (i.e., explorative) behaviors in discussion to achieve quality final decisions. Expanding the group size and introducing non-trivial social network structure generally improved the quality of ideas at the cost of decision convergence. Simulations with different social network topologies revealed that collective decision making on small-world networks with high local clustering tended to achieve highest decision quality more often than on random or scalefree networks. Implications of this evolutionary theory and simulation approach for future managerial research on collective, group, and multi-level decision making are discussed. Keywords: collective decision making, evolutionary theory, agent-based simulation, group homogeneity and heterogeneity, social networks Group Decision Simulation 2 Evolutionary perspectives on collective decision making: Studying the implications of diversity and social network structure with agent-based simulations Abstract Collective, especially group-based, managerial decision making is crucial in organizations. Using an evolutionary theory approach to collective decision making, agent-based simulations were conducted to investigate how collective decision making would be affected by the agents’ diversity in problem understanding and/or behavior in discussion, as well as by their social network structure. Simulation results indicated that groups with consistent problem understanding tended to produce higher utility values of ideas and displayed better decision convergence, but only if there was no group-level bias in collective problem understanding. Simulation results also indicated the importance of balance between selection-oriented (i.e., exploitative) and variation-oriented (i.e., explorative) behaviors in discussion to achieve quality final decisions. Expanding the group size and introducing non-trivial social network structure generally improved the quality of ideas at the cost of decision convergence. Simulations with different social network topologies revealed that collective decision making on small-world networks with high local clustering tended to achieve highest decision quality more often than on random or scalefree networks. Implications of this evolutionary theory and simulation approach for future managerial research on collective, group, and multi-level decision making are discussed. Keywords: collective decision making, evolutionary theory, agent-based simulation, group homogeneity and heterogeneity, social networks Group Decision Simulation 3 Evolutionary perspectives on collective decision making: Studying the implications of diversity and social network structure with agent-based simulations 1 Introduction Collective decision making plays an increasingly important role in society and organizations today (Mannes 2009; Kerr and Tindale 2004). In high-tech industries, for example, the number of engineers participating in the design of a single product can amount to hundreds or even thousands due to the increase of the product’s complexity far beyond each individual engineer’s capacity, which almost inevitably results in suboptimal outcomes (Klein et al. 2003a). Another example is the online collective decision making among massive anonymous participants via large-scale computer mediated communication networks, including collective website/product rating and common knowledge base formation (O’Reilly 2005). In these and related cases, participants and their societal or organizational structure may influence the final outcome of decision making processes. The complexity of the process is more pronounced when the participants are heterogeneous and are embedded in a topologically nonuniform network with differential distribution of power, as in most organizations and social systems. The dynamics of collective decision making in such conditions are poorly understood, and as such poses a significant challenge for the social and organizational sciences. Evidence of this challenge exists within the leadership, psychology and organizational behavior/management disciplines where collective dynamics, using both experimental and applied studies, generally emphasize linear statistical relationships between specific, narrowly defined team- or individual-level variables (Kerr and Tindale 2004; Salas et al. 2004; Dionne et al. 2012). Traditional studies seldom account for nonlinear dynamical processes that take place in a high-dimensional problem space and/or non-trivial social structure where interactions occur within a networked organizational structure. Abbott (2001) highlights this problem within the social sciences by discussing a “general linear reality,” where mainstream social science theories and methods treat linear models as actual representations of social systems. Further, Meyer et al. (2005) assert that reinforcing assumptions of linearity and equilibrium have “blocked the investigation of a family of interesting problems of great practical import (p. 456).” In other words, researchers point to an oversimplification of collective processes in general and collective decision making in particular. Examples of recent research not necessarily following a “general linear reality” to model inherent complexity in social systems are found within the complex systems research community, where social processes are studied using a mathematical/computational modeling approach (Simon 1955; Axelrod 1981; Epstein and Axtell 1996; Bar-Yam 1997; Bar-Yam 2004; Gilbert and Troitzsch 1999; Sterman 2000; Epstein 2006; Miller and Page 2007; Sayama, Farrell and Dionne 2011; Yamanoi and Sayama Group Decision Simulation 4 2012). Because emphasis is on emergent dynamical behavior of systems caused by nonlinear interactions among massive numbers of parts (a pervasive phenomenon also found in fields such as physics, biology, sociology, psychology, economics, engineering and computer science), advances in other scientific domains for modeling complex systems may benefit organizational research (Carroll and Burton 2000). Thus, the aim of this research is to enhance performance of groups and other entities involved in collective decision making. Collective decision making implies a larger clustering of individuals with interdependency based on shared expectations or hierarchy. Collectives can be complicated structures and include individuals, groups, functional business units and even larger industry alliances and networks (Dansereau, Alutto and Yammarino, 1984; Yammarino and Dansereau 2002; Yammarino et al. 2005). We seek to improve our understanding of both the dynamic nature of the collective decision process, as well as the influence of diversity and social connectivity issues related to decision making involving a number of participating group members. Employing evolutionary views in understanding decision making enables a uniform, straightforward explanation of many empirical findings about the effects of group composition and dynamics on group performance. Considering specific within-group level issues regarding the collaborative process of decision making also may offer clarity regarding the influence of group composition on performance. Borrowing from advances in complex systems enables a dynamic, withinlevel examination of an evolutionary collective decision process via computational modeling. To better understand decision making in collective and dynamic environments, we offer an alternative model of collective decision making based on evolutionary theory, examining the issues of diversity/heterogeneity in decision making groups and the effects of non-trivial social network structure among the group members on decision outcomes. We first explore how evolutionary theory can address complex changes over time by providing an explanatory framework for collective decision processes, and then discuss how specifying a targeted level of analysis can inform appropriate interpretation and limitations of decision making in dynamic environments. Finally, a computational agent-based model (Epstein 2006) with an evolutionary focus on collective decision making in groups and social networks is developed and tested, with diversity of problem understanding and behavioral patterns and social network structure manipulated as experimental variables. Specifically, four recommendations can be adapted to advance our theoretical understanding of collective decision making in complex social systems: 1) consider the impact of time; 2) study situations in flux; 3) incorporate nonlinear concepts into evolutionary theorizing; and 4) design multi-level research (Meyer et al. 2005) that takes into account complex social network topologies. These guidelines provide a starting point for investigating the complexity of collective decision making with an evolutionary and multi-level, network-oriented framework. Prior dynamical modeling in organizational research may have Group Decision Simulation 5 considered the impact of time and situations in flux; few if any, however, have included specific evolutionary and multi-level, network-oriented concepts. 2 Evolutionary theory and collective decision making Evolutionary theory describes adaptive changes of populations primarily by combining mechanisms of variation and selection (Futuyma 2005; Wilson 2005). The roles of these two mechanisms are similar to what was already discussed as “exploration” and “exploitation” in organizational learning literature (March 1991). In biological evolution, variation is caused primarily by internal genetic mechanisms (e.g., mutation and recombination) and plays an exploratory role that could potentially lead to a novel possibility of life form, but it usually reduces immediate competitiveness of a population. In contrast, selection is caused primarily by external environment (e.g., natural and sexual selection) and plays an exploitative role that enhances the presence of successful entities (genes, individuals, or groups) and eliminates unsuccessful ones, reducing the number of possibilities while potentially improving the overall competitiveness of the population. A dynamically maintained balance of the two mechanisms is the key to a successful evolutionary adaptation (Mitchell et al. 1991). We propose that decision making processes within a collective (such as a group or an organization) also may be viewed through a similar lens, by shifting the viewpoint from members’ personal properties (a more traditional psychological and decision making approach) to dynamical changes of ideas being discussed within the collective, where populations of potential ideas evolve via repetitive operations such as reproduction, recombination, mutation, and selection of ideas, conducted by participating members (Sayama and Dionne 2013a; Sayama and Dionne 2013b). Table 1 provides a brief summary of the evolutionary framework we propose by illustrating how some key evolutionary operators and concepts can be linked to decision factors. We take this approach because evolutionary theory provides a powerful theoretical framework that can readily address complex changes of systems over time in extremely highdimensional problem space, and also its explanatory mechanisms (heredity, variation, and selection) are theoretically clean-cut and easily accessible (Wilson 2005). Moreover, by shifting the viewpoint from individuals to ideas, a model could be liberated from the commonly used but somewhat artificial assumption that each individual always has his/her decision in mind. Rather, various ideas developed within and among participants are collectively reflected in the idea population, to which diverse withinindividual cognitive/behavioral patterns can be easily applied as a set of multiple evolutionary operators simultaneously acting on the same, shared idea population. -----------------------------Insert Table 1 Here -----------------------------2.1 Evolutionary operators and collective decision processes Group Decision Simulation 6 Many evolutionary operators (Mitchell 1996; Fogel 1995) can be conceived as a representation of diverse human behaviors in discussion and decision making processes (Sayama and Dionne 2013a; Sayama and Dionne 2013b; also see Table 1). For a selection-oriented example, replication of an idea is a form of positive selection, where the popularity of an idea is increased within the population of ideas. This action can be considered as advocacy of a particular idea under discussion. Similarly, criticism against an idea may also be considered a form of negative, subtractive selection. Criticism singles out an idea with poor utility and reduces its popularity within the population of ideas. Both positive and negative selections seek to narrow decision possibilities based on utilities (“fitness”) of ideas perceived by participants. For a variation-oriented example, random point mutation makes random changes to existing ideas by asking “what if”-type questions. Likewise, intelligent, or hill-climbing point mutation (Klein et al. 2003b), which is not present in biological evolution but may be relevant to include in collective decision making, initially begins like random point mutation, however several variations from the original idea may occur, with final selection of the idea with the highest perceived utility. Recombination represents the creation of a new idea by crossing multiple existing ideas. These variation-oriented evolutionary operators enhance the explorative capabilities of the population, but generally reduce their immediate fitness. To illustrate the typical evolutionary operators that may be present in collective decision making, consider a collective decision task for a design and marketing group from a toy maker that wants a stronger presence in the girls toys market. The company currently has a strong presence in the boys toys market with a construction block toy, but the toy’s predominantly primary and/or dark color blocks, rectangular and square shapes that construct buildings and vehicles, and generic figures that look like little men have not had significant appeal to girls. The team is charged with moving into the girls toys market to appeal to the other 50% of toy users. Here are some examples of evolutionary operators in action. 2.1.1 Replication One designer offers an idea to increase the color palate currently offered in the bricks, adding pastels and lighter colors. Another designer offers an idea to produce new shapes of blocks besides predominantly four-sided, regular blocks. Another designer thinks they should consider developing snap together jewelry. A marketing member of the team states they do not have an idea, but they really like the new color palate idea. This concurrence with a prior idea increases its popularity by adding an exact copy of an idea that already exists in the population, and is a form of advocacy. 2.1.2 Random Point Mutation One designer takes the new color palate idea and wonders “what if” figures could be color coordinated as well, and moreover, some figures could look like little women, not just little men. The Group Decision Simulation 7 copied idea (new color palate) is offered, but with a focus on including new figure designs (i.e., different gender) that could be outfitted in different colors. This random change to an existing idea represents random point mutation. 2.1.3 Intelligent Point Mutation Consider the idea generated above, where new figures of both men and women have color palates such as dark and bright colors on men figures and light and pastel colors on women figures. After a period of reflection of some of team’s ideas under consideration, a new idea emerges. For example, after the color palette idea emerges, each of the designers considers this new direction for a while. Then, someone suggests, with confidence, that adding accessories such as hats, shoes, hair and clothing, to customize the figures, would be the best way to go. His/her confidence comes from several internal trial-and-error thought processes inside him/her, which makes his/her suggestion more intelligent than other random “what-if” suggestions. 2.1.4 Recombination Consider a creativity exercise for the toy makers where all generated ideas are written down and placed into a jar. Two ideas are pulled from the jar randomly and the team is told to generate new ideas by linking them together. For example, a person may draw the ideas “new shapes for blocks” and “accessories for male and female figures” to develop an idea that accessories should snap on using the same technology that snap building blocks together. This idea means some new shapes (i.e., round blocks for hats, hair) need to be constructed and applied to the figures. This combines accessorizing figures with new shapes for building blocks (i.e., recombination of ideas). 2.1.5 Subtractive Selection In the discussion, someone may state that snap together jewelry moves too far away from the brand and therefore should be stricken from the idea list. This represents subtractive selection. This reduces the popularity of the idea in discussion so that its chance of being considered favorably may become lower. Moreover, besides the evolutionary operators, other evolutionary concepts can be adapted or applied to a collective decision making process as well. A group’s problem or decision space may be likened to a genetic possibility space. A potential idea , or set of choices for all aspects of a problem, may be akin to a genome. Similarly, a particular aspect of the problem could map to a locus on a genome, whereas a specific choice made for a particular aspect may be likened to allele (i.e., specific gene) on a locus. Adding to parallels in evolutionary framework application to decision making, consider that a set of potential ideas under discussion may map to the concept of population. Additionally, perceived (or real) utility value of a potential idea may represent fitness, and the increased utility value achieved by the idea population may be likened to adaptation. Group Decision Simulation 8 As summarized in Table 1, using an evolutionary theory perspective, we define collective decision making as ecologies of ideas over a social network habitat, where populations of potential ideas evolve via continual applications of evolutionary operators such as replication, recombination, mutation, selection, and migration, each conducted by participating group members. Thus, there appears to be an intuitive parallel between an evolutionary framework and a collective decision process. Applying an evolutionary theory to collective decision making seems consistent with the spirit of the Meyer et al. (2005) suggestions regarding improvement of research techniques to better reflect situations in flux and nonlinear concepts within an evolutionary framework. The next section addresses another important Meyer et al. (2005) concern: multi-level research. 3 Levels of analysis and evolution Evolutionary biologists Wilson and Wilson (2008) reiterate the link between adaptation and a specific regard for levels of analysis in reviewing the history of multi-level selection theory. Wilson and Wilson’s (2008) recent evolutionary perspective on multi-level selection challenges researchers to evaluate the balance between levels of selection, specifically where within-group selection is opposed by between-group selection. This deeper view of a multi-level evolutionary process can be applied to organizational research as well (Yammarino and Dansereau, 2011). Research on both levels of analysis within organizational behavior (Yammarino and Dansereau 2002; Dansereau et al. 1999; Klein et al. 1994; Dansereau et al. 1984) and on group collaborative processes (Chang and Harrington 2005, 2007; van Ginkel and van Knippenberg 2008) highlight the importance and value of explicitly viewing the heterogeneity and/or homogeneity of the group and/or collective. This homogeneity and heterogeneity perspective can be viewed as a within-level examination, where the entity of interest remains the group, but there can be at least two valid views at the collective level: homogeneity (what evolutionary theory refers to as a between-group focus) and heterogeneity (what evolutionary theory refers to as a withingroup focus). These two different perspectives for viewing groups are aligned with the concept of group wholes and group parts, a theoretical distinction developed within organizational behavior and applied to various research domains such as leadership and group dynamics (Yammarino and Dansereau 2002, 2011; Yammarino et al. 2005; Dansereau et al. 1999; Klein et al. 1994; Dansereau et al. 1984). A group wholes perspective indicates homogeneity within the group, and the relevant focus on the entity (i.e., groups) would be between groups, since differences within groups would be considered random (i.e., error). Conversely, a group parts perspective indicates heterogeneity within groups, and the relevant focus on the entity (i.e., groups) would be within groups, since differences between groups would be considered random (i.e., error). Group Decision Simulation 9 3.1.1 Homogeneity (group wholes, or between-group differences condition) The concept of differing perspectives on an entity can provide more specific insights regarding group processes, in that phenomena of interest may be more relevant when groups are homogeneous regarding their membership, but differ in characteristics from other groups. In this wholes condition, all members within a group possess the same (or at least very similar) characteristic, while in the next group all members possess some other characteristics that first group perhaps did not. Another view can be taken concerning amounts of a characteristic present, where members of a group would possess the same amount of a characteristic, while members of the next group also would possess the same characteristic, but all members would have more of that characteristic, or all members would have less of that characteristic. This view represents one patterning of characteristics and individuals in groups— homogeneity. 3.1.2 Heterogeneity (group parts, or within-group differences condition) From a contrasting perspective, phenomena of interest may be more relevant when groups are heterogeneous regarding their memberships. In this case, members within a group would have varying degrees of a characteristic, and the next group also would have members with varying degrees of a characteristic, and the same applies for all groups. This view is another patterning of characteristics and individuals in groups—heterogeneity. 3.2 Decision research and levels of analysis Precedent for a broadly applicable modeling approach has been established in the evolving architecture of problem-solving networks (Chang and Harrington 2007). This research enabled consideration of a generic problem-solving environment and assessment of emergence regularity of connectors within the problem environment. Moreover, Chang and Harrington’s research related to the modeling of both homogenous agents (2005) and heterogeneous agents (2007) is of interest to our work. Specifically, we use homogeneity and heterogeneity of groups as means for examining levels of analysis issues related to collective and/or group processes. Although Chang and Harrington’s (2005, 2007) modeling examines a more multi-level relationship between agents (individuals) and the larger environment, we are concerned with examining a withingroup, collective or collaborative decision process, where individuals would not be considered outside of the group. Our examination of a unique within-level evolutionary process, employing both within-group and between-group perspectives, is a novel view of collaborative decision making and advances the understanding of a collective environment. And, while Meyer and colleagues (2005) called for more multi-level research, this unique and deliberate view within a single level of analysis, but employing multiple perspectives (i.e., wholes/homogeneity and parts/heterogeneity) on that level, also advances social research in that it moves the field away from an oversimplified view of groups. Group Decision Simulation 10 A critical distinction of our research is that we are interested in examining a type of process occurring within the group over time, not necessarily the specific variables within the process. Dansereau, Yammarino and Kholes (1999) highlighted the nature of such research on differing perspectives of an entity and entity changes rather than on changes in specific variables over time. Because we are interested in the type of process occurring within the group during decision making, we agree with Dansereau and colleagues (1999) that the variables that characterize the level may change or remain stable, but the level of interest remains the same (in our case, the level of interest remains the group). Related, diversity and/or homogeneity and heterogeneity of groups and information sharing (Gruenfield et al. 1996; Gigone and Hastie 1993; Stasser and Stewart 1992; Stasser and Titus 1985) present an additional layer to the decision process that requires consideration. Nijstad and Kaps (2007) noted that homogeneity of preferences leads to a lack of sharing of unique information within a group, whereas preference diversity prevented premature consensus of the group and facilitated unbiased discussions of preferences. Lightle, Kagel and Arkes (2009) indicated individual heterogeneity in information recall may play an role in failure to identify hidden profiles within groups. Similarly, van Ginkel and van Knippenberg (2008) found that groups in decision tasks performed better when task representations emphasized information elaboration and the group acknowledged they shared the view of the task representation. These findings reinforced that groups tend to focus on finding common ground and reaching consensus, but highlighted the importance of understanding, as a group, the task representation. This shared understanding could be critical to group success and adaptation, and as such, we include an indicator of how well group members share a view of what constitutes the problem. Although advancements in decision research continue, many continue to focus on individual-level aspects related to a decision maker, such as how they adopt practical behavior rules (Maldonato 2007) or identification of performance moderator functions that may affect individual behaviors in simulated environments (Silverman et al. 2006). While multi-level implications exist in recent decision research (Nijstad and Kaps 2007; Van Ginkel and van Knippenberg 2008), there is limited specific focus on within-group level aspects of a decision process. Moreover, Maldonato (2007) notes there is likely no best way to view the decision process. As such, there may be some benefit to development of a preliminary model exploring the effect of membership similarity and differences on group-based decision processes from evolutionary and levels of analysis-based perspectives. Development of such a model advances understanding of collective decision making in that it builds on prior key decision research (Nijstad and Kaps 2007; Chang and Harrington 2007; Kock 1999, 2004; Knudsen and Levinthal 2007), incorporates the suggestions of improving organizational research offered by Meyer et al. (2005), and incrementally increases the complexity yet fuller understanding of the phenomena represented in prior collective decision models. The specific model assumptions are discussed in the next section. Group Decision Simulation 11 4 Modeling Dynamic Collective Decision Making Applying computational modeling to dynamical processes such as collective decision making may enable organizational researchers to more appropriately represent the potential nonlinearity of a collective process. For example, interdisciplinary exchange may have informed recent organizational research which includes several dynamical models proposed for collective decision making over social networks that consist of many interacting individuals (Klein et al. 2003a; Battiston et al. 2003a; Battiston et al. 2003b; Rodriguez and Steinbock 2004). These models, primarily an extension of models developed in theoretical physics, provide a novel, promising direction for research on group dynamics and collective decision making. A limitation of this research and more specifically its ability to model complex social systems, however, is the consideration of only simple problem spaces, typically made of binary or continuous numerical choices between 0 and 1. Increasingly complex nonlinear problem space has been modeled (Klein et al. 2003b; Rusmevichientong and Van Roy 2003, Klein et al. 2006) to consider interdependent networks of multiple aspects of a complex problem. This research, however, was not modeled in a collective, nontrivial societal context. This is not surprising because problems arise with collective decision models in that they commonly assume every individual agent has or makes his/her own decision. Following these assumptions, the collective decision making dynamic is represented as a process of propagation, interaction and modification of individual decisions. This is an over-simplified assumption compared to actual cognition processes and behavior of individuals and collectives (Lipshitz et al. 2001; Salas and Klein 2001). Individuals often keep multiple ideas in mind and may remain undecided during or even after a collective-level decision emerges. The collective decision forms not just through the interactions of individual decisions but also through the more active, dynamic exchanges of incomplete ideas and mental models being developed by every individual (Dionne, Sayama, Hao and Bush 2010). Such withinindividual mental and behavioral complexity has just begun to be included in computational models (c.f., Knudsen and Levinthal 2007; Dionne and Dionne 2008), and should be taken into account to a greater extent in order to investigate more detailed, dynamic aspects of collective decision making (Salas and Klein 2001). Although powerful in their ability to examine beyond the “general linear reality,” dynamical models of collective decision making are still at an initial, preliminary stage. However, if limitations in current collective decision research (such as those over-simplifications noted above) are straightforwardly addressed in a single model, the resulting model may be too complex to be useful and effective for scientific enquiries. Because so many details would be involved, the model may not be “transparent” enough to offer clear relationships between assumptions and outcomes (Miller and Page 2007, Adner et al. 2009, Ren, Carley and Argote 2006). Therefore, collective decision making models need to carefully Group Decision Simulation 12 balance the ability to represent the complexities of dynamical social interactions against the ability to straightforwardly explain collective decision processes and outcomes. In view of such contexts for computational models of social and organizational sciences, an agentbased model has already been proposed that applied the evolutionary framework introduced in the prior section to model collective decision making processes within a small-sized, well-connected social network structure (Sayama and Dionne 2013a, Sayama and Dionne 2013b). This model was used to conduct a specific within-level analysis on how homogeneity or heterogeneity of goals and decision utility functions among participants affect dynamics and the final outcomes of their collective decision making. We present here a new agent-based model that implements a systematic control of agents’ behavioral balance between selection-oriented and variation-oriented operators, together with much larger, non-trivial social network structure on which agents exchange ideas locally. We believe that our approach to social dynamics research can move the social sciences away from an oversimplified view in that it investigates nonlinear change in organizational research (Meyer et al. 2005). Moreover, examining a new theoretical framework is consistent with development of computational models, as Adner et al. (2009) recognize that simulation is generally an exercise in theory building. 4.1 4.1.1 Model assumptions Groups, or social networks Our model assumes that N agents are connected to a finite number of other agents via links through which ideas are exchanged. Each agent can memorize multiple ideas in its mind. Multiple copies of a single idea may be present, which represents a form of relative popularity for that idea to the agent. Each agent is initialized with a small number of randomly generated ideas in its mind at the beginning of a simulation. The agents begin to perform a set of actions on the population of ideas in their minds repeatedly for a fixed number of iterations. The order by which the agents take actions is randomized every time, but it is guaranteed that every agent does take exactly one action per iteration. This roundrobin format is commonly used in idea sharing phases with decision making techniques such as a nominal group technique and various brainstorm initiatives (Paulus and Yang 2000; Van de Ven and Delbecq 1974). As such, the number of actions performed in a simulation is a product of the number of agents N and the number of iterations T. While other group decision research has modeled hierarchical teams in decision models (c.f., Dionne and Dionne 2008), we make no assumptions regarding predetermined leadership and/or abilities within the team as several teams in organizations are self-led and share leadership responsibilities (Salas, Stagl and Burke 2004; Salas and Klein 2001). We investigate the potential impact of varying membership within the group (i.e., no assumption of identical abilities or uniform connectivities in general) on the Group Decision Simulation 13 potential pool of ideas. Since no single person is powerful enough to eliminate an idea from the group (i.e., shared leadership), we assumed that actions were performed on single copies of an idea, not the equivalence set of all idea replicates (described in detail below). 4.1.2 Utility functions The use of utility functions in collective decision research is a natural outgrowth of earlier research by Hollenbeck et al. (1995) noting team decision making theory can be considered an adaptation of individual decision models and decision alternatives can vary along a univariate continuum. This view supplies a multi-level (e.g., group parts and group wholes) perspective and allows for adaptation of individual utility functions throughout a collective decision process. Both factors can be represented and/or captured by collective decision computer models (c.f., Dionne and Dionne 2008). As such, the use of utility functions contributes to the development of this model as well. Agents develop and exchange ideas in an M-dimensional binary problem space, with a total of 2M possible ideas. For a simulation, every idea has an inherent utility value specified by a true utility function UT that is unavailable to any agent. Individual agents perceive idea utility values based on their own utility functions Uj constructed by adding noise to the master utility function UM. The master utility function UM may or may not be the same as UT, depending on the possibility of group-level bias (explained below). This initialization reflects the notion that today’s organizational problems are too complex for a single individual to solve (i.e., true utility value not available to any of group members), and therefore groups or collectives are assembled to solve problems and make decisions (Klein et al. 2003a; Salas and Klein 2001). Ideally, collectives function by bringing unique information from members (i.e., individual utility functions) together in such a way as to produce ideas that exceed an individual’s idea development capability (Kerr and Tindale 2004). We develop a semi-continuous assignment of utility values in the problem space in the following way. First, n representative ideas S = {vi} ( i = 1…n ) are randomly generated as strings of bits (zeros and ones), where each vi represents one idea of M bits. One idea is assigned the maximum utility value, 1, and another, the minimum utility value, 0. The remaining n – 2 ideas are assigned a random real value between 0 and 1. This action ensures that the entire range of utility values is always from 0 to 1, which makes it easier to compare different simulation results. The detailed shape of the distribution varies within this range for different simulation runs. The utility values of all possible ideas in the domain of the true utility function are defined by interpolation using the utility values of representative ideas in S. We use the Hamming distance as a measure of dissimilarity between two bit strings, which reflects the number of bits for which two strings vary (Hamming 1950). With this measure, the utility value of each possible idea v not present in S is calculated as a weighted average of the utility values of the representative ideas as follows: Group Decision Simulation 14 UT ∑ (v ) = n i =1 U T (vi ) ⋅ D(vi , v) −2 ∑ D(vi , v) −2 i =1 n (1) where v ∉ S is the idea in question, UT(vi) is the utility of a representative idea vi in S, and D(vi, v) is the Hamming distance between vi and v. This weighted average based definition gives the true utility function UT(v) a reasonably “smooth” utility value assignment in a high-dimensional problem space (i.e., similar ideas tend to have similar utility values in general). Such an underlying structure of the problem space is necessary for intelligent collective decision making to be better than unintelligent random trial and error. Note that the utility landscape construction method described above is different from that of Kauffman’s N-K fitness landscapes often used in management science (Kauffman 1993; Levinthal 1997; Rivkin 2000). We chose this approach because our method makes it easier and more straightforward to introduce group-level bias, i.e., discrepancy between the true and master utility functions. Group-level bias is simulated by adding random perturbation when the master utility function UM is constructed from the true utility function UT. Specifically, a bias β is included in the master utility function by flipping bits with probability 0.25β per bit on representative ideas in S, and by adding a random number in [–β, β] to utility values of the representative ideas. Their utility values are then renormalized to the range [0, 1]. The master utility function UM is then generated from these perturbed representative idea set in the same way as in Eq. (1). Adding bias changes fidelity of information at the group level, where β = 0 denotes perfect understanding of the problem (UM = UT) as a collective, while complete lack of understanding is asymptotically approached as bias increases. Moreover, each agent will unconsciously have a different set of utility values for the possible ideas of the problem. Individual utility functions Uj(v) ( j = 1…N ) are generated by adding random noise to the master utility function UM so that: U j (v) ∈ [max(U M (v) − ξ , 0), min(U M (v) + ξ ,1)] (2) for all v, where ξ is the parameter that determines the range of noise. Figure 1 shows an example of such individual utility functions in contrast to the master utility function. As bounded rational actors, agents are not aware of the full set of alternatives available to them, nor can agents fully specify potential actionpotential outcome causal linkages (Gavetti and Levinthal 2000). Therefore agents in our model are not aware of the entire structure of their own individual utility functions. They cannot tell what ideas would produce global maximum/minimum utility values, though they can retrieve a utility value from the function when a specific idea is given, which is a common assumption made in complex global optimization problems (Horst, Pardalos and Thoai 2000). -----------------------------Insert Figure 1 Here Group Decision Simulation 15 -----------------------------Although not explicitly aware of their entire utility function structure, agents in a homogeneous condition can represent a “group wholes” view, where agents have similar utility functions within the group, but across groups there exist different utility functions; yet all members of each particular group share a strong degree of similarity with their groups’ unique utility function. Conversely, a heterogeneous condition can represent a “group parts” view, where agents have different utility functions within the group, and these utility functions are generally not similar. As such, within each group unique and/or diverse utility functions prevail, but across groups, this pattern is not unique, as group after group exhibits this same type of uniqueness among its members. We recognize that a homogeneous group with no group-level bias would be unlikely in actual groups and collectives. Reduction of a group-level bias would be facilitated by different perspectives, expertise and experiences (i.e., diversity). While varying diversity on any number of dimensions (e.g., ethnic, gender, functional background, education, age) within teams has been studied in the literature (c.f., Kooij-de Bode, van Knippenberg and van Ginkel 2008; Williams and O’Reilly 1998; O’Reilly et al. 1998; Pelled, Eisenhardt and Xin 1999), research related to group performance has mixed reviews regarding the benefit of diversity within teams. While some diversity is thought to produce a more productive, functional conflict as opposed to an unproductive, relationship conflict (Jehn, Northcraft and Neale 1999), a meta-analysis on conflict (De Dreu and Weingart 2003) underscores that these various forms of conflict are all negatively related to group performance. Thus, group-level bias is included to assess potential issues associated with homogeneity within groups. 4.1.3 Evolutionary operators Our model uses agent behaviors reflecting either selection or variation as analogues for decision making behavior: replication, random point mutation, intelligent point mutation, recombination, and subtractive selection. While these five operators reflect common forms of action in evolution (Mitchell 1996; Fogel 1995), they also align with actions commonly found in brainstorming and normative decision making idea generation phases where the goal is to build new ideas from individually generated suggestions (Paulus and Yang 2000) (i.e. mutations and recombination) and idea evaluation phases where culling or supporting ideas (i.e., replication and/or subtraction) leads to final group idea selection and decision. Among those evolutionary operators, replication and subtractive selection use a preferential random search algorithm (Solis and Wets 1981), where rp ideas are randomly sampled from the idea population in the agent’s mind and ranked according to their perceived utility values, and then the agent selects the best (or worst) idea for replication (or subtractive selection). Note that the designs of the evolutionary operators used in this model are different from those used in earlier models (Sayama and Dionne 2013a, Sayama and Dionne 2013b), in order to make the variation and selection mechanisms Group Decision Simulation 16 more clearly separable. They are also extended so that their outcomes affect not only the agent’s own idea population but also those of its local neighbors on a social network, which represents the exchange of ideas through social ties. In other words, other agents can “hear” the focal agent’s opinion and update their own idea population according to it. Replication selects an idea from the agent’s idea population with the above-mentioned preferential random search algorithm, and then adds an exact copy of the idea back to its own idea population, as well as to those of its local neighbors (i.e., other agents that are connected to the agent executing replication). Replication therefore can neither produce a novel idea nor remove one, but it gently sways the ecology of the population by increasing the popularity of favorable existent ideas within a local neighborhood in the social network. This represents an advocacy of a particular idea under discussion. Random point mutation selects an idea from the population randomly, and then adds a copy of an idea with point mutations, flipping of bits at each aspect of a problem with a probability pm, to the agent’s idea population as well as to those of its neighbors. This represents an attempt of making random changes to the existing ideas, reflected in asking “what if” questions. Random point mutations help escape local maxima of a utility function in the problem space when a utility function is nonlinear and many-peaked. Intelligent point mutation selects an idea from the population randomly, makes several (rm) tentative offspring of the idea by adding random point mutations, and selects that of the highest perceived fitness for addition to the population. The selected idea is added to the agent’s idea population as well as to those of its neighbors. This represents a proposal of an improved idea derived from an existing idea under discussion. The intelligent point mutation can be useful in maximizing a utility function with one maximum by climbing monotone gradients, but it may perform poorly in a complex utility landscape. Recombination chooses two ideas from the agent’s idea population at random and then creates two offspring from the two parent ideas. Sexual reproduction is simulated with a multiple point cross-over recombination: parent ideas are aligned by aspects, for each of which there is a probability ps of switching their contents. Both of the two offspring are then added back to the agent’s idea population as well as to those of its neighbors. This represents a creation of new ideas from two existing ideas. Finally, subtractive selection uses a negative preferential random search algorithm to find the idea with low fitness from the agent’s idea population, and then one copy of that idea is deleted from there, as well as from the idea populations of its neighbors (if a neighbor agent does not have a copy of the idea nothing will happen). This operator modestly reduces the popularity or importance of the idea within the local neighborhood in the social network. This represents a criticism against a bad idea. Subtractive selection is the only operator that reduces the number of existing ideas and is therefore essential to groups attempting to attain convergence in the population distribution. Group Decision Simulation 17 Out of these five, replication and subtractive selection are selection-oriented operators, driving the exploitation in the discussion and decision making process. The other three (random/intelligent point mutations and recombination) are variation-oriented operators that increase the idea diversity and explore the problem space further. To systematically control and sweep the balance between the two evolutionary “forces” (selection/exploitation and variation/exploration), we introduced a global parameter p, which determines the behavioral tendency of agents. Specifically, each agent chooses an exploitative operator with probability p (or, an explorative operator with probability 1 - p; see Table 2). Setting p = 1 makes the agents completely selection-oriented, while p = 0 makes them fully exploratory. 4.1.4 Simulation settings Table 2 summarizes the parameter values used in our computer simulations. Most of those values were taken from earlier work (Sayama and Dionne 2013a, Sayama and Dionne 2013b), and were chosen so as to be reasonable in view of typical real collective decision making settings. We tested several variations for each parameter value, confirming that the results were not qualitatively different from the ones presented below. There are several experimental parameters that we varied in the three sets of experiments presented below. The first set of experiments manipulated β, group-level bias, and ξ, within-group noise. These two parameters were varied to represent different levels of accuracy and consistency of individual utility functions within a group. The second set of experiments varied p, the parameter that determines the balance between selection-oriented and variation-oriented operators in agents’ behaviors. The third set of experiments varied the size and topology of the group, by exponentially increasing the number of agents from N = 5, a small group whose size is within the optimal range for decision making teams (Kerr and Tindale, 2004; Salas, Stagl and Burke 2004), to N = 640, which forms a non-trivial social network. In all cases, the average node degree (i.e., average number of connections attached to a node) was always kept to four, which is a typical number of people one could have meaningful conversations with simultaneously. This assumption made the N = 5 case a fully connected network, while the network became increasingly sparse as N increased. For each specific value of N, three different network topologies were tested: random (RD), small-world (SW; Watts and Strogatz 1998) and scale-free (SF; Barabási and Albert 1999). For small-world networks, the link rewiring probability was set to 10%, which realizes the small-world property (Watts and Strogatz 1998) for relatively small-sized networks like those used in this study. These topological variations do not cause any effective differences for smaller N, but as N increases, their influences on network topology and dynamics of idea evolution begin to differentiate. -----------------------------Insert Table 2 Here Group Decision Simulation 18 -----------------------------4.2 Metrics of group performance Performance of a group is likely a multidimensional construct, as different authors have tested differing dimensions of group-based adaptation (c.f., LePine 2005; Kozlowski et al. 1999). For the purposes of collective decision making in organizational settings, the ability to converge on a decision is critical, as a group that cannot produce a decision likely fails in their task. In the meantime, convergence on a poor decision may be equally detrimental to a group as well, as mistakes could be costly. As such, it would seem that minimally the consideration of both convergence and decision quality would be needed to assess group performance. As required by increasingly complex organizational environments, groups and organizations need to converge quickly on decisions, and yet ensure these decisions have high efficacy related to solving perceived problems. We therefore used two separate performance metrics: One was the true utility value of the mode idea (the most supported idea) in the final population of ideas collected from all the agents’ minds, to measure the overall quality of collective decisions. This was selected as it is most likely that the most supported idea represents the group’s preferred idea, and once selected, this supported idea will be tested in the context of real-world problem solving. The other performance metric was the diversity of ideas remaining in the final population of ideas collected from all the agents’ minds, to measure the failure of the group to converge. This measurement is based on the classical definition of Shannon’s information entropy (Shannon 1948), m H = −∑ p ( xi ) log 2 p ( xi ) , (3) i =1 where m represents the number of different types of ideas in the final idea population, and p(xi) is the ratio of the number of the i-th type of idea to the total size of the final idea population. The theoretical maximum of H would be M, which occurs when all of 2M possible distinct ideas are equally represented. Since the entropy represents how many more bits would be needed to completely specify the single final collective decision, it can be assumed that M – H is a quantitative measure that intuitively means the number of aspects of the problem on which the group has formed a cohesive opinion. To rescale this to the range between 0 and 1, we used (M – H) / M as a measurement of the convergence of final collective decision. 5 Results 5.1 Effects of within-group noise and group-level bias We first conducted a computational experiment to examine the effects of increasing (a) withingroup noise, ξ, i.e., heterogeneity of individual utility functions within a group, and (b) group-level bias, β, i.e., discrepancy of the master utility function from the true utility function at a group level, on the Group Decision Simulation 19 overall group performance. For this experiment, the group was made of five agents with fully connected social network structure (i.e., everyone could talk to everyone else; a small group setting). We assumed that the agents were balanced in terms of their tendency between selection-oriented and variation-oriented behaviors in the discussion (i.e., p = 1/2). Figure 2 presents a summary of the results of simulations with within-group noise ξ and grouplevel bias β systematically varied. Each of the two performance metrics (i.e., level of convergence and utility of most supported idea, as described above) are visualized in a separate 3-D surface plot. We found that the level of convergence affected significantly by the within-group noise, while it was not affected at all by the group-level bias. On the other hand, the true utility of collective decisions degraded significantly when either the within-group noise or the group-level bias (or both) was increased. The true utility achieved by the most heterogeneous groups (ξ ~ 1.0) or the most biased groups (β ~ 1.0) dropped to about 0.5, which could be achieved just by random idea generation, meaning that there was no net improvement achieved during the discussion by those groups. This could be due to the within-group conflicts of interest (for greater ξ) and/or the lack of correct group-level understanding of the problem (for greater β). In real-world settings, the within-group noise and the group-level bias are not independent from each other. More specifically, if a group is assembled by gathering similar individuals with similar backgrounds, expertise and opinions, then the group tends to have less within-group conflicts but may risk of having a greater group-level bias. On the other hand, if a group is made of diverse individuals with different backgrounds, expertise and opinions, the group may have greater within-group conflicts but it may successfully reduce potential group-level bias and accomplish deeper discussion and better integration of ideas, as the diverse perspectives may represent the true nature of the problem more correctly (we confirmed this observation by numerical tests; to conserve space, results are not shown here). Therefore, there is a trade-off between minimizing the within-group heterogeneity and the grouplevel bias in a realistic setting. What kind of strategies of group formation will be optimal in order to maximize the true utility of collective decisions remains a non-trivial and problem-dependent question. -----------------------------Insert Figure 2 Here -----------------------------5.2 Effects of balance between selection-oriented and variation-oriented behaviors The “balanced” acts of agents assumed in the above experiment may be too ideal as a model of actual group members, because actual groups may have biased behavioral patterns as well. For example, some groups may be more prone to be critical, trying to purge bad ideas, while other groups may tend to promote combinations of multiple ideas in discussion. Examples of such behavioral patterns include Group Decision Simulation 20 organizational “cultures” shared by all group members, which is a plausible view of a factor that may influence group dynamics (Salas et al. 2004). We therefore ran another experiment to investigate the effects of balance between selectionoriented and variation-oriented behaviors patterns by systematically varying the parameter p. Greater values of p represent groups with more selection-oriented behaviors (i.e., advocacy and criticism), while smaller values of p represent groups with more variation-oriented behaviors (i.e., mutations and recombination). The group-level bias, β, was also varied as another experimental parameter, while the within-group noise, ξ, was fixed to 0.2 for this experiment. The group size and their network topology were the same as those in the first experiment. Figure 3 shows a summary of the results of the second experiment comparing group performances with different group behaviors, plotting two performance metrics in separate 3-D plots as used for Figure 2 (note that one of the axes is now for p, not for ξ). The effect of behavioral balance on the level of convergence is straightforward in that greater p (more selection-oriented behaviors) tended to promote convergence more. The effect of p on the utility of collective decisions, however, turned out not so trivial. While purely variation-oriented behaviors (p ~ 0.0) did not help increase the decision quality, neither purely selection-oriented behaviors (p ~ 1.0) did. There was a range of optimal balance (p = 0.7~0.9) where the groups achieved the highest decision quality. In the meantime, the effect of group-level bias is similar to that seen in Figure 2, so that the utility of collective decisions would be significantly lower if there was group-level bias. -----------------------------Insert Figure 3 Here -----------------------------5.3 Effects of group size and social network topology The first two experiments above assumed small, fully connected networks of agents. While their results produced useful implications for collective decision making in small group settings, they were not sufficient to generate insight into more general collective decision making dynamics on a larger nontrivial social environment, such as in a complex organization or on social media. We therefore conducted the third experiment in which the size of groups was increased from 5 to 640 in an exponential manner. For each size of the groups/networks, the average number of connections per agent (i.e., “degree” in network science terminology) were always kept to four, which was the same value as in the first two experiments above. The following values were used for other parameters: β = 0.0, ξ = 0.2, p = 0.5. In this experiment, larger groups were no longer considered a typical “group”, but rather they formed a more complex social/organizational network, perhaps more indicative of a “collective” in the Group Decision Simulation 21 organizational sciences. For each network size, we used the following three social network topologies. A new network topology was generated for each independent simulation run: • Random network (RD): A random network is a network in which connections are randomly assigned, which can be used as a random control condition. For our experiment, a total of 2N links were established between randomly selected pairs of agents. • Small-world network (SW; Watts and Strogatz 1998): A small-world network is a locally clustered (pseudo-)regular network, with a small number of global links introduced to reduce the effective diameter of the network significantly (i.e., a “small-world” effect). The small-world network may be considered a spatially extended network made of mostly local connections but with a few global connections. For our experiment, N agents were first arranged in a circle and each agent was connected to its nearest and second nearest neighbors so that the degree would be four for all. Then 10% of the links were randomly selected and either the origin or destination of each of those links was rewired to a randomly selected agent. • Scale-free network (SF; Barabási and Albert 1999): A scale-free network is a network in which the distribution of node degrees shows a power-law distribution. It represents a heterogeneous network made of a large number of poorly connected nodes and a few heavily connected “hubs”. Many real-world networks, including biological, engineered and social networks, were shown to be scale-free (Barabási 2009). While such networks show a small effective diameter like smallworld networks, they may not have high local clustering. For our experiment, a well-known preferential attachment algorithm (Barabási and Albert 1999) was used, starting with a fully connected network of five agents and then incrementally adding an agent by connecting it with two links to two existing agents selected preferentially based on their degrees, until the network size reached N. Figure 4 shows the effects of size and topology of networks on the decision outcomes. Without a surprise, the larger the group (or network) becomes, the harder it achieves convergence. Apparently there was no substantial difference between the three topological structures regarding their effects on the level of convergence. On the other hand, increasing group size had positive effects on the utility of the most supported idea within the group or on the social network. This can be understood in that, in a large network, agents can conduct different threads of discussions in parallel, which increases the chance for them to collectively find a better idea in the complex problem space. It is important for the agents to remain connected to each other so that the better ideas gradually spread over the network and widely accepted to become the more supported ideas. The same number of disconnected agents would not be able to achieve this kind of information aggregation and selection task. ------------------------------ Group Decision Simulation 22 Insert Figure 4 Here -----------------------------One particularly interesting phenomenon seen in Figure 4 is the difference in the utility of collective decisions between small-world networks and other two networks for larger N (N > 100). Figure 5 provides a more detailed view into this finding, showing the distributions of utilities of most supported ideas for 500 independent simulation runs for N = 640 under each of the three conditions. In each condition, the agents were able to find the truly best idea with utility 1.0 most of the time, but small-world networks facilitated such optimal decision making most frequently. The Mann-Whitney U test detected statistically significant differences between small-world and random (p < 0.003) as well as small-world and scale-free (p < 10-6) networks, while there was no significant difference between random and scalefree (p = 0.107) networks. The key distinctive feature of small-world networks that are not present in either random or scale-free networks is the local clustering. Such locally clustered social network structure helps agents in different regions in a network maintain their respective focus areas and engage in different local search, possibly enhancing the effective parallelism of collective decision making and therefore resulting in a greater number of successful decisions. In contrast, random and scale-free networks lack such local clustering, and the links in those networks are all “global”, mixing discussions prematurely and therefore reducing the effective parallelism of collective decision making. These observations have an interesting contrast with the fact that random and scale-free networks are highly efficient in information dissemination because of their global connectedness. Our results indicate that such efficiency of information dissemination may not necessarily imply the same for collective decision making. -----------------------------Insert Figure 5 Here -----------------------------6 Conclusions To improve our understanding of the dynamic nature of collective decision making, we developed an agent-based model and applied evolutionary operators as a means of illustrating how groups and collectives may move through a decision process based on ecologies of ideas over a social network habitat. Moreover, we considered various compositions of group members ranging from homogeneity to heterogeneity and examined the impact of team behaviors on the dynamic decision process as well. These explorations move toward a more realistic view of collective decision making within complex social systems, and answer calls (e.g., Meyer et al. 2005) for research that considers the impact of time and situations in flux, along with nonlinear, multi-level concepts incorporating evolutionary conceptual development. Group Decision Simulation 23 Our exploration revealed that the composition of the team has implications for decision making and likely considers the complex nature of asking several individuals to come together and agree on a direction that is best suited for the group/collective, rather than for each individual. Research on group diversity has found mixed results related to diversity and group performance issues such as creativity and decision effectiveness (De Dreu and West 2001; Jackson 1992; Nemeth 1986; 1992; Hoffman 1979; Gruenfeld et al. 1996; Harrison et al. 2002; Jehn and Mannix 2001; O’Reilly et al. 1989; Kraiger and Ford 1985), however our research indicates an important trade-off between reduction of within-group conflicts and mitigation of group-level bias. This means that the best team composition may depend greatly on specific problem settings. For example, if a team is tasked to work on a time-critical mission, then the convergence speed is key to their success and thus the emphasis should be placed more on the group homogeneity to avoid within-group conflicts. Or, if a team is formed to seek a truly high quality solution to a problem, then minimizing the possibility of group-level bias is critical for the team’s success, which may require increasing within-group diversity. Our results also implies that the balance between selection-oriented and variation-oriented behaviors may play an important role in collective decision making. While selection-oriented behaviors greatly promote convergence, they are not sufficient to achieve the highest possible utility. To improve the decision quality, the group also needs a good mixture of exploratory (variation-oriented) and exploitative (selection-oriented) behaviors. This also ties back to the diversity issue discussed above; a group may not necessarily benefit from diversity of individual problem understanding, but they can benefit from behavioral diversity of group members. In our simulations, the optimal balance between selection and variation was attained at p ~ 0.8 (i.e., 80% selection, 20% variation) but this particular balancing point may be problem dependent. Our results with social network structure illustrated intriguing effects of network topologies on decision quality, which was manifested particularly for larger networks. Small-world networks with spatially localized clusters tended to promote collective search of optimal ideas more often than random or scale-free networks, despite that the network size and the average degree were all identical. This finding offers another implication for the diversity in collective decision making: certain organizational structures may be more effective in generating and maintaining idea diversity in discussion, while other structures would tend to reduce idea diversity and promote premature convergence on suboptimal ideas more often. This is similar to the biological fact that certain geographical habitat structures can maintain greater biodiversity in evolutionary ecology. In the decision making context, this implies that not only within-group diversity or behavioral balance but also social network topologies could influence the dynamics of idea evolution in collective decision making processes. Group Decision Simulation 24 Using an evolutionary framework to model collective decision making processes, one can specifically examine the efficacy of a variety of decision processes employed by groups and collectives. The framework enables a means for direct comparison of various idea evolution paths within collective decision making, and enables an exploration of how the make-up and structure of teams could be critical depending on the overall requirements for decision making tasks. Furthermore, the evolutionary framework and subsequent computational model enables advancements in understanding collective decision making within a dynamic and complex social system. By employing an evolutionary framework we can explore the impact of time and situations in flux, and the modeling enables nonlinear exploration of processes. Finally, the multi-level, network-oriented nature of the research more appropriately models the potential differences in team composition and organizational topologies. This research adds to our understanding of the complex nature of collective decisions, and the potential pitfalls and caveats of employing various decision processes and designing teams in a heterogeneous and/or homogeneous manner. There are several limitations to our modeling study. For example, genetic operators may not exist in groups as “cleanly” as modeled in our simulation. We used simple parameterized settings to control the prevalence of operators, which may not be appropriate to represent the real human individual behavior in discussion. Also, our model considered only the heterogeneity of the utility functions of agents. In real human systems, the heterogeneity, or diversity, implies far richer concepts (Dionne et al. 2004), such as different backgrounds, professional expertise, and behavioral strategies, which were not present in our current model. To conduct a more comprehensive, systematic investigation of the homogeneity/heterogeneity issues, it would be critical to incorporate the heterogeneity of the participants’ domains of expertise, in addition to their utility functions. Having team members with diverse domains of expertise may further improve group performance. Furthermore, we tested only three typical social network topologies, but they are by no means an exhaustive list of possible organizational structures. Conducting experiments on more realistic social network topologies would add more realistic dynamics to the results. Computer simulations provide a mechanism to study complex, dynamic collective processes with relatively little cost to researchers and “subjects”, yet no level of model complexity could adequately capture the complexity of navigating decision making in real group environments (Adner et al. 2009). The interactive effects of levels of analysis, personality, knowledge, learning, group dynamics and the environment will likely remain the most complex of models. As such, to refine theory and direct and pinpoint empirical research, simulation is an excellent “first responder.” To offer practical ideas to organizations, group members and leaders, however, research needs to be conducted in such a way as to capture and analyze the actions of real groups, and assess theoretical hypotheses against empirical Group Decision Simulation 25 findings. Our simulations findings here could serve as a basis or direction for future experimental and field studies of decision making in various types of heterogeneous and homogeneous real-world groups and collectives. Acknowledgments: Research supported by the National Science Foundation (SES-0826711) Group Decision Simulation 26 References Abbot A (2001) Time Matters. University of Chicago Press, Chicago, Il Adner R, Polos L, Ryall M, Sorenson O (2009) Introduction to special topic forum: The case for formal theory. Acad Management Rev 34: 201-208 Axelrod R (1981) The evolution of cooperation. Sci 211: 1390-1396 Barabási AL, Albert R (1999) Emergence of scaling in random networks. Science 286: 509-512. Barabási AL (2009) Scale-free networks: a decade and beyond. Science 325: 412-413. Bar-Yam Y (1997) Dynamics of complex systems. Westview Press, Boulder, CO Bar-Yam Y (2004) Making things work: Solving complex problems in a complex world. NESCI Knowledge Press, Cambridge, MA Battiston S, Bonabeau E, Weisbuch G (2003a) Decision making dynamics in corporate boards. Physica A 322: 567-582 Battiston S, Weisbuch G, Bonabeau E (2003b) Decision spread in the corporate board network. Adv Complex Systems 6: 631-644 Carroll T, Burton RM (2000) Organizations and complexity: Searching for the edge of chaos. Comput Math Organ Theory 6: 319-337 Chang MH, Harrington JE Jr (2007) Discovery and diffusion of knowledge in an endogenous social network. Amer J Sociol 110(4): 937-976 Chang MH, Harrington JE Jr (2005) Innovators, imitators and the evolving architecture of problemsolving networks. Organ Sci 18(4): 648-666 Dansereau F, Alutto JA,Yammarino FJ (1984) Theory Testing in Organizational Behavior: The Varient Approach. Prentice-Hall, Englewood Cliffs, NJ Group Decision Simulation 27 Dansereau F,Yammarino FJ, Kohles J (1999) Multiple levels of analysis from a longitudinal perspective: Some implications for theory building. Acad Management Rev 24: 346-357 De Dreu CKW, Weingart LR (2003) Task and relationship conflict, team performance, and team member satisfaction: A meta-analysis. J Appl Psych 88: 741–749 De Dreu CKW, West MA (2001) Minority dissent and team innovation: The importance of participation in decision making. J Appl Psych 86: 1191-1201 Dionne SD, Akaishi J, Chen X, Gupta A, Sayama H, Yammarino FJ, Serban A, Hao C, Head HJ, Bush BJ (2012) Retrospective Relatedness Reconstruction: Applications to Adaptive Social Networks and Social Sentiment. Organ Res Methods 15(4): 663-692 Dionne SD, Dionne PJ (2008) Levels-based leadership and hierarchical group decision optimization: A simulation. Leadership Quart 19: 212-234 Epstein JM (2006) Generative Social Science: Studies in Agent-based Computational Modeling. Princeton University Press Epstein JM, Axtell R (1996) Growing Artificial Societies: Social Science from the Bottom Up. Brookings Institute Press, Washington, DC. Fogel DB (1995) Evolutionary Computation: Toward a New Philosophy of Machine Intelligence. IEEE Press, Piscataway, NJ Futuyma DJ (2005) Evolution. Sinauer Associates, Sunderland, MA Gavetti G, Daniel A Levinthal DA (2000) Looking Forward and Looking Backward: Cognitive and Experiential Search, Administrative Sci Quart 45: 113 – 137 Gilbert N, Troitzsch KG (1999) Simulation for the social scientist. Milton Keynes: Open University Press Group Decision Simulation 28 Gigone D, Hastie R (1993) The common knowledge effect: Information sharing and group judgment. J Personality Soc Psych 65: 959-974 Gruenfeld DH, Mannix EA, Williams KY, Neale MA (1996) Group composition and decision making: How member familiarity and information distribution affect process and performance. Organ Behavior Human Decision Processes 67: 1-15 Hamming RW (1950) Error detecting and error correcting codes. Bell System Tech J 26: 147-160 Harrison DA, Price KH, Gavin JH, Florey AT (2002) Time, teams, and task performance: Changing effects of surface-level and deep-level diversity on group functioning. Acad Management J 45: 1029-1045 Hoffman LR (1979) Applying experimental research on group problem solving to organizations. J Appl Behavioral Sci 15: 375-391 Hollenbeck JR, Ilgen DR, Sego DJ, Hedlund J, Major DA, Phillips J (1995) Multilevel theory of team decision making: Decision performance in teams incorporating distributed expertise. J Appl Psych 80(2): 292-316 Horst R, Pardalos PM, Thoai NV (2000) Introduction to Global Optimization, 2nd edn. Kluwer Academic Publishers, Dordrecht, Netherlands Jackson S (1992) Team composition in organizations. In: Worchel S, Wood W, Simpson J (eds) Group Process and Productivity. Sage Publications, London Jehn KA, Mannix EA (2001) The dynamic nature of conflict: A longitudinal study of intragroup conflict and group performance. Acad Management J 44: 238-251 Jehn KA, Northcraft GB, Neale MA (1999) Why differences make a difference: A field study of diversity, conflict, and performance in workgroups. Admin Sci Quart 44: 741–763 Kauffman SA (1993) The origin of order. Oxford University Press, NY Kerr NL, Tindale RS (2004) Group performance and decision making. Ann Rev Psych 55: 623-655 Group Decision Simulation 29 Klein M, Sayama H, Faratin P, Bar-Yam Y (2003a) The dynamics of collaborative design: Insights from complex systems and negotiations research. Concurrent Engrg: Res Appl 11: 201-209 Klein M, Faratin P, Sayama H, Bar-Yam Y (2003b) Protocols for negotiating complex contracts. IEEE Intelligent Systems 18(6): 32-38 Klein M, Faratin P, Sayama H, Bar-Yam Y (2006) An annealing protocol for negotiating complex contracts. In: Rennard J-P(ed) Handbook of Research on Nature Inspired Computing for Economics and Management, vol 2. Idea Group Publishing, Hershey, PA, Chapter XCVIII Klein KJ, Dansereau F, Hall RJ (1994) Levels issues in theory development, data collection, and analysis. Acad Management Rev 19: 195-229 Knudsen T, Levinthal DA (2007) Two faces of search: Alternative generation and alternative evaluation. Organ Sci 18(1): 39-54 Kock N (1999) Process Improvement and Organizational Learning: The Role of Collaboration Technologies. Idea Group Publishing, Hershey, PA Kock N (2004) The psychobiological model: Towards a new theory of computer-mediated communication based on Darwinian evolution. Organ Sci 15(3): 327-348 Kooij-de Bode HJM, van Knippenberg D, van Ginkel WP (2008) Ethnic diversity and distributed information in group decision making: The importance of information elaboration. Gr Dyn: Theory Res Pract 12: 307–320 Kozlowski SWJ, Gully SM, Nason ER, Smith EM (1999) Developing adaptive teams: A theory of compilation and performance across levels and time. In: Ilgen DR, Pulakos ED (eds) The Changing Nature of Performance: Implications for Staffing, Motivation and Development. Jossey-Bass, San Francisco, CA, pp 240-292 Kraiger K, Ford JK (1985) A meta-analysis of ratee-race effects in performance ratings. J Appl Psych 70: 56-65 Group Decision Simulation 30 LePine JA (2005) Adaptation of teams in response to unforeseen change: Effects of goal difficulty and team composition in terms of cognitive ability and goal orientation. J Appl Psych 90: 1153-1167 Levinthal DA (1997) Adaptation on rugged landscapes. Management Sci 43(7): 934-950 Lightle JP, Kagel JH, Arkes HR (2009) Information exchange in group decision making: The hidden profile problem reconsidered. Management Sci 55(4): 568-581 Lipshitz R, Klein G, Orasanu J, Salas E (2001) Focus Article: Taking stock of naturalistic decision making. J Behavioral Decision Making 14: 331-352 Maldonato M (2007) Undecidable decisions: Rationality limits and decision-making heuristics. World Futures: J General Evolution 63(1): 28-37 Mannes AE (2009) Are we wise about the wisdom of crowds? The use of group judgments in belief revision. Management Sci 55(8): 1267-1279 March JG (1991) Exploration and exploitation in organizational learning. Org Sci 2: 71-87. Meyer AD, Gaba V, Colwell KA (2005) Organizing far from equlibrium: Nonlinear change in organizational fields. Organ Sci 16(5): 456-473 Miller JH, Page SE (2007) Complex Adaptive Systems: An Introduction to Computational Models of Social Life. Princeton University Press, Princeton, NJ Mitchell M (1996) An Introduction to Genetic Algorithms. MIT Press, Cambridge, MA Mitchell M, Forrest S, Holland JH (1991) The royal road for genetic algorithms: Fitness landscapes and GA performance. In: Varela FJ, Bourgine P (eds) Toward a Practice of Autonomous Systems: Proceeds of the First European Conference on Artificial Life. Paris, France, pp 245-254 Nemeth CJ (1986) Differential contributions of majority and minority influence. Psych Rev 93: 23-32 Group Decision Simulation 31 Nemeth CJ (1992) Minority dissent as a stimulant to group performance. In: Worchel S, Wood W, Simpson J (eds) Group Process and Productivity. Sage Publications, London, pp 95-111 Nijstad BA, Kaps SC (2007) Taking the easy way out: Preference diversity decision strategies and decision refusals in groups. J Personality Soc Psych 94(5): 860-870 O’Reilly CA, Caldwell DF, Barnett WP (1989) Work group demography, social integration and turnover. Admin Sci Quart 34: 21-37 O’Reilly CA, Williams KY, Barsade S, Gruenfeld DH (1998) Group Demography and Innovation: Does Diversity Help? In M. A. Neale & E. A. Mannix (Ed), Research on Managing Groups and Teams Vol. 1: 183-207 O’Reilly T (2005) What is Web 2.0: Design patterns and business models for the next generation of software. IOP O’Reilly. http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web20.html. Accessed October 8, 2012 Paulus PB, Yang H-C (2000) Idea generation in groups: A basis for creativity in organizations. Organ Behavior Human Decision Processes 82: 76-87 Pelled LH, Eisenhardt KM, Xin KR (1999) Exploring the black box: An analysis of work group diversity, conflict and performance. Admin Sci Quart 44:1-28 Ren Y, Carley KM, Argote L (2006) The contingent effects of transactive memory: When is more beneficial to know what others know? Management Sci 52: 671-682 Rivkin JW (2000) Imitation of complex strategies. Management Sci 46(6): 824-844 Rodriguez, MA, Steinbock DJ (2004) A social network for societal-scale decision making systems. In NAACSOS 2004: Proc North Amer Association Comput Soc Organ Sci Conf, Pittsburgh, PA Rusmevichientong P, Van Roy B (2003) Decentralizing decision making in a large team with local information. Games Econom Behavior 43: 266-295 Group Decision Simulation 32 Salas E, Klein G (2001) Expertise and naturalistic decision making: An overview. In: E. Salas E, Klein G (eds) Linking Expertise and Naturalistic Decision Making. Lawrence Erlbaum Associates, Philadelphia, PA, pp 3-33 Salas E, Stagl KC, Burke CS (2004) 25 years of team effectiveness in organizations: Research themes and emerging needs. In: Cooper CL, Robertson IT (eds) International Review of Industrial and Organizational Psychology 19: 47-91 Sayama H, Dionne SD (2013a) Using evolutionary computation as models/tools for human decision making and creativity research. Proc 4th IEEE Symp Artif Life, pp.35-42. Sayama H, Dionne SD (2013b) Studying collective human decision making and creativity with evolutionary computation. Under review. Sayama H, Farrell DL, Dionne SD (2011) The effects of mental model formation on group decision making: An agent-based simulation. Complexity 16(3): 49-57. Shannon CE (1948) A mathematical theory of communication. Bell System Tech J 27: 379-423 Simon HA (1955) A behavioral model of rational choice. Amer Econom. Rev 69: 99-118 Silverman BG, Johns M, Corwell J, O’Brien K (2006) Human behavior models for agents in simulation games: Part 1: Enabling science with PMFserv. Presence 15(2): 139-162 Solis FJ, Wets, RJ-B (1981) Minimization by random search techniques. Math Oper Res 6: 19-30 Stasser G, Stewart D (1992) Discovery of hidden profiles by decision making groups: Solving a problem versus making a judgment. J Personality Soc Psych 57: 67-78 Stasser G, Titus W (1985) Pooling of unshared information in group decision making: Biased information sampling during discussion. J Personality Soc Psych 48: 1467-1478 Sterman JD (2000) Business dynamics: System thinking and modeling for a complex world. Irwin McGraw Hill, Boston, MA Group Decision Simulation 33 Van de Ven A, Delbecq AL (1974) The effectiveness of nominal, delphi, and interacting group decision making processes. Acad Management J 117: 605-621 van Ginkel WP, van Knippenberg D (2008) Group information elaboration and decision making: The role of shared task representations. Org Behavior Human Decision Processes 105(1): 89-97 Watts DJ, Strogatz SH (1998) Collective dynamics of ‘small-world’ networks. Nature 393: 440-442 Williams KY, O’Reilly CA (1998) Demography and diversity in organizations. Res Organ Behavior, 20: 77–140 Wilson DS (2005) Evolution for everyone: How to increase acceptance of interest in, and knowledge about evolution. Public Library Sci Biol 3(12): e364 Wilson DS, Wilson EO (2008) Evolution for the “good of the group.” Amer Sci 96: 380-389 Yamanoi J, Sayama H (2012) Post-merger cultural integration from a social network perspective: A computational modeling approach. Comput Math Org Theory 18: 1-22 Yammarino FJ, Dansereau F (eds) 2002 The many faces of multi-level issues. Research in Multi-Level Issues, vol 1. Elsevier Science,Oxford, UK Yammarino FJ, Dansereau F (2011) Multi-level issues in evolutionary theory, organization science, and leadership. Leadership Quart 22: 1042-1057 Yammarino FJ, Dionne SD, Chun JU, Dansereau F (2005) Leadership and levels of analysis: A state-ofthe-science review. Leadership Quart 16: 879-919 Group Decision Simulation 34 TABLE 1 Evolutionary Concepts Applied to Corresponding Decision Making Process Components Evolutionary Concept Decision Making Component Genetic possibility space Problem space (decision space) Genome Potential idea (a set of choices for all aspects of the problem) Locus on a genome Aspect of the problem Allele (specific gene) on a locus Specific choice made for an aspect Population A set of potential ideas being discussed Fitness Utility value of a potential idea (either perceived or real) Adaptation Increase of utility values achieved by an idea population Selection Narrowing of diversity of ideas based on their fitness Replication Increase of relative popularity of a potential idea in the discussion Recombination Production of a new potential idea by crossing multiple ideas Mutation Point-like change in an idea (possibly coming up with a novel idea) Group Decision Simulation 35 TABLE 2 Parameters and Symbols (Bold indicates experimental parameters varied) Parameter Value Meaning Parameters Related to Evolutionary Decision Process M 10 Problem space dimensionality n 10 Number of representative ideas to generate true/master utility functions rp 5 Number of sample ideas in preferential search algorithm rm 5 Number of offspring generated in intelligent point mutation pm 0.2 Random mutation rate per bit ps 0.4 Probability of random switching in recombination Probability for an agent to take selection-oriented actions p 0~1 p/2 Probability of replication - advocacy (increases popularity; selectionoriented) p/2 Probability of subtractive selection - criticism (decreases popularity; selection-oriented) (1-p)/3 Probability of random point mutation - minor modification of idea (variation-oriented) (1-p)/3 Probability of intelligent point mutation - improvement of existing idea (variation-oriented) (1-p)/3 Probability of recombination - generating new ideas from crossing multiple existing ideas (variation-oriented) Parameters Related to Team Characteristics Size of group/social network N 5~640 Network RD, SW, RD: random network, SW: small-world network, SF: scale-free network topology SF d 4 Average degree (average number of links connected to each agent) k 5 Number of initial randomly generated ideas in each agent’s mind Group-level bias 0~1 β Within-group noise 0~1 ξ T 60 Number of iterations Group Decision Simulation 36 FIGURE 1 Master and Individual Utility Functions Note: The master utility function with M = 10, generated from a representative set of idea utilities of size n = 10, is shown by black dots. An individual utility function by adding noise with ξ = 0.2 is shown by gray dots. The x-axis shows idea indices generated by interpreting bit strings as binary notations of an integer, i.e., all of different ideas are lined up along the horizontal axis and their utility values are plotted. It can be seen in the figure that the perturbed individual utility function (gray dots) maintains some structures of the master utility function (black dots), but they are not exactly the same, which represents the misunderstanding of the problem by the individual. Group Decision Simulation 37 FIGURE 2 Effects of Within-Group Noise and Group-Level Bias on Decision Convergence and Decision Quality Note: These plots summarize simulation results showing the effects of within-group noise (ξ) and group-level bias (β) on the level of convergence (left) and the true utility value of the most supported idea (right). Each dot represents an average result of 500 independent simulation runs. Left: Decision convergence was high when within-group noise was small, i.e., when groups were homogeneous in terms of the agents’ individual utility functions. Group-level bias did not show any substantial effect on decision convergence. Right: Quality decisions were made only if both within-group noise and group-level bias were small. As either increases, the quality of the most supported idea decreases. Group Decision Simulation 38 FIGURE 3 Effects of Balance between Selection-Oriented and Variation-Oriented Behaviors and Group-Level Bias on Decision Convergence and Decision Quality Note: These plots summarize simulation results showing the effects of group-level balance between selectionoriented and variation-oriented behaviors (p) and group-level bias (β) on the level of convergence (left) and the true utility value of the most supported idea (right). Each dot represents an average result of 500 independent simulation runs. Left: Decision convergence was high when group-level behavior was highly selection-oriented (p ~ 1), i.e., when groups used replication (advocacy) and subtractive selection (criticism) most of time. Group-level bias did not show any substantial effect on decision convergence. Right: Quality decisions were made only if the group-level behavior was maintained at an optimal balance between selection-oriented and variation-oriented behaviors (p = 0.7~0.9) while group-level bias was small. Group Decision Simulation 39 FIGURE 4 Effects of Group Size and Social Network Topology on Decision Convergence and Decision 0.45  0.40 0.35 0.30 0.25 0.20 0.15 Random Smallworld Scalefree                10 20    50 100 200 Group size       500 Utility of most supported idea Level of convergence Quality 0.90 0.88 0.86 0.84 0.82 0.80 0.78 0.76               10          20   Random Smallworld Scalefree 50 100 200 Group size 500 Note: These plots summarize simulation results showing the effects of group size (N) and social network topology (random, small-world or scale-free) on the level of convergence (left) and the true utility value of the most supported idea (right). Note the log scale for group size. Each dot represents an average result of 500 independent simulation runs. Left: Decision convergence decreased as the group size increased. Social network topology did not influence decision convergence very much. Right: For smaller groups (N < 100), the topological difference between random, small-world and scale-free networks did not have substantial effects, but for larger groups (N > 100), the small-world topology outperformed the other two topologies in terms of the quality of the most supported idea. Group Decision Simulation 40 FIGURE 5 Comparison of Distributions of Utilities of Most Supported Ideas Between Different Social Network Topologies Note: These plots summarize simulation results comparing the distributions of utilities of most supported ideas at the end of simulation between the three social network topologies (random, small-world or scale-free) for N = 640. The small-world network topology (middle) achieved the highest number of the maximal utility value (1.0) compared to the other two topologies, random (left) and scale-free (right). The MannWhitney U test revealed that there was a statistically significant difference between small-world and the other two (small-world v. random: p < 0.003, small-world v. scale-free: p < 10-6), while there was no statistically significant difference between random and scale-free topologies (p = 0.107).
9cs.NE
Combinatorial Secretary Problems with Ordinal Information∗ Martin Hoefer† Bojana Kodric‡ arXiv:1702.01290v3 [cs.DS] 25 Aug 2017 Abstract The secretary problem is a classic model for online decision making. Recently, combinatorial extensions such as matroid or matching secretary problems have become an important tool to study algorithmic problems in dynamic markets. Here the decision maker must know the numerical value of each arriving element, which can be a demanding informational assumption. In this paper, we initiate the study of combinatorial secretary problems with ordinal information, in which the decision maker only needs to be aware of a preference order consistent with the values of arrived elements. The goal is to design online algorithms with small competitive ratios. For a variety of combinatorial problems, such as bipartite matching, general packing LPs, and independent set with bounded local independence number, we design new algorithms that obtain constant competitive ratios. For the matroid secretary problem, we observe that many existing algorithms for special matroid structures maintain their competitive ratios even in the ordinal model. In these cases, the restriction to ordinal information does not represent any additional obstacle. Moreover, we show that ordinal variants of the submodular matroid secretary problems can be solved using algorithms for the linear versions by extending [18]. √ In contrast, we provide a lower bound of Ω( n/(log n)) for algorithms that are oblivious to the matroid structure, where n is the total number of elements. This contrasts an upper bound of O(log n) in the cardinal model, and it shows that the technique of thresholding is not sufficient for good algorithms in the ordinal model. 1 Introduction The secretary problem is a classic approach to model online decision making under uncertain input. The interpretation is that a firm needs to hire a secretary. There are n candidates and they arrive sequentially in random order for an interview. Following an interview, the firm learns the value of the candidate, and it has to make an immediate decision about hiring him before seeing the next candidate(s). If the candidate is hired, the process is over. Otherwise, a rejected candidate cannot be hired at a later point in time. The optimal algorithm is a simple greedy rule that rejects all candidates in an initial learning phase. In the following acceptance phase, it hires the first candidate that is the best among all the ones seen so far. It manages to hire the best candidate with optimal probability 1/e. Notably, it only needs to know if a candidate is the best seen so far, but no exact numerical values. Since its introduction [15], the secretary problem has attracted a huge amount of research interest. Recently, a variety of combinatorial extensions have been studied in the computer science literature [7], capturing a variety of fundamental online allocation problems in networks and markets, such as network design [28], resource allocation [24], medium access in networks [21], or competitive admission processes [12]. Prominently, in the matroid secretary problem [8], the elements of a weighted matroid arrive in uniform random order (e.g., weighted edges of an undirected graph G). The goal is to select a max-weight independent set of the matroid (e.g., a max-weight forest of G). The popular matroid secretary conjecture claims that for all matroids, there exists ∗ This work was supported by DFG Cluster of Excellence MMCI at Saarland University. of Computer Science, Goethe University Frankfurt/Main, Germany. [email protected] ‡ Max Planck Institute for Informatics and Saarland University, Saarland Informatics Campus, Germany. [email protected] † Institute 1 an algorithm with a constant competitive ratio, i.e., the expected total weight of the solution computed by the algorithm is at least a constant fraction of the total weight of the optimum solution. Despite much progress on special cases, the conjecture remains open. Beyond matroids, online algorithms for a variety of combinatorial secretary problems with downward-closed structure have recently been studied (e.g., matching [24, 28], independent set [21], linear packing problems [25] or submodular versions [18, 26]). The best known algorithms for matroid or matching secretary problems rely heavily on knowing the exact weight structure of elements. They either compute max-weight solutions to guide the admission process or rely on advanced bucketing techniques to group elements based on their weight. For a decision maker, in many applications it can be quite difficult to determine an exact cardinal preference for each of the incoming candidates. In contrast, in the original problem, the optimal algorithm only needs ordinal information about the candidates. This property provides a much more robust guarantee, since the numerical values can be arbitrary, as long as they are consistent with the preference order. In this paper, we study algorithms for combinatorial secretary problems that rely only on ordinal information. We assume that there is an unknown value for each element, but our algorithms only have access to the total order of the elements arrived so far, which is consistent with their values. We term this the ordinal model ; as opposed to the cardinal model, in which the algorithm learns the exact values. We show bounds on the competitive ratio, i.e., we compare the quality of the computed solutions to the optima in terms of the exact underyling but unknown numerical values. Consequently, competitive ratios for our algorithms are robust guarantees against uncertainty in the input. Our approach follows a recent line of research by studying the potential of algorithms with ordinal information to approximate optima based on numerical values [1, 3, 4, 10]. 1.1 Our Contribution We first point out that many algorithms proposed in the literature continue to work in the ordinal model. In particular, a wide variety of algorithms for variants of the matroid secretary problem with constant competitive ratios continue to obtain their guarantees in the ordinal model (see Table 1 for an overview). This shows that many results in the literature are much stronger, since the algorithms require significantly less information. Notably, the algorithm of [9] extends to the ordinal model and gives a ratio of O(log2 r) for general matroids, where r is the rank of the matroid. In contrast, the improved algorithms with ratios of O(log r) and O(log log r) [8, 16, 29] are not applicable in the ordinal model. For several combinatorial secretary problems we obtain new algorithms for the ordinal model. For online bipartite matching we give an algorithm that is 2e-competitive. We also extend this result to online packing LPs with at most d non-zero entries per variable. Here we obtain an O(d(B+1)/B )-competitive algorithm, where B is a tightness parameter of the constraints. Another extension is matching in general graphs, for which we give a 8.78-competitive algorithm. We give an O(α21 )-competitive algorithm for the online weighted independent set problem in graphs, where α1 is the local independence number of the graph. For example, for the prominent case of unit-disk graphs, α1 = 5 and we obtain a constant-competitive algorithm. For matroids, we extend a result of [18] to the ordinal model: The reduction from submodular to linear matroid secretary can be done with ordinal information for marginal weights of the elements. More specifically, we show that whenever there is an algorithm that solves the matroid secretary problem in the ordinal model on some matroid class and has a competitive ratio of α, there is also an algorithm for the submodular matroid secretary problem in the ordinal model on the same matroid class with a competitive ratio of O(α2 ). The ratio can be shown to be better if the linear algorithm satisfies some further properties. Lastly, we consider the importance of knowing the weights, ordering, and structure of the domain. For algorithms that have complete√ ordinal information but cannot learn the specific matroid structure, we show a lower bound of Ω( n/(log n)), even for partition matroids, where n is the number of elements in the ground set. This bound contrasts the O(log2 r)-competitive algorithm and indicates that learning the matroid structure is crucial in the ordinal model. Moreover, it 2 Matroid general 2 Ratio O(log r) Reference [9] k-uniform p 1 + O( 1/k), e [6, 15, 27] graphic cographic transversal regular 16 laminar √ 3 3e 2e 3e [28] [30] [13] [23] [14] 9e Table 1: Existing algorithms for matroid secretary problems that provide the same guarantee in the ordinal model. contrasts the cardinal model, where thresholding algorithms yield O(log r)-competitive algorithms without learning the matroid structure. For structural reasons, we present our results in a slightly different order. We first discuss the matroid results in Section 3. Then we proceed with matching and packing in Section 4 and independent set in Section 5. All missing proofs are deferred to the Appendix. 2 Preliminaries and Related Work In the typical problem we study, there is a set E of elements arriving sequentially in random order. The algorithm knows n = |E| in advance. It must accept or reject an element before seeing the next element(s). There is a set S ⊆ 2E of feasible solutions. S is downward-closed, i.e., if S ∈ S, then S ′ ∈ S for every S ′ ⊆ S. The goal is to accept a feasible solution that maximizes an P objective function f . In the linear version, each element has a value or weight we , and f (S) = e∈S we . In the submodular version, f is submodular and f (∅) = 0. In the linear ordinal model, the algorithm only sees a strict total order over the elements seen so far that is consistent with their weights (ties are broken arbitrarily). For the submodular version, we interpret the value of an element as its marginal contribution to a set of elements. In this case, our algorithm has access to an ordinal oracle O(S). For every subset S of arrived elements, O(S) returns a total order of arrived elements consistent with their marginal values f (e|S) = f (S ∪ {e}) − f (S). Given this information, we strive to design algorithms that will have a small competitive ratio f (S ∗ )/E[f (Salg )]. Here S ∗ is an optimal feasible solution and Salg the solution returned by the algorithm. Note that Salg is a random variable due to random-order arrival and possible internal randomization of the algorithm. In the matroid secretary problem, the pair M = (E, S) is a matroid. We summarize in Table 1 some of the existing results for classes of the (linear) problem that transfer to the ordinal model. The algorithms for all restricted matroid classes other than the graphic matroid assume a-priori complete knowledge of the matroid – only weights are revealed online. The algorithms do not use cardinal information, their decisions are based only on ordinal information. As such, they translate directly to the ordinal model. Notably, the algorithm from [9] solves even the general submodular matroid secretary problem in the ordinal model. 2.1 Related Work Our work is partly inspired by [4, 5], who study ordinal approximation algorithms for classical optimization problems. They design constant-factor approximation algorithms for matching and clustering problems with ordinal information and extend the results to truthful mechanisms. Our approach here differs due to online arrival. Anshelevich et al. [3] examine the quality of randomized social choice mechanisms when agents have metric preferences but only ordinal information is available to the mechanism. Previously, [1,10] studied ordinal measures of efficiency in matchings, for instance the average rank of an agent’s partner. The literature on the secretary problem is too broad to survey here. We only discuss directly related work on online algorithms for combinatorial variants. Cardinal versions of these problems have many important applications in ad-auctions and item allocation in online markets [22]. For 3 multiple-choice secretary, where we can select any k candidates, there are algorithms with ratios that are constant and asymptotically decreasing in k [6, 27]. More generally, the matroid secretary problem has attracted a large amount of research interest [8, 11, 16, 29], and the best-known algorithm in the cardinal model has ratio O(log log r). For results on specific matroid classes, see the overview in Table 1. Extensions to the submodular version are treated in [9, 18]. Another prominent domain is online bipartite matching, in which one side of the graph is known in advance and the other arrives online in random order, each vertex revealing all incident weighted edges when it arrives [28]. In this case, there is an optimal algorithm with ratio e [24]. Moreover, our paper is related to Göbel et al. [21] who study secretary versions of maximum independent set in graphs with bounded inductive independence number ρ. They derive an O(ρ2 )-competitive algorithm for unweighted and an O(ρ2 log n)-competitive algorithm for weighted independent set. In addition, algorithms have been proposed for further variants of the secretary problem, e.g., the temp secretary problem (candidates hired for a fixed duration) [19], parallel secretary (candidates interviewed in parallel) [17], or local secretary (several firms and limited feedback) [12]. For these variants, some existing algorithms (e.g., for the temp secretary problem in [19]) directly extend to the ordinal model. In general, however, the restriction to ordinal information poses an interesting challenge for future work in these domains. 3 Matroids 3.1 Submodular Matroids We start our analysis by showing that – in addition to algorithms for special cases mentioned above – a powerful technique for submodular matroid secretary problems [18] can be adjusted to work even in the ordinal model. More formally, in this section we show that there is a reduction from submodular matroid secretary problems with ordinal information (SMSPO) to linear matroid secretary problems with ordinal information (MSPO). The reduction uses Greedy (Algorithm 1) as a subroutine and interprets the marginal value when added to the greedy solution as the value of an element. These values are then forwarded to whichever algorithm (termed Linear) that solves the linear version of the problem. In the ordinal model, we are unable to see the exact marginal values. Nevertheless, we manage to construct a suitable ordering for the forwarded elements. Consequently, we can apply algorithm Linear as a subroutine to obtain a good solution for the ordinal submodular problem. Let M = (E, S) be the matroid, f the submodular function, and E the ground set of elements. The marginal contribution of element u to set M is denoted by f (u|M ) = f (M ∪ {u}) − f (M ). Since f can be non-monotone, Greedy in the cardinal model also checks if the marginal value of the currently best element is positive. While we cannot explicitly make this check in the ordinal model, note that f (u|M ) ≥ 0 ⇐⇒ f (M ∪ {u}) ≥ f (M ) = f (M ∪ {u′ }) for every u′ ∈ M . Since the ordinal oracle includes the elements of M in the ordering of marginal values, there is a way to check positivity even in the ordinal model. Therefore, our results also apply to non-monotone functions f . A potential problem with Algorithm 2 is that we must compare marginal contributions of different elements w.r.t. different sets. We can resolve this issue by following the steps of the Algorithm 1: Greedy [18] Input : ground set E Output: independent set M 1 2 3 4 Let M ← ∅ and E ′ ← E. while E ′ 6= ∅ do Let u ← maxu′ f (u′ |M ) and E ′ ← E ′ \ {u}; if (M ∪ {u} independent in M) ∧ (f (u|M ) ≥ 0) then add u to M ; 4 Algorithm 2: Online(p) algorithm [18] Input : n = |E|, size of the ground set Output: independent set Q ∩ N 1 Choose X from the binomial distribution B(n, 1/2). 2 Reject the first X elements of the input. Let L be the set of these elements. 3 Let M be the output of Greedy on the set L. 4 Let N ← ∅. 5 for each element u ∈ E \ L do 6 Let w(u) ← 0. 7 if u accepted by Greedy applied to M ∪ {u} then 8 With probability p do the following: 9 Add u to N . 10 Let Mu ⊆ M be the solution of Greedy immediately before it adds u to it. 11 w(u) ← f (u|Mu ). Pass u to Linear with weight w(u). 12 13 return Q ∩ N , where Q is the output of Linear. Greedy subroutine that tries to add new elements to the greedy solution computed on the sample. We use this information to construct a correct ordering over the marginal contributions of elements that we forward to Linear. Lemma 1. Let us denote by su the step of Greedy in which the element u is accepted when applied to M + u. Then su1 < su2 implies f (u1 |Mu1 ) ≥ f (u2 |Mu2 ). Proof. First, note that Mu1 ⊂ Mu2 when s1 > s2 . We denote by mu1 the element of M that would be taken in step su1 if u1 would not be available. Then we know that f (u1 |Mu1 ) ≥ f (mu1 |Mu1 ). Furthermore, since s1 < s2 , f (mu1 |Mu1 ) ≥ f (u2 |Mu1 ). Lastly, by using submodularity, we know that f (u2 |Mu1 ) ≥ f (u2 |Mu2 ). When su1 = su2 , then Mu1 = Mu2 so the oracle provides the order of marginal values. Otherwise, the lemma yields the ordinal information. Thus, we can construct an ordering for the elements that are forwarded to Linear that is consistent with their marginal values in the cardinal model. Hence, the reduction can be applied in the ordinal model, and all results from [18] continue to hold. We mention only the main theorem. It implies constant ratios for all problems in Table 1 in the submodular version. Theorem 1. Given an arbitrary algorithm Linear for MSPO that is α-competitive on a matroid class, there is an algorithm for SMSPO with competitive ratio is at most 24α(3α + 1) = O(α2 ) on the same matroid class. For SMSPO with monotone f , it can be improved to 8α(α + 1). 3.2 A Lower Bound Another powerful technique in the cardinal model is thresholding, where we first sample a constant fraction of the elements to learn their weights. Based on the largest weight observed, we pick a threshold and accept subsequent elements greedily if they exceed the threshold. This approach generalizes the classic algorithm [15] and provides logarithmic ratios for many combinatorial domains [8, 12, 21, 28]. Intuitively, these algorithms learn the weights but not the structure. We show that this technique does not easily generalize to the ordinal model. The algorithms with small ratios in the ordinal model rely heavily on the matroid structure. Indeed, in the ordinal model we show a polynomial lower bound for algorithms in the matroid secretary problem that learn the ordering but not the structure. Formally, we slightly simplify the setting as follows. The algorithm receives the global ordering of all elements in advance. It determines (possibly at random) a threshold position in the ordering. Then elements arrive and are accepted greedily if 5 1 k 2k 3k n−k n ... 1 0 1 1 1 .. . 1 0 0 0 0 .. . .. . .. . 0 0 0 0 1 0 0 ... 1 1 k .. . 1 1 Figure 1: Values for the family of instances de- Figure 2: One instance from the family described in the proof of Theorem 11, where the scribed in the proof of Theorem 11. position of the “valuable” ones is denoted by the thick segment. ranked above the threshold. Note that the algorithm does not use sampling, since in this case the only meaningful purpose of sampling is learning the structure. We call this a structure-oblivious algorithm. Theorem 2. Every structure-oblivious randomized algorithm has a competitive ratio of at least √ Ω( n/(log n)). Proof. In the proof, we restrict our attention to instances with weights in {0, 1} (for a formal justification, see Lemma 7 in the Appendix). We give a distribution of such instances on which √ every deterministic algorithm has a competitive ratio of Ω( n/(log n)). Using Yao’s principle, this shows the claimed result for randomized algorithms. All instances in the distribution are based on a graphic matroid (in fact, a partition matroid) of the following form. There is a simple path of 1 + k segments. The edges in each segment have weight of 0 or 1. We call the edges with value 1 in the last k segments the “valuable edges”. The total number of edges is the same in each instance and equals n + 1. All edges in the first segment have value 1 and there is exactly one edge of value 1 in all other segments (that being the aforementioned valuable edges). In the first instance there are in total k + 1 edges of value 1 (meaning that there is only one edge in the first segment). In each of the following instances this number is increased by k (in the i-th instance there are (i−1)·k +1 edges in the first segment) such that the last instance has only edges with value 1 (there are n − k + 1 edges in the first segment). The zero edges are always equally distributed on the last k path segments. The valuable edges are lower in the ordering than any non-valuable edge with value 1 (see Figure 1). Each of the instances appears with equal probability of nk (see Figure 2 for one example instance). A deterministic algorithm picks a threshold at position i. The expected value of the solution is i k k2 i k2 n kX k ≤1+ log ≤ log + 1 , E[w(Salg )] ≤ 1 + n ℓ n k n k ℓ=1 where log denotes the natural logarithm and the expression results from observing that the algorithm cannot obtain more than a value of 1 if its threshold i falls above the valuable 1’s. Otherwise it gets an additional fraction of k, depending on how close the threshold is positioned to the valuable 1’s. For instance, if the threshold is set between 1 and k positions below the valuable 1’s, the algorithm will in expectation select edges of total value of at least 1 + k/2. This follows from the random arrival order of the edges and the fact that the ratio of valuable to non-valuable edges that the algorithm is ready to accept is at least 1 : 2. Furthermore, we see that for this distribution √ of instances the optimal way to set a deterministic threshold is at the lowest position. Using k = n, a lower bound on the competitive ratio is  √  n n k = . n = Ω n n k2 k log k + k log n n log k + 1 6 Algorithm 3: Bipartite Matching Input : vertex set R and cardinality n = |L| Output: matching M 1 2 3 4 5 6 Let L′ be the first ⌊ ne ⌋ vertices of L, and M ← ∅; for each ℓ ∈ L \ L′ do L′ ← L′ ∪ {ℓ}; M (ℓ) ← greedy matching on G[L′ ∪ R]; Let e(ℓ) ← (ℓ, r) be the edge assigned to ℓ in M (ℓ) ; if M ∪ {e(ℓ) } is a matching then add e(ℓ) to M ; 4 4.1 Matching and Packing Bipartite Matching In this section, we study online bipartite matching. The vertices on the right side of the graph (denoted by R) are static and given in advance. The vertices on the left side (denoted by L) arrive sequentially in a random order. Every edge e = (r, ℓ) ∈ R × L has a non-negative weight w(e) ≥ 0. In the cardinal model, each vertex of L reveals upon arrival the weights of all incident edges. In the ordinal model, we are given a total order on all edges that have arrived so far, consistent with their weights. Before seeing the next vertex of L, the algorithm has to decide to which vertex r ∈ R (if any) it wants to match the current vertex ℓ. A match that is formed cannot be revoked. The goal is to maximize the total weight of the matching. The algorithm for the cardinal model in [24] achieves an optimal competitive ratio of e. However, this algorithm heavily exploits cardinal information by repeatedly computing max-weight matchings for the edges seen so far. For the ordinal model, our Algorithm 3 below obtains a competitive ratio of 2e. While similar in spirit, the main difference is that we rely on a greedy matching algorithm, which is based solely on ordinal information. It deteriorates the ratio only by a factor of 2. Here we assume to have access to ordinal preferences over all the edges in the graph. Note that the same approach works if the vertices provide correlated (ordinal) preference lists consistent with the edge weights, for every vertex from R and every arrived vertex from L. In this case, the greedy algorithm can still be implemented by iteratively matching and removing a pair that mutually prefers each other the most, and it provides an approximation guarantee of 2 for the max-weight matching (see, e.g., [2]). In contrast, if we receive only preference lists for vertices on one side, there are simple examples that establish super-constant lower bounds on the competitive ratio1 . Lemma 2. Let the random variable Av denote the contribution of the vertex v ∈ L to the output, i.e. weight assigned to v in M . Let w(M ∗ ) denote the value of the maximum-weight matching in G. For ℓ ∈ {⌈ ne ⌉, . . . , n},   ⌊ n ⌋ w(M ∗ ) E Aℓ ≥ e · . ℓ−1 2n Proof. We first show that e(ℓ) has a significant expected weight. Then we bound the probability of adding e(ℓ) to M . In step ℓ, |L′ | = ℓ and the algorithm computes a greedy matching M (ℓ) on G[L′ ∪ R]. The current vertex ℓ can be seen as selected uniformly at random from L′ , and L′ can be seen as ∗ ∗ ) ) and E[w(e(ℓ) )] ≥ w(M selected uniformly at random from L. Therefore, E[w(M (ℓ) )] ≥ nℓ · w(M 2 2n . Here we use that a greedy matching approximates the optimum by at most a factor of 2 [2]. 1 Consider a bipartite graph with two nodes on each side (named A,B and 1,2). If we only know that both A and B prefer 1 to 2, the ratio becomes at least 2 even in the offline case. Similar examples imply that the (offline) ratio must grow in the size of the graph. 7 Edge e(ℓ) can be added to M if r has not been matched already. The vertex r can be matched only when it is in M (k) . The probability of r being matched in step k is at most k1 and the order of the vertices in steps 1, . . . , k − 1 is irrelevant for this event. Pr[r unmatched in step ℓ] = Pr ℓ−1 ^ " k=⌈n/e⌉ r 6∈ e We now know that Pr[M ∪ e(ℓ) is a matching] ≥ lemma follows. (k) ⌊n/e⌋ ℓ−1 . # ≥ ℓ−1 Y k=⌈n/e⌉ ⌈n⌉ − 1 k−1 = e k ℓ−1 Using this and E[w(e(ℓ) )] ≥ w(M ∗ ) 2n , the Theorem 3. Algorithm 3 for bipartite matching is 2e-competitive. Proof. The weight of matching M can be obtained by summing over random variables Aℓ . " n # n n−1 X X ⌊n/e⌋ w(M ∗ ) ⌊n/e⌋ X 1 E[w(M )] = E Aℓ ≥ · = · w(M ∗ ) ℓ−1 2n 2n ℓ ℓ=1 Since ⌊n/e⌋ n ≥ 1 e − 1 n and ℓ=⌈n/e⌉ Pn−1 1 ℓ=⌊n/e⌋ ℓ ℓ=⌊n/e⌋ n ≥ ln ⌊n/e⌋ ≥ 1, it follows that E[w(M )] ≥  1 1 − e n  · w(M ∗ ) . 2 In the submodular version of the offline problem, the natural greedy algorithm gives a 3approximation [20]. It builds the matching by greedily adding an edge that maximizes the marginal improvement of f , which is the information delivered by the ordinal oracle. When using this algorithm as a subroutine for the bipartite matching secretary problem, the resulting procedure achieves a 12-approximation in the submodular case [26]. 4.2 Packing Our results for bipartite matching can be extended to online packing LPs of the form max cτ x s.t. Ax ≤ b and 0 ≤ x ≤ 1, which model problems with m resources and n online requests coming in random order. Each resource i ∈ [m] has a capacity bi that is known in advance, together with the number of requests. Every online request comes with a set of options, where each option has its profit and resource consumption. Once a request arrives, the coefficients of its variables are revealed and the assignment to the variables has to be determined. Formally, request j ∈ [n] corresponds to variables xj,1 , . . . , xj,K that represent K options. Each option k ∈ [K] contributes with profit cj,k ≥ 0 and has resource consumption P ai,j,k ≥ 0 for resource i. Overall, at most one option can be selected, i.e., there is a constraint k∈[K] xj,k ≤ 1, ∀j ∈ [n]. The objective is to maximize total profit while respecting the resource capacities. The offline problem is captured by the following linear program: X X X X ai,j,k xj,k ≤ bi i ∈ [m] cj,k xj,k s.t. max j∈[n] k∈[K] j∈[n] k∈[K] X k∈[K] xj,k ≤ 1 j ∈ [n] As a parameter, we denote by d the maximum number of non-zero entries in any column of the constraint matrix A, for which by definition d ≤ m. We compare the solution to the fractional ∗ optimum, which we denote by ratio will be expressed in terms of d and the j x . The competitive k bi capacity ratio B = mini∈[m] maxj∈[n],k∈[K] . ai,j,k 8 Algorithm 4: Packing LP Input : capacities b, total number of requests n, probability p = Output: assignment vector y 1 2 3 4 e(2d)1/B 1+e(2d)1/B Let L′ be the first p · n requests, and y ← 0; for each j ∈ / L′ do ′ ′ L ← L ∪ {j}; ′ x(L ) ← greedy assignment on the LP for L′ ; (L′ ) yj ← xj ; if ¬(A(y) ≤ b) then yj ← 0; 5 6 Kesselheim et al. [24] propose an algorithm that heavily exploits cardinal information – it repeatedly solves an LP-relaxation and uses the solution as a probability distribution over the options. Instead, our Algorithm 4 for the ordinal model is based on greedy assignments in terms of profits cj,k . More specifically, the greedy assignment considers variables xj,k in non-increasing order of cj,k . It sets a variable to 1 if this does not violate the capacity constraints, and to 0 otherwise. Theorem 4. Algorithm 4 for online packing LPs is O(d(B+1)/B )-competitive. 4.3 Matching in General Graphs Here we study the case when vertices of a general undirected graph arrive in random order. In the beginning, we only know the number n of vertices. Each edge in the graph has a non-negative weight w(e) ≥ 0. Each vertex reveals the incident edges to previously arrived vertices and their weights (cardinal model), or we receive a total order over all edges among arrived vertices that is consistent with the weights (ordinal model). An edge can be added to the matching only in the round in which it is revealed. The goal is to construct a matching with maximum weight. We can tackle this problem by prolonging the sampling phase and dividing the vertices into “left” and “right” vertices. Algorithm 5 first samples n/2 vertices. These are assigned to be the set R, corresponding to the static side of the graph in bipartite matching. The remaining vertices are assigned to be the set L. The algorithm then proceeds by sampling a fraction of the vertices of L, forming a set L′ . The remaining steps are exactly the same as in Algorithm 3. Theorem 5. Algorithm 5 for matching in general graphs is 12e/(e+1)-competitive, where 12e/(e+ 1) < 8.78. Algorithm 5: General Matching Input : vertex set V and cardinality n = |V | Output: matching M 1 2 3 4 5 6 7 Let R be the first ⌊ n2 ⌋ vertices of V ; n ⌋ vertices of V , and M ← ∅; Let L′ be the further ⌊ 2e ′ for each ℓ ∈ V \ L do L′ ← L′ ∪ {ℓ}; M (ℓ) ← greedy matching on G[L′ ∪ R]; Let e(ℓ) ← (ℓ, r) be the edge assigned to ℓ in M (ℓ) ; if M ∪ {e(ℓ) } is a matching then add e(ℓ) to M ; 9 Algorithm 6: Independent Set in Graphs with Bounded Local Independence Number p Input : n = |G|, p = α1 /(α1 + 1) Output: independent set of vertices S 1 2 3 4 5 6 Set k ← Binom(n, p), S ← ∅; Reject first k vertices of G, denote this set by G′ ; Build a maximal independent set of vertices from G′ greedily, denote this set by M1 ; for each v ∈ G \ G′ do w∗ ← max{w | N (v) ∩ M1 }; if (v > w∗ ) ∧ (S ∪ {v} independent set) then add v to S; Algorithm 7: Simulate p Input : n = |G|, p = α1 /(α1 + 1) Output: independent set of vertices S 1 2 3 4 5 6 7 8 9 5 Sort all vertices in G in non-increasing order of value; Initialize M1 , M2 ← ∅; for each v ∈ G in sorted order do if M1 ∪ {v} independent set then flip a coin with probability p of heads; if heads then M1 ← M1 ∪ {v}; else M2 ← M2 ∪ {v}; S ← M2 ; for each w ∈ S do if w has neighbors in S then remove w and all his neighbors from S; Independent Set and Local Independence In this section, we study maximum independent set in graphs with bounded local independence number. The set of elements are the vertices V of an underyling undirected graph G. Each vertex has a weight wv ≥ 0. We denote by N (v) the set of direct neighbors of vertex v. Vertices arrive sequentially in random order and reveal their position in the order of weights of vertices seen so far. The goal is to construct an independent set of G with maximum weight. The exact structure of G is unknown, but we know that G has a bounded local independence number α1 . Definition 1. An undirected graph G has local independence number α1 if for each node v, the cardinality of every independent set in the neighborhood N (v) is at most α1 . We propose Algorithm 6, which is inspired by the Sample-and-Price algorithm for matching in [28]. Note that Göbel et al. [21] construct a more general approach for graphs with bounded inductive independence number ρ. However, they only obtain a ratio of O(ρ2 log n) for the weighted version, where a competitive ratio of Ω(log n/ log2 log n) cannot be avoided, even in instances with constant ρ. These algorithms rely on ρ-approximation algorithms for the offline problem that crucially exploit cardinal information. Similar to [28], we reformulate Algorithm 6 into an equivalent approach (Algorithm 7) for the sake of analysis. Given the same arrival order, the same vertices are in the sample. Algorithm 7 drops all vertices from S that have neighbors in S while Algorithm 6 keeps one of them. Hence, E[w(SAlg )] ≥ E[w(SSim )]. In what follows, we analyze the performance of Simulate. The first 6 lemma follows directly from the definition of the local independence number. Lemma 3. E[w(M1 )] ≥ p · w(S ∗ ) α1 , where α1 ≥ 1 is the local independence number of G.   Lemma 4. E |N (v) ∩ M2 | v ∈ M2 ≤ α1 (1−p) p . 10 Proof. Let us denote by Xu1 and Xu2 the indicator variables for the events u ∈ M1 and u ∈ M2 respectively. Then, # " X X     E Xu2 v ∈ M2 Xu2 v ∈ M2 = E |N (v) ∩ M2 | v ∈ M2 = E u∈N (v) u∈N (v)   1−p 1−p X = E Xu1 v ∈ M2 ≤ · α1 p p u∈N (v) Theorem 6. Algorithm 7 for weighted independent set is O(α21 )-competitive, where α1 is the local independence number of the graph. Proof. By using Markov’s inequality and Lemma 4, Pr[|N (v) ∩ M2 | ≥ 1 v ∈ M2 ] ≤ and Pr[|N (v) ∩ M2 | < 1 v ∈ M2 ] > α1 · (1 − p)/p 1 − (α1 (1 − p)/p) . Thus, we can conclude that     1−p 1−p 1−p E[w(S)] ≥ 1 − α1 · · E[w(M2 )] ≥ 1 − α1 · · · w(S ∗ ) . p p α1 q 1 , which proves the theorem. The ratio is optimized for p = αα 1 +1 As a prominent example, α1 = 5 in the popular class of unit-disk graphs. In such graphs, our algorithm yields a constant competitive ratio for online independent set in the ordinal model. References [1] David Abraham, Robert Irving, Telikepalli Kavitha, and Kurt Mehlhorn. Popular matchings. SIAM J. Comput., 37(4):1030–1045, 2007. [2] Elliot Anshelevich and Martin Hoefer. Contribution games in networks. Algorithmica, 63(1– 2):51–90, 2012. [3] Elliot Anshelevich and John Postl. Randomized social choice functions under metric preferences. In Proc. 25th Intl. Joint Conf. Artif. Intell. (IJCAI), pages 46–59, 2016. [4] Elliot Anshelevich and Shreyas Sekar. Blind, greedy, and random: Algorithms for matching and clustering using only ordinal information. In Proc. 13th Conf. Artificial Intelligence (AAAI), pages 390–396, 2016. [5] Elliot Anshelevich and Shreyas Sekar. Truthful mechanisms for matching and clustering in an ordinal world. In Proc. 12th Conf. Web and Internet Economics (WINE), pages 265–278, 2016. [6] Moshe Babaioff, Nicole Immorlica, David Kempe, and Robert Kleinberg. A knapsack secretary problem with applications. In Proc. 10th Workshop Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 16–28, 2007. [7] Moshe Babaioff, Nicole Immorlica, David Kempe, and Robert Kleinberg. Online auctions and generalized secretary problems. SIGecom Exchanges, 7(2), 2008. [8] Moshe Babaioff, Nicole Immorlica, and Robert Kleinberg. Matroids, secretary problems, and online mechanisms. In Proc. 18th Symp. Discrete Algorithms (SODA), pages 434–443, 2007. 11 [9] MohammadHossein Bateni, MohammadTaghi Hajiaghayi, and Morteza Zadimoghaddam. Submodular secretary problem and extensions. ACM Trans. Algorithms, 9(4):32, 2013. [10] Deeparnab Chakrabarty and Chaitanya Swamy. Welfare maximization and truthfulness in mechanism design with ordinal preferences. In Proc. 5th Symp. Innovations in Theoret. Computer Science (ITCS), pages 105–120, 2014. [11] Sourav Chakraborty and Oded Lachish. Improved competitive ratio for the matroid secretary problem. In Proc. 23rd Symp. Discrete Algorithms (SODA), pages 1702–1712, 2012. [12] Ning Chen, Martin Hoefer, Marvin Künnemann, Chengyu Lin, and Peihan Miao. Secretary markets with local information. In Proc. 42nd Intl. Coll. Automata, Languages and Programming (ICALP), volume 2, pages 552–563, 2015. [13] Nedialko Dimitrov and Greg Plaxton. Competitive weighted matching in transversal matroids. Algorithmica, 62(1-2):333–348, 2012. [14] Michael Dinitz and Guy Kortsarz. Matroid secretary for regular and decomposable matroids. SIAM J. Comput., 43(5):1807–1830, 2014. [15] Eugene Dynkin. The optimum choice of the instant for stopping a Markov process. In Sov. Math. Dokl, volume 4, pages 627–629, 1963. [16] Moran Feldman, Ola Svensson, and Rico Zenklusen. A simple O (log log(rank))-competitive algorithm for the matroid secretary problem. In Proc. 26th Symp. Discrete Algorithms (SODA), pages 1189–1201, 2015. [17] Moran Feldman and Moshe Tennenholtz. Interviewing secretaries in parallel. In Proc. 13th Conf. Electronic Commerce (EC), pages 550–567, 2012. [18] Moran Feldman and Rico Zenklusen. The submodular secretary problem goes linear. In Proc. 56th Symp. Foundations of Computer Science (FOCS), pages 486–505, 2015. [19] Amos Fiat, Ilia Gorelik, Haim Kaplan, and Slava Novgorodov. The temp secretary problem. In Proc. 23rd European Symp. Algorithms (ESA), pages 631–642, 2015. [20] Marshall Fisher, George Nemhauser, and Laurence Wolsey. An analysis of approximations for maximizing submodular set functions-II. In Polyhedral combinatorics, pages 73–87. Springer, 1978. [21] Oliver Göbel, Martin Hoefer, Thomas Kesselheim, Thomas Schleiden, and Berthold Vöcking. Online independent set beyond the worst-case: Secretaries, prophets and periods. In Proc. 41st Intl. Coll. Automata, Languages and Programming (ICALP), volume 2, pages 508–519, 2014. [22] MohammadTaghi Hajiaghayi, Robert Kleinberg, and David Parkes. Adaptive limited-supply online auctions. In Proc. 5th Conf. Electronic Commerce (EC), pages 71–80, 2004. [23] Patrick Jaillet, José Soto, and Rico Zenklusen. Advances on matroid secretary problems: Free order model and laminar case. In Proc. 16th Intl. Conf. Integer Programming and Combinatorial Optimization (IPCO), pages 254–265, 2013. [24] Thomas Kesselheim, Klaus Radke, Andreas Tönnis, and Berthold Vöcking. An optimal online algorithm for weighted bipartite matching and extensions to combinatorial auctions. In Proc. 21st European Symp. Algorithms (ESA), pages 589–600, 2013. [25] Thomas Kesselheim, Klaus Radke, Andreas Tönnis, and Berthold Vöcking. Primal beats dual on online packing LPs in the random-order model. In Proc. 46th Symp. Theory of Computing (STOC), pages 303–312, 2014. 12 [26] Thomas Kesselheim and Andreas Tönnis. Submodular secretary problems: Cardinality, matching, and linear constraints. In Proc. 20th Workshop Approximation Algorithms for Combinatorial Optimization Problems (APPROX), pages 16:1–16:22, 2017. [27] Robert Kleinberg. A multiple-choice secretary algorithm with applications to online auctions. In Proc. 16th Symp. Discrete Algorithms (SODA), pages 630–631, 2005. [28] Nitish Korula and Martin Pál. Algorithms for secretary problems on graphs and hypergraphs. In Proc. 36th Intl. Coll. Automata, Languages and Programming (ICALP), pages 508–520, 2009. [29] Oded Lachish. O(log log rank) competitive ratio for the matroid secretary problem. In Proc. 55th Symp. Foundations of Computer Science (FOCS), pages 326–335, 2014. [30] José Soto. Matroid secretary problem in the random-assignment model. SIAM J. Comput., 42(1):178–211, 2013. 13 A Appendix A.1 Proof of Theorem 4 The proof is based on the following lemma. Lemma 5. Let the random variable Aℓ denote the contribution of request xℓ to the output and cτ x∗ the value of the optimal fractional solution. For requests xj ∈ {pn + 1, . . . , n} it holds that B ! τ ∗  c x e(1 − p) . E[Aj ] ≥ 1 − d · p (d + 1)n (L′ ) (L′ ) (L′ ) τ ∗ c x Proof. If xj,k = 1, then as in proof of Lemma 2, we get E[cj xj ] = E[cj,k xj,k ] ≥ (d+1)n , where ′ the expectation is taken over the choice of the set L and the choice of the last vertex in the order of arrival. (L′ ) only if the capacity constraints can be respected. For the sake The algorithm sets yj to xj (L′ ) of analysis, we assume that the algorithm only sets yj to xj (L′ ) xj if every capacity constraint bi that (L′ ) (xj,k affects = 1 and ai,j,k 6= 0) is affected by at most B −1 previous requests. We bound the probability of a capacity constraint bi being affected in any preceding step s ∈ {pn + 1, . . . , j − 1}, for a fixed i: X (L′ ) Pr[(xj ′ is last in the order) ∧ (ai,j ′ ,k′ 6= 0)] Pr[bi affected by xs,k′ = 1] ≤ xj′ ∈{1,...,s} ≤ 1 s X xj′ ∈{1,...,s} B , s Pr[ai,j ′ ,k′ 6= 0] ≤ where the last step follows from y being a feasible solution throughout the run of the algorithm. (L′ ) Now, we bound the probability of not being able to set yj to xj : Y  X B Pr[bi is affected at least B times] ≤ s C⊆{pn+1,...,j−1}, |C|=B ≤ s∈C B    B  (1 − p)n B (1 − p)e · ≤ , pn p B (L′ ) so the probability of succeeding in setting yj to xj Pr[Ay ≤ b] ≥ 1 − d ·  is (1 − p)e p B , (L′ ) and there are at most d because we can do a union bound over all bi that are affected by xj such, since that is the maximal number of non-zero entries in any column of the constraint matrix A. (L′ ) Combining this with the inequality regarding the expected contribution of xj , we get the claimed result. Using Lemma 5, we get E[cτ y] = n X ℓ=pn+1 τ = ∗ E[Aℓ ] ≥ n X l=pn+1 1 c x · · d + 1 1 + e(2d)1/B B ! τ ∗ c x e(1 − p) 1−d· p (d + 1)n B !  cτ x∗ 1 ≥ 1−d· . (2d)1/B 2(d + 1)(1 + 2ed1/B )  14 Note that Theorem 4 contains the one-sided b-hypermatching problem as a special case. For the even more special case of b = 1 in the one-sided hypermatching, an algorithm was given in [28], which also works in the ordinal model. Our ratio in this special case is similar, but our approach extends to arbitrary capacities b ≥ 1. A.2 Proof of Theorem 5 The proof is based on the following lemma. Lemma 6. Let the random variable Aℓ denote the contribution of vertex ℓ ∈ ⌊n/2 + n/(2e)⌋ to the output, i.e. the weight of the edge assigned to ℓ in M . Then, E[Aℓ ] ≥ n ⌈ n2 + 2e ⌉ 1 w(M ∗ ) · · ℓ−1 2 n Proof. The proof is similar to the one of Lemma 5, with the additional observation that each edge is available with probability 12 . It is available only if the incident vertices are assigned to different sides of the bipartition. We now use the lemma to bound as follows: " n # n X X E[w(M )] = E Aℓ ≥ ℓ=1 ℓ=⌈n/2+n/(2e)⌉ ⌊n/2 + n/(2e)⌋ 1 w(M ∗ ) · · ℓ−1 2 n n−1 X 1 ⌊n/2 + n/(2e)⌋ w(M ∗ ) · · n 2 ℓ ℓ=⌊n/2+n/(2e)⌋    1 1 w(M ∗ ) 1 1 1+ − · · ≥ 2 e n 2 3 = A.3 Competitive Ratio and 0–1 Weights For worst-case bounds, we can restrict our attention to instances where all elements have cardinal weights in {0, 1}. These instances always result in the worst competitive ratio, as shown in the following lemma. Lemma 7. By converting an arbitrary weighted instance to an instance with weights in {0, 1}, the competitive ratio between the optimum solution and the solution computed by an algorithm based on ordinal information can only deteriorate. Proof. Without loss of generality, we assume that all elements of the original instance have distinct weights. We denote the elements chosen in the optimal solution by a∗1 , . . . , a∗k and the elements chosen by the algorithm by b1 , . . . , bm . The numbering respects the ordinal ordering of weights, i.e., a∗1 ≻ a∗2 ≻ . . . a∗k and b1 ≻ b2 ≻ · · · ≻ bm . The competitive ratio is w(a∗1 ) + · · · + w(a∗k ) OPT = . ALG w(b1 ) + · · · + w(bm ) This ratio can only increase if we change the weight of all elements that appear after a∗k in the global ordering to 0. This effectively shortens the set of elements with a contribution chosen by the algorithm to b1 , . . . , bℓ , for some suitable ℓ ≤ m. Furthermore, we change the weights of all elements between a∗i and a∗i+1 by decreasing them to a∗i+1 . We now denote the elements that the algorithm chose by c1 , . . . , cl , since their weights might have changed. Both of these changes do 15 not influence OPT, but they reduce the weight of the solution returned by the algorithm. We continue converting the instance, by focusing on w(a∗k ). Then, OPT w(a∗1 ) + · · · + w(a∗k ) w(a∗1 ) + · · · + w(a∗k ) = ≤ ALG w(b1 ) + · · · + w(bm ) w(b1 ) + · · · + w(bℓ ) A + w(a∗k ) w(a∗1 ) + · · · + w(a∗k ) = , ≤ w(c1 ) + · · · + w(cℓ ) B + r · w(a∗k ) where A = w(a∗1 ) + · · · + w(a∗k−1 ), B is the sum of the weights of all elements that the algorithm chose which are not equal to w(a∗k ) in the altered instance and r ∈ N0 . Taking the derivative for w(a∗k ),  A + w(a∗k ) B + r · w(a∗k ) ′ = B−r·A , (B + r · w(a∗k ))2 we either decrease w(a∗k ) to 0 or raise it to w(a∗k−1 ) (depending what makes the ratio increase, i.e., the sign of the derivative). We continue this procedure until all weights of the instance are equal to either to a∗1 or 0. Note that these changes preserve the global ordering. W.l.o.g., we can finally set w(a∗1 ) = 1. Note that we increased the ratio between the solution of the algorithm and the optimal solution for the original weights, when applying the transformed weights. Note that none of these transformations change the decisions of the algorithm. In contrast, the optimum solution for the transformed weights can only become better, which even further deteriorates the competitive ratio. 16
8cs.DS
arXiv:0908.3650v1 [cs.PL] 25 Aug 2009 Lazy mixin modules and disciplined effects Keiko Nakata February 27, 2018 Abstract Programming languages are expected to support programmer’s effort to structure program code. The ML module system, object systems and mixins are good examples of language constructs promoting modular programming. Among the three, mixins can be thought of as a generalization of the two others in the sense that mixins can incorporate features of ML modules and objects with a set of primitive operators with clean semantics. Much work has been devoted to build mixin-based module systems for practical programming languages. In respect of the operational semantics, previous work notably investigated mixin calculi in call-by-name and call-by-value evaluation settings. In this paper we examine a mixin calculus in a call-by-need, or lazy, evaluation setting. We demonstrate how lazy mixins can be interesting in practice with a series of examples, and formalize the operational semantics by adapting Ancona and Zucca’s concise formalization of call-by-name mixins. We then extend the semantics with constraints to control the evaluation order of components of mixins in several ways. The main motivation for considering the constraints is to produce side effects in a more explicit order than in a purely lazy, demand-driven setting. We explore the design space of possibly interesting constraints and consider two examples in detail. 1 Introduction Modularity is an important factor in the development of large programs. In particular programmer’s effort to logically organize program code is of great importance in the long run to maintain, debug and extend the program code. Many modern programming languages have mechanisms to support this effort by facilitating modular development of programs. Examples of these mechanisms are object systems and the ML module system. Being ML programmers, we enjoy the rich expressivity of the ML module system for modular programming. Nestable structures allow us to hierarchically organize namespaces and program code. With signature constraints, we control visibility of components of structures. In particular the combination of nesting and signature constraints offers fine grained visibility control, as witnessed, for example, by the Moby programming language [Fisher and Reppy(1999)]. Functors, which are functions on modules, facilitate code reuse in a modular way. 1 Although functors might not be as pervasive as nesting or signature constraints in our programs, they play a critical role in some contexts. Good examples are Map.Make and Set.Make functors as implemented in OCaml’s standard library. However ML does not have recursive modules. That is, neither recursive functions nor types can be defined across module boundaries. As a result of this constraint, programmers may have to consolidate conceptually separate components into a single module, intruding on modular programming [Russo(2001)]. Compared to ML, object systems have excellent support for recursion across object/class boundaries. Particularly in the presence of late-binding, object systems facilitate the development of extensible programs, where recursively defined types and functions may need to be extended together. Typical such scenarios are condensed in the notorious expression problem [Torgersen(2004)]. We expect a module system to support all the familiar features of ML modules as well as recursion between modules and late-binding. There are at least three approaches to design such a module system. Two of them are to extend the ML module system with recursion [Crary et al.(1999)Crary, Harper, and Puri] and to extend object systems with nesting, abbreviation and type members [Odersky et al.(2003)Odersky, Cremet, Röckl, and Zenger]. The third approach is to develop another form of a module system, namely mixins. In this paper we follow this third approach. The concept of mixins is first introduced in the context of object systems [Bracha(1992)], then is extended to in the context of ML-style modules. A mixin is a collection of named components, where each component can be either defined (bound to a definition) or deferred (declared without definition). Two key operations on mixins are the sum and freeze operations; the former takes two mixins and composes a new mixin by merging the two, and the latter resolves, or links, deferred components of a mixin to defined ones. The sum operation is reminiscent of functor application in ML and inheritance in object systems. However more flexibility is obtained by separating the resolution from the sum operation. The freeze operation is free to resolve a deferred component to a defined one independently of their names at any point, as long as their types match; notably it can liberally tie a recursive knot inside a mixin. Indeed mixins are designed to be a generalization of ML-style modules and objects, by incorporating features of both with a set of primitive operators with clean semantics [Bracha(1992), Ancona and Zucca(2002)]. Two challenging problems remain to replace ML-style modules with mixins, namely type checking and initialization. In this paper, we address the latter problem. Promising progress has been made in designing a type system for mixins with type components and a signature language to enforce type abstraction between mixins [Odersky et al.(2003)Odersky, Cremet, Röckl, and Zenger, Owens and Flatt(2006)]; we expect to benefit from the previous work for the former problem. Initialization of mixins poses an important design problem if we are to build a mixin-based module system on top of a call-by-value core language supporting arbitrary side-effects, such as the ML core language. The main difficulty stems 2 from unconstrained recursive definitions such as let rec x = x that the core language does not allow but that might result from the freeze operation. We need an initialization semantics for mixins which takes account of unconstrained recursion consistently with the call-by-value semantics of the core language; this is the subject of this paper. Ancona and Zucca’s mixin calculus [Ancona and Zucca(2002)], called CMS, is one of the most influential work in formalizing an operational semantics for mixins. The formalization is elegantly concise and the paper illustrates how mixins support various existing constructs for composing modules, found in the ML module system, object-systems and linking calculi [Cardelli(1997)], wellexplaining why we claim mixins are a generalization of other modular systems. Inspired by CMS, Hirschowitz and Leroy examined a mixin calculus in a callby-value setting to build a mixin-based module system on top of the ML core language. The original call-by-name semantics of CMS might not be well-suited for the call-by-value effectful ML core language; CMS admits recursive definitions such as let rec x = x, causing the evaluation to diverge when x is selected, and it can produce the same side-effect repeatedly. Neither behavior is consistent with the semantics of ML. In this paper we examine a mixin calculus in a call-by-need, or lazy, evaluation setting with a back-patching semantics. Broadly we model mixins as nestable records with lazy fields. In the simplest setting which we examine in Section 3, a component of a mixin is evaluated when it is selected. We explain how side-effects are duplicated and linearly produced by open and closed mixins respectively, while allowing both open and closed mixins to be merged indiscriminately; this tolerance of merging mixins of different status is our important design choice, which is different from previous proposals [Hirschowitz and Leroy(2005), Ancona et al.(2003)Ancona, Fagorzi, Moggi, and Zucca]. In Section 2.1, we exemplify how the tolerance can be useful. Then in Section 4, we extend the former semantics of Section 3 with an ability to constrain the evaluation order of components of mixins. While the former semantics admits the most flexible recursive initialization patterns for mixins, the flexibility can do harm because of the intrinsically implicit evaluation order determined at run-time in a demand-driven way. It may be interesting to constrain possible initialization patterns, making the evaluation order more explicit. For instance, we may want to enforce top-down evaluation order within mixins, where components of a mixin are evaluated following the textual definition order in the source program. Or, we may want to keep the invariant that once a component of a mixin is selected, all its components are eventually evaluated. Indeed our ultimate goal is to find the most beneficial constraint on the evaluation order that still admits interesting recursive initialization patterns, but that makes the evaluation order more explicit, thus more predictable to programmers. In this paper we do not propose a particular constraint; simply we do not yet have enough experience in programming with mixins to decide what constraint is best in practice. Hence we formalize the operational semantics so that it deals 3 with several constraints. Concretely, we give a constraint language and extend the semantics of Section 3 to evaluate components of mixins according to a given constraint expressed by the constraint language. We explore the design space of possibly interesting constraints and examine two particular constraints in detail as examples. Contributions of the paper are summarized as follows. We formalize the operational semantics for a lazy mixin calculus (Section 3), by moderately extending Ancona and Zucca’s formalization of a call-by-name mixin calculus [Ancona and Zucca(2002)]. We demonstrate how lazy mixins can be useful in practice through examples (Section 2). Then we extend the semantics to be able to control the evaluation order of components of mixins in several ways (Section 4) and exemplify concrete scenarios where particular evaluation strategies are enforced by constraints. We believe the ability to deal with several evaluation strategies is a novelty of the formalization and the formalization serves as a basis for exploring the design space. 2 Examples In this section, we introduce our lazy mixin calculus through a series of examples. Many constructs of the calculus come from CMS [Ancona and Zucca(2002)]. Examples are written in a more programmer-friendly surface syntax and we assume a small subset of the OCaml core language for the core language of the mixin calculus. We recall that the OCaml core language adopts a call-by-value evaluation strategy and supports arbitrary side-effects within (core) expressions. 2.1 MakeSet and MakeMultiSet mixins We start by looking at possible mixin equivalents to MakeSet and MakeMultiSet ML functors and their instances by the Key structure, as given in Figure 1. MakeSet and MakeMultiSet are functions on ML structures, or functors, for making sets and multi-sets of integers, internally represented as lists and lists of lists respectively. Both take as argument a structure containing a create function for producing integers out of nothing and a compare function for comparing given two integers. MakeSet extends this functionality to sets of integers and MakeMultiSet does for multi-sets. Then we apply the two functors to the Key structure to instantiate customized Set and MultiSet structures. Below is a mixin equivalent to the MakeSet functor: mixin MakeSet = { val create element : unit → int val compare element : int → int → int let create () = [ create element () ] let compare s1 s2 = ..... compare element ... } A mixin structure is a sequence of named components, where a component may be defined like create and compare or deferred like create element and com- 4 module MakeSet = functor (X : sig val create : unit → int val compare : int → int → int end) → struct let create () = [ X.create () ] let compare s1 s2 = ..... X.compare ... end module MakeMultiSet = functor(X : sig val create : unit → int val compare : int → int → int end) → struct let create () = [[ X.create () ]] let compare s1 s2 = .... X.compare ... end module Key = struct let count = ref (-1) let create () = incr count; !count let compare x y = if x = y then 0 else if x < y then 1 else (-1) end module Set = MakeSet(Key) module MultiSet = MakeMultiSet(Key) Figure 1: MakeSet and MakeMultiSet ML functors pare element. The bodies of defined components can refer to names of deferred components as if they were present. Similarly, below is a mixin equivalent to the MakeMultiSet functor: mixin MakeMultiSet = { val create element : unit → int val compare element : int → int → int let create () = [[ create element () ]] let compare s1 s2 = ..... compare element ... } We build a mixin equivalent to the Key structure in two steps: mixin FKey = { let count = ref (-1) let create key () = incr count; !count let compare key x y = if x = y then 0 else if x < y then 1 else (-1) } mixin Key = close(FKey) We distinguish two states of mixins: open and closed. Intuitively a closed mixin is a record with lazy fields, whereas an open mixin is a function which returns a record with lazy fields. Intended implications of this comparison are 1) projection of components is only possible from closed mixins, but not from open mixins; 2) an open mixin can be instantiated to create closed mixins; 3) side-effects contained in a closed mixin are produced exactly once, whereas side-effects in 5 an open mixin are produced as many times as the mixin is instantiated. FKey above is an open mixin, and Key is a closed mixin instantiated from FKey by the close operation. A projection Key.create key is legal, but FKey.create key is not. As expected, the counter Key.count is initialized to -1 exactly once. We may close the FKey mixin again: mixin Key2 = close(FKey) Counters Key.count and Key2.count are distinct from each other. For instance, calling Key.create does not increase Key2.count. The close operation is only available for mixins without holes, or mixins which do not contain deferred components. The freeze operation, possibly combined with the sum operation, is used to fill in the holes. For instance, below we merge Key and MakeSet mixins by the sum operation, then resolve the deferred components create element and compare element of MakeSet to the defined component create key and compare key of Key respectively by the freeze operation, to fill in the holes of MakeSet: mixin FSet’ = Key ← MakeSet mixin FSet = freezeψ (FSet’) where ψ is the following mapping1 : h create element 7→ create key; compare element 7→ compare key i Now FSet does not contain holes, hence we can close it: mixin Set = close(FSet) We do the same for MakeMultiSet in one step this time: mixin MultiSet = close(freezeψ (Key ← MakeMultiSet)) Set and MultiSet mixins are equivalent to Set and MultiSet ML structures as given in Figure 1. It is important to see differences resulting from closing FKey after merging it with MakeSet and MakeMultiSet as follows: mixin Set’ = close(freezeψ (FKey ← MakeSet)) mixin MultiSet’ = close(freezeψ (FKey ← MakeMultiSet)) Here FKey is instantiated twice. While Set and MultiSet share the same counter, Set’ and MultiSet’ have distinct counter’s. As a result, calling Set.create affects both results of the next calls to Set.create and MultiSet.create, while calling Set’.create only does the result of the next call to itself. 2.2 Widget mixins Many GUI programming APIs involve recursive initialization patterns to form mutually referential graphs among related widgets in the style of create-andconfigure, as Syme calls in [Syme(2005)]. In that paper he explains how recur1 Only in this section, we use angle brackets instead of square brackets to denote mappings to avoid confusion with list expressions. 6 sive initialization patterns are prominent in GUI programming and proposes a semi-safe lazy evaluation strategy for the ML core language to tame ML’s value recursion restriction; the restriction constrains right-hand sides of recursive definitions to be syntactic values, thus may hinder uses of sophisticated GUI programming APIs. In this subsection, we consider a GUI example similar to his in a lazy mixin setting. We assume given the following interface of the API: type form type formMenu type menuItem val createForm: string → form val createMenu: string → formMenu val createMenuItem: string → menuItem val toggle : menuItem → unit val setMenus : form ∗ formMenu list → unit val setMenuItems : formMenu ∗ menuItem list → unit val setAction : menuItem ∗ (unit → unit) → unit The API requires the create-and-configure initialization pattern where widgets are first created, then explicit mutation configures a relation between the widgets. Below we build boiler-plate mixins which encapsulate the create-andconfigure pattern: mixin Form = { val name : string val menus : formMenu list let form = createForm(name) let = setMenus(form, menus) } mixin Menu = { val name : string val items : menuItem list let menu = createMenu(name) let = setMenuItems(menu, items) } mixin MenuItem = { val name : string val other : menuItem let item = createMenuItem(name) let = setAction(item, fun () → toggle(other)) } Then we use them: 7 MyForm = hidename (freezehname7→namei (Form ← { let name = “Form” })) MyMenu = hidename (freezehname7→namei (Menu ← { let name = “Menu” })) MyItem1 = rename(hother7→item2i,hitem17→itemi) (hidename ( freezehname7→namei (MenuItem ← { let name = “Rice” }))) MyItem2 = rename(hother7→item1i,hitem27→itemi) (hidename ( freezehname7→namei (MenuItem ← { let name = “Grape” }))) MyGUI = close(freezeψ1 ( MyItem1 ← (MyItem2 ←(MyMenu ←MyForm)))) where ψ1 is the following mapping: h item1 7→ item1; item2 7→ item2; items 7→ [item1; item2] ; menus 7→ [menu]i Above we have introduced two new constructs. The hide operation hideX (M ) hides the component named X of the mixin M by making the component invisible outside. The rename operation rename(φ1 ,φ2 ) (M ) changes names of deferred and defined components of the mixin M by φ1 and φ2 respectively, where φ1 and φ2 are finite mappings on names of components2 . For instance, in the definition of MyItem1, the deferred component other is renamed to item2 and the defined component item to item1. Observe the opposite directions of mappings hother 7→ item2i for deferred components and hitem1 7→ itemi for defined ones. This adds flexibility of the rename operation in that when φ1 maps deferred components of distinct names to the same name, then the components can be resolved simultaneously, and that when φ2 maps two distinct names X1 and X2 to a single name X, then the component which was named X can now projected by either X1 or X2 . Thanks to the renaming, MyItem1 and MyItem2 can be merged to form MyGUI without causing name clash; a deferred component and a defined component of a mixin can have the same name, but a deferred (resp. defined) component must not have the same name as other deferred (resp. defined) components. Besides, we have used the freeze operation in a more flexible way by mapping a name of a deferred component to an expression composed of names of defined components, for example [item1; item2]. The above example builds a GUI application forming a widget containment hierarchy where MyForm contains MyMenu, which contains MyItem1 and MyItem2. MyItem1 and MyItem2 are mutually recursive; each toggles the activation state of the other. We hide the name component of mixins to be merged to avoid name clash. Anonymous (under-scored) components do not contribute to name clash; they would be implemented as syntax sugar via the hide operation. Renaming of other and item components of MyItem1 and MyItem2, both of which 2 In the formalization, we will distinguish α-convertible identifiers (internal names) and non-convertible names (external names). Then φ1 and φ2 are mappings on names, not on identifiers. 8 are derived from the same mixin MenuItem, is necessary for cross-connecting the deferred component of one to the defined component of the other. In the last line we sum up the constituent mixins and resolve deferred components to defined ones, configuring the widget containment hierarchy. This example suggests it can be useful to control the evaluation order of components of mixins, instead of evaluating them purely lazily in a demanddriven way, i.e. evaluating only the components that are projected. Indeed we would like to make sure the widget containment hierarchy has been properly configured before MyGUI is actively used. For that purpose, all the anonymous components of MyGUI must be evaluated before any of its components becomes externally accessible. In Section 4, we present the operational semantics which can enforce such constraint on the evaluation order. 2.3 A combinator library for marshallers The last example deals with marshaller combinators and is motivated by Syme’s paper again [Syme(2005)]. Kennedy introduced a functional-language combinator library for building marshallers and unmarshallers of data structures [Kennedy(2004)]. The essential ingredient of his proposal is the tying together of a marshaller and unmarshaller pair in a single value. Then the consistency of marshalling and unmarshalling is ensured by construction. The original proposal of Kennedy is implemented in Haskell. Porting the code to ML is mostly easy, except for a couple of wrinkles. The value recursion restriction of ML is a source for the wrinkles and requires cumbersome workaround for an ML version of the combinator. In this subsection, we rebuild a combinator library for marshallers using lazy mixins with ML as the core language and demonstrate how the use of lazy mixins avoids the value recursion problem. In the following examples we assume a richer mixin language where a mixin may contain deferred and defined types as components, although our formal development does not consider mixins with type components. Type checking of mixins is not in the scope of the paper. As far as our examples are concerned, existing type systems are sufficient [Flatt and Felleisen(1998)]. We consider a mixin-based combinator library with the specification given below. A mixin signature mixin M : { type t val x : t } → { type s = t ∗ t val y : s } specifies an open mixin with deferred type component t and value component x of type t, written in the left-hand side of the arrow, and with defined type component s satisfying type equation s = t ∗ t and value component y of type s, written in the right-hand side3 . The scope of type names declared in the left hand of the arrow extends to the right hand. 3 This signature language is designed only for the sake of the examples. A more practical signature language is proposed, for instance in [Owens and Flatt(2006)]. 9 type channel type α marshaller val marshal : α marshaller → α ∗ channel → unit val unmarshal : α marshaller → channel → α mixin PairMrshl : { type s1 type s2 val mrshl1 : s1 marshaller val mrshl2 : s2 marshaller } → { type t = s1 ∗ s2 val marshaller : t mrshl } mixin ListMrshl : { type elm val mrshl elm : elm marshaller } → { type t = elm list val mrshl : t marshaller } mixin InnerMrshl : { type src type trg val f : src → trg val g : trg → src val mrshl src : src marshaller } → { type t = trg val mrshl : t marshaller } mixin IntMrsh : {} → { type t = int val mrshl : t marshaller } mixin StringMrsh : {} → { type t = string val mrshl : t marshaller } IntMrsh and StringMrsh mixin have an empty deferred component. But they are still open mixins, thus needs to be closed for making their components accessible. The abstract type marshaller could be internally implemented as a record consisting of a marshalling action and unmarshalling action: type α marshaller = { marshal: α ∗ channel → unit; unmarshal : channel → α } Recall that it is important for consistently building marshallers and unmarshallers that a marshaller is a single value, but not two separate functions. In this way, users of the library can only build consistent marshaller/unmarshaller pairs. We do not present further details of how the library can be implemented. In the original paper [Kennedy(2004)], Kennedy explains an excellent implementation which lets the programmer control sharing of the marshaled data. Transposing marshaller combinators for constructed types such as pairs and lists, originally implemented as functions, to mixins is straightforward. For instance, a function-based marshaller combinator pairMrshl(mrshl1, mrshl2) of type (s1 marshaller) ∗ (s2 marshaller) → (s1 ∗ s2) marshaller for constructing a marshaller for a pair from marshallers of the components can be translated into a mixin as follows: mixin PairMrshl = { type s1 type s2 val mrshl1 : s1 marshaller val mrshl2 : s2 marshaller type t = s1 ∗ s2 let mrshl = (∗ the body of pairMrshl(mrshl1, mrshl2) ∗) } Now we turn to how to build custom-marshallers for user-defined data types. We first build marshallers for both a single file, represented as a pair of an integer 10 and string, and a list of files: type file = int ∗ string mixin FileMrshl = freeze*( (rename(∅,hs17→t;mrshl17→mrshli) (IntMrshl)) ← (rename(∅,hs27→t;mrshl27→mrshli) (StringMrshl)) ← PairMrshl)) mixin FilesMrshl = freeze*( (rename(∅,helm7→t;mrshl elm7→mrshli) (FileMrshl)) ← ListMrshl) The notation ∅ denotes an empty mapping. Above we have introduced a highlevel mixin construct freeze*, which resolves deferred components to the samenamed defined components if exists, then hides the defined components used. The formalization given in the next section does not include freeze*. For the surface language, we could implement it by combining freeze and hide operations with the help of the type system. Next we build marshallers for both a single folder and a list of folders, which form recursive data structures: type folder = { files: file list; subfldrs: folders } and folders = folder list Like Syme, we use an intermediate mixin in favor of conciseness. mixin FldrInnerMrshl = freeze*( { type src = folder type trg = folders let f (fls, fldrs) = { files = fls; subfldrs = fldrs } let g fld = (fld.files, fld.subfldrs) } ← InnerMrshl) Then to build marshallers for folder and folders, we follow their type definitions, by merging constituent mixins and resolving deferred components to defined ones: mixin FldrMrshl = close(freeze*( (rename(∅,hs17→t;mrshl17→mrshli) (FilesMrshl)) ← (hidet (rename(hs17→s1;s27→s2;mrshl17→mrshl1;mrshl27→mrshl2i , hmrshl src7→mrshli) (PairMrshl))) ← (rename(hmrshl src7→mrshl srci,helm7→t;mrshl elm7→mrshl;fldMrshl7→mrshli) (FldrInnerMrshl)) ← (rename(helm7→elm;mrshl elm7→mrshl elmi, hfldrsMrshl7→mrshl;mrshl27→mrshl;s27→ti) (ListMrshl)) Thus we have created marshaller FldrMrshl.fldrMrshl for a single folder and FldrMrshl.fldrsMrshl for a list of folders. In the surface language we could provide an identity mapping with appropriate domain to improve notational verbosity. For the above example, we preferred not to use identity mappings to make explicit how deferred components are resolved to defined ones. Specifying marshallers for recursive data types such as folder and folders is not problematic in the original Haskell context of Kennedy or in our lazy mixin context, essentially due to the laziness. But it is problematic in the context of the ML core language because of the value recursion restriction. The problem is well-discussed in the previous papers of Kennedy and Syme. In short, it is 11 due to ML’s intolerance of the following recursive definition4 let rec p = pairMrshl(p, intMrshl) where we assumed primitive marshaller intMrshl and marshaller combinator pairMrshl given in the library. Note that the abstraction of type marshaller is not the root of the problem. Even we exposed the underlying implementation of marshaller, we still face the problem since marshallers are pairs of functions. If we consider first-class mixins, i.e. mixins as core values, we could implement a marshaller as separate functions of marshal action and unmarshal action, while ensuring the consistency of constructed marshaller/unmarshaller pairs. Our formalization of a lazy mixin calculus is largely abstracted over the core language. The core language may support first-class mixins, but we preferred the current presentation in favor of generality by not assuming a richer core language. We also found the current presentation useful to demonstrate a possibly interesting scenario where lazy mixins and a call-by-value core language are combined to obtain more tolerant recursive definitions. 3 Lazy mixins We start by considering a simpler semantics, where a component of a mixin is evaluated when it is projected. The syntax of our lazy mixin calculus, named Lyre, is defined in Figure 2. We assume pairwise disjoint sets Idents of identifiers, Names of names, and Loc of locations. Components of a mixin are internally referred to by (α-convertible) identifiers, but externally accessed by (non-convertible) names. We use locations to formalize lazy evaluation. Notations For a finite mapping f , dom(f ) and ran(f ) respectively denote the domain and range of f . ∅ is an empty mapping, that is, dom(∅), cod (∅) and i∈I ran(∅) are empty sets. The notation ai 7→ bi denotes the finite mapping f such that, for all i ∈ I, f (ai ) = bi . It is only defined when, for all i, j ∈ I, i 6= j implies ai 6= aj . Throughout the paper, we only consider finite mappings, so simply say a mapping to mean a finite one. For a mapping f , f \x is the restriction of f to dom(f )\{x}. For mappings f, f ′ , we write f + f ′ for the union of f and f ′ . That is, dom(f + f ′ ) =dom(f ) ∪ dom(f ′ ), and for all x in dom(f + f ′ ), f (x) when x ∈ dom(f ) (f + f ′ )(x) = f ′ (x) when x ∈ dom(f ′ ) f + f ′ is defined only if dom(f ) ∩ dom(f ′ ) = ∅. The notation f ′ ◦ f denotes the mapping composition. It is defined only when ran(f ) ⊆ dom(f ′ ). We have explained most of the constructs for mixin expressions in the previous section. In the formalization, however, mixin structures take a more fundamental form. Precisely, a mixin structure, simply called structure hereafter, is a triple of input assignment ι, output assignment o and local binding 4 The example is not ideal in that ML does not allow recursive type definitions such as type t = t ∗ int. But the source of the problem should be clear. 12 x, y X, Y l ∈ ∈ ∈ Idents Names Loc identifiers names locations ::= ::= | | | | | | | | | ::= | | C|M [ι; o; ρ] M1 ← M2 φ1 ⊳ M ⊲ φ2 hide X (M ) freeze ψ (M ) close(M ) M.X x X l M.X | l x|X ... expressions mixin structure sum rename hide freeze close projection ::= xi 7→ Xi ::= i∈I Xi 7→ xi ρ ::= i∈I xi 7→ Ei φ ::= Xi 7→ Yi i∈I renaming ::= i∈I tying E M C ι o ψ i∈I Xi 7→ Ei location projection, location identifier, name input assignment output assignment local binding Figure 2: Syntax for Lyre 13 ρ. The local binding ρ is a mapping from identifiers to expressions and corresponds to the body of the mixin; if x is in dom(ρ), then x is a defined component of the mixin with ρ(x) being the defining expression. ρ(x) can refer to both defined and deferred components of the mixin via identifiers. Any identifier in dom(ρ) and dom(ι) is bound in ρ(x). ρ(x) must not contain names. The input assignment ι is a mapping from identifiers to names and corresponds to declarations of deferred components; a deferred component internally referred to by x is resolved by the name ι(x). dom(ρ) and dom(ι) must be disjoint. The output assignment o is a mapping from names to identifiers; a component of a mixin externally accessed by X is associated to o(X) inside the mixin. ran(o) must be a subset of dom(ρ) ∪ dom(ι). Structures are identified up to α-renaming of identifiers. The explicit distinction between identifiers and names allows identifiers to be renamed by α-conversion, while names remain immutable, thus making projection by name unambiguous [Hirschowitz and Leroy(2005), Lillibridge and Harper(1994)]. In agreement with the distinction of identifiers and names, the rename operation takes two mappings on names, and the hide operation takes a name as argument. The freeze operation takes a mapping from names to expressions, where expressions may contain names. Mixin expressions contain locations. We use locations in the operational semantics to implement lazy evaluation, but locations will not appear in the surface language. The formalization is mostly independent of the core language. We only assume the core language includes projection from mixin expressions, locations, identifiers and names. Again locations will not appear in the surface language. In Figure 3, we define the operational semantics for Lyre. A heap state σ is a mapping from locations to heap objects, which are either expressions, values or error. We formalize lazy evaluation by suspending and memorizing evaluation in heap states. We assume given core values v. Then values V are either structures or core values. We syntactically distinguish structures as mixin expressions, surrounded by square brackets, and as values, surrounded by angle brackets. The distinction lets us simplify the formalization. The judgment σ ⊢ E ↓ (V ; σ2 ) means that in heap state σ expression E evaluates into value V with heap state being σ2 . We assume given inference rules to deduce σ ⊢ C ↓ (V ; σ2 ) for core expressions other than projections or locations. i∈I Notations We write σ[li 7→ κi ] to denote a mapping extension. Precisely,  κi when l′ = li for some i ∈ I ı∈I σ[li 7→ κi ](l′ ) = ′ σ(l ) otherwise The notation is defined only if, for any i, j ∈ I, i 6= j implies li 6= lj . We may write σ[l 7→ κ] when I is a singleton. The notation E[li /xi ]i∈I denotes the substitution of li ’s for xi ’s in E for all i ∈ I. The notation is defined only if, for any i, j ∈ I, i 6= j implies xi 6= xj . For input assignment ι, tying ψ and output i∈I assignment o = Xi 7→ xi , o ◦ ψ ◦ ι is the mapping ρ such that dom(ρ) = dom(ι) and, for all x ∈ dom(ι), ρ(x) is the expression obtained from ψ◦ι(x) by replacing 14 V κ σ ::= ::= ∈ hι; o; ρi | v E | error | V Loc -fin-> κ values heap objects heap state mixin structure (1) σ ⊢ [ι; o; ρ] ↓ (hι; o; ρi; σ) sum σ ⊢ M1 ↓ (hι1 ; o1 ; ρ1 i; σ2 ) σ2 ⊢ M2 ↓ (hι2 ; o2 ; ρ2 i; σ3 ) dom(ρ1 ) ∩ dom(ρ2 ) = ∅ dom(ι1 ) ∩ dom(ι2 ) = ∅ (2) σ ⊢ M1 ← M2 ↓ (hι1 + ι2 ; o1 + o2 ; ρ1 + ρ2 i; σ3 ) rename σ ⊢ M ↓ (hι; o; ρi; σ2 ) (3) σ ⊢ φ ⊳ M ⊲ φ′ ↓ (hφ ◦ ι; o ◦ φ′ ; ρi; σ2 ) hide σ ⊢ M ↓ (hι; o; ρi; σ2 ) (4) σ ⊢ hide X (M ) ↓ (hι; o\X; ρi; σ2 ) freeze σ ⊢ M ↓ (hι1 + ι2 ; o; ρi; σ2 ) dom(ψ) = ran(ι1 ) dom(ψ) ∩ ran(ι2 ) = ∅ (5) σ ⊢ freeze ψ (M ) ↓ (hι2 ; o; (ρ + (o ◦ ψ ◦ ι1 )i; σ2 ) close i∈I σ ⊢ M ↓ (h∅; o; xi 7→ Ei i; σ2 ) ∀i ∈ I, li fresh (6) i∈I i∈I σ ⊢ close(M ) ↓ (h∅; o; xi 7→ li i; σ2 [li 7→ Ei [lj /xj ]j∈I ]) projection σ ⊢ M ↓ (hι; o; ρi; σ2 ) σ2 ⊢ (ρ ◦ o)(X) ↓ (V ; σ3 ) (7) σ ⊢ M.X ↓ (V ; σ3 ) location σ(l) = V (8) σ ⊢ l ↓ (V ; σ) σ(l) = E σ[l 7→ error] ⊢ E ↓ (V ; σ2 ) (9) σ ⊢ l ↓ (V ; σ2 [l 7→ V ]) Figure 3: Semantics 15 Xi ’s with xi ’s for all i ∈ I. o ◦ ψ ◦ ι is only defined when ran(ι) ⊆ dom(ψ) and, for all x ∈ dom(ι), any name appearing in ψ ◦ ι(x) is in dom(o). Let’s look at the inference rules. A structure evaluates into itself and the heap state is unchanged (rule (1)). The sum operation merges the two operand mixins (rule (2)). The side conditions ensure that identifiers do not collide and are always satisfiable by taking appropriate α-equivalent mixins. The effect of the rename operation is simply compositions of mappings (rule (3)). The hide operation narrows the domain of the output assignment (rule (4)). The freeze operation resolves deferred components according to the tying ψ (rule (5)). Precisely, for all x ∈ dom(ι1 ), x is resolved to the expression o ◦ ψ ◦ ι1 (x). ψ ◦ ι1 (x) may contain names, which are replaced with identifiers by o. The rule augments the local binding with o ◦ ψ ◦ ι1 and the input assignment of the resulting mixin diminishes accordingly. The rule (6) for the close operation is responsible for making mixins lazy. Firstly the operand mixin expression must be evaluated into a structure without holes. Then, for each defined identifier xi , a fresh heap location li is allocated to store the defining expression Ei , where any occurrence of xj ’s in Ei is substituted by lj ’s. The body of the resulting structure maps xi to li , thus access to xi is redirected to li . To evaluate projection M.X (rule (7)), M is first evaluated into a structure hι; o; ρi. Then the rule consults o for the associated identifier to X, thus determines the expression that M.X accesses by looking up the identifier in ρ. In the normal evaluation, i.e. when projection is made from a closed mixin, ρ ◦ o(X) returns a location, where the defining expression of o(X) is stored. The last two rules are for evaluating locations l, and are fairly standard. If the heap state contains a value at l (rule (8)), then the value is returned and the heap state is unchanged. When an expression E is stored at l, then it is evaluated. The heap state maps l to error during the evaluation of E, to avoid evaluating the same expression repeatedly and to signal an error for cyclic definitions. On completion, the heap state is updated with the resulting value. It may be useful to note that we do not need evaluation rules for names or identifiers, since in the normal evaluation names are substituted by expressions and identifiers by locations. As one may have noticed, there is potential that evaluation gets stuck. One serious source is when projection is made from an open mixin. Instead of preventing such a scenario at the operational semantics level, we leave it to the type system to eliminate the possibilities for evaluation to get stuck. Although we do not present a type system in this paper, straightforward adaptation of previous work such as [Flatt and Felleisen(1998)] is sufficient for this purpose. The type system would be able to eliminate other ill-typed scenarios such as an attempt to merge mixins with overlapping output names, i.e., dom(o1 ) ∩ dom(o2 ) 6= ∅ in rule (2). We have omitted inference rules for propagating error states, assuming when evaluation encounters an error during deduction, it immediately terminates signaling a runtime error. 16 3.1 Call-by-name and eager variants Small modifications to evaluation rules let the operational semantics model callby-name and eager evaluation strategies. This subsection presents those variants. To model a call-by-name strategy, we replace rules (8) and (9) with the single rule: σ ⊢ σ(l) ↓ (V ; σ2 ) (10) σ ⊢ l ↓ (V ; σ2 ) Heap states are not updated, thus expressions stored are re-evaluated whenever accessed. By eager evaluation strategy, we mean an evaluation strategy that evaluates all components of a mixin at once when the mixin is closed. This is also easily implemented by replacing rule (6) with: i∈I σ ⊢ M ↓ (h∅; o; xi 7→ Ei i; σ2 ) I = {1, 2, . . . , n} i∈I 7 Ei [lj /xj ]j∈I ] ∀i ∈ I, li fresh σ ′ = σ2 [li → ′ ′ σ ⊢ l1 ↓ (V1 ; σ1′ ) σ1′ ⊢ l2 ↓ (V2 ; σ2′ ) · · · σn−1 ⊢ ln ↓ (Vn ; σn′ ) i∈I σ ⊢ close(M ) ↓ ([∅; o; xi 7→ li ]; σn′ ) 4 (11) Lazy mixins and disciplined effects We extend the operational semantics of the previous section so that it takes account of constraints on the evaluation order of components of mixins. In examples of this section, we use a side-effecting function “print C”, which prints the resulting value of evaluating C, then returns the value, to visualize the evaluation order. 4.1 Design space of evaluation strategies There are several evaluation strategies that we found interesting to consider. Below we explain those strategies which we have in mind. Firstly we consider the following example: mixin M1 = close( { let c1 = print 1 let c2 = print 2 let c3 = print 3 let c4 = print 4 }) Top-down strategy We may want components of a mixin to be evaluated following the textual definition order in which they appear in the source program. This constraint will ensure, in the above example, that 1 is printed before 2, and 2 is before 3, and 3 is before 4. This strategy is reminiscent of ML’s strategy. Lazy-field and lazy-record strategies If we adopt top-down strategy, we have a choice on whether to make accessible components of a mixin immediately after they are evaluated, while other components of the mixin are still to be evaluated 17 consecutively. We call lazy-field strategy the strategy that allows such access and lazy-record strategy the strategy that does not allow. Intuitively lazy-field strategy treats a closed mixin as a record with lazy fields like { a1 = lazy (print 1); a2 = lazy (print 2) }, where “{“ and “}” are record constructors of the core language here, while lazy-record strategy does as a lazy record like lazy ({ a1 = print 1; a2 = print 2 }). For instance, let’s consider executing the program: mixin M2 = close ({ let c1 = 1 let c2 = 2 ∗ M3.c1 }) mixin M3 = close ({ let c1 = 3 + M2.c1 }) let main = M2.c2 We assume, for the explanatory purpose, that a program consists of a sequence of mixin definitions plus a core value definition named main, where the top-level mixin bindings can be mutually recursive. The execution of the program evaluates the defining expression of main. For the execution of the above program to succeed, M2.c1 should be accessible to M3.c1 before evaluation of M2.c2 is completed. Hence the execution succeeds with lazy-field strategy, but it fails with lazy-record strategy. Clearly lazy-field strategy is more permissive. Although restrictive, lazy-record strategy is interesting to consider particularly in the presence of finer grained accessibility control, as we will see below. Internal and external accessibilities It can be useful to change accessibility to components of a mixin depending on whether the access is made inside the same mixin or outside. For instance, let us consider the following program: mixin M4 = close( { let c1 = 1 + 2 let c2 = c1 + 4 let c3 = print “ok” }) let main = M4.c2 For the execution to succeed, M4.c1 should be accessible to M4.c2 immediately after M4.c1 is evaluated but before evaluation of M4.c2 is completed. Hence we need lazy-field strategy inside M4. However we may want components of M4 to become accessible outside, only after all components of M4 have been evaluated. In other words, we may want lazy-record strategy outside M4 to make sure “ok” is necessarily printed before any component of M4 becomes externally accessible. Indeed, in the widget mixins example of Section 2.2, we envisaged this internally-lazy-field externally-lazy-record strategy. For instance, the component menu of MyGUI should be accessible inside once it is created, to configure the widget containment hierarchy via functions setMenuItems and setMenus. However menu should not be accessed outside MyGUI, before the configuration is completed, i.e. all components, including anonymous ones, of MyGUI are evaluated. Internally-lazy-field externally-lazy-record strategy is also potentially interesting in the light of our experience in programming with ML modules; it is sometimes convenient to include anonymous side-effecting expressions at the end of a structure for the debugging purpose or to properly initialize mutable components of the structure. As well as design choices among above strategies, we have a choice on how to propagate constraints when merging or closing mixins. In contrast to this vast design space, we do not have enough experience in programming with mixins. 18 Plainly we cannot determine at present which strategy is most beneficial in practice. Hence we keep our formalization open to strategies. That is, the formalization is abstracted over constraints on strategies and can be instantiate to express particular strategies. 4.2 The constraint language We use binary relations as our constraint language to express various evaluation strategies. We identify binary relations on any set P as sets of pairs of elements in P . For instance, the relation {(c1, c2) (c2, c3) (c3, c4)} expresses top-down strategy in the first example. The relation {(c1, c3) (c2, c4)} stipulates that c1 should be evaluated before c3 and c2 before c4. There is no constraint on the evaluation order between c1 and c2 or c3 and c2. Hence this relation does not fix the evaluation order in a unique way. For instance in the first example, either of the output “1 2 3 4” or “ 2 1 3 4” is compatible with the relation. To deal with more expressive strategies, we distinguish three sorts of identifiers: (ordinary) identifiers x for controlling the evaluation order; internal identifiers x̂ for internal accessibility; external identifiers x for external accessibility. For instance, the relation {(x1 , xˆ2 )} stipulates that the component x1 must be evaluated before the component x2 becomes accessible inside the same mixin. Similarly {(x1 , x2 )} stipulates that x1 must be evaluated before x2 becomes accessible outside. We will formalize how relations on these three sorts of identifiers control the evaluation order and accessibility later, when we define the operational semantics. Below we give a descriptive explanation on how those three sorts of identifiers can be used to express strategies we proposed above. If we assign the relation {(c1, c2)} as the constraint to M2 in the second example, the execution of the program succeeds. The relation stipulates nothing about how M2.c1 becomes accessible, implying M2.c1 is accessible both inside M2 and outside immediately after it is evaluated. If we assign the relation {(c1, c2), (c2, c1)} as the constraint to M2, the execution fails. The relation stipulates that M2.c1 becomes accessible outside M2 only after M2.c2 has been evaluated. However M3.c1 needs to access M2.c1 to be evaluated, and M2.c2 to M3.c1; there is a circular dependency. Top-down internally-lazy-field externally-lazy-record strategy in the third example is expressed by assigning the relation {(c1, c2), (c2, c3), (c3, c1), (c3, c2)} as the constraint to M4. We remark that there are implicit constraints ˆ and (c1, c1) (but not (c1, ˆ c1)). imposed by the semantics, such as (c1, c1) The reason is simple: the component c1 must be evaluated before it becomes accessible. Hence if the relation included (c1, c1), which introduces a circular dependency together with the implicit constraint (c1, c1), the evaluation would fail. Precisely, the operational semantics signals an error. The relation {(c1, c2), ˆ (c3, c2) ˆ (c3, c1), (c3, c2)} in the third example expresses top(c2, c3), (c3, c1), down internally-lazy-record externally-lazy-record strategy. We have omitted ˆ since it is anyway induced from (c2, c3) including constraints such as (c2, c1), ˆ by transitivity. Transitivity is imposed by the semantics: if c2 must and (c3, c1) ˆ then naturally c2 must be evaluated be evaluated before c3, and c3 before c1, 19 mixin structure (12) σ; Θ ⊢ [ι; o; ρ; θ] ↓ (hι; o; ρ; θi; σ; Θ) sum σ; Θ ⊢ M1 ↓ (hι1 ; o1 ; ρ1 ; θ1 i; σ2 ; Θ2 ) σ2 ; Θ2 ⊢ M2 ↓ (hι2 ; o2 ; ρ2 ; θ2 i; σ3 ; Θ3 ) dom(ρ1 ) ∩ dom(ρ2 ) = ∅ dom(ι1 ) ∩ dom(ι2 ) = ∅ (13) σ; Θ ⊢ M1 ← M2 ↓ (hι1 + ι2 ; o1 + o2 ; ρ1 + ρ2 ; ν(dom(ι1 ) ∪ dom(ρ1 ), θ1 , dom(ι2 ) ∪ dom(ρ2 ), θ2 )i; σ3 ; Θ3 ) rename σ; Θ ⊢ M ↓ (hι; o; ρ; θi; σ2 ; Θ2 ) (14) σ; Θ ⊢ φ1 ⊳ M ⊲ φ2 ↓ (hφ1 ◦ ι; o ◦ φ2 ; ρ; θi; σ2 ; Θ2 ) hide σ; Θ ⊢ M ↓ (hι; o; ρi; σ2 ; Θ2 ) (15) σ; Θ ⊢ hide X (M ) ↓ (hι; o\X; ρi; σ2 ; Θ2 ) freeze σ; Θ ⊢ M ↓ (hι1 + ι2 ; o; ρ; θi; σ2 ; Θ2 ) dom(ψ) = ran(ι1 ) dom(ψ) ∩ ran(ι2 ) = ∅ (16) σ; Θ ⊢ freeze ψ (M ) ↓ (hι2 ; o; ρ + (o ◦ ψ ◦ ι1 ); θi; σ2 ; Θ2 ) close i∈I σ; Θ ⊢ M ↓ (h∅; o; xi 7→ Ei ; θi; σ2 ; Θ2 ) ∀i ∈ I, li li′ li′′ fresh Θ3 = θ[li /xi ]i∈I [li′ /x̂i ]i∈I [li′′ /xi ]i∈I i∈I i∈I i∈I i∈I σ; Θ ⊢ close(M ) ↓ (h∅; o; xi 7→ li′′ ; µ({xi | i ∈ I}, θ)i; σ2 [li 7→ Ei [lj′ /xj ]j∈I ][li′ 7→ li ][li′′ 7→ li ]; Θ2 ∪ Θ3 ) projection σ; Θ ⊢ M ↓ (hι; o; ρ; θi; σ2 ; Θ2 ) σ2 ; Θ2 ⊢ (ρ ◦ o)(X) ↓ (V ; σ3 ; Θ3 ) (18) σ; Θ ⊢ M.X ↓ (V ; σ3 ; Θ3 ) location σ(l) = V (19) σ; Θ ⊢ l ↓ (V ; σ; Θ) (l′ , l) ∈ Θ σ(l) = E σ[l 7→ error]; Θ\{(l′, l)} ⊢ l′ ↓ (V ′ ; σ2 ; Θ2 ) σ; Θ ⊢ l ↓ (V ; σ3 ; Θ3 ) l 6≺ Θ σ2 [l 7→ E]; Θ2 ⊢ l ↓ (V ; σ3 ; Θ3 ) σ(l) = E σ[l 7→ error]; Θ ⊢ E ↓ (V ; σ ′ ; Θ′ ) (21) σ; Θ ⊢ l ↓ (V ; σ ′ [l 7→ V ]; Θ′ ) Figure 4: Semantics with constraint ˆ before c1. 4.3 Operational semantics We extend a structure with a binary relation on ordinary, internal and external identifiers. Precisely, a structure [ι; o; ρ; θ] is now 4-tuple of an input assignment ι, output assignment o, local binding ρ, and local constraint θ, where θ is a binary relation on dom(ι) ∪ dom(ρ) ∪ {x | x ∈ dom(ι) ∪ dom(ρ)} ∪ {x̂ | x ∈ dom(ι) ∪ dom(ρ)}. Otherwise the syntax is unchanged from Figure 2. We use X as a metavariable for sets of ordinary, internal and external identifiers. We assume given two functions µ(X1 , θ1 ) and ν(X1 , θ1 , X2 , θ2 ), where θ1 and θ2 are binary relations on X1 and X2 respectively. µ(X1 , θ1 ) returns a binary relation on X1 and ν(X1 , θ1 , X2 , θ2 ) does on X1 ∪ X2 . The operational semantics uses µ(X1 , θ1 ) to build local constraints for mixins instantiated by the close operation, where X1 is the set of deferred and defined identifiers and θ1 the 20 (17) (20) local constraint of the operand mixin. Similarly it uses ν(X1 , θ1 , X2 , θ2 ) to build local constraints for mixins composed by the sum operation, where X1 (resp. X2 ) is the set of deferred and defined identifiers and θ1 (resp. θ2 ) is the local constraints of the left (resp. right) right operand mixin. By not fixing the interpretations of µ or ν, we keep the formalization neutral of how to propagate local constraints when closing or merging mixins. In Figure 4, we present the operational semantics which takes account of constraints. We use Θ as a metavariable for global constraints, or binary relations on locations. The judgment σ; Θ ⊢ E ↓ (V ; σ ′ ; Θ′ ) means that under global constraint Θ with heap state σ expression E evaluates into V , where the heap state and global constraint have evolved into σ ′ and Θ′ . As well as heap states, global constraints evolve during evaluation, since new constraints are added when a mixin is closed (rule (17)). The notation Θ\{(l′ , l)} denotes set subtraction. The notation l 6≺ Θ denotes the condition that there is not l′ such that (l′ , l) ∈ Θ. Compared to previous evaluation rules in Figure 3, modifications are made on rules (2) (6), and (9), which we explain in turn. As explained above, the sum operation uses the function ν to build a local constraint for the composed mixin (rule (13)). When closing a mixin (rule (17)), three fresh locations li , li′ , li′′ are created for each defined component xi of the mixin, in order to separately control the evaluation order by li ’s, internal accessibility by li′ ’s, and external accessibility by li′′ ’s. Four important points to be understood are as follows: 1) The local binding of the resulting mixin maps xi ’s to li′′ ’s, i.e. locations for external access; 2) Evaluation of Ei is suspended at li , where xi ’s in Ei are substituted by li′ ’s, i.e. locations for internal access; 3) The new heap state maps li′ ’s and li′′ ’s for internal and external accesses to li ’s to connect the accesses to underlying expressions; 4) The local constraint θ is transported to the global constraint, by instantiating ordinary, internal and external identifiers to the corresponding locations. The notation θ[li /xi ]i∈I [li′ /x̂i ]i∈I [li′′ /xi ]i∈I denotes the binary relation on locations obtained from θ by substituting li ’s for xi ’s , li′ ’s for x̂i ’s, and li′′ ’s for xi ’s, where the substitution is performed by regarding a binary relation as a set of pairs. The local constraint for the resulting mixin is build by the function µ. We have introduced two new rules (20) and (21) for evaluating locations, replacing the previous rule (9), to take the global constraint into account. Rule (20) considers the case where the global constraint stipulates that l′ should be evaluated before l, as described by the side-condition (l′ , l) ∈ Θ. The rule evaluates l′ first, while updating the heap state to map l to error and removing (l′ , l) from Θ; if the evaluation of E ′ attempts to evaluate l against the global constraint, an error is signaled. On completion of the evaluation, E is restored at l and the rule retries to evaluate l. The same rule (20) may be applied again, when there is another location which should be evaluated before l. Otherwise rule (21) is applicable. When there is no location which must be evaluated before l, as described by the side condition l 6≺ Θ in rule (21), then E is evaluated immediately. 21 It shall be informative to note that in rule (20) the heap state σ is updated with error to enforce the evaluation order stipulated by the constraint, while in rule (21) to detect ill-founded recursion. An important ingredient of the formalization is that evaluation of projection M.X always goes through a location. This facilitates to control the evaluation order of components of mixins, in terms of a binary relation on locations. It is easily proved that if σ(l) = V then l 6≺ Θ. We also remark that the operational semantics, in particular the evaluation order, is not necessarily deterministic, depending on the constraint. For instance, if we assign a local constraint {(c1, c3), (c2, c4)} to the mixin M1 of the first example in Section 4.1, we can build deductions which result in the outputs “1 2 3 4” and “2 1 3 4”. Non-determinism is not abnormal, but should be thought of as underspecification like the underspecified evaluation order of function parameters in some programming languages. The operational semantics can be proved sane in the sense that evaluation does not diverge due to ill-founded recursion. In other words, when evaluation diverges, heap states are extended infinitely. A heap state is extended only when a mixin is closed (rule (17)). Hence the heap explosion implies that the close operation is used infinitely often. This is similar to a situation where infinite recursion of function calls exhausts the stack. 4.4 An example We present an example by instantiating the constraint to express one particular evaluation strategy. The strategy is motivated by our previous work on examining a lazy evaluation strategy for recursive ML-style module [Nakata(2009)]. The purpose of the example is not to advocate this particular strategy, but to deliver the better intuition about how to use the constraint. For a structure [ι; o; ρ; θ], we let θ be the relation: {(xi , xj ) | xi ∈ dom(ρ) ∩ IdsC , xj ∈ dom(ρ), i < j} ∪ {(xi , xj ) | xi ∈ (dom(ι) ∪ dom(ρ)) ∩ IdsC , xj ∈ dom(ι) ∪ dom(ρ)} Above we have assumed for any xi , xj , if i < j then the definition or declaration for xi textually precedes that for xj in the source program. IdsC denotes the set of identifiers bounds to core expressions. I.e. we assume Idents consists of disjoint sets of identifiers to be bound to core expressions and mixin expressions, respectively. We give interpretations to functions µ and ν as follows: µ(X , θ) = ∅ ν(X , θ, X ′ , θ′ ) = θ ∪ θ′ ∪ {(xi , xj | xi ∈ (X ∪ X ′ ) ∩ IdsC , xj ∈ X ∪ X ′ } The strategy is close to top-down internally-lazy-field externally-lazy-record strategy, where sub-mixins are evaluated lazily. Below we explain the strategy in detail. 1. Preceding core components of the same and enclosing mixins are evaluated 22 first. Enclosing mixins may contain other sub-mixins, whose core fields need not be evaluated first. This is enforced by including in the local constraint of a structure the relation {(xi , xj ) | xi ∈ dom(ρ) ∩ IdsC , xj ∈ dom(ρ), i < j}. Note that xj may be bound to a mixin expression, and in order to evaluate the expression all core components preceding to it must have been evaluated. Thus the constraint controls the evaluation order not only of core components of the same mixin but also of those of enclosing mixins. 2. Components of a mixin become accessible inside the same mixin immediately after they are evaluated, but are accessible outside only after all the core components have been evaluated. This is enforced by not having constraints mentioning internal identifiers and by including in the local constraint of a structure the relation {(xi , xj ) | xi ∈ (dom(ι) ∪ dom(ρ)) ∩ IdsC , xj ∈ dom(ι) ∪ dom(ρ)}. Observe how we propagate the constraint on external accessibility when merging mixins by including the relation {(xi , xj | xi ∈ (X ∪ X ′ ) ∩ IdsC , xj ∈ X ∪ X ′ } in the result of ν. 3. While core components are evaluated following the textual definition order, there is no constraint on the evaluation order between components of merged mixins; ν does not introduce (xi , xj ) or (xi , xj ) for any xi ∈ X and xj ∈ X ′ . 4. We do not leave any constraint after a mixin is closed; it is enough to enforce the evaluate order once. This is reflected in the interpretation of µ. As we have said, we do not intend to justify ourselves in choosing this strategy, because we do not have enough programming experience to do so. Nevertheless we motivate the strategy below, aiming at posing questions to readers about possible concerns one may face in the quest of better design choices. The first condition ensures that backward references to core components of the same and enclosing mixins are necessarily proper values, but not suspensions or error’s. This provides programmers with a safety guarantee on backward references to core components, which seems useful for ML-initiated programmers. Interestingly this design choice also bears a similarity to Java’s class initialization policy [Gosling et al.(2005)Gosling, Joy, Steele, and Bracha]. We have already motivated in Section 4.1 the combination of internally-lazyfield and externally-lazy-record strategies; internally-lazy-field strategy leaves flexibility in intra-mixin recursion, while externally-lazy-record strategy keeps the evaluation stable towards outside. A possible drawback of externally-lazyrecord strategy, compared to externally-lazy-field strategy, is that we may loose flexibility in inter-mixin recursion. However we are less concerned by inter-mixin recursion, since we believe mixins are designated to support flexible intra-mixin recursion; notably the sum and freeze operations are useful for taking fix-points inside a mixin. We are less confident in the choice of ν. But it could be useful to keep the evaluation order independent between separately defined mixins; it is unlikely 23 that a programmer can foresee in which order components of other mixins to be merged with should/could be evaluated. 4.5 An extension There is a strategy which we want to consider, but our constraint language is not expressive enough for it. The strategy is a variant on top-down internallylazy-field externally-lazy-field strategy, where we impose an extra constraint, called trigger-constraint, that all components of a mixin must be evaluated at once before the first access to a component of the mixin returns. For instance, let us consider the following program: mixin M1 = { let c1 = print 1 let c2 = M2.c2 let c3 = print (c1 + c2) let c4 = print 5 } mixin M2 = { let c1 = M1.c1 let c2 = print (c1 + 1) let c3 = print 4 } let main = M1.c3 According to the above proposed strategy, the execution succeeds and “1 2 4 3 5” is printed. (Recall that “print (1+2)” returns 3, after printing 3). Here is why. 1. Top-down strategy ensures the printing orders “1 3 5” and “2 4” independently. 2. Thanks to internally-lazy-field strategy, M1.c3 and M2.c2 are successfully evaluated. 3. Thanks to externally-lazy-field strategy, evaluation of M2.c1 succeeds. Note that M2 is forced to evaluate by the access from M1.c2. Hence with externally-lazy-record strategy, the evaluation fails, since M1.c1 is not yet accessible outside then. 4. Finally and importantly, the trigger-constraint ensures that M2.c3 is evaluated before evaluation of M1.c2 returns and that M1.c4 is before evaluation of main returns. This explains why 4 is printed immediately after 2, and 5 is after 3. This strategy comes from our previous work on lazy recursive modules [Nakata(2009)]. In a recursive modules setting, inter-module recursion is important, hence we wanted externally-lazy-field strategy. We found the trigger-constraint useful to enforce our design policy that once a module is accessed, all its component are eventually evaluated. We want to consider the same strategy as our previous proposal in a mixin context, too. Observe that the trigger-constraint only lets the access to M1.c3 trigger evaluation of M1.c4, but M1.c1 is already accessible both inside and outside once it is evaluated. We cannot include any of conˆ in the local constraint of M1, since the first straints (c4, c3), (c4, c3), or (c4, c3) one is inconsistent with top-down strategy, the second with externally-lazy-field strategy, the third with internally-lazy-field strategy. 24 Π = (Θ, ∆) {l, l1 . . . ln } ∈ ∆ σ; (Θ, ∆\{{l, l1 . . . ln }}) ⊢ l ↓ (V ; σ ′ ; Π′ ) ′ ; Π′n−1 ⊢ ln ↓ (Vn ; σn′ ; Π′n ) σ ; Π ⊢ l1 ↓ (V1 ; σ1′ ; Π′1 ) σ1′ ; Π′1 ⊢ l2 ↓ (V2 ; σ2′ ; Π′2 ) · · · σn−1 ′ ′ σ; Π ⊢ l ↓ (V ; σn′ ; Π′n ) (22) l 6∈∈ ∆ (l′ , l) ∈ Θ σ(l) = E σ[l 7→ error]; (Θ\{(l′ , l)}, ∆) ⊢ l′ ↓ (V ′ ; σ2 ; Π2 ) σ2 [l 7→ E]; Π2 ⊢ l ↓ (V ; σ3 ; Π3 ) (23) σ; (Θ, ∆) ⊢ l ↓ (V ; σ3 ; Π2 ) Π = (Θ, ∆) l 6∈∈ ∆ l 6≺ Θ σ(l) = E σ[l 7→ error]; Π ⊢ E ↓ (V ; σ ′ ; Π′ ) (24) σ; Π ⊢ l ↓ (V ; σ ′ [l 7→ V ]; Π′ ) i∈I σ; Π ⊢ M ↓ (h∅; o; xi 7→ Ei ; πi; σ2 ; Π2 ) π = (θ, δ) Π2 = (Θ, ∆) ∀i ∈ I, li li′ li′′ fresh Θ′ = θ[li /xi ]i∈I [li′ /x̂i ]i∈I [li′′ /xi ]i∈I ∆′ = δ[li /xi ]i∈I [li′ /x̂i ]i∈I [li′′ /xi ]i∈I i∈I i∈I i∈I i∈I σ; Π ⊢ close(M ) ↓ (h∅; o; xi 7→ li′′ ; µ({xi | i ∈ I}, π)i; σ2 [li 7→ Ei [lj′ /xj ]j∈I ][li′ 7→ li ][li′′ 7→ li ]; (Θ ∪ Θ′ , ∆ ∪ ∆′ )) Figure 5: Extension with trigger-constraint 4.5.1 Formalization To gain extra expressivity to deal with the trigger-constraint, we extend a local constraint to be a pair of a binary relation on identifiers and a set of sets of identifiers. Precisely, a structure [ι; o; ρ; π] now contains a local constraint π, which is a pair (θ, δ) of a binary relation θ on dom(ι) ∪ dom(ρ) ∪ {x | x ∈ dom(ι) ∪ dom(ρ)} ∪ {x̂ | x ∈ dom(ι) ∪ dom(ρ)} and a set δ of sets of elements in dom(ι) ∪ dom(ρ). θ expresses constraints on the evaluation order and accessibilities as before. δ expresses the trigger-constraint; if X is in δ, then evaluation of all components bound to identifiers in X is triggered at once when any of the components is accessed for the first time. For instance when δ contains dom(ρ), then all defined components of the structure, but deferred ones, are evaluated at once when any of the defined components is accessed for the first time. Accordingly, a global constraint Π is now a pair (Θ, ∆) of a binary relation Θ on locations and set ∆ of sets of locations. The functions µ and ν need to be extended to operate on pairs of a binary relation and set of sets. To take account of the trigger-constraint, We replace rules (20) and (21) by rules (22), (23) and (24), and rule (17) by rule (25) as given in Figure 5. The notation l 6∈∈ ∆ denotes the condition that ∆ does not contain a set containing l. The additional work is to check, before evaluating a location l, whether there are locations whose evaluation is triggered by l. Rule (22) considers the case where l triggers evaluation of li ’s, as described by the side condition {l, l1 . . . ln } ∈ ∆. The rule bears responsibility for evaluating li ’s and {l, l1 . . . ln } is discharged from ∆. Except for the side condition l 6∈∈ ∆, rules (23) and (24) are identical to previous rules (20) and (21); the side condition ensures that all trigger constraints involving l have been handled. It is easily proved that (19) and (22) are exclusive to each other. Rule (25) is a technical adjustment, since the rule now needs to transport a pair of a binary relation and set of sets from the local constraint to the global constraint. The notation δ[li /xi ]i∈I [li′ /x̂i ]i∈I [li′′ /xi ]i∈I denotes the set of sets of locations obtained from δ by substituting li ’s for xi ’s , li′ ’s for x̂i ’s, and li′′ ’s for xi ’s. We do not repeat 25 (25) class A { val a1 = ... } class B extends A { val b1 = ... val b2 = ... } class C extends B { val c1 = .. } let c = new C Figure 6: A class hierarchy the other rules; the necessary modification is to replace Θ’s by Π’s. 4.5.2 An example As an example of how to use the trigger-constraint, we present a possible object initialization strategy in class-based object-oriented languages. The purpose of the example is not to explain an encoding of object-oriented language features such as inheritance and overriding, which is already examined in previous work [Ancona and Zucca(2002)]. Here we focus on the aspect of object initialization, by regarding components of a mixin as (instance) fields of an object. In this scenario, open mixins correspond to classes and closed mixins to objects. We shall not need the full expressivity of Lyre to model standard class-based object-oriented languages. For specificity, we restrict ourselves to a fragment of the calculus satisfying the following conditions: • Structures do not contain sub-mixins. This implies we do not consider inner classes. • The sum operation only takes open mixins as operands. The operation corresponds to inheritance. Then this is standard, since usually classes do not inherit from objects, or vice versa. In the sum construct M1 ← M2 , we assume the left operand mixin M1 corresponds to the superclass and the right operand mixin M2 to the inheriting class. For a structure [ι; o; ρ; (θ, δ)], we assign internally-lazy-record externallylazy-record strategy. The initialization order of fields within an object is kept unspecified. That is, we let θ be the relation: {(xi , xj ) | xi , xj ∈ (dom(ι) ∪ dom(ρ))} ∪ {(xi , xˆj ) | xi , xj ∈ (dom(ι) ∪ dom(ρ))} We let δ be the singleton: {(dom(ι) ∪ dom(ρ))} The trigger-constraint δ above stipulates that all the fields of an object must be initialized at once. We give interpretations to functions µ and ν as follows: µ(X , π) = (∅, ∅) ν(X , (θ, δ), X ′ , (θ′ , δ ′ )) = (θ ∪ θ′ ∪ {(xi , xj ) | xi ∈ X , xj ∈ X ′ }, {(X ∪ X ′ )}) 26 The interpretation of ν makes the strategy interesting. Viewed as object initialization, the strategy is described as follows. 1. Fields are initialized following the class hierarchy. That is, fields of superclasses are initialized before those of sub-classes. For instance in Figure 6, the field a1 of the object c is initialized before b1 or b2, and b1 and b2 are before c1. This is imposed by including the constraint {(xi , xj ) | xi ∈ X , xj ∈ X ′ } in the result of the first element of ν. 2. Any field inherited from a superclass becomes accessible both inside and outside, once all the fields from the superclass are initialized. Hence in the example, c.b1 and c.b2 become accessible immediately after both have been initialized, but before c.c1 is initialized. Note that neither of c.b1 nor c.b2 is accessible even inside before both have been initialized. This is specified by the local constraint assigned to a structure. 3. We assume the new operation for instantiating objects from classes is equivalent to the close operation followed by access to some field of the mixin closed. For instance we may assume the Object class which resides in the root of the class hierarchy, i.e. a superclass of any class, contains a special field named init for that purpose. Then the strategy enforces the standard object initialization policy where all fields of an object are initialized when it is created. This is where we use the trigger-constraint. The result {(X ∪ X ′ )} of the second element of ν ensures that all field of an object are initialized at once when init is accessed, since it triggers initialization of the fields of inheriting classes, when the init field is initialized. In fact this strategy, in particular the characteristic described second above, is inspired by the object initialization strategy of the F# programming language [Syme and Margetson(2009)] 5 . F# places restrictions on possible object initialization patterns, enhancing safety by eliminating programming styles which are often awkward sources for null-pointer exceptions. As a result, the strategy is less flexible than that of some object-oriented languages such as Java, yet it can still support common programming idioms found in object-oriented programming. In short, we found F#’s strategy an interesting example of disciplined evaluation orders. 5 Related Work One difference between previous work and the present work is that each of previous work examined an evaluation strategy, while we explored the design space of lazy evaluation strategies and give the operational semantics which can deal with several strategies. Most related to our work is Ancona and Zucca’s call-by-name 5 We believe the strategy presented is close to F#’s. Yet the exact strategy is under-specified in the language documentation. 27 mixin calculus [Ancona and Zucca(2002)] and Hirschowitz and Leroy’s call-byvalue mixin calculus [Hirschowitz and Leroy(2005)]. Ancona et al. investigated the interaction between mixins and computational effect, using a monadic metalanguage as semantic basis [Ancona et al.(2003)Ancona, Fagorzi, Moggi, and Zucca]. We will review the three in detail below. S. Fagorzi and E. Zucca proposed Rcalculus to allow projection from open mixins in a consistent way [Fagorzi and Zucca(2007)]; this is a design direction we have not explored. Our previous work proposed a lazy evaluation strategy for recursive ML-style modules, which we explained in Section 4.5. Design questions we encountered there motivated strategies we proposed in Section 4.1. We do not look back at the history of mixins, but only mention a few of influential papers [Bracha(1992), Ancona and Zucca(2002), Hirschowitz and Leroy(2005), Duggan and Sourelis(1996), Flatt and Felleisen(1998)]. In particular, type systems which eliminate unsound scenarios such as to close mixins having holes or to select a component from an open mixin, have been well-investigated. Those type system proposals are orthogonal and complementary to the presented work. Call-by-name mixins Ancona and Zucca formalized a mixin calculus, named CMS, with call-by-name evaluation using small-step semantics [Ancona and Zucca(2002)]. The formalization is concise and allows equational reasoning of mixins. However the call-by-name semantics might not be suitable to be used with a call-by-value core language allowing arbitrary side-effects, such as the ML core language, since with the call-by-name semantics evaluation of let rec x = x diverges when x is selected and the same side-effect can be produced repeatedly. Large part of the formalization in Section 3 is borrowed from CMS. We adapted their small-step semantics to big-step semantics. Technically we made a small but important modification; in CMS an output assignment maps names to expressions, whereas in Lyre names to identifiers. In this way we avoid duplicating expressions in the freeze operation. Call-by-value mixins Hirschowitz and Leroy formalized a mixin calculus with call-by-value evaluation [Hirschowitz and Leroy(2005)]. Generally call-by-value mixins result in the simplest evaluation order, while lazy mixins are more flexible in handling recursion. For instance, the marshallers example in Section 2.3 relies on the laziness to specify marshallers for recursive data types. We are motivated to distinguish open and closed mixins by their work. Apart from the difference of call-by-value and lazy, Lyre differs from their calculus in the sum operation in that we allow mixins to be merged independently of whether they are closed or open, while they only consider the sum operation on open mixins. Our design choice is motivated to keep flexibility in sharing side effects. For instance, it was useful in MakeSet and MakeMultiSet mixins example from Section 2.1; the sharing of counter between Set and MultiSet is achieved by merging the closed mixin Key with MakeSet and MakeMultiSet. It should be noted that one important objective of Herschowitz and Leroy’s work is to statically ensure initialization safety of mixins. The objective of our paper is not about static guarantees of initialization safety. 28 Effectful mixins and equational reasoning Ancona et al. examined the interaction between mixins and computational effect, by means of a recursive monadic binding [Ancona et al.(2003)Ancona, Fagorzi, Moggi, and Zucca]. The sum operation only takes open mixins as argument in their calculus. They separate computational components from non-computational ones, where the former are evaluated exactly once, while the latter are re-evaluated whenever they are projected. Computational components of a mixin are evaluated at once when the mixin is closed by the doall operation, in a similar way to the rule (11) from Section 3.1. To the best of our understanding, their evaluation strategy is top-down internally-lazy-field externally-lazy-record strategy, where closed submixins are evaluated immediately. When mixins are merged, the computational components of the right-operand mixin are evaluated before those of the leftoperand mixin. The separation of computational components lets them retain the CMS equational reasoning. 6 Conclusion We have formalized the operational semantics for a mixin calculus with lazy evaluation. We started by considering a simpler semantics where a component of a mixin is evaluated when it is projected. Then we extended the semantics to impose various restrictions on the evaluation order of and accessibilities to components of mixins, by adding local constraint to mixin structures and global constraint to the evaluation judgment. We have kept the formalization neutral of constraints and it can be instantiated to express several evaluation strategies. As well as we considered the design space of strategies, we took a closer look at two particular strategies. We do not claim the formalization is expressive enough to deal with all interesting evaluation strategies. At the same time, we do not think it technically difficult to extend the formalization to express more strategies. As the extension we made in Section 4.5 exemplifies, we may well gain more expressivity by extending the constraint language and by adding more evaluation rules. Indeed a moot point was to keep the formalization not too complicated without giving up too much expressivity to deal with interesting strategies. Acknowledgement I am grateful to Xavier Leroy for the valuable advice and fruitful discussions throughout the development of this work. References [Ancona and Zucca(2002)] D. Ancona and E. Zucca. A calculus of module systems. Journal of Functional Programming, 12, 2002. [Ancona et al.(2003)Ancona, Fagorzi, Moggi, and Zucca] D. Ancona, S. Fagorzi, E. Moggi, and E. Zucca. Mixin Modules and Computational Effects. In Proc. ICALP, 2003. 29 [Bracha(1992)] G. Bracha. The Programming Language Jigsaw: Mixins, Modularity and Multiple inheritance. PhD thesis, University of Utah, 1992. [Cardelli(1997)] L. Cardelli. Program Fragments, Linking, and Modularization. In Proc. POPL, pages 266–277, 1997. [Crary et al.(1999)Crary, Harper, and Puri] K. Crary, R. Harper, and S. Puri. What is a recursive module? In Proc. PLDI, pages 50–63, 1999. [Duggan and Sourelis(1996)] D. Duggan and C. Sourelis. Mixin modules. In Proc. ICFP, 1996. [Fagorzi and Zucca(2007)] S. Fagorzi and E. Zucca. A Calculus of Open Modules: Call-by-need Strategy and Confluence,. Mathematical Structures in Computer Science, 17, 2007. [Fisher and Reppy(1999)] K. Fisher and J. Reppy. The design of a class mechanism for moby. In Proc. PLDI. ACM Press, 1999. [Flatt and Felleisen(1998)] M. Flatt and M. Felleisen. Units: Cool Modules for HOT Languages. In Proc. PLDI. ACM Press, 1998. [Gosling et al.(2005)Gosling, Joy, Steele, and Bracha] J. Gosling, B. Joy, G. Steele, and G. Bracha. The Java Language Specification, Third Edition, chapter 12.4. Prentice Hall, 2005. [Hirschowitz and Leroy(2005)] T. Hirschowitz and X. Leroy. Mixin modules in a call-by-value setting. ACM Transactions on Programming Languages and Systems, 27(5):857–881, 2005. [Kennedy(2004)] A. Kennedy. Functional Pearls: Pickler Combinators. Journal of Functional Programming, 14(6):727–739, 2004. [Lillibridge and Harper(1994)] M. Lillibridge and R. Harper. A Type-Theoretic Approach to Higher-Order Modules with Sharing. In Proc. POPL, pages 123–137, 1994. [Nakata(2009)] K. Nakata. Lazy modules. http://cs.ioc.ee/~keiko/, 2009. Draft paper available at [Odersky et al.(2003)Odersky, Cremet, Röckl, and Zenger] M. Odersky, V. Cremet, C. Röckl, and M. Zenger. A nominal theory of objects with dependent types. In Proc. ECOOP, 2003. [Owens and Flatt(2006)] S. Owens and M. Flatt. From Structures and Functors to Modules and Units. In Proc. ICFP, 2006. [Russo(2001)] C. Russo. Recursive Structures for Standard ML. In Proc. ICFP, pages 50–61. ACM Press, 2001. 30 [Syme(2005)] D. Syme. Initializing mutually referential abstract objects: The value recursion challenge. In Proc. Workshop on ML, 2005. [Syme and Margetson(2009)] D. Syme and J. Margetson. The F# Programming Language. Software and documentation available on the Web, http://research.microsoft.com/en-us/um/cambridge/projects/fsharp/ [Torgersen(2004)] M. Torgersen. The Expression Problem Revisited. In Proc. ECOOP, volume 3086, 2004. 31
6cs.PL
On the Transformation Capability of Feasible Mechanisms for Programmable Matter Othon Michail1 , George Skretas2 , and Paul G. Spirakis3 1 2 arXiv:1703.04381v1 [cs.DS] 13 Mar 2017 3 Department of Computer Science, University of Liverpool, UK [email protected] Computer Engineering and Informatics Department (CEID), University of Patras, Greece [email protected] Department of Computer Science, University of Liverpool, UK Computer Technology Institute and Press “Diophantus” (CTI), Patras, Greece [email protected] Abstract In this work, we study theoretical models of programmable matter systems. The systems under consideration consist of spherical modules, kept together by magnetic forces and able to perform two minimal mechanical operations (or movements): rotate around a neighbor and slide over a line. In terms of modeling, there are n nodes arranged in a 2-dimensional grid and forming some initial shape. The goal is for the initial shape A to transform to some target shape B by a sequence of movements. Most of the paper focuses on transformability questions, meaning whether it is in principle feasible to transform a given shape to another. We first consider the case in which only rotation is available to the nodes. Our main result is that deciding whether two given shapes A and B can be transformed to each other, is in P. We then insist on rotation only and impose the restriction that the nodes must maintain global connectivity throughout the transformation. We prove that the corresponding transformability question is in PSPACE and study the problem of determining the minimum seeds that can make feasible, otherwise infeasible transformations. Next we allow both rotations and slidings and prove universality: any two connected shapes A, B of the same order, can be transformed to each other without breaking connectivity. The worst-case number of movements of the generic strategy is Ω(n2 ). We improve this to O(n) parallel time, by a pipelining strategy, and prove optimality of both by matching lower bounds. In the last part of the paper, we turn our attention to distributed transformations. The nodes are now distributed processes able to perform communicate-compute-move rounds. We provide distributed algorithms for a general type of transformations. Keywords and phrases programmable matter, transformation, reconfigurable robotics, shape formation, complexity, distributed algorithms 1 Introduction Programmable matter refers to any type of matter that can algorithmically change its physical properties. “Algorithmically” means that the change (or transformation) is the result of executing an underlying program. Depending on the implementation, the program could either be a centralized algorithm capable of controlling the whole programmable matter system (external control) or a decentralized protocol stored in the material itself and executed by various sub-components of the system (internal control). For a concrete example, imagine a material formed by a collection of spherical nanomodules kept together by magnetic forces. Each module is capable of storing (in some internal representation) and executing a simple program that handles communication with nearby modules and that controls the module’s electromagnets, in a way that allows the module to rotate or slide over neighboring modules. © Othon Michail, George Skretas, and Paul G. Spirakis; licensed under Creative Commons License CC-BY Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 2 On the Transformation Capability of Feasible Mechanisms for Programmable Matter Such a material would be able to adjust its shape in a programmable way. Other examples of physical properties of interest for real applications would be connectivity, color [27, 5], and strength of the material. Computer scientists, nanoscientists, and engineers are more and more joining their forces towards the development of such programmable materials and have already produced some first impressive outcomes (even though it is evident that there is much more work to be done in the direction of real systems), such as programmed DNA molecules that self-assemble into desired structures [30, 13] and large collectives of tiny identical robots that orchestrate resembling a single multi-robot organism (Kilobot system) [31]. Other systems for programmable matter include the Robot Pebbles [21], consisting of 1cm cubic programmable matter modules able to form 2-dimensional (usually abbreviated “2D”) shapes through selfdisassembly, and the Millimotein [24], a chain of programmable matter which can fold itself into digitized approximations of arbitrary 3-dimensional (usually abbreviated “3D”) shapes. Ambitious long-term applications of programmable materials include molecular computers, collectives of nanorobots injected into the human circulatory system for monitoring and treating diseases, or even self-reproducing and self-healing machines. Apart from the fact that systems work is still in its infancy, there is also an apparent lack of unifying formalism and theoretical treatment. The following are some of the very few exceptions aiming at understanding the fundamental possibilities and limitations of this prospective. The area of algorithmic self-assembly tries to understand how to program molecules (mainly DNA strands) to manipulate themselves, grow into machines and at the same time control their own growth [13]. The theoretical model guiding the study in algorithmic self-assembly is the Abstract Tile Assembly Model (aTAM) [35, 29] and variations. Recently, a model, called the nubot model, was proposed for studying the complexity of self-assembled structures with active molecular components [36]. This model “is inspired by biology’s fantastic ability to assemble biomolecules that form systems with complicated structure and dynamics, from molecular motors that walk on rigid tracks and proteins that dynamically alter the structure of the cell during mitosis, to embryonic development where large-scale complicated organisms efficiently grow from a single cell” [36]. Another very recent model, called the Network Constructors model, studied what stable networks can be constructed by a population of finite-automata that interact randomly like molecules in a well-mixed solution and can establish bonds with each other according to the rules of a common small protocol [28]. The development of Network Constructors was based on the Population Protocol model of Angluin et al. [2], that does not include the capability of creating bonds and focuses more on the computation of functions on inputs. A very interesting fact about population protocols is that they are formally equivalent to chemical reaction networks (CRNs), “which model chemistry in a well-mixed solution and are widely used to describe information processing occurring in natural cellular regulatory networks” [14]. Also the recently proposed Amoebot model, “offers a versatile framework to model self-organizing particles and facilitates rigorous algorithmic research in the area of programmable matter” [10, 12, 11]. An indication of the potential that the research community sees in this effort, is the 1st Dagstuhl Seminar on “Algorithmic Foundations of Programmable Matter”, which took place in June 2016 and attracted leading scientist (both theoreticians and practitioners) from Algorithms, Distributed Computing, Robotics, and DNA Self-Assembly, with the aim at joining their forces to push forward this emerging subject. Each theoretical approach, and to be more precise, each individual model, has its own beauty and has lead to different insights and developments regarding potential programmable matter systems of the future and in some cases to very intriguing technical problems and O. Michail, G. Skretas, and P. G. Spirakis open questions. Still, it seems that the right way for theory to boost the development of more refined real systems is to reveal the transformation capabilities of mechanisms and technologies that are available now, rather than by exploring the unlimited variety of theoretical models that are not expected to correspond to a real implementation in the near future. In this paper, we follow such an approach, by studying the transformation capabilities of models for programmable matter, which are based on minimal mechanical capabilities, easily implementable by existing technology. 1.1 Our Approach We study a minimal programmable matter system consisting of n cycle-shaped modules, with each module (or node) occupying at any given time a cell of the 2D grid (no two nodes can occupy the same cell at the same time). Therefore, the composition of the programmable matter systems under consideration is discrete. Our main question throughout is whether an initial arrangement of the material can transform (either in principle, e.g., by an external authority, or by itself) to some other target arrangement. In more technical terms, we are provided with an initial shape A and a target shape B and we are asked whether A can be transformed to B via a sequence of valid transformation steps. Usually, a step consists either of a valid movement of a single node (in the sequential case) or of more than one nodes at the same time (in the parallel case). We consider two quite primitive types of movement. The first one, called rotation, allows a node to rotate 90° around one of its neighbors either clockwise or counterclockwise (see, e.g., Figure 7 in Section 3) and the second one, called sliding, allows a node to slide by one position “over” two neighboring nodes (see, e.g., Figure 2 in Section 5). Both movements succeed only if the whole direction of movement is free of obstacles (i.e., other nodes blocking the way). More formal definitions are provided in Section 2. One part of the paper focuses on the case in which only rotation is available to the nodes and the other part studies the case in which both rotation and sliding are available. The latter case has been studied to some extent in the past in the, so called, metamorphic systems [16, 17, 15], which makes those studies the closest to our approach. For rotation only, we introduce the notion of color-consistence and prove that if two shapes are not color-consistent then they cannot be transformed to each other. On the other hand color-consistence does not guarantee transformability as there is an infinite set of pairs (A, B) such that A and B are color consistent but still they cannot be transformed to each other. At this point, observe that if A can be transformed to B then the inverse is also true, as all movements considered in this paper are reversible. We distinguish two main types of transformations: those that are allowed to break the connectivity of the shape during the transformation and those that are not and call the corresponding problems Rot-Transformability and RotC-Transformability. We prove that RotCTransformability is a proper subset of Rot-Transformability by showing that a line-folding problem is in Rot-Transformability\RotC-Transformability. Our main result regarding Rot-Transformability is that Rot-Transformability ∈ P. To prove polynomial-time decidability, we prove that two shapes A and B are transformable to each other iff both A and B have at least one movement available (without any movement available, a shape is blocked and can only trivially transform to itself). Therefore, transformability reduces to checking the availability of a movement in the initial and target shapes. The idea is that if a movement is available in a shape A, then there is always a way to extract from A a 2-line (i.e., two neighboring nodes). Such a 2-line can move freely in any direction and can also extract further nodes to form a 4-line. A 4-line in turn can also move freely to any direction and is also capable of extracting nodes from the shape and transferring them, 3 4 On the Transformation Capability of Feasible Mechanisms for Programmable Matter one at a time, to any desired target position. In this manner, the 4-line can transform A to a line with leaves around it that is color-consistent to A (based on a proposition that we prove, stating that any shape has a corresponding color-consistent line-with-leaves). Similarly, B, given that it is color-consistent with A, can be transformed by the same approach to exactly the same line-with-leaves, and then, by reversibility, it follows that A and B can be transformed to each other by using the line-with-leaves as an intermediate. This set of transformations do not guarantee the preservation of connectivity during the transformation. That is, even though the initial and target shapes considered are connected shapes, the shapes formed at intermediate steps of the transformation may very well be disconnected shapes. We next study RotC-Transformability, in which again the only available movement is rotation, but now connectivity of the material has to be preserved throughout the transformation. The property of preserving the connectivity is expected to be a crucial property for programmable matter systems, as it allows the material to maintain coherence and strength, to eliminate the need for wireless communication, and, finally, enables the development of more effective power supply schemes, in which the modules can share resources or in which the modules have no batteries but are instead constantly supplied with energy by a centralized source (or by a supernode that is part of the material itself). Such benefits can lead to simplified designs and potentially to reduced size of individual modules. We first prove that RotC-Transformability ∈ PSPACE. The rest of our results here are strongly based on the notion of a seed. This stems from the observation that a large set of infeasible transformations become feasible by introducing to the initial shape an additional, and usually quite small, seed; i.e., a small shape that is being attached to some point of the initial shape. In particular, we prove that a 3-line seed, if placed appropriately, is sufficient to achieve folding of a line (otherwise impossible). We then investigate seeds that could serve as components capable of traveling the perimeter of an arbitrary connected shape A. Such shapes are very convenient as they are capable of “simulating” the universal transformation techniques that are possible if we have both rotation and sliding movements available (discussed in the sequel). To this end, we prove that all seeds of size ≤ 4 cannot serve for this purpose, by proving that they cannot even walk the perimeter of a simple line shape. Then we focus on a 6-seed and prove that such a seed is capable of walking the perimeter of a large family of shapes, called discrete-convex shapes. This is a first indication, that there might be a large family of shapes that can be transformed to each other with rotation only and without breaking connectivity, by extracting a 6-seed and then exploiting to transfer nodes to the desired positions. To further support this, we prove that the 6-seed is capable of performing such transfers, by detaching pairs of nodes from the shape, attaching them to itself, thus forming an 8-seed and then being still capable to walk the perimeter of the shape. Next, we consider the case in which both rotation and sliding are available and insist on connectivity preservation. We first provide a proof that this combination of simple movements is universal w.r.t. transformations, as any pair of connected shapes A and B of the same order, can be transformed to each other without ever breaking the connectivity throughout the transformation (a first proof of this fact had already appeared in [15]). This generic transformation requires Θ(n2 ) sequential movements in the worst case. By a potential-function argument we show that no transformation can improve on this worstcase complexity for some specific pairs of shapes and this lower bound is independent of connectivity preservation; it only depends on the inherent transformation-distance between the shapes. To improve on this, either some sort of parallelism must be employed or more O. Michail, G. Skretas, and P. G. Spirakis powerful movement mechanisms, e.g., movements of whole sub-shapes in one step. We investigate the former approach, and prove that there is a pipelining general transformation strategy that improves the time to O(n) (parallel time). We also give a matching Ω(n) lower bound. On the way, we also show that this parallel complexity is feasible even if the nodes are labeled, meaning that individual nodes must end up in specific positions of the target-shape. Afterwards, we propose a distributed algorithm that transforms any compact shapes into a line using the rotation-sliding movement without breaking the connectivity of the shape. We note that a unique leader is required, each node has 4 ports and we aim to minimise the memory as much as possible. The communication is synchronous with each node broadcasting messages to its neighbours each turn. Following this, we propose an algorithm that transforms any shape into a line. We have the same requirements and communication and our goal again to minimize the amount of memory required in the system. In Section 1.2 we discuss further related literature. Section 2 brings together all definitions and basic facts that are used throughout the paper. In Section 3, we study programmable matter systems equipped only with rotation movement. In Section 4, we insist on rotation only, but additionally require from the material to maintain connectivity throughout the transformation. In Section 5, we investigate the combined effect of rotation and sliding movements. Connectivity can always be preserved in this case. Section 6 focuses on distributed transformations having access to both rotation and sliding. Finally, in Section 7 we conclude and give further research directions that are opened by our work. 1.2 Further Related Work Mobile and Reconfigurable Robotics. There is a very rich literature on mobile and reconfigurable robotics. In mobile (swarm) robotics systems and models, as are, for example, the models for robot gathering [6, 25] and deployment [33] (cf., also [19]), geometric pattern formation [34, 8], and connectivity preservation [7], the modules are usually robots equipped with some mobility mechanism making them free to move in any direction of the plane (and in some cases even continuously). In contrast, we only allow discrete movements relative to neighboring nodes. Modular self-reconfigurable robotic systems form an area on their own, focusing on aspects like the design, motion planning, and control of autonomous robotic modules [4, 38, 1, 37]. The model considered in this paper bears similarities to some of the models that have appeared in this area. The main difference is that we follow a more computation-theoretic approach, while the studies in this area usually follow a more applied perspective. Puzzles. Puzzles are combinatorial one-player games, usually played on some sort of board. Typical questions of interest are whether a given puzzle is solvable and finding the solution with the fewest number of moves. Answers to these questions range from being in P up to PSPACE-hard or even undecidable when some puzzles are generalized to the entire plane with unboundedly many pieces [9, 22]. Famous examples of puzzles are the Fifteen Puzzle, Sliding Blocks, Rush Hour, Pushing Blocks, and Solitaire. Even though none of these is equivalent to the model considered here, the techniques that have been developed for solving and characterizing puzzles may turn very useful in the context of programmable matter systems. Actually, in some cases, such puzzles show up as special cases of the transformation problems considered here (e.g., the Fifteen Puzzle may be obtained if we restrict a transformation of node-labelled shapes to take place in a 4x4 square region). Passive Systems. Most of the models discussed so far including the model under considera- 5 6 On the Transformation Capability of Feasible Mechanisms for Programmable Matter tion in this paper, are active models, meaning that the movements are in the complete control of the algorithm. In contrast, in passive models the underlying algorithm cannot control the movements but in most cases it can decide in some way which movements to accept and which not. The typical assumption is that the movements are controlled by a scheduler (possibly adversarial), which represents some dynamicity of the system or the environment. Population Protocols [2, 3] and variants are a typical such example. For example, in Network Constructors [28] nodes move around randomly due to the dynamicity of the environment and when two of them interact the protocol can decide whether to establish a connection between them; that is, the protocol has some implicit control of the system’s dynamics. Another passive model, inspired from biological multicellular processes, was recently proposed by Emek and Uitto [18]. Most models from the theory of algorithmic self-assembly, like the Abstract Tile Assembly Model (aTAM) [35, 29], fall also in this category. In this paper, we are only concerned with active systems. Hybrid models combining active capabilities and passive dynamics, remain an interesting open research direction. 2 Preliminaries The programmable matter systems considered in this paper operate on a 2-dimensional square grid. As usual, each position (or cell) of the grid is uniquely referred to by its x and y coordinates, where x ≥ 0 corresponds to the row and y ≥ 0 to the column. Such a system consists of a set V of n modules, called nodes throughout. Each node may be viewed as a spherical module fitting inside a cell of the grid. At any given time, each node u ∈ V occupies a cell o(u) = (ox (u), oy (u)) = (i, j) (omitting the time index for simplicity here and also whenever clear from context) and no two nodes may occupy the same cell. In some cases, when a cell is occupied by a node we may refer to that cell by a color, e.g., black, and when a cell is not occupied (i.e., it is empty) we usually refer to it as white. At any given time t, the positioning of nodes on the grid defines an undirected neighboring relation E(t) ⊂ V × V , where {u, v} ∈ E iff ox (u) = ox (v) and |oy (u) − oy (v)| = 1 or oy (u) = oy (v) and |ox (u) − ox (v)| = 1, that is, if u and v are either horizontal or vertical neighbors on the grid, respectively. It is immediate to observe that every node can have at most 4 neighbors at any given time. A more informative way to define the system at a given time t, and thus often more convenient, is as a mapping Pt : N≥0 × N≥0 → {0, 1} where Pt (i, j) = 1 iff cell (i, j) is occupied by a node. At any given time t, Pt−1 (1) defines a shape. Such a shape is called connected if E(t) defines a connected graph. A connected shape is called convex if for any two occupied cells, the line that connects their centers does not pass through an empty cell. We call a shape discrete-convex if for any two occupied cells, belonging either to the same row or the same column, the line that connects their centers does not pass through an empty cell; i.e., in the latter we exclude diagonal lines. In general, shapes can transform to other shapes via a sequence of one or more movements of individual nodes. Time consists of discrete steps (or rounds) and in every step, zero or more movements may occur, possibly following a computation sub-step either centralized or distributed, depending on the application. In the sequential case, at most one movement may occur per step, and in the parallel case any number of “valid” movements may occur in parallel. 1 We consider two types of movements: (i) rotation and (ii) sliding. In both 1 By “valid”, we mean here subject to the constraint that their whole movement paths correspond to pairwise disjoint sub-areas of the grid. O. Michail, G. Skretas, and P. G. Spirakis 7 movements, a single node moves relative to one or more neighboring nodes as we explain now. A single rotation movement of a node u is a 90° rotation of u around one of its neighbors. Let (i, j) be the current position of u and let its neighbor be v occupying the cell (i − 1, j) (i.e., lying below u). Then u can rotate 90° clockwise (counterclockwise) around v iff the cells (i, j + 1) and (i − 1, j + 1) ((i, j − 1) and (i − 1, j − 1), respectively) are both empty. By rotating the whole system 90°, 180°, and 270°, all possible rotation movements are defined analogously. See Figure 1. i i−1 rotation is possible j after rotation j+1 Figure 1 Rotation to the right and down. A node on the black dot (in row i − 1) and empty cells at positions (i, j + 1) and (i − 1, j + 1) are required for this movement. Then an example movement is given. A single sliding movement of a node u is a one-step horizontal or vertical movement “over” a horizontal or vertical line of (neighboring) nodes of length 2. In particular, if (i, j) is the current position of u, then u can slide rightwards to position (i, j + 1) iff (i, j + 1) is not occupied and there exist nodes at positions (i − 1, j) and (i − 1, j + 1) or at positions (i + 1, j) and (i + 1, j + 1), or both. Precisely the same definition holds for up, left, and down sliding movements by rotating the whole system 90°, 180°, and 270° counterclockwise, respectively. Intuitively, a node can slide one step in one direction, if there are two consecutive nodes either immediately “below” or immediately “above” that direction that can assist the node slide (see Figure 2). 2 i+1 i i−1 sliding is possible j after sliding j+1 Figure 2 Sliding to the right. Either the two blues (dots in row i + 1) or the two blacks (dots in row i − 1) and an empty cell at position (i, j + 1) are required for this movement. Then an example movement with the two blacks is given. Let A and B be two shapes. We say that A transforms to B via a movement m (which m can be either a rotation or a sliding), denoted A → B, if there is a node u in A such that if u applies m, then the shape resulting after the movement is B (possibly after rotations and translations of the resulting shape, depending on the application). We say that A transforms m in one step to B (or that B is reachable in one step from A), denoted A → B, if A → B for some movement m. We say that A transforms to B (or that B is reachable from A) and write A B, if there is a sequence of shapes A = C0 , C1 , . . . , Ct = B, such that Ci → Ci+1 2 Observe that there are plausible variants of the present definition of sliding, such as to slide with nodes at (i − 1, j) and (i + 1, j + 1) or even with a single node at (i − 1, j) or at (i + 1, j). In this paper, though, we only focus on our original definition. 8 On the Transformation Capability of Feasible Mechanisms for Programmable Matter for all i, 0 ≤ i < t. We should mention that we do not always allow m to be any of the two possible movements. In particular, in Sections 3 and 4 we only allow m to be a rotation, as we there restrict attention to systems in which only rotation is available. We shall clearly explain what movements are permitted in each part of the paper. I Proposition 1. The relation “transforms to” (i.e., ‘ ’) is a partial equivalence relation. Proof. The relation ‘ ’ is a binary relation on shapes. To show that it is a partial equivalence relation, we have to show that it is symmetric and transitive. For symmetricity, we have to show that for all shapes A and B, if A B then B A. It suffices to show that for all A, B, if A → B then B → A, meaning that every one-step transformation (which can be either a single rotation or a single sliding) can be reversed. For the rotation case, this follows by observing that a rotation of a node u can be performed iff there are two consecutive empty positions in its trajectory. When u rotates, it leaves its previous position empty, thus, leaving in this way two consecutive positions empty for the reverse rotation to become enabled. The argument for sliding is similar. For transivity, we have to show that for all shapes A, B, and C, if A B and B C then A C. By definition, A B if there is a sequence of shapes A = C0 , C1 , . . . , Ct = B, such that Ci → Ci+1 for all i, 0 ≤ i < t and B C if there is a sequence of shapes B = Ct , Ct+1 , . . . , Ct+l = C, such that Ci → Ci+1 for all i, t ≤ i < t + l. So, for the sequence A = C0 , C1 , . . . , Ct = B, Ct+1 , . . . , Ct+l = C it holds that Ci → Ci+1 for all i, 0 ≤ i < t + l, that is, A C. J When the only available movement is rotation, there are shapes in which no rotation can be performed (we will see such examples in Section 3). If we introduce a null rotation, then every shape may transform to itself by applying the null rotation. That is, reflexivity is also satisfied, and, together with symmetricity and transivity from Proposition 1, “transforms to” (by rotations only) becomes an equivalence relation. I Definition 1. Let A be a connected shape. Color black each cell of the grid that is occupied by a node of A. A cell (i, j) is part of a hole of A if every infinite length single path starting from (i, j) (moving only horizontally and vertically) necessarily goes through a black cell. Color black also every cell that is part of a hole of A, to obtain a compact black shape A0 (i.e., one with no holes in it). Consider now polygons defined by unit-length line segments of the grid. Define the perimeter of A as the minimum-area such polygon that completely encloses A0 in its interior. The fact that the polygon must have an interior and an exterior follows directly from the Jordan curve theorem [23]. I Definition 2. Now, color red any cell of the grid that has contributed at least one of its line-segments to the perimeter and is not black (i.e., is not occupied by a node of A). Call this the cell-perimeter of shape A. See Figure 3 for an example. I Definition 3. The external surface of a connected shape A, is a shape B, not necessarily connected, consisting of all nodes u ∈ A such that u occupies a cell defining at least one of the line-segments of A’s perimeter. I Definition 4. The extended external surface of a connected shape A, is defined by adding to A’s external surface all nodes of A whose cell shares a corner with A’s perimeter (for example, the black node just below the hole, in Figure 3). I Proposition 2. The extended external surface of a connected shape A, is itself a connected shape. O. Michail, G. Skretas, and P. G. Spirakis Figure 3 The perimeter (polygon of unit-length line segments colored blue) and the cell-perimeter (cells colored red) of a shape A (white spherical nodes; their corresponding cells have been colored black). The dashed black cells correspond to a hole of A. Proof. The perimeter of A is connected, actually, it is a cycle. This connectivity is preserved by the extended external surface, as whenever the perimeter moves straight, we have two horizontally or vertically neighboring nodes on the extended external surface and whenever it makes a turn, we either stay put or preserve connectivity via an intermediate diagonal node (from those nodes used to extend the external surface). J Observe, though, that the extended external surface is not necessarily a cycle. For example, the extended external surface of a line-shape is equal to the shape itself (and, therefore, a line). 2.1 Problem Definitions We here provide formal definitions of all the transformation problems that are considered in this work. Rot-Transformability. Given an initial shape A and a target shape B (usually both connected), decide whether A can be transformed to B (usually, under translations and rotations of the shapes) by a sequence of rotation only movements. RotC-Transformability. The special case of Rot-Transformability in which A and B are connected shapes and, additionally, connectivity must be preserved throughout the transformation. RS-Transformability. Given an initial shape A and a target shape B (usually both connected), decide whether A can be transformed to B (usually, under translations and rotations of the shapes) by a sequence of rotation and sliding movements. Minimum-Seed-Determination. Given an initial shape A and a target shape B (usually only with rotation available and a proof that A and B are not transformable to each other without additional assumptions) determine a minimum-size seed and an initial positioning of that seed relative to A that makes the transformation from A to B feasible. There are several meaningful variations of this problem. For example, the seed may or may not form 9 10 On the Transformation Capability of Feasible Mechanisms for Programmable Matter part of the target shape or the seed may be used as an intermediated step to show feasibility with “external” help and then be able to show that, instead of externally providing it, it is possible to extract it from the initial shape A via a sequence of moves. We will clearly indicate which version is considered in each case. In the above problems, the goal is to show feasibility of a set of transformation instances and, if possible, to provide an algorithm that decides feasibility. 3 In the last part of the paper, we consider distributed transformation tasks. There, the nodes are distributed processes able to perform communicate-compute-move rounds and the goal is to program them so that they (algorithmically) self-transform their initial arrangement to a target arrangement. Distributed-Transformability. Given an initial shape A and a target shape B (usually by having access to both rotation and sliding), the nodes (which are now distributed processes), starting from A, must transform themselves to B by a sequence of communicationcomputation-movement rounds. In the distributed transformations, we mostly consider the case in which A can be any connected shape and B is a spanning line, i.e., a linear arrangement of all the nodes. 3 Rotation In this section, the only permitted movement is 90° rotation around a neighbor. Consider a black and red checkered coloring of the 2D grid, similar to the coloring of a chessboard. Then any shape S may be viewed as a colored shape consisting of b(S) blacks and r(S) reds. Call two shapes A and B color-consistent if b(A) = b(B) and r(A) = r(B) and call them color-inconsistent otherwise. Call a transformation from a shape A to a shape C color-preserving if A and C are color consistent. Observe now, that if A → B, then A and B are color-consistent, because a rotation can never move a node to a position of different color than its starting position. This implies that if A C, then A and C are color-consistent, because any two consecutive shapes in the sequence are color-consistent. We conclude that: I Observation 1. The rotation movement is color-preserving. Formally, A C (restricted to rotation only) implies that A and C are color-consistent. In particular, every node beginning from a black (red) position of the grid, will always be on black (red, respectively) positions throughout a transformation consisting only of rotations. Based on this property of the rotation movement, we may call each node black or red throughout a transformation, based only on its initial coloring. The above observation gives a partial way to determine that two shapes A and B cannot be transformed to each other by rotations. I Proposition 3. If two shapes A and B are color-inconsistent, then it is impossible to transform one to the other by rotations only. We now show that the inverse is not true, that is, it does not hold that any two color-consistent shapes can be transformed to each other by rotations. This is trivial for disconnected shapes, as any collection of isolated nodes cannot move at all, and either we 3 An immediate next goal is to devise an algorithm able to compute an actual transformation or even compute or approximate the optimum transformation (usually with respect to the number of moves). We leave these as interesting open problems. O. Michail, G. Skretas, and P. G. Spirakis consider only the cardinalities of the colors, in which case any two such shapes of equal cardinalities correspond to the same shape, or we also consider the precise positions of the nodes on the grid (e.g. by their relative distances), in which case no two such shapes can be transformed to each other. Thus, we show a counterexample for the case of connected shapes. We begin with a proposition relating the number of black and red nodes in a connected shape. I Proposition 4. A connected shape with k blacks has at least d(k − 1)/3e and at most 3k + 1 reds. Proof. For the upper bound, observe that a black can hold up to 4 distinct reds in its neighborhood, which implies that k blacks can hold up to 4k reds in total, even if the blacks were not required to be connected to each other. To satisfy connectivity, every black must share a red with some other black (if a black does not satisfy this, then it cannot be connected to any other black). Any such sharing reduces the number of reds by at least 1. As at least k − 1 such sharings are required for each black to participate in a sharing, it follows that we cannot avoid a reduction of at least k − 1 in the number of reds, which leaves us with at most 4k − (k − 1) = 3k + 1 reds. For the lower bound, if we invert the roles of blacks and reds, we have that l reds can hold at most 3l + 1 blacks. So, if k is the number of blacks, it holds that k ≤ 3l + 1 ⇔ l ≥ (k − 1)/3 and due to the fact that the number of reds must be an integer, we conclude that for k blacks the number of reds must be at least d(k − 1)/3e. J I Proposition 5. There is a generic connected shape, called line-with-leaves, that has a color-consistent version for any connected shape. In other words, for k blacks it covers the whole range of reds from d(k − 1)/3e to 3k + 1 reds. Proof. Consider a bi-color line starting with a black node and ending to a black node, such that all k blacks are exhausted, as shown in Figure 4. To do this, k − 1 reds are needed in order to alternate blacks and reds on the line. Next, “saturate” every black (i.e. maximize its degree) by adding as many red nodes as it can fit around it (recall that the maximum degree of every node is 4). The resulting saturated shape has k blacks and 3k + 1 reds. This shape covers the 3k + 1 upper bound on the possible number of reds. By removing red leaf-nodes (i.e., of degree 1) one after the other, we can achieve the whole range of numbers of reds, from k − 1 to 3k + 1 reds. It suffices to restrict attention to the range from k to 3k + 1 reds. Take now any connected shape A and color it in such a way that red is the majority color, that is l ≥ k, where l is the number of reds and k is the number of blacks (there is always a way to do that). From the upper bound of Proposition 4, l can be at most 3k + 1, so we have k ≤ l ≤ 3k + 1 for any connected shape A, which falls within the range that the line-with-leaves can represent. Therefore, we conclude that any connected shape A has a color-consistent shape B from the line-with-leaves family. J Figure 4 A saturated line-with-leaves shape, in which there are k = 5 blacks and 3k + 1 = 16 reds. 11 12 On the Transformation Capability of Feasible Mechanisms for Programmable Matter I Proposition 6. There is an infinite set of pairs (A, B) of connected shapes, such that A and B are color-consistent but cannot be transformed to each other by rotations only. Proof. For shape A, take a rhombus as shown in Figure 5, consisting of k 2 blacks and (k +1)2 reds, for any k ≥ 2. In this shape, every black node is “saturated”, meaning that it has 4 neighbors, all of them necessarily red. This immediately excludes the blacks from being able to move, as all their neighboring positions are occupied by reds. But the same holds for the reds, as all potential target-positions for a rotation are occupied by reds. Thus, no rotation movement can be applied to any such shape A and A can only be transformed to itself (by null rotations). By Proposition 5, any such A has a color-consistent shape B from the family of line-with-leaves shapes, such that B is not equal to A (actually in B several blacks may have degree 3 in contrast to A where all blacks have degree 4). We conclude that A and B are distinct color-consistent shapes which cannot be transformed to each other, and there is an infinite number of such pairs, as the number k 2 of black nodes of A can be made arbitrarily large. J Figure 5 A rhombus shape, consisting of k2 = 9 blacks and (k + 1)2 = 16 reds. Propositions 3 and 6 give a partial characterization of pairs of shapes that cannot be transformed to each other. Observe that the impossibilities proved so far, hold for all possible transformations based on rotation only, i.e., they do not restrict the transformation in any way as would be, for example, to not allow the transformation to break the connectivity of the shape at any time. A small shape of particular interest is a bi-color pair or 2-line. Such pairs can move easily in any direction, which makes them very useful components of transformations. One way to simplify some transformations would be to identify as many such pairs as possible in a shape and treat them in a different way than the rest of the nodes. A question in this respect is whether all the minority-color nodes of a connected shape can be completely to (distinct) nodes of the majority color. We show that this is not true. I Proposition 7. There is an infinite family of connected shapes, such that, if A is a shape in the family of size n, then any matching of A leaves at least n/8 nodes of each color unmatched. Proof. See Figure 6. J Recall that Rot-Transformability is the language of all transformation problems between connected shapes that can be solved by rotation only and RotC-Transformability is its subset obtained by the restriction that the transformation should not break the connectivity of the shape at any point during the transformation. We begin by showing that the inclusion between the two languages is strict, that is, there are strictly more feasible O. Michail, G. Skretas, and P. G. Spirakis Figure 6 The counterexample. transformations if we allow connectivity to break. We prove that by showing that there is a feasible transformation in Rot-Transformability\RotC-Transformability. I Theorem 5. RotC-Transformability ⊂ Rot-Transformability. Proof. RotC-Transformability ⊆ Rot-Transformability is immediate, as any transformation that does not break the shape’s connectivity is also a valid transformation for Rot-Transformability. So, it suffices to prove that there is a transformation problem in Rot-Transformability\RotC-Transformability. Consider a (connected) horizontal line of any even length n, and let u1 , u2 , . . . , un be its nodes. The transformation asks to fold the line onto itself, forming a double-line of length n/2 and width 2, i.e., a n/2 × 2 rectangle. It is easy to observe that this problem is not in RotC-Transformability for any n > 4: the only nodes that can rotate without breaking connectivity are u1 and un , but any of their two possible rotations only enables a rotation that will bring the nodes back to their original positions. This means that, if the transformation is not allowed to break connectivity, then such a shape is trapped in a loop in which only the endpoints can rotate between three possible positions, therefore it is impossible to fold a line of length greater than 4. On the other hand, if connectivity can be broken, we can perform the transformation by the following simple procedure, consisting of n/4 phases: In the beginning of every phase i ∈ {1, 2, . . . , bn/4c}, pick the nodes u2i−1 , u2i , which shall at that point be the two leftmost nodes of the original line. Rotate u2i−1 once clockwise, to move above u2i , then u2i three times clockwise to move to the right of u2i−1 (the first of these three rotations breaks connectivity and the third restores it), and then rotate u2i−1 twice clockwise to move to the right of u2i , then u2i twice clockwise to move to the right of u2i−1 and repeat this alternation until the pair that moves to the right meets the previous pair, which will be when u2i−1 becomes the left neighbor of u2i−2 on the upper line of the rectangle under formation, or, in case i = 1, when u2i−1 goes above un (see Figure 7). If n/4 is not an integer, then perform a final phase, in which the leftmost node of the original line is rotated once clockwise to move above its right neighbor, and this completes folding. J This means that allowing the connectivity to break enables more transformations, and this motivates us to start from this simpler case. But we already know from Proposition 6, that even in this case an infinite number of pairs of shapes cannot be transformed to each other. Aiming at a general transformation, we ask whether there is some minimal addition 13 14 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1 3 4 2 5 6 7 8 9 10 Figure 7 Line folding. to a shape that would allow it to transform. The solution turns out to be as small as a 2-line seed lying initially somewhere “outside” the boundaries of the shape (e.g., just below the lowest row occupied by the shape). Based on the above assumptions, we shall now prove that any pair of color-consistent connected shapes A and B can be transformed to each other. Recall from the discussion before Proposition 7, that 2-line shapes can move freely in any direction. The idea is to use this 2-line in order to extract from the shape another 2-line, and use the two 2-lines together as a 4-line seed. The 4-line can also move freely in all directions. Then we shall use the 4-line as a transportation medium for those nodes that cannot move alone. In particular, we partition the nodes of the shape into those that can leave the shape as part of a 2-line and those that cannot. The latter nodes require the help of the 4-line to move them by carrying them, one at a time, in the form of a shape of order 5, which can only move diagonally (due to color-preservation of Proposition 3). We exploit these mobility mechanisms to transform A into a uniquely defined shape from the line-with-leaves family of Proposition 5 (meaning that any two color-consistent shapes are matched to the same shape from the family). But if any connected shape A with an extra 2-line can be transformed to its color-consistent line-with-leaves version with an extra 2-line, then this also holds inversely due to reversibility of rotations (discussed in the proof of Proposition 1), and it follows that any A can be transformed to any B by transforming A to its line-with-leaves version LA and then inverting the transformation from B to LB = LA . I Theorem 6. If connectivity can break and there is a 2-line seed provided “outside” the initial shape, then any pair of color-consistent connected shapes A and B can be transformed to each other by rotations only. Proof. Without loss of generality (due to symmetry and the 2-line’s unrestricted mobility), it suffices to assume that the seed is provided somewhere below the lowest row l occupied by the shape A. We show how A can be transformed to LA with the help of the seed. We O. Michail, G. Skretas, and P. G. Spirakis 15 define LA as follows: Let k be the cardinality of the minority color, let it be the black color. As there are at least k reds, we can create a horizontal line of length 2k, i.e., u1 , u2 , . . . , u2k , starting with a black, i.e., u1 is black, and alternating blacks and reds. In this way, the blacks are exhausted. The remaining ≤ (3k + 1) − k = 2k + 1 reds are then added as leaves of the black nodes, starting from the position to the left of u1 and continuing counterclockwise, i.e., below u1 , below u3 , ..., below u2k−1 , above u2k−1 , above u2k−3 , and so on. This gives the same shape from the line-with-leaves family, for all color-consistent shapes (observe that the leaf to the right of the line is always placed). LA shall be constructed on rows l − 5 to l − 3 (not necessarily inclusive), with u1 on row l − 4 and a column j preferably between those that contain A. First, extract a 2-line from A, from row l, so that the 2-line seed becomes a 4-line seed. To see that this is possible for every shape A of order at least 2, distinguish the following two cases: (i) If the lowest row has a horizontal 2-line, then the 2-line can leave the shape without any help and approach the 2-seed. (ii) If not, then take any node u of row l. As A is connected and has at least two nodes, u must have a neighbor v above it. The only possibility that the 2-line u,v is not free to leave A is when v has both a left and a right neighbor. Figure 8 shows how this can be resolved with the help of the 2-line seed (now the 2-line seed approaches and extracts the 2-line). 2-line unable to leave 2-line seed binds (a) (b) (c) 4-line constructed (d) (e) Figure 8 Extracting a 2-line with the help of the 2-line seed. To transform A to LA , given the 4-line seed, do the following: While the minority color (color chosen for u1 ) is still present in A: If on the current lowest row occupied by A, there is a 2-line that can be extracted alone and move towards LA , then perform the shortest such movement that attaches the 2-line to the right endpoint of LA ’s line u1 , u2 , . . .. If not, then use the 4-line to extract a single node from the lowest row of A. If that node fits to the right endpoint of LA ’s line, place it there, otherwise, transfer it to an unoccupied position below row l − 7 to be used later. Once the minority color has been exhausted from A, alternate the two colors until u2k−3 has been placed (u2k−1 and u2k will only be placed in the end as they are part of the 4-line). To do this, use the 4-line to transfer nodes from A and from the “repository” maintained below LA . When this occurs, if there are no more nodes left, run the termination phase, otherwise transfer the remaining nodes with the 4-line, one after the other, and attach them around the line of LA , beginning from the position to the left of u1 counterclockwise, as decribed above (skipping the position u2k ). 16 On the Transformation Capability of Feasible Mechanisms for Programmable Matter Termination phase: the line-with-leaves is ready, apart from positions u2k−1 , u2k which require a 2-line from the 4-line. If the position above u2k−1 is empty, then extract a 2-line from the 4-line and transfer it to the positions u2k−1 , u2k . This completes the transformation. If the position above u2k−1 is occupied by a node u2k+1 , then place the whole 4-line vertically with its lowest endpoint on u2k (as in Figure 9). Then rotate the top endpoint counterclockwise, to move above u2k+1 , then rotate u2k+1 clockwise around it to move to its left, then rotate the node above u2k counterclockwise to move to u2k−1 , and finally restore u2k+1 to its original position. This completes the construction (the 2-line that always remains can be transferred in the end to a predefined position). J (a) (b) (c) (d) (e) (f) Figure 9 The termination phase of the transformation. The natural next question is to what extent can the 2-line seed assumption be dropped. Clearly, by Proposition 6, this cannot be always possible. The following corollary gives a sufficient condition to drop the 2-line seed assumption, without looking deep into the structure of the shapes that satisfy it. I Corollary 7. Assume rotations only and that connectivity can break. Let A and B be two color-consistent connected shapes such that each one of them can self-extract a 2-line. Then A and B can be transformed to each other. We remind that a rotation move in a grid can occur towards 4 directions: N orthEast(1), SouthEast(2), SouthW est(3), N orthW est(4). In order for the first move to occur a node has to be present North OR East but not both. The same requirements apply for moves 2, 3 and 4 respectively. If the connectivity of the shape can be broken and two nodes, A and B, are next to each other and A can perform a rotation using B, then B can perform a rotation using A if the connectivity of the shape can be broken. I Lemma 8. A 2-seed can be extracted from a shape iff a single rotation move is available on the shape. Proof. If a move is available on a shape but not on the perimeter, that move can be transferred to the perimeter through transformations. Let us consider a shape that has only two holes which are next to each other. We will call them cell A and E respectively. Without loss of generality let us consider that cell O. Michail, G. Skretas, and P. G. Spirakis A is west of E. We name S the cell south of A and SE the cell south of E. Now we propose the following method. The node residing in cell S rotates to the cell E and then the node in cell SE rotates to the cell A. After these two moves, cell S is renamed to A and SE is renamed to E. The cell south of the new A and E are named S and SE respectively. This method can be repeated indefinitely until the two white cells reach the end of the grid. We have shown how two white cells can“travel” south. By reversing the method the two white cells can travel north. The two white cells can travel east and west with a simple transformation before the method. After naming the four cells above, the node in cell S rotates to E. After this step we have two white cells, A and S. Now rename S into E and E into S. Now repeat the method and the two white positions will start travelling east. For the opposite direction, rotate the node in position SE to cell A, and rename A into SE and SE into A. Now repeat the method and the white cells can travel east. By using a combination of the above steps, the two white cells can move freely through the grid and reach any place. Now consider a shape where there are more than 2 holes but at least two are next to each other. We will show that the two white cells that are side by side can travel to the perimeter of the shape using the above method even if they reach other white cells. Without loss of generality suppose that the two white cells are the southernmost pair travelling south. If the travelling nodes ever meet a white cell south of them, we just need to show that we can turn this cell (S) from a white one to a black one. Thus we perform the following act: Check if there is a node west of A. If there is, move him south of A. Note that the cell west of S is always a black node because we cannot have two white cells next to each other south of A. If not check if there is a node north of A. Note that there is always a node north of A, else a move would never be available which is prohibited. Now move the node north of A to the west of A then south of A. This move is available if there is a node northwest of A. If there is not, move the node north of A, east of A then south of A. This move is available only if there is a node northeast of A. If there is not, move the node east to the northeastern cell of A then east of A then south of A. If there is not one, we reach the following shape.See figure 10 The first node available northeast of A or northwest of A can be moved with rotations to the cell south of A. If a node is not available on either of those lines then either the connectivity of the shape is breached because we know that there are nodes north of A which have to be connected with the rest of the shape, or the A cell is not part of the shape. Both of those are not allowed so there is always a node northeast or northwest of A. Thus there is always a way to fill the cell south of A. In a similar fashion if the cell south of E was white, we could always fill it. A 2-seed can be extracted from a shape if a single rotation move is available on the perimeter of the shape. Without the loss of generality suppose that nodes A and B are east-west to each other respectively, they are the southernmost nodes with a move available and none of them have any nodes in the two cells directly south of them. This means that the other can move as well. If node A can perform a rotation to move south of B then afterwards B can perform a rotation to move west of A. Then B can rotate south of A and A west of B. This four step method can be repeated forever until either one of them finds a node south. If one of them finds a node south, called C i.e. A find a node south of him then B moves north of A and A moves east of C. Then A and C perform the four step method. If the two nodes keep repeating this eventually they will disconnect from the shape as a 2-seed. 17 18 On the Transformation Capability of Feasible Mechanisms for Programmable Matter If a move is not available a 2-seed cannot be extracted. If a move is not available then no node can perform a rotation move. that no node can begin the process to extract himself as part of a 2-seed. This means J A Figure 10 Proof for 2seed extraction to the perimeter. I Theorem 9. Rotation-Transformability belongs to P. Proof. In Lemma 8, we proved that we can extract a 2-seed from a shape iff a move is initially available. By Theorem 6, if both shapes A and B have a 2-seed available then they can be transformed to each other. It follows that two shapes A and B can be transformed to each other iff both have a move available. Now we define a n × n grid where any shape with n nodes can fit in. The time it takes for an algorithm to check if one of the shapes has a move available is O(n). If for example the algorithm checks each individual node, that takes O(1) time and, therefore, O(n) time for n nodes. So for two shapes it takes O(n) time to check if a move is available in each of the shapes. Thus, the problem belongs to P. If the two shapes, A and B, are the same, then they can trivially transform to each other without any moves. An algorithm can check this by simply mapping the grid of the first shape, which takes O(n) time, and then check the second shape to see if the black cells match. If it ever finds a black cell that does not exist on the first shape, or it finds a white cell when it expected a black cell, then it decides that the two shapes are not the same. This process takes O(n) time because it is equals to the time it takes to visit every n node. Thus, it takes O(n) time to check if A = B. J 4 Rotation and Connectivity Preservation In this section, we restrict our attention to transformations that transform a connected shape A to one of its color-consistent shapes B, without ever breaking the connectivity of the shape on the way. As already mentioned in the introduction, connectivity preservation is a very desirable property for programmable matter, as, among other positive implications, it guarantees that communication between all nodes is maintained, it minimizes transformation failures, requires less sophisticated actuation mechanisms, and increases the external forces required to break the system apart. We begin by proving that RotC-Transformability can be decided in deterministic polynomial space. O. Michail, G. Skretas, and P. G. Spirakis I Theorem 10. RotC-Transformability is in PSPACE. Proof. We first present a nondeterministic Turing machine (NTM) N that decides Transformability in polynomial space. N takes as input two shapes A and B, both consisting of n nodes and at most 4n edges. A reasonable representation is in the form of a binary n × n matrix (representing a large enough sub-area of the grid) where an entry is 1 iff the corresponding position is occupied by a node. Given the present configuration C, where C = A initially, N nondeterministically picks a valid rotation movement of a single node. This gives a new configuration C 0 . Then N replaces the previous configuration with C 0 in its memory, by setting C ← C 0 . Moreover, N maintains a counter moves (counting the number of moves performed so far), with maximum value equal to the total number of possible shape 2 configurations, which is at most 2n in the binary matrix encoding of configurations. To set up such a counter, N just have to reserve for it n2 (binary) tape-cells, all initialized to 0. Every time N makes a move, as above, after setting a value to C 0 it also increases moves by 1, i.e., sets moves ← moves + 1. Then N takes another move and repeats. If it ever holds that C 0 = B (may require N to perform a polynomial-space pattern matching on the n × n matrix to find out), then N accepts. If it ever holds that the counter is exhausted, that is, all its bits are set to 1, N rejects. If A can be transformed to B, then there must be a transformation beginning from A and producing B, by a sequence of valid rotations, without ever repeating a shape. Thus, some branch of N ’s computation will follow such a sequence 2 and accept, while all non-accepting branches will reject after at most 2n moves (when moves reaches its maximum value). If A cannot be transformed to B, then all branches will reject 2 after at most 2n moves. Thus, N correctly decides Transformability. Every branch of N , at any time, stores at most to shapes (the previous and the current), which requires O(n2 ) 2 space in the matrix representation, and a 2n -counter which requires O(n2 ) bits. It follows that every branch uses space polynomial in the size of the input. So, far we have proved that Transformability is decidable in nondeterministic polynomial (actually, linear) space. By applying Savitch’s theorem [32] 4 , we conclude that Transformability is also decidable in deterministic polynomial space (actually, quadratic), i.e., it is in PSPACE. J Recall that in the line folding problem, the initial shape is a (connected) horizontal line of any even length n, with nodes u1 , u2 , . . . , un , and the transformation asks to fold the line onto itself, forming a double-line of length n/2 and width 2. As part of the proof of Theorem 5, it was shown that if n > 4, then it is impossible to solve the problem by rotation only (if n = 4, it is trivially solved, just by rotating each endpoint above its unique neighbor). In the next proposition, we employ again the idea of a seed to show that with a little external help the transformation becomes feasible. I Proposition 8. If there is a 3-line seed v1 , v2 , v3 , horizontally aligned over nodes u3 , u4 , u5 of the line, then the line can be folded. Proof. We distinguish two cases, depending on whether we want the seed to be part of the final folded line or not. If yes, then we can either use a 4-line seed directly, over nodes u3 , u4 , u5 , u6 , or a 3-line seed but require n to be odd (so that n + 3 is even). If not, then n must be even. We show the transformation for the first case, with n odd and a 3-line seed (the other cases can be then treated with minor modifications). 4 Informally, Savitch’s theorem establishes that any NTM that uses f (n) space can be converted to a deterministic TM that uses only f 2 (n) space. Formally, it establishes that for any function f : N → N, where f (n) ≥ log n, NSPACE(f (n)) ⊆ SPACE(f 2 (n)). 19 20 On the Transformation Capability of Feasible Mechanisms for Programmable Matter We first show a simple reduction from an odd line with a 3-line seed starting over its third node to an even line with a 4-line seed starting over its third node. By rotating u1 clockwise over u2 , we obtain the 4-line seed u1 , v1 , v2 , v3 . It only remains to move the whole seed two positions to the right (by rotating each of its 2-lines clockwise around themselves). In this manner, we obtain an even-length line u2 , . . . , un and a 4-line seed starting over its third node, without breaking connectivity. Therefore, in what follows we may assume that the initial shape is an even-length line u1 , u2 , . . . , un with a 4-line seed v1 , v2 , v3 , v4 horizontally aligned over nodes u3 , u4 , u5 , u6 . See Figure 11. J 1 1 u1 v1 v2 v3 3 v2 v4 u2 2 u1 v1 v3 v4 u2 5 4 4 v2 v1 v1 v1 v1 6 v2 u1 v1 v3 7 v4 u2 9 v2 v 8 2 v4 u2 10 u1 u2 u1 12 u1 u1 9 11 10 v3 v3 v4 v1 v4 11 10 u2 u2 v3 v3 v1 v1 v2 13 12 u1 v1 11 v4 13 12 v2 v2 v4 v4 u2 v2 v3 v4 v1 u2 u1 v3 v2 v1 u2 u1 v3 v2 13 v4 2-line leaves right v1 v4 Figure 11 The main subroutine of line folding with connectivity preservation. We believe that in order to transform one shape to another we first need to find a seed that can both move on the perimeter of a shape and being able to reach every possible cell of the perimeter. We call this for simplicity: traverse the perimeter. After this is guaranteed we want the seed to be able to extract nodes and move them gradually to specific cells of the O. Michail, G. Skretas, and P. G. Spirakis 21 perimeter in order to create the desired shape. Thus the seed could actually simulate the rotation-sliding movement. We begin with the smallest seed possible and try to tackle the problem of moving on the perimeter of a line. Note that we do not allow the nodes of the shape to move in order to simplify and strengthen the model. I Proposition 9. A 2-seed cannot traverse the perimeter a line without breaking the connectivity. Proof. Observe figure 12, shape number 1. The 2-seed has reached the end of the line and now it tries to move east of the line and then south of it. Note that the black node has 2 possible moves. It can either perform a single move and stop above the red node, or perform two subsequent moves and stop east of the red node. No matter the choice, the red node then is not able to move because any possible move would break the connectivity of the shape. See figure 12, shapes number 2, 3. Thus the black node has to stay in place and only the red node can move now. Observe now that the red node is trapped in a loop of 2 possible moves (excluding the act of moving above the black node which would not allow us to try and move under the line): become the new endpoint or move under the end of the line. The first case leads necessarily to the second case because it is the only legal move available (excluding the move of looping back). See figure 13. But when we each the second case, once more we are limited into looping back to the initial positions. Thus a 2-seed cannot traverse the perimeter of a line without breaking the connectivity J 1 2 3 Figure 12 Black node movement for 2-seed. 1 2 3 Figure 13 Red node movement for 2-seed). I Proposition 10. A 4-seed cannot traverse the perimeter of a line without breaking the connectivity. Proof. Consider the last time, tlast, that the black and red nodes in rows≤i increases from 2 to 3. This means that either a black or a red moved at tlast from i + 1 to i. From now on, none of those 3 nodes can go back to rows>i and there is one node remaining in rows>i. 22 On the Transformation Capability of Feasible Mechanisms for Programmable Matter Actually that node u must necessarily be in row i + 1, otherwise the connectivity would have broken. So no node from rows≤i can return to rows>i anymore and there is a single node u remaining in row r + 1. We begin by finding the possible shapes that meet the above requirements. The rotation of the node at tlast was necessarily clockwise, as the closest counterclockwise move to the line is from (i + 1, j + 1) to (i, j), but it requires (i, j) to be empty before rotating, but then 2 nodes in rows≤i and only one additional (u) in rows>i cannot support connectivity. We will now distinguish the tlast into cases. If u is a black node: If u is at position (i + 1, j − 2) then it is stuck forever (blue node cannot move and the other black and red cannot go up any more to carry u. It also cannot be at (i + 1, j + 2) as this does not permit a clockwise move of a red from (i + 1, j + 1), so it has to be at (i + 1, j). See figure 15 shape number 2. Node u is connected to A only via the red below it, which therefore cannot move unless u moves first(because no node can return to row>i any more to support u via another path. But the only way for u to move is for the black southeast node to move first, which in turn cannot move unless the rightmost red moves up which is impossible as no node may return to row>i (that red node can move down but then the only available movement is to return to its previous position. If u is a red node: It cannot be at (i + 1, j − 3) as before and it cannot be at (i + 1, j + 1) as the rotation at tlast was then necessarily from (i + 1, j) which is blocked by u. Observe that the clockwise rotation could not have been from (i + 1, j + 2). The only way to support connectivity in this case with 2 nodes in rows≤i and 2 in rows>i, is by having the following shape but then a clockwise rotation of the upper black is impossible. Therefore, if u is a red node it has to be at (i + 1, j − 1). See figure 15 shape number 1. Either nodes in rows≤i cannot move at all, or if the bottom black is far away, the rightmost black is trapped in a loop going down and then up to its original positions as before. Therefore the 4-seed cannot traverse the perimeter of a line without breaking the connectivity. J J j-3 j-2 j-1 j j+1 j+2 i+2 i+1 i i-1 i-2 Figure 14 Starting position of 4-seed on a line. I Proposition 11. A 6-seed can traverse the perimeter of a discrete-convex shape without breaking the connectivity. Proof. Consider a folded 6-seed occupying cells (i, j), (i, j + 1), (i, j + 2) and (i − 1, j), (i − 1, j + 1), (i − 1, j + 2). Since the shape is discrete-convex, iff there is any node present in cells (i, j + 3) or (i − 1, j + 3), there can be no node present in cells (i, j − 1) or (i − 1, j − 1). For the same reason if there is a node in cells (i − 2, j) or (i − 2, j + 1) or (i − 2, j + 2) O. Michail, G. Skretas, and P. G. Spirakis 23 1 2 Figure 15 Black and red cases for node u). there can be no node in cells (i + 1, j) or (i + 1, j + 1) or (i + 1, j + 2).In order to place this seed at those cells, one of the neighbouring cells has to be occupied by a node. Without loss of generality, suppose that the 6-seed tries to move east. There are 4 distinct cases for this move. Note that in the following 4 cases we assume the absolute minimum amount of neighbouring nodes. If at any case there were more present at the shape, the rotations would be the exact same without any modification or problem. A node occupies cell (i, j + 3). In order for this shape to be discrete-convex, a node has to be present in cell (i − 1, j + 3). In this case the 6-seed has to move north and performs the rotations described in figure 16, 17, 18, 19 if a node is present in cell (i + 1, j + 3) and the orientations described in figures 20 if a node is not present in cell (i + 1, j + 3) in order to keep moving. A node occupies cell (i − 1, j + 3) and no node occupies cell (i, j + 3). In this case the 6-seed performs the rotations described in figure 21 in order to climb the step. Note that since the 6-seed begins and ends the move while preserving its shape, it is guaranteed that any number of steps can be climbed this way. A node occupies cell (i − 2, j + 3) and no node occupies cell (i − 1, j + 3) or (i, j + 3). In this case the 6-seed performs the rotations described in figure 22 rotations in order to slide east. No nodes occupy cells (i − 2, j + 3), (i − 1, j + 3) and (i, j + 3). In this case the 6-seed performs the rotations described in figure 23 in order to reach a shape that matches the conditions of the step case. Therefore the 6-seed can now perform a climb move in order to continue. We can replicate the results for south, west, north directions by simply rotating the whole shape by 90, 180, 270 degrees respectively. J 1 2 2 i,j 2 1 1 2 1 2 3 1 2 1 4 5 6 7 Figure 16 Method for going north. I Proposition 12. An 8-seed can traverse the perimeter of a discrete-convex shape without breaking the connectivity. Proof. Consider a folded 8-seed occupying cells (i, j) (i, j + 1) (i, j + 2) (i, j + 3) and (i − 1, j), (i − 1, j + 1), (i − 1, j + 2), (i − 1, j + 3). Since the shape is discrete-convex, iff there is any 24 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1 2 3 i,j 2 4 2 1 2 1 1 1 2 3 4 5 6 Figure 17 Method for going north with node at (i-2,j+2). 1 2 2 1 i,j 3 1 2 1 2 3 4 Figure 18 Method for going north with node at (i-2,j+1). 1 1 2 1 3 2 i,j 1 2 2 1 2 3 4 5 6 Figure 19 Method for going north with node at (i-2,j). 2 2 3 1 1 1 1 2 4 3 2 3 4 3 1 2 3 4 5 Figure 20 Method for climbing north. 1 2 1 i,j 2 2 1 2 4 2 3 3 1 1 1 2 3 Figure 21 Method for climbing a step. 4 5 6 7 O. Michail, G. Skretas, and P. G. Spirakis 6 4 5 3 25 2 1 1 2 Figure 22 Method for sliding. 2 1 4 2 1 1 2 3 4 5 3 4 1 2 3 6 2 1 7 Figure 23 Method for transforming. node present in cells (i, j + 4) or (i − 1, j + 4), there can be no node present in cells (i, j − 1) or (i − 1, j − 1). For the same reason if there is a node in cells (i − 2, j) or (i − 2, j + 1) or (i − 2, j + 2) or (i − 2, j + 3) there can be no node in cells (i + 1, j) or (i + 1, j + 1) or (i + 1, j + 2) or (i + 1, j + 3).In order to place this seed at those cells, one of the neighbouring cells has to be occupied by a node. Without loss of generality, suppose that the 8seed tries to move east. There are 4 distinct cases for this move. Note that in the following 4 cases, if not mentioned, we assume the absolute minimum amount of neighbouring nodes. If at any case there were more present at the shape, the rotations would be the exact same without any modification or problem. A node occupies cell (i, j + 4). In order for this shape to be discrete-convex, a node has to present in cell (i − 1, j + 4). In this case the 8seed has to move north and performs the rotations described in figure 24 if a node is present in cell (i + 1, j + 4); and the orientations described in figure 25 if a node is not present in cell (i + 1, j + 4) in order to keep moving. A node occupies cell (i − 1, j + 4) and no node occupies cell (i, j + 4). In this case the 8-seed performs the rotations described in figure 26 and in figure 27 order to climb the step. Note that since the 8-seed begins and ends the move while preserving its shape, it is guaranteed that any number of steps can be climbed this way. A node occupies cell (i − 2, j + 4) and no node occupies cell (i − 1, j + 4) or (i, j + 4). In this case the 8-seed performs the rotations described in figure 28 rotations in order to slide east. No nodes occupy cells (i − 2, j + 4), (i − 1, j + 4) and (i, j + 4). In this case the 8-seed performs the rotations described in figure 29 in order to reach a shape that matches the conditions of the first case. Therefore the 8-seed can now perform a climb move in order to continue. We can replicate the results for south, west, north directions by simply rotating the whole shape by 90, 180, 270 degrees respectively. J Our goal here was to show that since both a 6-seed and an 8-seed can traverse the perimeter of any discrete-convex shape, then a 6-seed may be able to start extracting 2 nodes 26 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1 2 1 2 1 2 1 1 2 2 3 4 5 Figure 24 Method for going north. 3 2 1 1 3 2 2 2 4 1 3 5 4 1 6 3 4 5 2 1 3 2 1 1 2 3 4 5 6 4 1 3 2 1 7 8 9 Figure 25 Method for climbing north. 3 1 2 4 2 1 2 3 1 4 3 1 2 3 1 2 3 4 5 Figure 26 Method for climbing a step with a node at cell (i-2,j+2). 3 1 2 4 1 1 4 2 1 4 2 3 1 2 4 1 5 1 3 2 2 3 2 1 5 2 7 8 Figure 27 Method for climbing a step. 2 3 3 3 2 1 4 1 1 3 2 9 10 11 6 O. Michail, G. Skretas, and P. G. Spirakis 27 1 3 1 1 4 2 2 2 4 3 2 3 1 2 1 3 1 2 3 4 5 6 Figure 28 Method for sliding. 3 1 1 1 2 4 5 2 4 2 2 2 3 1 3 1 1 4 2 1 2 3 2 3 3 1 4 4 1 3 5 2 2 6 1 3 2 4 1 1 3 2 7 8 3 4 1 2 13 14 Figure 29 Method for transforming. 9 10 11 1 2 12 28 On the Transformation Capability of Feasible Mechanisms for Programmable Matter at a time from the shape A , move them as an 8-seed at a designated cell, leave them there, and continue this loop while creating i.e. a line with leaves. Afterwards we could perform the same method for shape B. If we succeeded in both shapes, then we could transform one to another. 5 Rotation and Sliding In this section, we study the combined effect of rotation and sliding movements. We shall prove that rotation and sliding together, are transformation-universal, meaning that they can transform any given shape to any other shape of the same size without ever breaking the connectivity during the transformation. It would be useful for the reader to recall Definitions 1, 2, 3, and 4 and Proposition 2, from Section 2, as the results that follow make extensive use of them. As the perimeter is a (connected) polygon, it can be traversed by a particle walking on its edges (the unit-length segments). We now show how to “simulate” the particle’s movement and traverse the cell-perimeter by a node, using rotation and sliding only. I Lemma 11. If we place a node u on any position of the cell-perimeter of a connected shape A, then u can walk the whole cell-perimeter and return to its original position by using only rotations and slidings. Proof. We show how to “simulate” the walk of a particle moving on the edges of the perimeter. The simulation implements the following simple rules: 1. If the current line-segment traversed by the particle concerns the same red cell as the one of the immediately previous line-segment traversed, then stay put. 2. If not: a. If the two consecutive line-segments traversed form a line-segment of length 2, then move by sliding one position in the same direction as the particle. b. If the two consecutive line-segments traversed are perpendicular to each other, then move by a single rotation in the same direction as the particle. It remains to prove that u can indeed always perform the claimed movements. (1) is trivial. For (2.a), a line-segment of length 2 on the perimeter is always defined by two consecutive blacks to the interior and two consecutive empty cells to the exterior (belonging to the cell-perimeter), therefore, u can slide on the empty cells. For (2.b), there must be a black in the internal angle defined by the line-segments and an empty cell diagonally to it, in the exterior (for an example, see the right black node on the highest row containing nodes of A, in Figure 3, Section 2). Therefore, rotation can be performed. J Next, we shall prove that u need not be an additional node, but actually a node belonging to the shape, and in particular one of those lying on the shape’s boundary. I Lemma 12. Let A be a connected shape of order at least 2. Then there is a subset R of the nodes on A’s external surface, such that |R| ≥ 2 and for all u ∈ R, if we completely remove u from A, then the resulting shape A0 = A − {u} is also connected. Proof. If the extended external surface of A contains a cycle, then such a cycle must necessarily have length at least 4 (due to geometry). In this case, any node of the intersection of the external surface (non-extended) and the cycle can be removed without breaking A’s connectivity. If the extended external surface of A does not contain a cycle, then it corresponds to a tree graph which by definition has at least 2 leaves, i.e., nodes of degree O. Michail, G. Skretas, and P. G. Spirakis exactly 1. Any such leaf can be removed without breaking A’s connectivity. In both cases, |R| ≥ 2. J I Lemma 13. Pick any u ∈ R (R defined on a connected shape A as above). Then u can walk the whole cell-perimeter of A0 = A − {u} by rotations and slidings. Proof. It suffices to observe that u already lies on the cell-perimeter of A0 . Then, by Lemma 11, it follows that such a walk is possible. J We are now ready to state and prove the universality theorem of rotations and slidings. I Theorem 14. Let A and B be any connected shapes, such that |A| = |B| = n. Then A and B can be transformed to each other by rotations and slidings, without breaking the connectivity during the transformation. Proof. It suffices to show that any connected shape A can be transformed to a spanning line L by rotations and slidings only and without breaking connectivity during the transformation. If we show this, then A can be transformed to L and B can be transformed to L (as A and B have the same order, therefore correspond to the same spanning line L), and by reversibility of these movements, A and B can be transformed to each other via L. Pick the rightmost column of the grid containing at least one node of A, and consider the lowest node of A in that column. Call that node u. Observe that all cells to the right of u are empty. Let the cell of u be (i, j). The final constructed line will start at (i, j) and end at (i, j + n − 1). The transformation is partitioned into n − 1 phases. In each phase k, we pick a node from the original shape and move it to position (i, j + k), that is, to the right of the right endpoint of the line formed so far. In phase 1, position (i, j + 1) is a cell of the cell-perimeter of A. So, even if it happens that u is a node of degree 1, by Lemma 12, there must be another such node v ∈ A that can walk the whole cell-perimeter of A0 = A − {v} (the latter, due to Lemma 13). As u 6= v, (i, j + 1) is also part of the cell-perimeter of A0 , therefore, v can move to (i, j + 1) by rotations and slidings. As A0 is connected (by Lemma 12), A0 ∪ {(i, j + 1)} is also connected and also all intermediate shapes were connected, because v moved on the cell-perimeter and, therefore, it never disconnected from the rest of the shape during its movement. In general, the transformation preserves the following invariant. At the beginning of phase k, 1 ≤ k ≤ n − 1, there is a connected shape S(k) (where S(1) = A) to the left of of column j (j inclusive) and a line of length k − 1 starting from position (i, j + 1) and growing to the right. Restricting attention to S(k), there is always a v 6= u that could move to position (i, j + 1) if it were not occupied. This implies that before the final movement that places it on (i, j + 1), v must have been in one of (i + 1, j) and (i + 1, j + 1), if we assume that v always walks in the clockwise direction. Observe now that from each of these positions v can perform zero or more right slidings above the line in order to reach the position above the right endpoint of the line. When this occurs, a final clockwise rotation makes v the new right endpoint of the line. The only exception is when v is on (i + 1, j + 1) and there is no line to the right of (i, j) (this implies the existence of a node on (i + 1, j), otherwise connectivity of S(k) would have been violated). In this case, v just performs a single downward sliding to become the right endpoint of the line. J I Theorem 15. The transformation of Theorem 14 requires Θ(n2 ) movements in the worst case. 29 30 On the Transformation Capability of Feasible Mechanisms for Programmable Matter Proof. Consider a ladder shape of order n, as depicted in Figure 30. The strategy of Theorem 14 will choose to construct the line to the right of node u. The only node that can be selected to move in each phase without breaking the shape’s connectivity is the top-left node. Initially, this is v, which must perform dn/2e movements to reach its position to the right of u. In general, the total number of movements M , performed by the transformation of Theorem 14 on the ladder, is given by M= = lnm 2 lnm 2 +2· (n−3)/2 l X i=1 nm +i 2 (n−3)/2 X (n − 2) + 2 · i i=1 = Θ(n2 ). J v 1 2 3 1 4 2 5 3 6 4 7 5 u 7 6 8 u 8 9 10 11 v Figure 30 Transforming a ladder into a spanning line. Theorem 15 shows that the above generic strategy is slow in some cases, as is the case of transforming a ladder shape into a spanning line. We shall now show that there are pairs of shapes for which any strategy and not only this particular one, may require a quadratic number of steps to transform one shape to the other. I Definition 16. Define the potential of a shape A as its minimum “distance” from the line L, where |A| = |L|. The distance is defined as follows: Consider any placement of L relative to A and any pairing of the nodes of A to the nodes of the line. Then sum up the Manhattan distances 5 between the nodes of each pair. The minimum sum between all possible relative placements and all possible pairings is the distance between A and L and also A’s potential. In case the two shapes do not have an equal number of nodes, then any matching is not perfect and the distance can be defined as infinite. Observe that the potential of the line is 0 as it can be totally aligned on itself and the sum of the distances is 0. I Lemma 17. The potential of the ladder is Θ(n2 ). Proof. We prove it for horizontal placement of the line, as the vertical case is symmetric. Any such placement leaves either above or below it at least half of the nodes of the ladder 5 The Manhattan distance between two points (i, j) and (i0 , j 0 ) is given by |i − i0 | + |j − j 0 |. O. Michail, G. Skretas, and P. G. Spirakis (maybe minus 1). W.l.o.g. let it be above it. Every two nodes, the height increases by 1, therefore there are 2 nodes at distance 1, 2 at distance 2,. . ., 2 at distance n/4. Any matching between these nodes and the nodes of the line gives for every pair a distance at least as large as the vertical distance between the ladder’s node and the line, thus, the total distance is at least 2 · 1 + 2 · 2 + ... + 2 · (n/4) = 2 · (1 + 2 + ... + n/4) = (n/4) · (n/4 + 1) = Θ(n2 ). We conclude that the potential of the initial ladder is Θ(n2 ). J I Theorem 18. Any transformation strategy based on rotations and slidings and performing a single movement per step, requires Θ(n2 ) steps to transform a ladder into a line. Proof. To show that Ω(n2 ) movements are needed to convert the ladder to a line, it suffices to observe that the difference in their potentials is that much and that one rotation or one sliding can decrease the potential by at most 1. J I Remark. The above lower bound is independent of connectivity preservation. It is just a matter of the total distance based on single distance-one movements. Finally, it is interesting to observe that such lower bounds can be computed in polynomial time, because there is a polynomial-time algorithm for computing the distance between two shapes. I Proposition 13. Let A and B be connected shapes. Then their distance d(A, B) can be computed in polynomial time. Proof. The algorithm picks a node u ∈ B, a cell c of the grid occupied by a node v ∈ A, and an orientation o ∈ north, east, south, west and draws a copy of the shape B, starting with u on c and respecting the orientation o. Then, it constructs (in its memory) a complete weighted bipartite graph (X, Y ), where X and Y are equal to the node-sets of A and B, respectively. The weight w(x, y) for x ∈ X and y ∈ Y is defined as the distance from x to y (given the drawing of shape B relative to shape A). To compute the minimum total distance pairing of the nodes of A and B for this particular placement of A and B, the algorithm computes a minimum cost perfect matching of (X, Y ), e.g., by the Kuhn-Munkres algorithm (a.k.a. the Hungarian algorithm) [26], and the sum of the weights of its edges k, and sets dist = min{d, k}. Then the algorithm repeats for the next selection of u ∈ B, cell c occupied by a node v ∈ A, and orientation o. In the end, the algorithm gives dist as output. To see that dist = d(A, B), observe that the algorithm just implements the procedure for computing the distance, of Definition 16, with the only differences being that it does not check all pairings of the nodes, instead directly computes the minimum-cost pairing, and that it does not try all relative placements of A and B but only those in which A and B share at least one cell of the grid. To see that this selection is w.l.o.g., assume that a placement of A and B in which no cell is shared achieves the minimum distance and observe that, in this case, A could be shifted one step “closer” to B, strictly decreasing their distance and, thus, contradicting the optimality of such a placement. As the relative placements of A and B are 4n2 and the Kuhn-Munkres algorithm is a polynomial-time algorithm (in the size of the bipartite graph), we conclude that the algorithm computes the distance in polynomial time. J To give a faster transformation either pipelining must be used (allowing for more than one movement in parallel) or more complex mechanisms that move sub-shapes consisting of many nodes, in a single step. 31 32 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 5.1 Parallelizing the Transformations We now maintain the connectivity preservation requirement but allow an unbounded number of rotation and/or sliding movements to occur simultaneously in a single step. I Proposition 14. There is a pipelining strategy that transforms a ladder into a line in O(n) parallel time. Proof. Number the nodes of the ladder 1 through n starting from the top and following the ladder’s connectivity until the bottom-right node is reached. These gives an even-numbered upper diagonal and an odd-numbered lower diagonal. Node 1 moves as in Theorem 15. Any even node 2 ≤ w < n − 1 starts moving as long as its upper odd neighbor has reached the same level as w (e.g., node 2 first moves after node 1 has arrived to the right of node 3). Any odd node 1 < z < n starts moving as long as its even left neighbor has moved one level down (e.g., node 3 first moves after node 2 has arrived to the right of 5). After a node starts moving, it moves in every step as in Theorem 15 (but now many nodes can move in parallel, implementing a pipelining strategy). It can be immediately observed that any node i starts after at most 3 movements of node i − 1 (actually, only 2 movements for even i), so after roughly at most 3n steps, node n − 2 starts. Moreover, a node that starts, arrives at the right endpoint of the line after at most n steps, which means that after at most 4n = O(n) steps all nodes have taken their final position in the line. J Proposition 14 gives a hint that pipelining could be a general strategy to speed-up transformations. We next show how to generalize this technique to any possible pair of shapes. I Theorem 19. Let A and B be any connected shapes, such that |A| = |B| = n. Then there is a pipelining strategy that can transform A to B (and inversely) by rotations and slidings, without breaking the connectivity during the transformation, in O(n) parallel time. Proof. The transformation is a pipelined version of the sequential transformation of Theorem 14. Now, instead of picking an arbitrary next candidate node of S(k) to walk the cell-perimeter of S(k) clockwise, we always pick the rightmost clockwise node vk ∈ S(k), that is, the node that has to walk the shortest clockwise distance to arrive at the line under formation. This implies that the subsequent candidate node vk+1 to walk, is always “behind” vk in the clockwise direction and is either already free to move or is enabled after vk ’s departure. Observe that after at most 3 clockwise movements, vk cannot block any more the way of vk+1 on the (possibly updated) cell-perimeter. Moreover, the clockwise move of vk+1 , only introduces a gap in its original position, therefore it only affects the structure of the cell-perimeter “behind” it. The strategy is to start the walk of node vk+1 as soon as vk is no longer blocking its way. As in Proposition 14, once a node starts, it moves in every step, and again any node arrives after at most n movements. It follows, that if the pipelined movement of nodes cannot be blocked in any way, after 4n = O(n) steps all nodes must have arrived at their final positions. Observe now that the only case in which pipelining could be blocked is when a node is sliding through a (necessarily dead-end) “tunnel” of height 1 (such an example is the red tunnel on the third row from the bottom, in Figure 3). To avoid this, the nodes shortcut the tunnel by visiting only its first position (i, j) and then simply skipping the whole walk inside it (that walk would just return them to position (i, j) after a number of steps). J We next show that even if A and B are labeled shapes, that is, their nodes are assigned the indices 1, . . . , n (uniquely, i.e., without repetitions), we can still transform the labeled A O. Michail, G. Skretas, and P. G. Spirakis to the labeled B with only a linear increase in parallel time. We only consider transformations in which the nodes never change indices in any way (e.g., cannot transfer them, or swap them), so that each particular node of A must eventually occupy (physically) a particular position of B (the one corresponding to its index). I Corollary 20. The labeled version of the transformation of Theorem 19 can be performed in O(n) parallel time. Proof. Recall from Theorem 14 that the line were constructed to the right of some node u. That node was the lowest node in that column, therefore, there is no node below u in that column. The procedure of Theorem 19, if applied on the labeled versions of A and B will result in two (possibly differently) labeled lines, corresponding to two permutations of 1, 2, . . . , n, call them πA and πB . It suffices to show a way to transform πA to πB in linear parallel time, as then labelled A is transformed to πA , then πA to πB , and then πB to B (by reversing the transformation from B to πB ), all in linear parallel time. To do this, we actually slightly modify the procedure of Theorem 19, so that it does not construct πA in the form of a line, but in a different form that will allow us to transform it fast to πB without breaking connectivity. What we will construct is a double line, with the upper part growing to the right of node u as before and the lower part starting from the position just below u and also growing to the right. The upper line is an unordered version of the left half of πB and the lower line is an unordered version of the right half of πB . To implement the modification, when a node arrives above u, as before, if it belongs to the upper line, it goes to the right endpoint of the line as before, while if it belongs to the lower line, it continues its walk in order to teach the right endpoint of the lower line. When the transformation of labeled A to the folded line is over, the procedure has to order the nodes of the folded line and then unfold in order to produce πB . We first order the upper line in ascending order. While we do this, the lower line stays still in order to preserve the connectivity. When we are done, we order the lower line in descending order, now keeping the upper line still. Finally, we perform a parallel right sliding of the lower line (requiring linear parallel time), so that its inverse permutation ends up to the right of the upper line, thus forming π. It remains to show how the ordering of the upper line can be done in linear parallel time without breaking connectivity. To do this, we simulate a version of the odd-even sort algorithm (a.k.a. parallel bubble sort) which sorts a list of n numbers with O(n) processors in O(n) parallel time. The algorithm progresses in odd and even phases. In the odd phases, the odd positions are compared to their right neighbor and in the even phases to their left neighbor and if two neighbors are ever found not to respect the ordering a swap of their values is performed. In our simulation, we break each phase into two subphases as follows. Instead of performing all comparisons at once, as we cannot do this and preserve connectivity, in the first subphase we do every second of them and in the second subphase the rest so that between any pair of nodes being compared there are 2 nodes that are not being compared at the same time. Now if the comparison between the ith and the i + 1 node indicates a swap, then i + 1 rotates over i + 2, i slides right to occupy the previous position of i + 1, and finally i + 1 slides left over i and then rotates left around i to occupy i’s previous position. This swapping need 4 steps and does not break connectivity. The upper part has n/2 nodes, each subphase takes 4 steps to swap everyone (in parallel), each phase has 2 sub-phases, and O(n) phases are required for the ordering to complete, therefore, the total parallel time is O(n) for the upper part and similarly O(n) for the lower part. This completes the proof. J 33 34 On the Transformation Capability of Feasible Mechanisms for Programmable Matter An immediate observation is that a linear-time transformation does not seem satisfactory for all pairs of shapes. To this end, take a square S and rotate its top-left corner u, one position clockwise, to obtain an almost-square S 0 . Even though, a single counter-clockwise rotation of u suffices to transform S 0 to S, the transformation of Theorem 19 may go all the way around and first transform S 0 to a line and then transform the line to S. In this particular example, the distance between S and S 0 , according to Definition 16, is 2, while the generic transformation requires Θ(n) parallel time. So, it is plausible to ask if any transformation between two shapes A and B can be performed in time that grows as a function of their distance d(A, B). We show that this cannot always be the case, by presenting two shapes A and B with d(A, B) = 2, such that A and B require Ω(n) parallel time to be transformed to each other. I Proposition 15. There are two shapes A and B with d(A, B) = 2, such that A and B require Ω(n) parallel time to be transformed to each other. Proof. The two shapes, a black and a red one, are depicted in Figure 31. Both shapes form a square which is empty inside and also open close to the middle of its bottom side. The difference between the two shapes is the positioning of the bottom “door” of length 2. The red shape has it exactly in the middle of the side, while the black shape has it shifted one position to the left. Equivalently, the bottom side of the red shape is “balanced”, meaning that it has an equal number of nodes in each side of the vertical dashed axis that passes through the middle of the bottom, while the black shape is “unbalanced” having one more node to the right of the vertical axis than to its left. To transform the black shape into the red one, a node must necessary cross either the vertical or the horizontal axis. Because, if nothing of the two happens, then, no matter the transformation, we won’t be able to place the axes so that the running shape has two pairs of balanced quadrants, while, on the other hand, the red shape satisfies this, by pairing together the two bottom quadrants and the two upper quadrants. Clearly, no move can be performed in the upper quadrants initially, as this would break the shape’s connectivity. The only nodes that can move initially are u and w and no other node can ever move unless first approached by some other node that could already move. Observe also that u and w cannot cross the vertical boundary of their quadrants, unless with help of other nodes. But the only way for a second node to move in any of these quadrants (without breaking connectivity) is for either u or w to reach the corner of their quadrant which takes at least n/8 − 2 steps and then another n/8 steps for any (or both) of these nodes to reach the boundary, that is, at least n/4 − 2 steps, which already proves the required Ω(n) parallel-time lower bound (even a parallel algorithm has to pay the initial sequential movement of either u or w). J 6 Distributed Transformations with Rotation and Sliding LineTransformationProblem: Transform any connected shape into a shape where all nodes are either in the x axis or the y axis. I Definition 21. A node on a black cell of the grid is called a potential hole node if removing him would create a non-compact shape. I Definition 22. We define a local-info based movement (lib movement), a movement that a leader decides to perform without consulting the whole network. I Proposition 16. No algorithm based on lib movements can solve the line transformation problem without breaking the connectivity. O. Michail, G. Skretas, and P. G. Spirakis w v 35 u Figure 31 Counterexample for distance Proof. Observe the following shapes. See figure 32 If an algorithm performed a lib movement at the first shape, the same algorithm would have to perform the same movement at the second shape because it cannot distinguish the two shapes. That movement would break the connectivity on the second shape therefore no algorithm based on lib movements could solve the line formation problem on both shapes. J Figure 32 Lib movement counterexample I Definition 23. A shape is called compact when it has no holes. I Lemma 24. If all nodes in a connected shape have two or more neighbours, then there it at least one cycle present. Proof. Assume a connected graph where every node has at least 2 neighbours and there is no cycle present. Every node has 2 edges and we have n nodes. The sum of all edges is 2n/2 = n because we have double counted every edge. Now a connected graph without a cycle is called a tree and a tree has n − 1 edges. If and edge is added (n edges) the tree creates a cycle. J I Lemma 25. In compact shapes, there is always a lib movement that does not break the connectivity. Proof. Observe that there is no shape where all nodes have 3 or 4 neighbours and when a node has only one neighbour it can always perform a lib movement. Suppose that a shape exists where no lib movements are available. Each node in this shape has at least 2 neighbours so there is at least one cycle. If this cycle is compact, then a node can consult his neighbours to see if it is a bridge in order to move. (HeIt can do this by asking whether the two neighbours it has, have a different node as a common neighbor). This is a lib movement because the information required is local based. Therefore a lib movement is always available. J 36 On the Transformation Capability of Feasible Mechanisms for Programmable Matter . The difference between a move and a travel action is, that the leader moving means that it swaps his settings to a neighbouring node, while a leader traveling means that it moves his current node. label ← 0, phase ← 0, check ← 0, state ← 0, buck ← 0, num ← 0, line ← 0 while r = 1 do p0 ← north, p1 ← east, p2 ← south, p3 ← west, orien(node) = 1; Send north, east, south, west to p0 , p1 , p2 , p3 respectively; end while while r = 2, 3 AND buck = 0 do Send tick = up, right, down, lef t; Send num = 0, 1, 0, −1 to p0 , p1 , p2 , p3 respectively; Receive (tick 0 , num0 , ack 0 ); Do for every tick 0 , num0 received; if num0 > num then line = tick 0 ; num = num0 ; end if if ack 0 = null then state + +; else state − −; end if if state ≥ 2 then f ollow the path described on the line; end if if line has been reached then buck = 1; end if end while while r = 2, 3, .. AND buck = 1 do Receive(f lag 0 , qu0 ); if label = 0 then move west; f lag(node) = 1; if no node available west then label + +; end if end if if label = 1 then move east; f lag(node) = 1; if no node available east then label + +; end if end if if f lag 0 = 0 AND f lag = 0 then if label = 2 then if neighbours = 1 then label + +; else if neighbours = 2 AND neighbours not opposite then if neighbours are p0 , p1 then send qu = 1 to p0 ; label + +; end if if neighbours are p1 , p2 then send qu = 1 to p1 ; label + +; end if 1: procedure Compact-Line(Leader) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: 45: 46: 47: 48: 49: 50: O. Michail, G. Skretas, and P. G. Spirakis 51: 52: 53: 54: 55: 56: 57: 58: 59: 60: 61: 62: 63: 64: 65: 66: 67: 68: 69: 70: 71: 72: 73: 74: 75: 76: if neighbours are p2 , p3 then send qu = 1 to p2 ; label + +; end if if neighbours are p3 , p0 then send qu = 1 to p3 ; label + +; end if else move; end if end if if label = 3 AND phase = 0 then if qu0 = 1 then phase = 1; else label − −; move; end if end if if label = 3 AND phase = 1 then travel; end if end if if f lag 0 = 1 OR f lag = 1 then f lag = 1; phase = 0; label = 2; move; end if end while end procedure 37 38 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1: procedure Compact-Line(Non-Leader) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: f lag ← 0, orien ← 0, mark ← 0 while orien = 0 do Receive(north0 , south0 , east0 , west0 , tick 0 , num0 , qu0 ) if p0 receives south OR p1 receives west OR p2 receives north OR p3 receives east then orien = 1; end if if p0 receives east OR p1 receives south OR p2 receives west OR p3 receives north then pn = p(n−1)mod3 ; orien = 1; end if if p0 receives north OR p1 receives east OR p2 receives south OR p3 receives swest then pn = p(n−2)mod3 ; orien = 1; end if if p0 receives west OR p1 receives north OR p2 receives east OR p3 receives south then pn = p(n−3)mod3 ; orien = 1; end if Sendnorth, east, south, west to p0 , p1 , p2 , p3 respectively; end while while orien = 1 do if mark = 0 then Receive(tick 0 , num0 ); Send tick =conc(tick 0 , up), tick =conc(tick 0 , right), tick =conc(tick 0 , down), tick =conc(tick 0 , lef t) to p0 , p1 , p2 p3 respectively; Send num = num0 + 0, num = num0 + 1, num = num0 + 0, num = num0 − 1 to p0 , p1 , p2 , p3 respectively; Send ack = 1 to the node who sent you tick; mark = 1; path = m where m is the number of the port that received the tick 0 − num0 ; message; end if O. Michail, G. Skretas, and P. G. Spirakis 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: 45: 46: 47: 48: 49: 50: 51: 52: 53: 54: 55: 56: 57: 58: 59: 60: 61: 62: 63: 64: 65: if mark=1 then Receive(ack 0 , tick 0 , qu0 ); if tick 0 was not null then Send(ack = 1) to ppath ; else if ack 0 was not null then Send(ack = 1) to ppath ; end if if qu = 0 then if p0 has neighbour then Sendqu = approve; else Sendqu = reject; end if end if if qu = 1 then if p1 has neighbour then Sendqu = approve; else Sendqu = reject; end if end if if qu = 2 then if p2 has neighbour then Sendqu = approve; else Sendqu = reject; end if end if if qu = 3 then if p3 has neighbour then Sendqu = approve; else Sendqu = reject; end if end if Sendf lag to p1 ; end if end while end procedure 39 40 On the Transformation Capability of Feasible Mechanisms for Programmable Matter I Theorem 26. The Compact Line algorithm solves the Line Formation problem for any compact starting shape without breaking the connectivity. Algorithm Description: The operation of the algorithm is split into 3 stages. The orientation stage(1), the line marking stage(2) and the movement stage(3). The first stage consists of the leader starting from a random node. It sets the orientation for the current node by marking ports 0,1,2,3 as “north”, “east”, “south”, “west” respectively. It then sends the orientation to all neighbours. All nodes receiving the orientation change their ports to coincide with the one the leader defined, and then propagate the message to their neighbours. Once a node sets its orientation once, it ignores all messages that concern it. In the second stage the leader searches for the rightmost node. It begins by broadcasting two messages to all neighbours: tick and num. The tick message consists of the direction the message was sent to. The num message is a number which starts as 0 and each time it is propagated through nodes, we add the following number: 0 for north , +1 for east, 0 for south and −1 for west. When a non leader node receives these messages, it propagates them to its neighbours after appending up, right, down, left, for neighbours 0,1,2,3 respectively, to the tick message and after adding the number to the num message following the method mentioned above. The node also sends a message called ack to the node who sent the tick and num. It then stores the node (path node) who sent the tick and marks himself. When a marked node receives a tick-num message it sends them to the path node along with an ack message. When the leader receives a num-tick message, it compares the num it received with the num0 it has in store. If the one it received is bigger, it replaces the num0 with num and keeps the tick0 message it received. Now, if the leader does not receive an ack for two consecutive rounds it starts following the path it has stored in the variable named line. Once it reaches the destination it marks the current node and starts moving west, marking all nodes in its path. It then returns to the node it marked first. The leader has now marked a designated line where it will move all other nodes to. This ends phase 2. The third stage consists of a loop being performed until all nodes form a line. Loop description: The leader moves randomly to nodes checking if they are on the correct line (f lag = 1). If it finds one and receives a message (flag0 =1), the leader marks it. If it finds one does not receive a message (flag=1), it checks two things. First it checks if the node has only one neighbour. Secondly it checks if the node has two neighbours not opposite to each other. If it does complete the second requirement, it sends a qu message to one of them asking it if the 2 nodes who are neighbours to it (the leader), have another common neighbour. The node then answers approve or reject. If any of those two checks are true (one neighbour, approve) the leader moves in a random fashion. Once it receives a message flag0 =1, it marks the node. That finishes the loop description. Proof. The goal is to show that any compact shape will always end up in a line. We need to show that the connectivity will be preserved throughout the transformation and the shape will not get stuck in a shape which is not a line. The first two phases cannot break the connectivity because no movement takes place. The leader is moving between nodes. The third phase consists of the loop. The loop has three phases. The lib movement, the search for the line, and the placement on the line. Observe that if a node performs a lib movement and iy does not break the connectivity, all its subsequent moves will not break it as long as no other node has moved. This guarantees that if the lib movement preserves the connectivity, the second and third phase will preserve it as well. Now in both checks performed by the algorithm, it is ensured that the node has no bridges so any movement it performs will not break the connectivity. O. Michail, G. Skretas, and P. G. Spirakis The first two phases will not turn the shape into an undesired one, because no movement takes place. All we have to show is that the loop won’t do it as well. The first case is whether a lib movement will always be available. Observe that there is no shape where all nodes have 3 or 4 neighbours. In this protocol we have a lib movement available when a node has only 1 neighbour or when a cluster of 4 nodes creates a square. Suppose that there is a shape that has no lib movements available. Every node has at least 2 neighbours. Such a shape can only be a cycle consisting of all nodes. This cycle is either a non compact shape or it consists of only 4 nodes. But both of those circumstances are prohibited because we have established that we are talking about compact shapes where there are no lib movements. Thus a lib movement is always available. The second case is whether the moving node will always find the right point of rightmost node of the line. Since the moving node is moving in random it will not get stuck in a loop. The rightmost node of the line is always accessible from any node on the shape. The third problem is whether the move on the rightmost part of the line creates a non compact shape. Since the line begins from the rightmost part of the shape, each time a node moves east of it, it has only one neighbour which is the rest of the line. So it cannot create a non-compact shape. J I Theorem 27. The Line Transform algorithm solves the Line Formation problem for any starting shape without breaking the connectivity. 7 Conclusions and Further Research There are many open problems related to the findings of the present work. We here restricted attention to the two extremes, in which the transformation either preserves connectivity or is free to break it arbitrarily. A compromise could be to allow some restricted degree of connectivity breaking, like necessarily restoring it in at most k ≥ 0 steps (a special case of this had been already proposed as an open question in [15]). There are other meaningful “good” properties that we would like to maintain throughout a transformation. An interesting example, is the strength of the shape. One of the various plausible definitions is as the minimum strength sub-shape of the shape (i.e., its weakest part; could possibly be captured by some sort of minimum geometric cuts). Then, a strength-preserving transformation would be one that reaches the target shape while trying to maximize this minimum. In the transformations considered in this paper, there was no a priori constraint on the maximum area that a transformation is allowed to cover or on the maximum dimensions that its intermediate shapes are allowed to have. It seems in general harder to achieve a particular transformation if any of these restrictions is imposed. For example, the generic transformation of Theorem 6 requires some additional space below the shape and the transformations of Theorems 14 and 19 convert any shape first to a spanning line, whose maximum dimension is √ n, even though the original shape could have a maximum dimension as small as n. Another interesting fact about restricting the boundaries is that in this way we get models equivalent to several interesting puzzles. For example, if the nodes are labeled, the initial shape is a square with a single empty cell, and the boundaries are restricted to the dimensions of the square, we get a generalization of the famous 15-puzzle (see, e.g., [9] for a very nice exposition of this and many more puzzles and 2-player games). Techniques developed in the context of puzzles could prove valuable for analyzing and characterizing discrete programmable matter systems. We intentionally restricted attention to very minimal actuation mechanisms, namely rotation and sliding. More sophisticated mechanical operations would enable a larger set 41 42 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1: procedure Line-Transform(Leader) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: 39: 40: 41: 42: 43: 44: 45: 46: 47: label ← 0, phase ← 0, check ← 0, state ← 0, buck ← 0, num ← 0, line ← 0 while r = 1 do p0 ← north, p1 ← east, p2 ← south, p3 ← west, orien(node) = 1; Send north, east, south, west to p0 , p1 , p2 , p3 respectively; end while while r = 2, 3 AND buck = 0 do Send tick = up, right, down, lef t and num = 0, 1, 0, −1 to p0 , p1 , p2 , p3 respectively; Receive (tick 0 , num0 , ack 0 ); Do for every tick 0 , num0 received; if num0 > num then line = tick 0 ; num = num0 ; end if if ack 0 = null then state + +; else state − −; end if if state ≥ 2 then f ollow the path described on the line; end if if line has been reached then buck = 1; end if end while while r = 2, 3, .. AND buck = 1 do Receive(f lag 0 , qu0 ); if label = 0 then move west; f lag(node) = 1; if no node available west then label + +; end if end if if label = 1 then move east; f lag(node) = 1 if no node available east then label + +; end if end if if ( thenf lag 0 = 0 AND f lag = 0) if label = 2 then if neighbours = 1 then label + +; else if neighbours = 2 AND neighbours not opposite then if neighbours are p0 , p1 then send qu = 1 to p0 ; label + +; end if O. Michail, G. Skretas, and P. G. Spirakis if neighbours are p1 , p2 then send qu = 1 to p1 ; label + +; 50: end if 51: if neighbours are p2 , p3 then 52: send qu = 1 to p2 ; label + +; 53: end if 54: if neighbours are p3 , p0 then 55: send qu = 1 to p3 ; label + +; 56: end if 57: else if neighbour = 2 AND neighboursopposite then 58: if neighbours are p0 , p2 then 59: Sendqu = 2 to p0 ; label + +; 60: end if 61: if neighbours are p1 , p3 then 62: Sendqu = 3 to p1 ; label + +; 63: end if 64: else 65: move; 66: end if 67: end if 68: if label = 3 AND phase = 0 then 69: if ack 0 is null then 70: wait + +; 71: end if 72: if ack 0 is not null then 73: wait − −; 74: end if 75: if wait = 2 then 76: label − −; move; 77: end if 78: if qu0 = k where k is the number of the port from where the qu’ was received then 79: phase = 1; Sendclear = 1 to all ports; 80: end if 81: end if 82: if label = 3 AND phase = 1 then 83: travel; 84: end if 85: end if 86: if f lag 0 = 1 OR f lag = 1 then 87: f lag = 1; phase = 0; label = 2; travel; 88: end if 89: end while 90: end procedure 48: 49: 43 44 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 1: procedure Line-Transform(Non-Leader) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: 33: 34: 35: 36: 37: 38: f lag ← 0, orien ← 0, mark ← 0 while orien = 0 do Receive(north0 , south0 , east0 , west0 , tick 0 , num0 , qu0 ) if p0 receives south OR p1 receives west OR p2 receives north OR p3 receives east then orien = 1; end if if p0 receives east OR p1 receives south OR p2 receives west OR p3 receives north then pn = p(n−1)mod3 ; orien = 1; end if if p0 receives north OR p1 receives east OR p2 receives south OR p3 receives swest then pn = p(n−2)mod3 ; orien = 1; end if if p0 receives west OR p1 receives north OR p2 receives east OR p3 receives south then pn = p(n−3)mod3 ; orien = 1; end if Sendnorth, east, south, west to p0 , p1 , p2 , p3 respectively; end while while orien = 1 do if mark = 0 then Receive(tick 0 , num0 ); Send tick =conc(tick 0 , up), tick =conc(tick 0 , right), tick =conc(tick 0 , down), tick =conc(tick 0 , lef t) to p0 , p1 , p2 p3 respectively; Send num = num0 + 0, num = num0 + 1, num = num0 + 0, num = num0 − 1 to p0 , p1 , p2 , p3 respectively; Send ack = 1 to the node who sent you tick mark = 1; path = m where m is the number of the port that received the tick 0 − num0 ; message; end if if mark=1 then Receive(ack 0 , tick 0 , qu0 ); if tick 0 was not null then Send(ack = 1) to ppath ; else if ack 0 was not null then Send(ack = 1) to ppath ; end if if qu0 = 0, 1, 2, 3 then path = m where m is the number of the port that received the qu0 ; message; Sendqu = qu0 to all ports; Sendack = 1 to portpath ; mark = 2; end if Send f lag to p1 ; end if O. Michail, G. Skretas, and P. G. Spirakis 39: 40: 41: 42: 43: 44: 45: 46: 47: 48: 49: if mark = 2 then Sendf lageast; Receive(ack 0 , tick 0 , clear0 ); if ack 0 was not blank then Send ack = 1 to ppath end if if clear0 = 1 from ppath then Sendclear = 1 to all ports; path = null; mark = 1; end if end if end while end procedure of transformations and possibly also reduce the time complexity. Such examples, could be the ability of a node to become inserted between two neghboring nodes (while pushing them towards opposite directions). This could enable parallel mergings of two lines of length n/2 into a line of length n in a single step (an, thus, for example, transforming a square to a line in polylogarithmic time). Another, is the capability of rotating whole lines of nodes (like rotating arms, see, e.g., [36]). There are also some promising specific technical questions. We do not yet know what is the complexity of RotC-Transformability. The fact that a 6-seed is capable of transfering pairs of nodes to desired positions, suggests that shapes having such a seed in their exterior or being capable of self-extracting such a seed, will possibly be able to transform to each other. Even if this turns out to be true, it is totally unclear whether transformations involving at least one of the rest of the shapes are feasible. Moreover, we didn’t study the problem of computing or approximating the optimum transformation. It seems that the problem is computationally hard. A possible approach to prove NP-hardness would be by proving NP-hardness of Rectilinear Graphic TSP (could be via a reduction from Rectilinear Steiner Tree or Rectilinear TSP, which are both known to be NP-complete [20]) and then giving a reduction from that problem to the problem of a 2-seed exploring a set of locations on the grid. Finally, regarding the distributed transformations, there are various interesting variations of the model considered here, that would make sense. One of them is to assume nodes that are oblivious w.r.t. their orientation. 45 46 On the Transformation Capability of Feasible Mechanisms for Programmable Matter References 1 Greg Aloupis, Nadia Benbernou, Mirela Damian, Erik D Demaine, Robin Flatland, John Iacono, and Stefanie Wuhrer. Efficient reconfiguration of lattice-based modular robots. Computational geometry, 46(8):917–928, 2013. 2 Dana Angluin, James Aspnes, Zoë Diamadi, Michael J. Fischer, and René Peralta. Computation in networks of passively mobile finite-state sensors. Distributed Computing, 18(4):235–253, March 2006. 3 Dana Angluin, James Aspnes, David Eisenstat, and Eric Ruppert. The computational power of population protocols. Distributed Computing, 20(4):279–304, November 2007. 4 Zack Butler, Keith Kotay, Daniela Rus, and Kohji Tomita. Generic decentralized control for lattice-based self-reconfigurable robots. The International Journal of Robotics Research, 23(9):919–937, 2004. 5 Xuli Chen, Li Li, Xuemei Sun, Yanping Liu, Bin Luo, Changchun Wang, Yuping Bao, Hong Xu, and Huisheng Peng. Magnetochromatic polydiacetylene by incorporation of fe3o4 nanoparticles. Angewandte Chemie International Edition, 50(24):5486–5489, 2011. 6 Mark Cieliebak, Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Solving the robots gathering problem. In International Colloquium on Automata, Languages, and Programming, pages 1181–1196. Springer, 2003. 7 Alejandro Cornejo, Fabian Kuhn, Ruy Ley-Wild, and Nancy Lynch. Keeping mobile robot swarms connected. In Proceedings of the 23rd international conference on Distributed computing, DISC’09, pages 496–511, Berlin, Heidelberg, 2009. Springer-Verlag. 8 Shantanu Das, Paola Flocchini, Nicola Santoro, and Masafumi Yamashita. Forming sequences of geometric patterns with oblivious mobile robots. Distributed Computing, 28(2):131–145, April 2015. 9 Erik D Demaine. Playing games with algorithms: Algorithmic combinatorial game theory. In International Symposium on Mathematical Foundations of Computer Science, pages 18– 33. Springer, 2001. 10 Zahra Derakhshandeh, Shlomi Dolev, Robert Gmyr, Andréa W Richa, Christian Scheideler, and Thim Strothmann. Brief announcement: amoebot–a new model for programmable matter. In Proceedings of the 26th ACM symposium on Parallelism in algorithms and architectures (SPAA), pages 220–222, 2014. 11 Zahra Derakhshandeh, Robert Gmyr, Alexandra Porter, Andréa W Richa, Christian Scheideler, and Thim Strothmann. On the runtime of universal coating for programmable matter. In International Conference on DNA-Based Computers, pages 148–164. Springer, 2016. 12 Zahra Derakhshandeh, Robert Gmyr, Andréa W Richa, Christian Scheideler, and Thim Strothmann. An algorithmic framework for shape formation problems in self-organizing particle systems. In Proceedings of the Second Annual International Conference on Nanoscale Computing and Communication, page 21. ACM, 2015. 13 David Doty. Theory of algorithmic self-assembly. Communications of the ACM, 55:78–88, 2012. 14 David Doty. Timing in chemical reaction networks. In Proc. of the 25th Annual ACM-SIAM Symp. on Discrete Algorithms (SODA), pages 772–784, 2014. 15 Adrian Dumitrescu and János Pach. Pushing squares around. In Proceedings of the twentieth annual symposium on Computational geometry, pages 116–123. ACM, 2004. 16 Adrian Dumitrescu, Ichiro Suzuki, and Masafumi Yamashita. Formations for fast locomotion of metamorphic robotic systems. The International Journal of Robotics Research, 23(6):583–593, 2004. O. Michail, G. Skretas, and P. G. Spirakis 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Adrian Dumitrescu, Ichiro Suzuki, and Masafumi Yamashita. Motion planning for metamorphic systems: Feasibility, decidability, and distributed reconfiguration. IEEE Transactions on Robotics and Automation, 20(3):409–418, 2004. Yuval Emek and Jara Uitto. Dynamic networks of finite state machines. In International Colloquium on Structural Information and Communication Complexity, pages 19–34. Springer, 2016. Paola Flocchini, Giuseppe Prencipe, and Nicola Santoro. Distributed computing by oblivious mobile robots. Synthesis lectures on distributed computing theory, 3(2):1–185, 2012. Michael R Garey, Ronald L Graham, and David S Johnson. Some NP-complete geometric problems. In Proceedings of the eighth annual ACM symposium on Theory of computing, pages 10–22. ACM, 1976. Kyle Gilpin, Ara Knaian, and Daniela Rus. Robot pebbles: One centimeter modules for programmable matter through self-disassembly. In Robotics and Automation (ICRA), 2010 IEEE International Conference on, pages 2485–2492. IEEE, 2010. Robert A Hearn and Erik D Demaine. PSPACE-completeness of sliding-block puzzles and other problems through the nondeterministic constraint logic model of computation. Theoretical Computer Science, 343(1-2):72–96, 2005. Camille Jordan. Cours d’analyse de l’École polytechnique, volume 1. Gauthier-Villars et fils, 1893. Ara N Knaian, Kenneth C Cheung, Maxim B Lobovsky, Asa J Oines, Peter SchmidtNeilsen, and Neil A Gershenfeld. The milli-motein: A self-folding chain of programmable matter with a one centimeter module pitch. In 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 1447–1453. IEEE, 2012. Evangelos Kranakis, Danny Krizanc, and Euripides Markou. The mobile agent rendezvous problem in the ring. Synthesis Lectures on Distributed Computing Theory, 1(1):1–122, 2010. Harold W Kuhn. The hungarian method for the assignment problem. Naval research logistics quarterly, 2(1-2):83–97, 1955. Yunfeng Lu, Yi Yang, Alan Sellinger, Mengcheng Lu, Jinman Huang, Hongyou Fan, Raid Haddad, Gabriel Lopez, Alan R Burns, Darryl Y Sasaki, et al. Self-assembly of mesoscopically ordered chromatic polydiacetylene/silica nanocomposites. Nature, 410(6831):913–917, 2001. Othon Michail and Paul G. Spirakis. Simple and efficient local codes for distributed stable network construction. Distributed Computing, 29(3):207–237, 2016. Paul W. K. Rothemund and Erik Winfree. The program-size complexity of self-assembled squares. In Proceedings of the 32nd annual ACM symposium on Theory of computing (STOC), pages 459–468, 2000. Paul WK Rothemund. Folding dna to create nanoscale shapes and patterns. Nature, 440(7082):297–302, 2006. Michael Rubenstein, Alejandro Cornejo, and Radhika Nagpal. Programmable self-assembly in a thousand-robot swarm. Science, 345(6198):795–799, 2014. Walter J Savitch. Relationships between nondeterministic and deterministic tape complexities. Journal of computer and system sciences, 4(2):177–192, 1970. Masahiro Shibata, Toshiya Mega, Fukuhito Ooshita, Hirotsugu Kakugawa, and Toshimitsu Masuzawa. Uniform deployment of mobile agents in asynchronous rings. In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, pages 415–424. ACM, 2016. Ichiro Suzuki and Masafumi Yamashita. Distributed anonymous mobile robots: Formation of geometric patterns. SIAM J. Comput., 28(4):1347–1363, March 1999. Erik Winfree. Algorithmic Self-Assembly of DNA. PhD thesis, California Institute of Technology, June 1998. 47 48 On the Transformation Capability of Feasible Mechanisms for Programmable Matter 36 37 38 Damien Woods, Ho-Lin Chen, Scott Goodfriend, Nadine Dabby, Erik Winfree, and Peng Yin. Active self-assembly of algorithmic shapes and patterns in polylogarithmic time. In Proceedings of the 4th conference on Innovations in Theoretical Computer Science, pages 353–354. ACM, 2013. Yukiko Yamauchi, Taichi Uehara, and Masafumi Yamashita. Brief announcement: pattern formation problem for synchronous mobile robots in the three dimensional euclidean space. In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, pages 447–449. ACM, 2016. Mark Yim, Wei-Min Shen, Behnam Salemi, Daniela Rus, Mark Moll, Hod Lipson, Eric Klavins, and Gregory S Chirikjian. Modular self-reconfigurable robot systems [grand challenges of robotics]. IEEE Robotics & Automation Magazine, 14(1):43–52, 2007.
8cs.DS
arXiv:1710.01368v1 [math.AG] 3 Oct 2017 PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA ANNE LONJOU Résumé. L’action du groupe de Cremona de rang 2 sur un espace hyperbolique de dimension infinie est récemment devenue centrale dans l’étude de ce groupe. Guidée par l’analogie avec l’action de PSL(2, Z) sur le demi-plan de Poincaré, nous exhibons un domaine fondamental pour cette action en considérant un pavage de Voronoï. Nous étudions ensuite les cellules adjacentes à une cellule de Voronoï donnée, ainsi que les cellules qui partagent des points communs au bord à l’infini. Abstract. The action of the Cremona group of rank 2 on an infinite dimensional hyperbolic space is the main recent tool to study the Cremona group. Following the analogy with the action of PSL(2, Z) on the Poincaré half-plane, we exhibit a fundamental domain for this action by considering a Voronoï tessellation. Then we study adjacent cells to a given cell, as well as cells that share common points in the boundary at infinity. Table des matières Introduction Remerciements 1. Préliminaires 2. Construction d’un pavage de Voronoï 3. Cellule de Voronoï associée à l’identité 4. Cellules adjacentes à la cellule associée à l’identité 5. Cellules quasi-adjacentes à la cellule associée à l’identité Références 1 5 6 19 26 44 49 57 Introduction Le groupe de Cremona de rang 2 sur un corps k, noté Bir(P2k ), est le groupe des transformations birationnelles du plan projectif. Dans l’étude qui nous intéresse, l’action du groupe modulaire PSL(2, Z) sur le demi-plan de Poincaré s’est avérée un guide précieux. Dans la suite de l’introduction, nous décrivons diverses analogies entre PSL(2, Z) et le groupe de Cremona. Date: 5 octobre 2017. 2010 Mathematics Subject Classification. 14E07, 20F65. 1 PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA Générateurs. Soient  0 S= 1   −1 1 , T = 0 0   1 1 et U = 1 1 2  −1 0 trois éléments de PSL(2, Z). Les matrices S et U sont respectivement d’ordre 2 et 3 alors que la matrice T est d’ordre infini. Le groupe modulaire est de présentation finie. Il est par exemple engendré par les matrices S et U et les relations sont engendrées par les relateurs S 2 = I2 et U 3 = I2 , ou encore par les matrices S et T avec les relations engendrées par S 2 et (T S)3 : PSL(2, Z) = hS, U | S 2 et U 3 i ≃ hS, T | S 2 et (T S)3 i. Bien que le groupe de Cremona possède un système de générateurs connu, ce groupe n’est pas de type fini et ceci est valable sur n’importe quel corps (voir [Can17, Proposition 3.6]). Lorsque le corps k est algébriquement clos, d’après le théorème de Noether-Castelnuovo, le groupe de Cremona est engendré par le groupe des automorphismes du plan projectif isomorphe à PGL(3, k) et par l’involution quadratique standard qui dans une carte affine s’écrit : σ : (x, y) 799K ( x1 , y1 ). Un autre système de générateurs qui se trouve être plus pratique dans certaines circonstances est PGL(3, k) ainsi que le sous-groupe de Jonquières. Un élément du groupe de Jonquières est une application préservant le pinceau de droites {y = constante}. À noter que l’application σ appartient au groupe de Jonquières. Action sur un espace hyperbolique. Considérons le plan hyperbolique H2 . Un de ses modèles est le demi-plan de Poincaré qui est défini comme le sous-espace du plan complexe constitué des nombres complexes de partie imaginaire strictement positive : H2 = {z ∈ C | Im(z) > 0}. Il est muni de la métrique définie de la façon suivante. Pour tous z1 , z2 ∈ H2 ,   (Im(z1 ) − Im(z2 ))2 + (Re(z1 ) − Re(z2 ))2 d(z1 , z2 ) = argcosh 1 + . 2 Im(z1 ) Im(z2 )   a b 2 Le groupe modulaire agit sur H par isométries : pour tout ∈ PSL(2, Z) et c d 2 pour tout point z ∈ H ,   az + b a b . ·z = c d cz + d Les points à l’infini ou appelés également points au bord sont les points dont la partie imaginaire est nulle ainsi que le point noté ∞ qui permet de compactifier la droite réelle {y = 0}. Pour cette action, les matrices S et U sont des √ isométries elliptiques puisqu’elles fixent respectivement les points i ∈ H2 et 21 (1 + i 3) ∈ H2 . La matrice T est une isométrie parabolique car elle fixe un unique point au bord, le point ∞. Une matrice est hyperbolique si elle fixe deux points à l’infini comme  √ √ 1 2 par exemple la matrice qui fixe les deux points réels −1 − 2 et −1 + 2. 2 5 Un autre de ses modèles est le modèle de l’hyperboloïde. Il est défini comme la nappe d’hyperboloïde H2 := {(x, y, z) ∈ R3 | x2 − y 2 − z 2 = −1 et x > 0}, PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 3 munie de la distance d(u, v) = argcosh B(u, v), pour tous u, v ∈ H2 où B(·, ·) est la forme bilinéaire associée à la forme quadratique précédente. Le groupe de Cremona agit également par isométries sur un espace hyperbolique qui est un analogue de dimension infinie au modèle de l’hyperboloïde de H2 . L’espace de Picard-Manin associé à P2 est la limite inductive des groupes de Picard des surfaces obtenues en éclatant toute suite finie de points de P2 , infiniment proches ou non. Il est muni d’une forme d’intersection de signature (1, ∞). En considérant une nappe d’hyperboloïde, nous pouvons lui associer un espace hyperbolique de dimension infinie, noté H∞ . Les éléments de PGL(3, k) sont tous elliptiques, ceux du groupe de Jonquières sont elliptiques lorsque les degrés de leurs itérées sont bornés et paraboliques sinon. L’application de Hénon hn : (x, y) 7→ (y, y n − x) est un exemple d’élément hyperbolique. Non-simplicité du groupe de Cremona. Le groupe PSL(2, Z) n’est pas un groupe simple. En effet, pour tout entier N > 1, le sous-groupe Γ(N ) = {A ∈ PSL(2, Z) | A ≡ ± I2 (mod N )}, est un sous-groupe distingué de PSL(2, Z). En fait, il possède également de nombreux sous-groupes distingués d’indice infini puisque c’est un groupe SQ-universel, c’est-à-dire que tout groupe dénombrable se plonge dans un quotient de PSL(2, Z). En 2013, en faisant agir le groupe de Cremona sur H∞ , S. Cantat et S. Lamy montrent que lorsque le corps est algébriquement clos, le groupe de Cremona n’est pas simple (voir [CL13]). Ils construisent des sous-groupes propres dont tous les éléments sont de grands degrés. Pour montrer cela, ils élaborent une variante de la théorie de petite simplification. Récemment, nous avons étendu ce résultat à un corps quelconque (voir [Lon16]), en utilisant un théorème de petite simplification dû à F. Dahmani, V. Guirardel et D. Osin (voir [DGO17]) établi dans le cadre général de groupes agissant par isométries sur des espaces Gromov-hyperboliques. Nous sommes dans ce cadre d’une part car l’espace H2 est hyperbolique au sens de Gromov. En effet, chacun de √ ses triangles vérifie la propriété suivante : tout côté est contenu dans le ln(1 + 2)-voisinage de la réunion de ses deux autres côtés. ∞ 2 ∞ D’autre part, un √ triangle de H vivant dans une copie de H , l’espace H est lui aussi ln(1 + 2)-hyperbolique. En fait, comme conséquence des résultats de F. Dahmani, V. Guirardel et D. Osin, nous obtenons dans [Lon16] des propriétés plus précises que la seule non-simplicité, à savoir que pour k un corps quelconque, le groupe Bir(P2k ) contient des sous-groupes distingués libres, et est SQ-universel. Pavage de Voronoï. L’espace H∞ est central dans l’étude du groupe de Cremona, cependant un domaine fondamental pour l’action du groupe de Cremona sur H∞ n’avait jusqu’alors pas été étudié. Un domaine fondamental est un sous-espace fermé de H∞ tel que son orbite sous l’action du groupe de Cremona recouvre H∞ et que les éléments de l’orbite de son intérieur soient deux à deux disjoints. En fait, il va s’avérer plus commode de travailler avec les cellules de Voronoï. Le but de cet article est de construire et étudier un pavage de Voronoï associé à cette action. Lorsqu’un groupe agit isométriquement et discrètement sur un espace métrique géodésique et qu’il existe un point de l’espace dont le stabilisateur est réduit au neutre, « les cellules de Voronoï » sont un outil naturel pour construire un domaine fondamental pour cette action. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 4 Définition. Soit P un ensemble discret de points d’un espace métrique géodésique X. À tout point p de P nous associons un ensemble de X, noté V(p) et appelé cellule de Voronoï associée au point p, constitué des points de X qui sont plus proches de p que des autres points de P : V(p) = {x ∈ X | pour tout q ∈ P, d(x, p) ≤ d(x, q)}. Les points p sont les « centres » des cellules de Voronoï. En effet, en considérant l’orbite d’un point dont le stabilisateur est réduit au neutre, nous obtenons un ensemble discret de points de notre espace métrique. La cellule de Voronoï associée à un point de cette orbite est un domaine fondamental. Revenons à l’action du groupe modulaire sur le demi-plan de Poincaré H2 . Il est bien connu que l’ensemble des points qui se situent au-dessus de la géodésique dont les points à l’infini sont −1 et 1, et qui ont une partie réelle supérieure ou égale à − 12 et inférieure ou égale à 21 est un domaine fondamental. Considérons l’orbite du point 2i sous l’action de PSL(2, Z). Les cellules de Voronoï correspondant à cet ensemble de points coïncident avec l’orbite du domaine fondamental donné plus haut. Cependant, si nous considérons l’orbite du point i sous l’action de PSL(2, Z), la cellule de Voronoï correspondant au point i n’est plus le domaine fondamental de l’action du groupe modulaire sur H2 , mais l’orbite de ce dernier par le stabilisateur de i qui est isomorphe à Z/2Z. L’objet de la section 2, est de construire un pavage de Voronoï associé à l’action du groupe de Cremona sur H∞ . Notons ℓ ∈ H∞ la classe d’une droite de P2 . Nous considérons les cellules de Voronoï associées à l’orbite de ℓ par l’action du groupe de Cremona. Le stabilisateur de ℓ étant PGL(3, k), nous identifions deux applications qui diffèrent par un automorphisme : f ∼ g ⇔ il existe a ∈ PGL(3, k), f = g ◦ a. La cellule de Voronoï associée à ℓ correspond à l’orbite d’un domaine fondamental sous l’action de PGL(3, k). Remarquons que deux applications appartenant à la même classe d’équivalence donnent la même cellule de Voronoï. Soit f appartenant à Bir(P2 ), nous notons V(f ) la cellule associée à f et l’application f est appelée « germe ». Dans cette section nous nous restreignons à un sous-espace convexe de H∞ qui est essentiellement l’enveloppe convexe de l’orbite de ℓ sous l’action de Bir(P2 ). Nous prenons en fait un convexe E un peu plus gros pour des raisons techniques (voir la définition de E à la sous-section 2.1). Nous étudions ensuite, lors de la section 3, les classes appartenant à la cellule de Voronoï associée à l’application identité. Le théorème principal de cette partie dit qu’il suffit que les classes soient plus proches de ℓ que de l’orbite de ℓ sous l’action des applications de Jonquières (et non pas de toutes les applications du groupe de Cremona). Théorème A. Une classe c appartient à la cellule V(id) si et seulement si pour toute application de Jonquières j, d(j# (c), ℓ) ≥ d(c, ℓ). En fait, le théorème 3.8 est plus précis que cela. Il suffit de vérifier l’inégalité pour certaines applications de Jonquières. Dans la section 4, nous déterminons les cellules non disjointes de la cellule V(id) (Corollaire 4.7) que nous appelons « cellules adjacentes ». Les germes de telles PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 5 cellules sont de deux types. Ceux qui sont de caractéristique Jonquières, c’est-àdire les applications du groupe de Cremona telles qu’il existe deux points p et q dans P2 et qui envoient le pinceau de droites passant par le point p sur le pinceau de droites passant par le point q. L’autre type de germes des cellules adjacentes à la cellule V(id) sont les applications du groupe de Cremona qui possèdent au plus huit points-base en position presque générale. Un ensemble de points {p0 , p1 , . . . , pr } est dit en position presque générale si d’une part pour chaque 0 ≤ i ≤ r le point pi vit soit dans P2 soit dans une surface dominant P2 qui est obtenue en éclatant seulement un sous-ensemble de points de {p0 , . . . , pr } et si d’autre part aucune des trois conditions suivantes n’est satisfaite : quatre des points de cet ensemble sont alignés, sept des points de cet ensemble sont sur une conique, deux des points de cet ensemble sont adhérents à un troisième point de cet ensemble. Théorème B. L’ensemble des germes des cellules adjacentes à la cellule V(id) est constitué de toutes : • les applications de caractéristique Jonquières, • les applications qui possèdent au plus 8 points-base en position presque générale. Nous déterminons également les classes qui se trouvent à l’intersection entre la cellule de Voronoï associée à ℓ et une ou plusieurs de ses cellules adjacentes (Théorème 4.1). Enfin dans la section 5 nous étudions les cellules qui possèdent une classe en commun à l’infini avec la cellule associée à l’identité. Revenons un instant à l’action du groupe modulaire sur le demi-plan de Poincaré et considérons le pavage de Voronoï associé à l’orbite du point 2i. Les cellules quasi-adjacentes à la cellule associée à 2i sont toutes les cellules obtenues comme image par le sous-groupe engendré par z → z + 1 de la cellule associée à 2i. Le théorème principal de cette section est Théorème C. L’ensemble des germes des cellules quasi-adjacentes à la cellule V(id) est constitué de toutes : • les applications de caractéristique Jonquières, • les applications qui possèdent au plus 9 points-base en position presque générale. De même que dans le cas précédent, nous étudions les classes à l’infini qui se trouvent dans l’intersection des bords à l’infini de la cellule associée à ℓ et d’une ou de plusieurs de ses cellules quasi-adjacentes. Une motivation pour cette étude était la question de l’hyperbolicité de certains graphes associés au groupe de Cremona, en particulier un graphe dû à Wright. Par rapport à l’analogie avec le groupe modulaire, ce graphe joue le rôle de l’arbre de Bass-Serre associé à la structure de produit amalgamé de PSL(2, Z). Dans un article à venir (voir également [Lon17]), nous ferons le lien entre le graphe de Wright et le graphe dual du pavage de Voronoï, et nous étudierons son hyperbolicité au sens de Gromov. Remerciements Je remercie vivement Stéphane Lamy, mon directeur de thèse, pour sa grande disponibilité et ses relectures minutieuses. Je remercie également les rapporteurs de PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 6 ma thèse, Charles Favre et Yves de Cornulier, pour leurs remarques qui ont permis de rendre certains passages plus clairs. 1. Préliminaires Dans cet article le corps de base, noté k, est algébriquement clos. Les surfaces considérées sont projectives et lisses. Le groupe de Cremona Bir(P2k ) est le groupe des applications birationnelles de 2 P = P2k vers lui-même. Un élément du groupe de Cremona s’écrit : f: P2 99K P2 [x : y : z] 799K [f0 (x, y, z) : f1 (x, y, z) : f2 (x, y, z)], où f0 , f1 , f2 ∈ k[x, y, z] sont des polynômes homogènes, de même degré et sans facteur commun. Nous appelons degré de f le degré des polynômes homogènes : deg(f ) := deg(fi ) pour i ∈ {0, 1, 2}. Par exemple, l’application quadratique standard σ : [x : y : z] 99K [yz : xz : xy] est un élément du groupe de Cremona. C’est une application de Jonquières puisqu’elle préserve le pinceau de droites passant par un point. En fait elle préserve trois pinceaux de droites, ceux passant par les points [0 : 0 : 1], [0 : 1 : 0] et [1 : 0 : 0]. Remarquons que l’inverse d’une application de Jonquières est encore une application de Jonquières. Soit S une surface. Une surface S ′ domine S s’il existe un morphisme birationnel allant de S ′ vers S. Considérons S1 et S2 deux surfaces dominant S et π1 et π2 leur morphisme respectif vers S. Nous disons que deux points p1 ∈ S1 et p2 ∈ S2 sont équivalents si π1−1 ◦ π2 est un isomorphisme local sur un voisinage de p2 et envoie p2 sur p1 . L’espace des bulles (« Bubble space » en anglais), noté B(S), est l’union de tous les points de toutes les surfaces dominant S modulo cette relation d’équivalence. Le théorème suivant est dû à O. Zariski et permet de décomposer toute application birationnelle comme composée d’éclatements et d’inverses d’éclatements. Théorème 1.1. Soient S1 et S2 deux surfaces, et f : S1 99K S2 une application birationnelle. Alors il existe une troisième surface S3 et deux composées d’éclatements π : S3 → S1 et σ : S3 → S2 telles que le diagramme suivant commute : S3 π S1 σ f S2 . Les points éclatés lors de la résolution minimale de f sont appelés points-base de f et vivent dans l’espace des bulles. Ils correspondent aux points-base du système linéaire associé à f . Cet ensemble de points est noté Bs(f ). À tout point-base de f est associé un entier appelé multiplicité et qui correspond à la multiplicité du système linéaire en ce point, c’est-à-dire à la plus petite multiplicité en ce point des polynômes définissant f . Le groupe de Cremona agit sur un hyperboloïde dans l’espace de Picard-Manin, noté H∞ . Dans ces préliminaires, nous rappelons la définition de H∞ ainsi que l’action du groupe de Cremona sur H∞ . Nous énonçons aussi des définitions et PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 7 des propriétés sur les points base des applications du groupe de Cremona qui nous seront utiles par la suite. 1.1. Hyperboloïde dans l’espace de Picard-Manin. Nous rappelons ici la construction de l’espace de Picard-Manin. Nous définissons ensuite l’action du groupe Bir(P2 ) sur cet espace. Enfin, nous nous intéressons à un sous-espace de l’espace de Picard-Manin qui est un espace hyperbolique de dimension infinie. Plus de précisions se trouvent dans [BC16, Section 4], [CL13, Part II.4], [Can11, Section 3] et [Lon17, Section 1.2.3]. 1.1.1. Espace de Picard-Manin. Soit S une surface. Nous considérons le groupe de Néron-Severi associé à S et tensorisé par R. Nous le notons encore N1 (S). C’est donc le groupe des diviseurs à coefficients réels sur S à équivalence numérique près. Il est muni d’une forme bilinéaire symétrique, la forme d’intersection. Pour tout diviseur D sur S nous notons {D}S sa classe de Néron-Severi ou {D} s’il n’y a pas d’ambiguïté sur la surface. Si π : S ′ −→ S est un morphisme birationnel entre deux surfaces, alors le tiré en arrière π ∗ : N1 (S) ֒→ N1 (S ′ ) qui à la classe d’un diviseur associe la classe de sa transformée totale, est un morphisme injectif qui préserve la forme d’intersection. De plus, N1 (S ′ ) est isomorphe à π ∗ (N1 (S)) ⊕ ( ⊕ R{Ep∗ }), p∈Bs(π −1 ) où Bs(π ) est l’ensemble des points-base de π −1 (infiniment proches ou pas) et Ep∗ est la transformée totale, vue dans S ′ , du diviseur exceptionnel Ep obtenu en éclatant le point p. Cette somme est orthogonale relativement à la forme d’intersection. Considérons la limite inductive des groupes de Néron-Severi des surfaces S ′ dominant S : Z C (S) = lim N1 (S ′ ), −1 −→ S ′ →S où l’indice C fait référence aux b-diviseurs de Cartier (pour plus de précisions voir [Fav10]). Remarquons que pour toute surface S ′ dominant S, le groupe N1 (S ′ ) est plongé dans Z C (S). En fait, si nous considérons un diviseur D sur S, à chaque surface S ′ dominant S, nous pouvons lui faire correspondre une classe de Néron-Severi {D}S ′ dans N1 (S ′ ). Ces éléments sont tous identifiés dans Z C (S) et correspondent à une classe d de Z C (S) notée en lettre minuscule. Exemple 1.2. Considérons un point q appartenant au diviseur exceptionnel Ep , issu de l’éclatement d’une surface S au point p. Notons Sp la surface obtenue en éclatant le point p et Sp,q celle en éclatant successivement les points p et q. La classe ep correspond à {Ep }Sp dans N1 (Sp ) et à {Ẽp + Eq }Sp,q dans N1 (Sp,q ) où Ẽp est la transformée stricte de Ep dans Sp,q . Définissons la forme d’intersection sur Z C (S). Pour cela, considérons c et d deux éléments de Z C (S). Il existe une surface S1 dominant S telles que les classes c et d correspondent respectivement à {C}S1 et {D}S1 dans N1 (S1 ). La forme d’intersection est donnée par : c · d = {C}S1 · {D}S1 . Elle ne dépend pas du choix de la surface S1 . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 8 Par la suite, nous nous intéressons à l’espace de Hilbert défini par X X λ2p < ∞ et {D0 }S ∈ N1 (S)}, λp ep | λp ∈ R, Z(S) = {{D0 }S + p∈B(S) p∈B(S) que nous appelons l’espace de Picard-Manin (voir [CL13] et [Can11] ou encore [BFJ08]). C’est le complété L2 de Z C (S). Ses éléments sont appelés « classes de Picard-Manin » ou plus simplement « classes ». Les classes ep (nous gardons les notations introduites dans l’exemple 1.2) où p est un point de S ou d’une surface dominant S, sont d’auto-intersection −1, orthogonales deux à deux et orthogonales à N1 (S). La forme d’intersection est donc de signature (1, ∞) et préserve la décomposition orthogonale : M  Rep . Z(S) = N1 (S) ⊕ p∈B(S) Tout morphisme birationnel π : S ′ → S induit un isomorphisme π# de Z(S ′ ) vers Z(S) qui consiste à considérer comme exceptionnelles au-dessus de S les classes eq qui étaient dans l’espace de Néron-Severi de S ′ : −1 π# : Z(S) = N1 (S) ⊕ ( ⊕ Rep ) −→ Z(S ′ ) = N1 (S ′ ) ⊕ ( p∈B(S) {D0 }S + P λp ep p∈B(S) 7→ ⊕ r∈B(S) −1 r ∈Bs(π / ) {D̃0 }S ′ + P q∈Bs(π −1 ) Rer ) (mq (D0 ) + λq )eq P + λr er , r∈B(S) −1 r ∈Bs(π / ) où D̃0 est la transformée stricte dans S ′ de D0 et mq (D0 ) la multiplicité de D0 au point q. Dans le cas où la surface considérée est P2 , nous notons simplement Z l’espace de Picard-Manin associé : Z = {nℓ + X p∈B(P2 ) λp ep | n, λp ∈ R, où ℓ est la classe de la droite dans P2 . X p∈B(P2 ) λ2p < ∞}, 1.1.2. Forme canonique. Notons Z L1 l’ensemble des classes de Picard-Manin qui sont L1 : X X |λp | < ∞}. λp ep ∈ Z | Z L1 = {c = nℓ + p∈B(P2 ) p∈B(P2 ) Nous définissons la forme canonique kP2 sur Z L1 , comme la forme linéaire définie par : X λp , pour tout c ∈ Z L1 , kP2 (c) = kP2 ·c = −3n − p∈B(P2 ) où kP2 = −3ℓ + ! ep . Plus généralement, en notant KS le diviseur canonique P ep . d’une surface S dominant P2 , la forme canonique s’écrit kS = KS + P p∈B(P2 ) p∈B(S) PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 9 1.1.3. Action du groupe de Cremona sur l’espace de Picard-Manin. Considérons une résolution de f ∈ Bir(P2 ) : S π P2 σ f P2 . Le groupe Bir(P2 ) agit sur Z(P2 ) via l’application (f, c) 7→ f# (c) où f# est définie par f# = σ# ◦ (π# )−1 . Remarquons que (f# )−1 = (f −1 )# et que l’action de f préserve la forme d’intersection : pour tous c1 , c2 ∈ Z, f# (c1 ) · f# (c2 ) = c1 · c2 . Remarque 1.3. La forme canonique est constante sur l’orbite d’une classe par le groupe de Cremona, c’est-à-dire pour toute classe c ∈ Z L1 et pour tout f ∈ Bir(P2 ), nous avons : kP2 ·c = kP2 ·f# (c). Soit d le degré de f et notons p0 , p1 , . . . , pr−1 ses points-base de multiplicité respective {mi }0≤i≤r−1 et q0 , q1 , . . . qr−1 ceux de f −1 de multiplicité {m′i }0≤i≤r−1 . L’action de f sur ℓ et sur les classes {epj }0≤j≤r−1 est donnée par : f# (ℓ) = dℓ − r−1 X m′i eqi , (1.4) i=0 f# (epj ) = mj ℓ − r−1 X ai,j eqi . (1.5) i=0 Remarquons que les coefficients ai,j correspondent au nombre d’intersection des transformées totales des diviseurs exceptionnels obtenus en éclatant respectivement les points pj et qi , dans la résolution de f . Par exemple, si j une application de Jonquières de degré d > 1. Notons p0 et q0 les points-base maximaux respectifs de j et j−1 et p1 , . . . , p2d−2 et q1 , . . . , q2d−2 les petits points-base respectifs de j et j−1 , nous avons :  2d−2 P  j# (ℓ) = dℓ − (d − 1)eq0 − eqi    i=1 2d−2 P . (1.6) eqi j# (ep0 ) = (d − 1)ℓ − (d − 2)eq0 −    i=1   j# (epi ) = ℓ − eq0 − eqi pour 1 ≤ i ≤ 2d − 2 Remarque 1.7. D’après [AC02, Proposition 2.2.21], les coefficients ai,j sont positifs pour tous 0 ≤ i, j ≤ r − 1. Remarque 1.8. L’action de f sur ℓ correspond au système linéaire associé à la transformée par f −1 d’une droite ne passant pas par les points-base de f . Si tous les points-base de f sont dans P2 alors pour chaque point pj il existe une courbe contractée par f −1 sur le point pj de degré mj et passant avec multiplicités ai,j aux points qj . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 10 Ces informations sur f se lisent dans sa matrice caractéristique :   d m0 m1 ... mr−1  −m′0 −a0,0 −a0,1 ... −a0,r−1     −m′1 −a −a . . . −a1,r−1  1,0 1,1 .    .. .. .. .. ..   . . . . . ′ −mr1 −ar−1,0 −ar−1,1 . . . −ar−1,r−1 Celles pour f −1 se lisent en ligne en changeant le signe des mi et des m′i : −1 f# (ℓ) = dℓ − −1 f# (eqi ) = m′i ℓ r−1 X mj epj , j=0 r−1 X − ai,j epj . j=0 Pour plus de détails sur la matrice caractéristique, nous renvoyons à [AC02, Section 2.4]. La première ligne de la matrice caractéristique de f s’appelle la caractéristique de f . Elle est notée (d; m0 , . . . , mr−1 ). Il ne nous reste plus qu’à regarder l’action de f sur les classes ep où p ∈ B(P2 ) n’est pas un point-base de f . Remarque 1.9. Si f est un isomorphisme d’un voisinage U de p ∈ P2 sur un voisinage V de f (p) ∈ P2 alors f# (ep ) = ef (p) . Sinon, quitte à éclater des points-base de f et des points-base de f −1 , il existe un point q sur une surface dominant P2 tel que l’application induite par f envoie p sur q et est un isomorphisme local entre des voisinages de p et de q et donc f# (ep ) = eq . Considérons une classe c de l’espace de Picard-Manin Z : c = nℓ − r−1 X i=0 λi epi − X λp ep . 2 p∈B(P ) p∈supp(f / ) L’action de f sur une classe c de l’espace de Picard-Manin s’obtient par linéarité. ! ! r−1 r−1 r−1 X X X X λp f# (ep ) ai,j eqi − λj mj ℓ − m′i eqi − f# (c) = n dℓ −  = nd − r−1 X j=0 i=0 j=0 i=0  λj mj  ℓ − r−1 X i=0  nm′i − r−1 X j=0 p∈B(P2 ) p∈supp(f / )  λj ai,j  eqi − X p∈B(P2 ) p∈supp(f / ) λp f# (ep ). (1.10) PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 11 1.1.4. Espace hyperbolique de dimension infinie dans l’espace de Picard-Manin. À présent, considérons l’espace H∞ (S) = {c ∈ Z(S) | c · c = 1 et c · d0 > 0}, où d0 ∈ N1 (S) est une classe ample. Muni de la distance définie par d(c, c′ ) = argcosh(c · c′ ) pour tous c, c′ ∈ H∞ (S), c’est un espace hyperbolique de dimension infinie. Nous nous intéressons plus particulièrement à H∞ (P2 ) que nous notons H∞ . Tout élément de H∞ est de la forme X X λ2p = 1. λp ep où n > 0 et n2 − nℓ + p∈B(P2 ) p∈B(P2 ) Comme le groupe de Cremona agit sur l’espace de Picard-Manin et que l’action préserve la forme d’intersection, pour montrer que le groupe de Cremona agit sur H∞ , il suffit de montrer que f# (c) · ℓ > 0. Comme f#−1 (ℓ) ∈ H∞ et que le nombre d’intersection entre deux classes est supérieur ou égal à 1, nous avons comme attendu : f# (c) · ℓ = c · f#−1 (ℓ) ≥ 1. 1.2. Propriétés des applications du groupe de Cremona. Dans cette soussection, nous nous intéressons aux propriétés que vérifient les points-base et les multiplicités des applications du groupe de Cremona. Pour cela, nous introduisons dans un premier temps un vocabulaire général utile pour les points-base d’une application, mais pas seulement. Enfin, nous nous concentrons sur les applications de Jonquières. 1.2.1. Vocabulaire. Soient π : S ′ → S une composée d’éclatements, avec p l’un des points éclatés dans cette suite, et Ep la transformée stricte sur S ′ du diviseur exceptionnel obtenu en éclatant le point p. Tout point q de S ′ et appartenant à Ep est dit adhérent à p. Nous notons cette relation q → p. Plus généralement, tout point q de S ′ et appartenant à la transformée totale π ∗ (Ep ) de Ep , est dit voisin de p. Considérons un ensemble P de points de B(P2 ). Nous disons qu’il est préconsistant si tous ses points vivent sur une surface obtenue en éclatant uniquement des points de P à partir de P2 . Tout point de cet ensemble qui est adhérent à un seul point de P est dit libre contrairement à un point adhérent à deux points distincts de P qui est appelé satellite. Ces deux dernières définitions sont relatives à la donnée d’un ensemble pré-consistant de points. Remarquons qu’un point peut être adhérent à au plus deux points. Un point adhérent et libre est habituellement appelé voisin du premier ordre, mais nous n’utilisons pas cette terminologie. Nous disons qu’une suite pré-consistante de points forme une tour si chaque point de la suite est adhérent au point précédent. Exemple 1.11. Soit p0 un point de P2 . Éclatons-le. Notons p1 un point sur le diviseur exceptionnel Ep0 obtenu en éclatant le point p0 . Éclatons le point p1 . Considérons deux points distincts p2 et p3 sur le diviseur exceptionnel Ep1 tel que p2 appartienne également à la transformée stricte de Ep0 . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA π0−1 (Ep0 ) Ep0 p0 • πp0 • 12 p1 πp1 • p2 p3 • Ep1 L’ensemble des points {p0 , p1 , p2 , p3 } est pré-consistant. Les points p1 , p2 et p3 sont voisins de p0 . Le point p1 est un point libre adhérent à p0 alors que le point p2 est satellite et adhérent aux points p0 et p1 . Le point p3 est libre non adhérent à p0 et il est adhérent à p1 . Pour plus de facilité, nous représentons ce genre de situation par un graphe où les sommets sont les points. Et il y a une flèche orientée entre deux sommets si celui du dessus est adhérent à celui du dessous. Ainsi la situation précédente se réécrit : p2 p3 p1 p0 Trois points ou plus sont dits alignés s’ils appartiennent à une droite de P2 ou à la transformée stricte d’une droite de P2 . Une suite pondérée est la donnée de points de B(P2 ) où chacun est muni d’une multiplicité réelle positive. Soit p un point d’une suite pondérée P . La différence entre la multiplicité mp , associée au point p, et la somme des multiplicités des points de P adhérents à p est appelée l’excès du point p : X mp − mq . q∈P q→p Une suite pondérée est dite consistante si l’excès en tout point de cet ensemble est positif. Remarquons qu’une suite de points est pré-consistante s’il est possible de pondérer tous les points de cet ensemble de façon strictement positive de sorte que si nous associons à tout autre point de B(P2 ) une multiplicité nulle alors l’excès en tous les points de B(P2 ) est positif ou nul. Exemple 1.12. Si nous reprenons l’exemple précédent 1.11, l’ensemble des points {p0 , p1 , p2 , p3 } est pré-consistant car ils peuvent être respectivement pondérés par 3, 2, 1, 1 et alors tous les points de B(P2 ) ont un excès positif ou nul. Par contre les points p0 , p2 , p3 ne forment pas un ensemble de points pré-consistant. En effet, quelque soit le choix de multiplicité associé aux points p2 et p3 l’excès au point p1 est toujours strictement négatif. 1.2.2. Propriété des points-base et de leur multiplicité. Cette partie regroupe plusieurs résultats de base qui seront utilisés par la suite. Une application du groupe de Cremona est dite de caractéristique Jonquières si sa caractéristique est la même que celle d’une application de Jonquières à savoir : (d; d − 1, 12d−2 ) où d est le degré de l’application. En fait ce sont des applications qui envoient un pinceau de droites sur un autre pinceau de droites. Les relations suivantes sont obtenues à partir de simples calculs d’intersection. La plupart d’entre elles sont connues et peuvent par exemple se trouver dans [AC02]. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 13 Lemme 1.13. Soit f ∈ Bir(P2 ). Notons (d; m0 , . . . , mr−1 ) la caractéristique de f , (d; m′0 , . . . , m′r−1 ) celle de f −1 et (ai,j )0≤i,j≤r−1 les coefficients de la sous-matrice de la matrice caractéristique ne contenant pas la première ligne et la première colonne. Nous avons les relations : r−1 P mi = 3d − 3. 1) 2) i=0 r−1 P m2i = d2 − 1. i=0 r−1 P a2i,j = m2j + 1. i=0 r−1 P m′i ai,j = dmj . i=0 3) Pour tout 0 ≤ i ≤ r − 1, mi ≤ d − 1. 4) Si m0 = d − 1 alors f est une application de caractéristique Jonquières. r−1 P ai,j = 3mj − 1. 5) 6) 7) 8) i=0 r−1 P i=0 ai,j ai,k = mj mk . Remarque. Les équations 1) et 2) sont souvent appelées « équations de Noether ». Une façon d’énoncer la seconde égalité est de dire que le système linéaire associé à f est homaloïdal, c’est-à-dire que deux courbes de ce système ont un unique point d’intersection hors des points-base. Démonstration. Les égalités 1) et 5) s’obtiennent respectivement en intersectant la forme canonique contre f#−1 (ℓ) et ℓ puis contre f# (epj ) et epj et en utilisant la remarque 1.3. Auto-intersecter f#−1 (ℓ) et f# (epj ), puis intersecter f# (epj ) contre f# (epk ) et f# (epj ) contre f# (ℓ) nous donne respectivement 2), 6), 7) et 8). Le point 3) découle de 2). Étudions le point 4). Si m0 = d − 1 alors en utilisant les égalités 1) et 2) nous obtenons que r−1 X i=1 mi (mi − 1) = 0, par conséquent, les multiplicités sont toutes égales à 1. En utilisant à nouveau le point 1), nous obtenons que r = 2d − 1 ce qui permet de conclure que f est de caractéristique Jonquières.  La preuve du lemme suivant est une application directe des relations de Noether vues dans le lemme 1.13. Lemme 1.14. Soit f ∈ Bir(P2 ) de degré d et admettant r points-base. 1) Si d ≥ 4 alors r ≥ 6. 2) Si r ≤ 8 alors d ≤ 17. Démonstration. Soient {mi }0≤i≤r−1 les multiplicités des points-base de f . L’inégalité de Cauchy-Schwarz donne : X 2 r−1 r−1 X mi ≤r m2i . i=0 i=0 PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 14 Ainsi d’après les équations de Noether 1) et 2) du lemme 1.13, nous obtenons : 9(d − 1)2 ≤ r(d2 − 1), qui implique en simplifiant par le facteur d − 1 9(d − 1) ≤ r(d + 1). Comme la suite ud = 9(d−1) d+1 est croissante, si d ≥ 4 alors 5 < u4 ≤ ud ≤ r et f a donc au moins six points-base. Si r ≤ 8 alors 9(d − 1) ≤ 8d + 8 qui nous donne d ≤ 17 comme attendu.  Une application f ∈ Bir(P2 ) est dite symétrique si elle est de degré strictement supérieur à 1 et si toutes ses multiplicités sont égales. Lemme 1.15 ([AC02, Lemma 2.5.5]). La caractéristique d’une application symétrique f ∈ Bir(P2 ) est forcément de l’une des formes suivantes : (2; 13 ), (5; 26 ), (8; 37 ) ou (17; 68 ). En particulier, la multiplicité m des points-base de f est liée au degré d par la relation d+1 . m= 3 Remarque 1.16. Soit f ∈ Bir(P2 ) de degré d. La somme des trois plus grandes multiplicités de ses points-base est supérieure ou égale à d + 1. En fait, il y a égalité si et seulement si f est une application symétrique ou de caractéristique Jonquières. Cela s’obtient en utilisant uniquement les égalités 1) et 2) du lemme 1.13. Proposition 1.17 (Positivité des excès). Soit f ∈ Bir(P2 ) les excès des points-base de f sont tous positifs : X mq . pour tout p ∈ Bs(f ), mp ≥ q∈Bs(f ) q→p Démonstration. Nous avons vu que la multiplicité mp d’un point-base p de f correspond à la multiplicité au point p des courbes du système linéaire associé à f . Considérons une courbe C générale de ce système linéaire. D’après [Sha94, p.252], la multiplicité de C au point p, notée mp (C) est supérieure ou égale à la somme des multiplicités de cette courbe aux points adhérents à p. Par conséquent, nous avons l’égalité attendue : X X mp = mp (C) ≥ mq .  mq (C) ≥ q∈B(P2 ) q→p q∈Bs(f ) q→p Proposition 1.18 (Bézout). Soit f ∈ Bir(P2 ) de degré d dont les points-base sont les points {pi }0≤i≤r−1 de multiplicité respective {mi }0≤i≤r−1 . Pour toute courbe C ′ de degré d′ passant par les points pi avec multiplicité µi nous avons : dd′ − r−1 X i=0 mi µi ≥ 0. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 15 Remarque 1.19. Une application de caractéristique Jonquières de degré d et de point-base de multiplicité maximale p0 , ne possède pas deux points-base adhérents à un même troisième point-base différent de p0 sinon cela contredirait la positivité des excès (Proposition 1.17) en ce point puisque sa caractéristique est (d; d − 1, 12d−2 ). De plus, par le même argument, il y a au plus d − 1 points adhérents au point de multiplicité maximale. Par la proposition 1.18, deux points de multiplicité 1 ne peuvent pas être alignés avec le point de multiplicité maximale. Un ensemble de points de B(P2 ) est dit en position presque générale s’il est pré-consistant et qu’aucune des situations suivantes n’est satisfaite : • quatre des points de cet ensemble sont alignés, • sept des points de cet ensemble sont sur une conique, • deux des points de cet ensemble sont adhérents à un troisième point. C’est en fait une terminologie utilisée par Dolgachev [Dol12, p.397]. Cependant, comme il s’intéresse aux surfaces del Pezzo, il impose en plus le fait qu’il y ait au plus 8 points. Une surface S est faiblement del Pezzo si son diviseur canonique est numériquement effectif et big, c’est à dire que pour toute courbe C de S le nombre d’intersection entre la courbe C et le diviseur canonique est positif ou nul, et que ce dernier est d’auto-intersection strictement positive : C · KS ≥ 0 et K2S > 0. Proposition 1.20 ([Dol12, Corollary 8.1.17]). Une surface rationnelle est faiblement del Pezzo si et seulement si elle a été obtenue en éclatant k ≤ 8 points de P2 en position presque générale. Lemme 1.21. Soit f ∈ Bir(P2 ) une application ayant au plus 8 points-base. Les points-base de f sont en position presque générale si et seulement si les points-base de f −1 le sont. Démonstration. D’après la proposition 1.20, une surface est faiblement del Pezzo si et seulement si la suite de points éclatés satisfait les conditions du lemme. La surface obtenue en éclatant les points-base de f et de f −1 étant la même nous obtenons le résultat.  1.2.3. Générateurs du groupe de Cremona. Soient f ∈ Bir(P2 ) et p0 un de ses points de multiplicité maximale m0 . En suivant la terminologie de [AC02], nous appelons complexité de f le nombre d − m0 cf = . 2 Un point-base p de f différent de p0 est dit majeur si sa multiplicité mp est strictement supérieure à la complexité de f : d − m0 . 2 Remarquons que si f possède plusieurs points de multiplicité maximale, si nous changeons le choix du point maximal, la complexité de f reste identique ainsi que le nombre de points-base majeurs. Nous notons Maj(f ) cet ensemble et h son cardinal. L’involution standard de Cremona, qui s’écrit dans une carte locale : mp > 1 1 σ : (x, y) 99K ( , ) x y PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 16 est un exemple d’application qui appartient au groupe de Jonquières. Elle a une importance particulière dans le groupe de Cremona, puisque comme le corps de base est algébriquement clos elle engendre avec le groupe des automorphismes de P2 tout le groupe. Le théorème qui suit n’est plus valable si le corps de base n’est pas algébriquement clos. Théorème 1.22 (M. Noether et G. Castelnuovo). Le groupe de Cremona Bir(P2 ) est engendré par σ et PGL(3, k). M. Noether fut le premier a énoncer ce théorème à la fin du 19e siècle. Cependant, la première preuve exacte est due à G. Castelnuovo. L’idée de « la preuve » de M. Noether est la suivante. Considérons une application f . En pré-composant par une application quadratique dont les trois points-base sont trois points-base de f de plus grande multiplicité, le degré de f diminue. En réitérant ce procédé le degré devient 1 et la composée est une application linéaire. Cependant il n’existe pas toujours une telle application quadratique. En effet, une application quadratique ne peut pas avoir deux de ses points-base adhérents au troisième (Remarque 1.19). Or il est possible que les points-base de multiplicité maximale d’une application soit dans cette configuration. C’est le cas notamment des automorphisme polynomiaux, comme par exemple (x, y) 7→ (y 3 − x, y). Ce problème n’avait pas été vu par M. Noether car le formalisme des points adhérents n’existait pas. Dans [Ale16], J. Alexander corrige la preuve de M. Noether en introduisant la complexité d’une application. S’il existe une application quadratique dont les points-base sont le point-base maximal de f et deux points-base majeurs alors la complexité diminue strictement. Sinon, il faut utiliser un troisième point qui vit dans P2 . Dans ce cas, la complexité reste identique mais le nombre de points-base majeurs diminue. La récurrence se fait sur ces deux entiers positifs. Une conséquence de ce théorème est que la réunion du groupe de Jonquières et du groupe des automorphismes de P2 est également un système de générateurs du groupe de Cremona. Ce résultat est plus faible mais parfois plus maniable. Il a également l’avantage de pouvoir décomposer une application f ∈ Bir(P2 ) en produit de transformations de Jonquières de sorte que le degré augmente à chaque pré-composition. Théorème 1.23 ([AC02, Theorem 8.3.4]). Toute application de Cremona f est composée d’applications de Jonquières ji et d’un élément a ∈ PGL(3, k) : f = a ◦ jn ◦ · · · ◦ j1 , de sorte qu’à chaque pré-composition par une application de Jonquières le degré augmente strictement, pour tout 1 ≤ i ≤ n − 1 : deg(a ◦ jn ◦ · · · ◦ ji+1 ◦ ji ) > deg(a ◦ jn · · · ◦ ji+1 ). Dans [AC02, Theorem 8.3.4], M. Alberich-Carramiñana n’énonce pas la seconde partie du théorème, qu’elle démontre pourtant. Il est facile de voir qu’en précomposant f par une application de Jonquières dont l’inverse a pour point-base maximal le point-base de f de multiplicité maximale, et ses petits points-base sont parmi les points-base majeurs de f , alors le degré diminue strictement. La partie difficile est de montrer qu’il existe une telle application de Jonquières j. Elle montre que c’est le cas si les petits points-base de j−1 sont choisis comme étant tous les pointsbase majeurs de f , à l’exception d’un lorsque le cardinal des points-base majeurs de f est impair. L’algorithme qu’elle utilise et qui est dû à G. Castelnuovo consiste à PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 17 considérer une telle application de Jonquières j1 . Puis elle considère f ◦ j1−1 et réitère le procédé jusqu’à obtenir un automorphisme. 1.2.4. Support d’une transformation de Jonquières. Dans cette partie, nous déterminons dans un cas très spécial, celui où il existe au moins un point adhérent à un autre point, à quelles conditions un ensemble pré-consistant de points de B(P2 ) est le support d’une application de Jonquières. La preuve proposée ici est plus simple que celle présentée dans [AC02], mais elle ne traite que d’un cas particulier. Le problème dans le cas général est de faire attention au fait que les points-base ne doivent pas se trouver sur une courbe de sorte qu’en éclatant les points et en contractant les fibres, la courbe deviennent d’auto-intersection strictement plus petite que −1. Par exemple, trois points alignés ne forment pas le support d’une quadratique. Lemme 1.24. Soient f ∈ Bir(P2 ) et p un de ses points-base de multiplicité maximale. Parmi les points-base majeurs de f , le nombre de points-base adhérents à p est inférieur ou égal au nombre de points-base non adhérents à p. Démonstration. Nous reprenons lors des deux premiers points des calculs connus et faits par exemple dans la Section 8.2 de [AC02, Lemma 8.2.3 et 8.2.6]. Notons r le nombre de points-base de f et h le nombre de points-base majeurs de f . • D’après le théorème de Bézout (Proposition 1.18), nous avons d ≥ mi + m0 pour tout 1 ≤ i ≤ r − 1, ce qui implique : 2 cf ≥ mi . • Multiplions par cf l’équation 1) du lemme 1.13 et soustrayons cela à l’équation 2) du même lemme : r−1 X i=0 mi (mi − cf ) = d2 − 1 − 3d cf +3 cf = d(d − 3 cf ) + 3 cf −1 = (m0 + 2 cf )(m0 − cf ) + 3 cf −1, ce qui implique : r−1 X i=1 mi (mi − cf ) = 2 cf (m0 − cf ) + 3 cf −1. Comme pour i > h les points ne sont pas majeurs nous avons h X i=1 mi (mi − cf ) > 2 cf (m0 − cf ), ce qui donne finalement par le premier point h X i=1 (mi − cf ) > m0 − cf . • Notons ha le nombre de points-base de f majeurs et adhérents à p0 . Quitte à réordonner les indices, l’équation précédente se ré-écrit : ha X i=1 mi + h X i=ha +1 mi > m0 + (h − 1) cf . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 18 Par positivité des excès en p0 pour f (Proposition 1.17) et par le premier point de la preuve : m0 + (h − ha )2 cf > m0 + (h − 1) cf ce qui entraîne : h 2 2(h − ha ) ≥ h. Par conséquent ≥ ha ce qui signifie qu’il y a au plus autant de points-base majeurs adhérents à p0 que de points-base majeurs non adhérents.  Lemme 1.25. Considérons un ensemble pré-consistant de points {pi }0≤i≤2δ de B(P2 ) satisfaisant a) exactement δ points sont adhérents à p0 , b) pour toute paire (i, j) où 1 ≤ i < j ≤ 2δ, les points pi , pj et p0 ne sont pas alignés, c) si deux points de cet ensemble sont adhérents à un même troisième point pi de cet ensemble alors i = 0. Alors il existe une application de Jonquières de degré δ + 1 qui possède cet ensemble comme points-base et dont p0 est le point-base majeur. Démonstration. Lorsque nous éclatons le point p0 , il n’y a pas deux points sur une même fibre d’après la condition b). Nous éclatons ensuite les δ points adhérents, et nous contractons les transformées strictes des fibres correspondantes. Par la condition c), il n’y a toujours pas deux points sur une même fibre. La surface obtenue est une surface de Hirzebruch Fδ+1 de section exceptionnelle d’auto-intersection −(δ + 1). Ensuite, nous éclatons un point non adhérent puis contractons la fibre passant par ce point. En faisant cela, nous obtenons la surface de Hirzeburch dont la section exceptionnelle est d’auto-intersection un de plus par rapport à la surface précédente et il n’y a toujours pas deux points sur une même fibre. Ainsi en répétant cette opération pour les δ points non adhérents nous obtenons une surface de Hirzeburch F1 et en contractant la section exceptionnelle nous obtenons une application de Jonquières de degré δ + 1.  Proposition 1.26. Soit f ∈ Bir(P2 ) possédant un point-base majeur adhérent à son (ou à un des ses) point-base maximal p0 . Pour tout sous-ensemble de l’ensemble des points-base majeurs de f , pré-consistant, de cardinal pair 2δ et possédant un nombre de points adhérents à p0 égal à δ, il existe une application de Jonquières de degré δ + 1 ayant p0 comme point-base maximal et cet ensemble de points comme autres points-base. De plus, un tel sous-ensemble existe toujours. Démonstration. Nous cherchons à utiliser le lemme 1.25. Pour cela, plusieurs points sont à vérifier : • L’hypothèse sur f et le lemme 1.24 justifient le fait qu’il existe un sousensemble de l’ensemble des points-base majeurs de f qui possède autant de points adhérents à p0 que de points non adhérents. • D’après le théorème de Bézout 1.18, il n’existe pas deux points majeurs alignés avec le point p0 . • Il n’y a pas deux points majeurs adhérents à un point majeur. Sinon, par la proposition 1.17, il existerait un point majeur p1 de multiplicité m1 > d − m0 . Mais dans ce cas, il y aurait un point q libre et adhérent à p0 (si p1 est voisin de p0 ) ou dans P2 qui serait de multiplicité strictement supérieure à d − m0 . Ceci contredit PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 19 le théorème de Bézout (proposition 1.18) en considérant la droite passant par les points p0 et q. Ainsi, d’après le lemme 1.25, il existe une application de Jonquières de degré δ + 1 ayant p0 comme point-base de multiplicité maximal et possédant cet ensemble comme petits points-base.  Remarque 1.27. Sans la condition qu’il y ait autant de points adhérents à p0 que de points non adhérents ce n’est pas possible de conclure. En effet, considérons les points {p0 , . . . , p6 } de P2 tels qu’il n’y ait pas deux points alignés avec p0 , que les points p1 , . . . , p4 soient alignés et que les points p5 et p6 n’appartiennent pas à la droite contenant les points p1 , . . . , p4 . • p0 • p6 • p1 • p5 • p2 • p3 • p4 Ils constituent le support d’une application de Jonquières de degré 4 et de pointbase maximal p0 . Mais si nous considérons seulement les points p0 , p1 , p2 , p3 , p4 ils ne forment plus le support d’une application de Jonquières. En effet, si nous éclatons les points p0 et p1 et que nous contractons la droite passant pas ces deux points, nous nous retrouvons sur P1 × P1 . En éclatant ensuite le point p2 , nous nous retrouvons sur F1 mais les deux points restants sont sur la section exceptionnelle. 2. Construction d’un pavage de Voronoï Considérons l’action du groupe de Cremona sur H∞ . L’objet de cette section est de construire un pavage de Voronoï associé à cette action. Dans la sous-section 2.1, nous nous restreignons à un sous-espace convexe E de H∞ contenant l’enveloppe convexe de l’orbite de la droite ℓ. Nous ne nous restreignons pas seulement à l’enveloppe convexe de l’orbite de ℓ car il est parfois difficile de vérifier qu’un élément y appartient. Pour cette raison, nous élargissons l’espace à étudier. Nous construisons alors un pavage de Voronoï de la façon suivante. Nous considérons l’orbite de la classe de la droite ℓ. Cela nous donne un ensemble discret de points de E. Cependant le stabilisateur de ℓ est PGL(3, k). Nous identifions donc deux applications qui diffèrent par un automorphisme : f ∼ g ⇔ il existe a ∈ PGL(3, k), f = g ◦ a. Nous notons f une telle classe. Par construction, toute application d’une même classe d’équivalence agit de la même façon sur ℓ. Pour toute classe f où f ∈ Bir(P2 ), nous associons une cellule de Voronoï notée V(f ) et définie comme : V(f ) = {c ∈ E | d(c, f# (ℓ)) ≤ d(c, g# (ℓ)) pour tout g ∈ Bir(P2 )}. Remarquons que toutes les applications du groupe de Cremona appartenant à la même classe d’équivalence indexent la même cellule de Voronoï. Les applications f ′ ∈ f sont appelées les germes associés à V(f ) et les classes f# (ℓ) sont les centres des cellules de Voronoï. Une cellule de Voronoï ne correspond pas tout-à-fait à un domaine fondamental mais c’est l’orbite d’un domaine fondamental sous l’action de PGL(3, k). PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 20 Nous définissons dans une première sous-section l’espace sur lequel nous faisons agir le groupe de Cremona, puis nous montrons que les cellules de Voronoï recouvrent l’espace construit et enfin nous montrons que les cellules de Voronoï ne s’accumulent pas sur une cellule. 2.1. Restriction à un sous-espace. Considérons l’espace hyperbolique H∞ de dimension infinie obtenu comme hyperboloïde dans l’espace de Picard-Manin qui a été construit à la sous-section 1.1.4. Nous considérons le sous-espace suivant. Définition 2.1. L’ensemble E est le sous-espace de H∞ constitué des classes X λp ep (n réel ≥ 1) c = nℓ − p∈B(P2 ) satisfaisant : 1) λp ≥ 0 pour tout p ∈ B(P2 ), 2) la positivité contre la classe anti-canonique : X λp ≥ 0, 3n − p∈B(P2 ) 3) la positivité des excès de tout point p ∈ B(P2 ) : X λp − λq ≥ 0, q∈B(P2 ) q→p 4) la condition de Bézout : pour toute courbe de P2 de degré d passant avec multiplicité µp en chaque point p ∈ B(P2 ) : X λp µp ≥ 0. nd − p∈B(P2 ) L’inégalité de la propriété 2) implique que les classes de E sont en fait L1 . Par conséquent, la forme canonique est bien définie sur les classes de E et la propriété 2) revient à demander que les classes soient positives contre la forme anti-canonique qui est l’opposé de la forme canonique : − kP2 ·c ≥ 0. Lorsqu’une classe satisfait cette inégalité, nous disons qu’elle est positive contre la classe anti-canonique. Le coefficient n est appelé le degré de c et les coefficients λp les multiplicités de c aux points p ∈ B(P2 ). Les points pour lesquels la multiplicité associée est strictement positive constituent le support de c. Cet ensemble est noté supp(c). Remarquons que par définition de H∞ celui-ci est dénombrable. Grâce à la propriété 3), le support de c est un ensemble pré-consistant de points, au sens de la définition introduite dans la section 1.2.1. Remarque 2.2. Par définition, une classe c ∈ E appartient à H∞ et possède donc un degré supérieur ou égal à 1 et strictement supérieur à chacune de ses multiplicités : X λ2p ≤ n2 − λ2q pour tout q ∈ B(P2 ). 1 = c2 = n 2 − p∈B(P2 ) PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 21 Notons Z >0 le sous-espace de l’espace de Picard-Manin constitué des classes d’auto-intersection strictement positive. Une classe de Z >0 satisfaisant les points 1), 2), 3) et 4) de la définition 2.1 est dite proportionnelle à une classe de E. Une telle classe appartient à la demi-droite ouverte issue de la classe nulle et passant par une classe de E. Plus généralement, étant donné un sous-ensemble F de l’espace de Picard-Manin, une classe d’auto-intersection strictement positive est dite proportionnelle à une classe de F si elle appartient à la demi-droite ouverte issue de la classe nulle et passant par une classe de F . L’application de normalisation : η : Z >0 → H∞ (2.3) x x 7→ p . B(x, x) envoie toute classe de Z >0 sur sa classe proportionnelle dans H∞ . Proposition 2.4. L’action du groupe de Cremona stabilise E. Démonstration. Le groupe de Cremona étant engendré par PGL(3, k) et l’involution standard σ (Théorème 1.22) il suffit de vérifier que l’action de ces applications préserve E. C’est le cas pour les automorphismes. Soit X λp ep ∈ E. c = nℓ − p∈B(P2 ) Montrons que σ# (c) appartient à E. Notons p0 , p1 et p2 les points-base de σ (qui sont en fait [0 : 0 : 1], [0 : 1 : 0] et [1 : 0 : 0]) et q0 , q1 et q2 ceux de σ −1 . Bien que σ soit une involution nous les différencions pour plus de clarté. D’après l’équation (1.10), nous avons : σ# (c) = (2n − λp0 − λp1 − λp2 )ℓ − (n − λp1 − λp2 )eq0 − (n − λp0 − λp2 )eq1 X λp σ# (ep ). − (n − λp0 − λp1 )eq2 − p∈B(P2 ) p∈{p / 0 ,p1 ,p2 } Le groupe de Cremona agit sur H∞ (voir le paragraphe 1.1.4) par conséquent la classe σ# (c) appartient à H∞ et possède donc un degré strictement positif. Intéressons-nous aux autres points de la définition. 1) Comme c ∈ E les multiplicités λp sont positives ou nulles. Montrons que c’est le cas des multiplicités de σ# (ℓ) pour les points q0 , q1 et q2 . Les points p0 et p1 sont dans P2 il existe donc une droite L passant par ces deux points et comme c satisfait la condition de Bézout (Définition 2.1.4)), nous avons : n − λp0 − λp1 ≥ 0. Les deux autres multiplicités sont positives avec le même argument. 2) La condition de positivité contre l’anti-canonique est satisfaite puisque la forme canonique est constante sur l’orbite de c sous l’action du groupe de Cremona (Remarque 1.3). 3) Montrons que les excès de σ# (c) sont positifs en tout point q ∈ B(P2 ). Soit q ∈ B(P2 ). Deux cas se présentent selon si q est un point-base de σ −1 ou pas. Dans le cas où q n’est pas un point-base de σ −1 , il existe p ∈ B(P2 ) tel que −1 ep = σ# (eq ). Quitte à éclater au départ et à l’arrivée, σ −1 induit un isomorphisme local envoyant q sur p et par conséquent les points adhérents à q sont envoyés sur des points adhérents à p et donc la positivité des excès est préservée. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 22 Il nous reste à considérer les excès au dessus des points q0 , q1 et q2 . Notons S la surface obtenue en éclatant les points p0 , p1 et p2 . Les points adhérents à q0 sont les points appartenant à la transformée stricte de la droite L passant par les points p1 et p2 sur S. Ainsi la droite L passe par les points p1 et p2 ainsi que par les points adhérents à q0 . Par conséquent en considérant cette droite et le fait que c satisfait la condition de Bézout (Définition 2.1.4)), nous avons : X X λp ) ≥ 0. λp = n − (λ1 + λ2 + (n − λ1 − λ2 ) − 2.1.4) p7→q0 p7→q0 Ainsi, l’excès en q0 est positif. Il en est de même pour les points q1 et q2 . 4) Montrons que σ# (c) satisfait la condition de Bézout pour toute courbe de P2 . Considérons dans un premier temps une courbe C1 qui n’est contractée par σ −1 . −1 Notons c1 sa classe dans Picard-Manin. Dans ce cas, la classe σ# (c1 ) est la classe de Picard-Manin correspondant à la courbe de P2 obtenue comme adhérence de σ −1 (C1 \ {q0 , q1 , q2 }). Par conséquent son nombre d’intersection avec c est positif ou nul puisque c satisfait la condition de Bézout : −1 σ# (c) · c1 = c · σ# (c1 ) ≥ 0. 2.1.4) Considérons à présent les droites contractées par σ −1 comme par exemple la droite passant par les points q1 et q2 . Alors nous obtenons : 2n − λp0 − λp1 − λp2 − (n − λp0 − λp2 ) − (n − λp0 − λp1 ) = λp0 ≥ 0. Il en est de même des deux autres droites contractées. Par conséquent σ# (c) satisfait également la condition de Bézout (Définition 2.1.4)). Nous avons ainsi montré que l’action de σ préserve E et par conséquent que l’action du groupe de Cremona stabilise E.  Proposition 2.5. L’espace E est un sous-espace convexe fermé de H∞ . Démonstration. Les conditions 1) et 4) définissent des demi-espaces fermés de l’espace de Picard-Manin. Comme les multiplicités des classes de E sont positives d’après la condition 1), la condition 2) se réécrit de la façon suivante : X pour toute partie finie F de B(P2 ), λp ≤ 3n. p∈F Par conséquent la condition 2) correspond à une intersection infinie de demi-espaces fermés qui est un fermé. Nous raisonnons pareil pour la condition 3). En intersectant ce fermé avec l’hyperboloïde H∞ nous obtenons que E est fermé comme annoncé.  Proposition 2.6. L’enveloppe convexe de l’orbite de ℓ sous l’action du groupe de Cremona est incluse dans E. Démonstration. Comme par la proposition 2.5 l’espace E est convexe, il suffit de montrer que toutes les classes de l’orbite de ℓ sous l’action du groupe de Cremona sont dans E. De plus comme d’après la proposition 2.4 l’action du groupe de Cremona préserve E, il suffit de vérifier que la classe de la droite ℓ appartient à E. La classe ℓ appartient à H∞ et vérifie le point 1). La classe de la droite contre la classe anti-canonique vaut 3 ainsi la positivité contre l’anti-canonique est vérifiée (point 2)). Les points 3) et 4) sont également vérifiés.  PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 23 Remarque 2.7. Soit p ∈ P2 . Il existe t0 ∈ [0, 1[ tel que pour tout t0 ≤ t < 1 la classe √ 1 (ℓ − tep ) n’est pas dans l’enveloppe convexe de l’orbite de ℓ puisque l’inter1−t2 section de cette classe contre la classe anti-canonique est strictement supérieure à 3. 2.2. Pavage. Montrons que les cellules de Voronoï recouvrent l’espace E (Corollaire 2.11). Proposition 2.8. Pour toute classe c appartenant à E, les deux infimums suivants sont atteints :  1) inf  d(c, f# (ℓ)) | f ∈ Bir(P2 ) 2) inf d(c, f# (ℓ)) | f ∈ Bir(P2 ) et c ∈ / V(f ) . P Démonstration. Soit c = nℓ − λp ep une classe de E. Montrons que l’infimum suivant est atteint : p∈B(P2 )  inf d(c, f# (ℓ)) | f ∈ Bir(P2 ) . (2.9) Considérons les classes de l’orbite de la droite ℓ se trouvant dans la boule fermée de E centrée en c et de rayon argcosh(n). La classe ℓ est dans cette boule. De plus, par l’inégalité triangulaire, toute application f telle que la classe f# (ℓ) se situe dans cette boule est de degré au plus cosh(2 argcosh(n)) = 2n2 − 1. Notons B l’ensemble de ces applications. Il n’y a qu’un nombre fini de caractéristiques pour des applications du groupe de Cremona de degré au plus 2n2 − 1. Remarquons que si le support de c est fini alors l’infimum est atteint. Nous considérons donc le cas où c est de support infini. Notons C1 , . . . , Ck cet ensemble de caractéristiques. Pour 1 ≤ j ≤ k, posons Cj = (dj ; mj0 , . . . , mjrj ). Notons Bj l’ensemble des applications de B ayant Cj pour caractéristique. Montrons que pour tout 1 ≤ j ≤ k  (2.10) inf d(c, f# (ℓ)) | f ∈ Bj est atteint. Fixons 1 ≤ j ≤ k. Raisonnons par l’absurde et supposons qu’il existe une suite (fi )i∈N d’applications de Bj telle que la suite (d(c, fi # (ℓ)))i∈N soit strictement décroissante. Pour chaque i, nous regardons le point base q de fi−1 de multiplicité mj0 . Nous notons λ0,i la multiplicité λq de c associée au point q. À noter que si q n’est pas un point du support de c, la multiplicité λ0,i est nulle. Nous faisons de même pour chaque 0 ≤ s ≤ rj . Nous obtenons ainsi rj + 1 suites {λs,i }i∈N de coefficients. Si nous l’ordonnons, la suite des multiplicités de c est décroissante et tend vers 0. Par conséquent quitte à prendre des sous-suites nous pouvons supposer que chacune des rj +1 suites est ou bien constante ou bien strictement décroissante. Or la suite (d(c, fi # (ℓ)))i∈N étant strictement décroissante cela implique que la suite rj P ms λs,i est strictement croissante ce qui est absurde. Par conséquent, pour Si = s=0 tout 1 ≤ j ≤ k il existe une application f j ∈ Bj pour laquelle l’infimum (2.10) est atteint :  d(c, f#j (ℓ)) = inf d(c, f# (ℓ)) | f ∈ Bj . Notons j0 ∈ {1, . . . , k} un indice tel que d(c, f#j0 (ℓ)) = min d(c, f#j (ℓ)). 1≤j≤k L’infimum (2.9) est atteint pour f . Le point 2) se démontre de la même façon. j0  PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 24 Corollaire 2.11. Les cellules de Voronoï pavent l’espace E. Démonstration. Soit c ∈ E. Le point 1) de la proposition 2.8 implique qu’il existe f ∈ Bir(P2 ) telle que c appartient à V(f ).  2.3. Non-accumulation des cellules. Dans cette partie, nous montrons que les cellules de Voronoï ne s’accumulent pas sur cellule : pour tout f ∈ Bir(P2 ), pour toute classe c ∈ V(f ), il existe ε > 0 tel que les cellules de Voronoï ne contenant pas c mais tel que c soit dans leur ε-voisinage sont en nombre fini. La condition « ne contenant pas c » est nécessaire car nous verrons que dans certains cas c appartient à un nombre infini de cellules. Proposition 2.12. Pour tout c ∈ E, il existe ε > 0 tel que pour tout f ∈ Bir(P2 ) soit c appartient à V(f ), soit la distance entre c et V(f ) est strictement supérieure àε: d(c, V(f )) > ε. La notation « d(c, V(f )) » est un abus de notation et signifie l’infimum sur toutes les classes c′ de V(f ) des distances entre c et c′ : d(c, V(f )) = inf{d(c, c′ ) | c′ ∈ V(f )}. Démonstration. Quitte à faire agir le groupe de Cremona sur le pavage de Voronoï, nous pouvons supposer que c appartient à la cellule V(id). Si la classe c est à l’intérieur (pour le pavage de Voronoï) de V(id), tout ε strictement positif tel que la boule fermée centrée en c et de rayon ε est incluse dans l’intérieur (pour le pavage) de V(id) convient. Intéressons-nous à présent aux classes P λp ep ∈ E une classe apqui sont au bord de la cellule V(id). Soit c = nℓ − p∈B(P2 ) partenant au bord de la cellule V(id). D’après le point 2) de la proposition 2.8, l’infimum suivant est atteint Posons D := inf{d(c, f# (ℓ)) | f ∈ Bir(P2 ) et c ∈ / V(f )}. D − argcosh(n) . 6 Comme c appartient à V(id), ε est strictement positif. Montrons que pour toute application f ∈ Bir(P2 ) telle que c n’appartient pas à V(f ), nous avons : ε= d(c, V(f )) > ε. Raisonnons par l’absurde et supposons qu’il existe f ∈ Bir(P2 ) telle que c n’appartient pas à V(f ) et qu’il existe c′ ∈ V(f ) tel que d(c, c′ ) ≤ ε. Nous avons alors par définition de D et par l’inégalité triangulaire la contradiction suivante : D ≤ d(c, f# (ℓ)) ≤ d(c, c′ ) + d(c′ , f# (ℓ)) ≤ ε + d(c′ , ℓ) ≤ ε + d(c′ , c) + d(c, ℓ) ≤ 2ε + argcosh(n) D 2 argcosh(n) + 3 3 D 2D + = D. < 3 3 ≤  PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 25 Nous disons qu’un segment de E traverse une cellule de Voronoï s’il existe un sous-segment contenu dans l’intérieur (pour le pavage) de cette cellule. Le corollaire suivant dit qu’un segment ne traverse qu’un nombre fini de cellules de Voronoï. Plus généralement, il donne un analogue de ce résultat lorsque le segment reste dans le bord de Voronoï de plusieurs cellules. Corollaire 2.13. Soit [c, c′ ] un segment géodésique de E. Toute suite (ci )i∈I de classes du segment [c, c′ ] satisfaisant les trois points suivants est finie : • c0 = c, • ci < ci+1 et • pour tout i ≥ 1 il existe fi ∈ Bir(P2 ) satisfaisant ci ∈ V(fi ) et ci−1 ∈ / V(fi ) En particulier, un segment géodésique ne traverse qu’un nombre fini de cellules de Voronoï. Démonstration. Paramétrons le segment [c, c′ ] par γ(t) pour t ∈ [0, 1] avec γ(0) = c et γ(1) = c′ . Nous construisons une suite de points ci = (γ(ti )) par le procédé de récurrence suivant. Initialisons en posant t0 = 0 et c = γ(0). Pour i ≥ 1, si ti−1 ∈ [0, 1[ est déjà construit, nous posons ti = inf{t ∈]ti−1 , 1] | ∃f ∈ Bir(P2 ), γ(t) ∈ V(f ) et γ(ti−1 ) ∈ / V(f )}. Remarquons que les classes de cette suite appartiennent à plusieurs cellules par construction. De plus, pour tout 1 ≤ i et pour toute application f telle que V(f ) contient la classe ci mais pas la classe ci−1 , la cellule V(f ) ne contient pas les classes cj pour j ≤ i − 1 par convexité des cellules de Voronoï. Pour tout 0 ≤ t ≤ 1, d’après la proposition 2.12 et le paragraphe précédent, il existe εt > 0 tel que dans l’intervalle ouvert centré en γ(t) et de diamètre 2ε il existe au plus une classe de la suite {ci }i∈I . Ces ouverts forment un recouvrement du segment géodésique compact [c, c′ ], par conséquent il existe un sous-recouvrement fini. Or chacun de ces ouverts contient au plus un point de la suite. Il y a donc un nombre fini d’éléments dans cette suite.  2.4. Bord à l’infini. Le bord de H∞ est constitué des classes d’auto-intersection nulle. Ces classes peuvent être vues comme limites de classes de Picard-Manin vivant dans l’hyperplan affine d’équation {ℓ = 1} et proportionnelles à des classes de H∞ . Nous définissons le bord à l’infini de E, noté ∂∞ E comme l’ensemble des classes du bord de H∞ qui vérifient les points 1) à 4) de la définition 2.1 de E. De même que précédemment ces classes sont limites de classes de Picard-Manin vivant dans l’hyperplan affine d’équation {ℓ = 1} et proportionnelles à des classes de E. 2.5. Classes symétriques. Une classe dont les r plus grandes multiplicités sont égales et la (r + 1)-ème est strictement plus petite est appelée r-symétrique. Si de plus, c ne possède pas d’autre multiplicité, la classe est dite pure. Lemme 2.14. Soit c une classe r-symétrique avec la plus grande multiplicité qui est égale au tiers du degré de c : r−1 c = nℓ − nX ep − 3 i=0 i X λp ep , 2 p∈B(P ) p∈{p / 0 ,...,pr−1 } / {p0 , . . . , pr−1 }. Nous avons alors : où λp < n3 pour tout p ∈ 1) Si c ∈ E alors r ≤ 8. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 26 2) Si c ∈ ∂∞ E alors r = 9 et c est une classe 9-symétrique pure. Démonstration. Considérons une telle classe c. Dans le cas où c ∈ E, si r ≥ 9 alors nous obtenons la contradiction suivante : X n2 λ2p ≤ 0. − 1 = c2 ≤ n 2 − 9 9 p∈{p / 0 ,...,pr−1 } Si maintenant c ∈ ∂∞ E alors c2 = 0 et par le même argument, nous obtenons r ≤ 9. Dans le cas où r = 9, notons que la classe c est forcément symétrique pure. Supposons que r ≤ 8. Alors il existe p ∈ / {p0 , . . . , pr−1 } tel que λp > 0 puisque : n2 − r n2 − 9 X λ2p = 0. (2.15) p∈{p / 0 ,...,pr−1 } Comme c appartient au bord à l’infini, nous avons par définition : X n λp . 0 ≤ − kP2 ·c = 3n − r − 3 (2.16) p∈{p / 0 ,...,pr−1 } 2 En multipliant l’égalité 2.15 par 3, nous avons 3n2 = 3r n9 + 3 P p∈{p / 0 ,...,pr−1 } λ2p . En multipliant l’équation 2.16 par n qui est positif et en remplaçant dans cette équation 3n2 par la valeur que nous venons d’obtenir, nous avons X X X n2 n2 λp (3λp − n), λ2p − r − n λp = 0 ≤ 3r + 3 9 3 p∈{p / 0 ,...,pr−1 } ce qui contredit le fait que λp < attendu. p∈{p / 0 ,...,pr−1 } n 3 p∈{p / 0 ,...,pr−1 } pour tout p ∈ / {p0 , . . . , pr−1 }. Ainsi r = 9 comme  Remarquons que ce lemme est l’analogue du lemme 1.15 sur les caractéristiques des applications symétriques. Cependant, comme les multiplicités des classes ne sont pas entières cela enlève de la rigidité, d’où l’hypothèse imposée sur les coefficients. 3. Cellule de Voronoï associée à l’identité Le groupe de Cremona agissant transitivement sur les cellules de Voronoï, il suffit d’étudier la cellule V(id) pour comprendre toutes les cellules. Dans cette section, nous caractérisons les classes se trouvant dans la cellule V(id) (Proposition 3.6 et Théorème 3.8). Par définition, une classe c est dans la cellule de Voronoï associée à l’identité si elle ne peut pas être rapprochée de ℓ en faisant agir un élément de Bir(P2 ) : c ∈ V(id) ⇔ pour tout f ∈ Bir(P2 ), f# (c) · ℓ ≥ c · ℓ. Avant cela, introduisons des notations utilisées dans cette section et par la suite. Nous avons vu que le support d’une classe c ∈ E (ou plus généralement dans H∞ ) est dénombrable. Par facilité d’écriture, étant donnée une classe c ∈ E, nous renumérotons toujours dans cette section les points de son support et les multiplicités correspondantes, de sorte qu’ils soient indicés par un sous-ensemble I ′ de N qui est soit un intervalle commençant à 0 soit N tout entier : X c = nℓ − λi epi . i∈I ′ PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 27 Remarquons que pour alléger les notations, nous écrivons λi au lieu de λpi . Par la suite, lorsque nous ferons agir une application f ∈ Bir(P2 ) sur c, nous aurons également besoin d’une notation pour les points-base de f . S’ils sont dans le support de c, la notation des points-base de f sera induite par celle sur les points du support de c. Si ce n’est pas le cas, nous aurons besoin d’introduire un ensemble fini J disjoint de N, tel que pour j ∈ J, λj est la multiplicité nulle de c correspondant au point-base pj de f qui n’est pas dans le support de c. De fait, pour tout i ∈ I ′ et pour tout j ∈ J, λi > λj . Ainsi, pour alléger les notation, I correspondra suivant le contexte à I ′ ou à I ′ ∪J et les indices de J seront considérés comme plus grands que ceux de I ′ . Une classe est dite ordonnée lorsque la numérotation induit un ordre décroissant sur les multiplicités de c : pour tout i, j ∈ I tels que i < j, λi ≥ λj . Considérons l’action d’une application f ∈ Bir(P2 ) de degré d sur une classe P c = nℓ − i∈I λi epi ∈ E. Pour tout i ∈ I tel que pi est un point-base de f , nous notons mi sa multiplicité pour f en tant que point-base. Alors nous avons l’égalité suivante : f# (c) · ℓ − c · ℓ = c · f#−1 (ℓ) − c · ℓ X = c · (dℓ − pi ∈supp(f ) = (d − 1)n − mi ) − n X (3.1) mi λi pi ∈supp(f ) Dans le cas où la somme des trois plus grandes multiplicités d’une classe ordonnée est inférieure ou égale à son degré, le lemme suivant permet de vérifier rapidement que cette classe appartient à V(id). P Lemme 3.2. Soit f ∈ Bir(P2 ) de degré d et c = nℓ − i∈I λi epi ∈ E. Notons, pour tout i ∈ I tel que pi ∈ supp(f ), mi la multiplicité du point-base pi . Considérons le multi-ensemble E constitué des indices de I, chacun apparaissant avec multiplicité mi . Alors, il est possible de partitionner E en d − 1 triplets et d’avoir ainsi, en notant T l’ensemble de ces triplets : X n − λi − λj − λk . f# (c) · ℓ − c · ℓ = {{i,j,k}}∈T De plus, il est possible de choisir la partition de E de sorte que chaque triplet de E soit constitué de trois indices deux à deux distincts. Rappelons que les indices de I correspondent à des points du support de c ou du support de f . Démonstration. D’après l’équation (3.1), nous avons l’égalité : X mi λi . f# (c) · ℓ − c · ℓ = (d − 1)n − (⋆) pi ∈supp(f ) L’égalité du lemme 1.13.1) 3(d − 1) = X mi pi ∈supp(f ) implique que nous pouvons constituer d − 1 triplets dans E afin d’arranger le terme de droite de (⋆) comme une somme de d − 1 termes de la forme n − λi − λj − λk , PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA où {{i, j, k}} ∈ T . Ainsi (d − 1)n − X mi λi = pi ∈supp(f ) X {{i,j,k}}∈T 28 n − λi − λj − λk . De plus, pour chaque i, l’inégalité du lemme 1.13.3) mi ≤ d − 1, permet de répartir les mi multiplicités λi de sorte qu’il n’y en ait pas deux dans le même terme de la somme et donc que les triplets de T soient formés d’indices deux à deux distincts. Une façon de former ces triplets est de faire une répartition en suivant. Nous répartissons le premier indice i0 de multiplicité non nulle mi0 dans les mi0 premiers triplets. Puis nous répartissons le second indice i1 dans les mi1 triplets suivant en revenant au premier quand nous avons compléter le dernier. En itérant ce procédé on obtient la partition en triplets attendue.  Lemme 3.3. Soit c ∈ E une classe de degré n. Supposons que l’une des deux conditions suivantes est réalisée. 1) Les points pi , pj et pk sont alignés. 2) Les points pi , pj et pk sont le support d’une application quadratique q et q# (c) · ℓ ≥ c · ℓ. Alors, en notant λi , λj et λk les multiplicités respectives, éventuellement nulles, des points pi , pj et pk pour c, nous avons : n − λi − λj − λk ≥ 0. Démonstration. Si les points pi , pj et pk sont alignés alors en considérant la droite passant par ces trois points, nous avons d’après l’inégalité de Bézout (Définition 2.1.4)) le résultat attendu. Si les points pi , pj et pk sont les points-base de l’application quadratique q, l’équation (3.1) nous donne : n − λi − λj − λk = q# (c) · ℓ − c · ℓ ≥ 0 ce qui prouve le lemme sous la seconde condition.  Une classe ordonnée qui possède au moins trois points dans son support est appelée spéciale si les points p1 et p2 sont adhérents à p0 et si ses trois plus grandes multiplicités vérifient : 0 > n − λ0 − λ1 − λ2 . Remarque 3.4. En particulier, une classe spéciale ne possède qu’une seule multiplicité maximale. En effet, si c est une classe spéciale alors λ0 > n2 puisque par positivité des excès (Définition 2.1.3)) λ0 ≥ λ1 + λ2 et donc 0 > n − λ0 − λ1 − λ2 ≥ n − 2λ0 . La conclusion s’obtient avec l’inégalité de Bézout (Définition 2.1.4)). L’objet des énoncés qui suivent est de caractériser les classes appartenant à V(id). Nous étudions dans un premier temps (Lemme 3.5 et Proposition 3.6) les classes non spéciales. D’une part car la preuve est facile puisque n’importe quel choix de partition de E en triplets d’indices deux à deux disjoints convient. D’autre part car elle donne une caractérisation immédiate pour contrôler si une classe non spéciale ordonnée appartient à V(id) ou pas. Il suffit de vérifier que la somme des trois premières multiplicité est plus petite que le degré. Dans un second temps nous nous intéressons aux classes spéciales (Théorème 3.8). PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 29 P Lemme 3.5. Soit c = nℓ − i∈I λi epi ∈ E une classe ordonnée. Si la somme des trois plus grandes multiplicités de c est inférieure ou égale à son degré : alors c ∈ V(id). n − λ0 − λ1 − λ2 ≥ 0, Démonstration. Considérons une telle classe c. L’hypothèse ainsi que la décroissance des multiplicités de c impliquent que pour tout triplet {{i, j, k}} d’indices deux à deux distincts de I, n − λi − λj − λk ≥ 0. Ainsi, par le lemme 3.2, pour tout f ∈ Bir(P2 ), f# (c) · ℓ ≥ c · ℓ. Par conséquent c ∈ V(id) comme attendu.  Si une classe c ordonnée n’est pas spéciale alors soit les points p0 , p1 et p2 sont alignés, soit ils forment le support d’une application quadratique, soit les points p1 et p2 sont adhérents à p0 et n − λ0 − λ1 − λ2 ≥ 0. Par positivité des excès en p0 (Définition 2.1.3)) il n’y a pas d’autre possibilité. P Proposition 3.6. Soit c = nℓ − i∈I λi epi ∈ E une classe ordonnée. 1) Si les points p0 , p1 et p2 sont alignés alors n− λ0 − λ1 − λ2 ≥ 0 et c ∈ V(id). 2) Si les points p0 , p1 et p2 sont le support d’une application quadratique alors la classe c appartient à V(id) si et seulement si n − λ0 − λ1 − λ2 ≥ 0. 3) Si les points p1 et p2 sont adhérents à p0 et si n − λ0 − λ1 − λ2 ≥ 0 alors c ∈ V(id). Remarque 3.7. Une classe c ordonnée et non spéciale qui appartient à V(id) a un degré supérieur ou égal à la somme de ses trois plus grandes multiplicités : n − λ0 − λ1 − λ2 ≥ 0. Démonstration. 1) Le premier point découle des lemmes 3.3 et 3.5. 2) Soit q une application quadratique ayant p0 , p1 et p2 comme points-base. Si c ∈ V(id), la définition de cellule de Voronoï implique qu’en particulier, −1 q# (c) · ℓ = c · q# (ℓ) ≥ c · ℓ. Le lemme 3.3 permet d’obtenir l’inégalité souhaitée. La réciproque découle du lemme 3.5. 3) Le troisième point découle du lemme 3.5.  Comme nous le verrons dans les exemples 3.27 et 3.28, il existe des classes spéciales appartenant à V(id). Par conséquent, la caractérisation précédente, à savoir que la somme des trois plus grandes multiplicités d’une classe ordonnée doit être inférieure ou égale au degré de la classe pour que celle-ci appartienne à V(id), ne caractérise pas toutes les classes de V(id). Ceci nous obligera par la suite à faire une disjonction de cas suivant si les classes sont spéciales ou non. De plus, il est difficile d’obtenir un critère aussi simple que dans le cas des classes non spéciales pour vérifier qu’une classe spéciale appartient à V(id). Le théorème 3.8 permet de réduire les applications birationnelles à tester pour vérifier qu’une classe spéciale est dans V(id). Il suffit de faire agir les applications de caractéristique Jonquières ayant comme point-base maximal le point correspondant à la plus grande multiplicité de c. En fait ce n’est pas si surprenant que le cas des classes spéciales soit PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 30 plus compliqué que le cas des classes non spéciales. Les trois premiers points du support des classes spéciales sont précisément dans la configuration qui avait été oubliée par M. Noether et qui ont posé problème dans sa preuve du théorème de Noether-Castelnuovo (voir le commentaire fait après le théorème 1.22). P Théorème 3.8. Soit c = nℓ − i∈I λi epi ∈ E une classe spéciale ordonnée. 1) La classe c est dans V(id) si et seulement si pour toute application de Jonquières j et de point-base maximal p0 nous avons j# (c) · ℓ ≥ c · ℓ. 2) De plus, si c ∈ V(id) ∩ V(f ) alors f est une application de caractéristique Jonquières dont l’inverse a comme point-base maximal p0 . En notant pi1 , . . . , pi2d−2 les petits points-base de f −1 , c vérifie : X 1 n = λ0 + λi . d−1 i∈{i1 ,...,i2d−2 } Si f est une application de caractéristique Jonquières alors elle envoie un pinceau de droites sur un autre pinceau de droites. Par conséquent, en la pré-composant par un automorphisme, c’est une application de Jonquières. Ainsi il existe un représentant de f qui est une application de Jonquières. Le reste de cette section est consacré à la preuve de ce théorème, et sera complété par deux exemples de classes spéciales. La démonstration est technique et est décomposée en faits pour faciliter la lecture. L’implication rapide est faite en premier. Pour montrer la réciproque, l’astuce est d’écrire la condition f# (c) · ℓ ≥ c · ℓ, sous forme d’une somme mettant en jeu les multiplicités de c qui sont supportées par les points-base de f de sorte que tous les termes de la somme soient positifs. Démonstration. Prouvons dans un premier temps le point 1). L’implication découle de la définition de cellule de Voronoï. En effet, une classe est dans la cellule associée à l’identité si et seulement si pour toute application f ∈ Bir(P2 ), f# (c) · ℓ ≥ c · ℓ. Par conséquent, si c ∈ V(id) alors en particulier, pour toute application de Jonquières j de point-base maximal p0 nous avons : j# (c) · ℓ ≥ c · ℓ. Intéressons nous à la réciproque du point 1). Supposons que pour toute application de Jonquières j de point-base maximal p0 , nous ayons : j# (c) · ℓ ≥ c · ℓ. (3.9) 2 Nous devons montrer que pour toute application f ∈ Bir(P ), 2 f# (c) · ℓ ≥ c · ℓ. Fixons f ∈ Bir(P ) de degré d dont les r points-base {pi } sont de multiplicité respective {mi }. La numérotation est induite par celle déjà faite sur les points pi du support de c : i ≤ j si et seulement si λi ≥ λj . Rappelons que si le point pi n’est pas dans le support de c alors nous posons λi = 0. D’après l’égalité (3.1) et le PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 31 lemme 3.2, et en gardant ses notations, nous devons montrer que la somme suivante est positive : X X n − λi − λj − λk ≥ 0. (⋆⋆) mi λi = (d − 1)n − pi ∈supp(f ) {{i,j,k}}∈T Le reste de la preuve consiste à choisir, lorsque c’est possible, les triplets de T de sorte que chaque terme soit positif. Lorsque ça ne sera pas le cas, nous partitionnerons également E avec des sous-ensembles de tailles différentes afin d’obtenir également des sommes de termes positifs. Fait 3.10. Pour tout triplet d’indices {i1 , i2 , i3 } tels que 0 < i1 < i2 ≤ i3 , nous avons : n − λi1 − λi2 − λi3 ≥ 0. De plus, si ce terme est nul alors pour tout 1 ≤ j ≤ i3 , λj = n − λ0 . Démonstration. Comme la classe c est spéciale les points p1 et p2 sont adhérents à p0 . Par positivité des excès en p0 pour c et par l’inégalité de Bézout pour la droite passant par les points p0 et p2 , nous avons : λi1 + λi2 + λi3 ≤ λ1 + 2λ2 ≤ λ0 + λ2 ≤ n. 2.1.3) 2.1.4) Si n − λi1 − λi2 − λi3 = 0 alors en considérant le cas d’égalité dans les inégalités ci-dessus nous obtenons λi3 = λ2 = n − λ0 . Nous concluons par décroissance des λi .  Fait 3.11. Si le point p0 n’est pas un point-base de multiplicité maximale pour f alors f# (c) · ℓ > c · ℓ. Démonstration. Si le point p0 n’est pas un point-base de multiplicité maximale pour f , alors il existe un point-base de f dans P2 , noté pr , tel que d−1 ≥ mr > m0 . 1.13.3) Nous posons comme convention que si p0 n’est pas un point-base de f , m0 = 0. Nous pouvons réécrire le terme de gauche de (⋆⋆) : X mi λi = m0 (n − λ0 − λr ) (d − 1)n − pi ∈supp(f ) + (d − 1 − m0 )n X mi λi − pi ∈supp(f ) i∈{0,r} / − (mr − m0 )λr . Nous complétons la seconde ligne à l’aide des (mr − m0 ) λr restants. C’est possible puisque nous avons vu que d − 1 ≥ mr . En répartissant les λi de la troisième ligne nous obtenons une partition en triplets similaire à celle du lemme 3.2. Cependant, comme nous avons imposé que certains triplets sont composés des indices 0 et r et d’autres d’indice r nous devons vérifier que c’est encore possible de former des triplets d’indices deux à deux disjoints. Ordonnons les triplets à remplir avec en PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 32 premier celui où il y a un indice r imposé puis ensuite ceux où aucun indice n’est imposé. Nous ne considérons pour le moment que ces triplets là. Nous répartissons les λi de la troisième ligne à l’aide de la « répartition en suivant » vue dans la preuve du lemme 3.2 en commençant au premier triplet où aucun indice n’est imposé. Pour chaque indice i tel que mi > d − 1 − m0 , une fois les d − 1 − m0 premiers indices i répartis nous complétons les triplets contenant les indices 0 et r. Puis nous répartissons l’indice suivant à partir de là où nous nous étions arrêtés dans la répartition en suivant. Si à la fin il reste des indices nous les mettons dans les triplets commençant par les indices 0 et r. Tous les termes de la somme sont ainsi soit de la forme n − λ0 − λr − λk avec k ∈ / {0, r} soit de la forme n − λi1 − λi2 − λi3 avec 0 < i1 < i2 < i3 . Montrons que les deux types de termes sont positifs ou nuls et qu’il existe au moins un terme strictement positif. • Par le fait 3.10, les (d−1−m0) termes de la forme n−λi1 −λi2 −λi3 sont positifs ou nuls. Montrons qu’il existe au moins un de ces termes qui est strictement positif. Comme d−1 > m0 et mr > m0 , il existe un terme où λr apparaît : n−λi1 −λi2 −λr avec 0 < i1 < i2 et r ∈ / {0, i1 , i2 }. Ce terme est strictement positif. En effet, sinon par le fait 3.10, nous aurions λ1 = λr = n − λ0 , ce qui implique que n − λ0 − λ1 − λr = λ0 − n < 0. Or les points p0 et pr étant distincts dans P2 , les points p0 , p1 et pr sont soit le support d’une application quadratique, soit alignés ce qui contredit le lemme 3.3. • Intéressons-nous aux m0 autres termes : n − λ0 − λr − λk où k ∈ / {0, r}. Il existe un point pk1 tel que pk soit voisin de, ou égal à pk1 et que les points p0 , pr et pk1 soient le support d’une application quadratique ou soient alignés. Ainsi par le lemme 3.3 et par la positivité de l’excès au point pk1 (Définition 2.1.3)), nous avons : n − λ0 − λr − λk ≥ n − λ0 − λr − λk1 ≥ 0. 3.3 2.1.3) Par conséquent, avec l’ensemble des triplets T définis ainsi, les termes de (⋆⋆) sont positifs et au moins un terme est strictement positif ce qui implique que cette somme est strictement positive.  Il nous reste à étudier le cas où le point p0 est de multiplicité maximale pour f qui va se révéler être le cas le plus difficile. Considérons les sous-ensembles disjoints d’indices des points-base de f suivants : • MIN est l’ensemble des indices i tels que pi ∈ supp(f ) et est un point 0 mineur de c, c’est-à-dire λi ≤ n−λ 2 . • ADH est l’ensemble des indices i ∈ / MIN tels que pi ∈ supp(f ) et est un point adhérent à p0 . • VNA est l’ensemble des indices i ∈ / MIN tels que pi ∈ supp(f ) et est un point voisin et non adhérent à p0 . Fait 3.12. Les ensembles MIN, ADH et VNA correspondent à une partition des points-base de f hors p0 . Démonstration. Ces ensembles d’indices étant disjoints, il suffit de montrer que tout point-base de f hors p0 est indicé par un élément de ADH ∪ VNA ∪ MIN. Tous les points-base de f voisins du point p0 sont indicés par un élément de ces trois sous-ensemble. Montrons que les points de P2 ou voisins d’un point de P2 PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 33 p m2 p m1 pm pr p0 Figure 1. Les points pm1 et pm2 sont adhérents au point pm . différent de p0 sont mineurs pour c. Soit pm ∈ P2 alors les points p0 , p1 , pm sont soit alignés soit le support d’une application quadratique donc d’après le lemme 3.3 nous obtenons l’inégalité : 0 ≤ n − λ0 − λ1 − λm ≤ n − λ0 − 2λm , 3.3 qui permet de conclure que le point pm est mineur pour c. De plus, tout point pm′ voisin de pm est mineur puisque λm′ ≤ λm par positivité des excès pour c en pm et en tous les points qu’il faut éclater pour obtenir p′m (Définition 2.1.3)).  Remarquons que par définition de l’ensemble MIN, tout terme de la forme suivante est positif : n − λ0 − λi − λj ≥ 0, pour tous i, j ∈ MIN. Notons que les indices i et j ne sont pas forcément distincts. Si l’ensemble ADH est vide, il en est de même de VNA par positivité des excès pour c et pour f (Définition 2.1.3) et Proposition 1.17). Par conséquent, dans ce cas-là tous les indices hors 0 sont dans MIN et la somme de (⋆⋆) est positive car tous les termes le sont. Supposons donc que ADH est non vide. Le but dans ce qui suit est d’arranger de façon adéquate les multiplicités des points indicés par ADH et par VNA afin d’obtenir une somme dont chaque terme est positif. Fait 3.13. Chaque point voisin de p0 possède au plus un point adhérent indicé par ADH ∪ VNA, les autres, s’ils existent, sont indicés par MIN. Démonstration. Soient pm1 et pm2 deux points adhérents au point pm voisin de p0 , et tels que λm2 ≤ λm1 (voir Figure 1). Notons pr , possiblement égal au point pm , le point libre et adhérent à p0 tel que pm soit voisin de pr . Alors d’après l’inégalité de Bézout pour la droite passant par les points p0 et pr et la positivité de l’excès en pr et en pm , nous avons : 0 ≤ n − λ0 − λr ≤ n − λ0 − λm ≤ n − λ0 − λm1 − λm2 ≤ n − λ0 − 2λm2 . 2.1.4) 2.1.3) 2.1.3) Par conséquent, m2 ∈ MIN.  Remarquons que le fait 3.13 implique que les points indicés par VNA sont tous libres. En effet, si un point pm2 est satellite cela signifie que pm2 est adhérent à deux points pm1 et pm et que pm1 est également adhérent à pm (voir Figure 2). Par PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 34 p m2 p m1 pm p0 Figure 2. Le point pm2 est un point satellite. le fait 3.13 et par positivité des excès en pm1 nous obtenons que m2 ∈ MIN. Par contre, les points indicés par ADH peuvent être libres ou satellites. Remarque 3.14. Un point libre indicé par ADH est un point infiniment proche du premier ordre de p0 . De plus, tout point satellite indicé par ADH est voisin d’un point libre indicé par ADH. Par exemple sur la figure 3, les points pi1 , pi2 , pi3 et pi4 sont adhérents au point p0 . Les points pi2 et pi3 sont des points satellites et sont voisins du point pi1 qui est libre. Le point pi4 est lui aussi libre. pi3 pi2 pi1 pi4 p0 Figure 3. Une configuration de points adhérents à p0 Fait 3.15. Supposons qu’il existe un sous-ensemble {p0 , pj1 , . . . , pj2δ } de l’ensemble des points-base de f qui est le support d’une application de Jonquières ayant pour point-base maximal p0 . Notons jmin ∈ {j1 , . . . , j2δ } un indice tel que λjmin = min{λi | i ∈ {j1 , . . . , j2δ }}. Alors pour tout i ≥ jmin , l’indice i est dans l’ensemble MIN. Démonstration. Soit j une application de caractéristique Jonquières ayant cet ensemble de points comme points-base. Notons qu’elle est de degré δ + 1. Nous avons alors par hypothèse sur c : 0 ≤ j# (c) · ℓ − c · ℓ = δn − δλ0 − (3.9) (3.1) 2δ X i=1 λji ≤ δ(n − λ0 − 2λjmin ). Par conséquent l’indice jmin est dans MIN, et par décroissance des λi , c’est le cas de tous les indices plus grands que jmin .  PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 35 Fait 3.16. Parmi les points-base de f voisins de tout point libre indicé par ADH il y a au moins autant de points indicés par ADH que par VNA. En particulier, le cardinal de VNA est strictement inférieur à celui de ADH. Démonstration. Soit a0 ∈ ADH tel que pa0 est un point libre. Notons a1 ≤ · · · ≤ ak les indices de ADH et v1 ≤ · · · ≤ vr les indices de VNA tels que les points pa1 , . . . , pak , pv1 , . . . , pvr soient les voisins de pa0 . Raisonnons par l’absurde et supposons que k soit strictement plus petit que r : k < r. Par le fait 3.13, ces points forment une tour où chaque point est adhérent au précédent mais n’est adhérent à aucun autre point de la tour, excepté de p0 lorsqu’ils sont indicés par ADH (voir Figure 4). Considérons l’ensemble pré-consistant {p0 , pa0 , pa1 , . . . , pak , pv1 , . . . , pvk+1 }. D’après le lemme 1.25, il existe une application de Jonquières de degré k + 2 ayant cet ensemble de points comme points-base et p0 comme point-base maximal. Par le fait 3.15, vk+1 , . . . , vr ∈ MIN ce qui est la contradiction attendue.  pvr pv1 pak pa1 pa0 p0 Figure 4. Tour de points au-dessus de p0 S’il existe un point-base majeur de f indicé par ADH alors nous introduisons une dernière catégorie d’indice non disjointe des précédentes appelée JONQ. Construisons cet ensemble. • tous les indices de ADH correspondant à des points majeurs pour f sont dans JONQ. • Ensuite nous ajoutons un à un les indices des points majeurs de f , dans l’ordre décroissant des λi , de façon à ce que l’ensemble reste consistant à chaque étape. • Nous nous arrêtons lorsqu’il y a autant de points adhérents à p0 que de points non adhérents à p0 . Cela arrive forcément d’après le lemme 1.24. Remarque 3.17. D’après la proposition 1.26, il existe une application de Jonquières ayant p0 comme point-base maximal et possédant l’ensemble des points indicés par JONQ comme points-base de multiplicité 1. Fait 3.18. Tout point-base majeur de f non indicé par JONQ est indicé par MIN. Démonstration. Raisonnons par l’absurde et supposons qu’il existe ps un point-base majeur de f tel que s ∈ / JONQ ∪ MIN. Comme les indices de ADH sont tous dans JONQ, la seule possibilité est que s ∈ VNA. Considérons un indice r de JONQ tel PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 36 que pour tout j ∈ JONQ, λr ≤ λj . Par la remarque 3.17 et le fait 3.15, l’indice r est dans MIN et non pas dans ADH. Par conséquent, c’est l’un des derniers points ajoutés et comme nous rangeons les indices dans JONQ dans l’ordre décroissant des λi cela signifie que λs ≤ λr . Par conséquent, s appartient à MIN, ce qui nous donne la contradiction attendue.  Soit 2δ le cardinal de l’ensemble JONQ. Nous renommons par j1 , . . . , j2δ l’ensemble des indices de JONQ de sorte que mj1 ≥ · · · ≥ mj2δ et que pour tout 1 ≤ i ≤ 2δ, l’ensemble de points {pj1 , . . . , pji } muni de leur multiplicité respective est consistant. S’il n’existe pas de point-base majeur de f indicé par ADH alors JONQ est un ensemble vide et l’entier δ ainsi que les multiplicités mji seront considérés comme nuls dans les calculs qui suivent. Commençons à réorganiser l’équation (⋆⋆). Par le fait 3.12, il est possible de répartir les termes de la façon suivante : X mi λi = mj2δ (δn − δλ0 − λj1 − · · · − λj2δ ) (d − 1)n − pi ∈supp(f ) + (m0 − δmj2δ )(n − λ0 ) + (d − 1 − m0 )n − − − 2δ−1 X i=1 (mji − mj2δ )λji X (3.19) mi λi i∈(VNA∪ADH)\JONQ X mi λi . i∈MIN\JONQ Lorsque nous sommes dans le cas des trois premières lignes, les termes en les mi sont appelés les poids des termes en les multiplicités λi . Notre but, à présent, est de répartir les λi des sommes des trois dernières lignes afin que tous les termes soient positifs. Posons pour tout point-base pi de f : ( mi − mj2δ si i ∈ JONQ m̃i = . mi sinon Considérons les indices i de ADH dont la multiplicité m̃i est non nulle. Notons-les a1 , . . . , ak de sorte que m̃a1 ≥ · · · ≥ m̃ak . Faisons de même pour les indices de VNA et notons les v1 , . . . , vr de sorte que m̃v1 ≥ · · · ≥ m̃vr . Malgré le fait 3.16, k n’est pas forcément strictement supérieur à r. En effet il se pourrait qu’une situation analogue à l’exemple suivant arrive. Considérons la tour de points p0 , p1 , p2 , p3 incluse dans l’ensemble des points-base de f où chacun est adhérent au précédent, où p2 est également adhérent à p0 (voir Figure 5) et où 1, 2 ∈ ADH et 3 ∈ VNA. Si nous supposons de plus que 1, 2 ∈ JONQ, 3 ∈ / JONQ, que m1 = m2 = mj2δ et que les autres points-base de f sont dans P2 alors k = 0 alors que r = 1. Cette situation arrive si le point p3 est un point-base de f qui n’est pas majeur pour f mais qui est majeur pour c. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 37 p3 p2 p1 p0 Figure 5 Fait 3.20. Si r ≥ k > 0 alors il existe au moins r − k + 1 couples d’indices, notés (ak+t , vit )1≤t≤r−k+1 tels que tous les indices sont deux à deux distincts et pour 1≤t≤r−k+1 : • • • ak+t ∈ ADH \ {a1 , . . . , ak }, vit ∈ {vi }1≤i≤r , pvit est voisin de pak+t . Remarquons que la condition ak+t ∈ ADH \ {a1 , . . . , ak } est équivalente à ak+t ∈ ADH ∩ JONQ et m̃ak+t = 0. Remarque 3.21. L’hypothèse k > 0 est indispensable car sinon nous pourrions avoir la situation précédent le fait 3.20. Dans ce cas-là, k = 0 et r = 1. Il y a effectivement deux points indicés par ADH qui ont une multiplicité m̃i nulle mais il n’existe qu’un point indicé par VNA et voisin des points p1 et p2 . Démonstration. Notons pi1 , . . . , pin les points libres indicés par ADH. Tous les points indicés par ADH ∪ VNA sont voisins ou égaux à ces points-là d’après la remarque 3.14. Pour tout j ∈ {1 . . . , n}, considérons le point pij ainsi que ses points voisins indicés par ADH ∪ VNA. D’après le fait 3.13, ils forment une tour où chacun est adhérent uniquement au point précédent, sauf les points indicés par ADH qui sont également adhérents au point p0 . Notons kij et rij le cardinal des indices des points voisins ou égaux à pij dont la multiplicité m̃i est non nulle et qui sont respectivement indicés par ADH et VNA. Si kij ≤ rij alors d’après le fait 3.16, cela implique qu’il existe au moins rij −kij +1 points distincts de cette tour indicés par ADH qui ont une multiplicité m̃i nulle. Dans le cas où kij est non nul, rij − kij + 1 ≤ rij donc il existe au moins rij − kij + 1 points distincts de cette tour indicés par VNA qui ont une multiplicité m̃i non nulle. Si kij = 0 alors il y en a rij = rij − kij . Par conséquent dans les deux cas il existe rij − kij points distincts de cette tour indicés par VNA qui ont une multiplicité m̃i non nulle et autant indicés par ADH qui ont une multiplicité m̃i nulle. Nous pouvons en ajouter un de plus dans chaque famille lorsque kij est non nul. Notons J l’ensemble des indices j ∈ {1, . . . , n} tels que kij ≤ rij . Comme nous avons supposé k non nul cela signifie qu’il existe au moins un élément s ∈ {1 . . . , n} PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 38 tel que kis est non nul. S’il y en a plusieurs, nous en choisissons un. Posons : Cs =  P (rij − kij ) ris − kis + 1 +    j∈J si s ∈ J j6=s P    (rij − kij ) sinon . j∈J Nous avons montré que nous pouvons choisir au moins Cs couples ayant les propriétés de l’énoncé. Dans les deux cas de la définition de Cs , comme rij − kij < 0 pour j ∈ / J, nous avons r−k = X j∈J (rij − kij ) + X j ∈J / (rij − kij ) < Cs , par conséquent nous pouvons choisir r − k + 1 couples comme dans l’énoncé. Fait 3.22. Nous avons m̃a1 ≤ d−m0 2 et m̃v1 ≤  d−m0 2 . Démonstration. Montrons le résultat pour m̃a1 le résultat s’obtient de la même manière pour m̃v1 . Si le point pa1 n’est pas un point-base majeur pour f , le résultat est immédiat puisque m̃a1 = ma1 . Si le point pa1 est un point point-base majeur de f alors a1 ∈ JONQ sinon nous aurions une contradiction avec le fait 3.18 qui impliquerait que a1 ∈ MIN. Comme l’ensemble JONQ est pré-consistant, il existe un indice i dans JONQ ∩ ADH, possiblement égal à a1 tel que pa1 est voisin de pi et tel que le point pi est 0 libre. Raisonnons par l’absurde et supposons que ma1 − mj2δ = m̃a1 > d−m 2 . Par positivité de l’excès au point pi pour f (Proposition 1.17), et comme pj2δ est un point-base majeur pour f , nous avons : mi ≥ ma1 > d − m0 + mj2δ > d − m0 . 2 Nous obtenons une contradiction avec le théorème de Bézout (Proposition 1.18) en considérant la droite passant par les points p0 et pi , puisque le point pi est, par hypothèse, libre et adhérent à p0 .  Le fait 3.22 implique que d − m0 − m̃a1 − m̃v1 ≥ 0. Nous pouvons donc réarranger les termes en considérant deux cas, suivant si d − m0 − m̃a1 − m̃v1 est nul ou pas. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 39 i) Si d − m0 − m̃a1 − m̃v1 ≥ 1 alors nous répartissons les termes de (3.19) de la façon suivante : X (∗jonq ) mi λi = mj2δ (δn − δλ0 − λj1 − · · · − λj2δ ) (d − 1)n − pi ∈supp(f ) + (m0 − δmj2δ )(n − λ0 )  + m̃ak (n − λa1 − · · · − λak )     + (m̃ak−1 − m̃ak )(n − λa1 − · · · − λak−1 )  ..   .     + (m̃a1 − m̃a2 )(n − λa1 )  + m̃vr (n − λv1 − · · · − λvr )     + (m̃vr−1 − m̃vr )(n − λv1 − · · · − λvr−1 )  ..   .     + (m̃v1 − m̃v2 )(n − λv1 ) + (d − 1 − m0 − m̃a1 − m̃v1 )n X − m̃i λi . (∗λ0 ) (∗adh ) (∗vna ) (∗n ) i∈MIN Remarquons que les expressions des lignes (∗adh ) et (∗vna ) sont respectivement égales à r k X X m̃vi λvi . m̃ai λai et m̃v1 n − m̃a1 n − i=1 i=1 Si r = 0 la somme s’écrit de la même façon sans les termes de (∗vna ). De même, si k = 0 il n’y a plus les termes de (∗adh ). Montrons que les termes de chaque ligne exceptée la dernière, sont positifs. Ensuite, nous répartirons les λi où i ∈ MIN de sorte que chaque terme reste positif. ∗ Les poids sont positifs. Les points pj1 , . . . , pjδ sont adhérents à p0 , par conséquent, par décroissance des multiplicités mji et par positivité des excès en p0 pour f , nous avons : δ X m0 ≥ mji ≥ δmj2δ . 1.17 i=1 Ainsi, le poids m0 − δmj2δ est positif. Les autres poids le sont par hypothèse de décroissance des multiplicités et par hypothèse du cas i). ∗ Les termes en λi sont positifs. Le terme en λi de (∗jonq ) est positif par l’hypothèse faite sur c (équation (3.9)) et par la remarque 3.17 et l’équation (3.1). Considérons les termes de (∗adh ). En utilisant la positivité des excès en p0 pour c, nous avons pour 1 ≤ i ≤ k : n − λa1 − λa2 − · · · − λai ≥ n − λ0 > 0. 2.2 2.1.3) (3.23) Par le fait 3.16 et par positivité des excès pour c en chaque point adhérent (Proposition 2.1.3)), nous avons : X X λi ≤ λi . i∈VNA i∈ADH PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 40 Ainsi les termes de (∗vna ) sont strictement positifs, pour 1 ≤ i ≤ r : n − λv1 − λv2 − · · · − λvi ≥ n − X i∈VNA λi ≥ n − X i∈ADH λi ≥ n − λ0 > 0. 2.2 (3.24) ∗ Répartissons les λi où i ∈ MIN. Nous voulons répartir les λi où i ∈ MIN, de sorte que les termes soient comme dans le lemme 3.2, de la forme n − λi − λj − λk . Cependant, si k ≥ 4 ou r ≥ 4, certains termes (∗adh ) et (∗vna ) sont surchargés, c’est-à-dire qu’ils contiennent plus de trois multiplicités λi , par conséquent d’autres termes devront être sous-chargés. Nous répartissons ainsi les multiplicités λi où i ∈ MIN dans les termes de (∗λ0 ), (∗n ) et les deux derniers de (∗adh ) et de (∗vna ). Les termes que nous venons de compléter sont positifs par la définition de l’ensemble MIN. Nous venons de montrer que si c satisfait la condition (3.9) alors pour toute application f qui a pour point-base maximal p0 et dont les points-base satisfont i), f# (c) · ℓ ≥ c · ℓ. ii) Plaçons nous dans le cas où d − m0 − m̃a1 − m̃v1 = 0. Le fait 3.22 implique que m̃a1 = m̃v1 = d − m0 . 2 En particulier, k et r sont strictement positifs. Nous ne pouvons pas répartir les termes de la somme comme dans le cas i) puisque le poids de (∗n ) est à présent négatif : −1 − m0 − m̃a1 − m̃v1 = −1. Si r ≥ k, nous reprenons le résultat et les notations du fait 3.20. Posons J = {it }1≤t≤r−k+1 l’ensemble des indices apparaissant dans le fait 3.20. Notons J c son complémentaire. Les ensembles J et J c forment une partition de l’ensemble des indices {1, . . . , r}. Dans le cas où J c est non vide, nous notons t0 un de ses éléments. S’il est vide les termes de (∗v ) n’existent pas et λvt0 = 0. Si r < k alors J est vide et J c contient les r indices {1, . . . , r}. Par rapport à la répartition des termes dans la somme du cas i), nous voulons répartir une fois les multiplicités λvi dans d’autres termes afin que le poids de (∗n ) soit positif. Pour cela, nous surchargeons le terme (∗av ) afin de ne pas avoir à compléter les termes (∗v ). Nous arrangeons donc les termes de la somme de la façon suivante : PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA (d − 1)n − X pi ∈supp(f ) 41 mi λi = mj2δ (δn − δλ0 − λj1 − · · · − λj2δ ) + n − λa1 − λa2 − · · · − λak − λvt0 − + (m̃ak − 1)(n − λa1 − · · · − λak ) .. . t∈J c \{t0 } X λvt (∗av ) t∈J      − · · · − λak−1 )  + (m̃ak−1 − m̃ak )(n − λa1 + (m̃a1 − m̃a2 )(n − λa1 ) X (n − λ0 − λvt ) + (∗jonq )       (∗adh ) (∗v ) + (m̃vr − 1)(n − λv1 − · · · − λvr ) + (m̃vr−1 − m̃vr )(n − λv1 .. . + (m̃v1 − m̃v2 )(n − λv1 )      − · · · − λvr−1 )  + (m0 − Card(J c ) + 1 − δmj2δ )(n − λ0 ) + (d − 1 − m0 − m̃a1 − m̃v1 + 1)n X − mi λi .       (∗vna ) (∗λ0 ) (∗n ) i∈MIN Remarquons que les expressions des lignes (∗av ) et (∗adh ) sont égales à : m̃a1 n − k X i=1 m̃ai λai − λvt0 − celle de la ligne (∗v ), si elle existe, est égale à : (Card(J c ) − 1)(n − λ0 ) − et celles des lignes (∗vna ) est égale à : (m̃v1 − 1)n − r X i=1 X λvt , t∈J X λvt , t∈J c \{t0 } (m̃vi − 1)λvi . Montrons que nous pouvons compléter les termes incomplets à l’aide des λi où i ∈ MIN afin que chaque terme soit positif. ∗ Les poids sont positifs. Montrons dans un premier temps que le cardinal de J c est inférieur ou égal à k − 1 : ( r ≤k−1 si r < k Card(J c ) = . r − (r − k + 1) = k − 1 sinon En utilisant cela ainsi que la positivité des excès en p0 pour f , nous obtenons : k X X X m̃ai + mj2δ ≥ k + δmj2δ > Card(J c ) + δmj2δ . m0 ≥ mi = 1.17 i∈ADH i=1 i∈JONQ∩ADH PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 42 Ainsi le poids m0 − Card(J c ) + 1 − δmj2 δ est strictement positif. Les autres le sont par décroissance des m̃i et par l’hypothèse faite dans le cas ii). ∗ Les termes en λi sont positifs. Les termes en λi de (∗jonq ), (∗adh ) et (∗vna ) sont positifs par les mêmes arguments que dans le cas i) puisqu’ils n’ont pas changé. S’il existe, le terme de (∗v ) est positif d’après l’inégalité de Bézout (Proposition 2.1.4)). Il reste à montrer la positivité du terme en λi de (∗av ). Si ℓ ≥ k alors d’après le fait 3.20, il existe des points pak+1 , . . . , paℓ+1 adhérents à p0 , distincts des {pai }1≤i≤k et tels que pour t ∈ J, pvit est voisin de pak+t . Ainsi par positivité des excès audessus de chaque point adhérent : X X λvt ≤ λak+t . t∈J t∈J Notons pa le point libre adhérent à p0 tel que le point pvt0 est voisin de pa . Nous avons par positivité des excès pour les points p0 et pa , et par l’inégalité de Bézout : n − λa1 − · · · − λak − λvt0 − X t∈J λvt ≥ n − k X i=1 λak − X t∈J ≥ n − λ0 − λvt0 2.1.3) ≥ n − λ0 − λa 2.1.3) ≥ 0, 2.1.4) λak+t − λvt0 (3.25) et donc le terme en λi de (∗av ) est positif. Si r < k alors J est vide et nous obtenons le même résultat en utilisant la même inégalité qu’au-dessus en enlevant la somme sur J. ∗ Montrons que nous pouvons laisser incomplets les termes de (∗v ), s’ils existent. Si k = 1 alors J c est vide et il n’y a par conséquent rien à faire. Sinon le terme de (∗av ) possède k + Card(J) + 1 − 3 = k − 2 + Card(J) multiplicités λi en trop qui compensent les Card(J c ) − 1 ≤ k − 2 multiplicités manquantes. ∗ Complétons les termes de la somme avec les λi où i ∈ MIN. D’après le point précédent, les termes à compléter sont les deux dernières lignes de (∗adh ) et (∗vna ), ainsi que les termes (∗λ0 ) et (∗n ). Par la définition de MIN tous les termes complétés sont positifs. Ainsi la somme est positive comme attendue. Ceci conclut le cas ii) et donc le point 1) du théorème 3.8. Montrons maintenant le point 2) du théorème 3.8. Supposons maintenant que c ∈ V(id) ∩ V(f ). Nous voulons montrer que f est de caractéristique Jonquières dont le point-base de multiplicité maximale de l’inverse est p0 . Par définition : c · ℓ = c · f# (ℓ) = f#−1 (c) · ℓ. Ainsi, d’après le fait 3.11, le point p0 doit être un point-base de f −1 de multiplicité maximale. De plus, la somme (⋆⋆) appliquée à f −1 doit être nulle. Suivant si nous nous trouvons dans le cas i) ou dans le cas ii), nous utilisons la répartition des termes faite dans i) ou dans ii). Comme c ∈ V(id), nous avons déjà montré, dans PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 43 la première partie de la preuve, que tous les termes de ces sommes sont positifs ou nuls. Nous devons étudier à quelles conditions ils sont en fait tous nuls. a) Les points-base de f −1 ne peuvent pas satisfaire la condition du cas ii). Supposons que ce soit le cas. Alors, le terme (∗av ) est nul ce qui implique en prenant le cas d’égalité des inégalités (3.25) que λvt0 = n − λ0 . Considérons la suite minimale de points du support de f −1 , hors p0 , qu’il a fallu éclater pour obtenir pvt0 et notons-les pi1 , . . . , pik , pik+1 où pik+1 = pvt0 . Comme vt0 ∈ VNA, par positivité des excès, les indices i1 , . . . , ik appartiennent à VNA ∪ ADH. D’après le fait 3.13, chacun est adhérent uniquement au point précédent sauf les points indicés par ADH qui sont également adhérents à p0 . Notons k ′ le plus petit entier tel que pik′ ne soit pas adhérent à p0 . Considérons k ′ − 2 points de P2 (pas forcément dans le support de c) tels que deux points de cette famille ne soient pas alignés avec p0 . D’après le lemme 1.25 ces points ainsi que les points p0 , pi1 , . . . , pi′k forment le support d’une application de Jonquières j de degré k ′ . Nous obtenons la contradiction suivante en utilisant la positivité des excès au-dessus des points {pis }1≤s≤k : 0 ≤ j# (c) · ℓ − c · ℓ (3.9) ≤ (k ′ − 1)n − (k ′ − 1)λ0 − λi1 − · · · − λi′k (3.1) ≤ (k ′ − 1)n − (k ′ − 1)λ0 − k ′ λvt0 2.1.3) (3.26) = −(n − λ0 ) < 0. 2.2 Par conséquent, dans le cas ii) il n’existe pas de f telle que c ∈ V(id) ∩ V(f ). b) Les points-base de f −1 doivent donc satisfaire les conditions du cas i). Tous les termes de la somme du cas i) étant nuls, c’est en particulier le cas du terme m̃ak (n − λa1 − λa2 − · · · − λak ) de (∗adh ). Par hypothèse sur le choix de l’indice k, m̃ak est non nul, c’est donc n − λa1 − λa2 − · · · − λak qui est nul. L’équation (3.23) implique que k ≤ 2 puisque pour k = 1 et k = 2 les termes ont été complétés à l’aide des λi où i ∈ MIN. Mais le fait 3.10 implique qu’alors λi = n− λ0 ce qui est absurde puisque i ∈ MIN. Ainsi k = 0 et il n’y a pas de termes (∗adh ). Nous obtenons de même qu’il n’y a pas de termes (∗vna ). Par le fait 3.10, le terme en λi de (∗n ) est strictement positif. Par conséquent, pour que (∗n ) soit nul, il faut que son poids qui est égal à d − 1 − m0 le soit. Ceci implique que m0 = d − 1. Par conséquent f −1 est une application de caractéristique Jonquières et dont le point-base maximal est p0 d’après le point 4) du lemme 1.13. De plus, en notant pi1 , . . . , pi2d−2 les petits points-base de f −1 , la condition c · ℓ = j#−1 · ℓ se réécrit grâce à l’équation (3.1) : X 1 λi . n = λ0 + d−1 Ceci achève la preuve du théorème 3.8. i∈{i1 ,...,i2d−2 }  Exemple 3.27. Il existe des classes spéciales dans la cellule V(id). Considérons p0 ∈ P2 et deux points libres et adhérents à p0 notés p1 et p2 . Considérons la classe 1 c = (7ℓ − 4ep0 − 2ep1 − 2ep2 ). 5 Montrons qu’elle appartient à E. Elle est d’auto-intersection 1. Les excès sont positifs. Elle est positive contre l’anti-canonique. Montrons qu’elle satisfait également PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 44 la condition de Bézout. C’est clair pour les droites. Pour les coniques aussi (à noter que la seule conique passant par les trois points est la réunion de deux droites). Il existe une cubique C passant avec multiplicité 2 en p0 et avec multiplicité 1 aux points p1 et p2 . Considérons une courbe D de P2 passant avec multiplicité µi aux points pi . Nous avons alors d’après le théorème de Bézout : 3d = C · D ≥ 2µ0 + µ1 + µ2 . Par conséquent, 7d ≥ 6d ≥ 4µ0 + 2µ1 + 2µ2 . Et la condition de Bézout est vérifiée pour toute courbe. Ainsi, la classe c appartient à E (Définition 2.1). De plus, les points p1 et p2 sont adhérents à p0 et le degré de c est strictement plus petit que la somme de ses trois plus grandes multiplicités. Par conséquent, c est une classe spéciale. Montrons que c ∈ V(id). D’après le théorème 3.8, il suffit de vérifier que pour toute application j de caractéristique Jonquières dont l’inverse a pour point-base maximal p0 nous avons j# (c) · ℓ ≥ ℓ · c ⇔ c · j−1 # (ℓ) ≥ c · ℓ. Il n’existe pas d’application quadratique dont les points-base ont cette configuration (par positivité des excès). Soit q une application quadratique dont les points-base de l’inverse sont les points p0 , p1 et un troisième noté q. Dans ce cas, nous avons 1 8 7 c · q# (ℓ) = (14 − 4 − 2) = > = c · ℓ. 5 5 5 Pour tout d ≥ 3, il existe une application de Jonquières j de degré d telle que les points p0 , p1 et p2 soient des points-base de j−1 avec p0 point-base maximal. Dans ces cas, nous avons : 3d 7 1 > . c · j# (ℓ) = (7d − 4(d − 1) − 2 − 2) = 5 5 5 Par conséquent, c appartient à la cellule identité et n’appartient à aucune autre cellule. L’exemple suivant montre que les germes de cellules contenant une classe spéciale en commun avec la cellule V(id) ne sont pas forcément des applications de caractéristique Jonquières dont les points-base sont en configuration spéciale. Exemple 3.28. Reprenons la même configuration que dans l’exemple précédent. Considérons deux points p1 et p2 libres et adhérents à un point p0 ∈ P2 . Posons : 1 c = √ (7ℓ − 4ep0 − 3ep1 − ep2 ). 23 En faisant exactement les mêmes étapes que dans l’exemple précédent, excepté pour l’inégalité de Bézout où nous devons en plus remarquer que d ≥ µ1 nous montrons dans un premier temps que la classe c est dans E. Puis en faisant les mêmes calculs d’intersection, nous montrons que c appartient à V(id) et aux cellules dont le germe est une application quadratique dont les points-base de l’inverse sont les points p0 , p1 et un troisième point. De plus, c n’appartient à aucune autre cellule. 4. Cellules adjacentes à la cellule associée à l’identité Deux cellules de Voronoï sont dites adjacentes si leur intersection est non vide. Dans cette partie, nous déterminons les germes des cellules de Voronoï qui sont adjacentes à la cellule V(id) (Théorème 4.1) et nous caractérisons les classes se trouvant dans de telles intersections. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA Théorème 4.1. Soit c = nℓ − P i∈I 45 λi epi ∈ E une classe ordonnée. 1) Si c est une classe spéciale appartenant à V(id) ∩ V(f ) alors f est une application de caractéristique Jonquières dont l’inverse a pour point-base maximal p0 . De plus en notant pi1 , . . . , pi2d−2 les petits points-base de f −1 , c vérifie : X 1 n = λ0 + λi . d−1 i∈{i1 ,...,i2d−2 } 2) Dans le cas où c n’est pas une classe spéciale, quitte à permuter l’ordre des points pi qui ont même multiplicité λi , nous avons c ∈ V(id) ∩ V(f ) si et seulement si nous sommes dans l’une des trois situations suivantes. a) L’application f est quadratique, p0 , p1 et p2 sont les points-base de f −1 et n = λ0 + λ1 + λ2 où λ2 peut éventuellement être nulle. b) L’application f est de caractéristique Jonquières non quadratique, p0 est le point-base de multiplicité maximale de f −1 , les points {pi }1≤i≤2d−2 sont ses autres points-base et c = nℓ − λ0 ep0 − n−λ0 2 2d−2 X n − λ0 X epi − λi epi 2 i=1 i≥2d−1 où λ0 ≥ ≥ λi pour tout i ≥ 2d − 1. c) L’application f n’est pas de caractéristique Jonquières et possède r ∈ {6, 7, 8} points-base en position presque générale, les points {pi }0≤i≤r−1 sont les points-base de f −1 et r−1 X nX epi − λi epi c = nℓ − 3 i=0 i≥r où n 3 ≥ λi pour tout i ≥ r. Remarque 4.2. Par le lemme 1.21, les points-base de f sont en position presque générale si et seulement si il en est de même des points-base de f . Remarque 4.3. Une classe c non-spéciale qui contient seulement deux points dans son support et telle que la somme de ses deux plus grandes multiplicités est égale à son degré, appartient à une infinité de cellules de Voronoï. En effet, c est au bord de V(id) et appartient à toutes les cellules V(q) où q est une application quadratique telle que le support de c est inclus dans le support de q−1 . Ces cellules sont en nombre infini puisque il y a un nombre infini d’applications quadratiques modulo PGL(3, k). Une classe spéciale peut également appartenir à une infinité de cellules de Voronoï, comme par exemple dans 3.28. Dans les autres cas, les classes n’appartiennent qu’à un nombre fini de cellules de Voronoï. Démonstration. Si c est une classe spéciale et c ∈ V(id)∩V(f ) alors d’après le point 2) de la proposition 3.8, f −1 doit être de caractéristique Jonquières et doit avoir p0 comme point-base P de multiplicité maximale. Soit c = nℓ − λi epi ∈ E une classe non spéciale et ordonnée. La classe c ∈ V(f ) si et seulement si c · ℓ = c · f# (ℓ) = f#−1 (c) · ℓ. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 46 Notons d le degré de f −1 et mi les multiplicités de ses points-base pi . D’après l’équation (3.1) et en reprenant les notations et le résultat du lemme 3.2, il existe un ensemble T de d − 1 triplets d’indices des points-base de f −1 dont chaque triplet est formé d’indices deux à deux disjoints et tel que l’égalité ci-dessus est équivalente à X X n − λi − λj − λk . (4.4) 0 = (d − 1)n − mi λi = pi ∈supp(f −1 ) {{i,j,k}}∈T Dans la somme de droite les multiplicités λi apparaissent mi fois. Comme la classe c n’est pas spéciale, elle appartient à V(id) si et seulement si pour tout i < j < k : n − λi − λj − λk ≥ n − λ0 − λ1 − λ2 ≥ 0. 3.7 (4.5) Ainsi c ∈ V(id) ∩ V(f ) si et seulement si tous les termes de la somme de droite de (4.4) sont nuls. Si nous sommes dans l’un des trois cas a), b) ou c) alors c appartient à V(id) ∩ V(f ). Montrons à présent l’implication et supposons que c appartient à V(id) ∩ V(f ). Distinguons les cas suivant si f est une application quadratique, si f est une application de caractéristique Jonquières non quadratique et enfin si f n’est pas de caractéristique Jonquières. a) Si f est une application quadratique dont l’inverse a pour points-base pi0 , pi1 , pi2 alors la somme (4.4) s’écrit n − λi0 − λi1 − λi2 = 0. Les multiplicités λi0 , λi1 et λi2 sont les trois plus grandes multiplicités de c car sinon : 0 = n − λi0 − λi1 − λi2 > n − λ0 − λ1 − λ2 , ce qui contredirait l’équation (4.5). Ainsi, les points p0 , p1 et p2 sont les points-base de f −1 et n = λ0 + λ1 + λ2 . b) Dans le cas où f est de caractéristique Jonquières de degré strictement supérieur à 2, notons λi0 la multiplicité pour c correspondant au point-base maximal de f −1 et λi1 , . . . , λi2d−2 les multiplicités pour c correspondant aux points-base pi1 , . . . , pi2d−2 de f −1 de sorte que λi1 ≥ · · · ≥ λi2d−2 . La somme (4.4) se réécrit : 0= d−1 X j=1 (n − λi0 − λi2j−1 − λi2j ). Comme tous les termes sont positifs ou nuls, ils sont en fait nuls. Ainsi, nous n−λ obtenons que λi1 = · · · = λi2d−2 = 2 i0 . De même que précédemment pour ne pas contredire l’équation (4.5), nous devons avoir λi0 = λ0 et λ1 = λi1 comme attendu. c) Considérons enfin le cas où f n’est pas de caractéristique Jonquières. Notons λi0 , λi1 , . . . , λir−1 les multiplicités de c correspondant aux points-base pi0 , . . . , pir−1 de f −1 de sorte que λi0 ≥ λi1 ≥ · · · ≥ λir−1 . Comme f n’est pas une application de Jonquières elle est de degré au moins 4 et par le lemme 1.14.1) elle possède au moins six points-base. De plus, par les points 3) et 4), pour tout i, mi ≤ d − 2. Par conséquent, nous pouvons arranger les termes de la somme (4.4) de sorte qu’il y en ait un de la forme : n−λi0 −λi1 −λi2 et un autre de la forme : n−λir−3 −λir−2 −λir−1 où r − 3 > 2. Comme c appartient à V(f ), ils sont tous les deux nuls : n = λi0 + λi1 + λi2 = λir2 + λir−1 + λir . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 47 Par décroissance des λij cela signifie qu’ils sont tous égaux à n3 . Si maintenant ce ne sont pas les multiplicités maximales pour c cela implique en particulier que λ0 > n3 par conséquent : n n − λ0 − λ1 − λ2 < n − 3 = 0. 3 Or, ceci contredit l’équation (4.5). Ainsi, nous avons montré que si c appartient à V(id) ∩ V(f ) alors c est r′ -symétrique avec r′ ≥ r, c a pour multiplicité maximale n −1 sont inclus dans les points du support de c ayant la 3 et les points-base de f multiplicité maximale, comme attendu. De plus, d’après le lemme 2.14, une telle classe r′ -symétrique vérifie r′ ≤ 8, par conséquent f −1 ne possède pas plus de 8 points-base. Si f −1 possède quatre points-base alignés ou sept points-base sur une conique cela contredit l’inégalité de Bézout (Définition 2.1.4)) et donc cela contredit le fait que c ∈ E. De même si f −1 possède deux points-base adhérents à un même troisième point-base nous obtenons une contradiction avec la positivité des excès  (Définition 2.1.3)). La remarque 4.2 permet de conclure. Exemple 4.6. Voici des exemples de classes appartenant à l’intersection entre V(id) et une autre cellule. • La classe : ! r 2d−2 d+1 1 X d−1 2 ep ℓ− ep0 − cj = d+1 2 2 2 i=1 i appartient à V(id) ∩ V(j) où j est une application de caractéristique Jonquières de degré d dont l’inverse a pour point-base maximal p0 et pour autres points-base {pi }1≤i≤2d−2 . • La classe : r−1 X 3 1 cf = √ epi ℓ− √ 9−r 9 − r i=0 appartient à V(id) ∩ V(f ) où f −1 une application ayant au plus 8 points-base {pi }0≤i≤r−1 qui sont en position presque générale (r ≤ 8). Le corollaire 4.7 résume tous les germes des cellules adjacentes à V(id). Corollaire 4.7. L’ensemble des germes des cellules adjacentes à V(id) est constitué de toutes : 1) les applications de caractéristique Jonquières, 2) les applications ayant au plus 8 points-base, qui ne sont pas de caractéristiques Jonquières et dont les points-base de l’inverse sont en position presque générale. Remarque 4.8. Les conditions du point 2) du corollaire 4.7 sont nécessaires. Soient p0 , . . . , p4 ∈ P2 tels que trois points ne soient pas alignés. Ce sont les points-base d’une application de Jonquières j de degré 3 et de point-base maximal p0 . Soit L la droite passant par les points p1 et p2 . Considérons trois points formant le support d’une application quadratique q1 dont deux sont sur j(L) mais sont différents des points-base de j−1 . Alors l’application q1 ◦ j est une application ayant huit pointsbase dont quatre alignés et de caractéristique (6; 4, 24 , 13 ). Soit C une conique passant par les points p1 , . . . , p4 . Considérons trois points formant le support d’une application quadratique q2 qui sont sur j(C) mais qui ne sont pas des points-base de j−1 . L’application q2 ◦ j est une application ayant huit points-base dont sept sur une conique. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 48 Enfin, si maintenant nous composons l’application de Jonquières de degré trois (x, y) 7→ (y 3 − x, y) par une application quadratique dont les trois points-base sont dans P2 différents du point [1 : 0 : 0], la composée possède huit points-base dont deux adhérents à un même troisième. Ces trois applications, bien qu’ayant huit points-base, ne sont pas des germes de cellules adjacentes à l’identité d’après le corollaire 4.7. Le corollaire suivant est une conséquence du corollaire 4.7 et du lemme 1.14.2). Corollaire 4.9. Les germes des cellules adjacentes à la cellule V(id) qui ne sont pas des applications de caractéristique Jonquières sont de degré inférieur ou égal à 17. Remarquons que si V(f ) et V(g) sont deux cellules adjacentes, le segment géodésique [f# (ℓ), g# (ℓ)] n’est pas forcément inclus dans l’union des cellules V(f ) ∪ V(g). Exemple 4.10. Considérons une application f dont les points-base de l’inverse sont en position presque générale et qui a pour caractéristique (4, 33 , 13 ). Les classes dans l’intersection de V(f ) et V(id) sont 6-symétriques, ce qui n’est le cas d’aucune classe du segment [f# (ℓ), ℓ]. Par conséquent le segment traverse au moins une autre cellule de Voronoï. Cependant si f est une application de caractéristique Jonquières ou une application symétrique cela n’arrive jamais. C’est l’objet du lemme suivant. Rappelons qu’une application est symétrique si elle est de degré strictement supérieur à 1 et si les multiplicités de ses points-base sont toutes égales. Lemme 4.11. Soit f une application symétrique ou de caractéristique Jonquières. Alors nous avons l’inclusion [ℓ, f# (ℓ)] ⊂ V(id) ∪ V(f ). Démonstration. Si j est une application de Jonquières de degré d, dont l’inverse a pour point-base maximal p0 et {p1 , . . . , p2d−2 } comme petits points-base. Notons s   2d−2 X 1 epi . (d + 1)ℓ − (d − 1)ep0 − cj = 2(d + 1) i=1 Si s est une application symétrique de degré d dont l’inverse possède r points-base {p0 , . . . , pr−1 }, nous posons r   r−1 1X d+1 ℓ− ep . cs = 2 3 i=0 i Les classes cj et cs sont les normalisations des milieux des segments de l’espace de l’espace de Hilbert ambiant reliant respectivement les classes ℓ et j# (ℓ) et ℓ et s# (ℓ). Par conséquent les classes cj et cs appartiennent respectivement aux segments géodésiques [ℓ, j# (ℓ)] et [ℓ, s# (ℓ)]. L’application s−1 est aussi une application symétrique de degré d et d’après le lemme 1.15 la multiplicité de ses points-base est égale à d+1 3 . Par conséquent, elle ne peut pas posséder trois points-base alignés, ni six points-base sur une conique car sinon cela contredirait l’inégalité de Bézout (Proposition 1.18). De même, il ne peut pas y avoir deux points-base adhérents à un même troisième sinon cela contredirait la positivité des excès pour s−1 (Proposition 1.17). Ainsi en utilisant le corollaire 4.7 et le théorème 4.1, cj ∈ V(id) ∩ V(j) PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 49 et cs ∈ V(id) ∩ V(s). Ainsi, cj est à égale distance de ℓ et de j# (ℓ) et cs de ℓ et de s# (ℓ) et comme elles appartiennent respectivement aux segments géodésiques [ℓ, j# (ℓ)] et [ℓ, s# (ℓ)] ce sont les milieux de ces segments. Ainsi, ces segments sont inclus dans la réunion des deux cellules de Voronoï.  5. Cellules quasi-adjacentes à la cellule associée à l’identité Rappelons que le bord à l’infini de E est constitué des classes du bord de H∞ , c’est-à-dire des classes d’auto-intersection nulle et de degré strictement positif, qui sont limites d’une suite de classes vivant dans l’hyperplan {ℓ = 1} et proportionnelles à des classes de E. Nous définissons de même le bord à l’infini d’une cellule de Voronoï V(f ). Ce sont les classes du bord à l’infini de E qui sont limites de classes vivant dans l’hyperplan {ℓ = 1} et qui sont proportionnelles à des classes de V(f ). Deux cellules ayant une classe en commun dans leur bord à l’infini sont dites quasi-adjacentes. Dans cette section, le but est de caractériser les applications dont la cellule de Voronoï est quasi-adjacente à la cellule associée à l’identité. Avant cela, nous étudions les classes candidates à être dans de telles intersections et nous montrons au passage que les cellules adjacentes à V(id) sont quasi-adjacentes à V(id) (Corollaire 5.6). Lemme 5.1. Soit {p0 , . . . , p2d−2 } le support d’une application de Jonquières de degré d et de point-base maximal p0 . Pour tout n strictement positif et pour tout d−1 d n ≤ λ0 < n la classe : cλ0 = nℓ − λ0 ep0 − 2d−2 n − λ0 X epi ∈ Z(P2 ) 2 i=1 est d’auto-intersection positive et est proportionnelle à une classe de E. Démonstration. Pour prouver que pour tout d−1 d n ≤ λ0 < n la classe cλ0 est proportionnelle à une classe de E, nous devons montrer que cette classe satisfait les points 1), 2), 3) et 4) de la définition 2.1. Pour λ0 < n, les multiplicités de la classe cλ0 sont toutes positives et donc cette classe satisfait 2.1.1). Montrons que pour n strictement positif fixé, et pour λ0 ∈ [ d−1 d n ≤ λ0 < n[, cλ0 est d’auto-intersection positive et vérifie les points 2), 3) et 4) de la définition 2.1. • Posons  n − λ 2 0 f (λ0 ) = c2λ0 = n2 − λ20 − (2d − 2). 2 ′ Alors f (λ0 ) = −λ0 (d+1)+n(d−1). Ainsi la fonction f est croissante sur l’intervalle n(d−1) [ n3 , n(d−1) d+1 ] puis décroissante sur l’intervalle [ d+1 , n[. De plus, lim f (λ0 ) = 0. Par λ0 →n d−1 conséquent, pour d−1 d+1 n ≤ d n ≤ λ0 < n, cλ0 est d’auto-intersection positive. • La condition 2) qui est la positivité contre l’anti-canonique correspond à : 3n − λ0 − (d − 1)(n − λ0 ) ≥ 0. Elle est vérifiée sans restriction sur λ0 lorsque d = 2 et sinon λ0 doit satisfaire : n(d − 4) λ0 ≥ . d−2 De plus, pour d > 2 nous avons λ0 ≥ d−1 d n. d−1 d ≥ d−4 d−2 et cette condition est satisfaite pour PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 50 • Nous devons vérifier à quelle condition sur λ0 , les excès en tous les points du support de cλ0 sont positifs (Définition 2.1.3)). D’après la remarque 1.19, il suffit juste de regarder l’excès au-dessus du point p0 . De plus, il y a au plus d − 1 points adhérents à p0 . Nous voulons avoir : n − λ0 . λ0 ≥ (d − 1) 2 d−1 Ceci est satisfait lorsque λ0 ≥ d+1 n, ce qui est le cas lorsque λ0 ≥ d−1 d n. • Nous nous intéressons à présent à l’inégalité de Bézout (Définition 2.1.4)). Soit D une courbe de degré δ passant avec multiplicités {µi }0≤i≤2d−2 en les points {pi }0≤i≤2d−2 . Nous cherchons à savoir pour quelles valeurs de λ0 , le terme suivant est positif :  2d−2    2d−2 2d−2 1 X 1 X n − λ0 X (5.2) µi = n δ − µi + λ0 µi − µ0 . nδ − λ0 µ0 − 2 2 i=1 2 i=1 i=1 Si toutes les multiplicités {µi }1≤i≤2d−2 sont nulles alors le terme (5.2) est égal à nδ − λ0 µ0 > n(δ − µ0 ) ≥ 0 et est positif. Considérons le cas où au moins l’un des µi est strictement positif pour 1 ≤ i ≤ 2d − 2. Par positivité des excès des points par lesquels passe la courbe D il existe alors un point de P2 ou un point libre et adhérent à p0 , noté pik ∈ {pi }1≤i≤2d−2 tel que µik > 0. En considérant la droite passant par les points p0 et pik le théorème de Bézout pour la courbe D implique que δ ≥ µ0 + µik . En particulier, δ est strictement supérieur à µ0 : δ > µ0 . P2d−2 P2d−2 1 ∗ Si δ ≥ 21 i=1 µi et 2 i=1 µi ≥ µ0 alors (5.2) est positif pour tout λ0 positif donc en particulier pour d−1 < n. d n ≤ λ0P P2d−2 2d−2 1 1 ∗ Considérons le cas où δ ≥ 2 i=1 µi et 2 i=1 µi < µ0 . Alors, pour tout λ0 positif le terme (5.2) est supérieur ou égal à :   2d−2 1 X µi ≥ 0. (n − λ0 ) µ0 − 2 i=1 ∗ C’est donc en particulier le cas pour d−1 d n ≤ λ0 < n. P2d−2 P2d−2 1 1 Si δ < 2 i=1 µi alors 2 i=1 µi > µ0 . Par conséquent, pour que (5.2) soit positif, il faut que nous ayons : 1 P2d−2 i=1 µi − δ 2 . (5.3) n > λ0 ≥ nt où t = 1 P2d−2 i=1 µi − µ0 2 Cependant, le facteur t dépend de la courbe D et nous voulons un coefficient λ0 uniforme. En particulier, il ne faudrait pas qu’il existe une suite de courbes {Di } telle que la suite de facteurs {ti } associés converge vers 1. Montrons que nous pouvons majorer t indépendamment de D. Considérons une courbe C du système linéaire associé à l’application de Jonquières. En appliquant le théorème de Bézout entre C et D, nous obtenons : 0 ≤ δd − µ0 (d − 1) − Cela se réécrit : −δ ≤− 2d−2 X µi . i=1 2d−2 d−1 1 X µ0 − µi . d d i=1 (5.4) PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 51 Par conséquent, nous avons : 2d−2  1 1  2d−2 X d−1 1 X µi − µi − δ ≤ − µ0 2 i=1 d i=1 d (5.4) 2 2d−2 d−2 X d−1 µi − µ0 2d i=1 d   2d−2 d−1 1 X µi − µ0 . < d 2 i=1 = d−1 Ainsi, t est majoré par d−1 d et pour tout d n ≤ λ0 < n, λ0 satisfait l’équation (5.3). Finalement, nous avons montré que pour tout λ0 tel que d−1 d n ≤ λ0 < n, la classe cλ0 est d’auto-intersection strictement positive et est proportionnelle à une classe de E comme annoncé.  La proposition suivante fournit des exemples de cellules quasi-adjacentes à la cellule associée à l’identité. Proposition 5.5. 1) Soit j une application de caractéristique Jonquières dont l’inverse a pour point-base maximal p0 ∈ P2 . Alors, nous avons : ℓ − ep0 ∈ ∂∞ V(id) ∩ ∂∞ V(j). 2) Soit f une application dont les r ≤ 8 points-base {p0 , . . . , pr−1 } sont en position presque générale. Alors pour toute complétion en un ensemble de neuf points {p0 , . . . , p8 } en position presque générale, nous avons : 3ℓ − 8 X i=0 epi ∈ ∂∞ V(id) ∩ ∂∞ V(f ). Démonstration. 1) Soit j une application de caractéristique Jonquières de degré d dont l’inverse a pour point-base maximal p0 ∈ P2 et pour petits points-base {pi }1≤i≤2d−2 . Fixons n positif. Soit n3 ≤ λ0 < n et considérons la classe cλ0 = nℓ − λ0 ep0 − 2d−2 n − λ0 X epi ∈ Z(P2 ). 2 i=1 D’après le lemme 5.1, pour tout λ0 tel que d−1 d n ≤ λ0 < n, cette classe est d’autointersection strictement positive et est proportionnelle à une classe de E. Par conséquent, la normalisation η(cλ0 ) de la classe cλ0 introduite 2.3 est d’auto-intersection 1 et appartient à E pour tout d−1 d n ≤ λ0 < n. Le théorème 4.1 implique que η(cλ0 ) c appartient à l’intersection V(id)∩V(j). Par conséquent, la classe nλ0 est proportionnelle à une classe appartenant à l’intersection des cellules V(id) et V(j). En prenant la limite quand λ0 tend vers n nous obtenons : ℓ − ep0 ∈ ∂∞ V(id) ∩ ∂∞ V(j) comme annoncé. 2) Considérons pour tout 0 < ε ≤ 1 la classe cε = 3ℓ − r−1 X i=0 epi − (1 − ε) 8 X i=r epi . PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 52 Son auto-intersection est strictement positive : 9 − r − (1 − ε)2 (9 − r) > 0. Nous pouvons par conséquent considérer sa normalisation η(cε ) qui est d’auto-intersection 1, qui est positive contre l’anti-canonique et dont les multiplicités et le degré sont positifs. Elle vérifie donc les points 1) et 2) de la définition 2.1. Le point 3) est vérifié car pour tout 0 < ε ≤ 1, les points du support de la classe cε sont en position presque générale et par conséquent les excès sont tous positifs. Par le même argument, l’inégalité de Bézout est vérifiée pour les droites et les coniques. Il reste à vérifier que l’inégalité de Bézout est satisfaite pour les courbes D de degré d supérieur ou égal à 3 et passant avec multiplicité µi par les points pi pour 0 ≤ i ≤ 8. Comme les points {p0 , . . . , p7 } sont en position presque générale, d’après la proposition 1.20, la surface obtenue en éclatant ces points est faiblement del Pezzo. Avec le même argument que dans la preuve du corollaire 4.7, le théorème de Riemann-Roch implique que la forme anti-canonique sur cette surface correspond à un pinceau de cubiques. Par conséquent, il existe une cubique C de ce pinceau passant par le point p8 . D’après l’inégalité de Bézout appliquée aux courbes C et D, nous avons : 8 r−1 8 X X X µi . µi + (1 − ε) µi ≥ 3d ≥ i=0 i=0 i=r Cela montre que la classe cε satisfait le point 2.1.4) et achève donc de prouver que cε est proportionnelle à une classe de E. En utilisant le théorème 4.1, nous obtenons finalement que pour tout 0 < ε ≤ 1, la classe cε est proportionnelle à une classe vivant dans l’intersection V(id) ∩ V(f ). En passant à la limite quand ε tend vers 0, nous avons : 8 X epi ∈ ∂∞ V(id) ∩ ∂∞ V(f ) 3ℓ − i=0 qui est le résultat annoncé.  Corollaire 5.6. Une cellule adjacente à V(id) est quasi-adjacente à V(id). Démonstration. D’après le corollaire 4.7, il n’y a que deux sortes de cellules adjacentes à V(id), celles dont le germe est de caractéristique Jonquières et celles dont le germe est une application dont les r ≤ 8 points-base de l’inverse sont en position presque générale. Par la proposition 5.5, elles sont toutes quasi-adjacentes à V(id).  Remarque 5.7. définition du bord à l’infini ∂∞ E, nous obtenons que les classes PPar 8 de type 3ℓ − i=0 epi appartiennent à E si et seulement si l’ensemble {p0 , . . . , p8 } est en position presque générale. Lemme 5.8. Soit c ∈ ∂∞ V(id) ∩ ∂∞ V(f ). Si c n’est pas une classe spéciale alors c est une classe 1-symétrique pure ou 9-symétrique pure. Sinon c est une classe 1-symétrique. P Démonstration. Supposons c = nℓ− i∈I λi epi ordonnée. Si c est une classe spéciale alors les points p1 et p2 sont adhérents au point p0 . Par positivité des excès en p0 , la multiplicité λ1 doit être strictement plus petite que p0 . Par conséquent c est une classe 1-symétrique. Considérons maintenant le cas où la classe c n’est pas spéciale. Par définition du bord à l’infini, c est limite d’une suite de classes proportionnelles à des classes de V(id) ∩ V(f ). Quitte à prendre une sous-suite nous pouvons supposer que les classes PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 53 de cette suite sont soit toutes spéciales soit toutes non spéciales. Si ces classes sont spéciales le degré de chacune des classes de cette suite est strictement inférieur à la somme de ses trois plus grandes multiplicités. Or c n’est pas une classe spéciale donc à la limite c satisfait n = λ0 + λ1 + λ2 . Si toutes les classes de cette suite ne sont pas spéciales alors le degré de chacune est égal à la somme de ses trois plus grandes multiplicités (Théorème 4.1). Ainsi, à la limite la classe c possède la même propriété : n = λ0 + λ1 + λ2 . (5.9) Si la classe c est k-symétrique avec k ≥ 3, alors ses multiplicités maximales sont égales au tiers du degré. Nous sommes dans les conditions du lemme 2.14 et c est 9-symétrique pure. Supposons à présent que c est k-symétrique pour k ≤ 2. Comme c2 = 0, nous avons X n2 = λ2i . (5.10) i∈I Par conséquent, si λ2 = 0 il en est de même de λ1 et donc la classe c est 1-symétrique pure. Montrons que λ2 est forcément nul. Supposons le contraire. Nous avons :   X  X  λi = λ2 2n − λ2 3n − λi i≥0 (5.9) i≥3 = −n2 + λ20 + λ21 + λ22 + 2nλ2 + X (5.10) = −(n − λ2 )2 + λ20 + λ21 + 2λ22 + X i≥3 = −(λ0 + λ1 )2 + λ20 + λ21 + 2λ22 + (5.9) = −2λ0 λ1 + 2λ22 + X i≥3 λi (λi − λ2 ) i≥3 λi (λi − λ2 ) X i≥3 (5.11) λi (λi − λ2 ) λi (λi − λ2 ) Comme la classe c est k-symétrique pour k ≤ 2, λ2 < λ0 . De plus, comme les multiplicités sont décroissantes le dernier terme de (5.11) est strictement négatif. P λi puisque λ2 est strictement positif. Ceci implique qu’il en est de même de 3n − i≥0 Mais cela contredit le fait qu’une classe au bord est positive contre l’anti-canonique.  Remarquons qu’il n’existe peut-être pas de classe spéciale au bord à l’infini de V(id). Nous n’avons ni réussi à en construire une ni réussi à montrer qu’il n’en existait pas. Proposition 5.12. L’ensemble des classes non spéciales au bord à l’infini de V(id) et qui sont également dans le bord à l’infini d’une cellule quasi-adjacente à V(id) est constitué des classes suivantes : 1) ℓ − ep0 où p0 ∈ P2 , 8 P epi où les points de l’ensemble {p0 , . . . , p8 } sont en position presque 2) 3ℓ − générale. i=0 Démonstration. D’après la proposition 5.5, les cas 1) et 2) sont dans l’intersection entre le bord à l’infini de V(id) et celui d’une cellule adjacente. Le lemme 5.8 nous PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 54 dit que les seules classes non spéciales vérifiant l’hypothèse de la proposition sont 1-symétrique pure ou 9-symétrique pure. Une classe 9-symétrique pure doit avoir comme support un ensemble de 9 points en position presque générale car sinon cela  contredirait le fait que cette classe appartient à ∂∞ E (Remarque 5.7). Proposition 5.13. Soient p0 ∈ P2 et f ∈ Bir(P2 ). La classe ℓ − ep0 appartient à l’intersection ∂∞ V(id) ∩ ∂∞ V(f ) si et seulement si f est une application de caractéristique Jonquières dont l’inverse a pour point-base maximal p0 . Démonstration. L’implication indirecte découle de la proposition 5.5.1). Soit f ∈ Bir(P2 ) telle que ℓ − ep0 soit dans l’intersection ∂∞ V(id) ∩ ∂∞ V(f ). Si la cellule V(f ) est une cellule adjacente à la cellule associée à l’identité alors pour toute classe c ∈ V(id) ∩ V(f ) nous avons par convexité des cellules de Voronoï l’inclusion suivante : [c, ℓ − ep0 [ ⊂ V(id) ∩ V(f ). D’après le théorème 4.1, si f n’est pas une application de caractéristique Jonquières les classes de V(id) ∩ V(f ) sont au moins r-symétriques où r ≥ 6 est le nombre de points-base de f . Par conséquent, en notant p0 , . . . , pr les points-base de f −1 toute classe multiple d’une classe du segment géodésique [c, ℓ−ep0 [ vit dans le sous-espace vectoriel de l’espace de Picard-Manin obtenu comme intersection des hyperplans {λp0 = λp1 }, {λp0 = λp2 }, . . ., {λp0 = λpr−1 }. Or, la classe ℓ − ep0 n’appartient pas au bord à l’infini de ce sous-espace ce qui mène à une contradiction. Avec le même type d’argument nous obtenons une contradiction si nous supposons que f est une application de caractéristique Jonquières dont le point-base maximal de f −1 n’est pas le point p0 . Montrons que f ne peut pas être le germe d’une cellule quasi-adjacente non adjacente à V(id). Raisonnons par l’absurde et supposons le contraire. L’espace E est convexe et les cellules de Voronoï recouvrent E. De plus, les cellules adjacentes à la cellule V(id) et contenant la classe ℓ − ep0 sont des applications de caractéristiques Jonquières dont le point-base maximal de l’inverse est p0 . Nous pouvons par conséquent supposer que la cellule V(f ) est adjacente à une cellule V(j) où j est un représentant qui est une application de Jonquières et dont l’inverse a pour point-base maximal p0 . Faisons agir à présent l’application j−1 . Elle fixe la classe à l’infini ℓ − ep0 ainsi la cellule V(j−1 ◦ f ) est une cellule adjacente de la cellule identité et elle possède la classe ℓ − ep0 dans son bord à l’infini. Par le point précédent, nous obtenons que j−1 ◦ f est une application de caractéristique Jonquières dont l’inverse a pour point-base maximal p0 . C’est donc aussi le cas de f ce qui mène à une contradiction. Ainsi, V(f ) est forcément adjacente à V(id) et f est de caractéristique Jonquières et son inverse possède le point p0 comme point-base maximal.  Remarque 5.14. S’il existe une classe spéciale c ∈ V(id) ∩ V(f ) et si V(f ) est adjacente à V(id) alors f −1 est une application de caractéristique Jonquières dont le point-base maximal est le point de multiplicité maximale de c. Cela découle du théorème 4.1 et du fait qu’il n’existe pas une suite de classes non spéciales de V(id) ∩ V(f ) convergeant vers c puisque leur degré est égal à la somme de leurs trois plus grandes multiplicités contrairement à c. Par le même argument que dans la preuve de la proposition 5.13, ce sont les seules applications dont les cellules de Voronoï contiennent cette classe. PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 55 Lemme 5.15. Soient {p0 , . . . , p8 } un ensemble de points en position presque généP rale et c = 3ℓ − 8i=0 epi ∈ E. Soit f ∈ Bir(P2 ). Si le support de f −1 est inclus dans le support de c, alors le support de f −1 (c) contient 9 points en position presque générale et X X f#−1 (ep ). eq − f#−1 (c) = 3ℓ − q∈supp(f ) p∈supp(c) −1 p∈supp(f / ) Démonstration. Notons {mq }q∈supp(f ) (respectivement {m′p }p∈supp(f −1 ) ) les multiplicités des points-base de f (respectivement de f −1 ) et {ap,q }q∈supp(f ) les autres coefficients de la matrice caractéristique. Nous avons d’après l’équation (1.10) :    X X X  3mq − ap,q eq f#−1 (c) = 3d − m′p ℓ − q∈supp(f ) p∈supp(f −1 ) p∈supp(f −1 ) − X f#−1 (ep ). p∈supp(c) −1 p∈supp(f / ) Or d’après les égalités 1) et 5) du lemme 1.13, nous avons :  P m′p = 3  3d − p∈supp(f −1 ) P  aq,p = 1, pour tout q ∈ supp(f ) 3mq − p∈supp(f −1 ) ce qui implique que f#−1 (c) = 3ℓ − X q∈supp(f ) eq − X f#−1 (ep ) p∈supp(c) −1 p∈supp(f / ) comme attendu. Comme le groupe de Cremona préserve E et ∂∞ E, la classe f#−1 (c) appartient à ∂∞ E. D’après la remarque 5.7, cela signifie que le support de cette classe est un ensemble de points en position presque générale.  Proposition 5.16. Soit {p0 , . . . , p8 } un ensemble de points en position presque générale. L’application f satisfait 3ℓ − 8 X i=0 epi ∈ ∂∞ V(id) ∩ ∂∞ V(f ) si et seulement si f possède au plus neuf points-base et le support de son inverse est inclus dans {p0 , . . . , p8 }. P8 Démonstration. Posons c = 3ℓ − i=0 epi . D’après la proposition 5.12 elle appartient au bord à l’infini de V(id). Montrons la réciproque. Si le support de f −1 est inclus dans le support de c alors le lemme 5.15 implique que la classe f#−1 (c) est une classe 9-symétrique pure dont le support est constitué de 9 points en position presque générale. Par la proposition 5.12, nous obtenons que la classe f#−1 (c) appartient au bord à l’infini de V(id). Par conséquent, c appartient au bord à l’infini de V(f ) et nous pouvons en conclure que comme attendu. c ∈ ∂∞ V(id) ∩ ∂∞ V(f ), PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 56 Montrons l’implication directe, elle se prouve P8comme l’implication de la proposition 5.13. Soit f ∈ Bir(P2 ) tel que c = 3ℓ − i=0 epi ∈ ∂∞ V(id) ∩ ∂∞ V(f ). Si f est le germe d’une cellule adjacente à la cellule V(id), par convexité des cellules de Voronoï nous obtenons pour tout x ∈ V(id) ∩ V(f ) : [x, c[ ⊂ V(id) ∩ V(f ). D’après le théorème 4.1, toute classe multiple d’une classe de [x, c[ vit dans le sousespace de Picard-Manin obtenu comme intersection d’hyperplans déterminés par les points-base de f −1 . Par conséquent c vit dans le bord à l’infini de l’intersection entre ce sous-espace et E. Ceci implique que l’ensemble des points-base de f −1 est inclus dans l’ensemble {p0 , . . . , p8 }. Supposons maintenant que f n’est pas la germe d’une cellule adjacente à l’identité. Comme le pavage de Voronoï recouvre E qui est de plus convexe, nous pouvons supposer qu’il existe g ∈ Bir(P2 ) telle que V(g) soit adjacente à V(id) et à V(f ) et que V(g) possède la classe c dans son bord à l’infini. Par le point précédent, le support de g −1 est inclus dans le support de c. Faisons agir g −1 . D’après le lemme 5.15, X X −1 −1 g# (ep ) eq − g# (c) = 3ℓ − q∈supp(g) p∈supp(c) −1 p∈supp(g / ) et son support est constitué de 9 points en position presque générale. D’après ce que nous avons montré dans le paragraphe précédent, les points-base de l’inverse −1 de g −1 ◦ f sont contenus dans le support de g# (c). Les points-base de f −1 ◦ g sont inclus dans l’union de l’ensemble des points-base de g et de l’ensemble des points images par g −1 des points-base de f −1 qui ne sont pas des points-base de g −1 . Par conséquent les points base de f −1 sont inclus dans le support de c comme attendu.  Le corollaire suivant se déduit de la remarque 5.14 et des propositions 5.12, 5.13 et 5.16. Corollaire 5.17. L’ensemble des germes des cellules quasi-adjacentes à V(id) est constitué de : • toutes les applications de caractéristique Jonquières, • de toutes les applications ayant au plus 9 points-base et dont les points-base de l’inverse sont en position presque générale. Corollaire 5.18. Soient f, g ∈ Bir(P2 ) telles que les cellules V(f ) et V(g) soient quasi-adjacentes à la cellule associée à l’identité. Notons p0 , . . . , pk−1 l’union des points-base de f −1 et de g −1 . Les trois cellules V(id), V(f ) et V(g) ont une classe commune dans leur bord à l’infini si et seulement si nous sommes dans l’un des deux cas suivants : • f −1 et g −1 sont deux applications de caractéristique Jonquières ayant le même point-base maximal, ou un même point-base maximal dans le cas où l’une est quadratique, • les points {p0 , . . . , pk−1 } sont en position presque générale et k ≤ 9. Démonstration. Supposons que les cellules V(id), V(f ) et V(g) possèdent une classe c commune au bord à l’infini et que f −1 et g −1 ne soient pas des applications de caractéristique Jonquières ayant le même point-base maximal. Si la classe c PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 57 est spéciale alors par la remarque 5.14, les applications f et g doivent être des applications de Jonquières de même point-base ce qui contredit notre hypothèse. La classe c n’est donc pas spéciale. Ainsi, la proposition 5.12 nous dit qu’il n’y a que deux possibilités pour cette classe. Les propositions 5.13 et 5.16 impliquent que c est une classe 9-symétrique pure dont le support contient les supports de f −1 et de g −1 : c = 3ℓ − 8 X i=0 epi ∈ ∂∞ V(f ) ∩ ∂∞ V(g) ∩ ∂∞ V(id). Ainsi, k ≤ 9 et, d’après la remarque 5.7, les points du support de c (et par conséquent {p0 , . . . , pk−1 }) sont en position presque générale. Montrons la réciproque. Si f −1 et g −1 sont des applications de caractéristique Jonquières et de même point-base maximal p0 alors la classe ℓ − ep0 appartient au bord à l’infini des trois cellules par la proposition 5.5.1). Considérons le cas où f −1 et g −1 ne sont pas des applications de caractéristique Jonquières ayant même pointbase maximal. Notons {p0 , . . . , pk−1 } l’union des points-base de f −1 et de g −1 , et supposons que cet ensemble soit en position presque générale et k ≤ 9. Alors nous pouvons compléter cette famille de sorte que {p0 , . . . , p8 } soit un ensemble de points 8 P en position presque générale. D’après la remarque 5.7, la classe 3ℓ− epi appartient i=0 au bord à l’infini de V(id), et d’après la proposition 5.16 nous obtenons qu’elle appartient également au bord à l’infini de V(g) et de V(f ) comme annoncé.  Références M. Alberich-Carramiñana – Geometry of the plane Cremona maps, Lecture Notes in Mathematics, vol. 1769, Springer-Verlag, Berlin, 2002. [Ale16] J. W. Alexander – « On the factorization of Cremona plane transformations », Trans. Amer. Math. Soc. 17 (1916). [BC16] J. Blanc & S. Cantat – « Dynamical degrees of birational transformations of projective surfaces », J. Amer. Math. Soc. 29 (2016), no. 2, p. 415–471. [BFJ08] S. Boucksom, C. Favre & M. Jonsson – « Degree growth of meromorphic surface maps », Duke Math. J. 141 (2008), no. 3, p. 519–538. [Can11] S. Cantat – « Sur les groupes de transformations birationnelles des surfaces », Annals of Mathematics. Second Series 174 (2011), p. 299–340. , « The Cremona groups », À paraître dans Proceedings of 2015 Summer Institute [Can17] on Algebraic Geometry, AMS Proceedings of Symposia in Pure Mathematics (2017). [CL13] S. Cantat & S. Lamy – « Normal subgroups in the Cremona group », Acta Math. 210 (2013), p. 31–94. [DGO17] F. Dahmani, V. Guirardel & D. Osin – « Hyperbolically embedded subgroups and rotating families in groups acting on hyperbolic spaces », Mem. Amer. Math. Soc. 245 (2017), no. 1156, p. v+152. [Dol12] I. V. Dolgachev – Classical algebraic geometry, Cambridge University Press, Cambridge, 2012, A modern view. [Fav10] C. Favre – « Le groupe de Cremona et ses sous-groupes de type fini », Astérisque (2010), no. 332, p. Exp. No. 998, vii, 11–43, Séminaire Bourbaki. Volume 2008/2009. Exposés 997–1011. [Lon16] A. Lonjou – « Non simplicité du groupe de Cremona sur tout corps », Ann. Inst. Fourier 66 (2016), no. 5, p. 2021–2046. [Lon17] , Groupe de Cremona et espaces hyperboliques, Thèse, 2017. [Sha94] I. R. Shafarevich – Basic algebraic geometry. 1, second éd., Springer-Verlag, Berlin, 1994, Varieties in projective space, Translated from the 1988 Russian edition and with notes by Miles Reid. [AC02] PAVAGE DE VORONOÏ ASSOCIÉ AU GROUPE DE CREMONA 58 Universität Basel, Departement Mathematik und Informatik, Spiegelgasse 1„ 4051 Basel, Switzerland E-mail address: [email protected]
4math.GR
arXiv:1402.3488v2 [cs.DS] 17 Sep 2015 A Unifying Model for Representing Time-Varying Graphs Klaus Wehmuth National Laboratory for Scientific Computing (LNCC) Av. Getúlio Vargas, 333 25651-075 – Petrópolis, RJ – Brazil [email protected] Eric Fleury ENS de Lyon / INRIA – Université de Lyon UMR CNRS – ENS Lyon – UCB Lyon 1 – INRIA 5668 46, allée d’Italie 69364 – Lyon Cedex 07, France [email protected] Artur Ziviani National Laboratory for Scientific Computing (LNCC) Av. Getúlio Vargas, 333 25651-075 – Petrópolis, RJ – Brazil [email protected] Abstract Graph-based models form a fundamental aspect of data representation in Data Sciences and play a key role in modeling complex networked systems. In particular, recently there is an ever-increasing interest in modeling dynamic complex networks, i.e. networks in which the topological structure (nodes and edges) may vary over time. In this context, we propose a novel model for representing finite discrete Time-Varying Graphs (TVGs), which are typically used to model dynamic complex networked systems. We analyze the data structures built from our proposed model and demonstrate that, 1 for most practical cases, the asymptotic memory complexity of our model is in the order of the cardinality of the set of edges. Further, we show that our proposal is an unifying model that can represent several previous (classes of) models for dynamic networks found in the recent literature, which in general are unable to represent each other. In contrast to previous models, our proposal is also able to intrinsically model cyclic (i.e. periodic) behavior in dynamic networks. These representation capabilities attest the expressive power of our proposed unifying model for TVGs. We thus believe our unifying model for TVGs is a step forward in the theoretical foundations for data analysis of complex networked systems. 1 Introduction Data representation is a fundamental aspect in the field of Data Science [1, 2, 3]. In this context, graph models for representing complex networked systems find broad applicability in several different areas, ranging from techno-social systems [4] to computational systems biology [5]. In a typical graph model, nodes denote objects of the domain of interest (e.g., individuals or genes), and edges express interactions between these objects. Characteristics of objects and their interactions can be represented as node and edge properties, in a similar way to the attributes of relations. Indeed, advanced graph analytics is at the core of the new field of Network Science [6, 7, 8]. Much of the utility of the graph abstraction, however, actually resides in the fact that it can represent relations between a set of objects as well as their connectivity properties, which derive from the notion of paths in a straightforward way without the need of further assumptions that are not explicit in the graph abstraction itself. Based upon graph representations, there is a lot of studies focused on investigating dynamic processes, such as random walks or information diffusion, over complex networks represented by graphs [9, 10, 11, 12]. More recently, there is an ever-increasing interest in investigating not only the process dynamics on networks, but also the dynamics of networks, i.e. when the network structure (nodes and edges) may vary over time [13, 14, 15, 16]. Indeed, Braha and Bar-Yam [17] indicate that new insights can be obtained from the dynamical behavior, including a dramatic time dependence of the role of nodes that is not apparent from static (time aggregated) analysis of node connectivity and network topology. Analyzing the dynamics of networks, however, brings a difficulty since the original graph abstraction was not created considering time 2 relations between nodes. As a consequence, the need to extend the basic graph abstraction to include time relations between nodes arose, leading to many models for representing Time-Varying Graphs (TVGs), also known in the literature as temporal or time-dependent networks [18, 20, 19, 21, 22, 23, 24, 25, 26]. Although recent TVG models appear extending the basic graph concept to include time relations (Section 4 discusses related work), they are nonetheless not general enough to satisfy the needs of different complex networked systems and also in many cases rely on assumptions that are not explicitly expressed in the model. For instance, in models based on snapshots (i.e., a series of static graphs), as those in [20, 19], it is implicitly assumed that a node in a given snapshot is connected to ‘itself’ in the next snapshot, making it possible to extend the transitivity of edges over time. This assumption, however, is not made explicit in the snapshot model. Therefore, when analyzed without this implicit assumption, a snapshot model is a sequence of disconnected graphs and therefore no connectivity is possible between different time instants. The need to handle this assumption, which is not explicitly part of the model, brings difficulties since the structure of the model by itself is no longer sufficient to properly represent its behavior, making the semantics, applicability, interpretation, and analysis of such models more complex. In this paper, we propose a new unifying model for representing finite discrete TVGs. Our proposed model is sufficiently general to capture the needs of distinct dynamic networks [20, 19, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31], whereas not requiring any further assumption that is not already explicitly contained in the model itself. Further, our model aims at preserving the strictly discrete nature of the basic graph abstraction, while also allowing to properly represent time relations between nodes. The model we propose is based upon our recent work [32, 33], which shows that structures such as multilayer and timevarying networks are in fact isomorphic to directed static graphs. Our proposal in this paper, however, is specifically tailored for use with TVGs. Furthermore, we also demonstrate the unifying properties of our proposed model for representing TVGs by describing how it represents several previous (classes of) models for dynamic networks found in the recent literature, which in general are unable to represent each other. In contrast to previous TVG models, our proposal is able to intrinsically model cyclic (i.e. periodic) behavior in complex dynamic networks. These representation features attest the expressive power of our proposed unifying model for TVGs. Finally, we also demonstrate that, for most practical cases, the asymptotic memory complexity of our TVG model is determined by the cardinality of the set of edges in the model. We thus believe our unifying model for 3 TVGs is a step forward in the theoretical foundations for data analysis of complex networked systems.1 This paper proceeds as follows. Section 2 introduces our proposed unifying model for representing TVGs and its main properties. Section 3 discusses data structures to properly represent TVGs using our model. In Section 4, we show how our unifying model can be used to represent previous models for dynamic networks while these models in general are unable to represent each other. Finally, we conclude in Section 5. 2 Proposed model for representing TVGs The TVG model we introduce in this paper is a particular case of a MultiAspect Graph (MAG) [32], in which the vertices and time instants are the key features (i.e., aspects) to be represented by the model. A MAG is a structure capable of representing multilayer and time-varying networks, while also having the property of being isomorphic to a directed graph. The MAG structural form is similar to the multilayer structure recently presented by [35], since in both cases the proposed structure has a construction similar to an even uniform hypergraph associated with an adjacency concept similar to the one of simple directed graphs. Formally, a MAG can be defined as an object H “ pA, Eq, where E is a set of edges and A is a finite list of sets, each of which is called an aspect. In our case, for modeling a TVG, we have two aspects, namely vertices and time instants, i.e. |A| “ 2. For the sake of simplicity, this 2-aspect MAG can be regarded as representing a TVG with an object H “ pV, E, T q, where V is the set of nodes, T is the set of time instants, and E Ď V ˆ T ˆV ˆ T is the set of edges. As a matter of notation, we denote V pHq as the set of all nodes in H, EpHq the set of all edges in H, and T pHq the set of all time instants in H. An edge e P EpHq is defined as an ordered quadruple e “ pu,ta , v,tb q, where u, v P V pHq are the origin and destination nodes, respectively, while ta ,tb P T pHq are the origin and destination time instants, respectively. Therefore, e “ pu,ta , v,tb q should be understood as a directed edge from node u at time ta to node v at time tb . If one needs to represent an undirected edge in the TVG, both pu,ta , v,tb q and pv,tb , u,ta q should be in EpHq. We also define four canonical projections, each projection mapping a dynamic edge into each one of its components: 1A preliminary version of this paper appears as a technical report [34]. 4 π1 : EpHq Ñ V pHq pu,ta , v,tb q ÞÑ u, π2 : EpHq Ñ T pHq pu,ta , v,tb q ÞÑ ta , π3 : EpHq Ñ V pHq pu,ta , v,tb q ÞÑ v, π4 : EpHq Ñ T pHq pu,ta , v,tb q ÞÑ tb . An edge e “ pu,ta , v,tb q in our model may be classified into four classes depending on its temporal characteristic: 1. Spatial edges connect two nodes at the same time instant, e is in the form of e “ pu,ta , v,ta q, where u ‰ v; 2. Temporal edges connect the same node at two distinct time instants, e is in the form of e “ pu,ta , u,tb q, where ta ‰ tb ; 3. Mixed edges connect distinct nodes at distinct time instants, e is in the form of e “ pu,ta , v,tb q, where u ‰ v and ta ‰ tb ; 4. Spatial-temporal self-loop edges connect the same node at the same time instant, e is in the form of e “ pu,ta , u,ta q. The definition of a TVG H is as general as possible and does not impose any order on the time set T pHq. One may, however, stick to the classical time notion and impose a total order on T pHq. In this context, where T pHq has a linear order, both mixed or temporal dynamic edges e “ pu,ta , v,tb q can also be classified as progressive or regressive depending on the order of their temporal components. Dynamic edges that are originated at an earlier time instant and destined to a later time instant are progressive (ta ă tb ), whereas dynamic edges originated at a later time instant and destined to an earlier time instant are regressive (ta ą tb ). 5 Regressive edges are particularly useful for creating cyclic TVGs, which in turn can be applied to model networks with a cyclic periodic behavior. Further, we define a temporal node as an ordered pair pu,ta q, where u P V pHq and ta P T pHq. The set V T pHq of all temporal nodes in a TVG H is given by the cartesian product of the set of nodes and the set of time instants, i.e. V T pHq “ V pHq ˆ T pHq. As a notation note, a temporal node is represented by the ordered pair that defines it, e.g. pu,ta q. The usage of the object H “ pV, E, T q to represent a TVG is formally described in the technical report [34]. Therein, the representation of the TVG based on temporal nodes is proven to be isomorphic to a directed static graph. This is an important theoretical result since this allows the use of the isomorphic directed graph as a tool to analyze both the properties of a TVG and the behavior of dynamic processes over a TVG, as done is this work. This model is then shown to unify the representation of several previous (classes of) models for TVGs of the recent literature, which in general are unable to represent each other, as we show in further detail in Section 4. 3 Algebraic representations and structures In this section, we discuss ways to properly represent a TVG using our proposed model. Similarly to static graphs, a TVG can be fully represented by an algebraic structure, like the MAG structure from which our TVG model is derived [33]. We thus first present a TVG algebraic representation based on the adjacency tensor in Section 3.1. In this work, we adopt matrix-based representations, in particular the adjacency matrix (Section 3.2). We also present the TVG incidence matrix in Section 3.3. In order to illustrate such representations, we use the TVG W presented in Figure 1, where spatial edges are represented by solid arrows and temporal edges by dashed arrows. Finally, in Section 3.4, we analyze the memory complexity for storing a TVG using our model. 3.1 TVG adjacency tensor The TVG adjacency tensor follows from the adjacency matrix widely used to represent static graphs. However, since the dynamic edges used in the TVG are ordered quadruples, this representation has as a consequence to be done by means of a 4th order tensor. 6 t t 0 t 1 2 0 1 0 1 0 1 2 3 2 3 2 3 Figure 1: TVG W : Example for the algebraic representation. We then define the adjacency tensor of a TVG H as a 4th order tensor ApHq with dimension |V pHq| ˆ |T pHq| ˆ |V pHq| ˆ |T pHq| that has an entry for every possible dynamic edge in H. Each dynamic edge present in the TVG H is represented by a non-zero entry in the adjacency tensor ApHq, while all other entries have a zero value. The non-zero entries represent the weight of the corresponding dynamic edge in the represented TVG. In the case of a unweighted TVG, the nonzero entries corresponding to the dynamic edges present in the TVG have value 1. u,ta The notation ApHqv,t is used to identify the entry corresponding to the dynamic b edge pu,ta , v,tb q of the TVG H. As an example, the adjacency tensor of the TVG W depicted in Figure 1 has dimension 4 ˆ 3 ˆ 4 ˆ 3, having a total of 144 entries. For instance, the pair of dynamic spatial edges connecting node 0 at time t0 to node 3 at time t0 is 3,t0 0 represented by the entries ApW q0,t 3,t0 and ApW q0,t0 , where both carry value 1 as the TVG W is unweighted. Note that, even though the TVG adjacency tensor ApHq has dimension |V pHt q|ˆ |T pHt q| ˆ |V pHt q| ˆ |T pHt q|, only the entries corresponding to dynamic edges present in the TVG H have non-zero values. 3.2 TVG adjacency matrix Since every MAG has a directed static graph that is isomorphic to it [32], the same holds for our TVG model, since it is a particular specialized case of a MAG. Consequently, it follows that the TVG can be represented by an adjacency matrix. In the more general environment represented by a MAG, a companion tuple 7 is used in order to properly identify and position each temporal node of the isomorphic graph in the adjacency matrix. Since the case we present in this work is restricted to MAGs with 2 aspects, it follows that the companion tuple is reduced to a pair, which in the first entry has the number of nodes and the second entry has the number of time instants. For instance, considering the TVG example of Figure 1, the companion tuple associated with its adjacency matrix is p4, 3q, since there are 4 nodes and 3 time instants. The function of the companion tuple is only to ensure that the order by which the temporal nodes are placed in the adjacency matrix is the one shown in Figure 2. Since in the case where the number of aspects is restricted to 2 this placement can be easily achieved, in this work we do not further mention the companion tuple. To get the TVG adjacency matrix, we only need to consider that each temporal node pu,ta q can be thought of as a node in a static graph. This static graph has |V | ˆ |T | nodes and, as a consequence, its adjacency matrix has |V | ˆ |T | ˆ |V | ˆ |T | “ |V |2 ˆ |T |2 entries. Since the non-zero entries of this matrix correspond to the dynamic edges of the TVG, further analysis show that this matrix is usually sparse and can therefore be stored in an efficient way. Figure 2: The matrix form of the adjacency tensor of TVG W . Figure 2 shows the matrix representation obtained for the illustrative TVG W 8 shown in Figure 1. From Figure 2, we highlight that the matrix form of the TVG adjacency tensor has interesting structural properties. First, each one of the four nodes (identified as 0, 1, 2, and 3) of the TVG W clearly appears as a separate entity in each of the three time instants (t0 , t1 , and t2 ) that compose the TVG W . Second, the main block diagonal (lightly shaded) contains the entries corresponding to the spatial edges at each time instant. In these three blocks the entries corresponding to the spatial edges of the TVG carry value 1. Third, the unshaded entries at the off-diagonal blocks correspond to the temporal edges. The eight progressive temporal edges present at the TVG W are indicated by the value 1 on the first superior diagonal. Finally, the dark shaded entries are the ones that correspond to the mixed edges. Since no mixed edges are present in the example TVG W , all these entries contain value 0. Further, we remark that the entries corresponding to progressive (mixed and temporal) edges are above the main block diagonal, whereas the edges corresponding to regressive edges appear below the main block diagonal. All these structural properties derive from the order adopted for representing the nodes and time instants present in the TVG and can be readily verified in the matrix form in a quite convenient way. Note that the procedure used to obtain the matrix form of the adjacency tensor is the well-known matricization or unfolding of a tensor [36]. In fact, since each entry of the matrix corresponds to an entry in the tensor, the process can be reversed, obtaining the corresponding tensor from its matrix form. 3.3 TVG incidence matrix The incidence matrix of a TVG is the incidence matrix corresponding to the directed static graph obtained though the temporal node representation presented in more detail in [34]. For instance, considering the TVG W shown in Figure 1, there is a temporal edge connecting node 0 at time t0 to node 0 at time t1 . Without loss of generality, we can label this edge as e0 and assign it the coordinate 0 for the edge dimension of the incidence tensor. As a consequence, this edge is represented in the incidence tensor by setting C00,0 “ ´1 and C10,0 “ 1. Taking the temporal edge connecting node 0 at time t1 to node 0 at time t2 and labeling it as e1 , its representation on the incidence tensor is C10,1 “ ´1 and C20,1 “ 1. By repeating this procedure for each edge in the TVG, the corresponding incidence tensor is created. Since the TVG W has 16 edges, being 8 temporal edges and 8 spatial edges, 4 nodes, and 3 time instants, the corresponding incidence tensor has a total of 4 ˆ 16 ˆ 3 “ 192 entries, from which 160 carry value 0, 16 carry value ´1, and 16 value 1. Note that the resulting matrix has 12 rows (for 3 times and 4 nodes) 9 and 16 columns, one for each edge in the TVG, totalizing 12 ˆ 16 “ 192 entries. Figure 3 shows the matrix representation of the incidence tensor corresponding to the TVG W shown in Figure 1. In this representation, the eight temporal edges present in the TVG are labeled as edges e0 to e7 and the 8 spatial edges as edges e8 to e15 . Considering this labeling, it is straightforward to verify the correspondence of the incidence tensor in matrix form to the TVG. Figure 3: The matrix form of the incidence tensor of TVG W . 3.4 Memory complexity for storing a TVG In this subsection, we analyze the memory complexity for storing a TVG. This analysis is valid for the TVG representations based on adjacency and incidence as well as their corresponding algebraic structures, which have all been discussed in Sections 3.1 to 3.3. In the general case, TVGs may have disconnected nodes or unused time instants. A disconnected node is defined as a node that has no dynamic edge incident to it, i.e. a node with no connection at any time instant. In a similar way, an unused time instant in a TVG is defined as a time instant at which there is no dynamic edge originated from or destined to it. In most practical cases, however, a TVG is expected to have none or very few disconnected nodes as well as a unused time instants as compared with the total number of nodes or time instants, respectively. We show that when a TVG has no disconnected nodes and unused time instants, or if the number of disconnected nodes and unused time instants is significantly lower than the number of dynamic edges, then the amount of storage 10 needed to represent a TVG is determined by the number of dynamic edges in the TVG. In other words, we show in this section that in most practical cases the memory complexity MC pHq for storing a given TVG H is MC pHq “ Θp|EpHq|q, where EpHq is the set of dynamic edges in the TVG H. The first step to achieve this is to show that the set of connected nodes and the set of used time instants of a TVG can be recovered from the set of dynamic edges. Lemma 1 shows this by using the dynamic edge definition and the canonical projections defined in Section 2. Lemma 1. In any given TVG H, the set of connected nodes and the set of used time instants can be recovered from the set EpHq that contains the dynamic edges of H. Proof. Let VC pHq be the set of connected nodes on TVG H. We now show that VC pHq can be constructed from the set EpHq. Since VC pHq contains only connected nodes, for every u P VC pHq there is at least one dynamic edge incident to u. Let eu P EpHq be a dynamic edge incident to node u. Then, either eu is of the form pu, ¨, ¨, ¨q or of the form p¨, ¨, u, ¨q, and therefore, either u “ π1 peu q or u “ π3 peu q. Therefore, we can write VC pHq as ď tπ1 peq, π3 pequ . VC pHq “ ePEpHq We now use a similar reasoning to recover the set of used time instants from the set EpHq. Let TU pHq be the set of used time instants in H and let tu be a used time instant. Then, there is at least one dynamic edge eu P EpHq of the form p¨,tu , ¨, ¨q or p¨, ¨, ¨,tu q such that tu “ π2 peu q or tu “ π4 peu q. Hence, we can write TU pHq as ď tπ2 peq, π4 pequ . TU pHq “ ePEpHq Since Lemma 1 shows that the both sets of connected nodes and used time instants in a given TVG H can be recovered from the set of dynamic edges EpHq, we can conclude that such information is redundant and does not need to be stored to represent a TVG. Therefore, to represent any given TVG H, it suffices to store the set of dynamic edges EpHq as well as the sets of disconnected nodes and unused time instants of the TVG. 11 We now demonstrate in Theorem 1 that when the sets of disconnected nodes and unused time instants of a TVG are significantly smaller than the set of dynamic edges, which is actually expected in most practical cases, then the asymptotic memory complexity of the TVG representation is determined by the cardinality of the set of dynamic edges. Theorem 1. If the set of disconnected nodes and the set of unused time instants are smaller than the set of dynamic edges, then the memory complexity MC pHq for storing a given TVG H is determined by the size of the set of dynamic edges, i.e. MC pHq “ Θp|EpHq|q. Proof. Let H be an arbitrary TVG, EpHq its set of dynamic edges, VC pHq its set of connected nodes, VN pHq its set of disconnected nodes, TU pHq its set of used time instants, TN pHq its set of unused time instants, and MC pHq the memory complexity for storing the TVG H. Note that V pHq “ VC pHqYVN pHq and T pHq “ TU pHq Y TN pHq, whereas VC pHq XVN pHq “ H and TU pHq X TN pHq “ H. Since Lemma 1 shows that VC pHq and TU pHq can be recovered from EpHq, it follows that to store a representation of H in memory, it suffices to store EpHq, VN pHq, and TN pHq. We now analyze the asymptotic bounds for the memory complexity for storing these sets, together with the assumption that |VN pHq| ` |TN pHq| ă |EpHq|. • Lower bound for MC pHq: Since for storing the set EpHq it is necessary at least to store an ordered quadruple for each dynamic edge e P EpHq, the memory needed is c1 ˆ |EpHq|, where c1 is an integer constant. To store the set VN pHq it is necessary to store all nodes u P VN pHq and therefore the memory needed is c2 ˆ |VN pHq|, while to store the set TN pHq it is necessary to store all time instants u P TN pHq, leading to a memory need of c3 ˆ |TN pHq|. Therefore, the total memory need is at least c1 ˆ |EpHq| ` c2 ˆ |VN pHq| ` c3 ˆ |TN pHq|, and MC pHq “ Ωp|EpHq| ` |VN pHq| ` |TN pHq|q. Finally, from our assumption that |VN pHq|`|TN pHq| ă |EpHq|, we conclude that MC pHq “ Ωp|EpHq|). • Upper bound for MC pHq: On the upper bound analysis, we see that the information to be stored is at most the same three sets EpHq, VN pHq, and TN pHq, which had to be stored in the lower bound analysis. Therefore, we conclude that MC pHq “ Op|EpHq|). Since MC pHq “ Ωp|EpHq|q and also MC pHq “ Op|EpHq|q, we finally conclude that MC pHq “ Θp|EpHq|q, if |VN pHq| ` |TN pHq| ă |EpHq|. 12 Corollary 1. The complete expression of the memory complexity for a given TVG H is MC pHq “ Θp|VN pHq| ` |TN pHq| ` |EpHq|q. Proof. It follows from the proof of Theorem 1 that the formal and complete expression of the lower bound memory complexity for storing a given TVG H is MC pHq “ Ωp|VN pHq| ` |TN pHq| ` |EpHq|q, where VN pHq its set of disconnected nodes, TN pHq its set of unused time instants, and EpHq the set of dynamic edges, while the upper bound is MC pHq “ Ωp|VN pHq| ` |TN pHq| ` |EpHq|q. We therefore conclude that complete form of the memory complexity is MC pHq “ Θp|VN pHq| ` |TN pHq| ` |EpHq|q. Since in most practical cases the amount of disconnected nodes and unused time instants is significantly smaller than the number of dynamic edges (i.e., |VN pHq| ` |TN pHq| ! |EpHq|), we can conclude that the expected amount of memory needed to store a representation of a given TVG H is determined by the size of the set of dynamic edges |EpHq|, i.e. MC pHq “ Θp|EpHq|q as states Theorem 1. Furthermore, any given TVG H for most practical applications can typically be expected to be sparse, i.e. the number of dynamic edges is significantly smaller than the squared number of temporal nodes (|EpHq| ! |V T pHq|2 ), thus allowing its storage in a compact form, similar to the compressed forms used for sparse matrices [37]. 4 A unifying TVG model In this section, we show that the TVG model we propose can be used to represent many previous models found in the literature. Further, these models are not always capable of representing each other and none of them has the same representation range of the unifying model we propose. In order to assert that all the considered models can be directly represented by our model, we show that each of these models is in fact a subset of what is representable in our model and can therefore be easily represented in our model, maintaining any previously obtained result as at least valid on a special case. To achieve this, we show that each of the studied models can be represented in our TVG model by using only a subset of the types of dynamic edges available on our model (see Section 2). We achieve this by presenting the general structure of the matrix form of the adjacency tensor of the TVG that represents the model under study. We establish a set of four nodes V “ t0, 1, 2, 3u and a set of three time instants T “ tt0 ,t1 ,t2 u to be used to illustrate all of the following analyses. This is 13 done without loss of generality, since the same procedure could be applied to any set of nodes and time instants present in a TVG. To show the representation in our model of the different TVG models found in the literature, we group them into classes that can be represented in our unifying model in similar ways and analyze these classes in the remaining of this section. 4.1 Models based on snapshots Some snapshot models for TVGs adopt an aggregate graph and a sequence of successive state sub-graphs that represent the network in a discrete way as time passes. Some examples are the models proposed by Ferreira [19] and Xuan et al. [20]. We also consider in this same class of snapshot models the models proposed by Holme [21] and Holme and Saramäki [26], where edges are represented as triples of the form pi, j,tq meaning the existence of a contact between nodes i and j at time t. Still under this same class, we also consider the models proposed by Tang et al. [23, 38, 39], as well as all other models in which the TVG is proposed as a sequence of static graphs (i.e., the snapshots), each of them representing the TVG at a given time instant. Snapshot models are widely used in the literature and in general give an intuitive and straightforward notion of TVGs. Nevertheless, the snapshot models also demand some assumptions to be made without having them explicitly constructed in the model. For instance, it is usually assumed in such snapshot models that the nodes have a sort of memory that allows the transitivity induced by the edges to propagate on each node over time. This means that a path can be constructed passing through a given node even if this node is disconnected from all others during a period of time, meaning that the node is capable of retaining the edge transitivity during the period of disconnection. Even though this behavior is straightforward and intuitively expected in many cases, it is not constructed within the model and has to be assumed as an additional (external) property of the model, resulting that this assumption has also to be incorporated into the algorithms used with those model and thus making these algorithms dependent of these external assumptions. From the analysis of the snapshot models, we remark that clearly they only use edges connecting nodes in the same given time instant. This is consistent with the concept of spatial dynamic edges proposed in our model. In this way, all the TVGs constructed in this class of snapshot models can be represented in our model by using only spatial dynamic edges, given that all the necessary nodes and time instants are present in our model. Thus, a TVG with four nodes and 14 three time instants in this class of snapshot model would be represented in our model by a TVG whose adjacency tensor in matrix form is as the one presented in Figure 4. The entries containing “*” may have non-zero values, indicating the potential presence of a spatial edges. Note that all the entries of this kind are located in the main block diagonal of the adjacency tensor in matrix form, which actually corresponds to the snapshots. Figure 4: Snapshot models represented by our unifying TVG model. In our general representation, we allow spatial and temporal self-loops (i.e. dynamic edges connecting a node to itself at the same time instant). This kind of edge is represented on the main diagonal of the matrix, just as it would be on an adjacency matrix of a static graph. Any TVG of the snapshot class can be represented in this straightforward way in our proposed unifying model. Actually, snapshot models are in fact a subspace of the representable TVGs in our model, making clear that this whole class of snapshot models is rather a subset of the representable TVGs in our model. Further, in snapshot models, each snapshot is formally disconnected from each other (although arguably implicitly connected), since the temporal connections are not explicitly constructed in the snapshot models. The number of dynamic edges used to represent a TVG of this kind is the 15 same as the number of edges present in the original snapshot-based representation. Therefore, the memory complexity for storing TVGs in our model is the same found on the original snapshot-based representation, which is compatible with the memory complexity discussed in Section 3.4. 4.2 Models based on continuous time intervals (CTI) The class discussed in this subsection includes models that use a presence function defined over continuous time intervals (i.e. t P R` ), such as the continuous time version of TVG proposed by Casteigts et al. [24]. We further assume that the presence function used in such models is constructed in such a way that every time interval (or their union) has a non-zero and finite measure. Although this assumption is not explicitly stated in the original paper, it is consistent with all examples and the reasoning present therein. It is also important to remind that the model we construct is a discrete version of the continuous time interval model that nonetheless retains all information present on the original model based on continuous time intervals. In order to represent TVGs based on continuous time intervals in our unifying model, some representations are possible depending on the target application of the model that defines the semantics associated with an edge in the TVG. An example with three possible representations is presented in Figure 5 and each of the these three representations is explained in the following. If the semantic of a time interval pta ,tb s associated with an edge e between two nodes u and v is that the edge exists from the beginning of the interval (i.e. from time ta ) until the end of the interval (i.e. until time tb ), it is possible to represent the existence of such an edge by using a mixed dynamic edge. This is consistent with the original semantics, where the edge e exists in the interval delimited by the mixed edge (i.e. from ta until tb ). A concrete example of this first representation is shown comparing Figures 5(a) and 5(b). The edge between nodes 0 and 1 present at the time interval p1, 15s shown in Figure 5(a) is represented by the mixed dynamic edge p0,t1 , 1,t15 q in Figure 5(b). Similarly, the edge between nodes 1 and 2 at the time interval p5, 7s is represented by the mixed dynamic edge p1,t5 , 2,t7 q. In the case an edge is present at different time intervals, we represent this edge by having one mixed edge for each time interval. Further, if the edge between nodes u and v is bidirectional, this edge is represented at each time interval by the pair of edges pu,ta , v,tb q and pv,ta , u,tb q. Note that once the edges present in the TVG are defined for all time intervals, it is possible to construct the set T 16 0 (1,15] 1 (5,7] 2 (a) TVG model based on continuous time intervals t1 t5 t7 t15 0 0 0 0 1 1 1 1 2 2 2 2 (b) First representation: Use of mixed edges t1 t5 t7 t15 t1 t5 t7 t15 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 (c) Second representation: Snapshots (d) Third representation: Use of temporal and spatial edges Figure 5: Converting continuous time intervals into a discrete TVG. of time instants based on the dynamic edges present in the set E. From this, we conclude that the TVGs in this class modeled by continuous time intervals can be represented in our model using only progressive mixed dynamic edges. Figure 6 shows the possible non-zero entries for a TVG with four nodes and three time instants based on the model of continuous time intervals using the first representation we are describing. Clearly from Figure 6, this kind of TVG is a subspace (and therefore a subset) of the TVGs representable by our proposed unifying model. Thus, we conclude that TVGs of this class are particular cases of the TVGs representable in our model. Even though this first representation by our model carries all information present in the original TVG based on continuous time intervals, it still relies on an assumption that is not explicitly present in this first representation. Namely, this assumption concerns that the time instants present on each mixed dynamic edge represent the time intervals on which the edge exists. Note that the same happens in the original model based on continuous time intervals. For example, using this assumption, a path between nodes 0 and 2 exists at any given time in17 Figure 6: The first representation of TVGs based on continuous time intervals. stant during the interval between t5 and t7 . To understand that this assumption is made in a manner that does not directly follows as a property of the structure of the TVG, notice that it makes the transitivity of the relation implied by an edge more difficult and cumbersome to determine. This happens because an external processing is needed to verify the presence of the edge (either by the time intervals indicated on the mixed dynamic edge or by the set of intervals on the continuous time model) in order to be able to establish its transitivity to another edge. To establish the existence of a path connecting two nodes, it is necessary to compute the intersections of the time intervals on which each edge exists. The resulting path then exists on the time interval obtained by this intersection. Therefore, the existence of a path connecting nodes in this kind of representation can be non-intuitive and computationally expensive to determine, thus impacting considerations about connectivity, reachability, communicability, and any other property derived from the transitivity of edges in a TVG. A second representation (Figure 5(c)) comes from the realization that the continuous time intervals model is in fact a continuos form of the snapshot model, in which edges are present at infinite (uncountable) time instants. Therefore, a natural way to represent the CTI model in a discrete form is to have the time instants 18 set T formed by the beginning and end instants of each interval present on the CTI model, and then placing the corresponding edge at each time instant for which an edge is present in the CTI model. The result of this is a snapshot representation of the CTI model, as shown in Figure 5(c), where the edge between nodes 0 and 1 is present at instants t0 ,t5 ,t7 , and t15 , while the edge between nodes 1 and 2 is present at instants t5 and t7 . This representation has the same characteristics we highlighted for the snapshot class of models. Although the TVG connectivity can be readily determined at each time instant, the snapshots (i.e. time instants) are formally disconnected from each other. Hence, if any sort of connectivity between time instants is to be considered, it has to be stated as an additional assumption, which is not directly encoded in the representation. A third representation (Figure 5(d)) can be derived from the second one (snapshots), by formally placing temporal dynamic edges where the connectivity between successive time instants is desired. In our example, this leads to the representation shown in Figure 5(d), where temporal nodes are used to connect nodes 0 and 1 between time instants t0 ,t5 ,t7 , and t15 and to connect nodes 1 and 2 from time instant t5 to t7 . This reflects the fact that in the original CTI model the edge p0, 1q was present at the interval pt0 ,t15 s, while the edge p1, 2q was present at the interval pt5 ,t7 s. Figure 7 shows the possible non-zero entries on the matrix form of the adjacency tensor of a TVG of this class using this third representation. Figure 7: The third representation of TVGs based on continuous time intervals. 19 In order to determine the memory complexity of representing a TVG based on continuous time intervals in our proposed unifying model, we state the following proposition, based on the third representation, presented in Figure 5(d), which uses the largest number of dynamic edges: Proposition 1. A TVG based on continuous time intervals with n nodes, m edges, and η continuous time intervals defining these edges can be represented in our model with Opη 2 q dynamic edges. Proof. For each time interval in the continuous time representation, a mixed dynamic edge is created on our model. Since each mixed edge requires two time instants to be defined, it follows that the representation in our model requires at most 2η time instants. Therefore, in our model we have |T | “ 2η in the worst case. To decompose a mixed dynamic edge into spatial and temporal dynamic edges, at most |T | spatial dynamic edges are needed to connect the two nodes on the mixed edge in all possible time instants. Further, at most 2p|T | ´ 1q temporal dynamic edges are needed to connect the nodes over all possible time instants. Therefore, to fully decompose a mixed edge, at most 2p|T | ´ 1q ` |T | “ 3|T | ´ 2 dynamic edges are needed. Hence, as η mixed dynamic edges are needed in the representation, to fully decompose them into spatial and temporal edges, at most ηp3|T | ´ 2q dynamic edges are needed. Expanding and substituting |T | “ 2η for the worst case, we have ηp3|T | ´ 2q “ ηp6η ´ 2q “ 6η 2 ´ 2η. We therefore conclude that the number of dynamic edges needed is Opη 2 q. From this, we further conclude that, for a TVG with η continuous time intervals, in our model we have |E| “ Opη 2 q. Therefore, the memory complexity of the representation based on continuous time instants is Opη 2 q, which is compatible with the memory complexity discussed in Section 3.4. 4.3 Models based on spatial and temporal edges (STE) Some models like the one proposed by Kostakos [22] are based on the idea that a class of links represent instantaneous iterations between distinct nodes while 20 other class represent a waiting state of a given node. These concepts are formalized in our proposed unifying model by spatial and temporal dynamic edges. In our model, these dynamic edges are fully formalized and can be used to make a unambiguous representation of this kind of TVG. Figure 8 depicts the entries that may be non-zero on the matrix form of the adjacency tensor of a TVG of this class having four nodes and three time instants. It is again clear that this class of TVGs can be thus represented as a subset of the TVGs that can be represented by the unifying model we propose. Figure 8: Representation of TVGs based on spatial and temporal edges. 4.4 Models based on temporal and mixed edges (TME) Some works found in the recent literature, such as the one by Kim and Anderson [25], loosely suggest the use of edges connecting nodes at different time instants. TVGs of this class can be represented in our model using only temporal and mixed dynamic edges. Figure 9 shows the matrix form of the adjacency tensor of a TVG of this class. It can be seen that this is also a particular case of the TVGs that can be represented using our unifying model. 21 Figure 9: Representation of TVGs based on temporal and mixed edges. 4.5 Overview on the unifying representation of previous models Table 1 shows a representation map that indicates if a (class of) TVG model(s) is able to represent another (class of) TVG model(s). We compare the unifying representation model we propose with the models based on (i) snapshots, (ii) continuous time intervals (CTI), (iii) spatial and temporal edges (STE), and (iv) temporal and mixed edges (TME), which have been presented in Sections 4.1 to 4.4, respectively. Snapshot models can only represent TVGs of the continuous time intervals (CTI) class, since they are in fact a continuos time version of the snapshot model. Direct representation of other models by snapshots is not possible because the snapshot model lacks the notion of temporal edges. Models based on continuous time intervals (CTI) and spatial and temporal edges (STE) can represent snapshot models because they support the notion of spatial edges as well as they are mutually able to represent each other. Models based on temporal and mixed edges (TME) are able to represent models based on continuous time intervals (CTI) in a discretized way. Remark that the converse is not true, i.e. models based on CTI are unable to 22 Table 1: Representation map between TVG models: An entry is checked if the (class of) model(s) in the row is able to represent the (class of) model(s) in the column. Snapshots CTI STE TME Unifying model Snapshots X X CTI X X X STE X X X TME X X Unifying model X X X X X represent models based on TME as they lack the notion of mixed edges. Furthermore, note that models based on TME are unable to represent in all cases models with spatial edges, such as the ones based on snapshots and STE. This is because, although a mixed edge could be seen as a composition of a spatial and a temporal edge, a mixed edge is unable to represent a single spatial edge, thus preventing the representation of these cases. Overall, we remark that considering the previous classes of TVG models, none is able to represent all others. This basically happens because the kind of edges present in one model not necessarily can be transformed into the kind of edges present in another model or class of models. In contrast, we have shown along this section that all classes of previous TVG models we consider can be represented in the unifying model we propose, whereas these previous TVG models not necessarily are able to represent each other, as shown in Table 1. Additionally, none of the previous TVG models makes use of regressive edges, which could be used in our proposal to intrinsically model cyclic (i.e. periodic) behavior in dynamic networks. Therefore, we highlight that none of the previous analyzed models have all the representation capabilities and thus the same expressive power of our proposed unifying model for TVGs. 5 Summary and outlook In this paper, we have proposed a novel model for representing finite discrete Time-Varying Graphs (TVGs). We have shown that our model is simple, yet flexible and efficient for the representation and modeling of dynamic networks. The proposed model preserves the discrete nature of the basic graph abstraction and has algebraic representations similar to the ones used on a regular graph. More23 over, we have also shown that our unifying model has enough expressive power to represent several previous (classes of) models for dynamic networks found in the recent literature, which in general are unable to represent each other, and also to intrinsically represent cyclic (i.e. periodic) behavior of dynamic networks. To further illustrate the flexibility of our model, we remark that our model can also be used to represent time schedules using a TVG. For example, in this case, the nodes can be thought of as locations and mixed edges as the amount of time taken to move between locations. Such representation can model scheduled arrivals and departures in transportation systems allowing, for instance, the evaluation whether a connection is feasible or the delivery time for logistics management. We have analyzed the proposed model proving that if the TVG nodes can be considered as independent entities at each time instant, the analyzed TVG is isomorphic to a directed static graph. This basic theoretical result has provided the ground for achieving other theoretical results that show that some properties of the analyzed TVG can be inferred from the temporal node representation of that TVG. This is an important set of theoretical results because this allows the use of the isomorphic directed graph as a tool to analyze both the properties of a TVG and the behavior of dynamic processes over a TVG. We have also demonstrated that, for most practical cases, the asymptotic memory complexity of our TVG model is determined by the cardinality of the set of edges. Further, from the basic definition of the model we proposed for representing TVGs, we have derived some basic properties such as communicability and connectivity using only properties that follow directly from the underlying structure of the model, such as the transitivity of the relation induced by the dynamic edges. As a consequence, in contrast to previous works, our model can be used without the need of external assumptions, meaning that all properties are derived from explicit properties of the TVG, in the same way that happens with static graphs. As future work, we intend to apply our proposed TVG model in the analysis of different dynamic complex networks as well as of properties over such dynamic networks. An example of such analysis is the recent work by Costa et al. [40]. In that work, authors analyze the concept of time centrality for information diffusion in dynamic complex networks using the TVG model we propose in this paper, thus investigating the relative importance of different time instants to start a information diffusion process. 24 Acknowledgment The cooperation among authors has been supported by STIC-AmSud. K. Wehmuth and A. Ziviani acknowledge that their work was partially funded by the Brazilian funding agencies CAPES, CNPq, and FAPERJ as well as the Brazilian Ministry of Science, Technology, and Innovation (MCTI). E. Fleury acknowledges the support by MILYON. References [1] V. Dhar, “Data science and prediction,” Communication of the ACM, vol. 56, no. 12, pp. 64–73, Dec. 2013. [2] C. A. Mattmann, “Computing: A vision for data science,” Nature, vol. 493, no. 7433, pp. 473–475, Jan. 2013. [3] H. V. Jagadish, J. Gehrke, A. Labrinidis, Y. Papakonstantinou, J. M. Patel, R. Ramakrishnan, and C. Shahabi, “Big data and its technical challenges,” Communications of the ACM, vol. 57, no. 7, pp. 86–94, Jul. 2014. [4] A. Vespignani, “Predicting the behavior of techno-social systems,” Science, vol. 325, no. 5939, pp. 425–428, Jul. 2009. [5] H. Kitano, “Computational systems biology,” Nature, vol. 420, no. 6912, pp. 206–210, Nov. 2002. [6] T. G. Lewis, Network science: Theory and applications. Wiley, 2009. [7] L. Kocarev, “Network science: A new paradigm shift,” IEEE Network, vol. 24, no. 6, pp. 6–9, Nov. 2010. [8] U. Brandes, G. Robins, A. McCraine, and S. Wasserman, “What is network science?” Network Science Journal, vol. 1, no. 1, pp. 1–15, Apr. 2013. [9] R. Pastor-Satorras and A. Vespignani, “Epidemic spreading in scale-free networks,” Physical Review Letters, vol. 86, pp. 3200–3203, Apr. 2001. [10] D. Kempe, J. Kleinberg, and E. Tardos, “Maximizing the spread of influence through a social network,” in Proc. of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), pp. 137–146, Aug. 2003. 25 [11] A. Barrat, M. Barthelemy, and A. Vespignani, Dynamical Processes on Complex Networks. Cambridge University Press, 2008. [12] M. Iliofotou, M. Faloutsos, and M. Mitzenmacher, “Exploiting dynamicity in graph-based traffic analysis: Techniques and applications,” in Proc. of the ACM International Conference on Emerging Networking Experiments and Technologies (ACM CoNEXT), pp. 241–252, Dec. 2009. [13] N. Ganguly, A. Deutsch, and A. Mukherjee, Eds., Dynamics on and of complex networks. Springer, 2009. [14] D. Figueiredo, P. Nain, B. Ribeiro, E. de Souza e Silva, and D. Towsley, “Characterizing continuous time random walks on time varying graphs,” ACM SIGMETRICS Performance Evaluation Review, vol. 40, no. 1, pp. 307– 318, Jun. 2012 [15] P. Holme and J. Saramäki, Eds., Temporal Networks. Springer, 2013. [16] P. Holme, “Modern temporal network theory: arXiv:1508.01303, 33 p., Aug. 2015. A colloquium,” [17] D. Braha and Y. Bar-Yam, “From centrality to temporary fame: Dynamic centrality in complex networks,” Complexity, vol. 12, no. 2, pp. 59–63, Nov. 2006. [18] S. A. Hill and D. Braha, “Dynamic model of time-dependent complex networks,” Physical Review E, vol. 82, no. 4, Oct. 2010. [19] A. Ferreira, “Building a reference combinatorial model for MANETs,” IEEE Network, vol. 18, no. 5, pp. 24–29, Oct. 2004. [20] B. B. Xuan, A. Ferreira, and A. Jarry, “Evolving graphs and least cost journeys in dynamic networks,” in Proc. of the Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), Mar. 2003. [21] P. Holme, “Network reachability of real-world contact sequences,” Physical Review E, vol. 71, no. 4, pp. 1–8, Apr. 2005. [22] V. Kostakos, “Temporal graphs,” Physica A: Statistical Mechanics and its Applications, vol. 388, no. 6, pp. 1007–1023, Mar. 2009. 26 [23] J. Tang, M. Musolesi, C. Mascolo, and V. Latora, “Temporal distance metrics for social network analysis,” in Proc. of the ACM Workshop on Online Social Networks (WOSN). pp. 31–36, Aug. 2009. [24] A. Casteigts, P. Flocchini, W. Quattrociocchi, and N. Santoro, “Time-varying graphs and dynamic networks,” International Journal of Parallel, Emergent and Distributed Systems, vol. 27, no. 5, pp. 387–408, Oct. 2012. [25] H. Kim and R. Anderson, “Temporal node centrality in complex networks,” Physical Review E, vol. 85, no. 2, Feb. 2012. [26] P. Holme and J. Saramäki, “Temporal networks,” Physics Reports, vol. 519, no. 3, pp. 97–125, Oct. 2012. [27] J. I. Alvarez-Hamelin, E. Fleury, A. Vespignani, and A. Ziviani, “Complex dynamic networks: Tools and methods (guest editorial),” Computer Networks, vol. 56, no. 3, pp. 967–969, Dec. 2012. [28] C. Sengul, A. C. Viana, and A. Ziviani, “A survey of adaptive services to cope with dynamics in wireless self-organizing networks,” ACM Computing Surveys, vol. 44, no. 4, pp. 23:1–23:35, Sep. 2012. [29] A. Guimarães, A. B. Vieira, A. P. C. Silva, and A. Ziviani, “Fast centralitydriven diffusion in dynamic networks,” in Proc. of the Workshop on Simplifying Complex Networks for Practitioners (SIMPLEX), World Wide Web conference (WWW), pp. 821–828, May 2013. [30] L. Martinet, C. Crespelle, and E. Fleury, “Dynamic contact network analysis in hospital wards,” in Proc. of the Workshop on Complex Networks (CompleNet), pp. 241–249, Mar. 2014. [31] Q. Wang, “Link prediction and threads in email networks,” in Proc. of the International Conference on Data Science and Advanced Analytics (DSAA), pp. 470–476, Oct. 2014. [32] K. Wehmuth, E. Fleury, and A. Ziviani, “On MultiAspect Graphs,” arXiv:1408.0943, 30 p., Aug. 2014. [33] K. Wehmuth, E. Fleury, and A. Ziviani, “MultiAspect Graphs: Algebraic representation and algorithms,” arXiv:1504.07893, 61 p., Aug. 2015. 27 [34] K. Wehmuth, A. Ziviani, and E. Fleury, “A Unifying Model for Representing Time-Varying Graphs,” INRIA Technical Report no. RR-8466, 39 p., Jan. 2014. [35] M. Kivelä, A. Arenas, M. Barthelemy, J. P. Gleeson, Y. Moreno, and M. A. Porter, “Multilayer networks,” Journal of Complex Networks, Jul. 2014. [36] T. G. Kolda, “Multilinear operators for higher-order decompositions,” Sandia National Laboratories, Technical Report, Apr. 2006. [37] R. Barrett, M. Berry, T. F. Chan, J. Demmel, J. M. Donato, J. Dongarra, V. Eijkhout, R. Pozo, C. Romine, and H. V. der Vorst, Templates for the solution of linear systems: Building blocks for iterative methods. SIAM, 1994. [38] J. Tang, S. Scellato, M. Musolesi, C. Mascolo, and V. Latora, “Small-world behavior in time-varying graphs,” Physical Review E, vol. 81, no. 5, pp. 81– 84, May 2010. [39] J. Tang, M. Musolesi, C. Mascolo, V. Latora, and V. Nicosia, “Analysing information flows and key mediators through temporal centrality metrics,” in Proc. of the ACM EuroSys Workshop on Social Network Systems (SNS), pp. 1–6, Apr. 2010. [40] E. C. Costa, A. B. Vieira, K. Wehmuth, A. Ziviani, and A. P. C. Silva, “Time centrality in dynamic complex networks,” arXiv:1504.00241, 12 p., Apr. 2015. 28
8cs.DS
A co-located partitions strategy for parallel CFD–DEM couplings Gabriele Pozzetti, Xavier Besseron, Alban Rousset, Bernhard Petersa,∗ a Campus Belval, Université du Luxembourg 6, Avenue de la Fonte, L-4364 Esch-sur-Alzette Luxembourg arXiv:1802.05029v1 [cs.CE] 14 Feb 2018 Abstract In this work, a new partition-collocation strategy for the parallel execution of CFD–DEM couplings is investigated. Having a good parallel performance is a key issue for an Eulerian-Lagrangian software that aims to be applied to solve industrially significant problems, as the computational cost of these couplings is one of their main drawback. The approach presented here consists in co-locating the overlapping parts of the simulation domain of each software on the same MPI process, in order to reduce the cost of the data exchanges. It is shown how this strategy allows reducing memory consumption and inter-process communication between CFD and DEM to a minimum and therefore to overcome an important parallelization bottleneck identified in the literature. Three benchmarks are proposed to assess the consistency and scalability of this approach. A coupled execution on 280 cores shows that less than 0.1% of the time is used to perform inter-physics data exchange. 1. Introduction Eulerian-Lagrangian couplings are nowadays widely used to address engineering and technical problems. In particular, CFD–DEM couplings have been successfully applied to study several configurations ranging from mechanical [14, 13], to chemical [11] and environmental [8] engineering. CFD–DEM coupled simulations are normally very computationally intensive, and, as already pointed out in [10], the execution time represents a major issue for the applicability of this numerical approach to complex scenarios. Therefore, optimizing the parallel performance of such a coupling is a fundamental step for allowing large-scale numerical solutions of industrial and technical problems. The parallelization of Eulerian-Lagrangian software is, however, rather delicate. This is mainly due to the fact that the optimal partitioning strategies for those wireframes are different, and the memory requirement of a coupled solution can represent a major performance issue. Furthermore, since the coupling normally affects an extended domain region (often the whole computational domain), the amount of information that is required to be exchanged is normally important. For this reason, highly efficient coupling approaches for boundary problems, like the one proposed in [4] may suffer for the extensive communication layer. At the same time, due to the Eulerian-Lagrangian nature of the coupling, mesh-based communication as the one proposed in [9] cannot, by themselves take care of the information exchange. One of the earliest attempt to parallelize a DEM algorithm was proposed in [21], where the authors distributed inter-particle contacts among processors on a machine featuring 512 cores. In their scheme, all particle data was stored in every process resulting in a memory-intensive computation that leads to a speedup of 8.73 for 512 cores with a 1672 particles assembly. A later work [12] showed how by reducing the DEM inter-process communication, a speedup of ∼11 within 16 process-computation of 100k particles was obtainable. This proved how, for the sole Lagrangian software, the memory usage and the inter-process communication can profoundly affect the parallel performance of the code. The problem of memory consumption and inter-process communication becomes even more important when a Lagrangian code is coupled with an Eulerian one as the single pieces of software generally reach the optimum performance with different load and partitioning strategies. This can lead to massive inter-process communication ∗ Principal corresponding author. Email: [email protected], [email protected] Preprint submitted to Elsevier February 15, 2018 that can deeply affect the performance of the overall algorithm. In [5], the authors proposed a mirror domain method for ensuring the correct passage of information between Lagrangian bubbles and an underlying fluid flow in a parallel execution. This method consists in distributing global knowledge of all the Eulerian and Lagrangian domains, by letting a process performing only a part of the computation, and then distributing the information via gather-scatter operations. It was shown in [5], how this strategy allows a correct access to information and an almost linear speedup up to 4 processes for a case with 648000 CFD cells and 100000 particles. Nevertheless, the strategy wasn’t able to offer significant advantages when operating on more than 32 processes. Therefore, its application is limited to medium-small scale problems. In order to cope with this problem, in [10], the authors proposed a parallelization strategy based on a Jostle graph for the DEM part and an independent parallelization for the CFD part. This allowed reducing memory consumption while keeping an high inter-physics communication load. The resulting coupling was observed to scale better than what previously seen in the literature obtaining a speedup of ∼35 for 64 processes. Nevertheless, the coupled code was shown to perform significantly worse than the sole DEM part, proving how the inter-physics communication between the Eulerian and the Lagrangian part can induce significant performance issues. This issue was underlined by [1], where a communication strategy based on non-distributed memory was implemented in order to reduce the communication costs. The results proved how this strategy can indeed reduce the DEM and the inter-physics communication, yet its advantages are limited to the usage of ∼30 processes though not allowing very-large-scale simulations. An important attempt to study large-scale problems with an Eulerian-Lagrangian coupling was presented in [19]. In this contributions, the authors propose a coupling between a highly efficient code for molecular dynamics and a well-known open-source software for CFD. The proposed decomposition strategy for CFD and molecular dynamics code are completely independent from each other, and all the required data for the inter-physics exchange is provided through a complex communication layer. It is shown how the specific couple of codes can tackle large-scale problems and scale over more than one hundred of processes. Nevertheless, when a large number of processes is used, the inter-physics communication becomes very important, taking up to 30% of the computation time. Nowadays, there is still no reference solution for the parallel execution of CFD–DEM couplings, and even though several strategies have been proposed, they have been focusing on specific software. The aim of the current work is to investigate the performance of a parallelization strategy for a CFD–DEM four-way coupling that aims to minimize the memory consumption and the inter-physics communication. The article is structured as follows. Firstly, the Lagrangian and Eulerian parts of this coupling are presented, and the systems of equations solved by the DEM and CFD part described. Secondly, the partitioning strategy based on co-located partitions is introduced. Finally, three benchmark cases are proposed in order to assess the consistency and performances of the proposed parallelization strategy. In this work, we refer to the coupling between the XDEM platform [16, 15], which is used to treat the Lagrangian entities, and the OpenFOAM [22] libraries, which is used to resolve the fluid flow equations in a Eulerian reference. The parallelization strategy is presented in its general way and can be implemented for a generic CFD–DEM coupling independently from the specific software. To the best of the authors’ knowledge, the partitioning strategy for CFD–DEM couplings here proposed is the first one that succeeds in keeping the inter-physics communication negligible while running over hundreds of process. 2. Methodology 2.1. Discrete Element Method (DEM) The Discrete Element Method (DEM) is a well-established approach for granular flows [7]. The XDEM platform [16, 3, 13] aims to extend the application of the DEM by attaching chemical/thermodynamical variables on the particles, and coupling the DEM core with codes for computational fluid dynamics (CFD). More in general, the coupling between CFD and DEM is a common strategy for addressing industrially relevant problems [13, 11]. In this work, the DEM module of the XDEM platform is used to evolve a set of particles describing physical entities in the 2 Table 1: List of variables Symbol Variable Symbol Variable uf µf Fb Ffpi ρf Ap fluid velocity fluid viscosity body force fluid-particle interaction force fluid density particle surface area p uc C σf ρp ε pressure compression velocity surface curvature fluid stress tensor particle density local porosity Mcoll torque acting on a particle due to collision events particle mass particle moment of inertia contact force acting on a particle contact force acting on the particle i due to the collision with particle j force rising from the particle-fluid interaction Fg gravitational force Mext u external torque acting on a particle particle velocity φ particle orientation ω particle angular velocity m I Fcoll Fi j Fdrag presence of a multiphase fluid. Defining with xi the positions, mi the masses, and φ the orientations, one can write d2 xi dt 2 d2 Ii 2 φ i dt mi = Fcoll + Fdrag + Fg , (1) = Mcoll + Mext , (2) In equation 1, the term Fc indicates the collision force, Fcoll = ∑ Fi j (x j , u j , φ j , ω j ), (3) i6= j with u j the velocity of particle j, and ω the angular velocity. The term Mcoll indicates the torque acting on the particle due to collisions Mcoll = ∑ Mi j (x j , u j , φ j , ω j ), (4) i6= j with Mi j the torque acted from particle j to particle i. The term Fdrag takes into account the force rising from the interaction with the fluid, and Fg corresponds to the gravitational force. For what concerns Fdrag the analytical expression of the term can be obtained from the literature. Many authors have focused on its description [6, 2] that is normally provided in the form of a semi empirical law Fdrag = β (u f − u p ), (5) β = β (u f − u p , ρ f , ρ p , d p , A p , µ f , ε), (6) with u f , u p the fluid and particle velocity respectively, ρ f , ρ p the respective densities, d p , A p the particle characteristic length and area, µ f the fluid viscosity, and ε the porosity, defined as the ratio between the volume occupied by the fluid and the total volume of the CFD cell. For the sake of generality, we took β as described in [18]. During the parallel execution of XDEM, the simulation domain is geometrically decomposed in regularly fixed-size cells that are used to distribute the workload between the processes. Every process has global knowledge of the domain structure and decomposition, but only performs the calculation, and holds knowledge, for the particles 3 that belong to its sub-domain. The load partitioning between processes has been shown to be often crucial for the parallel performance of XDEM [17], and different partitioning strategies are available within the XDEM platform. In this contribution, we investigate the parallel performance of XDEM when operated with geometrically uniform partitions for the coupling with OpenFOAM. In figure 8, standalone XDEM executions compare the different partitioning algorithms, including the geometrically uniform approach, in order to assess their influence on the specific cases used in this work. 2.2. Computational Fluid Dynamics (CFD) For the fluid solution, we refer to an unsteady incompressible flow through porous media with forcing terms arising from particle phase, as described in [16, 15, 14]. This system must fulfill the Navier-Stokes equations in the form, ∇ · εu f = ∂ε , ∂t ∂ εu f + ∇ · (εu f u f ) = −ε∇p + TD + Fb + Ffpi , ∂t  TD = ∇ · ε µ f ∇u f + ∇T u f , (7) (8) (9) with u f the fluid velocity, p the fluid pressure, µ f the fluid viscosity, Fb a generic body force, Ffpi the fluid-particle interaction force, that is the counterpart of Fdrag , which is here treated with the semi-implicit algorithm proposed in [23]. This set of equations is solved with the OpenFOAM libraries [22], which parallelization is based on domain decomposition. The CFD domain is split into sub-domains assigned to each process available at run time, over each of them a separate copy of the code is run. The exchange of information between processes is performed at boundaries through a dedicated patch class as described in [22]. In this contribution, the CFD domain is partitioned according to the DEM domain, as described in section 2.3. In figure 5, we compare standalone OpenFOAM execution with different partitioning algorithm to assess the influence of the partitioning on our specific cases. 2.3. Co-located partitions strategy for domain decomposition Since CFD–DEM couplings based on volume averaging technique only consider local exchanges of mass, momentum, and energy, the Lagrangian (DEM) entity will be affected only from the fluid characteristic of an area close to its center. At the same time, the fluid flow will be only locally interested by the action of particles present in the local region. In this contribution, we are taking advantage of theses characteristics to design an optimized partitioning strategy for our CFD–DEM simulation. This partitioning strategy is illustrated on figure 1: 1. In our problem, the CFD (OpenFOAM) and DEM (XDEM) domains are overlapping, totally or partially. As stated earlier, interactions between the fluid and the particles happen for objects closely located in the simulation space. 2. In consequence, our partitioning strategy considers the 2 domains together and its goal is to maintain the locality of the objects in the simulation. This means the domain elements co-located in the simulation space are assigned to the same process. In this way, the partition i of the CFD and the partition i of the DEM domain will be coinciding. 3. For the parallel execution, partitions are distributed to the computing nodes. It is important to make sure that partition i of the CFD domain and partition i of the DEM domain are actually located in the computing node, or even better, in the same MPI process. 4. With this partitioning strategy, the parallel execution benefits from the resulting communication pattern. Inter-partition intra-physics data exchanges, i.e. the same that occur in a standalone execution of OpenFOAM or XDEM, are performed with the MPI communication layer using native implementation. This ensures good portability of the approach as the intra-physics communication implementation is not changed. 4 Figure 1: Co-located partitions strategy for a coupled CFD–DEM simulation: 1. OpenFOAM and XDEM domains are overlapping. 2. Domain elements co-located in the simulation space are assigned to the same partitions. 3. Partitions are distributed to the computing nodes. 4. The parallel execution benefits from the resulting communication pattern. 5 Intra-partition inter-physics data exchanges are implemented with simple read/write operation in memory or direct library function calls because the two partitions share the same intra-process memory space. These data exchanges, which represent the majority of the data exchange due to the co-located partitions strategy, are much faster than the ones based on traditional communication layer like MPI. Inter-partition inter-physics data exchanges are achieved using the MPI communication layer. Thanks to the co-located partitions strategy, they are reduced to a minimum, or non-existent if the partitions are perfectly aligned. As a result, our approach has many advantages compared to the other work in the literature (cf section 1). Firstly, we rely on the distribution of the simulation domain among the computing nodes. Every partition of the computational domain keeps only its local data, and therefore reduces memory consumption. This is important as it allows simulating large-scale problems that would not fit in the memory of a single computing node. Secondly, by running the CFD and DEM code in the same process (by linking the two libraries into one executable), the local inter-physics data exchanges can be performed by direct memory accesses and avoid the overhead of an additional communication layer. Thanks to our partitioning strategy that imposes the co-location constraint on the CFD and DEM sub-domains, we ensure that the majority of the inter-physics data exchange will occur in that way. These advantages are meant to reduce the overhead of a parallel execution and to simplify the structure of the interface between the different codes, that will be identical for parallel and sequential execution. In this study, we implement the proposed strategy by using a simple partitioning algorithm that enforces the co-location constraint. This algorithm controls the partitioning of both the CFD and DEM domain. For the sake of simplicity, the global simulation space is here partitioned with a uniform strategy based on a geometric decomposition. This consists in splitting the domain into regions of similar volume making the spatial volume of the domains, that are assigned to each process, balanced. In this way, every process will handle a similar volume of the computational domain holding data and performing the computation for the CFD and DEM part occupying the specific spatial region. While this strategy is not optimal for a generic case, it greatly simplifies the implementation and the analysis of the results. The result of this partitioning is then enforced into each software bypassing any internal they may use. For OpenFOAM, this is achieved using the manual decomposition method which allows using a predefined partitioning defined in a text file. In this way, our partitioning algorithm considers the global simulation space of two physics software as a whole, not differencing if a point in space belongs to the CFD mesh or the DEM domain. This strategy is significantly different from what proposed in previous works [19], where the partitioning of CFD and DEM domains was aiming to optimize the load-balance of each standalone software, rather than the communication cost of the coupled execution. 3. Experimental results 3.1. Experimental methodology In order to assess the validity of our approach and evaluate the scalability of the proposed strategy, we have setup and executed three benchmarks. The first benchmark, One particle traveling across a processes boundary presented in section 3.2, tests the equivalence of the results between sequential run and parallel run with the current parallelization strategy. This is done to assess the validity of our approach and implementation by checking the continuity of the results when the particle travels across process boundary even without inter-partition inter-physics communication. The second benchmark, One million particles in two million cells proposed in section 3.3, investigates the effects of an heavy inter-physics communication on the performance of a standalone software. This is done to show how the proposed parallelization strategy allows maintaining the performance of the original single solver in the presence of an heavy inter-physics communication even with hundreds of processes. The third benchmark, Ten Million Particles in one Million cells described in section 3.4, studies the parallel performance of a coupled solution in case of an heavy coupled case. This is done to show how our solution can handle highly costly simulations and at the same time allows to resolve a main issue underlined in the literature linked to the inter-physics communication. 6 The experiments were carried out using the Iris cluster of the University of Luxembourg [20] which provides 168 computing nodes for a total of 4704 cores. The nodes used in this study feature a total a 128 GB of memory and have two Intel Xeon E5-2680 v4 processors running at 2.4 GHz, that is to say a total of 28 cores per node. The nodes are connected through a fast low-latency EDR InfiniBand (100Gb/s) network organized in a fat tree. We used OpenFOAM-Extend 3.2 and XDEM version b6e12a86, both compiled with Intel Compiler 2016.1.150 and parallel executions were performed using Intel MPI 5.1.2.150 over the InfiniBand network. To ensure the stability of the measurement, the nodes were reserved for an exclusive access. Additionally, each performance value reported in this section is the average of at least hundred of measurements. The standard deviation showed no significant variation in the results. 3.2. One particle traveling across a process boundary Figure 2: One particle traveling across process boundary: Setup. A first basic test is proposed, featuring a particle traveling across a boundary between processes. This is done in order to test the equivalence of the results obtained in sequential and parallel execution. The particle, initially at rest within the domain assigned to process 0, is accelerated by the fluid according to the law of equation 5. The resulting drag force pushes the particle across the boundary with process 1 causing it to be transferred from the sub-domain 0 to the sub-domain 1. As shown in figure 2, the boundary conditions imposed on the fluid domain are a uniform Dirichlet at the inlet, no-slip at the wall, and reference pressure at the outlet. The CFD domain is a square channel of dimensions of 1m, 0.2m and 0.2m, and is discretized with 240 identical cubic cells. In figure 3, the normalized particle velocity and acceleration, and the normalized solid volume and L1 norm of the fluid acceleration are proposed as a function of times. All the quantity are normalized by dividing them by their maximum value, so that they can be displayed on the same plot. The particle crosses the process boundary at 0.32s leaving the domain assigned to process 0 and entering into the domain assigned to process 1. It can be observed how the particle velocity and drag force are continuous across the processes boundary. This shows how the information on the fluid velocity at the particle position is correctly exchanged between CFD and DEM code in the whole domain, including the regions between boundaries. Similarly, the porosity and acceleration fields projected by the particle into the Eulerian grid do not suffer discontinuities when the particle switches between processes. In particular, it can be noticed how the results obtained with the parallel execution are perfectly matching the one obtained by running the code in sequential for both particle and fluid quantities. This shows how even without keeping global knowledge of the whole computational domain, continuity across processes of both Eulerian and Lagrangian quantities can be achieved. This allows greatly limiting both the memory usage and the inter-process communication. 3.3. One million particles in two million cells This second test aims to evaluate the influence of an intense intra-physics communication load on the scalability of the code. For that, a coupling between OpenFOAM for the CFD part and a dummy DEM software, named DummyDEM, is used. DummyDEM, is a modified version of XDEM whose purpose is to trigger all the necessary data exchange, but does not perform any actually DEM computation, i.e. the particles are not moving. 7 Normalized Velocity, Acceleration Normalized particle velocity and acceleration as a function of time 1 0.8 Particle Velocity (SEQ) Particle Velocity (PAR) Particle Accel. (SEQ) Particle Accel. (PAR) 0.6 0.4 0.2 Process boundary 0 0 0.1 0.2 0.3 0.4 0.5 0.6 Time [s] (a) Normalized Field Variables Normalized solid volume and fluid acceleration as a function of time 1.2 1 Solid Volume (SEQ) Solid Volume (PAR) Fluid Accel. (SEQ) Fluid Accel. (PAR) 0.8 0.6 0.4 0.2 Process boundary 0 0 0.1 0.2 0.3 0.4 0.5 0.6 Time [s] (b) Figure 3: One particle traveling across process boundary: comparison between the sequential (SEQ) and parallel (PAR) results for CFD and DEM variables. Continuity across the process boundary can be observed. 8 Figure 4: One million particles in two million cells: Setup. This case is similar to the one proposed in the previous section, but in order to increase the amount of data exchange it contains a swarm of one million of particles suspended in a channel flow discretized with two millions of identical cubical CFD cells (figure 4). The boundary conditions imposed on the fluid domain are as in the previous test the standard inlet, wall and outlet conditions on respectively the channel inlet, the surrounding walls and the outlet section. 3.3.1. Standalone OpenFOAM performance 250 ● ● Ideal ● OpenFOAM using METIS 200 ● OpenFOAM using SCOTCH Speedup OpenFOAM using Uniform ● 150 ● ● 100 ● ● 50 ● 0 ● 28 56 84 112 140 168 196 224 252 Number of cores Figure 5: One million particles in two millions cells: comparison between the scalability of the pure OpenFOAM partitioned using SCOTCH, METIS, and uniform partitioning algorithm. Similar scalability properties can be observed. In figure 5, we first present the scalability of the standalone OpenFOAM run obtained by decomposing the domain with the native SCOTCH and METIS partitioners, and the uniform partitioner that is used in the coupling. One can notice how the behavior of OpenFOAM is not highly dependent on the partitioner adopted. For that case, this can be explained considering that the problem is rather uniform and therefore the optimal partitioning would be close to the uniform one. 3.3.2. Coupled OpenFOAM–DummyDEM performance In a first step to understand the performance of the coupled CFD–DEM approach, we first decided to study the behavior of the coupling in case of uniformly distributed load, so that the final cost is not influenced by dynamic load balancing. In order to obtain this, our coupling OpenFOAM–DummyDEM performs all the coupling data exchange but our simplified DEM implementation, DummyDEM, does not execute any DEM calculation. As a result, in this testing coupling OpenFOAM–DummyDEM case, we have at every timestep: • data exchange from CFD to DEM: the fluid velocity is used to calculate the drag force applying on the particles • data exchange from DEM to CFD: the distribution of the particles is used to calculate the porosity field of the CFD domain 9 However, DummyDEM will not integrate the particle position which will remain stationary in the simulation domain. Furthermore, this allows adopting the same timestep for the CFD and DEM parts, further simplifying the analysis of the results. The resulting case is therefore equivalent to a pure CFD case, on the top of which a inter-physics communication is triggered. This allows studying the effects of the data exchange on the scalability of the software. ● 250 ● 200 Ideal ● OpenFOAM using Uniform ● Speedup DummyDEM using Uniform 150 ● OpenFOAM−DummyDEM coupled ● ● 100 ● ● 50 ● 0 ● 28 56 84 112 140 168 196 224 252 Number of cores Figure 6: One million particles in two millions cells: speedup of the coupled OpenFOAM–DummyDEM in comparison with standalone OpenFOAM and standalone DummyDEM. The scalability of the coupled OpenFOAM–DummyDEM is similar to the standalone OpenFOAM: the overhead of data exchange of the coupling is negligible. The poor performance of DummyDEM is due to the artificially reduced amount of computation. In figure 6, we evaluate the scalability of our OpenFOAM–DummyDEM coupling approach, in comparison with standalone OpenFOAM and standalone DummyDEM execution. The aim of this is to underline the influence of the presence of an interface between the Lagrangian and Eulerian domain, on the overall algorithm scalability. One can observe how in this case, the parallel performance of the DummyDEM part is poor. This is explained considering that the decision of not integrating the particle motion, which makes the DEM computation rather inexpensive, leading to the flat scalability profile observed in figure 6. This also offers the possibility of studying the performance of the coupled solver in a case where the performance of the two basic software is markedly different. In this configuration, for an execution on 252 cores, we measured that 81% of the execution time is spent in OpenFOAM code, 18% in DummyDEM and less than 1% doing inter-physics data exchange. As a consequence, the performance of the OpenFOAM–DummyDEM coupling is similar to the one of the standalone OpenFOAM execution. This shows how the presence of the interface between the two codes, that in this case is coupling one million of particles with two millions of cells, does not affect the performance significantly. This can be explained considering that, in this case, the generated partitions are perfectly aligned and, as a result, it does not introduce any inter-physics inter-process communication, and the most of the inter-physics data exchanges use direct memory accesses and avoid any communication layer. This also proves how, by using the co-located partitions strategy, the presence of an intensive inter-physics data exchange does not affect the parallel performance of the software. This is an important step for parallel execution of coupled software, as it should be ensured that its performance matches the one of a heavy loaded standalone algorithm without an excessive overhead. 3.4. Ten Million Particles in one Million cells The third test case consists in a layered bed of ten million particles moving in the presence of a carrier gas. This case was inspired by [19] and chosen to show the capability of the coupling to treat a very large amount of DEM particles while keeping the inter-physics communication cost low. As shown in figure 7, the test case is of the form proposed in [19] with a domain size of 480mm x 40mm x 480 mm, featuring a layered bed of 10 million of particles moving under the action of an incompressible flow. The 10 (a) (b) Figure 7: Ten million particles in one million cells: Setup. 11 boundary conditions for the fluid solution are of constant Dirichlet at the inlet (2m/s), non-slip at the wall boundaries and reference atmospheric pressure at the outlet. In [19] was pointed out that with heavy coupled cases, when partitioning the two domains independently, the inter-physics communication becomes more and more important with the rise of computing processes, reaching up to 30% of the whole cost of the simulation when using more than 200 computing processes. This means that, when using an independent domain partitioning from each software, the coupled simulation will be negatively affected by the coupling interface, leading to a coupled execution that will perform worse than the single-code one when operated on a high number of computing nodes. This behavior was also identified in [10] where the authors clearly showed how the coupled execution was performing worse than both of the standalone software. 3.4.1. Standalone XDEM and standalone OpenFOAM performance ● 280 ● Ideal ● XDEM using METIS ● XDEM using SCOTCH ● 196 Speedup XDEM using Uniform ● XDEM using Zoltan RIB ● ● 112 ● ● ● 28 28 56 84 112 140 168 196 224 252 280 Number of cores Figure 8: Ten million particles in one million cells: Speedup of standalone XDEM for different partitioning algorithms. ● 280 ● Ideal ● OpenFOAM using SCOTCH ● OpenFOAM using Uniform ● Speedup 196 ● ● ● 112 ● ● 28 ● 28 56 84 112 140 168 196 224 252 280 Number of cores Figure 9: Ten million particles in one million cells: Speedup of standalone OpenFOAM for different partitioning algorithms. In figure 8, the scalability performance of the pure DEM execution obtained with different partitioning algorithms is proposed. One can observe how the results are affected by the choice partitioning algorithm, but the general behavior 12 is rather similar. This can be explained considering that the setup for this case is rather homogeneous and uniformly distributed. Similarly, in figure 9, the performance of the pure CFD execution obtained with a uniform partitioning and a classic OpenFOAM partitioner (SCOTCH) are compared. Once more, the trends are rather similar and only minor differences can be noticed. 3.4.2. Coupled OpenFOAM–XDEM performance ● 280 ● ● Ideal OpenFOAM using Uniform 196 ● XDEM using Uniform ● Speedup OpenFOAM−XDEM coupled ● ● ● 112 ● ● 28 ● 28 56 84 112 140 168 196 224 252 280 Number of cores Figure 10: Ten million particles in one million cells: Speedup of the coupled OpenFOAM–XDEM approach in comparison with standalone XDEM and OpenFOAM: The coupled execution performs better than the standalone XDEM even for more than 200 processes. ● % of Total Execution time 0.075 ● 0.050 0.025 0.000 28 56 ● ● 84 112 ● ● 140 168 ● ● ● ● 196 224 252 280 Number of cores Figure 11: Ten million particles in one million cells: Percentage of time spent for inter-physics data exchange for an increasing number of processes. Less than 0.1% of the time is spent in the coupling part and the proposed solution scales well. In figure 10, we evaluate the performance of our coupled OpenFOAM–XDEM approach in comparison with standalone XDEM and standalone CFD, all executed with a uniform partitioning. It is interesting to notice how the parallel execution of the coupled code is not worse than the one of the single code when operating with more than 200 processes. This can be explained by the repartition of the computational cost: more than 92% is spent in the XDEM part, less than 8% in OpenFOAM and the inter-physics data exchanges represented less than 0.1% as shown 13 on figure 11. It appears that, in this case, the cost of the coupling is negligible and the behavior of the coupled solution is driven by the most computation intensive part of the code, namely XDEM. This represents a major improvement compared to previous work. In particular, instead of rising as it was happening for [19], the inter-physics data exchange reduces in magnitude when using our co-located partitions strategy. This can be explained considering that no inter-process communication is involved, and the amount of the data exchanged per each process reduces. In this way, instead of becoming one of the limiting factors for the scalability of a coupled execution, this communication benefits from being executed in parallel when a co-located partitions strategy is adopted. This represents an important advantage for large-scale applications that need to run over hundreds of processes in order to produce results within a reasonable computational time. 4. Discussion The main novelty of the current approach presented in section 2.3 is to introduce a new partitioning strategy for CFD and DEM domains. This strategy aims to co-locate partitions from the CFD and DEM domain that will need to perform information exchange, in the same MPI process. This is radically different from what previously proposed in the literature, where most of the works focused on optimizing the load-balancing of each software independently from each other while we focus first on reducing the inter-physics communication. We implemented this strategy by defining a partitioning algorithm that forces CFD and DEM to be co-located. In the cases proposed in this paper, the co-location constraint is completely fulfilled, meaning that all the information required for the inter-physics exchanges are present within the same MPI process. Therefore, the inter-physics interprocess communications are completely absent. As shown in section 3.4, this strategy allows overcoming the interphysics communication bottleneck that was identified in [19]. Nevertheless, adopting a co-location constraint introduces a significant limitation in the partitioning flexibility of the two domains. First, an hybrid partitioning algorithm must be adopted that can optimize the executions of the two codes. In uniform cases, as the one proposed in this work, a uniform partitioning algorithm allows achieving reasonably good parallel performances. On the other hand, in cases in which the DEM and CFD parts have significantly different parallel requirements (as, for instance, when the computational load of the DEM part is clustered in a specific region of the domain, while the CFD load is uniform) a better partitioning algorithm that optimizes the coupled execution must be designed. We want to point out how, for more complex partitioning algorithms, a perfect fulfillment of the co-location constraint might be difficult or not possible. In this cases, one might consider relaxing the co-location constraint allowing the partitions to be non-perfectly coinciding. This will require the introduction of an inter-physics interpartition communication layer that will cause a communication overhead with respect to the cases here presented. This cost will be null for perfectly coinciding partitions, and maximum for completely non-coinciding partitions. Therefore, an optimal partitioning algorithm for CFD–DEM couplings must consider both the cost associated with intra and inter-physics communication in order not to be excessively penalized by any bottleneck. Alternatively, in several cases, it might not be always necessary to have such a complex hybrid partitioning algorithm. When one of the software is clearly dominating in term of computational load, it could be sufficient to partition its domain with one of its native algorithms, and decide the partitions of the second software to match the decision of the dominant one, respecting the co-location principle proposed in this work. 5. Conclusion A partitioning strategy for CFD–DEM couplings has been investigated. It consists of the usage of co-located partitions for the CFD and the DEM domains. This allows performing the bulk information exchange between the two codes locally, reducing the global communication time and in particular minimizing the inter-physics parallel communication. This strategy was implemented by using a simple uniform partitioning algorithm that forces the partitions to be co-located. Three benchmark cases have been introduced in order to assess the consistency and performances of the proposed strategy. Experimental results were carried out using the coupling between the XDEM framework and the OpenFOAM libraries. The validity of the results have been assessed by comparing sequential and parallel 14 executions, and scalability performance over hundreds of processes has been reported showing that less than 0.1% of the time is used for inter-physics data exchange. The main advantage of the proposed strategy consists in the reduction of the cost associated with the inter-physics communication, that is a fundamental step toward the large-scale computation, as it allows maintaining good parallel performances when operating with hundreds of computing processes. This results proved how the inter-physics communication must be taken into account when choosing a partitioning algorithm for CFD–DEM couplings in order to avoid an important communication bottleneck. In order to improve the applicability our work to more generic scenarios, an enhanced flexibility in the domain partitioning can be provided. For this, dedicated partitioning algorithms must be designed to find the good tradeoff between a good load-balancing within each software, their own communication requirements and the volume of inter-physics data exchange. This will be studied in future works. Acknowledgement This research is in the framework of the project DigitalTwin, supported by the programme Investissement pour la compétitivité et emploi - European Regional Development Fund (Grant agreement: 2016-01-002-06). The experiments presented in this paper were carried out using the HPC facilities of the University of Luxembourg1 . [1] Amit Amritkar, Surya Deb, and Danesh Tafti. Efficient parallel cfd-dem simulations using openmp. Journal of Computational Physics, 256:501 – 519, 2014. [2] O.O. Ayeni, C.L. Wu, K. Nandakumar, and J.B. Joshi. Development and validation of a new drag law using mechanical energy balance approach for DEM–CFD simulation of gas–solid fluidized bed. Chemical Engineering Journal, 302:395–405, 2016. [3] Mehdi Baniasadi, Maryam Baniasadi, and Bernhard Peters. Coupled cfd-dem with heat and mass transfer to investigate the melting of a granular packed bed. Chemical Engineering Science, 178:136 – 145, 2018. [4] S. Buis, A. Piacentini, and D. Declat. Palm: A computational framework for assembling high-performance computing applications. Concurrency and Computation: Practice and Experience, 18(2):231–245, 2006. [5] D. Darmana, N.G. Deen, and J.A.M. Kuipers. Parallelization of an eulerlagrange model using mixed domain decomposition and a mirror domain technique: Application to dispersed gasliquid two-phase flow. Journal of Computational Physics, 220(1):216 – 248, 2006. [6] Wei Du, Xiaojun Bao, Jian Xu, and Weisheng Wei. Computational fluid dynamics (CFD) modeling of spouted bed: Assessment of drag coefficient correlations. Chemical Engineering Science, 61(5):1401–1420, 2006. [7] H. J. Herrmann. Physics of granular media. Chaos, Solitons & Fractals, 6:203–212, 1995. [8] L. Jing, C. Y. Kwok, Y. F. Leung, and Y. D. Sobral. Extended CFD–DEM for free-surface flow with multi-size granules. International Journal for Numerical and Analytical Methods in Geomechanics, 40(1):62–79, 2016. NAG-14-0182.R1. [9] Wolfgang Joppich and M Kürschner. Mpccia tool for the simulation of coupled applications. Concurrency and computation: Practice and Experience, 18(2):183–192, 2006. [10] D.K. Kafui, S. Johnson, C. Thornton, and J.P.K. Seville. Parallelization of a lagrangianeulerian dem/cfd code for application to fluidized beds. Powder Technology, 207(1):270 – 278, 2011. [11] Amir Houshang Mahmoudi, Florian Hoffmann, Miladin Markovic, Bernhard Peters, and Gerrit Brem. Numerical modeling of self-heating and self-ignition in a packed-bed of biomass using {XDEM}. Combustion and Flame, 163:358–369, 2016. [12] Algirdas Maknickas, Arnas Kačeniauskas, Rimantas Kačianauskas, Robertas Balevičius, and Algis Džiugys. Parallel dem software for simulation of granular media. Informatica, 17(2):207–224, April 2006. [13] Peters, Bernhard and Pozzetti, Gabriele. Flow characteristics of metallic powder grains for additive manufacturing. EPJ Web Conf., 140:13001, 2017. [14] Gabriele Pozzetti and Bernhard Peters. Evaluating Erosion Patterns in an abrasive water jet cutting using XDEM. Advances in Powder Metallurgy & Particulate Materials, pages 191–205, 2017. [15] Gabriele Pozzetti and Bernhard Peters. On the choice of a phase interchange strategy for a multiscale DEM-VOF Method. AIP Conference Proceedings, 1863, 2017. [16] Gabriele Pozzetti and Bernhard Peters. A multiscale dem-vof method for the simulation of three-phase flows. International Journal of Multiphase Flow, 99:186 – 204, 2018. [17] Alban Rousset, Xavier Besseron, and Bernhard Peters. Parallelizing xdem: Load-balancing policies and efficiency, a study. International Conference on Particle-Based Methods (PARTICLES17), 2017. [18] L. Schiller and Z. Naumann. A Drag Coefficient Corre-lation,. VDI Zeitung, Vol. 77,:318–320, 1935. [19] Rui Sun and Heng Xiao. SediFoam: A general-purpose, open-source CFD–DEM solver for particle-laden flow with emphasis on sediment transport. Computers & Geosciences, 89:207–219, 2016. [20] S. Varrette, P. Bouvry, H. Cartiaux, and F. Georgatos. Management of an Academic HPC Cluster: The UL Experience. In Proc. of the 2014 Intl. Conf. on High Performance Computing & Simulation (HPCS 2014), pages 959–967, Bologna, Italy, July 2014. IEEE. 1 http://hpc.uni.lu 15 [21] David W. Washington and Jay N. Meegoda. Micro-mechanical simulation of geotechnical problems using massively parallel computers. International Journal for Numerical and Analytical Methods in Geomechanics, 27(14):1227–1234, 2003. [22] H. G. Weller, G. Tabor, H. Jasak, and C. Fureby. A tensorial approach to computational continuum mechanics using object-oriented techniques. Computers in Physics, 12(6):620–631, 1998. [23] Heng Xiao and Jin Sun. Algorithms in a Robust Hybrid CFD-DEM Solver for Particle-Laden Flows. Communication Computer Physics, 2010. 16
5cs.CE
arXiv:1702.07448v3 [math.ST] 30 Nov 2017 Optimal Bayesian Minimax Rates for Unconstrained Large Covariance Matrices Kyoungjae Lee1 and Jaeyong Lee2 1 Department of Applied and Computational Mathematics and Statistics, The University of Notre Dame 2 Department of Statistics, Seoul National University December 4, 2017 Abstract We obtain the optimal Bayesian minimax rate for the unconstrained large covariance matrix of multivariate normal sample with mean zero, when both the sample size, n, and the dimension, p, of the covariance matrix tend to infinity. Traditionally the posterior convergence rate is used to compare the frequentist asymptotic performance of priors, but defining the optimality with it is elusive. We propose a new decision theoretic framework for prior selection and define Bayesian minimax rate. Under the proposed framework, we obtain the optimal Bayesian minimax rate for the spectral norm for all rates of p. We also considered Frobenius norm, Bregman divergence and squared log-determinant loss and obtain the optimal Bayesian minimax rate under certain rate conditions on p. A simulation study is conducted to support the theoretical results. Key words: Bayesian minimax rate; Convergence rate; Decision theoretic prior selection; Unconstrained covariance. 1 Introduction Estimating covariance matrix plays a fundamental role in multivariate data analysis. Many statistical methods in multivariate data analysis such as the principle component analysis, canonical 1 correlation analysis, linear and quadratic discriminant analysis require the estimated covariance matrix as the starting point of the analysis. In the risk management and the longitudinal data analysis, the covariance matrix estimation is a crucial part of the analysis. The log-determinant of covariance matrix is used for constructing hypothesis test or quadratic discriminant analysis [2]. Suppose we observe a random sample Xn = (X1 , . . . , Xn ), Xi ∈ Rp , i = 1, . . . , n, from the p-dimensional normal distribution with mean zero and covariance matrix Σ, i.e. iid X1 , . . . , Xn | Σ ∼ Np (0, Σ). We assume the zero mean and focus on the covariance matrix. With advance of technology, data arising from various areas such as climate prediction, image processing, gene association study, and proteomics, are often high dimensional. In such high dimensional settings, it is often natural to assume that the dimension of the variable p tends to infinity as the sample size n gets larger, i.e. p = pn −→ ∞ as n −→ ∞. This assumption can be justified as follows. First, when p is large in comparison with n, often the limiting scenario with p tending to infinity approximates closer to the reality than that with p fixed. Second, in many cases we can postulate the reality is infinitely complex and involves infinitely many variables, and with limited resources and time, we can collect only a portion of variables and observations. If we have more resources to collect more data, it is natural to collect more observations as well as more variables, i.e. to increase both n and p. When p tends to infinity as n −→ ∞, the traditional covariance estimator is not optimal [32]. The sparsity or bandable assumptions on large matrices have been used frequently in the literature. Many researchers have studied the large sample properties under the restrictive matrix classes. [6] considered the bandable covariance/precision classes and studied the convergence rate of banding estimator on those classes. [44] derived the convergence rate for precision matrices via sparse Cholesky factors and showed that it is the minimax rate under the Frobenius norm. In addition, the minimax convergence rates for the sparse or bandable covariance matrices were established by [11], [12, 13] and [45]. For a comprehensive review on the convergence rate for the covariance and precision matrices, see [10]. The posterior convergence rate has been investigated by [36], [4], and [21]. [36] showed that their continuous shrinkage priors are optimal for the sparse covariance estimation under the 2 spectral norm in the sense that the posterior convergence rate is quite close to the frequentist √ minimax rate. They achieved a nearly minimax rate upto a log n term under the spectral norm and sparse assumption even when n = o(p). [4] considered Bayesian banded precision matrix estimation using graphical models. They obtained the posterior convergence rate of the precision matrix under matrix `∞ norm when log p = o(n). [21] developed a prior distribution for the sparse PCA and showed that it achieves the minimax rate under the Frobenius norm. They also derived the posterior convergence rate under the spectral norm. Most of the previous works on the Bayesian estimation of large covariance matrix concentrate on the constrained covariance or precision matrix. To the best of our knowledge, only [22] considered asymptotic results for large unconstrained covariance matrix under the “large p and large n” setting. However, they attained the Bernstein-von Mises theorems under somewhat restrictive assumptions on the dimension p. In this paper, we fill the gap in the literature. At first, we propose a new decision theoretic framework to define Bayesian minimax rate. The posterior convergence rate is the primary concept when the asymptotic optimality is studied in the Bayesian sense. But it is not completely satisfactory. The following is a quote from [24] which they write just after defining the posterior convergence rate. ‘We defined “a” rather than the rate of contraction, and hence logically any rate slower than a contraction rate is also a contraction rate. Naturally we are interested in a fastest decreasing sequence n , but in general this may not exist or may be hard to establish. Thus our rate is an upper bound for a targeted rate, and generally we are happy if our rate is equal to or close to an “optimal” rate. With an abuse of terminology we often make statements like “n is the rate of contraction.” ’ In the proposed new decision theoretic framework, a probability measure on the parameter space is an action and a prior is a decision rule for it gives a probability measure (the posterior) for a given data set. In this setup, we define the convergence rate and the Bayesian minimax rate. We investigate the Bayesian minimax rates for unconstrained large covariance matrix. We consider four losses for the covariance inference: spectral norm, Frobenius norm, Bregman divergence and squared log-determinant loss. For the spectral norm, we have the complete result of the Bayesian minimax rate. We show that the Bayesian minimax rate is min(p/n, 1) for all rates 3 of p. For the Frobenius norm and Bregman divergence, we show the Bayesian minimax lower √ bound is p · min(p, n)/n for all rates of p, but obtained the upper bound under the constraint √ √ p ≤ n. Thus, under the condition p ≤ n, the Bayesian minimax rate is p2 /n. We also show that the Bayesian minimax rate under the squared log-determinant loss is p/n when p = o(n). The rest of the paper is organized as follows. In section 2, we define the model, the covariance classes we consider, and introduce some notations. We propose the new decision theoretical framework and define the Bayesian minimax rate. The Bayesian minimax rates under the spectral norm, the Frobenious norm, the Bregman matrix divergence, and the squared log-determinant loss are presented in section 3. A simulation study is given in section 4. The discussion is given in section 5, and the proofs are given in Supplementary Material ([35]). 2 Preliminaries 2.1 The Model and the Inverse-Wishart Prior Suppose we observe a random sample from the p-dimensional normal distribution X1 , · · · , Xn | Σn iid ∼ Np (0, Σn ), (1) where Σn is a p × p positive definite matrix, and p is a function of n such that p = pn −→ ∞ as n −→ ∞. The true value of the covariance matrix is denoted by Σ0 or Σ0n , which is dependent on n. For the prior of the covariance matrix Σn in model (1), we consider the inverse-Wishart prior Σn ∼ IWp (νn , An ), (2) where νn > p − 1, An is a p × p positive definite matrix for a proper prior. The mean of Σn is An /(νn − p − 1). The condition νn > p − 1 is needed for the distribution to have a density in the space of p × p positive definite matrices. If νn is an integer with νn ≤ p − 1, (2) defines a singular distribution on the space of p × p positive semidefinite matrices [43]. We also consider the truncated inverse-Wishart prior. The inverse-Wishart prior with parameter ν and A whose eigenvalues are restricted in [K1 , K2 ] with 0 < K1 < K2 is denoted by IWp (ν, A, K1 , K2 ). The truncated inverse-Wishart prior was adopted for technical reason. By Lemma E.1, to connect the Frobenius norm with Bregman matrix divergence, the eigenvalues 4 of argument matrices have to be bounded. The truncated inverse-Wishart prior guarantees that the posterior covariance matrix has bounded eigenvalues. 2.2 Matrix Norms and Notations We define the spectral norm (or matrix `2 norm) for matrices by kAk := sup kAxk2 , kxk2 =1 P where k · k2 denotes the vector `2 norm defined by kxk2 := ( pi=1 x2i )1/2 , x = (x1 , . . . , xp )T ∈ Rp p and A is p × p matrix. The spectral norm is the same as λmax (AT A) or λmax (A) if A is symmetric, where λmax (B) denotes the largest eigenvalue of B. The Frobenius norm is defined by  1 2 p X p X 2 kAkF :=  aij  , i=1 j=1 where A = (aij ) is a p × p matrix. It is the same as p tr(AT A), where tr(B) denotes the trace of B. The Frobenius norm is the vector `2 norm with p × p matrices treated as p2 -dimensional vectors. The Bregman divergence [7] is originally defined for vectors, but it can be extended to the real symmetric matrices. Let φ be a differentiable and strictly convex function that maps real symmetric p × p matrices to R. The Bregman divergence with φ between two real symmetric matrices is defined as Dφ (A, B) := φ(A) − φ(B) − tr[(∇φ(B))T (A − B)], where A and B are real symmetric matrices and ∇φ is the gradient of φ, i.e., ∇φ(B) = (∂φ(B)/∂Bi,j ). In this paper, we consider a class of φ such that φ(X) = Pp i=1 ϕ(λi ) where ϕ is a differentiable and strictly convex real-valued function and λi ’s are the eigenvalues of A. Furthermore, we assume that ϕ satisfies the following properties for some constant τ1 > 0: (i) ϕ is a twice differentiable and strictly convex function over λ ∈ (τ1 , ∞); (ii) there exist some constants C > 0 and r ∈ R such that |ϕ(λ)| ≤ Cλr for all λ ∈ (τ1 , ∞); and 5 (iii) for any positive constants τ > τ1 , there exist some positive constants ML and MU such that ML ≤ ϕ00 (λ) ≤ MU for all λ ∈ [τ1 , τ ]. The above class of Bregman matrix divergences includes the squared Frobenius norm, von Neumann divergence and Stein’s loss. For their use in statistics and mathematics, see [13], [18] and [34]. If ϕ(λ) = λ2 , the Bregman divergence is the squared Frobenius norm Dφ (A, B) = kA−Bk2F . If ϕ(λ) = λ log λ−λ, it is the von Neumann divergence Dφ (A, B) = tr (A log A − A log B − A + B) , where log A is the matrix logarithm, i.e., A = V DV T is mapped to log A = V log DV T . Here, D = diag(di ) is a p × p diagonal matrix where di is the ith eigenvalue of A, and V = [V1 , · · · , Vp ] is a p × p orthogonal matrix where Vi is an eigenvector of A corresponding to the eigenvalue di . If ϕ(λ) = − log λ, the Bregman divergence is the Stein’s loss Dφ (A, B) = tr(AB −1 ) − log det(AB −1 ) − p. The Stein’s loss is the Kullback-Leibler divergence between two multivariate normal distributions with means zero and covariance matrices A and B, respectively. Finally, we introduce some notations for asymptotic analysis which will be used subsequently. For any positive sequences an and bn , we say an  bn if there exist positive constants c and C such that c ≤ an /bn ≤ C for all sufficiently large n. We define an = o(bn ), if an /bn → 0 as n → ∞ and an = O(bn ), if there exist positive constants N and M such that |an | ≤ M |bn | for all d n ≥ N . For any random variables Xn and X, Xn −→ X means the convergence in distribution. For any real symmetric matrix A, A > 0 (A ≥ 0) means that the matrix A is positive definite (nonnegative definite). We denote δA as the dirac measure at A. 2.3 A Class of Covariance Matrices Let Cp denote the set of all p × p covariance matrices. For any positive constants τ, τ1 and τ2 , define the class of covariance matrix C(τ ) = Cp (τ ) := {Σ ∈ Cp : kΣk ≤ τ, Σ ≥ 0}, C(τ1 , τ2 ) = Cp (τ1 , τ2 ) := {Σ ∈ Cp : λmin (Σ) ≥ τ1 , kΣk ≤ τ2 }, where λmin (Σ) is the smallest eigenvalue of Σ. Throughout the paper, we consider the model (1) and assume that the true covariance matrix belongs to C(τ ) or C(τ1 , τ2 ). 6 Often the subgaussian property is used to relax the Gaussian distribution assumption. The distribution of random vector X has subgaussian property with variance factor τ > 0, if 2 /(2τ ) P (|v T (X − EX)| > t) ≤ e−t for all t > 0 and kvk = 1. The subgaussian property with variance factor τ implies kVar(X)k ≤ 2τ . In the literature, the subgaussian distribution is frequently used as a basic assumption, for examples, [11], [12, 13] and [45]. If X follows a multivariate normal distribution, kΣk ≤ τ is a sufficient condition for X to have the subgaussian property. 2.4 Decision Theoretic Prior Selection Let d(Σ, Σ0 ) be a pseudo-metric that measures the discrepancy between two covariance matrices Σ and Σ0 . A sequence n −→ 0 is called a posterior convergence rate at the true parameter Σ0 if for any Mn −→ ∞, π(d(Σ, Σ0 ) ≥ Mn n | Xn ) −→ 0 in PΣ0 -probability as n −→ ∞. The convergence rate is measured by the rate of n , which allows that the posterior contraction probability converges to zero in probability PΣ0 , where PΣ0 is iid the distribution for random sample (X1 , . . . , Xn ) ∼ Np (0, Σ0 ). In the literature, the posterior is said to achieve the minimax rate if its convergence rate is the same as the frequentist minimax rate ([36]; [21]; [29]). Since the posterior convergence rate cannot be faster than the frequentist minimax rate ([28]), it is often called the optimal rate of posterior convergence ([40]; [38]). However, its definition is elusive as the quote from [24] indicates. As an alternative framework for the evaluation of the prior and the posterior, we take a frequentist decision theoretical approach. For each n, the parameter space is Cp and the action space is the set of all probability measures on Cp . After the data Xn is collected, the posterior π(·|Xn ) is computed for the given prior π and the posterior takes a value in the action space. In this setup, the prior can be considered as a decision rule, because the prior and observations together produce the posterior. A probability measure in the action space will be used as a posterior for the inference, but it does not have to be generated from a prior. We define the loss 7 and risk function of the parameter Σ0 and the prior π as L(Σ0 , π(·|Xn )) := Eπ d(Σ, Σ0 )|Xn ), R(Σ0 , π) := EΣ0 L(Σ0 , π(·|Xn )) = EΣ0 Eπ d(Σ, Σ0 )|Xn ). Note that the risk function measures the performance of the prior π. To distinguish them from the usual loss and risk, we call the above loss and risk as posterior loss (P-loss) and posterior risk (P-risk). The P-risk itself is not new. For example, the P-risk was also used in [14] for density estimation on the unit interval. There are a couple of benefits of the proposed decision theoretic prior selection. First, the decision theoretic prior selection makes the definition of the minimax rate of the posterior mathematically concrete. Although the minimax rate of the posterior is used frequently, it has been used without a rigorous definition. The frequentist minimax rate is used as a proxy of the desired concept. Second, in the study of the posterior convergence rate, the scale of the loss function needs to be carefully chosen so that the posterior consistency holds. But in the proposed decision theoretic prior selection, the inconsistent priors can be compared without any conceptual difficulty. Thus, the scale of the loss function does not need to be chosen. We now define the minimax rate and convergence rate for P-loss. Let Πn be the class of all priors on Σn . A sequence rn is said to be the minimax rate for P-loss (P-loss minimax rate) or simply the Bayesian minimax rate for the class Cp∗ ⊂ Cp and the space of the prior distributions Π∗n ⊂ Πn , if inf sup EΣ0 L(Σ0 , π(·|Xn ))  rn . π∈Π∗n Σ0 ∈C ∗ p A prior π∗ is said to have a convergence rate for P-loss (P-loss convergence rate) or convergence rate an , if sup EΣ0 L(Σ0 , π ∗ (·|Xn )) . an , Σ0 ∈Cp and, if an  rn where rn is the minimax rate for P-loss, π ∗ is said to attain the minimax rate for P-loss or the Bayesian minimax rate. If it is clear from context, we will drop P-loss and refer them as the minimax rate and the convergence rate. For a given inference problem, we wish to find a prior π ∗ which attains the minimax rate for P-loss. Remark The P-loss convergence rate implies the posterior convergence rate by Proposition A.1 in Supplementary Material ([35]). By obtaining the P-loss convergence rate, we also get the 8 traditional posterior convergence rate. The converse may not be true, because for certain loss functions, the P-loss may not even converge to 0 while the posterior convergence rate converges to 0. Remark The P-loss convergence rate is slower than or equal to the frequentist minimax rate by Proposition A.2 in Supplementary Material ([35]). To obtain a P-loss minimax lower bound, the mathematical tools for frequentist minimax lower bound can be used. Remark If we assume that the prior class Πn includes the data dependent priors, the P-loss minimax rate is the same as the frequentist minimax rate. Take π = δΣ̂∗ where Σ̂∗ is an estimator attaining the frequentist minimax rate. Then, π attains the frequentist minimax rate and thus attains the Bayesian minimax rate. However, the data-dependent prior is not acceptable for legitimate Bayesian analysis unless the prior is dependent on ancillary statistics. Even if Πn does not contain data-dependent priors, in most cases the frequentist and P-loss minimax rates are the same. However, if we consider a restricted class of priors, the P-loss minimax rate might differ from the usual frequentist minimax rate. In such cases, the frequentist minimax rate will not be a natural concept to study the asymptotic properties of the posterior. See Remark in subsection 3.2. 3 Bayesian Minimax Rates under Various Matrix Loss Functions 3.1 Bayesian Minimax Rate under Spectral Norm In this subsection, we show that the Bayesian minimax rate for covariance matrix under the spectral norm is min(p/n, 1). We also show that the prior  n n πn (Σn ) = IWp (Σn | νn , An )I p ≤ + δIp (Σn )I p > 2 2  (3) attains the Bayesian minimax rate for the class C(τ1 , τ2 ) under the spectral norm, where IWp (Σ | νn , An ) is the inverse-Wishart distribution, νn > p − 1 and An is a p × p positive definite matrix. We have the complete result for all values of n and p. The Bayesian minimax rate holds for any 9 n and p, regardless of their relationship. The number 1/2 in the prior (3) can be replaced by any number in (0, 1) and the prior still renders the minimax rate. The main result of the section is given in Theorem 3.1 whose proof is given in Supplementary Material ([35]). We divide the proof into two parts: lower bound and upper bound parts. First, we show that the lower bound of the frequentist minimax rate is min(p/n, 1), which may be of interest in its own right, and it in turn implies that min(p/n, 1) is a Bayesian minimax lower bound. After that, the P-loss convergence rate with the prior (3) is derived, which is the same as the Bayesian minimax lower bound when νn2 = O(np) and An = Sn . Consequently, we obtain the following theorem by combining these two results. Throughout the paper, Πn is the class of all priors on Σn ∈ Cp as we have defined in subsection 2.4. Theorem 3.1 Consider the model (1). For any positive constants τ1 < τ2 , inf sup π∈Πn Σ0 ∈C(τ1 ,τ2 ) EΣ0 Eπ (kΣn − Σ0 k2 | Xn )  min p n  ,1 . Furthermore, the prior (3) with νn2 = O(np) and kAn k2 = O(np) attains the Bayesian minimax rate. Remark The proof for the lower bound holds even for τ1 and τ2 depending on n and possibly for τ1 −→ 0 and τ2 −→ ∞ as n −→ ∞. In such cases, the rate of the minimax lower bound is τ22 · min (p/n, 1). For details, see Theorem B.1 in the Supplementary Material ([35]). Note that τ2 affects the minimax lower bound, while τ1 does not. A similar phenomenon occurs for estimation of sparse spiked covariance matrices. See Theorem 4 of [10]. We have complete results of the Bayesian minimax rate under the spectral norm. In words, the results above do not have any condition on the rate of p and n. For a given rate of p, we obtained the Bayesian minimax rate. When p grows the same rate as n, the above theorem shows that estimating the covariance under the spectral norm is hopeless. Indeed, this can be seen from the form of the prior (3). When p ≥ n/2, the point mass prior δIp gives the Bayesian minimax rate. In words, you can not do better than the useless point mass prior δIp . Applying techniques used in the proof of the upper bound, one can show that the prior (3) also gives the same P-loss convergence rate for precision matrix. 10 Corollary 3.2 Consider the model (1) and prior (3) with νn2 = O(np) and kAn k2 = O(np). For any positive constants τ1 < τ2 , sup Σ0 ∈C(τ1 ,τ2 ) −1 2 EΣ0 Eπ (kΣ−1 n − Σ0 k | Xn ) ≤ c · min p n ,1  for all sufficiently large n and some constant c > 0. We remark here that [22] derived a posterior convergence rate for unconstrained covariance matrix under the spectral norm when p = o(n). In this paper, we obtained a P-loss convergence rate which implies the stronger convergence than a posterior convergence rate, for any n and p. [22] also attained a posterior convergence rate for precision matrix under p2 = o(n). In this paper, Corollary 3.2 gives a P-loss convergence rate for any n and p. 3.2 Bayesian Minimax Rate under Frobenius Norm Throughout this subsection, τ > 0 can depend on n and possibly τ −→ ∞ as n −→ ∞. In this subsection, we show that the rate of the Bayesian minimax lower bound for covariance matrix √ under Frobenius norm is τ 2 · min(p, n) · p/n for the class C(τ ), and the inverse-Wishart prior √ attains the Bayesian minimax lower bound when p ≤ n. The following theorem gives the Bayesian minimax lower bound. The proof of Theorem 3.3 is given in Supplementary Material ([35]). In the proof of the theorem, we prove that the lower √ bound of the frequentist minimax rate is τ 2 · min(p, n) · p/n as a by-product. Theorem 3.3 Consider the model (1). For any τ > 0, inf sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn ) ≥ c · τ 2 · π∈Πn Σ0 ∈C(τ ) √ p · min(p, n) n for all sufficiently large n and some constant c > 0. Theorem 3.4 Consider the model (1) and prior (2) with νn > 0 and An > 0 for all n. If νn = p and kAn k2 = O(n), for any τ > 0, sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn ) ≤ c · τ 2 · Σ0 ∈C(τ ) p2 n for some constant c > 0 and all sufficiently large n. Furthermore, if p ≤ √ n, νn2 = O(np) and kAn k2 = O(np) is the necessary and sufficient condition for achieving the rate p2 /n. 11 Note that if τ > 0 is a fixed constant, from the relationship between the spectral norm and Frobenius norm, one can obtain a P-loss convergence rate min(p, n) · p/n instead of p2 /n in Theorem 3.4. However, in this case, one should restrict the parameter space to C(τ1 , τ2 ) instead of the more general parameter space C(τ ). In practice, we recommend using νn = p and small An such as An = Op or An = Ip , where Op denotes a p × p zero matrix because it guarantees the rate p2 /n regardless of the relation between n and p. Note that the Jeffreys prior [31] π(Σn ) ∝ det(Σn )−(p+2)/2 , the independence-Jeffreys prior [42] π(Σn ) ∝ det(Σn )−(p+1)/2 and the prior proposed by [23] π(Σn ) ∝ det(Σn )−p satisfy the above conditions. They can be viewed as inverse-Wishart priors, IW (νn , An ), with parameters (1, Op ), (0, Op ) and (p − 1, Op ), respectively. Furthermore, the IW (p + 1, Sn ) prior, whose mean is Sn , also satisfies the conditions in Theorem 3.4. By Theorem 3.4 and Theorem 3.3, we have the Bayesian minimax rate τ 2 ·p2 /n for covariance √ matrix under the Frobenius norm when p ≤ n. Thus, with the inverse-Wishart prior, we attain the Bayesian minimax rate under the Frobenius norm. Theorem 3.5 Consider the model (1). If p ≤ inf √ n, for any τ > 0, sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn )  τ 2 · π∈Πn Σ0 ∈C(τ ) p2 . n Furthermore, νn2 = O(np) and kAn k2 = O(np) is the necessary and sufficient condition for the √ prior (2) to achieve the Bayesian minimax rate when p ≤ n. Remark In section 2.4, we have said that the Bayesian minimax rate can be different from the frequentist minimax rate when a restricted prior class is considered, and that the frequentist minimax rate will not be a natural concept to address the asymptotic properties of the posteriors 12 from a restricted prior class. We give an example here. Consider a prior class Π∗n = {π ∈ √ IWp (νn , An ) : νn ≥ n, An ∈ Cp } and assume p ≤ n. It is easy to check that inf sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn )  τ 2 · p, π∈Π∗n Σ0 ∈C(τ ) from the proof of Theorem 3.4. Note that the obtained P-loss minimax rate differs from the usual frequentist minimax rate, τ 2 · p2 /n. 3.3 Bayesian Minimax Rate under Bregman matrix Divergence In this section, we obtain the Bayesian minimax rate under a certain class of Bregman matrix divergences. Let Φ be the class of differentiable and strictly convex real-valued functions satisfying (i)-(iii) conditions in the subsection 2.2, and let DΦ be the class of Bregman matrix divergences P Dφ where φ(X) = pi=1 ϕ(λi ) for symmetric matrix X and ϕ ∈ Φ. To achieve the Bayesian minimax convergence rate for Bregman matrix divergences, we use the truncated inverse-Wishart distribution IWp (νn , An , K1 , K2 ) whose eigenvalues are all in [K1 , K2 ] for some positive constants K1 < K2 . The density function of IWp (νn , An , K1 , K2 ) is given by 1 π n,K1 ,K2 (Σn ) = −1 det(Σn )−(ν+p+1)/2 e− 2 tr(An Σn ) I(Σn ∈ C(K1 , K2 )) R 0−1 1 0 −(ν+p+1)/2 e− 2 tr(An Σn ) dΣ0 n C(K1 ,K2 ) det(Σn ) (4) where νn > p − 1 and An is a p × p positive definite matrix. Theorem 3.6 Consider the model (1). If p ≤ inf sup π∈Πn Σ0 ∈C(τ1 ,τ2 ) √ n, for any positive constants τ1 < τ2 EΣ0 Eπ (Dφ (Σn , Σ0 ) | Xn )  p2 n for all Dφ ∈ DΦ . Furthermore, the prior (4) with νn2 = O(np), kAn k2 = O(np), K1 < τ1 and √ K2 > τ2 achieves the Bayesian minimax rate when p ≤ n. To extend the minimax result for the squared Frobenius norm to the Bregman matrix divergence, the posterior distribution for Σn and the true covariance Σ0 should be included in the class C(K1 , K2 ) and C(τ1 , τ2 ), respectively, for some positive constants K1 < τ1 and K2 > τ2 . The truncated inverse-Wishart prior was needed to restrict the posterior distribution for Σn within the class C(K1 , K2 ). In practice, we recommend using sufficiently small K1 and large K2 . 13 According to the above theorem, the minimax convergence rate for the class DΦ is equivalent to that for the Frobenius norm if we consider the parameter space C(τ1 , τ2 ). Moreover, the truncated inverse-Wishart prior IWp (νn , An , K1 , K2 ) achieves the Bayesian minimax rate. The proof of the theorem is given in Supplementary Material ([35]). 3.4 Bayesian Minimax Rate of Log Determinant of Covariance Matrix In this subsection, we establish the Bayesian minimax rate for the log-determinant of the covariance matrix under squared error loss. The frequentist minimax lower bound was derived by [9]. We prove that the inverse-Wishart prior achieves the Bayesian minimax rate when p = o(n). The estimator of the log-determinant of the covariance matrix can be used as a basic ingredient for constructing hypothesis test or the quadratic discriminant analysis [2]. The logdeterminant of the covariance matrix is needed to compute the quadratic discriminant function for multivariate normal distribution 1 1 − log det Σ − (x − µ)T Σ−1 (x − µ) 2 2 where x is the random sample from Np (µ, Σ). Furthermore, the differential entropy of Np (µ, Σ) is given by p p log(2π) log det Σ + + , 2 2 2 so the estimation of the differential entropy is equivalent to estimation of the log-determinant of the covariance matrix, when we consider the multivariate normal distribution. The differential entropy has various applications including independent component analysis (ICA), spectroscopy, image analysis, and information theory. See [5], [19], [30] and [16]. [9] showed that the minimax rate for the log-determinant of the covariance matrix under squared error loss is p/n and their estimator achieves this optimal rate when p = o(n). On the Bayesian side, [41] and [26] suggested a Bayes estimator for log-determinant of the covariance matrix of the multivariate normal. They proposed using the inverse-Wishart prior and showed that the posterior mean minimizes expected Bregman divergence. In this subsection, we support their argument by showing that the inverse-Wishart prior achieves the P-loss minimax rate for log-determinant of the covariance matrix under squared error loss. Thus, we show that the inverse-Wishart prior gives the optimal result in the Bayesian sense. We also show the sufficient conditions for achieving the Bayesian minimax rate. The following theorem presents 14 the Bayesian minimax rate for the log-determinant of the covariance matrix under the squared error loss. The proof of the theorem is given in Supplementary Material ([35]). Theorem 3.7 Consider the model (1). If p = o(n), we have inf sup EΣ0 Eπ ((log det Σn − log det Σ0 )2 | Xn )  π∈Πn Σ0 ∈Cp p . n Furthermore, prior (2) with νn2 = O(n/p) and An = Op attains the Bayesian minimax rate. Remark One can also show that the optimal minimax convergence rate is achieved by using the prior (2) with νn2 = O(n/p), An = cn Sn and c2n = O(n/p). Remark [22] showed the Bernstein-von Mises result for the log-determinant of covariance, which implies a posterior convergence rate. However, they considered a restrictive parameter space C(τ1 , τ2 ) and the stronger condition p3 = o(n). In this paper, the more general parameter space Cp and weaker condition p = o(n) are sufficient for the stronger result, a P-loss convergence rate. 4 Simulation study In this section, we support our theoretical results by a simulation study. The simulations for three loss functions, spectral norm, square of scaled Frobenius norm and squared log-determinant loss, were conducted. We compare the performance of the minimax priors with those of some frequentist estimators. We choose the posterior mean as a Bayesian estimator. The posterior mean obtained from the minimax prior attains the minimax rate in Theorem B.2, Theorem 3.4 and Theorem 3.7 by the Jensen’s inequality. We generated dataset X1 , . . . , Xn from Np (0, Σ0 ) where true covariance matrix Σ0 was either diagonal or full covariance matrix. A full covariance matrix is a covariance matrix which does not have any restriction on its elements such as sparsity or banding. In the diagonal covariance iid setting, the true covariance is Σ0 = diag(σ0,ii ) where σ0,ii ∼ U nif (0, 5). In the full covariance setting, we made the true covariance Σ0 = V T V where V = (vij ) is a p × p matrix with iid vij ∼ N (0, 5/p). In the simulation study, the dimensions of the true covariance matrices are 25, 50, 100 and 200, and the numbers of data n are either n = p2 or n = dp3/2 e. For each 15 setting, we generated a true covariance once for which we generated 100 data sets and calculated estimators of the covariance. For the spectral norm and square of scaled Frobenius norm loss, we computed the posterior p mean of the inverse-Wishart prior, IW (νn , An ), for comparison. We chose νn = 2, n/p, p and n to see the effect of the νn , but fixed An = Op to remove the prior effect on the structure of the covariance estimate. By Theorems B.2 and 3.4, when n = p2 , the inverse-Wishart prior with p νn = 2, n/p and p are minimax priors, while that with νn = n is not. We also computed the sample covariance Sn and the tapering estimator Σ̂k [11] for comparison. As mentioned before, the sample covariance matrix is a Bayesian estimator using inverse-Wishart prior with νn = p+1 √ and An = Op , which satisfies the conditions in Theorem 3.4. We used k = n as the threshold of tapering estimator. It corresponds to α = 0 in [11], which gives the minimal sparse constraint for the covariance matrix in their class. Figure 1 summarizes the simulation results for the spectral norm. Each point of the plot was calculated by 100 1 X b (s) k kΣ0 − Σ n 100 s=1 b (s) where Σ n is the estimate of the true covariance Σ0 in s-th simulation. The first and second rows of Figure 1 show the results when the true covariance matrix is a diagonal and full covariance, respectively; the left and right columns are the results when n = p2 and n = dp3/2 e, respectively. The inverse-Wishart prior with νn = p and the sample covariance performed well in all cases. They are either the best or comparable to the best. When n = dp3/2 e, the truncated inverseWishart prior with νn = n is not minimax, and the simulation results show that it performed p the worst or the second to the worst. The inverse-Wishart priors with νn = 2 and n/p are minimax, and thus their risks decrease as n −→ ∞ in all cases, but their performance are slightly worse than that with νn = p. The tapering estimator Σ̂k performed the best in diagonal settings because it gives zero to many of upper and lower diagonal elements or shrink them toward zero. However, in the full covariance settings, it performed the worst or close to the worst for the same reason. Figure 2 summarizes the simulation results for Frobenius norm. Each point of the plot was 16 Figure 1: The risks for the Bayes estimator with IW (νn , Op , K), the sample covariance Sn and tapering estimator Σ̂k under the spectral norm loss function. The true covariances were generated in diagonal setting (top row) and full covariance setting (bottom row). The number of the observation was chosen by either n = p2 (left column) or n = dp3/2 e (right column). calculated by 100 1 X1 b (s) k2 kΣ0 − Σ n F 100 p s=1 where b (s) Σ n is the estimate of the true covariance Σ0 in s-th simulation. The results are quite similar to the spectral norm case. For the square of log-determinant loss, we chose the maximum likelihood estimator (MLE) log det Sn and the uniformly minimum variance unbiased estimator (UMVUE) for comparison. 17 Figure 2: The risks for the Bayes estimator with IW (νn , Op , K), the sample covariance Sn and tapering estimator Σ̂k under the squared Frobenius norm loss function. The true covariances were generated in diagonal setting (top row) and full covariance setting (bottom row). The number of the observation was chosen by either n = p2 (left column) or n = dp3/2 e (right column). The UMVUE of log det Σ is given by log det Sn + p log n 2 − p−1 X j=0  ψ n−k 2  where ψ is the digamma function which is defined by ψ(x) = d/dz log Γ(z)|z=x where Γ is the gamma function. See [1] for more details. We tried the same settings for inverse-Wishart prior as p before. Note that for n = p2 and n = dp3/2 e, the choices νn = 2 and n/p satisfy the sufficient condition in Theorem 3.7 while νn = p and n do not. The posterior mean of the log-determinant 18 Figure 3: The squared log-determinant loss function plot. The true covariances were generated in diagonal setting (top row) and full covariance setting (bottom row). The number of the observation was chosen by either n = p2 (left column) or n = dp3/2 e (right column). for the inverse-Wishart prior is    p−1  n X n + νn − k An + p log − ψ . log det Sn + n 2 2 j=0 Thus, the UMVUE is the same as the Bayesian estimator using inverse-Wishart prior with νn = 0 and An = Op , which satisfies the sufficient condition in Theorem 3.7. Figure 3 summarizes the simulation results for log-determinant. Each point of the plot was calculated by 100 (s) 1 X \ (log det Σ0 − log det Σn )2 100 s=1 where (s) \ log det Σn is the estimate of log det Σ in s-th simulation and Σ0 is the true covariance. 19 The top and bottom rows are for the diagonal and full true covariance cases, respectively; the left and right columns are for n = p2 and dp3/2 e, respectively. For the squared log-determinant loss, the inverse-Wishart priors with νn = 2 and p n/p are minimax, while those with νn = p and n are not. The UMVUE or the Bayes estimator of the the inverse-Wishart priors with νn = 0 performed the best in all cases. The inverse-Wishart priors p with νn = 2 and n/p performed comparable to the UMVUE. Interestingly, the inverse-Wishart priors with νn = p, which was the best under the spectral norm, performed worst in all cases. When n = dp3/2 e, the results for νn = p do not appear in the Figure 3 because of its large risk values. This signifies the fact that we need to choose different prior parameter for different loss function. 5 Discussion In this paper, we develop a new framework for the Bayesian minimax theory, and introduce Bayesian minimax rate and P-loss convergence rate. The proposed decision theoretic framework gives an alternative way to distinguish the good priors from the inadequate ones and makes the definition of the minimax rate of the posterior clear. We obtain the Bayesian minimax rates for the normal covariance model under the various loss functions: spectral norm, the squared Frobenius norm, Bregman matrix divergence and squared log-determinant loss for large covariance estimation. We show that the inverse-Wishart prior or truncated inverse-Wishart prior attains the Bayesian minimax rate. The simulation results support the theory obtained. A Basic properties of P-loss convergence rate A frequentist minimax lower bound is defined as a lower bound of inf sup EΣ0 (d(Σ̂, Σ0 )) Σ̂ Σ0 ∈Cp where Σ̂ denotes an arbitrary estimator of Σ0 , and we say rn is the frequentist minimax rate for the class Cp and the space of the estimators of Σ0 , if inf sup EΣ0 (d(Σ̂, Σ0 ))  rn . Σ̂ Σ0 ∈Cp 20 Propositions A.1 and A.2 state two basic properties of P-loss convergence rate and the Bayesian minimax rate. Proposition A.1 For any Σ0 ∈ Cp , a P-loss convergence rate at Σ0 is a posterior convergence rate at Σ0 . Proof Suppose that the rate of the P-loss convergence rate at Σ0 ∈ Cp is n , i.e., EΣ0 Eπ (d(Σ, Σ0 )|Xn )  n . For a sequence Mn −→ ∞ and δ > 0, PΣ0 (π(d(Σ, Σ0 ) ≥ Mn n | Xn ) > δ) PΣ0 (Eπ (d(Σ, Σ0 ) | Xn ) > δMn n ) 1 ≤ EΣ Eπ (d(Σ, Σ0 ) | Xn ) δMn n 0 −→ 0, as n → ∞. ≤ The first and second inequalities follow from the Markov inequality. Proposition A.2 A frequentist minimax lower bound for Σ0 is also a P-loss minimax lower bound for any loss function d(·, Σ0 ), i.e., inf sup EΣ0 Eπ (d(Σ, Σ0 ) | Xn ) ≥ inf sup EΣ0 (d(Σ̂, Σ0 )), π∈Πn Σ0 ∈Cp Σ̂ Σ0 ∈Cp where Σ̂ denotes an arbitrary estimator of Σ0 . Proof Note that the P-risk is always equal or larger than the posterior convergence rate by Markov’s inequality, and the frequentist minimax rate is a lower bound for the posterior convergence rate ([28]). Thus, the frequentist minimax rate is also a lower bound for the P-loss minimax rate. B Proof of Theorem 3.1 We divide the proof of Theorem 3.1 into two parts: the lower bound part (Theorem B.1) and the upper bound part (Theorem B.2). For Theorem B.1, we have a quite strong result in sense that it holds even for τ1 and τ2 depending on n and possibly τ1 −→ 0 and τ2 −→ ∞ as n −→ ∞. 21 Theorem B.1 Consider the model (1). For any positive constants τ1 < τ2 , for both fixed p and p −→ ∞ as n −→ ∞, inf sup π∈Πn Σ0 ∈C(τ1 ,τ2 ) EΣ0 Eπ (kΣn − Σ0 k2 | Xn ) ≥ c · τ22 · min p n  ,1 for all sufficiently large n and some constant c > 0. Theorem B.2 Consider the model (1) and prior (3) with νn2 = O(np) and kAn k2 = O(np). For any positive constants τ1 < τ2 , sup Σ0 ∈C(τ1 ,τ2 ) EΣ0 Eπ (kΣn − Σ0 k2 | Xn ) ≤ c · min p n  ,1 for all sufficiently large n and some constant c > 0. B.1 Proof of Theorem B.1 Lemma B.3-B.5 are used to prove Theorem B.1. The proofs of Lemma B.3 and Lemma B.4 are straightforward, and they are omitted here. Lemma B.3 Let fi be the density function of p-dimensional Np (0, Σi ), i = 0, 1, 2. If Σ−1 1 + −1 Σ−2 2 − Σ0 is a positive definite matrix, Z Rp f1 f2 −1/2 . dx = [det(Ip − Σ−2 0 (Σ1 − Σ0 )(Σ2 − Σ0 ))] f0 √ Lemma B.4 Define U := {u ∈ Rp : ui = ±1/ p, i = 1, · · · , p}. For any u, v ∼ U nif (U), d hu, vi ≡ 2B/p − 1 where B ∼ Bin(p, 1/2). Lemma B.5 Let P0 , P1 ∈ P where P is a set of all probability measures on X and let f0 R and f1 be their density functions, respectively. Define ξ = ξ(P0 , P1 ) := X f12 /f0 dx and set θi = θ(Pi ), i = 0, 1, where θ is a functional defined on P. Then inf max{E0 (δ − θ0 )2 , E1 (δ − θ1 )2 } ≥ δ (θ1 − θ0 )2 , (1 + ξ 1/2 )2 where δ denotes any estimator of θ and Ei represents the expectation with respect to Pi , i = 0, 1. 22 Proof For given estimator δ which satisfies R(δ, θ0 ) = E|δ(X) − θ|2 ≤ 2 , we have R(δ, θ1 ) ≥ (|θ1 − θ0 | − ξ 1/2 )2 by [8]. Choose  = |θ1 − θ0 |/(1 + ξ 1/2 ) so that 2 = (|θ1 − θ0 | − ξ 1/2 )2 . If E0 (δ − θ0 )2 ≤ 2 , we have max{E0 (δ − θ0 )2 , E1 (δ − θ1 )2 } ≥ E1 (δ − θ1 )2 ≥ 2 = (θ1 − θ0 )2 (1 + ξ 1/2 )2 If E0 (δ − θ0 )2 ≥ 2 , we have max{E0 (δ − θ0 )2 , E1 (δ − θ1 )2 } ≥ E0 (δ − θ0 )2 ≥ 2 = (θ1 − θ0 )2 . (1 + ξ 1/2 )2 Hence, inf max{E0 (δ − θ0 )2 , E1 (δ − θ1 )2 } ≥ δ (θ1 − θ0 )2 1 (1 + ξ 2 )2 . Proof of Theorem B.1 It suffices to show that inf sup Σ̂n Σ0 ∈C(τ1 ,τ2 ) EΣ0 kΣ̂n − Σ0 k2 ≥ c0 · τ22 · min p n ,1  for some constant c0 > 0 because by the Jensen’s inequality, inf sup π∈Πn Σ0 ∈C(τ1 ,τ2 ) EΣ0 Eπ (kΣn − Σ0 k2 | Xn ) ≥ inf sup π∈Πn Σ0 ∈C(τ1 ,τ2 ) ≥ inf sup Σ̂n Σ0 ∈C(τ1 ,τ2 ) EΣ0 kΣ̃n − Σ0 k2 EΣ0 kΣ̂n − Σ0 k2 , where Σ̃n := Eπ (Σn | Xn ). Assume n ≥ p and define n o √ u = (u1 , . . . , up ) ∈ Rp : ui = ±1/ p, i = 1, · · · , p , n o  τ2  Θ := Σ ∈ Rp×p : Σ = Ip + uuT , u ∈ U 1+ U := p with  = c p/n ≤ 1 for some small c > 0 satisfying  ≤ τ2 /τ1 −1. Let P0n = N (0, 2−1 τ2 Ip )n , P1n = P 2−p Σ∈Θ N (0, Σ)n and let f0n and f1n be their density functions, respectively. Note that kΣk = 23 τ2 and λmin (Σ) = (1 + )−1 τ2 ≥ τ1 for any Σ ∈ Θ, thus Θ ⊂ C(τ1 , τ2 ) for some small c > 0. By the above Lemma B.5, inf sup Σ̂n Σ0 ∈C(τ1 ,τ2 ) EΣ0 kΣ̂n − Σ0 k2 ≥ inf sup ≥ inf sup Σ̂n Σ0 ∈C(τ1 ,τ2 ) δ Σ0 ∈C(τ1 ,τ2 ) ≥ inf max EΣ0 (kΣ̂n k − kΣ0 k)2 EΣ0 (δ − kΣ0 k)2 EΣ0 (δ − kΣ0 k)2 δ Σ0 ∈{2−1 τ2 Ip }∪Θ ≥ inf max(Ef0n (δ − (1 + )−1 τ2 )2 , Ef1n (δ − τ2 )2 ) δ τ22 2 , 4(1 + ξ 1/2 )2 R where δ denotes any estimator of kΣ0 k and ξ := (f1n )2 /f0n . The fourth inequality follows from Z 2 inf max EfΣ (δ − kΣk) = inf max (δ(x) − τ2 )2 fΣn (x)dx δ Σ∈Θ δ Σ∈Θ Z 1 X ≥ inf p (δ(x) − τ2 )2 fΣn (x)dx δ 2 Σ∈Θ Z = inf (δ(x) − τ2 )2 f1n (x)dx ≥ δ = inf Ef1n (δ − τ2 )2 δ where fΣn is the density function of N (0, Σ)n . Now we calculate ξ. Z (f1n )2 ξ = f0n P Z (2−p Σ∈Θ fΣn )2 = f0n X Z fΣn fΣn 1 1 2 = 22p f0n Σ1 ,Σ2 ∈Θ X Z fΣ fΣ n 1 1 2 = 22p f0 Σ1 ,Σ2 ∈Θ = 1 X det[(Ip − 2 uuT vv T )]−n/2 22p = 1 X (1 − 2 (uT v)2 )−n/2 22p u,v∈U u,v∈U = E(1 − 2 hu, vi2 )−n/2 ≤ E(exp(2n2 hu, vi2 )), where u, v ∼ U nif (U). The fifth equality is derived from Lemma B.3. We will show that ξ ≤ C for some constant C > 0 for all sufficiently large n. If p does not grow to infinity, i.e., p ≤ C for 24 some constant C > 0, the last term bounded above easily, E(exp(2n2 hu, vi2 )) ≤ exp(2c2 p) ≤ d √ √ d exp(2c2 C). If p tends to infinity, by the Lemma B.4, note that phu, vi ≡ p(2B/p − 1) −→ N (0, 1) as n −→ ∞ where B ∼ Bin(p, 1/2). Note also that we have "  2 #! 2 1 E exp cp B−1 −→ E(exp(cZ 2 )) = √ p 1 − 2c by Theorem 1 of [33] for 0 < c < 1/2, Z ∼ N (0, 1). In our setting, consider Fp as the distribution p function of p(2B/p − 1)2 . Thus, we get the followings by taking  = c p/n for some small c > 0 such that 2c < 1/2, " ≤ ξ −→  E exp 2cp √ 2 B−1 p 2 #! 1 , 1 − 4c as n −→ ∞. Hence, we have inf sup EΣ0 kΣ̂n − Σ0 k2 ≥ Σ̂n Σ0 ∈C(τ1 ,τ2 ) p τ22 2 ≥ c0 · τ22 · n 4(1 + ξ 1/2 )2 for some c0 > 0 which proves the lower bound when n ≥ p. Now, assume n < p and define n o 1 Un := u ∈ Rn : ui = ± √ , i = 1, . . . , n n         Σn 0 τ2 T   In + uu , u ∈ Un . Θ := Σ= : Σn =   1+ 0 Ip−n Earlier result shows that inf sup EkΣ̂n − Σ0 k2 ≥ inf max EkΣ̂n − Σ0 k2 Σ̂n Σ0 ∈Θ Σ̂n Σ0 ∈C(τ1 ,τ2 ) ≥ c0 · τ22 · n = c0 · τ22 n for some c0 > 0. B.2 Proof of Theorem B.2 Lemma B.6 Let Ωn ∼ Wp (νn , νn−1 An ) with νn > p and positive definite matrix An , for all n ≥ 1 and kAn k ≤ τn for all sufficiently large n. Then, there exist positive constants c1 and c2 such that   2 2 P(kΩn − An k ≥ x) ≤ 5p e−c1 νn x /τn + e−c2 νn x/τn 25 for all x > 0. Proof There exist vj with kvj k2 = 1 for j = 1, . . . , 5p , such that kAk ≤ 4 · sup |vjT Avj | j≤5p for any p × p symmetric matrix A (Page 2141 of [11]). Thus, we have P(kΩn − An k ≥ x) ≤ P(kAn kkA−1/2 Ωn A−1/2 − Ip k ≥ x) n n ≤ P(kAn−1/2 Ωn A−1/2 − Ip k ≥ x/τn ) n ! ≤ P 4 · sup |vjT (An−1/2 Ωn An−1/2 − Ip )vj | ≥ x/τn j≤5p   ≤ 5p sup π |vjT (A−1/2 Ωn A−1/2 − Ip )vj | ≥ x/(4τn ) n n j≤5p   2 2 ≤ 5p e−c1 νn x /τn + e−c2 νn x/τn . −1/2 The last inequality follows from Lemma 2.4 and Theorem 3.2 of [39] because An −1/2 Ω n An ∼ Wp (νn , νn−1 Ip ). Lemma B.7 Let Ωn ∼ Wp (νn , νn−1 Ip ) with cνn ≥ p for some constant 0 < c < 1. Then , π(λmax (Ωn ) ≥ c1 ) ≤ 2e−νn /2 , √ 2 π(λmin (Ωn ) ≤ c2 ) ≤ 2e−νn (1− p/νn ) /8 for any constant c1 ≥ (2 + p p p/νn )2 and 0 < c2 ≤ (1 − p/νn )2 /4. Proof It follows from Corollary 5.35 in [20], p √ 2 p/νn + t/ νn ) ≤ 2e−t /2 , p √ 2 ≤ 1 − p/νn − t/ νn ) ≤ 2e−t /2 π(λmax (Ωn )1/2 ≥ 1 + (5) π(λmin (Ωn )1/2 (6) for any t ≥ 0. If we choose t = √ νn for (5), it gives the first inequality π(λmax (Ωn ) ≥ (2 + If we choose t = p p/νn )2 ) ≤ 2e−νn /2 . p p √ νn (1 − p/νn − (1 − p/νn )/2) > 0 for (6), it gives the second inequality π(λmin (Ωn ) ≤ (1 − p p/νn )2 /4) ≤ 2e−νn (1− ≤ 2e−νn (1− 26 √ √ p/νn −(1− p/νn )2 /8 . √ p/νn )/2)2 /2 Proof of Theorem B.2 We prove the upper bound for p ≤ n/2 case first. Note that EΣ0 Eπ (kΣn − Σ0 k | Xn ) ≤ EΣ0 Eπ (kΣn − Σ̆n k | Xn ) + EΣ0 kΣ̆n − Σ0 k, (7) where Σ̆n := (nSn + An )/(n + νn ). Consider the first term of right hand side (RHS) of (7). EΣ0 Eπ (kΣn − Σ̆n k | Xn ) h i = EΣ0 Eπ (kΣn − Σ̆n k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 k ≤ C ) 2 n h i + EΣ0 Eπ (kΣn − Σ̆n k | Xn )I(kΣ̆n k > C1 or kΣ̆−1 k > C ) 2 n (8) (9) for any constant C1 and C2 . The integrand of (8) is bounded by Eπ (kΣn − Σ̆n k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 n k ≤ C2 ) −1 ≤ Eπ (kΣn kkΣ−1 n Σ̆n − Ip k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆n k ≤ C2 ) −1 1/2 1/2 −1 ≤ Eπ (kΣn kkΣ̆−1/2 kkΣ̆1/2 n n Σn Σ̆n − Ip kkΣ̆n k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆n k ≤ C2 ) p −1 1/2 −1 ≤ C1 C2 · Eπ (kΣn kkΣ̆1/2 n Σn Σ̆n − Ip k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆n k ≤ C2 ) h i1/2 p ≤ C1 C2 · Eπ (kΣn k2 | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 k ≤ C ) 2 n h i1/2 −1 1/2 2 × Eπ (kΣ̆1/2 . n Σn Σ̆n − Ip k | Xn ) To show that h i p EΣ0 Eπ (kΣn − Σ̆n k | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 p/n, k ≤ C ) . 2 n 1/2 1/2 it suffices to prove that Eπ (kΣ̆n Σ−1 n Σ̆n − Ip k2 | Xn ) . p/n and Eπ (kΣn k2 | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 n k ≤ C2 ) = O(1). Note that −1 1/2 2 Eπ (kΣ̆1/2 n Σn Σ̆n − Ip k | Xn ) Z ∞ −1 1/2 2 ≤ π(kΣ̆1/2 n Σn Σ̆n − Ip k ≥ u | Xn )du + x x Z ∞  √  ≤ 5p e−C3 (n+νn )u + e−C4 (n+νn ) u du + x ≤ x 5p e−C3 (n+νn )x √ √ √ 5p · 2 xe−C4 (n+νn ) x 5p · 2e−C4 (n+νn ) x + + +x C3 (n + νn ) C4 (n + νn ) C42 (n + νn )2 27 (10) for any x > 0 and some positive constants C3 and C4 by Lemma B.6. If we choose x = C5 · p/n for some large C5 > 0, the rate of (10) is p/n. Note that Eπ kΣn k2 | Xn   ≤ Eπ kΣn k2 I(kΣn k > C6 ) | Xn + C62  1/2 ≤ Eπ kΣn k4 | Xn [π (kΣn k > C6 | Xn )]1/2 + C62 , by Hölder’s inequality. One can easily show that Eπ (kΣn k4 | Xn ) is bounded above by p5 up to some constant factor because kΣn k ≤ tr(Σn ) and Eπ (tr(Σn )4 | Xn )I(kΣ̆n k ≤ C1 and kΣ̆−1 n k ≤ C2 ) . p4 . Also note that  −1 π (kΣn k > C6 | Xn ) = π λmin (Σ−1 n ) < C6 | Xn   −1 1/2 | X ) ≤ π λmin (Σ̆n1/2 Σ−1 Σ̆ ) < k Σ̆ kC n n n n 6   −1 1/2 ≤ π λmin (Σ̆n1/2 Σ−1 n Σ̆n ) < C1 C6 | Xn ) √ 2 ≤ 2e−(n+νn )(1− p/(n+νn )) /8 for some constant C6 ≥ C1 · 4(1 − p of (8) is smaller than p/n. p 1/2)−2 by Lemma B.7. Thus, we have shown that the rate Now, we show that the rate of (9) is smaller than p p/n. Note that (9) is bounded by h i EΣ0 Eπ (kΣn − Σ̆n k | Xn )I(kΣ̆n k > C1 or kΣ̆−1 k > C ) 2 n h  i ≤ EΣ0 Eπ (kΣn k | Xn ) + kΣ̆n k I(kΣ̆n k > C1 or kΣ̆−1 n k > C2 ) h i h i ≤ EΣ0 Eπ (kΣn k | Xn )I(kΣ̆n k > C1 ) + EΣ0 Eπ (kΣn k | Xn )I(kΣ̆−1 k > C ) 2 n h i h i + EΣ0 kΣ̆n kI(kΣ̆n k > C1 ) + EΣ0 kΣ̆n kI(kΣ̆−1 n k > C2 ) Since Σ̆n = (nSn + An )/(n + νn ) and Σ0 ∈ C(τ1 , τ2 ), we have   kAn k > C1 PΣ0 (kΣ̆n k > C1 ) ≤ PΣ0 kSn k + n + νn   kAn k = PΣ0 kSn k > C1 − n + νn    kAn k −1 ≤ PΣ0 kS̄n k > τ2 C1 − n + νn −1/2 where S̄n := Σ0 −1/2 Sn Σ0 (11) ∼ Wp (n, n−1 Ip ). Then, (11) is bounded by 2e−n/2 for some constant 28 C1 > 0 by Lemma B.7. Similarly, for some constant C2 ,   n + νn −1 −1 · kSn k > C2 PΣ0 (kΣ̆n k > C2 ) ≤ PΣ0 n   νn  −1  = PΣ0 λmin (Sn ) < 1 + C2   n ν  n C2−1 ≤ PΣ0 λmin (S̄n ) < τ1−1 1 + n √ −n(1− p/n)2 /8 , ≤ 2e by Lemma B.7. It is easy to show that (n + νn )p kΣ̆n k n + νn − p − 1 Eπ (kΣn k | Xn ) ≤ and Z ∞ h i h i EΣ0 kΣ̆n kI(kΣ̆n k > C1 ) = PΣ0 kΣ̆n kI(kΣ̆n k > C1 ) ≥ u du Z0 ∞ = PΣ0 (kΣ̆n k ≥ u)du C1    Z ∞ kAn k du. ≤ PΣ0 kS̄n k ≥ τ2−1 u − n + νn C1 p √ q −1 By applying t = n( τ2 (u − kAn k/(n + νn )) − 1 − p/n) to the tail inequality (5), we have Z ∞  PΣ0 kS̄n k ≥ 1 ZC∞ ≤ 1 ZC∞ ≤ τ2−1   kAn k u− du n + νn √ 2 √ −1 2e−n( τ2 (u−kAn k/(n+νn ))−1− √ 2e−n uC7 /2 p/n) /2 du du C1 √ ≤ √ C1 −√C1 C7 n/2 1 − C1 C7 n/2 e + e C7 n 2C72 n2 for some constant C7 > 0. Also note that h i h  i1/2 EΣ0 kΣ̆n kI(kΣ̆−1 ≤ EΣ0 kΣ̆n k2 · PΣ0 kΣ̆−1 n k > C2 ) n k > C2 h i1/2 √ 2 ≤ EΣ0 kΣ̆n k2 · 2e−n(1− p/n) /8 29 and kAn k2 + 2EΣ0 kSn k2 (n + νn )2 Z ∞  kAn k2 2 2 sup P kS k ≥ u du + n Σ 0 2 n (n + νn ) 0 Z ∞  √ PΣ0 kS̄n k ≥ u/τ2 du C8 + 9 ZC∞ √ 1/4 √ 2 C8 + 2e−n(u / τ2 −1− p/n) /2 du 9 ZC∞ √ C8 + 2e−nC10 u/2 du EΣ0 kΣ̆n k2 ≤ 2 ≤ ≤ ≤ ≤ C9 for some positive constants C8 , C9 and C10 by applying the tail inequality (5). Thus, we have p shown that the rate of (9) is faster than p/n. For the second term of RHS of (7), note that   kAn k . n + νn p Since νn2 = O(np) and kAn k2 = O(np), it is trivial that νn /(n + νn ) . p/n and kAn k/(n + p p νn ) . p/n. One can show that EΣ0 kSn − Σ0 k ≤ EΣ0 kS̄n − Ip k · kΣ0 k . p/n by Lemma B.6. EΣ0 kΣ̆n − Σ0 k ≤ EΣ0 kSn − Σ0 k + νn n + νn EΣ0 kSn k + Furthermore, it is easy to prove that EΣ0 kSn k . 1 because we have proved EΣ0 kΣ̆n k2 . 1. Thus, p we have EΣ0 kΣ̆n − Σ0 k . p/n. For the case p > n/2, we have EΣ0 Eπ (kΣn − Σ0 k | Xn ) = kIp − Σ0 k ≤ kIp k + kΣ0 k = 1 + τ2 which has the same rate with min(p/n, 1). Proof of Theorem 3.2 It suffices to consider the case p ≤ n/2 because the other part is trivial. Note that −1 EΣ0 Eπ kΣ−1 n − Σ0 k | X n    −1 −1 −1 ≤ EΣ0 Eπ kΣ−1 n − Σ̆n k | Xn + EΣ0 kΣ̆n − Σ0 k h   i −1 −1 = EΣ0 Eπ kΣ−1 − Σ̆ k | X I(k Σ̆ k ≤ C ) n 1 n n n h   i −1 −1 + EΣ0 Eπ kΣ−1 − Σ̆ k | X I(k Σ̆ k > C ) n 1 n n n (12) −1 + EΣ0 kΣ̆−1 n − Σ0 k. (14) 30 (13) For the term (12), we have h   i −1 −1 EΣ0 Eπ kΣ−1 − Σ̆ k | X I(k Σ̆ k ≤ C ) n 1 n n n   1/2 ≤ C1 · EΣ0 Eπ kΣ̆n1/2 Σ−1 n Σ̆n − Ip k | Xn p . n by the argument (10) in the proof of Theorem B.2. For the term (13), note that ≤ ≤ . ≤ . h   i −1 −1 EΣ0 Eπ kΣ−1 − Σ̆ k | X I(k Σ̆ k > C ) n 1 n n n h  i  −1 −1 EΣ0 Eπ kΣ−1 k | X + k Σ̆ k I(k Σ̆ k > C ) n 1 n n n   i h  −1 1/2 −1 −1 EΣ0 Eπ kΣ̆1/2 n Σn Σ̆n k | Xn + 1 kΣ̆n kI(kΣ̆n k > C1 ) h i −1 p · EΣ0 kΣ̆−1 n kI(kΣ̆n k > C1 ) h i1/2  1/2 2 −1 p · EΣ0 kΣ̆−1 k · P k Σ̆ k > C 1 Σ0 n n √ 2 p2 · e−n(1− p/n) /16 by Lemma B.7. The last term (14) is bounded above by −1 −1 −1 EΣ0 kΣ̆−1 n − Sn k + EΣ0 kSn − Σ0 k. By the Woodbury formula, it is easy to show that −1 EΣ0 kΣ̆−1 n − Sn k ≤ . ≤ . 1 νn −1 −1 −1 · EΣ0 kSn−1 k + 2 · EΣ0 kSn−1 (A−1 n + n Sn )Sn k n n 1/2   νn 1  −1 −1 −1 2 1/2 + 2 EΣ0 kSn−1 k4 · EΣ0 k(A−1 n + n Sn ) k n n 1/2  1/2 1 νn · EΣ0 kSn k2 + EΣ0 kSn−1 k4 n n νn n and   −1/2 −1/2 −1 k . E kS kkΣ S Σ − I k EΣ0 kSn−1 − Σ−1 n p Σ n 0 0 0 0 h i1/2   1/2 −1/2 −1/2 ≤ EΣ0 kSn−1 k2 · EΣ0 kΣ0 Sn Σ0 − Ip k2 r p . n from the arguments used in the proof of Theorem B.2. 31 C Proof of Theorem 3.3 Before we prove Theorem 3.3, we define the total variation affinity and the L1 -distance between measures. L1 -distance Let P and Q be probability measures with density functions p and q with respect to a σ-finite measure ν, respectively. Let Z kP ∧ Qk := p ∧ q dν be the total variation affinity between P and Q, and Z kP − Qk1 := |p − q| dν be the L1 -distance between P and Q. Lemma C.1 (Assouad’s Lemma) Let the parameter set Θ = {0, 1}k , d be a pseudo-metric and T be any estimator of ψ(θ) based on the observation X from Pθ with θ ∈ Θ. Let H(θ, θ0 ) = Pk i=1 |θi − θi0 |. Then for all s > 0 max 2s Eθ ds (T, ψ(θ)) ≥ θ∈Θ ds (ψ(θ), ψ(θ0 )) k H(θ, θ0 ) 2 H(θ,θ0 )≥1 min min H(θ,θ0 )=1 kPθ ∧ Pθ0 k. For the proof of Assouad’s lemma, see [3]. Lemma C.2 For any p × p symmetric matrix B such that Ip + tB is a positive definite matrix for any t ∈ [0, 1] and kBkF is small, log det(Ip + B) = tr(B) − R where 0 ≤ R ≤ ckBk2F for some positive constant c. Proof of lemma C.2 Using the notation Ip = (eij ) = (e1 , . . . , ep ), let e := vec(Ip ) := (eT1 , . . . , eTp )T ∈ 2 2 2 Rp . In the same way, let b := vec(B) := (bT1 , . . . , bTp )T ∈ Rp . Define a function h : Rp → R by h(vec(A)) := log det(A), for any p × p positive definite matrix A. Then, the Taylor expansion yields 1 log det(Ip + B) = h(e + b) = h(e) + h0 (e)T b + bT h00 (e + tb)b 2 1 = h0 (e)T b + bT h00 (e + tb)b 2 32 for some t ∈ [0, 1], where |bT h00 (e + tb)b| ≤ kbk22 · kh00 (e + tb)k. Note that ∂ ∂A log det(A) = (A−1 )T [37], so h0 (a) = vec((A−1 )T ) and 0 T h (e) b = p X p X eji bij i=1 j=1 = tr(B). We need to prove that −ckbk22 ≤ bT h00 (e + tb)b/2 ≤ 0 for some constant c > 0. Since h(a) = log det(A) is concave on positive definite matrices [15], h00 (a) is a negative semidefinite matrix for all positive definite A. Thus, bT h00 (e + tb)b ≤ 0. Furthermore, kh00 (e + tb)k is a continuous function on t ∈ [0, 1] because Ip + tB is a positive definite matrix for any t ∈ [0, 1]. Thus, kh00 (e + tb)k/2 ≤ c for some constant c > 0 uniformly on t ∈ [0, 1]. Proof of Theorem 3.3 We follow closely the line of a proof in [11]. By the Jensen’s inequality, inf sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn ) ≥ π∈Π Σ0 ∈C(τ ) inf sup EΣ0 kΣ̃n − Σ0 k2F π∈Π Σ0 ∈C(τ ) ≥ inf sup EΣ0 kΣ̂n − Σ0 k2F Σ̂n Σ0 ∈C(τ ) ≥ inf sup EΣ0 kΣ̂n − Σ0 k2F Σ̂n Σ0 ∈A for any A ⊂ C(τ ), where Σ̃n = Eπ (Σ n | Xn ). We show that for any τ > 0 and A ⊂ C(τ ), inf sup EΣ0 kΣ̂n − Σ0 k2F ≥ c · τ2 · Σ̂n Σ0 ∈A √ p · min(p, n) n for some constant c > 0. Note that τ can depend on n and possibly τ −→ ∞ as n −→ ∞. Without loss of generality, we assume τ > 1. Define   h i c1 √ A := Σ(θ) : Σ(θ) = c2 Ip + (θij I(1 ≤ |i − j| < k)) , θij = θji ∈ {0, 1}, i, j = 1, 2, . . . , p , n √ √ where k = min(p, n), c1 = min(1/3, 1/(3 2c4 )) and c2 = τ /(1 + c1 ). The constant c4 > 0 will be defined later. For any Σ(θ) ∈ A, kΣ(θ)k = = = ≤ ≤   c1 sup c2 x Ip + √ (θij I(1 ≤ |i − j| < k) x n kxk=1   c1 T √ (θij I(1 ≤ |i − j| < k) x c2 + sup c2 x n kxk=1   c1 c2 √ (θij I(1 ≤ |i − j| < k) c2 + n   c1 c2 √ (θij I(1 ≤ |i − j| < k) c2 + n 1 c1 c2 c2 + √ k. n T 33 By the definition of k, c1 and c2 , it follows kΣ(θ)k ≤ τ . Thus, we have A ⊂ C(τ ). Note that symmetric and diagonally dominant matrix Σ(θ) = (σij (θ)) , i.e., σii (θ) > p X |σij (θ)|, j6=i is a positive definite. See, for example, [27]. Also note that Σ(θ) − λIp , for all 0 < λ < (1 − 2c1 )c2 is a diagonally dominant matrix, thus, is positive definite. This implies that the minimum eigenvalue of Σ(θ), λmin (Σ(θ)) > λ for all 0 < λ < (1 − 2c1 )c2 , which in turn, implies λmin (Σ(θ)) ≥ (1 − 2c1 )c2 ≥ c2 3 kΣ(θ)−1 k = λmin (Σ(θ))−1 ≤ 3 . c2 because c1 ≤ 1/3. Thus, By Assouad’s lemma, inf sup EΣ0 kΣ̂n − Σ0 k2F ≥ Σ̂n Σ0 ∈A where H(θ, θ0 ) := kΣ(θ) − Σ(θ0 )k2F (2p − k)(k − 1) · · min kPθ ∧ Pθ0 k H(θ, θ0 ) 4 H(θ,θ0 )≥1 H(θ,θ 0 )=1 1 22 min Pp i>j,1≤|i−j|<k 0 |. The first factor of the RHS is given by |θij − θij kΣ(θ) − Σ(θ0 )k2F min H(θ, θ0 ) H(θ,θ0 )≥1 = min ( c√1 cn2 )2 H(θ,θ0 )≥1 P 1≤|i−j|<k (θij H(θ, θ0 ) 0 )2 − θij 2c21 c22 n  2 2 τ c1 = 2 1 + c1 n = 0 ∈ {0, 1} and because θij , θij P 1≤|i−j|<k (θij 0 )2 = 2H(θ, θ 0 ). The second factor of the RHS is − θij of rate kp. The proof of the theorem will be completed, if we show that lim inf min n→∞ H(θ,θ0 )=1 kPθ ∧ Pθ0 k ≥ c3 for some constant c3 > 0. Since kPθ − Pθ0 k1 = 2 − 2kPθ ∧ Pθ0 k, 34 it it suffices to prove, when H(θ, θ0 ) = 1, kPθ − Pθ0 k21 < 1, for all sufficiently large n. Then, we have lim inf min n→∞ H(θ,θ0 )=1 kPθ ∧ Pθ0 k > 1/2. Note that by Pinsker’s inequality [17], kPθ − Pθ0 k21 ≤ 2K(Pθ0 , Pθ )   = n · tr(Σ(θ0 )Σ(θ)−1 ) − log det(Σ(θ0 )Σ(θ)−1 ) − p where K(Pθ0 , Pθ ) := R (15) dP log( dPθθ0 )dPθ0 is the Kullback-Leibler divergence. Define A1 := Σ(θ0 ) − Σ(θ), then (15) can be written as   n · tr(A1 Σ(θ)−1 ) − log det(Ip + A1 Σ(θ)−1 ) h i = n · tr(Σ(θ)−1/2 A1 Σ(θ)−1/2 ) − log det(Ip + Σ(θ)−1/2 A1 Σ(θ)−1/2 ) . Consider the diagonalization of Σ(θ)−1 , Σ(θ)−1 = U V U T where U is an orthogonal matrix and V is a diagonal matrix. Since H(θ, θ0 ) = 1, kΣ(θ)−1/2 A1 Σ(θ)−1/2 k2F = kU V 1/2 U T A1 U V 1/2 U T k2F = kV 1/2 U T A1 U V 1/2 k2F ≤ kV k2 kU T A1 U k2F = kΣ(θ)−1 k2 kA1 k2F 32 2c2 c2 2c2 ≤ 2 · 1 2 = 32 · 1 . n n c2 Note that kΣ(θ)−1/2 A1 Σ(θ)−1/2 k ≤ kΣ(θ)−1/2 A1 Σ(θ)−1/2 k2F ≤ 32 · 2c21 /n ≤ 2/3 for any n ≥ 3 because c1 ≤ 1/3. Then Ip + tΣ(θ)−1/2 A1 Σ(θ)−1/2 is a positive definite matrix for any t ∈ [0, 1] and kΣ(θ)−1/2 A1 Σ(θ)−1/2 k2F is small, so we have log det(Ip + Σ(θ)−1/2 A1 Σ(θ)−1/2 ) = tr(Σ(θ)−1/2 A1 Σ(θ)−1/2 ) − Rn where 0 ≤ Rn ≤ c4 kΣ(θ)−1/2 A1 Σ(θ)−1/2 k2F for some constant c4 > 0 by Lemma C.2. Note that the constant c4 does not depend on c1 as long as c1 ≤ 1/3 and n ≥ 3. Thus, we have kPθ − Pθ0 k21 ≤ nRn √ such that Rn ≤ c4 kΣ(θ)−1/2 A1 Σ(θ)−1/2 k2F for all large n. Since we choose c1 = min(1/3, 1/(3 2c4 )), it completes the proof. 35 D Proof of Theorem 3.4 Proof of Theorem 3.4 Let Σ̃n = (σ̃n,ij ) := Eπ (Σn | Xn ). Note that EΣ0 Eπ (kΣn − Σ0 k2F | Xn ) p X p X = EΣ0 Eπ (σn,ij − σ0,ij )2 | Xn  i=1 j=1 p X p X = π  EΣ0 Var σn,ij | Xn + i=1 j=1 p X p X EΣ0 σ̃n,ij − σ0,ij i=1 j=1 =: T1 + T2 . Let Bn = (bn,ij ) := T1 = ≤ Pn T k=1 Xk Xk p X p X i=1 j=1 p X p X EΣ0  (n + νn − p + 1)b2 + (n + νn − p − 1)bn,ii bn,jj  n,ij (n + νn − p)(n + νn − p − 1)2 (n + νn − p − 3)  EΣ0 i=1 j=1 ≤ = + An . If n + νn − p ≥ 6, we have  2(n + νn − p)bn,ii bn,jj (n + νn − p)(n + νn − p − 1)2 (n + νn − p − 3) p X p   X 8 E b b n,ii n,jj Σ0 (n + νn − p)3 8 (n + νn − p)3 i=1 j=1 p X p X (CovΣ0 (bn,ii , bn,jj ) + EΣ0 bn,ii · EΣ0 bn,jj ) . i=1 j=1 The remaining steps are given by T1 ≤ = = ≤ p X p q  X 8 Var (b ) · Var (b ) + E b · E b n,ii n,jj n,ii n,jj Σ Σ Σ Σ 0 0 0 0 (n + νn − p)3 8 (n + νn − p)3 i=1 j=1 p X p  X  2nσ0,ii · σ0,jj + (nσ0,ii + an,ii ) · (nσ0,jj + an,jj ) i=1 j=1 p p p p X X X X 2 2  8 2 σ (n + 2n) + 2n σ a + a 0,ii 0,ii n,jj n,ii (n + νn − p)3 i=1 i=1 j=1 i=1   8 2 2 2 2 2 2 (n + 2n)p kΣ k + 2np kΣ k · kA k + p kA k . 0 0 n n (n + νn − p)3  Since Σ0 ∈ C(τ ), we have the upper bound for T1 , T1 ≤   8 2 2 2 2 2 2 (n + 2n)τ p + 2np τ kA k + p kA k . n n (n + νn − p)3 36 2 Similar to T1 , we can compute the T2 part by T2 = = p X p X  EΣ0 i=1 j=1 p X p  X 2 bij − σ0,ij n + νn − p − 1 VarΣ0 ( i=1 j=1 h i2  bn,ij bn,ij ) + EΣ0 ( − σ0,ij ) n + νn − p − 1 n + νn − p − 1 p X p  2 +σ h (−ν + p + 1)σ + a i2  X n(σ0,ij 0,ii σ0,jj ) n 0,ij n,ij + = (n + νn − p − 1)2 n + νn − p − 1 i=1 j=1 ≤ + p X p X 2n (σ0,ii σ0,jj ) (n + νn − p − 1)2 2 (n + νn − p − 1)2 i=1 j=1 p X p  X  2 (νn − p − 1)2 σ0,ij + a2n,ij . i=1 j=1 Since kΣ0 k2F ≤ pkΣ0 k2 , T2 ≤ ≤ p  X  2 2 2 2 2 n σ + (ν − p − 1) kΣ k + kA k 0,ii n 0 n F F (n + νn − p − 1)2 i=1   2 2 2 2 2 2 . np kΣ k + (ν − p) pkΣ k + pkA k 0 n 0 n (n + νn − p − 1)2 Thus, the upper bound of the rate for T2 is   4 2 2 2 2 2 . τ np + τ (ν − p) p + pkA k n n (n + νn − p)2 T2 ≤ We have the upper bound of the rate for the P-loss convergence rate sup EΣ0 Eπ (kΣn − Σ0 k2F | Xn ) Σ0 ∈C(τ )   c 2 2 2 2 2 2 n p τ + np kA kτ + p kA k n n (n + νn − p)3   c 2 2 2 2 2 + np τ + (νn − p) pτ + pkAn k (n + νn − p)2 ≤ (16) for some constant c > 0. Now, we get the upper bound sup EΣ0 Eπ kΣn − Σ0 k2F | Xn  Σ0 ∈C(τ ) ≤ c · τ2 · p2 n if we assume νn = p and kAn k2 = O(n). √ If we assume p ≤ n, each term in (16) should be smaller than τ 2 · p2 /n to obtain the minimax rate. Under this condition, νn2 = O(np) and kAn k2 = O(np) is the necessary and sufficient condition to attain the minimax rate τ 2 · p2 /n. 37 E Proof of Theorem 3.6 To obtain the minimax posterior rate of the Bregman divergence, we need the following lemma from [13]. Lemma E.1 Suppose that the eigenvalues of the real symmetric matrices X and Y lie in [τ1 , τ2 ] for some constants 0 < τ1 < τ2 . Then, there exist positive constants c1 < c2 depending on τ1 and τ2 such that c1 kX − Y k2F ≤ Dφ (X, Y ) ≤ c2 kX − Y k2F for all Dφ ∈ DΦ . Proof of Theorem 3.6 Let Σ̆n := (nSn + An )/(n + νn ). Then, EΣ0 Eπ n,K1 ,K2 (Dφ (Σn , Σ0 ) | Xn ) h n,K ,K i  1 2 ≤ C1 · EΣ0 Eπ kΣn − Σ0 k2F | Xn I(Σ̆n ∈ / C(C2 , C3 )) h n,K ,K i  1 2 + C1 · EΣ0 Eπ kΣn − Σ0 k2F | Xn I(Σ̆n ∈ C(C2 , C3 )) (17) (18) for some constant C1 > 0 and any positive constants C2 < C3 by Lemma E.1. Set C2 = τ1 (1−2c̃)2 and C3 = τ2 (1 + 2c̃)2 for some small constant c̃ > 0. Note that (17) is bounded by h n,K ,K i  1 2 EΣ0 Eπ kΣn − Σ0 k2F | Xn I(Σ̆n ∈ / C(C2 , C3 )) h n,K ,K i  1 2 ≤ EΣ0 Eπ p · kΣn − Σ0 k2 | Xn I(Σ̆n ∈ / C(C2 , C3 )) ≤ 2p(K22 + τ 2 )PΣ0 (Σ̆n ∈ / C(C2 , C3 )). Since Σ0 ∈ C(τ1 , τ2 ), PΣ0 (Σ̆n ∈ C(C2 , C3 )) is bounded below by    C3 kAn k νn  C2 ≤ λmin (S̄n ) & λmax (S̄n ) ≤ 1− (19) PΣ0 1+ n τ1 τ2 C3 (n + νn ) √ where S̄n ∼ Wp (n, n−1 Ip ). By applying Corollary 5.35 in [20] with t = c̃ n, (19) is bounded below by 1 − 2e−c̃ 2 n/2 for all sufficiently large n. Thus,   p2 2 . p · PΣ0 Σ̆n ∈ / C(C2 , C3 ) ≤ 2pe−c̃ n/2  n Note that the integrand of (18) is bounded by Eπ Z = ≤ n,K1 ,K2  kΣn − Σ0 k2F | Xn dIW (Σn | n + νn , nSn + An )I(Σn ∈ C(K1 , K2 )) kΣn − Σ0 k2F Rp dΣn 0 0 C(K1 ,K2 ) dIWp (Σn | n + νn , nSn + An )dΣn  1 · Eπ kΣn − Σ0 k2F | Xn π(Σn ∈ C(K1 , K2 ) | Xn ) 38 where π(Σn | Xn ) is a density function of IWp (n + νn , nSn + An ). If we show that π(Σn ∈ C(K1 , K2 ) | Xn )−1 I(Σ̆n ∈ C(C2 , C3 )) ≤ 2 for all sufficiently large n, the rate of (18) is p2 /n by Theorem 3.4. Note that I(Σ̆n ∈ C(C2 , C3 )) π(Σn ∈ C(K1 , K2 ) | Xn ) = I(Σ̆n ∈ C(C2 , C3 )) π(K1 ≤ λmin (Σn ) ≤ λmax (Σn ) ≤ K2 | Xn ) ≤ π(K1 ≤ ≤ I(Σ̆n ∈ C(C2 , C3 )) −1/2 −1/2 −1/2 −1/2 λmin (Σ̆n Σn Σ̆n )λmin (Σ̆n ) ≤ λmax (Σ̆n Σn Σ̆n )λmax (Σ̆n ) 1 π(K2−1 C3 1/2 ≤ 1/2 where Σ̆n Σ−1 n Σ̆n 1/2 1/2 λmin (Σ̆n Σ−1 n Σ̆n ) 1/2 1/2 −1 ≤ λmax (Σ̆n Σ−1 n Σ̆n ) ≤ K1 C2 | Xn ) ≤ K2 | Xn ) , | Xn ∼ Wp (n + νn , (n + νn )−1 Ip ). Note that if K1 < τ1 and K2 > τ2 , we always can find the small constant c̃ > 0 satisfying K1 ≤ C2 (1 + 2c̃)−2 = τ1 {(1 − 2c̃)/(1 + 2c̃)}2 and K2 ≥ C3 (1 − 2c̃)−2 = τ2 {(1 + 2c̃)/(1 − 2c̃)}2 . Then, by applying Corollary 5.35 in [20] with √ 2 t = c̃ n + νn , the last term is bounded above by (1 − 2e−c̃ (n+νn )/2 )−1 for all sufficiently large n. Since (1 − 2e−c̃ F 2 (n+ν n )/2 )−1 ≤ 2 for all sufficiently large n, it completes the proof. Proof of Theorem 3.7 Proof of Theorem 3.7 The minimax lower bound part is given at Theorem 3 of [9], so we prove here the upper bound part only. Let νn2 = O(n/p) and An = Op . Note that if Σ ∼ d Q 2 2 IWp (ν, A), it implies det(AΣ−1 ) ≡ p−1 k=0 χν−k where χν−k ’s are independent chi-square random variables with the degree of freedom ν − k (page 180 of [25]. Then, EΣ0 Eπ ((log det Σn − log det Σ0 )2 | Xn ) π = EΣ0 E ((log det nSn − log det Σ0 − p−1 X log χ2n+νn −k )2 | Xn ). k=0 Define Tn := log det Sn −τn,p , τn,p := Pp−1 k=0  ψ((n−k)/2)−log(n/2) and ψ(x) := d/dz log Γ(z)|z=x . Then, we have   p−1 X EΣ0 Eπ (log det nSn − log det Σ0 − log χ2n+νn −k )2 | Xn k=0 2 ≤ 2 · EΣ0 Tn − log det Σ0 X 2 p−1 2 + 2·E [ψ((n − k)/2) + log 2 − log χn+νn −k ] , k=0 39 (20) (21) where the last expectation is with respect to the chi-square random variables. The first term (20) has the upper bound EΣ0 Eπ  Tn − log det Σ0 2 | Xn   p 10p ≤ −2 log 1 − + . n 3n(n − p) (22) by Theorem 2 of [9]. The RHS of (22) has the asymptotic rate p/n because p = o(n). Using the facts, E(log χ2ν ) = ψ(ν/2) + log 2 and Var(log χ2ν ) = ψ 0 (ν/2), we can separate (21) into two parts:  !2  p−1   X n−k ψ | Xn  EΣ0 Eπ  + log 2 − log χ2n+νn −k 2 k=0 ! p−1 X ≤ 2 · VarΣ0 log χ2n+νn −k  (23) k=0 + 2·   !2 p−1   X n−k n + νn − k ψ . −ψ 2 2 (24) k=0 Note that ψ 0 (ν) = ν −1 + θ(2ν 2 )−1 + θ(6ν 3 )−1 for ν > 1 and 0 < θ < 1 (page 169 of [9]). Applying the above facts to (23), we can show that ! p−1  p−1 X X 2 = VarΣ0 log χn+νn −k k=0 2 2θ 4θ + + 2 n + νn − k (n + νn − k) 3(n + νn − k)3 k=0    p−1  X 1 7 ≤ −2 log 1 − + n + νn − k 3(n + νn − k)2 k=0   7 p p ≤ −2 log 1 − + · n + νn 3 n  (25) for 0 < θ < 1. In the second line, we use the inequality x + θx2 ≤ − log(1 − x) + x2 /2 for 0 < x < 1. Note that the RHS of (25) has the asymptotic rate p/n if p = o(n). For (24), we use the following property of digamma function, ψ(x + 1) − ψ(x) = x−1 . Thus, we have  2 νn e−1   !2 p−1   p−1 d X 2 X X n + νn − k 2 n−k  ψ −ψ ≤  2 2 n − k + 2x k=0 k=0 x=0 !2 νn + 2 ≤ log 1 + n−k−2 k=0   2 νn + 2 ≤ p log 1 + . n−p−2 p−1 X  Note that (26) has the asymptotic rate p/n if νn2 = O(n/p) and p = o(n). 40 (26) Combining (22)-(26), we have  p EΣ0 Eπ ((log det Σn − log det Σ0 )2 | Xn ) ≤ −C1 log 1 − n   2 p νn + 2 2 + C2 · + C3 · p log 1 + n n−p−2 for all sufficiently large n with n > p and some positive constants C1 , C2 and C3 . Since we assume p = o(n) and νn2 = O(n/p), EΣ0 Eπ ((log det Σn − log det Σ0 )2 | Xn ) ≤ c · p n for all sufficiently large n and some constant c > 0. References [1] Nabil Ali Ahmed and DV Gokhale. Entropy expressions and their estimators for multivariate distributions. IEEE Trans. Inform. Theory, 35(3):688–692, 1989. [2] T.W. Anderson. An Introduction to Multivariate Statistical Analysis. Wiley Series in Probability and Statistics. Wiley, 2003. [3] Patrice Assouad. Deux remarques sur l’estimation. C. R. Acad. Sci. Paris Sér. I Math., 296(23):1021–1024, 1983. [4] Sayantan Banerjee and Subhashis Ghosal. Posterior convergence rates for estimating large precision matrices using graphical models. Electron. J. Stat., 8(2):2111–2137, 2014. [5] Jan Beirlant, Edward J Dudewicz, László Györfi, and Edward C van der Meulen. Nonparametric entropy estimation: An overview. Int. J. Math. Stat. Sci., 6(1):17–39, 1997. [6] Peter J Bickel and Elizaveta Levina. Regularized estimation of large covariance matrices. Ann. Statist., 36(1):199–227, 2008b. [7] Lev M. Bregman. The relaxation method of finding the common point of convex sets and its application to the solution of problems in convex programming. USSR Comput. Math. Math. Phys., 7(3):200–217, 1967. 41 [8] Lawrence D Brown and Mark G Low. A constrained risk inequality with applications to nonparametric functional estimation. Ann. Statist., 24(6):2524–2535, 1996. [9] T Tony Cai, Tengyuan Liang, and Harrison H Zhou. Law of log determinant of sample covariance matrix and optimal estimation of differential entropy for high-dimensional gaussian distributions. J. Multivariate Anal., 137:161–172, 2015. [10] T Tony Cai, Zhao Ren, and Harrison H Zhou. Estimating structured high-dimensional covariance and precision matrices: Optimal rates and adaptive estimation. Electron. J. Stat., 10(1):1–59, 2016. [11] T Tony Cai, Cun-Hui Zhang, and Harrison H Zhou. Optimal rates of convergence for covariance matrix estimation. Ann. Statist., 38(4):2118–2144, 2010. [12] T Tony Cai and Harrison H Zhou. Minimax estimation of large covariance matrices under l1 norm. Statist. Sinica, 22(4):1319–1378, 2012a. [13] T Tony Cai and Harrison H Zhou. Optimal rates of convergence for sparse covariance matrix estimation. Ann. Statist., 40(5):2389–2420, 2012b. [14] Ismaël Castillo. On bayesian supremum norm contraction rates. The Annals of Statistics, 42(5):2058–2091, 2014. [15] Thomas M Cover and A Thomas. Determinant inequalities via information theory. SIAM J. Matrix Anal. Appl., 9(3):384–392, 1988. [16] Thomas M. Cover and Joy A. Thomas. Elements of Information Theory. Wiley-Interscience, New York, NY, USA, 1991. [17] I Csiszár. Information-type measures of difference of probability distributions and indirect observations. Studia Sci. Math. Hungar., 2:299–318, 1967. [18] Inderjit S Dhillon and Joel A Tropp. Matrix nearness problems with bregman divergences. SIAM J. Matrix Anal. Appl., 29(4):1120–1146, 2007. [19] Edward J Dudewicz and Walter Mommaerts. Maximum entropy methods in modern spectroscopy: a review and an empiric entropy approach. In conference proceedings on The 42 frontiers of statistical scientific theory & industrial applications (Vol. II), pages 115–160. American Sciences Press, 1991. [20] Yonina C Eldar and Gitta Kutyniok. Compressed sensing: theory and applications. Cambridge University Press, 2012. [21] Chao Gao and Harrison H Zhou. Rate-optimal posterior contraction for sparse pca. Ann. Statist., 43(2):785–818, 2015. [22] Chao Gao and Harrison H Zhou. Bernstein-von mises theorems for functionals of the covariance matrix. Electronic Journal of Statistics, 10(2):1751–1806, 2016. [23] Seymour Geisser and Jerome Cornfield. Posterior distributions for multivariate normal parameters. J. R. Stat. Soc. Ser. B. Stat. Methodol., 25:368–376, 1963. [24] Subhashis Ghosal and Aad van der Vaart. Fundamentals of Nonparametric Bayesian Inference. Cambridge University Press, 2017. [25] NR Goodman. The distribution of the determinant of a complex wishart distributed matrix. Ann. Math. Statistics, 34(1):178–180, 1963. [26] Maya Gupta and Santosh Srivastava. Parametric bayesian estimation of differential entropy and relative entropy. Entropy, 12(4):818–843, 2010. [27] D.A. Harville. Matrix Algebra From a Statistician’s Perspective. Springer, 2008. [28] N.L. Hjort, C. Holmes, P. Müller, and S.G. Walker. Bayesian Nonparametrics. Cambridge Series in Statistical and Probabilistic Mathematics. Cambridge University Press, 2010. [29] Marc Hoffmann, Judith Rousseau, and Johannes Schmidt-Hieber. On adaptive posterior concentration rates. Ann. Statist., 43(5):2259–2295, 2015. [30] Aapo Hyvärinen. New approximations of differential entropy for independent component analysis and projection pursuit. In Proceedings of the 1997 Conference on Advances in Neural Information Processing Systems 10, NIPS ’97, pages 273–279, Cambridge, MA, USA, 1998. MIT Press. [31] H. Jeffreys. Theory of Probability. Oxford, Oxford, England, third edition, 1961. 43 [32] Iain M Johnstone and Arthur Yu Lu. On consistency and sparsity for principal components analysis in high dimensions. J. Amer. Statist. Assoc., 104(486):682–693, 2009. [33] W Kozakiewicz. On the convergence of sequences of moment generating functions. Ann. Math. Statistics, 18:61–69, 1947. [34] Brian Kulis, Mátyás A Sustik, and Inderjit S Dhillon. Low-rank kernel learning with bregman matrix divergences. J. Mach. Learn. Res., 10:341–376, 2009. [35] Kyoungjae Lee and Jaeyong Lee. Supplementary material for “optimal bayesian minimax rates for unconstrained large covariance matrices”. 2017. [36] Debdeep Pati, Anirban Bhattacharya, Natesh S Pillai, and David Dunson. Posterior contraction in sparse bayesian factor models for massive covariance matrices. Ann. Statist., 42(3):1102–1130, 2014. [37] Kaare Brandt Petersen and Michael Syskind Pedersen. The matrix cookbook. Technical University of Denmark, 7:15, 2008. [38] Veronika Rocková. Bayesian estimation of sparse signals with a continuous spike-and-slab prior. Submitted manuscript, pages 1–34, 2015. [39] L Saulis and VA Statulevic̆ius. Limit Theorems for Large Deviations, volume 73. Springer Science & Business Media, 1991. [40] Weining Shen and Subhashis Ghosal. Adaptive bayesian procedures using random series priors. Scand. J. Stat., 42(4):1194–1213, 2015. [41] Santosh Srivastava and Maya R Gupta. Bayesian estimation of the entropy of the multivariate gaussian. In 2008 IEEE International Symposium on Information Theory, pages 1103–1107. IEEE, 2008. [42] Dongchu Sun and James O Berger. Objective bayesian analysis for the multivariate normal model. Bayesian Statistics, 8:525–547, 2007. [43] Harald Uhlig. On singular wishart and singular multivariate beta distributions. Ann. Statist., 22(1):395–405, 1994. 44 [44] Nicolas Verzelen. Adaptive estimation of covariance matrices via cholesky decomposition. Electron. J. Stat., 4:1113–1150, 2010. [45] Lingzhou Xue and Hui Zou. Minimax optimal estimation of general bandable covariance matrices. J. Multivariate Anal., 116:45–51, 2013. 45
10math.ST
The Complex Negotiation Dialogue Game Romain Laroche Microsoft Maluuba, Montréal, Canada [email protected] arXiv:1707.01450v1 [cs.AI] 5 Jul 2017 Abstract This position paper formalises an abstract model for complex negotiation dialogue. This model is to be used for the benchmark of optimisation algorithms ranging from Reinforcement Learning to Stochastic Games, through Transfer Learning, One-Shot Learning or others. 1 Introduction A negotiation is defined as a bargaining process between two or more parties (each with its own aims, needs, and viewpoints) seeking to discover a common ground and reach an agreement to settle a matter of mutual concern or resolve a conflict. From a dialogue point of view, one distinguishes negotiation dialogue from standard dialogue by the mutual sharing of information1 , by its required user adaptation2 , and by the non-stationarity induced by its non fully cooperative structure: the user and system objectives correlate but also differ to some extent, and they are consequently adversely co-adapting. Research on negotiation dialogue experiences a growth of interest. At first, Reinforcement Learning (Sutton and Barto, 1998), the most popular framework for dialogue management in dialogue systems (Levin and Pieraccini, 1997; Laroche et al., 2009; Lemon and Pietquin, 2012), was applied to negotiation with mitigated results (English and Heeman, 2005; Georgila and Traum, 2011; Lewis et al., 2017), because the non-stationary policy of the opposing player prevents those algorithms from converging consistently. Then, Multi-Agent Reinforcement Learning (Bowling and Veloso, 2002) was applied but also with convergence 1 whereas standard dialogue mainly relies on discovering the user information or intent, 2 whereas standard dialogue, such as form filling applications, is rather indifferent to the user’s characteristics, difficulties (Georgila et al., 2014). Finally, recently, Stochastic Games (Shapley, 1953) were applied successfully (Barlier et al., 2015), with convergence guarantees, but only for zero-sum games, which is inconsistent with dialogue since most tasks are cooperative. Here, we extend (Laroche and Genevay, 2017)’s abstraction of the negotiation dialogue literature applications: (di Eugenio et al., 2000; English and Heeman, 2005) consider sets of furniture, (Afantenos et al., 2012; Efstathiou and Lemon, 2014; Georgila et al., 2014; Litman et al., 2016; Lewis et al., 2017) resource trading, and (Putois et al., 2010; Laroche et al., 2011; El Asri et al., 2014; Genevay and Laroche, 2016; Laroche and Féraud, 2017) appointment scheduling. Indeed, these negotiation dialogue problems are cast into a generic agreement problem over a shared set of options. The goal for the players is to reach an agreement and select an option. This negotiation dialogue game can be parametrised to make it zero-sum, purely cooperative, or general sum. However, (Laroche and Genevay, 2017) only consider elementary options: they are described through a single entity. We formalise in this paper the game for options that are compounded in the sense that they are characterised by several features. For instance, Tuesday morning is defined by two features: the day and the moment of the day. Considering compounded options naturally leads to richer expressions, and therefore to a larger set of actions: I’m available whenever on Tuesday, or I’d prefer in the afternoon. Since the options are uttered in a compounded way, as opposed to their elementary definition in (Laroche and Genevay, 2017), the state representation also becomes more complex. This extension allows more realistic dialogues, and more challenging Reinforcement Learning, Multi-Agent Reinforcement Learning, and Stochastic Games policy training. 2 The Negotiation Dialogue Game This section recalls the negotiation dialogue game as described in (Laroche and Genevay, 2017). The goal for each participant is to reach an agreement. The game involves a set of m players P = {pi }i∈[1,m] . With m > 2, the dialogue game is said to be multi-party (Asher et al., 2016; ?). The players consider n options (in resource trading, an option is an exchange proposal, in appointment scheduling, it is a time-slot), and the cost to agree on an option τ is cτi randomly sampled from distribution δi ∈ ∆R+ to agree on it. Players also have a utility ω i ∈ R+ for reaching an agreement. For each player, a parameter of cooperation with the other players αi ∈ R is introduced. As a result, player pi ’s immediate reward at the end of the dialogue is: X Ri (siT ) = ω i − cτi + αi (ω j − cτj ) (1) j6=i where siT is the last state reached by player pi at the end of the dialogue, and τ is the agreed option. If players fail to agree, the final immediate rewards Ri (siT ) = 0 for all players pi . If at least one player pj misunderstands and agrees on a wrong option τ j which was not the one proposed by the other players, this is even worse: each player pi gets the cost of selecting option τ i without the reward of successfully reaching an agreement: X j Ri (siT ) = −cτi i − αi cτ j (2) j6=i The values of αi give a description of the nature of the players, and therefore of the game as modelled in game theory (Shapley, 1953). If αi < 0, player pi is said to be antagonist: he has an interest in making the other players lose. In particular, if m = 2 and α1 = α2 = −1, it is a zero-sum game. If αi = 0, player pi is said to be selfcentred: he does not care if the other player is winning or losing. Finally, if αi > 0, player pi is said to be cooperative, and in particular, if ∀i ∈ [1, m], αi = 1, the game is said to be fully cooperative because ∀(i, j) ∈ [1, m]2 , Ri (siT ) = Rj (sjT ). From now on, and until the end of the article, we suppose that there are only m = 2 players: a system ps and a user pu . They act each one in turn, starting randomly by one or the other. They have four possible actions. ACCEPT(τ ) means that the user accepts the option τ (independently from the fact that τ has actually been proposed by the other player; if it has not, this induces the use of Equation 2 to determine the reward). This act ends the dialogue. R EF P ROP(τ ) means that the user refuses the proposed option and proposes instead option τ . A SK R EPEAT means that the player asks the other player to repeat his proposition. And finally, E ND D IAL denotes the fact that the player does not want to negotiate anymore, and terminates the dialogue. Understanding through speech recognition of system ps is assumed to be noisy with a sentence error rate SERsu after listening to a user pu : with probability SERsu , an error is made, and the system understands a random option instead of the one that was actually pronounced. In order to reflect human-machine dialogue reality, a simulated user always understands what the system says: SERus = 0. We adopt the way (Khouzaimi et al., 2015) generates speech recognition confidence scores: scorereco = 1 where X ∼ N(c, 0.2) given a user pu , 1+e−X two parameters (c⊥u , c⊤u ) with c⊥u < c⊤u are defined such that if the player understood the right option, c = c⊤u otherwise c = c⊥u . The further apart the normal distribution centres are, the easier it will be for the system to know if it understood the right option, given the score. 3 Allowing compounded options This section extends the negotiation dialogue game recalled in Section 2 with compounded options. Each option τ is now characterised by a set of ℓ features: τ = {fτk }k∈J1,ℓK , with fτk ∈ F k . Not all feature combinations might form a valid option, but for the sake of simplicity, we consider that the set of the n options contain all of them and that the cost for inconsistent ones is infinite. This way, we can express that an option is invalid but that the user is not aware of it. The cost of an option needs to be revisited consequently. The costs of two options that only differ by a feature are similar in general. Without loss of generality, we define the cost of one player pi for agreeing on a given option τ as follows: ciτ = ĉiτ + ℓ X ĉik , (3) k=1 where ĉik is the cost of agreeing on feature f k and ĉiτ is the cost for selecting this option in particular. In an appointment scheduling negotiation task, the feature related costs ĉik can generally be considered as null: there is no correlation between being booked on Monday morning and being available on Tuesday morning. Most of the constraints are therefore expressed in the ĉiτ term. On the opposite, in a furniture set application, the preferences are expressed on specific features of the furniture: colour, price, etc. In this case, the constraints mainly lie in ĉik terms. The option-as-features definition naturally induces new ways of expressing one’s preferences over the option set. The P ROP F EA k k 1 2 TURES(f , f , . . . ) dialogue act replaces the previously defined R EF P ROP(τ ): it means that the speaker wants the k1th , k2th , . . . features to be set to values f k1 , f k2 , . . . A SK R EPEAT still asks to repeat the whole last utterance, but its partial version is added: A SK PARTIAL R EPEAT(k1 , k2 , . . . ) consists in asking to repeat values of features k1 , k2 , . . . ACCEPT still accepts the last grounded option, but it can only be performed once all features have been grounded. Its partial version is also introduced: PARTIAL ACCEPT(k1 , k2 , . . . ) determines an agreement on the last grounded value of features k1 , k2 , . . . The compounded options imply complex actions, which in turn imply a complex understanding model: the sentence level understanding rate and score need to be extended. The sentence error rate SERsu is therefore replaced with a feature error rate F ERsu . The same speech recognition confidence score generation is used at the feature level, meaning that, at each P ROP F EA TURES, A SK PARTIAL R EPEAT, and PARTIAL AC CEPT acts, the player receives an array of feature values (or feature names), each associated with a confidence score. 4 Potential use of the complex negotiation dialogue game (Genevay and Laroche, 2016) already used the simple negotiation dialogue game to study Knowledge Transfer for Reinforcement Learning (Taylor and Stone, 2009; Lazaric, 2012) applied to dialogue systems (Gašic et al., 2013; Casanueva et al., 2015). It appears in this paper that the optimal policies are rather simple. Making the interaction process more intricate and more reality reflecting allows to put the computational tractability of the methods to the test. Following the same purpose, one-shot learning (Schaal et al., 1997; Fei-Fei et al., 2006) may also be used for negotiation dialogues. Cooperative co-adaptation in dialogue has been tackled only in one previous article: (Chandramohan et al., 2012). Similarly, but for the adversary case, the negotiation dialogue game offers a good empirical test bed for a generalisation to the general-sum games of (Barlier et al., 2015). We believe that this line of research is complementary with the more applied one of (Lewis et al., 2017) that work on real human dialogues and are more focused on dealing with natural language within a negotiation task. Their mitigated results indicate that negotiation generalisation over simulated users to real users is difficult, even when the simulated user is trained on human data. References Stergos Afantenos, Nicholas Asher, Farah Benamara, Anaı̈s Cadilhac, Cédric Dégremont, Pascal Denis, Markus Guhe, Simon Keizer, Alex Lascarides, Oliver Lemon, et al. 2012. Developing a corpus of strategic conversation in the settlers of catan. In SeineDial 2012-The 16th Workshop On The Semantics and Pragmatics Of Dialogue. Nicholas Asher, Julie Hunter, Mathieu Morey, Farah Benamara, and Stergos D. Afantenos. 2016. Discourse structure and dialogue acts in multiparty dialogue: the stac corpus. In Proceedings of the 11th Edition of Language Resources and Evaluation Conference (LREC). Merwan Barlier, Julien Perolat, Romain Laroche, and Olivier Pietquin. 2015. Human-machine dialogue as a stochastic game. In Proceedings of the 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue (Sigdial). Michael Bowling and Manuela Veloso. 2002. Multiagent learning using a variable learning rate. Artificial Intelligence 136(2):215–250. Inigo Casanueva, Thomas Hain, Heidi Christensen, Ricard Marxer, and Phil Green. 2015. Knowledge transfer between speakers for personalised dialogue management. In Proceedings of the 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue (Sigdial). Senthilkumar Chandramohan, Matthieu Geist, Fabrice Lefèvre, and Olivier Pietquin. 2012. Co-adaptation in Spoken Dialogue Systems. In Proceedings of the 4th International Workshop on Spoken Dialogue Systems (IWSDS). Paris, France, page 1. Barbara di Eugenio, Pamela W. Jordan, Richmond S. Thomason, and Johanna D. Moore. 2000. The agreement process: an empirical investigation of humanhuman computer-mediated collaborative dialogs. International Journal of Human-Computer Studies 53(6):1017 – 1076. Ioannis Efstathiou and Oliver Lemon. 2014. Learning non-cooperative dialogue behaviours. In Proceedings of the 15th Annual Meeting of the Special Interest Group on Discourse and Dialogue (Sigdial). Layla El Asri, Remi Lemonnier, Romain Laroche, Olivier Pietquin, and Hatim Khouzaimi. 2014. Nastia: Negotiating appointment setting interface. In Proceedings of the 9th Edition of Language Resources and Evaluation Conference (LREC). Michael S English and Peter A Heeman. 2005. Learning mixed initiative dialogue strategies by using reinforcement learning on both conversants. In Proceedings of the conference on Human Language Technology (HLT). Li Fei-Fei, Rob Fergus, and Pietro Perona. 2006. Oneshot learning of object categories. IEEE transactions on pattern analysis and machine intelligence 28(4):594–611. Milica Gašic, Catherine Breslin, Matthew Henderson, Dongho Kim, Martin Szummer, Blaise Thomson, Pirros Tsiakoulis, and Steve Young. 2013. Pomdpbased dialogue manager adaptation to extended domains. In Proceedings of the 14th Annual Meeting of the Special Interest Group on Discourse and Dialogue (Sigdial). Aude Genevay and Romain Laroche. 2016. Transfer learning for user adaptation in spoken dialogue systems. In Proceedings of the 15th International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS). International Foundation for Autonomous Agents and Multiagent Systems. Kallirroi Georgila, Claire Nelson, and David Traum. 2014. Single-agent vs. multi-agent techniques for concurrent reinforcement learning of negotiation dialogue policies. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (ACL). Kallirroi Georgila and David R Traum. 2011. Reinforcement learning of argumentation dialogue policies in negotiation. In Proceedings of the 11th Annual Conference of the International Speech Communication Association (Interspeech). pages 2073– 2076. Hatim Khouzaimi, Romain Laroche, and Fabrice Lefevre. 2015. Optimising turn-taking strategies with reinforcement learning. In Proceedings of the 16th Annual Meeting of the Special Interest Group on Discourse and Dialogue (Sigdial). Romain Laroche and Raphaël Féraud. 2017. Algorithm selection of off-policy reinforcement learning algorithm. arXiv preprint arXiv:1701.08810 . Romain Laroche and Aude Genevay. 2017. The negotiation dialogue game. In Dialogues with Social Robots, Springer, pages 403–410. Romain Laroche, Ghislain Putois, Philippe Bretier, Martin Aranguren, Julia Velkovska, Helen Hastie, Simon Keizer, Kai Yu, Filip Jurcicek, Oliver Lemon, and Steve Young. 2011. D6.4: Final evaluation of classic towninfo and appointment scheduling systems. Report D6 4. Romain Laroche, Ghislain Putois, Philippe Bretier, and Bernadette Bouchon-Meunier. 2009. Hybridisation of expertise and reinforcement learning in dialogue systems. In Proceedings of the 9th Annual Conference of the International Speech Communication Association (Interspeech). pages 2479–2482. Alessandro Lazaric. 2012. Transfer in reinforcement learning: a framework and a survey. In Reinforcement Learning, Springer, pages 143–173. Oliver Lemon and Olivier Pietquin. 2012. Data-Driven Methods for Adaptive Spoken Dialogue Systems: Computational Learning for Conversational Interfaces . Springer. Esther Levin and Roberto Pieraccini. 1997. A stochastic model of computer-human interaction for learning dialogue strategies. In Proceedings of the 5th European Conference on Speech Communication and Technology (Eurospeech). Mike Lewis, Denis Yarats, Yann N. Dauphin, Devi Parikh, and Dhruv Batra. 2017. Deal or no deal? end-to-end learning for negotiation dialogues. arXiv preprint arXiv:1706.05125 . Diane Litman, Susannah Paletz, Zahra Rahimi, Stefani Allegretti, and Caitlin Rice. 2016. The teams corpus and entrainment in multi-party spoken dialogues . Ghislain Putois, Romain Laroche, and Philippe Bretier. 2010. Online reinforcement learning for spoken dialogue systems: The story of a commercial deployment success. In Proceedings of the 11th Annual Meeting of the Special Interest Group on Discourse and Dialogue. Citeseer, pages 185–192. Stefan Schaal et al. 1997. Learning from demonstration. Advances in neural information processing systems pages 1040–1046. Lloyd S Shapley. 1953. Stochastic games. Proceedings of the National Academy of Sciences of the United States of America 39(10):1095. Richard S Sutton and Andrew G Barto. 1998. Reinforcement learning: An introduction, volume 1. MIT press Cambridge. Matthew E Taylor and Peter Stone. 2009. Transfer learning for reinforcement learning domains: A survey. Journal of Machine Learning Research 10:1633–1685.
2cs.AI
arXiv:1503.00374v2 [cs.DS] 31 Aug 2016 A Randomized Algorithm for Approximating the Log Determinant of a Symmetric Positive Definite Matrix Christos Boutsidis ∗ Petros Drineas † Eugenia-Maria Kontopoulou § Prabhanjan Kambadur ‡ Anastasios Zouzias ¶ Abstract We introduce a novel algorithm for approximating the logarithm of the determinant of a symmetric positive definite (SPD) matrix. The algorithm is randomized and approximates the traces of a small number of matrix powers of a specially constructed matrix, using the method of Avron and Toledo [AT11]. From a theoretical perspective, we present additive and relative error bounds for our algorithm. Our additive error bound works for any SPD matrix, whereas our relative error bound works for SPD matrices whose eigenvalues lie in the interval (θ1 , 1), with 0 < θ1 < 1; the latter setting was proposed in [HMS15]. From an empirical perspective, we demonstrate that a C++ implementation of our algorithm can approximate the logarithm of the determinant of large matrices very accurately in a matter of seconds. 1 Introduction Given a matrix A ∈ Rn×n , the determinant of A, denoted by det(A), is one of the most important quantities associated with A. Since its invention by Cardano and Leibniz in the late 16th century, the determinant has been a fundamental mathematical concept with countless applications in numerical linear algebra and scientific computing. The advent of Big Data, which are often represented by matrices, increased the applicability of algorithms that compute, exactly or approximately, matrix determinants; see, for example, [LZL05, ZLLW08, ZL07, dBEG08, HSD+ 13] for machine learning applications (e.g., gaussian process regression) and [LP01, KL13, FHT08, PB97, PBGS00] for several data mining applications (e.g., spatial-temporal time series analysis). Formal definitions of the determinant include the well-known formulas derived by Leibniz and Laplace; however, neither the Laplace nor the Leibniz formula can be used to design an efficient, polynomial-time, algorithm to compute the determinant of A. To achieve this goal, one should rely on other properties of the determinant. For example, a standard approach would be to leverage the so-called LU matrix decomposition or the Cholesky decomposition for symmetric ∗ Email: [email protected] Purdue University. West Lafayette, IN. Email: [email protected] ‡ Bloomberg L.P. New York, NY. Email: [email protected] § Purdue University. West Lafayette, IN. Email: [email protected] ¶ Swisscom. Zurich, Switzerland. Email: [email protected] † 1 positive definite matrices (SPD) to get an O(n3 ) deterministic algorithm to compute the determinant of A. (Recall that an SPD matrix is a symmetric matrix with strictly positive eigenvalues.) In this paper, we are interested in approximating the logarithm of the determinant of a symmetric positive definite (SPD) matrix A. The logarithm of the determinant, instead of the determinant itself, is important in several settings [LZL05, ZLLW08, ZL07, dBEG08, HSD+ 13, LP01, KL13, FHT08, PB97, PBGS00]. Definition 1. [L OG D ET P ROBLEM DEFINITION ] Given an SPD matrix A ∈ Rn×n , compute, exactly or approximately, logdet (A). Note that since all the eigenvalues of A are strictly positive, the determinant of A is strictly positive. The best exact algorithm for the above problem simply computes the determinant of A in cubic time and takes its logarithm. Few approximation algorithms have appeared in the literature, but they either lack a proper theoretical convergence analysis or do not work for all SPD matrices. We will discuss prior work in detail in Section 1.2. 1.1 Our contributions We present a fast approximation algorithm for the problem of Definition 1. Our main algorithm (Algorithm 3) is randomized and its running time is   O nnz(A) mε−2 + log n log(1/δ) , where nnz(A) denotes the number of non-zero elements in A, 0 < δ < 1 denotes the failure probability of our algorithm, and (integer) m > 0 and (real) ε > 0 are user-controlled accuracy parameters that are specified in the input of the algorithm. The first step of our approximation algorithm uses the power method to compute an approximation to the dominant eigenvalue of A. This value will be used in a normalization (preconditioning) step in order to compute a convergent matrix-Taylor expansion. The second step of our algorithm leverages a truncated matrix-Taylor expansion of a suitably constructed matrix in order to compute an approximation of the log determinant. This second step leverages a randomized trace estimation algorithm from [AT11]. \ (A) be the value returned by our approximation algorithm (Algorithm 3); let logdet (A) Let logdet be the true log determinant of A; let λi (A) denote the i-th eigenvalue of A for all i = 1, . . . , n with λ1 (A) ≥ λ2 (A) ≥ . . . ≥ λn (A) > 0; and let κ (A) = λ1 (A)/λn (A) be the condition number of A. Our main result, proven in Lemma 6, is that if    1 m ≥ 7κ (A) log , (1) ε then, with probability at least 1 − 2δ, \ (A) − logdet (A) ≤ 2εΓ, logdet where Γ= n X i=1   λ1 (A) log 7 · . λi (A) 2 (2) We now take a careful look at the above approximation bound. First, given our choice of m in eqn. (1), the running time of the algorithm becomes   O nnz(A) κ (A) log (1/ε) ε−2 + log n log(1/δ) . (3) Thus, the running time of our algorithm increases linearly with the condition number of A. The error of our algorithm scales with Γ, a quantity that is not immediately comparable to logdet (A). It is worth noting that the Γ term increases logarithmically with respect to the ratios λ1 (A)/λi (A) ≥ 1. An obvious, but potentially loose upper bound for the sum of those ratios, is Γ= n X i=1   λ1 (A) log 7 · ≤ n · log (7κ(A)) . λi (A) (4) Our second result handles the family of SPD matrices whose eigenvalues all lie in the interval (θ1 , 1), with 0 < θ1 < 1; this setting was proposed in [HMS15]. In this case, a simplified version of Algorithm 3 returns a relative error approximation to the log-determinant of the input matrix. Indeed, Lemma 8 proves that, with probability at least 1 − δ, \ (A) − logdet (A) ≤ 2ε|logdet (A) |. logdet The running time of the simplified algorithm is   log(1/ε) log(1/δ) O nnz(A) . ε2 θ 1 (5) Finally, we implemented our algorithm in C++ and tested it on several large dense and sparse matrices. Our dense implementation runs on top of Elemental [PMVdG+ 13], a linear algebra library for distributed matrix computations with dense matrices. Our sparse implementation runs on top of Eigen 1 , a software library for sparse matrix computations. Our code is available to download on Github (see Section 5 for details and a link to our code). 1.2 Related Work The most relevant result to ours is the work in [BP99]. Barry and Pace [BP99] described a randomized algorithm for approximating the logarithm of the determinant of a matrix with special structure that we will describe below. They show that in order to approximate the logarithm of the determinant of a matrix A, it suffices to approximate the traces of Dk , for k = 1, 2, 3... for a suitably constructed matrix D. Specifically, [BP99] deals with approximations to SPD matrices A of the form A = In − αD, where 0 < α < 1 and all eigenvalues of D are in the interval [−1, 1]. \ (A) that is close to Given such a matrix A, the authors of [BP99] seek to derive an estimator logdet logdet (A). [BP99] proved (using the so-called Martin expansion [Mar92]) that log(det(A)) = − k=1 1 ∞   X αk  k  tr Dk − tr D . k k m X αk k=m http://eigen.tuxfamily.org/ 3 They considered the following estimator:   p  m  k T k  X 1 X α zi D zi   . \ logdet (A) = −n   Tz p k z  i i i=1  k=1 | {z } Vi All Vi for i = 1 . . . p are random variables and the value of p controls the variance of the estimator. The algorithm in [BP99] constructs vectors zi ∈ Rn whose entries are independent identically distributed standard Gaussian random variables. The above estimator ignores the trailing terms of the Martin expansion and only tries to approximate the first m terms. [BP99] presented the following approximation bound: s m−1 n·α σ2 \ (A) − logdet (A) ≤ logdet + 1.96 · , (m + 1)(1 − α) p where σ 2 is the variance of the random variable Vi . The above bound fails with probability at most 0.05. We now compare the results in [BP99] with ours. First, the idea of using the Martin expansion [Mar92] to relate the logarithm of the determinant and traces of matrix powers is present in both approaches. Second, the algorithm of [BP99] is applicable to SPD matrices that have special structure, while our algorithm is applicable to any SPD matrix. Intuitively, we overcome this limitation of [BP99] by estimating the top eigenvalue of the matrix in the first step of our algorithm. Third, our error bound is much better that the error bound of [BP99]. To analyze our algorithm, we used the theory of randomized trace estimators of Avron and Toledo [AT11], which relies on stronger measure-concentration inequalities than [BP99], which uses the weaker Chebyshev’s inequality. A similar idea using Chebyshev polynomials appeared in the paper [PL04]; to the best of our understanding, there are no theoretical convergence properties of the proposed algorithm. Applications to Gaussian process regression appeared in [LZL05, ZLLW08, ZL07]. The work of [Reu02] uses an approximate matrix inverse to compute the n-th root of the determinant of A for large sparse SPD matrices. The error bounds in this work are a posteriori and thus not directly comparable to our bounds. [HAB14] provides a strong worst-case theoretical result which is, however, only applicable to Symmetric Diagonally Dominant (SDD) matrices. The algorithm is randomized and guarantees \ (A) − logdet (A) ≤ ε · n, for a user specified error parameter that, with high probability, logdet ε > 0. This approach also uses the Martin expansion [Mar92] as well as ideas from preconditioning systems of linear equations with Laplacian  matrices [ST04]. The algorithm of [HAB14] runs in 3 2 −2 time O nnz(A)ε log (n) log (nκ(A)/ε) . To compare to our approach, we need to combine the suboptimal upper bound for Γ from eqn. (4) with the bound of eqn. (2). Then, we can run Algorithm 3 with input ε ε0 = , log(7κ(A)) 4 instead of ε to guarantee that the final error of our approximation will be bounded by ε0 n. Then, we can observe that the running time of [HAB14] depends logarithmically on the condition number of the input matrix A, whereas our algorithm has a linear dependency on the condition number. Notice, however, that our method is applicable to any SPD matrix while the method in [HAB14] is applicable only to SDD matrices; given current state-of-the-art on Laplacian preconditioners it looks hard to extend the approach of [HAB14] to general SPD matrices. Independently and in parallel with our work, [HMS15] presented an algorithm using Stochastic Chebyshev Expansions for the log-determinant problem. The algorithm is very similar in spirit to our approach, using the Chebyshev instead of the Taylor expansion and achieves relative-error guarantees for a special class of SPD matrices, namely matrices whose eigenvalues all lie in the interval (θ1 , 1 − θ1 ) for some 0 < θ1 < 1/2. As we already discussed, our algorithm also achieves a relative error bound under q such an assumption; the only difference is that the running time of [HMS15] is proportional to 1 θ1 log θ11 , whereas the running time of our approach (see eqn. (5)) is proportional to θ11 . This slightly improved running time might be due to the use of the Stochastic Chebyshev Expansions. However, importantly, our algorithm works for any SPD matrix, with arbitrary eigenvalues. Not surprisingly, the added generality comes with a loss in accuracy and the relative error bound becomes an additive error bound. Finally, two very recent papers [HMAS16, SAI16]2 presented algorithms to approximate the logdet of a matrix, highlighting the renewed importance of the topic. The work of [SAI16] presents a very novel approach to approximate the logdet of a positive semi-definite matrix, using a randomized subspace iteration approach. To the best of our understanding, the relevant bounds in their work (Theorem 2 in [SAI16]) are not directly comparable to our bounds. The work of [HMAS16] follows the lines of [HMS15] and leverages the use of Chebyshev approximations to propose novel estimators for the trace of a matrix function. Among the many exciting applications of the proposed approach is an additive-error approach to approximate the logdet of any square non-singular matrix; the algorithm needs as inputs upper and lower bounds for all the singular values of the input matrix. Similar to the running time of our additive error algorithm in eqn. (3), the time complexity of the proposed algorithm depends on the condition number of the input matrix (see Corollary 7 of [HMAS16]). We conclude by noting that common algorithms for the determinant computation assume floating point arithmetic and do not measure bit operations. If the computational cost is to be measured in bit operations, the situation is much more complicated and an exact computation of the determinant, even for integer matrices, is not trivial. We refer the interested reader to [EGV00] for more details. 2 Preliminaries 2.1 Notation Let A, B, . . . denote matrices and let a, b, . . . denote column vectors. In is the n×n identity matrix; 0m×n is the m × n matrix of zeros; tr (A) is the trace of a square matrix A; the Frobenius and 2 Both papers appeared after an earlier version of this paper was posted on ArXiv on March 2015 and cite this earlier version of our work. 5 P the spectral matrix-norms are: kAk2F = i,j A2ij and kAk2 = maxkxk2 =1 kAxk2 . We denote the determinant of a matrix A by det(A) and the (natural) logarithm of the determinant of A by logdet (A). We use log x to denote the natural logarithm of x . Finally, given an event E, P [E] denotes the probability of the event. For an SPD matrix A ∈ Rn×n , log [A] is an n × n matrix defined as: log [A] = UDUT , where U ∈ Rn×n contains the eigenvectors of A and D ∈ Rn×n is diagonal with entries being log(λ1 (A)), log(λ2 (A)), . . . , log(λn (A)). Let x be a scalar variable that satisfies |x| < 1. Then, using the Taylor expansion, log(1 − x) = − ∞ X xk k=1 k . A matrix-valued generalization of this identity is the following statement. Lemma 1. Let A ∈ Rn×n be a symmetric matrix whose eigenvalues all lie in the interval (−1, 1). Then, log(In − A) = − ∞ X Ak k=1 2.2 k . Power method The first step in our algorithm for approximating the determinant of an SPD matrix is to obtain an estimate for the largest eigenvalue of the matrix. Given an SPD matrix A ∈ Rn×n we will use the power-method (Algorithm 1) to obtain an accurate estimate of its largest eigenvalue. This estimated eigenvalue is denoted by λ̃1 (A). Algorithm 1 Power method, repeated q times. • Input: SPD matrix A ∈ Rn×n , integers q, t > 0 • For j = 1, . . . , q 1. Pick uniformly at random a vector xj0 ∈ {+1, −1}n 2. For i = 1, . . . , t • xji = A · xji−1 3. Compute: λ̃j1 (A) = T xjt Axjt T xjt xjt • Return: λ̃1 (A) = maxj=1...q λj1 (and the corresponding vector xt = xjt ) Algorithm 1 requires O(qt(n + nnz(A))) arithmetic operations to compute λ̃1 (A). Lemma 2 (see [Tre11] for a proof) argues that any λ̃j1 (A) is close to λ1 (A). 6 Lemma 2. For any fixed j = 1 . . . q, and for any t > 0, ε > 0, with probability at least 3/16, T (1 − ε) xjt Axjt λ (A) ≤ = λ̃j1 (A). 1 jT j 1 + 4n(1 − ε)2t xt xt  √  Let e = 2.718 . . . and let ε = 1 − (1/e) and t = log 4n ; then, with probability at least 3/16, for any fixed j = 1 . . . q, 1 1 λ1 (A) ≤ λ1 (A) ≤ λ̃j1 (A). 6 2e It is now easy to see that the largest value λ̃1 (A) (and the corresponding vector xt ) fails to satisfy the inequality (1/6)λ1 (A) ≤ λ̃1 (A) with probability at most    q 3 q 13 1− = ≤ δ, 16 16 where the last inequality follows by setting q = d4.82 log(1/δ)e ≥ log(1/δ)/ log(16/13). Finally, we note that, from the min-max principle, λ̃1 (A) ≤ λ1 (A). We summarize the above discussion in the following lemma.  √  Lemma 3. Let λ̃1 (A) be the output of Algorithm 1 with q = d4.82 log(1/δ)e and t = log 4n . Then, with probability at least 1 − δ, 1 λ1 (A) ≤ λ̃1 (A) ≤ λ1 (A). 6  The running time of Algorithm 1 is O (n + nnz(A)) log(n) log 1δ . 2.3 Trace estimation Even though computing the trace of a square n × n matrix requires only O(n) arithmetic operations, the situation is more complicated when A is given through a matrix function, e.g., A = X2 , for some matrix X and the user only observes X. For situations such as these, Avron and Toledo [AT11] analyzed several algorithms to estimate the trace of A. Algorithm 2 and Lemma 4 present the relevant results from their paper. Lemma 4. Let A ∈ Rn×n be an SPD matrix, let 0 < ε < 1 be an accuracy parameter, and let 0 < δ < 1 n be a failure  probability.2 If g1 , g2 , . . . , gp ∈ R are independent random standard Gaussian vectors, then, for p = 20 log(2/δ)/ε , with probability at least 1 − δ, p 1X > tr (A) − gi Agi ≤ ε · tr (A) . p i=1 The above lemma is immediate from Theorem 5.2 in [AT11]. 7 Algorithm 2 Randomized Trace Estimation • Input: SPD matrix A ∈ Rn×n , accuracy 0 < ε < 1, and failure probability 0 < δ < 1.   1. Let p = 20 log(2/δ)/ε2 2. Let g1 , g2 , . . . , gp be a set of independent Gaussian vectors in Rn 3. Let γ = 0 4. For i = 1, . . . , p • γ = γ + gi> Agi 5. γ = γ/p • Return: γ 3 Additive error approximation for general SPD matrices Lemma 5 is the starting point of our main algorithm for approximating the determinant of a symmetric positive definite matrix. The message in the lemma is that computing the log determinant of an SPD matrix A reduces to the task of computing the largest eigenvalue of A and the trace of all the powers of a matrix C related to A. Lemma 5. Let A ∈ Rn×n be an SPD matrix. For any α with λ1 (A) < α, define B := A/α and C := In − B. Then,  ∞ X tr Ck logdet (A) = n log(α) − . k k=1 Proof. Observe that B is an SPD matrix with kBk2 < 1. It follows that logdet (A) = log(αn det(A/α)) n Y = n log(α) + log ! λi (B) i=1 = n log(α) + n X log(λi (B)) i=1 = n log(α) + tr (log [B]) . Here, we used standard properties of the determinant, standard properties of the logarithm function, and the fact that (recall that B is an SPD matrix), tr (log [B]) = n X λi (log [B]) = i=1 n X log(λi (B)). i=1 Now, tr (log [B]) = tr (log [In − (In − B)]) = tr − ∞ X (In − B)k k=1 8 k !  ∞ X tr Ck =− . k k=1 (6) The second equality follows by the Taylor expansion because all the eigenvalues of C = In − B are contained3 in (0, 1) and the last equality follows by the linearity of the trace operator. 3.1 Algorithm Lemma 5 indicates the following high-level procedure for computing the logdet of an SPD matrix A: 1. Compute some α with λ1 (A) < α. 2. Compute C = In − A/α. 3. Compute the trace of all the powers of C. To implement the first step in this procedure we use the power iteration from the numerical linear algebra literature (see Section 2.2). The second step is straightforward. To implement the third P k step, we keep a finite number of summands in the expansion ∞ tr C . This step is important k=1 since the quality of the approximation, both theoretically and empirically, depends on the number of summands (denoted with m) that will be kept. On the other hand, the running time of the algorithm increases with m. Finally, to estimate the traces of the powers of C, we use the randomized algorithm of Section 2.3. Our approach is described in detail in Algorithm 3; notice that step 7 in Algorithm 3 is an efficient way of computing ! p m X X 1 \ (A) := n log(α) − logdet gi> Ck gi /k. p k=1 3.2 i=1 Error bound The following lemma proves that Algorithm 3 returns an accurate approximation to the logdet of A. \ (A) be the output of Algorithm 3 on inputs A, m, and ε. Then, with probability at Lemma 6. Let logdet least 1 − 2δ,   m  1 \ logdet (A) − logdet (A) ≤  + 1 − · Γ, 7κ (A)     P (A) where Γ = ni=1 log 7 · λλ1i (A) . If m ≥ 7κ (A) log 1ε , then \ (A) − logdet (A) ≤ 2Γ. logdet Proof. First, note that using our choice for α in Step 3 of Algorithm 3 and applying Lemma 3, we get that, with probability at least 1 − δ, 7 λ1 (A) < λ1 (A) ≤ α ≤ 7λ1 (A), 6 3 Indeed, λi (C) = 1 − λi (B) and 0 < λi (B) < 1 for all i = 1 . . . n. 9 (7) Algorithm 3 Randomized Log Determinant Estimation 1: INPUT: A ∈ Rn×n , accuracy parameter ε > 0, and integer m > 0. 2: Compute λ̃1 (A) using Algorithm 1 with (integers)t = O (log n) and q = O (log(1/δ)) 3: Pick α = 7λ̃1 (A) 4: Set C = In − A/α   5: Set p = 20 log(2/δ)/ε2 6: Let g1 , g2 , . . . , gp ∈ Rn be i.i.d. random Gaussian vectors. 7: For i = 1, 2 . . . , p (i) (i) (i) • v1 = Cgi and γ1 = gi> v1 • For k = 2, . . . , m (i) (i) (i) (i) 1. vk := Cvk−1 . (i) 2. γk = gi> vk (Inductively γk = gi> Ck gi ) • EndFor EndFor  P  P (i) p 1 \ (A) = n log(α) − m 9: OUTPUT: logdet /k k=1 p i=1 γk 8: The strick inequality at the leftmost side of the above equation follows since all eigenvalues of A are strictly positive. Let’s call the event that the above inequality holds E1 ; obviously, P [E1 ] ≥ 1 − δ   (and thus P Ē1 ≤ δ). We condition all further derivations on E1 holding and we manipulate \ (A) − logdet (A) as follows: ∆ = logdet ∆= ≤ = m X k=1 m X k=1 p X 1 p | i=1 p 1X > k gi C gi p ! 1 p ! i=1 p X gi> Ck gi /k − /k − i=1 gi> ∞ X k=1 m X   tr Ck /k  k tr C  /k + k=1 m X ! Ck /k gi − tr k=1 m X ! Ck /k + k=1 {z   tr Ck /k k=m+1 ∞ X   tr Ck /k . k=m+1 } ∆1 ∞ X | {z ∆2 } Below, we bound the two Westart with ∆1 : the idea is to apply  P termsk ∆1 and ∆2 separately. 2 . Let E denote the probability that Lemma 4 on the matrix m C /k with p = 20 log(2/δ)/ε 2 k=1   Lemma 4 holds; obviously, P [E2 ] ≥ 1 − δ (and thus P Ē2 ≤ δ) given our choice of p. We condition all further derivations on E2 holding as well to get ! ! m ∞ X X Ck /k ≤ ε · tr Ck /k . ∆1 ≤ ε · tr k=1 k=1 10  In the last inequality we used the fact that C is a positive matrix, hence for all k, tr Ck > 0. The second term ∆2 is bounded as follows: ∞ X ∆2 = =  k tr C k=m+1 ∞ X  ∞ X /k ≤ k=m+1  ∞ X  tr Cm · Ck−m /k ≤ k=m+1 ∞ X  1− λn (A) α  tr Ck−m /k ≤ kCm k2 · k=m+1 m    kCm k2 · tr Ck−m /k k=m+1 = kCm k2 · ≤   tr Ck /k ∞ X   tr Ck /k k=1 · ∞ X   tr Ck /k. k=1 In the first inequality, we used the triangle inequality and the fact that C is a positive matrix. In the second inequality, we used the following fact4 : given two positive semidefinite matrices A, B of the same size, tr (AB) ≤ kAk2 · tr (B) . In the last inequality, we used the fact that λ1 (C) = 1 − λn (B) = 1 − λn (A)/α. Combining the bounds for ∆1 and ∆2 gives  m  X   ∞ tr Ck λ (A) n \ (A) − logdet (A) ≤  + 1 − · . logdet α k k=1 We have already proven in Lemma 5 that  ∞ X tr Ck = −tr (log [B]) = n log(a) − logdet (A) . k k=1 Notice that the assumption of Lemma 5 (namely, λ1 (A) < α) is satisfied from the inequality of eqn. (7). We further manipulate the last term as follows: n Y n log(a) − logdet (A) = n log(α) − log( λi (A)) i=1 = n log(α) − n X log(λi (A)) i=1 = = n X i=1 n X i=1 4 This follows from Von Neumann’s trace inequality. 11 (log (α) − log (λi (A)))  log α λi (A)  . Collecting our results together, we get: \ (A) − logdet (A) ≤ logdet     X   n λn (A) m α + 1− · . log α λi (A) i=1 Using the inequality of eqn. (7) (only the upper bound on α is needed here) proves the first inequalx ity of the lemma. To prove the second inequality, we use the well-known fact that 1 − x−1 ≤ e−1 (where e = 2.718 . . . and x > 0) and our choice for m. Finally, recall that we conditioned all derivations on events E1 and E2 both holding, which can be bounded as follows:       P [E1 ∩ E2 ] = 1 − P Ē1 ∪ Ē2 ≥ 1 − P Ē1 − P Ē1 ≥ 1 − 2δ. The first inequality in the above derivation follows from the union bound. 3.3 Running time Step 2 takes O(nnz(A) log(n) log(1/δ)) time; we assume that nnz(A) ≥ n, since otherwise the determinant of A would be trivially equal to zero. For each k > 0, vk = Ck gi . The algorithm inductively computes vk and gi> Ck gi = gi> vk for all k = 1, 2, . . . , m. Given vk−1 , vk and gi> Ck gi can be computed in nnz(C) and O(n) time, respectively. Notice that nnz(C) ≤ n + nnz(A). Therefore, step 7 requires O(p · m · nnz(A)) time. Since p = O(ε−2 log(1/δ)), the total cost is    m  1 O nnz(A) · 2 + log n · log . ε δ 4 Relative error approximation for SPD matrices with bounded eigenvalues In this section, we argue that a simplified version of Algorithm 3 achieves a relative error approximation to the logdet of the SPD matrix A, under the assumption that all the eigenvalues of A lie in the interval (θ1 , 1), where 0 < θ1 < 1. This is a mild generalization of the setting introduced in [HMS15]. Given the upper bound on the largest eigenvalue of A, the proof of the following lemma (which is the analog of Lemma 5) is straightforward. Lemma 7. Let A ∈ Rn×n be an SPD matrix whose eigenvalues lie in the interval (θ1 , 1), for some 0 < θ1 < 1. Let C := In − A; then,  ∞ X tr Ck logdet (A) = − . k k=1 Proof. Similarly to the proof of Lemma 5, logdet (A) = log n Y ! λi (A) = i=1 n X i=1 12 log(λi (A)) = tr (log [A]) . Now, tr (log [A]) = tr (log [In − (In − A)]) = tr − ∞ X (In − A)k ! k k=1  ∞ X tr Ck =− . k k=1 The second equality follows by the Taylor expansion since all the eigenvalues of C = In − A are contained in the interval (0, 1). 4.1 The algorithm and the relative error bound We simplify Algorithm 3 as follows: we skip steps 2 and 3 and in step 4 we set C = In − A. The following lemma proves that in this special case the modified algorithm returns a relative error approximation to the log determinant of the input matrix A. \ (A) be the output of the (modified) Algorithm 3 on inputs A and ε. Then, with Lemma 8. Let logdet probability at least 1 − δ, \ (A) − logdet (A) ≤ 2ε · |logdet (A)| . logdet \ (A) − logdet (A) as follows: Proof. Similarly to the proof of Lemma 6, we manipulate ∆ = logdet ∆= m X k=1 ≤ = m X k=1 p X 1 p | i=1 p 1X > k gi C gi p ! /k − i=1 p 1X p /k − i=1 gi>   tr Ck /k k=1 ! gi> Ck gi ∞ X m X  k tr C  /k + k=1 m X ! Ck /k gi − tr m X ! Ck /k + k=1 k=1 {z   tr Ck /k k=m+1 ∞ X   tr Ck /k . k=m+1 } ∆1 ∞ X | {z ∆2 } We now bound the twoP terms ∆1 and ∆2 separately. We start   with ∆1 : the idea is to apply m k 2 Lemma 4 on the matrix k=1 C /k with p = 20 log(2/δ)/ε . Hence, with probability at least 1 − δ (this is the only probabilistic event in this lemma and hence 1 − δ is a lower bound on the success probability of the lemma): ! ! m ∞ X X ∆1 ≤ ε · tr Ck /k ≤ ε · tr Ck /k . k=1 k=1  In the last inequality we used the fact that C is a positive definite matrix, hence for all k, tr Ck > 13 0. Bounding ∆2 follows the lines of the proof of Lemma 6: ∆2 = ≤ ∞ X k=m+1 ∞ X ∞ X   tr Ck /k =   tr Cm · Ck−m /k k=m+1  m k−m kC k2 · tr C  m /k = kC k2 · k=m+1 ≤ kCm k2 · ∞ X   tr Ck /k ≤ (1 − λn (A))m k=1 ∞ X   tr Ck−m /k k=m+1 ∞  X  tr Ck /k . k=1 In the last inequality, we used the fact that λ1 (C) = 1 − λn (A). Combining the bounds for ∆1 and ∆2 gives  ∞ X tr Ck m \ (A) − logdet (A) ≤ ( + (1 − λn (A)) ) · . logdet k k=1 We have already proven in Lemma 7 that  ∞ X tr Ck = −tr (log [A]) = −logdet (A) . k k=1 Collecting our results, we get: \ (A) − logdet (A) ≤ (ε + (1 − λn (A))m ) · |logdet (A)| . logdet Using 1 − λn (A) < 1 − θ1 , we conclude that \ (A) − logdet (A) ≤ (ε + (1 − θ1 )m ) · |logdet (A)| . logdet Setting  1 m= · log θ1   1 ε x and using 1 − x−1 ≤ e−1 (where e = 2.718 . . . and x > 0), guarantees that (1 − θ1 )m ≤ ε and concludes the proof of the lemma. We conclude by discussing the running  time of thesimplified  Algorithm 3, which is equal to log(1/δ) log(1/ε) and m = O O(p · m · nnz(A)). Since p = O , the running time becomes θ1 ε2  O  log(1/ε) log(1/δ) nnz(A) . ε2 θ 1 14 5 Experiments The goal of our experimental section is to establish that our approximation to logdet (A) (as computed by Algorithm 3) is both accurate and fast for both dense and sparse matrices. The accuracy of Algorithm 3 is measured by comparing its result against the exact logdet (A) computed via the Cholesky factorization. The rest of this section is organized as follows: in Section 5.1, we describe our software for approximating logdet (A); in Section 5.2 we describe the computational environment that we used; and in Sections 5.3 and 5.4 we discuss experimental results for dense and sparse SPD matrices, respectively. 5.1 Software We developed high-quality, shared- and distributed-memory parallel C++ code for the algorithms listed in this paper. All of the code that was developed for this paper is hosted at https: //github.com/pkambadu/ApproxLogDet. In it’s current state, our software supports: (1) ingesting dense (binary and text format) and sparse (binary, text, and matrix market format) matrices, (2) generating large random SPD matrices, (3) computing both approximate and exact spectral norms of matrices, (4) computing both approximate and exact traces of matrices, and (5) computing both approximate and exact log determinants of matrices. Currently, we support both Eigen [GJ+ 10] and Elemental [PMVdG+ 13] matrices. The Eigen software package supports both dense and sparse matrices, while the Elemental software package mostly supports dense matrices and only recently added support for sparse matrices (pre-release). As we wanted the random SPD generation to be fast, we have used parallel random number generators from Random123 [SMDS11] in conjunction with Boost.Random. 5.2 Environment All our experiments were run on “Nadal”, a 60-core machine, where each core is an Intel R Xeon R E7-4890 machine running at 2.8 Ghz. Nadal has 1 TB of RAM and runs Linux kernel version 2.632. For compilation, we used GCC 4.9.2. We used Eigen 3.2.4, OpenMPI 1.8.4, Boost 1.55.7, and the latest version of Elemental at https://github.com/elemental. For experiments with Elemental, we used OpenBlas, which is an extension of GotoBlas [GVDG08], for its parallel prowess; Eigen has built-in the BLAS and LAPACK packages. 5.3 Dense Matrices Data Generation. In our experiments, we used two types of synthetic SPD matrices. The first type were diagonally dominant SPD matrices and were generated as follows. First, we created X ∈ Rn×n by drawing n2 entries from a uniform sphere with center 0.5 and radius 0.25. Then, we generated a symmetric matrix Y by setting Y = 0.5 ∗ (X + X> ). Finally, we ensured that the desired matrix A is positive definite by adding the value n to each diagonal entry [Cur09] of Y: A = Y + nIn . We call this method randSPDDenseDD. 15 The second approach generates SPD matrices that are not diagonally dominant. We created X, D ∈ Rn×n by drawing n2 and n entries, respectively, from a uniform sphere with center 0.5 and radius 0.25; D is a diagonal matrix with small entries. Next, we generated an orthogonal random matrix Q = qr (X). Thus, Q is an orthonormal basis for X. Finally, we generated A = QDQT . We call this method randSPDDense. randSPDDense is more expensive than randSPDDenseDD, as it requires an additional O(n3 ) computations for the QR factorization and the matrix-matrix product. Evaluation. To evaluate the runtime of Algorithm 3 against a baseline, we used the Cholesky decomposition to compute the logdet (A). More specifically, we computed A = LLT and returned logdet (A) = 2 · logdet (L). Since Elemental provides distributed and shared memory parallelism, we restricted ourselves to experiments with Elemental matrices throughout this section. Note that we measured the accuracy of the approximate algorithm in terms of the relative error to ensure that we have numbers of the same scale for matrices with vastly different values for logdet (A); we defined the relative error e as e = 100(x − x̃)/x, where x is the true value and x̃ is the approximation. Similarly, we defined the speedup s as s = tx /tx̃ , where tx is the time needed to compute x and tx̃ is the time needed to compute the approximation x̃. Results. For dense matrices, we first used synthetic matrices generated using randSPDDense; these are relatively ill-conditioned matrices. We experimented with values of n (number of rows and columns of A) in the set {5, 000, 7, 500, 10, 000, 12, 500, 15, 000}. The three key points pertaining to these matrices are shown in Figure 1. First, we discuss the effect of m, the number of terms in the Taylor series used to approximate logdet (A); Figure 1(a) depicts our results for the sequential case. On the y-axis, we see the relative error, which is measured against the exact logdet (A) as computed via the Cholesky factorization. We observe that for these ill-conditioned matrices, for small values of m (less than four) the relative error is high. However, for all values of m ≥ 4, we observe that the error drops significantly and stabilizes. We note that in each iteration, all random processes were re-seeded with new values; we have plotted the error bars throughout Figure 1. The standard deviation for both accuracy and time was consistently small; indeed, it is not visible to the naked eye at scale. To see the benefit of approximation, we look at Figure 1(b) together with Figure 1(a). For example, at m = 4, for all matrices, we get at least a factor of two speedup. As n gets larger, the speedups of the approximation also increase. For example, for n = 15, 000, the speedup at m = 4 is nearly six-fold. In terms of accuracy, Figure 1(a) shows that at m = 4, the relative error is approximately 4%. This speedup is expected as the Cholesky factorization requires O(n3 ) operations; Algorithm 3 only relies on matrix-matrix products where one of the matrices has a small number of columns (equal to p), which is independent of n. Finally, we discuss the parallel speedup in Figure 1(c), which shows the relative speedup of the approximate algorithm with respect to the baseline Cholesky algorithm. For this evaluation, we set m = 4 and varied the number of processes, denoted by np, from 1 to 60. The main take away from Figure 1(c) is that the approximate algorithm provides nearly the same or increasingly better speedups relative to a parallelized version of the exact (Cholesky) algorithm. For example, for n = 15, 000, the speedups for using the approximate algorithm are consistently better that 6.5x. The absolute values for logdet (A) and timing along with the baseline numbers for this experiment are given in Table 1. We report the numbers in Table 1 at m = 4 at which point, we have low relative error. For the second set of dense experiments, we generated diagonally dominant matrices using 16 (a) Accuracy vs. m (b) Speedup vs. m (c) Parallel Speedup Figure 1: Panels 1(a) and 1(b) depict the effect of m (see Algorithm 3) on the accuracy of the approximation and the time to completion, respectively, √ for dense matrices generated by randSPDDense. For all the panels, p = 60 and t = 2 log 4n. The baseline for all experiments was the Cholesky factorization, which was used to compute the exact value of logdet (A). For panels 1(a) and 1(b), the number of cores, np, was set to one. The last panel 1(c) depicts the relative speedup of the approximate algorithm when compared to the baseline solver (at m = 4). Elemental was used as the backend for these experiments. For the approximate algorithm, we report the mean and standard deviation of ten iterations. n 5000 7500 10000 12500 15000 exact -3717.89 -5474.49 -7347.33 -9167.47 -11100.9 logdet (A) mean -3546.920 -5225.152 -7003.086 -8734.956 -10575.16 std 8.10 8.73 7.79 17.43 15.09 exact 2.56 7.98 18.07 34.39 58.28 time (secs) mean std 1.15 0.0005 2.53 0.0015 4.47 0.0006 7.00 0.0030 10.39 0.0102 √ Table 1: Accuracy and sequential running times (at p = 60, m = 4 and t = log 4n) for dense random matrices generated using randSPDDense. Baselines were computed using the Cholesky factorization; mean and standard deviation are reported over ten iterations. randSPDDenseDD; we were able to quickly generate and run benchmarks on matrices of sizes n × n with n in the set {10, 000, 20, 000, 30, 000, 40, 000} due to the relatively simpler procedure involved in matrix generation. In this set of of experiments, due to the diagonal dominance, all matrices were well-conditioned. The results of our experiments on these well-conditioned matrices are presented in Figure 2 and show a marked improved over the results presented in Figure 1. First, notice that very few terms of the Taylor series (i.e., small m) are sufficient to get high accuracy approximations; this is apparent in Figure 2(a). In fact, we see that even at m = 2, we are near convergence and at m = 3, for most of the matrices, we have near-zero relative error. This experimental result, combined with Figure 2(b) is particularly encouraging; at m = 2, we seem to not only have a nearly lossless approximation of logdet (A), but also have at least a fivefold speedup. Similarly to Figure 1, the speedups are better for larger matrices. For example, for n = 40, 000, the speedup at m = 2 is nearly twenty-fold. We conclude our analysis by presenting Figure 2(c), which similarly to Figure 1(c), points out that at any level of parallelism, Algorithm 3 17 (a) Accuracy vs. m (b) Speedup vs. m (c) Parallel Speedup Figure 2: Panels 2(a) and 2(b) depict the effect of m (see Algorithm 3) on the accuracy of the approximation and the time to completion, respectively, for diagonally dominant dense √ random matrices generated by randSPDDenseDD. For all the panels, p = 60 and t = 2 log 4n. The baseline for all experiments was the Cholesky factorization, which was used to compute the exact value of logdet (A). For panels 2(a) and 2(b), the number of cores, np, was set to one. The last panel 2(c) depicts the relative speedup of the approximate algorithm when compared to the baseline solver (at m = 2). Elemental was used as the backend for these experiments. For the approximate algorithm, we report the mean and standard deviation over ten iterations. n 10000 20000 30000 40000 exact 92103.1 198069.0 309268.0 423865.0 logdet (A) mean 92269.5 198397.4 309763.8 424522.4 std 5.51 9.60 20.04 14.80 time (secs) exact mean 18.09 2.87 135.92 12.41 448.02 30.00 1043.74 58.05 std 0.01 0.02 0.12 0.05 √ Table 2: Accuracy and sequential running times (at p = 60, m = 2, and t = 2 log 4n) for diagonally dominant dense random matrices generated using randSPDDenseDD. Baselines were computed using the Cholesky factorization; mean and standard deviation are reported over ten iterations. maintains its relative performance over the exact (Cholesky) factorization. The absolute values for logdet (A) and the corresponding running times, along with the baseline for this experiment are presented in Table 2. We report the numbers in Table 1 at m = 2, at which point we have a low relative error. 5.4 Sparse Matrices Data Synthesis. To generate a sparse, synthetic matrix A ∈ Rn×n , with nnz non-zeros, we use a Bernoulli distribution to determine the location of the non-zero entries and a uniform distribution to generate the values. First, we completely fill the n principle diagonal entries. Next, we generate (nnz − n)/2 index positions in the upper triangle for the non-zero entries by sampling from a Bernoulli distribution with probability (nnz−n)/(n2 −n). We reflect each entry across the principle diagonal to ensure that A is symmetric and we add n to each diagonal entry to ensure that A is 18 name n nnz area of origin thermal2 ecology2 ldoor thermomech TC boneS01 1228045 999999 952203 102158 127224 8580313 4995991 42493817 711558 5516602 Thermal 2D/3D Structural Thermal Model reduction exact 1.3869e6 3.3943e6 1.4429e7 -546787 1.1093e6 logdet (A) approx mean std 1.3928e6 964.79 3.403e6 1212.8 1.4445e7 1683.5 -546829.4 553.12 1.106e6 247.14 time (sec) approx exact mean 31.28 31.24 18.5 10.47 117.91 17.60 57.84 2.58 130.4 8.48 m 149 125 33 77 125 Table 3: Description of the SPD matrices from the University of Florida sparse matrix collection [DH11] that were used in our experiments. All experiments were run sequentially (np = 1) using Eigen. Accuracy results for Algorithm 3 are reported using both the mean and the standard deviation over ten iterations at (with t = 5 and p = 5); we only report the mean for the running times, since the standard deviation is negligible. The exact logdet (A) was computed using the Cholesky factorization. SPD (actually, A is also diagonally dominant). Real Data. To demonstrate the prowess of Algorithm 3 on real-world data, we used SPD matrices from the University of Florida’s sparse matrix collection [DH11]. The complete list of matrices from this collection used in our experiments, as well as a brief description of each matrix, is given in columns 1–4 of Table 3. Evaluation. It is tricky to pick any single method as the “exact method” to compute the logdet (A) for a sparse SPD matrix A. One approach would be to use direct methods such as Cholesky decomposition of A [Dav06, Gup00]. For direct methods, it is difficult to derive an analytical solution for the number of operations required for the factorization as a function of the number of non-zero entries of the matrix, as this is highly dependent on the structure of the matrix [GKK97]. In the distributed setting, one also needs to consider the volume of communication involved, which is often the bottleneck. Alternately, we can use iterative methods to compute the eigenvalues of A [Dav75] and use the eigenvalues to compute logdet (A). It is clear that the worst case performance of both the direct and iterative methods is O(n3 ). However, iterative methods are typically used to compute a few eigenvalues and eigenvectors: therefore, we chose to use the Cholesky factorization based on matrix reordering to compute the exact value of logdet (A). It is important to note that both the direct and iterative methods are notoriously hard to implement, which comes to stark contrast with the almost trivial implementation of Algorithm 3, which is also readily parallelizable. Results. The true power of Algorithm 3 lies in its ability to approximate logdet (A) for sparse A. The Cholesky factorization can introduce O(n2 ) non-zeros during factorization due to fill-in; for many problems, there is insufficient memory to factorize a large, sparse matrix. In our first set of experiments, we wanted to show the effect of m on: (1) convergence of logdet (A), and (2) cost of the solution. To this end, we generated sparse, diagonally dominant SPD matrices of size n = 106 and varied the sparsity from 0.1% to 1% in increments of 0.25%. We did not attempt to compute the exact logdet (A) for these synthetic matrices — our aim was to merely study the speedup √ with m for different sparsities, while t and p were held constant at 2 log 4n and 60 respectively. The results are shown in Figure 3. Figure 3(a) depicts the convergence of logdet (A) measured as a relative error of the current estimate over the final estimate. As can be seen — for well conditioned 19 (a) Convergence with m (b) Cost as a function of m Figure 3: Panels 3(a) and 3(b) depict the effect of the number of terms in the Taylor expansion, m, (see Algorithm 3) on the convergence to the final solution and the time to completion of the approximation. The matrix size was fixed at n = 106 and sparsity was varied as 0.1%, 0.25%, √ 0.5%, 0.75%, and 1%. Experiments were run sequentially (np = 1) and we set p = 60, t = 2 log 4n. For panel 3(a), the baseline is the final value of logdet (A) at m = 25. For panel 3(b), the baseline is the time to completion of the approximation algorithm with m = 1. Eigen was used as the backend for these experiments. matrices — convergence is quick. Figure 3(b) shows the relative cost of increasing m; here the baseline is m = 1. Therefore, the additional cost incurred by increasing m is linear when all other parameters are held constant. The results of running Algorithm 3 on the UFL matrices are shown in Table 3. The numbers reported for the approximation are the mean and standard deviation over ten iterations, t = 5, and p = 5 5 . The value of m was varied between one and 150 in increments of five to select the best average accuracy. The matrices shown in Table 3 have a nice structure, which lends itself to nice reorderings and therefore an efficient computation of the Cholesky factorization. We see that even in such cases, the performance of Algorithm 3 is commendable due to its lower algorithmic complexity; ldoor is the only exception as the approximation takes longer to compute than the Cholesky factorization. In the case of thermomech TC, we achieve good accuracy while achieving a 22x speedup. 6 Conclusions Prior work has presented approximation algorithms for the logarithm of the determinant of a symmetric positive definite matrix; those algorithms either do not work for all SPD matrices, or do not admit a worst-case theoretical analysis, or both. In this work, we presented an approximation algorithm to compute the logarithm of the determinant of a SPD matrix that comes with strong theoretical worst-case analysis bounds and can be applied to any SPD matrix. A simplification of our algorithm delivers relative-error approximation guarantees for a popular special case of SPD 5 We experimented with different p, t and settled on the smallest values that did not result in loss in accuracy. 20 matrices. Using state-of-the-art C++ numerical linear algebra software packages for both dense and sparse matrices, we demonstrated that the proposed approximation algorithm performs remarkably well in practice in serial and parallel environments. 21 References [AT11] H. Avron and S. Toledo. Randomized Algorithms for Estimating the Trace of an Implicit Symmetric Positive Semi-definite Matrix. J. ACM, 58(2):8, 2011. [BP99] Ronald Paul Barry and R Kelley Pace. Monte carlo estimates of the log determinant of large sparse matrices. Linear Algebra and its applications, 289(1):41–54, 1999. [Cur09] Paul F Curran. On a variation of the gershgorin circle theorem with applications to stability theory. 2009. [Dav75] Ernest R Davidson. The iterative calculation of a few of the lowest eigenvalues and corresponding eigenvectors of large real-symmetric matrices. Journal of Computational Physics, 17(1):87–94, 1975. [Dav06] Timothy A Davis. Direct methods for sparse linear systems, volume 2. SIAM, 2006. [dBEG08] Alexandre d’Aspremont, Onureena Banerjee, and Laurent El Ghaoui. First-order methods for sparse covariance selection. SIAM Journal on Matrix Analysis and Applications, 30(1):56–66, 2008. [DH11] Timothy A Davis and Yifan Hu. The university of florida sparse matrix collection. ACM Transactions on Mathematical Software (TOMS), 38(1):1, 2011. [EGV00] Wayne Eberly, Mark Giesbrecht, and Gilles Villard. On computing the determinant and smith form of an integer matrix. In Foundations of Computer Science, 2000. Proceedings. 41st Annual Symposium on, pages 675–685. IEEE, 2000. [FHT08] Jerome Friedman, Trevor Hastie, and Robert Tibshirani. Sparse inverse covariance estimation with the graphical lasso. Biostatistics, 9(3):432–441, 2008. [GJ+ 10] Gaël Guennebaud, Benoı̂t Jacob, et al. Eigen v3. http://eigen.tuxfamily.org, 2010. [GKK97] Anshul Gupta, George Karypis, and Vipin Kumar. Highly scalable parallel algorithms for sparse matrix factorization. Parallel and Distributed Systems, IEEE Transactions on, 8(5):502–520, 1997. [Gup00] Anshul Gupta. Wsmp: Watson sparse matrix package (part-i: direct solution of symmetric sparse systems). IBM TJ Watson Research Center, Yorktown Heights, NY, Tech. Rep. RC, 21886, 2000. [GVDG08] Kazushige Goto and Robert Van De Geijn. High-performance implementation of the level-3 blas. ACM Transactions on Mathematical Software (TOMS), 35(1):4, 2008. [HAB14] Timothy Hunter, Ahmed El Alaoui, and Alexandre Bayen. Computing the logdeterminant of symmetric, diagonally dominant matrices in near-linear time. arXiv preprint arXiv:1408.1693, 2014. 22 [HMAS16] Insu Han, Dmitry Malioutov, Haim Avron, and Jinwoo Shin. Approximating the Spectral Sums of Large-scale Matrices using Chebyshev Approximations. jun 2016. [HMS15] Insu Han, Dmitry Malioutov, and Jinwoo Shin. Large-scale log-determinant computation through stochastic chebyshev expansions. In David Blei and Francis Bach, editors, Proceedings of the 32nd International Conference on Machine Learning (ICML15), pages 908–917. JMLR Workshop and Conference Proceedings, 2015. [HSD+ 13] Cho-Jui Hsieh, Mátyás A Sustik, Inderjit S Dhillon, Pradeep K Ravikumar, and Russell Poldrack. Big & quic: Sparse inverse covariance estimation for a million variables. In Advances in Neural Information Processing Systems, pages 3165–3173, 2013. [KL13] Prabhanjan Kambadur and Aurelie Lozano. A parallel, block greedy method for sparse inverse covariance estimation for ultra-high dimensions. In Proceedings of the Sixteenth International Conference on Artificial Intelligence and Statistics, pages 351– 359, 2013. [LP01] James P LeSage and R Kelley Pace. Spatial dependence in data mining. In Data Mining for Scientific and Engineering Applications, pages 439–460. Springer, 2001. [LZL05] WE Leithead, Yunong Zhang, and DJ Leith. Efficient gaussian process based on bfgs updating and logdet approximation. In the 16th IFAC world congress, 2005. [Mar92] RJ Martin. Approximations to the determinant term in gaussian maximum likelihood estimation of some spatial models. Communications in Statistics-Theory and Methods, 22(1):189–205, 1992. [PB97] R Kelley Pace and Ronald Barry. Quick computation of spatial autoregressive estimators. Geographical analysis, 29(3):232–247, 1997. [PBGS00] R Kelley Pace, Ronald Barry, Otis W Gilley, and CF Sirmans. A method for spatial– temporal forecasting with an application to real estate prices. International Journal of Forecasting, 16(2):229–246, 2000. [PL04] R Kelley Pace and James P LeSage. Chebyshev approximation of log-determinants of spatial weight matrices. Computational Statistics & Data Analysis, 45(2):179–196, 2004. [PMVdG+ 13] Jack Poulson, Bryan Marker, Robert A Van de Geijn, Jeff R Hammond, and Nichols A Romero. Elemental: A new framework for distributed memory dense matrix computations. ACM Transactions on Mathematical Software (TOMS), 39(2):13, 2013. [Reu02] Arnold Reusken. Approximation of the determinant of large sparse symmetric positive definite matrices. SIAM Journal on Matrix Analysis and Applications, 23(3):799– 818, 2002. 23 [SAI16] Arvind K. Saibaba, Alen Alexanderian, and Ilse C. F. Ipsen. Randomized Matrixfree Trace and Log-Determinant Estimators. page 37, may 2016. [SMDS11] John K Salmon, Mark A Moraes, Ron O Dror, and David E Shaw. Parallel random numbers: as easy as 1, 2, 3. In High Performance Computing, Networking, Storage and Analysis (SC), 2011 International Conference for, pages 1–12. IEEE, 2011. [ST04] Daniel A Spielman and Shang-Hua Teng. Nearly-linear time algorithms for graph partitioning, graph sparsification, and solving linear systems. In Proceedings of the thirty-sixth annual ACM symposium on Theory of computing, pages 81–90. ACM, 2004. [Tre11] Luca Trevisan. Graph Partitioning and Expanders. Handout 7, 2011. [ZL07] Yunong Zhang and William E Leithead. Approximate implementation of the logarithm of the matrix determinant in gaussian process regression. journal of Statistical Computation and Simulation, 77(4):329–348, 2007. [ZLLW08] Yunong Zhang, WE Leithead, DJ Leith, and L Walshe. Log-det approximation based on uniformly distributed seeds and its application to gaussian process regression. Journal of Computational and Applied Mathematics, 220(1):198–214, 2008. 24
8cs.DS
Nonfractional Memory: Filtering, Antipersistence, and Forecasting J. Eduardo Vera-Valdés∗ Department of Mathematical Sciences, Aalborg University, and CREATES. arXiv:1801.06677v1 [math.ST] 20 Jan 2018 Abstract The fractional difference operator remains to be the most popular mechanism to generate long memory due to the existence of efficient algorithms for their simulation and forecasting. Nonetheless, there is no theoretical argument linking the fractional difference operator with the presence of long memory in real data. In this regard, one of the most predominant theoretical explanations for the presence of long memory is cross-sectional aggregation of persistent micro units. Yet, the type of processes obtained by cross-sectional aggregation differs from the one due to fractional differencing. Thus, this paper develops fast algorithms to generate and forecast long memory by cross-sectional aggregation. Moreover, it is shown that the antipersistent phenomenon that arises for negative degrees of memory in the fractional difference literature is not present for crosssectionally aggregated processes. Pointedly, while the autocorrelations for the fractional difference operator are negative for negative degrees of memory by construction, this restriction does not apply to the cross-sectional aggregated scheme. We show that this has implications for long memory tests in the frequency domain, which will be misspecified for cross-sectionally aggregated processes with negative degrees of memory. Finally, we assess the forecast performance of high-order AR and ARF IM A models when the long memory series are generated by cross-sectional aggregation. Our results are of interest to practitioners developing forecasts of long memory variables like inflation, volatility, and climate data, where aggregation may be the source of long memory. Keywords: Nonfractional memory, long memory, fractional difference, antipersistence, forecasts. JEL classification: C15, C22, C53. ∗ E-mail: [email protected] Webpage: https://sites.google.com/view/veravaldes/ Address: Skjernvej 4A, 9220 Aalborg East, Denmark. Preprint submitted to arXiv January 23, 2018 1. Introduction Long memory has been a topic of interest in econometrics since Granger’s (1966) study on the shape of the spectrum of economic variables. Granger found that long-term fluctuations in economic variables if decomposed into frequency components are such that the amplitudes of the components decrease smoothly with decreasing period. As shown by Adenstedt (1974), this type of behaviour implies long lasting autocorrelations. The presence of long memory in the data can have perverse effects in estimation and forecasting methods if not included into the modelling scheme, see Beran (1994), and Beran et al. (2013). The autoregressive fractionally integrated moving average (ARF IM A) class of models has become one of the most popular methods to model long memory in the time series literature. They have the appeal of bridging the gap between the stationary autoregressive moving average (ARM A) models and the nonstationary autoregressive integrated moving average (ARIM A) model. ARF IM A models rely on the fractional difference operator to introduce long memory behaviour. Nonetheless, there are currently no economic or financial reasonings implying the fractional difference operator. One of the reasons behind the reliance of the time series literature on generating long memory by the fractional difference operator is the existence of efficient algorithms for their simulation and forecasting. In general, these type of algorithms are not available for other long memory generating schemes. Thus, in this paper, we develop algorithms for memory generation and forecasting by cross-sectional aggregation à la Granger (1980). We then contrast the properties of cross-sectionally aggregated processes to the ones obtained by the fractional difference operator. It is shown that cross-sectional aggregated processes are more flexible than fractionally differenced ones, in the sense that more short term dynamics may be included. Moreover, we show that the antipersistent property of negative autocorrelation for negative degrees of memory does not apply to long memory generated by cross-sectional aggregation. We show that this has repercussions for long memory estimators in the frequency domain. Finally, this paper evaluates the forecasting power of the ARF IM A, and high-order AR models when forecasting long memory generated by cross-sectional aggregation. It finds that high-order AR models beat a pure fractional difference process, I(d), in terms of forecasting performance for some cases. Nonetheless, allowing for short term dynamic in the form of an ARF IM A(1, d, 0) model produces comparable forecast performance as high-order AR models while relying on fewer parameters. This paper proceeds as follows. In Section 2, we present the fractional difference operator commonly used to model long memory in the time series literature. Section 3 discusses crosssectional aggregation as the theoretical explanation behind the presence of long memory in the data and develops a fast algorithm for its generation. Moreover, it contrasts properties of the fractional difference operator against the cross-sectional aggregation scheme. Section 4 discusses the antipersistent property in the context of cross-sectionally aggregated processes. Section 5 constructs minimum squared error forecasts, and studies the theoretical performance of highorder AR, and ARF IM A models when forecasting long memory generated by cross-sectional aggregation. Section 6 concludes. 2. The Fractional Difference Operator The ARF IM A specification due to Granger and Joyeux (1980), and Hosking (1981) has become the standard model to study long memory in the time series literature. They extended the ARM A model to include long memory dynamics by introducing the fractional difference operator (1 − L)d xt = εt , 2 where εt is a white noise process, and d ∈ (−1/2, 1/2). Following the standard binomial expansion, they decompose the fractional difference operator, (1 − L)d , to generate a series given by xt = ∞ X πj εt−j , (1) j=0 with coefficients πj = Γ(j + d)/(Γ(d)Γ(j + 1)) for j ∈ N. Using Stirling’s approximation, it can be shown that these coefficients decay at a hyperbolic rate, πj ≈ j d−1 , which in turn translates to slowly decaying autocorrelations. We write xt ∼ I(d) to denote a process generated by equation (1), that is, an integrated process with parameter d. The properties of the ARF IM A model have been well documented in, among others, Baillie (1996), and Beran et al. (2013). Moreover, fast algorithms have been developed to generate series using the fractional difference operator, see Jensen and Nielsen (2014). Thus, the ARF IM A model has become the canonical construction for modelling and forecasting long memory in the time series literature. Even though the ARF IM A provides a good representation of long memory, and bridges the gap between the stationary ARM A models and the non-stationary ARIM A model, to the best of our knowledge, there is no theoretical reasoning linking the ARF IM A model with the memory found in real data. That is, in contrast with the complete market hypothesis implying that stock prices follow a random walk, or capital depreciation suggesting an autoregressive process, there are no economic or financial arguments for the fractional difference operator to occur in real data. In this regard, the next section presents the most common theoretical motivation behind long memory in the time series literature, cross-sectional aggregation. 3. Cross-Sectional Aggregation Granger (1980), in line with the work of Robinson (1978) on autoregressive processes with random coefficients, showed that aggregating AR(1) processes with coefficients sampled from a Beta distribution can produce long memory. Define a cross-sectional aggregated series as N 1 X xt = √ xi,t , N i=1 (2) where the N individual series are generated as xi,t = αi xi,t−1 + i,t i = 1, 2, · · · , N ; where εi,t is an i.i.d. process with E[2i,t ] = σ2 . Moreover, αi2 is sampled from a Beta distribution with parameters a, b > 0, with density given by B(α; a, b) = 1 αa−1 (1 − α)b−1 B(a, b) for α ∈ (0, 1), where B(·, ·) is the Beta function. Granger showed that, as N → ∞, the autocorrelation function of xt decays at a hyperbolic rate with parameter d = 1 − b/2. Thus, xt has long memory. The cross-sectional aggregation result has been extended in several directions, including to allow for general ARM A processes, as well as to other distributions. See for instance, Linden (1999), Oppenheim and Viano (2004), and Zaffaroni (2004). As argued by Haldrup and Vera Valdés (2017), maintaining the Beta distribution allows us to have closed form representations. 3 Furthermore, Beran et al. (2010) proposed a method to estimate the parameters from the Beta distribution from the individual series, xi,t above. In applied work, cross-sectional aggregation has been cited as source of long memory for many series. To name but a few, it has been proposed for inflation, output, and volatility; see Balcilar (2004), Diebold and Rudebusch (1989), and Osterrieder et al. (2015). Even though a cross-sectional aggregated process has long memory, Haldrup and Vera Valdés (2017) show that the resulting series does not belong to the ARF IM A class of processes. Pointedly, they show that the fractionally differenced cross-sectional aggregated process does not follow an ARM A specification. The next subsections expands on the cross-sectional aggregation literature by developing fast algorithms for its generation, and contrasting its theoretical properties to the ones of the fractional difference operator. 3.1. Nonfractional Memory Generation As can be seen by its definition, Equation (2), generating cross-sectionally aggregated processes is computationally demanding. For each cross-sectionally aggregated process, we need to simulate a vast number of AR(1) processes, which are in turn computationally demanding. Haldrup and Vera Valdés (2017) suggest that to get a good approximation, the cross-sectional dimension should increase as the sample size. The computational demands are thus particularly large for Monte Carlo type of analysis on cross-sectionally aggregated processes. In what follows, we use the theoretical autocorrelations of the cross-sectionally aggregated process to present an algorithm that makes generation of long memory by cross-sectional aggregation comparable to fractional differencing in terms of computational requirements. Denote xt ∼ CSA(a, b) to a series generated by cross-sectional aggregation of autoregressive parameters sampled from the Beta distribution B(a, b), Equation (2). The notation makes explicit the origin of the memory by cross-sectional aggregation and its dependence on the two parameters of the Beta distribution. Theorem 1 develops a fast algorithm to generate cross-sectionally aggregated processes. Theorem 1. Let xt ∼ CSA(a, b) defined as in (2), then xt can be computed as the first T elements of the (2T − 1) × 1 vector T −1 F (F̄ φ̃ F̄ ε̃), where F̄ is the discrete Fourier transform, T −1 F is the inverse transform, and ’ ’ denotes multiplication element by element. Furthermore, z̃ is a (2T −1)×1 vector given by z̃ := [z0 , z1 , · · · , zT −1 , 0, · · · , 0] for zt = φt , εt where εj ∼ i.i.d.N (0, σ2 ), and φj = (B(p + j, q)/B(p, q))1/2 , ∀j ∈ N. Proof: See appendix A. The theorem is an application of the circular convolution theorem for the coefficients associated with the cross-sectionally aggregated process. In this sense, it is in line with the algorithm of Jensen and Nielsen (2014) for the fractional difference operator and thus achieves equivalent computational efficiency. The difference in computation times between the standard simulation of a cross-sectional aggregated times series, Equation (2), and the fast implementation in Theorem 1 are very large for all sizes. For small series (T ≈ 102 ) the gains are in the hundreds of times faster, while in the thousands for medium sized series (T ≈ 104 ). This is of course not surprising given that, for a sample of size T , the number of computations needed for the standard implementation is of order N T 2 , with N the cross-sectional dimension, which, as argued before, should increase as T does. Meanwhile, the computational requirements for the fast implementation are of order T log (T ). Codes implementing the algorithm for memory generation by cross-sectional aggregation are available in Appendix B, and on the author’s github repository at github.com/everval/Nonfractional. 4 To get a better understanding of the dynamics of the long memory by cross-sectional aggregation, the next sections compare it against the pure fractional noise, that is, a fractionally differenced white noise. However, note that we can allow more short-term dynamic by adding AR and M A filters to both specifications. 3.2. Nonfractional Memory and Fractional Difference Operator One notable difference between a cross-sectionally aggregated process and a fractionally differenced one is the number of parameters needed for its generation. Fractionally differenced processes rely on only one parameter to model the entire series, whilst a cross-sectionally aggregated process uses two. As we will see below, this gives the cross-sectional aggregation procedure more flexibility. Let γI(d) (·), and γCSA(a,b) (·) be the autocorrelation functions of an I(d), and a CSA(a, b) process, respectively. That is, γI(d) (k) = Γ(k + d)Γ(1 − d) ≈ k 2d−1 Γ(k − d + 1)Γ(d) as k → ∞ (3) B(a + k/2, b − 1) ≈ k 1−b as k → ∞, (4) B(a, b − 1) which show that both processes have hyperbolic decaying autocorrelations. As argued by Granger (1980), the asymptotic behaviour of the autocorrelation function for a cross-sectionally aggregated process, Equation (4), only depends on the second argument of the Beta function. In this context, both processes show the same rate of decay for the autocorrelation function for b = 2(1 − d). Moreover, the first argument of the Beta function allows us to introduce short term dynamics. Figure 1 shows the autocorrelation function of cross-sectional aggregated processes for different values of ‘a’, the first parameter of the Beta distribution. The figure shows that as the first parameter gets larger, so does the autocorrelation function for the initial lags. Thus, ‘a’ acts as a short memory modulator. γCSA(a,b) (k) = Figure 1: Autocorrelation function for an CSA(a, b) processes for different values of ‘a’ while having the same asymptotic behaviour. Section 5 will look at the forecasting performance of ARF IM A models when working with cross-sectionally aggregated processes, but for now suppose we are interested in looking in the other direction. That is, assume we have a process generated by the fractional difference operator and we want to approximate it with a cross-sectionally aggregated process. We show that we can use the first argument to generate such a series. Consider the loss function L(k, a, d) := k X 2 γI(d) (i) − γCSA(a,2(1−d)) (i) , i=0 5 (5) which measures the squared difference between autocorrelations at the first k lags for crosssectionally aggregated and fractionally differenced processes with the same long memory dynamics, hence we set b = 2(1 − d) for the cross-sectionally aggregated process. Minimizing (5) with respect to ‘a’, allows us to find the cross-sectional aggregated process that best approximates an I(d) one up to lag k, while having the same long term dynamics. Given the different forms of the autocorrelation functions, (3), and (4), there is in general not a value of ‘a’ that minimizes (5) for all values of k; for instance, mina L(2, a, 0.2) = 0.118, while mina L(30, a, 0.2) = 0.121. Moreover, it will depend on d. Nonetheless, selecting a medium sized k, say k ≈ 10, the approximation turns out to be quite 4 good in general. In Figure 2, we present a filtered {εt }10 t=1 ∼ N (0, 1) vector using the fractional difference operator with long memory parameter d = 0.2, and using the cross-sectional aggregated algorithm with parameters a = 0.12, and b = 1.6, so that they show similar short and long memory behaviours. Figure 2: Filtered series and autocorrelation function for a fractional differenced process I(0.2), and a cross-sectional aggregated one CSA(0.12, 1.6). The figure shows that the filtered series are quite similar. This behaviour can further be seen on the autocorrelation functions showing similar dynamics. Thus, the figure shows that it is possible to generate cross-sectionally aggregated processes that closely mimic ones due to fractional differencing. 4. Nonfractional Memory and Antipersistent Processes It is well known in the long memory literature that the fractional difference operator implies that the autocorrelation function is negative for negative degrees of memory, d ∈ (−1/2, 0). This can be seen in (3) where the sign of γI(d) (k) depends on Γ(d) in the denominator, which is negative for d ∈ (−1/2, 0). Furthermore, the behaviour of the spectral density for a fractionally differenced process near the origin is given by fI(d) (λ) ≈ c0 λ−2d as λ → 0, (6) where c0 is a constant. Thus, fI(d) (λ) → 0 as λ → 0, that is, the fractional difference operator for negative degrees of memory imply a spectral density collapsing to zero at the origin. These properties, among other related ones, has been named antipersistence in the literature. We argue that cross-sectionally aggregated processes do not share these features. First, Equation (4) shows that the autocorrelation function for the cross-sectionally aggregated process only depends on the Beta function, which is always positive. Figure 3 shows the autocorrelation function for both fractionally differenced and cross-sectional aggregated processes for a negative degree 6 of memory, d = −0.2. The figure shows that, even though both processes show the same rate of decay in their autocorrelation functions, they have opposite signs. Figure 3: Autocorrelation functions for a fractional differenced process, I(−0.2), and a cross-sectional aggregated one, CSA(0.09, 2, 4). The right plot shows a close-up for lags 70 to 110. Then, given the positive sign for all autocorrelations, Theorem 2 shows that the spectral density for the cross-sectionally aggregated process for negative degrees of memory converges to a positive constant. Theorem 2. Let xt ∼ CSA(a, b) defined as in (2) with b ∈ (2, 3) so that the long memory parameter is in the negative range, d ∈ (−1/2, 0), then, the spectral density of xt at the origin is positive. That is, fCSA(a,b) (0) = ca,b > 0, (7) where ca,b depends on the parameters of the Beta distribution. Proof: See appendix A. Figure 4 shows the periodogram, an estimate of the spectral density, for CSA(a, b) and I(d) processes of size T = 104 averaged for 104 replications. The figure shows that the periodogram for both processes show similar patterns for positive degrees of memory, both diverging to infinity at the same rate. Nonetheless, for negative degrees of memory, the periodogram collapses to zero as the frequency goes to zero for the fractionally differenced process, while it converges to a constant for the cross-sectionally aggregated process. Moreover, the latter property has implications for estimation and inference. In particular, tests for long memory in the frequency domain will be affected. These tests are based on the rate to which the periodogram goes to zero as an estimator for long memory using the log-periodogram regression, see Geweke and Porter-Hudak (1983), and Robinson (1995). The log-periodogram regression is given by log(fˆX (λj )) = a − 2d log(λj ) + uj , where fˆX (·) is the periodogram, a is a constant, and uj is the error term. From (6), note that the log-periodogram regression provides an estimate of the long memory parameter, d, for fractionally differenced processes. Tests in the frequency domain use this expression to estimate the degree of memory. Nonetheless, as Theorem 2, and Figure 4 show, these tests will be misspecified for long memory by cross-sectional aggregation for negative degrees of memory. To illustrate the misspecification problem, Table 1 reports the degree of long memory estimated by the method of Geweke and Porter-Hudak, 1983, GP H hereinafter, for several degrees of memory for both fractionally differenced, and cross-sectionally aggregated processes. 7 Figure 4: Mean periodogram of a fractional differenced process, I(d), [top], and a cross-sectional aggregated process, CSA(0.2, 2(1 − d)), [bottom]. A sample size of T = 10, 000 was used, with 10,000 replications, and d = 0.4, −0.4. Table 1: Mean, and standard deviation in parentheses, of estimated long memory by the GP H method for CSA(0.2, 2(1 − d)) and I(d) processes. We use the standard T 1/2 bandwidth, where the sample size is T = 104 , and with 104 replications. d = 0.2 d = −0.2 d = −0.4 d = 0.4 CSA(a, b) I(d) CSA(a, b) I(d) CSA(a, b) I(d) CSA(a, b) I(d) 0.4062 0.4034 0.2628 0.2011 0.1036 -0.1985 0.0653 -0.3927 (0.0701) ( 0.0697) (0.0697) (0.0696) (0.0687) (0.0685) (0.0695) (0.0717) The table shows that the estimator is relatively close to the true memory for both processes when the memory is positive, if slightly overshooting it for the cross-sectionally aggregated process, as reported by Haldrup and Vera Valdés (2017). This contrasts to the case of negative memory, where the table shows that the estimator remains precise for the fractionally differenced series, while it is incapable of detecting the long memory in the cross-sectionally aggregated processes, with estimators not statistically different from zero. This is of course not surprising in light of Theorem 2. In sum, the lack of the antipersistent property in cross-sectionally aggregated processes shows that care must be taken when estimating long memory for negative degrees of memory if the long memory generating mechanism is not the fractional difference operator. Further analysis of negative degrees of memory and antipersistence is a line of inquiry open for further research. 5. Nonfractional Memory Forecasting In the time series literature, some effort has been directed to assess the performance of the ARF IM A type of models when forecasting long memory processes. For instance, Ray (1993) calculates the percentage increase in mean-squared error (M SE) from forecasting I(d) series with AR models. She argues that the M SE may not increase significantly, particularly when we do not know the true long memory parameter. Crato and Ray (1996) compare the forecasting performance 8 of ARF IM A models against ARM A alternatives and find that ARF IM A models are in general outperformed by ARM A alternatives. Moreover, Man (2003) argues that an ARM A(2, 2) model compares favourably to an I(d) for short-term forecasts of long memory time series with fractionally differenced structure. One thing that these forecasting comparison studies have in common is the underlying assumption that long memory is generated by an ARF IM A process. In this context, a priori the forecasting exercises assume that a fractionally differenced process is the correct specification. As previously discussed, even though cross-sectional aggregation does generate long memory, the series does not follow an ARF IM A specification. The question remains whether an ARF IM A model serves as a good approximation for forecasting purposes. The next subsection computes the minimum square error forecasts for cross-sectional aggregated processes, CSA(a, b). With those as benchmark, the following subsections evaluate the forecasts performance of high order AR, and ARF IM A models on CSA(a, b) processes. 5.1. Minimum Square Error Forecasts Theorem 3 computes the minimum mean square error forecasts for a series generated by crosssectional aggregation. Theorem 3. Let xt ∼ CSA(a, b) defined as in (2), and let h ∈ N, then the minimum mean square error forecast h periods ahead, x̂t+h , can be computed as1 x̂T +h = T X φj νT −j+h , (8) j=h where νi is computed as νi = xi − i X φj νi−j ∀i ∈ 0, 1, · · · , T , j=1 with φj as in Theorem 1. Proof: See Appendix A. The theorem relies on the M A(∞) representation to construct the forecasts. Algorithms for computing the minimum mean square forecasts, (8), are presented in Appendix B, and are available on the author’s github repository at github.com/everval/Nonfractional. Theorem 3 allows for the construction of forecasts for the correct theoretical specification. Note that in the theorem we have assumed that we know the parameters of the the Beta distribution for the cross-sectionally aggregated process; for empirical applications we can use Beran et al.’s (2010) method to estimate them. In the following, we will use these computations to assess the forecasting performance of high-order AR, and ARF IM A models when working on long memory generated by cross-sectional aggregation. 5.2. Forecasts With AR(p) Models This subsection computes the forecasting efficiency loss of an AR(p) model when working with a CSA(a, b) process. Theorem 4 obtains the parameter estimates for an AR(p) model fitted to a CSA(a, b) process, and computes the efficiency loss for one-step ahead forecasts. 1 The Theorem assumes a Type II process analogous to samples of fractionally differenced processes, see Davidson (2009). In particular, it assumes νj = 0, ∀j < 0. 9 Theorem 4. Let xt ∼ CSA(a, b) defined as in (2), and estimate an AR(p) given by (1 − α1 L − α2 L2 − · · · − αp Lp )xt = ut , then   1 α1  α2   γCSA(a,b) (1)     ..  =  ..  .   .  αP −1   · · · γCSA(a,b) (p − 1) γCSA(a,b) (1)   · · · γCSA(a,b) (p − 2)  γCSA(a,b) (2)   , .. .. ..    . . . γCSA(a,b) (1) 1 .. . γCSA(a,b) (p − 1) γCSA(a,b) (p − 2) · · · 1 γCSA(a,b) (p) with γCSA(a,b) (·) defined as in 4. Furthermore, the one-step ahead forecast error variance relative to the minimum square error forecasts, ζAR(p) , is given by  ζAR(p) = B(a, b − 1) B(a, b)    1+ p X ! αi2 +2 i=1 p X i=1  γCSA(a,b) (i) −αi + p−i X  αj αj+i  . j=1 Proof: See Appendix A. As an example, consider estimating an AR(1) model to forecast a cross-sectionally aggregated process. From Theorem 4, the autoregressive parameter is α1 = γCSA(a,b) (1) = B(a + 1/2, b − 1)/B(a, b−1), while the one-step ahead forecast error variance is ζAR(1) = (B(a, b−1)/B(a, b))(1− 2 γCSA(a,b) (1)), which shows that the efficiency loss is a nonlinear function of both parameters of the CSA(a, b) process. To get a better sense of the nonlinearity, Figure 5 presents both the autoregressive parameter, α1 , and the efficiency loss, ζAR(p) , while varying the first parameter of the cross-sectional aggregated process, ‘a’, with fixed b = 1.8. On the one hand, the figure shows that as ‘a’ increases, so does the autoregressive parameter, this is in line with the discussion above regarding the first parameter as a short memory regulator. On the other hand, the one-step ahead forecast error variance shows a maximum around a = 0.5, with a forecast error variance of almost 15%. That is, more than double the reported by Man (2003) for an I(0.1) process. Thus, the figures suggest that we could expect worse performance using an AR(1) process to forecast a CSA(a, b) process than a pure I(d) one. Figure 5: Estimated autoregressive parameter and forecast error variance of fitted AR(1) on CSA(a, b) processes relative to the optimum forecasts while varying ‘a’, for different degrees of memory. Table 2 shows the one-step ahead forecast error variance of fitted AR(1) models on CSA(a, b) processes for different values of a, b. The losses are in line with the ones computed by Man (2003) for the I(d) case, increasing as the memory of the process increases. Moreover, as noted by Ray (1993) and Man (2003), we can reduce the one-step ahead forecast error variance by allowing for more lags in the AR specification. To get a sense of the improvements we can achieve, Table 2 also 10 Table 2: One-step ahead forecast error variance of fitted AR(1) and AR(20) models on CSA(a, b) processes relative to the optimum forecasts shown in (8). The brackets show the associated long memory parameter d. AR(1) AR(20) a\b [d] 1.8 [0.1] 1.6 [0.2] 1.4 [0.3] 1.2 [0.4] 1.1 [0.45] 1.8 [0.1] 1.6 [0.2] 1.4 [0.3] 1.2 [0.4] 1.1 [0.45] 0.1 0.5 0.9 1.3 1.7 1.085 1.145 1.129 1.110 1.095 1.110 1.172 1.146 1.122 1.104 1.154 1.211 1.170 1.137 1.114 1.257 1.273 1.202 1.156 1.126 1.387 1.320 1.223 1.168 1.133 1.071 1.111 1.099 1.086 1.075 1.085 1.123 1.107 1.091 1.079 1.104 1.137 1.115 1.096 1.082 1.129 1.153 1.124 1.101 1.085 1.144 1.161 1.128 1.103 1.086 presents the one-step ahead forecast error variance of AR(20) models fitted to CSA(a, b) processes for different values of a, b. As the table shows, increasing the order of the AR model can greatly reduce the one-step ahead forecast error variance, particularly for larger degrees of long memory. 5.3. Forecasts With Fractional Models This section studies the forecast performance of fractional models when working on crosssectional aggregated processes. In particular, we compute the one-step ahead forecast error variance of the pure I(d) model and of an ARF IM A(1, d, 0) allowing for more short term dynamics. Theorem 5. Let xt ∼ CSA(a, b) defined as in (2), then the one-step ahead forecast error variance of the d = 1 − b/2 fractional difference of the series, ζI(d) , is given by ζI(d) = γz (0). Furthermore, estimate an ARF IM A(1, d, 0) by fitting an AR(1) model to the d = 1 − b/2 fractional difference of the series, then the autoregressive parameter, αI , and the one-step ahead forecast error variance, ζARF IM A(1,d,0) , are given by αI = γz (1) , γz (0) ζARF IM A(1,d,0) = γz (0)2 − γz (1)2 . γz (0)2 Where in both expressions γz (k) is given by   γ ∗ (k) 1 γz (k) = B(a, b − 1) (F1 (k) − 1) + B(a + , q − 1)F2 (k) , B(a, b) 2 with γ ∗ (k) = σε2 Γ(1 + 2d) Γ(−d − k) , Γ(−d)Γ(1 + d) Γ(1 + d − k) and      1 − d + k −d + k 2+d+k 1+d+k F1 (k) := F 1, a, , , a + b − 1, , ,1 + 2 2 2 2      1 − d − k −d − k 2+d−k 1+d−k F 1, a, , , a + b − 1, , ,1 , 2 2 2 2 −d + k F2 (k) := ∗ 1+ d + k     1 1−d+k 2−d+k 1 2+d+k 3+d+k F 1, p + , , , a+b− , , ,1 2 2 2 2 2 2 −d − k + ∗ 1+d−k 11  F 1 1−d−k 2−d−k 1, a + , , 2 2 2     1 2+d−k 3+d−k , a+b− , ,1 , , 2 2 2 where d = 1 − b/2, and F [·] is the generalized hypergeometric function. Proof: See Appendix A. Table 3 presents the one-step ahead forecast error variance of fitted ARF IM A(1, d, 0), and I(d) models on CSA(a, b) processes for different values of a, b. The table also shows the estimated autoregressive parameter of the fitted ARF IM A(1, d, 0) model. As the table shows, the pure fractional differenced process can be quite bad at forecasting CSA(a, b) processes, specially for higher values of ‘a’. Once again, relating the first parameter functioning as a short memory regulator. Once we allow for more short term dynamics in the form of an ARF IM A(1, d, 0) model, the forecasting performance is much in line with the one from high order AR models. Thus, it greatly helps to allow for some short term dynamics in the modelling scheme. Table 3: One-step ahead forecast error variance, and estimated autoregressive parameter in parenthesis, of fitted I(d) and ARF IM A(1, d, 0) models on CSA(a, b) processes. The brackets show the associated long memory parameter d. I(d) ARF IM A(1, d, 0) a\b [d] 1.8 [0.1] 1.6 [0.2] 1.4 [0.3] 1.2 [0.4] 1.1 [0.45] 1.8 [0.1] 0.1 1.077 1.084 1.112 1.158 1.186 0.5 1.345 1.253 1.202 1.176 1.169 0.9 1.615 1.435 1.318 1.240 1.212 1.3 1.880 1.611 1.431 1.309 1.263 1.7 2.138 1.778 1.538 1.374 1.312 1.072 ( 0.067 1.127 ( 0.402 1.118 ( 0.555 1.104 ( 0.642 1.093 ( 0.699 1.6 [0.2] 1.083 ) ( -0.019 ) 1.132 ) ( 0.312 ) 1.121 ) ( 0.468 ) 1.107 ) ( 0.559 ) 1.096 ) ( 0.620 ) 1.4 [0.3] 1.2 [0.4] 1.1 [0.45] 1.103 ( -0.091 ) 1.138 ( 0.229 ) 1.123 ( 0.384 ) 1.108 ( 0.475 ) 1.097 ( 0.536 ) 1.131 ( -0.153 ) 1.147 ( 0.156 ) 1.125 ( 0.305 ) 1.107 ( 0.393 ) 1.095 ( 0.451 ) 1.147 ( -0.180 ) 1.152 ( 0.123 ) 1.125 ( 0.268 ) 1.106 ( 0.352 ) 1.093 ( 0.408 ) Comparing the results from Tables 2 and 3, we see that, as was the case for long memory series generated by the fractional difference operator, a high order AR(p) can be a good model for forecasting long memory at short horizons. Yet, the bias-variance trade-off has to be assessed given the number of estimated parameters. As an alternative, the ARF IM A(1, d, 0) produces similar results while relying in only two parameters. 6. Conclusions Even though there is no theoretical argument linking the presence of long memory in the data with the fractional difference operator, fractionally differenced processes remain the most popular construction in the long memory time series literature. This may be due to the existence of efficient algorithms for their simulation and forecasting. Thus, this paper presents fast algorithms to generate long memory by a theoretically based mechanism that do not rely on the fractional difference operator, cross-sectional aggregation. The cross-sectional aggregated process is then contrasted to the fractional difference operator. In particular, the paper analyses the antipersistent phenomenon. It is proven that, for negative degrees of memory, while the autocorrelations are negative by definition for the fractional difference operator, this restriction does not apply to the cross-sectional aggregated scheme. Furthermore, the paper shows that the lack of antipersistence for cross-sectional aggregated processes 12 has implications for long memory estimators in the frequency domain which will be misspecified in general. Moreover, this work evaluated the efficiency loss of using high-order AR and ARF IM A models to forecast long memory series generated by cross-sectional aggregation. It finds that, at short horizons, high-order AR models beat a pure fractional difference process, I(d), in terms of forecasting performance. Nonetheless, allowing for short term dynamic in the form of an ARF IM A(1, d, 0) model produces comparable forecast performance as high-order AR models while relying on less parameters. The results of this paper can be used in the context of Monte Carlo simulations of long memory estimators and forecasts. Of particular interest is the analysis of long memory in inflation, one of the primer examples of cross-sectional aggregation producing long memory due to the way the data is computed. Moreover, the results allow for financial econometrics and climate econometrics models to incorporate long memory forecasts consistent with the theoretical argument posed by cross-sectional aggregation. Acknowledgements I would like to thank Niels Haldrup for the careful reading of this article and all the insightful comments. References Adenstedt, R. K. (1974). On Large-Sample Estimation for the Mean of a Stationary Random Sequence. The Annals of Statistics, 2(6):1095–1107. Baillie, R. T. (1996). Long memory processes and fractional integration in econometrics. Journal of Econometrics, 73(1):5–59. Balcilar, M. (2004). Persistence in inflation: does aggregation cause long memory? Emerging Markets Finance and Trade, 40(5):25–56. Beran, J. (1994). Statistics for long-memory processes. Chapman & Hall. Beran, J., Feng, Y., Ghosh, S., and Kulik, R. (2013). Long-Memory Processes: probabilistic theories and Statistical Methods. Springer. Beran, J., Schtzner, M., and Ghosh, S. (2010). From short to long memory: Aggregation and estimation. Computational Statistics and Data Analysis, 54(11):2432–2442. Crato, N. and Ray, B. K. (1996). Model selection and forecasting for long-range dependent processes. Journal of Forecasting, 15(2):107–125. Davidson, J. (2009). When is a time series I(0)? In Castle, J. and Shepherd, N., editors, The Methodology and Practice of Econometrics, chapter 13. Oxford University Press. Diebold, F. X. and Rudebusch, G. D. (1989). Long Memory and Persistence in Agregate Output. Journal of Monetary Economics, 24(2):189–209. Geweke, J. and Porter-Hudak, S. (1983). The estimation and application of long memory time series models. Journal of Time Series Analysis, 4(4):221–238. Granger, C. W. (1966). The Typical Spectral Shape of an Economic Variable. Econometrica, 34(1):150–161. Granger, C. W. (1980). Long memory relationships and the aggregation of dynamic models. Journal of Econometrics, 14(2):227–238. Granger, C. W. and Joyeux, R. (1980). An Introduction to Long Memory Time Series Models and Fractional Differencing. Journal of Time Series Analysis, 1(1):15–29. Haldrup, N. and Vera Valdés, J. E. (2017). Long memory, fractional integration, and cross-sectional aggregation. Journal of Econometrics, 199(1):1–11. Hosking, J. R. M. (1981). Fractional differencing. Biometrika, 68(1):165–176. Jensen, A. N. and Nielsen, M. Ø. (2014). A Fast Fractional Difference Algorithm. Journal of Time Series Analysis, 35(5):428–436. Linden, M. (1999). Time series properties of aggregated AR(1) processes with uniformly distributed coefficients. Economics Letters, 64(1):31–36. Man, K. S. (2003). Long memory time series and short term forecasts. International Journal of Forecasting, 19(3):477–491. Oppenheim, G. and Viano, M. C. (2004). Aggregation of random parameters ornstein-uhlenbeck or ar processes: Some convergence results. Journal of Time Series Analysis, 25(3):335–350. 13 Osterrieder, D., Ventosa-Santaulària, D., and Vera-Valdés, J. E. (2015). Unbalanced Regressions and the Predictive Equation. CREATES Research Paper, 9. Ray, B. K. (1993). Modeling Long Memory Processes for Optimal Long Range Prediction. Journal of Time Series Analysis, 14(5):511–525. Robinson, P. M. (1978). Statistical Inference for a Random Coefficient Autoregressive Model. Scandinavian Journal of Statistics, 5(3):163–168. Robinson, P. M. (1995). Log-Periodogram Regression of Time Series with Long Range Dependence. The Annals of Statistics, 23(3):1048–1072. Zaffaroni, P. (2004). Contemporaneous aggregation of linear dynamic models in large economies. Journal of Econometrics, 120(1):75–102. Appendix A. Proofs Proofs of Theorem 1, and Theorem 2 Lemma 1 of Haldrup and Vera Valdés (2017), which is in turn an application of the Central Limit Theorem, show that in the limit, the cross-sectionally aggregated process, Equation (2), allows an M A(∞) representation. Using this representation, Theorem 1 is an application of the circular convolution Theorem, see Jensen and Nielsen (2014). Moreover, note that the spectral density for xt evaluated at the origin is given by ∞ σε2 X fX (0) = φj 2π 2 , j=0 where φj are the coefficients of the M A(∞) representation given by φj = the Beta function. Thus, fX (0) = ∞ σε2 X φj 2π j=0 = 2 ∞ X σε2 B(a + j, b)1/2 = 2πB(a, b) j=0 ∞ σε2 Γ(b) X Γ(a + j)1/2 2πB(a, b) Γ(a + j + b)1/2 j=0 2 2 B(a+j,b)1/2 , B(a,b)1/2 with B(·, ·), ∞ X σε2 Γ(a + j)1/2 Γ(b)1/2 = 2πB(a, b) Γ(a + j + b)1/2 j=0 ∞ σε2 Γ(b) X −b/2 ≈ j 2πB(a, b) j=0 2 2 = σε2 Γ(b) ζ(−b/2)2 2πB(a, b) = ca,b < ∞, where Γ(·), ζ(·) are the Gamma and EulerRiemann zeta function, respectively. Moreover, note that all terms in the expression are positive and thus ca,b > 0. Proof of Theorem 3 Assuming a Type II process, the Lemma shows that xt can be expressed as      1 φ1 φ2 · · · φT xT νT xT −1  0 1 φ1 · · · φT −1  νT −1       xT −2  0 0 1 · · · φT −2  νT −2  = ,    ..   .. .. .. . . ..   ..   .  . .   . . .  . ν0 0 0 0 ··· 1 x0 (9) with φt , νt defined in Theorem 1. Solving for νj , this represents a system with an upper triangular matrix to which fast algorithms exist. Once we have solved it, the minimum mean square error forecast h periods ahead can be easily obtained. 14 Proofs of Theorem 4, and Theorem 5 P∞ Let xt ∼ CSA(a, b) and denote Φ(z:,t ) := j=0 φj zt−j the function that applies the filter associated to the M A(∞) representation of the CSA(a, b) process to z:,t = (zt , zt−1 , · · · ). That is, xt = ∞ X φj νt−j := Φ(ν:,t ), j=0 where νj ∼ N (0, σε2 ) and φj = (B(p + j, q)/B(p, q))1/2 , ∀j ∈ N. Let ut be the residual of a fitted AR(p) process to xt , i.e., ut = (1 − α1 L − α2 L2 − · · · − αp Lp )xt , where L is the lag operator and {α1 , · · · , αp } are the fitted parameters. Hence, ut = (1 − α1 L − α2 L2 − · · · − αp Lp )xt = (1 − α1 L − α2 L2 − · · · − αp Lp )Φ(ν:,t ) = Φ(ν:,t ) − α1 Φ(ν:,t−1 ) − α2 Φ(ν:,t−2 ) − · · · − αp Φ(ν:,t−p ) = νt φ0 + νt−1 (φ1 − α1 φ0 ) + · · · + νt−s (φs − · · · − αp φs−p ) + · · · ∞ X = φ̃j νt−j , j=0 where  φ0     φ   1 − α1 φ0 φ1 − α1 φ1 − α2 φ0 φ˜j :=  ..   .    φj − · · · − αp φj−p j=0 j=1 j=2 .. . j≥p Thus, var(ut )σε = ∞ X 2 φ˜j j=0 = φ20 2 + (φ1 − α1 φ0 ) + · · · + ∞ X (φj − α1 φj−1 − · · · − αp φj−p )2 j=p     ∞ ∞ X X =  φ2j  (1 + α12 + · · · + αp2 ) + 2  φj φj−1  (−α1 + α1 α2 + · · · + αp−1 αp ) j=0  +2  j=1 ∞ X   φj φj−2  (−α2 + α1 α3 + · · · + αp−2 αp ) + 2  j=2 ∞ X  φj φj−p  (−αp ) j=p  B(a, b − 1)  (1 + α12 + · · · + αp2 ) + 2γCSA(a,b) (1)(−α1 + α1 α2 + · · · + αp−1 αp ) B(a, b)  + · · · + 2γCSA(a,b) (p)(−αp ) .  = Which shows that minimizing with respect to {α1 , · · · , αp } yields the Yule-Walker system of equations, the result follows. Finally, for Theorem 5, the first part regarding the autocorrelation function of a fractionally differenced cross-sectional aggregated process is Theorem 3 in Haldrup and Vera Valdés (2017). For the second part, the proof follows the same steps as for the pure AR(p) case above replacing the autocorrelation function of the pure CSA(a, b) process for the one of the fractionally differenced one. 15 B. Code Implementation Nonfractional Memory Generation R code c s a d i f f = function ( x , p , d ) { iT = length ( x ) n = nextn ( 2 ∗iT − 1 , 2 ) k = 0 : ( iT −1) b = ( beta ( p+k , d ) /beta ( p , d ) ) ˆ ( 1 / 2 ) dx = f f t ( f f t ( c ( x , rep ( 0 , n − iT ) ) ) ∗ f f t ( c ( b , rep ( 0 , n − iT ) ) ) , inverse = T) / n ; return (Re( dx [ 1 : iT ] ) ) } Matlab code function [ cx ] = c s a d i f f ( x , p , q ) T = size (x , 1 ) ; np2 = 2 . ˆ nextpow2( 2 ∗T−1); c o e f s = [ 1 , ( beta ( p +(1:T−1) , q ) . / . . . beta ( p , q ) ) . ˆ ( 1 / 2 ) ] ; cx = i f f t ( f f t ( x , np2 ) . ∗ f f t ( c o e f s ’ , np2 ) ) ; cx = cx ( 1 : T, : ) ; end Nonfractional Memory Forecasts R code get e r r c s a = function ( x , p , q ) { iT = length ( x ) k = 0 : ( iT −1) b = ( beta ( p+k , q ) /beta ( p , q ) ) ˆ ( 1 / 2 ) zen = c ( 1 , rep ( 0 , iT −1)) ma = pracma : : T o e p l i t z ( b , zen ) v j s = solve (ma, x ) return ( v j s ) } f o r e c a s t c s a = function ( x , p , q , h ) { iT = length ( x ) k = seq ( 1 , ( iT ) , 1 ) b = ( beta ( p+k , q ) /beta ( p , q ) ) ˆ ( 1 / 2 ) e r r = get e r r c s a ( x , p , q ) e r r v = rev ( e r r ) f x = rep ( 0 , h ) for ( i i i n 1 : h ) { f x [ i i ] = crossprod ( b [ i i : iT ] , e r r v [ 1 : ( iT− i i + 1 ) ] ) } return ( f x ) } 16 Matlab code function [ v j s ] = g e t e r r c s a ( x , p , q ) T = size (x , 1 ) ; c o e f s = [ 1 , ( beta ( p +(1:T−1) , q ) . / beta ( p , q ) ) . ˆ ( 1 / 2 ) ] ; zen = [ 1 , zeros ( 1 ,T− 1 ) ] ; ma = t o e p l i t z ( c o e f s , zen ) ; v j s = ma\x ; end function [ f x ] = f o r e c a s t c s a ( x , p , q , h ) T = size (x , 1 ) ; c o e f s = [ 1 , ( beta ( p +(1:T−1) , q ) . / beta ( p , q ) ) . ˆ ( 1 / 2 ) ] ; coefs = fliplr ( coefs ); err = get err csa (x , p , q ) ; f x = zeros ( h , 1 ) ; for i i = 1 : h f x ( i i , 1 ) = c o e f s ( 1 , 1 : T− i i ) ∗ e r r ( i i +1:T , 1 ) ; end end 17
10math.ST
IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES 1 Learning to Play Othello with Deep Neural Networks arXiv:1711.06583v1 [cs.AI] 17 Nov 2017 Paweł Liskowski, Wojciech Jaśkowski, Krzysztof Krawiec Abstract—Achieving superhuman playing level by AlphaGo corroborated the capabilities of convolutional neural architectures (CNNs) for capturing complex spatial patterns. This result was to a great extent due to several analogies between Go board states and 2D images CNNs have been designed for, in particular translational invariance and a relatively large board. In this paper, we verify whether CNN-based move predictors prove effective for Othello, a game with significantly different characteristics, including a much smaller board size and complete lack of translational invariance. We compare several CNN architectures and board encodings, augment them with state-of-theart extensions, train on an extensive database of experts’ moves, and examine them with respect to move prediction accuracy and playing strength. The empirical evaluation confirms high capabilities of neural move predictors and suggests a strong correlation between prediction accuracy and playing strength. The best CNNs not only surpass all other 1-ply Othello players proposed to date but defeat (2-ply) Edax, the best open-source Othello player. Index Terms—deep learning, convolutional neural networks, Othello I. I NTRODUCTION Neural networks, particularly the deep and convolutional ones (CNNs), excel at recognizing virtually all kinds of patterns [32]. They naturally generalize to arbitrary dimensionality, which makes them suitable for analyzing raster images, time series, video sequences, and 3D volumetric data in medical imaging [38]. These properties make CNNs powerful for solving a wide range of challenging tasks at unprecedented performance level, ranging from image classification [12], to object localization [10], object detection [27], image segmentation [23], and even visual reinforcement learning in 3D environments [19]. The structural analogy between 2D raster images and board states in games is natural, so no wonder that it has been exploited within the neural paradigm in the past (e.g., [42]) . In most cases however, neural nets served there as board evaluation functions employed for searching game trees. It is only recently that massive computing and efficient learning algorithms for deep CNNs enabled their use as direct move predictors capable of achieving the level of play in the most challenging games previously thought to be exclusive only to human players. This gave rise to a line of Go-playing programs, including the paramount achievement of AlphaGo, the superhuman-level Go-playing program [33]. The authors are with the Institute of Computing Science, Poznan University of Technology, Poznan, Poland. W. Jaśkowski did this work while staying at IDSIA Dalle Molle Institute for Artificial Intelligence Research, Manno TI, Switzerland; e-mails: {pliskowski, wjaskowski, kkrawiec}@cs.put.poznan.pl. CNNs’ success in Go was possible because it has been known for a long time that Go players, rather than performing a “mental” tree search of future game states, rely heavily on detecting patterns in board states. This, together with a high branching factor of 250, and a large board renders tree search approaches ineffective for Go. Here we ask whether CNNs have a practical potential for games of a small branching factor and much smaller board size, for which the minimax-style tree search algorithms perform well and achieve human-level performance. To this aim, we consider learning CNN-based move predictors for the game of Othello, a long-standing benchmark for AI [18]. This problem not only diverges from Go, but is also very different from analysis of images in computer vision: the input rasters are tiny (8 × 8 ternary board states), free from noise and distortions typical for real-world settings (sensor noise, lighting, perspective, etc.), and the desirable invariances involve axial symmetries rather than translation and scaling. Last but not least, every single piece on the board matters and influences the decision. CNNs have been hardly ever evaluated in such settings. Our contributions include i) an experimental study of different CNN-based architectures of deep neural networks for Othello; ii) state-of-the-art move prediction accuracy on the French Othello league game dataset WThor; iii) state-of-theart 0-ply policy for Othello (no look ahead) that significantly improves over the previous approaches; iv) an in-depth analysis of the characteristics of trained policies, including the relationship between move prediction accuracy and winning odds, strength and weaknesses at particular game stages, and confrontation with opponents that employ game tree search at different depths. The gathered evidence suggests that several of the proposed neural architectures are best-to-date move predictors for Othello. II. R ELATED W ORK CNNs have been introduced by Fukushima in Neocognitron [9] and occasionally used for selected image analysis tasks for the next two decades [22]. The attempts of applying them to broader classes of images remained however largely unsuccessful. The more recent advent of deep learning brought substantial conceptual breakthroughs, enabling training of deeper and more complex networks. This, combined with cheap computing power offered by GPUs revolutionized machine perception and allowed achieving unprecedented classification accuracy, exemplified by the chain of ever-improving neural architectures assessed on the ImageNet database [21], [12]. 2 As signaled in the Introduction, the structural analogy between natural images and game boards is quite obvious for humans and as such could not remain unnoticed for long. This led to early attempts of applying CNNs to board games [8]. Soon it became clear that the deep learning paradigm may be powerful enough to be used together with game tree search techniques. This claim led to DeepMind’s AlphaGo, the first superhuman-level Go playing system [33], which combined supervised learning, policy gradient search and Monte Carlo Tree Search. Othello has for a long time been a popular benchmark for computational intelligence methods [29], [35], [5], [25], [26], [42], [40], [28], [16], [30], [18]. All strong Othello-playing programs use a variant of the minimax search [7] with a board evaluation function. Past research suggested that more can be gained by improving the latter than the former; that is why recently the focus was mostly on training 1 look-ahead (a.k.a. 1-ply) agents using either self-play [26], [18], fixed opponents [20], [16], or expert game databases [30]. Multiple ways of training the agents have been proposed: value-based temporal difference learning [25], [42], [34], (co)evolution [26], [31], [17], [15], and hybrids thereof [39], [40]. Designing a board evaluation function involves finding a good function approximator. One of the most successful function approximators for board games are n-tuple networks. Interestingly, they were originally proposed for optical character recognition [4], and their reuse for board games is yet another sign that the analogy between images and piece arrangements on a board is feasible. They were employed for the first time for Othello under the name of tabular value functions by Buro [7] in his famous Logistello program and later popularized by Lucas [24]. Neural networks have also been used for Othello as function approximators, e.g., in [42], but, to the best of our knowledge, CNNs have never been used for this purpose. As we are not aware of any published move predictors for Othello, in the experimental part of this paper we compare our method to a representative sample of 1-ply strategies. A comparison of the state-of-the-art 1-ply players for Othello can be found in [18]. Among the published works, the best 1-ply player to date was obtained by Coevolutionary CMAES (covariance matrix adaptation evolution strategies) [18] and systematic n-tuple networks. Among the multi-ply Othello strategies, one of the contemporary leaders is Edax1 , an open source player that uses tabular value functions, one for each stage of the game. Edax is highly optimized (bitboard move generator) and uses deep tree minimax-like search (negasout with multi-probcut tree search [6]). Unfortunately, a description of how its evaluation function was obtained is not publicly available. One of the other top-5 Othello players to date is RL14_iPrefN that has been trained using preference learning on the French Othello League expert games dataset [30], reportedly obtaining 53.0% classification accuracy. In this paper, we significantly improve over this baseline. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES (a) Othello initial board state. Black to move. (b) Board state after black’s move. White to move. Figure 1: Othello boards with legal moves marked as shaded locations. III. OTHELLO Othello is a perfect information, zero-sum, two-player strategy game played on an 8 × 8 board. There are 64 identical pieces which are white on one side and black on the other. The game begins with each player having two pieces placed diagonally in the center of the board (Fig. 1a). The black player moves first, placing a piece on one of four shaded locations, which may lead to the board state in Fig. 1b. A move is legal if the newly placed piece is adjacent to an opponent’s piece and causes one or more of the opponent’s pieces to become enclosed from both sides on a horizontal, vertical or diagonal line. The enclosed pieces are then flipped. Players alternate placing pieces on the board. The game ends when neither player has a legal move, and the player with more pieces on the board wins. If both players have the same number of pieces, the game ends in a draw. Despite simple rules, the game of Othello is far from trivial. The number of legal positions is approximately 1028 and the game tree has in the order of 1058 nodes [1], which precludes any exhaustive search method. Othello is also characterized by a high temporal volatility: a high number of pieces can be flipped in a single move, dramatically changing the board state. These features and the fact that the game has not yet been solved makes Othello an interesting test-bed for computational intelligence methods. IV. L EARNING TO P REDICT E XPERT M OVES A. The Classification Problem Since Othello is a deterministic and fully-observable environment, a policy π : X → Y is here a mapping from the space of board states X to the space of actions Y = {1, . . . , K} that correspond one-to-one to the K = 60 board positions. π(x) represents the desired move for board state x ∈ X. Given a training set of N examples of good (e.g., experts’) moves in X × Y , we can formulate the problem of finding π as a multi-class classification problem. A typical approach to such problems is training a parameterized probability function p(y|x; θ), that represents the confidence 1 http://abulmo.perso.neuf.fr/edax/ PAWEŁ LISKOWSKI et al.: LEARNING TO PLAY OTHELLO WITH DEEP NEURAL NETWORKS 3 ... ... ... ... Othello board 2 ⇥ 8 ⇥ 8 input 3 ⇥ 8 ⇥ 8 feature maps 3 ⇥ 8 ⇥ 8 feature maps output layer Figure 2: Exemplary CNN for move prediction. The board is fed into the network as an 8 × 8 two-channel binary image, where ones indicate the locations of the player’s (first channel) and opponent’s pieces (second channel). Units in a feature map (colored squares) receive data from 3 × 3 RFs (in the same color) in the image (or in a previous layer). The network uses zero-padding on the edges (not shown), so maps in all layers are 8 × 8. For clarity, each hidden layer has only 3 feature maps. of making a move y in state x. To estimate p, one needs to minimize the cross-entropy loss: L(θ) = − K N X X i=1 k=1 (k) yi (k) ln p(yi |xi ; θ), (k) where y = 1 if y = k and 0 otherwise. The task of a training algorithm is to estimate the optimal θ and so find θ̂, a policy parameterization that brings L(θ) sufficiently close to its global optimum. Once found, the player chooses the moves of highest confidence: πθ̂ (x) = arg max p(y|x; θ̂), y∈Legal(x) where Legal(x) ⊂ Y is the subset of moves that are legal in board state x. If π determines the move to make without explicit simulation of the future game course (using, e.g., minimax-style algorithms), we refer to it as move predictor. One-to-one correspondence between board locations and moves in Othello greatly facilitates the design of move predictors. For other board games that involve heterogeneous pieces that move around the board, the space of moves Y is more complex and requires a more sophisticated representation. B. CNNs for Move Prediction In the simplest scenario, the board states in X could be encoded as 64 ternary variables and fed into any probability estimator. However, generic probability estimators are not biased towards the kind of structure that relates board state variables in Othello. To see that such a structure exists, it is enough to imagine the board variables being randomly permuted, which would completely obfuscate the game for human players (while being still the same policy learning task under the formulation in the previous section). This shows that capturing spatial patterns of the player’s and opponent’s pieces is essential, and makes it particularly appropriate to take advantage of learning systems that have such capabilities, i.e., treat a board state as an image. Convolutional neural networks (CNNs) are nowadays the leading machine learning tool for image analysis (cf. the work cited in the introduction). In the following, we briefly describe the CNN architecture as we tailored it to move prediction in Othello, referring readers interested in this topic to other comprehensive studies [2], [32]. For clarity, we present here only the core CNN architecture and augment it with extensions in the subsequent experimental section. A CNN is a composite of multiple elementary processing units, each equipped with weighted inputs and one output, performing convolution of input signals with weights and transforming the outcome with some form of nonlinearity. The units are arranged in rectangular feature maps (grids) and spatially aligned with the raster of the input image. The spatial arrangement of units is the primary characteristic that makes CNNs suitable for processing visual information. Feature maps are arranged into layers, where maps in a given layer fetch signals only from the previous layer (see also Fig. 2). Our CNNs take as input the representation of the current board state, encoded in two 8 × 8 binary matrices. The 1s indicate the locations of the player’s pieces in the first matrix and opponent’s pieces in the second matrix. We refer to this encoding as pieces. In the encoding called vmoves, we add a third matrix in which we mark with 1s the player’s legal moves, to facilitate picking the valid moves during game playing. Following recent research conducted in Go [33], we define also the ones encoding, which includes an additional regularizing channel in pieces encoding that contains only ones. A board state represented in the above way forms an 8 × 8 binary image comprising two (for pieces), or three (for vmoves and ones) channels, and is fetched by the feature maps in the first layer of the CNN. Each unit in a feature map receives data only from its receptive field (RF), a small rectangle of neighboring board locations, however from all channels, and uses a separate weight set for each channel (see exemplary RFs in Fig. 2). Analogously in the subsequent layers, a unit fetches data from the corresponding RFs in all feature maps in the previous layer, and treats them with separate weight sets. The RFs of neighboring units in a map are offset by a stride. Board size, RF size and stride together determine the dimensions of a feature map. For instance, a feature map with 4 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES Table I: CNN architectures used in the experiments. Layer names are followed by numbers of feature maps. Conv4 conv64 → conv64 → conv128 → conv128 → f c128 → f c60 Conv6 conv64 → conv64 → conv128 → conv128 → conv256 → conv256 → f c128 → f c60 Conv8 conv64 → conv64 → conv128 → conv128 → conv256 → conv256 → conv256 → conv256 → f c128 → f c60 3 × 3 RFs with stride 1 needs only 36 units when applied to an 8 × 8 board, because six RFs of width 3 each, overlapping by two rows, span the entire board width (and analogously for height). The local connectivity substantially reduces the number of weights and facilitates capturing of spatial patterns. Units within the same feature map share their weights, and so calculate the same local feature, albeit from a different part of the board. This reduces the number of parameters even further and makes the extracted features equivariant. For instance, the 6 × 6 feature map mentioned above has only 9 · b + 1 parameters for a b-channel input (3 × 3 = 9 plus one threshold per feature map). We use rectified linear units (ReLU) to process convolution outcomes, with the nonlinearity defined as f (x) = max(x, 0). ReLUs make networks learn faster than squeezing-function units (e.g., sigmoid or tanh) and are particularly effective in networks with many layers, effectively alleviating the vanishing gradient problem, because gradient backpropagates through them undistorted for all positive excitations, in contrast to a small interval of excitations for the squeezing units. Our basic architectures are the networks composed of 4, 6, and 8 convolutional layers shown in Table I. In each architecture, the input is passed through a stack of convolutional layers composed of 64, 128, or 256 feature maps, with 3×3 RFs and the stride set to 1. Since the input is very small, we pad it with zeros on the grid border (so that the RFs can reach also beyond the input grid) in order to preserve the spatial resolution after convolution. For the same reason, we do not use any form of pooling, i.e., aggregating the outputs of multiple units by other means than convolution, as there is little rationale for that for small input grids [36]. Consequently, all feature maps in all layers have 8 × 8 units. In all architectures, the stack of convolutional layers is followed by two fully-connected (FC) layers. The hidden layer consists of 128 units with ReLU activations, while the output layer has K = 60 units corresponding to 60 possible move candidates. Each output y (k) corresponds to a single board location, and the desired moves are encoded using the binary 1-of-K scheme (a.k.a. one-hot encoding). For the output values to be interpreted as probabilities they must sum to unity, which is achieved using the softmax transformation: ey ok = P j (k) ey(j) , The classifier selects the move with the highest probability, i.e., ô = arg maxk∈K ok . The architectures presented in Table I resulted from a series of preliminary experiments, where we found out that increasing network depth beyond eight convolutional layers does not improve the performance while significantly lengthening the training time. Also, small 3 × 3 RFs and deeper networks turn out to be more efficient in terms of trading-off runtime and accuracy than using fewer but larger RFs. V. E XPERIMENTS IN M OVE P REDICTION ACCURACY A. Experimental Setup In this section, we consider networks as move predictors and do not engage them in actual games. The key performance indicator is prediction accuracy, i.e. the percentage of correctly predicted moves. We compare various configurations of the neural move predictors described in Section IV trained on examples of moves extracted from games played by humans (Section V-A2) . 1) Datasets: Created in 1985, the WThor database2 contains the records of 119,339 games played by professional Othello players in various French tournaments. From those records, we extracted all board states accompanied with the color of the player to move and the move chosen by the player in that particular state. The resulting set of 6,874,503 (board, color, move) triples is referred to as Original. We then removed the duplicates, obtaining 4,880,413 unique (board, color, move) triples, referred to as Unique dataset in the following. Note that both datasets may contain inconsistent examples, i.e. the same board state associated with different moves. A perfect classifier can achieve accuracy of 91.16% on Original and 97.49% on Unique. The color attribute is used only to invert the pieces on the boards when the white player is to move, so that all states in the dataset are seen from the black player’s perspective. Deep neural networks are known to perform particularly well when trained on large volumes of data. In order to augment the datasets, we take advantage of Othello’s invariance to board symmetries. For each board state in the Original and Unique datasets, we produce its all seven reflections and rotations. This results respectively in two symmetric datasets: Original-S (54,996,024 examples) and Unique-S (39,019,056 examples), where the latter was cleared also of the duplicates resulting from symmetric transformations. To assess the generalization capabilities of move predictors, we partition each dataset into disjoint training and testing sets. For the asymmetric datasets (Original and Unique), we allocate 25% of examples for testing. The symmetric datasets are much larger, so we allocate only 5% of examples for testing, so that all test sets are similar in size. 2) Training: For training, we use stochastic gradient descent with 0.95 momentum. Units’ weights are initialized using He’s method [11] while the biases (offsets) are initialized with zeroes. The learning rate is initially set to 0.1, and then halved twice per epoch. The loss function is regularized by the L2 norm with the weight of 5 · 10−4 . Learning is stopped after 2 http://www.ffothello.org/informatique/la-base-wthor/ PAWEŁ LISKOWSKI et al.: LEARNING TO PLAY OTHELLO WITH DEEP NEURAL NETWORKS Table II: Prediction accuracy of networks trained on four different training sets and evaluated on the Original test set. Pieces encoding was used. Architecture Conv4 Conv6 Conv8 Original 55.1 57.2 58.1 Original-S 56.9 58.7 60.1 Unique 55.9 57.9 58.9 Architecture Conv4 Conv6 Conv8 pieces ones vmoves 57.2 59.2 60.5 57.3 59.1 60.6 57.3 59.0 59.0 Table IV: Probability [%] of choosing a valid move on UniqueS. Unique-S 57.2 59.1 60.5 Table III: Prediction accuracy on Unique-S test set for different board encodings and number of convolutional layers. 24 epochs of training for the asymmetric datasets (171, 600 batches of examples) and 6 epochs (434, 400 batches) for the symmetric datasets. The implementation is based on the Theano framework [41], which performs all computation on a GPU in singleprecision arithmetic. The experiments were conducted on an Intel Core i7-4770K CPU with NVIDIA GTX Titan GPU. Training time varied from single hours to dozens of hours depending on configuration, e.g. nearly 62 hours for Conv8 trained on Unique-S. B. Results 1) Effect of Data Augmentation: Table II presents the testset prediction accuracy of three basic network architectures trained on particular training sets with the pieces encoding. For fairness, the networks are compared on the same data, i.e. the Original test set. Training on the datasets augmented by symmetries systematically leads to a higher prediction accuracy. The impact of removing duplicates is also consistently positive, albeit not so strong. These two trends together render Unique-S most promising, so in the following experiments we use this dataset only. 2) Impact of Board Encoding and the Number of Layers: Table III presents the prediction accuracy of the three architectures when trained on Unique-S with various encodings of the board state. This time, the networks are tested on the UniqueS test set, which explains the minor differences w.r.t. Table II, where Original test set was used for testing. The accuracy clearly correlates with the number of layers, so it is tempting to reach for even deeper architectures. However, a 10-layer architecture analogous to Conv8 failed to further improve the prediction accuracy. Concerning the comparison of encodings, pieces and ones seem to perform on par, so the former should be preferred as it does not require an additional input layer/channel. The relative underperformance of vmoves is more puzzling as it is hard to see how giving a learner a hint about moves’ validity could deteriorate its performance. In an attempt to investigate this outcome, we evaluate the networks with respect to their ability to discern the valid and invalid moves. In Table IV, we present the test-set accuracy of particular networks, where 100% indicates that the network’s most excited output 5 Architecture pieces ones vmoves Conv4 Conv6 Conv8 99.95 99.99 99.99 99.95 99.99 99.99 100.0 100.0 100.0 Table V: The influence of dropout, batch normalization, and bagging on prediction accuracy [%]. Pieces encoding was used. Architecture Conv8 (baseline) Conv8+dropout Conv8+BN Conv8+BN+bagging Prediction accuracy Prediction time [×10−4 s] 60.5 58.8 62.7 64.0 1.6 1.6 1.9 19.4 is always among the valid moves. All considered networks and encodings bring this indicator very close to perfection, with the networks using vmoves making no mistakes at all in that respect. This suggests that telling apart the valid moves from the invalid ones is very easy regardless of configuration, and providing this information explicitly in vmoves is not only unnecessary but may distract the training process. Therefore, we use the pieces encoding in all experiments that follow. 3) Impact of Regularization and Bagging: In Table V, we report the impact of a few techniques that tend to improve generalization performance of CNNs. Dropout consists in disabling a number of (here: 50 percent) randomly selected units for the individual batches of training examples, which forces a network to form multiple alternative pathways from inputs to outputs. This usually makes networks more robust and reduces overfitting, particularly in domains where input data are inherently redundant, like natural images, typically composed of at least thousands of pixels. The states of Othello board are however very different: there are only 64 inputs, and every single piece counts when choosing the move to make. There is virtually no redundancy in the input. As Table V suggests, dropout prevents the Conv8 network from capturing the board state in full and so hampers its predictive accuracy. The purpose of batch normalization (BN) is to address the internal covariate shift [14] by standardizing the outputs of individual network units over batches of examples, which was demonstrated to be beneficial in many contexts. This is corroborated in our case with over two percent gain in accuracy, so we consider this configuration as a baseline throughout the rest of this paper. Finally, we attempt to reduce the classifier’s variance by employing bootstrap aggregation (bagging). We train 10 networks on bootstrapped samples drawn from the training set and average their corresponding outputs to determine the move to make. When applied to the Conv8+BN network (Table V), bagging boosts the performance to 64%. The price paid for that is a 10-fold increase in not only the training time3 , but 3 The mean prediction times were computed using batch size of 256. Making decision for a single board state takes on average 5-20 times more GPU time. 6 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES Table VI: Prediction accuracy of residual networks. Conv8+BN (baseline) ResNet-32 ResNet-32-np ResNet-32-np-p 62.7 57.4 59.2 59.5 1.9 1.0 1.0 1.0 ResNet-56 ResNet-56-np ResNet-56-np–p 58.3 60.1 60.5 1.8 1.8 1.8 DenseNet-40 DenseNet-100 59.9 61.9 4.8 37.2 WideNet-40-4 62.2 9.4 Top-1 Accuracy # valid moves Prediction time [×10−4 s] 1 3 5 7 9 11 13 15 17 19 Accuracy Architecture 0.8 0.6 0.4 0.2 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 0.0 Move # valid moves 1 3 5 7 9 11 13 15 17 19 Top-2 Accuracy 1.0 0.8 0.6 0.4 0.2 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 0.0 Move # valid moves Top-3 Accuracy 1 3 5 7 9 11 13 15 17 19 also the prediction time, which will become relevant in the later parts of the study, when confronting our strategies with other opponents. 4) Architectures with Skip-Connections: The more recent DL research brought very deep network architectures containing dozens of layers [37], [12], which became the state-ofthe-art in image classification. Training such networks is only possible due to skip connections that form shortcuts in the pathways between layers, typically adding the representation (feature map) learned in a given layer to the representation learned in one of the consecutive layers. This, particularly when repeated multiple times across the network, opens new ways to achieving the training goal: rather than learning a mapping H such that y(x) = H(x), a network learns a residual F such that y(x) = F (x) + x. Skip connections alleviates the vanishing gradient problem as the gradient can backpropagate unchanged through many layers. Table VI presents the predictive accuracy of several skipconnection architectures. A ResNet-n network [12] consists of n 2 residual blocks, each comprising a nonlinear layer (ReLU activation) followed by a linear layer, shortcut with a skip connection that adds the input of the first layer to the output of the second one. Originally designed for image analysis, ResNets perform downsampling that reduces the input dimensionality; as there is arguably little need for that for our very small 8 × 8 input, we consider a variant stripped off that feature, ResNet-n-np. As expected, maintaining the dimensionality of the input throughout learning improves the accuracy of the smaller (ResNet-32) and larger (ResNet-56) architecture. Simple adding of layer’s outputs is possible only when they have the same dimensions. Otherwise, the authors of ResNets propose to implement the skip connections as linear mappings. The ResNet-n-np-p configurations in Table VI implement that feature, which slightly improves the predictions. ResNets’ skip connections can be considered first-order as each of them spans the inputs and outputs of the same residual block. In DenseNets [13], skip connections are being introduced between each pair of layers, so in a network of l of them. We trained layers (or residual blocks) there are l(l−1) 2 two DenseNet architectures. The smaller one (DenseNet-40) managed to perform on par with the other networks considered in this section, while the larger one (DenseNet-100) significantly outperformed them, almost reaching the performance level of the baseline. 1.0 1.0 0.8 0.6 0.4 0.2 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 Move Figure 3: Top-k prediction accuracy factored w.r.t. the number of move in a game and the number of valid moves. Finally, a very recent work on architectures dubbed WideNet [43] revealed that the number of layers (and thus parameters) in residual networks can be significantly reduced with little or no harm for accuracy by making the residual blocks more expressive. This can be achieved by increasing the number of convolution layers within a block, increasing the number of feature maps, or both. Our instance of this architecture comprises 3 stacks of residual blocks, each stack composed of 6 blocks. Each residual block contains two 3×3 convolutional layers. The layers in consecutive stacks are equipped with respectively 64, 128, and 256 feature maps (cf. Table 1 in [43] for k = 4), so the network is four times wider than the original ResNet. As the last row of Table VI demonstrates, this WideNet configuration fares the best among the skipconnections architectures considered here, which suggests that aggregating multiple features at various stages of processing is essential for successful move prediction. However, WideNet40-4 is also one of the slowest networks when queried. Overall however, contrary to the expectations, neither of the very-deep skip-connection networks did improve over the Conv8+BN baseline. 5) Prediction Accuracy Analysis: The move prediction task is inherently multimodal: to play well, correct predictions have to be made along the entire course of the game, for 0.0 PAWEŁ LISKOWSKI et al.: LEARNING TO PLAY OTHELLO WITH DEEP NEURAL NETWORKS the board states typical for the initial game stages as well as those occurring in the endgame. It is thus interesting to ask how difficult it is for a network to perform well at particular stages of the game. Here, we answer this question in terms of prediction accuracy. In Fig. 3, we present the top-k prediction accuracy for our baseline network Conv8+BN, factored with respect to the number of a move in a game and the number of legal moves in a given state. Given four pieces in the initial board state, the former factor may vary from 5 to 60; however we start with 6 as the fifth move is always the same under the Othello symmetries (which we take into account here). The color of a datapoint reflects the probability that the correct move (as per the WThor test set) is among the top k indicated by the network. The figure reveals that the prediction accuracy remains largely consistent throughout the game. Only in the game’s beginning the network’s predictions are less accurate, which we attribute to a relatively small amount of training data for Unique-S at this game stage (due to many identical states). The other aspect at play, suggested by the differences between the top-1 and top-3 graphs, is the large fraction of inconsistent examples for the early game states, when there are many alternative paths to success and players tend to follow them accordingly to their personal habits and preferences. The high quality of predictions in the later game stages (also when the number of available moves is high) is particularly encouraging, as even a single move towards the end of a game can drastically change the state of the board – the feature that Othello owes its name to. VI. P LAYING S TRENGTH A NALYSIS Prediction accuracy considered in the previous section is only a surrogate measure of performance, since we are ultimately interested in the playing strength. In this section, we let our predictors play against other players. A. Experimental Setup We consider a suite of thirteen 1-ply players proposed in previous research, gathered and compared in our former study [18]. The suite consists of players with board evaluation functions encoded by weighted piece counter and n-tuple networks, trained by different methods including hand-design, temporal difference learning, evolution, and coevolution (cf. Section II). In addition to that suite of opponents, we consider also Edax ver. 4.3.24 , a strong, open source, highly optimized Othello program. Edax can be configured to play at a given ply (search depth) n, which we denote as Edax-n. Since our move predictors as well as all 14 opponents (including Edax) are deterministic, we resort to the following technique in order to obtain robust estimates of the odds of winning. Rather than playing a single game that starts from the initial board, we use a set of 1000 6-ply opening positions prepared by Runarsson and Lucas [30]. Starting from each such state, two games are played, with the players switching roles. For a single game, a player can obtain 1, 0.5 or 0 points 4 http://abulmo.perso.neuf.fr/edax/4.3/edax.4-3-2.zip 7 Table VII: The winning rates of the best performing move predictors against the 1-ply opponent players. Note that while CoCMAES is included in the 13 opponents suite, Edax-1 is not. Architecture ResNet-56-np-p DenseNet-sym-100 WideNet Conv8+BN Conv8+BN+bagging Prediction accuracy 60.5 61.9 62.2 62.7 64.0 Winning rate Average CoCMAES Edax-1 (13 opponents) -4+2x2 94.3 87.7 80.7 94.1 87.5 79.0 96.3 92.2 88.1 96.7 93.2 87.5 96.6 93.5 87.6 on the win, draw, or loss, respectively. We report the winning rate, i.e. the percentage of points possible to score in 2000 games. B. Playing Strength Evaluation We selected a representative sample of the five best predictors from Section V and confronted them with all 13 opponents from our suite as well as with Edax-1. Table VII presents their average winning rates against the 13 players, and separately the winning rates against CoCMAES-4+2x2 that proved the best in [18] and against Edax-1. All networks turn out to be significantly stronger than any of the existing 1-ply look-ahead players, achieving around 90% winning rate against them. We find this interesting, given that move predictors are essentially 0-ply strategies, as they do not perform any look-ahead. Conv8+BN achieves the highest average winning rate, and is only slightly worse than Conv8+BN+bagging when playing against CoCMAES-4+2x2 and than WideNet when playing against Edax-1. This overall performance corroborates its high prediction accuracy. The roughly monotonous relationship between the prediction accuracy and the winning rate observed in Table VII lets us ask whether such a tendency holds in general. In Fig. 4, we plot the latter against the former for all networks evaluated in this paper, when confronted with the models in the suite and with Edax-1. The graph reveals a very strong linear dependency (determination coefficient r2 = 0.997 and r2 = 0.999, respectively). Fitting linear models suggests that in the considered range of prediction accuracy (57-64 percent), each percent point of the prediction accuracy brings 1.7 percent points of the winning rate against the suite of 13 players, and 3.4 percent points against Edax-1. Obviously, this trend cannot hold globally, as illustrated by Conv8+BN+bagging (the rightmost two data points). Although this might be an outlier, it may also suggest that 63 percent is approximately the point at which further increases of prediction accuracy do not translate into better winning rates anymore. C. Effect of Data Augmentation on Playing Strength In Section V-B1, we found out that the training set stripped of duplicates and augmented with symmetries (Unique-S) gives rise to the best move prediction accuracy. However, prediction accuracy is only a proxy of what we really care about – the winning rate. It is thus not obvious whether an analogous claim holds for playing strength, so, in this 8 IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES Figure 4: Networks’ move prediction accuracy vs. winning rate against all 13 opponent players (red dots) and against Edax (blue triangles). Table VIII: The winning rates against the 13 players from the suite for the basic neural predictors trained on different datasets Architecture Conv4 Conv6 Conv8 Original 77.9 84.6 85.4 Original-S 85.2 89.0 91.8 Unique 80.5 86.5 88.6 Unique-S 86.0 90.0 93.1 section we let the basic convolutional predictors from Section V-B play against the opponents from the suite. Other settings remain as in the previous section. The winning rates presented in Table VIII corroborate the outcomes in terms of prediction accuracy presented earlier in Table II. Both duplicate removal and augmentations have significantly positive effects on the playing strength. This correlation shows again that, at least in certain intervals, move prediction accuracy is a reliable predictor of the playing strength (cf. Fig. 4). factor of Othello is 10, so for search depth 5 Edax’s decision are based of tens of thousands of board states each, while our neural predictor performs quite well with just one. Search depth impacts the mean time required by Edax to make a move, which we report in the last column of the table. As Edax is highly optimized, it is able to make moves at a rate comparable to the prediction time of the Conv8 CNN (1.9×10−4 s) for search depths up to 3. Deeper search takes Edax longer. On the other hand, however, the times reported for neural predictors have been assessed in batches of 256 board states, the common efficiency means in GPU computing. When asked to predict a move for a single board state, CNNs are 5-20 times slower. Table IX includes also Edax prediction accuracy on the Original dataset, which clearly grows with the depth of search. However, increasing the depth from 4 to 5 does not improve the accuracy, despite the associated increase in headto-head matches against Conv8+BN. Also, Edax’s prediction accuracy (59% at n = 5) is significantly lower than the 64% demonstrated by Conv8+BN. It seems thus that Edax plays in a different way than human players, whom CNNs try to mimic. E. Analysis of Game Stages As much as we find the performance of our 0-ply move predictors impressive, the previous experiments show that deeper lookaheads are essential for achieving high winning rates. In our last experiment, we seek to find out which game stage may benefit the most when supplementing our move predictor with game tree search (and conversely, which game stage is most problematic for neural predictors). To this aim, we split the game into four stages according to intervals of move numbers: [1, 15], [16, 30], [31, 45], and [46, 60]. For each stage, we design a hybrid strategy that employs Edax-5 in that D. Playing against Game Tree Search stage, while using the Conv8+BN policy to make decisions Section VI-B revealed that the 0-ply neural move predictors in the remaining stages. We let those hybrid strategies play outperform the 1-ply opponents, and do so by a large margin against Edax-1..5. The results summarized in Fig. 5 confirm that letting Edax (∼ 90 percent vs. the 50 percent tie point). It is interesting to see how that margin decreases when the opponents are make moves at any game stage improves the performance of allowed for deeper game-tree searches. To investigate this, we the hybrid. The gains are largest for n = 3; as demonstrated confront Conv8+BN with Edax-n for search depth n ∈ [2, 5] in Section VI-D, for smaller n Edax is relatively easy to beat (using the same protocol involving 2000 games), and gather already by pure Conv8+BN, so extending it with Edax-5 at the results in Table IX. Remarkably, our predictor maintains a single game stage does not improve the odds for winning superiority when Edax is allowed for 2-ply lookahead, though much. Conversely, for n > 3 the opponent Edax-n becomes the odds of its winning are now only roughly 6:4. Starting so strong that it is hard to increase the odds of winning either. The graphs reveal also that there is more to gain at later from search depth 3, Conv8+BN is more likely to lose than to win, and for 5-ply search its odds for winning drop to 1:9. This stages of the game regardless of the opponent’s depth. We is however still impressive, given that the average branching suspect that this is due to the combinatorial nature of the game, which makes the CNN’s pattern recognition capabilities less relevant for success in the last game stage. Also, given that Table IX: The performance of Conv8+BN vs. Edax-n. Othello games last at most 60 moves, a search depth 5 in the n Winning rate Edax move time [×10−4 s] Edax prediction accuracy last game stage enables Edax to often reach the final game 1 87.5 1.0 47.9 states and so obtain robust assessments of potential moves. 2 59.4 1.1 53.3 Last but not least, certain fraction of moves derived from 3 34.7 1.6 55.2 4 19.8 5.0 59.8 WThor can be suboptimal and so might have ‘deceived’ the 5 10.3 10.0 59.7 networks. 3/31/2017 https://docs.google.com/spreadsheets/d/1hgrDWaqWOA7NCvDhqKZgDt4LYEpA3Hd0wex3Gbo_XC0/pubchart?oid=124067… PAWEŁ LISKOWSKI et al.: LEARNING TO PLAY OTHELLO WITH DEEP NEURAL NETWORKS 1-ply 2-ply 3-ply 4-ply Winning Rate Gain [%] 15 10 9.35 7.18 5 5-ply 14.25 11.77 10.9 9.92 11.05 10.47 7.6 6.35 4.7 4.25 1.95 12.57 12.43 11.85 8.5 6.6 9 arbitrary complex combinatorial patterns occurring in entire board states. A natural follow-up step is thus considering fullyconnected networks that do not suffer from that limitation; however, they may be also much more costly in training and tend to overfit. In relation to that, an interesting study regarding fully-connected networks for Othello with up to 3 hidden layers was performed in [3]. 4.18 2.53 VIII. C ONCLUSIONS Our study brings evidence that deep neural networks are a viable methodology for training Othello agents. They do 0 15 30 45 not require explicit knowledge on game rules or strategies, nor extensive game-tree searches, nor explicitly compare inStage [move number] dividual future board states or actions. Rather than that, they Figure 5: The gain of winning rate of Conv8+BN when achieve a high level of playing by learning the associations hybridized with Edax-5 for a particular stage of the game. between the patterns observed in board states and the desired Winning rates are assessed independently against Edax-1..5. moves. We may claim thus that, at least to some extent, the trained neural predictors embody the knowledge of the Othello domain – a statement that would be hard to defend for VII. D ISCUSSION game-tree search techniques, which owe their power largely The deep CNN-based move predictor with its nearly 63% to algorithmic efficiency. On the other hand, the supervised approach proposed here of accuracy turned to be much better than n-tuples-based preference learning [30], which achieved only 53% on the cannot be deemed as ‘knowledge-free’ in the same sense as same dataset. Our Conv-8-BN wins against it in 93.9% of for instance evolutionary or reinforcement learning methods. games. We obtained a similar winning rate of 93.2% also Here, the essential know-how is hidden in the expert games against the CoCMAES player [18], the strongest to-date 1- used for training. CNNs power lies in the ability to extract and incorporate this knowledge into a system that is able to ply Othello player (cf. Table VII). Despite Othello’s relatively low branching factor and small generalize beyond the training examples, something no other board, CNNs proved to be supreme move predictors, managing method in the past has been shown to do well enough to to efficiently capture the expertise materialized in millions achieve the expert level of play in Othello. Given the supreme performance of CNNs, this work may of humans’ moves. We find that impressive given that small, discrete-valued board states are arguably very different from be worth extending in several directions. The networks that rely more on the fully-connected layers, mentioned in Section natural images5 . Seeing a convolutional network to perform so well in a VII, are one such possibility. Logistello [7] and Edax use board game that is characterized with little translation invari- different evaluation functions for each stage of the game (cf. ance is intriguing, as the main motivation for using convolution SectionVI-E), and such ‘factorization by game course’ could is precisely the translation invariance. This suggests that also lead to a better CNN agent. Another, arguably simple certain patterns observed in Othello boards can be to some extension is to add the information about the player to move, extent translation-invariant, or at least can be detected using which we expect to be beneficial given that Othello is a non‘higher-order convolutions’ implemented by a stack of several symmetric game. Last but not least, given the usefulness of convolutional features evidenced here, it would be interesting https://docs.google.com/spreadsheets/d/1hgrDWaqWOA7NCvDhqKZgDt4LYEpA3Hd0wex3Gbo_XC0/pubchart?oid=1240676136&… 1/1 convolutional layers intertwined with nonlinearities. Concerning limitations of the approach, we could not im- to verify their capabilities in other contexts than supervised prove upon the result obtained with the Conv-8-BN network learning of move predictors, e.g. as state or state-action evalby using deeper networks with skip connections. This suggests uation functions trained with reinforcement learning methods. that what works for high-dimensional image data does not alACKNOWLEDGMENTS ways succeeds for low-dimensional problems such as Othello. P. Liskowski acknowledges the support from grant An interesting observation concerning training is that the large networks hardly overfit to the data. The classification 2014/15/N/ST6/04572 funded by the National Science Cenaccuracy on the training set is typically within one percent tre, Poland. W. Jaśkowski acknowledges the support from point of the accuracy on the test set, suggesting that the Ministry of Science and Higher Education grant “Mobilnetworks we considered here cannot memorize the training ity Plus” no 1296/MOB/IV/2015/0. K. Krawiec was supdata entirely. We may conclude thus that there is still room ported by the National Science Centre, Poland, grant for improving their architectures. In particular, this may be no. 2014/15/B/ST6/05205. a sign of an inherent limitation of convolutional processing, R EFERENCES where the limited in size RFs may be insufficient to capture 0 5 Note that the images considered in computer vision hardly ever contain fewer than 100 pixels. [1] Victor L Allis. Searching for solutions in games and artificial intelligence. PhD thesis, University of Limburg, Maastricht, The Netherlands, 1994. 10 [2] Yoshua Bengio. Learning deep architectures for AI. Foundations and trends in Machine Learning, 2(1):1–127, 2009. [3] Kevin J Binkley, Ken Seehart, and Masafumi Hagiwara. A study of artificial neural network architectures for Othello evaluation functions. Information and Media Technologies, 2(4):1129–1139, 2007. [4] Woodrow Wilson Bledsoe and Iben Browning. Pattern recognition and reading by machine. In Proc. Eastern Joint Comput. Conf., pages 225– 232, 1959. [5] M Buro. An evaluation function for Othello based on statistics. Technical report, NEC, Princeton, NJ, 1997. [6] Michael Buro. Experiments with multi-probcut and a new high-quality evaluation function for othello. Games in AI Research, pages 77–96, 1997. [7] Michael Buro. Experiments with Multi-ProbCut and a new high-quality evaluation function for Othello. In H.J. van den Herik and H. Iida, editors, Games in AI Research, pages 77–96. University Maastricht, 2000. [8] Christopher Clark and Amos Storkey. Teaching deep convolutional neural networks to play go. arXiv preprint arXiv:1412.3409, 2014. [9] Kunihiko Fukushima and Sei Miyake. Neocognitron: A self-organizing neural network model for a mechanism of visual pattern recognition. In Competition and cooperation in neural nets, pages 267–285. Springer, 1982. [10] Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 580–587, 2014. [11] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on Imagenet classification. In Proceedings of the IEEE international conference on computer vision, pages 1026–1034, 2015. [12] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 770– 778, 2016. [13] Gao Huang, Zhuang Liu, Kilian Q Weinberger, and Laurens van der Maaten. Densely connected convolutional networks. arXiv preprint arXiv:1608.06993, 2016. [14] Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015. [15] Wojciech Jaśkowski. Systematic n-tuple networks for othello position evaluation. ICGA Journal, 37(2):85–96, June 2014. [16] Wojciech Jaśkowski. Systematic n-tuple networks for position evaluation: Exceeding 90% in the othello league. Technical Report RA06/2014, arXiv:1406.1509, Institute of Computing Science, Poznan University of Technology, Poznań, Poland, 2014. [17] Wojciech Jaśkowski, Paweł Liskowski, Marcin Szubert, and Krzysztof Krawiec. Improving coevolution by random sampling. In Christian Blum, editor, GECCO’13: Proceedings of the 15th annual conference on Genetic and Evolutionary Computation, pages 1141–1148, Amsterdam, The Netherlands, July 2013. ACM. [18] Wojciech Jaśkowski and Marcin Szubert. Coevolutionary CMA-ES for knowledge-free learning of game position evaluation. IEEE Transactions on Computational Intelligence and AI in Games, 8(4):389–401, 2016. [19] Michał Kempka, Marek Wydmuch, Grzegorz Runc, Jakub Toczek, and Wojciech Jaśkowski. ViZDoom: A Doom-based AI Research Platform for Visual Reinforcement Learning. In IEEE Conference on Computational Intelligence and Games, pages 341–348, Santorini, Greece, Sep 2016. IEEE. [20] Krzysztof Krawiec and Marcin Grzegorz Szubert. Learning n-tuple networks for Othello by coevolutionary gradient search. In Proceedings of the 13th annual conference on Genetic and evolutionary computation - GECCO ’11, pages 355–362, New York, New York, USA, jul 2011. ACM Press. [21] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. [22] Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. [23] Paweł Liskowski and Krzysztof Krawiec. Segmenting retinal blood vessels with deep neural networks. IEEE transactions on medical imaging, 35(11):2369–2380, 2016. [24] Simon M. Lucas. Learning to play Othello with N-tuple systems. Australian Journal of Intelligent Information Processing Systems, Special Issue on Game Technology, 9(4):01–20, 2007. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES [25] Simon M. Lucas and Thomas P. Runarsson. Temporal difference learning versus co-evolution for acquiring Othello position evaluation. In IEEE Symposium on Computational Intelligence and Games, pages 52–59. IEEE, 2006. [26] Edward P Manning. Using Resource-Limited Nash Memory to Improve an Othello Evaluation Function. IEEE Transactions on Computational Intelligence and AI in Games, 2(1):40–53, 2010. [27] Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 779–788, 2016. [28] Michiel Van Der Ree and Marco Wiering. Reinforcement learning in the game of Othello: Learning against a fixed opponent and learning from self-play. In Adaptive Dynamic Programming And Reinforcement Learning (ADPRL), 2013 IEEE Symposium on, pages 108—-115, 2013. [29] P.S. Rosenbloom. A world-championship-level othello program. Artificial Intelligence, 19(3):279–320, 1982. [30] Thomas Runarsson and Simon Lucas. Preference Learning for Move Prediction and Evaluation Function Approximation in Othello. Computational Intelligence and AI in Games, IEEE Transactions on, 6(3):300– 313, 2014. [31] Spyridon Samothrakis, S Lucas, TP Runarsson, and David Robles. Coevolving Game-Playing Agents: Measuring Performance and Intransitivities. IEEE Transactions on Evolutionary Computation, 17(2):213– 226, 2013. [32] Jürgen Schmidhuber. Deep learning in neural networks: An overview. Neural networks, 61:85–117, 2015. [33] David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George van den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. Mastering the game of go with deep neural networks and tree search. Nature, 529(7587):484–489, 2016. [34] Ioannis E. Skoulakis and Michail G. Lagoudakis. Efficient Reinforcement Learning in Adversarial Games. In 2012 IEEE 24th International Conference on Tools with Artificial Intelligence, pages 704–711. IEEE, nov 2012. [35] R. Smith and B. Gray. Co-adaptive genetic algorithms: An example in othello strategy. In 7th Florida AI Research Symposium, 1994. [36] Jost Tobias Springenberg, Alexey Dosovitskiy, Thomas Brox, and Martin Riedmiller. Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806, 2014. [37] Rupesh Kumar Srivastava, Klaus Greff, and Jürgen Schmidhuber. Highway networks. arXiv preprint arXiv:1505.00387, 2015. [38] Maciej Szkulmowski, Daniel Ruminski, Paweł Liskowski, Bartosz Wieloch, Krzysztof Krawiec, Bartosz Sikorski, and Maciej D Wojtkowski. Oct retinal angiography using neural networks. Investigative Ophthalmology & Visual Science, 57(12):454–454, 2016. [39] Marcin Szubert, Wojciech Jaśkowski, and Krzysztof Krawiec. Learning Board Evaluation Function for Othello by Hybridizing Coevolution with Temporal Difference Learning. Control and Cybernetics, 40(3):805–831, 2011. [40] Marcin Szubert, Wojciech Jaśkowski, and Krzysztof Krawiec. On scalability, generalization, and hybridization of coevolutionary learning: a case study for othello. IEEE Transactions on Computational Intelligence and AI in Games, 5(3):214–226, 2013. [41] Theano Development Team. Theano: A Python framework for fast computation of mathematical expressions. arXiv e-prints, abs/1605.02688, May 2016. [42] Sjoerd van den Dries and Marco A. Wiering. Neural-Fitted TD-Leaf Learning for Playing Othello With Structured Neural Networks. IEEE Transactions on Neural Networks and Learning Systems, 23(11):1701– 1713, November 2012. [43] Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. arXiv preprint arXiv:1605.07146, 2016.
1cs.CV
For a study of definable representations of algebraic groups Adrien Deloro arXiv:1510.06302v2 [math.LO] 4 Mar 2016 7th March 2016 Abstract We classify irreducible SL2 (K)-modules of low Morley rank (≤ 4 rk K) as a first step towards a more general conjecture. 1 Introduction It was more than fifty years since Robert Steinberg published his celebrated “tensor product” theorem. Fact (Steinberg’s Tensor Product Theorem, [15]). Let G be a semisimple algebraic group of characteristic p 6= 0 and rank ℓ, and let R denote the set of pℓ irreducible rational projective representations of G in which the high weight λ satisfies 0 ≤ λ(a) ≤ (p − 1) for all simple roots a. Let αi i denote the automorphism t 7→ tp of the universal field as well as the corresponding automorphism αi of G, and for R ∈ R let R denote the composition of αiN and R. Then every irreducible rational projective representation of G can be written uniquely as Riαi . Conversely, every such product yields an irreducible rational projective representation of G. As conjectured by Steinberg, the rationality assumption was later removed by Borel and Tits following their work on “abstract homomorphisms” between groups of K-points [2]. This of course requires consideration of all field automorphisms and not only iterates of the Frobenius map in the above theorem, but the set R remains unchanged [2, Corollaire 10.4]. We hope the reader to be familiar with the significance of Steinberg’s tensor theorem. For we wish in the present paper to conjecture an analogue in a different setting; such an analogue would be the first stone of a bridge linking representation theory to model theory. As a matter of fact, we suggest to study the category of definable representations of the semisimple algebraic groups — and since our expected reader is not an expert in mathematical logic, (s)he will find all necessary explanations after the statements below. Conjecture. Let (G, V ) be a module of finite Morley rank, where G is isomorphic to the group GK of K-points of some semisimple algebraic group G. Suppose that the action is faithful and irreducible. Then there are a definable, compatible K-vector space structure on V and definable field automorphisms ϕi such that V ≃ ⊗ϕi Ri , definably, as a K[G]-module. We prove a basic case of this conjecture (the precise statement is in §1.5). Theorem. Work in the setting of the conjecture. Suppose that K does not have characteristic 2 or 3, that G ≃ SL2 (K) and that rk V ≤ 4 rk K, where rk denotes the Morley rank. Then the desired conclusion holds. MSC 2010: 20F11. Keywords: Groups of finite Morley rank; Modules of finite Morley rank; Definable representations 1 Partial results had already been obtained: identification of the natural action when rk V ≤ 2 rk K in [7] (with an application to identification of the standard action of GLn (K) [1]), and identification of the adjoint action when rk V ≤ 3 rk K in [5]. One easily imagines that 3 rk K = rk SL2 (K) is a critical value past which things become much more difficult. Not only does our proof begin to overcome such difficulties, it also provides much quicker arguments for [7, 5] (see §1.6). And now let us explain what we mean. 1.1 Model Theory: Ranked Universes Model theory is concerned with mathematical structures in both a wide (general) and narrow (the restriction to “first-order”) sense. But we do not need a general introduction as we shall focus on groups. An excellent reference describing our setting is [4]. For the model theorist, algebraic groups as functors hardly exist: only affine groups of K-points can be examined, one by one. Such objects are equipped with a collection of finitary relations — among which the equality and the group law of course, but there could be more. This we call a “group structure”. Now on a general group structure G model theory studies the class of so-called definable sets [4, §4.1.1]: singletons, Cartesian powers of G, and the graphs of relations are definable, the class is closed under boolean combinations, under projections, and under quotients by definable equivalence relations. This reflects the logician’s will to work only with “first-order” formulas (an approach we shall not need here). This also loosely mimicks the behaviour of the constructible class in affine algebraic groups. Of course the geometry of the constructible class in an affine algebraic group over an algebraically closed field is well-understood, whereas for a general, abstract group structure, nothing similar should be expected. One ingredient is obviously missing to bring our setting closer to affine algebraic group theory: the Zariski topology. But this is not in the scope of model theory, and we shall rely on no topological methods. The loss is serious as geometers imagine. Instead we merely use a coarse analogue of the Zariski dimension, known as the Morley rank. The Morley rank, in general an ordinal-valued function, is defined by a standard induction: • a non-empty, finite definable set has rank 0; • a definable set A has rank ≥ α + 1 iff there are infinitely many disjoint definable subsets Bi ⊆ A with rk Bi ≥ α; • to deal with limit ordinals take suprema. Now it so happens (at least in the case of a group structure; other mathematical objects are not all so well-behaved model-theoretically) that if G is a group structure the Morley rank of which is finite, then it satisfies the following properties [4, §4.1.2], where f : A ։ B is any definable surjection between definable sets: • the rank is definable: for any k, the set {b ∈ B : rk f −1 (b) = k} is definable; • the rank is additive: if the latter set equals A then rk A = rk B + k; • uniformity phenomena (called “elimination of infinite quantifiers” by logicians): there is an integer m such that for any b ∈ B, the fiber f −1 (b) either is infinite or of cardinality ≤ m. All standard dimension computations [4, §4.2] are therefore allowed, though we fall short of topological methods. As finiteness of the Morley rank is inherited by definable subsets, the phrases “let G be a group of finite Morley rank” and “let G be a group definable in a finite Morley rank universe” describe the same setting. 1.2 Ranked Groups A ranked group structure enjoys a number of properties highly reminiscent of algebraic group theory: • the existence of a connected component [4, §5.2] H ◦ for each definable subgroup H ≤ G; 2 • generation by so-called indecomposable definable sets, similar to generation by irreducible subsets in algebraic groups [4, Theorem 5.26, known as Zilber’s Indecomposibility Theorem] (indecomposibility is a clever way to imitate topological irreducibility without a topology: a definable set is indecomposable if no definable subgroup can partition it using a finite number k > 1 of translates); • the ability to retrieve fields from definable, connected, infinite, soluble, non-nilpotent groups, as in the following fundamental fact. Fact A (Zilber’s Field Theorem: [4, Theorem 9.1]). Let G = A ⋊ H be a group of finite Morley rank where A and H are infinite definable abelian subgroups. Suppose the action is faithful and H-irreducible, viz. A has no definable, proper, infinite, H-invariant subgroup. Then the ring of endomorphisms of A generated by H is a definable field K, for which A ≃ K+ definably and H ֒→ K× in its action on K+ . Now an infinite field structure of finite Morley rank is necessarily algebraically closed by a theorem of Macintyre [4, Theorem 8.1] (note for the geometer: K may have Morley rank > 1). In particular there are no extensions of infinite definable fields in our setting, and consequently infinite fields of finite Morley rank have no definable groups of automorphisms [4, Theorem 8.3] (note: definable field automorphisms however exist, but only in characteristic p [4, p. 129]: it is not known whether they are all relative powers of the Frobenius map, which will make our conjecture interesting). But model theorists have been extremely plafyful with subgroups of K+ , resp. K× , which are not to be thought as “minimal” with respect to definability. Some of our arguments will look quite convoluted to the geometer, precisely because of this. Quite remarkably, we need virtually no other reprequisites than the above material — which we take as a strong indication that we are at the beginning of something not only new, but also of interest. 1.3 Ranked Modules A ranked module (G, V, ·) (or simply (G, V ) when there is no ambiguity) is a semi-direct product G ⋉ V such that: • G ⋉ V has finite Morley rank; • G and V are definable and infinite; • and V is abelian and connected. Be very careful that it is a requirement on V to be both definable and connected. All related notions are therefore connected versions: an irreducible module, a composition series, and so on. But in practice working in the definable-connected category is completely intuitive. The classification of ranked modules could be next to impossible. As a matter of fact, despite highly regarded efforts towards a well-known classification conjecture for the infinite simple groups of finite Morley rank, such abstract groups are not determined. But in the present paper we handle a very special case, where G is known to be isomorphic with SL2 (K). In particular, our work is almost disjoint in spirit from the ambitious classification programme we just mentioned, and definitely not about the so-called Cherlin-Zilber algebraicity conjecture. Now if SL2 (K) is definable inside a group of finite Morley rank, then so is K (the reader not familiar with definability should exercise here as it involves all techniques we shall use in the article); by the previous subsection, it is algebraically closed. Hence, if (G, V ) is a (faithful and irreducible) ranked module with G of the form SL2 (K), or more generally GK for G a semisimple algebraic group, then K is an algebraically closed field. In such an ideal world, how can V fail to be a representation of the algebraic group G? 1.4 On the Conjecture Let us repeat our conjecture. 3 Conjecture. Let (G, V ) be a module of finite Morley rank, where G is isomorphic to the group GK of K-points of some semisimple algebraic group G. Suppose that the action is faithful and irreducible. Then there are a definable, compatible K-vector space structure on V and definable field automorphisms ϕi such that V ≃ ⊗ϕi Ri , definably, as a K[G]-module. 1. Null Characteristic. Like Steinberg’s original theorem, the conjecture degenerates in characteristic 0, a case where it is already known. Fact B ([5, Lemma 1.4]). In a universe of finite Morley rank, consider the following definable objects: a field K, a quasi-simple algebraic group over K, a torsion-free abelian group V , and a faithful action of G on V for which V is G-irreducible. Then V ⋊ G is algebraic with respect to some K-vector space structure on V . One should note that this is a weak analogue of the equivalent statement in the so-called o-minimal category, where prior knowledge of G is not even required. Fact C (not used; Macpherson-Mosley-Tent; [13, Proposition 4.1]). Let (G, V ) be a module definable in an o-minimal structure. Suppose that the action is faithful and irreducible. Then there is a definable real closed field R such that V has definably the structure of a vector space over R, and G is definably isomorphic to a subgroup of GL(V ) in the standard action on V . Furthermore, if G is connected then its image in GLm (R) is R-semialgebraic. 2. Linearity. Let us return to the ranked setting. In positive characteristic, little is known. Needless to say, Steinberg’s slightly computational proof, and the more modern approach through Frobenius kernels as schemes [6] are both completely out of our methodological scope. And we confess to have no general strategy for the moment. Whether definable K-linearity of V would suffice is not completely clear: by the Borel-Tits corollary to Steinberg’s theorem, all irreducible linear representations of GK are known and of the desired form — but the definability of the field automorphisms used as twists is not fully obvious albeit highly expectable. We do however suspect that for given G = GK and V ≃ ⊗i ϕi Ri as above, ϕ2 the structures (K; ϕ , . . . , ϕϕn1 ) and (G, V, ·) should be inter-definable. It is a topic we shall return 1 to some day. But in any case, we see no general path to linearity, a much harder question. Our proof proceeds by defining the K-vector space structure manually, that is, with some hint of what the twist will be. 3. Field automorphisms. We wish to make a few more general comments. Fact D (not used; Macpherson-Pillay, Poizat; [14, Théorème 2]). Definable in a universe of finite Morley rank, let K be a field of prime characteristic and G ≤ GLn (K) be a simple subgroup. Then there are definable field automorphisms ϕ1 , . . . , ϕk such that G is definable in the structure (K; +, ·, ϕ1 , . . . , ϕk ). However remarkable this phenomenon and the proof Poizat gave, one hardly sees how to use it in our arguments. But we take it as supporting evidence for the conjecture: given a definable representation, the relevant category seems to be the rational category augmented by a finite number of twists. We wish to go further into mere speculation. In Steinberg’s classical result one computes the p-adic expansion of the highest weight; what would be the similar computation here? Observe how any two definable field automorphisms of a field of finite Morley rank commute over the algebraic closure of the prime field, hence everywhere; in particular, the ring Fp [Autdef (K)] generated by definable automorphisms of K is commutative. So computing in this ring would make (some) sense. This also do we take as a strong indication that our conjecture is the right statement. And now let us be specific. 4 1.5 The Result and its Legitimacy Theorem. Definable in a universe of finite Morley rank, let K be a field, G = SL2 (K), and V be an irreducible G-module of rank ≤ 4 rk K. Suppose the characteristic of K is neither 2 nor 3. Then there is a definable K-vector space structure on V such that V , as a K[G]-module, V is definably isomorphic to one of the following: • Nat G, the natural representation; • Ad G ≃ Sym2 Nat G, the adjoint representation; • Sym3 Nat G, the rational representation of degree 4 on K[X 3 , X 2 Y, XY 2 , Y 3 ]; • Nat G ⊗ χ (Nat G), a twist-and-tensor representation for some definable χ ∈ Aut(K). We do not know what happens in characteristics 2 and 3. But we suspect things would be much harder, and despite the challenge we confess that for the time being our interests lie more in higher Morley rank than in lower characteristic. The theorem is proved in §3, but it requires the tools developed in §2. We must legitimate our result — which we agree is but a very first step. However we consider it a breakthrough; there are three critical steps in the analysis: 1. leave the category of rational representations of SL2 (K); 2. remove bounds on the Morley rank of the SL2 (K)-module V ; 3. handle the other semisimple algebraic groups. As we said, until now only the case G ≃ SL2 (K) and rk V ≤ 3 rk K was known [5]. Here we successfully leave the rational category, which requires a complete change of methods. We view completion of 1 as evidence for the maturity of (some of) our methods. There are no claims now on how to pass the remaining steps. 1.6 On our Methods Let us describe the main features of the argument. • As opposed to [5] which handled the rk V ≤ 3 rk K case (see in particular [5, Step 5 in §2 and the Proposition in §3]), we are now working with modules greater in rank than the group. Consequently there can be no useful genericity argument since orbits of elements are all small when compared to the module. The present study entirely substitutes genericity arguments with much better techniques given in §2. Some of these were found by Tindzogho Ntsiri in his PhD [17], also [18]; what we cannot extend we faithfully reproduce for the sake of future reference. • We convert the abstract tools into methods based on the structure of V as a T -module (where T is an algebraic torus) and explained in §2.3: we shall even give a considerably shorter proof of [5] in §3.3. It is not unreasonable to hope that these methods can be generalised further. • The main issue with our proof is that we reproduce some of the unpleasant computations developed for SL2 (Z)-modules of short nilpotence length [9]. Now one should take intrinsic limitations on the unipotence length with care: [9, Proposition 2], which we briefly touch upon in §3.1, explains why computations which look possible in unipotence length ≤ 5 have a geometric obstruction in longer length. Although this geometric phenomenon simply cannot survive strong model-theoretic assumptions, for the moment there is no strategy other than the “short length miracle” of [9, Theorem 1]. In our opinion this is the main obstacle to jumping to identification of all rational representations of SL2 (K) among its definable modules. 5 But perhaps model theory, or a combination of finite group theory and model theory, could substitute such computations. This would open the way to something general and step 2 in §1.5 might then prove tractable. • In the twisted case we untensor by hand a linear structure we defined by hand. As we said in the previous subsection, one could naively hope to divide a solution to any case of the conjecture into two tasks: – proving linearity (in as general a context as possible); – proving in general that if V ≃ ⊗ϕi Ri is a definable GK -module, then the ϕi /ϕ1 are definable from G ⋉ V (see §1.4.2). But as we strongly suspect there is no direct path to linearity, analysing the conjecture in this two-step fashion hardly helps. This certainly reflects on our methods for the tensor case (Proposition 3.6 of §3.5): we isolate weight spaces and define the field action following what the twist should be; only after doing so do we actually retrieve the field automorphism. 2 General Tools The proof of our main Theorem will be in §3; this preliminary section contains tools whose interest goes beyond the rank 4k case. In §2.1 we state Tindzogho Ntsiri’s semi-simple analogue of Maschke’s Theorem. In §2.2 we enhance and simplify his systematic study of covariant, bi-additive maps between definable fields. These general results are applied to SL2 (K)-modules of finite Morley rank in §2.3. Before we start, we remind the reader that by convention, all modules are definable and connected; this affects the notions of irreducibility and composition series. 2.1 Abstract Tools 1: Actions of Tori Fact E ([10, Lemma G (iv)]). In a universe of finite Morley rank, let A be a definable, abelian group and R be a group acting on A by definable automorphisms. Let A0 ≤ A be a definable, R-invariant subgroup. Suppose that A has exponent p and R is a definable, soluble, p⊥ group. Then A = [A, R] ⊕ CA (R), ([A, R] ∩ A0 ) = [A0 , R], CA (R) covers CA/A0 (R), and CR (A) = CR (A0 , A/A0 ). It certainly is superfluous to explain the relevance of a definable version of Maschke’s Theorem. The result below is from Tindzogho Ntsiri’s PhD thesis [17]. Fact F (Tindzogho Ntsiri, [17, §5.2.1, Proposition 5.23] or [18, Corollary 2.17]). In a universe of finite Morley rank, let T be a definable, connected, soluble, p⊥ group and V be a T -module of exponent p. Suppose CV (T ) = 0. Then every T -submodule admits a direct complement T -module. Remark. The author wonders whether anything similar might exist in characteristic 0. This is mostly for art’s sake as the conjecture is settled there by Fact B. 2.2 Abstract Tools 2: Covariant Bi-additive Maps We move to studying T -covariant, bi-additive maps; the reason for doing so is the following. When analysing an arbitrary SL2 (K)-module, one will try to capture weight spaces as T -minimal modules; if the action of T is not trivial, Zilber’s Field Theorem recovers an algebraically closed field from every such module. But the interpretable field has no reason to be isomorphic to K, nor even to be the same on the various T -minimal modules. The hope is that linking the various weight spaces via the commutation map with a unipotent subgroup normalised by T should force interpretable fields to be definably isomorphic with K. A first result in this direction was developed (entirely by Cherlin) for [5] and served as a basis of Tindzogho Ntsiri’s work. 6 In a sense, the material in this section is again from [17]; but as opposed to Fact F, here we can generalise Tindzogho Ntsiri’s conclusions while simplifying his proof. The resulting statement is as follows. Theorem 2.1 (cf. [17, §5.1.1, Théorème 5.7] and [18, Theorem 3.2]). All objects (including functions and actions) are supposed to be definable in a universe of finite Morley rank. Let K, L, M be fields and U, V, W be vector spaces over K, L, M, respectively. Suppose there is a group T acting (not necessarily faithfully) by scalar multiplication on U , V , W , i.e. as a subgroup of K× , L× , M× . Let κ : T → K× , λ : T → L× and µ : T → M× be the associated group homomorphisms, and let ρ = κ × λ × µ : T → K× × L× × M× . Let β : U × V → W be a non-zero bi-additive map and suppose that β is plus-or-minusT -covariant, i.e. there are εK , εL , εM ∈ {±1} such that for all (t, u, v) ∈ T × U × V , one has β(tεK · u, tεL · v) = tεM · β(u, v). Then: • ker ρ = ker κ ∩ ker λ = ker κ ∩ ker µ; • if ker κ/ ker ρ is infinite, then L ≃ M; • if both ker κ/ ker ρ and im κ are infinite, then K ≃ L ≃ M; • if ker µ/ ker ρ is infinite, then K ≃ L; • if both ker µ/ ker ρ and im µ are infinite, then K ≃ L ≃ M. The proof will take place in §2.2.3; we start with easy remarks. 2.2.1 Two Remarks on Fields Notation. For a field F, let F′ = F \ {0} ∪ {∞} and define ∗ : F′ × F′ → F′ by:  ab for a, b ∈ F \ {0} with a 6= −b  a ∗ b = a+b a ∗ (−a) = ∞ for a ∈ F \ {0}  a ∗ ∞ = ∞ ∗ a = a for a ∈ F′ Extend · to F′ by a · ∞ = ∞ · a = ∞. Observation 1. (F′ , ∗, ·) is a field isomorphic to (F, +, ·) via the function ιF (a) = a−1 (with the convention 0−1 = ∞ and conversely); if F is definable then so are F′ and this isomorphism. Observation 2. Let F1 and F2 be fields, and denote by πi : F1 × F2 → Fi the projection maps. If a subring R ≤ F1 × F2 is a field, then π1 (R) ≃ π2 (R) (actually R stands for the graph of one such field isomorphism; alternatively, π1 (R) ≃ R ≃ π2 (R)). In particular F1 and F2 have the same characteristic. If in addition F1 , F2 , and R are definable in a theory of finite Morley rank with R infinite, then F1 ≃ F2 . Proof. It suffices to see that R is a one-to-one, functional relation. Since R is an additive subgroup of F1 × F2 , it suffices to see that (0, y) ∈ R entails y = 0: which is obvious since R is a field. For the second claim, bear in mind that there can be no extensions of infinite, definable fields for all such are algebraically closed [4, Theorem 8.1]. ♦ 2.2.2 An Example to Understand The following will not be used anywhere in the present article, but it involves all ideas underlying the proof of Theorem 2.1. Lemma. All objects (including functions and actions) are supposed to be definable in a universe of finite Morley rank. Let K, L be fields and U, V be vector spaces over K, L, respectively. Suppose there is a group T acting (not necessarily faithfully) by scalar multiplication on U, V , i.e. as a subgroup of K× , L× . 7 Let κ : T → K× and λ : T → L× be the associated group homomorphisms, and let ρ = κ × λ : T → K× × L× . Let α : U → V be a non-zero additive map and suppose that α is either T -covariant, i.e. α(t · u) = t · α(u), or T -contravariant, i.e. α(t · u) = t−1 · α(u). Then: • ker ρ = ker κ = ker λ; • if im κ (or equivalently, im λ) is infinite, then K ≃ L definably. Proof. Since α is non-zero, there is u0 ∈ U with α(u0 ) 6= 0. Let t ∈ ker κ. Then λ(t) · α(u0 ) = α(κ(t)±1 · u0 ) = α(u0 ) 6= 0, where the value ±1 depends on whether α is T -covariant or T contravariant; hence λ(t) = 1. Conversely, if t ∈ ker λ \ ker κ, then letting u1 = (κ(t) − 1)−1 · u0 one finds: α(u0 ) = α((κ(t) − 1) · u1 ) = λ(t)±1 · α(u1 ) − α(u1 ) = 0 which is a contradiction. We prove the second claim for a covariant map. Let FK,L = {(k, ℓ) ∈ K × L : ∀u ∈ U, α(k · u) = ℓ · α(u)}. One easily checks that FK,L is a definable subfield of the ring K × L. Also let GK,L = F× K,L . If im κ ≃ T / ker κ ≃ im λ is infinite, then so is ρ(T ) ≤ GK,L , and therefore FK,L too. It follows K ≃ L. The proof of the contravariant case is even more instructive. Let FK,L′ = {(k, ℓ) ∈ K × L \ {0} : ∀u ∈ U, ℓ · α(k · u) = α(u)} ∪ {(0, ∞)}. We claim that FK,L′ is a definable subfield of K × L′ ; perhaps the only non-trivial claim is stability under the additive law. So suppose (ki , ℓi ) ∈ K × L′ for i ∈ {1, 2}; the cases where ℓi = ∞ or ℓ1 + ℓ2 = 0 are easily dealt with, so we assume not. Then for u ∈ U : ℓ1 ℓ2 · (α(k1 · u) + α(k2 · u)) ℓ1 + ℓ2 ℓ1 ℓ2 · α(u) + · α(u) = ℓ1 + ℓ2 ℓ1 + ℓ2 = α(u) (ℓ1 ∗ ℓ2 ) · α((k1 + k2 ) · u) = as desired. Also let GK,L′ = {(k, ℓ) ∈ K× × L′× : ∀u ∈ U, ℓ · α(k · u) = α(u)}; clearly GK,L′ = F× K,L′ . If im κ is infinite, then by contravariance so are ρ(T ) ≤ GK,L′ and FK,L′ . Hence K ≃ L′ ≃ L. Using the same argument twice is unsatisfactory. So suppose again that α is T -contravariant. By means of the inverse isomorphism ιL : L ≃ L′ , view V as a vector space over L′ . Then α : U → V is T -covariant. Since the other assumptions and the statements are invariant under this change, the contravariant case actually reduces to the covariant one (first claim included). 2.2.3 Proof of Theorem 2.1 Proof of Theorem 2.1. Throughout the proof we assume εK = εL = εM = 1; we explain why in the end. The proof that ker ρ = ker κ ∩ ker λ = ker κ ∩ ker µ is essentially as in the previous Lemma. Since β is non-zero there is (u0 , v0 ) ∈ U × V with w0 = β(u0 , v0 ) 6= 0. If t ∈ ker κ ∩ ker λ, then µ(t) · w0 = β(κ(t) · u0 , λ(t) · v0 ) = w0 6= 0, so µ(t) = 1. Conversely for t ∈ (ker κ ∩ ker µ) \ ker λ, let v1 = (λ(t) − 1)−1 · v0 . Then: β(u0 , v0 ) = β(u0 , (λ(t) − 1) · v1 ) = β(κ(t) · u0 , λ(t) · v1 ) − β(u0 , v1 ) = µ(t) · β(u0 , v1 ) − β(u0 , v1 ) = 0 which is a contradiction. We now need a theory of notations. Notation. • Let FK,M = {(k, m) ∈ K × M : ∀(u, v) ∈ U × V, β(k · u, v) = m · β(u, v)}. • Let FK,L′ = {(k, ℓ) ∈ K × (L \ {0}) : ∀(u, v) ∈ U × V, β(k · u, ℓ · v) = β(u, v)} ∪ {(0, ∞)}. 8 • Let GK,L,M = {(k, ℓ, m) ∈ K× × L× × M× : ∀(u, v) ∈ U × V, β(k · u, ℓ · v) = m · β(u, v)}. • Let πK× : K× × L× × M× → K× denote projection on K× (define πL× and πM× likewise). • Let GK,M = GK,L,M ∩ ker πL× = {(k, 1, m) : (k, m) ∈ F× K,M }. • Let GK,L′ = GK,L,M ∩ ker πM× = {(k, ℓ, 1) : (k, ℓ) ∈ F× K,L′ }. One should also define FL,M and GL,M similarly. As in the above Lemma, FK,M is a definable subfield of K × M and FK,L′ is one of K × L′ . Clearly GK,L,M is a subgroup of K× × L× × M× ; by the covariance assumption, ρ(T ) ≤ GK,L,M . We are finally ready for the proof. Suppose ker κ/ ker ρ to be infinite. This means that ρ(ker κ) ≤ GK,L,M ∩ ker πK× = GL,M is infinite, and therefore so is FL,M : it follows that L ≃ M. Suppose that both ker κ/ ker ρ and im κ are infinite. Here again FL,M is infinite, so it surjects onto L: hence πL (FL,M ) = L and πL× (GL,M ) = L× . But since im κ is infinite too, GL,M has infinite index in ρ(T ) · GL,M ≤ GK,L,M . Therefore ker πL× ∩ GK,L,M = GK,M is infinite; so is FK,M , proving K ≃ M. Now suppose that ker µ/ ker ρ is infinite. This means that ρ(ker µ) ≤ GK,L′ is infinite, and therefore so is FK,L′ : it follows that K ≃ L′ ≃ L. Finally suppose that both ker µ/ ker ρ and im µ are infinite. Here again πL× (FK,L′ ) = L× (one should remember that L× and L′× have the same underlying set). But in addition, im µ is infinite, so GK,L′ has infinite index in ρ(T ) · GK,L′ ≤ GK,L,M : proving that ker πL× ∩ GK,L,M = GK,M is infinite, and K ≃ M. It remains to cover the other cases. Whenever εF = −1, view the corresponding F-vector space as a vector space over F′ via the inverse isomorphism ιF : F ≃ F′ . Then β is covariant in the usual sense β(t · u, t · v) = t · β(u, v). Remarks. • Tindzogho Ntsiri has another result [17, §5.1.2, Proposition 5.15 and Lemme 5.17] or [18, Proposition 3.10]: assuming the characteristic (which is obviously common to K, L, M, for instance by our method) is p and κ, λ, µ are onto, one has K+ ≃ L+ ≃ M+ and K× ≃ L× ≃ M× . We shall not use this. • The author does not care for n-additive maps with n ≥ 3. 2.3 Applied Tools: SL2 (K)-Modules We want some general results on SL2 (K)-modules of finite Morley rank; actually, part of the analysis requires less than the entire SL2 (K)-module structure and we shall try to clarify matters. This results in the notion of a non-trivial T -line, Definition 2.9 below. An important feature of our study is that we restrict to positive characteristic settings, as Fact B in §1.4 entirely settles the definable representation theory of algebraic groups in characteristic 0. From here on we adopt the following notations. Notation 2.2. • Let K be a definable field of positive characteristic p and G = SL2 (K); • let U be a maximal unipotent subgroup of G, B = NG (U ) be the associated Borel subgroup, and T ≤ B be an algebraic torus; • let w ∈ NG (T ) \ T (an element of order at most 4 inverting T ). Finally recall that H-module means: definable, connected, H-module. Fact G (from [3, Lemma B]). If V is a U -module, then the semi-direct product U ⋉ V is nilpotent. (One may however observe that this could fail in characteristic 0.) Notation 2.3. Let V be a U -module. 9 • Let Z0 = 0 and Zj+1 /Zj = CV◦ /Zj (U ). (As a consequence of Zilber’s Indecomposibility Theorem, [U, Zj+1 ] ≤ Zj .) • Let Yj = Zj /Zj−1 . • Let ℓU (V ) be the least integer with Zn = V . We call ℓU (V ) the U -length, or unipotence length, of V . (This is not the same measure as in the proof of Fact F.) By Fact G, the series (Zj ) is strictly increasing until one reaches ZℓU (V ) = V . Notice that if V is actually a B-module, then so are Zj and Yj . Lemma 2.4 (from [5, §2.1, Step 7]). Let V be a B-module. Then [U, CV (T )] ≤ [T, V ]. Proof. For brevity we let C = CV (T ) and D = [T, V ]. Let c0 ∈ C and u ∈ U \ {1}. Since V = C ⊕ D by Fact E, there is (c, d) ∈ C × D with [c0 , u] = c + d. Now for any t ∈ T , [c0 , t · u] = c + t · d ∈ hci + D. Since T · u generates U , one finds [c0 , U ] ≤ hci + D; by Zilber’s Indecomposibility Theorem and since the characteristic is finite, actually [c0 , U ] ≤ D, as desired. Lemma 2.5. Let V be a B-module of U -length exactly n and 2 ≤ j ≤ n. Then T cannot centralise both Yj and Yj−1 (see Notation 2.3). More precisely, if T centralises Yj−1 then CYj (T ) = 0. Proof. Let β : U × Yj → Yj−1 be given by: β(u, z + Zj−1 ) = [u, z] + Zj−2 It is routine to check that β is well-defined, bi-additive, and T -covariant. We claim that the right radical of β (usually denoted U ⊥ ) is finite. For if z + Zj−1 is βorthogonal to U , then [U, z] ≤ Zj−2 and z ∈ CV /Zj−2 (U ), the connected component of which is exactly Zj−1 . Now assuming that T centralises Yj−1 , let x ∈ CYj (T ) and (u, t) ∈ U × T ; one finds: β(t · u − u, x) = t · β(u, x) − β(u, x) = 0 Since [T, u] = U , we get β(U, x) = 0 for arbitrary x ∈ CYj (T ), forcing finiteness of the latter, and its triviality by connectedness of Yj and Fact E. Lemma 2.6. Let V be an irreducible G-module of U -length exactly n. Then Z1 ∩ w · Zn−1 is finite. Proof. We claim that V0 = hG · (Z1 ∩ w · Zn−1 )i ≤ Zn−1 . For let v ∈ Z1 ∩ w · Zn−1 and g ∈ G; by the Bruhat decomposition G = B ⊔ BwU there are two cases. • If g ∈ B, write g = tu with obvious notations; then g · v = t · v ∈ Z1 ≤ Zn−1 . • If g ∈ BwU then g = bwu and g · v = bw · v ∈ Zn−1 again. Since Zn−1 is proper in the irreducible G-module V , the G-module V0 is finite. Lemma 2.7. Let V be an irreducible G-module of U -length exactly n. Then T does not centralise Yn = Zn /Zn−1 = V /Zn−1 . Proof. Suppose it does. By Lemma 2.6, w · Z1 ∩ Zn−1 is finite, so for some finite K the quotient w · Z1 /K embeds into Yn as a T -module. It follows that T centralises w · Z1 /K: by connectedness of Z1 , T centralises w · Z1 . Also notice that by assumption and Fact E, [T, V ] ≤ Zn−1 . Now let u ∈ U be such that (uw)3 = 1 (see Notation 3.1 below if necessary), let i stand for the central involution of G (it is harmless to let i = 1 in characteristic 2), and a ∈ Z1 . Then: uwu · a = uwa = wa + [u, wa] = (wuw)−1 · a = wu−1 wa = ia + w[u−1 , wa]. Notice that [u, wa] ∈ [U, Zn ] ≤ Zn−1 . Moreover, since wa ∈ w · Z1 ≤ CV (T ), one has [u−1 , wa] ∈ [U, CV (T )] ≤ [T, V ] by Lemma 2.4, so w[u−1 , wa] ∈ w · [T, V ] = [T, V ] ≤ Zn−1 as observed. As a consequence wa = ia + w[u−1 , wa] − [u, wa] ∈ w · Z1 ∩ Zn−1 which is finite by Lemma 2.6, against Z1 being infinite. 10 Lemma 2.8. Let V be a B-module. For j 6= 1, Yj from Notation 2.3 is the direct sum of CYj (T ) and of non-central T -minimal modules of the same rank as K. If V is actually an irreducible G-module, then the same holds of j = 1. Proof. We already know from Fact E that Yj = CYj (T ) ⊕ [T, Yj ], so by Maschke’s Theorem (Fact F) the statement is about T -minimal submodules of the latter summand, if any. Let L ≤ [T, Yj ] be one such. Take again the bi-additive, T -covariant function β : U × Yj → Yj−1 from Lemma 2.5; remember that the right radical is finite. So the restriction β : U × L → Yj−1 is non-zero. Let M be a T -minimal subquotient of Yj−1 such that π ◦ β : U × L → M still remains non-zero. Now using the action of T on L, M respectively and Zilber’s Field Theorem, interpret fields L, M (possibly M = Fp if T centralises M ), then prepare to apply Theorem 2.1. Observe from the structure of Borel subgroups of SL2 (K) that here ker κ = Z(G) has order at most 2. Suppose rk L 6= rk K. Notice that ker◦ λ 6= 1; this is clear if rk L < rk K, and a consequence of Wagner’s Torus Theorem [19] if rk L > rk K as T ≃ K× cannot embed properly into L× in positive characteristic. Hence ker◦ λ and ker λ/ ker ρ are infinite. But also im◦ λ 6= 1 since otherwise T centralises L, against its definition. By Theorem 2.1, K ≃ L, against rk L = rk L 6= rk K. This shows rk L = rk K. If V is actually an irreducible G-module and j = 1, use Lemma 2.6 to embed w · Z1 into V /Zn−1 = Yn as a T -module (up to a finite kernel). Definition 2.9. A non-trivial T -line is a non-central, T -minimal module of same rank as K. For instance, it is a consequence of Lemmas 2.7 and 2.8 that Zn contains a non-trivial T -line not included in Zn−1 . Corollary 2.10. If V is an irreducible G-module, then [T, V ] is a direct sum of an even number of non-trivial T -lines. Proof. Let us refine the non-maximal B-series (Zj ) into a composition T -series: one gets T -central factors and non-trivial T -lines. The number of the latter must be even since w normalises [T, V ] and a w-invariant, T -minimal module must be centralised by T , as there are no definable groups of automorphisms of fields of finite Morley rank [4, Theorem 8.3]. The careful reader will observe that one ought to pay more attention to factors in composition series than we just did: since we work in the connected category, uniqueness in a Jordan-Hölder property can hold only up to isogeny. But in the case of connected T -modules, this is harmless. Remarks. • A weaker result had been obtained by Tindzogho Ntsiri [17, §5.2.2, Proposition 5.31] or [18, Theorem 4.6] under the assumption that SL2 (K) acts faithfully on V . • These results are far from optimal. The main problem is that the centraliser CV (T ) could be “scattered” among the various Yj , i.e. CYj (T ) could be non-zero for several indices, something prohibited in the algebraic setting. This for the moment seems to be the major obstruction to understanding the B-structure of SL2 (K)-modules of arbitrary rank, and we view it as a crucial investigation to lead in the near future. 3 Proof of the Main Theorem Let us state our result again. Theorem. Definable in a universe of finite Morley rank, let K be a field, G = SL2 (K), and V be an irreducible G-module of rank ≤ 4 rk K. Suppose the characteristic of K is neither 2 nor 3. Then there is a definable K-vector space structure on V such that V , as a K[G]-module, V is definably isomorphic to one of the following: • Nat G, the natural representation; 11 • Ad G ≃ Sym2 Nat G, the adjoint representation; • Sym3 Nat G, the rational representation of degree 4 on K[X 3 , X 2 Y, XY 2 , Y 3 ]; • Nat G ⊗ χ (Nat G), a twist-and-tensor representation for some definable χ ∈ Aut(K). Let us confess again that we do not know what happens in low characteristic. 3.1 Notations and Facts The characteristic 0 case is covered by Fact B from §1.4, so let us turn to positive characteristics. We keep and extend Notations 2.2 (see §2.3); as a matter of fact we need to coordinatise G = SL2 (K). Notation 3.1. For λ ∈ K+ (resp., K× ), let:    t 1 λ uλ = , tλ = λ 1 t−1 λ  , w=  1 −1  We let i = t−1 be the central involution of G (by assumption, p 6= 2); of course w2 = i. Notice that letting U = {uλ : λ ∈ K+ } ≃ K+ and T = {tλ : λ ∈ K× } ≃ K× is consistent with Notation 2.2. Also notice that tµ uλ t−1 µ = uλµ2 . Finally check that: uλ wuλ−1 wuλ w = tλ For brevity let u = u1 ; then the above relation simplifies into (uw)3 = 1. Notation 3.2. Let V be an irreducible G-module of rank ≤ 4 rk K. For brevity let k = rk(K). Notation 3.3. For λ ∈ K, let ∂λ = aduλ : V → V map v to [uλ , v] = uλ v − v. For brevity let ∂ = ∂1 . Hence ∂λ = uλ − 1 in End(V ). Notice that tµ ∂λ t−1 µ = ∂λµ2 . The rank 4k analysis starts here. The structure of the proof is rather straightforward. We first bound the unipotence length in Proposition 3.4 (§3.2). Small rank cases, where rk V ≤ 3k, are known by [7] and [5]; we however give shorter proofs in §3.3. Then real things begin. We cover Sym3 Nat G in Proposition 3.5 (§3.4), and then Nat G ⊗ χ (Nat G) in Proposition 3.6 (§3.5). We shall rely on a non-model-theoretic investigation of Symn Nat G. In the following, composition series are in the classical sense (no definability nor connectedness required). Fact H ([9, Theorem 1]). Let V be a Q[SL2 (Z)]-module. Suppose that for every unipotent element u ∈ SL2 (Z), (u − 1)5 = 0 in End(V ). Then V has a composition series each factor of which is a direct sum of copies of Q ⊗Z Symk Nat SL2 (Z) for k ∈ {0, . . . , 4}. Although Fact H is stated for SL2 (Z)-modules, its highly computational proof readily adapts to Fp [SL2 (Fp )]-modules, provided p is greater than the unipotence length; incidently the author does not know whether a character-theoretic proof exists in that case. One should however refrain from using Fact H. As indicated by [9, Proposition 2], there are deep geometric reasons which prevent the computation from extending to length ≥ 7, at least for Q[SL2 (Z)]-modules. So we are dissatisfied with this result, albeit next-to-optimal. A result we are satisfied with is the following. Fact I ([9, Theorem 2]). Let n ≥ 2 be an integer and K be a field of characteristic 0 or ≥ 2n + 1. Suppose that K is 2(n − 1)!!-radically closed. Let G = SL2 (K) and V be a G-module. Let K1 be the prime subfield and G1 = SL2 (K1 ). Suppose that V is a K1 -vector space such that V ≃ ⊕I Symn−1 Nat G1 as K1 [G1 ]-modules. Then V bears a compatible K-vector space structure for which one has V ≃ ⊕J Symn−1 Nat G as K[G]-modules. Moreover, the linear structure is definable over G by construction. 12 3.2 Bounding the Length Proposition 3.4. V as in Notation 3.2 has U -length at most 4. Proof. If there are four non-trivial T -lines (see Definition 2.9) we are done for rank reasons. So suppose there are only two. By Lemma 2.7 at least one occurs in the final factor Yn ; by Lemma 2.5 the other one cannot occur more than two steps afar, and cannot be more than two steps away from Z0 . The worst case is therefore where the two lines occur at stages 2 and 4: ℓU (V ) ≤ 4. 3.3 Warming up: Shorter Proofs in Rank 3k Since one can also measure technical progress in a topic by the ability to produce shorter proofs of existing theorems, we shall now revisit two earlier results. Fact J (rank 2k analysis: [7, Theorem B]). If V as in Notation 3.2 has rank ≤ 2k, then there is a definable K-vector space structure such that V ≃ Nat G. The proof will appear only marginally shorter than the original argument, but it is self-contained as opposed to [7] which relied on work by Timmesfeld [16, Theorem 3.4]. (From the latter we extract only the core computation, the group SL2 (K) being already identified and coordinatised.) Proof. For rank reasons, it follows from Corollary 2.10 that [T, V ] is the direct sum of exactly two non-trivial T -lines. As a consequence, V = Z2 has U -length 2 and CV (T ) = 0. Now let a ∈ Z1 ; with a look at Notation 3.3, set b = ∂wa = [u, wa] ∈ [U, V ] ≤ Z1 , and c = ∂wb ∈ Z1 . One finds: (uw)2 · a = uw(wa + b) = ia + wb + c = (uw)−1 · a = iwu−1 a = iwa so w(ia − b) = ia + c ∈ Z1 ∩ w · Z1 ≤ CV (U, wU w−1 ) = CV (G) ≤ CV (T ) = 0. Hence b = ia. Now for arbitrary λ ∈ K× , one still has tλ a ∈ Z1 so: uλ2 wa = tλ utλ−1 wa = tλ uwtλ a = tλ (wtλ a + itλ a) = wa + itλ2 a and since K is algebraically closed, one finds uλ wa = wa + itλ a. We may now define the vector space structure. On Z1 let λ · a = tλ a; on w · Z1 let λ · (wa) = w(λ · a). This is obviously additive in a and multiplicative in λ; moreover, since U centralises [U, V ] ≤ Z1 , (λ + µ) · a = tλ+µ a = i[uλ+µ , wa] = i(uλ · [uµ , wa] + [uλ , wa]) = i2 (tµ a + tλ a) = λ·a+µ·a so this does define a linear structure on Z1 ⊕ w · Z1 . (We already observed that the sum is direct indeed.) We claim that Z1 ⊕ w · Z1 is then a K[G]-module. First observe that it is hw, U i = G-invariant alright. By construction w acts linearly. Linearity of U is obvious on Z1 . Now for (λ, µ) ∈ K2 and a ∈ Z1 , one has: uµ (λ · wa) = uµ w(λ · a) = w(λ · a) + itµ tλ a = λ · wa + λ · (itµ a) = λ · uµ a which proves linearity of U on w · Z1 too. By irreducibility, V = Z1 ⊕ w · Z1 which is clearly isomorphic to Nat G. Remarks. • The argument applies to an irreducible G-module of U -length exactly 2 such that CV (T ) = 0, without mentioning the rank nor even its finiteness: this is a special case of Facts H and I. • In the case of an irreducible G-module of U -length exactly 2 such that CV (T ) = 0, there are no restrictions on the characteristic, which may be 0, 2 or 3 in the above computation. 13 • In order to remove from the latter the CV (T ) = 0 assumption in a finite Morley rank setting, one can follow [7, Claim 5.7] or its generalisation to SLn (K) [3, Proposition 2.1, Claim 1]. Fact K (rank 3k analysis: [5]). If V as in Notation 3.2 has rank ≤ 3k, then there is a definable Kvector space structure such that either V ≃ Nat G or V ≃ Sym2 Nat G (the adjoint representation). Proof. We may assume rk V > 2k; then ℓU (V ) ≥ 3 since otherwise V /CV (G) has rank 2k, and V has too by finiteness of CV (G). Here again, [T, V ] is the direct sum of two non-trivial T -lines; it follows that CV (T ) is infinite; in particular, the central involution i acts as 1. Notice that [U, CV (T )] 6= 0 as otherwise U centralises CV (T ) = w · CV (T ), so G = hU, wU w−1 i centralises CV (T ); by irreducibility the latter is therefore finite (notice that we did not reduce to CV (G) = 0), a contradiction. Hence [U, CV (T )] 6= 0; on the other hand equality does not hold in the inclusion [U, CV (T )] ≤ [T, V ] given by Lemma 2.4: as otherwise [T, V ] is hU, wi = G-invariant, so by irreducibility again, V = [T, V ], against CV (T ) 6= 0. The conclusion of the above analysis is that [U, CV (T )] consists in exactly one non-trivial T -line L; it follows that [T, V ] = L ⊕ w · L. Since L is U -invariant and T -minimal, it is centralised by U ; hence L ≤ Z1 . By Lemma 2.7 there is a non-trivial T -line in Yn , where n > 2 is the unipotence length, and in particular there is none in Yn−1 , . . . , Y2 : so by Lemma 2.5, n − 1 = 2; V is a cubic module in the sense [U, U, U, V ] = 0. Let us study its structure further. First we see that T centralises Y2 . A priori, by Fact E, one should expect Z1 = L ⊕ X1 with X1 = CZ1 (T ). But by Lemma 2.6, w · X1 embeds (modulo a finite kernel) into Y3 : both w · X1 and Y2 are centralised by T , which violates Lemma 2.5. So X1 = 0 and Z1 = L = [U, CV (T )]. Likewise, [T, Y3 ] = Y3 is a non-trivial T -line. Rank reasons then yield V = L ⊕ CV (T ) ⊕ w · L. It is time to identify the action. Over the prime field Fp one could rely on Fact H but this is not the spirit, so we perform a subset of the mentioned computations. In view of the decomposition V = L ⊕ CV (T ) ⊕ w · L, there are additive maps c : L → CV (T ) and ℓ : L → L such that for any a ∈ L = Z1 , one has uwa = wa + c(a) + ℓ(a). Recall from Notation 3.3 that ∂ stands for adu = u − 1 ∈ End(V ). Hence: uwuwa = uw(wa + c(a) + ℓ(a)) = a + wc(a) + ∂wc(a) + wℓ(a) + c(ℓ(a)) + ℓ(ℓ(a)) −1 = (uw) a = wa Projecting onto w · L, one finds ℓ(a) = a; projecting onto CV (T ), wc(a) = −c(ℓ(a)) = −c(a). If c(a) = 0 for a 6= 0, then actually uwa = wa + a and therefore wa = (uw)−1 a = (uw)2 a = uw(wa + a) = a + wa + a, a contradiction to the characteristic not being 2. So c : L → CV (T ) is injective, and therefore rk CV (T ) ≥ k; c is also surjective, so the previous computation shows that w inverts CV (T ). Now let d(a) = ∂c(a) ∈ [U, CV (T )] = L. Find: uwuwc(a) = −uw(c(a) + d(a)) = c(a) + d(a) − wd(a) − c(d(a)) − d(a) = (uw)−1 c(a) = wc(a) − wd(a) = −c(a) − wd(a) so c(d(a)) = 2c(a). Since the map c : L → CV (T ) is injective, d(a) = 2a. It is now clear that V is a direct sum of copies of Sym2 Nat G1 , where G1 = hu, wi = SL2 (Fp ). We then apply Fact I. Since the resulting K-linear structure is definable, there is a definable isomorphism with Sym2 Nat G. (After reading again the end of the argument of [5], we have no clue what Cherlin meant that day.) Remarks. • Here we did assume that the characteristic was neither 0 (at the beginning of the argument, when we used Lemma 2.4) nor 2 (at the end of the argument, for our computations); it could however be 3. 14 • The characteristic 2 case is dealt with quickly in [5]; remember that the characteristic 0 case is most efficiently handled by the model theory of Fact B. • The argument does not classify all cubic SL2 (K)-modules of finite Morley rank (if it did there would be no Proposition 3.6). What it does classify is those cubic modules with descending coherence degree κ(V ) ([8, §5]) equal to 1, i.e. with Z1 = ker ∂; there are no assumptions on the rank. The interested reader should try to prove directly that ker ∂ = Z1 in the rk V ≤ 3k configuration; even our quickest argument goes through splitting V = L ⊕ CV (T ) ⊕ w · L. 3.4 The Quartic Analysis Proposition 3.5. If V as in Notation 3.2 has U -length exactly 4, then there is a definable K-vector space structure such that V ≃ Sym3 Nat G. Before the proof it could be good to remind the reader that Sym3 Nat G is naturally isomorphic to the representation of SL2 (K) in the 4-dimensional space K[X 3 , X 2 Y, XY 2 , Y 3 ] of homogeneous polynomials in X, Y with degree 3, and to encourage him to perform a few calculations there (exponentiating the action of the Lie algebra is an alternative to direct computation). Proof of Proposition 3.5. 3.5.1 — Notation. For j = 1 . . . 4, let Žj = (Zj ∩ w · Zn+1−j )◦ (here n = 4). 3.5.2 — Claim. V = ⊕4j=1 Žj . Proof. If V = [T, V ], the claim follows from 2.10: in that case and for a rank reason, V is a direct sum of exactly four non-trivial T -lines, and since the U -length is exactly four, one sees that each Yi is a non-trivial T -line. Then intersections are easily taken. Notice that V = [T, V ] would follow from the next Claim 3.5.3 — but we do not know the action of the central involution yet. So let us assume towards a contradiction that CV (T ) 6= 0. Now there are exactly two non-trivial T -lines. Since T does not centralise Y4 by Lemma 2.7, and in view of Lemma 2.5, these lines are in Y2 and Y4 (an argument already used for Proposition 3.4). At this point T centralises Y1 and Y3 , so by Lemma 2.5 again, [T, Y4 ] = Y4 is a non-trivial T -line. On the other hand, by Lemma 2.6, w · Z1 embeds modulo a finite kernel into Y4 , so w · Z1 is a non-trivial T -line: Z1 as well, a contradiction. ♦ 3.5.3 — Claim. The central involution i acts as −1. Proof. The awful computation underlying Fact H (more specifically, [9, §1.2.7]) is not fully conclusive since one could imagine a globally quartic PSL2 (Z)-module which splits into cubic-by-cubic. So let us compute. Suppose i acts as 1; fix a ∈ Z1 . Noticing w · Ž2 = Ž3 and given the decomposition of Claim 3.5.2, there are additive maps α : Z1 → Z1 , and β, γ : Z1 → Ž2 such that: uwa = wa + wγ(a) + β(a) + α(a) Hence: uwuwa = a + γ(a) + ∂γ(a) + wβ(a) + ∂wβ(a) + wα(a) + wγ(α(a)) + β(α(a)) + α(α(a)) = (uw)−1 a = wa Projecting onto Ž4 one finds α(a) = a, then projecting onto Ž3 one finds γ(a) = −β(a), so finally ∂wβ(a) = ∂β(a) − 2a. Then letting δ(a) = ∂β(a) − 2a ∈ Z1 : uwuwβ(a) = uw(wβ(a) + δ(a)) = β(a) + ∂β(a) + wδ(a) − wβ(δ(a)) + β(δ(a)) + δ(a) −1 = (uw) β(a) = wβ(a) − w∂β(a) 15 Now this yields δ(a) = −∂β(a) = ∂β(a) − 2a, and ∂β(a) = a = −δ(a). Hence ∂wa = −wβ(a) + β(a) + a entails ∂ 2 wa = 0. We just proved ∂ 2 (w · Z1 ) = 0; conjugating by T , one has ∂λ2 (w · Z1 ) = 0 for any λ ∈ K; since the characteristic is not 2, ∂λ ∂µ (w · Z1 ) = 0 for any (λ, µ) ∈ K2 . This means w · Z1 ≤ Z2 . Now Lemma 2.6 forces the U -length to be 2, a contradiction. ♦ 3.5.4 — Claim. For λ ∈ K× there is an abelian group homomorphism βλ : Z1 → Ž2 such that for any a ∈ Z1 : uλ wa = wa + wt−1 λ βλ (a) + βλ (a) − tλ a As a matter of fact, βλ2 (a) = tλ β1 (tλ a). Proof. We shall first do it over the prime field, i.e. for λ = 1, and vary the field and values of λ afterwards. So for the moment set λ = 1; this is a quick computation, very similar to Claim 3.5.3 (as a matter of fact, one could reach both Claims simultaneously but the exposition may not benefit from doing so). Fix a ∈ Z1 . Noticing w · Ž2 = Ž3 and given the decomposition of Claim 3.5.2, one should expect additive maps α : Z1 → Z1 , and β, γ : Z1 → Ž2 such that: uwa = wa + wγ(a) + β(a) + α(a) Bearing in mind that (uw)3 = 1, one finds: uwuw · a = u(−a − γ(a) + wβ(a) + wα(a)) = −a − γ(a) − ∂γ(a) + wβ(a) + ∂wβ(a) + wα(a) + wγ(α(a)) + β(α(a)) + α(α(a)) = (uw)−1 a = −wu−1 a = −wa Projecting onto Ž4 = w·Z1 , this yields α(a) = −a; projecting onto Ž3 , one finds γ(a) = −β(α(a)) = β(a). Now let λ ∈ K× and ℓ ∈ K× be a square root. Then: uλ wa = tℓ ut−1 ℓ wa = tℓ uwtℓ a = tℓ (wtℓ a + wβ(tℓ a) + β(tℓ a) − tℓ a) = wa + tℓ wβ(tℓ a) + tℓ β(tℓ a) − tλ a = wa + wt−1 λ tℓ β(tℓ a) + tℓ β(tℓ a) − tλ a So one should let βλ (a) = tℓ β(tℓ a) to find the desired decomposition. ♦ Model theory, more specifically connectedness arguments, will play a role in the next Claim. Without finiteness of the rank, it might fail (the brave should see [9, §1.2.8]). 3.5.5 — Claim. βλ : Z1 → Ž2 is a group isomorphism. Proof. Let a ∈ Z1 , and introduce the definable sets A = {µ ∈ K× : βµ (a) = 0} ∪ {0} and X = K+ \ A. Suppose A 6= 0 and fix some λ ∈ A \ {0}, ie. with βλ (a) = 0. Thanks to Claim 3.5.4, one has for arbitrary µ ∈ K× : uµ uλ wa = uµ (wa − tλ a) = wa + wt−1 µ βµ (a) + βµ (a) − tµ (a) − tλ (a) = uλ+µ wa = wa + wt−1 λ+µ βλ+µ (a) + βλ+µ (a) − tλ+µ a Projecting onto Ž2 , one finds βλ+µ (a) = βµ (a). Hence A is a subroup of K+ . Let µ ∈ X, i.e. with βµ (a) 6= 0, if there is such a thing. Returning to the equation and now −1 projecting onto Ž3 , one finds tµ−1 βµ (a) = t−1 λ+µ βλ+µ (a) = tλ+µ βµ (a). Hence t(λ+µ)µ−1 centralises βµ (a) 6= 0. Then by T -minimality of Ž2 and Zilber’s Field Theorem, t(λ+µ)µ−1 centralises all of Ž2 . 16 Therefore X ⊆ {µ ∈ K× : t(λ+µ)µ−1 ∈ CT (Ž2 )}. But CT (Ž2 ) is proper (hence not of maximal rank) in the connected group T , and the map µ 7→ 1 + µλ is injective on X, so X is not of maximal rank in K+ . Hence A is of maximal rank, but it also is a subgroup. This proves A = K+ [4, Corollary 5.13 if not obvious], and βµ (a) = 0 for any µ ∈ K× . In particular, uµ wa = wa − tµ a for all µ ∈ K× ; now hG · ai is easily seen to be a quadratic module, hence by irreducibility, a = 0. A rank argument then proves the claim. ♦ 3.5.6 — Claim. For a ∈ Z1 , one has ∂β(a) = −3a. Proof. Return to the decomposition obtained in Claim 3.5.4: letting β = β1 , one has uwa = wa + wβ(a) + β(a) − a. Then: uwuwa = uw(wa + wβ(a) + β(a) − a) = −a − β(a) − ∂β(a) + wβ(a) + ∂wβ(a) − wa − wβ(a) − β(a) + a = (uw)−1 a = −wu−1 a = −wa So that ∂wβ(a) = 2β(a) + ∂β(a). Now let q = ∂β(a) ∈ Z1 . Then: uwuwβ(a) = uw(wβ(a) + 2β(a) + q) = −β(a) − q + 2wβ(a) + 4β(a) + 2q + wq + wβ(q) + β(q) − q = wq + wβ(q + 2a) + β(q + 3a) −1 = (uw) β(a) = −w(β(a) − q) = wq − wβ(a) This forces β(q + 3a) = 0, so by Claim 3.5.5, q = −3a, as desired. ♦ 3.5.7 — Claim. There is a K-vector space structure on V for which V ≃ Sym3 Nat G. Proof. At this stage we could rely on Fact H to determine the structure of V as a G1 -module, where G1 = SL2 (Fp ). The argument would be as follows. First, we compute the descending coherence degree κ(V ) in the sense of [8, §5]; more precisely we show κ(V ) = 1, viz. ker ∂ = Z1 . One inclusion is clear; for the other, let v ∈ ker ∂. In view of Claim 3.5.2, we may suppose v = wa + wb + c for a ∈ Z1 and (b, c) ∈ Ž22 . It is not hard to see that ∂wb = −β(∂b) + ∂b, so that 0 = ∂v = wβ(a) + β(a) − a − β(∂b) + ∂b + ∂c. Projecting onto Ž3 , one has β(a) = 0 whence a = 0 by Claim 3.5.5; then projecting onto Ž2 , β(∂b) = 0 whence ∂b = 0; finally ∂c = 0. But since β : Z1 → Ž2 is onto by Claim 3.5.6, one sees that β(∂b) = −3b = 0, so b = c = 0, and v = 0. This proves ker ∂ = Z1 . Now by Fact H, more specifically [9, §1.2.8] (“n = 4, i = −1”) there, as a G1 -module, V has a composition series (in the classical sense of the term) 0 ≤ V1 ≤ V2 ≤ V with V1 and V2 /V1 isomorphic to sums of copies of Nat G1 , and V /V2 a sum of copies of Sym3 Nat G1 . However, the quadratic radical over G1 is G1 -generated by ker ∂ ∩ w · ker ∂ 2 = Z1 ∩ w · Z2 , and by Lemma 2.6, the latter is contained in CV (T ) = 0, so V2 = 0 and V ≃ V /V2 has the desired structure under G1 . As a matter of fact we do not need [9, Theorem 1] since we already know that for a ∈ Z1 , hold uwa = wa + wβ(a) + β(a) − a and ∂β(a) = −3a: from there and the decomposition of Claim 3.5.2, constructing a G1 -isomorphism with Sym3 Nat G1 is actually immediate. In order to recover a K-linear structure, we now use Fact I (more accurately, [9, Theorem 2] and the remark following it to justify working in characteristic 6= 2, 3). ♦ This completes the proof of Proposition 3.5. 17 3.5 The Tensor Analysis And now let us do the twist. Proposition 3.6. If V as in Notation 3.2 has rank > 3k and U -length ≤ 3, then there are a definable K-vector space structure and a definable automorphism χ of K such that V ≃ Nat G ⊗ χ (Nat G) (twist-and-tensor). Before the proof begins it could be useful to work out the details of the target module. Example 3.7. Let ϕ, ψ ∈ Aut(K). Let K2 have basis:     1 0 e1 = , e2 = 0 1 Then in the twisted representation ϕ (Nat G), one has:    uλ · e1 tλ · e1 = ϕ(λ)e1 w · e1 = −e2 , , uλ · e2 tλ · e2 = ϕ(λ)−1 e2 w · e2 = e1 Now ϕ (Nat G) ⊗ ψ (Nat G) by:  w · e1 ⊗ e1    w · e1 ⊗ e2 w · e2 ⊗ e1    w · e2 ⊗ e2  uλ · e1 ⊗ e1    uλ · e1 ⊗ e2  uλ · e2 ⊗ e1   uλ · e2 ⊗ e2 = e1 = ϕ(λ)e1 + e2 has basis (e1 ⊗ e1 , e1 ⊗ e2 , e2 ⊗ e1 , e2 ⊗ e2 ), and the action there is given = = = = = = = =  e2 ⊗ e2 tλ · e 1 ⊗ e 1    −e2 ⊗ e1 tλ · e 1 ⊗ e 2 , −e1 ⊗ e2  t λ · e2 ⊗ e1   e1 ⊗ e1 tλ · e 2 ⊗ e 2 = = = = ϕ(λ)ψ(λ)e1 ⊗ e1 ϕ(λ)ψ(λ)−1 e1 ⊗ e2 , ϕ(λ)−1 ψ(λ)e2 ⊗ e1 −1 −1 ϕ(λ) ψ(λ) e2 ⊗ e2 e1 ⊗ e1 ψ(λ)e1 ⊗ e1 + e1 ⊗ e2 ϕ(λ)e1 ⊗ e1 + e2 ⊗ e1 ϕ(λ)ψ(λ)e1 ⊗ e1 + ϕ(λ)e1 ⊗ e2 + ψ(λ)e2 ⊗ e1 + e2 ⊗ e2 The reader should keep these in mind during the forthcoming proof. Proof of Proposition 3.6. 3.6.1 — Claim. The central involution acts as 1. Proof. The value of the central involution could be read from [9]; we shall argue more directly. Suppose i = −1 and let a1 ∈ Z1 . Let b2 = ∂wa1 ∈ [U, V ] ≤ Z2 . Then: uwuw · a1 = uw(wa1 + b2 ) = −a1 + wb2 + ∂wb2 = (uw)−1 · a1 = −wa1 This suggests to write b2 as q2 − a1 , with q2 ∈ Z2 . Hence: −wa1 = −a1 + wq2 − wa1 + ∂wq2 − (q2 − a1 ) and therefore uwq2 = q2 ; in particular wq2 ∈ Z2 . Now let r1 = ∂q2 ∈ Z1 ; observe how q2 = (uw)−1 q2 = −w(q2 − r1 ) = wr1 − wq2 , so wr1 = (1 + w)q2 ∈ w · Z1 ∩ Z2 . The latter is finite by Lemma 2.6; since 1 + w is a bijection, there are finitely many possible values for q2 . But the map a1 7→ q2 is additive from the connected group Z1 , so q2 = 0. This means that for any a1 ∈ Z1 one has ∂wa1 = −a1 ∈ Z1 , and therefore ∂ 2 w · Z1 = 0. We argue as in the end of Claim 3.5.3 of Proposition 3.5 to reach a contradiction. ♦ 3.6.2 — Claim. V = Z1 ⊕ L ⊕ w · L ⊕ w · Z1 , where Z1 and L are non-trivial T -lines, and L ≤ Z2 . Proof. We shall first show that Z2 ∩w·Z2 is infinite by an argument similar to Claim 3.6.1. Suppose Z2 ∩ w · Z2 is finite. Then for a1 ∈ Z1 , letting b2 = ∂wa1 ∈ Z2 and c2 = ∂wb2 ∈ Z2 : uwuwa1 = a1 + wb2 + c2 = wa1 so a1 − b2 ∈ Z2 ∩ w · Z2 which we assumed finite. Here again, a1 7→ a1 − b2 is additive, so b2 = a1 ; then uwa1 = wa1 + a1 , implying a1 = (uw)3 a1 = 3a1 + 2wa1 , and since the characteristic is not 2, 18 wa1 = −a1 ∈ Z1 ∩ w · Z1 which is finite by Lemma 2.6, against Z1 being infinite. So Z2 ∩ w · Z2 is infinite. Now suppose that CV (T ) 6= 0. Notice that this reduces the number of non-trivial T -lines to exactly 2. Since T does not centralise Y3 by Lemma 2.7, not both these lines are in Z2 ; so by Lemma 2.5 there is exactly one non-trivial T -line contained in Z2 , call it L. Still assuming CV (T ) 6= 0, suppose in addition L ≤ Z1 . Then Y2 is centralised by T ; by Lemma 2.5, CY3 (T ) = 0. But since w · Z1 embeds into Y3 (as a T -module and modulo a finite kernel), we find CZ1 (T ) = 0, that is, Z1 = L. On the other hand, rk CV (T ) = rk V − 2k > k. The map ∂ : CV (T ) → V has image ∂(CV (T )) ≤ [U, CV (T )] ≤ [T, V ] by Lemma 2.4, but also im ∂ ≤ [U, V ] ≤ Z2 , so im ∂ ≤ ([T, V ] ∩ Z2 )◦ = L of rank exactly k, and ∂ : CV (T ) → V has infinite kernel: there are infinitely many c ∈ CV (T ) with [u, c] = 0. Applying T , any such c is actually centralised by U : hence (CV (T ) ∩ Z1 )◦ 6= 0, contradicting Z1 = L, a non-trivial T -line. So, under the assumption CV (T ) 6= 0, the only non-trivial T -line in Z2 is not contained in Z1 : hence T centralises Z1 . By Lemma 2.5 again, CY2 (T ) = 0, and this shows Z2 = Z1 ⊕ L. So if an element v lies in Z2 ∩ w · Z2 , it has decompositions v = z + ℓ = wz ′ + ℓ′ with z, z ′ ∈ Z1 and ℓ, ℓ′ ∈ L. Now ℓ − wℓ′ ∈ CV (T ) ∩ [T, V ] = 0, and ℓ = wℓ′ ∈ L ∩ w · L = 0. Hence v = z = wz ′ ∈ Z1 ∩ w · Z1 which is finite by Lemma 2.6: we just contradicted Z2 ∩ w · Z2 being infinite. As a conclusion, CV (T ) = 0 and V is therefore the direct sum of non-trivial T -lines, the number of which can only be 4. But remember that Ž2 = (Z2 ∩ w · Z2 )◦ is infinite. Being a proper hT, wi-submodule of V , it is the sum of exactly two non-trivial T -lines: Ž2 = L⊕w ·L. Notice that Z1 ∩ Ž2 ≤ Z1 ∩w ·Z2 which is finite by Lemma 2.6, hence trivial since CV (T ) = 0. This way we reach V = Z1 ⊕L⊕w·L⊕w·Z1 . ♦ 3.6.3 — Claim. For λ ∈ K× there is an abelian group isomorphism βλ : Z1 ≃ L such that for any a ∈ Z1 : uλ wa = wa − tλ wβλ (a) + βλ (a) + tλ a As a matter of fact, βλ2 (a) = tλ β1 (tλ a). Finally, β = β1 : Z1 → L and ∂ : L → Z1 are converse bijections. Proof. This is very much like Claim 3.5.4 in the proof of Proposition 3.5. Fix a ∈ Z1 . Given the decomposition of Claim 3.6.2, one should expect additive maps α : Z1 → Z1 and β, γ : Z1 → L such that: uwa = wa + wγ(a) + β(a) + α(a) Bearing in mind that (uw)3 = 1, one finds: uwuw · a = u(a + γ(a) + wβ(a) + wα(a)) = a + γ(a) + ∂γ(a) + wβ(a) + ∂wβ(a) + wα(a) + wγ(α(a)) + β(α(a)) + α(α(a)) −1 = (uw) a = wu−1 a = wa (1) Projecting onto w · Z1 , this yields α(a) = a; projecting onto w · L, one finds γ(a) = −β(a). Moving from β1 = β to βλ is exactly as in Claim 3.5.4 from the proof of Proposition 3.5 Additivity of βλ is obvious; we did not prove that βλ is an isomorphism, which will be a consequence of the next. ♦ 3.6.4 — Claim. One has ∂λ βλ (a) = tλ a and ∂λ−1 wβλ (a) = −a. For b ∈ L, one has ∂λ wb = −∂λ tλ b. Proof. Equation (1) from Claim 3.6.3 now rewrites as ∂wβ(a) − ∂β(a) + 2a = 0. Let r = ∂β(a) ∈ [U, L] ≤ Z1 , then compute again: uwuwβ(a) = uw(wβ(a) + r − 2a) = β(a) + r + w(r − 2a) − wβ(r − 2a) + β(r − 2a) + (r − 2a) =w −1 −1 u β(a) = wβ(a) − wr 19 so projecting onto w·Z1 we find 2r = 2a; the characteristic not being 2, this results in a = r = ∂β(a) and ∂wβ(a) = −a. Incidently, this shows that the additive map β : Z1 → L is injective, and therefore surjective as well. The inverse map is clearly ∂ : L → Z1 . −1 Now for λ ∈ K, one has ∂λ βλ (a) = tℓ ∂t−1 ℓ tℓ β(tℓ a) = tλ a and ∂λ−1 wβλ (a) = tℓ ∂tℓ wtℓ β(tℓ a) = −a. Finally let b ∈ L; since βλ−1 : Z1 → L is a bijection, there is a ∈ Z1 with b = βλ−1 (a). Hence: ∂λ wb = ∂λ wβλ−1 (a) = −a = −tλ tλ−1 a = −tλ ∂λ−1 βλ−1 a = −∂λ tλ b ♦ 3.6.5 — Claim. In End(L), β∂λ + β∂µ = β∂λ+µ and (β∂λ )(β∂µ ) = β∂λµ for any (λ, µ) ∈ K2 . Proof. This will be tedious; the author strongly suspects that the second half of the argument could be made shorter with more culture on Jordan rings; incidently, it is not surprising to see Jordan rings appear in a cubic action (see the preprint [11] with the proviso that our setting smoothes many arguments). Let ψλ = β∂λ : L → L and ψ : K → End(L) map λ to ψλ . In general one has ∂λ+µ = ∂λ +∂µ +∂λ ∂µ ; here, since L ≤ Z2 , ψ is additive. What we must now prove is that ψ is multiplicative as well. Fix λ and µ ∈ K× . Then in view of Claims 3.6.3 and 3.6.4:  uλ uµ wa = uλ wa − wt−1 µ βµ (a) + βµ (a) + tµ a = wa − wt−1 λ βλ (a) + βλ (a) + tλ a −1 − wt−1 µ βµ (a) − ∂λ wtµ βµ (a) + βµ (a) + ∂λ βµ (a) + tµ a = uλ+µ wa = wa − wt−1 λ+µ βλ+µ (a) + βλ+µ (a) + tλ+µ a so projecting on the various summands one finds: −1 −1 t−1 λ βλ (a) + tµ βµ (a) = tλ+µ βλ+µ (a); βλ (a) + βµ (a) = βλ+µ (a); tλ a − ∂λ wt−1 µ βµ (a) + ∂λ βµ (a) + tµ a = tλ+µ a (2) But we also know from Claim 3.6.4 that tλ+µ a = ∂λ+µ βλ+µ (a); hence using im βλ = L ≤ Z2 : tλ+µ a = ∂λ+µ βλ+µ (a) = ∂λ βλ (a) + ∂λ βµ (a) + ∂µ βλ (a) + ∂µ βµ (a) = tλ a + ∂λ βµ (a) + ∂µ βλ (a) + tµ a −1 Putting this with Equation (2), one gets ∂µ βλ (a) = −∂λ wt−1 µ βµ (a), which equals ∂λ tλ tµ βµ (a) by Claim 3.6.4. Hence: ∂µ βλ (a) = ∂λ tλµ−1 βµ (a) (3) This was unpleasant but the rest of the argument goes slightly better, although we suspect there should be something shorter. We make a series of claims. 1. tλ = ∂λ βλ (as functions on Z1 ). This is from Claim 3.6.4. 2. If ℓ2 = λ then βλ ∂ = tℓ ψλ tℓ . −1 Recall from Claim 3.6.3 that tℓ β = βλ t−1 ℓ . Therefore tℓ ψλ tℓ = tℓ β∂λ tℓ = βλ tℓ ∂λ tℓ = βλ ∂. 3. If ℓ2 = λ and m2 = µ then ψµ tℓ ψλ tℓ = ψλ tλm−1 ψµ tm . This reduces to the previous claim and Equation (3) composed with β on the left and ∂ on the right: ψµ tℓ ψλ tℓ = β∂µ βλ ∂ = β∂λ tλµ−1 βµ ∂ = ψλ tλµ−1 tm ψµ tm . 4. If ℓ2 = λ then tℓ ψλ = ψλ tℓ . Set ℓ = 1 in the previous, and find ψµ = t−1 m ψµ tm . 20 5. ψµ tλ ψλ = ψλ tλ ψµ . With the last two items, ψµ ψλ tλ = ψλ tλ ψµ ; now ψλ and tλ commute. 6. ψµλ2 = ψλ ψµ ψλ . This is since ψµλ2 = β∂µλ2 = βtλ ∂µ t−1 λ , so with items 1 (which applies since ∂µ (L) = Z1 ) and 2, ψµλ2 = β∂λ βλ ∂µ t−1 = ψλ βλ ∂β∂µ t−1 = ψλ tℓ ψλ tℓ ψµ t−1 λ λ λ ; in view of the previous −1 2 commutation properties, one gets ψµλ2 = ψλ tλ ψµ t−1 λ = ψλ ψµ tλ ψλ tλ = ψλ ψµ ψλ . Whether one can conclude at this early stage is not clear to us. Hua’s famous theorem [12] on (anti-)automorphisms of skewfields would require End(L), or at least a subring, to be a division ring (which is not obvious even taking T -minimality into account); exploiting the identity ψλ2 = ψλ2 would require it to be commutative. Perhaps there is an algebraic argument, which we replace by basic model-theory. 7. For any polynomial P ∈ Fp [X], ψP (λ) = P (ψλ ). First show ψλn = ψλn by setting µ = λn in the previous, then use additivity of ψ. 8. For any two (λ, µ) ∈ Fp , ψλ ψµ = ψµ ψλ . This is because there are ν ∈ Fp and polynomials P, Q ∈ Fp [X] with λ = P (ν) and µ = Q(ν). 9. For any two (λ, µ) ∈ K, ψλ ψµ = ψµ ψλ . For λ ∈ Fp , Cλ = {µ ∈ K : ψλ ψµ = ψµ ψλ } is an infinite, definable field, whence equal to K. So for λ ∈ K, Cλ is an infinite, definable field, whence equal to K. 10. ψ is a ring homomorphism. This follows from ψλ ψµ = ψµ ψλ and ψλ2 = ψλ2 . This completes the proof of Claim 3.6.5. ♦ Fortunately the rest is now just painting from nature. 3.6.6 — Notation. We define an action of K  λ·b    λ · wb λ · ∂b    λ · w∂b on V by letting, for (λ, b) ∈ K × L: = = = = β∂λ b w(λ · b) ∂(λ · b) w(λ · ∂b) 3.6.7 — Claim. This defines a K-vector space structure on V for which G is linear. Proof. First bear in mind that since ∂ realises a bijection L ≃ Z1 , and since V = Z1 ⊕L⊕w·L⊕w·Z1, this is well-defined. Additivity in the module element is obvious. Additivity and multiplicativity in λ need only be proved on L, and are exactly Claim 3.6.5. It remains to prove that G is linear. By construction, w is. We turn to linearity of u, which amounts to that of ∂. The latter is obvious on Z1 and L. Now if wb ∈ w · L then by Claim 3.6.4, ∂w(λ · b) = −∂(λ · b) = −λ · ∂b = λ · ∂wb and ∂ is also linear on w · L. Notice that β : Z1 → L is linear. For if a ∈ Z1 , then there is b ∈ L with a = ∂b or equivalently b = β(a), so that: β(λ · a) = β(λ · ∂b) = β(∂(λ · b)) = λ · b = λ · β(a) Finally, for a ∈ Z1 : ∂(λ · wa) = ∂w(λ · a) = −wβ(λ · a) + β(λ · a) + (λ · a) = −wλ · β(a) + λ · β(a) + λ · a = −λ · wβ(a) + λ · β(a) + λ · a = λ · ∂wa 21 So far we proved linearity of hw, ui; now to linearity of T . For b ∈ L one has, thanks to Claim 3.6.5: tµ (λ · b) = β∂tµ (λ · b) = βtµ ∂µ−2 β∂λ b = βtµ ∂β∂µ−2 β∂λ b = βtµ ∂β∂λµ−2 b = βtµ ∂λµ−2 b = β∂λ tµ b = λ · (tµ b) This is linearity of T on L; linearity on w · L follows at once. Now for a ∈ Z1 , letting b = β(a), one has λ · a = ∂(λ · b) = ∂λ b = ∂λ β(a), so: tµ λ · a = tµ ∂λ β(a) = ∂β∂λµ2 tµ β(a) = ∂β∂λ β∂µ2 tµ β(a) = ∂λ βtµ ∂β(a) = λ · (tµ a) This is linearity of T on Z1 ; linearity on w · Z1 follows, proving global linearity of hw, u, T i = G. ♦ By linearity, G ≃ PSL2 (K) embeds definably into GL4 (K); Fact D we quoted in §1.4 guarantees definability of G in the pure field K together with a finite number of automorphisms. This is certainly consistent with the desired identification but does not settle matters. Another remarkable information is the use of the Borel-Tits positive answer [2, Corollaire 10.4] to Steinberg’s [15, Conjecture 1.2]. We know at this stage that V either is the rational module of Proposition 3.5 (which we already ruled out) or a tensor product Nat G ⊗ χ (Nat G) for some field automorphism χ. The problem is that we also announced definability of χ: and for the moment, we see no better argument than retrieving it by a direct computation. There ought to be something more general here and we shall return to the topic some day. 3.6.8 — Notation. Let b0 ∈ L \ {0} be fixed. For λ ∈ K let χ(λ) be the unique µ ∈ K with ∂µ b0 + ∂λ wb0 = 0. 3.6.9 — Claim. The map χ is a well-defined, definable automorphism of K not depending on b0 ; finally, V ≃ χ (Nat G) ⊗ Nat G. Proof. First notice that the function U → Z1 mapping uλ to ∂λ b0 is a definable bijection. So χ is a well-defined, definable function on K. Additivity is obvious since L ⊕ w · L ≤ Z2 . Now remember from Claim 3.6.4 that for b ∈ L, one has ∂λ wb = −∂λ tλ b, so that: χ(λ) · b0 = β∂χ(λ) b0 = −β∂λ wb0 = β∂λ tλ b0 = λ · tλ b0 In particular, by linearity of T : χ(λµ) · b0 = (λµ) · tλµ b0 = λ · (µ · tλ tµ b0 ) = λ · (tλ (µ · tµ b0 )) = χ(λ) · (χ(µ) · b0 ) This proves multiplicativity of χ, which is an automorphism of K. Incidently, if one were to take b1 = t · b0 for some t ∈ T , one would find:  β ∂χ(λ) b1 + ∂λ wb1 = χ(λ) · b1 − β∂λ tλ b1 = χ(λ) · tb0 − λ · tλ tb0 = t(χ(λ) · b0 − λ · tλ b0 ) = 0 But β is injective, so this means that the function χ does not depend on the precise choice of b0 in T · b0 = L \ {0}. It remains to see that we have a definable isomorphism V ≃ χ (Nat G) ⊗ Nat G. The latter has basis (e1 ⊗ e1 , e1 ⊗ e2 , e2 ⊗ e1 , e2 ⊗ e2 ) in the notations of Example 3.7; the reader should take ϕ = χ and ψ = Id there. Let a0 = ∂b0 ∈ Z1 , so that b0 = β(a0 ); clearly (a0 , b0 , w · b0 , w · a0 ) forms a basis of V as a K-vector space. Now consider the map:  7→ e1 ⊗ e1   a0  b0 7→ e1 ⊗ e2 f: w · b0 7→ −e2 ⊗ e1    w · a0 7→ e2 ⊗ e2 22 and extend linearly. We claim that f is G-covariant. The action of w and u is obviously preserved. So it suffices to study the action of T . Remember that tλ b0 = χ(λ) λ · b0 . Hence tλ a0 = tλ ∂b0 = χ(λ) ∂λ2 tλ b0 = λ ∂β∂λ2 b0 = λχ(λ)a0 . Therefore: f (tλ a0 ) = λχ(λ)f (a0 ) = λχ(λ)e1 ⊗ e1 = tλ f (a0 ) whereas: f (tλ b0 ) = χ(λ) χ(λ) f (b0 ) = e1 ⊗ e2 = tλ f (b0 ) λ λ Covariance on wa0 and wb0 follows. ♦ This concludes the proof of Proposition 3.6 and the rank 4k analysis. Remarks. • In order to convince the reader that despite our efforts matters are not perfectly clear, we do not know if one can classify cubic SL2 (K)-modules of finite Morley rank, i.e. those satisfying ℓU (V ) = 3. • Several years ago the author had tried something without model theory: there are many obstacles. First, the decomposition of Claim 3.6.2 cannot be granted. Second, it is not clear that injectivity of β entails its surjectivity in Claim 3.6.4. Also, but this may be due to our lack of algebraic culture, multiplicativity of ψ in Claim 3.6.5 apparently holds only over the algebraic closure of the prime field (to be more precise, the argument works over any quadratically closed, algebraic extension of Fp ). Last but not least, in order to “untensor” definably, one needs to construct χ as in Notation 3.6.8, which requires λ 7→ ∂λ b0 to be a bijection K ≃ Z1 ; the latter is not clear without rank arguments. This is the reason why we finally prefered to work in finite Morley rank. One’s first love is not easily forgotten. References [1] Ayşe Berkman and Alexandre Borovik. Groups of finite Morley rank with a pseudoreflection action. J. Algebra, 368:237–250, 2012. [2] Armand Borel and Jacques Tits. Homomorphismes “abstraits” de groupes algébriques simples. Ann. of Math. (2), 97:499–571, 1973. [3] Alexandre Borovik and Adrien Deloro. Rank 3 Bingo. J. Symbolic Logic, 2015. To appear. [4] Alexandre Borovik and Ali Nesin. Groups of finite Morley rank, volume 26 of Oxford Logic Guides. The Clarendon Press - Oxford University Press, New York, 1994. Oxford Science Publications. [5] Gregory Cherlin and Adrien Deloro. Small representations of SL2 in the finite Morley rank category. Journal of Symbolic Logic, 77(3):919–933, 2012. [6] Edward Cline, Brian Parshall, and Leonard Scott. On the tensor product theorem for algebraic groups. J. Algebra, 63(1):264–267, 1980. [7] Adrien Deloro. Actions of groups of finite Morley rank on small abelian groups. Bull. Symb. Log., 15(1):70–90, 2009. [8] Adrien Deloro. Symmetric powers of Nat sl2 (K). Communications in Algebra, 2015. To appear. [9] Adrien Deloro. Symmetric powers of Nat SL2 (K). Journal of Group Theory, 2015. To appear. 23 [10] Adrien Deloro and Éric Jaligot. Involutive automorphisms of N◦◦ -groups. Submitted, 2015. [11] Matthias Grüninger. On cubic action of a rank one group. Preprint. arXiv:1106.2310v2, 2011. [12] Loo-Keng Hua. On the automorphisms of a sfield. Proc. Nat. Acad. Sci. U. S. A., 35:386–389, 1949. [13] Dugald Macpherson, Alex Mosley, and Katrin Tent. Permutation groups in o-minimal structures. 62(2):650–670, 2000. [14] Bruno Poizat. Quelques modestes remarques à propos d’une conséquence inattendue d’un résultat surprenant de Monsieur Frank Olaf Wagner. J. Symbolic Logic, 66(4):1637–1646, 2001. [15] Robert Steinberg. Representations of algebraic groups. Nagoya Math. J., 22:33–56, 1963. [16] Franz Georg Timmesfeld. Abstract Root Subgroups and Simple Groups of Lie-type, volume 95 of Monographs in Mathematics. Birkhäuser, Basel, 2001. [17] Jules Tindzogho Ntsiri. Étude de quelques liens entre les groupes de rang de Morley fini et les groupes algébriques linéaires. PhD thesis, Université de Poitiers, Poitiers, 2013. [18] Jules Tindzogho Ntsiri. Structure of an SL2 -module of finite Morley rank. Submitted, 2016. [19] Frank Wagner. Fields of finite Morley rank. J. Symbolic Logic, 66(2):703–706, 2001. 24
4math.GR
SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn arXiv:1703.09599v2 [math.GR] 28 Jul 2017 BARBARA BAUMEISTER AND THOMAS GOBET Abstract. We show that the simple elements of the dual Garside structure of an Artin group of type Dn are Mikado braids, giving a positive answer to a conjecture of Digne and the second author. To this end, we use an embedding of the Artin group of type Dn in a suitable quotient of an Artin group of type Bn noticed by Allcock, of which we give a simple algebraic proof here. This allows one to give a characterization of the Mikado braids of type Dn in terms of those of type Bn and also to describe them topologically. Using this topological representation and Athanasiadis and Reiner’s model for noncrossing partitions of type Dn which can be used to represent the simple elements, we deduce the above mentioned conjecture. AMS 2010 Mathematics Classification: : 20F36, 20F55. Keywords. Coxeter groups, Artin-Tits groups, dual braid monoids, Garside theory, noncrossing partitions. Contents 1. Introduction 2. Artin groups of type Dn inside quotients of Artin groups of type Bn 2.1. Coxeter groups and Artin groups 2.2. Embeddings of Coxeter groups 2.3. Embeddings of Artin groups 3. Mikado braids of type Bn and Dn 3.1. Mikado braids of type Bn eBn 3.2. Mikado braids of type Dn inside A 4. Dual braid monoids 4.1. Noncrossing partitions 4.2. Dual braid monoids 4.3. Standard Coxeter elements in WDn 5. Simple dual braids of type Dn are Mikado braids 5.1. Outline of the proof 5.2. Graphical model for noncrossing partitions 5.3. The diagram Nx and the braid βx 5.4. Simple dual braids are Mikado braids References The second author was partially funded by the ANR Geolie ANR-15-CE40-0012. 2 3 3 3 4 6 6 7 7 7 7 8 9 9 9 11 17 18 2 BARBARA BAUMEISTER AND THOMAS GOBET 1. Introduction The dual braid monoid Bc∗ of a Coxeter system (W, S) of spherical type was introduced by Bessis [5] and depends on the choice of a standard Coxeter element c ∈ W (a product of all the elements of S in some order). It is generated by a copy Tc of the set T of reflections of W , that is, elements which are conjugates to elements of S. As a Garside monoid, it embeds into its group of fractions, which was shown by Bessis to be isomorphic to the Artin group AW corresponding to W . Unfortunately, this isomorphism is poorly understood, and the proof of its existence requires a case-by-case argument [5, Fact 2.2.4]. The aim of this note is to study properties of the simple elements Div(c) in Bc∗ viewed inside AW in case W is of type Dn and to show that they are Mikado braids, that is, that they can be represented as a quotient of two positive canonical lifts of elements of W . These braids appeared in work of Dehornoy [13] in type An and in work of Dyer [14] for arbitrary Coxeter systems and have many interesting properties. For example, they satisfy an analogue of Matsumoto’s Lemma in Coxeter groups [14, Section 9]. We refer the reader to [14, Section 9], [12, Section 4] (there the Mikado braids are called rational permutation braids, while the terminology Mikado braids rather refers to braids viewed topologically; it is shown however in [12] that both are equivalent) or [15, Section 3.2] for more on the topic. Another important property is that their images in the IwahoriHecke algebra H(W ) of the Coxeter system (W, S) have positivity properties; let us be more precise. There is a natural group homomorphism a : AW −→ H(W )× . If β ∈ AW is a Mikado braid and if we express its image a(β) in the canonical basis {Cw | w ∈ W } of the Hecke algebra, then the coefficients are Laurent polynomials with positive coefficients (see [12, Section 8]). This is one of the main motivations for studying Mikado braids, and showing that simple dual braids are Mikado braids. This last property was conjectured for an arbitrary Coxeter system (W, S) of spherical type in [12], and shown to hold in all the irreducible types different from Dn [12, Theorems 5.12, 6.6, 7.1]. In the classical types An and Bn , the conjecture is proven using a topological characterization of Mikado braids: it can be seen on any reduced braid diagram (resp. symmetric braid diagram in type Bn ) whether a braid is a Mikado braid or not. The present paper gives topological models for Mikado braids of type Dn , similar to those given in types An and Bn in [12], and solves the above conjecture in the remaining type Dn : Theorem 1.1. Let c be a standard Coxeter element in a Coxeter group (W, S) of type Dn . Then every element of Div(c) is a Mikado braid. As a consequence, every simple dual braid in every spherical type Artin group is a Mikado braid, the reduction to the irreducible case being immediate. Licata and Queffelec recently informed us that they also have a proof of the conjecture in types A, D, E with a different approach using categorification [18]. To prove the conjecture, we proceed as follows. Firstly, we explicitly realize the Artin group ADn of type Dn as an index two subgroup of a quotient of the Artin group ABn of type Bn . The existence of such a realization, which is of independent interest, is not new: it was noticed by Allcock [1, Section 4]. We give a simple proof of it here (Proposition 2.7). This allows to realize elements of ADn topologically by Artin braids. We then characterize Mikado braids of type Dn as the images of those Mikado braids of type Bn which surject onto elements of WDn ⊆ WBn under the canonical map from ABn onto WBn (Theorem 3.3). This implies that Mikado braids of type Dn satisfy a nice topological condition, and gives a model for their study in terms of symmetric SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 3 Artin braids, because elements of ABn can be realized as symmetric Artin braids on 2n strands (see Section 3.1). Using Athanasiadis and Reiner’s graphical model [3] for c-noncrossing partitions of type Dn (which are in canonical bijections with the simple elements Div(c) of Bc∗ ; we denote this bijection by x 7→ xc , where x is a c-noncrossing partition), we attach to every such noncrossing partition x an Artin braid βx of type Bn , whose image in the above mentioned quotient is precisely the element xc ∈ ADn (Section 5). Using the topological characterization of Mikado braids of type Bn from [12], we then prove that βx is a Mikado braid of type Bn (Proposition 5.3), which concludes by the above mentioned characterization of Mikado braids of type Dn (Theorem 5.5). Acknowledgments. We thank Luis Paris for useful discussions with the second author and Jon McCammond for pointing out the reference [20]. 2. Artin groups of type Dn inside quotients of Artin groups of type Bn 2.1. Coxeter groups and Artin groups. This section is devoted to recalling basic facts on Coxeter groups and their Artin groups. We refer the reader to [9, 17] or [8] for more on the topic. A Coxeter system (W, S) is a group W generated by a set S of involutions subject to additional braid relations, that is, relations of the form st · · · = ts · · · for s, t ∈ S, s 6= t. Here st · · · denotes a strictly alternating product of s and t, and the number mst of factors in the left hand side equals the number mts of factors in the right hand side. We have mst ∈ {2, 3, . . . } ∪ {∞}, the case mst = ∞ meaning that there is no relation between s and t. Let ℓ : W → Z≥0 be the length function with respect to the set of generators S. Finite irreducible Coxeter groups are classified in four infinite families of types An , Bn , Dn , I2 (m) and six exceptional groups of types E6 , E7 , E8 , F4 , H3 , H4 . If X is a given type, we denote by (WX , SX ) a Coxeter system of this type. The Artin group AW attached to the Coxeter system (W, S) is generated by a copy S of the elements of S, subject only to the braid relations. This gives rise to a canonical surjection π : AW ։ W induced by s 7→ s. If W has type X, we simply denote AW by AX . The canonical map π has a set-theoretic section W ֒→ AW built as follows: let w = s1 s2 · · · sk be a reduced expression for w, that is, we have si ∈ S for all i = 1, . . . , k and k = ℓ(w). Then the lift s1 s2 · · · sk in AW is independent of the chosen reduced expression, and we therefore denote it by w. This is a consequence of the fact that in every Coxeter group, one can pass from any reduced expression of a fixed element w to any other just by applying a sequence of braid relations. The element w is the canonical positive lift of w. 2.2. Embeddings of Coxeter groups. Let (WBn , SBn ) be a Coxeter system of type Bn . We will identify it with the signed permutations group as follows: let S−n,n be the group of permutations of [−n, n] = {−n, −n + 1, . . . , −1, 1, . . . , n} and define WBn := {w ∈ S−n,n | w(−i) = −w(i), for all i ∈ [−n, n]}. Then setting s0 := (−1, 1) and si = (i, i + 1)(−i, −i − 1) for all i = 1, . . . , n − 1 we get that SBn = {s0 , s1 , . . . , sn−1 } is a simple system for WBn (see [8, Section 8.1]). Let (WDn , SDn ) be a Coxeter group of type Dn . Recall that WDn can be realized as an index two subgroup of WBn as follows: setting t0 = s0 s1 s0 , ti = si for all i = 1, . . . , n−1 we have that SDn := {t0 , t1 , . . . , tn−1 } is a simple system for the Coxeter group WDn = ht0 , t1 , . . . , tn−1 i of type Dn (see [8, Section 8.2]). In the following, a Coxeter group of type Dn will always be viewed inside WBn , with the above identifications. 4 BARBARA BAUMEISTER AND THOMAS GOBET 2.3. Embeddings of Artin groups. We assume the reader to be familiar with Artin groups attached to Coxeter groups and refer to [11, Chapter IX] for basic results. Notice that there are two surjective maps qB : ABn −→ AAn−1 , qD : ADn −→ AAn−1 defined as follows: if we denote by {σ1 , . . . , σn−1 } the set of standard Artin generators of the n-strand Artin braid group AAn−1 , then qB (s0 ) = 1, qB (si ) = σi for i 6= 0, while qD (t0 ) = σ1 , qD (ti ) = σi for all i 6= 0 (see [10, Section 2.1]). Both maps qB and qD are split and one can write AXn ∼ = ker(qX ) ⋊ AAn−1 for X ∈ {B, D}. Crisp and Paris showed that the embedding of WDn in WBn which we recalled in Subsection 2.2 does not come from an embedding ϕ : ADn −→ ABn such that qD = qB ◦ ϕ [10, Proposition 2.6]. In this section we show that there is an embedding of eBn of ABn ; this embedding can be seen as a natural lift of the ADn inside a quotient A embedding of Coxeter groups and has the expected properties (see Lemma 2.8). This is mostly a reformulation of results of Allcock [1, Sections 2 and 4], but we will give a simple algebraic proof of this fact here. eBn to be the quotient of ABn by the smallest normal subgroup Definition 2.1. Define A 2 containing s0 . It follows immediately from this definition that the canonical map πn : ABn ։ WBn eBn via two surjective maps πn,1 : ABn ։ A eBn and πn,2 : A eBn ։ WBn . factors through A Remark 2.2. In [20, Definition 3.3], a similar group, called the middle group, is considered. It is defined as the quotient of ABn by the smallest normal subgroup containing s21 (as a consequence, every s2i for i ≥ 1 is equal to 1 in the quotient since si lies in the same conjugacy class as s1 ). eBn , for all si ∈ SBn . Set Denote by s′i , i = 0, . . . , n − 1 the image of si ∈ ABn in A ′ ′ ′ ′ ′ ′ t0 = s0 s1 s0 and ti = si for i = 1, . . . , n − 1. Lemma 2.3. The elements t′0 , t′1 , . . . t′n−1 satisfy the braid relations of type Dn , that is, we have t′0 t′1 = t′1 t′0 , t′0 t′2 t′0 = t′2 t′0 t′2 , t′i t′i+1 t′i = t′i+1 t′i t′i+1 for all i = 1, . . . , n − 2, t′i t′j = t′j t′i if |i − j| > 1 and {i, j} = 6 {0, 2}. Proof. All the relations except the second one are immediate consequences of the type Bn braid relations satisfied by the s′0 , s′1 , . . . , s′n−1 . For the second relation we have ′ ′ ′ ′ ′ ′ ′ ′ ′ ′ ′ ′ ′ t′0 t′2 t′0 = s′0 s′1 s′0 s′2 s′0 s′1 s′0 = s′0 s′1 s′2 0 s2 s1 s0 = s0 s1 s2 s1 s0 = s0 s2 s1 s2 s0 = s′2 s′0 s′1 s′0 s′2 = t′2 t′0 t′2 .  An immediate corollary is eBn defined by ιn (ti ) = Corollary 2.4. There is a group homomorphism ιn : ADn −→ A ′ ti for all i = 0, . . . , n − 1. We have the following situation Lemma 2.5. There is a commutative diagram ABn π n,1 eBn o //A ❊❊ ❊❊ ❊❊ πn,2 B ❊❊❊  πn ""  WB o n where πnD : ht′0 , . . . , t′n−1 i ′ ′ ? _ ht0 , . . . , tn−1 i oo ADn D πn  _? WDn −→ WDn is defined by πnD (t′i ) = ti for all i = 0, . . . , n − 1. SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 5 Remark 2.6. In Proposition 2.7 below we will show that the map ιn is injective; hence πnD is in fact simply the canonical surjection ADn ։ WDn . eBn factors Proof. We have to show that the composition of πn,2 and ht′0 , . . . , t′n−1 i ֒→ A through WDn . It suffices to show that the image of t′i under this composition is precisely ti (viewed inside WBn via the embedding WDn ֒→ WBn ) for all i = 0, . . . , n − 1, which is immediate.  Proposition 2.7. The homomorphism ιn is injective and ht′0 , . . . , t′n−1 i is a subgroup eBn of index two. Hence ADn can be identified with the subgroup of A eBn generated of A ′ by the ti , i = 0, . . . , n − 1. Proof. We first notice that, as an immediate consequence of Lemma 2.5, the subgroup eBn is proper since WDn is a proper subgroup of WBn . U := ht′0 , . . . , t′n−1 i ⊆ A ′ As s0 interchanges t′0 and s′0 t′0 s′0 = t′1 , and as s′0 commutes with t′i for i = 2, . . . n − 1, the involution s′0 normalizes U and induces on U an automorphism of order 2 (which eBn . is in fact an outer automorphism). Therefore, U = ιn (ADn ) is of index 2 in A Next we determine a presentation of U using the Reidemeister-Schreier algorithm (see for instance [19]). We take as a Schreier-transversal T := {1, s′0 } for the right eBn . This yields the generating set cosets of U in A {ts′i ts′i −1 | t ∈ T and 0 ≤ i ≤ n − 1} = {t′i | 0 ≤ i ≤ n − 1} eBn . Application of this algorithm and where x is the representative of U x in T for x ∈ A of Tietze-transformations (see [19]) then precisely yields the braid relations as stated in Lemma 2.3. This shows that ιn is injective.  eBn with ADn and we set From now on we identify the subgroup ht′0 , t′1 , . . . , t′n−1 i ⊆ A eBn , the map qB factors ti = t′i for all i = 0, . . . , n − 1. Note that by definition of A eBn , giving rise to a surjection qeB : A eBn −→ AA . Then we have through A n−1 Lemma 2.8. The map ιn satisfies qeB ◦ ιn = qD . Proof. We have qD (t0 ) = σ1 and (e qB ◦ ιn )(t0 ) = qeB (s′0 s′1 s′0 ) = qB (s0 )qB (s1 )qB (s0 ) = qB (s1 ) = σ1 . For i ≥ 1 we have qD (ti ) = σi = qB (si ) = qeB (s′i ) = (e qB ◦ ιn )(ti ).  Definition 2.9. Given x ∈ WDn , we denote by xD the canonical positive lift of x in eBn ) and by xB the canonical positive ADn (which we will systematically view inside A lift of x in ABn . Proposition 2.10. Let x ∈ WDn . We have πn,1 (xB ) = xD . Proof. Let ti1 ti2 · · · tik be an SDn -reduced expression of x in WDn . Replacing t0 by s0 s1 s0 and ti by si for i = 1, . . . , n − 1 we get a word in the elements of SBn for x. Note that this may not be a reduced expression for x in WBn . It suffices to show that one can transform the above word into a reduced expression for x in WBn just by applying braid relations of type Bn and the relation s20 = 1. We prove the above statement by induction on k. If k = 1 then the claim holds since ti , i ≥ 1 is replaced by si while t0 is replaced by s0 s1 s0 which is SBn -reduced. Hence assume that k > 1. By induction the claim holds for x′ = ti2 · · · tik . By [8, Propositions 8.1.2, 8.2.2] one has that sj , j ≥ 1 is a left descend of x′ in WBn if and only if it is a left descent of x′ in WDn . Hence we can assume that ti1 = t0 and that it is the only left descent of x in WDn . Firstly, assume that s0 is a left descent of x′ in WBn , hence s0 is not a left descent of s0 x′ . We claim that it suffices to show that s1 is not a left descent of s0 x′ : indeed, 6 BARBARA BAUMEISTER AND THOMAS GOBET it implies that ℓ(s0 s1 s0 x′ ) = ℓ(s0 x′ ) + 2 (where ℓ is the length function in WBn ) by the lifting property (see [8, Corollary 2.2.8(i)]). Moreover by induction we can get every SBn -reduced decomposition of x′ using only the claimed relations, hence we can by induction get a reduced expression for x′ starting with s0 with these relations. The only additional relation to apply to get a reduced decomposition of x is the deletion of the s20 = 1 which appears when appending s0 s1 s0 at the left of such a reduced expression of x′ . Hence assume that s1 s0 x′ < s0 x′ in WBn , i.e., that s1 is a left descent of s0 x′ . By [8, Proposition 8.1.2] it follows that x′−1 s0 (1) > x′−1 s0 (2) which implies that x′−1 (−1) > x′−1 (2), hence −x′−1 (2) > x′−1 (1). But by [8, Proposition 8.2.2] it precisely means that t0 is a left descent of x′ , a contradiction. Now assume that s0 is not a left descent of x′ in WBn . Then s1 is not a left descent of x′ in WBn , otherwise using [8, Proposition 8.1.2] again it would be a left descent of ti1 x′ in WBn , hence in WDn by [8, Proposition 8.2.2], a contradiction. It follows that a reduced expression for y = s1 s0 x′ in WBn is obtained by concatenating s1 s0 at the left of a reduced expression for x′ (which we can obtain by induction). If s0 y > y then we are done, while if s0 y < y then by Matsumoto’s Lemma we can obtain a reduced expression of y starting with s0 just by applying type Bn braid relations. Deleting the s20 at the beginning of the word we then have a reduced expression of x.  Remark 2.11. The fact that reduced expressions of an element x ∈ WDn can be transformed into reduced expressions in WBn as we did in the proof above had been noticed by Hoefsmit in his thesis [16, Section 2.3] without a proof. The fact that ADn eBn also implies that the corresponding Iwahori-Hecke can be realized as a subgroup of A algebra H(WDn ) of type Dn embeds into the two-parameter Iwahori-Hecke algebra H(WBn ) of type Bn where the parameter corresponding to the conjugacy class of s0 is specialized at 1. This is precisely what Hoefsmit uses to study representations of Iwahori-Hecke algebras of type Dn using the representation theory of those algebras in type Bn . 3. Mikado braids of type Bn and Dn 3.1. Mikado braids of type Bn . We recall from [12] the following Definition 3.1. Let (W, S) be a finite Coxeter system with Artin group AW . An element β ∈ AW is a Mikado braid if there exist x, y ∈ W such that β = x−1 y. We denote by Mik(W ) (or Mik(X) if W is of type X) the set of Mikado braids in AW . We briefly recall results from [12, Section 6.2] on topological realizations of Mikado braids in type Bn which will be needed later on. The Artin group ABn embeds into AA2n−1 , which is isomorphic to the Artin braid group on 2n strands. Labeling the strands by −n, . . . , −1, 1, . . . , n, every simple generator in SBn ⊆ Sn,−n is then lifted to an Artin braid as follows. The generator s0 exchanges the strands 1 and −1, while the generator si , i = 1, . . . , n − 1 exchanges the strands i and i + 1 as well as the strands −i and −i − 1 (in both crossings, the strand coming from the right passes over the strand coming from the left, like in the right picture in Figure 3). Those braids in AA2n−1 which are in ABn are precisely those braids which are fixed by the automorphism which exchanges each crossing i, i + 1 by a crossing −i, −i − 1 of the same type, for all i. We call these braids symmetric. There is the following graphical characterization of Mikado braids in ABn Theorem 3.2 ([12, Theorem 6.3]). Let β ∈ ABn . The following are equivalent (1) The braid β is a Mikado braid, that is, there are x, y ∈ WBn such that β = x−1 y. SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 7 (2) There is an Artin braid in AA2n−1 representing β, such that one can inductively remove pairs of symmetric strands, one of the two strands being above all the other strands (so that the symmetric one is under all the other strands). Note that in the second item above, we remove pairs of strands instead of single strands so that at each step of the process, the obtained braid is still symmetric (hence in ABn ). eBn . The aim of this subsection is to prove 3.2. Mikado braids of type Dn inside A the following result, relating Mikado braids of type Dn to Mikado braids of type Bn : eBn are precisely the Theorem 3.3. The Mikado braids of type Dn viewed inside A images of those Mikado braids of type Bn which surject onto elements of WDn , that is, we have Mik(Dn ) = {πn,1 (β) | β ∈ Mik(Bn ) and πnB (β) ∈ WDn }. eBn . Then there exist x, y ∈ WDn such that γ = (xD )−1 yD . Proof. Let γ ∈ Mik(Dn ) ⊆ A Note that by Lemma 2.5 we have πn,2 (γ) = x−1 y ∈ WDn . But by Proposition 2.10 we have γ = πn,1 (β) where β = (xB )−1 yB ∈ Mik(Bn ), which shows the first inclusion. Conversely, let β ∈ Mik(Bn ) such that πnB (β) ∈ WDn . We have to show that πn,1 (β) ∈ Mik(Dn ). By definition there are x, y ∈ WBn such that β = (xB )−1 yB . Since πnB (β) = x−1 y ∈ WDn , if either x or y is in WDn then both of them are in WDn in which case we are done by Proposition 2.10. Hence assume that x, y ∈ / WDn . Since WDn is a subgroup of WBn of index two and s0 ∈ / WDn there are x′ , y ′ ∈ WDn such that ′ B (the exponent depending on whether x = s0 x′ , y = s0 y ′ . If follows that xB = s±1 0 x B ′ e s0 x > x or not) and yB = s±1 0 y . Hence since the image of s0 in ABn has order two, D −1 ′ D ′ using Proposition 2.10 again we have πn,1 (β) = (x ) y which concludes.  4. Dual braid monoids 4.1. Noncrossing partitions. Let (W, S) be a Coxeter system of spherical type. Let S T = w∈W wSw−1 denote the set of reflections in W and ℓT : W −→ Z≥0 the corresponding length function. A standard Coxeter element in (W, S) is a product of all the elements of S. Given u, v ∈ W , we can define a partial order ≤T on W by u ≤T v ⇔ ℓT (u) + ℓT (u−1 v) = ℓT (v). In this case we say that u is a prefix of v. Let c be a standard Coxeter element. The set NC(W, c) of c-noncrossing partitions consists of all the x ∈ W such that x ≤T c. The poset (NC(W, c), ≤T ) is a lattice, isomorphic to the lattice of noncrossing partitions when W = WAn ∼ = Sn+1 . See [2] for more on the topic. Remark 4.1. There are several (unequivalent) definitions of Coxeter elements (see for instance [4, Section 2.2]). The above definitions still make sense for more general Coxeter elements, but for the realization of the dual braid monoids (which are introduced in the next section) inside Artin groups the Coxeter element is required to be standard (see [12, Remark 5.11]). 4.2. Dual braid monoids. We recall the definition and properties of dual braid monoids. For a detailed introduction to the topic the reader is referred to [5, 12] or [11]. Dual braid monoids were introduced by Bessis [5], generalizing definitions of Birman, Ko and Lee [7] and Bessis, Digne and Michel [6] to all the spherical types. Let (W, S) be a finite Coxeter system. Denote by T the set of reflections in W and by 8 BARBARA BAUMEISTER AND THOMAS GOBET AW the corresponding Artin-Tits group. Let c be a standard Coxeter element in W . Bessis defined the dual braid monoid attached to the triple (W, T, c) as follows. Take as generating set a copy Tc := {tc | t ∈ T } of T and set Bc∗ := htc ∈ Tc | tc ∈ Tc , tc t′c = (tt′ t)c tc if tt′ ≤T ci The defining relations of Bc∗ are called the dual braid relations with respect to c. We mention some properties of Bc∗ , which can be found in [5]. The monoid Bc∗ is infinite and embeds into AW . In fact, Bc∗ is a Garside monoid, hence it embeds into its group of fractions Frac(Bc∗ ) and the word problem in Frac(Bc∗ ) is solvable. Bessis showed that Frac(Bc∗ ) is isomorphic to AW , but his proof requires a case-by-case analysis (see [5, Fact 2.2.4]) and the isomorphism is difficult to understand explicitly. More precisely, the embedding Bc∗ ⊆ AW sends sc to s for every s ∈ S. In [12, Proposition 3.13], a formula for the elements of Tc (which are the atoms of the monoid Bc∗ ) as products of the Artin generators is given, but it does not give in general a braid word of shortest possible length. Example 4.2. Let (W, S) be of type A2 and c ∈ W be the Coxeter element s1 s2 where si = (i, i + 1). Then we have the dual braid relation (s1 )c (s2 )c = (s1 s2 s1 )c (s1 )c . Hence inside AW , the atom (s1 s2 s1 )c corresponding to the non-simple reflection s1 s2 s1 is equal to s1 s2 s−1 1 . As every Garside monoid, Bc∗ has a finite set of simple elements, which form a lattice under left divisibility. They are defined as follows. For x ∈ NC(W, c), let x = t1 t2 · · · tk be a T -reduced expression of x, that is, a reduced expression as product of reflections. Then Bessis showed that the element xc := (t1 )c (t2 )c · · · (tk )c ∈ Bc∗ is independent of the choice of the reduced expression of x and therefore well-defined as a consequence of a dual Matsumoto property [5, Section 1.6]. The Garside element is the lift cc of c and the set Div(c) of simple elements (that is, of (left) divisors of cc ) is given by Div(c) := {xc | x ∈ NC(W, c)}. There is an isomorphism of posets (NC(W, c), ≤T ) ∼ = (Div(c), ≤), x 7→ xc , where ≤ is the left-divisibility order in Bc∗ . In general, we are only able to determine the elements of Div(c) as words in the classical Artin generators S of AW by an inductive application of the dual braid relations. It is therefore difficult to study properties of elements of Div(c) viewed inside AW . Note that the composition Bc∗ ֒→ AW ։ W sends every product (t1 )c (t2 )c · · · (tk )c , ti ∈ T to t1 t2 · · · tk . 4.3. Standard Coxeter elements in WDn . In this subsection, we characterize standard Coxeter elements in WDn in terms of signed permutations. This will be needed to introduce graphical representations of c-noncrossing partitions of type Dn in Section 5.2. Recall that WDn ⊆ WBn and that w(−i) = −w(i), for all i ∈ [−n, n] and all w ∈ WBn . In WBn , cycles of the shape (i1 , . . . , ir , −i1 , . . . , −ir ) are abbreviated by [i1 , . . . ir ] and called balanced cycles, and those of type (i1 , . . . , ir )(−i1 , . . . , −ir ) by ((i1 , . . . , ir )) and called paired cycles. The set of reflections in WDn is T := TDn := {(i, j)(−i, −j) | i, j ∈ {−n, . . . , n}, i 6= ±j}, and every w ∈ WDn can be written as a product of disjoint cycles in which there is an even number of balanced cycles (see [3, Section 2]). Lemma 4.3. An element c ∈ WDn (n ≥ 3) is a standard Coxeter element if and only if c = (i1 , −i1 )(i2 , . . . , in , −i2 , . . . , −in ) where {i1 , . . . , in } = {1, 2, 3, . . . , n}, i1 ∈ {1, 2} and the sequence i2 · · · in is first increasing, then decreasing. SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 9 Proof. The proof is by induction on n. The case n = 3 is easy to check by hand. Let c be a standard Coxeter element in WDn , n ≥ 4. Then either sn c or csn is a standard Coxeter element in WDn−1 , in which case induction and a straightforward computation shows that c is of the required form. Conversely if c is of the above form, then since (i1 , −i1 ) commutes with sn either sn c or csn is of the above form in WDn−1 , hence is a standard Coxeter element in WDn−1 , implying that c is a standard Coxeter element in WDn .  Elements in NC(WDn , c) will be described below via a graphical representation. 5. Simple dual braids of type Dn are Mikado braids The aim of this section is to show Theorem 1.1, that is, that simple dual braids of type Dn are Mikado braids. 5.1. Outline of the proof. The proof proceeds as follows. • Step 1. We describe in Section 5.2 a pictural model for the elements x ∈ NC(WDn , c) which is due to Athanasiadis and Reiner [3]. In this model the element x is represented by a diagram consisting of non-intersecting polygons joining labeled points on a circle. The labeling depends on the choice of the standard Coxeter element c, more precisely, we first require to write the Coxeter element as a signed permutation (as in Lemma 4.3). • Step 2. We slightly modify the diagram from Step 1 associated to x ∈ NC(WDn , c) to obtain a new diagram Nx consisting of non-intersecting polygons joining labeled points on a circle. The only difference with the AthanasiadisReiner model is that there is a point with two labels in the latter, which we split in two different points. As we will see, the diagram Nx is not unique in general, but we will show that all the information which we will use from the diagram Nx is independent of the chosen diagram representing x. From this new diagram Nx , we build a topological braid βx lying in an Artin group ABn of type Bn (viewed inside AA2n−1 , hence βx is a symmetric braid on 2n strands). We first explain how to define the diagram Nx for elements of TDn ⊆ NC(WDn , c) and we then do it for all x ∈ NC(WDn , c). eBn , for t ∈ TDn , lie in ADn and • Step 3. We show that the braids πn,1 (βt ) ∈ A satisfy the dual braid relations with respect to c. This will follow from the more general statement that if x ≤T xt ≤T c with t ∈ TDn , then πn,1 (βx )πn,1 (βt ) = πn,1 (βxt ). This property and the fact that πn,1 (βs ) = s for all s ∈ SDn will be enough to conclude that πn,1 (βx ) is equal to the simple dual braid xc for all x ∈ NC(WDn , c) (this is explained in the proof of Corollary 5.2). In particular we also show that πn,1 (βx ) does not depend on the choice of the diagram Nx . • Step 4. We show that the braid βx , x ∈ NC(WDn , c) is a Mikado braid in ABn by using the topological characterization of [12]. Recall that βx is defined graphically, as an Artin braid on 2n strands. Together with Step 3 and Theorem 3.3, it follows that xc = πn,1 (βx ) is a Mikado braid, which proves Theorem 1.1. 5.2. Graphical model for noncrossing partitions. Athanasiadis and Reiner found a graphical model for noncrossing partitions of type Dn . We present it here (with slightly different conventions). First we explain how to label a circle depending on the choice of the standard Coxeter element c. Given a standard Coxeter element c = (i1 , −i1 )(i2 , . . . , in , −i2 , . . . , −in ) in WDn , where the notation is as in Lemma 4.3 and where i2 = −n, we place 2n − 2 points (labeled by i2 , . . . , in , −i2 , . . . , −in ) on a circle as follows: point −n is at the top of the 10 BARBARA BAUMEISTER AND THOMAS GOBET circle while point n is at the bottom. The remaining points all have distinct height depending on their label: if i < j then point i is higher than point j. Moreover, when going along the circle in clockwise order starting at i2 = −n, the points must be met in the order i2 i3 · · · in (−i2 )(−i3 ) · · · (−in ). Finally, we add a point at the center of the circle, labeled by ±i1 . Athanasiadis and Reiner showed that c-noncrossing partitions are those for which there exists a graphical representation as follows (in their description, we have i1 = n; this corresponds to a choice of Coxeter element which is not standard, however by conjugation we can assume it to be standard an to have i1 ∈ {1, 2}. The c-noncrossing partition lattices are isomorphic for all Coxeter elements c). Given x ∈ NC(WDn , c), consider its cycle decomposition inside S−n,n and associate to each cycle the polygon given by the convex hull of the points labeled by elements in the support of the cycle. It results in a noncrossing diagram, i.e., the various obtained polygons do not intersect, with two possible exceptions: if there is a polygon Q of x with i1 ∈ Q, −i1 ∈ / Q, then −Q is also a polygon of x. Thus the two polygons Q and −Q will have the middle point in common (Note that since x is a signed permutation, for every polygon P of x we have that −P is also a polygon of x, possibly with P = −P ). The second case appears when the decomposition of x has a product of factors of the form [j][i1 ] for some j 6= ±i1 . In this case to avoid confusion with the noncrossing representation of the reflection ((j, i1 )) (or ((j, −i1 ))) we have to choose an alternative way of representing this product. Note that the cycle [j] should be considered as a polygon P such that P = −P . By analogy with the situation where there is such a polygon and where the point ±i1 lies inside P , we represent [j] by two curves both joining j to −j and not intersecting except at the points ±j, in such a way that the point ±i1 lies between these two curves. Conversely, to every noncrossing diagram with the above properties, one can associate an element x of NC(WDn , c) as follows: we send each polygon P with labels j1 , j2 , . . . , jk (read in clockwise order) to the cycle (j1 , j2 , . . . , jk ) except in case P = −P . Each single point with label i is sent to the one-cycle (i) except i1 in case there is a polygon P with P = −P (in which case ±i1 lie inside P ). In this last case, if P is labeled by j1 , j2 , . . . , jk then we send it to the product of cycles (i1 , −i1 )(j1 , j2 , . . . , jk ) (like in the middle example of Figure 1). The element x is then the product of all the cycles associated to all the polygons of the noncrossing diagram (note that they are disjoint). Note that when the middle point lies in two different polygons, one has to specify in which polygon the label i1 lies. Examples are given in Figure 1 and we refer to [3] for more details. b b b b b −2 b b 2 b b b b b b b −8 −7 −6 −5 −4 −3 b b −1 1 3 4 5 6 7 8 b b b b b 2 −2 b b b b b b b b −8 −7 −6 −5 −4 −3 b b −1 1 3 4 5 6 7 8 −8 −7 −6 −5 −4 −3 b b b b b b b 2 −2 b b b b b b b Figure 1. Examples of noncrossing diagrams for x1 = ((1, −8))((7, 5, −2)), x2 = ((8, 7, 5))[6, 3, 1][2], x3 = ((6, 3, −4)) ∈ NC(WDn , c). −1 1 3 4 5 6 7 8 SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 11 5.3. The diagram Nx and the braid βx . To define the diagram Nx , we slightly modify the labeling of the circle given in the previous section by splitting the point ±i1 into two points placed on the vertical axis of the circle consistently with their labels (all the points should be placed such that the point i is higher than the point j if i < j). An example is given in Figure 2 and we call this labeling the c-labeling of the circle. The idea is then to start from Athanasiadis and Reiner’s graphical representation of x ∈ NC(WDn , c) and just split the middle point into two points. For convenience we may represent the polygons by curvilinear polygons since in some cases, because of the splitting it might not be possible to have the polygons not intersecting each other. Depending on the situation we will add an edge joining the two points i1 and −i1 : we explain more in details below how to draw the diagrams Nx , first when x is a reflection, then in general. b b b b b b b b b b b b b b b b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 Figure 2. Example of a c-labeling in type D8 . Here c = t1 t3 t5 t7 t6 t4 t2 t0 = (2, −2)[−8, −7, −5, −3, −1, 4, 6] and i1 = 2. 5.3.1. Pictures for reflections. Reflections are all of the form t = c1 c2 , where c1 and c2 are two 2-cycles with opposite support. If c1 = (i, j), we will draw a curvilinear “polygon” with two edges both joining i to j. We then orient the polygon in counterclockwise order. We do the same for c2 = (−i, −j) in such a way that the second curvilinear polygon does not intersect the first one. In some cases, there is not a unique way of drawing two such curvilinear polygons with the condition that the resulting diagram should be noncrossing. We explain how to do it in the next paragraph by separating the set of reflections into three classes. Firstly, assume that supp(c1 ) = {i, j} ⊆ {1, . . . , n}, then Nt is drawn as in the left picture of Figure 3. Now assume that supp(c1 ) = {i, −j} with i ∈ {1, . . . , n}\{i1 }, j ∈ {−1, . . . , −n}\{−i1 }. In that case, we draw the two curvilinear polygons in such a way that the two middle points labeled by ±i1 lie between them, as done in Figure 4. The last case is the case where c1 = (i1 , j) with j ∈ {−1, . . . , −n}\{−i1 }. In that case, there are two ways of drawing the curvilinear polygon (see the left pictures of Figure 5). We can choose any of the two pictures for Nt . Starting from such a noncrossing diagram, we then associate an Artin braid βt on 2n strands to it, by first projecting the noncrossing diagram to the right (as done in the left pictures of Figures 3 and 4), i.e., putting all the points on the same vertical line, obtaining a new graph for the noncrossing partition. This new graph can then be viewed as a braid diagram, viewed from the bottom: a curve joining point k to point ℓ corresponds to a k-th strand ending at ℓ, while single points without a curve starting or ending at them correspond to unbraided strands. If a point has nothing at its right (resp. at its left), it means that the corresponding unbraided strand is above all the others (resp. below all the others). The points lying right to (resp. left to) a curve correspond to an unbraided strand lying above (resp. below) the strand corresponding 12 BARBARA BAUMEISTER AND THOMAS GOBET to that curve. See the above mentioned Figures. Note that in the case of Figure 5, the two braids βt obtained from the two different diagrams Nt are distinct in ABn , but their eBn are the same because we can invert the crossings images πn,1 (βt ) in the quotient A corresponding to the generator s0 (because of the relation s20 = 1 which holds in the quotient). b b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b Figure 3. The diagram Nt for t = (3, 6)(−3, −6) and the braid βt . b b b b b b b b b b b b b b b b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b Figure 4. The diagram Nt for t = (3, −5)(−3, 5) and the braid βt . We now generalize the above picturial process, by associating a (possibly non unique) noncrossing diagram Nx and an Artin braid βx to every x ∈ NC(WDn , c). 5.3.2. Pictures for noncrossing partitions. To obtain a noncrossing diagram Nx with oriented curvilinear polygons from x as we did for reflections in the previous section, we proceed as follows: we orient every polygon of the noncrossing partition in counterclockwise order (note that this is the opposite orientation to the one given by the corresponding cycle of x, that is, an arrow j2 → j1 means that the cycle of x sends j1 to j2 ; hence this orientation corresponds to x−1 ). Polygons reduced to a single edge are replaced by curvilinear polygons with two edges as we did for reflections in Section 5.3.1. Again we split the points with labels ±i1 into two points with labels −i1 and i1 respectively as in Figure 2. In the case where the middle point in the Athanasiadis-Reiner model has no edge starting at it and does not lie inside a symmetric polygon, then the two points i1 and −i1 have no edge starting at them in the new diagram. In the case where there are two distinct polygons P and −P sharing the middle point, they are separated so that each SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 13 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b Figure 5. Two diagrams Nt for t = (2, −7)(−2, 7) and the corresponding Artin braids βt . Note that the two Artin braids on the right are eBn . equal in the quotient A point lies in the correct curvilinear polygon (see Figure 6): there might be several nonisotopic diagrams which work when separating P from −P (in case P is a 2-cycle we precisely get what we already noticed and explained in Figure 5). A similar argument eBn of the various Artin braids to the one given in Figure 5 shows that the images in A βx obtained from the distinct diagrams Nx at the end of the process explained below will be equal. In case there is a symmetric polygon P = −P or a factor [j][i1 ] in x, we add a curvilinear polygon with two edges joining −i1 to i1 , oriented in counterclockwise order (Recall that in the noncrossing representation of [j][i1 ], the factor [j] is already represented by a curvilinear “polygon” with two edges and the point i1 inside it. Here we orient this polygon in counterclockwise order as in all other cases). b b b b b b −2 b b 2 b −8 −7 −6 −5 −4 −3 b −1 1 b b b b b b b b b b b b b b b 3 4 5 6 7 8 b b b b b b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 Figure 6. Splitting of two polygons with common middle point. If one has the diagram Nx with oriented curvilinear polygons as in Figure 6 on the right, we proceed exactly as we did for reflections in Section 5.3.1 to obtain βx : firstly, we put all the black points on a vertical line and project the noncrossing diagram to obtain a picture as in the left pictures in Figures 3 and 4; this diagram gives the Artin braid βx viewed from the bottom. We illustrate this process for the noncrossing diagram of the element x2 = ((8, 7, 5))[6, 3, 1][2] of Figure 1 in Figure 7. Note that as a consequence of this procedure, the orientation we put on polygons, which as we 14 BARBARA BAUMEISTER AND THOMAS GOBET already noticed at the beginning of the subsection is not the one corresponding to x but to x−1 , defines the permutation induced by the strands of βx . The fact that the permutation induced by the strands of βx is x−1 rather than x comes from the fact that our convention is to concatenate Artin braids from top to bottom. Note that we can always recover the braid from the middle diagram without ambiguity, because all the strands either strictly go up or down, except possibly in one case: in case i1 = 2 and x = (1, −1)(2, −2) ∈ NC(WDn , c), then the strands joining 1 to −1 and −1 to 1 do not strictly go up or down. In that case we represent the braid as done in Figure 8 in the next subsection. b −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b Figure 7. The Artin braid βx2 where x2 = ((8, 7, 5))[6, 3, 1][2] is as in Figure 1. The strands corresponding to the cycle [6, 3, 1] are drawn in blue. Note that it is a Mikado braid in ABn . −8 −7 −6 −5 −4 −3 −2 −1 1 2 3 4 5 6 7 8 b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b b Figure 8. The Artin braid βt for t = (1, −1)(2, −2) in case i1 = 2. In this way, we associate to every noncrossing partition x ∈ NC(WDn , c) an Artin braid βx ∈ ABn . For some x there are several possible βx ∈ ABn as illustrated in SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 15 Figure 5, but they have the same image under πn,1 , hence πn,1 (βx ) is well-defined. We have Proposition 5.1. Let x ∈ WDn , t ∈ TDn such that x ≤T xt ≤T c. Then πn,1 (βx βt ) = πn,1 (βxt ). Proof. The situation x ∈ NC(WDn , c), t ∈ T and x ≤T xt ≤T c precisely corresponds to a cover relation in the noncrossing partition lattice of type Dn . These covering relations were described by Athanasiadis and Reiner [3, Section 3]: there are three families of covering relations. Setting y = xt, we have that x is obtained from y by replacing one or two balanced cycles or one paired cycle as follows: [j1 , j2 , . . . , jk ] 7→ [j1 , . . . , jℓ ]((jℓ+1 , . . . , jk )), 1 ≤ ℓ < k ≤ n − 1, ((j1 , j2 , . . . , jk )) 7→ ((j1 , . . . , jℓ ))((jℓ+1 , . . . , jk )), 1 ≤ ℓ < k ≤ n − 1, [j1 , . . . , jℓ ][jℓ+1 , . . . , jk ] 7→ ((j1 , . . . , jk )), 1 ≤ ℓ < k ≤ n − 1. Note that in the last case, we have either ℓ = 1 and j1 = ±i1 or k = ℓ + 1 and jk = ±i1 since x is a noncrossing partition. Indeed, the noncrossing partition has at most one polygon P with P = −P , in which case the middle point lies inside P . We have to show that the braid that we obtain by the concatenation βx ⋆ βt has the eBn as βxt . It is easy to deduce from the noncrossing representations same image in A Nx what the result of the concatenation of two such braids is. By the process explained above, the noncrossing diagram itself can be considered as an Artin braid, viewed inside a circle or rather a cylinder. An edge of a curvilinear polygon represents a strand, and the orientation indicates the startpoint and the endpoint of that strand. Consider the case where the cover relation xt 7→ x is the first one above, that is, it consists of breaking a symmetric polygon into a symmetric polygon and two opposite cycles. This means that xt has the two symmetric factors [i1 ] and [j1 , j2 , . . . , jk ] while x has the same factors as xt except that the two symmetric factors are replaced by [i1 ][j1 , . . . , jℓ ]((jℓ+1 , . . . , jk )) for some ℓ ∈ {1, . . . , k − 1} and t = ((jℓ , jk )). We have k ≥ 2. All the other polygons of x and xt have support disjoint from {±j1 , . . . , ±jk }, hence when concatenating βx ⋆βt it is graphically clear that they will stay unchanged: indeed, these polygons are disjoint from the two curvilinear polygons associated to the reflection t. Hence we can assume that xt = [i1 ][j1 , j2 , . . . , jk ] and x = [i1 ][j1 , . . . , jℓ ]((jℓ+1 , . . . , jk )). The situation is depicted in Figure 9 below. In the concatenated diagram, the strand starting at j1 first goes to −jℓ inside βx , then the strand starting at −jℓ goes to −jk inside βt . Hence the result is that the strand starting at j1 goes to −jk , and can be drawn as in the diagram on the right since there is no obstruction for such an isotopy. Similarly, the strand starting at −jℓ+1 first goes to −jk , then to jℓ , hence is isotopic to the strand which goes directly from −jℓ+1 to −jℓ as drawn in the picture on the right. The same happens on the other side, while all other strands stay unchanged. It follows that the result of the concatenation corresponds to the diagram on the right, which is precisely the diagram Nxt associated to xt. Hence we have the claim in the case where the cover relation is the one described, with k ≥ 2. We have to show the same for the other two cover relations. We also treat the case of the last cover relation and leave the second one to the reader. Note that in the case where the cover relation is given by [j1 , . . . , jℓ ][jℓ+1 , . . . , jk ] 7→ ((j1 , . . . , jk )), 16 BARBARA BAUMEISTER AND THOMAS GOBET b ... b b −jℓ −jk j1 b −i1 ... b j2 −j1 i1 b jℓ b b −j1 b jk−1 b b i1 b j2 b jℓ b b jℓ+1 b jk−1 ... j1 ... ... jk b −jk ... b −i1 ... b jk b b −j2 b −jk−1 b −jℓ ... b −j2 b −jℓ+1 b b ... −jk−1 b −jℓ+1 jℓ+1 ... Figure 9. Concatenating diagrams corresponding to the cover relation [i1 ][j1 , . . . , jk ] 7→ [i1 ][j1 , . . . , jℓ ]((jℓ+1 , . . . , jk ). we have either ℓ = 1 and j1 = ±i1 or ℓ + 1 = k and jk = ±i1 . Assume that ℓ + 1 = k and jk = −i1 , the case where jk = i1 as well as the cases where ℓ = 1, j1 = ±i1 are similar. We have x = ((j1 , . . . , jℓ , −i1 )), t = ((jℓ , i1 )). In this case, there are two possible diagrams Nx for x and the same holds for Nt (see Figure 5 for an illustration in the case where the noncrossing partition is a reflection). Since the corresponding braids βx obtained from the two different diagrams Nx have the same image under πn,1 we can choose any diagrams among the two, but the diagram Nt has to be chosen to be compatible with the diagram Nx if we want to do the same proof as for the first cover relation. One of the two situations is represented in Figure 10. Arguing as in the first case we then get the diagram on the right of the figure for the concatenation βx ⋆ βt . This diagram is the diagram Nxt up to the orientation of the two curves joining i1 to −i1 : but changing their orientation corresponds to inverting a middle crossing in βxt eBn thanks to the relation which gives rise to a braid which has the same image in A 2 s0 = 1. This proves the claim. −j2 b ... b b −j1 i1 b −i1 b i1 b b ... b b −jℓ b −j1 b jℓ −j2 b ... −jℓ −i1 b b j1 jℓ j2 b ... j1 b j2 Figure 10. Concatenating diagrams corresponding to the cover relation [j1 , . . . , jℓ ][−i1 ] 7→ ((j1 , . . . , jℓ , −i1 )).  Corollary 5.2. Let x ∈ NC(WDn , c). Then πn,1 (βx ) = xc . SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 17 Proof. Recall that SDn = {(1, −2)(−1, 2)} ∪ {(i, i + 1)(−i, −i − 1) | i = 1, . . . , n − 1}. By construction of the braid βt from the diagram Nt we have that πn,1 (βs ) = s for all s ∈ SDn , and it is a general fact that sc = s for every simple reflection s. Hence we have the claim in case x is in SDn and in particular πn,1 (x) lies in ADn . Since by Proposition 5.1 the elements πn,1 (βt ) with t ∈ TDn satisfy the dual braid relations with respect to c, we claim that πn,1 (βt ) = tc for all t ∈ TDn . Indeed, for all t ∈ TDn , we can always find s ∈ SDn such that either st ≤T c or ts ≤T c, say, st ≤T c, and ℓS (sts) < ℓS (t) (this can be seen for instance using the noncrossing representation of t). It follows that we have the dual braid relation πn,1 (βs )πn,1 (βt ) = πn,1 (βsts )πn,1 (βs ). Arguing by induction on ℓS (t), we have that πn,1 (βq ) = qc for every reflection q occurring in the above equality except possibly t. Thanks to the dual braid relation sc tc = (sts)c sc we get that πn,1 (βt ) = tc and in particular that πn,1 (βt ) ∈ ADn . Now for x ∈ N C(WDn , c) arbitrary we can use Proposition 5.1 as well as the fact that x ≤T xt ≤T c, t ∈ TDn , implies that (xt)c = xc tc (see the end of Subsection 4.2) to get by induction on ℓT (x) that πn,1 (βx ) = xc .  5.4. Simple dual braids are Mikado braids. In all the examples drawn in the figures given in the previous sections, we see that the Artin braids βx resulting from simple dual braids are Mikado braids: they indeed satisfy the topological condition given by the point (2) of Theorem 3.2. This is the main statement which we want to prove here. Proposition 5.3. Let x ∈ NC(WDn , c). Then βx ∈ ABn is a Mikado braid. Proof. As βx ∈ ABn , it suffices to verify the point (2) of Theorem 3.2. Note that except in case x = (1, −1)(2, −2) and i1 = 2 (in which case the braid βx which is drawn in Figure 8 is obviously Mikado), the diagram which we obtained from Nx by putting all the dots on the same vertical line (as done in Figures 3 and 4; we call this diagram a vertical diagram) has the following property: each oriented curve joining two points either strictly increases or strictly decreases, and every two such distinct curves never cross. The first property follows from the fact that the diagram is obtained from Nx by projecting to the right a curve which is already either strictly increasing or strictly decreasing, while the second follows from the fact that the polygons in Nx do not cross. In such a diagram, consider a curve joining two points and going up with respect to the orientation, with no other curve lying at its right. It follows from the discussion in the paragraph above that it always exists. Every single point lying at the right of such a curve corresponds to a vertical unbraided strand in βx which lies above all the other strands. Therefore, every such point can be removed in the vertical diagram, and the symmetric point lying at the left of the curve which is symmetric to the original curve can be removed simultaneously: it corresponds to removing a vertical unbraided strand lying above all the other strands in βx , and simultaneously removing the symmetric unbraided strand lying below all the other strands, giving a new braid βx′ lying in ABn−1 since we removed a symmetric pair of strands. After removing all such points in the vertical diagram, the original curve has nothing at its right, hence corresponds to a strand which lies above all the other strands, and we can therefore remove it, as well as its symmetric strand. Again we obtain an element which lies in an Artin group of type Bm for a smaller m. Going on inductively, we can remove every strand corresponding to a curve, with a braid which stays symmetric at each step. If after removing the last curve we still have points, these correspond to vertical unbraided strands which can be removed. This concludes by Theorem 3.2. We illustrate the above procedure in Example 5.4 below. 18 BARBARA BAUMEISTER AND THOMAS GOBET  Note that we could define more generally vertical diagrams (not necessarily corresponding to simple dual braids) and associate to them an Artin braid, which would therefore always be Mikado. Example 5.4. We illustrate the procedure given in the proof of Proposition 5.3 in case x is the element x2 = ((8, 7, 5))[6, 3, 1][2] from Figure 1. The vertical diagram and the braid βx are given in Figure 7. The blue curve joining 6 to −1 in the vertical diagram has no other curve lying at its right. There is only the single point 4, which corresponds in βx to a strand which lies above all the others, with the symmetric strand −4 lying below all the others. Removing the pair of strands 4 and −4, we get a symmetric braid on 14 strands, hence in AB7 . We can then remove the strand corresponding to the original curve joining 6 to −1 as well as its symmetric strand, since there is no remaining strand lying above it. Going on inductively we eventually remove all pairs of strands. As a corollary we get the main result Theorem 5.5. Let x ∈ NC(WDn , c). Then xc is a Mikado braid. Proof. By Corollary 5.2 we have that πn,1 (βx ) = xc for every x ∈ NC(WDn , c). But by Proposition 5.3, βx is a Mikado braid in ABn . Applying Theorem 3.3 we get that xc = πn,1 (βx ) is a Mikado braid in ADn .  References [1] D. Allcock, Braid pictures for Artin groups, Trans. Amer. Math. Soc. 354 (2002), 3455-3474. [2] D. Armstrong, Generalized noncrossing partitions and combinatorics of Coxeter groups, Mem. Amer. Math. Soc. 202 (2009), No. 949. [3] C.A. Athanasiadis and V. Reiner, Noncrossing partitions for the group Dn , SIAM J. Discrete Math. 18 (2004), no. 2, 397-417 (electronic). [4] B. Baumeister, T. Gobet, K. Roberts, and P. Wegener, On the Hurwitz action in finite Coxeter groups, J. of Group Theory 20 (2017), 103-131. [5] D. Bessis, The dual braid monoid, Ann. Sci. École Normale Supérieure 36 (2003), 647-683. [6] D. Bessis, F. Digne, and J. Michel, Springer theory in braid groups and the Birman-Ko-Lee monoid, Pacific J. Math. 205 (2002), 287–309. [7] J. Birman, K.H. Ko, and S.J. Lee, A New Approach to the Word and Conjugacy Problems in the Braid Groups, Adv. in Math. 139 (1998), 322–353. [8] A. Björner and F. Brenti, Combinatorics of Coxeter groups, GTM 231, Springer, 2005. [9] N. Bourbaki, Groupes et algèbres de Lie, chapitres 4,5 et 6, Hermann (1968). [10] J. Crisp and L. Paris, Artin groups of type B and D, Adv. Geom. 5 (2005), no. 4, 607-636. [11] P. Dehornoy, F. Digne, D. Krammer, E. Godelle, and J. Michel. Foundations of Garside theory, Tracts in Mathematics 22, Europ. Math. Soc. (2015). [12] F. Digne and T. Gobet, Dual braid monoids, Mikado braids and positivity in Hecke algebras, Math. Z. 285 (2017), no. 1-2, 215-238. [13] P. Dehornoy, Three-dimensional realizations of braids, J. London Math. Soc. 60 (1999), 108–132. [14] M.J. Dyer, Modules for the dual nil Hecke ring, http://www3.nd.edu/~dyer/papers/nilhecke.pdf. [15] T. Gobet, Twisted filtrations of Soergel bimodules and linear Rouquier complexes, J. Algebra 484 (2017), 275-309. [16] P.N. Hoefsmit, Representations of Hecke Algebras of Finit Groups with BN-Pairs of Classical type, PhD thesis, University of British Columbia, August 1974. [17] J. Humphreys, Reflection groups and Coxeter groups, Cambridge Studies in Advanced Mathematics 29, Cambridge University Press (1990). [18] T. Licata and H. Queffelec, Braid groups of type ADE, Garside structures, and the categorified root lattice, preprint (2017), https://arxiv.org/pdf/1703.06011.pdf. [19] R.C. Lyndon and P.E. Schupp, Combinatorial group theory, Springer, Berlin, 1977. SIMPLE DUAL BRAIDS, NONCROSSING PARTITIONS AND MIKADO BRAIDS OF TYPE Dn 19 [20] J. McCammond and R. Sulvay, https://arxiv.org/abs/1312.7770. Artin groups of euclidean type, preprint (2013), Barbara Baumeister, Fakultät für Mathematik, Universität Bielefeld, Postfach 10 01 31, 33501 Bielefeld, Germany. E-mail address: [email protected] Thomas Gobet, Institut Élie Cartan de Lorraine, Université de Lorraine, site de Nancy, B.P. 70239, 54506 Vandoeuvre-lès-Nancy Cedex, France E-mail address: [email protected]
4math.GR
Local Parametric Estimation in High Frequency Data∗ arXiv:1603.05700v3 [q-fin.ST] 10 Mar 2017 Yoann Potiron** and Per Mykland*** ** Faculty of Business and Commerce, Keio University. 2-15-45 Mita, Minato-ku, Tokyo, 108-8345, Japan. Phone: +81 3 5418 6571. Email: [email protected], website: http://www.fbc.keio.ac.jp/~potiron *** Department of Statistics, The University of Chicago. 5734 S. University Avenue, Chicago IL, 60637. Phone: + 1 773 702 8044/8333. Fax: + 1 773 702 9810. Email: [email protected], website: http://galton.uchicago.edu/~mykland This version: March 13, 2017 Abstract In this paper, we give a general time-varying parameter model, where the multidimensional parameter, which possibly includes jumps, follows a local martingale. The quantity of interest is defined as the integrated value over time of the parameter process RT Θ = T −1 0 θt∗ dt. We provide a local parametric estimator (LPE) of Θ and conditions under which we can show the central limit theorem. The framework is restricted to the specific convergence rate n1/2 . Several examples of LPE, in which √ the conditions are shown to be satisfied assuming that the microstructure noise is Op (1/ n), are provided: estimation of volatility, powers of volatility, high-frequency covariance and volatility when incorporating trading information. The LPE considered in those cases are variations of the maximum likelihood estimator. We also treat the case of time-varying model with uncertainty zones and the time-varying MA(1). Keywords: high-frequency data; integrated volatility ; local martingale; local parametric estimator; market microstructure noise; powers of volatility; quasi-maximum likelihoodestimator MSC2010 subject classifications: 62G05, 62G20, 62M09, 91B84. ∗ Financial support from the National Science Foundation under grant DMS 14-07812 and from Keio University is greatly acknowledged. We are indebted to Simon Clinet, Takaki Hayashi, Dacheng Xiu, participants of the seminars in Berlin and Tokyo and conferences in Osaka, Toyama, the SoFie annual meeting in Hong Kong, the PIMS meeting in Edmonton for valuable comments, which helped in improving the quality of the paper. 1 1 Introduction Modeling dynamics is very important in various fields, including finance, economics, physics, environmental engineering, geology and sociology. Time-varying parametric models can deal with a special problem in dynamics, namely, the temporal evolution of systems. The extensive literature on time-varying parameter models and local parametric methods include and are not limited to Fan and Gijbels (1996), Hastie and Tibshirani (1993) or Fan and Zhang (1999) when regression and generalized regression models are involved, locally stationary processes following the work of Dahlhaus (1997, 2000), Dahlhaus and Rao (2006), or any other timevarying parameter models, e.g. Stock and Watson (1998) and Kim and Nelson (2006). In this paper, we propose to specify local parametric methods in the particular context of high-frequency observations for a general class of problems. Local methods have been used very much in the high-frequency data literature, see e.g. Mykland and Zhang (2009, 2011), Kristensen (2010), Reiß (2011) or Jacod and Rosenbaum (2013) among many others. If we define T as the horizon time, the target quantity in this monograph is defined as the integrated parameter Z 1 T ∗ Θ := θ ds, (1) T 0 s which can be equal to the volatility, the covariation between several assets, the variance of the microstructure noise, the friction parameter of the model with uncertainty zones (see Section 4.5 for more details), the time-varying parameters of the MA(1) model, etc. To estimate the integrated parameter, we estimate the local parameter on each block by using the parametric estimator on the observations within the block and take a weighted sum of the local parameter estimates, where each weight is equal to the corresponding block length. We call the obtained estimator the local parametric estimator (LPE). In Section 3, we investigate conditions under which we can establish the corresponding central limit theorem (CLT) with convergence rate n1/2 , where n is the (possibly expected) number of observations. The framework is such that the local block length vanishes asymptotically. The main contribution of this paper is not so much the general technology in itself described in this section, which is rather simple and natural, as the six applications which are derived easily as a corollary to the introduced theory along with their respective central limit theory work. Those applications are discussed extensively in Section 4 where we also provide the associated CLTs. As far as the authors know, all those results are new. Depending on the considered example, the LPE is useful for one or several of the following reasons: robustness: the LPE is robust to time-varying parameters (such as the noise variance, η from the model with uncertainty zones, the parameters of the MA(1) process) which are usually assumed constant. This is the case of all our examples, except for Example 4. efficiency: the LPE turns out to be more efficient than the global estimator or existing concurrent approaches. This is the case of Example 4. In addition, the LPE is conjectured to be efficient in all our examples except for Example 5. 2 definition of new estimators: It can be the case that the estimator doesn’t work globally but that the LPE provides a good candidate as in Example 2 and Example 4. We describe the six examples in what follows. To estimate integrated volatility under noisy observations, Xiu (2010) studied the quasi-maximum likelihood-estimator (QMLE), showed the corresponding asymptotic theory when the variance of the noise is fixed and obtained a convergence rate n1/4 , which is optimal (see Gloter and Jacod (2001)). The behavior of the QMLE remains unknown when the variance of the noise goes to 0. When assuming that it is √ Op (1/ n), we show that the LPE of the QMLE is optimal (with rate n1/2 ) and furthermore robust to time-varying noise variance. Another important problem, which goes back to Barndorff-Nielsen and Shephard (2002), is the estimation of higher powers of volatility. When there is microstructure noise, Jacod et al. (2010) show that the pre-averaging approach can be used, although not working when estimating the integral of σtk with odd k. To estimate the powers of volatility, we define a LPE where the local estimates are powers of the QMLE of volatility. Under the assumption √ on small noise Op (1/ n), we show that this estimator is optimal and robust to time-varying noise variance. In particular, as far as the authors know, this provides the first estimator of the tricity (i.e. the integrated third moment of volatility) with noisy observations under which the central limit theory is investigated. Furthermore, this is an example where the global approach doesn’t work as the QMLE is only consistent when estimating volatility. The third example is the estimation of the high-frequency covariance with the QMLE from Aït-Sahalia et al. (2010). As for the volatility problem and under the assumption on snall noise, we show that the LPE of QMLE is optimal and robust to time-varying noise variance. A more recent problem is the estimation of volatility when incorporating trading information. To do that, Li et al. (2016) assume that the noise is a parametric function of trading √ information with a remaining noise component of order Op (1/ n). Their strategy consists in first estimating the parametric part of the noise, and then take the sum of square pre-estimated efficient returns. They also advocate for the use of the QMLE after price pre-estimation although they don’t provide the associated limit theory. We show that the latter approach, when considering the LPE of QMLE, is optimal and provides a better asymptotic variance (AVAR) than the former technique. In addition, a modification of the local estimator as in Example 2 allows us to estimate higher powers of volatility. A concurrent ultra high frequency approach to model the observed price was given in Robert and Rosenbaum (2011, 2012), who introduced the semiparametric model with uncertainty zones where η is the 1-dimensional friction parameter, observation times are endogenous and observed prices lie on a tick grid. As most likely correlated with the volatility, it is natural to consider ηt as a time-varying parameter. We provide a formal model extension and establish the according limit theory of the LPE of the estimator considered in their work. In addition, our empirical illustration seems to indicate that ηt is indeed time-varying. In the last example, we consider an application in time series and introduce a time-varying MA(1) model with null mean. The time series is observed in high frequency on [0, T ] and θt∗ 3 corresponds to the two-dimensional parameter of the MA(1) process. We show that the LPE of the MLE is optimal and document that it outperforms the global MLE and other concurrent approaches in finite sample. As the spectrum of applications is diverse, the locally parametric model (LPM) introduced in Section 2 is very general. In particular, in the case where we model the price of an asset as a continuous efficient Itô process, it allows for endogeneity, auto-correlated time-varying noise, correlation between the efficient return and the noise, as well as multidimensional asynchronous observations. The disadvantage of such approach is that the definition of the LPM and the corresponding CLT conditions are rather involved, and thus we advise the reader to consult Section 2 and Section 3 with a simple setting in mind. In addition, we specify the conditions when observations are regular in Section 3.4. The remaining of this paper is organized as follows. The LPM is introduced in the following section. Conditions for the CLT are stated in Section 3. We give the examples in Section 4. We investigate the finite sample performance of the LPE in a time-varying MA(1) model in Section 5. An empirical illustration on the model of uncertainty zones is carried out in Section 6. We conclude in Section 7. Proofs and theoretical arguments are discussed in the Appendix. 2 2.1 The Locally Parametric Model (LPM) Vocabulary We need first to fix the vocabulary for the rest of this paper. Parametric model will refer to the (non time-varying) parametric model of the econometrician, and not to the time-varying parameter model. Correspondingly, parametric estimator stands for the parametric estimator (in the parametric model). 2.2 Data-generating mechanism We assume that we infer from the dr -dimensional vectors {R1,n , · · · , RNn ,n }, which are functions of the observations where Nn can be random, the observation times are such that τ0,n := 0 < τ1,n < · · · < τNn ,n ≤ T and τi−1,n , τi,n is the time block corresponding to (d ) Ri,n . We further assume that the last component of Ri,n , Ri,nr , is equal to the time increment (1) ∆τi,n . As an example when dr := 2, Ri,n can be defined as the (possibly log) returns of the original observations. As such, we will refer abusively to Ri,n as returns in the rest of the paper, but they should be thought as observable quantities. We assume that the returns Ri,n depend on the underlying parameter process θt∗ . In particular, the sampling times can depend on θt∗ . 2.3 The parameter  We will assume that the p-dimensional parameter process θt∗ := (θt∗ )(1) , · · · , (θt∗ )(p) , which is restricted to lie in K, a (not necessarily compact) subset of Rp , is a continuous local martingale 4 of the form dθt∗ := σtθ dWtθ (2) where σtθ is a random nonnegative process (of dimension p × p), and Wtθ a standard pdimensional Brownian motion. The parameter θt∗ can be for example equal to the volatility, the high-frequency covariance, the time-varying noise variance, the friction parameter η from the model with uncertainty zones, the parameters of the MA(1) process, etc. It is actually possible to include finite activity jumps and a drift in the parameter (see Section 4). We don’t assume any independence between θt∗ and the other quantities driving the observations, such as the Brownian motion of the efficient price process, the volatility of the efficient price process, the microstructure noise, etc. In particular, there can be leverage effect (see e.g. Wang and Mykland (2014), Aït-Sahalia et al. (2014)). Also, the arrival times τi,n and the parameter θt∗ can be correlated, i.e. there is endogeneity in sampling times. In the rest ofP this paper, for any u-dimensional vector ν := (ν (1) , · · · , ν (u) ), we will use the notation | ν |:= uk=1 |ν (k) | when referring to the Manhattan norm. Also, for any θ ∈ K, we define the 1-dimensional vector θ+ as the minimum value of the 1-dimensional sub-parameters restricted to be positive. We assume that | θt∗ | is locally bounded and (θt∗ )+ is locally bounded away from 0. Furthermore, we assume that the volatility of the parameter, σtθ , is locally bounded. 2.4 Asymptotics There are commonly two choices of asymptotics in the literature: the high-frequency asymptotics, which makes the number of observations explode on [0, T ], and the low-frequency asymptotics, which takes T to infinity. We chose the former one. Investigating the low-frequency implementation case is beyond the scope of this paper1 . 2.5 The model for the returns We insist on the fact that the reader shouldn’t spend too much time on this general version of the model and advise her to go directly to Section 2.6 for one key example. Alternatively, we advise the reader curious to see where the general model comes from to consult Appendix I prior to reading this section. In what follows, the general time-varying parameter model is given in (4), whereas the parametric model is provided in (3). We want to allow a general model for the returns Ri,n . To do that, we introduce the random non-observed quantities Qi,n , which take values into the general space Qn . We also define Mi,n := (Qi,n , Ri,n ), and assume that Mi,n take values on the space Mn 2 , which is a subset of Qn × Rdr . Let m be a nonnegative integer (which can be infinite) which will stand 1 If we set down the asymptotic theory in the same way as in p.3 of Dahlhaus (1997), we conjecture that the results of this paper would stay true. 2 Mn is assumed to be a Borel space. 5 for the order of memory in the model. We define the m initial values M−(m−1),n , · · · , M0,n of the Markov chain. Also, we introduce the m-dimensional "memory" vectors of past quantities Mi,n := (Mi,n , · · · , Mi−(m−1),n ), which take values on a space Mm,n (subset of Mm n ). Finally, we will refer to Mi,n := (Qi,n , Ri,n ) respectively for the unobserved part and the observed part of Mi,n . The parametric model is assumed to be expressed as Mi,n := Fn (Mi−1,n , Ui,n , θ∗ ), (3) where Fn (x, y, z) is a Mn -valued non-random function3 , the random innovation Ui,n are independent and identically distributed (IID) with distribution U for a fixed n (but the distribution can depend on n) and independent of the past information. We assume that the time-varying parameter model can be expressed as4 Mi,n = Fn (Mi−1,n , Ui,n , {θs∗ }τi−1,n ≤s≤τi,n ). (4) The interpretation of Qi,n is as follows. Among all the non-observed information we have from the past, Qi,n are the quantities which matter in the distribution of the future returns. In particular, the parametric model (3) allows for auto-correlation in returns (up to a lag possibly bigger than m). 2.6 A simple setting: regular observations with additive IID noise We provide here one key example. Assume that the observations are following the additive model Zτi,n = Xτi,n + i,n , where Xt = σt dWt is the efficient price and i,n the IID noise independent from Xt . We also assume that observations are regular τi,n = iT /n. In that case the parameter is θt∗ = σt2 , the leverage effect is possible, and the returns are simply defined as Ri,n = Zτi,n − Zτi−1,n , the unobserved quantity Qi,n = i,n , and Ui,n = ({Ws }τi−1,n ≤s≤τi,n , i,n ). The order of the model is m = 1. The form of Fn can be defined from the expression Z τi,n   σs dWs + i,n − i−1,n i,n , τi−1,n = Fn  Z τi−1,n i−1,n ,   σs dWs + i−1,n − i−2,n , ({Ws }τi−1,n ≤s≤τi,n , i,n ), {σs2 }τi−1,n ≤s≤τi,n . τi−2,n 3 We assume that for i any positive integer, Ui,n ∈ Un where Un is a Borel space and that Fn (x, y, z) is defined on Mm,n × Un × Cp (R+ ). Additionally, we assume that Fn (x, y, z) is a jointly measurable Mn -valued function such that for any (Mn , Un , θt ) ∈ Mm,n × Un × Cp (R+ ), we have E | Fn (Mn , Un , θt ) |< ∞ 4 In all generality, we can assume Mi,n = Fn (Mi−1,n , Ui,n , {θs∗ }0≤s≤τi,n ), and the central limit theorem stays true under this more general assumption. In that case, the conditions of Section 3 would be slightly altered. Nonetheless, we choose to work under (4) to keep the analysis more tractable in Section 3. 6 2.7 Estimation The approach taken here is usual in high-frequency data. We define the block size as hn , and the number of blocks as Bn := pNn h−1 n q. For i = 1, · · · , Bn we define the spot parameter’s average on the ith block as R Ti,n Θi,n := ∗ Ti−1,n θs ds ∆Ti,n , (5) b i,n . Then, we take where Ti,n := min(τihn , T ) and its corresponding parametric estimator as Θ b i,n and obtain an estimator of the integrated spot process the weighted sum of Θ Bn X b n := 1 b i,n ∆Ti,n . Θ Θ T (6) i=1 Note that each block includes exactly hn observations, except for the last one, which might include fewer observations. We call (6) the local parametric estimator (LPE). 3 The central limit theorem We investigate in the following of this section the limit distribution. We advise the reader that the notations and conditions are very much involved although the reasoning is rather standard. This is due to the generality of the problem, in particular from the possible endogeneity of observation times. We specify and simplify the conditions in the regular observation times case in Section 3.4. The reason why we expose the following conditions is that the central limit theory of the examples from Section 4 is obtained as a corollary5 of this section. We insist on the fact that different approaches could have led to a different set of conditions. 1 The following methods are specified6 to the rate of convergence n 2 . Formally, we aim to find the limit distribution of 1 n 2 T −1 Bn X  b i,n − Θi,n ∆Ti,n . Θ (7) i=1 Specifically, we want to show that (7) converges stably 7 to a limit distribution. 5 By corollary, we mean that they are a corollary of the obtained conditions in this section together with results from their own central limit theory work 6 It is possible to specify the problem with a general rate of convergence, but all the considered examples from this paper are with rate n1/2 . 7 One can look at definitions of stable convergence in Rényi (1963), Aldous and Eagleson (1978), Chapter 3 (p. 56) of Hall and Heyde (1980), Rootzén (1980), and Section 2 (pp. 169-170) of Jacod and Protter (1998). 7 3.1 Stable convergence We give the definition of stable convergence and the according condition. Definition. (stable convergence) A sequence of integrable variable Zn known with information J is said to converge weakly to an integrable random variable Z if for all E ∈ J ,     E Zn 1E → E Z1E This mode of convergence, which is a bit stronger than the regular convergence in distribution, is due for the statistical purpose. Because we will obtain in the variance limit of (7) random quantities, we need the stable convergence to infer the same way we would do it if the variance limit was nonrandom. Since the stable convergence needs a corresponding information J to be defined with, we need to be more specific about the definition of J . We will be needing the following technical assumption, which can be easily verified on all the considered examples. The idea goes back to Heath (1977). We define Ii,n the information up to time τi,n as follows. We assume that Ii,n is a (discrete-time) filtration on (Ω, F, P ) such that {θs∗ }0≤s≤τi,n and Ui,n are adapted to Ii,n . Also, we assume that M0,n is I0,n -measurable. Finally, the assumption "Ui,n independent of the past information" can be formally expressed as Ui,n independent of Ii−1,n . Condition (E0). Ii,n can be extended into Ji,n 8 , where Ji,n is the interpolated information (c) (c) of a continuous information Jt , i.e. Ji,n = Jτi,n .   In the following of this paper, when using the conditional expectation Eτ Z 9 , we will (c) (c) refer to the conditional expectation of Z knowing Jτ . Finally, we consider J := JT information to go with stable convergence. 3.2 the Preliminary definitions and outline The parametric estimator takes the following form θ̂k,n := θ̂k,n (r1,n ; · · · ; rk,n ; r0,n ). (8) Let i = 1, · · · , Bn be the block number. We define the Markov chain elements on the ith block j Mi,n := M(i−1)hn +j,n for j = 1, · · · , hn . We also define the initial vector of the ith block as −(m−1) 0 ,··· ,M M0i,n := (Mi,n i,n ) := M(i−1)hn ,n . We assume that b i,n := θ̂h ,n (R1 ; · · · ; Rhn ; R0 ). Θ i,n i,n n i,n We alo introduce the following definition. 8 9 It means that Ji,n is a discrete filtration and for any i nonnegative integer Ii,n ⊂ Ji,n (c) The underlying assumption is that τ is a Jt -stopping time. 8 (9) (1),i  (1),i Definition. EM,n For any block number i = 1, · · · , Bn and any M > 0, EM,n is defined as 1 , · · · , U hn ) ∈ E the bounded space of time-varying parameter θt such that (θt , Ui,n M,n . i,n Consider the block number i = 1, · · · , Bn . Let M > 0, M ∈ Mm,n , θ ∈ KM and (1),i j,M,θ j,M,θt θt ∈ EM,n . For any j = −(m − 1), · · · , hn we define Mi,n and Mi,n the Markov chain approximations with initial vector M and fixed parameter θ (respectively with time-varying −(m−1),M,θ 0,M,θ parameter process θt ). The initial vectors are defined as (Mi,n , · · · , Mi,n ) := M −(m−1),M,θt and (Mi,n 0,M,θt , · · · , Mi,n ) := M. Also, we define the m-dimensional "memory" vectors j−(m−1),M,θ j−(m−1),M,θ j,M,θ j,M,θt t t as Mj,M,θ := (Mi,n , · · · , Mi,n ) and Mj,M,θ := (Mi,n , · · · , Mi,n ). Fii,n i,n nally, for any positive integer j, the jth element of the ith block Markov chain approximations are obtained by the same recurrence relations as (3) and (4)  j,M,θ j−1,M,θ i Mi,n := Fn Mi,n , Uj,n ,θ , (10)  j,M,θt j−1,M,θt j Mi,n := Fn Mi,n , Ui,n , {θs }τ j−1 ≤s≤τ j . (11) i,n i,n ˆ M with initial vector M ∈ M . We introduce now the infeasible estimator on the ith block Θ̃ m,n i,n The infeasible estimator is defined as 1,M,Θ̃i,n h ,M,Θ̃i,n 0,M,Θ̃ ˆ M := θ̂ Θ̃ ; · · · ; Ri,nn ; Ri,n i,n ). hn ,n (Ri,n i,n (12) Since there is endogeneity, observation times matter in this work. When approximating the returns on a block holding the parameter θt∗ constant, we also induce a change in the observation times. For that reason, we introduce the following definitions. We define the length of the with starting vector M and with non time-varying parameter θ as Phnith block M,θ j,M,θ (dr ) ∆Ti,n := j=1 (Ri,n ) and the length of the ith block with starting vector M and with P n j,M,θt (dr ) t (Ri,n ) . time-varying parameter θt as ∆TM,θ := hj=1 i,n Let the nonrandom known vector M∗n := (Q∗n , R∗n ) ∈ Mm,n , which is chosen by the econometrician to carry the analysis of (7). For instance, in the case of an additive IID noisy model as studied in Section 2.6, we can simply choose M∗n := (0, 0), i.e. the starting return  b i,n − Θi,n ∆Ti,n as and noise are null. We can decompose Θ ˆ M0i,n ∆TM0i,n ,Θ̃i,n  + Θ̃ ˆ M0i,n ∆TM0i,n ,Θ̃i,n − Θ̃ ˆ M∗n ∆TM∗n ,Θ̃i,n  b i,n ∆Ti,n − Θ̃ Θ i,n i,n i,n i,n i,n i,n    M∗n ,Θ̃i,n M∗n ,Θ̃i,n M∗n ˆ + Θ̃i,n − Θ̃i,n ∆Ti,n + Θ̃i,n ∆Ti,n − ∆Ti,n + Θ̃i,n − Θi,n ∆Ti,n (13) where the first term is the error in estimation due to the use of the approximated model (12) instead of the time-varying parameter model (4), the second term is the error made when taking M∗n instead of M0i,n as initial value of the block in the mixture of the parametric model (12), the third term corresponds to the error of the estimation of the constant parameter by the underlying approximations starting with a fixed initial value M∗n , the fourth term corresponds to the error of arrival times approximation when considering a parametric model starting with 9 initial value M∗n and the last term is the error made by holding the process parameter constant ˆ M0i,n is a mixture of the parametric model with parameter Θ̃ and on each block. Note that Θ̃ i,n i,n M0i,n . a mixture of starting value It is instructive to consider (13) when we assume that the time-varying parameter model is equal to the parametric model and that the observation times are regular. In that case, all the previously defined block length approximations are equal to ∆Ti,n . The first term, the fourth term and the fifth term are equal to 0 by definition. Additionally, we can hope that asymptotically the initial values of the blocks will be forgotten and thus that under right conditions Bn 1 X ˆ M0 ˆ M∗n ∆T ≈ 0. Θ̃ i,n − Θ̃ n2 i,n i,n i,n i=1 1 Finally, if we assume that we know the convergence rate n 2 and the limit distribution N (0, Vθ∗ ) 1  of the parametric estimator, for any i = 1, · · · , Bn we have that hn2 Θ̂i,n − θ∗ ∆Ti,n ≈ N (0, Vθ∗ )∆Ti,n and thus we can hope that 1 2 n T −1 Bn X  b i,n − θ∗ ∆Ti,n ≈ N (0, Vθ∗ ) Θ i=1 under right assumptions (in particular on the block size hn ). The time-varying parameter model and endogenous arrival time case will be treated in a similar way than the parametric model case. Formally, we will be providing in what follows conditions such that Bn  1 X P n2 Θ̃i,n − Θi,n ∆Ti,n → 0, (14) i=1 1 n2 n Bn X 1 2 M∗ ,Θ̃i,n Θ̃i,n ∆Ti,nn i=1 Bn X − ∆Ti,n  (15)  Z  M∗n ,Θ̃i,n st-D M∗n ˆ Θ̃i,n − Θ̃i,n ∆Ti,n → T 0 i=1 1 P → 0, n 2 T −1 T 1 2 Vθs∗ ds N (0, 1), Bn X P ˆ M0i,n ∆TM0i,n ,Θ̃i,n − Θ̃ ˆ M∗n ∆TM∗n ,Θ̃i,n  → Θ̃ 0, i,n i,n i,n i,n (16) (17) i=1 1 n2 Bn X P ˆ M0i,n ∆TM0i,n ,Θ̃i,n  → b i,n ∆Ti,n − Θ̃ Θ 0. i,n i,n (18) i=1 Note that if the sampling times are not regular, Vθ∗ will most likely be different from the variance of the parametric estimator. For instances of this when estimating volatility, one can look at Corollary 2.30 on p.154 in Mykland and Zhang (2012), where the "Asymptotic Quadratic Variation of Time" alters the variance of the RV estimator. 10 3.3 Main result In the following, we provide six conditions which we describe in what follows. Condition (E1) - Condition (E4) are used to prove (14) - (16). Moreover, (17) is proven with Condition (E5). Finally, we can show (18) if we assume Condition (E6). The first two assumptions are due to the endogeneity of sampling times and are not needed in the regular case specified in Section 3.4. Condition (E1). The observation times are such that for k = 1, 2, 4, 8   sup Eτi−1,n (∆τi,n )k = Op (n−k ). (19) 1≤i≤Nn Remark 1. (block length) As consequence of (19) when k = 1, we have that the  an obvious  block length is such that E ∆Ti,n = O(hn n−1 ). We make a second assumption on the observation times, which is due to non regularity of arrival times. We make sure that when the initial Markov-chain is fixed to M∗n , we can bound the difference in length between the approximated block and the true block, uniformly in the block initial value parameter θ0 and the path of the parameter process θt . Let M > 0 and (i) i = 1, · · · , Bn . For any θt ∈ EM,n , M ∈ Mm,n and N ∈ Mm,n , we define the difference in block length expectation as   M,N,θt t 0 Ei,n := E ∆TM,θ − ∆TN,θ i,n i,n , and the difference variance as   M,N,θt t 0 := Var ∆TM,θ − ∆TN,θ Vi,n i,n . i,n Condition (E2). For any M > 0, we have Bn X i=1 M∗n ,M0i,n ,θt sup (i) θt ∈EM,n Bn X Ei,n M∗n ,M0i,n ,θt sup Vi,n 1 = op (n− l ), 2 = op (n− l ). (20) (21) (i) i=1 θt ∈EM,n The following condition is the main assumption of this section. On examples in Section 4, it is verified using the central limit theory proofs of the respective estimators. Because we allow for endogeneity of observation times, the conditions are more involved. We advise the reader to consult Condition (E3’) in Section 3.4 for the regular observation times case. We introduce the    M,θ 1,M,θ hn ,M,θ definition of the bias on the ith block Bi,n := E θ̂hn ,n (Ri,n ; · · · ; Ri,n ; R) − θ ∆TM,θ i,n for any M ∈ Mm,n and any θ ∈ K. 11 Condition (E3). For any parameter θ ∈ K, we assume that there exists a covariance matrix Vθ > 0 such that for any M > 0, we have Vθ is bounded for any θ ∈ KM and uniformly in θ ∈ KM and in i = 1, · · · , Bn  1   1,M∗ ,θ h ,M∗ ,θ M∗ ,θ  M∗ ,θ  Var hn2 θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ ∆Ti,nn = Vθ E ∆Ti,nn T hn n−1 + o(h2n n−2 )     ∗ ∗ ∗ 1,M ,θ h ,M ,θ M ,θ 4 E θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ ∆Ti,nn = O(h2n n−4 ) M∗ ,θ Bi,nn = o(hn n − 23 ) (22) (23) (24) We make a fourth assumption, which is on the block size hn . In practice, Condition (E4) provides us with the maximum block size hn to use for constant approximation of parameter. Note that the condition corresponds exactly to the block size order found in Mykland and Zhang (2011), who investigated how constant we can hold volatility in a small neighborhood in the case of regular observations of the price following a continuous Itô-process. Condition (E4). The block size hn is such that 1 n− 2 hn = o(1). (25) The next condition assumes that through uniformity in the parameter value and future parameter path, we can bound the discrepancy of the parametric model starting with two different initial vectors. Let M > 0. For any θ ∈ KM , M1 ∈ Mm,n and M2 ∈ Mm,n , we introduce the difference bias on the ith block as h M1 ,M2 ,θ 1,M1 ,θ hn ,M1 ,θ 1 ,θ Ei,n := E θ̂hn ,n (Ri,n , · · · , Ri,n ; R1 )∆TM i,n i 1,M2 ,θ hn ,M2 ,θ 2 ,θ − θ̂hn ,n (Ri,n , · · · , Ri,n ; R2 )∆TM , i,n and the difference variance as h M1 ,M2 ,θ 1,M1 ,θ hn ,M1 ,θ 1 ,θ Vi,n := Var θ̂hn ,n (Ri,n , · · · , Ri,n ; R1 )∆TM i,n i 1,M2 ,θ hn ,M2 ,θ 2 ,θ − θ̂hn ,n (Ri,n , · · · , Ri,n ; R2 )∆TM , i,n Condition (E5). For any M > 0 we have Bn X M0 ,M∗n ,θ sup Ei,ni,n i=1 θ∈KM Bn X M0 ,M∗n ,θ sup Vi,n i,n i=1 θ∈KM 12 1 = op (n− 2 ), (26) = op (n−1 ). (27) The last condition is very similar to Condition (E5), except that we are not looking at the discrepancy induced by different initial vectors but rather the difference between the timevarying parameter model and the parametric model when initial vectors are equal. For that reason, we provide the following definitions. Let i = 1, · · · , Bn be the block number. For any (1),i M > 0, any θt ∈ EM,n and any M ∈ Mm,n , we introduce the difference bias on the ith block as  M,θt 1,M,θt hn ,M,θt t Ei,n := E θ̂hn ,n (Ri,n , · · · , Ri,n ; R)∆TM,θ i,n  1,M,θ0 hn ,M,θ0 0 , − θ̂hn ,n (Ri,n , · · · , Ri,n ; R)∆TM,θ i,n as well as the variance of the difference  M,θt 1,M,θt hn ,M,θt t Vi,n := Var θ̂hn ,n (Ri,n , · · · , Ri,n ; R)∆TM,θ i,n  1,M,θ0 hn ,M,θ0 0 − θ̂hn ,n (Ri,n , · · · , Ri,n ; R)∆TM,θ . i,n Condition (E6). For any M > 0, we have Bn X sup (1),i M0 ,θt 1 Ei,ni,n = op (n− 2 ), (28) = op (n−1 ). (29) i=1 θt ∈EM,n Bn X i=1 M0 ,θt sup Vi,n i,n (1),i θt ∈EM,n We now state the main theorem of this paper, which investigates the limit distribution of (13). Theorem 1. (Central Limit Theorem) Assume Condition (E0) - Condition (E6). Then, stably in law as n → ∞, Z T 1   1 2 b n − Θ → T −1 n2 Θ Vθs∗ ds N (0, 1). (30) 0 Remark 2. (parametric model with regular observations) Note that in the case where observations are regular and the time-varying parameter model is equal to the parametric model b n is equal to the variance of the with true parameter θ∗ , the asymptotic variance (AVAR) of Θ parametric model, i.e. 1  1 b n − Θ → V 2∗ N (0, 1). n2 Θ θ Remark 3. (subset parameter estimation) In practice, one can be interested in estimating only a p0 -dimensional integrated parameter Ξ, where p0 ∈ {1, · · · , p − 1} and Ξ is a subset of Θ. If we define in analogy with the quantities depending on θt∗ the p0 -dimensional subquantities b i,n Ξ b n as well as the p0 × p0 -dimensional matrix Vξ , the Central Limit Theorem ξt∗ , ξˆk,n , Ξi,n , Ξ still holds in that case under the same assumptions Z T  1  1 2 −1 b n 2 Ξn − Ξ → T Vθs∗ ds N (0, 1). 0 13 Remark 4. (estimating the asymptotic variance) If the practitioner doesn’t have a (parametric) variance estimator at hand and that her parametric estimator can be written as in Mykland and Zhang (2016), one can use the techniques of the cited paper to obtain a variance estimate. Investigating if such techniques would work in our setting is beyond the scope of this paper. If she has a variance estimator v̂hn ,n , then for any i = 1, · · · , Bn she can estimate the ith 1 ; · · · ; Rhn ; R0 ), and the asymptotic variance as the block variance Vbi,n as Vbi,n := v̂hn ,n (Ri,n i,n i,n weighted sum Vbn = T −2 Bn X Vbi,n ∆Ti,n . (31) i=1 Under conditions similar to the ones in Appendix I and the ones from this current section, we can obtain the consistency of (31). 3.4 When observation times are regular We specify Theorem 1 when observations are regular, i.e. τi,n = iT n . In that case, note that Condition (E1) and Condition (E2) are straightforwardly satisfied. We also have that Condition (E4) remains unchanged. Finally, we adapt the other conditions in the following. Condition (E3’). For any parameter θ ∈ K, we assume that there exists a covariance matrix Vθ > 0 such that for any M > 0, we have Vθ is bounded for any θ ∈ KM and uniformly in θ ∈ KM and in i = 1, · · · , Bn  1  1,M∗ ,θ h ,M∗ ,θ Var hn2 θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ = Vθ T hn n−1 + o(h2n n−2 )    ∗ ∗ 4 1,M ,θ h ,M ,θ E θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ = O(h−2 n )   ∗ ∗ 1 1,M ,θ h ,M ,θ E θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ = o(n− 2 ) (32) (33) (34) Condition (E5’). For any M > 0 we have Bn X h 1,M0 ,θ hn ,M0 ,θ sup E θ̂hn ,n (Ri,n i,n , · · · , Ri,n i,n ; R0i,n ) i=1 θ∈KM 1,M∗n ,θ −θ̂hn ,n (Ri,n Bn X h ,M∗n ,θ , · · · , Ri,nn i −1 1 ; R∗n ) = op (hn 2 n 2 ), (35) h 1,M0 ,θ hn ,M0 ,θ sup Var θ̂hn ,n (Ri,n i,n , · · · , Ri,n i,n ; R0i,n ) i=1 θ∈KM 1,M∗n ,θ −θ̂hn ,n (Ri,n h ,M∗n ,θ , · · · , Ri,nn 14 i ; R∗n ) = op (h−1 n n), (36) Condition (E6’). For any M > 0, we have Bn X sup (1),i  1,M0 ,θt hn ,M0 ,θt E θ̂hn ,n (Ri,n i,n , · · · , Ri,n i,n ; R0i,n ) i=1 θt ∈EM,n 1,M0i,n ,θ0 −θ̂hn ,n (Ri,n Bn X i=1 sup Var (1),i θt ∈EM,n  hn ,M0i,n ,θ0 , · · · , Ri,n 1,M0i,n ,θt θ̂hn ,n (Ri,n 1,M0i,n ,θ0 −θ̂hn ,n (Ri,n ; R0i,n ) hn ,M0i,n ,θt , · · · , Ri,n hn ,M0i,n ,θ0 , · · · , Ri,n  −1 1 = op (hn 2 n 2 ), (37) ; R0i,n )  ; R0i,n ) = op (h−1 n n). (38) We now provide the corresponding theorem. Theorem 2. (Central Limit Theorem with regular observation times) Assume Condition (E0), Condition (E3’), Condition (E4), Condition (E5’) and Condition (E6’). Then, stably in law as n → ∞, Z T  1  1 2 b n − Θ → T −1 Vθs∗ ds N (0, 1). (39) n2 Θ 0 4 Examples This section provides some applications of the theory introduced in Section 3. To show that the conditions are satisfied, we use the theory work from each considered estimator. In all those examples this is relatively straightforward to show that conditions hold (see the proofs in Appendix II), indicating that our theory can be applied easily in those cases. The corresponding CLTs provided in this section are all new. We choose five examples with regular observations in which it is sufficient to show the conditions of Theorem 2. We further consider the model with uncertainty zones where there is endogeneity in observation times and in which we need to verify the more general conditions of Theorem 1. Two further examples of application of those techniques include our own recent work. Due to the high complexity of those instances, the conditions of Theorem 1 are not straightforwardly satisfied, but they provided a basis of work which significantly simplified the proofs. Potiron and Mykland (2017) introduced a bias-corrected Hayashi-Yoshida estimator (Hayashi and Yoshida (2005)) of the high-frequency covariance and showed the corresponding CLT under endogenous and asynchronous observations. To model duration data, Clinet and Potiron (2017a) built a time-varying parameter extension to the Hawkes self-exciting process, derived the bias-corrected MLE and showed the CLT of the corresponding LPE. In all the examples considered we have that the convergence rate n1/2 is optimal from Gloter and Jacod (2001). Thus the CLTs provided in the following of this section are all optimal. In the case of (42) in Example 1, (44) in Example 2, Theorem 5 (ii) and Theorem 15 6 (ii) in Example 4, Theorem 8 in Example 6, we also have a parametric estimator which achieves the Cramér-Rao bound of efficiency locally, thus we conjecture that the obtained variance is the nonparametric efficient bound. In the case of (41) in Example 1, i.e. when √ estimating volatility assuming that the noise is very small i,n = op (1/ n), the asymptotic R R T T variance is equal to 6T −1 0 σs4 ds, whereas the efficient bound 2T −1 0 σs4 ds is attained by the RV. This increases the variance by a factor of 3, which is also observed on the MLE (when assuming the volatility is constant) when misspecified on a model which doesn’t incorporate microstructure noise (see, e.g., Section 2.4 pp. 1486-1487 in Barndroff-Nielsen et al. (2008)). Rt Example 4.1-4.5 feature an underlying continuous-Itô price model dXt = 0 σu dWu (Example 4.6 considers a time series without any underlying price process). We discuss now how we can add a drift, allow for finite activity jump in both the price process and volatility and stochastic observation times when needed. We first show how to add a drift component. By Girsanov theorem, together with local arguments (see, e.g., pp. 158-161 in Mykland and Zhang (2012)), we can weaken the price and volatility local-martingale assumption by allowing them to follow an Itô-process (of dimension 2 in case of volatility or powers of volatility estimation, dimension 4 when considering the highfrequency covariance problem), with a volatility matrix locally bounded and locally bounded away from 0, and drift which is also locally bounded. It is also easy to see that we can allow for finite activity jumps in θt∗ and in Xt with a b i,n to a certain threshold truncation technique. To do that, one might cap the values of Θ e i,n = min(Θ b i,n , S). Consider S which doesn’t depend on n. More specifically, we define Θ ∗ Jn ⊂ {1, · · · , Bn } the set of blocks where there is at least one jump in θt and/or Xt . As the number of blocks B → ∞, the cardinal of Jn is at most finite, and thus we have that Nn X 1X e i,n ∆Ti,n ≈ 1 e i,n ∆Ti,n . Θ Θ T T i=1 i∈J / n It is then immediate to adapt the proof of the CLT, and it also works for Example 4.6 (in the case of the parameter jump only). Actually, when jumps occur only in the parameter, we don’t require to truncate the estimator. On the other hand, if infinitely many jumps are possible in both the price process and the parameter, the theoretical development is beyond the scope of this paper. In Example 4.1-4.4, the assumption on regular observation times can be weaken to stochastic times. To do that, we can follow the analysis of Barndorff-Nielsen et al. (2008, Section 5.3, pp. 1505-1507). To express their setting as a LPM, we assume that the observation times are of the form τi,n = Γi/(nT ) , (40) Rt where Γt is a stochastic process satisfying Γt = 0 Γ̃2u du, with Γ̃t a strictly positive parameter of the LPM. We can then construct a (change of time) process X̃t = XΓt so that for X̃t the 16 observations are regular. In view of Dambis Dubins-Schwarz theorem (see, e.g., Theorem 1.6 on p. 181 in Revuz and Yor (1999)) we have that [X]T = [X̃]ΓT . In addition, it is immediate to see that Condition (E1)-(E2) hold in that case. Alternatively one can assume that the quadratic variation of time (see, e.g., Assumption A on p. 1939 in Mykland and Zhang (2006)) exists and that observation times are independent of the price process. Under suitable assumptions, we can also show that Condition (E1)-(E2) hold in that case. Another nice corollary about the introduced theory is that we can obtain the CLT of the b i,n ). powers of the integrated parameter g(θt∗ ) effortlessly when using the local estimates g(Θ Essentially, the proof uses on each block a Taylor expansion as in the delta method. Rather than stating a general abstract result, we apply the technique on the local QMLE in Example 4.2 and on an adapted estimator from Li et al. (2016) in Example 4.4 to estimate the higher powers of volatility. It is clear that the same technique would work in the other examples too, although we don’t state the corresponding theorems. Finally, as the parametric estimator must satisfy bias conditions (24), (26) and (28), it is useful to consider in some instances a bias-corrected (BC) version of it which provides the b (BC) . The BC LPE is then constructed as estimate on the ith block Θ i,n Bn 1X (BC) b b (BC) ∆Ti,n . Θn = Θ i,n T i=1 Moreover, it is easy to see that Condition (E0), which is a natural assumption on the underlying filtration, is immediately satisfied in all the examples. Condition (E4), i.e. hn = o(n1/2 ), is not model specific and thus there is nothing further to show in the following examples. 4.1 Estimation of volatility with the QMLE We assume the setting of Section 2.6. We further assume that the noise has the form 1 i,n := n−α vt2 γt , where α ≥ 1/2, the noise variance vt is time-varying, and γt are IID with null-mean and √ unity variance. In other words we have i,n = Op (1/ n). The parameter process is defined as the two-dimensional volatility and noise variance process θt∗ = (σt2 , vt ) and thus Θ =  RT RT T −1 0 σt2 dt, T −1 0 vt dt . Correspondingly we work locally with the QMLE introduced in b n = (σ̂n2 , v̂n ). Xiu (2010, p. 236) and we introduce the notation for the corresponding LPE Θ b (BC) We also consider the bias-corrected version of the QMLE Θ , where the procedure to n construct the unbiased estimator is given in Appendix II Section 7.6.1. In numerical simulations under a realistic framework, this bias is not observed even with small values of n (see Section 6 in Xiu (2010) and Section 7 in Clinet and Potiron (2017b)), and thus it is safe to b n = (σ̂ 2 , v̂n ) in practice. use Θ n 17 Xiu (2010) showed the CLT of the QMLE when vt is non time-varying and α = 0. In the same setting Clinet and Potiron (2017b) showed that the asymptotic variance can be smaller when using the LPE with Bn = B fixed and documented that in finite sample the LPE was advantageous over the global QMLE. As in those papers where the asymptotics is such that the noise variance doesn’t shrink to 0 and the convergence rate is n1/4 , the techniques of this paper don’t apply. However the techniques allow us to investigate how the LPE behaves in a different asymptotics where the behavior of the QMLE and the LPE remains unknown, i.e. when the noise √ variance is Op (1/ n) and Bn tends to +∞. Moreover, we allow for heteroskedasticity in noise variance. Finally, in the case where the noise variance goes to 0 at the same speed as the variance of the returns, i.e. α = 1/2, we can also retrieve the integrated variance noise. In accordance with the setting of this paper, the convergence rate of both the volatility and the noise is n1/2 . Although the AVAR of the global QMLE is unknown in this setting, we expect that the LPE is more efficient in analogy with what was found in Clinet and Potiron (2017b). To verify the conditions for the CLT, we use heavily the asymptotic results of the QMLE (see Theorem 6 in Xiu (2010)) and the MLE in the low-frequency asymptotics (see Proposition 1 on p. 369 in Aït-Sahalia et al. (2005)). The result is formally embedded in the following theorem. Theorem 3. (QMLE) (i) We assume that α > 12 . Then, stably in law as n → ∞, n 1 2  σ̂n2 −T −1 Z T  σs2 ds  → 6T −1 Z T 1 2 σs4 ds N (0, 1). (41) 0 0  1 b (BC) (ii) When α = 12 , we have stable convergence in law of T n 2 Θ − Θ to a mixed normal n random variable with zero mean and asymptotic variance given by ! p p   RT RT 3 4v + σ 2 ds 4 − 0 σs4 + 2σs2 vs + 4σs3 4vs + σs2 ds s s 0 2σs + 4σs . (42) p   R 1 T 2 σ 2 + 2v + σ 2 ds 2v + σ • 4v + σ s s s s s s s 2 0 4.2 Estimation of powers of volatility Here the parameter is θt∗ = g(σt2 ) with g not being the identity function. We are concerned RT with the estimation of powers of volatility Θ = T −1 0 g(σt2 )dt under microstructure noise √ with variance Op (1/ n) in the same setting as in Section 4.1. The problem was introduced in Barndorff-Nielsen and Shephard (2002). They showed that the case g(x) = x2 is related to the asymptotic variance of the realized volatility. One can also consult Barndorff-Nielsen et al. (2006), Mykland and Zhang (2012, Proposition 2.17, p. 138) and Renault et al. (2013) for related developments. All those studies assume no microstructure noise. When there is microstructure noise, Jacod et al. (2010) use the pre-averaging method. In the special case of quarticity, one can also look at Mancino and Sanfelici (2012) and Andersen 18 et al. (2014). The pre-averaging approach only works when estimating σt2k with k a positive integer. As far as the authors know, the problem when the power is odd hasn’t been investigated so far. In particular, the question of how to estimate tricity under microstructure noise stays open. Under no microstructure noise, block estimation (Mykland and Zhang (2009, Section 4.1, p. 1421-1426)) has the ability to make the mentioned estimators approximately or fully efficient. 2 and then take a The path followed to do that is to first estimate locally the volatility σ̂i,n 2 Riemann sum of g(σ̂i,n ). See also Jacod and Rosenbaum (2013) for related work. In the same spirit when allowing for microstructure noise, we propose to use locally the 2 ), where σ̂ 2 is the QMLE estimate of the volatility on the ith block. The estimation g(σ̂i,n i,n b n = Bn−1 PBn g(σ̂ 2 ). Also, the BC estimator is defined global estimate is thus defined as Θ i,n i=1 PBn 2 )(BC) ). The theorem is given in what follows. The proof uses a −1 b (BC) g((σ̂ as Θ = B n n i,n i=1 local delta method and then follows the proof of Theorem 3. To reflect on the powerfulness of the local approach, the reader can note that the global QMLE is estimating the wrong quantity when g is different from the identity function, except when the volatility is constant. To see why this is the case, we consider the estimation of RT quarticity (i.e. with g(x) = x2 ) and we note that a global QMLE would estimate g( 0 σt2 dt), RT which is except when volatility is constant different from 0 σt4 dt. Indeed, the extensive empirical work in Andersen et al. (2014) indicates that the two quantities are very different in practice. Theorem 4. (powers of volatility) (i) We assume that α > 12 . Then, stably in law as n → ∞, n 1 2   b Θn − Θ → 6T −1 T Z g 0 1 2 (σs2 ) σs4 ds 2 N (0, 1). (43) 0 (ii) When α = 12 , we have n 1 2   b (BC) Θ − Θ → T −1 n Z T g 0 (σs2 ) 2σs4 + 4σs3 p   4vs + σs2 ds N (0, 1). (44) 0 4.3 Estimation of high-frequency covariance with the QMLE To estimate integrated covariance under noisy observations and asynchronous observations, Aït-Sahalia et al. (2010) introduced a QMLE based on a synchronization of observation times. It is clear that their Generalized Synchronization Method can be expressed as a LPM. In view of the close connection between their proposed estimator (2) on p. 1506 and the QMLE studied in Section 4.1, the conditions of our work can be verified and thus Theorem 2 (p. 1506) of the authors can be adapted with the LPE in a framework similar to Section 4.1, i.e. when the noise variance is O(n−1/2 ) and time-varying. 19 4.4 Estimation of volatility and higher powers of volatility incorporating trading information To incorporate all the information available in high frequency data (e.g. in addition to transaction prices, we also observe the trading volume, the type of trade i.e. buyer or seller initiated, more generally bid/ask information from the limit order book), Li et al. (2016) consider the model where the noise is partially observed through a parametric function Zτi,n = Xτi,n + i,n = Xτi,n + g(Ii,n , ν) + ˜i,n , where Ii,n is the vector of information at time τi,n and ˜i,n is the noisy part of the original noise i,n . Here again the observation times are assumed to be regular, i.e. τi,n = iT /n. The authors assume that ˜i,n is with mean 0, finite standard deviation and that n Var[˜ i,n ] → √ v, which in turn implies that ˜i,n = Op (1/ n). To embed this assumption in our LPM framework, there is no harm assuming that 1 ˜i,n = n−α v 2 γt , where α ≥ 1/2 and γt are IID with null-mean and unity variance. They estimate ν and the underlying price as N ν̂ = arg min ν n 1X bτ = Zτ − g(Ii,n , ν̂). (∆Zτi,n − ∆g(Ii,n , ν))2 , X i,n i,n 2 i=1 The authors then estimate the integrated volatility with ERVext = Nn Nn X X bτ )2 + 2 b τ ∆X bτ (∆X ∆X i,n i,n i−1,n i=1 i=2 and show the according central limit theory. Under suitable assumptions, they obtain the optimal convergence rate n1/2 and the AVAR when T = 1: Z 1 Z 1 (ERV ) 4 AV AR =6 σt dt + 8v σt2 dt + 8v 2 . 0 0 They also consider another estimator (which they call E-QMLE) which consists in using the QMLE from Xiu (2010), which we considered as a local estimator in Example 4.1, on the bτ . They indicate that the E-QMLE might yield a smaller AVAR estimated observations X i,n (see their discussion on p. 38), and they report in their numerical study that its finite sample performance is comparable to ERVext (see Table 2 in p. 41). They don’t investigate the corresponding central limit theory. With the theory provided in our paper, we cannot investigate the E-QMLE, but rather the bτ . To keep notation of our paper, we E-(LPE of QMLE), i.e. we apply Example 4.1 on X i,n 20 b n the E-(LPE of QMLE) estimator of volatility and Θ b n(BC) its bias-corrected version denote Θ (i.e. E-(BC LPE of QMLE)). The AVARs obtained in Theorem 5 are the same as in Theorem 3. This is due to the fact that the estimation of ν is very accurate featuring n as a rate of convergence and thus the pre-estimation doesn’t impact the AVAR. This was already the case for the ERVext (see the proof of Theorem 3 on pp. 46-47 in Li et al. (2016)). Recalling that the LPE of QMLE is conjectured to be more efficient than the QMLE, in particular this implies that E-(LPE of QMLE) is also conjectured to be more efficient than EQMLE. In Figure 1, we can see that E-(LPE of QMLE) highly improves the AVAR compared to the ERVext . The improvement gets bigger as the noise of ˜i,n increases. When setting the volatility and the noise variance as in the setting of the numerical study in Li et al. (2016), the ratio of AVARS is equal to 0.7. When we further assume no jumps in volatility, this ratio goes to 0.2. When choosing a bigger noise variance 1.44e − 07 which remains reasonable, this ratio is lower than 0.01. The overall picture is clearly in favor of the E-(LPE of QMLE). We provide the theorem of this estimator in what follows. Theorem 5. (E-(LPE of QMLE)) Under Assumption A in Li et al. (2016, p. 7): (i) we assume that α > 21 . Then, stably in law as n → ∞, n 1 2  b n − T −1 Θ Z T  σs2 ds  → 6T −1 0 T 1 2 σs4 ds N (0, 1). (45) p   12 4v + σs2 ds N (0, 1). (46) Z 0 (ii) when α = 12 , we have stable convergence in law of n 1 2   b (BC) − Θ → T −2 Θ n T Z 2σs4 + 4σs3 0 We discuss now briefly how to estimate the higher powers of volatility, i.e. when θt∗ = g(σt2 ) with g not being the identity function. We consider the estimator from Example 4.2, i.e. the 2 ), where σ̂ 2 is the QMLE estimate of the volatility on the ith block. local estimation g(σ̂i,n i,n bτ The difference with Example 4.2 is that this estimator is used on the estimated price X i,n based on the information. The theorem is given in what follows. Theorem 6. (powers of volatility) Under Assumption A in Li et al. (2016, p. 7): (i) We assume that α > 12 . Then, stably in law as n → ∞, n 1 2   b n − Θ → 6T −1 Θ T Z 1 2 2 g 0 (σs2 ) σs4 ds N (0, 1). (47) 0 (ii) When α = 12 , we have n 1 2   b (BC) Θ − Θ → T −1 n Z T g 0 (σs2 ) 2σs4 + 4σs3 0 21 p   4v + σs2 ds N (0, 1). (48) 4.5 Estimation of volatility using the model with uncertainty zones We introduce a time-varying friction parameter extension to the model with uncertainty zones introduced in Robert and Rosenbaum (2011) to estimate volatility. There is microstructure noise in this model. Let Zτi,n ,n be the last traded price. In a frictionless market, we can assume that a trade with 1-tick increment of the price will occur when the efficient price process crosses the mid-tick value Zτi,n ,n + α2n (and a trade with 1-tick decrement of the price when crossing the value Zτi,n ,n − α2n ). In practice, the absolute value of the increment (or the decrement) of the observed price can be bigger than the tick size αn . For that reason, the authors introduced the discrete variables Li,n that stand for the absolute size, in tick number, of the next price change. Thus, the next traded price which corresponds to a price change will be Zτi+1,n = Zτi,n ± αn Li,n . They also introduced a continuous (possibly multidimensional) time-varying parameter χt , and assume that conditional on the past, Li,n take values on {1, · · · , m} with Pτi,n (Li,n = k) = pk (χτi,n ) , k = 1, · · · , m, for some unknown positive differentiable with bounded derivative functions pk . We assume that the time-varying parameter is a null-drift Itô-process dχt := σtχ dWtχ , where the volatility σtχ is continuous. Also, the frictions induce that the transactions will not occur exactly when the efficient process is equal to the mid-tick values. For this purpose, in the notation of Robert and Rosenbaum (2012), let 0 < η < 1 be a parameter that quantifies the aversion to price change. The frictionless non-realistic case would correspond to η := 0. Conversely, if η is closer to 1, (α) the agents are very averse to trade. If we let Xt be the value of Xt rounded to the nearest multiple of α, the sampling times are defined recursively as τ0,n := 0 and for any positive integer i as n  1 n) τi,n := inf t > τi−1,n : Xt = Xτ(α − αn Li−1,n − + η i−1,n 2 o  1 n) or Xt = Xτ(α + αn Li−1,n − + η . i−1,n 2 Correspondingly, the observed price is assumed to be equal to the rounded efficient price (α ) Zτi,n := Xτi,nn . To express the model with uncertainty zones as a LPM, we consider that θt∗ := (σt2 , η, χt ). We are not interested in estimating directly χt and thus we follow Remark 3 and consider the subparameter ξt∗ = (σt , η) to be estimated. Following the setting of this paper, we will assume that η is a time-varying parameter ηt and we will extend the model with uncertainty zones in (49). We call this extension the time-varying friction parameter model with uncertainty zones. The sampling times are defined recursively as τi,n := 0 and for any positive integer i n  1 n) τi,n := inf t > τi−1,n : Xt = Xτ(α − αn Li,n − + ητi−1,n i−1,n 2 22 n) or Xt = Xτ(α + αn Li,n − i−1,n o 1 + ητi−1,n . 2 (49) The idea behind the time-varying friction model with uncertainty zones is that we hold the parameter ηt constant between two observations. RT RT The target quantity is the integrated parameter Θ := ( 0 σt2 dt, 0 ηt dt). We define the unobserved returns as Qi,n := Li,n and the observed returns as Ri,n := (∆Zτi,n , ∆τi,n ). The order of memory is m := 1. The random innovation is defined as the two-dimensional path Ui,n := ((∆W[τi−1,n ,t] )t≥τi−1,n , (∆W[τ0 i−1,n ,t] )t≥τi−1,n ) where the jump size Li,n is a function of Wt0 , which is a Brownian motion independent of the other quantities and which was introduced in p.11 of Robert and Rosenbaum (2012). We also define Z t Z t o n  (1) σs du(1) = −α q − 1 + 2η or σ du = α q w+ := inf t > 0 : n 0 s n s s 0 and 0 Z t Z t n o (1) w := inf t > 0 : σs dus = −αn q or σs du(1) = α q − 1 + 2η . n 0 s − 0 0 Furthermore, we define w := w+ 1{r(1) >0} + w− 1{r(1) <0} and y := m X k−1 k n  hX  X io − 12 k1 φ u(2) w ∈ p χ , p χ j w j w w j=1 k=1 (50) j=1 where φ is the cumulative function of the standard normal distribution. The right hand-side in (50) can be found in p.11 of Robert and Rosenbaum (2012). We can express Z w    (1) (2) Fn (q, r(1) , r(2) ), (ut , ut ), (σt2 , ηt , χt ) := y, αn q sign σs du(1) ,w . s 0 We estimate on each block the volatility and the friction parameter using respectively a d αn ,t and η̂αn ,t (see p. 8 in Robert and Rosenbaum slight modification of the estimator RV d αn ,t depends on η̂αn ,t , which we denotes (2012) for definitions). Actually, we can see that RV d αn ,t (η̂αn ,t ) in what follows. First, we define the new estimator of η: RV (mod) η̂α,t := m X (mod) (mod) λα,t,k uα,t,k (51) k=1 with (a) (mod) λα,t,k (c) Nα,t,k + Nα,t,k := P m j=1 (a) (c) Nα,t,j + Nα,t,j  and (mod) uα,t,k !  (c)   1  Nα,t,k := max 0, min 1, k −1 +1 , (a) 2 Nα,t,k 23 (mod) (a) where we assume that C/0 := ∞, and in particular uα,t,k = 1 when Nα,t,k = 0. Second, we define d (mod) = RV d αn ,t (η̂ (mod) ). RV αn ,t αn ,t We choose to work with this modified estimator for two reasons. First, the definition of η̂α,t (a) was unclear when Nα,t,k = 0 in p. 8 of Robert and Rosenbaum (2012). Second, the finite (m) sample bias of η̂α,t is slightly smaller with the modified estimator. Asymptotically, they are equivalent and thus all the theory provided in Robert and Rosenbaum (2012) can be used to prove the following theorem. Theorem 7. (Time-varying friction parameter model with uncertainty zones) Stably in law as n → ∞, αn−1   b n − Θ → T −1 Θ Z 0 T 1 2 Vθs∗ ds N (0, 1), (52) where Vθ can be straightforwardly inferred from the definition of Lemma 4.19 in p. 26 of Robert and Rosenbaum (2012). Remark 5. (convergence rate) Note that, equivalently, the convergence rate in (52) is the usual 1 n 2 when n corresponds to the expected number of observations. One can consult Remark 4 in Potiron and Mykland (2017) for more details. 4.6 Application in time series: the time-varying MA(1) We first specify the LPM for a one-dimensional time series. In that case, we assume that the observation times are regular of the form τi,n = ni T , and thus that the number of observations is Nn = n. We assume that the "returns" Ri,n stand for time series observations. Recalling that Mi,n = (Qi,n , Ri,n ), we assume that the time-varying time series can be expressed as the interpolation of θt∗ via Mi,n = Fn (Mi−1,n , Ui,n , θτ∗i−1,n ), (53) where θt∗ is assumed to be independent of all the innovations. Numerous time series10 are of the parametric form (3) and admits a time-varying parameter extension following (53). We provide details for the MA(1). In this specific example, several time-varying extensions are possible and we choose to work with the time-varying parameter model Ri,n = µτi−1,n + √ √ κτi−1,n λi,n + βτi−1,n κτi−1,n λi−1,n , where λi,n are standard normally-distributed white noise error terms, and κt is the time-varying variance. The three-dimensional parameter is defined as θt∗ := (µt , βt , κt ) ∈ R2 × R+ ∗. 10 We can actually show that any time series in state space form can be expressed with a corresponding Fn function. 24 To express the MA(1) as the parametric model (3) and a time-varying parameter model (4), we fix both the unobserved quantity and innovation equal to the white noise Qi,n = λi,n and Ui,n = λi,n , and the order of the model m = 1. We can define now the function  √ √ Fn m := (q, r), u, (µ, β, κ) = (q, µ + κu + β κq). We have thus expressed the MA(1) as a LPM. We discuss now how to estimate the parameters. ForRsimplicity, R T we assume in what follows T that µt = 0. The target quantity is thus equal to Θ = ( 0 βt dt, 0 κt dt). The local estimator is the regular MLE applied on the MA(1) model (Hamilton (1994), Section 5.4). On each block (of size hn ), the MLE bias is of order h−1 n (Tanaka (1984)) and thus the bias conditions (34), (36) and (38) are not satisfied. Nonetheless, we can correct for the bias up to the order O(h−2 n ) (BC) b b b as follows. We define the bias-corrected estimator as Θi,n = Θi,n − b(Θi,n , hn ), where the bias function b(θ, h) can be derived following the techniques in Tanaka (1984). In particular b (BC) satisfies the bias conditions if hn is chosen such that n1/4 = o(hn ). In this implies that Θ i,n practice this bias can be obtained by Monte-Carlo simulations (see our simulation study). In the parametric case and in a low frequency asymptotics where T → ∞ and observations times are 0, ∆, · · · , T = n∆ with ∆ > 0, known results (see, e.g., the proof of Proposition I in bκ pp. 391-393 (Ait-Sahalia et al. (2005)) show that the asymptotic variance of the MLE (β, b) is such that  1/2 1 − β2 0 1/2 b n ((β, κ b) − (β, κ)) → N (0, 1). 0 2κ2 The following theorem provides the time-varying version of the asymptotic theory when T is fixed. Theorem 8. (Time-varying MA(1)) We assume that n1/4 = o(hn ). Then, stably in law as n → ∞, n 5 1 2  b (BC) Θ −Θ → n T −1 RT 0 (1 − βs2 )ds 0 0 RT 0 ! !1 2κ2s ds 2 N (0, 1). Numerical study in the time-varying MA(1) 5.1 Goal of the study To investigate the finite sample performance of the LPE, we consider the time-varying MA(1) with null-mean introduced in Section 4.6. The goal of the study is twofold. First, we want to investigate how the LPE performs compared to some standard concurrent approaches. Second, we want to discuss about the choice of the tuning parameter hn in practice. We consider the following simple concurrent approaches: 25 MLE : the global MLE when considering that the parameters are not time-varying on [0, T ]. Fitting Recent Observations (FRO): This approach consists in fitting the MLE on a recent sub-block with less observations (e.g. on [TF , T ] where TF > 0) so that the parameter is roughly constant on that block. LPE h̃n : This approach consists in using the LPE (of MLE) with another choice of h̃n as block size. b n(BC) = Θ b i,n − b(Θ b i,n , hn ), we can either compute and To compute the BC estimator Θ implement the function b(θ, h) or carry out Monte-Carlo simulations to compute b(θ, h) for any (θ, h) prior to the numerical study. We choose the latter option as this allows to get also rid of bias terms which appears in the Taylor expansion in a higher order than O(h−2 ). Indeed, although those terms vanish asymptotically, they can pop up in a finite sample context. To be more specific, we first compute the sample mean for a grid of parameter values and block length (θ, h) with, say, 100,000 Monte Carlo paths11 of the parametric model. Then on each b i,n , hn ). block, we estimate the bias by b(Θ We discuss here what we expect theoretically from the bias-correction. In view of the b i,n on first approximation as the sum decomposition (13), we can disentangle the bias of Θ of two terms, namely the bias of the parametric estimator and the bias due to the fact that the parameter is time-varying. The former can be corrected by the econometrician, and we b (BC) accordingly. On the contrary, as the path of the define the bias-corrected local estimate Θ i,n parameter is unknown, we cannot correct for the latter. This is one reason why we have to 1 work with (up to constant terms) a hn < n 2 . The theory shows that the normalized latter bias will vanish asymptotically under that condition. Conversely, the econometrician who chooses 1 to work locally with hn > n 2 will most likely obtain a significant latter bias which she cannot identify, and correcting for the former bias might not improve the estimation in that case. 5.2 Model design We recall that the time-varying parameter is θt∗ = (βt , κt ). We set T = 1, which stands for one day (or one week, one month). We fix the number of observations n = 10000. We consider one toy model where the parameters move around a target parameter deterministically. We assume that the noisy parameter follows a cos function θt∗ = ν + A cos( 2πtδ T ), where ν = (β, κ) (β) (κ) is the parameter, A = (A , A ) corresponds to the amplitude, and δ = (δ (β) , δ (κ) ) stands for the number of oscillations on [0, T ]. It is clear that Θ = (β, κ). We fix the parameter ν = (0.5, 1) and the amplitude A = (0.2, 0.4). We also set a setting with a small number of oscillations δ = (4, 4) and one with a bigger number of oscillations δ = (10, 10). We simulate M = 1, 000 Monte-carlo paths. 11 Actually, the number of Monte Carlo paths can be significantly lower when h increases 26 In view of Theorem 8 and Condition (E4), the tuning parameter hn should (up to constant terms) satisfy n1/4 < hn < n1/2 . In our case, we have that n1/4 = 10 and n1/2 = 100. We decide thus to choose hn = 100 (the results would be similar with hn around 100). For the concurrent approach, we let h̃n ∈ {25, 500, 1000, 2000, 5000}. For the FRO approach, we choose TF = 0.95 (this choice is arbitrary but different values would yield to similar results), which means that we consider the last 500 observations to fit the MLE. 5.3 Results The results are reported in Table 1 when δ = (4, 4) and Table 2 when δ = (10, 10). First, note that there is not much qualitative difference between the two settings. Second, as expected from the theory, the LPE performs at its best with the choice hn = 100, and the bias-corrected version is much better. Moreover, the LPE100 outperforms all the concurrent approaches. The case h̃n = 25 allows us to check what can happen when we have blocks with very few observations. The bias-corrected estimator performs well to estimate κ, but somehow the bias-correction to estimate β doesn’t provide better estimates. This is most likely due to the fact that we have not enough observations on each block. The estimation made with h̃n = 500 is very decent in the case where we don’t have many oscillations. The bias-corrected estimator is actually not as good. This corroborates the theory that when hn >> 100 the main source of bias is due to the parameter which is time-varying rather than the parametric estimator bias itself. If we have a bigger number of oscillations, the estimates are not as accurate. When using bigger hn , we see the same pattern, and the accuracy of the estimation decreases as hn increases. The global MLE performs relatively good to estimate β, but have a strong bias in κ. This indicates that even in a simple deterministic model which oscillates around the target value, the MLE can’t be trusted. Finally, the FRO is far off. There are several problems coming with that approach. The estimated quantity is θT∗ , which can be much different from ν. Also, the block size to use is arbitrary, and the standard deviation is bigger. Remark 6. (block size) Condition (E4) provides the asymptotic order to use for the tuning parameter hn . Thus, it gives a rule of thumb to use on finite sample, but it is left to the practitioner to ultimitalely choose hn . If the parametric estimator is badly biased, the practitioner should increase the value of hn . Also, if the parameter process θt∗ seems not to be moving a lot, hn can be chosen to be bigger. In our simulation study, this rule of thumb could be trusted. In our empirical illustration, we can see that the estimated volatility is robust to the 1/2 value of hn if we choose hn ≈ Nn . As n can be chosen such that n = Nn , this indicates that the rule of thumb seems to be robust to the actual choice of hn in our empirical study too. 27 6 Empirical illustration in the model with uncertainty zones In this section, we are interested in estimating the integrated parameter in the time-varying friction parameter model with uncertainty zones introduced in Section 4.5. We recall that the parameter of interest is defined as ξt∗ = (σt2 , ηt ). We are looking at Orange (ORA.PA) stock price traded actively on the CAC 40 on Monday March 4th, 2013. To prevent from opening and closing effect, we assume that T := 1, consider that t = 0 corresponds to 9am and that t = T stands for 4pm. The number of trades corresponding to a change of price during this time period is equal to Nn = 3306, and the tick size αn = 0.001 euro. When assuming the non time-varying model with friction parameter equal to η, we can (mod) estimate the friction parameter with η̂αn ,T . We estimate the standard deviation as (mod) ŝn := ŝn (η̂α,T ), where the formal definition of the standard deviation sn (η) and the standard deviation estimate (mod) ŝn (η) can be found in Appendix II Section 7.12. We find that η̂αn ,T = 0.155 and ŝn = 0.008. (mod) Note that in finite sample, η̂αn ,T is biased and that this bias can be estimated following the estimate B̂ introduced in Appendix II Section 7.12. Because we choose hn big enough in this section, the bias is very small and will not alter the values of the estimators and the results of the tests in what follows. b i,n := (σ̂ 2 , η̂i,n ) the estimate on the ith block. We also define the standard We define Θ i,n deviation estimate of η̂i,n as ŝi,hn := si,hn (η̂i,n ). Note that ŝi,hn is not block-dependent except for the last block, which is removed from the analysis in the following because the number of observations can be too small in that block. We introduce the notation ŝhn := ŝ1,hn . Figure 2 shows the evolution over time of η̂i,n for different values of hn . Based on those estimates and the standard deviation estimate ŝhn , we compute the associated chi-square statistic χ2n := BX n −1  (mod) η̂i,n − η̂αn ,T 2 ŝhn i=1 . Under the null hypothesis which states that ηt is non time-varying, χ2n follows approximately a chi-square distribution with Bn − 1 degrees of freedom. We report χ2n for different values of hn in Table 3. The obtained values indicate that we have strong evidence against the null hypothesis, thus it provides us very good reasons to use the techniques of this paper. This analysis has been carried out on other days and other stocks. Our conclusion is that in almost every situation, the friction parameter is time-varying. Finally, using bootstrap values instead of the theoretical normal approximation wouldn’t change the picture. b n := (σ̂n2 , η̂n ) for different values of hn following the time-varying We now compute Θ 1/2 friction parameter model with uncertainty zones. Because Nn ≈ 57.5 we choose to work with hn = 43, · · · , 63. We can see in Figure 3 that we obtain different estimates of volatility using 28 the techniques of this work compared to the estimates of the model with uncertainty zones, which is one reason why it is crucial to use a proper time-varying model for ηt . The estimates of the model with uncertainty zones seems to underestimate the integrated volatility. In addition, the RV estimator, which ignores the microstructure noise, seems to be overestimating the integrated volatility. This is what to be expected in theory and thus indicates that the correction made by σ̂n is reasonable. Finally, the estimates are very similar for different values of hn , which seems to indicate that the method is robust to small block size variation. 7 Conclusion In this paper, we have introduced a general framework to provide theoretical tools to build central limit theorems of convergence rate n1/2 . We have applied successfully the method to investigate estimation of volatility (possibly under trading information), higher powers of volatility, high-frequency covariance, and time-varying parameters in the model with uncertainty zones and time-varying parameters of the MA(1). This allowed us to obtain estimators robust to time-varying quantities, more efficient and/or new estimators of quantities (such as in the case of higher powers of volatility). Subsequently, we believe that many other examples can be solved using the framework of our paper, which is simple and natural, either as a direct corollary of the respective central limit theory work (as in the case of all the examples discussed in our paper) or as a basis of work for the proofs. The latter was successfully done in our related papers Potiron and Mykland (2017) and Clinet and Potiron (2017a). This was possible as the framework is transparent and the conditions can be altered easily in view of the direct proofs. For this reason, we have chosen to allow for general models possibly including endogeneity, microstructure noise correlated with the other quantities, etc. References [1] Aït-Sahalia, Y., J. Fan, C.D. Wang and X. Yang (2015). Estimation of the continuous and discontinuous leverage effects, Available at SSRN. [2] Aït-Sahalia, Y., P.A. Mykland and L. Zhang (2005). How often to sample a continuoustime process in the presence of market microstructure noise, Review of Financial Studies 18, 351-416. [3] Andersen, T.G., D. Dobrislav and E. Schaumburg (2014). A robust neighborhood truncation approach to estimation of integrated quarticity, Econometric Theory,30(1),3-59. [4] Barndorff-Nielsen, O.E. and N. Shephard (2002). Econometric analysis of realized volatility and its use in estimating stochastic volatility models. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 64.2, 253-280. 29 [5] Barndorff-Nielsen, O.E., S.E. Graversen, J. Jacod, M. Podolskij and N. Shephard (2006). A central limit theorem for realised power and bipower variations of continuous semimartingales. From stochastic calculus to mathematical finance, Springer Berlin Heidelberg, 33-68. [6] Barndorff-Nielsen, O.E., P.R. Hansen, A. Lunde, and N. Shephard (2008). Designing realized kernels to measure the ex post variation of equity prices in the presence of noise. Econometrica 76(6), 1481-1536. [7] Clinet, S. and Y. Potiron (2017a). Estimating the Integrated Parameter of the TimeVarying Parameter Self-Exciting Process. arXiv preprint arXiv:1607.05831. [8] Clinet, S. and Y. Potiron (2017b). Efficient asymptotic variance reduction when estimating volatility in high frequency data. arXiv preprint arXiv:1701.01185. [9] Dahlhaus, R. (1997). Fitting time series models to nonstationary processes, Ann. Statist. 25(1), 1-37. [10] Dahlhaus, R. (2000). A likelihood approximation for locally stationary processes, Ann. Statist., 1762-1794. [11] Dahlhaus, R. and S.S. Rao (2006). Statistical inference for time-varying ARCH processes, Ann. Statist. 34(3), 1075-1114. [12] Fan, J. and I. Gijbels (1996). Local polynomial modelling and its applications: monographs on statistics and applied probability 66. Vol. 66. CRC Press. [13] Fan, J. and W. Zhang (1999). Statistical estimation in varying coefficient models. Ann. Statist., 1491-1518. [14] Gloter, A. and J. Jacod (2001). Diffusions with measurement errors. I. Local asymptotic normality. ESAIM: Probability and Statistics 5, 225-242. [15] Hall, P. and C.C. Heyde (1980). Martingale Limit Theory and its Application. Academic Press, Boston. [16] Hamilton, J.D. (1994). Time series analysis. Vol. 2. Princeton: Princeton university press. [17] Hastie T. and R. Tibshirani (1993). Varying-coefficient models. J. R. Stat. Soc. Ser. B. Stat. Methodol. 757-796. [18] Hayashi, T. and N. Yoshida (2005). On covariance estimation of non-synchronously observed diffusion processes. Bernoulli 11, 359-379. [19] Jacod, J., M. Podolskij and M. Vetter (2010). Limit theorems for moving averages of discretized processes plus noise. The Annals of Statistics 38.3, 1478-1545. 30 [20] Jacod, J. and P. Protter (1998). Asymptotic error distributions for the Euler method for stochastic differential equations. Ann. Probab. 26, 267-307. [21] Jacod, J. and P. Protter (2012). Discretization of Processes. Springer. [22] Jacod, J. and M. Rosenbaum (2013). Quarticity and other functionals of volatility: efficient estimation. Ann. Statist. 41(3), 1462-1484. [23] Jacod, J. and A. Shiryaev (2003). Limit Theorems For Stochastic Processes (2nd ed.). Berlin: Springer-Verlag. [24] Kim, C. J. and Nelson, C. R. (2006). Estimation of a forward-looking monetary policy rule: A time-varying parameter model using ex post data. Journal of Monetary Economics, 53(8), 1949-1966. [25] Kristensen, D. (2010). Nonparametric filtering of the realized spot volatility: A kernelbased approach. Econometric Theory, 26.01, 60-93. [26] Li, Y., S. Xie and X. Zheng (2016). Efficient estimation of integrated volatility incorporating trading information. Journal of econometrics 195.1, 33-50. [27] Mancino, M.E. and S. Sanfelici (2012). Estimation of quarticity with high-frequency data. Quantitative finance, 12(4),607-622. [28] Mykland, P.A., and L. Zhang (2006) ANOVA for Diffusions and Itô Processes. Annals of Statistics 34, 1931-1963. [29] Mykland, P.A. and L. Zhang (2009). Inference for Continuous Semimartingales Observed at High Frequency. Econometrica 77, 1403-1445. [30] Mykland, P.A. and L. Zhang (2011). The Double Gaussian Approximation for High Frequency Data. Scand. J. Stat. 38, 215-236. [31] Mykland, P.A. and L. Zhang (2012). The econometrics of High Frequency Data. In M. Kessler, A. Lindner and M. Sørensen (eds.), Statistical Methods for Stochastic Differential Equations, 109-190. Chapman nad Hall/CRC Press. [32] Mykland, P.A. and L. Zhang (2016). Assessment of Uncertainty in High Frequency Data: The Observed Asymptotic Variance. Forthcoming in Econometrica. Available at SSRN 2475620. [33] Potiron, Y. and P.A. Mykland (2017). Estimation of integrated quadratic covariation with endogenous sampling times. Journal of Econometrics, 197, 20-41. [34] Reiß, M (2011). Asymptotic equivalence for inference on the volatility from noisy observations. Ann. Statist. 39(2), 772-802. 31 [35] Renault, E., C. Sarisoy and B.J.M. Werker (2012). Efficient estimation of integrated volatility and related processes. Econometric Theory. 1-40. [36] Revuz, D. and M. Yor (1999) Continuous Martingales and Brownian motion. 3rd ed., Germany: Springer. [37] Robert, C.Y. and M. Rosenbaum (2011). A new approach for the dynamics of ultra-highfrequency data: the model with uncertainty zones. Journal of Financial Econometrics 9, 344-366. [38] Robert, C.Y. and M. Rosenbaum (2012). Volatility and covariation estimation when microstructure noise and trading times are endogenous. Math. Finance 22(1), 133-164. [39] Stock, J. H. and M. W. Watson (1998). Median unbiased estimation of coefficient variance in a time-varying parameter model. J. Amer. Statist. Assoc., 93(441), 349-358. [40] Tanaka K. (1984). An asymptotic expansion associated with the maximum likelihood estimators in ARMA models. J. R. Stat. Soc. Ser. B. Stat. Methodol. 58-67. [41] Wang, C.D. and P.A. Mykland (2014). The Estimation of Leverage Effect with High Frequency Data. J. Amer. Statist. Assoc., 109, 197-215. [42] Xiu, D. (2010). Quasi-maximum likelihood estimation of volatility with high frequency data. J. Econometrics 159, 235-250 . 32 Appendix I: consistency in a simple model The purpose of this appendix is to provide an outline of the LPM and the conditions of the CLT by investigating the simpler problem of consistency in the case of a simple model. The reader should refer to it for a deeper understanding of Section 2 and Section 3. Two toy examples, the estimation of volatility with regular not noisy observations, and the estimation of the rate of a Poisson process, are discussed extensively. Morever, techniques of proofs are also mentioned throughout the section. The obtained conditions are illustrative. Proofs of the conditions along with proofs that conditions hold in the two toy examples can be found in Appendix II. Finally, some detailed mathematical definitions of the objects can be found throughout this part too. The simple model We focus on a simple setting in this section. First, we work with dr := 2. Also, we assume that the observations occur at equidistant time intervals ∆τn := Tn , so that τi,n = ni T and (2) thus Ri,n := ∆τn is deterministic. For the rest of this appendix, we will forget about the second component of the returns Ri,n , which doesn’t provide us any further information, and pretend that Ri,n is real-valued. The parametric model is assumed to be very simple. It assumes that there exists a parameter θ∗ ∈ K such that Ri,n are independent and identically distributed (IID) random functions of θ∗ . If we introduce Ui,n an adequate IID sequence of random variables with distribution U , we can express the returns as  Ri,n := Fn Ui,n , θ∗ , (54) where Fn (x, y) is a non-random function. In (54), Ui,n can be seen as the random innovation. Since θt∗ can in fact be time-varying, Ri,n don’t necessarily follow (54) in the time-varying parameter model. A formal time-varying generalization of (54) will be given in (57). In general, Ri,n are neither identically distributed nor independent. Ri,n are not even necessarily conditionally independent given the true parameter process θt∗ , as we can see in the following two toy examples. Example 1. (estimatingRvolatility) Consider when θt∗ := σt2 (the volatility is thus assumed to τi,n follow (2)), and Ri,n := τi−1,n σs dWs , where Wt is a standard 1-dimensional Brownian motion. ∗ 2 In this case, the parameter space is K := R+ ∗ . The parametric model assumes θ := σ and that the distribution of the returns is Ri,n := σ∆Wτi,n , where ∆Wτi,n := Wτi,n − Wτi−1,n is the increment of the Brownian motion between the (i − 1)th observation time and the ith observation time and σ 2 is the fixed volatility. Under that assumption, the returns are IID. Under the time-varying parameter model, Ri,n are clearly not necessarily IID, and they are also not necessarily conditionally independent given the whole volatility process σt2 if there is a leverage effect. Example 2. (estimating the rate of a Poisson process) Suppose an econometrician observes data on the number of events (such as trades) in an arbitrary asset, and thinks the number 33 of events happening between 0 and t, Nt , follows a homogeneous Poisson process with rate λ. The parameter rate θt∗ := λt will be assumed to follow (2), with possibly a null-volatility σtθ = 0 if the homogeneity assumption turns out to be true. Because the econometrician doesn’t have access to the raw data, she can’t observe directly the exact time of each event. Instead, she only observes the number of events happening on a period (for instance a tenminute block) [τi−1,n , τi,n ), that is Ri,n = Nτ−i,n −Nτi−1,n . If the econometrician’s assumption of homogeneity is true, the returns are IID. In case of heterogeneity, Nt will be a inhomogeneous Poisson process, and the returns Ri,n will most likely be neither identically distributed nor independent. We need to introduce some notation and definitions. On a given block i = 1, · · · , Bn the 1 , · · · , Rhn . Formally, it means that Rj := R observed returns will be called Ri,n (i−1)hn +j,n for i,n i,n j 1 , · · · , R̃hn any j = 1, · · · , hn . In analogy with Ri,n , we introduce the approximated returns R̃i,n i,n j on the ith block. We also introduce the corresponding observation times τi,n := τ(i−1)hn +j,n for hn 0 j = 0, · · · , hn . Note that τi,n = τi−1,n . Finally, for j = 1, · · · , hn we define the time increment j j j−1 between the (j − 1)th return and the jth return of the ith block as ∆τi,n := τi,n − τi,n . We provide a time-varying generalization of the parametric model (54) as well as a formal expression for the approximated returns. To deal with the former, we assume that in general  Ri,n := Fn Ui,n , {θs∗ }τi−1,n ≤s≤τi,n . (55) The time-varying parameter model in (55) is a natural extension of the parametric model (54) because the returns Ri,n can depend on the parameter process path from the previous sampling time τi−1,n to the current sampling time τi,n . As Ri,n depend on the parameter path, it seems natural to allow Ui,n to be themselves process paths. For example, when the parameter is equal to the volatility process θt∗ := σt2 , we will assume that Ui,n are equal to the underlying Brownian motion Wt path (see Example 3 for more details). Also, as Ui,n are random innovation, they should be independent of the parameter process path past, but not on the current parameter path. In the case of volatility, it means that we allow for the leverage effect. A simple particular case of (55) is given by  Ri,n := Fn Ui,n , θτ∗i−1,n , (56) i.e. the returns depend on the parameter path only through its initial value. The time-varying friction parameter model with uncertainty zones introduced in Section 4.5 and the time-varying Hitting Constant Boundaries model defined in Appendix II and are defined as a mix of (55) and (56). Finally, the approximated returns R̃i,n follow a mixture of the parametric model (54) with initial block parameter value. We are now providing a formal definition of our intuition. We assume that  j j Ri,n := Fn Ui,n , {θs∗ }τ j−1 ≤s≤τ j , (57) i,n i,n  j j R̃i,n := Fn Ui,n , Θ̃i,n , (58) 34 j where the random innovation Ui,n take values on a space Un that can be functional12 and j that can depend on n, Ui,n are IID for a fixed n but the distribution can depend on n, and Fn (x, y) is a non-random function13 . Note that (57) is a mere re-expression of (55) using a different notation. For any block i = 1, · · · , Bn and for any observation time j = 0, · · · , hn of j j 14 the information up to time τi,n . The crucial assumption is that the ith block, we define Ii,n j Ui,n has to be independent of the past information15 (and in particular of Θ̃i,n ). Note that j we don’t assume any independence between the random innovation Ui,n and the parameter j process {θs∗ }τ j−1 ≤s≤τ j . We provide directly the definitions of Fn and Ui,n in the two toy i,n i,n examples. Example 3. (estimating volatility) In this case, Un is defined as the space C1 [0, ∆τn ] of continj uous paths parametrized by time t ∈ [0, τn ], Ui,n := {∆W[τ j−1 ,s] }τ j−1 ≤s≤τ j are the Brownian i,n i,n i,n motion increment path processes between two consecutive observation times. We assume that (Wtθ , Wt ) is jointly a (possibly non-standard) 2-dimensional Brownian motion. Thus, the ranj dom innovation Ui,n are indeed independent of the past in view of the Markov property of Rτ 1 Brownian motions. We also define Fn (ut , θt ) := 0 n θs2 dus . We thus obtain that the returns j R τi,n j j are defined as Ri,n := j−1 σs dWs and that the approximated returns R̃i,n := στ 0 ∆W[τ j−1 ,τ j ] τi,n i,n i,n i,n are the same quantity when holding the volatility constant on the block. Example 4. (estimating the rate of a Poisson process) We assume that the rate of the (possibly inhomogeneous) Poisson process is αn λt , where αn is a non time-varying and non-random quantity such that αn ∆τn := 1. In this case, we assume that Un is the space of increasing paths on R+ starting from 0 which takes values in N and whose jumps are equal to 1. We also assume that for any path in Un , the number of jumps is finite on any compact of R+ . j Ui,n can be defined as standard Poisson processes {Nti,j,n }t≥0 , independent of each other. We j R τi,n also have Fn (ut , θt ) := uR τn αn θs dus . Thus, if we let tji,n := j−1 αn λs ds, the returns are the τi,n 0 12 Un is a Borel space, for example the space C1 [0, ∆τn ] of 1-dimensional continuous paths parametrized by time t ∈ [0, τn ]. 13 Let Cp (R+ ) be the space of p-dimensional continuous paths parametrized by time t ∈ R+ , which is a Borel space. Consequently, Un × Cp (R+ ) is also a Borel space. We assume that Fn (x, y) is a jointly measurable real-valued function on Un × Cp (R+ ). Note that the advised reader will have seen that a priori {θs∗ }τ j−1 ≤s≤τ j i,n i,n j−1 is defined on Cp [0, τn ] (after translation of the domain by −τi,n ) in (57) and Θ̃i,n is a vector in (58), whereas + both should be defined on the space Cp (R ) according to the definition. We match the definitions by extending them as continuous paths on R+ . Formally, if θt ∈ Cp [0, τn ], we extend it as θt := θτn for all t > τn . Similarly, if θ ∈ K, we extend it as θt := θ for all t ≥ 0. 14 In what follows, we will be using the term information to refer to the mathematical object of filtration. Let (Ω, F, P ) be a probability space. Define the sorted information {Ik,n }k≥0 such that for any non-negative j integer k that we can decompose as k = (i − 1)hn + j where i ∈ {1, · · · , Bn } and j ∈ {0, · · · , hn }, Ik,n := Ii,n . ∗ We assume that Ik,n is a (discrete-time) filtration on (Ω, F, P ). In addition, we assume that {θs }0≤s≤τ j and i,n j j Ui,n are Ii,n -measurable. j−1 15 past information means up to time τi,n 35 time-changed Poisson processes j Ri,n = N i,j,n , j (59) ti,n j R̃i,n = Nαn ∆τ j i,j,n i,n λτ 0 i,n . (60) Consistency In the following of this section and Section 3, we will make the block size hn go to infinity hn → ∞. (61) Furthermore, we will make the block length ∆Ti,n vanish asymptotically. Because we assumed observations are regular in this section, this can be expressed as hn n−1 → 0. (62) b n as We can rewrite the consistency of Θ Bn X  P b i,n − Θi,n ∆Ti,n → Θ 0. (63) i=1 b i,n can be found in (67). In order to show (63), we can where the formal definition of Θ b i,n − Θi,n ) into the part related to misspecified distribution error, decompose the increments (Θ the part on estimation of approximated returns error and the evolution in the spot parameter error b̃  + Θ b̃ − Θ̃  + Θ̃ − Θ , b i,n − Θi,n = Θ b i,n − Θ Θ (64) i,n i,n i,n i,n i,n b̃ , which is defined formally in (68), is the parametric estimator used on the underwhere Θ i,n lying non-observed approximated returns. It is not a feasible estimator and appears in (64) only to shed light on the way we can obtain the consistency of the estimator in the proofs. We first deal with the last error term in (64), which is due to the non-constancy of the spot parameter θt∗ . Note that Bn X  Θ̃i,n − Θi,n ∆Ti,n = i=1 Bn X ∗ θT ∆Ti,n i−1,n i=1 Z Ti,n −  θs∗ ds (65) Ti−1,n and thus we deduce from Riemann-approximation16 that Bn X  P Θ̃i,n − Θi,n ∆Ti,n → 0. i=1 16 see i.e. Proposition 4.44 in p.51 of Jacod and Shiryaev (2003) 36 (66) To deal with the other terms in (64), we assume that for any positive integer k, the practitioner has at hand an estimator θ̂k,n := θ̂k,n (r1,n ; · · · ; rk,n ), which depends on the input of returns {r1,n ; · · · ; rk,n }. On each block i = 1, · · · , Bn we estimate the local parameter as  b i,n := θ̂h ,n R1 ; · · · ; Rhn . (67) Θ i,n n i,n b̃ is defined as the same parametric estimator with approximated The non-feasible estimator Θ i,n returns as input instead of observed returns  b̃ := θ̂ hn 1 Θ i,n hn ,n R̃i,n ; · · · ; R̃i,n . (68) j Note that (68) is infeasible because the approximated returns R̃i,n are non-observable quantities. Example 5. (estimating volatility) The estimator is the scaled usual RV, i.e. θ̂k,n (r1,n ; · · · ; rk,n ) P 2 . Note that θ̂ := T −1 k −1 n kj=1 rj,n k,n can also be asymptotically seen as the MLE (see the discussion pp. 112-115 in Mykland and Zhang (2012)). Example 6. (estimating the rateP of a Poisson process) The estimator to be used is the return k −1 mean θ̂k,n (r1,n ; · · · ; rk,n ) := k j=1 rj,n . For any M > 0, we introduce the following bounded space for the parameter value. Definition. (KM ) For any M > 0, we define KM := {θ ∈ K : | θ |≤ M and θ+ ≥ M −1 }, which is a bounded subset of K. In order to tackle the second term in (64), we make the assumption that the parametric estimator is L1 -convergent, locally uniformly in the model parameter θ if we actually observe returns coming from the parametric model. This can be expressed in the following condition. Condition (C1). Let the innovation of a block (V1,n , · · · , Vhn ,n ) be IID with distribution U . For any M > 0, h i sup E θ̂hn ,n (Fn (V1,n , θ); · · · ; Fn (Vhn ,n , θ)) − θ → 0. θ∈KM Remark 7. (practicability) Under Condition (C1), results on regular conditional distributions17 give us that the error made on the estimation of the underlying non-observed returns tends to 0, i.e. Bn X P b̃ − Θ̃ ∆T → Θ 0. i,n i,n i,n (69) i=1 This proof technique is the main idea of the paper. Regular conditional distributions are used to deduce results on the time-varying parameter model using uniform results in the parametric 17 see for instance Leo Breiman (1992), see Appendix II Section 7.2 for more details. 37 model. It considerably simplifies the work of the econometrician, in the sense that Condition (C1) is most likely easier to verify than (69). Indeed, Condition (C1) is "parametric" with non-random parameter, whereas (69) is "nonparametric" and each term of the sum Θ̃i,n is a mixture of parameter. Moreover, the uniform convergence in Condition (C1) shouldn’t be an additional problem at all once the econometrician has the (non-uniform) convergence because the parameter θ ∈ KM , which is a bounded space. Remark 8. (consistency) Note that L1 -convergence is slightly stronger than the simple consistency of the parametric estimator. Nonetheless, in most applications, we will have both. To deal with the first term of (64), we need to make sure that we can control the discrepancy between the estimate made on the observed returns and the estimate made on the underlying approximated returns, uniformly in the initial parameter and in the future path of the parameter process. First, we need to introduce a new definition. Definition. (EM,n ) For any M > 0, we define EM,n the product space of all null-drift continuous p-dimensional Itô-process and innovation (θt , Vn ), where Vn := (V1,n , · · · , Vhn ,n ), such that the initial value θ0 is non-random, θt ∈ KM for all 0 ≤ t ≤ T , the volatility of θt is bounded by M for all 0 ≤ t ≤ T , and for any j = 1, · · · , hn we have Vj,n independent of the path past {θs }0≤s≤τ j−1 . 1,n In analogy with KM which is a bounded space for the parameter value, EM,n can be seen as a bounded space for the parameter path (in the parameter value and the parameter volatility at each time 0 ≤ t ≤ T ). Note that each path in EM,n is random (but with non-random starting value), whereas elements of KM are non-random. We can now express the new following assumption. Condition (C2). We have sup   E θ̂hn ,n Fn (V1,n , θ0 ), · · · , Fn (Vhn ,n , θ0 ) (θt ,Vn )∈EM,n −θ̂hn ,n  Fn (V1,n , {θs }0≤s≤τ1,n ) 1 ), · · · , Fn (Vhn ,n , {θs } hn −1 τ ≤s≤τ hn 1,n  P → 0. 1,n Remark 9. (practicability) Condition (C2) implies18 that the error due to the local model approximation vanishes in the limit, i.e. Bn X P b̃ )∆T → b i,n − Θ (Θ 0. i,n i,n (70) i=1 Here again, the main argument of the proof is regular conditional distributions. In analogy with Remark 7, the econometrician is expected to have less trouble verifying Condition (C2) 18 see Appendix II - Section 7.2 for more details 38 than (70). Indeed, the parameter has a non-random initial value (and a random path) in Condition (C2), but a mixture of initial value στθ 0 (and a random path) in (70). Note i−1,n that here again the uniformity in Condition (C2) is not expected to add any difficulty to the problem because we look at expected values and EM,n is a well-chosen bounded space (in the parameter value and the parameter volatility). We can now summarize the theorem on consistency in this very simple case where observations occur at equidistant time intervals and returns are IID under the parametric model. Under Condition (C1) and Condition (C2), we have the consistency of (6), i.e. P bn → Θ. Θ (71) We obtain the consistency in the couple of toy examples19 . Remark 10. (LPE equal to the parametric estimator) The reader will have noticed that in the couple of examples, the LPE is equal to the parametric estimator. This is because in those very basic examples, the parametric estimator is linear, i.e. for any positive integer k and l = 1, · · · , k − 1 θ̂k,n (r1,n ; · · · ; rk,n ) = l k−l θ̂l,n (r1,n ; · · · ; rl,n ) + θ̂k−l,n (rl+1,n ; · · · ; rk,n ) k k (72) In more general examples, (72) will break, and we will obtain two distinct estimators. Challenges There are three empirical reasons why the presentation above is too simple. In practice, the observed returns can be autocorrelated, noisy and there can be endogeneity in sampling times. Accordingly, we build the general LPM in Section 2. Also, we investigate the limit distribution in Section 3. 19 see Appendix II for proofs 39 Appendix II: proofs 7.1 Preliminaries Since | θt∗ | is locally bounded and (θt∗ )+ is locally bounded away from 0, we can follow standard localisation arguments (see, e.g., pp. 160 − 161 of Mykland and Zhang (2012)) and assume without loss of generality that there exists M > 0 such that θt∗ ∈ KM for all 0 ≤ t ≤ T . Furthermore, because we assume that the volatility of the parameter σtθ is locally bounded, we can use the same techniques and assume without loss of generality that there exists σ + > 0 such that σtθ ≤ σ + for all 0 ≤ t ≤ T . Finally, we fix some notation. In the following of this paper, we will be using C for any constant C > 0, where the value can change from one line to the next. 7.2 Proof of the consistency (71) Proof (C1) ⇒(69) It suffices to show that (C1) implies that h i b̃ − Θ̃ sup E Θ = op (1). i,n i,n (73) i≥0 By (58) and (68), we can build gn such that we can write b̃ − Θ̃ hn 1 Θ i,n i,n = gn (Ui,n , · · · , Ui,n , Θ̃i,n ), where gn is a jointly measurable real-valued function such that hn 1 , Θ̃i,n ) < ∞. , · · · , Ui,n E gn (Ui,n We have that ii i h h h hn hn 1 1 E gn (Ui,n , · · · , Ui,n , Θ̃i,n ) = E E gn (Ui,n , · · · , Ui,n , Θ̃i,n ) Θ̃i,n Z  =E gn (u, Θ̃i,n )µω (du) 1 , · · · , U hn ) given Θ̃ where µω (du) is a regular conditional distribution for (Ui,n i,n (see, e.g., i,n Breiman (1992)). From Condition (C1), we obtain (73). Proof (C2) ⇒(70) It is sufficient to show that (C2) implies that h i ˆ sup E Θ̂i,n − Θ̃ = op (1). i,n i≥0 40 (74) (2) By (57), (58), (67) and (68), we can build gn such that we can write ˆ hn (2) 1 ∗ Θ̂i,n − Θ̃ i,n = gn (Ui,n , · · · , Ui,n , {θs }τ 0 0 i−1,n ≤s≤τi,n , Θ̃i,n ). We compute h i h h ii ˆ | = E E g (2) (U 1 , · · · , U hn , {θ∗ } 0 E |Θ̂i,n − Θ̃ 0 , Θ̃i,n )|Θ̃i,n i,n n i,n s τi−1,n ≤s≤τi,n i,n Z  (2) =E gn (v, Θ̃i,n )µω (dv) = op (1). 1 , · · · , U hn , {θ ∗ } where µω (dv) is a regular conditional distribution for (Ui,n s τ0 i,n 0 i−1,n ≤s≤τi,n ) given Θ̃i,n and where we used Condition (C2) in the last equality. 7.3 Proof of Consistency in Example 1 Let’s show Condition (C1) first. For any M > 0, the quantity  θ̂hn ,n Fn (V1,n , θ); · · · ; Fn (Vhn ,n , θ) − θ can be uniformly in {θ ∈ KM } bounded by hn X C (∆V[0;τn ],j,n )2 T −1 − 1 . (75) j=1 We can prove that (75) tends to 0 in probability as a straightforward consequence of Theorem I.4.47 of p.52 in Jacod and Shiryaev (2003). To show Condition (C2), let M > 0. It is sufficient to show that the following quantity " # Z τj hn X 1,n 2 2 −1 nhn E θ0 ∆V[0;τn ],j,n − θs dVs−τ j−1 ,j,n (76) j−1 τ1,n j=1 1,n goes to 0 uniformly in {(θt , Vn ) ∈ EM,n }. Using Conditional Burkholder-Davis-Gundy inequality (BDG, see inequality (2.1.32) of p. 39 in Jacod and Protter (2012)), (76) can be bounded uniformly by " # Z τj hn X 1,n −1 Chn E θ0 ∆V[0;τn ],j,n − θs dVs−τ j−1 ,j,n . (77) j−1 τ1,n j=1 1,n We can also bound uniformly (77) by Ch−1 n hn X  j 1/2  (∆τ1,n ) E {z } | j=1 O(n−1/2 ) | 41  sup j−1 j s∈[τ1,n ,τ1,n ] {z |θ0 − θs |  op (n−1/2 ) } where we used BDG another time to obtain op (n−1/2 ). 7.4 Proof of Consistency in Example 2 Condition (C1) can be shown easily. Similarly, Condition (C2) is a direct consequence of the definition in (59), (60) together with (62). 7.5 Proof of Theorem 1 (central limit theorem) We show (14) We aim to show that Ei,n := Bn X  1 P n 2 Θ̃i,n − Θi,n ∆Ti,n → 0. | {z } i=1 (78) ei,n   Note that ETi−1,n ei,n = 0 and thus that Ei,n is a discrete martingale. We compute the limit  2  P n of n B i=1 ETi−1,n ei,n . We have n Bn X Bn h X   ETi−1,n ETi−1,n e2i,n = n ≤ Cn 2 l Ti,n Ti−1,n i=1 i=1 Z 2 i ∗ (θu∗ − θT )du i−1,n Bn X   1 ETi−1,n (∆Ti,n )4 2 | {z } i=1 Op (h2n n−2 )  ETi−1,n  sup Ti−1,n ≤s≤Ti,n | {z ∗ (θs∗ − θT )4 i−1,n Op (hn n−1 )  12 } = op (1), where we used Conditional Cauchy-Schwarz in the inequality, (19) of Condition (E1) together with BDG  2to obtain the big taus, and (25) in the last equality. Because we showed PBninequality that n i=1 ETi−1,n ei,n tends to 0 in probability, we obtain (78). We show (16) Without loss of generality, we can assume that the prameter θt∗ is a 1-dimensional process. Because for example the parametric estimator can be biased, in all generality, Ai,n :=  1 ˆ M∗ M∗ ,Θ̃ n n 2 Θ̃ − Θ̃ ∆T n i,n is not the increment term of a discrete martingale. Thus, we i,n i,n i,n need first to compensate it in order to apply usual discrete martingale limit theorems. Let Bi,n := Ai,n − ETi−1,n [Ai,n ]. We want to use Corollary 3.1 of pp. 58 − 59 in Hall and Heyde (1980). First, note that by Condition (E0), condition (3.21) in p.58 of Hall and Heyde (1980) 42 is satisfied. We turn now to the two other conditions of the corollary in the two following steps. First condition : We will show in this step that for all  > 0, Bn X h i P 2 ETi−1,n Bi,n 1{Bi,n >} → 0. (79) i=1 The conditional Cauchy-Schwarz inequality gives us that each term of the sum in (79) can be bounded by   4    12 ETi−1,n Bi,n ETi−1,n 1{Bi,n >} . (80) To show that the right term of the sum in the right-hand side of (80) vanishes uniformly, we use regular conditional distribution together with (19), (22) and (25). We apply regular conditional distribution together with (23) on the left term of the sum in the right-hand side of (80). Then, we take the sum of all the terms in the right-hand side of (80) and we can prove (79). Second condition : We will prove that Bn X Z  2  P ETi−1,n Bi,n →T T Vθs∗ ds. 0 i=1 (81) By regular conditional distribution and (22), we have that Bn X Bn X  2   ETi−1,n Bi,n = T ETi−1,n VθT∗ i=1 M∗ ,Θ̃i,n  i−1,n i=1 ∆Ti,nn + op (1). In view of (21), the conditional Cauchy-Schwarz inequality and the boundedness of Vθ , we get Bn X h ETi−1,n VθT∗ i=1 M∗ ,Θ̃i,n i−1,n ∆Ti,nn i 1− l20 = hn 2 n l −1 Bn X h ETi−1,n VθT∗ i=1 i−1,n i ∆Ti,n + op (1). Using Lemma 2.2.11 of Jacod and Protter (2012) together with conditional Cauchy-Schwarz inequality, (19) and the boundedness of Vθ , we obtain T Bn X i=1 h ETi−1,n VθT∗ i−1,n Bn i X 1− 20 2 ∆Ti,n = hn l n l −1 T VθT∗ i=1 i−1,n ∆Ti,n + op (1). We can apply now Proposition I.4.44 (p. 51) in Jacod and Shiryaev (2003) and we get T Bn X i=1 VθT∗ P i−1,n Z ∆Ti,n → T 0 43 T Vθs∗ ds. We are interested in the stable convergence of the sum of Ai,n terms, but by using Corollary 3.1 of pp. 58 − 59 in Hall and Heyde (1980), we only obtain the stable convergence of the increment martingale terms Bi,n . We will show now that the sum of the conditional means   PBn Sn := i=1 ETi−1,n Ai,n tends to 0 in probability. An application of (24) together with regular conditional distribution will give us the convergence to 0 of Sn . We show (15) We want to prove 1 n2 Bn X M∗ ,Θ̃i,n Θ̃i,n ∆Ti,nn  P − ∆Ti,n → 0. (82) i=1 We define the conditional expectation of the terms in the sum of (82): h i M∗ ,Θ̃ Ci,n := ETi−1,n Θ̃i,n ∆Ti,nn i,n − ∆Ti,n . In analogy with the previous part, we can rewrite the term on the left-hand side of (82) as 1 n2 Bn X Bn X   − ∆Ti,n − Ci,n + Ci,n . {z } i=1 M∗ ,Θ̃i,n Θ̃i,n ∆Ti,nn i=1 | Di,n P Note that ki=1 Di,n is a discrete martingale, and thus to show that it vanishes asymptotically, it is sufficient to show n Bn X  2  P ETi−1,n Di,n → 0. (83) i=1 Regular conditional distribution and (21) implies (83). Similarly, regular conditional distribuP n P tion together with (20) enables us to deduce B i=1 Ci,n → 0. Thus, we proved (82). We show (17) and (18) The proof is very similar to the previous part, using respectively Condition (E5) and Condition (E6) instead of Condition (E2). 7.6 7.6.1 Proof of Theorem 3 (QMLE) Algorithm to construct the unbiased estimator b (BC) We describe here the algorithm to obtain Θ . Note that the bias-correction is only required n when α = 1/2. 44 1. We compute the local QMLEs. 2. From Theorem 6 (p. 241) in Xiu (2010), we compute the corresponding W1 and W2 . 3. We change some entries of the matrices to ensure unbiased estimates when using formula (21) and (22) in the aforementioned theorem. 4. We compute the unbiased local QMLE using the formula (21) and (22) with the corrected matrices. b (BC) 5. The bias-corrected LPE Θ is taken as the mean of local bias-corrected estimates. n 7.6.2 Proof We want to show that the conditions of Theorem 2 are satisfied. We start with the case α > 12 . The key result is Theorem 6 in Xiu (2010, p. 241). We show first Condition (E3’). We can see easily from the key result that if we choose Vθt∗ = 6σt2 , then (32) is satisfied. We can verify the second equation (33) straightforwardly. As for the bias condition (34), we can see that as the noise shrinks faster than the order of the returns to 0, then the bias tends to the sum of the diagonal elements of W1 defined in (23) in Xiu (2010, p. 241) minus unity. This equals 0 and thus (34) is satisfied. Condition (E5’) is satisfied with M∗n = (0, 0) as the behavior of the QMLE doesn’t depend much on the initial condition. Finally, Condition (E6’) can be shown combining the aforementioned theorem with the rationale in Appendix II Section 7.3. We consider now the case α = 1/2, i.e. when both the noise variance and the returns are b (BC) of the same rate. In that case, we need to use the bias-corrected estimator Θ so that we n can verify the conditions of Thorem 2. The key result here is Proposition 1 (p. 369) along with its proof (p. 391-393) in Aït-Sahalia et al. (2005). Condition (E3) is then satisfied using similar techniques of proof along with the fact that we have reduced the bias of the estimator. Condition (E5’) with M∗n = (0, 0) and Condition (E6’) are satisfied using similar techniques to the proof in the case α > 1/2 along with the fact that the estimator bias is reduced. 7.7 Proof of Theorem 4 (powers of volatility) We aim to show that we can verify the conditions of Theorem 2. The idea is to use a Taylor expansion as in the delta method. Then conditions will be satisfied following the proof of Theorem 3. More specifically, for Condition (E3) the Taylor expansion can be expressed as 1,M∗n ,σ 2 g θ̂hn ,n (Ri,n h1/2 n 1,M∗n ,σ 2 = h1/2 θ̂hn ,n (Ri,n n h ,M∗n ,σ 2 ; · · · ; Ri,nn h ,M∗n ,σ 2 ; · · · ; Ri,nn 45   ; R∗n ) − g(σ 2 )  ; R∗n ) − σ 2 g 0 (σ 2 ) + op (hn n−1 ). For Condition (E5’) we have similarly and uniformly 1,M0i,n ,σ 2 g(θ̂hn ,n (Ri,n 1,M0i,n ,σ 2 = (θ̂hn ,n (Ri,n hn ,M0i,n ,σ 2 , · · · , Ri,n hn ,M0i,n ,σ 2 , · · · , Ri,n 1,M∗n ,σ 2 ; R0i,n )) − g(θ̂hn ,n (Ri,n 1,M∗n ,σ 2 ; R0i,n ) − θ̂hn ,n (Ri,n h ,M∗n ,σ 2 , · · · , Ri,nn h ,M∗n ,σ 2 , · · · , Ri,nn ; R∗n )) ; R∗n ))g 0 (σ 2 ) −1/2 +op (h1/2 ). n n Finally, for Condition (E6’) we also have uniformly 1,M0i,n ,σt2 g θ̂hn ,n (Ri,n 1,M0i,n ,σt2 = θ̂hn ,n (Ri,n hn ,M0i,n ,σt2 , · · · , Ri,n hn ,M0i,n ,σt2 , · · · , Ri,n   1,M0 ,σ 2 hn ,M0 ,σ 2 ; R0i,n ) − g θ̂hn ,n (Ri,n i,n 0 , · · · , Ri,n i,n 0 ; R0i,n ) 1,M0i,n ,σ02 ; R0i,n ) − θ̂hn ,n (Ri,n hn ,M0i,n ,σ02 , · · · , Ri,n  ; R0i,n ) g 0 (σ02 ) −1/2 +op (h1/2 ). n n 7.8 Proof of Theorem 5 (E-(LPE of QMLE)) The strategy of the proof consists in showing that the estimation error in ν doesn’t affect asymptotically the behavior of the QMLE so that we can apply directly Theorem 3. To do that, the key results will be Theorem 3(i) (p. 37) in Li et al. (2016) and Theorem 6 (p. 241) in Xiu (2010). bτ = Zτ −g(Ii,n , ν̂) and we define the n-dimensional vector Ybn = (X bτ − We recall that X 1,n i,n i,n b0 , · · · , X bT − X bτ X ). We also define Y = ((X − X ) + (˜  −  ˜ ), · · · , (X − X n τ 0 1,n 0,n τ T n−1,n 1,n n−1,n ) + (˜ n,n − ˜n−1,n )) and δn = (g(I1,n , ν̂) − g(I0,n , ν̂)) − (g(I1,n , ν) − g(I0,n , ν)), · · · , g(In,n , ν̂) − g(In−1,n , ν̂)) − (g(In,n , ν) − g(In−1,n , ν))). It is clear that Ybn = Yn + δn . (84) b n is the LPE of QMLE on Ybn and we define Θ e n as the LPE of QMLE Finally, we recall that Θ on Yn . Consider the case α < 1/2 (the case α = 1/2 is done following the same line of reasoning). The goal is to show that stably in distribution Z T    1 2 1/2 b −1 (85) n Θn − Θ → 6T σs4 ds N (0, 1). 0 We decompose the left hand-side term in (85) as b n − Θ) = n1/2 (Θ e n − Θ) + n1/2 (Θ bn − Θ e n) . n1/2 (Θ | {z } | {z } An On the account of Theorem 3, we have that An → (6T −1 P show that Bn → 0, then this implies (85). 46 Bn RT 0 1 σs4 ds) 2 N (0, 1). Thus, if we can P We show now that Bn → 0. We define Mn the set of real n × n matrices. In view of Theorem 6 (p. 241) in Xiu (2010), there exists a function M : K → Mn × Mn θ 7→ (M (1) (θ), M (2) (θ)) b i,n = Ybn0 M (Θ b i,n )Ybn and Θ̃i,n = Yn0 M (Θ̃i,n )Yn , where we define for any θ ∈ K and such that Θ any n dimensional vector Y : Y 0 M (θ)Y = (Y 0 M (1) (θ)Y, Y 0 M (2) (θ)Y ). We have that b n − Θ̃i,n ), Bn = n1/2 (Θ b i,n )Ybn − Yn0 M (Θ̃i,n )Yn ), = n1/2 (Ybn0 M (Θ b i,n )(Yn + δn ) − Y 0 M (Θ̃i,n )Yn ), = n1/2 ((Yn + δn )0 M (Θ n 1/2 0 0 b b i,n )Yn + Yn0 M (Θ b i,n )δn + δn0 M (Θ b i,n )δn )), = n (Yn (M (Θi,n ) − M (Θ̃i,n ))Yn + (δn M (Θ b i,n ) − M (Θ̃i,n ))Yn + op (1), = n1/2 Yn0 (M (Θ = op (1). where we used (84) in the third equality, Assumption A along with Theorem 3(i) in Li et al. (2016) in the fifth equality, and Theorem 6 in Xiu (2010) along with Assumption A, Theorem 3(i) in Li et al. (2016) in the sixth equality. 7.9 Proof of Theorem 6 (powers of volatility) The proof follows the proof of Theorem 5 along with the proof of Theorem 4. 7.10 Proof of Theorem 7 (Time-varying friction parameter model with uncertainty zones) We choose M∗n = (1, 1, 1). Condition (E1) follows exactly from Corollary 4.4 (p. 14) in Robert t 0 and Rosenbaum (2012). We show now Condition (E2). We can decompose ∆TM,θ − ∆TN,θ i,n i,n into  N,θt  0 0 0 ∆TM,θ − ∆TN,θ + ∆TN,θ . (86) i,n i,n i,n − ∆Ti,n (1)  We deal with the first term in (86). We can see that under the parametric model Li,n , sign(Ri,n ) follows a discrete Markov chain on the space {1, · · · , m} × {−1, 1}. Following the same line 47 of reasoning as in the proof of Lemma 14 in Potiron and Mykland (2017), we can easily show that   1 0 0 E ∆TM,θ − ∆TN,θ sup = op (hn n−1− l ), i,n i,n (θt ,V,M,N)∈EM,n ×M2m,n sup (θt ,V,M,N)∈EM,n ×M2m,n   2 0 0 Var ∆TM,θ − ∆TN,θ = op (hn n−1− l ). i,n i,n We turn now to the second term in (86). Using the same idea as in the proof of Lemma 11 in Potiron and Mykland (2017), we deduce  1 N,θt  0 E ∆TN,θ = op (hn n−1− l ), i,n − ∆Ti,n (87)   2 t 0 = op (hn n−1− l ). Var ∆TM,θ − ∆TN,θ i,n i,n (88) sup (θt ,V,N)∈EM,n ×Mm,n sup (θt ,V,N)∈EM,n ×Mm,n We turn now to Condition (E3). Let M > 0. Because in the model with uncertainty M∗ ,θ (1)  zones ∆Ti,nn can be written as a sum of Markov chain Li,n , sign(Ri,n ) with a finite fourth moment, we have uniformly in θ ∈ KM and in i = 1, · · · , Bn that  10  1,M∗ ,θ h ,M∗ ,θ M∗ ,θ  Var hnl θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ ∆Ti,nn    10 1,M∗ ,θ h ,M∗ ,θ M∗ ,θ  = Var hnl θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ E ∆Ti,nn )2 + op (h2n n−2 ),  10   1,M∗ ,θ h ,M∗ ,θ M∗ ,θ  M∗ ,θ = Var hnl θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ E ∆Ti,nn ∆Ti,nn + op (h2n n−2 ), (1) (2) M∗ ,θ = Sθ,n Sθ,n ∆Ti,nn T hn n−1 + op (h2n n−2 ), with   10 1,M∗ ,θ h ,M∗ ,θ (1) Sθ,n := Var hnl θ̂hn ,n (Ri,n n ; · · · ; Ri,nn n ; R∗n ) − θ  (2) M∗ ,θ  and Sθ,n := E ∆Ti,nn T −1 h−1 n n. By Lemma 4.19 in p. 26 of Robert and Rosenbaum (2012) in the special case where the volatility is constant, we obtain the existence and the value of (1) (1) (1) Sθ such that Sθ,n → Sθ . Also, by Corollary 4.4 in p. 14 of Robert and Rosenbaum (2012), (2) (2) (2) (1) (2) there exists Sθ such that Sθ,n → Sθ . If we define Vθ = Sθ Sθ , (22) is satisfied. Moreover, (23) and (24) can be verified easily. Condition (E5) can be proven the same way as the first term in (86). Finally, we can prove Condition (E6) using (87), (88) and similar arguments to the proof of Lemma 13 in Potiron and Mykland (2017). 7.11 Proof of Theorem 8 (Time-varying MA(1)) The key result for this proof is the connection between the MA(1) process and the observations in the model described in Section 4.1 in the case α = 1/2. Such connection can be seen in 48 view of the proof of Proposition I (pp. 391-393) in Aït-Sahalia et al. (2005). More specifically, we can use Taylor expansions to re-express this estimator as the estimator in Section 4.1 and then use Theorem 3 (ii) to conclude. Similar Taylor expansions were already obtained in the proof of Theorem 4, and we will not further explain the details in this specific case. We verify now the conditions hold. Condition (E3) is obtained via Taylor expansions and Theorem 3 (ii), along with the fact that n1/4 = o(hn ) for the bias condition. We use the same results to prove Condition (E5’)-(E6’). 7.12 Estimation of the friction parameter bias and standard deviation in the model with uncertainty zones In this section, we provide the friction parameter bias and standard deviation used in our empirical illustration. The notation of Section 4.5 and Section 6 are in force. We define ŝn (η) := V̂ , where an expression of V̂ will be provided at the end of this section. First, we assume that the absolute jump size is constant equal to the tick size, i.e. Li,n := 1. In view of (51), we have  N (c)  α,t,1 (m) η̂α,t := min 1, . (a) 2Nα,t,1 (a) (c) We also have by definition that the number of alternations is Nα,t,1 = Nn − Nα,t,1 . If we assume that Nn is non-random, then 2η (c) ), (89) Nα,t,1 ∼ Bin(Nn , 2η + 1 where Bin(n, p) is a binomial distribution with n observations and probability p. Let B ∼ 2η ). We can define the bias Bin(Nn , 2η+1    B B := E min 1, −η 2(Nn − B) and the variance as   V := Var min 1,  B . 2(Nn − B) B and V can be computed easily numerically. If Nn is random, we can work conditional on Nn . As the sampling times are endogenous, (c) 2η (89) is not true in that case. Nonetheless, we can still approximate Nα,t,1 by Bin(Nn , 2η+1 ) if the number of observations is large enough. We now turn out to the general case, where Li,n can be different from 1. For k = 1, · · · , m (c) we define pk := 2η+k−1 2η+k and we let Bk be an independent sequence of distribution Bin(Nα,t,k + (a) Nα,t,k , pk ), and   1   Bk Ck := max 0, min 1, k − 1 + 1 . (a) (c) 2 Nα,t,k + Nα,t,k − Bk 49 P (m) (m) The distribution of η̂α,t can be approximated by the distribution of m i=1 λα,t,k Ck , and we can    Pm P (m) 2 (m)  estimate the bias as B̂ := m i=1 (λα,t,i ) Var Ck . i=1 λα,t,i E Ck and the variance as V̂ := 50 Figure 1: AVAR of ERVext and E-(LPE of QMLE) as a function of the noise variance, i.e. the variance of ˜i,n . The horizon time is set to T = 1 (which corresponds to 6.5 hours of intraday trading). On the left hand-side, we follow exactly the setting of the numerical study in Li et al. (2016), where σt2 = 0.000125 if 0.05 ≤ t < 0.95 and σt2 = 15 ∗ 0.000125 otherwise. There is on average one observation a second, which corresponds to n = 23, 400. On the right hand-side, the setting is the same except that we remove the jumps in volatility and consider σt2 = 0.000125 for 0 ≤ t ≤ 1. 51 Figure 2: Evolution of η̂i,n for different values of hn . The red line corresponds to the global (mod) (mod) estimate η̂αn ,T . The blue lines are one (local) standard deviation ŝhn away from η̂αn ,T . The (mod) purple lines are two (local) standard deviations away from η̂αn ,T . 52 Figure 3: Estimated volatility with the LPE for different values of hn . The red line corresponds to the RV estimator. The blue line stands for the model with uncertainty zones volatility d αn ,T . estimator RV estimator MLE FRO LPE BC LPE LPE BC LPE LPE BC LPE LPE BC LPE LPE BC LPE LPE BC LPE block size 25 25 100 100 500 500 1000 1000 2000 2000 5000 5000 β sample bias -0.0052 0.2913 -0.0168 -0.0172 0.0035 -0.0010 -0.0021 -0.0049 -0.0030 -0.0056 -0.0032 -0.0055 -0.0052 -0.0060 β s.d. 0.0085 0.0355 0.0131 0.0132 0.0083 0.0082 0.0094 0.0095 0.0099 0.0100 0.0102 0.0101 0.0087 0.0087 κ sample bias 0.1041 0.1666 -0.0985 -0.0062 -0.0256 -0.0065 0.0073 0.0098 0.0425 0.0438 0.1029 0.1035 0.1037 0.1044 κ s.d. 0.0148 0.0355 0.0096 0.0097 0.0096 0.0096 0.0101 0.0104 0.0125 0.0126 0.0143 0.0143 0.0148 0.0147 Table 1: In this table, we report the sample bias and the standard deviation for the different estimators in the case of a small number of oscillations δ = (4, 4). The parameter (β, κ) = (0.5, 1). The number of Monte-carlo simulations is 1,000. 53 estimator MLE FRO LPE LPE BC LPE LPE BC LPE LPE BC LPE LPE BC LPE LPE BC LPE LPE BC block size 25 25 100 100 500 500 1000 1000 2000 2000 5000 5000 β sample bias -0.0069 0.0065 -0.0148 -0.0155 0.0017 0.0012 -0.0053 -0.0085 -0.0071 -0.0115 -0.0071 -0.0108 -0.0071 -0.0093 β s.d. 0.0105 0.0391 0.0183 0.0184 0.0092 0.0092 0.0094 0.0094 0.0102 0.0102 0.0106 0.0106 0.0106 0.0106 κ sample bias 0.1094 0.0882 -0.0876 0.0046 -0.0164 0.0039 0.1046 0.1086 0.1078 0.1098 0.1087 0.1096 0.1087 0.1090 κ s.d. 0.0222 0.0678 0.0144 0.0143 0.0183 0.0183 0.0219 0.0221 0.0216 0.0217 0.0220 0.0221 0.0220 0.0219 Table 2: In this table, we report the sample bias and the standard deviation for the different estimators in the case of a bigger number of oscillations δ = (10, 10). The parameter (β, κ) = (0.5, 1). The number of Monte-carlo simulations is 1,000. hn 50 100 150 200 250 300 350 400 450 Bn 67 34 23 17 14 12 10 9 8 Chi Sq. Stat 719 268 155 116 109 68.5 90.6 91.5 42.6 Dg. Fr. 66 33 22 16 13 11 9 8 7 p-value 0 0 0 0 0 0 0 0 6e−7 Table 3: Summary chi-square statistics χ2n based on the block size hn . Note that since the number of observations of the last block is arbitrary, the last block estimate η̂Bn ,n is not used to compute the chi-square statistic. 54
10math.ST
Improving Max-Sum through Decimation to Solve Loopy Distributed Constraint Optimization Problems J. Cerquides1 , R. Emonet2 , G. Picard3 , and J.A. Rodriquez-Aguilar1 arXiv:1706.02209v1 [cs.MA] 7 Jun 2017 1 IIIA-CSIC, Campus UAB, 08193 Cerdanyola, Catalonia, Spain {cerquide,jar}@iiia.csic.es 2 Université de Lyon, Laboratoire Hubert Curien UMR CNRS 5516, France [email protected] 3 MINES Saint-Etienne, Laboratoire Hubert Curien UMR CNRS 5516, France [email protected] Abstract. In the context of solving large distributed constraint optimization problems (DCOP), belief-propagation and approximate inference algorithms are candidates of choice. However, in general, when the factor graph is very loopy (i.e. cyclic), these solution methods suffer from bad performance, due to non-convergence and many exchanged messages. As to improve performances of the Max-Sum inference algorithm when solving loopy constraint optimization problems, we propose here to take inspiration from the belief-propagation-guided decimation used to solve sparse random graphs (k-satisfiability). We propose the novel DeciMaxSum method, which is parameterized in terms of policies to decide when to trigger decimation, which variables to decimate, and which values to assign to decimated variables. Based on an empirical evaluation on a classical BP benchmark (the Ising model), some of these combinations of policies exhibit better performance than state-of-the-art competitors. 1 Introduction In the context of multi-agent systems, distributed constraint optimization problems (DCOP) are a convenient to model coordination issues agents have to face, like resource allocation, distributed planning or distributed configuration. In a DCOP, agents manage one or more variables they have to assign a value (e.g. a goal, a decision), while taking into account constraints with other agents. Solving a DCOP consists in making agents communicate as to minimize the violation of these constraints. Several solution methods exist to solve such problems, from complete and optimal solutions, to approximate ones. When dealing with larger scales (thousands of variables), approximate methods are solutions of choice. Indeed, complete methods, like ADOPT or DPOP, suffer exponential computation and/or communication cost in general settings [10,15]. As a consequence, in some large settings, approximate methods are better candidates, as evidenced by the extensive literature on the subject (see [1] for a complete review). One major difficulty for approximate method to solve DCOP is the presence of cycles in the constraint graph (or factor graph). Among the aforementioned methods, inference-based ones, like Max-Sum [3] and its extensions like [16], have demonstrated good performance even on loopy settings. However, there exists some cases, with numerous loops or large induced width of the constraint graph, where they perform badly, which translates into a larger number of messages, a longer time to convergence and a final solution with bad quality. One original approach to cope with loopy graphs is to break loops by decimating variables during the solving process. Decimation is a method inspired by statistical physics, and applied in belief-propagation, which consists in fixing the value of a variable, using the marginal values as the decision criteria to select the variable to decimate [13]. The decimation is processed regularly after the convergence of a classical belief-propagation procedure. In [11], decimation has been used in the constraint satisfaction framework, for solving centralized k-satisfiability problems [11]. Inspired by this concept, we propose a general framework for applying decimation in the DCOP setting. Other works proposed Max-Sum_AD_VP as to improve Max-Sum performance on loopy graphs [20]. The idea is to perform the inference mechanism through an overlay directed 2 Cerquides et al. acyclic graph, to remove loops, and to alternating the direction of edges at a fixed frequency as to improve the sub-optimal solution found with the previous direction. One mechanism within one of these extensions, namely value propagation, can be viewed as a temporary decimation. Against this background, the main goal of this paper is to propose a general framework for installing decimation in Max-Sum for solving DCOP. More precisely, we make the following contributions: 1. We propose a parametric solution method, namely DeciMaxSum, to implement decimation in Max-Sum. It takes three fundamental parameters for decimation: (i) a policy stating when to trigger decimation, (ii) a policy stating which variables to decimate, and (iii) a policy stating which value to assign to decimated variables. The flexibility of DeciMaxSum comes from the fact that any policy from (1i) can be combined with any policy from (1ii) and (1iii). 2. We propose a library of decimation policies; some inspired by the state-of-the-art and some original ones. Many combinations of policies are possible, depending on the problem to solve. 3. We implement and evaluate some of these combinations of decimation policies on classical DCOP benchmarks (meeting scheduling and Ising models), against state-of-the-art methods like standard Max-Sum and Max-Sum_AD_VP. The rest of the paper is organized as follows. Section 2 expounds some background on DCOP and expounds the decimation algorithm from which our algorithm DeciMaxSum is inspired. Section 3 defines the general framework of DeciMaxSum, and several examples of decimation policies. Section 4 presents results and analyses of experimenting DeciMaxSum, with different combinations of decimation policies, against Max-Sum and Max-Sum_AD_VP. Finally, Section 5 concludes this paper with some perspectives. 2 Background This section expounds the DCOP framework and some related belief-propagation algorithms from the literature are discussed concerning the mechanisms to handle cycles in constraint graphs. 2.1 Disributed Constraint Optimization Problems One way to model the coordination problem between smart objects is to formalize the problem as a distributed constraint optimization problem. Definition 1 (DCOP). A discrete Distributed Constraint Optimization Problem (or DCOP) is a tuple hA, X , D, C, µi, where: A = {a1 , . . . , a|A| } is a set of agents; X = {x1 , . . . , xN } are variables owned by the agents; D = {Dx1 , . . . , DxN } is a set of finite domains, such that variable xi takes values in Dxi = {v1 , . . . , vk }; C = {u1 , . . . , uM } is a set of soft constraints, where each ui defines a utility ∈ R ∪ {−∞} for each combination of assignments to a subset of variables Xi ⊆ X (a constraint is initially known only to the agents involved); µ : X → A is a function mapping variables to their associated agent. A solution to the DCOP is an assignment X ∗ = {x∗1 , . . . , x∗N } to all variables that maximizes the overall sum of costs4: M X um (Xm ) (1) m=1 4 Note that the notion of cost can be replaced by the notion of cost ∈ R∪{+∞}. In this case, solving a DCOP is a minimization problem of the overall sum of costs. DeciMaxSum: Decimation in MaxSum 3 As highlighted in [1], DCOPs have been widely studied and applied in many reference domains, and have many interesting features: (i) strong focus on decentralized approaches where agents negotiate a joint solution through local message exchange; (ii) solution techniques exploit the structure of the domain (by encoding this into constraints) to tackle hard computational problems; (iii) there is a wide choice of solutions for DCOPs ranging from complete algorithms to suboptimal algorithms. A binary DCOP can be represented as a constraint graph, where vertices represent variables, and edge represent binary constraints. In the case of n-ary constraints, a DCOP can be represented as a factor graph: an undirected bipartite graph in which vertices represent variables and constraints (called factors), and an edge exists between a variable and a constraint if the variable is in the scope of the constraint. Definition 2 (Factor Graph). A factor graph of a DCOP as in Def. 1, is a bipartite graph F G = hX , C, Ei, where the set of variable vertices corresponds to the set of variables X , the set of factor vertices corresponds to the set constraints C, and the set of edges is E = {eij | xi ∈ Xj }. When the graph representing the DCOP contains at least a cycle, we call it a cyclic DCOP; otherwise, it is acyclic. A large literature exists on algorithms for solving DCOPs which fall into two categories. On the one hand, complete algorithms like ADOPT and its extensions [9], or inference algorithms like DPOP [15] or ActionGDL [19], are optimal, but mainly suffer from expensive memory (e.g. exponential for DPOP) or communication (e.g. exponential for ADOPT) load –which we may not be able to afford in a constrained infrastructure, like in sensor networks. On the other hand, approximate algorithms like Max-Sum [3] or MGM [8] have the great advantage of being fast with a limited memory print and communication load, but losing optimality in some settings –e.g. Max-Sum is optimal on acyclic DCOPs, and may achieve good quality guarantee on some settings. The aforementioned algorithms mainly exploit the fact that an agent’s utility (or constraint’s cost) depends only on a subset of other agents’ decision variables, and that the global utility function (or cost function) is a sum of each agent’s utility (constraint’s cost). In this paper, we are especially interested in belief-propagation-based algorithms, like Max-Sum, where the notion of marginal values describes the dependency of the global utility function on variables. 2.2 From Belief-Propagation to Max-Sum Belief propagation (BP), i.e. sum-product message passing method, is a potentially distributed algorithm for performing inference on graphicalQmodels, and can operate on factor graphs representing a product of M factors [7]: F (x) = M m=1 fm (Xm ) . The sum-product algorithm provides an efficient local message passing procedure to compute the marginal functions of all variables simultaneously. The marginal function, Pzn (xn ) describes the total dependency of the global function F (x) on variable xn : zn (xn ) = {x0 },n0 6=n F (Xn0 ). BP operates iteratively propagating messages mi→j (tables associating marginals to each value of variables) along the edges of the factor graph.When the factor graph is a tree, BP algorithm computes the exact marginals and converge in a finite number a steps depending on the diameter of the graph [7]. Max-product is an alternative version of sum-product which computes the maximum value instead of the sum. Built as a derivative of max-product, Max-Sum is an approximate algorithm to solve DCOP [3]. The main evolution is the way messages are assessed, to pass from product to sum operator through logarithmic translation. And as a consequence, Max-Sum computes an assignment X ∗ 4 Cerquides et al. Algorithm 1: The BP-guided decimation algorithm from [11] Data: A factor graph representing a k-satisfiability problem Result: A feasible assignment X ∗ or FAIL 11 initialize BP messages U ←∅ for t = 1, . . . , n do run BP until the stopping criterion is met choose xi ∈ X \ U uniformly at random compute the BP marginal zi (xi ) choose x∗i distributed according to zi fix xi = x∗i U ← U ∪ {xi } simplify the factor graph if a contradiction is found, return FAIL 12 return X ∗ 1 2 3 4 5 6 7 8 9 10 that maximizes the DCOP objective in Equation 1. Depending on the DCOP to solve, MaxSum may be used with two different termination rules: (i) continue until convergence (no more exchanged messages, because when a variables or a factor receives twice the same message from the same emitter it does not propagates); (ii) propagate message for a fixed number of iterations per agent. Max-Sum is optimal on tree-shaped factor graphs, and still perform well on cyclic settings. But there exist problems for which Max-Sum does not converge or converge to a sub-optimal state. In fact, on cyclic settings [3] identify the following behaviors: (i) agents converge to fixed states that represent either the optimal solution, or a solution close to the optimal, and the propagation of messages ceases; (ii) agents converge as above, but the messages continue to change slightly at each update, and thus continue to be propagated around the network; (iii) neither the agents’ preferred states, nor the messages converge and both display cyclic behavior. As to improve Max-Sum performance on cyclic graphs, [20] proposed two extensions to Max-Sum: (i) Max-Sum_AD which operates Max-Sum on a directed acyclic graph built from the factor graph, and alternates direction at a fixed rate (a parameter of the algorithm); (ii) MaxSum_AD_VP which operates Max-Sum_AD and propagates current values of variables when sending Max-Sum messages so that factors receiving the value only consider this value instead of the whole domain of the variable. These two extensions, especially the second one, greatly improves the quality of the solution: Max-Sum_AD_VP found solutions that approximate the optimal solution by a factor of roughly 1.1 on average. However, the study does not consider the number of exchanged messages, or the time required to converge and terminate MaxSum_AD_VP. 2.3 BP-guided Decimation In this paper, we propose to take inspiration from work done in computational physics [13], as to cope with cyclicity in DCOP. Notably, [5] introduced the notion of decimation in constraint satisfaction, especially k-satisfiability, where variables are binary, xi ∈ {0, 1}, and each constraint requires k of the variables to be different from a specific k-uple. Authors proposed a class of algorithms, namely message passing-guided decimation procedure, which consists in iterating the following steps: (1) run a message passing algorithm, like BP ; (2) use the result to choose a variable index i , and a value x∗i for the corresponding variable; (3) replace the constraint satisfaction problem with the one obtained by fixing xi to x∗i . The BP-guided decimation procedure is shown in Algorithm 1, whose performances are analysed in [11,13]. DeciMaxSum: Decimation in MaxSum 5 BP-guided decimation operates on the factor graph representing the k-satisfiability problem to solve. At each step, the variable to decimate is randomly chosen among the remaining variables. The chosen variable xi is assigned a value determined by random sampling according to its marginal zi . After decimation, the factor graph is simplified: some edges are no more relevant, and factors can be sliced (columns corresponding to removed variables are deleted). In some settings, BP-guided decimation may fail, if random choices assign a value to a variable which is not consistent with other decimated variables. Some comments can be made on this approach. First, relying on marginal values is a key feature, and is the core of the “BP-guided” nature of this method. Marginal values are exploited to prune the factor graph. Second, while in the seminal work of [11], this procedure is used to solve satisfiability problems, the approach can easily be implemented to cope with optimization problems. For instance, the inference library libDAI proposes an implementation of decimation for discrete approximate inference in graphical models [12], which was amongst the three winners of the UAI 2010 Approximate Inference Challenge5. 2.4 State of a Factor Graph Representation The previous BP-based algorithm operates on factor graph representing the problem. “Operates” means that the algorithms create a data structure representing the factor graph which evolves with time : marginal values change, variables disappear, messages are sent/received, etc. Commonly, the logical representation of a factor graph is a set of nodes connected depending on the connectivity of the graph. Each such node has a state which stores some useful values. Definition 3. The current state F Gt at time t of a factor graph F G = hX , C, Ei is the composition of all the current states of the data structures used by the BP-based algorithm to operate on the related factor graph, including the marginal values zi , the messages mi→j , the set of decimated variables U, and other algorithm-specific data. We can consider that for a given problem, many factor graph states may exist. We denote S the set of possible factor graph states, and S(F G) ⊂ S the set of possible states for the factor graph F G. 3 DeciMaxSum: Extending Max-Sum with Decimation While mainly designed as a centralized algorithm and studied on k-SAT problems, BP-guided decimation could be utilized for solving DCOP with a few modifications. To the best of our knowledge, this approach has never been proposed for improving Max-Sum algorithm. Here we expound the core contribution of this paper, namely the DeciMaxSum framework and its components. 3.1 Principles The main idea is to extend the BP-guided decimation algorithm from [11] in order to define a more general framework, in which other BP-based existing algorithms could fit. First, the main focus is decimation, which means assigning a value to a variable as to remove it from the problem. As the name suggests, there is no way back when a variable has been decimated –unlike search algorithms, where variable assignments can be revised following a backtrack, for instance. Therefore, triggering decimation is an impacting decision. This is why our framework 5 http://www.cs.huji.ac.il/project/UAI10/ 6 Cerquides et al. is mainly based on answering three questions: (i) when is decimation triggered, (ii) which variable(s) to decimate, (iii) which value to assign to the decimated variable(s)? Several criteria can be defined for answering each question, and the DeciMaxSum specifies such criteria as decimation policies, that are fundamental parameters of the decimation procedure. Definition 4 (Decimation Policy). A decimation policy is a tuple π = hΘ, Φ, Υ, Λi where: – Θ : S → {0, 1} is the condition to trigger the decimation process, namely the trigger policy, – Φ : S → 2X is a filter policy which selects some candidate variables to decimate, – Υ : X × S → {0, 1} is the condition to perform decimation on a variable, namely perform policy, – Λ : X × S → DX is the assignment policy, which assigns a value to a given variable. A rich population of decimation-based algorithm can be modeled through this framework by combining decimation policies. For instance, one can consider a DeciMaxSum instance, which (i) triggers decimation once BP has converged, (ii) chooses randomly a variable to decimated within the whole set of non-decimated variables, and (iii) samples the value of the decimated variable depending on its marginal values (used as probability distribution). By doing so, we result in the classical BP-guided decimation algorithm from [11] . However, as many more decimation policies can be defined and combined, we fall into a more general framework generating a whole family of algorithms. 3.2 DeciMaxSum as an Algorithm We can summarize the DeciMaxSum framework using Algorithm 2. It is a reformulation of BPguided decimation, parameterized with a decimation policy. Here decimation is not necessarily triggered at the convergence (or time limit) of BP. Criterion Θ may relies on other components of the state of the factor graph. Contrary to classical BP-guided decimation, there may be several variables to decimate at the same time (like in some variants of DSA or MGM) and that variables can be chosen in an informed manner (and not randomly), using criterion Υ . Values assigned to decimated variables, are not necessarily chosen stochastically, but are assigned using the function Λ that can be deterministic (still depending on the current state of the FG). Since, here we’re not in the k-satisfiability case, but in an optimization case, there is no failure (only suboptimality), contrary to Algorithm 1. Finally, once all variables have been decimated, the output consists in decoding the state F Gt , i.e. getting the values assigned to decimated variables. This means that finally DeciMaxSum is performing decoding while solving the problem, which is not a common feature in other DCOP algorithms, like classical Max-Sum or DSA. Indeed, once these algorithms halt, a decoding phase must be performed to extract the solution from the variables’ states. While presented as a classical algorithm, let us note that decimation is meant to be implemented in a distributed and concurrent manner, depending on the decimation policy components. The rest of the section details and illustrates each of these decimation policies component with some examples. 3.3 Triggering Decimation (Θ criterion) In the original approach proposed by [11], decimation is triggered once BP has converged. In a distributed settings and diffusing algorithms like BP, this can be implemented using termination detection techniques.  1, if s is quiescent def (2) Θconverge (s) = 0, otherwise DeciMaxSum: Decimation in MaxSum 7 Algorithm 2: The DeciMaxSum framework as an algorithm Data: A factor graph F G = hX , C, Ei, a decimation policy π = hΘ, Φ, Υ, Λi Result: A feasible assignment X ∗ 1 2 3 4 5 6 7 8 9 10 initialize BP messages U ←∅ while U 6= X do run BP until decimation triggers, i.e. Θ(F Gt ) = 1 choose variables to decimate, X 0 = {xi ∈ Φ(F Gt ) | Υ (xi , F Gt )} for xi ∈ X 0 do xi ← Λ(xi , F Gt ) U ← U ∪ {xi } simplify F Gt // Sect. 3.3 // Sect. 3.4 // Sect. 3.5 // remove variables, slice factors return X ∗ by decoding U This trigger consists in detecting the quiescence of the current state of the factor graph. This means no process is enabled to perform any locally controlled action and there are no messages in the channels [6]. Algorithms like DijkstraScholten can detects such global state by implementing a send/receive network algorithm, based on the same graph than F G [6]. Note that such techniques generates extra communication load for termination detection-dedicated messages. Due to the Max-Sum behavior on loopy factor graphs, convergence may not be reached [20]. The common workaround is to run BP for a fixed number of iterations in case there is no convergence. Setting this time limit (namely LIMIT) might be really problem-dependent.  1, if time(s) = LIMIT def (3) Θtime (s) = 0, otherwise In synchronous settings (all variables and factors are executed synchronously, step by step), getting the iteration number of the current state of the FG, time(s), can done in a distributed manner, as usually done in Max-Sum. In the asynchronous case, one can either (i) use a shared clock, or (ii) count locally outcoming messages within each variables, and once a variable has sent a limit number of messages, decimation is triggered. In some settings with strong time or computation constraints (e.g. sensor networks [3], internet-of-things [17]), waiting convergence is not affordable. Indeed, BP may generate a lot of messages. Therefore, we may consider decimating before convergence at a fixed rate (e.g. each 10 iterations), or by sharing a fixed iteration budget amongst the variables (e.g. each 1000 iterations divided by the number of variables). We can even consider a varying decimation speed (e.g. faster at the beginning, and lower at the end, as observed in neural circuits in the brain [14]).  1, if time(s) mod f (s) = 0 def (4) Θfrequency (s) = 0, otherwise where f is a function of the current state of the system, for instance : – f (s) = RATE, with a predefined decimation frequency, – f (s) = BUDGET/|X |, with a predefined computation budget, – f (s) = 2 × time(s), for an decreasing decimation frequency. Finally, another approach could be to trigger decimation once a loop in the FG is detected. Indeed, decimation is used here to cope with loops, so decimating variables, which could potentially break loops, seems a good approach. 8 Cerquides et al. def Θloop (s) =  1, if ∃xi ∈ X , |loop(xi )| > 1 0, otherwise (5) where loop(xi ) is the set of agents in the same first loop that xi just discovered. Detecting loops in the FG can be implemented during BP, by adding some metadata on the BP messages, like done in the DFS-tree construction phase of algorithms like DPOP or ADOPT. 3.4 Deciding the Subset of Variables to Decimate (Φ and Υ criteria) Now our system has detected decimation should be triggered, the following question is “which variables to decimate?” In [11], the variable is chosen randomly in a uniform manner, while in [12], the variable with a the maximum entropy over its marginal values (the most determined variable) is selected. Obviously, exploiting the marginal values, build throughout propagation is a good idea. From which subset choosing the candidate variables to decimate? Both [11] and [12] select the only variable to decimate amongst the whole set of non-decimated variables (cf. line 5 in Algorithm 1). Here, Φ criterion is specified as follows: def Φall (s) = X \ U (6) However, this selection on the whole set of variables can be discussed when using local decimation triggers, like loop detection. In such case, selecting the variables to decimate within the agents in the loop, or the one which detected the loop sounds better. Another approach is to consider selecting agents depending on the past state of the system. For instance, if a variable has been decimated, good future candidates for decimation could be its direct neighbors in the FG: def (7) Φneighbors (s) ={x ∈ X \ U | neighbors(x) ∩ U 6= ∅} with neighbors(xi ) = {xj ∈ X | j 6= i, ∃eik , ekj ∈ E}. Which criteria to decide whether the variable decimate? Now, we have to specify the Υ criterion used to decide which candidates decimate. In [11], it is fully random: it does not depends on the current state of the variables. It corresponds to make each variable roll a dice and choosing the greatest draw:  1, if ∀xj 6= xi ∈ X , rand(xi ) > rand(xj ) def (8) Υmax_rand (xi , s) = 0, otherwise where rand(x) stands for the output of a random number generator (namely sample) using a uniform distribution (e.g. U [0, 1]). In [12], the variable with the maximal entropy over its marginal values is selected. This means the variable for which marginal values seems to be the most informed, in the Shannon’s Information Theory sense, is chosen:  1, if ∀xj 6= xi ∈ X , H(zi (xi )) > H(zj (xj )) def Υmax_entropy (xi , s) = (9) 0, otherwise P with H(zk (xk )) = − d∈Dk zk (xk )(d) log(zk (xk )(d)). From this, other criteria can be derived. For instance, instead of using entropy, one can consider the maximal normalized marginal value: DeciMaxSum: Decimation in MaxSum def Υmax_marginal (xi , s) = ( 1, if ∀xj 6= xi ∈ X , max(zi (xi )(d)) > max(zj (xj )(d)) d∈Di 0, otherwise d∈Di 9 (10) If several variables can be decimated at the same time, one may consider selecting the set of variable having an entropy or a normalized marginal value greater than a given threshold, to only decimate variable which are “sufficiently” determined. Hence, this approach requires setting another parameter (namely THRESHOLD):  1, if H(zi (xi )) > THRESHOLD def (11) Υthreshold_entropy (xi , s) = 0, otherwise Of course, many combination of the aforementioned criteria, and other criteria could be considered in our framework. We don’t discuss here criteria like in DSA which does not rely on marginal values, but on stochastic decision. Which subset of variables the decision to decimate a variable depends on? Behind this question lies the question of coordinating the variable selection. Indeed, if computing criterion Υ does not depend on the decision of other variables, the procedure is fully distributable at low communication cost, as for policies like (11). At the contrary, if the decision requires to be aware of the state of other variables, as for policies like (8), (9) and (10), the procedure will require some system-scale coordination messages. In [11] and [12], decimation only concerns all the variables, from which only one will be chosen. This requires a global coordination, or a distributed leader election protocol which may require an underlying network (ring, spanning tree, etc.), like the one used for quiescence detection, to propagate election messages [6]. In some cases, the decimation decision might be at local scale, when variables will make their decision depending on the decision of their direct neighbors, or variables in the same loop. In this case, less coordination messages will be required. For instance, if considering decimating variables in a loop, only variables in the loop will implement a leader election protocol. All policies, from (8) to (10), could be extended in the same manner, by replacing X by loop(xi ), neighours(xi ), or any subset of X . For instance:  1, if ∀xj 6= xi ∈ loop(xi ), rand(xi ) > rand(xj ) def (12) Υmax_rand_loop (xi , s) = 0, otherwise 3.5 Deciding the Values to Assign To Decimated Variables (Λ criterion) Now variables to decimate have been selected, the question is “which values to assign?” Usually, in BP-based algorithms, the simplest way to select values for variables, after propagation, is to assign values with maximal marginal value (or utility). [12] is using such a criterion for inference: def Λmax_marginal (xi , s) = argmax zi (xi )(d) (13) d∈Di While, the policy is deterministic, in [11] the choice of the value is a random choice using the marginal values as a probability distribution: def Λsample_marginal (xi , s) = sample(zi (xi )) (14) Once again, these are only some examples of policies exploiting BP, and one can easily specify many more. 10 Cerquides et al. 4 Experiments In this section we evaluate the performance of different combinations of decimation policies in DeciMaxSum, on a classical optimization model (Ising model), against classical Max-Sum [3] and its extension Max-Sum_AD_VP [20], we have implemented in our own framework. 4.1 Ising Model Since we are interested in evaluating our algorithms in the presence of strong dependencies among the values of variables, we evaluate them on Ising model which is a widely used benchmark in statistical physics [4]. We use here the same settings than [18]. Here, constraint graphs are rectangular grids where each binary variable xi is connected to its four closer neighbors (with toroidal links which connect opposite sides of the grid), and is constrained by a unary cost ri . The weight of each binary constraint rij is determined by first sampling a value κij from a uniform distribution U [−β, β] and then assigning ( κij if xi = xj rij (xi , xj ) = −κij otherwise The β parameter controls the average strength of interactions. In our experiments we set β to 1.6. The weight for each unary constraint ri is determined by sampling κi from a uniform distribution U [−0.05, 0.05] and then assigning ri (0) = κi and ri (1) = −κi . 4.2 Results and Analysis In this section we analyse results of different DeciMaxSum combinations to solve squared-shape Ising problems with side size varying from 10 to 20 (e.g. 100 to 400 variables). We implemented the following combinations: – 11 DeciMaxSum instances with different decimation policies using the following criteria: • trigger policies (Θ criterion): ∗ Θconverge (from equation 2, noted converge), ∗ rate-based Θfrequency (from equation 4, noted 2-periodic, 3-periodic, 5-periodic, 10periodic, 20-periodic, and 100-periodic), ∗ budget-based Θfrequency (from equation 4, noted periodic), • filter policy (Φ criterion): ∗ the one that selects the whole set of variables as potential variables to decimate (i.e. Φall from equation 6), • perform policies (Υ criterion): ∗ Υmax_rand (from equation 8, noted random), ∗ Υmax_entropy (from equation 9, noted max_entropy), • assignment policies (Λ criterion): ∗ deterministic Λmax_marginal (from equation 13, noted deterministic), ∗ sampled Λsample_marginal (from equation 14, noted sampling), – MaxSum, as defined in [3], – MaxSum_AD, as defined in [20], – MaxSum_AD_VP, as defined in [20], – Montanari-Decimation, as defined in [11], – Mooij-Decimation, as defined in [12]. DeciMaxSum: Decimation in MaxSum (a) Final total cost 11 (b) Final number of messages Fig. 1: Performances of DeciMaxSum and other solution methods on Ising problems (average of 10 problems per generator’s parameter set, and average of 3 runs per problem). Figure 1 presents two performance metrics (final total cost and total number of exchanged messages). Considering optimality of the final solutions obtained by the different solution methods and DeciMaxSum instances, what appears is that very fast decimation combined with a deterministic decimation of the most determined variable (max_entropy) presents the best cost. Besides, very fast decimation also imply that few messages are exchanged compared to other solution methods, since decimation cuts message propagations. However, all the solution methods (except Montanari-Decimation and Mooij-Decimation) tend to a comparable number of exchanged messages. 5 Conclusions In this paper we have investigated how to extend Max-Sum method for solving distributed constraint optimization problems, by taking inspiration from the decimation mechanisms used to solve k-satisfiability problems by belief-propagation. We propose a parametric method, namely DeciMaxSum, which can be set up with different decimation policies stating when to trigger decimation, which variables to decimate, and which value to assign to decimated variables. In this paper, we propose a library of such policies that can be combined to produce different versions of DeciMaxSum. Our empirical results on different benchmarks show that some combinations of decimation policies outperform classical Max-Sum and its extension Max-Sum_AD_VP, specifically design to handle loops. DeciMaxSum outputs better quality solutions in a reasonable number of message propagation. There are several paths to future research. First, we only explore a limited set of decimation policies. We wish to investigate more complex ones, especially policies trigger when loops are detected by agents. In fact, since our overarching goal is to cope with loops, detecting them at the agent level seems a reasonable approach to initiate decimation in a cyclic network. This approach will require agents to implement cycle-detection protocol, by sending message history, while propagating marginals. In such a setting, several decimation election may arise concurrently in the graph. Second, we would like to generalize DeciMaxSum framework to consider MaxSum_AD_VP as a particular case of decimation: iterated decimation. Finally, we plan to applied 12 Cerquides et al. DeciMaxSum on real world applications, with strong loopy nature, like the coordination of smart objects in IoT [17] or decentralized energy markets in the smart grid [2]. References 1. Cerquides, J., Farinelli, A., Meseguer, P., Ramchurn, S.D.: A tutorial on optimization for multi-agent systems. The Computer Journal 57(6), 799–824 (2014), http://dx.doi.org/10.1093/comjnl/bxt146 2. Cerquides, J., Picard, G., Rodríguez-Aguilar, J.: Designing a marketplace for the trading and distribution of energy in the smart grid. In: 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS). pp. 1285–1293. International Foundation for Autonomous Agents and Multiagent Systems (2015), http://www.aamas-conference. org/Proceedings/aamas2015/forms/contents.htm#I4 3. Farinelli, A., Rogers, A., Petcu, A., Jennings, N.R.: Decentralised coordination of low-power embedded devices using the max-sum algorithm. In: International Conference on Autonomous Agents and Multiagent Systems (AAMAS’08). pp. 639–646 (2008), http://dl.acm.org/citation.cfm?id=1402298.1402313 4. Kolmogorov, V.: Convergent tree-reweighted message passing for energy minimization. IEEE Transactions on Pattern Analysis and Machine Intelligence 28(10), 1568–1583 (Oct 2006) 5. Krzakala, F., Montanari, A., Ricci-Tersenghi, F., Semerjian, G., Zdeborova, L.: Gibbs states and the set of solutions of random constraint satisfaction problems. Proceedings of the National Academy of Science 104, 10318–10323 (Jun 2007) 6. Lynch, N.: Disributed Algorithms. Morgan Kaufmann (1996) 7. Mackay, D.J.C.: Information Theory, Inference and Learning Algorithms. Cambridge University Press, first edition edn. (Jun 2003) 8. Maheswaran, R., Pearce, J., Tambe, M.: Distributed algorithms for dcop: A graphical-game-based approach. In: Proceedings of the 17th International Conference on Parallel and Distributed Computing Systems (PDCS), San Francisco, CA. pp. 432– 439 (2004) 9. Modi, P.J., Shen, W., Tambe, M., Yokoo, M.: ADOPT: Asynchronous Distributed Constraint Optimization with Quality Guarantees. Artificial Intelligence 161(2), 149–180 (2005) 10. Modi, P., Shen, W., Tambe, M., Yokoo, M.: ADOPT: Asynchronous distributed constraint optimization with quality guarantees. Artificial Intelligence Journal (2005) 11. Montanari, A., Ricci-Tersenghi, F., Semerjian, G.: Solving constraint satisfaction problems through belief propagationguided decimation. CoRR abs/0709.1667 (2007), http://arxiv.org/abs/0709.1667 12. Mooij, J.M.: libDAI: A free and open source C++ library for discrete approximate inference in graphical models. Journal of Machine Learning Research 11, 2169–2173 (Aug 2010), http://www.jmlr.org/papers/volume11/mooij10a/ mooij10a.pdf 13. Mézard, M., Montanari, A.: Information, Physics, and Computation. Oxford University Press (2009) 14. Navlakha, S., Barth, A.L., Bar-Joseph, Z.: Decreasing-rate pruning optimizes the construction of efficient and robust distributed networks. PLOS Computational Biology 11(7), 1–23 (07 2015), http://dx.doi.org/10.1371%2Fjournal. pcbi.1004347 15. Petcu, A., Faltings, B.: A scalable method for multiagent constraint optimization. In: International Joint Conference on Artificial Intelligence (IJCAI’05). pp. 266–271 (2005) 16. Rogers, A., Farinelli, A., Stranders, R., Jennings, N.: Bounded approximate decentralised coordination via the max-sum algorithm. Artificial Intelligence 175(2), 730 – 759 (2011), http://www.sciencedirect.com/science/article/ pii/S0004370210001803 17. Rust, P., Picard, G., Ramparany, F.: Using message-passing DCOP algorithms to solve energy-efficient smart environment configuration problems. In: International Joint Conference on Artificial Intelligence (IJCAI). AAAI Press (2016) 18. Vinyals, M., Pujol, M., Rodríguez-Aguilar, J., Cerquides, J.: Divide and coordinate: solving dcops by agreement. In: International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS’10). pp. 149–156. IFAAMAS, Canada (2010) 19. Vinyals, M., Rodriguez-Aguilar, J., Cerquides, J.: Constructing a unifying theory of dynamic programming dcop algorithms via the generalized distributive law. Autonomous Agents and Multi-Agent Systems 22(3), 439–464 (2010), http://dx. doi.org/10.1007/s10458-010-9132-7 20. Zivan, R., Peled, H.: Max/min-sum distributed constraint optimization through value propagation on an alternating DAG. In: van der Hoek, W., Padgham, L., Conitzer, V., Winikoff, M. (eds.) International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2012, Valencia, Spain, June 4-8, 2012 (3 Volumes). pp. 265–272. IFAAMAS (2012), http://dl.acm.org/citation.cfm?id=2343614
2cs.AI
arXiv:1410.5170v3 [math.ST] 1 Jul 2016 Robust and Efficient Parameter Estimation based on Censored Data with Stochastic Covariates Abhik Ghosh and Ayanendranath Basu Indian Statistical Institute [email protected], [email protected] Abstract Analysis of random censored life-time data along with some related stochastic covariables is of great importance in many applied sciences like medical research, population studies and planning etc. The parametric estimation technique commonly used under this set-up is based on the efficient but non-robust likelihood approach. In this paper, we propose a robust parametric estimator for the censored data with stochastic covariates based on the minimum density power divergence approach. The resulting estimator also has competitive efficiency with respect to the maximum likelihood estimator under pure data. The strong robustness property of the proposed estimator with respect to the presence of outliers is examined and illustrated through an appropriate simulation study in the context of censored regression with stochastic covariates. Further, the theoretical asymptotic properties of the proposed estimator are also derived in terms of a general class of M-estimators based on the estimating equation. Keywords: Censored Data; Robust Methods; Linear Regression; Density power divergence; M-Estimator; Exponential Regression Model, Accelerated Failure Time Model. 1 Introduction It is often necessary to analyze life-time data in many applied sciences including medical sciences, population studies, planning etc. For these survival analyses problems, researchers often cannot observe the full data because some of the respondents may leave the study in between or some may be still alive at the end of the study period. Statistical modelling of such data involves the idea of censored distributions and random censoring variables. Mathematically, let Y1 , . . . , Yn be n independent and identically distributed (i.i.d.) observations from the population with unknown life-time distribution GY . We assume that the observations are censored by a censoring distribution GC independent of GY and C1 , . . . , Cn denote n i.i.d. sample observations from GC . We only observe the portion of Yi s (right) censored by Ci s, i.e., we observe Zi = min (Yi , Ci ) and δi = I(Yi ≤ Ci ), i = 1, . . . , n, where I(A) denote the indicator function of the event A. Based on these data (Zi , δi ), our aim is to do inference about the lifetime distribution GY . Suppose Z(i,n) denotes the i-th order statistic in {Z1 , · · · , Zn } and δ[i,n] is the value of corresponding δ (i-th concomitant). The famous product-limit (non-parametric) estimator of GY under this set-up had been derived by Kaplan 1 and Meier (1958), which is given by d G Y (y) = 1 − n  Y i=1 δ[i,n] 1− n−i+1 I(Z(i,n) ≤y) . It can be seen that, under suitable assumptions, the above product-limit estimator is in fact the maximum likelihood estimator of the distribution function in presence of censoring and enjoys several optimum properties. Many researchers have proved such properties and also extended it for different complicated inference problems with censored data; for example, see Petersen (1977), Chen et al. (1982), Campbell and Földes (1982), Wang et al. (1986), Tsi et al. (1987), Dabrowska (1988), Lo et al. (1989), Zhou (1991), Cai (1998), Satten and Datta (2001) among many others. In this present paper we further assume the availability of a set of uncensored covariables X ∈ Rp that are associated with our target response Y ; i.e., for each respondent i we have observed the values Xi along with (Zi , δi ). These covariables are generally the demographic conditions of the subject or some measurable indicator of the response variable (e.g., medical diagnostic measures like blood pressure, hemoglobin content, etc., for clinical trial responses). Let us assume that the distribution function of these i.i.d. covariates is GX and their joint distribution function with Y is G so that Z Z GY (y) = G(x, y)dx = GY |X=x (y)GX (x)dx, where GY |X=x is the conditional distribution function of Y given X = x. Instead of inferring about the response Y alone, here we are more interested in obtaining the association between response and covariables through the conditional distribution GY |X ; the distribution GX of covariates is often of interest but sometimes it may act as a nuisance component too. Let us denote the i-th concomitant of X associated with Z(i,n) by X[i,n] . Under this set-up, Stute d (1993) has extended the Kaplan-Meier product limit (KMPL) estimator G Y (y) to obtain a nonparametric estimate of the joint multivariate distribution function G given by b y) = G(x, n X i=1 Win I(X[i,n] ≤ x, Z(i,n) ≤ y) where the weights are calculated as Win δ[j,n] i−1  δ[i,n] Y n−j . = n−i+1 n−j +1 j=1 Note that when there is no censoring at all, i.e., δi = 1 for all i, then Win = n1 for each i so b y) coincide with respective empirical distribution functions. Further, above that d GY (y) and G(x, estimator is also self-adjusted in presence of any ties in the data. These give the framework for non-parametric inference based on the censored data with covariates. Stute (1993, 1996) proved b y) and several asymptotic properties like strong consistency, asymptotic distribution of G(x, related statistical functionals. Several non-parametric and semi-parametric inference procedures b y) are widely used in real life applications. using G(x, However, for many applications in medical sciences, one may know the parametric form of the distribution of the survival time (censored responses) possibly through previous experience 2 in similar context (similar drugs or similar diseases may have studied in the past). In such cases, the use of a fully parametric model is much more appropriate over the semi-parametric or non-parametric models. Many advantages of a fully parametric model for the regression with censored responses had been illustrated in Chapter 8 of Hosmer et al. (2008) which include – (a) greater efficiency due to the use of full likelihood, (b) more meaningful estimates of clinical effects with simple interpretations, (c) prediction of the response variable from the fitted model etc. The most common parametric models used for the analysis of survival data are the exponential, Weibull or log-logistic distributions. Many researchers had used such parametric models to analyze survival data more efficiently; see for example, Cox and Oakes (1984), Crowder et al. (1991), Collett (2003), Lawless (2003), Klein and Moeschberger (2003) among others. The robustness issue with the survival data, on the other hand, has got prominent attention very recently. The size and availability of survival data has clearly been growing in recent times in biomedical and other industrial studies which often may contain few erroneous observations or outliers and it is very difficult to sort out those observations in presence of complicated censoring schemes. Some recent attempts have been made to obtain robust parametric estimators based on survival data without any covariates. For example, Wang (1999) has derived the properties of M-estimators for univariate life-time distributions and Basu et al. (2006) have developed a more efficient robust parametric estimator by minimizing the density power divergence measure (Basu et al., 1998). These estimators, along with the automatic control for the effect of outlying observations, provide a compromise between the most efficient classical parametric estimators like maximum likelihood or method of moments and the inefficient non-parametric or semiparametric approaches provided there is no significant loss of efficiency under pure data. The present paper extends this idea to develop such robust estimators for the model parameters under censored response with covariates. It does not follow directly from the existing literature as we need to change the laws of large number and central limit theorem for censored data suitably in the presence of covariates. It is to be noted that, in this paper we consider a fully parametric model for survival data with covariates, which is not the same as the usual semi-parametric or nonparametric regression models like the Cox proportional hazard model (Cox, 1972) or the Buckley-James linear regression (Buckley and James, 1979; Ritov, 1990). The latter methods are generally more robust with respect to model misspecification but less efficient compared to a fully parametric models. Further, many recent attempts have been made to develop inference under such semiparametric models that are robust also with respect to outliers in the data; e.g., Zhou (1992), Bednarski (1993), Kosorok et al. (2004), Bednarski and Borowicz (2006), Salibian-Barrera and Yohai (2008), Farcomeni and Viviani (2011) etc. However, no such work has been done to develop robust inference under fully parametric regression models with survival response. The few works that closely relate to the proposal of our present paper are by Zhou (2010), Locatelli et al. (2011) and Wang et al. (2015), who have proposed some robust solutions for a particular case of accelerated failure time regression model without any parametric assumptions on the stochastic covariates; the first two papers propose the M-estimators and S-estimators respectively for the semi-parametric AFT models with parametric location-scale error and the third one extends the M-estimators further to achieve robustness with respect to leverage points and simultaneous robust estimation of the error variance. In Zhou (2010) there is the possibility of dependence between the error and stochastic explanatory variables, but independence is also allowed in which case it considers the same model set-up as in Locatelli et al. (2011). However, none of these approaches considered fully parametric models with suitable assumptions on the marginal covariate distributions. The present paper fill this gap in the literature of survival anal3 ysis by proposing a simple yet general robust estimation criterion with more efficiency under any general parametric model for both the censored response and the stochastic covariates. Further, the proposal of the present paper is fully general with respect to model assumptions and can be easily extended to the semi-parametric models considered in the existing literature; we will show that the existing versions of the M-estimators of Zhou (2010) and Wang et al. (2015) can be considered as a special case of our proposal under the semi-parametric extension. In that sense, our proposed method in the present paper will give a complete general framework for all possible modeling options of censored data with stochastic covariates along with the possibility of more efficient inference through fully parametric covariate distributions. The rest of the paper is organized as follows. We start with a brief review of background b y) and the minimum density concepts and results about the non-parametric estimator G(x, power divergence estimators in Section 2. Next we consider a general parametric set-up for the censored lifetime data with covariates as described above and propose the modified minimum density power divergence estimator for the present set-up in Section 3; its application in the context of simple linear and exponential regression models with censored response and for the general parametric accelerated failure time model are also described in this section. In Section 4, we derive theoretical asymptotic properties for a general class of estimators containing the proposed minimum density power divergence estimator under the present set-up; this general class of estimators is indeed a suitable extension of the M-estimators. The global nature of our proposal and its generality are discussed in Section 5 along with the illustration of this extension in the semi-parametric set-up. Section 6 contains the robustness properties of the proposed MDPDE and the general M-estimators examined through the influence function analysis for both fully parametric and semi-parametric set-ups. The performance of the proposed minimum density power divergence estimator in terms of both efficiency and robustness is illustrated through some appropriate simulation studies in Section 7. Some remarks on the choice of the tuning parameter in the proposed estimator are presented in Section 8, while the paper ends with a short concluding remark in Section 9. 2 2.1 Preliminary Concepts and Results b y) Asymptotic Properties of G(x, One of the main barriers to derive any asymptotic results based on survival data was the unavailability of limit theorems, like law of iterated logarithm, law of large number, central limit theorem etc., under censorship. This problem has been solved in the recently decades mainly through the works of Stute and Wang; see Stute and Wang (1993), Stute (1995) for such limit theorems for the censored data without covariates and Stute (1993, 1996) for similar results in presence of covariables. In this section, we briefly describe some results from the later works with covariates that will be needed in this paper. Assume the set-up of life-time variable Y censored by an independent censoring variable C as discussed in Section 1. Denote Z = min(Y, C); the distribution function of Z is given by GZ = 1 − (1 − GY )(1 − GC ). In order to have the limiting results for this set-up, we need to make the following basic assumptions: (A1) The life-time variable Y and the censoring variable C are independent and their respective distribution functions GY and GC have no jump in common. 4 (A2) The random variable δ = I(Y ≤ C) and X are conditionally independent given Y, i.e. whenever the actual life-time is known the covariates provide no further information on censoring. More precisely, P (Y ≤ C|X, Y ) = P (Y ≤ C|Y ). Now, consider a real valued measurable function φ from Rp+1 to Rk and define Sn = n X Win φ(X[i,n] , Z(i,n) ) = i=1 Z b φ(x, y)G(dx, dy). (1) This functional Sn forms the basis of several estimators under this set-up. The results presented below describe its strong consistency and distributional convergence; see Stute (1993, 1996) for their proofs and details. Proposition 2.1 [Strong Consistency (Stute, 1993)] Suppose that φ(X, Y ) is integrable and Assumptions (A1) and (A2) hold for the above mentioned set-up. Then we have, with probability one and in the mean, Z Z φ(X, τGZ )dP, (2) φ(X, Y )dP + I(τGZ ∈ A) lim Sn = n→∞ Y =τGZ Y <τGZ where τGZ denote the least upper bound for the support of GZ given by τGz = inf {z : GZ (z) = 1}, and A denotes the set of atoms (jumps) of GZ . The above convergence can be written in a simpler form, by defining  G(x, y) if y < τ GZ e G(x, y) = G(x, τGZ −) + I(τGZ ∈ A)G(x, {τGZ }) if y ≥ τ GZ . Then, the convergence in (2) yields Z Z b e e say. φ(x, y)G(dx, dy) = φ(x, y)G(dx, dy) = S, lim n→∞ Further, note that the independence of Y and C gives τGZ = min(τGY , τGC ), where τGY and τGC are the least upper bound of the supports of GY and GC respectively. So, whenever τGY < τGC or e coincides with G and the estimator Sn becomes τGC = ∞, the modified distribution function G R a strongly consistent estimator of its population counterpart S = φ(x, y)G(dx, dy). Further, it follows that the Glivenko-Cantelli type strong uniform convergence of Ĝ to G holds under assumptions (A1) and (A2); see Corollary 1.5 of Stute (1993). Proposition 2.2 [Central Limit Theorem (Stute, 1996, Theorem 1.2)] Consider the above mentioned set-up with assumption (A2) and suppose that the measurable function φ(X, Y ) satisfies R (A3) [φ(X, Z)γ0 (Z)δ]2 dP < ∞, (A4) R e |φ(X, Z)| C 1/2 (w)G(dx, dw) < ∞, 5 where Z and  G0Z (dz ′ ) γ0 (z) = exp , with 1 − GZ (z ′ ) 0 Z w− GC (dz ′ ) C(w) = . [1 − GC (z ′ )][1 − GZ (z ′ )] 0 Then we have, as n → ∞, where z− √ G0Z (z) = P (Z ≤ z, δ = 0), D e → n(Sn − S) N (0, Σφ ), Σφ = Cov [φ(X, Z)γ0 (Z)δ + γ1 (Z)(1 − δ) − γ2 (Z)] , (3) (4) where γ1 and γ2 are vectors of the same length as φ and are defined as Z 1 e11 (dx, dw), I(z < w)φ(x, w)γ0 (w)G γ1 (z) = 1 − GZ (z) ZZ I(v < z, v < w)φ(x, w)γ0 (w) 0 e11 (dx, dw), and γ2 (z) = GZ (dv)G [1 − GZ (v)]2 e11 (x, z) = P (X ≤ x, Z ≤ z, δ = 1). with G Note that a consistent estimator of the above asymptotic variance can be obtained by using the corresponding sample covariance and by replacing the distribution functions in the definitions of γ0 , γ1 and γ2 by their respective empirical estimators. In this context, we should note that Assumption (A2) is strictly stronger than the usual assumptions in regression analysis for censored life-time data (Begun et al., 1983). This can b as a particular case of the inverse of the probability of be seen by writing Stute’s estimate G censoring weighted (IPCW) statistic, where the censoring weights are estimated by the marginal Kaplan-Meier estimator for the censoring time. This may lead to some biased inference when the censoring distribution depends on the covariates, but in such cases we cannot have robust results unless moving to the semi-parametric models like Cox regression. Further, Robins and Rotnitzky (1992) also assumed this stronger condition (A2) to develop a more efficient IPCW statistic under the semi-parametric set-up (see also Van der Laan and Robins, 2003). Zhou (2010) and Wang et al. (2015) have also considered the same assumption (A2) for robust estimation under semiparametric accelerated failure time models. So, while considering the fully parametric set-up throughout this paper, we continue with the assumption (A2) for deriving any asymptotic result; clearly it does not restrict the practical use of the proposed method in finite samples. 2.2 The Density Power Divergence and Corresponding Estimators The density power divergence based statistical inference has become quite popular in recent days due to its strong robustness properties and high asymptotic efficiency without using any non-parametric smoothing. The density power divergence measure between any two densities g and f (with respect to some common dominating measure) is defined in terms of a tuning parameter α ≥ 0 as (Basu et al., 1998),     Z  1 1+α 1 α 1+α   f g+ g , for α > 0, f − 1+ α α Z (5) dα (g, f ) =   g log(g/f ), for α = 0. 6 When we have n i.i.d. samples Y1 , . . . , Yn from a population with true density function g, modeled by the parametric family of densities F = {fθ : θ ∈ Θ ⊂ Rp }, the minimum density power divergence estimator (MDPDE) of the parameter θ is to be obtained by minimizing the density power divergence between the data and the model family; or equivalently by minimizing Z fθ1+α (y)dy 1+α − α Z fθα(y)dGn (y) = Z n fθ1+α (y)dy − 1+α1 X α fθ (Yi ), α n (6) i=1 with respect to θ; here Gn is the empirical distribution function based on the sample. See Basu et al. (1998, 2011) for more details and other properties of the MDPDEs. It is worthwhile to note that the MDPDE corresponding to α = 0 coincides with the maximum likelihood estimator (MLE); the MDPDEs become more robust but less efficient as α increases, although the extent of loss is not significant in most cases with small positive α. Thus the parameter α gives a trade-off between robustness and efficiency. Hong and Kim (2001) and Warwick and Jones (2005) have presented some data-driven choices for the selection of optimal tuning parameter α. The MDPDE has been applied to several statistical problems and has been extended suitably for different types of data. For example, Kim and Lee (2001) have extended it to the case of robust estimation of extreme value index, Lee and Song (2006, 2013) have provided extensions in the context of GARCH model and diffusion processes respectively and Ghosh and Basu (2013, 2014) have generalized it to the case of non-identically distributed data with applications to the linear regression and the generalized linear model. In the context of survival analysis, Basu et al. (2006) have extended the concept of MDPDE for censored data without any covariates to obtain a robust and efficient estimator. Based on n i.i.d. right censored observations Y1 , . . . , Yn as above, Basu et al. (2006) have proposed to use the Kaplan-Meier product limit estimator d GY in place of the empirical distribution function Gn in (6) and derived the properties of the corresponding MDPDEs. In the next section, we will further generalize this idea to obtain robust estimators for a joint parametric model based on censored data with covariates. 3 3.1 The Minimum Density Power Divergence Estimation (MDPDE) under Random Censoring with Covariates General Parametric Models and Estimating Equations Let us consider the set-up of Section 1. We are interested in making some inference about the distribution of the lifetime variable Y and its relation with the covariates (through the distribution GY |X ) based on the survival data with covariates (Zi , δi , Xi ). Sometimes one may also be interested in the distribution GX of the covariates. As noted earlier, this paper focuses on the parametric approach of inference; so we assume two model family of distributions for GY |X and GX given by FX = {Fθ (y|X) : θ ∈ Θ ⊆ Rq } and F′ = {FX,γ (x) : γ ∈ Γ ⊆ Rr } respectively. Then the target parameters of interest are θ and γ which we will estimate jointly based on (Zi , δi , Xi ). The case of known γ can be easily derived from this general case or from the work of Basu et al. (2006). The most common and popular method of estimation is the maximum likelihood estimator (MLE) that is obtained by maximizing the probability of the observed data (Zi , δi , Xi ) with respect to the parameters (θ, γ). However, in spite of several optimal properties, the MLE has well-known drawback of the lack of robustness. As noted in the previous section, the minimum density power divergence estimator can be used as a robust alternative to the MLE 7 with no significant loss in efficiency under pure data for several common problems. Deriving the motivation from these, specially from the work of Basu et al. (2006), here we consider the minimum density power divergence estimator (MDPDE) of (θ, γ) obtained by minimizing the objective function (6) for the joint density of the variables (Y, X) and a suitable estimator of this joint distribution. Let us denote the density of Fθ (y|X) by fθ (y|X) and so on. Then the joint model density of (X, Y ) is fθ (y|x)fX,θ (x). As an estimator of their true joint distribution b y), because of its optimality properties as described in Section 2.1. G we use the KMPL G(x, Thus, for any α > 0, the objective function to be minimized with respect to (θ, γ) is given by ZZ ZZ 1+α 1+α 1+α b y) Hn,α (θ, γ) = fθ (y|x) fX,γ (x) dxdy − fθ (y|x)α fX,γ (x)α dG(x, α ZZ n 1+α X Win fθ (Z(i,n) |X[i,n] )α fX,γ (X[i,n] )α . (7) = fθ (y|x)1+α fX,γ (x)1+α dxdy − α i=1 For  the case α =0, the MDPDE of (θ, γ) is to be obtained by minimizing the objective function lim Hn,α(θ, γ) , or equivalently α↓0 Hn,0 (θ, γ) = − n X i=1   Win log fθ (Z(i,n) |X[i,n] )fX,γ (X[i,n] ) . (8) The estimator obtained by minimizing (8) is nothing but the maximum likelihood estimator of (θ, γ) under the present set-up. Therefore, the proposed MDPDE is indeed a generalization of the MLE. The estimating equations of the MDPDE of (θ, γ) are then given by ∂Hn,α (θ, γ) = 0, ∂θ ∂Hn,α (θ, γ) = 0. ∂γ α ≥ 0. For α > 0, routine differentiation simplifies the estimating equations to yield ζθ − n X i=1 Win uθ (Z(i,n) , X[i,n] )fθ (Z(i,n) |X[i,n] )α fX,γ (X[i,n] )α = 0, ζγ − where n X i=1 Win uγ (X[i,n] )fθ (Z(i,n) |X[i,n] )α fX,γ (X[i,n] )α = 0, ζθ = ζγ = ZZ (9) (10) uθ (y, x)fθ (y|x)1+α fX,γ (x)1+α dxdy, ZZ uγ (x)fθ (y|x)1+α fX,γ (x)1+α dxdy, n X Win uθ (Z(i,n) , X[i,n] ) = 0, ∂ ln f (x) γ θ (y|x) with uθ (y, x) = ∂ ln f∂θ and uγ (x) = being the score functions corresponding to θ and ∂γ γ respectively. For α = 0, the corresponding estimating equation obtained by differentiating Hn,0 has the simpler form given by i=1 n X Win uγ (X[i,n] ) = 0, i=1 8 which can also be obtained from Equations (9) and (10) by substituting α = 0; note that, at α = 0, ζθ = 0 and ζγ = 0. Therefore, Equations (9) and (10) represent the estimating equations for all MDPDEs with α ≥ 0. Definition 3.1 Consider the above mentioned set-up. The minimum density power divergence estimator of (θ, γ) based on the observed data (Zi , δi , Xi ), i = 1, . . . , n is defined by the simultaneous root of the equations (9) and (10). If there are multiple roots of these equations, the MDPDE will be given by the root which minimizes the objective function (7) for α > 0, or (8) for α = 0. Clearly, the MDPDE is Fisher consistent by its definition and the estimating equations (9) and (10) are unbiased at the model. Further, there will not be any problem of root selection in case of multiple roots, which is a general issue in the inferences based on estimating equation. This is because we have a proper objective function in the case of MDPDE. Note that the MDPDE estimating equations (9) and (10) can also be written as ZZ b y) = ψ(y, x; θ, γ)dG(x, n X Win ψ(Z(i,n) , X[i,n] ; θ, γ) = 0, (11) i=1 where ψ(y, x; θ, γ) = (ψ1,α (y, x; θ, γ), ψ2,α (y, x; θ, γ))T with ψ1,α (Y, X; θ, γ) = ζθ − uθ (Y, X)fθ (Y |X)α fX,γ (X)α , ψ2,α (Y, X; θ, γ) = ζγ − uγ (X)fθ (Y |X)α fX,γ (X)α .  (12) This particular estimating equation (11) is similar to that of the M-estimator for i.i.d. nonb is the empirical distribution censored data with covariates (in fact they become the same if G function). So, extending the concept of Wang (1999), we can define the general M-estimator of θ and γ based on any general function ψ(y, x; θ, γ) : R × Rp × Rq × Rr 7→ Rq × Rr (13) as the solution of the estimating equation (11). However, to make it an unbiased estimating equation, we consider only the ψ-functions for which ZZ ψ(y, x; θ, γ)dG(x, y) = 0. (14) Definition 3.2 Consider the above mentioned parametric set-up for censored data with stochastic covariates. Also, consider a general ψ-function as in (13) satisfying the condition (14). An M-estimator of (θ, γ) corresponding to this general ψ-function based on the observed data (Zi , δi , Xi ), i = 1, . . . , n, is defined as the root of the estimating equation (11). Note that any general M-estimator is also Fisher consistent and is based on an unbiased estimating equation, by definition. But, in general, they may suffer from the problem of multiple roots and need a proper numerical techniques (like bootstrapping) to get a well-defined Mestimator. So, in this paper, we restrict our attention mainly to examine the performances of the robust MDPDE corresponding to the particular ψ-function defined in (12). However, we derive theoretical asymptotic properties of the general M-estimators in Section 4 and deduce the properties of MDPDEs from those general results in Section 4.2. 9 3.2 Application (I): Fully Parametric version of Linear Regression model We first consider the simplest problem of linear regression with censored responses and stochastic covariables. Precisely, we assume the linear regression model (LRM) Yi = XiT θ + ǫi , i = 1, . . . , n, (15) where Yi is the censored response (generally the lifetime), Xi is a p-variate stochastic auxiliary variable associated with the response, θ is the vector of unknown regression coefficients and ǫi is the error in specified linear model. We assume that the error ǫi s are independent and identically distributed with distribution function Fe and Xi s are independent of the errors having distribution function FX,γ . Generally we can assume both symmetric error distributions like the normal as well as asymmetric error distributions like the exponential; however the second group is used in most reliability applications. Then, the conditional distribution of the response variable Yi given Xi is Fθ (y|Xi ) = Fe (y − XiT θ). Now, we consider the incomplete censored observations (Zi , δi ) as defined in Section 1 and use them to estimate (θ, γ) robustly and efficiently. This inference problem clearly belongs to the general set-up considered in the previous subsection and frequently arises in reliability studies and other applied researches. We can obtain a robust solution to this problem through the proposed MDPDEs, obtained by just solving the estimating equations (9) and (10). Here we present the detail working for one particular example of model families FX and F′ . The case of other model families can also be tackled similarly. Suppose the response variable is exponentially distributed with mean depending on the co variates as E[Y |X] = X T θ; then FX = Exp(X T θ) : θ ∈ Rp where Exp(τ ) represents the exponential distribution with mean τ . Also, for simplicity, let us assume that the auxiliary variables are independent to each other and normally distributed so that F′ = {Np (γ, Ip ) : γ ∈ Rp }. In this case, the objective function Hn,α (θ, γ) of the MDPDE has a simpler form given by n e−αψi (θ,γ) 1+α X (1 + α)−3/2 (0) W ψ (θ, γ) − in T θ)α (2π)α/2 (2π)α/2 α i=1 (X[i,n]   n X 1 T Win ψi (θ, γ) + log(X[i,n] θ) + log(2π) , Hn,0 (θ, γ) = 2 Hn,α (θ, γ) = and α > 0, (16) (17) i=1 R 1 where ψ (0) (θ, γ) = (xT θ)−α Np (x, γ, 1+α Ip )dx and ψi (θ, γ) = Z(i,n) T X[i,n] θ + 21 (X[i,n] − γ)T (X[i,n] − γ). Note that the integral ψ (0) (θ, γ) is just the expectation of a simple function of multivariate normal random variable; so it can be computed quite easily using standard numerical integration techniques. Therefore, we can simply minimize the above objective functions by any numerical algorithm to obtain the MDPDE at any α ≥ 0. Alternatively, we can obtain the MDPDE by solving the estimating equations (9) and (10), which can also be simplified in this particular situation as ! n X Z 1 α (i,n) Win e−αψi (θ,γ) ψ̄ (0) (θ, γ) = − X[i,n] , T θ)(1+α) T θ)2 (1 + α)5/2 (X[i,n] (X[i,n] i=1 n h i X (X[i,n] − γ) α (0) (0) Win e−αψi (θ,γ) , ψ̄ (θ, γ) − γψ (θ, γ) = T θ)α 5/2 (1 + α) (X[i,n] i=1 R 1 where ψ̄ (0) (θ, γ) = (xT θ)−α xNp (x, γ, 1+α Ip )dx. The case of α = 0 (MLE) can be simplified further where the estimator of γ becomes independent of the parameter θ. To see this, we 10 simplify the above estimating equations at α = 0 as   T θ n Z(i,n) − X[i,n] X Win X[i,n] = 0, T θ)2 (X [i,n] i=1 n X i=1  Win X[i,n] − γ = 0. Pn W X i=1 Pn in [i,n] , i=1 Win Solving the second equation, we get that γ b= which clearly does not depend on θ, as is expected from the theory of maximum likelihood inference. The semi-parametric version of this model has been considered in Zhou (2010), where no assumption has been made about the distribution of the i.i.d. sequences {Xi } and {ǫi }. In that paper, an M-estimator of θ has been proposed by solving the estimating equation n X i=1   T θ = 0, Win ψ0 Z(i,n) − X[i,n] (18) for suitable choices of ψ0 . Although this M-estimator is different from the proposed MDPDE, it in fact belongs to our general class of M-estimators (Definition 3.2) as we will show in detail in section 5. Further, we will show in Section 6 that our MDPDE with α > 0 under fully parametric set-up is robust with respect to both the outliers in response and the leverage points in the explanatory variables; but the M-estimator of Zhou (2010) is not robust with respect to the leverage points. 3.3 Application (II): Fully Parametric Exponential Regression model for Medical Sciences The simple linear regression model considered in the previous subsection is the most popular inference problem under the set-up considered in this paper. However, although it is simple and potentially applicable in several real life problems, for the purpose of serving the typical applications in the medical science this simple linear model is rarely used. The reason is that in almost all medical applications the support of the distribution of the censoring times is shorter than the support of the lifetimes (we cannot follow the patients until they die). For this reason the linear model is usually not identifiable and in order to become applicable the setup of the proposed method needs to introduce a truncation time, say τ , such that the probability to be uncensored by time τ is strictly greater than zero for all x. We can suitably extend the proposed MDPDE to cover these assumptions through some more routine calculations, which we leave for the readers. In this section we present an alternative multiplicative model with exponential error for the applications in medical sciences. This particular model, known as the exponential regression model, is widely used and most popular in the medical sciences and related applications. More precisely, let us assume the multiplicative regression model for the survival times (responses) Yi , i = 1, . . . , n as T Yi = eXi θ × ǫi , i = 1, . . . , n, (19) where Xi is a p-variate stochastic auxiliary variable associated with the response, θ is the vector of unknown regression coefficients and ǫi is the error in the specified linear model. Such a multiplicative model ensures the positivity of the the response variables, which are generally lifetime in most applications. In the exponential regression model, we assume that the error variable ǫ is exponentially distributed with mean 1. Then the conditional distribution of the response 11 T variable Y given the covariate X is also withomean E[Y |X] = eX θ ; so considering n exponential T the notations of Section 1, FX = Exp(eX θ ) : θ ∈ Rp . Also, the Xi s are independent of the errors having distribution function FX,γ . Our objective is to estimate (θ, γ) robustly and efficiently based on the incomplete (censored) observations (Zi , δi , Xi ) as defined in Section 1. Again this inference problem belongs to the general set-up of Section 3.1 so that the proposed MDPDEs provide a robust solution to it. In the case of independent and normally distributed covariates with F′ = {Np (γ, Ip ) : γ ∈ Rp }, we can simplify the objective function Hn,α(θ, γ), to be minimized in order to obtain the MDPDE, as α(γ T θ)+ α2 (θ T θ) n 2(1+α) e (1 + α) X Hn,α (θ, γ) = Win e−αΓi (θ,γ) − 3/2 α/2 (1 + α) (2π) (2π)α/2 α i=1   n X 1 Win Γi (θ, γ) + log(2π) , Hn,0 (θ, γ) = 2 and α > 0, (20) (21) i=1 XT θ T T θ) + 1 (X where Γi (θ, γ) = Z(i,n) e [i,n] + (X[i,n] [i,n] − γ) (X[i,n] − γ). This objective function can 2 be easily minimized using any standard numerical techniques for any α ≥ 0. The estimating equations (9) and (10) can also be simplified for this particular case of ERM with normal covariates. For α > 0, they have the form n X −αΓi (θ,γ) Win e i=1   (X T θ) Z(i,n) e [i,n] + 1 X[i,n] = n X i=1 Win e−αΓi (θ,γ) X[i,n] − γ  =   α2 α αθ (θ T θ) α(γ T θ)+ 2(1+α) γ + , e 5/2 (1 + α) (1 + α) α2 α2 θ α(γ T θ)+ 2(1+α) (θ T θ) e . (1 + α)5/2 At α = 0 (MLE), these estimating equations further simplifies to n X i=1   (X T θ) Win Z(i,n) e [i,n] + 1 X[i,n] = 0, n X i=1  Win X[i,n] − γ = 0, which again produce the same estimator of γ as in the case of the LRM and independent of the parameter θ. 3.4 Application (III): Fully Parametric Version of Accelerated Failure Time (AFT) Models The exponential regression model considered in the previous section can be linearized by taking natural logarithm of the response time: log(Yi ) = XiT θ + ǫ∗i , (22) where ǫ∗i = log(ǫ) follows the standard extreme value distribution. This model can be generalized by considering some alternative distribution for ǫ∗i , but with mean 0. When ǫ∗i follows an extreme value distribution with mean 0 and scale parameter σ, then Yi follows a Weibull distribution and the resulting regression model is known as the Weibull regression model (WRM). Other common distributions for ǫ∗i are logistic (survival time has log-logistic distribution), normal (survival times 12 are log-normal) etc. In such models, the covariate has a multiplicative effect of the response life-time and hence they are generally known as the accelerated failure time (AFT) model. Consider a general location scale model family {fµ,σ (x) = f ((x − µ)/σ)} for some known function f and let ǫ∗i have density f0,σ . Then, given the covariate X, Yi has density   1 log(y) − (X T β) f . y σ This is the general form of the parametric AFT regression model; taking f as standard extreme value distribution it simplifies to the Weibull regression model and so on. Suppose the distribution of the covariates Xi is modeled by the family FX,γ as in the earlier cases so that our target becomes the estimation of θ = (β, σ) and γ = µ based on the censored observations (Zi , δi , Xi ) as defined in Section 1. Now we can again minimize the objective function (7) with respect to the parameters to obtain their robust MDPDE. The exact form of this objective function can be obtained easily for any particular choice of f and any standard numerical algorithm provide us with the solution of this optimization problem. Further, as we will see through the numerical illustrations in Section 7, the proposed MDPDE provides highly robust solutions in presence of outliers in data with little loss in efficiency at small positive α. In the case of the accelerated failure time models, the robustness of the MDPDE is directly comparable with the alternative proposal of Locatelli et al. (2011). Note that, contrary to the Locatelli et al. (2011) approach, our proposed estimator can estimate the parameter (γ) in the distribution of covariates simultaneously with θ = (β, σ); although someone might not see it to be a big advantage as the parameter γ can be estimated separately in many cases. However, the major advantage of our proposal is its generality and computational simplicity for any kind of parametric model with censored survival data with stochastic covariates. We will see in Section 5 that, even if we ignore the estimation of the parameters of the marginal distribution of covariates, our proposal contains the existing proposals of Locatelli et al. (2011), a similar proposal of Zhou (2010) under the same set-up and also their extension in Wang et al. (2015). This vast generality is the major strength of our proposal over the existing literature; see Section 5 for more detailed and general discussions. 4 Asymptotic Properties Consider the models and set-up described in Section 3.1. First, we derive the asymptotic properties of the general M-estimator (θ̂n , γ̂n ) of (θ, γ) as defined in Definition 3.2 based on a (random) censored sample of size n. Let us assume that the true distributions belong to the corresponding model families with (θ0 , γ0 ) being the true parameter value. Define ZZ n X b y) = Win ψ(Z(i,n) , X[i,n] ; θ, γ), λn (θ, γ) = ψ(y, x; θ, γ)dG(x, i=1 and λG (θ, γ) = ZZ ψ(y, x; θ, γ)dG(x, y). Then λn (θ, γ) is the empirical version of λG (θ, γ); also by definition λn (θ̂n , γ̂n ) = 0 and λG (θ0 , γ0 ) = 0. In order to prove the asymptotic consistency and normality of the general Mestimator (θ̂n , γ̂n ), we use the results of Section 2. So, we will assume that the assumptions (A1) to (A4) holds true with φ replaced by ψ. Further, let us assume 13 e and G coincides. (A5) Either τGY < τGC or τGC = ∞ so that G (A6) The variance matrix Σψ , as defined in (4) with φ replaced by ψ, exists finitely (with all entries finite). Then Proposition 2.1 and Proposition 2.2 give the strong consistency and asymptotic normality of λn (θ, γ), which are summarized in the following lemma. Lemma 4.1 Consider the above set-up with an integrable function ψ and let (θ0 , γ0 ) be the true parameter value. Then, (i) Under Assumptions (A1), (A2) and (A5) we have, with probability one, lim λn (θ0 , γ0 ) = λG (θ0 , γ0 ) n→∞ (ii) Under Assumptions (A2) to (A6), the asymptotic distribution of ZZ √ √ b − G](x, y) n [λn (θ, γ) − λG (θ, γ)] = n ψ(y, x; θ, γ)d[G is normal with mean 0 and variance matrix Σψ . 4.1 Strong Consistency and Asymptotic Normality of General M-estimators Wang (1999) has proved the strong consistency and asymptotic normality results for the Mestimators based on only censored variable with no covariables. This section extend the theory to the case where covariables are present along with the censored response. The extensions are in the line of the corresponding results with no censoring (see Huber, 1981; Serfling, 1980). Further note that whenever γ is known the asymptotic properties of θ̂n follows from just a routine application of the results derived in Wang (1999); so here we assume γ to be known and derive the joint distribution of M-estimator of θ and γ. These results provide a general (asymptotic) theoretical framework to study the properties of a wide class of estimators of (θ, γ) depending on the estimating equations. Denote the j-th component of the function ψ by ψj for j = 1, . . . , q + r. Also, consider following (stronger) conditions on the nature of the function ψ. (A7) ψ(y, x; θ, γ) is continuous in (θ, γ) and also bounded. (A8) The population estimating equation λG (θ, γ) = 0 has an unique root given by (θ0 , γ0 ). (A9) There exists a compact set C in Rq × Rr satisfying ZZ inf ψj (y, x; θ, γ)dG(x, y) > 0, (θ,γ)∈C / j = 1, . . . , q + r. Now let us start with the strong consistency of the M-estimator (θ̂n , γ̂n ) by an extension of Theorem 3 of Wang (1999, page 307) under above conditions. The proof follows in the same line of Wang (1999) by replacing the corresponding SLLN, given in Proposition 1 of Wang (1999), by the part (i) of Lemma 4.1 in the present context; hence it is omitted for simplicity of presentation. 14 Theorem 4.2 Consider the above set-up with Assumptions (A1), (A2), (A5), (A7) and (A8). Then we have the following results. (i) There exists a sequence of M-estimators {(θ̂n , γ̂n )} satisfying the empirical estimating equation λn (θ, γ) = 0 that converges with probability one to (θ0 , γ0 ). (ii) Further if (A9) also holds true, then any sequence of M-estimators {(θ̂n , γ̂n )} satisfying λn (θ, γ) = 0 converges with probability one to (θ0 , γ0 ). Note that the first part (i) of Theorem 4.2 is just a multivariate extension of Lemma B of Serfling (1980, page 249) from the complete data case to the present case of censored data with covariates. Further, the additional condition (A9) in part (ii) makes any sequence of Mestimators satisfying the estimating equation (11) to eventually fall in a compact neighborhood of (θ0 , γ0 ). This result, even with the stronger conditions, becomes really helpful when the empirical estimating equation λn (θ, γ) = 0 has multiple roots and one could obtain different M-estimator sequences by applying different numerical equation solving techniques. Part (ii) of Theorem 4.2 ensures that all theses sequences of M-estimators will be strongly consistent for the unique root (θ0 , γ0 ) of the equation λG (θ, γ) = 0. Next we turn our attention to the asymptotic normality of M-estimators. In this regard, we will first present a useful lemma in terms of any real valued function g(y, x, θ0 , γ0 ). This is again a suitable extension of Lemma 1 of Wang (1999, page 307) to the present set-up and the proof follows similarly by replacing the corresponding SLLN (Proposition 1 of Wang) by Part (i) of Lemma 4.1. Assume the following condition about the function g(y, x, θ0 , γ0 ). (A10) For a real valued function g(y, x, θ0 , γ0 ), at least one of the following holds: (i) g(y, x, θ, γ) is continuous at (θ0 , γ0 ) uniformly in (y, x). (ii) As δ → 0, ZZ sup {(θ,γ):||(θ,γ)−(θ0 ,γ0 )||≤δ} |g(y, x, θ, γ) − g(y, x, θ0 , γ0 )| dG(x, y) = hδ → 0. (Here || · || denotes the Euclidean norm). (iii) g is continuous in (y, x) for for any fixed (θ, γ) in a neighborhood of (θ0 , γ0 ), and lim (θ,γ)→(θ0 ,γ0 ) ||g(y, x, θ, γ) − g(y, x, θ0 , γ0 )||v = 0. (Here || · ||v denotes the total variation norm). RR (iv) g(y, x, θ, γ)dG(x, y) is continuous at (θ, γ) = (θ0 , γ0 ), and g is continuous in (y, x) for (θ, γ) in a neighborhood of (θ0 , γ0 ), and lim (θ,γ)→(θ0 ,γ0 ) (v) RR ||g(y, x, θ, γ) − g(y, x, θ0 , γ0 )||v < ∞. g(y, x, θ, γ)dG(x, y) is continuous at (θ, γ) = (θ0 , γ0 ), and ZZ ZZ P g(y, x, θ, γ)dĜ(x, y) → g(y, x, θ, γ)dG(x, y) < ∞, uniformly for (θ, γ) in a neighborhood of (θ0 , γ0 ). 15 RR Lemma 4.3 Suppose g(y, x, θ0 , γ0 ) is a real valued function with g(y, x, θ0 , γ0 )dG(x, y) < ∞. Assume that the conditions (A1), (A2) and (A10) hold for g. Then, for any sequence P (θ̂n , γ̂n ) →(θ0 , γ0 ), we have ZZ ZZ P g(y, x, θ̂n , γ̂n )dĜ(x, y) → g(y, x, θ0 , γ0 )dG(x, y). Theorem 4.4 Consider the above set-up and assume that ψ is differentiable with respect to (θ, γ) in a neighborhood of (θ0 , γ0 ) and the matrix ZZ ∂ ΛG (θ0 , γ0 ) = ψ(y, x, θ, γ) dG(x, y), (23) ∂(θ, γ) (θ,γ)=(θ0 ,γ0 ) exists finitely and is non-singular. Further assume that the assumptions of Lemma 4.3 hold for g(y, x, θ, γ) = Λij G (θ0 , γ0 ), the (i, j)-th element of ΛG (θ0 , γ0 ), with i, j = 1, . . . , q + r. Then, under Assumptions (A2) to (A6) we have, for any sequence of M-estimators {(θ̂n , γ̂n )} satisfying λn (θ, γ) = 0 that converges in probability to (θ0 , γ0 ),   i √ h D n (θ̂n , γ̂n ) − (θ0 , γ0 ) → N 0, ΛG (θ0 , γ0 )−1 Σψ (G)ΛG (θ0 , γ0 )−1 . Proof: Since ψ is differentiable in (θ, γ) , so is the function λn (θ, γ). So an application of multivariate mean value theorem yields h i λn (θ̂n , γ̂n ) − λn (θ0 , γ0 ) = ΛĜ (ζ1n , ζ2n ) (θ̂n , γ̂n ) − (θ0 , γ0 ) , with ||(ζ1n , ζ2n ) − (θ0 , γ0 )|| < ||(θ̂n , γ̂n ) − (θ0 , γ0 )||. Further, by definition, λn (θ̂n , γ̂n ) = 0 and λG (θ0 , γ0 ) = 0. Hence we get, Z Z   −1 b − G](x, y) . (θ̂n , γ̂n ) − (θ0 , γ0 ) = − ΛĜ (ζ1n , ζ2n ) ψ(y, x; θ, γ)d[G However, it follows from Lemma 4.3 that each term of ΛĜ (ζ1n , ζ2n ) convergence in probability to the corresponding term of ΛG (θ0 , γ0 ). Then, an application of Slutsky’s theorem and Part (ii) of Lemma 4.1 completes the proof of the theorem.  It is to be noted that the asymptotic normality of the M-estimators require more conditions than that required for its strong consistency in terms of differentiability properties of the ψ function, but it avoid the strong assumptions (A7) – (A9) used in Theorem 4.2. In fact, to obtain the asymptotic distributional convergence of any sequence of M-estimators in this case, it is just enough to ensure their convergence to the true parameter value in probability. All the related conditions used here are in the same spirit with that used in Wang (1999) have been no covariables are present and were discussed extensively in that paper. Finally, note that the estimating equation of any general M-estimator can be solved through an appropriate numerical technique but the complexity in terms of the iterative procedure increases extensively for a complicated non-linear ψ-function. However, one can show that, for 16 √ the Newton-Raphson algorithm, if we start the iterations with some n-consistent estimator of (θ, γ) then the estimator obtained by just one iteration, known as the one-step M-estimator, will have the same asymptotic distribution as the fully iterated M-estimator even in case of censored data with covariables as considered here. This is a well-known property of the M-estimator in case of complete data. The following theorem present this precisely for our case; the proof follows by an argument similar to that of Theorem 6 of Wang (1999) replacing Proposition 1 and 2 of that paper by Part (i) and Part (ii) of Lemma 4.1 respectively. √ Theorem 4.5 Suppose the conditions of Theorem 4.4 hold true and let (θen , γ en ) is any n(1) (1) consistent estimate of the true parameter value (θ0 , γ0 ). Then, the one-step M-estimator (θn , γn ), defined as h i−1 (θn(1) , γn(1) ) = (θen , γ en ) − ΛĜ (θen , γ en ) λn (θen , γ en ), (24) has the same distribution as that of the M-estimator (θ̂n , γ̂n ) derived in Theorem 4.4. 4.2 Properties of the MDPDE Note that, the MDPDE is a particular M-estimator with the ψ-function given by (12) and so all the results derived in the previous subsection for general M-estimators also hold true for the MDPDEs. In particular MDPDEs are strongly consistent and asymptotically normal under the assumptions considered in Theorems 4.2 and 4.4. However, in this particular case of MDPDEs, we can closely investigate the required assumptions for the particular form of the ψ-function. Note that assumptions (A1), (A2) and (A5) are related to the censoring scheme under consideration and others are about the special structure of the ψ-function. Further, in this particular case of MDPDE, the ψ-function depends on the model density and its score function. So, conditions (A3), (A4) and (A6) can easily be shown to hold for most statistical models by using the existence of finite and continuous second order moments of the score functions with respect to the true distribution G. Similar differentiability conditions on the model and score functions further ensure the assumptions of Lemma 4.3. So, the asymptotic normality of the MDPDEs follows from Theorem 4.4 for most models provided we can prove its consistency. However, assumptions (A6)–(A9), required to prove the strong consistency in Theorem 4.2, are rather difficult one and may not always hold for the assumed model. Noting that, the asymptotic normality of MDPDEs, as obtained in Theorem 4.4, does not require its strong consistency (only convergence in probability is enough), we now present an alternative approach to prove the (weak) consistency for the particular case of MDPDEs under some simpler conditions. This approach is essentially due ot Lehmann (1983), and has been used by Basu et al. (1998) to prove the asymptotic properties of the MDPDEs under i.i.d. complete data and extended by many researchers later in the context of different inference problems. Here, we extend their approach further for the present case of censored data with covariates. Let us also relax the assumption that the true distribution G belongs to the model family in the sense of assumption (D1) below. Define ZZ 1+α fθ (Y |X)α fX,γ (X)α , V (Y, X; θ, γ) = fθ (y|x)1+α fX,γ (x)1+α dxdy − α so that the MDPDE of (θ, γ) is to be obtained by minimizing ZZ b y), Hn (θ, γ) = V (y, x; θ, γ)dG(x, 17 with respect to the parameters. Further, the ψ-function for the MDPDEs as given by Equation (12) satisfies ψ1 (Y, X; θ, γ) = ∂V (Y, X; θ, γ) , ∂θ ψ2 (Y, X; θ, γ) = ∂V (Y, X; θ, γ) . ∂γ (25) Now, let us assume the following conditions: (D1) The supports of the distributions Fθ and FX,γ for any value of X are independent of the parameters θ and γ respectively. The true distribution G(x, y) is also supported on the set A = {(x, y) : fθ (y|x)fX,γ (x) > 0}, on which the true density g is positive. (D2) There exists an open subset ω of the parameter space that contains the best fitting parameter (θ0 , γ0 ) and for all (θ, γ) ∈ ω and for almost all (x, y) ∈ A, the densities fθ and fX,γ are thrice continuously differentiable with respect to θ and γ respectively. RR RR (D3) The integrals fθ (y|x)1+α fX,γ (x)1+α dxdy and fθ (y|x)α fX,γ (x)α dG(x, y) can be differentiated three times and the derivatives can be taken under the integral sign. Further the ψ-function under consideration is finite. (D4) The matrix ΛG (θ0 , γ0 ) = = ZZ ZZ ∂ ψ(y, x, θ, γ) ∂(θ, γ) dG(x, y) (θ,γ)=(θ0 ,γ0 ) ∂2 V (y, x, θ, γ) ∂(θ, γ)2 dG(x, y), (θ,γ)=(θ0 ,γ0 ) exists finitely and is non-singular. (D5) For all (θ, γ) ∈ ω, each of the third derivatives of V (y, x, θ, γ) with respect to (θ, γ) is bounded by a function of (x, y), independent of (θ, γ), that has finite expectation with respect to the true distribution G. Theorem 4.6 Under Assumptions (A1), (A2), (A5) and (D1)–(D5), there exists a sequence of solutions {(θ̂n , γ̂n )} of the minimum density power divergence estimating equations (9) and (10) with probability tending to one, that is consistent for the best fitting parameter (θ0 , γ0 ). (Then, the asymptotic normality of this sequence {(θ̂n , γ̂n )} follows from Theorem 4.4 under the assumptions of that theorem.) Proof: We follow a similar argument to that in the proof of Theorem 6.4.1(i) of Lehman (1983). Consider the behavior of Hn (θ, γ), as a function of (θ, γ), on a sphere Qa having center (θ0 , γ0 ) and radius a. Then, to prove the existence part, it is enough to show that, for sufficiently small a, Hn (θ, γ) > Hn (θ0 , γ0 ), (26) with probability tending to one, for any point (θ, γ) on the surface of Qa . Hence, for any a > 0, Hn (θ, γ) has a local minimum in the interior of Qa and the estimating equations of the MDPDE have a solution {(θ̂n (a), γ̂n (a)} within Qa , with probability tending to one. 18 Now a Taylor series expansion of Hn (θ, γ) around (θ0 , γ0 ) yields q+r X ∂Hn (θ, γ) (ζi − ζi0 ) Hn (θ0 , γ0 ) − Hn (θ, γ) = − ∂ζi i=1 q+r X (θ,γ)=(θ0 ,γ0 ) ∂ 2 Hn (θ, γ) ∂ζi ζj − 1 2 + q+r 1 X ∂ 3 Hn (θ, γ) (ζi − ζi0 )(ζj − ζj0 )(ζk − ζk0 ) 6 ∂ζi ζj ζk (ζi − ζi0 )(ζj − ζj0 ) i,j=1 (θ,γ)=(θ0 ,γ0 ) i,j,k=1 = S1 + S2 + S3 , (say), (θ,γ)=(θ ∗ ,γ ∗ ) (27) where ζi and ζi0 are the i-th component of the parameter vectors (θ, γ) and (θ0 , γ0 ) respectively for all i = 1, . . . , q+r, and (θ ∗ , γ ∗ ) lies in between (θ, γ) and (θ0 , γ0 ) with respect to the Euclidean norm. By a direct extension of the arguments presented in the proof of Theorem 3.1 of Basu et al. (2006), we get, with probability tending to one, on Qa , |S1 | < (q + r)a3 , for all a > 0; S2 < −ca2 , for all a < a0 with some c, a0 > 0; and |S3 | < ba3 , for all a > 0 with some b > 0, using the assumptions (D1)–(D5) and Lemma 4.1 whenever necessary. Combining these, we get max(S1 + S2 + S3 ) < −ca2 + (b + q + r)a3 , c proving (26) holds. which is less that zero whenever a < b+q+r Finally, to show that one can choose a root of the estimating equations of MDPDEs independent of the radius a, consider the sequence of roots closest to the best fitting parameter (θ0 , γ0 ), which exists by continuity of Hn (θ, γ) as a function of (θ, γ). This sequence will also be consistent completing the proof of the theorem.  Note that Assumptions (D1)–(D5) are easier to check compared to the (stronger) Assumptions (A6)–(A9) and are the routine extensions of the corresponding assumptions [(A1)–(A5)] of Basu et al. (2006). 4.3 Other M-estimators with Different ψ-Functions Although our main focus in this paper is to study one particular M-estimator, namely the minimum density power divergence estimator (MDPDE), it opens the scope of many different M-estimators through the general results derived in Section 4.1. This general framework of parameter estimation based on some suitable estimating equation is well studied in case of complete data and several optimum robustness properties of these M-estimators has been proved for different classes of weight function; for example, see Huber (1981) and Hampel et al. (1986). In fact, there exists different class of ψ-function generating optimum solution in case of different problems. For example, in case of estimating the location parameter in a symmetric distribution, the ψ functions, that are odd in the targeted parameter, lead to such optimum M-estimation. However, as pointed out in Wang (1999), an optimum ψ-function for the complete data might not enjoy similar optimality for the censored data, even if there is no covariable presence. 19 The main reason is that the lifetime variables are not usually symmetric and neither belong to a location-scale family; rather it is usually asymmetric. The case of censored data with covariates, as considered here, is much more complicated and we can not directly pick a ψfunction from the theory of complete data. Wang (1999) presented some example of ψ-functions in the context of censored data with no covariates that can be extended in the present case with several covariables. However, their usefulness and optimality both in terms of efficiency and robustness need to be verified for the censored data cases with or without covariates. There need a lot of research in this area to suggest an optimum ψ-function under any suitable criteria of robustness or efficiency based on censored data. However, we believe that the minimum density power divergence estimator proposed here is quite sufficient for most practical situations since it produces highly robust estimators with only a slight loss in efficiency compared to the maximum likelihood estimator (as described in Section 7). Further, the estimating equation of MDPDEs can be solved by any simple numerical technique quite comfortably and has a simple interpretation in terms of the density power divergence. Thus, although some future research work may provide suitable ψ-function satisfying some optimality criteria with complicated form or estimation procedure, the MDPDE will still have its importance in many practical scenarios due to its simplicity. 5 Global nature and the Semi-parametric Extensions Although the main focus of our paper is the MDPDE under fully parametric set-up, the Mestimator defined in Definition 3.2 and its asymptotic theory derived in the previous section is completely general in the sense that it can also be applied to any semi-parametric or even non-parametric set-ups. To see this, just note that the general M-estimator is defined in terms of a ψ function that only need to satisfy Equation (14). Therefore, one can also consider the ψ functions, ψ(y, x; θ), involving no parametric assumptions on the distribution of x (and hence independent of parameter γ) and define the M-estimator as before based on the corresponding estimating equation; that estimator will also follow the general asymptotic theory developed in this paper. Further, in this case, we might generalize our requirement (14) for such ψ functions by considering integral with respect to only the conditional distribution GY |X of Y given X as follows (since φ doesn’t include any distributional part of X): Z ψ(y, x; θ)dGY |X (y) = 0. (28) In this general sense, the existing estimators of Zhou (2010) and Wang et al. (2015) become particular members of our class of general M-estimators with some specific choice of ψ function without distributional assumptions on X. In particular the choice  (29) ψ(y, x; θ) = ψ0 y − xT θ , under the set-up considered in Section 3.2 (except the distributional assumption on X) generates the estimator proposed in Zhou (2010). Then the asymptotic results of Zhou et al (2010) directly follows from our general theory of Section 4; in particular, Theorem 3.3 of Zhaou (2010) follows from our Theorem 4.4. Similarly, the proposal of Wang et al. (2015) can also be though of as a special case of our general M-estimators under the set-up of 3.4 (except the distributional assumption on X) with 20 the ψ function  ψ(y, x; θ) =  ψ0   ω(x)(y−xt β) xω(x)   σ t β) χ ω(x)(y−x σ  , (30) where χ(s) = sψ0 (s)−1, ω(x) is some suitable weights and ψ0 is some suitable function as given in Wang et al. (2015). Once again, all the asymptotic results of their paper follow from our general theory presented in Section 4. For example, Theorem 3.2 and 3.3 of Wang et al. (2015) follow from our Theorem 4.2 and 4.4. respectively under the above mentioned set-up. A numerical comparison of our MDPDE with the estimator of Wang et al. (2015) has been provided later in Section 7.2 through an interesting real data example. However, the proposed MDPDE, a special M-estimator with the ψ function given by (12), involve the assumed density of the covariates X. So it cannot be applied directly to the semiparametric settings where no distributional assumption has been made. But, we can easily extend our definition of MDPDE for the semi-parametric cases by considering the density power divergence between the conditional densities fθ (Y |X) of Y given X instead of considering the joint density of Y and X. The ψ function corresponding to this extended MDPDE under semiparametric set-up can be seen to have the form = ζeθ (X) − uθ (Y, X)fθ (Y |X)α , (31) R where ζeθ (x) = uθ (y, x)fθ (y|x)1+α dy. Clearly, this ψ function, ψα (y, x; θ), corresponding to the extended MDPDE satisfies the stronger condition (28) and hence also satisfies (14). Thus, all the properties derived in Section 4 continue to hold under suitable modification for the semiparametric set-up. With this modification, the proposed MDPDE can now be applied to any semi-parametric set-up including the linear regression set-up of Zhou et al. (2010), as considered in Section 3.2 with fully parametric assumptions. 6 Robustness: Influence Function Analysis The influence function (Hampel et al., 1986) of an estimator is a popular tool to measure its classical robustness properties. It measures the stability of the estimator under infinitesimal contamination yielding a first order approximation of the bias due to that small contamination in data. More precisely, if Tψ (G) = (Tψθ (G), Tψγ (G)) denotes the statistical functional for the M-estimator corresponding to ψ (which satisfies Equation (14)), then the influence function of this estimator is defined as IF ((y0 , x0 ); Tψ , G) = ∂ Tψ (Gǫ ) ∂ǫ = lim ǫ=0 ǫ↓0 Tψ (Gǫ ) − Tψ (G) , ǫ where Gǫ = (1 − ǫ)G + ǫ∧(x0 ,y0 ) is the contaminated distribution with ǫ being the contamination proportion and ∧(x0 ,y0 ) being the degenerate distribution at the contamination point (x0 , y0 ). If the influence function is bounded in the contamination points (x0 , y0 ), the bias under infinitesimal contamination cannot become arbitrarily large even when the contamination is very far from the data center; hence the estimator will be robust with respect to the data contamination. A straightforward albeit lengthy differentiation of the estimation equation (Equation (14) with G replaced by Gǫ and (θ, γ) replaced by Tψ (Gǫ )) yields the form of the influence function of our general M-estimators, which is presented in the following theorem. 21 Theorem 6.1 Under the above mentioned set-up, IF ((y0 , x0 ); Tψ , G) = ΛG (Tψθ (G), Tψγ (G))−1 ψ(y0 , x0 ; Tψθ (G), Tψγ (G)). (32) Clearly, whenever we choose the ψ function to be bounded with respect to y and x, the influence function of the corresponding M-estimator will be bounded in both y0 and x0 ; hence the estimator will be robust with respect to both the outlier y0 in response variables as well as the leverage point x0 in the explanatory variables. However, if we have ψ function bounded only in y and not in x (like the ψ functions of the classical M-estimators under normal linear regression without censoring) the resulting estimator will be robust only with respect to outliers in response but may not be robust with respect to leverage points. In particular, the above theorem also provides the influence function of the proposed MDPDE under fully parametric models by just using the ψ function given in (12). Note that, for most common parametric models, this particular ψ function is bounded in both y and x whenever α > 0 implying the robust nature of the MDPDE with α > 0 for both the outliers in responses and covariates. However, at α = 0, the ψ function of the corresponding MDPDE (which is the same as the MLE) is proportional to the score functions which are generally unbounded for most parametric models and prove their non-robust nature. However, the MDPDE under the semi-parametric extension has a different ψ function, given in (31), which is not bounded in x for all α ≥ 0 under common parametric families; but it is generally bounded in y for α > 0. Hence the semi-parametric MDPDE with α > 0 are only robust with respect to outliers in the response but not robust under leverage points. 7 7.1 Numerical Illustrations Simulation Study Consider the exponential regression model with randomly censored data and normal covariables as discussed in the previous subsection. For simulation exercise, we consider only one covariable so that X is a univariate normal random variable with mean γ (scalar) and variance 1. Then a covariate sample of size n is generated from N (γ, 1) distribution and given the value x of the covariate we simulate the (lifetime) response variable from an exponential distribution with mean θx under a random censoring scheme; the true values of the parameters are taken to be θ = 1 and γ = 5. Here we consider the simple exponential censoring distribution, but the censoring rate is determined to keep the expected proportion of censoring at 10 or 20% under the true distribution. Under the exponential censoring distribution with mean τ , i.e., C ∼ Exp(τ ), the expected proportion of censoring under the true distribution Exp(θx) can be seen to be P (Y > C) = θx . τ + θx So to make this proportion equal to 10% or 20%, we need to take τ = 9θx and τ = 4θx respectively (with θ = 1 for our simulation study). Then we compute the MDPDE of (θ, γ) numerically and repeat the process 1000 times to obtain the empirical estimates for the total absolute bias (sum of the absolute biases of θ and γ) and the total MSE (sum of the MSEs of θ and γ) of the MDPDE with respect to the target value (1, 5). One can measure the performance of the proposed MDPDE with respect to several choice of tuning parameter α and with the maximum likelihood estimator (MLE) at α = 0 by comparing these empirical bias and MSEs. 22 At first we consider only the pure sample without any contamination and compare the efficiencies of the MDPDEs for different α with the MLE (at α = 0). The empirical estimates of efficiency are computed from the total MSEs and are reported in Table 1 along with the total absolute bias for different α and different censoring proportions. It is clear from the table that the efficiency of the MDPDE decreases as α increases but the loss in efficiency is not so significant at smaller positive values of α. Further, for any fixed α both the total absolute bias and MSE increase as the censoring proposing increases. Table 1: Empirical Summary measures for the MDPDEs under no contamination Total Abs. Bias Total MSE Relative Efficiency Cens. Prop. 10% 20% 10% 20% 10% 20% 0.00 0.3848 0.4260 0.1363 0.1860 100% 100% 0.01 0.3695 0.4192 0.1490 0.1954 91% 95% 0.10 0.4067 0.4616 0.1577 0.2078 86% 90% α 0.30 0.4659 0.5472 0.1873 0.2656 73% 70% 0.50 0.5145 0.6122 0.2198 0.3097 62% 60% 0.70 0.5474 0.6518 0.2458 0.3424 55% 54% 1.00 0.5801 0.6890 0.2773 0.3782 49% 49% Next, to examine the robustness of the proposed MDPDEs over the MLE, we repeat the above simulation study but with 5, 10, 15 or 20% contamination in the response variable and covariates. For contamination in response variable, we generate them from an Exp(5x) distribution (θ = 5) under the same censoring scheme as before; for contamination in the covariates, we simulate observations from another normal distribution with mean 10 and variance 1. The empirical bias and MSE of the estimators are reported in Tables 2 and 3 respectively. Clearly, note that the total absolute bias as well as the total MSE increases for any fixed α as the contamination proportion increases. However, these changes are rather drastic at smaller values of α and stabilize as α increases. In other words, the MDPDE with larger α ≥ 0.3 can successfully ignore the outliers to generate robust inference. Table 2: Empirical total absolute bias of the MDPDEs for different contamination proportions Cens. Prop. 10% 20% Cont. Prop 5% 10% 15% 20% 5% 10% 15% 20% 0.00 0.513 0.741 1.093 1.594 1.006 0.759 0.865 1.090 0.01 0.506 0.667 1.011 1.476 0.953 0.706 0.790 1.000 23 0.10 0.392 0.437 0.794 1.169 0.747 0.522 0.719 1.102 α 0.30 0.270 0.258 0.554 1.009 0.651 0.412 0.559 1.166 0.50 0.220 0.223 0.518 0.878 0.723 0.393 0.481 1.092 0.70 0.199 0.216 0.534 0.816 0.786 0.405 0.449 1.035 1.00 0.186 0.217 0.578 0.781 0.856 0.415 0.436 1.003 Table 3: Empirical total MSE of the MDPDEs for different contamination proportions Cens. Prop. 10% 20% 7.2 Cont. Prop 5% 10% 15% 20% 5% 10% 15% 20% 0.00 0.265 0.453 0.908 2.282 0.794 0.441 0.689 1.208 0.01 0.257 0.425 0.848 2.167 0.743 0.415 0.680 1.171 0.10 0.139 0.220 0.497 1.585 0.425 0.248 0.499 1.153 α 0.30 0.081 0.101 0.259 0.913 0.305 0.166 0.309 1.008 0.50 0.070 0.079 0.229 0.714 0.353 0.144 0.249 0.898 0.70 0.071 0.077 0.244 0.629 0.410 0.143 0.235 0.838 1.00 0.083 0.081 0.298 0.602 0.482 0.147 0.242 0.833 Real Data Application : Heart Transplant data We will now apply our proposed MDPDEs to an interesting real data example with the semiparametric model assumptions, which will illustrate the performance of the proposed semiparametric extension described in Section 5 along with its applicability in real life scenarios. The data set considered is from the popular Stanford heart transplant program described in details in Clark et al. (1971) and contains the following survival information of 158 patients (Crowley and Hu, 1977; Escobar and Meeker Jr, 1992): ID number of patients (“ID”), survival or censoring time (“TIME”), censoring status (dead or alive), patient’s age at first transplant in years (“AGE”) and the T5 mismatch score (“T5-MS”). The dataset, available from the ‘survival’ library of R, was analyzed statistically by many authors including Brown et al. (1973), Turnbull et al. (1974), Mantel and Byar (1974), and Miller and Halpern (1982). Recently, it has also been used to illustrate the performances of robust estimates under semi-parametric AFT models by Salibian-Barrera and Yohai (2008), Locatelli et al. (2011) and Wang et al. (2015). The latest robust estimator of Wang et al. (2015), namely, the KMW-GM estimator, has been seen to work best for this dataset while using the model log(TIME) = β0 + β1 (AGE) + β2 (T5-MS) + σǫ. Here, we will apply our proposed MDPDE with different tuning parameters α with the same parametric model as above and the assumption that ǫ ∼ N (0, 1) and illustrate the superior performance of our proposal over the KMW-GM estimator of Wang et al. (2015). As noted in Wang et al. (2015), there are three potential outliers in the dataset corresponding to the ID 2, 16 and 21, where the patients have unexpectedly shorter survival times. This finding is also consistent with the results from previous analyses of the dataset and so we also treat these three data points as outliers and compute our MDPDEs twice; once with the full data set and once after removing these outliers. However, since the estimates of the parameters (β0 , β1 , β2 , σ) differ only slightly in the two cases with and without outliers, we will report teh relative variation in the estimates in order to check the extent of their robustness. Following Wang et al. (2015), we define the relative variation as RelativeVariation = 24 |θ̂full − θ̂cleaned | |θ̂full | , where θ̂full is the estimated parameter value based on the full data set and θ̂cleaned is the parameter estimate based on the cleaned data after removing the three outliers. The relative variations obtained for each of the parameters are reported in Table 4 for our proposed MDPDEs with different tuning parameters and α and also for the KMW-GM estimator of Wang et al. (2015). It can be seen clearly from the table that the MDPDEs of most of the parameters are much more stable and have less relative variation compared to the KMW-GM estimator of Wang et al. (2015) for α ≥ 0.4; this clearly shows the greater robustness of our proposal compared to the existing robust method. Further, note that the relative variation is quite high at α = 0 which is the non-robust maximum likelihood estimator. As α increases the relative variations of all the parameters decrease significantly which again shows the significant gain in robustness of our proposal with increasing α. Table 4: The relative variation of the MDPDEs at α and the KMW-GM estimates of Wang et al. (2015) with and without outliers for the Heart Transplant Data α β0 β1 β2 σ 0 0.0191 0.8198 0.3622 0.0886 0.0200 0.3450 0.3189 0.0786 0.05 0.0202 0.1477 0.2727 0.0707 0.1 0.2 0.0191 0.0041 0.1825 0.0570 0.0172 0.0347 0.1079 0.0463 0.3 0.4 0.0153 0.0445 0.0558 0.0384 0.0139 0.0452 0.0236 0.0328 0.5 0.0118 0.0409 0.0039 0.0259 0.7 0.9 0.0108 0.0369 0.0088 0.0225 0.0106 0.0354 0.0077 0.0215 1 KMW-GM 0.0153 0.0034 0.0807 0.0573 8 On the Choice of Tunning Parameter α in MDPDE A crucial issue for applying the proposed MDPDE in any real-life problem is the choice of tuning parameter α. As we have seen that the robustness and efficiency of the MDPDEs depend crucially on the tuning parameter α, it needs to be chosen carefully in practice where we have no idea regarding the contamination and censoring proportions. The simulation study presented in Section 7 gives some indication in this direction. We have seen that the MDPDEs with larger α ≥ 0.3 are robust enough to successfully address the problem of outliers; the robustness increases as α increases. On the other hand, the efficiency of the MDPDEs under pure data is seen to decreases as α increases, but there is no significant loss in efficiency at smaller positive values of α near 0.3. So, we recommend to use a value of the tuning parameter α near 0.3 to get a fair compromise between efficiency and robustness whenever the amount of contamination is not known in practice. This is in-line with the empirical suggestions given by Basu et al. (2006) in the context of MDPDE based on censored data with no covariables. However, these empirical suggestions need further justification based on more elaborative simulation and theoretical aspects. In case of complete data, some such justifications of the data driven choice of α is given by Hong and Kim (2001) and Warwick and Jones (2005). Their work might have been generalized to the case of censored data, although it is not very easy, in order to solve this issue 25 of selecting α. We hope to pursue this in our future research. 9 Conclusion The present paper proposes the minimum density power divergence estimator under the parametric set-up for censored data with covariables to generate highly efficient and robust inference. The applicability of the proposed technique is illustrated through appropriate theoretical results and simulation exercise in the context of censored regression with stochastic covariates. Further, the paper provide the asymptotic theory for a general class of estimators based on the estimating equation which opens the scope of studying many such estimators in the context of censored data in presence of some stochastic covariates. Acknowledgments: The authors gratefully acknowledge the comments of two anonymous referees which led to an improved version of the manuscript. References [1] Basu, S., Basu, A., and Jones, M. C. (2006). Robust and efficient parametric estimation for censored survival data. Annals of the Institute of Statistical Mathematics, 58(2), 341–355. [2] Basu, A., Harris, I. R., Hjort, N. L., and Jones, M. C. (1998). Robust and efficient estimation by minimising a density power divergence. Biometrika, 85(3), 549–559. [3] Bednarski, T. (1993) Robust estimation in the Cox regression model. Scand. J. Statist., 20, 213–225. [4] Bednarski, T. and Borowicz, F. (2006). coxrobust: Robust Estimation in Cox Model. R package version 1.0. [5] Begun, J. M., Hall, W. J., Huang, W. M., Wellner, J. A. (1983). Information and Asymptotic Efficiency in Parametric-Nonparametric Models. Annals of Statistics, 11, 432–452. [6] Brown, B. W., Jr., Hollander, M., and Korwar, R. M. (1973). Nonparametric Test of independence for censored data with application to Heart Transplant Studies. Florida State University Conference on Reliability and Biometry. [7] Buckley, J., and James, I., (1979). Linear regression with censored data. Biometrika, 66, 429–436. [8] Cai, Z. (1998). Asymptotic properties of Kaplan-Meier estimator for censored dependent data. Statistics and probability letters, 37(4), 381–389. [9] Campbell, G., and Földes, A. (1982). Large sample properties of nonparametric bivariate estimators with censored data. Nonparametric statistical inference, 1, 103-121. [10] Chen, Y. Y., Hollander, M., and Langberg, N. A. (1982). Small-sample results for the Kaplan-Meier estimator. Journal of the American Statistical Association, 77, 141-144. [11] Clark, D. A., Stinson, E. B., Griepp, R. B., Schroeder, J. S., Shumway, N. E., and Harrison, D. C. (1971). Cardiac Transplantation in Man. VI. Prognosis of Patients Selected for Cardiac Transplantation. Annals of Internal Medicine, 75, 15–21. 26 [12] Collett, D. (2003). Modelling Survival Data in Medical Research. Chapman Hall, London, U.K. [13] Cox, D.R. (1972). Regression models and life tables (with discussion). Journal of Royal Statistical Society, Series B. 34, 187–220. [14] Cox, D. R., and Oakes, D. (1984). Analysis of Survival Data. Chapman Hall, London, U.K. [15] Crowder, M. J., Kimber, A. C., Smith, R. L., and Sweeting, T. J. (1991). Statistical Analysis of Reliability Data. Chapman Hall, London, U.K. [16] Crowley, J. and Hu, M. (1977). Covariance analysis of heart transplant survival data. Journal of the American Statistical Association, 72, 27–36. [17] Dabrowska, D. M. (1988). Kaplan-Meier estimate on the plane. The Annals of Statistics, 16(4), 1475–1489. [18] Escobar, L. A. and Meeker Jr, W. Q. (1992). Assessing influence in regression analysis with censored data. Biometrics, 48, 507–528. [19] Farcomeni, A. and Viviani, S. (2011) Robust estimation for the Cox regression model based on trimming. Biometrical Journal, 53(6), 956–973. [20] Ghosh, A., and Basu, A. (2013). Robust estimation for independent non-homogeneous observations using density power divergence with applications to linear regression. Electronic Journal of statistics, 7, 2420-2456. [21] Ghosh, A., and Basu, A. (2014). Robust Estimation in Generalized Linear Models : The Density Power Divergence Approach. Test, doi:10.1007/s11749-015-0445-3. [22] Hampel, F. R., E. Ronchetti, P. J. Rousseeuw, and W. Stahel (1986). Robust Statistics: The Approach Based on Influence Functions. New York, USA: John Wiley & Sons. [23] Hong, C. and Kim, Y. (2001), Automatic selection of the tuning parameter in the minimum density power divergence estimation. Journal of the Korean Statistical Society, 30, 453–465. [24] Hosmer, D. W., Lemeshow, S. and May, S. (2008). Applied Survival Analysis: Regression Modeling of Time-to-Event Data. John Wiley & Sons. [25] Huber, P. J. (1981). Robust Statistics. John Wiley & Sons. [26] Kaplan, E. L., and Meier, P. (1958). Nonparametric estimation from incomplete observations. Journal of the American statistical association, 53 (282), 457–481. [27] Kim, M., and Lee, S. (2008). Estimation of a tail index based on minimum density power divergence. Journal of Multivariate Analysis, 99(10), 2453–2471. [28] Klein, J.P. and Moeschberger, M.L. (2003). Survival Analysis Techniques for Censored and Truncated Data, Second Edition. Springer-Verlag, New York. [29] Kosorok, M.R., Lee, B.L. and Fine, J.P. (2004). Robust inference for univariate proportional hazards frailty regression models. Annals of Statistics, 32, 1448–1491. 27 [30] Lawless, J.F. (2003). Statistical Models and Methods for Lifetime Data, Second Edition. John Wiley & Sons, Inc. New York. [31] Lee, S., and Song, J. (2009). Minimum density power divergence estimator for GARCH models. Test, 18(2), 316–341. [32] Lee, S., and Song, J. (2013). Minimum density power divergence estimator for diffusion processes. Annals of the Institute of Statistical Mathematics, 65(2), 213-236. [33] Lehmann, E. L. (1983). Theory of Point Estimation. John Wiley & Sons. [34] Lo, S. H., Mack, Y. P., and Wang, J. L. (1989). Density and hazard rate estimation for censored data via strong representation of the Kaplan-Meier estimator. Probability theory and related fields, 80(3), 461-473. [35] Locatelli, I., Marazzi, A., Yohai, V. J. (2011). Robust accelerated failure time regression. Computational Statistics and Data Analysis. 55, 874–887. [36] Mantel, N. and Byar, D. P. (1974). Evaluation of Response-Time data involving transient states: An illustration using Heart-Transplant data. Journal of the American Statistical Association, 69, 81–86. [37] Miller, R. and Halpern, J. (1982). Regression with censored data. Biometrika, 69, 521–531. [38] Peterson Jr, A. V. (1977). Expressing the Kaplan-Meier estimator as a function of empirical subsurvival functions. Journal of the American Statistical Association, 72 (360a), 854–858. [39] Ritov, Y. (1986). Estimation in a Linear Regression Model with Censored Data. The Annals of Statistics, 18(1), 303–328. [40] Robins, J. M., and Rotnitzky, A. (1992). Recovery of information and adjustment for dependent censoring using surrogate markers. In AIDS Epidemiology, 297–331. Birkh´’auser Boston. [41] Satten, G. A., and Datta, S. (2001). The KaplanMeier estimator as an inverse-probabilityof-censoring weighted average. The American Statistician, 55(3), 207–210. [42] Salibian-Barrera, M., and Yohai, V. J. (2008). High breakdown point robust regression with censored data. The Annals of Statistics, 36(1), 118–146. [43] Serfling, R. J. (1980). Approximation Theorems of Mathematical Statistics. New York, USA: John Wiley & Sons. [44] Stute, W. (1993). Consistent estimation under random censorship when covariables are present. Journal of Multivariate Analysis, 45(1), 89–103. [45] Stute, W. (1995). The central limit theorem under random censorship. The Annals of Statistics, 23(2), 422–439. [46] Stute, W. (1996). Distributional convergence under random censorship when covariables are present. Scandinavian Journal of Statistics, 23(4), 461–471. [47] Stute, W., and Wang, J. L. (1993). The strong law under random censorship. The Annals of Statistics, 21(3), 1591–1607. 28 [48] Turnbull, B. W., Brown, B. W., Jr., and Hu, M. (1974). Survivorship analysis of Heart Transplant data. Journal of the American Statistical Association, 69, 74–80. [49] Tsai, W. Y., Jewell, N. P., and Wang, M. C. (1987). A note on the product-limit estimator under right censoring and left truncation. Biometrika, 74(4), 883–886. [50] Van der Laan, M. J., and Robins, J. M. (2003). Unified methods for censored longitudinal data and causality. Springer. [51] Wang, J. L. (1999). Asymptotic Properties of M-Estimators Based on Estimating Equations and Censored Data. Scandinavian journal of statistics, 26(2), 297–318. [52] Wang, M. C., Jewell, N. P., and Tsai, W. Y. (1986). Asymptotic properties of the product limit estimate under random truncation. The Annals of Statistics, 14(4), 1597–1605. [53] Warwick, J., and Jones, M. C. (2005). Choosing a robustness tuning parameter. Journal of Statistical Computation and Simulation, 75(7), 581–588. [54] Zhou, M. (1991). Some properties of the Kaplan-Meier estimator for independent nonidentically distributed random variables. The Annals of Statistics, 19(4), 2266–2274. [55] Zhou, M. (1992). M-estimation in censored linear models. Biometrika, 79(4), 837-841. 29
10math.ST
1 Pattern Recognition Letters journal homepage: www.elsevier.com Video Semantic Object Segmentation by Self-Adaptation of DCNN Seong-Jin Park∗∗, Ki-Sang Hong arXiv:1711.08180v1 [cs.CV] 22 Nov 2017 Department of Electrical Engineering, POSTECH, Namgu Pohang, Republic Korea ABSTRACT This paper proposes a new framework for semantic segmentation of objects in videos. We address the label inconsistency problem of deep convolutional neural networks (DCNNs) by exploiting the fact that videos have multiple frames; in a few frames the object is confidently-estimated (CE) and we use the information in them to improve labels of the other frames. Given the semantic segmentation results of each frame obtained from DCNN, we sample several CE frames to adapt the DCNN model to the input video by focusing on specific instances in the video rather than general objects in various circumstances. We propose offline and online approaches under different supervision levels. In experiments our method achieved great improvement over the original model and previous state-of-the-art methods. c 2016 Elsevier Ltd. All rights reserved. 1. Introduction Semantic segmentation assigns all pixels in an image to semantic classes; it gives finely-detailed pixel-level information to visual data and can build a valuable module for higher-level applications such as image answering, event detection, and autonomous driving. Conventional semantic segmentation techniques for images have been mostly built using handcrafted features on conditional random fields (CRFs) (Russell et al., 2009; Ladickỳ et al., 2010; Yao et al., 2012). Recently deep convolutional neural networks (DCNNs) have achieved great success in classification (Krizhevsky et al., 2012; Simonyan and Zisserman, 2014; Szegedy et al., 2015; He et al., 2015), so they have been widely applied to semantic segmentation approaches (Long et al., 2015; Chen et al., 2014; Noh et al., 2015; Zheng et al., 2015; Lin et al., 2015; Liu et al., 2015; Yu and Koltun, 2015). A video consists of a sequence of images, so image-based models can be applied to each of them. For instance, there was an attempt to apply object and region detectors pre-trained on still images to a video (Zhang et al., 2015); they used pretrained object detectors to generate rough object region proposals in each frame. Similarly, we adopt an approach that employs an image-trained model to process a video, but instead of a conventional object detector, we apply a DCNN semantic segmentation model to each frame. However, the DCNN model author: Tel.: +82-54-279-2881; e-mail: [email protected] (Seong-Jin Park) ∗∗ Corresponding (a) (b) Fig. 1. Problems when the pre-trained DCNN model is applied directly to a video frame (top: a frame, bottom: the result). Different colors of results represent different classes. (a) Objects segmented into different classes. (b) Label wavers between visually-similar categories (from left to right: frame 1 - mixed, frame 31 - dog, frame 61 - horse). Best viewed in color. can show spatially inconsistent labels as previously reported in (Qi et al., 2015) when it is applied to an image. This inconsistency is exacerbated for video due to various factors such as motion blur, video compression artifacts, and sudden defocus (Kalogeiton et al., 2015). When the model is applied directly to video, the labeling result for an object can be segmented into different classes, and can waver between visually confusing categories among frames (Fig. 1). Human vision also experiences 2 Video frames DCNN Semantic Segmentation Adapt model Globally confident Output Select frames Set labels Locally confident Generate self-adapting dataset Fig. 2. Main framework of our method. Best viewed in color. such difficulty of recognition under certain circumstances. Our framework is motivated by the following question: ‘How does a human recognize a confusing object?’ When a human has difficulty identifying the object, she can guess its identity by using learned models and focusing on the object for a while. Then, she can recognize the object by referring to the moments during which it is unambiguous; i.e., she tunes her model to the specific object while regularizing small appearance changes. In a way analogous to this process, our framework takes advantage of multiple frames of a video by emphasizing confidentlyestimated (CE) frames to adapt a pre-trained model to a video. The key idea of our method is to propagate the belief of CE frames to the other frames by fine-tuning DCNN model; we apply a pre-trained DCNN model to each frame to guess the object’s class, and collect frames in which the estimation is globally confident or locally confident. Then, we use the set of CE frames as a training set to fine-tune the pre-trained model to the instances in a video (Fig. 2). We restrict the DCNN model to be video-specific rather than general purpose; i.e., we make the model focus on the specific instances in each video. In our procedures, we only use the label of CE regions, and let the uncertainly-estimated (UE) regions be determined by the CE frames. We also incorporate weak labels (i.e., manuallyannotated class labels of objects in the video) to prevent a few incorrect labels from degrading the model. Our procedures to generate a self-adapting dataset and to use CE frames to update the model can recover the uncertain or misclassified parts of UE frames that include multiple objects. We also propose an online approach that is implemented in a way similar to object tracking, because object tracking and online video object segmentation are closely related in that both tasks should trace the appearance change of an object while localizing it. Then we combine the batch and online results to improve the motion-consistency of segmentation. We validate our proposed method on the Youtube-ObjectDataset (Prest et al., 2012; Jain and Grauman, 2014; Zhang et al., 2015). In experiments our model greatly improved the pre-trained model by mitigating its drawback even when we do not use the weak labels. 2. Related work Recent image semantic segmentation techniques have been propelled by the great advance of DCNN for the image classification task (Krizhevsky et al., 2012; Simonyan and Zisserman, 2014; Szegedy et al., 2015; He et al., 2015). Based on the classification network, Long et al. (2015) extended a convolutional network to a fully-convolutional end-to-end training framework for pixel-wise dense prediction. Chen et al. (2014) used a hole algorithm to efficiently compute dense feature maps, and combined the output of the network into a fully-connected CRF. Several follow-up studies proposed more-sophisticated combinations of CRF framework with DCNNs (Zheng et al., 2015; Lin et al., 2015; Liu et al., 2015). Yu and Koltun (2015) proposed a modified architecture that aggregates multi-scale context by using dilated convolutions specifically designed for dense prediction. Due to the difficulty of pixel-wise annotation for frames, most video semantic object segmentation techniques have been built on a weakly-supervised setting that is given only videolevel class labels of objects appearing in a video. Hartmann et al. (2012) trained weakly-supervised classifiers for several spatiotemporal segments and used graphcuts to refine them. Tang et al. (2013) determined positive concept segments by using a concept-ranking algorithm to compare all segments in positive videos to the negative videos. Liu et al. (2014) proposed a label transfer scheme based on nearest neighbors. The natural limitation of the weakly-supervised approach is that it has no information about the location of target objects. Because a video is a sequence of images, Zhang et al. (2015) used object detectors that had been pre-trained on still images, and applied them to a video to localize object candidates; in each frame the method generates several object proposals by using object detectors that correspond to the given labels and by using rough segmentation proposals based on objectness. Although the object detection gives the spatial information as a bounding box around objects that have a semantic class label, the information is not sufficient for pixel-wise segmentation. Thus we use a DCNN semantic segmentation model pre-trained on images to give the pixel-wise spatial extent of the object and its semantic label at the same time, and adapt the image-based DCNN model to the input video. In contrast to most existing approaches that focus on modeling temporal consistency at pixel or region levels, our framework does not necessarily assume that the neighboring frames should be similar, and because it samples several frames that may capture different appearances of an object, our framework is relatively insensitive to sudden changes of the object. Another related topic is video object segmentation with semisupervised video (Ali et al., 2011; Ramakanth and Babu, 2014; Tsai et al., 2012; Badrinarayanan et al., 2010; Jain and Grauman, 2014; Fathi et al., 2011), which is given pixel-wise annotation of certain frames. Especially, Jain and Grauman (2014) proposed a method that employs supervoxels to overcome the myopic view of consistency in pairwise potentials by incorporating additional supervoxel-level higher-order potential. Fathi et al. (2011) developed an incremental self-training framework by iteratively labeling the least uncertain frame and updating 3 similarity metrics. The framework is similar to ours in that we update a model based on previously-estimated frames, although we neither assume pixel-wise annotation nor require superpixels, which often wrongly capture the boundary of the object. We also update the pre-trained DCNN model, in contrast to the method of Fathi et al. (2011) that updates a simple similarity metric based on hand-crafted features such as SIFT and a color histogram. 3. Method: AdaptNet We assume that a video includes at least a few CE frames and that they are helpful to improve the results of the UE frames. The main idea of our method is to propagate the belief of those CE frames by fine-tuning DCNN model. Thus our main framework consists of the following steps: selection of CE frames, label map generation, and adaptation of the model to the input video. We describe the detailed algorithm of these steps in the following subsections. We first propose a batch (offline) framework, then an online framework. We combine those two results to improve the motion-consistency of segmentation by incorporating optical flow. At the end of the section, we mention simple extensions to the unsupervised batch algorithm. 3.1. Batch Let F denote a set of frame indices, and W denote a set of given weak labels of the input video. We begin by applying a pre-trained DCNN model θ to each frame f ∈ F , then use softmax to compute the probability P(xi |θ) that the i-th pixel is a member of each class xi ∈ O, where O denotes the set of object classes and background. The semantic label map S can be computed using the argmax operation for every i-th pixel: S (i) = arg max xi P(xi |θ). To adapt the DCNN model θ to the input video, we collect a self-adapting dataset G that consists of CE frames and corresponding label maps. We collect globally-CE and locally-CE frames and compute the respective label maps Gg and Gl to construct the self-adapting dataset. The procedures to select the frames and to compute the labels are described in the following and summarized in Algorithm 1. We first perform connectedcomponent analysis on each class map of S to generate a set R of object candidate regions. For each k-th segmented label map Rk ∈ R we measure the confidence C(Rk ) of the estimated regions, where the C(·) operator takes a label map as input and computes the average probability that the pixels labeled as objects in the label map have the corresponding class labels. Then we generate the label map Ggf by setting the label of the region only when its confidence exceeds a high threshold to . We also set the background label for every pixel for which the probability P(xi = bg|θ) of being background exceeds threshold tb . To complete Ggf , the remaining uncertain regions must be processed. For this purpose, we let the remaining pixels have the “ignored” label. The uncertain “ignored” pixels are not considered during computation of the loss function for model update. We also ignore all pixels that have labels that are not in Algorithm 1 AdaptNet-Batch 1: Given: DCNN model θ, a set of weak labels W 2: Local best confidence d = 0 3: for f ∈ F do 4: Initialize Ggf , Glf to ”ignored” labels 5: Compute P(x|θ) and S = arg maxx P(x|θ) 6: Compute set R of connected components in S 7: for Rk ∈ R do 8: if S (i) < W, i ∈ Rk then continue 9: if C(Rk ) > to then Set Ggf (i) = S (i), ∀i ∈ Rk 10: Set Glf (i) = S (i), ∀i ∈ Rk 11: Set Ggf (i) = Glf (i) = 0, ∀i, s.t.P(xi = bg|θ) > tb 12: if C(Ggf ) > 0 then G ← G ∪ {Ggf } 13: if C(Glf ) > d then 14: Update t = f and d = C(Glf ) 15: if f mod τb = 0 then 16: if Ggt < G then 17: G ← G ∪ {Glt } 18: Initialize d = 0 19: Finetune DCNN model θ to θ0 using the set G the set W of given weak labels of a video. We add globallyCE frames with Ggf that has at least one confident region (i.e., C(Ggf ) > 0) to the self-adapting dataset G. Because the selected frames might be temporally unevenly distributed, the model can be dominated by frames that are selected during a short interval. To mitigate the resulting drawback and regularize the model, we also select the locally-CE frames that have best object confidences during every period τb although the frames do not include globally-CE object regions. We determine the locally-CE frame and its label map Gl as follows: we generate a label map Glf for every frame f by keeping the label of all pixels only if the label S (i) is included in W, while setting the background as before. We measure the confidence of a frame by computing C(Glf ) and we regard as locally-CE the frame that has the highest confidence during every section of τb frames. If the locally-CE frame is not already selected as a globally-CE frame, we add it to the self-adapting dataset G. Given the self-adapting dataset G constructed from the above procedures, we finally adapt the DCNN model θ to the video by fine-tuning the model to θ0 based on the dataset. Then, we compute the new label map by applying θ0 to every frame. 3.2. Online The main difference between the batch and online frameworks is the generation of the self-adapting dataset. We adopt an online framework similar to object tracking using DCNN (Nam and Han, 2015) because object tracking and online video object segmentation are closely related in that they should trace an object’s appearance change while localizing object’s region. Nam and Han (2015) pre-trained domain-independent layers from training videos and collected two sets of frames (i.e., logterm and short-term sets) to fine-tune the model to be domainspecific. Similarly, to update the model periodically we collect 4 O.F. Sb So c(m f , m f +1 ) Fig. 3. Motion-consistent combination. Top row: consecutive frames of a video and color-coded optical flows (O.F.) between frames. Middle row: corresponding results of batch (S b ) model. Bottom row: corresponding results of online model (S o ). We compute the consistency c(m f , m f +1 ) between those results by following optical flow, then find the most consistent path of selected models. Best viewed in color. Algorithm 2 AdaptNet-Online 1: Given: DCNN model θ, a set of weak labels W 2: Local best confidence d = 0 3: for f ∈ F do 4: Initialize Ggf , Glf to ”ignored” labels 5: Compute P(x|θ) and S = arg maxx P(x|θ) 6: Compute set R of connected components in S 7: for Rk ∈ R do 8: if S (i) < W, i ∈ Rk then continue 9: if C(Rk ) > to then Set Ggf (i) = S (i), ∀i ∈ Rk 10: Set Glf (i) = S (i), ∀i ∈ Rk 11: Set Ggf (i) = Glf (i) = 0, ∀i, s.t.P(xi = bg|θ) > tb 12: if C(Ggf ) > 0 then 13: if |Tl | > τl then Tl .dequeue 14: Tl .enqueue(Ggf ) 15: if C(Glf ) > d then 16: Update t = f and d = C(Glf ) 17: if f mod τ s = 0 then 18: if Ggt < Tl then 19: if |T s | > τ s then T s .dequeue 20: T s .enqueue(Glt ) 21: Initialize d = 0 22: if f mod τb = 0 then 23: Finetune DCNN model θ to θ0 using T s ∪ Tl 24: Set θ ← θ0 latter; i.e., the batch algorithm makes its decision after processing the whole video. However, videos may exist in which the online algorithm shows better results for certain local frames. Thus we can combine the two results to improve the motionconsistency of segmentation by incorporating dense optical flow. We cast the combination as the problem of selecting the best model in every frame as follows: let m f ∈ {S bf , S of }, ∀ f be a variable that selects a labeled result between batch S bf and online S of , and c(m f , m f +1 ) measure a consistency between two consecutive labeled frames. We can formulate the motionconsistent model selection problem as argmax m X c(m f , m f +1 ), f where m = {m1 , m2 , ..., m|F | } is the set of selected models. We measure the consistency c(m f , m f +1 ) by the overlap o(m f , m f +1 ) of object regions between consecutive labeled frames warped by following dense optical flow (Farnebäck, 2003) (Fig. 3). Because the optical flow can be noisy we give a small preference  for the transition from batch to batch result. That is,   o(m f , m f +1 ) +  if m f = S bf     ∧ m f +1 = S bf +1 c(m f , m f +1 ) =      o(m f , m f +1 ) otherwise. Note that this problem can be easily solved using dynamic programming. and maintain two sets: Tl and T s of frames instead of G; Tl maintains τl globally-CE frames and T s maintains τ s locallyCE frames separately. Tl is implemented as a priority queue to collect globally-CE frames; T s is a basic queue to deal with local variations. After collecting two sets of frames for a certain period τb , we use both Tl and T s as the self-adapting dataset to update the parameters of the model θ. We iterate those procedures until the end of the video. The detailed procedures are described in Algorithm 2. Note that the first 11 lines in the algorithm are the same as the batch procedures. 3.3. Motion-Consistent Combination The batch algorithm generally works better than the online algorithm, because the former uses global update with larger pool of CE frames and has longer-range dependency than the 3.4. Unsupervised Video We briefly mention our method for processing an unsupervised video. Our framework can be easily applied to unsupervised videos by bypassing line 8 in Algorithm 1. This deletion means that we do not care whether the class actually appears in the video, thus we set all the labels of CE regions even if the labels are incorrect. We found that most of the videos processed in this way show similar results to those of weakly-supervised video, because the labels of pixels determined with very high probability usually correspond to the correct labels. Nevertheless, a few exceptions that correspond to incorrect labels occur, which can degrade the model and decrease the accuracy compared with the weakly-supervised setting. 5 Table 1. Intersection-over-union overlap on Youtube-Object-Dataset 2014 (Jain and Grauman, 2014) Base-context Base-front-end SCF (Jain and Grauman, 2014) Our-Unsupv-batch Our-Weak-on Our-Weak-batch Our-Weak-comb Our-Unsupv-CRF Our-Weak-on-CRF Our-Weak-batch-CRF Our-Weak-comb-CRF Aero 0.808 0.828 0.863 0.829 0.819 0.830 0.830 0.844 0.837 0.844 0.844 Bird 0.642 0.725 0.810 0.783 0.774 0.788 0.788 0.808 0.794 0.810 0.810 Boat 0.627 0.657 0.686 0.699 0.686 0.708 0.710 0.710 0.690 0.723 0.725 Car 0.746 0.797 0.694 0.812 0.791 0.817 0.817 0.822 0.797 0.827 0.827 3.5. Post-processing Because the output of DCNN is insufficient to exactly delineate the object, we use the fully-connected CRF (Koltun, 2011). We simply use the output of DCNN for the unary term and use colors and positions of pixels for the computation of pairwise terms as Chen et al. (2014) did. Finally, we refine the label map through morphological operations (i.e., dilation and erosion). 4. Experiments 4.1. Implementation details We tested the ‘front-end’ and ‘context’ DCNN models pretrained in Yu and Koltun (2015) and observed that the front-end model shows better results than the context model under our setting on Youtube-Object-Dataset (Table 1). Thus we used the front-end model as our baseline model θ. The front-end model is a modified version of the VGG-16 network (Simonyan and Zisserman, 2014) and is extended for dense prediction. In practice, we resize each frame such that its long side is 500 pixels, then pad the frame by reflecting it about each image boundary to be 900×900 pixels. We use threshold values to = 0.75 and tb = 0.8; the value for background is set slightly higher than for foreground to leave room for additional foreground pixels (e.g., pixels around objects). We set the local period τb = 30 for both algorithms and τl = 10, τ s = 5 for our online algorithm, and the small preference  = 0.02 for the motion-consistent combination. For model update, we fine-tuned all the layers with dropout ratio of 0.5 for the last two layers and iterated for the number of frames in the self-adapting dataset with batch size of 1. We set the learning rate to 0.001, momentum to 0.9, and weight decay to 0.0005. Due to the lack of a validation dataset, we use the fixed CRF parameters used in (Noh et al., 2015) during post-processing. Our implementation is based on the Caffe library (Jia et al., 2014) equipped with an Nvidia GTX Titan X GPU. 4.2. Evaluation We evaluate the proposed method on the Youtube-ObjectDataset (Jain and Grauman, 2014; Zhang et al., 2015) that contains subset of classes in the PASCAL VOC 2012 segmentation dataset, on which the baseline model is pre-trained. The Cat 0.622 0.616 0.589 0.688 0.676 0.688 0.713 0.696 0.694 0.698 0.722 Cow 0.646 0.646 0.686 0.675 0.680 0.685 0.696 0.688 0.690 0.700 0.709 Dog 0.670 0.671 0.618 0.701 0.710 0.732 0.732 0.717 0.726 0.745 0.745 Horse 0.414 0.462 0.540 0.505 0.540 0.589 0.595 0.514 0.553 0.610 0.611 Motor 0.570 0.674 0.609 0.705 0.693 0.711 0.711 0.714 0.704 0.722 0.722 Train 0.607 0.624 0.663 0.702 0.679 0.718 0.718 0.702 0.673 0.729 0.729 Avg. 0.635 0.670 0.672 0.710 0.705 0.727 0.731 0.722 0.716 0.741 0.744 Youtube-Object-Dataset was originally constructed by Prest et al. (2012). Jain and Grauman (2014) annotated pixel-level ground truth for every 10-th frame for the first shot of each video. The dataset consists of 126 videos with 10 object classes. Due to inconsistent numbers of annotations, Zhang et al. (2015) modified the dataset by resampling 100 frames (sampled every other frame) for each video and annotating missed frames for one in every 10 frames. We use those two versions of dataset to compare with the two existing methods respectively. We use the intersection-over-union overlap to measure the accuracy. The results on the dataset used in (Jain and Grauman, 2014) are shown in Table 1. We first report the accuracies of two baseline DCNN models proposed in (Yu and Koltun, 2015) denoted by Base-front-end and Base-context in the table. Note that the Base-front-end model (Yu and Koltun, 2015) showed higher accuracy (0.670) for the dataset under our setting than did the Base-context model (0.635), which attaches several context layers to the front-end model. It is interesting that the front-end model applied to each frame of unsupervised videos showed almost the same average accuracy as the results of SCF (Jain and Grauman, 2014), which is built based on semi-supervised video. Our method with weak-supervision (Our-Weak-comb-CRF) further improved the accuracy to 0.744, which exceeds that of SCF (average 0.672). Our online algorithm under weaksupervision (Our-Weak-on) improved the accuracy by 3.5% and the batch algorithm (Our-Weak-batch) improved it by 5.7% which is better than the online algorithm due to the global update. Note that our motion-consistent combination (Our-Weakcomb) achieved small improvement on a few classes by selecting results that are more motion-consistent, which shows temporally consistent video segmentation result. The great improvement of our model over the baseline model mostly originates from the correction of confusing parts of frames by the newly-updated model based on CE frames. Some representative results of ours are shown in Figure 41 . We also report our results without any supervision (Our-Unsupv-batch) explained in Sec 3.4 to show the efficiency of our method. It achieved slightly lower accuracy (0.710) than the algorithm with weak1 More video results and the datasets we used are available at the project webpage: https://seongjinpark.github.io/AdaptNet/ 6 Table 2. Intersection-over-union overlap on Youtube-Object-Dataset 2015 (Zhang et al., 2015) (Zhang et al., 2015) Base-front-end Our-Unsupv-batch Our-Weak-on Our-Weak-batch Our-Weak-comb Our-Unsupv-CRF Our-Weak-on-CRF Our-Weak–batch-CRF Our-Weak-comb-CRF Aero 0.758 0.786 0.791 0.795 0.794 0.794 0.808 0.813 0.809 0.809 Bird 0.608 0.727 0.766 0.773 0.786 0.786 0.791 0.796 0.809 0.807 Boat 0.437 0.632 0.681 0.665 0.685 0.684 0.695 0.672 0.699 0.698 Car 0.711 0.866 0.876 0.883 0.870 0.870 0.879 0.884 0.870 0.870 supervision, but had 3.8% higher average accuracy than SCF. We report only the batch algorithm for unsupervised videos because the online algorithm is more vulnerable than the batch algorithm to incorrect labels, especially for the short videos that the dataset includes. Post-processing increased the accuracy by about 1.1 ∼ 1.4%. Our result achieved state-of-the-art overlap accuracy for all classes except ‘aeroplane’. We observed that the slightly inferior accuracy on this class occurs mainly because our method gives less accurate object boundary for the class. This problem occurs because we used the same CRF parameters for all classes as we could not cross-validate the parameters for each class, whereas SCF is given manual delineation of the object in the first frame. In Table 2, we also report our results on the dataset used in Zhang et al. (2015) to compare with the framework that uses models pre-trained on images to segment weaklysupervised video. Zhang et al. (2015) constructed the dataset (Youtube-Object-Dataset 2015) by modifying the YoutubeObject-Dataset 2014. Because neither the dataset nor source code is provided by the authors, we manually built the dataset by following the procedures explained in the paper. Our results in Table 2 show tendencies similar to those in Table 1, from the online to the combined model that greatly improves the baseline model. In this analysis the difference between the accuracies of our model and that of existing method was much larger than in Table 1 because Zhang et al. (2015) used a conventional object detector on weakly-supervised video, whereas we use a semantic segmentation model based on DCNN. 4.3. Limitation The limitation of our method occurs when a video does not meet our assumption that at least one frame has a correct label or that at least one object region that corresponds to the pretrained object classes is estimated. Such cases mostly occur due to very small size of objects in an image. The absence of a frame to improve the other frames yields the same result as the baseline model. We plan to consider these problems in our future work. 5. Conclusion We proposed a novel framework for video semantic object segmentation that adapts the pre-trained DCNN model to the Cat 0.465 0.583 0.679 0.641 0.667 0.668 0.683 0.643 0.674 0.675 Cow 0.546 0.657 0.711 0.691 0.738 0.738 0.729 0.702 0.756 0.756 Dog 0.555 0.632 0.656 0.684 0.734 0.737 0.669 0.703 0.751 0.754 Horse 0.549 0.403 0.432 0.488 0.567 0.580 0.441 0.507 0.580 0.595 Motor 0.424 0.635 0.689 0.658 0.694 0.694 0.690 0.671 0.695 0.695 Train 0.358 0.626 0.650 0.652 0.672 0.673 0.651 0.631 0.651 0.645 Avg. 0.541 0.655 0.693 0.693 0.721 0.722 0.704 0.702 0.729 0.730 input video. To fine-tune the extensively-trained model to be video-specific, we constructed a self-adapting dataset that consists of several frames that help to improve the results of the UE frames. In experiments the proposed method improved the results by using the fine-tuned model to re-estimate the misclassified parts. It also achieved state-of-the-art accuracy by a large margin. We plan to extend the framework for semi-supervised video to increase the accuracy. We also expect that the efficient self-adapting framework can be applicable to generate a huge accurately-labeled video dataset, and thus be used to progress image semantic segmentation. References Ali, K., Hasler, D., Fleuret, F., 2011. Flowboostappearance learning from sparsely annotated video, in: Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, IEEE. pp. 1433–1440. Badrinarayanan, V., Galasso, F., Cipolla, R., 2010. Label propagation in video sequences, in: Computer Vision and Pattern Recognition (CVPR), 2010 IEEE Conference on, IEEE. pp. 3265–3272. Chen, L.C., Papandreou, G., Kokkinos, I., Murphy, K., Yuille, A.L., 2014. Semantic image segmentation with deep convolutional nets and fully connected crfs. arXiv preprint arXiv:1412.7062 . Farnebäck, G., 2003. Two-frame motion estimation based on polynomial expansion, in: Scandinavian conference on Image analysis, Springer. pp. 363– 370. Fathi, A., Balcan, M.F., Ren, X., Rehg, J.M., 2011. Combining self training and active learning for video segmentation, in: Eds. Jesse Hoey, Stephen McKenna and Emanuele Trucco, In Proceedings of the British Machine Vision Conference (BMVC 2011), pp. 78–1. Hartmann, G., Grundmann, M., Hoffman, J., Tsai, D., Kwatra, V., Madani, O., Vijayanarasimhan, S., Essa, I., Rehg, J., Sukthankar, R., 2012. Weakly supervised learning of object segmentations from web-scale video, in: Computer Vision–ECCV 2012. Workshops and Demonstrations, Springer. pp. 198–208. He, K., Zhang, X., Ren, S., Sun, J., 2015. Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385 . Jain, S.D., Grauman, K., 2014. Supervoxel-consistent foreground propagation in video, in: Computer Vision–ECCV 2014. Springer, pp. 656–671. Jia, Y., Shelhamer, E., Donahue, J., Karayev, S., Long, J., Girshick, R., Guadarrama, S., Darrell, T., 2014. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093 . Kalogeiton, V., Ferrari, V., Schmid, C., 2015. Analysing domain shift factors between videos and images for object detection. arXiv preprint arXiv:1501.01186 . Koltun, V., 2011. Efficient inference in fully connected crfs with gaussian edge potentials. Adv. Neural Inf. Process. Syst . Krizhevsky, A., Sutskever, I., Hinton, G.E., 2012. Imagenet classification with deep convolutional neural networks, in: Advances in neural information processing systems, pp. 1097–1105. 7 Aeroplane Bird Boat Car Cat Cow Dog Horse Motorbike Train Fig. 4. Representative results of proposed method compared with baseline model. The results of Top: Base-front-end, Middle: Our-Weak-comb, Bottom: Our-Weak-comb-CRF. Semantic labels are overlaid on images with different colors corresponding to different class labels. We only highlight the boundary of correct class. Best viewed in color. Ladickỳ, L., Sturgess, P., Alahari, K., Russell, C., Torr, P.H., 2010. What, where and how many? combining object detectors and crfs, in: European conference on computer vision, Springer. pp. 424–437. Lin, G., Shen, C., Reid, I., et al., 2015. Efficient piecewise training of deep structured models for semantic segmentation. arXiv preprint arXiv:1504.01013 . Liu, X., Tao, D., Song, M., Ruan, Y., Chen, C., Bu, J., 2014. Weakly supervised multiclass video segmentation, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 57–64. Liu, Z., Li, X., Luo, P., Loy, C.C., Tang, X., 2015. Semantic image segmentation via deep parsing network, in: Proceedings of the IEEE International Conference on Computer Vision, pp. 1377–1385. Long, J., Shelhamer, E., Darrell, T., 2015. Fully convolutional networks for semantic segmentation, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3431–3440. Nam, H., Han, B., 2015. Learning multi-domain convolutional neural networks for visual tracking. arXiv preprint arXiv:1510.07945 . Noh, H., Hong, S., Han, B., 2015. Learning deconvolution network for semantic segmentation, in: Proceedings of the IEEE International Conference on Computer Vision, pp. 1520–1528. Prest, A., Leistner, C., Civera, J., Schmid, C., Ferrari, V., 2012. Learning object class detectors from weakly annotated video, in: Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, IEEE. pp. 3282– 3289. Qi, X., Shi, J., Liu, S., Liao, R., Jia, J., 2015. Semantic segmentation with object clique potential, in: Proceedings of the IEEE International Conference on Computer Vision, pp. 2587–2595. Ramakanth, S.A., Babu, R.V., 2014. Seamseg: Video object segmentation using patch seams, in: Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on, IEEE. pp. 376–383. Russell, C., Kohli, P., Torr, P.H., et al., 2009. Associative hierarchical crfs for object class image segmentation, in: 2009 IEEE 12th International Conference on Computer Vision, IEEE. pp. 739–746. Simonyan, K., Zisserman, A., 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 . Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Erhan, D., Vanhoucke, V., Rabinovich, A., 2015. Going deeper with convolutions, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9. Tang, K., Sukthankar, R., Yagnik, J., Fei-Fei, L., 2013. Discriminative segment annotation in weakly labeled video, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2483–2490. Tsai, D., Flagg, M., Nakazawa, A., Rehg, J.M., 2012. Motion coherent tracking using multi-label mrf optimization. International journal of computer vision 100, 190–202. Yao, J., Fidler, S., Urtasun, R., 2012. Describing the scene as a whole: Joint object detection, scene classification and semantic segmentation, in: Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, IEEE. pp. 702–709. Yu, F., Koltun, V., 2015. Multi-scale context aggregation by dilated convolutions. arXiv preprint arXiv:1511.07122 . Zhang, Y., Chen, X., Li, J., Wang, C., Xia, C., 2015. Semantic object segmentation via detection in weakly labeled video, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 3641–3649. Zheng, S., Jayasumana, S., Romera-Paredes, B., Vineet, V., Su, Z., Du, D., Huang, C., Torr, P.H., 2015. Conditional random fields as recurrent neural networks, in: Proceedings of the IEEE International Conference on Computer Vision, pp. 1529–1537.
1cs.CV
Sufficient Markov Decision Processes with Alternating Deep Neural Networks Longshaokan Wang1 , Eric B. Laber1 , Katie Witkiewitz2 1 Department 2 Department of Statistics, North Carolina State University, Raleigh, NC, 27695, U.S.A. of Psychology, University of New Mexico, Albuquerque, NM, 87106, U.S.A. arXiv:1704.07531v2 [stat.ME] 17 Mar 2018 Abstract Advances in mobile computing technologies have made it possible to monitor and apply datadriven interventions across complex systems in real time. Recent and high-profile examples of data-driven decision making include autonomous vehicles, intelligent power grids, and precision medicine through mobile health. Markov decision processes are the primary mathematical model for sequential decision problems with a large or indefinite time horizon; existing methods for estimation and inference rely critically on the correctness of this model. Mathematically, this choice of model incurs little loss in generality as any decision process evolving in discrete time with observable process states, decisions, and outcomes can be represented as a Markov decision process. However, in some application domains, e.g., mobile health, choosing a representation of the underlying decision process that is both Markov and low-dimensional is non-trivial; current practice is to select a representation using domain expertise. We propose an automated method for constructing a low-dimensional representation of the original decision process for which: (P1) the Markov decision process model holds; and (P2) a decision strategy that leads to maximal mean utility when applied to the low-dimensional representation also leads to maximal mean utility when applied to population of interest. Our approach uses a novel deep neural network to define a class of potential process representations and then searches within this class for the representation of lowest dimension which satisfies (P1) and (P2). We illustrate the proposed method using a suite of simulation experiments and application to data from a mobile health intervention targeting smoking and heavy episodic drinking among college students. 1 Introduction Sequential decision problems arise in a wide range of application domains including autonomous vehicles (Bagnell and Schneider, 2001), finance (Bäuerle and Rieder, 2011), logistics (Zhang and Dietterich, 1995), robotics (Kober et al., 2013), power grids (Riedmiller et al., 2000), and healthcare (Chakraborty and Moodie, 2013). Markov decision processes (MDPs) (Bellman, 1957; Puterman, 2014) are the primary mathematical model for representing sequential decision problems with an indefinite time horizon (Bertsekas and Tsitsiklis, 1996; Sutton and Barto, 1998; Bather, 2000; Si, 2004; Powell, 2007; Wiering and Van Otterlo, 2012). This class of models is quite general as almost any decision process can be made into an MDP by concatenating data over multiple decision points (see Section 2 for a precise statement); however, coercing a decision process into the MDP framework in this way can lead to high-dimensional system state information that is difficult to model effectively. One common approach to construct a low-dimensional decision process from a high-dimensional MDP is to create a finite discretization of the space of possible system states and to treat the resultant process as a finite MDP (Gordon, 1995; Murao and Kitamura, 1997; Sutton and Barto, 1998; Kamio et al., 2004; Whiteson et al., 2007). However, such discretization can result in a significant loss of information and can be difficult to apply when the system state information is continuous and high-dimensional. Another common approach to dimension reduction is to construct a low-dimensional summary of the underlying system states, e.g., by applying principal components analysis (Jolliffe, 1986), multidimensional scaling (Borg and Groenen, 1997), or by constructing a local linear embedding (Roweis and Saul, 2000). These approaches can identify a low-dimensional representation of the system state but, as we shall demonstrate, they need not retain salient features for making good decisions. The preceding methods seek to construct a low-dimensional representation of a high-dimensional MDP with the goal of using the low-dimensional representation to estimate an optimal decision strategy, i.e., one that leads to maximal mean utility when applied to the original process; however, they offer no guarantee that the resulting process is an MDP or that a decision strategy estimated using data from the low-dimensional process will perform well when applied to the original process. We derive sufficient conditions under which a low-dimensional representation is an MDP, and that 1 an optimal decision strategy for this low-dimensional representation is optimal for the original process. We develop a hypothesis test for this sufficient condition based on the Brownian distance covariance (Székely et al., 2007; Székely and Rizzo, 2009) and use this test as the basis for selecting a low-dimensional representation within a class of deep neural networks. The proposed estimator can be viewed as a novel variant of deep neural networks for feature construction in MDPs. In Section 2, we review the MDP model for sequential decision making and define an optimal decision strategy. In Section 3, we derive conditions under which a low-dimensional representation of an MDP is sufficient for estimating an optimal decision strategy for the original process. In Section 4, we develop a new deep learning algorithm that is designed to produce low-dimensional representation that satisfies the proposed sufficiency condition. In Section 5, we evaluate the performance of the proposed method in a suite of simulated experiments. In Section 6, we illustrate the proposed method using data from a study of a mobile health intervention targeting smoking and heavy episodic drinking among college students (Witkiewitz et al., 2014). A discussion of future work is given in Section 7. 2 Setup and Notation We assume that the observed data are n on S1i , A1i , Ui1 , S2i , . . . , ATi , UiT , STi +1 independent and identically distributed copies of the trajectory which comprise n i=1 1 1 1 (S , A , U , S2 , . . . , AT , U T , ST +1 ) where: T ∈ N denotes the observation time; St ∈ Rpt denotes a summary of information collected up to time t = 1, . . . , T ; At ∈ A = {1, . . . , K} denotes the decision made at time t = 1, . . . , T ; and U t = U t (St , At , St+1 ) is a real-valued deterministic function of (St , At , St+1 ) that quantifies the momentary “goodness” of being in state St , making decision At , and subsequently transitioning to state St+1 . We assume throughout that supt |U t | ≤ M with probability one for some fixed constant M . In applications like mobile health, the observed data might be collected in a pilot study with a preset time horizon T (Maahs et al., 2012; Witkiewitz et al., 2014); however, the intent is to use these data to estimate an intervention strategy that will maximize some measure of cumulative utility when applied over an indefinite time horizon (Ertefaie, 2014; Liao et al., 2015; Luckett et al., 2016). Thus, we assume that (S1 , A1 , U 1 , S2 , . . . , AT , U T , ST +1 ) comprises the first 2 T observations of the process (S1 , A1 , U 1 , S2 , . . .). Furthermore, we assume (A0) that this infinite process is Markov and homogeneous in that it satisfies  P t+1 S ∈G t+1 t t 1 A ,S ,...,A ,S 1    t+1 t+1 t t =P S ∈G A ,S , (1) for all (measurable) subsets G t+1 ⊆ dom St+1 and t ∈ N and that the probability measure in (1) e t = (St , At−1 , . . . , St−mt ), does not depend on t. For any process (S1 , A1 , S2 , . . .) one can define S   e 1 , At , S e t , . . . satisfies (A0); to see this, note that the result where mt is chosen so that process S holds trivially for mt = t − 1. Furthermore, by augmenting the state with a variable for time, i.e., defining the new state at time t to be (Set , t), one can ensure that the probability measure in (A0) does not depend on t. In practice, mt is typically chosen to be a constant, as letting the dimension of the state grow with time makes extrapolation beyond the observed time horizon, T , difficult. Thus, hereafter we assume that the domain of the state is constant over time, i.e., dom St = S ⊆ Rp for all t ∈ N. Furthermore, we assume that the utility is homogeneous in time, i.e., U t = U (St , At , St+1 ) for all t ∈ N. A decision strategy, π : S → A, is a map from states to decisions so that, under π, a decision maker presented with St = st at time t will select decision π(st ). We define an optimal decision strategy using the language of potential outcomes (Rubin, 1978). We use an overline to denote history so that at = (a1 , . . . , at ) and st = (s1 , . . . , st ). The set of potential outcomes is O∗ =  ∗t t−1 S (a ) t≥1 where S∗t (at−1 ) is the potential state under at−1 and we have defined S∗1 (a0 ) = S1 .  Thus, the potential utility at time t under at is U S∗t (at−1 ), at , S∗(t+1) (at ) . The potential state P Q under a decision strategy, π, is S∗t (π) = at−1 S∗t (at−1 ) t−1 v=1 1π{S∗v (av−1 )}=av , and the potential    utility under π is U ∗t (π) = U S∗t (π), π S∗t (π) , S∗(t+1) (π) . Define the discounted mean utility under a decision strategy, π, as V (π) = E  X  t≥1   γ t−1 U ∗t (π) ,  where γ ∈ (0, 1) is a discount factor that balances the trade-off between immediate and long-term utility. Given a class of decision strategies, Π, an optimal decision strategy, π opt ∈ Π, satisfies 3 V (π opt ) ≥ V (π) for all π ∈ Π.   t t−1 = at−1 . To characterize π opt in terms of Define µt (at ; st , at−1 ) = P At = at S = st , A the data-generating model, we make the following assumptions for all t ∈ N: (C1) consistency, St = S∗t (A t−1 t ); (C2) positivity, there exists  > 0 such that µt (at ; S , A t t−1 one for all at ∈ A; and (C3) sequential ignorability, O∗ ⊥ At S , A t−1 ) ≥  with probability . These assumptions are standard in data-driven decision making (Robins, 2004; Schulte et al., 2014). Assumptions (C2) and (C3) hold by design in a randomized trial (Liao et al., 2015; Klasnja et al., 2015) but are not verifiable in the data for observational studies. Under these assumptions, the joint distribution  T of S∗t (π) t=1 is non-parametrically identifiable under the data-generating model for any decision strategy π and time horizon T . In our application, these assumptions will enable us to construct low-dimensional features of the state that retain all relevant information for estimating π opt without having to solve the original MDP as an intermediate step. 3 Sufficient Markov Decision Processes If the states St are high-dimensional it can be difficult to construct a high-quality estimator of the optimal decision strategy; furthermore, in applications like mobile health, storage and computational resources on the mobile device are limited, making it desirable to store only as much information as is needed to inform decision making. For any map φ : S → Rq define Stφ = φ(St ). t t+1 t We say that φ induces a sufficient MDP for π opt if (A , Sφ , U ) contains all relevant information t t+1 in (A , S t , U ) about π opt . Given a policy πφ : dom Stφ → A define the potential utility under πφ as Uφ∗t (πφ ) = X t n  o Y U S∗t at−1 , at , S∗(t+1) at 1πφ {S∗v (av−1 )}=av . at v=1 φ The following definition formalizes the notion of inducing a sufficient MDP. Definition 3.1. Let Π ⊆ AS denote a class of decision strategies defined on S and Πφ ⊆ ASφ a class of decision strategies defined on Sφ = dom Stφ ⊆ Rq . We say that the pair (φ, Πφ ) induces a sufficient MDP for π opt within Π if the following conditions hold for all t ∈ N: 4 t t+1 t (SM1) the process (A , Sφ , U ) is Markov and homogeneous, i.e.,     t t+1 t+1 t t+1 t t S , A = P S ∈ G S , A P St+1 ∈ G φ φ φ φ φ φ for any (measurable) subset Gφt+1 ⊆ Rq and this probability does not depend on t; (SM2) there exists π opt ∈ arg maxπ∈Π V (π) which can be written as π opt = πφopt ◦ φ, where πφopt ∈ nP o t−1 U ∗t (π ) . γ arg maxπφ ∈Πφ E φ t≥1 φ n on T +1 T T Thus, given observed data, (Si , Ai , Ui ) i=1 and class of decision strategies, Π, if one can find a pair (φ, Πφ ) which induces a sufficient MDP for π opt within Π, then it suffices to store only the n on T +1 T T Sφ,i , Ai , Ui reduced process . Furthermore, existing reinforcement learning algorithms i=1 (e.g., Sutton and Barto, 1998; Szepesvári, 2010) can be applied to this reduced process to construct an estimator of πφopt and hence π opt = πφopt ◦ φ. If the dimension of Stφ is substantially smaller than that of St , then using the reduced process can lead to smaller estimation error as well as reduced storage and computational costs. In some applications, it may also be desirable to have φ be a sparse function of St in the sense that it only depends on a subset of the components of St . For example, in the context of mobile health, one may construct the state, St , by concatenating measurements taken at time points t, t − 1, . . . , t − m, where the look-back period, m, is chosen conservatively based on clinical judgement to ensure that the process is Markov; however, a datadriven sparse feature map might identify that a look-back period of m0  m is sufficient thereby reducing computational and memory requirements but also generating new knowledge that may be of clinical value. The remainder of this section will focus on developing verifiable conditions for checking that (φ, Πφ ) induces a sufficient MDP. These conditions are used to build a data-driven, low-dimensional, and potentially sparse sufficient MDP.  | Define Yt+1 = U t , (St+1 )| for all t ∈ N. The following result provides a conditional independence criterion that ensures a given feature map induces a sufficient MDP; this criterion can be seen as an MDP analog of nonlinear sufficient dimension reduction in regression (Cook, 2007; Li et al., 2011). A proof is provided in the Supplemental Materials. Theorem 3.2. Let (S1 , A1 , U 1 , S2 , . . .) be an MDP that satisfies (A0) and (C1)-(C3). Suppose 5 that there exists φ : S → Rq such that Yt+1 ⊥ ⊥ St Stφ , At , (2) then, (φ, Πφ,msbl ) induces a sufficient MDP for π opt within Πmsbl , where Πmsbl is the set of measurable maps from S into A and Πφ,msbl is the set of measurable maps from Rq into A. The preceding result could be used to construct an estimator for φ so that (φ, Πφ,msbl ) induces a sufficient MDP for π opt within Πmsbl as follows. Let Φ denote a potential class of vector-valued functions on S. Let pbn (φ) denote a p-value for a test of the conditional independence criterion (2) based on the mapping φ, e.g., one might construct this p-value using conditional Brownian distance correlation (Wang et al., 2015) or kernel-based tests of conditional independence (Fukumizu et al., 2007). Then, one could select φbn to be the transformation of lowest dimension among those within n o the set φ ∈ Φ : dbn (φ) ≥ τ , where τ is a fixed significance level, e.g., τ = 0.10. However, such an approach can be computationally burdensome especially if the class Φ is large. Instead, we will develop a procedure based on a series of unconditional tests that is computationally simpler and allows for a flexible class of potential transformations. Before presenting this approach, we first describe how the conditional independence criterion in the above theorem can be applied recursively to potentially produce a sufficient MDP of lower dimension. The condition Yt+1 ⊥ ⊥ St Stφ , At is overly stringent in that it requires Stφ to capture all the information about Yt+1 contained within St regardless of whether or not that information is useful for decision making. However, given a sufficient MDP (S1φ , A1 , U 1 , S2φ , . . .), one can apply the above theorem to this MDP to obtain further dimension reduction; this process can be iterated until no n  | o| further dimension reduction is possible. For any map φ : S → Rq , define Ytφ = U t , St+1 . φ The following result is proved in the Supplemental Materials. Corollary 3.3. Let (S1 , A1 , U 1 , S2 , . . .) be an MDP that satisfies (A0) and (C1)-(C3). Assume that there exists φ0 : S → Rq0 such that (φ0 , Πφ0 ,msrbl ) induces a sufficient MDP for π opt within 6 Πmsrbl . Suppose that there exists φ1 : Rq0 → Rq1 such that for all t ∈ N Yt+1 ⊥ Stφ0 Stφ1 ◦φ0 , At , φ0 ⊥ (3) then (φ1 ◦φ0 , Πφ1 ◦φ0 ,msrbl ) induces a sufficient MDP for π opt within Πmsrbl . Furthermore, for k ≥ 2, ⊥ ⊥ Stφ denoting φk ◦ φk−1 ◦ · · · ◦ φ0 as φk , if there exists φk : Rqk−1 → Rqk such that Yt+1 φ k−1 then (φk , Πφ k ,msrbl ) induces a sufficient MDP for π opt k−1 Sφt , At , k within Πmsrbl . We now state a simple condition involving the residuals of a multivariate regression that can be used to test the conditional independence required in each step of the preceding corollary. In our implemenation we use residuals from a varient of deep neural networks that is suited to sequential decision problems (see Section 4). The following result is proved in the Supplemental Materials. Lemma 3.4. Let (S1 , A1 , U 1 , S2 , . . .) be an MDP that satisfies (A0) and (C1)-(C3). Suppose that there exists φ : S → Rq such that at least one of the following conditions hold: (i) o n  ⊥ ⊥ St At , Yt+1 − E Yt+1 Stφ , At (ii)  o  n  ⊥ ⊥ Yt+1 , Stφ At , St − E St Stφ then Yt+1 ⊥ ⊥ St Stφ , At . The preceding result can be used to verify the conditional independence condition required by Theorem (3.2) and Corollary (3.3) using unconditional tests of independence within levels of At ; in our simulation experiments, we used Brownian distance covariance for continuous states (Székely et al., 2007; Székely and Rizzo, 2009) and a likelihood ratio test for discrete states, though other choices are possible (Gretton et al., 2005a,b). Application of these tests requires modification to account for dependence over time within each subject. One simple approach, the one we follow here, is to compute a separate test at each time point and then to pool the resultant p-values using a pooling procedure that allows for general dependence. For example, let Gt = g(St , At , St+1 ) ∈ Rd1 and H t = h(St ) ∈ Rd2 be known features of (St , At , St+1 ) and St . Let Pn denote the empirical 7 measure. To test Gt ⊥ ⊥ H t using the Brownian distance covariance, we compute the test statistic     b t = ||Pn exp i ς | Gt + %| Ht − Pn exp iς | Gt Pn exp i%| Gt ||2 T n ω     Z Pn exp i ς | Gt + %| Ht  − Pn exp iς | Gt  Pn exp i%| H t 2 Γ 1+d1 Γ 1+d2 2 2 d%dς, = (d +d +2)/2 d +1 d +1 ||ς|| 1 ||%|| 2 π 1 2 b n as estimated with and subsequently compute the p-value, say pbtn , using the null distribution of T permutation (see Székely et al., 2007; Székely and Rizzo, 2009, for details). For each u = 1, . . . , T , let (u) (u) pbn denote the uth order statistic of pb1n , . . . , pbTn and define the pooled p-value pbun,pooled = T pbn /u. For each u = 1, . . . , T it can be shown that pbun,pooled is valid p-value (Rüger, 1978), e.g., u = 1 corresponds to the common Bonferroni correction. In our simulation experiments, we set u = bT /20 + 1c across all settings. 3.1 Variable screening The preceding results provide a pathway for constructing sufficient MDPs. However, while the criteria given in Theorem 3.2 and Lemma 3.4 can be used to identify low-dimensional structure in the state, they cannot be used to eliminate certain simple types of noise variables. For example,  let Bt t≥1 denote a homogeneous Markov process that is independent of (S1 , A1 , U 1 , S2 . . .), and    e t = (St )| , (Bt )| | . Clearly, the e 1 , A1 , U 1 , S e 2 , . . . , where S consider the augmented process S  optimal policy for the augmented process does not depend on Bt t≥1 , yet, Yt+1 need not be e t given St . To remove variables of this type, we develop a simple conditionally independent of S screening procedure that can be applied prior to constructing nonlinear features as described in the next section. The proposed screening procedure is based on the following result which is proved in the Supplemental Materials. Theorem 3.5. Let (S1 , A1 , U 1 , S2 , . . .) be an MDP that satisfies (A0) and (C1)-(C3). Suppose that there exists φ : S → Rq such that Yt+1 ⊥ ⊥ St Stφ , At , φ 8 (4) then, (φ, Πφ,msbl ) induces a sufficient MDP for π opt within Πmsbl , where Πmsbl is the set of measurable maps from S into A and Πφ,msbl is the set of measurable maps from Rq into A. This result can be viewed as a stronger version of Theorem 3.2 in that the required conditional et) = independence condition is weaker; indeed, in the example stated above, it can be seen that φ(S St satisfies (4). However, because φ appears in both Yt+1 and Stφ , constructing nonlinear features φ using this criterion is more challenging as the residual-based conditions stated in Lemma 3.4 can no longer be applied. Nevertheless, this criterion turns out to be ideally suited to screening procedures wherein the functions φ : Rp → Rq are of the form φ(st )j = stkj for j = 1, . . . , q, where {k1 , . . . , kq } is a subset of {1, . . . , p}. n o For any subset J ⊆ {1, . . . , p}, define StJ = Sjt j∈J  and YtJ = U t , (StJ )| . Let J1 denote the smallest set of indices such that U t depends on St and St+1 only through StJ1 and St+1 J1 conditioned n o on At . For k ≥ 2, define Jk = 1 ≤ j ≤ p : Sjt ⊥ 6 ⊥ YtJk−1 At . Let K denote the smallest value for which JK−1 = JK , such a K must exist as Jk−1 ⊆ Jk for all k, and define φscreen (St ) = StJK . The following results shows that φscreen induces a sufficient MDP; furthermore, Corollary 3 shows that such screening can be applied before nonlinear feature construction without destroying sufficiency. Theorem 3.6. Let (S1 , A1 , U 1 , S2 , . . .) be an MDP that satisfies (A0) and (C1)-(C3), and let J1 , . . . , JK , φscreen be as defined above. Assume that for any two non-empty subsets, J, J 0 ⊆ {1, . . . , p}, t t 6 ⊥ Yt+1 At . Then, Yt+1 ⊥ St Stφscreen , At . if StJ ⊥ 6 ⊥ Yt+1 φscreen ⊥ J0 J 0 A then there exists j ∈ J such that Sj ⊥ The condition that joint dependence implies marginal dependence (or equivalently, marginal independence implies joint independence) ensures that screening one variable at a time will identify the entire collection of important variables; this condition could be weakened by considering sets of multiple variables at a time though at the expense of additional computational burden. Algorithm 1 gives a schematic for estimating φscreen using the Brownian distance covariance to test for dependence. The inner for-loop (lines 4-7) of the algorithm can be executed in parallel and thereby scaled to large domains. 9 Algorithm 1 Screening with Brownian Distance Covariance n on T +1 T T Input: p-value threshold τ ; max number of iterations Nmax ; data (Si , Ai , Ui ) ; set of all indices D = {1, 2, . . . , p = dim(St )}. t+1 1: Set J0 = ∅, and YJ = {U t } 0 2: for k = 1, . . . , Nmax do 3: Set Jk = Jk−1 4: for each j ∈ D \ Jk−1 do 5: Perform dCov test on Sjt and YJt+1 within levels of At k−1 6: if p-value ≤ τ then 7: Set Jk = Jk ∪ {j} 8: if Jk = Jk−1 then 9: Set K = k, stop. Output: JK 4 i=1 Alternating Deep Neural Networks For simplicity, we assume that S = Rp . We consider summary functions φ : Rp → Rq that are representable as multi-layer neural networks (Anthony and Bartlett, 2009; LeCun et al., 2015; Goodfellow et al., 2016). Multi-layer neural networks have recently become a focal point in machine learning research because of their ability to identify complex and nonlinear structure in highdimensional data (see Goodfellow et al., 2016, and references therein). Thus, such models are ideally suited for nonlinear feature construction; here, we present a novel neural network architecture for estimating sufficient MDPs. We use criteria (i) in Lemma (3.4) to construct a data-driven summary function φ, therefore we also require a model for the regression of Yt+1 on Stφ and At ; we also use a multi-layer neural network for this predictive model. Thus, the model can be visualized as two multi-layer neural networks: one that composes the feature map φ and another that models the regression of Yt+1 on Stφ and At . A schematic for this model is displayed in Figure 1. Let Φ : R → [0, 1] denote a continuous and monotone increasing function and write Φ◦ to denote the vector-valued function obtained by elementwise application of Φ, i.e., Φ◦j (v) = Φ(vj ) where v ∈ Rd . The neural network for the feature map is parameterized as follows. Let r1 , . . . , rM1 ∈ N be such that r1 = p. The first layer of the feature map network is L1 (s; Σ1 , η1 ) = Φ◦ (Σ1 s + η1 ), where Σ1 ∈ Rr2 ×r1 and η1 ∈ Rr2 . 10 Recursively, for k = 2, . . . , M1 , define Lk (s; Σk , ηk , . . . , Σ1 , η1 ) = Φ◦ {Σk Lk−1 (s; Σk−1 , ηk−1 , . . . , Σ1 , η1 ) + ηk } , where Σk ∈ Rrk ×rk−1 and ηk ∈ Rk . Let θ1 = (ΣM1 , ηM1 , . . . , Σ1 , η1 ) then the feature map under θ is φ(s; θ1 ) = LM1 (s; θ1 ) = LM1 (s; ΣM1 , ηM1 , . . . , Σ1 , η1 ). Thus, the dimension of the feature map is rM1 . The neural network for the regression of Yt+1 on Stφ and At is as follows. Let rM1 +1 , . . . , rM1 +M2 ∈ N be such that rM1 +M2 = p + 1. For each a ∈ A define LM1 +1,a (s; θ1 , ΣM1 +1,a , ηM1 +1,a ) = Φ◦ {ΣM1 +1,a φ(s; θ1 ) + ηM1 ,a }, where ΣM1 +1,a ∈ RrM1 +1 ×rM1 and ηM1 ,a ∈ RrM1 +1 . Recursively, for k = 2, . . . , M2 and each a ∈ A define LM1 +k,a (s; θ1 , ΣM1 +k,a , ηM1 +k,a , . . . , ΣM1 +1,a , ηM1 +1,a ) = Φ◦ {ΣM1 +k,a LM1 +k−1,a (s; θ1 , ΣM1 +k−1,a , ηM1 +k−1,a , . . . , ΣM1 +1,a , ηM1 +1,a ) + ηM1 +k,a } , where ΣM1 +k,a ∈ RrM1 +k ×rM1 +k−1 and ηM1 +k ∈ RrM1 +k . For each a ∈ A, define θ2,a = (ΣM1 +M2 ,a , ηM1 +M2 ,a , . . . , ΣM1 +1,a , ηM1 +1,a ), and write θ2 = {θ2,a }a∈A . The postulated model for   E Yt+1 Stφ = stφ , At = at under parameters (θ1 , θ2 ) is LM1 +M1 (s; θ1 , θ2,at ). We use penalized least squares to construct an estimator of (θ1 , θ2 ). Let Pn denote the empirical measure and define Cnλ (θ1 , θ2 ) = Pn T X v r1 uX X u r2 t t+1 2 t ||LM1 +M2 (S ; θ1 , θ2,At ) − Y || + λ Σ21,`,j , t=1 j=1 `=1   λ ,θ λ bλ and subsequently θb1,n 2,n = arg minθ1 ,θ2 Cn (θ1 , θ2 ), where λ > 0 is a tuning parameter. The qP r2 2 term `=1 Σ1,`,j is a group-lasso penalty (Yuan and Lin, 2006) on the `th column of Σ1 ; if the `th column of Σ1 shrunk to zero then Stφ does not depend on the `th component of St . Computation of   λ ,θ bλ θb1,n 2,n also requires choosing values for λ, M1 , M2 , and r2 , . . . , rM1 −1 , rM1 +1 , . . . , rM1 +M2 −1 , (recall that r1 = p, rM1 +M2 = p + 1, and rM1 is the dimension of the feature map and is therefore considered separately). Tuning each of these parameters individually can be computationally burdensome, especially when M1 + M2 is large. In our implementation, we assumed 11 r2 = r3 = · · · = rM1 −1 = rM1 +1 = · · · = rM1 +M2 −1 = K1 and M1 = M2 = K2 ; then, for each fixed value of rM1 we selected (K1 , K2 , λ) to minimize cross-validated cost. Algorithm 2 shows the process for fitting this model; the algorithm uses subsampling to improve stability of the underlying sub-gradient descent updates (this is also known as taking minibatches, see Lab, 2014; Goodfellow et al., 2016, and references therein). Figure 1: Schematic for alternating deep neural network (ADNN) model. The term ‘alternating’ refers to the estimation algorithm which cycles over the networks for each treatment a ∈ A. To select the dimension of the feature map we choose the lowest dimension for which the Brownian distance covariance test of independence between Yt+1 − LM1 +M2 (St ; θb1,n , θb2,At ,n ) and St fails to reject at a pre-specified error level τ ∈ (0, 1). Let φb1n be the estimated feature map s 7→ n o b1 = j ∈ {1, . . . r1 } : Σ b 2 6= 0 for some ` ∈ {1, . . . , r2 } to be the elements of LM1 (s; θb1 ). Define R n 1,`,j n o St that dictate Stb1 ; write Stb1 as shorthand for Sjt . One may wish to iterate the foregoing 1 Rn φn b j∈R n estimation procedure as described in Corollary 3.3. However, because the components of Stb1 are φn each a potentially nonlinear combination of the elements of Stb1 , R therefore a sparse feature map n defined on the domain of Stb1 may not be any more sparse in terms of the original features. Thus, φn when iterating the feature map construction algorithm, we recommend using the reduced process n o T +1 T T n and the input; because the sigma-algebra generated by Stb1 contains the sigmaSRb1 ,i , Ai , Ui n Rn i=1 algebra generated by Stb1 , this does not incur any loss in generality. The above procedure can be φn 12 Algorithm 2 Alternating Deep Neural Networks Input: K1 , K2 ∈ N, λ ≥ 0; feature map dimension r1 ; data o n Tuning parameters T +1 T T n ; batch size proportion ν ∈ (0, 1); gradient-descent step-size {αb }b≥1 ; error Si , A i , U i i=1 1: 2: 3: 4: 5: (1) (1) tolerance  > 0; max number of iterations Nmax ; and initial parameter values θb1,n , θb2,n .  Set Da = (i, t) : Ati = a and na = #Da for each a ∈ A and t = 1, . . . , T for b = 1, . . . , Nmax do for each a ∈ A do Draw a random batch Ba of size bνna c without replacement from Da Compute a sub-gradient of the cost on batch Ba v   r2 r1 uX n o X X u 1 2 (b) (b) t  Λ(b) Σ21,`,j  LM1 +M2 Sti ; θb1,n , θb2,a,n − Yt+1 +λ a =∇ i bνna c j=1 (i,t)∈Ba 6: Compute a sub-gradient descent update     (b+1) (b) θb1,n θb1,n  =  + αb Λ(b) a (b+1) (b) θb θb 2,a,n 2,a,n (b+1) (b) Set θb2,a0 ,n = θb2,a0 ,n for all a0 6= a n o n o (b) (b) (b+1) (b+1) 8: If maxa Cnλ θb1,n , θb2,a,n − Cnλ θb1,n , θb2,a,n ≤  stop.     (b+1) (b+1) Output: θb1,n , θb2,n = θb1,n , θb2,n 7: 13 `=1 iterated until no further dimension reduction occurs. 5 Simulation Experiments We evaluate the finite sample performance of the proposed method (pre-screening with Brownian distance covariance + iterative alternating deep neural networks, which we will simply refer to as ADNN in this section) using a series of simulation experiments. To form a basis for comparison, we consider two alternative feature construction methods: (PCA) principal components analysis, so that the estimated feature map φbPCA (s) is the projection of s onto the first k principal components   P | of T −1 Tt=1 Pn St − Pn St St − Pn St ; and (tNN) a traditional sparse neural network, which can be seen as a special case of our proposed alternating deep neural network estimator where there is only 1 action. In our implementation of PCA, we choose the number of principal components, k, corresponding to 90% of variance explained. We do not compare with sparse PCA for variable selection, because based on preliminary runs, the principal components that explain 50% of variance already use all the variables in our generative model. In our implementation of tNN, we build a separate tNN for each a ∈ A, where (λ, K1 , K2 , r1 ) are tuned using cross-validation, and take the union of selected variables and constructed features. Note that there is no other obvious way to join the constructed features from tNN but to simply concatenate them, which will lead to inefficient dimension reduction especially when |A| is large, whereas we will see that ADNN provides a much more efficient way to aggregate the useful information across actions. We evaluate the quality of a feature map, φ, in terms of the marginal mean outcome under the o n T +1 T T n using Q-learning estimated optimal regime constructed from the reduced data Si , Ai , Ui i=1 with function approximation (Bertsekas and Tsitsiklis, 1996; Murphy, 2005); we use both linear function approximation and non-linear function approximation with neural networks. A description of Q-learning as well as these approximation architectures are described in the Supplemental Materials. 14 We consider data from the following class of generative models, as illustrated in Figure 2: S1 ∼ Normal64 (0, 0.25I64 ) ; A1 , . . . , AT ∼i.i.d. Bernoulli (0.5) ;  t+1 t+1 S4i−3 , S4i−2 ∼i.i.d. Normal (1 − At )g(Sit ), 0.01(1 − At ) + 0.25At ;  t+1 t+1 S4i−1 , S4i ∼i.i.d. Normal At g(Sit ), 0.01At + 0.25(1 − At ) ; U t ∼ Normal{(1 − At )[2{g(S1t ) + g(S2t )} − {g(S3t ) + g(S4t )}] + At [2{g(S3t ) + g(S4t )} − {g(S1t ) + g(S2t )}], 0.01}; for i = 1, 2, . . . , 16. Figure 2: Relationship between St and Yt+1 in the generative model, which depends on the action. First 16 variables determine the next state. First 4 variables determine the utility. The above class of models is indexed by g : R → R which we vary across the following maps: identity g(u) = u, truncated quadratic g(u) = min{u2 , 3}, and truncated exponential g(u) = min{exp(u), 3}, where the truncation is used to keep all variables of relatively the same scale across time points. Additionally, we add 3 types of noise variables, each taking up about 1 3 of total noises added: (i) dependent noise variables Djt , which are generated the same way as above except that they don’t affect the utility; (ii) white noises Wkt , which are sampled independently from Normal(0, 0.25) at each time point; and (iii) constants Clt , which are sampled independently from Normal(0, 0.25) at t = 1 and remain constant over time. More precisely, let m be the total number 15 of noise variables, then Dj1 , Wk1 , Cl1 ∼i.i.d. Normal (0, 0.25) ;  t+1 t+1 D4i−3 , D4i−2 ∼i.i.d. Normal (1 − At )g(Dit ), 0.01(1 − At ) + 0.25At ;  t+1 t+1 D4i−1 , D4i ∼i.i.d. Normal At g(Dit ), 0.01At + 0.25(1 − At ) ; Wkt ∼i.i.d. Normal (0, 0.25) ; Clt = Cl1 ; for j = 1, 2, . . . , bm/3c; k = 1, 2, . . . , dm/3e; l = 1, 2, . . . , dm/3e. It can be seen that the first 16 variables, the first 4 variables, and {g(S1t ), g(S2t ), g(S3t ) + g(S4t )}| all induce a sufficient MDP. the foregoing class of models is designed to evaluate the ability of the proposed method to identify low-dimensional and potentially nonlinear features of the state in the presence of action-dependent transitions and various noises. For each Monte Carlo replication, we sample n = 30 i.i.d. trajectories of length T = 90 from the above generative model. The results based on 500 Monte Carlo replications are reported in Table 1 - 3. In addition to reporting the marginal mean outcome under the policy estimated using Q-learning with both function approximations, we also report: (nVar) the number of selected variables; and (nDim) the dimension of the feature map. The table shows that (i) ADNN produces substantially smaller nVar and nDim compared with PCA or tNN in all cases; (ii) ADNN is robust to the 3 types of noises; (iii) when fed into the Q-learning algorithm, ADNN leads to considerably better marginal mean outcome than PCA and the original states under non-linear models; and (iv) ADNN is able to construct features suitable for Q-learning with linear function approximation even when the utility function and transition between states are non-linear. 6 Application to BASICS-Mobile We illustrate the proposed methedology using data on the effectiveness of BASICS-Mobile, a behavioral intervention delivered via mobile device, targeting heavy drinking and smoking among college students (Witkiewitz et al., 2014). Mobile interventions are appealing because of their 24-hour availability, anonymity, portability, increased compliance, and accurate data recording (Heron and 16 Model nNoise 0 linear 50 200 Feature map Linear Q NNQ nVar nDim st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) 3.36(0.012) 3.34(0.012) 3.21(0.018) 3.38(0.012) 3.34(0.012) 3.31(0.012) 3.31(0.012) 3.26(0.014) 3.32(0.012) 3.34(0.012) 2.17(0.016) 3.33(0.012) 3.29(0.013) 3.34(0.012) 3.33(0.013) 3.31(0.012) 3.31(0.013) 3.34(0.013) 3.30(0.012) 3.30(0.012) 3.27(0.012) 3.29(0.013) 3.32(0.013) 3.29(0.013) 3.28(0.013) 2.98(0.035) 3.31(0.013) 3.32(0.012) 3.27(0.013) 3.11(0.028) 64 4 4.1(0.01) 16.0(0.00) 64 114 4 5.6(0.08) 37.0(0.00) 114 264 4 10.2(0.12) 87.4(0.11) 264 64 4 3.1(0.02) 34.4(0.13) 50.0(0.00) 114 4 4.6(0.08) 86.0(0.19) 85.8(0.02) 264 4 7.5(0.09) 157.8(0.48) 166.0(0.02) Table 1: Comparison of feature map estimators under linear transition and different number of noise variables (nNoise) in terms of: marginal mean outcome using Q-learning with linear function approximation (Linear Q); Q-learning with neural network function approximation (NN Q); the number of selected variables (nVar); and the dimension of the feature map (nDim) Smyth, 2010). BASICS-Mobile enrolled 30 students and lasted for 14 days. On the afternoon and evening of each day, the student is asked to complete a list of self-report questions, and then either an informational module or a treatment module is provided. A treatment module contains 1-3 mobile phone screens of interactive content, such as comparing the student’s smoking level with the levels of their peers, or guiding the student to manage their smoking urges. A treatment module is generally more burdensome than an informational module, and may be less effective if, for example, the student’s stress level is high; furthermore, excessive treatment can cause habituation and disengagement from the intervention. An optimal intervention will assignment a treatment module if and when it is needed without diminishing engagement. In our original formulation of this decision problem as an MDP, the state comprises of 15 variables capturing baseline information, current answers to the self-report questions, a weekend indicator, age, past attempts to quit smoking, current smoking urge, and current stress level; the action is whether a treatment module gets assigned; the reward is the negative of the cigarettes 17 Model nNoise 0 quad 50 200 Feature map Linear Q NNQ nVar nDim st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) 3.08(0.062) 2.54(0.056) 6.63(0.038) 6.94(0.027) 2.97(0.064) 2.96(0.054) 2.58(0.057) 6.76(0.032) 6.98(0.031) 3.09(0.061) 1.28(0.030) 2.52(0.056) 6.87(0.034) 6.76(0.044) 3.09(0.062) 2.64(0.073) 6.75(0.046) 6.97(0.034) 6.54(0.068) 2.50(0.067) 1.69(0.064) 6.76(0.042) 6.99(0.030) 6.53(0.064) 2.00(0.067) 0.88(0.031) 6.68(0.050) 6.92(0.033) 6.03(0.075) 0.96(0.033) 64 4 4.1(0.02) 15.3(0.04) 64 114 4 6.4(0.06) 36.5(0.03) 114 264 4 14.3(0.14) 84.1(0.11) 264 64 4 2.4(0.04) 37.1(0.22) 51.2(0.02) 114 4 5.3(0.09) 88.3(0.22) 87.1(0.03) 264 4 12.5(0.23) 152.4(0.36) 167.4(0.03) Table 2: Comparison of feature map estimators under quadratic transition Model nNoise 0 exp 50 200 Feature map Linear Q NNQ nVar nDim st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) st (st1 , st2 , st3 , st4 )| φbADNN (st ) φbtNN (st ) φbPCA (st ) 8.73(0.008) 9.20(0.006) 9.30(0.018) 9.44(0.005) 9.10(0.016) 8.78(0.008) 9.19(0.006) 9.32(0.018) 9.43(0.005) 8.89(0.014) 8.71(0.008) 9.19(0.006) 9.37(0.016) 9.41(0.005) 8.66(0.014) 8.78(0.012) 9.43(0.004) 9.45(0.004) 9.29(0.009) 9.02(0.023) 8.77(0.012) 9.43(0.005) 9.43(0.005) 9.18(0.012) 8.99(0.020) 8.73(0.012) 9.44(0.004) 9.41(0.006) 9.06(0.016) 9.02(0.022) 64 4 4.3(0.13) 16.0(0.00) 64 114 4 5.4(0.03) 37.0(0.00) 114 264 4 7.8(0.09) 93.4(0.10) 264 64 4 2.4(0.13) 42.3(0.17) 14.2(0.018) 114 4 2.4(0.04) 81.5(0.28) 37.2(0.02) 264 4 3.3(0.12) 152.4(0.42) 91.4(0.02) Table 3: Comparison of feature map estimators under exponential transition smoked at the next time point; the goal is to find a strategy that minimizes cumulative cigarette rate. 18 Two students with large amounts of missing data are excluded. All other missing values are imputed with the fitted value from a local polynomial regression of the state variable on time t. We treat all the variables as ordinal, partitioning some of them (see the Supplemental Materials for a complete description). We estimate φbADNN (st ) wherein conditional independence is checked via condition (i) in Lemma 3.4. The dimension of φbADNN (st ) is set to be the smallest dimension for which φbADNN (st ) fails to reject this independence condition at level τ = 0.05; this procedure resulted in a feature of dimension six. To increase the interpretability of the constructed feature map, we constrained the dimension reduction network to have no hidden layers. Under this constraint, φbADNN (st ) is a linear transformation of st followed by application of Φ◦ which was set to be the arctangent function. A plot of the weights of the 15 original variables in the linear transformation for each component of the feature map is useful in interpreting the learned feature map; see Figure 3 for an example. weights for the 1st new variable weights for the 2nd new variable 0.5 0.0 0.0 −0.5 −0.5 −1.0 −1.0 −1.5 wkend age male past90Smk quitSmk baseCigs urge wouldSmk smkMood fixMind stress tired cigs drinks lastCigs wkend age male past90Smk quitSmk baseCigs urge wouldSmk smkMood fixMind stress tired cigs drinks lastCigs −1.5 Figure 3: Weights of the original variables in the first two components of the estimated feature map. We estimate the optimal strategy using Q-learning applied to the learned feature map. Comparing the estimated parameters for treatment and no treatment, while examining the plots of weights, we can give a sense of how the original variables impact the optimal treatment assignment. For instance, the 1st parameter in the Q-function for treatment is smaller than the one for no treatment, which suggests that the 1st new variable contributes to the decision to apply treatment by being 19 small, i.e., if it is the weekend and a student’s stress level is low then the estimated policy is more likely to provide treatment. This agrees with the intuition that a treatment module would be more effective when the student is not busy or stressed. Similarly, it can be seen that previous attempts to quit smoking is positively associated with providing treatment, with the possible explanation that individuals with prior quit attempts tend to be more severe and in need of frequent treatment. 7 Discussion Data-driven decision support systems are being deployed across a wide range of application domains including medicine, engineering, and business. MDPs provide the mathematical underpinning for most data-driven decision problems with an infinite or indefinite time horizon. While the MDP model is extremely general, choosing a parsimonious representation of a decision process that fits the MDP model is non-trivial. We introduced the notion of a feature map which induces a sufficient MDP and provided an estimator of such a feature map based on a variant of deep neural networks. There are several important ways in which this work can be extended; we mention two of the most pressing here. We considered estimation from a batch of i.i.d. replicates; however, in some applications it may be desirable to estimate a feature map online as data accumulate. In such cases, a data-driven, and hence evolving, feature map of the state will be stored complicating estimation. Furthermore, because the proposed algorithm sweeps through the observed data multiple times it is not suitable for real-time estimation. Another important extension is to states with complex data structures, e.g., images and text, such data are increasingly common in health, engineering, and security applications. Existing neural network architectures designed for such data (Krizhevsky et al., 2012; Dahl et al., 2012; Simonyan and Zisserman, 2014) could potentially be integrated into the proposed feature map construction algorithm. References Anthony, M. and Bartlett, P. L. Neural Network Learning: Theoretical Foundations. cambridge university press (2009). 20 Bagnell, J. A. and Schneider, J. G. “Autonomous helicopter control using reinforcement learning policy search methods.” In International Conference on Robotics and Automation, volume 2, 1615–1620. IEEE (2001). Bather, J. Decision theory: An Introduction to Dynamic Programming and Sequential Decisions. John Wiley & Sons (2000). Bäuerle, N. and Rieder, U. Markov Decision Processes with Applications to Finance. Springer Science & Business Media (2011). Bellman, R. “A Markovian decision process.” Technical report, DTIC Document (1957). Bengio, Y. “Learning deep architectures for AI.” Foundations and Trends in Machine Learning, 2(1):1–127 (2009). Bertsekas, D. and Tsitsiklis, J. Neuro-Dynamic Programming. Belmond, MA: Athena Scientific (1996). Bertsekas, D. P. Dynamic Programming and Optimal Control , volume 1. Athena Scientific Belmont, MA (1995). Borg, I. and Groenen, P. Modern Multidimensional Scaling: Theory and Applications. SpringerVerlag (1997). Bourlard, H. and Kamp, Y. “Auto-association by multilayer perceptrons and singular value decomposition.” Biological Cybernetics, (59):291–294 (1998). Bowling, M., Ghodsi, A., and Wilinson, D. “Action respecting embedding.” In ICML ’05: Proceedings of the 22nd International Conference on Machine Learning. New York, NY, USA: ACM (2005). Chakraborty, B. and Moodie, E. E. M. Statistical Methods for Dynamic Treatment Regimes. Springer (2013). Cook, R. D. “Fisher lecture: Dimension reduction in regression.” Statistical Science, 1–26 (2007). 21 Dahl, G. E., Yu, D., Deng, L., and Acero, A. “Context-dependent pre-trained deep neural networks for large-vocabulary speech recognition.” IEEE Transactions on Audio, Speech, and Language Processing, 20(1):30–42 (2012). Ertefaie, A. “Constructing Dynamic Treatment Regimes in Infinite-Horizon Settings.” arXiv preprint arXiv:1406.0764 (2014). Filar, J. and Vrieze, K. Competitive Markov Decision Process. Springer-Verlag (1997). Fukumizu, K., Gretton, A., Sun, X., and Schölkopf, B. “Kernel Measures of Conditional Dependence.” In NIPS , volume 20, 489–496 (2007). Goodfellow, I. J., Bengio, Y., and Courville, A. Deep Learning. MIT Press (2016). Gordon, G. “Stable function approximation in dynamic programming.” Technical Report CMUCS-95-103, Computer Science Department, Carnegie Mellon University (1995). Gretton, A., Bousquet, O., Smola, A., and Schölkopf, B. “Measuring statistical dependence with Hilbert-Schmidt norms.” In International conference on algorithmic learning theory, 63–77. Springer (2005a). Gretton, A., Herbrich, R., Smola, A., Bousquet, O., and Schölkopf, B. “Kernel methods for measuring independence.” Journal of Machine Learning Research, 6(Dec):2075–2129 (2005b). Hadsell, R., Chopra, S., and LeCun, Y. “Dimensionality reduction by learning an invariant mapping.” In Proceedings of CVPR ’06 . Washington, DC, USA: IEEE Computer Society (2006). Heron, K. E. and Smyth, J. M. “Ecological momentary interventions: Incorporating mobile technology into psychosocial and health behaviour treatments.” British Journal of Health Psychology, 15(Pt 1):1–39 (2010). Hinton, G. E. “A practical guide to training restricted Boltzmann machines.” UTML Tech Report 2010-003, University of Toronto (2010). Hinton, G. E. and Salakhutdinov, R. “Reducing the dimensionality of data with neural networks.” Science, 313(5786):504–507 (2006). 22 Jolliffe, T. Principal Component Analysis. Springer-Verlag (1986). Kaelbling, L. P., Littman, M. L., and Moore, A. W. “Reinforcement learning: A survey.” Journal of artificial intelligence research, 4:237–285 (1996). Kamio, T., Soga, S., Fujisaka, H., and Mitsubori, K. “An adaptive state space segmentation for reinforcement learning using fuzzy-ART neural network.” MWSCAS , 3 (2004). Klasnja, P., Hekler, E. B., Shiffman, S., Boruvka, A., Almirall, D., Tewari, A., and Murphy, S. A. “Microrandomized trials: An experimental design for developing just-in-time adaptive interventions.” Health Psychology, 34(S):1220 (2015). Kober, J., Bagnell, J. A., and Peters, J. “Reinforcement learning in robotics: A survey.” The International Journal of Robotics Research, 0278364913495721 (2013). Krizhevsky, A., Sutskever, I., and Hinton, G. E. “Imagenet classification with deep convolutional neural networks.” In Advances in neural information processing systems, 1097–1105 (2012). Lab, L. “Deep learning tutorial.” Technical report, University of Montreal (2014). LeCun, Y., Bengio, Y., and Hinton, G. “Deep learning.” Nature, (521):436–444 (2015). Li, B., Artemiou, A., and Li, L. “Principal support vector machines for linear and nonlinear sufficient dimension reduction.” The Annals of Statistics, 3182–3210 (2011). Liao, P., Klasnja, P., Tewari, A., and Murphy, S. A. “Sample size calculations for micro-randomized trials in mHealth.” Statistics in medicine (2015). Luckett, D. J., Laber, E. B., Kahkoska, A. R., Maahs, D. M., Mayer-Davis, E., and Kosorok, M. R. “Estimating dynamic treatment regimes in mobile health using V-learning.” arXiv preprint arXiv:1611.03531 (2016). Maahs, D. M., Mayer-Davis, E., Bishop, F. K., Wang, L., Mangan, M., and McMurray, R. G. “Outpatient assessment of determinants of glucose excursions in adolescents with type 1 diabetes: proof of concept.” Diabetes technology & therapeutics, 14(8):658–664 (2012). 23 Mahadevan, S. “Learning representations and control in Markov decision processes: New frontiers.” Foundations and Trends in Machine Learning, 1(4):403–565 (2008). Mnih, V., Kavukcuoglu, K., Silva, D., Rusu, A. A., Veness, J., Bellemare, M. G., Graves, A., Riedmiller, M., Fidjeland, A. K., Ostrovski, G., Petersen, S., Beattie, C., Sadik, A., Antonoglou, I., King, H., Kumaran, D., Wierstra, D., Legg, S., and Hassabis, D. “Human-level control through deep reinforcement learning.” Nature, (518):529–533 (2015). Murao, H. and Kitamura, S. “Q-Learning with adaptive state segmentation (QLASS).” In Proceedings of CIRA (1997). Murphy, S. A. “A generalization error for Q-learning.” Journal of Machine Learning Research, 6(Jul):1073–1097 (2005). Murphy, S. A., Deng, Y., Laber, E. B., Maei, H. R., Sutton, R., and Witkiewitz, K. “A batch, offpolicy actor-critic algorithm for optimizing the average reward.” eprint (2016). ArXiv:1607.05047 [stat.ML]. Nielsen, M. A. Neural Networks and Deep Learning. Determination Press (2015). Powell, W. B. Approximate Dynamic Programming: Solving the curses of dimensionality, volume 703. John Wiley & Sons (2007). Puterman, M. L. Markov Decision Processes: Discrete Stochastic Dynamic Programming. John Wiley & Sons (2014). Riedmiller, M., Moore, A., and Schneider, J. “Reinforcement learning for cooperating and communicating reactive agents in electrical power grids.” In Workshop on Balancing Reactivity and Social Deliberation in Multi-Agent Systems, 137–149. Springer (2000). Robins, J. M. “Optimal structural nested models for optimal sequential decisions.” In Proceedings of the second seattle Symposium in Biostatistics, 189–326. Springer (2004). Roweis, S. T. and Saul, L. K. “Nonlinear dimensionality reduction by locally linear embedding.” Science, (290):2323–2326 (2000). 24 Rubin, D. B. “Bayesian inference for causal effects: The role of randomization.” The Annals of statistics, 34–58 (1978). Rüger, B. “Das maximale Signifikanzniveau des Tests “Lehne H0 ab, wenn k under n gegebenen Tests zur Ablehnung führen.” Metrika, 25:171–178 (1978). Sardag, A. and Akin, H. L. “ARKAQ-Learning: Autonomous state space segmentation and policy generation.” ISCIS (2005). Schulte, P. J., Tsiatis, A. A., Laber, E. B., and Davidian, M. “Q-and A-learning methods for estimating optimal dynamic treatment regimes.” Statistical science: a review journal of the Institute of Mathematical Statistics, 29(4):640 (2014). Si, J. Handbook of Learning and Approximate Dynamic Programming, volume 2. John Wiley & Sons (2004). Simonyan, K. and Zisserman, A. “Very deep convolutional networks for large-scale image recognition.” arXiv preprint arXiv:1409.1556 (2014). Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., and Salakhutdinov, R. “Dropout: a simple way to prevent neural networks from overfitting.” Journal of Machine Learning Research, 15:1929–1958 (2014). Sutton, R. and Barto, A. Reinforcement Learning: An Introduction. MIT Press (1998). Sýkora, O. “State-space dimensionality reduction in Markov decision processes.” In WDS ’08 Proceedings of Contributed Papers, Part I, 165–170 (2008). Székely, G. and Rizzo, M. “Brownian distance covariance.” The Annals of Applied Statistics, 3:1236–1265 (2009). Székely, G., Rizzo, M., and Bakirov, N. “Measuring and testing dependence by correlation of distances.” The Annals of Statistics, 35(6):2769–2794 (2007). Szepesvári, C. “Algorithms for reinforcement learning.” Synthesis lectures on artificial intelligence and machine learning, 4(1):1–103 (2010). 25 Vincent, P., Larochelle, H., Lajoie, I., Bengio, Y., and Manzagol, P. A. “Stacked denoising autoencoders: learning useful representations in a deep network with a local denoising criterion.” Journal of Machine Learning Research, 11:3371–3408 (2010). Wang, X., Pan, W., Hu, W., Tian, Y., and Zhang, H. “Conditional distance correlation.” Journal of the American Statistical Association, 110(512) (2015). Whiteson, S., Taylor, M. E., and Stone, P. “Adaptive tile coding for value function approximation.” AI Technical Report AI-TR-07-339, University of Texas at Austin (2007). Wiering, M. and Van Otterlo, M. “Reinforcement learning: state-of-the-art.” Adaptation, Learning, and Optimization, 12 (2012). Witkiewitz, K., Desai, S. A., Bowen, S., Leigh, B. C., Kirouac, M., and Larimer, M. E. “Development and evaluation of a mobile intervention for heavy drinking and smoking among college students.” Psychology of Addictive Behaviors, 28(3):639–650 (2014). Yuan, M. and Lin, Y. “Model selection and estimation in regression with grouped variables.” Journal of the Royal Statistical Society: Series B (Statistical Methodology), 68(1):49–67 (2006). Zhang, W. and Dietterich, T. G. “A reinforcement learning approach to job-shop scheduling.” In IJCAI , volume 95, 1114–1120. Citeseer (1995). 8 Supplemental Materials Q-learning t Let (A , S t+1 t , U ) be an MDP. The value of a state-action pair under a policy π, referred to as the Q-function, is the discounted mean utility if the current state is s, current action is a, and nP o t−1 U ∗t (π)|S1 = s, A1 = a , where γ ∈ (0, 1) the agent follows π afterwards: Qπ (s, a) = E γ t≥1 is the discount factor. An optimal policy π opt yields the largest value for every state-action pair. Denote the corresponding Q-function as Qopt (s, a) = Qπ 26 opt (s, a) = max Qπ (s, a). If Qopt (s, a) is π known for all (s, a), then an optimal policy can be defined as π opt (s) = argmax Qopt (s, a). Qopt a∈A satisfies the Bellman Optimality Equations (BOE): opt Q  t (s, a) = E U + γ max Q 0 opt a ∈A (S t+1 0 t t  , a ) | S = s, A = a . In practice, one often cannot obtain Qopt by solving the above equations, because computing the right-hand-side requires the underlying model of the MDP, which is often unknown. Besides, solving a huge linear system can be costly. Q-learning is a stochastic optimization algorithm that doesn’t require knowing the transition model or solving a linear system. The update step for the classic Q-learning, Watkin’s Q-learning (Sutton and Barto, 1998), for finite state and action spaces, is as follows: Qk+1 (st , at ) ← Qk (st , at ) + α{ut + γ max Qk (st+1 , a) − Qk (st , at )}, a where α is the learning rate. If the state space is continuous, one may approximate Q(s, a) with a parametric function F (s, a; θ) and update the parameters instead: θ k+1 ← θ k + α{ut + γ max F (st+1 , a; θ k ) − F (st , at ; θ k )} · ∇θ F (st , at ; θ k ). a Proof of Theorem 3.2 t t+1 t Proof. First we show that the process (A , Sφ , U ) induced by (φ, Πφ,msbl ) satisfies (SM1). For any t ∈ N and measurable subset G ∈ Rq , t t P (St+1 ∈ Gφt+1 |Sφ , A ) φ t t t t t t = E{P (St+1 ∈ Gφt+1 |St , Sφ , A )|Sφ , A } φ = E{P (St+1 ∈ Gφt+1 |St , Stφ , At )|Sφ , A } (by Markov property of the original process) φ t t = E{P (St+1 ∈ Gφt+1 |Stφ , At )|Sφ , A } (by (2)) φ = P (St+1 ∈ Gφt+1 |Stφ , At ) φ 27 t t t t Also note that E{P (St+1 ∈ Gφt+1 |St , Sφ , A )|Sφ , A } does not depend on t by homogeneity of the φ original process. Thus the induced process is Markov and homogeneous. Next we show that the induced process satisfies (SM2). Let Qopt (s, a) be defined as before. Then we have Qopt (s, a) = E[U t + γ max Qopt (St+1 , a0 ) | St = s, At = a] 0 a (by BOE) = E[U t + γ max Qopt (St+1 , a0 ) | St = s, Stφ = sφ , At = a] 0 a = E[U t + γ max Qopt (St+1 , a0 ) | Stφ = sφ , At = a] 0 a = Qopt φ (sφ , a), (by (2)) and opt π opt (s) = argmax Qopt (s, a) = argmax Qopt φ (sφ , a) = πφ (sφ ). a a Proof of Corollary 3.3 Proof. By assumption (φ0 , Πφ0 ,msrbl ) induces a sufficient MDP for π opt within Πmsrbl , then by t t+1 t ◦ φ0 . definition the process (A , Sφ0 , U ) is Markov and homogeneous, and there exists π opt = πφopt 0 Define φk = φk ◦ · · · ◦ φ0 . By (3) and Theorem 3.2, (φ1 , Πφ1 ,msrbl ) induces a sufficient MDP for t t πφopt within Πφ0 ,msrbl . Then the process (A , Sφ , U ) is Markov and homogeneous, and there exists 0 1 ◦ φ0 = πφopt ◦ φ1 . Therefore (φ1 , Πφ πφopt = πφopt ◦ φ1 . Thus π opt = πφopt 0 0 1 1 MDP for π opt within Πmsrbl . Proof of Lemma 3.4 Proof. We show that (i) ⇒ Yt+1 ⊥ ⊥ St |Stφ , At : {Yt+1 − E(Yt+1 |Stφ , At )} ⊥ ⊥ St |At ⇒{Yt+1 − E(Yt+1 |Stφ , At )} ⊥ ⊥ (St , Stφ )|At ⇒{Yt+1 − E(Yt+1 |Stφ , At )} ⊥ ⊥ St |Stφ , At ⇒Yt+1 ⊥ ⊥ St |Stφ , At . 28 1 ,msrbl ) induces a sufficient The 1st implication follows from the fact that Stφ is a transformation of St . The 2nd implication follows from the fact that X ⊥ ⊥ Y, Z ⇒ f (X|Y, Z) = f (X) = f (X|Z) ⇒ X ⊥ ⊥ Y |Z for random variables X, Y, and Z. The 3rd implication follows from the fact that E(Yt+1 |Stφ , At ) is constant conditional on Stφ and At . Similarly, one can show that (ii) ⇒ Yt+1 ⊥ ⊥ St |Stφ , At . Proof of Theorem 3.5 t t+1 t Proof. First we show that the process (A , Sφ , U ) induced by (φ, Πφ,msbl ) satisfies (SM1). For any t ∈ N and measurable subset G ∈ Rq , t t ∈ Gφt+1 |Sφ , A ) P (St+1 φ t t t t t t = E{P (St+1 ∈ Gφt+1 |St , Sφ , A )|Sφ , A } φ = E{P (St+1 ∈ Gφt+1 |St , Stφ , At )|Sφ , A } (by Markov property of the original process) φ t t ∈ Gφt+1 |Stφ , At )|Sφ , A } (by (4)) = E{P (St+1 φ = P (St+1 ∈ Gφt+1 |Stφ , At ) φ t t t t ∈ Gφt+1 |St , Sφ , A )|Sφ , A } does not depend on t by homogeneity of the Also note that E{P (St+1 φ original process. Thus the induced process is Markov and homogeneous. Next we show that the induced process satisfies (SM2). Define Qopt,1 (st , at ) :=E{U (St , At , St+1 ) | St = st , At = at } t t t t = E{U (Stφ , At , St+1 φ ) | S = s ,A = a } t t t t = E{U (Stφ , At , St+1 φ ) | Sφ = s φ , A = a } = Qopt,1 (stφ , at ) φ 29 (by (4)) For T ≥ 2, define Qopt,T (st , at ) := E{U (St , At , St+1 ) + γ max Qopt,T −1 (St+1 , a0 ) | St = st , At = at } 0 a −1 t+1 0 = E{U (St , At , St+1 ) + γ max Qopt,T (Sφ , a ) | St = st , At = at } φ 0 a 0 t t t t = E{U (Stφ , At , St+1 Qφopt,T −1 (St+1 φ ) + γ max φ , a ) | Sφ = s φ , A = a } 0 a (by induction) (by (4)) = Qopt,T (stφ , at ) φ From now on we use U t = U (St , At , St+1 ) = U (Stφ , At , St+1 φ ) for short. Claim: supat ,st |Qopt,T (st , at ) − Qopt (st , at )|= O(γ T ). Given that the utilities are bounded, we have supst ,at ,st+1 |ut |≤ C1 , and consequently, supst ,at |Qopt (st , at )|≤ C2 , for some constants C1 and C2 . sup Qopt,1 (st , at ) − Qopt (st , at ) at ,st = sup E{U t | St = st , At = at } − E{U t + γ max Qopt (St+1 , a0 ) | St = st , At = at } 0 a t t a ,s = sup γ E{max Qopt (St+1 , a0 ) | St = st , At = at } 0 a t t a ,s ≤ γ C2 = O(γ). For T ≥ 2, assume that supat ,st |Qopt,T −1 (st , at ) − Qopt (st , at )|≤ γ T −1 C2 , then sup max Qopt,T −1 (st , a0 ) − max Qopt (st , a0 ) ≤ γ T −1 C2 , a0 a0 st and sup Qopt,T (st , at ) − Qopt (st , at ) at ,st Qopt,T −1 (St+1 , a0 ) − U t − γ max Qopt (St+1 , a0 ) | St = st , At = at } = sup E{U t + γ max 0 0 a a t t a ,s = sup γ E{max Qopt,T −1 (St+1 , a0 ) − max Qopt (St+1 , a0 ) | St = st , At = at } 0 0 a a t t a ,s ≤ γ (γ T −1 C2 ) = O(γ T ), (by induction) 30 which proves the claim. Therefore, limT →∞ Qopt,T (s, a) = Qopt (s, a) for all s and a. Similarly, limT →∞ Qopt,T (sφ , a) = Qopt φ φ (sφ , a) for all sφ and a. And we have π opt (s) = argmax Qopt (s, a) = argmax lim Qopt,T (s, a) a a T →∞ opt = argmax lim Qopt,T (sφ , a) = argmax Qopt φ φ (sφ , a) = πφ (sφ ). a T →∞ a Proof of Theorem 3.6 Proof. Let D be the set of all indices. Under the assumption that joint dependence implies marginal ⊥ ⊥ St |StJK , At . Because JK−1 = JK , ⊥ ⊥ StD\JK |At . Thus YJt+1 dependence, by construction YJt+1 K−1 K−1 the result follows. How the variables from BASICS-Mobile are partitioned The variable that records the the number of cigarettes smoked in between reports, CIGS, ranges from 0 to 20. The values imputed by local polynomial regression have decimals and are rounded to the nearest integers. CIGS has 18 unique values after rounding, which is still the most among all variables. We divide CIGS by 20 to rescale it to [0, 1], and the rescaled unique values of CIGS will be used as the levels for all variables. All other variables are rescaled to [0, 1] and rounded to the nearest level. 31
10math.ST
A TRACTABLE FAULT DETECTION AND ISOLATION APPROACH FOR NONLINEAR SYSTEMS WITH PROBABILISTIC PERFORMANCE arXiv:1408.1767v2 [math.OC] 22 Jan 2016 PEYMAN MOHAJERIN ESFAHANI AND JOHN LYGEROS Abstract. This article presents a novel perspective along with a scalable methodology to design a fault detection and isolation (FDI) filter for high dimensional nonlinear systems. Previous approaches on FDI problems are either confined to linear systems or they are only applicable to low dimensional dynamics with specific structures. In contrast, shifting attention from the system dynamics to the disturbance inputs, we propose a relaxed design perspective to train a linear residual generator given some statistical information about the disturbance patterns. That is, we propose an optimization-based approach to robustify the filter with respect to finitely many signatures of the nonlinearity. We then invoke recent results in randomized optimization to provide theoretical guarantees for the performance of the proposed filer. Finally, motivated by a cyber-physical attack emanating from the vulnerabilities introduced by the interaction between IT infrastructure and power system, we deploy the developed theoretical results to detect such an intrusion before the functionality of the power system is disrupted. 1. Introduction The task of FDI in control systems involves generating a diagnostic signal sensitive to the occurrence of specific faults. This task is typically accomplished by designing a filter with all available information as inputs (e.g., control signals and given measurements) and a scalar output that implements a non-zero mapping from the fault to the diagnostic signal, which is known as the residual, while decoupling unknown disturbances. The concept of residual plays a central role for the FDI problem which has been extensively studied in the last two decades. In the context of linear systems, Beard and Jones [Bea71, Jon73] pioneered an observer-based approach whose intrinsic limitation was later improved by Massoumnia et al. [MVW89]. Following the same principles but from a game theoretic perspective, Speyer and coauthors thoroughly investigated the approach in the presence of noisy measurements [CS98, DS99]. Nyberg and Frisk extended the class of systems to linear differential-algebraic equation (DAE) apparently subsuming all the previous linear classes [NF06], which recently also studied in the context of stochastic linear systems [EFK13]. This extension greatly enhanced the applicability of FDI methods since the DAE models appear in a wide range of applications, including electrical systems, robotic manipulators, and mechanical systems. For nonlinear systems, a natural approach is to linearize the model at an operating point, treat the nonlinear higher order terms as disturbances, and decouple their contributions from the residual by employing robust techniques [SF91, HP96]. This strategy only works well if either the system remains close to the chosen operating point, or the exact decoupling is possible. The Date: January 25, 2016. The authors are with the Automatic Control Laboratory, ETH Zürich, 8092 Zürich, Switzerland. Emails: {mohajerin,lygeros}@control.ee.ethz.ch. 1 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance former approach is often limited, since in the presence of unknown inputs the system may have a wide dynamic operating range, which in case linearization leads to a large mismatch between linear model and nonlinear behavior. The latter approach was explored in detail by De Persis and Isidori, who in [PI01] proposed a differential geometric approach to extend the unobservibility subspaces of [Mas86, Section IV], and by Chen and Patton, who in [CP82, Section 9.2] dealt with a particular class of bilinear systems. These methods are, however, practically limited by the need to verify the required conditions on the system dynamics and transfer them into a standard form, which essentially involve solving partial differential equations, restricting the application of the method to relatively low dimensional systems. Motivated by this shortcoming, in this article we develop a novel approach to FDI which strikes a balance between analytical and computational tractability, and is applicable to high dimensional nonlinear dynamics. For this purpose, we propose a design perspective that basically shifts the emphasis from the system dynamics to the family of disturbances that the system may encounter. We assume that some statistical information of the disturbance patterns is available. Following [NF06] we restrict the FDI filters to a class of linear operators that fully decouple the contribution of the linear part of the dynamics. Thanks to the linearity of the resulting filter, we then trace the contribution of the nonlinear term to the residual, and propose an optimizationbased methodology to robustify the filter to the nonlinearity signatures of the dynamics by exploiting the statistical properties of the disturbance signals. The optimization formulation is effectively convex and hence tractable for high dimensional dynamics. Some preliminary results in this direction were reported in [MVAL12], while an application of our approach in the presence of measurement noise was successfully tested for wind turbines in [SMEKL13]. The performance of the proposed methodology is illustrated in an application to an emerging problem of cyber security in power networks. In modern power systems, the cyber-physical interaction of IT infrastructure (SCADA systems) with physical power systems renders the system vulnerable not only to operational errors but also to malicious external intrusions. As an example of this type of cyber-physical interaction we consider here the Automatic Generation Control (AGC) system, which is one of the few control loops in power networks that are closed over the SCADA system without human operator intervention. In earlier work [MVM+ 10, MVM+ 11] we have shown that, having gained access to the AGC signal, an attacker can provoke frequency deviations and power oscillations by applying sophisticated attack signals. The resulting disruption can be serious enough to trigger generator out-of-step protection relays, leading to load shedding and generator tripping. Our earlier work, however, also indicated that an early detection of the intrusion may allow one to disconnect the AGC and limit the damage by relying solely on the so-called primary frequency controllers. In this work we show how to mitigate this cyber-physical security concern by using the proposed FDI scheme to develop a protection layer which quickly detects the abnormal signals generated by the attacker. This approach to enhancing the cyber-security of power transmission systems led to an EU patent sponsored by ETH Zurich [MEVAL]. The article is organized as follows. In Section 2 a formal description of the FDI problem as well as the outline of the proposed methodology is presented. A general class of nonlinear models is described in Section 3. Then, reviewing residual generation for the linear models, we develop an optimization-based framework for nonlinear systems in Section 4. Theoretical guarantees are also provided in the context of randomized algorithms. We apply the developed methodology to the AGC case study in Section 5, and finally conclude with some remarks and directions for 2 P. Mohajerin Esfahani and J. Lygeros ݀ ݂ ‫ݕ‬ System Dynamics FDI Filter ‫ݎ‬ ‫ݑ‬ Figure 1. General configuration of the FDI filter future work in Section 6. For better readability, the technical proofs of Sections 4.2 and 4.3 are moved to the appendices. Notation. The symbols N and R+ denote the set of natural and nonnegative real numbers, respectively. Let A ∈ Rn×m be an n × m matrix with real values, A| ∈ Rm×n be its transpose, and kAk2 := σ(A) where σ is the maximum singular value of the matrix. Given a vector v := [v1 , · · · , vn ]| , the infinite norm is defined as kvk∞ := maxi≤n |vi |. Let G be a linear matrix  transfer function. Then kGkH∞ := supω∈R σ G(jω) , where σ is the maximum singular value of the matrix G(jω). The function space W n denotes the set of piece-wise continuous (p.w.c) functions taking values in Rn , and WTn is the restriction of W n to the time interval [0, T ], which is RT endowed with the L2 -inner product, i.e., he1 , e2 i := 0 e|1 (t)e2 (t)dt with the associated L2 -norm p kekL2 := he, ei. The linear operator p : W n → W n is the distributional derivative operator. d In particular, if e : R+ → Rn is a smooth mapping then p[e(t)] := dt e(t). Given a probability Nn n := space (Ω, F, P), we denote the n-Cartesian product space by Ω i=1 Ω and the respective product measure by Pn . 2. Problem Statement and Outline of the Proposed Approach In this section, we provide the formal description of the FDI problem as well as our new design perspective. We will also outline our methodology to tackle the proposed perspective. 2.1. Formal Description. The objective of the FDI design is to use all information to generate a diagnostic signal to alert the operators to the occurrence of a specific fault. Consider a general dynamical system as in Figure 1 with its inputs categorized into (i) unknown inputs d, (ii) fault signal f , and (iii) known inputs u. The unknown input d represents unknown disturbances that the dynamical system encounters during normal operation. The known input u contains all known signals injected to the system which together with the measurements y are available for FDI tasks. Finally, the input f is a fault (or an intrusion) which cannot be directly measured and represents the signal to be detected. The FDI task is to design a filter whose input are the known signals (u and y) and whose output (known as the residual and denoted by r) differentiates whether the measurements are a consequence of some normal disturbance input d, or due to the fault signal f . Formally speaking, the residual can be viewed as a function r(d, f ), and the FDI design is ideally translated as the mapping requirements (1a) d 7→ r(d, 0) ≡ 0, (1b) f 7→ r(d, f ) 6= 0, 3 ∀d A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance where condition (1a) ensures that the residual of the filter, r, is not excited when the system is perturbed by normal disturbances d, while condition (1b) guarantees the filter sensitivity to the fault f in the presence of any disturbance d. The state of the art in FDI concentrates on the system dynamics, and imposes restrictions to provide theoretical guarantees for the required mapping conditions (1). For example, the authors in [NF06] restrict the system to linear dynamics, whereas [HKEY99, PI01] treat nonlinear systems but impose necessary conditions in terms of a certain distribution connected to their dynamics. In an attempt to relax the perfect decoupling condition, one may consider the worst case scenario of the mapping (1) in a robust formulation as   min γ   γ,F RP : (2) s.t. r(d, 0) ≤ γ, ∀d ∈ D    f 7→ r(d, f ) 6= 0, ∀d ∈ D, where D is set of normal disturbances, γ is the alarm threshold of the designed filter, and the minimization is running over a given class of FDI filters denoted by F. Note that the residual r is influenced by the choice of the filter in F, but we omit this dependence for notational simplicity. In view of formulation (2), an alarm is only raised whenever the residual exceeds γ, i.e., the filter avoids any false alarm. This, however, comes at the cost of missed detections of the faults whose residual is not bigger than the threshold γ. In the literature, the robust perspective RP has also been studied in order for a trade-off between disturbance rejection and fault sensitivity for a certain class of dynamics, e.g., see [CP82, Section 9.2] for bilinear dynamics and [FF12] for multivariate polynomial systems. 2.2. New Design Perspective. Here we shift our attention from the system dynamics to the class of unknown inputs D. We assume that the disturbance signal d comes from a prescribed probability space and relax the robust formulation RP by introducing probabilistic constraints instead. In this view, the performance of the FDI filter is characterized in a probabilistic fashion. Assume that the signal d is modeled as a random variable on the prescribed probability space (Ω, F, P), which takes values in a metric space endowed with the corresponding Borel sigmaalgebra. Assume further that the class of FDI filters ensures the measurability of the mapping d 7→ r where r also belongs to a metric space. In light of this probabilistic framework, one may quantify the filter performance from different perspectives; in the following we propose two of them:     γ γ  min  min   γ,F γ,F    CP : (3) AP : s.t. E J kr(d, 0)k ≤ γ s.t. P kr(d, 0)k ≤ γ ≥ 1 − ε       f 7→ r(d, f ) 6= 0, ∀d ∈ D, f 7→ r(d, f ) 6= 0, ∀d ∈ D, where E[ · ] in AP is meant with respect to the probability measure P, and k · k is the corresponding norm in the r space. The function J : R+ → R+ in AP and ε ∈ (0, 1) in CP are design parameters. To control the filter residual generated by d, the payoff function J is required to be in class K∞ , i.e., J is strictly increasing and J(0) = 0 [Kha92, Definition 4.2, p. 144]. The decision variables in the above optimization programs are F, a class of FDI filters which is chosen a priori, and γ which is the filter threshold; we shall explain these design parameters more explicitly in subsequent sections. 4 P. Mohajerin Esfahani and J. Lygeros Two formulations provide different probabilistic interpretations of fault detection. The program AP stands for “Average Performance” and takes all possible disturbances into account, but in accordance with their occurrence probability in an averaging sense. The program CP stands for “Chance Performance” and ignores an ε-fraction of the disturbance patterns and only aims to optimize the performance over the rest of the disturbance space. Note that in the CP perspective, the parameter ε is an additional design parameter to be chosen a priori. Let us highlight that the proposed perspectives rely on the probability distribution P, which requires prior information about possible disturbance patterns. That is, unlike the existing literature, the proposed design prioritizes between disturbance patterns in terms of their occurrence likelihood. From a practical point of view this requirement may be natural; in Section 5 we will describe an application of this nature. 2.3. Outline of the Proposed Methodology. We employ randomized algorithms to tackle the formulations in (3). We generate n independent and identically distributed (i.i.d.) scenarios (di )ni=1 from the probability space (Ω, F, P), and consider the following optimization problems as random counterparts of those in (3):   γ   γ  min  min γ,F   γ,F  Pn 1 f : f : s.t. max kr(di , 0)k ≤ γ (4) AP CP s.t. i=1 J kr(di , 0)k ≤ γ n i≤n       f 7→ r(d, f ) 6= 0, ∀d ∈ D f 7→ r(d, f ) 6= 0, ∀d ∈ D, f and CP f are naturally stochastic as they depend on Notice that the optimization problems AP n the generated scenarios (di )i=1 , which is indeed a random variable defined on n-fold product probability space (Ωn , F n , Pn ). Therefore, their solutions are also random variables. In this work, we first restrict the FDI filters to a class of linear operators in which the random programs (4) are effectively convex, and hence tractable. In this step, the FDI filter is essentially robustified to n signatures of the dynamic nonlinearity. Subsequently, invoking existing results on randomized optimization, in particular [Han12, MSL15], we will provide probabilistic guarantees on the relation of programs (3) and their probabilistic counterparts in (4), whose precision is characterized in terms of the number of scenarios n. We should highlight that the true empirical approximation of the chance constraint in CP is Pn indeed n1 i=1 1 ≥ 1 − ε, where 1 is the indicator function. This approximation, ||r(di ,0)||≤γ as opposed to the one proposed in (4), leads to a non-convex optimization program which is, in general, computationally intractable. In addition, note that the design parameter ε of CP in (3) f in (4). However, as we will clarify in does not explicitly appear in the random counterpart CP 4.3, the parameter ε contributes to the probabilistic guarantees of the design. 3. Model Description and Basic Definitions In this section we introduce a class of nonlinear models along with some basic definitions, which will be considered as the system dynamics in Figure 1 throughout the article. Consider the nonlinear differential-algebraic equation (DAE) model (5) E(x) + H(p)x + L(p)z + F (p)f = 0, where the signals x, z, f are assumed to be piece-wise continuous (p.w.c.) functions from R+ into Rnx , Rnz , Rnf , respectively; we denote the spaces of such signals by W nx , W nz , W nf , respectively. 5 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance Let nr be the number of rows in (5), and E : Rnx → Rnr be a Lipschitz continuous mapping. The operator p is the distributional derivative operator [Ada75, Section I], and H, L, F are polynomial matrices in the operator p with nr rows and nx , nz , nf columns, respectively. In the setup of Figure 1, the signal x represents all unknowns signals, e.g., internal states of the system dynamics and unknown disturbances d. The signal z contains all known signals, i.e., it is an augmented signal including control input u and available measurements y. The signal f stands for faults or intrusion which is the target of detection. We refer to [Shc07] and the references therein for general theory of nonlinear DAE systems and the regularity of their solutions. One may extend the space of functions x, z, f to Sobolev spaces, but this is outside the scope of our study. On the other hand, if these spaces are restricted to the (resp. right) smooth functions, then the operator p can be understood as the classical (resp. right) differentiation operator. Throughout this article we will focus on continuous-time models, but one can obtain similar results for discrete-time models by changing the operator p to the time-shift operator. We will think of the matrices H(p), L(p) and F (p) above either as linear operators on the function spaces (in which case p will be interpreted as a generalized derivative operator as explained above) or as algebraic objects (in which case p will be interpreted as simply a complex variable). The reader is asked to excuse this slight abuse of the notation, but the interpretation should be clear from the context. Let us first show the generality of the DAE framework of (5) by the following example. Consider the classical nonlinear ordinary differential equation (  GẊ(t) = EX X(t), d(t) + AX(t) + Bu u(t) + Bd d(t) + Bf f (t) (6)  Y (t) = EY X(t), d(t) + CX(t) + Du u(t) + Dd d(t) + Df f (t) where u( · ) is the input signal, d( · ) the unknown disturbance, Y ( · ) the measured output, X( · ) the internal variables, and f ( · ) a faults (or an attack) signal to be detected. Parameters G, A, Bu , Bd , Bf , Du , Dd , and Df are constant matrices and functions EX , EY are Lipschitz continuous mappings with appropriate dimensions. One can easily fit the model (6) into the DAE framework of (5) by defining     X Y x := , z := , d u         EX (x) −pG + A Bd 0 Bu Bf E(x) := , H(p) := , L(p) := , F (p) := . EY (x) C Dd −I Du Df Following [NF06], with a slight extension to a nonlinear dynamics, let us formally characterize all possible observations of the model (5) in the absence of the fault signal f :  (7) M := z ∈ W nz ∃x ∈ W nx : E(x) + H(p)x + L(p)z = 0 ; This set is known as the behavior of the system [PW98]. Definition 3.1 (Residual Generator). A proper linear time invariant filter r := R(p)z is a residual generator for (5) if for all z ∈ M, it holds that lim r(t) = 0. t→∞ Note that by Definition 3.1 the class of residual generators in this study is restricted to a class of linear transfer functions where R(p) is a matrix of proper rational functions of p. 6 P. Mohajerin Esfahani and J. Lygeros Definition 3.2 (Fault Sensitivity). The residual generator introduced in Definition 3.1 is sensitive to fault fi if the transfer function from fi to r is nonzero, where fi is the ith elements of the signal f . One can inspect that Definition 3.1 and Definition 3.2 essentially encode the basic mapping requirements (1a) and (1b), respectively. 4. Fault Detection and Isolation Filters The main objective of this section is to establish a scalable framework geared towards the design perspectives AP and CP as explained in Section 2. To this end, we first review a polynomial characterization of the residual generators and its linear program formulation counterpart for linear systems (i.e., the case where E(x) ≡ 0). We then extend the approach to the nonlinear model (5) to account for the contribution of E( · ) to the residual, and subsequently provide probabilistic performance guarantees for the resulting filter. 4.1. Residual Generators for Linear Systems. In this subsection we assume E(x) ≡ 0, i.e., we restrict our attention to the class of linear DAEs. One can observe that the behavior set M can alternatively be defined as  M = z ∈ W nz NH (p)L(p)z = 0 , where the collection of the rows of NH (p) forms an irreducible polynomial basis for the left null-space of the matrix H(p) [PW98, Section 2.5.2]. This representation allows one to describe the residual generators in terms of polynomial matrix equations. That is, by picking a linear combination of the rows of NH (p) and considering an arbitrary polynomial a(p) of sufficiently high order with roots with negative real parts, we arrive at a residual generator in the sense of Definition 3.1 with transfer operator (8) R(p) = a−1 (p)γ(p)NH (p)L(p) := a−1 (p)N (p)L(p), where γ(p) is a polynomial row vector representing a linear combination of the rows of NH (p). Note that the role of γ(p) is implicitly taken into consideration by N (p) := γ(p)NH (p). The above filter can easily be realized by an explicit state-space description with input z and output r. Multiplying the left hand-side of (5) by a−1 (p)N (p) leads to r = −a−1 (p)N (p)F (p)f. Thus, a sensitive residual generator, in the sense of Definition 3.1 and Definition 3.2, is characterized by the polynomial matrix equations (9a) N (p)H(p) = 0, (9b) N (p)F (p) 6= 0, where (9a) implements condition (1a) above (cf. Definition 3.1) while (9b) implements condition (1b) (cf. Definition 3.2). Both row polynomial vector N (p) and denominator polynomial a(p) can be viewed as design parameters. Throughout this study we, however, fix a(p) and aim to find an optimal N (p) with respect to a certain objective criterion related to the filter performance. In case there are more than one faults (nf > 1), it might be of interest to isolate the impact of one fault in the residual from the others. The following remark implies that the isolation problem is effectively a detection problem. 7 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance Remark 4.1 (Fault Isolation). Consider model (5) and suppose nf > 1. In order to detect only one of the fault signals, say f1 , and isolate it from the other faults, fi , i ∈ {2, · · · , nf }, one may consider the detection problem for the same model but in new representation   x e E(x) + [H(p) F (p)] ˜ + L(p)z + F1 (p)f = 0, f where F1 (p) is the first column of F (p), and Fe(p) := [F2 (p), · · · , Fnf (p)], and f˜ := [f2 , · · · , fnf ]. In light of Remark 4.1, one can build a bank of filters where each filter aims to detect a particular fault while isolating the impact of the others; see [FKA09, Theorem 2] for more details on fault isolation. Next, we show how to transform the matrix polynomial equations (9) into a linear programming framework. Lemma 4.2. Let N (p) be a feasible polynomial matrix of degree dN for the inequalities (9), where dH dF dN X X X H(p) := Hi pi , F (p) := Fi pi , N (p) := Ni pi , i=0 nr ×nx i=0 nr ×nf i=0 1×nr , Fi ∈ R , and Ni ∈ R are constant matrices. Then, the polynomial and Hi ∈ R matrix inequalities (9) are equivalent, up to a scalar, to (10a) N̄ H̄ = 0, (10b) N̄ F̄ ∞ ≥ 1, where k · k∞ is the infinity vector norm, and  N̄ := N0 N1 ··· NdN  H1 ··· HdH 0 ··· H0 ··· .. . H0 HdH 0 .. ··· H1 .. . 0 H1 . ···  F0  0 F̄ :=  .  .. F1 ··· FdF 0 ··· F0 F1 .. . FdF 0 .. 0 ··· ··· .. . F0  H0  0 H̄ :=   .  .. 0 0 F1 . ···  0 ..  .  ,  0  HdH  0 ..  .  .  0  FdF Proof. It is easy to observe that N (p)H(p) = N̄ H̄[I pI · · · pi I]| , i := dN + dH , N (p)F (p) = N̄ F̄ [I pI · · · pj I]| , j := dN + dF . Moreover, in light of the linear structure of equations (9), one can simply scale the inequality (9b) and arrive at the assertion of the lemma.  Strictly speaking, the formulation in Lemma 4.2 is not a linear program, due to the non-convex constraint (10b). It is, however, easy to show that the characterization (10) can be understood as a number of linear programs, which grows linearly in the degree of the filter: 8 P. Mohajerin Esfahani and J. Lygeros Lemma 4.3. Consider the sets th n Nj := N̄ ∈ Rnr (dN +1) o N̄ H̄ = 0, N̄ F̄ vj ≥ 1 , ↓ j  | vj := 0, · · · , 1, · · · , 0 , Sm and let N := j=1 Nj where m := nf (dF + dN + 1) is the number of columns of F̄ (the parameters H̄, F̄ , nf , dF , dN are as considered in Lemma 4.2). Then, the set characterized by (10) is equivalent to N ∪ −N . Proof. Notice that kN̄ F̄ k∞ ≥ 1 if and only if there exists a coordinate j such that N̄ F̄ vj ≥ 1 or N̄ F̄ vj ≤ −1. Thus, the proof readily follows from the fact that each of the set Nj focuses on a component of the vector N̄ F̄ in (10b).  Fact 4.4. There exists a solution N (p) to (9) if and only if Rank [H(p) F (p)] > Rank H(p). Fact 4.4 provides necessary and sufficient conditions for the feasibility of the linear program formulation in Lemma 4.2; proof is omitted as it is an easy adaptation of the one in [FKA09, Corollary 3]. 4.2. Extension to Nonlinear Systems. In the presence of nonlinear terms E(x) 6= 0, it is straightforward to observe that the residual of filter (8) consists of two terms: (11) r := R(p)z = − a−1 (p)N (p)F (p)f − a−1 (p)N (p)E(x) . {z } | {z } | (i) (ii) Term (i) is the desired contribution of the fault f and is in common with the linear setup. Term (ii) is due to the nonlinear term E( · ) in (5). Our aim here will be to reduce the impact of E(x) while increasing the sensitivity to the fault f . To achieve this objective, we develop two approaches to control each of the two terms separately; in both cases we assume that the degree of the filter (i.e., dN in Lemma 4.2) and the denominator (i.e., a(p) in (11)) are fixed, and the aim is to design the numerator coefficients (i.e., N (p) in (11)). Approach (I) (Fault Sensitivity). To focus on fault sensitivity while neglecting the contribution of the nonlinear term, we assume that the system operates close to an equilibrium point xe ∈ Rnx . Even though in case of a fault the system may eventually deviate substantially from its nominal operating point, if the FDI filter succeeds in identifying the fault early the system will not have time to deviate too far. Hence, one may hope that a filter based on linearizing the system dynamics around the equilibrium would suffice. Then we assume, without loss of generality, that lim x→xe E(x) 2 = 0, kx − xe k2 where k · k2 stands for the Euclidean norm of a vector. If this is not the case, the linear part of E( · ) can be extracted and included in the linear part of the system. To increase the sensitivity of the linear filter to the fault f , we revisit the linear programming formulation (10) and seek a feasible numerator N (p) such that the coefficients of the transfer function N (p)F (p) attain maximum values within the admissible range. This gives rise to the 9 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance following optimization problem:   max   N̄ F̄ N̄ (12) s.t.    ∞ N̄ H̄ N̄ =0 ≤1 ∞ where the objective function targets the contribution of the signal f to the residual r. Let us recall that N̄ F̄ is the vector containing all numerator coefficients of the transfer function f 7→ r. The second constraint in (12) is added to ensure that the solutions remain bounded; note that thanks to the linearity of the filter this constraint does not influence the performance. Though strictly speaking (12) is not a linear program, in a similar fashion as in Lemma 4.3 it is easy to transform it to a family of m different linear programs, where m is the number of columns of F̄ . How well the filter designed by (12) will work depends on the magnitude of the second term in (11), which is due to the nonlinearities E(x) and is ignored in (12). If the term generated by E(x) is large enough, the filter may lead to false alarms, whereas if we set our thresholds high to tolerate the disturbance generated by E(x) in nominal conditions, the filter may lead to missed detections. A direct way toward controlling this trade-off involving the nonlinear term will be the focus of the second approach. Approach (II) (Robustify to Nonlinearity Signatures). This approach is the main step toward the theoretical contribution of the article, and provides the principle ingredients to tackle the proposed perspectives AP and CP introduced in (3). The focus is on term (ii) of the residual (11), in relation to the mapping (1a). The idea is to robustify the filter against certain signatures of the nonlinearity during nominal operation. In the following we restrict the class of filters to the feasible solutions of polynomial matrix equations (9), characterized in Lemma 4.2. Let us denote the space of all p.w.c. functions from the interval [0, T ] to Rn by WTn . We equip this space with the L2 -inner product and the corresponding norm Z T p kekL2 := he, ei, he, gi := e| (t)g(t)dt, e, g ∈ WTn . 0 Consider an unknown signal x ∈ WTnx . In the context of the ODEs (6) that means we excite the system with the disturbance d( · ) for the time horizon T . We then stack d( · ) together with nr 1 the internal state X( · ) to introduce x := [ X d ]. We define the signals ex ∈ WT and rx ∈ WT as follows:  (13) ex (t) := E x(t) , rx (t) := −a−1 (p)N (p)[ex ](t), ∀t ∈ [0, T ]. The signal ex is the “nonlinearity signature” in the presence of the unknown signal x, and the signal rx is the contribution of the nonlinear term to the residual of the linear filter. Our goal now is to minimize krx kL2 in an optimization framework in which the coefficients of polynomial N (p) are the decision variables and the denominator a(p) is a fixed stable polynomial with the degree at least the same as N (p). Lemma 4.5. Let N (p) be a polynomial row vector of dimension nr and degree dN , and a(p) be a stable scalar polynomial with the degree at least dN . For any x ∈ WTnx there exists ψx ∈ n (d +1) such that WT r N (14a) rx (t) = N̄ ψx (t), (14b) kψx kL2 ≤ Ckex kL2 , ∀t ∈ [0, T ] p C := nr (dN + 1)ka−1 kH∞ , 10 P. Mohajerin Esfahani and J. Lygeros where N̄ is the vector collecting all the coefficients of the numerator N (p) as introduced in Lemma 4.2, and the signals ex and rx are defined as in (13). Proof. See Appendix I.1.  Given x ∈ WTnx and the corresponding function ψx as defined in Lemma 4.5, we have Z T 2 | krx kL2 = N̄ Qx N̄ , (15) Qx := ψx (t)ψx| (t)dt. 0 We call Qx the “signature matrix ” of the nonlinearity signature t 7→ ex (t) resulting from the unknown signal x. Given x and the corresponding signature matrix Qx , the L2 -norm of rx in (13) can be minimized by considering an objective which is a quadratic function of the filter coefficients N̄ subject to the linear constraints in (10):   min N̄ Qx N̄ |   N̄ (16) s.t. N̄ H̄ =0    ≥1 N̄ F̄ ∞ The program (16) is not a true quadratic program due to the second constraint. Following Lemma 4.3, however, one can show that the optimization program (16) can be viewed as a family of m quadratic programs where m = nf (dF + dN + 1). In the rest of the subsection, we establish an algorithmic approach to approximate the matrix Qx for a given x ∈ WTnx , with an arbitrary high precision. We first introduce a finite dimensional subspace of WT1 denoted by B := span{b0 , b1 , · · · , bk }, (17) Nnr where the collection of bi : [0, T ] → R is a basis for B. Let B nr := i=1 B be the nr Cartesian product of the set B, and TB : WTnr → B nr be the L2 -orthogonal projection operator onto B nr , i.e., (18) TB (ex ) = k X βi? bi , i=0 β ? := arg min ex − β k X β i bi L2 i=0 Let us remark that if the basis of B is orthonormal (i.e., hbi , bj i = 0 for i 6= j), then βi? = RT bi (t)ex (t)dt; we refer to [Lue69, Section 3.6] for more details on the projection operator. 0 Assumption 4.6. We stipulate that (i) The basis functions bi of subspace B are smooth and B is closed under the differentiation d operator p, i.e., for any b ∈ B we have p[b] = dt b ∈ B. (ii) The basis vectors in (17) are selected from an L2 -complete basis for WT1 , i.e., for any e ∈ WTnr , the projection error e − TB (e) L2 can be made arbitrarily small by increasing the dimension k of subspace B. The requirements of Assumptions 4.6 can be fulfilled for subspaces generated by, for example, the polynomial or Fourier basis. Thanks to Assumption 4.6(i), the linear operator p can be 11 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance viewed as a matrix operator. That is, there exists a square matrix D with dimension k + 1 such that (19) p[B(t)] = d B(t) = DB(t), dt B(t) := [b0 (t), · · · , bk (t)]| . In Section 5.2 we will provide an example of such matrix operator for the Fourier basis. By virtue of the matrix representations of (19) we have   β? dN dN  β?D  X X   (20) Ni β ? Di B = N̄ D̄B, D̄ :=  .  , Ni pi β ? B = N (p)TB (ex ) = ..   i=0 i=0 β ? DdN where the vector β ? := [β0? , · · · , βk? ] is introduced in (18). If we define the positive semidefinite matrix G := [Gij ] of dimension k + 1 by Gij := a−1 (p)[bi ], a−1 (p)[bj ] , (21) we arrive at (22) a−1 (p)N (p)TB (e) 2 L2 = N̄ QB N̄ | , QB := D̄GD̄| , where D̄ and G are defined in (20) and (21), respectively. Note that the matrices G and D are built by the data of the subspace B and denominator a(p), whereas the nonlinearity signature only influences the coefficient β ? . The above discussion is summarized in Algorithm 1 with an emphasis on models described by the ODE (6), while Proposition 4.7 addresses the precision of the approximation scheme. Proposition 4.7 (Signature Matrix Approximation). Consider an unknown signal x : [0, T ] → Rnx in WTnx and the corresponding nonlinearity signature ex and signature matrix Qx as defined in (13) and (15), respectively. Let (bi )i∈N ⊂ WT1 be a family of basis functions satisfying Assumptions 4.6, and let B be the finite dimensional subspace in (17). If kex − TB (ex )kL2 < δ, where TB is the projection operator onto B nr , then  (23) Qx − QB 2 < C̄δ, C̄ := 1 + 2kex kL2 Cka−1 kH∞ , where QB is obtained by (22) (the output of Algorithm 1), and C is the same constant as in (14b). Proof. See Appendix I.1.  Remark 4.8 (Multi Signatures Training). In order to robustify the FDI filter to more than one unknown signal, say {xi ( · )}ni=1 , one may introduce an objective function as an average cost  Pn N̄ n1 i=1 Qxi N̄ | or the worst case viewpoint maxi≤n N̄ Qxi N̄ | , where Qxi is the signature matrix corresponding to xi as defined in (15). 4.3. Proposed Methodology and Probabilistic Performance. The preceding subsection proposed two optimization-based approaches to enhance the FDI filter design from linear to nonlinear system dynamics. Approach (I) targets the fault sensitivity while neglecting the nonlinear term of the system dynamics, and Approach (II) offers a QP framework to robustify the residual with respect to signatures of the dynamic nonlinearities. Here our aim is to achieve a 12 P. Mohajerin Esfahani and J. Lygeros Algorithm 1 Computing the signature matrix Qx in (15) (i) Initialization of the Filter Paramters: (a) Select a stable filter denominator a(p), a numerator degree dN not higher than a(p) order, and horizon T (b) Select a basis {bi }ki=1 ⊂ WT1 satisfying Assumptions 4.6 (c) Compute the differentiation matrix D in (19) (d) Compute the matrix G in (21) 1 (ii) Identification of the Nonlinearity Signature: (a) Input the disturbance pattern d( · ) for time horizon T (b) Solve (6) under inputs d( · ) and f ≡ 0 to obtain the internal state X( · ) (c) Set the unknown signal x(t) := [X | (t), d| (t)]|  |  | (d) Set the nonlinearity signature ex (t) := EX x(t) , EY| x(t) (iii) Computation of the Signature Matrix (a) Compute β ? from (18) (in case of orthonormal basis βi? = RT bi (t)ex (t)dt) 0 (b) Compute D̄ from (20) (c) Ouput QB := D̄GD̄| in (22) reconciliation between these two approaches. We subsequently provide theoretical results from the proposed solutions to the original design perspectives (3). Let (di )ni=1 ⊂ D be i.i.d. disturbance patterns generated from the probability space (Ω, F, P). For each di , let xi be the corresponding unknown signal with the associated signature matrix Qxi as defined in (15). In regard to the average perspective AP, we propose the two-stage (random) optimization program  min γ    γ,N̄     s.t. N̄ H̄ =0 f (24a) AP1 : N̄ F̄ ∞ ≥1    p  n  P  1   J N̄ Qxi N̄ | ≤γ n i=1  max N̄ F̄ ∞      N̄  N̄ H̄ =0  s.t. f2 : (24b) AP N̄ ∞ ≤1      n p  P  1  J kN̄1? k∞ N̄ Qxi N̄ | ≤ γ1?  n i=1 where J : R+ → R+ is an increasing and convex payoff function, and in the second stage (24b) N̄1? and γ1? are the optimizers of the first stage (24a), i.e., the programs (24) need to be 1A conservative but easy-to-implement approach is to set G an identity matrix with dimension k + 1. 13 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance solved sequentially in a lexicographic (multi-objective) sense [MA04]. Let us recall that the filter coefficients can always be normalized with no performance deterioration. Hence, it is straightforward to observe that the main goal of the second stage is only to improve the coefficients of N̄ F̄ (concerning the fault sensitivity) while the optimality of the first stage (concerning the robustification to nonlinearity signatures) is guaranteed. Similarly, we also propose the following two-stage program for the perspective CP:   min γ   γ,N̄     s.t. N̄ H̄ =0 f1 : CP (25a) N̄ F̄ ∞ ≥1        max N̄ Qxi N̄ | ≤ γ i≤n (25b) f2 : CP  max   N̄     s.t.       N̄ F̄ ∞ N̄ H̄ N̄ =0 ≤1 ∞ kN̄1? k2∞ max N̄ Qxi N̄ i≤n  | ≤ γ1? Remark 4.9 (Computational Complexity). In view of Lemma 4.3, all the programs in (24) and (25) can be written as families of convex programs, and hence are tractable. It is, however, f is J(α) := α2 , the computational complexity worth noting that in case the payoff function of AP of the resulting programs in (24) is independent of the number of scenarios n, since the problems effectively reduce to a quadratic programming with a constraint involving the average of all the Pn respective signature matrices (i.e., n1 i=1 Qxi ). This is particularly of interest if one requires to train the filter for a large number of scenarios. Clearly, the filter designed by programs (24) and (25) is robustified to only finitely many most likely events, and as such, it may remain sensitive to disturbance patterns which have not been observed in the training phase. However, thanks to the probabilistic guarantees detailed in the sequel, we shall show that the probability of such failures (false alarm) is low. In fact, the tractability of our proposed scheme comes at the price of allowing for rare threshold violation of the filter. The rest of the subsection formalizes this probabilistic bridge between the program (24) (resp. (25)) and the original perspective AP (resp. CP) in (3) when the class of filters is confined to the linear residuals characterized in Lemma 4.2. For this purpose, we need a technical measurability assumption which is always expected to hold in practice. Assumption 4.10 (Measurability). We assume that the mapping D 3 d 7→ x ∈ WTnx is measurable where the function spaces are endowed with the L2 -topology and the respective Borel sigma-algebra. In particular, x can be viewed as a random variable on the same probability space as d. Assumption 4.10 is referred to the behavior of the system dynamics as a mapping from the disturbance d to the internal states. In the context of ODEs (6), it is well-known that under mild assumptions (e.g., Lipschitz continuity of EX ) the mapping d 7→ X is indeed continuous [Kha92, Chapter 5], which readily ensures Assumption 4.10. f Here we study the asymptotic behavior of the empirical 4.3.1. Probabilistic performance of AP.   average of E J(krk) uniformly in the filter coefficients N̄ , which allows us to link the solutions 14 P. Mohajerin Esfahani and J. Lygeros  of programs (24) to AP. Let N := N̄ ∈ Rnr(dN +1) : kN̄ k∞ ≤ 1 function of AP in (3) as the mapping φ : N × WTnx → R+ :   (26) φ(N̄ , x) := J krx kL2 = J kN̄ ψx kL2 , and consider the payoff where the second equality follows from Lemma 4.5. Theorem 4.11 (Average Performance). Suppose Assumption 4.10 holds and the random variable x is almost surely bounded2. Then, the mapping N̄ 7→ φ(N̄ , x) is a random function. Moreover, if (xi )ni=1 ⊂ WTnx are i.i.d. random variables and en is the uniform empirical average error n n1 X  o (27) en := sup φ(N̄ , xi ) − E φ(N̄ , x) , n i=1 N̄ ∈N then, (i) the Strong Law of Large Numbers (SLLN) holds, i.e., lim en = 0 almost surely. n→∞ √ (ii) the Uniform Central Limit Theorem (UCLT) holds, i.e., nen converges in law to a Gaussian variable with distribution N (0, σ) for some σ ≥ 0. Proof. See Appendix I.2 along with required preliminaries.  The following Corollary is an immediate consequence of the UCLT in Theorem 4.11 (ii). Corollary 4.12. Let assumptions of Theorem 4.11 hold, and en be the empirical average error (27). For all ε > 0 and k < 12 , we have  lim Pn nk en ≥ ε = 0, n→∞  where Pn denotes the n-fold product probability measure on Ωn , F n . f The formulation CP in (3) is known as chance con4.3.2. Probabilistic performance of CP. strained program which has received increasing attention due to recent developments toward f in (4)) in a convex tractable approaches, in particular via the scenario counterpart (cf. CP setting [CC06, CG08]. These studies are, however, not directly applicable to our problem due to the non-convexity arising from the constraint kN̄ F̄ k∞ ≥ 1. Here, following our recent work [MSL15], we exploit the specific structure of this non-convexity and adapt the scenario approach accordingly.  Let N̄n? , γn? be the optimizer obtained through the two-stage programs (25) where N̄n? is the filter coefficients and γn? represents the filter threshold; n is referred to the number of disturbance patterns. Given the filter N̄n? , let us denote the corresponding filter residual due to the signal x by rx [N̄n∗ ]; this is a slight modification of our notation rx in (13) to specify the filter coefficients. To quantify the filter performance, one may ask for the probability that a new unknown signal x 2 violates the threshold γn? when the FDI filter is set to N̄n? (i.e., the probability that rx [N̄n∗ ] L2 > γn∗ ). In the FDI literature such a violation is known as a false alarm, and from the CP standpoint its occurrence probability is allowed at most to the ε level. In this view the performance of the filter can be quantified by the event n   o  2 (28) E N̄n? , γn∗ := P rx [N̄n∗ ] L2 > γn∗ > ε . 2This assumption may be relaxed in terms of the moments of x, though this will not be pursued further here. 15 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance f solution from the original perspective CP. The event (28) accounts for the feasibility of the CP Note that the measure P in (28) is referred to x whereas the stochasticity of the event stems  from the random solutions N̄n? , γn∗ .3 Theorem 4.13 (Chance Performance). Suppose Assumption 4.10 holds and (xi )ni=1 are i.i.d. f and random variables on (Ω, F, P). Let N̄n? ∈ Rnr (dN +1) and γn∗ ∈ R+ be the solutions of CP, n n measurable in F . Then, the set (28) is F -measurable, and for every β ∈ (0, 1) and any n such that  2  nf (dF + dN + 1) n≥ ln + nr (dN + 1) + 1 , ε β where dN is the degree of the filter and nf , nr , dF are the system size parameters of (5), we have   Pn E N̄n? , γn∗ < β. Proof. See Appendix I.2.  5. Cyber-Physical Security of Power Systems: AGC Case Study In this section, we illustrate the performance of our theoretical results to detect a cyber intrusion in a two-area power system. Motivated by our earlier studies [MVM+ 10, MVM+ 11], we consider the IEEE 118-bus power network equipped with primary and secondary frequency control. While the primary frequency control is implemented locally, the secondary loop, referred also as AGC (Automatic Generation Control), is closed over the SCADA system without human operator intervention. As investigated in [MVM+ 10], a cyber intrusion in this feedback loop may cause unacceptable frequency deviations and potentially load shedding or generation tripping. If the intrusion is, however, detected on time, one may prevent further damage by disconnecting the AGC. We show how to deploy the methodology developed in earlier sections to construct an FDI filter that uses the available measurements to diagnose an AGC intrusion sufficiently fast, despite the presence of unknown load deviations. 5.1. Mathematical Model Description. In this section a multi-machine power system, based only on frequency dynamics, is described [Andb]. The system is arbitrarily divided into two control areas. The generators are equipped with primary frequency control and each area is under AGC which adjusts the generating setpoints of specific generators so as to regulate frequency and maintain the power exchange between the two areas to its scheduled value. 5.1.1. System description. We consider a system comprising n buses and g number of generators. Let G = {i}g1 denote the set of generator indices and A1 = {i ∈ G | i in Area 1}, A2 = {i ∈ G | i in Area 2} the sets of generators that belong to Area 1 and Area 2, respectively. Let also Lktie = {(i, j)|i, j edges of a tie line from area k to the other areas}, where a tie line is a line connecting the two independently controlled areas and let also K = {1, 2} be the set of the indices of the control areas in the system. Using the classical generator model every synchronous machine is modeled as constant voltage source behind its transient reactance. The dynamic states of the system are the rotor angle δi (rad), the rotor electrical frequency fi (Hz) and the mechanical power (output of the turbine) 3The measure P is, with slight abuse of notation, the induced measure via the mapping addressed in Assump- tion 4.10. 16 P. Mohajerin Esfahani and J. Lygeros Pmi (M W ) for each generator i ∈ G. We also have one more state that represents the output of the AGC ∆Pagck for each control area k ∈ K. We denote by EG ∈ Cg a vector consisting of the generator internal node voltages EGi = for i ∈ G. The phase angle of the generator voltage node is assumed to coincide with 0 the rotor angle δi and |EGi | is a constant. The voltages of the rest of the nodes are included in VN ∈ Cn , whose entries are VN i = |VN i |∠θi for i = 1, . . . , n. To remove the algebraic constraints that appear due to the Kirchhoff’s first law for each node, we retain the internal nodes (behind the transient reactance) of the generators and eliminate the rest of the nodes. This could be achieved only under the assumption of constant impedance loads since in that way they can be included in the network admittance matrix. The node voltages can then be linearly connected to the internal node voltages, and hence to the dynamic state δi . This results in a reduced admittance matrix that corresponds only to the internal nodes of the generators, where the power flows are expressed directly in terms of the dynamic states of the system. The resulting model of the two area power system is described by the following set of equations. 0 |EGi |∠δi δ̇i = 2π(fi − f0 ), f0 1 (Pmi − Pei (δ) − (fi − f0 ) − ∆Ploadi ), 2Hi SBi Di 1 sat sat (P 0 = + vak ∆Pp,a + wak ∆Pagc,k − Pm,ak ), k Tch,ak m,ak X X = ckj (fj − f0 ) + bkj (Pmj − Pej (δ) − ∆Ploadj ) f˙i = Ṗm,ak ∆Ṗagc,k j∈Ak j∈Ak − 1 TNk gk (δ, f ) − Cpk hk (δ, f ) − Kk sat (∆Pagc,k − ∆Pagc,k ). TNk where i ∈ G, ak ∈ Ak for k ∈ K. Supperscript sat on the AGC output signal ∆Pagc,k and on the primary frequency control signal ∆Pp,ak highlights the saturation to which the signals are subjected. The primary frequency control is given by ∆Pp,i = −(fi − f0 )/Si . Based on the reduced admittance matrix, the generator electric power output is given by Pei = g X red EGi EGj (Gred ij cos(δi − δj ) + Bij sin(δi − δj )). j=1 dgk 0 ) and hk := Moreover, gk := (i,j)∈Lk (Pij − PT12 dt , where the power flow Pij , based on the tie initial admittance matrix of the system, is given by P Pij = |VNi ||VNj |(Gij cos(θi − θj ) + Bij sin(θi − θj )) All undefined variables are constants, and details on the derivation of the models can be found in [MVAL12]. The AGC attack is modeled as an additive signal to the AGC signal. For instance, if the attack signal is imposed in Area 1, the mechanical power dynamics of Area 1 will be modified as  1 0 sat sat (Pm,a + va1 ∆Pp,a + wa1 ∆Pagc + f (t) − Pm,a1 ), Ṗm,a1 = 1 1 1 Tch,a1 The above model can be compactly written as ( Ẋ(t) = h(X(t)) + Bd d(t) + Bf f (t) (29) Y (t) = CX(t), 17 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance Figure 2. Stochastic load fluctuation and prediction error [Anda, p. 59]  | where X := {δi }1:g , {fi }1:g , {Pm,i }1:g , {∆Pagci }1:2 ∈ R3g+2 denotes the internal states vector comprising rotor angles δi , generators frequencies fi , generated mechanical powers  | Pm,i , and the AGC control signal ∆Pagci for each area. The external input d := {∆Ploadi }1:g represents the unknown load disturbances (discussed in the next subsection), and f represents the intrusion signal injected to the AGC of the first area. We assume that the measurements of all the frequencies and generated mechanical power are available, i.e., Y = {fi }1:g , {Pm,i }1:g ]| ∈ R2g . The nonlinear function h( · ) and the constant matrices Bd , Bf and C can be easily obtained by the mapping between the analytical model and (29). To transfer the ODE dynamic expression (29) into the DAE (5) it suffices to introduce " # X − Xe x := , z := Y − CXe d # " # " # " −pI + A Bd 0 h(X) − A(X − Xe ) , , H(p) := , L(p) := E(x) := −I 0 C 0 " # Bf F (p) := , 0 ∂h where Xe is the equilibrium of (29), i.e., h(Xe ) = 0, and A := ∂X . Notice that by the X=Xe above definition, the nonlinear term E( · ) only carries the nonlinearity of the system while the linear terms of the dynamic are incorporated into the constant matrices H, L, F . This can always be done without loss of generality, and practically may improve the performance of the scheme, as the linear terms can be fully decoupled from the residual of the filter. 5.1.2. Load Deviations and Disturbances. Small power imbalances arise during normal operation of power networks due, for example, to load fluctuation, load forecast errors, and trading on electricity market. Each of these sources give rise to deviations at different time scale. High frequency load fluctuation is typically time uncorrelated stochastic noise on a second or minute time scale, whereas forecast errors usually stem from the mismatch of predicted and actual consumption on a 15-minute time scale. Figure 2 demonstrates two samples of stochastic load fluctuation and forecast error which may appear at two different nodes of the network [Anda, p. 59]. The trading on the electricity market also introduces disturbances, for example, in an hourly framework (depending on the market). To capture these sources of uncertainty we consider a space of disturbance patterns comprising combinations of sinusoids at different frequency ranges (to model short term load fluctuation and mid-term forecast errors) and step functions (to model long-term abrupt changes due to the market). The space of load deviations (i.e., the disturbance patterns D in our FDI setting) is 18 P. Mohajerin Esfahani and J. Lygeros then described by (30) ∆Pload (t) := α0 + η X αi sin(ωi t + φi ), t ∈ [0, T ], i=1 where the parameters (αi )ηi=0 , (ωi )ηi=1 (φi )ηi=1 , and η are random variables whose distributions Pη induce the probability measure on D. We assume that i=0 |αi |2 is uniformly bounded with probability 1 to meet the requirements of Theorem 4.11. 5.2. Diagnosis Filter Design. To design the FDI filter, we set the degree of the filter dN = 7, the denominator a(p) = (p + 2)dN , and the finite time horizon T = 10 sec. Note that the degree of the filter is significantly less than the dimension of the system (29), which is 59. This is a general advantage of the residual generator approach in comparison to the observer-based approach where the filter order is effectively the same as the system dynamics. To compute the signature matrix Qx , we resort to the finite dimensional approximation QB in Proposition 4.7. Inspired by the class of disturbances in (30), we first choose Fourier basis with 80 harmonics ( cos( 2i ωt) i : even 2π bi (t) := (31) , ω := , i ∈ {0, 1, · · · , 80}. i+1 T ωt) i : odd sin( 2 We should emphasize that there is no restriction on the basis selection as long as Assumptions 4.6 are fulfilled; we refer to [MVAL12, Section V.B] for another example with a polynomial basis. Given the basis (31), it is easy to see that the differentiation matrix D introduced in (19) is   0 0 0 ··· 0 0 0 0 ω ··· 0 0      ··· 0 0  0 −ω 0  D = . .. .. .. ..  .. . .  .. . . . .    0 0 0 0 80ω  0 0 0 · · · −80ω 0 We can also compute offline (independent of x) the matrix G in (21) with the help of the basis (31) and the denominator a(p). To proceed with Qx of a sample ∆Pload we need to run the system dynamic (29) with the input d( · ) := ∆Pload and compute x(t) := [X(t)| , ∆Pload (t)]| where X is the internal states of the system. Given the signal x, we then project the nonlinearity signature  t 7→ ex (t) =: E x(t) onto the subspace B (i.e., TB (ex )), and finally obtain Qx from (22). In the following simulations, we deploy the YALMIP toolbox [Lof04] to solve the corresponding optimization problems. 5.3. Simulation Results. 5.3.1. Test system. To illustrate the FDI methodology we employed the IEEE 118-bus system. The data of the model are retrieved from a snapshot available at [ref]. It includes 19 generators, 177 lines, 99 load buses and 7 transmission level transformers. Since there were no dynamic data available, typical values provided by [AF02] were used for the simulations. The network was arbitrarily divided into two control areas whose nonlinear frequency model was developed in the preceding subsections. Figure 3 depicts a single-line diagram of the network and the boundaries of the two controlled areas where the first and second area contain, respectively, 12 and 7 generators. 19 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance Area 2 Area 1 Figure 3. IEEE 118-bus system divided into two control areas 20 20 ΔP ΔP Load Load 5 Attack 10 0 0 5 10 (i) Load deviation at node 5 (dash) and AGC attack (solid) 0.2 15 Residual 0 −0.2 0 0 0 5 10 (i) Load deviation at node 5 (dash) and AGC attack (solid) 0.2 15 Residual 0 5 (ii) Linearized Model: E(x) ≡ 0 10 2 15 Residual 0 −2 0 5 Attack 10 −0.2 0 5 (ii) Linearized Model: E(x) ≡ 0 10 0.2 15 Residual 0 5 (iii) Full Nonlinear Model 10 15 −0.2 0 5 (iii) Full Nonlinear Model 10 15 (a) Performance of the filter neglecting the nonlinear (b) Performance of the filter trained for the step signaterm tures Figure 4. Performance of the FDI filters with step inputs 5.3.2. Numerical results. In the first simulation we consider the scenario that an attacker manipulates the AGC signal of the first area at Tack = 10 sec. We model this intrusion as a step signal equal to 14 M W injected into the AGC in Area 1. To challenge the filter, we also assume that a step load deviation occurs at Tload = 1 sec at node 5. In the following we present the results of two filters: Figure 4(a) shows the filter based on formulation (12) in Approach (I), which basically neglects the nonlinear term; Figure 4(b) shows the proposed filter in (24) based on AP perspective where the payoff function is J(α) := α2 ; see Remark 4.9 why such a payoff function is of particular interest. We validate the filters performance with two sets of measurements: first the measurements obtained from the linearized dynamic (i.e. E(x) ≡ 0); second the measurements obtained from the full nonlinear model (29). As shown in Fig. 4(a)(ii) and Fig. 4(b)(ii), both filters work perfectly well with linear dynamics measurements. It even appears that the first filter seems 20 P. Mohajerin Esfahani and J. Lygeros 1 0.9 0.8 0.7 ρ 0.6 0.5 0.4 0.3 0.2 0.1 0 0 100 200 300 400 500 600 Disturbance Samples 700 800 900 1000 Figure 5. The indicator ρ defined in (32) more sensitive. However, Fig. 4(a)(iii) and Fig. 4(b)(iii) demonstrate that in the nonlinear setting the first filter fails whereas the robustified filter works effectively similar to the linear setting. In the second simulation, to evaluate the filter performance in more realistic setup, we robustify the filter to random disturbance patterns, and then verify it with new generated samples. To measure the performance in the presence of the attack, we introduce the following indicator: max kr(t)k∞ (32) ρ := t≤Tack max kr(t)k∞ , t≤T where r is the residual (11), and Tack is when the attack starts. Observe that ρ ∈ [0, 1], and the lower ρ the better performance for the filter, e.g., in Fig. 4(a)(iii) ρ = 1, and in Fig. 4(b)(iii) ρ ≈ 0. In the training phase, we randomly generate five sinusoidal load deviations as described in (30), and excite the dynamics for T = 10 sec in the presence of each of the load deviations individually. Hence, in total we have n = 19 × 5 = 95 disturbance signatures. Then, we compute f in (24) with the payoff function J(α) := α2 and these the filter coefficients by virtue of AP 95 samples. In the operation phase, we generate two new disturbance patterns with the same distribution as in the training phase and run the system in the presence of both load deviations simultaneously at two random nodes for the horizon T = 120 sec. Meanwhile, we inject an attack signal at Tack = 110 sec in the AGC, and compute the indicator ρ in (32). Figure 5 demonstrates the result of this simulation for 1000 experiments. 6. Conclusion and Future Directions In this article, we proposed a novel perspective toward the FDI filter design, which is tackled via an optimization-based methodology along with probabilistic performance guarantees. Thanks to the convex formulation, the methodology is applicable to high dimensional nonlinear systems in which some statistical information of exogenous disturbances are available. Motivated by our earlier works, we deployed the proposed technique to design a diagnosis filter to detect the AGC malfunction in two-area power network. The simulation results validated the filter performance, particularly when the disturbance patterns are different from training to the operation phase. 21 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance The central focus of the work here is to robustify the filter to certain signatures of dynamic nonlinearities in the presence of given disturbance patterns. As a next step, motivated by applications that the disruptive attack may follow certain patterns, a natural question is whether the filter can be trained to these attack patterns. From the technical standpoint, this problem in principle may be different from the robustification process since the former may involve maximization of the residual norm as opposed to the minimization for the robustification discussed in this article. Therefore, this problem offers a challenge to reconcile the disturbance rejection and the fault sensitivity objectives. The proposed methodology in this study is applicable to both discrete and continuous-time dynamics and measurements. In reality, however, we often have different time-setting in different parts, i.e., we only have discrete-time measurements while the system dynamics follows a continuous-time behavior. We believe this setup introduces new challenges to the field. We recently reported heuristic attempts toward this objective in [ETML13], though there is still a need to address this problem in a rigorous and systematic framework. Acknowledgment The authors are grateful to M. Vrakopoulou and G. Andersson for the help on the AGC case study. The first author also thanks G. Schildbach for fruitful discussions on randomized algorithms. I. Appendix I.1. Proofs of Section 4.2. Let us start with a preliminary required for the main proof of this section. PdN Lemma I.1. Let N (p) := i=0 Ni pi be an Rnr row polynomial vector with degree dN , and a(p) be a stable polynomial with the degree at least dN . Let N̄ := [N0 N1 · · · NdN ] be the collection of the coefficients of N (p). Then, p e N̄ k∞ , e := nr (dN + 1) ka−1 kH . a−1 N H∞ ≤ Ck C ∞ Proof. Let b(p) := (I.1)  Let b̄ := b0 (I.2) b1 PdN i be a polynomial scaler function. By H∞ -norm definition we have PdN 2 2i b(jω) 2 2 i=0 |bi | ω ≤ sup . a−1 b H∞ = sup |a(jω)|2 ω∈[0,∞) ω∈(−∞,∞) a(jω)  · · · bdN . It is then straightforward to inspect that ( dN X (dN + 1)kb̄k2∞ if ω ∈ [0, 1] 2 2i |bi | ω ≤ 2 2dN (dN + 1)kb̄k∞ ω if ω ∈ (1, ∞) i=0 i=0 bi p Therefore, (I.1) together with (I.2) yields to a−1 b 2 H∞ ≤ (dN + 1) a−1 2 kb̄k2∞ . H∞ Now, taking the dimension of the vector N (p) into consideration, we conclude the desired assertion.  22 P. Mohajerin Esfahani and J. Lygeros Proof of Lemma 4.5. Let ` ≥ dN be the degree of the scalar polynomial a(p). Then, taking advantage of the state-space representation of the matrix transfer function a−1 (p)N (p), in particular the observable canonical form [ZD97, Section 3.5], we have Z t rx (t) = C e−A(t−τ ) Bex (τ )dτ + Dex (t), 0 1×` where C ∈ R is a constant vector, A ∈ R`×` is the state matrix depending only on a(p), `×nr and B ∈ R and D ∈ R1×nr are matrices that depend linearly on all the coefficients of the numerator N̄ ∈ Rnr (dN +1) . Therefore, it can be readily deduced that (14a) holds for some n (d +1) function ψx ∈ WT r N . In regard to (14a) and the definition (13), we have (I.3) kN̄ ψx kL2 = krx kL2 = a−1 (p)N (p)ex L2 ≤ a−1 N H∞ e N̄ k∞ kex kL , kex kL2 ≤ Ck 2 where the first inequality follows from the classical result that the L2 -gain of a matrix transfer function is the H∞ -norm of the matrix [ZD97, Theorem 4.3, p. 51], and the second inequality follows from Lemma I.1. Since (I.3) holds for every N̄ ∈ Rnr (dN +1) , then p e x kL , kψx kL2 ≤ nr (dN + 1) Cke 2 which implies (14b).  Proof of Proposition 4.7. Observe that by virtue of the triangle inequality and linearity of the projection mapping we have  e N̄ k∞ δ, krx kL2 − a−1 (p)N (p)TB (ex ) L2 ≤ a−1 (p)N (p) ex − TB (ex ) L2 ≤ Ck where the second inequality follows in the same spirit as (I.3) and kex − TB (ex )kL2 ≤ δ. Note that by definitions of Qx and QB in (15) and (22), respectively, we have  2 e N̄ k∞ δ Ck e N̄ k∞ δ + 2krx kL N̄ (Qx − QB )N̄ | = krx k2L2 − a−1 (p)N (p)TB (ex ) L ≤ Ck 2 2   e 2 kN̄ k2∞ δ δ + 2kex kL ≤ Cka−1 kH kN̄ k22 δ 1 + 2kex kL ≤C 2 ∞ 2 where the inequality of the first line stems from the simple inequality |α2 − β 2 | ≤ |α − β| 2|α| +  |α − β| , and C is the constant as in (14b).  I.2. Proofs of Section 4.3. To prove Theorem 4.11 we need a preparatory result addressing the continuity of the mapping φ in (26). Lemma I.2. Consider the function φ as defined in (26). Then, there exists a constant L > 0 such that for any N̄1 , N̄2 ∈ N and x1 , x2 ∈ WTnx where kxi kL2 ≤ M , we have  φ(N̄1 , x1 ) − φ(N̄2 , x2 ) ≤ L N̄1 − N̄2 ∞ + kx1 − x2 kL2 . Proof. Let LE be the Lipschitz continuity constant of the mapping E : Rnx → Rnr in (13). We modify the notation of rx in (13) with a new argument as rx [N̄ ], in which N̄ represents the filter coefficients. Then, with the aid of (I.3), we have sup sup krx [N̄ ]kL2 ≤ kxkL2 ≤M N̄ ∈N sup e E kN̄ k∞ kxkL ≤ M f, sup CL 2 f := CL e E M, M kxkL2 ≤M N̄ ∈N e is introduced in Lemma I.1. As the payoff function J is convex, it is then where the constant C f] [Ber09, Proposition 5.4.2, p. 185]; we denote Lipschitz continuous over the compact set [0, M this Lipschitz constant by LJ . Then for any N̄i ∈ N and kxi kL2 ≤ M , i ∈ {1, 2}, we have, φ(N̄1 , x1 ) − φ(N̄2 , x2 ) ≤ LJ rx1 [N1 ] L2 23 − rx2 [N2 ] L2 (I.4) A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance   ≤ LJ rx1 [N1 ] − rx1 [N2 ] L + rx1 [N2 ] − rx2 [N2 ] L 2 2   e x kL kN1 − N2 k∞ + Cke e x − ex kL kN2 k∞ ≤ LJ Cke 1 2 1 2 2  e E M kN1 − N2 k∞ + kx1 − x2 kL . ≤ LJ CL 2 where (I.4) follows from (I.3) and the fact that the mapping (N̄ , ex ) 7→ rx [N̄ ] is bilinear.  Proof of Theorem 4.11. By virtue of Lemma I.2, one can infer that for every N̄ ∈ N the mapping x 7→ φ(N̄ , x) is continuous, and hence measurable. Therefore, φ(N̄ , x) can be viewed as a random variable for each N̄ ∈ N , which yields to the first assertion, see [Bil99, Chapter 2, p. 84] for more details. By uniform (almost sure) boundedness and again Lemma I.2, the mapping N̄ 7→ φ(N̄ , x) is uniformly Lipschitz continuous (except on a negligible set), and consequently first moment continuous in the sense of [Han12, Definition 2.5]. We then reach (i) by invoking [Han12, Theorem 2.1]. For assertion (ii), note that the compact set N is finite dimensional, and thus admits a logarithmic ε-capacity in the sense of [Dud99, Section. 1.2, p. 11]. Therefore, the condition [Dud99, (6.3.4), p. 209] is satisfied. Since the other requirements of [Dud99, Theorem 6.3.3, p. 208] are readily fulfilled by the uniform boundedness assumption and Lemma I.2, we arrive at the desired UCLT assertion in (ii).  To keep the paper self-contained, we provide a proof for Theorem 4.13 in the following, but refer the interested reader to [MSL15, Theorem 4.1] for a result of a more general setting. Proof of Theorem 4.13. The measurability of E is a straightforward consequence of the measurability of [N̄n? , γn? ] and Fubini’s Theorem [Bil95, Theorem 18.3, p. 234]. For notational simplicity, we introduce the following notation. Let ` := nr (dN + 1) + 1 and define the function f : R` × WTnx → R f (θ, x) := N̄ Qx N̄ | − γ, θ := [N̄ , γ]| ∈ R` , where Qx is the nonlinearity signature matrix of x as defined in (15), and θ is the augmented vector collecting all the decision variables. Consider the convex sets Θj ⊂ R` th n Θj := θ = [N̄ , γ]| o N̄ H̄ = 0, N̄ F̄ vj ≥ 1 , ↓ j  | vj := 0, · · · , 1, · · · , 0 , where the size of vj is m := nf (dF + dN + 1). Note that in view of Lemma 4.3, we can replace the Sm characterization of the filter coefficients in (10) with θ ∈ j=1 Θj . We then express the program f 1 in (25a) as follows: CP in (3) and its random counterpart CP   |  min c| θ min c θ   m   S m S θ∈ Θ j θ∈ Θj f1 : CP : CP j=1 j=1       s.t. max f (θ, xi ) ≤ 0, s.t. P f (θ, x) ≤ 0 ≥ 1 − ε i≤n where c is the constant vector with 0 elements except the last which is 1. It is straightforward f in (25) is the same as the to observe that the optimal threshold γn? of the two-stage program CP f optimal threshold obtained in the first stage CP1 . Thus, it suffices to show the desired assertion 24 P. Mohajerin Esfahani and J. Lygeros f 1 . Now, consider considering only the first stage. Let θn? := [N̄n? , γn? ] denote the optimizer of CP f m sub-programs denoted by CP (j) and CP (j) for j ∈ {1, · · · , m}:  (  min c| θ min c| θ θ∈Θj θ∈Θj f CP (j) : CP (j) :   s.t. max f (θ, xi ) ≤ 0, s.t. P f (θ, x) ≤ 0 ≥ 1 − ε i≤n f (j) by θ∗ . Note that for all j, the set Θj is deterministic Let us denote the optimal solution of CP n,j f (j) is feasible if (not affected by x) and convex, and the corresponding random program CP f Θj 6= ∅, thanks to the min-max structure of CP (j). Therefore, we can readily employ the existing results of the random convex problems. Namely, by [CG08, Theorem 1] we have `−1    X n i ∗ Pn E(θn,j ) < ε (1 − ε)n−i , ∀j ∈ {1, · · · , m} i i=0 m ∗ where E is introduced in (28). Furthermore, it is not hard to inspect that θn∗ ∈ θn,j . Thus, j=1 Sm ∗ ∗ E(θn ) ⊆ j=1 E(θn,j ) which yields `−1   m m  X [ X   n i ∗ ∗ ε (1 − ε)n−i . Pn E(θn,j ) <m Pn E(θn∗ ) ≤ Pn E(θn,j ) ≤ i i=0 j=1 j=1 Now, considering β as an upper bound, the desired assertion can be obtained by similar calculation as in [Cal09] to make the above inequality explicit for n in terms of ε and β.  References [Ada75] [AF02] [Anda] [Andb] [Bea71] [Ber09] [Bil95] [Bil99] [Cal09] [CC06] [CG08] [CP82] [CS98] [DS99] Robert A. Adams, Sobolev spaces, Academic Press [A subsidiary of Harcourt Brace Jovanovich, Publishers], New York-London, 1975, Pure and Applied Mathematics, Vol. 65. P. M. Anderson and A. A. Fouad, Power System Control and Stability, IEEE Computer Society Press, 2002. Gran Andersson, Dynamics and control of electric power systems, Power System Laboratory, ETH Zurich,. , Power system analysis, Power System Laboratory, ETH Zurich,. R. V. Beard, Failure accommodation in linear systems through self-reorganization, Ph.D. thesis, Massachusetts Inst. Technol., Cambridge, MA, 1971. Dimitri P. Bertsekas, Convex Optimization Theory, Athena Scientific, 2009. MR 2830150 (2012f:90001) Patrick Billingsley, Probability and measure, third ed., Wiley, 1995. MR 1324786 (95k:60001) , Convergence of Probability Measures, second ed., Wiley Series in Probability and Statistics: Probability and Statistics, John Wiley & Sons Inc., New York, 1999. MR 1700749 (2000e:60008) Giuseppe C. Calafiore, A note on the expected probability of constraint violation in sampled convex programs, 18th IEEE International Conference on Control Applications Part of 2009 IEEE Multiconference on Systems and Control, july 2009, pp. 1788 – 1791. Giuseppe C. Calafiore and Marco C. Campi, The scenario approach to robust control design, IEEE Trans. Automat. Control 51 (2006), no. 5, 742–753. MR 2232597 (2007a:93075) M. C. Campi and S. Garatti, The exact feasibility of randomized solutions of uncertain convex programs, SIAM J. Optim. 19 (2008), no. 3, 1211–1230. MR 2460739 (2009j:90081) J. Chen and R. Patton, Robust model based faults diagnosis for dynamic systems, Dordrecht: Kluwer Academic Publishers, New York, 1982. Walter H. Chung and Jason L. Speyer, A game-theoretic fault detection filter, IEEE Trans. Automat. Control 43 (1998), no. 2, 143–161. Randal K Douglas and Jason L Speyer, H bounded fault detection filter, Journal of guidance, control, and dynamics 22 (1999), no. 1, 129–138. 25 A Tractable FDI Approach for Nonlinear Systems with Probabilistic Performance [Dud99] R. M. Dudley, Uniform Central Limit Theorems, Cambridge Studies in Advanced Mathematics, vol. 63, Cambridge University Press, Cambridge, 1999. MR 1720712 (2000k:60050) [EFK13] Daniel Eriksson, Erik Frisk, and Mattias Krysander, A method for quantitative fault diagnosability analysis of stochastic linear descriptor models, Automatica 49 (2013), no. 6, 1591–1600. [ETML13] Erasmia Evangelia Tiniou, Peyman Mohajerin Esfahani, and John Lygeros, Fault detection with discrete-time measurements: an application for the cyber security of power networks, 52nd IEEE Conference Decision and Control, Dec 2013, pp. 194–199. [FF12] Giuseppe Franzè and Domenico Famularo, A robust fault detection filter for polynomial nonlinear systems via sum-of-squares decompositions, Systems & Control Letters 61 (2012), no. 8, 839–848. [FKA09] Erik Frisk, Mattias Krysander, and Jan Aslund, Sensor placement for fault isolation in linear differential-algebraic systems, Automatica 45 (2009), no. 6, 364–371. [Han12] Lars Peter Hansen, Proofs for large sample properties of generalized method of moments estimators, Journal of Econometrics 170 (2012), no. 2, 325–330. MR 2970318 [HKEY99] H. Hammouri, M. Kinnaert, and E.H. El Yaagoubi, Observer-based approach to fault detection and isolation for nonlinear systems, Automatic Control, IEEE Transactions on 44 (1999), no. 10, 1879 –1884. [HP96] M. Hou and R.J. Patton, An lmi approach to H− /H∞ fault detection observers, Control ’96, UKACC International Conference on (Conf. Publ. No. 427), vol. 1, sept. 1996, pp. 305 – 310 vol.1. [Jon73] H. L. Jones, Failure detection in linear systems, Ph.D. thesis, Massachusetts Inst. Technol., Cambridge, MA, 1973. [Kha92] Hassan K. Khalil, Nonlinear systems, Macmillan Publishing Company, New York, 1992. MR 1201326 (93k:34001) [Lof04] J. Lofberg, Yalmip : a toolbox for modeling and optimization in matlab, Computer Aided Control Systems Design, 2004 IEEE International Symposium on, sept. 2004, pp. 284 –289. [Lue69] David G. Luenberger, Optimization by vector space methods, John Wiley & Sons Inc., New York, 1969. [MA04] R Timothy Marler and Jasbir S Arora, Survey of multi-objective optimization methods for engineering, Structural and multidisciplinary optimization 26 (2004), no. 6, 369–395. [Mas86] Mohammad-Ali Massoumnia, A geometric approach to the synthesis of failure detection filters, IEEE Trans. Automat. Control 31 (1986), no. 9, 839–846. [MEVAL] Peyman Mohajerin Esfahani, Maria Vrakopoulou, Goran Andersson, and John Lygeros, Intrusion detection in electric power networks, Patent applied for EP-12005375, filed 24 July 2012. [MSL15] Peyman Mohajerin Esfahani, Tobias Sutter, and John Lygeros, Performance bounds for the scenario approach and an extension to a class of non-convex programs, IEEE Transactions on Automatic Control 60 (2015), no. 1, 46–58. [MVAL12] Peyman Mohajerin Esfahani, Maria Vrakopoulou, Goran Andersson, and John Lygeros, A tractable nonlinear fault detection and isolation technique with application to the cyber-physical security of power systems, 51st IEEE Conference Decision and Control, Dec 2012, Full version: http://control. ee.ethz.ch/index.cgi?page=publications;action=details;id=4196, pp. 3433–3438. [MVM+ 10] Peyman Mohajerin Esfahani, Maria Vrakopoulou, Kostas Margellos, John Lygeros, and Goran Andersson, Cyber attack in a two-area power system: Impact identification using reachability, American Control Conference, 2010, pp. 962–967. [MVM+ 11] , A robust policy for automatic generation control cyber attack in two area power network, 49th IEEE Conference Decision and Control, 2011, pp. 5973–5978. [MVW89] Mohammad-Ali Massoumnia, G. C. Verghese, and A. S. Willsky, Failure detection and identification, IEEE Transaction on Automatic Control 34 (1989), no. 3, 316–321. [NF06] Mattias Nyberg and Erik Frisk, Residual generation for fault diagnosis of system described by linear differential-algebraic equations, IEEE Transaction on Automatic Control 51 (2006), no. 12, 1995– 2000. [PI01] Claudio De Persis and Alberto Isidori, A geometric approach to nonlinear fault detection and isolation, IEEE Trans. Automat. Control 46 (2001), no. 6, 853–865. [PW98] Jan Willem Polderman and Jan C. Willems, Introduction to mathematical systems theory, Texts in Applied Mathematics, vol. 26, Springer-Verlag, New York, 1998, A behavioral approach. [ref] Power systems test case archive, college of engineering,university of washington, URL: http://www.ee.washington.edu/research/pstca/. 26 P. Mohajerin Esfahani and J. Lygeros [SF91] R. Seliger and P.M. Frank, Fault diagnosis by disturbance-decoupled nonlinear observers, Proceedings of the 30th IEEE Conference on Decision and Control, 1991, pp. 2248–2253. [Shc07] A. A. Shcheglova, Nonlinear differential-algebraic systems, Sibirsk. Mat. Zh. 48 (2007), no. 4, 931– 948. MR 2355385 (2009c:34002) [SMEKL13] Bratislav Svetozarevic, Peyman Mohajerin Esfahani, Maryam Kamgarpour, and John Lygeros, A robust fault detection and isolation filter for a horizontal axis variable speed wind turbine, American Control Conference (ACC), 2013, June 2013, pp. 4453–4458. [ZD97] Kemin Zhou and John C. Doyle, Essentials of robust control, Prentice Hall, September 1997. 27
3cs.SY
1 Secure Group Testing arXiv:1607.04849v3 [cs.IT] 16 Jan 2018 Alejandro Cohen Asaf Cohen Abstract—The principal goal of Group Testing (GT) is to identify a small subset of “defective” items from a large population, by grouping items into as few test pools as possible. The test outcome of a pool is positive if it contains at least one defective item, and is negative otherwise. GT algorithms are utilized in numerous applications, and in many of them maintaining the privacy of the tested items, namely, keeping secret whether they are defective or not, is critical. In this paper, we consider a scenario where there is an eavesdropper (Eve) who is able to observe a subset of the GT outcomes (pools). We propose a new non-adaptive Secure Group Testing (SGT) algorithm based on information-theoretic principles, which keeps the eavesdropper ignorant regarding the items’ status. Specifically, when the fraction of tests observed by Eve is 0 ≤ δ < 1, we prove that the number of tests required for both correct reconstruction at the legitimate user (with high 1 probability) and negligible information leakage to Eve is 1−δ times the number of tests required with no secrecy constraint for fixed K regime. By a matching converse, we completely characterize the Secure GT capacity. Moreover, we consider a computationally efficient decoding algorithm, and prove that for δ < 1/2 the number of tests required, without any constraint on 1 times the number of tests required with no K, is at most 1/2−δ secrecy constraint. I. I NTRODUCTION The classical version of Group Testing (GT) was suggested during World War II in order to identify syphilis-infected draftees while dramatically reducing the number of required tests [1]. Specifically, when the number of infected draftees, K, is much smaller than the population size, N , instead of examining each blood sample individually, one can conduct a small number of of pooled samples. Each pool outcome is negative if it contains no infected sample, and positive if it contains at least one infected sample. The problem is thus to identify the infected draftees via as few pooled tests as possible. Figure 1 (a)-(c) depicts a small example. Since its exploitation in WWII, GT has been utilized in numerous fields, including biology and chemistry [2], [3], communications [4]–[7], sensor networks [8], pattern matching [9] and web services [10]. GT has also found applications in the emerging field of Cyber Security, e.g., detection of significant changes in network traffic [11], Denial of Service attacks [12] and indexing information for data forensics [13]. Many scenarios which utilize GT involve sensitive information which should not be revealed if some of the tests leak (for instance, if one of the several labs to which tests have been distributed for parallel processing is compromised). However, in GT, leakage of even a single pool-test outcome may reveal significant information about the tested items. If A. Cohen, A. Cohen and O. Gurewitz are with the Department of Communication Systems Engineering, Ben-Gurion University of the Negev, BeerSheva 84105, Israel (e-mail: [email protected]; [email protected]; [email protected]). S. Jaggi is with the Department of Information Engineering, Chinese University of Hong Kong ([email protected]). Parts of this work were presented at the IEEE International Symposium on Information Theory, ISIT 2016. Sidharth Jaggi Omer Gurewitz the test outcome is negative it indicates that none of the items in the pool is defective; if it is positive, at least one of the items in the pool is defective (see Figure 1 (d) for a short example). Accordingly, it is critical to ensure that a leakage of a fraction of the pool-tests outcomes to undesirable or malicious eavesdroppers does not give them any useful information on the status of the items. It is very important to note that protecting GT is different from protecting the communication between the parties. To protect GT, one should make sure that information about the status of individual items is not revealed if a fraction of the test outcomes leaks. However, in GT, we do not want to assume one entity has access to all pool-tests, and can apply some encoding function before they are exposed. We also do not want to assume a mixer can add a certain substance that will prevent a third party from testing the sample. To protect GT, one should make sure that without altering mixed samples, if a fraction of them leaks, either already tested or not, information is not revealed. While the current literature includes several works on the privacy in GT algorithms for digital objects [13]–[16], these works are based on cryptographic schemes, assume the testing matrix is not known to all parties, impose a high computational burden, and, last but not least, assume the computational power of the eavesdropper is limited [17], [18]. Information theoretic security considered for secure communication [18], [19], on the other hand, if applied appropriately to GT, can offer privacy at the price of additional tests, without keys, obfuscation or assumptions on limited power. Due to the analogy between channel coding and group-testing regardless of security constraints, [20], [21], in Section II we present an extensive survey of the literature on secure communication as well. Main Contribution In this work, we formally define Secure Group Testing (SGT), suggest SGT algorithms based on information-theoretic principles and analyse their performance. In the considered model, there is an eavesdropper Eve who might observe part of the vector of pool-tests outcomes. The goal of the test designer is to design the tests in a manner such that a legitimate decoder can decode the status of the items (whether the items are defective or not) with an arbitrarily small error probability. It should also be the case that as long as Eve the eavesdropper gains only part of the output vector (a fraction δ - a bound on the value of δ is known a priori to the test designer, but which specific items are observed is not), Eve cannot (asymptotically, as the number of items being tested grows without bound) gain any significant information on the status of any of the items. We propose a SGT code and corresponding decoding algorithms which ensure high of reliability (with high probability over the test design, the legitimate decoder should be able to estimate the status of each item correctly), as well as strong 2 Secure Group-Test Model - Erasure Eavesdropper ∧ Items N Testing Matrix X Y (t) Main Channel T uses Eavesdropper Channel δ 0 1−δ 1 0 Z (t ) Test Outcomes N Eve ? δ 1 Figure 2: An analogy between a wiretap erasure channel and the corresponding SGT model. (a) (c) (b) (d) Figure 1: Classical group testing: An example of test results, a simple decoding procedure at the legitimate decoder and the risk of leakage. The example includes 7 items, out of which at most one defective (the second one in this case; unknown to the decoder). Three pooled tests are conducted. Each row dictates in which pooled tests the corresponding item participates. (a) Since the first result is negative, items 1 and 6 are not defective. (b) The second result is positive, hence at least one of items 2 and 4 is defective. (c) Based on the last result, as item 4 cannot be defective, it is clear that 2 is defective. Note that decoding in this case is simple: any algorithm which will simply rule out each item whose row in the matrix is not compatible with the result will rule out all but the second item, due to the first and last test results being negative, thus identifying the defective item easily. (d) An eavesdropper who has access to part of the results (the first two) can still infer useful information. Our goal is construct a testing matrix such that such an eavesdropper remains ignorant. secrecy conditions (as formally defined in Section III) - which ensures that essentially no information about the status of individual items leaks to Eve. Our first SGT code and corresponding decoding algorithm (based on Maximum Likelihood (ML) decoding) requires a number of tests that is essentially information-theoretically optimal in N, K and δ (as demonstrated in Section VI by corresponding information-theoretic converse that we also show for the problem). The second code and corresponding decoding algorithm, while requiring a constant factor larger number of tests than is information-theoretically necessary (by a factor that is a function of δ), is computationally efficient. It maintains the reliability and secrecy guarantees, yet requires only O(N 2 T ) decoding time, where T is the number of tests. We do so by proposing a model, which is, in a sense, analogous to a wiretap channel model, as depicted in Figure 2. In this analogy the subset of defective items (unknown a priori to all parties) takes the place of a confidential message. The testing matrix (representing the design of the pools - each row corresponds to the tests participated in by an item, and each column corresponds to a potential test) is a succinct representation of the encoder’s codebook. Rows or disjunctive unions of rows of this testing matrix can be considered as codewords. The decoding algorithm is analogous to a channel decoding process, and the eavesdropped signal is the output of an erasure channel, namely, having only any part of the transmitted signal from the legitimate source to the legitimate receiver. In classical non-adaptive group-testing, each row of the testing matrix comprises of a length-T binary vector which determines which pool-tests the item is tested in. In the SGT code constructions proposed in this work, each item instead corresponds to a vector chosen uniformly at random from a pre-specified set of random and independent vectors. Namely, we use stochastic encoding, and each vector corresponds to different sets of pool-tests an item may participate in. For each item the lab picks one of the vectors in its set (we term the set associated with item j as “Bin j”) uniformly at random, and the item participates in the pool-tests according to this randomly chosen vector. The set (“Bin”) is known a priori to all parties, but the specific vector chosen by the encoder/mixer is only known to the encoder/mixer, and hence is not a shared key/common randomness in any sense. A schematic description of our procedure is depicted in Figure 4. Accordingly, by obtaining a pool-test result, without knowing the specific vectors chosen by the lab for each item, the eavesdropper may gain only negligible information regarding the items themselves. Specifically, we show that by careful design of the testing procedure, even though the pool-tests in which each item participated are chosen randomly and even though the legitimate user does not know a-priori in which pool-tests each item has participated, the legitimate user will, with high probability over the testing procedure, be able to correctly identify the set of defective items, while the eavesdropper, observing only a subset of the pool-test results, will have no significant information regarding the status of the items. The structure of this work is as follows. In Section II, we present an extensive survey and summarize the related work. In Section III, a SGT model is formally described. Section IV includes our main results, with the direct proved in Section V and converse proved in Section VI. Section VII 3 describes a computationally efficient algorithm, and proves an upper bound on its error probability. Section VIII concludes the paper. II. BACKGROUND AND R ELATED W ORK A. Group-testing Group-testing comes in various flavours, and the literature on these is vast. At the risk of leaving out much, we reference here just some of the models that have been considered in the literature, and specify our focus in this work. 1) Performance Bounds: GT can be non-adaptive, where the testing matrix is designed beforehand, adaptive, where each new test can be designed while taking into account previous test results, or a combination of the two, where testing is adaptive, yet with batches of non-adaptive tests. It is also important to distinguish between exact recovery and a vanishing probability of error. To date, the best known lower bound on the number of K2 tests required (non-adaptive, exact recovery) is Ω( log K log N ) [22]. The best known explicit constructions were given in [23], resulting in O(K 2 log N ). However, focusing on exact recovery requires more tests, and forces a combinatorial nature on the problem. Settling for high probability reconstructions allows one to reduce the number of tests to the order of K log N .1 For example, see the channel-coding analogy given in [20]. A similar analogy to wiretap channels will be at the basis of this work as well. In fact, probabilistic methods with an error probability guarantee appeared in [24], without explicitly mentioning GT, yet showed the O(K log N ) bound. Additional probabilistic methods can be found in [25] for support recovery, or in [26], when an interesting phase transition phenomenon was observed, yielding tight results on the threshold (in terms of the number of tests) between the error probability approaching one or vanishing. 2) A Channel Coding Interpretation: As mentioned, the analogy to channel coding has proved useful [20]. [21] defined the notion of group testing capacity, that is, the value of log (N ) limN →∞ T K under which reliable algorithms exist, yet, over which, no reliable reconstruction is possible. A converse result for the Bernoulli, non-adaptive case was given in [27]. Strong converse results were given in [28], [29], again, building on the channel coding analogy, as well as converses for noisy GT [30]. In [31], adaptive GT was analyzed as a channel coding with feedback problem. 3) Efficient Algorithms: A wide variety of techniques were used to design efficient GT decoders. Results and surveys for early non-adaptive decoding algorithms were given in [32]–[34]. Moreover, although most of the works described above mainly targeted fundamental limits, some give efficient algorithms as well. In the context of this work, it is important to mention the recent COMP [35], DD and SCOMP [36] algorithms, concepts from which we will use herein. 1 A simple information theoretic argument explains a lower bound. There N N are K defectives out of N items, hence K possibilities to cover: log K bits of information. Since each test carries at most one bit, this is the amount of tests required. Stirling’s approximation easily shows that for K  N , the leading factor of that is K log(N/K). B. Secure communication It is very important to note that making GT secure is different from making communication secure, as remarked in Section I. Now, we briefly survey the literature in secure communication, since many of the ideas/models/primitives in secure communication will have analogues in secure grouptesting. 1) Information-theoretic secrecy: In a secure communication setting, transmitter Alice wishes to send a message m to receiver Bob. To do so, she is allowed to encode m into a (potentially random) function x = f (m), and transmit x over a medium. It is desired that the eavesdropper Eve should glean no information about m from its (potentially noisy) observation z. This information leakage is typically measured via the mutual information between m and z. The receiver Bob should be able to reconstruct m based on its (also potentially noisy) observation of x (and, potentially, a shared secret that both Bob and Alice know, but Eve is ignorant of). There are a variety of schemes in the literature for information-theoretically secure communications.2 Such schemes typically make one of several assumptions (or combinations of these): • Shared secrets/Common randomness/Symmetric-key encryption: The first scheme guaranteed to provide information-theoretic secrecy was by [37], who analyzed the secrecy of one-time pad schemes and showed that they ensure perfect secrecy (no leakage of transmitted message). He also provided lower bounds on the size of this shared key. The primary disadvantage of such schemes is that they require a shared key that is essentially as large as the amount of information to be conveyed, and it be continually refreshed for each new communication. These requirements typically make such schemes untenable in practice. • Wiretap secrecy/Physical-layer secrecy: Wyner et al. [19], [38] first considered certain communication models in which the communication channel from Alice to Eve is a degraded (noisier) version of the channel from Alice to Bob, and derived the information-theoretic capacity for communication in such settings. These results have been generalized in a variety of directions. See [18], [39], [40] for (relatively) recent results. The primary disadvantage of such schemes is that they require that it be possible to instantiate communication channels from Alice to Bob that are better than the communication channel from Alice to Eve. Further, they require that the channel parameters of both channels be relatively well known to Alice and Bob, since the choice of communication rate depends on these parameters. These assumptions make such schemes also untenable in practice, since on one hand Eve may deliberately situate herself to have 2 Security in general has many connotations for instance, in the informationtheory literature it can also mean a scheme that is resilient to an active adversary, for instance a communication scheme that is resilient to jamming against a malicious jammer. In this work we focus our attention on passive eavesdropping adversaries, and aim to ensure secrecy of communications visa-vis such adversaries. We shall thus henceforth use the terms security and secrecy interchangeably. 4 • a relatively clear view of Alice’s transmission than Bob, and on the other hand there are often no clear physicallymotivated reasons for Alice and Bob to know the channel parameters of the channel to Eve. Public discussion/Public feedback: A very nice result by Maurer ( [41] and subsequent work - see [18] for details) significantly alleviated at least one of the charges level against physical-layer security systems, that they required the channel to Bob to be “better” than the channel to Eve. Maurer demonstrated that feedback (even public feedback that is noiselessly observable by Eve) and multiround communication schemes can allow for informationtheoretically secure communication from Alice to Bob even if the channel from Alice to Bob is worse than the channel from Alice to Eve. Nonetheless, such public discussion schemes still require some level of knowledge of the channel parameters of the channel to Eve. 2) Cryptographic security: Due to the shortcomings highlighted above, modern communication systems usually back off from demanding information-theoretic security, and instead attempt to instantiate computational security. In these settings, instead of demanding small information leakage to arbitrary eavesdroppers, one instead assumes bounds on the computational power of the eavesdropper (for instance, that it cannot computationally efficiently invert “one-way functions”). Under such assumptions one is then often able to provide conditional security, for instance with a public-key infrastructure [42], [43]. Such schemes have their own challenges to instantiate. For one, the computational assumptions they rely on are sometimes unfounded and hence sometimes turn out to be prone to attack [17], [18], [44]. For another, the computational burden of implementing cryptographic primitives with strong guarantees can be somewhat high for Alice and Bob [45]. C. Secure Group-Testing On the face of it, the connection between secure communication and secure group-testing is perhaps not obvious. We highlight below scenarios that make these connections explicit. Paralleling the classification of secure communication schemes above, one can also conceive of a corresponding classification of secure GT schemes. 1) Information-theoretic schemes: • Shared secrets/Common randomness/Symmetric-key encryption: A possible scheme to achieve secure group testing, is to utilize a shared key between Alice and Bob. For example, consider a scenario in which Alice the nurse has a large number of blood samples that need to be tested for the presence of a disease. She sends them to a lab named Eve to be tested. To minimize the number of tests done via the lab, she pools blood samples appropriately. However, while the lab itself will perform the tests honestly, it can’t be trusted to keep medical records secure, and so Alice keeps secret the identity of the people tested in each pool. 3 3 Even in this setting, it can be seen that the number of diseased individuals can still be inferred by Eve. However, this is assumed to be a publicly known/estimable parameter. • Given the test outcomes, doctor Bob now desires to identify the set of diseased people. To be able to reconstruct this mapping, a relatively large amount of information (the mapping between individuals’ identities and pools tested) needs to be securely communicated from Alice to Bob. As in the one-time pad secure communication setting, this need for a large amount of common randomness makes such schemes unattractive in practice. Nonetheless, the question is theoretically interesting, and some interesting results have been recently reported in this direction by [13]–[16]. Wiretap secrecy/Physical-layer secrecy: This is the setting of this paper. Alice does not desire to communicate a large shared key to Bob, and still wishes to maintain secrecy of the identities of the diseased people from “honest but curious” Eve. Alice therefore does the following two things: (i) For some δ ∈ (0, 1), she chooses a 1/δ number of independent labs, and divides the T pools to be tested into 1/δ pool sets of T δ pools each, and sends each set to a distinct lab. (ii) For each blood pool, she publicly reveals to all parties (Bob, Eve, and anyone else who’s interested) a set S(t) of possible combinations of individuals whose blood could constitute that specific pool t. As to which specific combination from S(t) of individuals the pool actually comprises of, only Alice knows a priori - Alice generates this private randomness by herself, and does not leak it to anyone (perhaps by destroying all trace of it from her records). The twin-fold goal is now for Alice to choose pool-sets and set of S(t) for each t ∈ [T ] to ensure that as long as no more than one lab leaks information, there is sufficient randomness in the set of S(t) so that essentially no information about the diseased individuals identities leaks, but Bob (who has access to the test reports from all the 1/δ labs) can still accurately estimate (using the publicly available information on S(t) for each test t) the disease status of each individual. This scenario closely parallels the scenario in Wyner’s Wiretap channel. Specifically, this corresponds to Alice communicating a sequence of T test outcomes to Bob, whereas Eve can see only a δ fraction of test outcomes. To ensure secrecy, Alice injects private randomness (corresponding to which set from S(t) corresponds to the combination of individuals that was tested in test t) into each test - this is the analogue of the coding schemes often used for Wyner’s wiretap channels. Remark 1. It is a natural theoretical question to consider corresponding generalizations of this scenario with other types of broadcast channels from Alice to Bob/Eve (not just degraded erasure channels), especially since such problems are well-understood in a wiretap security context. However, the physical motivation of such generalizations is not as clear as in the scenario outlined above. So, even though in principle the schemes we present in Section III can be generalized to other broadcast channels, to keep the presentation in this paper clean we do not pursue these generalizations here. 5 • Remark 2. Note that there are other mechanisms via which Alice could use her private randomness. For instance, she could deliberately contaminate some fraction of the tests she sends to each lab with blood from diseased individuals. Doing so might reduce the amount of private randomness required to instantiate secrecy. While this is an intriguing direction for future work, we do not pursue such ideas here. Public discussion/Public feedback: The analogue of a public discussion communication scheme in the secure group-testing context is perhaps a setting in which Alice sends blood pools to labs in multiple rounds, also known as adaptive group testing in the GT literature. Bob, on observing the set of test outcomes in round i, then publicly broadcasts (to Alice, Eve, and any other interested parties) some (possibly randomized) function of his observations thus far. This has several potential advantages. Firstly, adaptive group-testing schemes (e.g. [36]) significantly outperform the best-known nonadaptive group-testing schemes (in terms of smaller number of tests required to identify diseased individuals) in regimes where K = ω(N 1/3 ). One can hope for similar gains here. Secondly, as in secure communication with public discussion, one can hope that multi-round GT schemes would enable information-theoretic secrecy even in situations where Eve may potentially have access to more test outcomes than Bob. Finally, such schemes may offer storage/computational complexity advantages over non-adaptive GT schemes. Hence this is an ongoing area of research, but outside the scope of this paper. 2) Cryptographic secrecy: As in the context of secure communication, the use of cryptographic primitives to keep information about the items being tested secure has also been explored in sparse recovery problems - see, for instance [13]–[16]. Schemes based on cryptographic primitives have similar weaknesses in the secure GT context as they do in the communication context, and we do not explore them here. Throughout the paper, we use boldface to denote matrices, capital letters to denote random variables, lower case letters to denote their realizations, and calligraphic letters to denote the alphabet. Logarithms are in base 2 and hb (·) denotes the binary entropy function. Figure 3 gives a graphical representation of the model. In general, and regardless of security constraints, non-adaptive GT is defined by a testing matrix T X = [X1T ; X2T ; . . . ; XN ] ∈ {0, 1}N ×T , where each row corresponds to a separate item j ∈ {1, . . . , N }, and each column corresponds to a separate pool test t ∈ {1, . . . , T }. For the j-th item, XjT = {Xj (1), . . . , Xj (T )} is a binary row vector, with the t-th entry Xj (t) = 1 if and only if item j participates in the t-th test. If Aj ∈ {0, 1} denotes an indicator function for the j-th item, determining whether it belongs to the defective set, i.e., Aj = 1 if j ∈ K and Aj = 0 otherwise, the (binary) outcome of the t ∈ {1, . . . , T } pool test Y (t) equals Y (t) = N _ Xj (t)Aj = j=1 _ Xd (t), d∈K W where is used to denote the boolean OR operation. In SGT, we assume an eavesdropper who observes a noisy vector Z T = {Z(1), . . . , Z(T )}, generated from the outcome vector Y T . In the erasure case considered in the work, the probability of erasure is 1 − δ, i.i.d. for each test. That is, on average, T δ outcomes are not erased and are accessible to the eavesdropper via Z T . Therefore, in the erasure case, if Bt ∈ {1, ?} is an erasure indicator function for the t-th pool test, i.e., Bt = 1 with probability δ, and Bt =? with probability 1 − δ, the eavesdropper observes   N _ Z(t) = Y (t)Bt =  Xj (t)Aj  Bt , t = 1, . . . , T. j=1 III. P ROBLEM F ORMULATION In SGT, a legitimate user desires to identify a small unknown subset K of defective items from a larger set N , while minimizing the number of measurements T and keeping the eavesdropper, which is able to observe a subset of the tests results, ignorant regarding the status of the N items. Let N = |N |, K = |K| denote the total number of items, and the number of defective items, respectively. As formally defined below, the legitimate user should (with high probability) be able to correctly estimate the set K; on the other hand, from the eavesdroppers perspective, this set should be “almost”  N uniformly distributed over all possible K sets. We assume that the number K of defective items in K is known a priori to all parties - this is a common assumption in the GT literature [3].4 4 If this is not the case, [46], [47] give methods/bounds on how to “probably approximately” correctly learn the value of K in a single stage with O(log N ) tests.  N } the index of the subset Denote by W ∈ W , {1, . . . , K of defective items. We assume W is uniformly distributed, that is, there is no a priori bias towards any specific subset.5 Further, denote by Ŵ (Y T ) the index recovered by the legitimate decoder, after observing Y T . In this work, we assume that the mixer may use a randomized testing matrix. In this case, the random bits used are know only to the mixer, and are not assumed to be shared with the decoder. In other words, the “codebook” which consists of all possible testing matrices is known to all parties, Alice, Bob and Eve. However, if the mixer choose a specific X, the random value is not shared with Bob or Eve. We refer to the codebook consisting of all 5 This is a common probabilistic model for the set of defectives in grouptesting. Another model, called Probabilistic Group Testing, assumes that items are defective with probability K/N . Yet another model assumes that any set of size at most K (rather than exactly K) instantiates with equal probability. In many group-testing scenarios results for one probabilistic model for the set of defectives can be translated over to other scenarios, so we focus on the model presented above, where exactly K items are defective. 6 Figure 3: Noiseless non-adaptive secure group-testing setup. possible matrices, together with the decoder at Bob’s side as SGT algorithm. As we are interested in the asymptotic behavior, i.e., in “capacity style” results, with a focus on the number of tests T (as a function of N and K) required to guarantee high probability of recovery as the number of items N grows without bound. For simplicity, in the first part of this work, we focus primarily on the regime where K is a constant independent of N . In Section VII, we give an algorithm which applies to any K.6 The following definition lays out the goals of SGT algorithms. Definition 1. A sequence of SGT algorithms with parameters N, K and T is asymptotically (in N) reliable and weakly or strongly secure if, (1) Reliable: The probability (over the index W ) of incorrect reconstruction of W at the legitimate receiver converges to zero. That is, lim P (Ŵ (Y T ) 6= W ) = 0. N →∞ (2) Weakly secure: One potential security goal is so-called weak information-theoretic security against eavesdropping. Specifically, if the eavesdropper observes Z T , a scheme is said to be weakly secure if 1 I(W ; Z T ) = 0. T →∞ T lim (3) Strongly secure: A stronger notion of security is so-called strong information-theoretic security against eavesdropping. Specifically, if the eavesdropper observes Z T , a scheme is said to be strongly secure if lim I(W ; Z T ) = 0. T →∞ Remark 3. Note that strong security implies that in the limit the distribution over Z T is essentially statistically independent of the distribution over W . Specifically, the KL divergence between pZ T ,W and pZ T pW converges to 0. Remark 4. While weak security is a much weaker notation of security against eavesdropping than strong security, and indeed is implied by strong security, nonetheless we consider it in this work for the following reason. Our impossibility result will show that even guaranteeing weak security requires at least a 6 Following the lead of [27], in principle, many of our results in this section as well can be extended to the regime where K = o(N 1/3 ), but for ease of presentation we do not do so here). certain number of tests, and our achievability results will show that essentially the same number of tests suffices to guarantee strong security. Hence both our impossibility and achievability results are with regard to the corresponding “harder to prove” notion of security. To conclude, the goal in this work is to design (for parameters N and K) an N × T measurement matrix (which is possibly randomized) and a decoding algorithm W (Y T ), such that on observing Y T , the legitimate decoder can (with high probability over W ) identify the subset of defective items, and yet, on observing Z T , the eavesdropper learns essentially nothing about the set of defective items. IV. M AIN R ESULTS Under the model definition given in Section III, our main results are the following sufficiency (direct) and necessity (converse) conditions, characterizing the maximal number of tests required to guarantee both reliability and security. The proofs are deferred to Section V and Section VI. A. Direct (Sufficiency) The sufficiency part is given by the following theorem. Theorem 1. Assume a SGT model with N items, out of which K = O(1) are defective. For any 0 ≤ δ < 1, if   1+εK N −K log , (1) T ≥ max i=1,...,K 1 − δ i i for some ε>0 independent of N and K, then there exists a sequence of SGT algorithms which are reliable and secure. That is, as N → ∞, both the average error probability approaches zero exponentially and an eavesdropper with leakage probability δ is kept ignorant. The construction of the SGT algorithm, together with the proofs of reliability and secrecy are deferred to Section V. In fact, in Section V we actually prove that the maximal error probability decays to 0. However, a few important remarks are in order now. First, rearranging terms in eq. (1), we have   1 (1 + ε)K N −K T ≥ max log . 1 − δ i=1,...,K i i That is, compared to only a reliability constraint, the number of tests required for both reliability and secrecy is increased 1 by the multiplicative factor 1−δ , where, again, δ is the leakage probability at the eavesdropper. 7 The result given in Theorem 1 uses an ML decoding at the legitimate receiver. The complexity burden in ML, however, prohibits the use of this result for large N. In Theorem 3, we suggest an efficient decoding algorithm, which maintains the reliability and the secrecy results using a much simpler decoding rule, at the price of only slightly  more tests. Using an upper bound on log N −K , the maximization in i Theorem 1 can be solved easily, leading to simple bound on T with tight scaling and only a moderate constant. Corollary 1. For SGT with parameters K << N and T , reliability and secrecy can be maintained if 1+ε K log(N − K)e. 1−δ  Proof. Substituting log N −K ≤ i log (N −K)e , the maximum i i over i is easily solved. T ≥ Note that together with the converse below, this suggests  K log N T =Θ , and, a Θ (K log N ) result for δ bounded 1−δ away from 1. D. Efficient Algorithms Under the SGT model definition given in Section III, we further consider a computationally efficient algorithm at the legitimate decoder. Specifically, we analyze the Definite NonDefective (DND) algorithm (originally called Combinatorial Orthogonal Matching Pursuit (COMP)), considered for the non-secure GT model in the literature [35], [36]. The theorem below states that indeed efficient decoding (with arbitrarily small error probability) and secrecy are possible, at the price of a higher T . Interestingly, the theorem applies to any K, and not necessarily only to K = O(1). This is, on top of the reduced complexity, an important benefit of the suggested algorithm. Theorem 3. Assume a SGT model with N items,  out of which K are defective. Then, for any δ < 21 1 − lnK2 , there exists an efficient decoding algorithm, requiring O(N 2 T ) operations, such that if the number of tests satisfies T ≥ 1 2 (1 1+ K log N − lnK2 ) − δ its error probability is upper bounded by B. Converse (Necessity) The necessity part is given by the following theorem. Theorem 2. Let T be the minimum number of tests necessary to identify a defective set of cardinality K among population of size N while keeping an eavesdropper, with a leakage probability δ < 1, ignorant regarding the status of the items. Then, if T1 I(W ; Z T ) < , one must have:   N 1 − T T ≥ log , K 1−δ Pe ≤ N − . The construction of the DND GT algorithm, together with the proofs of reliability and secrecy are deferred to Section VII. Clearly, the benefits of the algorithm above come at the price of additional tests and a smaller range of δ it can handle. V. C ODE C ONSTRUCTION AND A P ROOF FOR T HEOREM 1 Returning to the analogy in [21] between channel capacity and group testing, one might define by  Cs the (asymptotic) N minimal threshold value for log K /T , above which no reliable and secure scheme is possible. Under this definition, the result in this paper show that Cs = (1 − δ)C, where C is the capacity without the security constraint. Clearly, this can be written as Cs = C − δC, In order to keep the eavesdropper, which obtains only a fraction δ of the outcomes, ignorant regarding the status of the items, we randomly map the items to the tests. Specifically, as depicted in Figure 4, for each item we generate a bin, containing several rows. The number of such rows corresponds to the number of tests that the eavesdropper can obtain, yet, unlike wiretap channels, it is not identical to Eve’s capacity, and should be normalized by the number of defective items. Then, for the j-th item, we randomly select a row from the j-th bin. This row will determine in which tests the item will participate. In order to rigorously describe the construction of the matrices and bins, determine the exact values of the parameters (e.g., bin size), and analyze the reliability and secrecy, we first briefly review the representation of the GT problem as a channel coding problem [20], together with the components required for SGT.  N A SGT code consists of an index set W = {1, 2, . . . K }, its w-th item corresponding to the w-th subset K ⊂ {1, . . . , N }; A discrete memoryless source of randomness (R, pR ), with known alphabet R and known statistics pR ; An encoder, f : W × R → XSw ∈ {0, 1}K×T raising the usual interpretation as the difference between the capacity to the legitimate decoder and that to the eavesdropper [18]. Note that as the effective number of tests Eve sees is Te = δT , her GT capacity is δC. which maps the index W of the defective items to a matrix XTSw of codewords, each of its rows corresponding to a different item in the index set Sw , w ∈ W, |Sw | = K. The need for a stochastic encoder is similar to most encoders ensuring where T =  + ˜T , with ˜T → 0 as T → ∞. The lower bound is derived using Fano’s inequality to address reliability, assuming a negligible mutual information at the eavesdropper, thus keeping an eavesdropper with leakage probability δ ignorant, and information inequalities bounding the rate of the message on the one hand, and the data Eve does not see on the other. Compared with the lower bound without security constraints, it is increased by the multiplicative factor 1 1−δ . C. Secrecy capacity in SGT 8 Random selection of Test Vector per Item Bin Matrixes of code-words 11000……...0...0101 1 01001……...1...1001 2 M M N-Items 00011……...0...1101 M 1 2 M N 01101……...1...1011 1 10101……...1...0011 2 Secure Group testing Matrix 01001……...1...1001 10001……...0...0110 M M M 10001……...0...0110 M M M M ⇒ 10110……...1...0100 1 11001……...1...1100 2 10110……...1...0100 T N YSecure (t ) = ∨ X j (t ) Aj , 00110……...0...0001 M T j =1 t = 1KT Figure 4: Binning and encoding process for a SGT code. information theoretic security, as randomness is required to confuse the eavesdropper about the actual information [18]. Hence, we define by RK the random variable encompassing the randomness required for the K defective items, and by M the number of rows in each bin. Clearly, M K = H(RK ). At this point, an important clarification is in order. The lab, of course, does not know which items are defective. Thus, operationally, it needs to select a row for each item. However, in the analysis, since only the defective items affect the output (that is, only their rows are ORed together to give Y T ), we refer to the “message” as the index of the defective set w and refer only to the random variable RK required to choose the rows in their bins. In other words, unlike the analogous communication problem, in GT, nature performs the actual mapping from W to XTSw . The mixer only mixes the blood samples according to the (random in this case) testing matrix it has. A decoder at the legitimate user is a map Ŵ : Y T → W. The probability of error is P (Ŵ (Y T ) 6= W ). The probability that an outcome test leaks to the eavesdropper is δ. We assume a memoryless model, i.e., each outcome Y (t) depends only on the corresponding input XSw (t), and the eavesdropper observes Z(t), generated from Y (t) according to p(Y T , Z T |XSw ) = T Y 2) Testing: For each item j, the mixer/lab selects uniformly at random one codeword xT (m) from the j-th bin. Therefore, the SGT matrix contains N randomly selected codewords of length T , one for each item, defective or not. Amongst is an unknown subset XSTw , with the index w representing the true defective items. An entry of the j-th random codeword is 1 if the j-item is a member of the designated pool test and 0 otherwise. 3) Decoding at the Legitimate Receiver: The decoder looks for a collection of K codewords XSTŵ , one from each bin, for which Y T is most likely. Namely, p(Y (t)|XSw (t))p(Z(t)|Y (t)). P (Y T |XSTŵ ) > P (Y T |XSTw ), ∀w 6= ŵ. Then, the legitimate user (Bob) declares Ŵ (Y T ) as the set of bins in which the rows ŵ reside. A. Reliability Let (S 1 , S 2 ) denote a partition of the defective set S into disjoint sets S 1 and S 2 , with cardinalities i and K − i, respectively.7 Let I(XS 1 ; XS 2 , Y ) denote the mutual information between XS 1 and XS 2 , Y , under the i.i.d. distribution with which the codebook was generated and remembering that Y is the output of a Boolean channel. The following lemma is a key step in proving the reliability of the decoding algorithm. Lemma 1. If the number of tests satisfies  i log N −K M i , T ≥ (1 + ε) · max i=1,...,K I(XS 1 ; XS 2 , Y ) then, under the codebook above, as N → ∞ the average error probability approaches zero. Next, we prove Lemma 1, which extends the results in [20] to the codebook required for SGT. Specifically, to obtain a bound on the required number of tests as given in Lemma 1, we first state Lemma 2, which bounds the error probability of the ML decoder using a Gallager-type bound [48]. Definition 2. The probability of error event Ei in the ML decoder defined, as the event of mistaking the true set for a set which differs from it in exactly i items. Lemma 2. The error probability P (Ei ) is bounded by −T P (Ei ) ≤ 2 log Eo (ρ)−ρ K Mi log ( ) (N −K i ) i − −K T T T ! , t=1 We may now turn to the detailed construction and analysis. 1) Codebook Generation: Choose M such that log2 (M ) = T (δ − 0 )/(K) where the error exponent Eo (ρ) is given by " X X X Eo (ρ) = − log Y ∈{0,1} XS 2 ∈{0,1} P (XS 1 ) XS 1 ∈{0,1} #1+ρ 0 0 for some  > 0.  will QT affect the equivocation. Using a distribution P (X T ) = i=1 P (xi ), for each item generate M independent and identically distributed codewords xT (m), 1 ≤ m ≤ M . The codebook is depicted in the left hand side of Figure 4. Reveal the codebook to Alice and Bob. We assume Eve may have the codebook as well. p(Y, XS 2 |XS 1 ) 1 1+ρ , 0 ≤ ρ ≤ 1. 7 This partition helps decompose the error events into classes, where in class i one already knows K − i defective items, and the dominant error event corresponds to missing the other i. Thus, it is easier to present the error event as one “codeword” against another. See Appendix A for the details. 9 Proof of Lemma 1. For this lemma, we follow the derivation in [20]. However, due the different code construction, the details are different. Specially, for each item there is a bin of codewords, from which the decoder has to choose. Define   i log Ki log N −K M K i − − . f(ρ) = Eo (ρ) − ρ T T T We wish to show that T f(ρ) → ∞ as N → ∞. Note that log Ki is a constant for the fixed K regime. Thus for large T we have limT →∞ f(0) = 0. Since the function f(ρ) is differentiable and has a power series expansion, for a sufficiently small α, by Taylor series expansion in the neighborhood of ρ ∈ [0, α] we have f(ρ) = f(0) + ρ df |ρ=0 +Θ(ρ2 ). dρ Now, ∂Eo |ρ=0 ∂ρ XX X = [ P (XS 1 )p(Y, XS 2 |XS 1 ) log p(Y, XS 2 |XS 1 ) Y − XS 2 XS 1 X P (XS 1 )p(Y, XS 2 |XS 1 ) XS 1 = I(Xs1;Xs2,Y) 0.8 XS 1 (1 + ε) log N −K i  Mi < I(XS 1 ; XS 2 , Y ) T for some constant ε > 0, the exponent is positive for large enough T and we have P (Ei ) → 0 as T → ∞ for ρ > 0. Using a union bound one can show that taking the maximum over i will ensure a small error probability in total. 10 20 30 40 50 1 <= i <= K 60 70 80 90 100 90 100 Figure 5: Mutual Information Bound 1800 Necessary T with h (e-1) constant, N = 40000 b 1600 Proof of Claim 1. First, note that Necessary T without h (e-1) constant, N = 40000 b 1400 (a) Sufficient T with hb(e-1) constant, N = 40000 -1 I(X XS 2hb)(e+ I(XSN1=;40000 Y |XS 2 ) Sufficient ) constant, S 1 ; XS 2 , Y ) = I(X S 1T ;without 1200 1000 = H(Y |XS 2 ) − H(Y |XS ) 0 10 20 (b) 30 40 50 60 70 80 = q K−i H(q1i<= ) i <= K    1 1 = q K−i q i log i + 1 − q i log , q (1 − q i ) where equality (a) follows since the rows of the testing matrix are independent, and (b) follows since H(Y |XS ) is the uncertainty of the legitimate receiver given XS , thus when observing the noiseless outcomes of all pool tests, this uncertainty is zero. Also, note that the testing matrix is random and i.i.d. with distribution (1 − q, q), hence the probability for i zeros is q i . Then, under a fixed input distribution for the testing matrix ln(2) (p = ln(2) K , q = 1 − K ) and large K it is easy to verify that the bounds meet at the two endpoint of i = 1 and i = K, yet the mutual information is concave in i thus the bound is obtained. This is demonstrated graphically in Figure 5. Applying Claim 1 to the expression in Lemma 1, we have  i  i log N −K M log N −K M i i ≤ . i I(XS 1 ; XS 2 , Y ) K P (XS 1 )p(Y, XS 2 |XS 1 ) Hence, if 0 2000 P (XS 1 )p(Y, XS 2 |XS 1 )] p(Y, XS 2 |XS 1 ) = I(XS 1 ; XS 2 , Y ). P (XS 1 )p(Y, XS 2 |XS 1 ) i/K I(Xs1;Xs2,Y) 0.4 0 XS 2 XS 1 log P 0.6 0.2 XS 1 XXX Y X 1 Number of tests In Appendix A we analyze the bound provided in Lemma 2. Note that there are two main differences  Kcompared to nonN secured GT. First, the decoder has M possible subsets K  N of codewords to choose from, K for the number of possible bins and M K for the number of possible rows to take in each bin. Thus, when fixing the error event, there are N −K Mi i subsets to confuse the decoder. Moreover, due to the bin structure of the code, there are also many “wrong” codewords which are not the one transmitted on the channel, hence create a decoding error codeword-wise, yet the actual bin decoded may still be the right one. δ−K Hence, substituting M = 2T K , a sufficient condition for reliability is     1+ε N −K i T ≥ max log + T (δ −  ) K i 1≤i≤K i K K Rearranging terms results in T ≥ max 1≤i≤K   1 1+ε N −K log , 1 − δ + K − εδ + εK i/K i The expression I(XS 1 ; XS 2 , Y ) in Lemma 1 is critical to understand how many tests are required, yet it is not a function of the problem parameters in any straight forward mannar. We now bound it to get a better handle on T . where by reducing K and εK we increase the bound on T , and with some constant ε > 0. Noting that this is for large K and N , and that ε is independent of them, achieves the bound on T provided in Theorem 1 and reliability is established. Claim 1. For large K, and under a fixed input distribution ln(2) for the testing matrix ( ln(2) K , 1 − K ), the mutual information between XS 1 and (XS 2 , Y ) is lower bounded by B. Information Leakage at the Eavesdropper I(XS 1 ; XS 2 , Y ) ≥ i . K We now prove the security constraint is met. Hence, we wish to show that I(W ; Z T )/T → 0, as T → ∞. Denote by 10 CT the random codebook and by XST the set of codewords corresponding to the true defective items. We have,  1 1 T T T T I(W ; Z |CT ) = T I(W, RK ; Z |CT ) − I(RK ; Z |W, CT )  (a) 1 = T I(XST ; Z T |CT ) − I(RK ; Z T |W, CT ) = T1 (I(XST ; Z T |CT ) − H(RK |W, CT ) + H(RK |Z T , W, CT ))  (b) 1 = T I(XST ; Z T |CT ) − H(RK ) + H(RK |Z T , W, CT ) 1 1 (c) =I(XS ; Z|CT ) − K log M + H(RK |Z T , W, CT ) T  T  (d) (e) δ − 0 1 1 ≤δ − K T + H(RK |Z T , W, CT ) ≤ T + 0 , T K T where T → 0 as T → ∞. (a) is since there is a 1 : 1 correspondence between (W, RK ) and XST ; (b) is since RK is independent of W and CT ; (c) is since in this direct result the codebook is defined by the construction and is memoryless, as well as the channel; (d) is since by choosing an i.i.d. distribution for the codebook one easily observes that I(XS ; Z|CT ) ≤ δ. Finally, (e) is for the following reason: Given W and the codebook, Eve has a perfect knowledge regarding the bins from which the codewords were selected. It requires to see whether she can indeed estimate RK . Note that the channel Eve sees in this case is the following multiple access channel: each of the defective items can be considered as a “user” with M messages to transmit. Eve’s goal is to decode the messages from all users. This is possible if the rates at which the users transmit are within the capacity region of this MAC. Indeed, this is a (binary) Boolean MAC channel, followed by a simple erasure channel. The sum capacity cannot be larger than δ, and this sum capacity is easily achieved by letting one user transmit at a time, or, in our case, where the codebook is randomly i.i.d. distributed, under a fixed 1 input distribution p = 1 − 2 K . Since actually, we use input ln(2) distribution for the testing matrix of ( ln(2) K , 1 − K ), and 1 ln(2) limK→∞ 1 − 2 K / K = 1, for large K, each user obtain the same capacity; namely, each user sees a capacity of δ/K. Remark 5. Under non-secure GT, it is clear that simply adding tests to a given GT code (increasing T ) can only improve the performance of the code (in terms of reliability). A legitimate decoder can always disregard the added tests. For SGT, however, the situation is different. Simply adding tests to a given code, while fixing the bin sizes, might make the vector of results vulnerable to eavesdropping. In order to increase reliability, one should, of course, increase T , but also increase the bin sizes proportionally, so the secrecy result above will still hold. This will be true for the efficient algorithm suggested in Section VII as well. Remark 6. To establish the weak secrecy constraint we set δ−0 M to be 2T K , where the readability is archived without any constraint on 0 . However, in Appendix B to establish the 0 T δ+ strong secrecy constraint we require M to be 2 K . Remark 7. Note that since 1 1 1 H(RK |Z T , W, CT ) = H(RK ) − I(RK ; Z T , W, CT ) T T T 1 1 = log M − I(RK ; Z T , W, CT ), T T any finite-length approximation for I(RK ; Z T , W, CT ) will give a finite length approximation for the leakage at the eavesdropper. For example, one can use the results in [49], to show that the leakage can be approximated as √1T + 0 . VI. C ONVERSE (N ECESSITY ) In this section, we derive the necessity bound on the required number of tests. Let Z̄ denote the random variable corresponding to the tests which are not available to the eavesdropper. Hence, Y = (Z, Z̄). By Fano’s inequality, if Pe → 0, we have H(W |Y ) ≤ T 0T , where 0T → 0 as T → ∞. Moreover, the secrecy constraint implies I(W ; Z) ≤ T 00T , (2) where 00T → 0 as T → ∞. Consequently,   N log = H(W ) K = I(W ; Y ) + H(W |Y ) (a) ≤ I(W ; Z, Z̄) + T 0T = I(W ; Z) + I(W ; Z̄|Z) + T 0T (b) ≤ (c) I(W ; Z̄|Z) + T 0T + T 00T ≤ I(XSw ; Z̄|Z) + T (0T + 00T ) = H(Z̄|Z) − H(Z̄|XSw , Z) + T (0T + 00T ) (d) ≤ H(Z̄) + T (0T + 00T ) where (a) follows from Fano’s inequality and since Y = (Z, Z̄), (b) follows from (2), (c) follows from the Markov chain W → XSTw → Y → Z and (d) is since conditioning reduces entropy. We now evaluate H(Z̄). Denote by Ē the set of tests which are not available to Eve and by Ēγ the event {|Ē| ≤ T (1 − δ)(1 + γ)} for some γ > 0. We have H(Z̄) = P (Ēγ )H(Z̄|Ēγ ) + P (Ēγc )H(Z̄|Ēγc ) ≤ T (1 − δ)(1 + γ) + T P (Ēγc ) ≤ T (1 − δ)(1 + γ) + T 2−T (1−δ)f (γ) , where the last inequality follows from the Chernoff bound for i.i.d. Bernoulli random variables with parameter (1 − δ) and is true for some f (γ) such that f (γ) > 0 for any γ > 0. Thus, we have   N ≤ T (1 − δ)(1 + γ) + T 2−T (1−δ)f (γ) + T (0T + 00T ). log K That is,   N 1 − T log , T ≥ 1−δ K for some T such that T → 0 as T → ∞. This completes the converse proof. 11 VII. E FFICIENT A LGORITHMS defective items. As a result, we have Pe The achievability result given in Theorem 1 uses a random codebook and ML decoding at the legitimate party. The complexity burden in ML, however, prohibits the use of this result for large N . In this section, we derive and analyze an efficient decoding algorithm, which maintains the reliability result using a much simpler decoding rule, at the price of only slightly more tests. The secrecy constraint, as will be clear, is maintained by construction, as the codebook and mixing process do not change compared to the achievability result given before. Moreover, the result in this section will hold for any K, including even the case were K grows linearly with N. Specifically, we assume the same codebook generation and the testing procedure given in Section V, and analyze the Definite Non-Defective (DND) algorithm, previously considered for the non-secure GT in the literature [35], [36]. The decoding algorithm at the legitimate user is as follows. Bob attempts to match the rows of X with the outcome vector Y T . If a particular row j of X has the property that all locations t where it has 1, also corresponds to a 1 in Y (t), then that row can correspond to a defective item. If, however, the row has 1 at a location t where the output has 0, then it is not possible that the row corresponds to a defective item. The problem, however, when considering the code construction in this paper for SGT, is that the decoder does not know which row from each bin was selected for any given item. Thus, it takes a conservative approach, and declares an item as defective if at least one of the rows in its bin signals it may be so. An item is not defective only if all the rows in its bin prevent it from being so. It is clear that this decoding procedure has no false negatives, as a defective item will always be detected. It may have, though, false positives. A false positive may occur if all locations with ones in a row corresponding to a non-defective item are hidden by the ones of other rows corresponding to defective items and selected by the mixer. To calculate the error probability, fix a row of X corresponding to a nondefective item (a row in its bin). Let j1 ; . . . ; jk index the rows of X corresponding to the K defective items, and selected by the mixer for these items (that is, the rows which were actually added by the Boolean channel). An error event associated with the fixed row occurs if at any test where that row has a 1, at least one of the entries Xj1 (t), . . . , Xjk (t) also has a 1. The probability for this to happen, per column, is p(1 − (1 − p)K ). Hence, the probability that a test result in a fixed row is hidden from the decoder, in the sense that it cannot be declared as non defective due to a specific column, is p(1 − (1 − p)K ) + (1 − p) = 1 − p(1 − p)K . Since this should happen for all T columns, T the error probability for a fixed row is 1 − p(1 − p)K . Now, to compute the error probability for the entire procedure we take a union bound over all M (N − K) rows corresponding to non- ≤ (a) ≤ = (b) ≤ (c) ≤ ≤ T M (N − K) 1 − p(1 − p)K βK log N  y K y  1− MN 1 − K K βK log N   y K−1  y y 1− 1− MN 1 − K K K   β log N !  K y y 1− K   MN 1− Key −y y M N e−y(1− K )e β log N y −y 1 M N 1−y(1− K )e β ln 2 (d) = M N 1− 2 β(1− (e) = 2β(δ−) log N N 1− 2 β(1− = N β(δ−) N 1− 2 β(1− K ln 2 1 N 1−β ( 2 (1− K )−δ) . ≤ 1 ln 2 K ) 1 1 ln 2 ln 2 K ) ) (3) In the above, (a) follows by taking p = y/K and setting T as βK log N , for some positive y and β, to be defined. (b) follows since e−y ≤ (1 − y/n)n−1 for small y > 0 and any integer n > 0. In the sequence below, we will use it with y = ln 2, for which it is true. (c) follows since e−x ≥ (1 − x/n)n for x > 0 and any integer n > 0. (d) follows by choosing y = ln 2. (e) δ− is by setting M = 2T K and substituting the value for T . The result in (3) can be interpreted as follows. As long as δ, the leakage probability at the eavesdropper, is smaller than ln 2 1 2 (1 − K ), choosing T = βK log N with a large enough β results in an exponentially small error probability. For example, for large enough K and δ = 0.25, one needs β > 4, that is, about 4K log N tests to have an exponentially small (with N ) error probability while using an efficient decoding algorithm. To see the dependence of the error probability on the number of tests, denote     1 ln 2 =β 1− − δ − 1. 2 K Then, if the number of tests satisfies T ≥ 1 2 (1 1+ K log N − lnK2 ) − δ one has Pe ≤ N − . Thus, while the results under ML decoding (Theorem 1) show 1 that any value of δ < 1 is possible (with a 1−δ toll on T compared to non-secure GT), the analysis herein suggests that using the efficient algorithm, one can have a small error probability only for δ < 1/2, and the toll on T is greater 1 than 1 −δ . This is consistent with the fact that this algorithm 2 is known to achieve only half of the capacity for non-secure GT [36]. However, both these results may be due to coarse analysis, and not necessarily due to an inherent deficiency in the algorithm. Remark 8 (Complexity). It is easy to see that the algorithm runs over all rows in the codebook, and compares each one 12 Number of items N = 500, Number of defective items K = 3, Erasure Probability at Eve 1- delta = 0.1, Number of iterations = 8000 100 90 to any defective set Sw of size K, hence the probability of error computed decays exponentially for any “message W ”. Success (percentage) 80 70 60 50 40 Success (%) at the Receiver with DND decoder Success (%) at the Receiver with ML decoder Success (%) at Eve with DND decoder Success (%) at Eve with ML decoder DND bound on T ML lower bound on T ML upper bound on T 30 20 10 0 10 20 30 40 50 60 70 80 90 100 110 120 T - Number of pool tests Figure 6: Definite Non-Defective and ML simulation results. to the vector of tests’ results. The length of each row is T . δ There are N items, each having about 2 K T rows in its bin. Since T = O(K log N ), we have O(N 2 ) rows in total. Thus, the number of operations is O(N 2 T ) = O(KN 2 log N ). This should be compared to O(KN log N ) without any secrecy constraint. Figure 6 includes simulation results of the secure DND GT algorithm proposed, compared with ML decoding and the upper and lower bounds on the performance of ML. VIII. C ONCLUSIONS In this paper, we proposed a novel non-adaptive SGT algorithm, which with parameters N, K and T is asymptotically reliable and secure. Specifically, when the fraction of tests observed by Eve is 0 ≤ δ < 1, we prove that the number of tests required for both correct reconstruction at the legitimate user (with high probability) and negligible mutual information 1 times the number of tests required at Eve’s side is 1−δ with no secrecy constraint. We further provide sufficiency and necessity bounds on the number of tests required in the SGT model to obtains both, reliability and secrecy constraints. Moreover, we analyze in the proposed secure model, computationally efficient algorithms at the legitimate decoder, previously considered for the non-secure GT in the literature which identify the definitely non-defective items. A PPENDIX A E RROR P ROBABILITY B OUND In this section, we give a direct proof for Lemma 1. Specifically, we bound the error probability of the maximum likelihood decoder, and show that under the condition on T in the lemma, the error probability is indeed approaching 0 as N → ∞. Under the assumption that all items are equality likely to be defective, we consider the error probability given that the first K items are defective, that is, Sw=1 is the defective set. Denote this probability by Pe|1 . We have Pe|1 ≤ K X P (Ei ), i=1 where Ei is the event of a decoding error in which the decoder declares a defective set which differs from the true one (S1 ) in exactly i items. Note that the discussion below will apply In general, we follow the derivation in [20]. However, there is a key difference. In the code construction suggested in Section V, for each item there are M possible codewords (a “bin” of size M ). Only one of these codewords is selected by the mixer to decide in which pool tests the item will participate. Thus, when viewing this problem as a channel coding problem, if an item is defective, one and only one codeword out of its bin is actually transmitted (and summed with the codewords of the other K − 1 defective items). Since the decoder does not know which codewords were selected in each bin (the randomness is known only to the mixer), there are multiple error events to consider. E.g., events where the decoder choose the wrong codeword for some items, yet identified parts of the bins correctly, and, of course, events where the codeword selected was from a wrong bin. This complicates the error analysis significantly. Moreover, we wish to employ the correction suggested in [50], which results in a simpler yet stricter bound. Consider the event Ei . Clearly, Ei can be broken down into two disjoint events. The first is Ei and the event that the codewords selected for the correct K − i items are the true transmitted ones, and the second is the event of both Ei and the event that at least one of the codewords selected for the correct items is wrong. Denote the first event as Ei0 . Now, consider the case where we have Ei , that is, a correct decision on K − i items, yet, out of these K − i items, the decoder identified only j codewords right, 0 ≤ j < K − i, and for the rest, it identified a wrong codeword in the right bin. We claim that the probability for this event is exactly 0 ), as the decoder has to mistake X0 for XS1 , where P (EK−j both are collections of K codewords, and X0 shares exactly j codewords with XS1 . Thus, we have: Pe|1 ≤ = K X P (Ei ) i=1 K  X P (Ei0 ) + i=1 ≤ 2K K−i−1 X  j=0 K X   K −i−1 0 P (EK−j ) j P (Ei0 ). (4) i=1 The last inequality in (4) is loose, yet it suffices for the proof in the regime where K = O(1). A more delicate bounding technique might be required if K might grow with N . We now bound P (Ei0 ). Particularly, we will establish the following lemma. Lemma 3. The error probability P (Ei0 ) is bounded by −T P (Ei0 ) ≤ 2 log Eo (ρ)−ρ K log ( ) Mi (N −K i i ) − T T ! , 13 where the error exponent Eo (ρ) is given by " X X X Eo (ρ) = − log Y ∈{0,1} XS 2 ∈{0,1}  K There are K−i sets S1,w , and the summation does not depend on which set is it, hence, we get XX ρ iρ K P (Ei0 ) ≤ (N −K p1 (XS 1 ,Y T ) (i) i ) M P (XS 1 ) XS 1 ∈{0,1} Y T XS1 #1+ρ 1 1+ρ p(Y, XS 2 |XS 1 )  , 0 ≤ ρ ≤ 1. X  Proof. Denote by A = {w ∈ W : |S1c ,w | = i, |Sw | = K} the set of indices corresponding to sets of K items that differ from the true defective set S1 in exactly i items. S1c ,w for w ∈ W denotes the set of items which are in Sw but not in S1 . We have ≤ Pr[Ei0 |w0 = 1, XS1 , Y T ] X X pw (Y T ,XS1,w |XS1c ,w )s Q(XS1c ,w ) T s X X X Q(XS1c ,w ) S1,w S1c ,w XS1c ,w (5) pw (Y T ,XS1,w |XS1c ,w )s p1 (Y T ,XS1,w |XS1,wc )s (b)  ≤ X i (N −K i )M S1,w X Q(XS1c ,w ) XS1c ,w (c) ρ iρ ≤ (N −K i ) M X X S1,w ,XS1,w |XS1,wc ) pw (Y T ,XS1,w |XS1c ,w )s ρ p1 (Y T ,XS1,w |XS1,wc )s Q(XS1c ,w ) XS1c ,w pw (Y T ,XS1,w |XS1c ,w )s ρ p1 (Y T ,XS1,w |XS1,wc )s for all s > 0 and 0 ≤ ρ ≤ 1. Note that (a) is since the probability is less than 1 and can be raised to the power of ρ. (b) is critical. It follows from the symmetry of codebook construction, namely, the inner summation depends only on the codewords in XS1c ,w but not the ones in S1c ,w . Due to the code’sconstruction, i.e., its binning structure, there are exactly N −K M i possible sets of codewords to consider for S1c ,w . i (c) follows as the sum of positive numbers raised to the ρ-th power is smaller than the sum of the ρ-th powers. We now continue similar to [20], substituting the conditional error probability just derived in a summation over all codewords and output vectors. We have XX P (Ei0 ) = p1 (XS 1 , Y T ) Pr[Ei0 |w0 = 1, XS1 , Y T ] XS1 Y T ρ iρ ≤ (N −K i ) M X XX p1 (XS 1 ,Y T ) S1,w Y T XS1  X  XS1c ,w Q(XS1c ,w ) s pw (Y T ,XS1,w |XS1c ,w ) p1 (Y T ,XS1,w |XS1,wc )s Y  X XS1,w 1/(1+ρ) (XS1,w ,Y |XS1,wc ) Q(XS1c ,w )p1 1+ρ #T . XS1,wc −T log E0 (ρ)−ρ (N −K i ) + i log M T T ! − log (Ki ) ! T . , Pr[Ei |w0 = 1, XS1 , Y T ] (a)  X X X pw (Y T ,XS1,w |XS1c ,w )s ρ Q(XS1c ,w ) ≤ T s p1 (Y  which continue similar to [20], results in " X X 0 N −K ρ K P (Ei ) ≤ ( i ) M iρ ( i ) P (Ei0 ) ≤ 2 where (5) is exactly [20, eq. (25)], as when considering Ei0 we assume the decoder not only got K − i items right, but also the correct codeword in each such bin. Hence S1,w S1c ,w XS1c ,w p1 (Y T ,XS1,w |XS1,wc )s ρ Thus, we have ,XS1,w |XS1,wc ) p1 (Y w∈A XS1c ,w ≤ Q(XS1c ,w ) XS1c ,w pw (Y T ,XS1,w |XS1c ,w )s ρ  . A PPENDIX B I NFORMATION L EAKAGE AT THE E AVESDROPPER (S TRONG S ECRECY ) We wish to show that I(W ; Z T ) → 0. Denote by CT the random codebook and by XTSw the set of codewords corresponding to the true defective  items. N We assumed W ∈ {1, . . . , K } is uniformly distributed, that is, there is no a-priori bias to any specific subset. Further, the codebook includes independent and identically distributed codewords. The eavesdropper, observing Z T , wish to decode the true K independent and identically distributed codewords,  N which correspond to the defective items, one of K subsets. To analyze the information leakage at the eavesdropper, we note that the channel Eve sees in this case is the following multiple access channel. Each of the items can be considered as a “user” with M specific codewords. Eve’s goal is to identify the active users. Note the Eve’s channel can be viewed as (binary) Boolean MAC, followed by a BEC(1 − δ). The sum capacity to Eve cannot be larger than δ. In fact, since the codebook is randomly i.i.d. distributed, under a fixed ln(2) input distribution for the testing matrix ( ln(2) K , 1 − K ), Eve can obtain from each active user a rate of at most δ/K. Consequently, Eve may obtain a sub-matrix Z̃ of possibly transmitted codewords, where from each codeword Eve sees at most a capacity of δ/K. However, in this analysis, we help Eve even further to get the true sub-matrix Z̃, with the maximum rate δ/K. That is, we assume Eve gets the full rate, identifies the codewords of the users except for the erasures. We give Eve the power not to be confused from the existence of other, N − K users which did not transmit eventually. Providing this information to Eve only makes her stronger and thus a coding scheme that succeeds to keep Eve ignorant, will also succeed against the original Eve. 14 as P r(XjT ∈ C ∩ XjT ∈ Sh(Z̃j̃T , d)) = Vol(Sh(Z̃j̃T , d)) 2T  δ+0  2(1− K )T . 2T δ = T For each item we have M = 2 K codewords. Thus, on average, the number of codewords Eve sees on a shell, per defective item is |{w : XjT (w) ∈ Sh(Z̃j̃T , d)}| Z̃j̃T Figure 7: Codewords exactly lie in a ball around of radius δ d ≈ (1− K )T ), where j is the codeword index and 1 ≤ i ≤ N is the bin index. Now, once Eve obtains the true sub-matrix Z̃, since the codebook and the subsets of the items was generated independently and identically, we will analyze the information that leaks at the eavesdropper from each possibly transmitted codeword in Z̃ separately. Namely, per original codeword XjT , δ T from the T outcomes are not erased and are on average, K accessible to the eavesdropper via Z̃j̃T . Thus, out of the M independent and identically distributed codewords, there is an exponential number of codewords, that from eavesdropper perspective, may have participated in XTSw and could have resulted in the same Z̃j̃T . These consistent codewords are exactly those δ that lie in a ball around Z̃j̃T of radius d ≈ (1− K )T as depicted in Figure 7. The eavesdropper does not know what is the codeword XjT in XTSw , which was selected by the mixer and she even does not know what dH = kXjT − Z̃j̃T k is exactly (where k · k is the δ )T . hamming distance), other than the fact that dH ≈ (1 − K However, we help Eve by providing d and by choosing a  small yet exponential set of codewords (of size 2T K , for an appropriately small ) from the codebook C, chosen from the set of all codewords at distance d from Z̃j̃T , with the additional guarantee that it also contains the true XjT . We refer to this set as the oracle-given set XTOracel . Again, providing this information to Eve only makes her stronger and thus a coding scheme that succeeds to keep Eve ignorant, will also succeed against the original Eve. Conditioned on Eves view Z̃j̃T and XTOracel , each of the codewords in XTOracel is equally likely to have been participated in the pool tests. Nonetheless, Eve still has a reasonable  amount of uncertainty about which of the 2T K codewords was actually participated indeed, this is the uncertainty that we leverage in our analysis. We define, for any Z̃j̃T and d, a ball and a shell as Vol(Z̃j̃T , d) = {XjT : dH (XjT , Z̃j̃T ) ≤ d}, Sh(Z̃j̃T , d) = {XjT : dH (XjT , Z̃j̃T ) = d}. Hence, we define the probability for a codeword to fall in shell  δ+0 K  δ 0 · 2(1− K )T = 2T K . T 2 Hence, we can conclude that, on average, for every item, Eve has quite a few options in a particular shell. Now that we established that the average number of code0 T T TK words per item |{w : Xj (w) ∈ Sh(Z̃j̃ , d)}| is 2 , we wish to calculate the probability that the actual number of options deviates from the average by more than ε. We define = 2 T 0 EC1 (Z̃j̃T , d) := P r{(1 − ε)2T K ≤ 0 |{w : XjT (w) ∈ Sh(Z̃j̃T , d)}| ≤ (1 + ε)2T K }. Let us fix a pair Z̃j̃T and d for large enough T . By the Chernoff bound, and taking union bound over Z̃j̃T and d, we have 0 0 T K P r(EC1 (Z̃j̃T , d)) ≥ 1 − 2−ε 2 . Due to the super exponential decay in T , even when we take a union bound over all the codewords and all shells, we get that the probability that a codeword will have |{w : XjT (w) ∈ 0 Sh(Z̃j̃T , d)}| options significantly different than 2T K is very small. Actually, with high probability, Eve has almost the same number of options per item. Hence, for Eve all the codewords are almost equiprobable. In other words, Eve distribution on the items converges super-exponentially fast to a uniform one, hence H(W |Z T ) → H(W ) and we have I(W ; Z T ) → 0. R EFERENCES [1] R. Dorfman, “The detection of defective members of large populations,” The Annals of Mathematical Statistics, vol. 14, no. 4, pp. 436–440, 1943. [2] D.-Z. Du and F. K. Hwang, Combinatorial group testing and its applications. World Scientific, 1999, vol. 12. [3] A. J. Macula, “Probabilistic nonadaptive group testing in the presence of errors and DNA library screening,” Annals of Combinatorics, vol. 3, no. 1, pp. 61–69, 1999. [4] M. K. Varanasi, “Group detection for synchronous Gaussian codedivision multiple-access channels,” Information Theory, IEEE Transactions on, vol. 41, no. 4, pp. 1083–1096, 1995. [5] M. Cheraghchi, A. Karbasi, S. Mohajer, and V. Saligrama, “Graphconstrained group testing,” IEEE Transactions on Information Theory, vol. 58, no. 1, pp. 248–262, 2012. [6] S. Wu, S. Wei, Y. Wang, R. Vaidyanathan, and J. Yuan, “Partition information and its transmission over Boolean multi-access channels,” Information Theory, IEEE Transactions on, vol. 61, no. 2, pp. 1010– 1027, 2015. [7] ——, “Achievable partition information rate over noisy multi-access Boolean channel,” in Information Theory (ISIT), 2014 IEEE International Symposium on. IEEE, 2014, pp. 1206–1210. 15 [8] W. U. Bajwa, J. D. Haupt, A. M. Sayeed, and R. D. Nowak, “Joint source–channel communication for distributed estimation in sensor networks,” Information Theory, IEEE Transactions on, vol. 53, no. 10, pp. 3629–3653, 2007. [9] R. Clifford, K. Efremenko, E. Porat, and A. Rothschild, “k-mismatch with dont cares,” in European Symposium on Algorithms. Springer, 2007, pp. 151–162. [10] W.-T. Tsai, Y. Chen, Z. Cao, X. Bai, H. Huang, and R. Paul, “Testing web services using progressive group testing,” in Content Computing. Springer, 2004, pp. 314–322. [11] G. Cormode and S. Muthukrishnan, “What’s new: finding significant differences in network data streams,” IEEE/ACM Transactions on Networking (TON), vol. 13, no. 6, pp. 1219–1232, 2005. [12] Y. Xuan, I. Shin, M. T. Thai, and T. Znati, “Detecting application denial-of-service attacks: A group-testing-based approach,” Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 8, pp. 1203– 1216, 2010. [13] M. T. Goodrich, M. J. Atallah, and R. Tamassia, “Indexing information for data forensics,” in Applied Cryptography and Network Security. Springer, 2005, pp. 206–221. [14] M. J. Atallah, K. B. Frikken, M. Blanton, and Y. Cho, “Private combinatorial group testing,” in Proceedings of the 2008 ACM symposium on Information, computer and communications security. ACM, 2008, pp. 312–320. [15] M. J. Freedman, K. Nissim, and B. Pinkas, “Efficient private matching and set intersection,” in Advances in Cryptology-EUROCRYPT 2004. Springer, 2004, pp. 1–19. [16] Y. Rachlin and D. Baron, “The secrecy of compressed sensing measurements,” in Communication, Control, and Computing, 2008 46th Annual Allerton Conference on. IEEE, 2008, pp. 813–817. [17] “Chapter 16: Cryptographic problems and philosophies,” in Stream Ciphers and Number Theory, ser. North-Holland Mathematical Library, C. D. Thomas W. Cusick and A. Renvall, Eds. Elsevier, 2004, vol. 66, pp. 391 – 406. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0924650904800187 [18] M. Bloch and J. Barros, Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, 2011. [19] A. D. Wyner, “The wire-tap channel,” Bell Syst. Tech. J., vol. 54, pp. 1355–1387, 1975. [20] G. K. Atia and V. Saligrama, “Boolean compressed sensing and noisy group testing,” Information Theory, IEEE Transactions on, vol. 58, no. 3, pp. 1880–1901, 2012. A minor corection appered in vol. 61, no. 3, pp. 15071507, 2015. [21] L. Baldassini, O. Johnson, and M. Aldridge, “The capacity of adaptive group testing,” in Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on. IEEE, 2013, pp. 2676–2680. [22] Z. Füredi, “Onr-cover-free families,” Journal of Combinatorial Theory, Series A, vol. 73, no. 1, pp. 172–173, 1996. [23] E. Porat and A. Rothschild, “Explicit nonadaptive combinatorial group testing schemes,” IEEE Transactions on Information Theory, vol. 57, no. 12, pp. 7982–7989, 2011. [24] A. Sebő, “On two random search problems,” Journal of Statistical Planning and Inference, vol. 11, no. 1, pp. 23–31, 1985. [25] J. Scarlett and V. Cevher, “Limits on support recovery with probabilistic models: An information-theoretic framework,” in 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015, pp. 2331–2335. [26] ——, “Phase transitions in group testing,” in Proceedings of the TwentySeventh Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 2016, pp. 40–53. [27] M. Aldridge, “The capacity of bernoulli nonadaptive group testing,” IEEE Transactions on Information Theory, 2017. [28] V. Y. Tan and G. K. Atia, “Strong impossibility results for sparse signal processing,” IEEE Signal Processing Letters, vol. 21, no. 3, pp. 260–264, 2014. [29] O. Johnson, “Strong converses for group testing in the finite blocklength regime,” arXiv preprint arXiv:1509.06188, 2015. [30] J. Scarlett and V. Cevher, “Converse bounds for noisy group testing with arbitrary measurement matrices,” arXiv preprint arXiv:1602.00875, 2016. [31] M. Aldridge, “Adaptive group testing as channel coding with feedback,” in Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. IEEE, 2012, pp. 1832–1836. [32] H.-B. Chen and F. K. Hwang, “A survey on nonadaptive group testing algorithms through the angle of decoding,” Journal of Combinatorial Optimization, vol. 15, no. 1, pp. 49–59, 2008. [33] A. De Bonis, L. Gasieniec, and U. Vaccaro, “Optimal two-stage algorithms for group testing problems,” SIAM Journal on Computing, vol. 34, no. 5, pp. 1253–1270, 2005. [34] P. Indyk, H. Q. Ngo, and A. Rudra, “Efficiently decodable non-adaptive group testing,” in Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, 2010, pp. 1126–1142. [35] C. L. Chan, S. Jaggi, V. Saligrama, and S. Agnihotri, “Non-adaptive group testing: Explicit bounds and novel algorithms,” Information Theory, IEEE Transactions on, vol. 60, no. 5, pp. 3019–3035, 2014. [36] M. Aldridge, L. Baldassini, and O. Johnson, “Group testing algorithms: bounds and simulations,” IEEE Transactions on Information Theory, vol. 60, no. 6, pp. 3671–3687, 2014. [37] C. E. Shannon, “Communication theory of secrecy systems,” Bell system technical journal, vol. 28, no. 4, pp. 656–715, 1949. [38] L. H. Ozarow and A. D. Wyner, “Wire-tap channel II,” AT&T Bell Laboratories technical journal, vol. 63, no. 10, pp. 2135–2157, 1984. [39] I. Csiszár and P. Narayan, “Secrecy capacities for multiple terminals,” IEEE Transactions on Information Theory, vol. 50, no. 12, pp. 3047– 3061, 2004. [40] ——, “Secrecy capacities for multiterminal channel models,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2437–2452, 2008. [41] U. M. Maurer, “Secret key agreement by public discussion from common information,” Information Theory, IEEE Transactions on, vol. 39, no. 3, pp. 733–742, 1993. [42] P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” in Advances in CryptologyCRYPTO96. Springer, 1996, pp. 104–113. [43] D. R. Stinson, Cryptography: theory and practice. CRC press, 2005. [44] A. W. Dent, “Fundamental problems in provable security and cryptography,” Philosophical Transactions of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, vol. 364, no. 1849, pp. 3215–3230, 2006. [45] D. J. Bernstein, T. Lange, and C. Peters, “Attacking and defending the mceliece cryptosystem,” in International Workshop on Post-Quantum Cryptography. Springer, 2008, pp. 31–46. [46] P. Damaschke and A. S. Muhammad, “Competitive group testing and learning hidden vertex covers with minimum adaptivity,” Discrete Mathematics, Algorithms and Applications, vol. 2, no. 03, pp. 291–311, 2010. [47] P. Damaschke and A. Muhammad, “Bounds for nonadaptive group tests to estimate the amount of defectives,” Combinatorial Optimization and Applications, pp. 117–130, 2010. [48] R. G. Gallager, Information theory and reliable communication. Springer, 1968, vol. 2. [49] Y. Polyanskiy, H. V. Poor, and S. Verdú, “Channel coding rate in the finite blocklength regime,” IEEE Transactions on Information Theory, vol. 56, no. 5, pp. 2307–2359, 2010. [50] G. K. Atia, V. Saligrama, and C. Aksoylar, “Correction to “boolean compressed sensing and noisy group testing”,” Information Theory, IEEE Transactions on, vol. 61, no. 3, pp. 1507–1507, 2015.
7cs.IT
1 Random Ensembles of Lattices from Generalized Reductions arXiv:1702.00608v3 [cs.IT] 5 Feb 2018 Antonio Campello, Member, IEEE Abstract—We propose a general framework to study constructions of Euclidean lattices from linear codes over finite fields. In particular, we prove general conditions for an ensemble constructed using linear codes to contain dense lattices (i.e., with packing density comparable to the Minkowski-Hlawka lower bound). Specializing to number field lattices, we obtain a number of interesting corollaries - for instance, the best known packing density of ideal lattices, and an elementary coding-theoretic construction of asymptotically dense Hurwitz lattices. All results are algorithmically effective, in the sense that, for any dimension, a finite family containing dense lattices is exhibited. For suitable constructions based on Craig’s lattices, this family is smaller, in terms of alphabet-size, than previous ensembles in the literature. Keywords: Lattices, sphere packings, random codes, ideal lattices, codes over matrix rings the lower bound from integer lattices constructed from linear codes in Fnp , in the limit when p → ∞, with randomcoding arguments. Improvements of the lower bound, in turn, strongly rely on additional (algebraic) structure. For instance, Vance [11] showed that the best quaternionic lattice in dimension m (with real equivalent in dimension 4m) has density at least 3mζ(4m)/e24m−3 ≤ ∆4m . Using lattices built from cyclotomic number fields, Venkatesh [12] established the bound ∆2ϕ(m) ≥ m/22ϕ(m)−1, where ϕ(m) is Euler’s totient function (since m can grow as fast as a constant times ϕ(m) log log ϕ(m) this provides the first super-linear improvement). From another perspective, Gaborit and Zémor [13], and Moustrou [14] exploited additional coding-theoretic and algebraic structures to significantly reduce the family size of ensembles containing dense lattices. I. I NTRODUCTION There has been a renewed interest in the search for new constructions of lattices from error-correcting codes due to their various recent applications, such as coding for fading wiretap channels [1], Gaussian relay networks [2], compound fading channels [3] and index codes [4], to name only a few. For the applications considered in these works, it is desirable to lift a code over a finite field into a lattice that possesses a rich algebraic structure, often inherited from the properties of number fields. In the present work we provide an unified analysis of these constructions and investigate “random-coding”-like results for such lattices. Our focus is on the problem of finding dense structured lattice packings, although our techniques have a much broader scope of applications (as discussed in Section VII). Indeed, finding the densest packing is a central subject in the Geometry of Numbers, with a variety of well-established connections to Coding Theory. Let ∆n denote the best possible sphere packing density achievable by a Euclidean lattice of dimension n. The celebrated Minkowski-Hlawka theorem (e.g. [5], [6]) gives the lower bound ∆n ≥ ζ(n)/2n−1 for all n ≥ 2, where ζ(n) = 1 + 1/2n + 1/3n + . . . is the Riemann zeta function. Up to very modest asymptotic improvements, this is still, to date, the best lower bound for the best packing density in high dimensions. Typical methods for establishing the theorem depend on the construction of random ensembles of lattices and on meanvalue results [7], [8]. Rush [9] and Loeliger [10] obtained This work was supported in part by the São Paulo Research Foundation (fellowship 2014/20602-8). † Current address: Department of Electrical and Electronic Engineering, Imperial College London, South Kensington Campus, London SW7 2AZ, United Kingdom (e mail: [email protected]). Main Contributions. In this work we investigate general random lattices obtained from error correcting codes. The objective of this study is twofold: we provide unified analyses and coding-theoretic proofs of the aforementioned results, as well as a simple condition to verify if any new construction can be used to build ensembles containing dense lattices. We start from the fairly general definition of a reduction, i.e. a mapping that takes a lattice into the space Fnp . For a general reduction we prove the following: Theorem 1. Let φp : Λ → Fnp be a family of reductions (surjective homomorphisms), where Λ is a lattice of rank m in the Euclidean space. Consider the ensemble  Lp = βφp−1 (C) : C is a k − dimensional code in Fnp , for an appropriate normalization factor β so that all lattices have volume V . Denote by NΛ′ (r) = #(Br ∩ Λ′ ) the number of primitive points of Λ inside a ball of radius r. If the first minimum of Λp = ker φp satisfies   λ1 (Λp ) lim inf > 0, then (1) p→∞ pn/m lim ELp [NΛ′ (r)] = (ζ(m)V )−1 vol Br , p→∞ where the average is with respect to the uniform distribution on Lp . A slightly stronger version of the above result is precisely stated in Theorem 2. We shall refer to a family of reductions that satisfies condition (1) as non-degenerate. Non-degeneracy is indeed a very mild condition, and is satisfied, for instance, if Λp has non-vanishing Hermite parameter (e.g., Λp = pZn ). 2 Non-degenerate constructions immediately yield lattices satisfying the Minkowski-Hlawka lower bound (see the discussion in the end of Section II). By choosing specific suitable families of non-degenerate reductions, we can further improve this density and obtain a number of interesting corollaries. We highlight one of them: Corollary 1. Let OK be the ring of integers of a degree n number field K containing r(K) roots of unity. For any integer t ≥ 2, there exists an OK -lattice with dimension t and packing density r(K)tζ(tn)(1 − ε) ∆≥ , e(1 − e−t )2tn for any ε > 0. This proves for instance, the existence of ideal lattices in any dimension with density better, by a linear factor, than the Minkowski-Hlawka lower bound. This also recovers, for t = 2 and a judicious choice of number field and degree, the density in [12, Thm. 1] and [14, Thm. 2]. By allowing reductions to codes over matrix rings (rather than the field Fp ), we provide, in Section V, a coding-theoretic proof of the existence of dense Hurwitz lattices, as in [11]. Here is how Theorem 1 may be interpreted: the density of the kernel (coarse) lattice Λp is improved by “adjoining” a code C to it, through the reduction φp . Now if Λp itself has a reasonable density, we can improve it up to the MinkowskiHlawka bound. Building on this idea, we show in Section VI that if we start from a suitable reduction so that the base (fine) lattice Λ is not so thick (in terms of its covering density) and such that the kernels are not so sparse (in terms of packing density), we can bound the required size of p to be within a finite range. For instance, we show that by starting from the family of Craig’s lattices [15], we can √ build dense lattices from codes with alphabet-size p = O((n log n)1+ν ), where ν > 0 is any (small) positive constant. This improves significantly the size of codes required by usual constructions [9] [10] (where p grows at least as ω(n3/2 )). As observed in [15, pp. 18-19], the works of Rush (and Loeliger) already significantly reduce the family sizes of typical proofs of the Minkowski-Hlawka lower bound. It is worth mentioning that, in terms of absolute family size, the best result is achieved by [13] by restricting the average to double-circulant codes or [14] using cyclotomic lattices. For instance, while the logarithm of the search space for Craig’s lattices reductions has size n2 log log n, the family based on double-circulant codes has size n log n (we refer the reader to Table 1 for more details). We leave it as an open question to whether coupling a good reduction with a smaller family of codes can further reduce the overall search space. Organization. This work is organized as follows. In Section II we describe some basic definitions and notation. In Section III we establish our main result on general reductions and several corollaries. In Section IV we consider reductions induced by quotients of ideals in the ring of integers of a number field, proving the main corollaries. In Section V we construct random Hurwitz and Lipschitz lattices from codes over matrix rings. In Section VI, we discuss an “algorithmic” version of the main theorem and draw the final conclusions. II. P RELIMINARIES AND N OTATION m The Euclidean norm of x ∈ R is denoted by kxk = (x21 + . . . + x2m )1/2 . The ball of radius r in Rm is denoted by Br = {x ∈ Rm : kxk ≤ r}. A lattice Λ is a discrete additive subgroup of Rm . Denote by span Λ the minimal subspace of Rm that contains Λ. The rank of Λ is defined to be the dimension of span Λ. The quotient (span Λ)/Λ is compact, and its volume, denoted by V (Λ), is said to be the volume of Λ. The first minimum λ1 (Λ) of Λ is the shortest Euclidean norm of non-zero vectors in Λ. In general, the i-th minima of Λ are defined as λi (Λ) = min {r : dim (span {Br ∩ Λ}) = i} . The packing density of a rank m lattice Λ is defined as ∆(Λ) = vol Bλ1 /2 . V (Λ) We say that a point in x ∈ Λ is primitive if the intersection between Λ and the open line segment {αx : α ∈ (0, 1)} is the empty set. The set of all primitive points in Λ is denoted by Λ′ . Theorem 1 implies the Minkowski-Hlawka lower bound in the following fashion. From the average result, it follows that it must exist at least one Λ ∈ L such that NΛ (r) ≤ (ζ(m)V )−1 vol Brm . Now if we force the right-hand side to be equal to 2(1 − ε), for some small ε > 0, then, since a lattice has at least two minimum vectors, we must have NΛ (r) = 0. Therefore Λ can pack balls of radius r/2; rearanging the terms gives us, up to ε, the Minkowski-Hlawka bound. If Λ is a lattice with guaranteed number of minimum vectors (say, L) we can, by similar arguments, achieve density L(1 − ε)/2m . A k-dimensional vector subspace C ⊂ Fnp is called a (linear) code with parameters (n, k, p) (or simply an (n, k, p)-code). Throughout the paper we use the standard “big-O”, “bigomega” and “little-omega” notations, e.g. f (x) = Ω(g(x)) if lim supx→∞ |g(x)/f (x)| < +∞, and f (x) = ω(g(x)) if limx→∞ g(x)/f (x) = 0. III. G ENERALIZED R EDUCTIONS From now on, let Λ be a rank m lattice and let n ≤ m be an integer. Definition 1. Let φp : Λ → Fnp be a surjective homomorphism. Given a linear code C, its associated lattice via φp is defined as Λp (C) , φ−1 p (C). A surjective homomorphism as in the above definition will, from now on, be called a reduction. We shall see that Λp (C) is indeed a lattice of rank m. First observe that Λp (C) is a subgroup of Λp (Fnp ) = Λ. Since the quotient Λ/ker(φp ) ≃ Fnp is finite, ker(φp ) = Λp ({0}) , Λp is a sub-lattice of Λ, of rank m. From the inclusion Λp ⊂ Λp (C) ⊂ Λ, we conclude that the three lattices have the same rank. Moreover, Λp (C)/Λp ≃ C, and therefore V (Λp (C)) = |C|−1 pn V (Λ). Remark 1. There is an off-topic connection between Definition 1 and combinatorial tilings. If in addition to being surjective, the reduction φp is a bijection when restricted to a 3 set P ⊂ Λ of cardinality pn , then P tiles Λ by translations of vectors of Λp . This framework contains classical Construction A [15], [9], the constructions in [1], and [16]. We derive sufficient conditions for this general construction to admit a MinkowskiHlawka theorem. Set β = V 1/m /(pn−k V (Λ)1/m ) and let Lp = {βΛp (C) : C is an (n, k, p) − code} Definition 2. Let f : W → R be a Riemann-integrable function. We say that f is semi-admissible if b , ∀x ∈ W (1 + kxk)m+δ 1 |Cn,k | X Remark 2. If f and its Fourier transform fˆ are semiadmissible, then f is said to be admissible. In this paper we will not be concerned about admissible functions, which play an important role in the development of the so-called linear programming bounds for packings. Theorem 2. Let (pj )∞ j=1 be an increasing sequence of prime numbers such that there exist reductions φpj : Λ → Fnpj and let f : W → R be a semi-admissible function. If the first minimum of Λpj = Λpj ({0}) satisfies   E x∈βΛpj (C)  pj →∞  lim ELpj  pj →∞ X x∈βΛ′p (C) j   f (x) = (ζ(m)V )−1 X ≤ f (βx) = x∈Λpj \{0} W (5) where the averages are taken over all βΛpj (C) in the ensemble Lpj (Equation (2)). Proof. We will prove the “refined” statement (ii). The proof of (i) is similar, except for the last step. Recall that the set f (βx) j b . (1 + kβxk)m+δ Since the lattice Λp (C) has rank m ≥ 1, the series on the righthand-side of the above inequality is absolutely convergent for any pj . Moreover, since, by assumption kβxk ≥ βλ1 (Λpj ) ≥ cV 1/m (V (Λ))−1/m pα j → ∞, each individual term of the last sum tends to zero, as pj → ∞ and, by dominated convergence, the sum tends to zero. Let γ = (pkj − 1)/(pnj − 1). For the second term of Equation (7), we have:    X    (a) X E f (βx) = γ f (βx)  x∈βΛ′ (C)  ′ x∈Λ pj φp (x)6=0 j ∞ X µ(r) rm X rm γf (rβx) x∈Λ\{0} where µ denotes the Möbius function (see, e.g. [5, Sec. VI. 3.2]). In the above, (a) follows from (6) and (b) is the Möbius function inversion formula (see, e.g., [5, Sec. VI. 3.2]). The theorem follows by using the property ∞ X µ(r) r=1 f (x)dx, X x∈Λ′p X r=1 Z (7) From the assumption on f , (ii)  pj φp (x/β)=0 j pj φp (x/β)6=0 j = f (x)dx, (4) (6) j  (b) W x∈βΛpj (C)\{0} g(v), v∈Fn p \{0}  X    +E  f (x) .  x∈βΛ′ (C)  , for some constant c, α > 0, then (i)   Z X f (x) = V −1 lim ELpj  X Fnp x∈Λ′p (C) j φp (x)=0 j x∈Λ +α pkj − 1 pnj − 1 → R. Now for f : W → R,     X  X    f (x) = E  f (x)   ′ x∈βΛ′ (C) (3) Any bounded integrable function with compact support is semi-admissible. Of particular interest are indicator functions of bounded convex sets. Notice that, for any semi-admissible function and a rank-m lattice Λ in W , X f (x) < +∞. n−k g(c) = C∈Cn,k c∈C\{0} where b > 0 and δ > 0 are positive constants. λ1 (Λpj ) ≥ cpj m X for a function g : (2) be the ensemble of all lattices associated to codes of dimension k, normalized to volume V . Suppose that a lattice in Lp is picked at random by choosing C uniformly. We shall prove a generalized version of the Minkowski-Hlawka theorem for Lp . Instead of functions with bounded support, we will consider a wider class of functions. Let W = span(Λ) be the minimal subspace of Rn containing Λ (therefore, dim(span(Λp (C))) = m). |f (x)| ≤ of Cn,k of all (n, k)-codes satisfies Loeliger’s balancedness equation [10] rm = 1 ζ(m) and observing that for the inner sum satisfies Z X rm γf (rβx) = (V −1 ζ(m)) lim pj →∞ x∈Λ\{0} f (x)dx, W by the definition of Riemann integral. Exchanging the limit and the sum is justified by dominated convergence, given the condition on f . 4 Corollary 3. For any ε > 0, there exists Λpj ∈ L such that Example 1. If Λ = Zn and φp is the reduction modulo p, we obtain mod-p lattices as in [10]. It is clear that Λp = pZn satisfies the hypothesis of Theorem 2, with m = n and α = k/n. This implies Theorem 1 of [10]. Definition 3. A sequence of surjective homomorphisms n (φj )∞ j=1 , φj : Λ → Fpj is said to be non-degenerate if m Y i=1 ∆i (Λ)1/m ≥ 2mζ(m)(1 − ε) . e(1 − e−m ) (10) Proof. The proof follows from a method of Rogers [8], choosing f (x) appropriately in the Minkowski-Hlawka theorem. We shall give a complete proof in the next section, in the context of OK -lattices. n λ(Λpj ) ≥ cpjm , IV. C ONSTRUCTIONS F ROM N UMBER F IELDS for some constants c > 0. Similarly, the sequence of associated ensembles (Equation 2) are said to be non-degenerate. It follows that if the reductions are non-degenerate, the associated ensemble admits the Minkowski-Hlawka theorem. Example 2 (“Natural reduction”). If m = n, the natural reduction to Fnp is as follows. Given a basis x1 , . . . , xn for Λ, take φp to be the linear map defined by φp (xi ) = ei ∈ Fnp , where ei the i-th canonical vector (0, . . . , 0, 1, 0, . . . , 0). It is clear that φ is surjective and ker φp = pΛ, therefore the associated sequence of reductions is non-degenerate. This provides a systematic way of constructing good sublattices of a given lattice. Taking f (x) to be the indicator function of a ball in part (ii) of Theorem 2, we recover Theorem 1. Another function 2 of interest is f (x) = e−τ kxk for τ > 0, yielding the theta series X 2 ΘΛ (τ ) = e−τ kxk . x∈Λ A corollary of part (i) of the theorem is the following: Corollary 2. The average theta series of a sequence of nondegenerate ensemble satisfies  π m/2 + 1. (8) lim ELpj [ΘΛ (τ )] = V −1 pj →∞ τ Corollary 2 can, for instance, be applied to the construction of sufficiently flat Gaussian measures for secure communications (cf [17]). Remark 3. The condition for non-degeneracy can be rewritten as lim inf γ(Λpj ) > 0, pj →∞ where γ(Λ) = λ(Λ)/V (Λ)1/m is the Hermite parameter of Λ. In other words, non-degeneracy is equivalent to non-vanishing Hermite parameter of the sequence of kernel lattices. We close this section with another consequence of Theorem 2. We shall refer to each ratio ∆i (Λ) = vol Bλi /2 , i = 1, . . . , m, V (Λ) (9) as the i-th successive density of a lattice S∞ Λ. For a sequence of non-degenerate ensemble, put L = j=1 Lpj . From now on we consider constructions of random ensembles based on algebraic number theory. We refer the reader to [18] and [19] for an introduction to the theory, as well as undefined notation. Let K/Q be a number field with degree n and signature (r1 , r2 ). Denote its real embeddings by σ1 , . . . , σr1 and their pairs of complex embeddings by σr1 +1 , σr1 +1 , . . . , σr1 +r2 +1 , σr1 +r2 +1 . Let OK be the ring of integers of K and I ⊂ OK be an ideal. An ideal can be identified with a real lattice of dimension (r1 + 2r2 ) via the canonical embedding σ : OK → Rr1 +2r2 σ(x) = (σ1 (x), . . . , σr1 (x),ℜσr1 +1 (x), . . . ℜσr1 +r2 +1 (x), ℑσr1 +1 (x), . . . , ℑσr1 +r2 +1 (x)). Lattices constructed from the embedding of ideals I ⊂ OK are called ideal lattices, and appear in the study of modular forms, coding theory, and cryptography. In this section we study the Minkowski Hlawka theorem for OK -lattices and related structures. Let E = K ⊗Q R be the Euclidean space generated by K. An OK -lattice is a free OK sub-module of E t , for some t > 0. In particular, an OK lattice is closed under multiplication by elements of OK . The Euclidean norm in E is induced by the trace form. Notice that K is naturally embedded in E. In the cases when K is either totally real or a totally imaginary extension of a real number field (CM-field) some notational simplifications can be made. For instance, we can write the trace form as tr(xy) = σ1 (x)σ1 (x) + . . . + σn (x)σn (x). We discuss the average behavior of a general reduction from algebraic number theory [1], [3], [2], defined in the sequel. A prime p is said to split completely if pOK can be factored into the product of prime ideals p1 p2 · · · pn . Definition 4. Let p be a prime that splits completely, and p an ideal above p. Consider π : OK → OK /p ≃ Fp a projection onto p and σ the canonical embedding. Let Λ = σ(OK )t (the canonical embedding is applied componentwise). Take φp : Λ → Ftp φp (σ(x1 , . . . , xt )) = (π(x1 ), . . . , π(xt )) nt and define Λp (C) = φ−1 p (C) ⊂ R . 5 Lemma 1. The ensemble induced by Definition 4 is nondegenerate. Proof. The minimum algebraic norm of an element of p is greater or equal p. Hence Λp = σ(p)t has minimum √ than 1/n norm at least np , finishing the proof. A very important caveat to the previous lemma is the fact that there must exist an infinite number of primes p such that the construction above is possible. This follows from Chebotarev’s density theorem (e.g. [20] Cor. 13.6, p. 547), which implies that the natural density δ of primes that split completely in K is positive (indeed, one has 0 < δ ≤ 1/n!). Remark 4. Very similarly, it is possible to prove that the constructions in [16] are non-degenerate. Suppose that K contains r(K) roots of unity. Let µ be a root of unity contained in OK . It follows that kσ(µx)k = kσ(x)k (e.g. [21, Lem. 3.1]). Therefore, each Λ constructed as in Definition 4 contains at least r(K) minimal vectors and we automatically obtain the density r(K)(1 − ε)/2nt (this argument was used by Venkatesh [12] to prove that cyclotomic lattices (Z[µ]-lattices where µ is a root of unity) achieve density m(1 − ε)/22φ(m) ). For t-dimensional OK lattices, however, there is a loss of a linear factor of t in the enumerator. Nevertheless, we can improve the following density up to that of Corollary 1, using a method by Rogers [8], recently employed in [11] to quaternionic lattices. The basic idea is to apply to Theorem 2, rather than indicator function of a ball, to a bounded-support function that allows us to analyze the generalized densities of the ensemble. After ensuring the existence of a lattice with good generalized densities, it is possible to apply standard linear transformations to such a lattice (see e.g. [11, Thm. 2.2]) in order in order to transform it into a lattice with good packing density. t Proof of Corollary 1: . For Λ0 ⊂ OK let the i-th successive minima of Λ0 (over K) be the smallest i-such that the ball Br contains the canonical embedding of i linearly independent vectors (over K). More formally   −1 (σ(Λ0 ) ∩ Br ) = i . λK i (Λ0 ) = min r > 0 : dim spanK σ (11) K Notice that λK 1 (Λ0 ) = λ1 (σ(Λ0 )) and, in general λi (Λ0 ) ≥ λi (σ(Λ0 )). Also, if x1 , . . . , xt are linearly independent over K and achieve the sucessive minima of Λ0 , then the embeddings σ(x1 ), . . . , σ(xt ) are linearly independent and primitive in σ(Λ0 ) ⊂ Rnt . Now let f : Rnt → R be the following function with limited support:  1/n if kyk ≤ re(1−t)/tn    kyk 1 f (y) = if re(1−t)/tn ≤ kyk ≤ re1/tn nt − log r   0 otherwise. (12) We have Z e(1 − e−t )rnt vol B1 f (y)dy = . nt Rnt Choose r such that the right-hand side of this last equation is equal to r(K)V ζ(nt)(1 − ε)/n for a small ε < 1. Let φp be as in Definition 1 and Lp its induced ensemble Lp = {βΛp (C) : C is an (n, k, p) − code} (13) as in Equation (2). According to Theorem 2, it is possible to find Λ1 = βσ(Λ0 ) ∈ Lp of volume V such that, for p sufficiently large X r(K) r(K) < , (14) f (y) ≤ (1 − ε) n n ′ y∈Λ1 Let v1 , . . . , vt be linearly independent vectors in Λ0 achieving the successive minima, kβσ(vi )k = λK i (Λ0 ). We have X y∈Λ′1 f (y) ≥ t X X i=1 f (βσ(µvi )) = r(K) µ t X f (βσ(vi )), i=1 where the sum with subscript µ is over all roots of unity in 1/n−1 K. From this we conclude that, for all i, βλK i (Λ0 ) ≥ re and   tQ K 1 1 β λi (Λ0 ) < . − log n rt n Therefore, for the t successive densities (Eq. (9)): t Y i=1 ∆K i !1/t = t Y vol(BλK ) i /2 i=1 V !1/t (15) r(K)tζ(nt)(1 − ε) ≥ . e(1 − e−t )2nt But in this case, we can find Λ̃ whose packing density (or r(K)tζ(nt) ∆K 1 ) is greater or equal than e(1−e−t )2nt (1−ε) (e.g. [11, Thm. 2.2]). V. BALANCED S ETS OF C ODES OVER M ATRIX R INGS In some contexts, the “natural” underlying alphabet in the reduction φp is, rather than the field Fp , the ring Mn (Fp ) of n × n matrices with entries in Fp . Although we can 2 identify Mn (Fp ) with Fnp , the identification does not carry enough algebraic structure for our purposes. For instance, we cannot guarantee that the constructed lattices are closed under multiplication by units, which is crucial in order to obtain the full density improvements of these lattices, as in [11]. For this reason, we study in this section a version of Theorem 2 for codes over matrix rings. A. An Averaging Bound for Codes over Rings Let R be a finite ring and R∗ its units. Denote by (Rn )∗ the set of vectors in Rn such that at least one coordinate is a unit. A linear code in C ⊂ Rn is a free1 R-submodule of Rn (with the natural scalar multiplication). Following [10], we define balanced sets of codes as follows. 1 This may differ from the literature, where a linear code over a ring is simply an additive subgroup of Rn . The requirement that a linear code is a free module is necessary for Lemma 2 to hold. 6 Definition 5. Consider a non-empty set of codes Cb of same cardinality. We say that Cb is balanced if any x ∈ (Rn )∗ is contained in the same number of codes (say, L) of Cb . Let M be the cardinality of a code in Cb . From a counting argument, one can see that M |Cb | ≥ L|(Rn )∗ |. The following lemma shows how to bound averages of functions in (Rn )∗ . n + Lemma 2. Let g : R P → R be a function. For a code C, ∗ we define g (C) = c∈C∩(Rn )∗ g(c). If Cb is the set of all codes of rank k then k E [g ∗ (C)] ≤ |R| g ∗ (Rn ), |(Rn )∗ | where the expectation is with respect to the uniform distribution on Cb . Proof. For any balanced set of codes with cardinality M , we have     X X E[g ∗ (C)] = E  g(c) = E  g(x)1C (x) c∈C∩(Rn )∗ = x∈(Rn )∗ X E [g(x)1C (x)] X g(x) x∈(Rn )∗ = x∈(Rn )∗ M L ≤ g ∗ (Rn ). |Cb | |(Rn )∗ | We now need to prove that the set of all codes of rank k is balanced. Let y be any element in Rn ∗ . There exists an invertible linear map T (y) = (1, 0, . . . , 0) = e1 . Since T is rank-preserving, y ∈ C if and only if e1 ∈ T (C), where C and T (C) have same rank. This induces a bijection between the codes that contain y and the codes that contain e1 , proving the statement. B. Lipschitz and Hurwitz Lattices The quaternion skew-field H is given by H = {a + bi + (c + di)j : a, b, c, d ∈ R}, with the usual relations i2 = j 2 = −1 and ij = −ji. Vance recently [11] proved a Minkowski-Hlawka theorem for lattices in H over the Hurwitz order. Here we show how to recover a “coding-theoretic” version of this result from generalized reductions. We first explain how to deduce a slightly simpler case, for the Lipschitz order. The Lipschitz integers L ⊂ H is the (non-maximal) order L = {x + yj : x, y ∈ Z[i]} . Recall that a quaternion has matrix representation   x −y . y x Let p be an ideal in Z[i] above p that splits. Let π : Z[i] → Z[i]/p be a projection. We consider the following “singleletter” reduction: φH p : L → M2 (Fp ) φp (x + yj)H =  π(x) π(y) −π(y) π(x) 4 We have ker φH p = (pZ[i]) + (pZ[i])j. Identifying H with R in the natural way ψ(a, b, c, d) → a + bi + (c + di)j we obtain a reduction φp : Z4 → M2 (Fp ), φp (x) = H φH p (ψ(x)). By abuse of notation, we will also denote by φp m the reduction applied componentwise in vector of L , i.e., φH p (x1 + y1 j, . . . , xm + ym j) H m = (φH p (x1 + y1 j), . . . , φp (xm + ym j)) ∈ M2 (Fp ) . (16) H −1 If C ⊂ M2 (Fp )m is a linear code, then ΛH (C) p (C) = (φp ) −4m is a quaternionic lattice with volume |C|p . Let Cb be a balanced set and Lp the associated lattice ensembles  Lp = βΛH p (C) : C ∈ Cb , where β = (V /(|C|−1 p4m ))1/(4m) . The following Theorem 3 is the analogous of Theorem 1 for Lipschitz lattices. We need the following lemma Lemma 3. If φp (x + yj) is non-invertible for x + yi ∈ L, then the squared norm of x + yj is a multiple of p. Proof. If det φp (x + yj) = 0, then π(xx + yy) = 0, i.e., k(x, y)k2 ∈ p. Since the norm of a Lipschitz quaternion is an integer, and p is above p, the result follows. Theorem 3. Let Cb be a balanced set of codes with rank k > m/2. If f is a semi-admissible function then   Z X lim ELp  f (ψ(x)) ≤ (ζ(4m)V −1 ) f (x)dx. p→∞ R4m x∈βΛH p (C) (17) Proof. The proof is very similar to that of Theorem 1. Here we divide the expectation into invertible and non-invertible elements (we make the change of variable x = βy, to facilitate), i.e. X X f (ψ(βy)) f (ψ(βy)) = y∈ΛH p (C) y∈ΛH p (C) φ(y)∈(M2 (Fp )m )∗ + X f (ψ(βy)). x∈ΛH p (C) m ∗ φ(y)∈(M / 2 (Fp ) ) The first term tends to zero as p → ∞ from Lemma 3, since f is semi-admissible and √ β kψ(y)k ≥ β p = |C|1/4m p−1/2 = pk/m−1/2 → ∞, (18) as pto∞. From Lemma 2 we conclude that the second term is upper bounded by the right-hand side of (17) as p → ∞. For the maximal Hurwitz order H = {a + bi + cj + d(−1 + i + j + ij)/2 : a, b, c, d ∈ Z} ,  . the theorem follows by considering reductions from leftprime ideals P ⊳ H. For any rational prime p, there exist 7 isomorphisms H/pH ∼ Fp (i, j, k) ∼ M2 (Fp ) (e.g. Wedderburn’s Theorem [22, Thm. 6.16 Lem 9.2.1]), where noninvertible elements in H/pH have reduced norm (determinant) proportional to p. Notice that in this case we obtain a reduction φp : D4 → M2 (Fp ), where D4 is the checkerboard lattice in dimension four [15, Sec. 7.2]. An explicit realization of ring isomorphism is obtained by setting     1 0 0 −1 φ(1) = , φ(i) = 0 1 1 0   a b and φ(j) = , b −a where a and b are two integers such that a2 + b2 ≡ −1 (mod p). Notice that such an isomorphism preserves the residue class of the reduced norm, i.e. nrd(x) = det φ(x) (mod p), for any x ∈ H. VI. A LGORITHMIC E FFECTIVENESS Theorem 1 holds in the limit pj → ∞. However, for each n, under some conditions it is possible to find finite ensembles that contain dense lattices. In the literature, this is referred to as effectiveness (e.g. [15, p. 18] and [13]). We show conditions for a family of reductions to be effective. We need the following lemma, which is a special case of a classical result in the Geometry of Numbers (see [6, p. 141]) and is also valid if Br is replaced by more general sets. We include a proof here for the sake of completeness. Lemma 4. Let P be a fundamental region for Λ, an let l0 = supx∈P kxk . For r > l0 , we have (r − l0 )n Vn ≤ V (Λ)NΛ (r) ≤ (r + l0 )n Vn . (19) In particular, we can take l0 = τ (Λ) to be the covering radius of Λ. Proof. We show the set inclusion [ Br−l0 ⊂ (x + P) ⊂ Br+l0 . x∈Λ∩Br The lemma then follows from a simple volume calculation of the three sets. If y = x + p, x ∈ Λ ∩ Br , p ∈ P, then kyk ≤ kxk + kpk ≤ r + l0 , proving the second inclusion. For the first inclusion, let y ∈ Br−l0 and write it as y = x + p, with x ∈ Λ and p ∈ P (this is always true since P is a fundamental region). Then kxk ≤ kyk + kpk ≤ r. as µ(Λ) = τ (Λ)/V (Λ)1/m . Recall that ρ(Λ) = λ1 (Λ)/2 is the packing radius of Λ. A lattice satisfying the MinkowskiHlawka bound has density  1/m V (Λ) Vm ρ(Λ)m m−1 1−1/m > 1/2 ⇒ ρ(Λ) ≥ 2 , ∆= V (Λ) Vm where Vm = vol B1 is thepvolume of the unit ball in Rm . −1/m ∼ m/2πe, if V (Λ) is normalized Recalling that Vm to one, this implies that the packing radius of good lattices should scale as r m . ρ(Λ) ∼ 2 2πe Proposition 1. Let the notation be as in Theorem 1 and let ε > 0. Let δ = k/n be the rate of the underlying codes. Suppose that √ nδ/m γ(Λpj ) = Ω( m) and (i) pj n/m = ω(mµ(Λ)/γ(Λpj )). (ii) pj If m is sufficiently large, there exists a code with parameters (n, k, pj ) such that the lattice Λpj (C) has packing density greater than (1 − ε)/2m−1 . Proof. For simplicity, suppose that the volume of Λpj (C) equals 1, which can be achieved by choosing an appropriatepscaling factor. Considering the above discussion let r = m/2πe. In the notation of the proof of Theorem 1, the average lattice point enumerator (Equation (7)) becomes: h  i h  i E # βΛ′pj (C) ∩ Br = E # βΛ′pj ∩ Br i h  + E # β(Λ′pj (C)\Λp ) ∩ Br . The first term of the right-hand side zero whenever k/m pj λ1 (Λpj ) V (Λpj )1/m ≥ r. (20) The second term satisfies i pk − 1 h   j # β(Λ′ \Λpj ) ∩ Br E # β(Λ′pj (C)\Λp ) ∩ Br = n − 1 pj !m µ(Λ) Vm k−n m m 1 + (n−k)/m ≤pj (r + βτ (Λ)) = Vm r . β m V (Λ) rp j (21) Imposing the right-hand-side of (21) to be 2(1 − ε), we obtain a lattice with density (cf. Section II): !−m µ(Λ) 1−ε . (22) ∆ ≥ m−1 1 + (n−k)/m 2 rp j A. Effective families containing dense lattices The next proposition essentially says that if the base lattice Λ is sufficiently “thin” and the kernel-lattices Λpj are not so sparse, it is possible to bound pj in terms of the rate of the underlying code. The conditions are very mild (they are achievable, for instance, by Λ = Zm and Λp = pZm ). For convenience, we recall the definition of the Hermite parameter γ(Λ) = λ1 (Λ)/V (Λ)1/m and define the covering parameter Under the conditions of the theorem, the term in parenthesis tends to 1 as m → ∞. Remark 5. Similar conditions hold for the case of quaternionic lattices. In this case, in light of the proof of Theorem 3 and Equation (18), condition (i) should be replaced by p = Ω(r2m/(2k−m) ). 8 Example 3. Let m = n, Λ = Zm and φp be the “modulo-p” reduction. Conditions (i)-(ii) of Proposition 1 state that p ≥ c1 m1/2δ and p ≥ c2 m3/2+ν , where c1 , c2 are constants and ν is any small number. The optimal rate (i.e., the one that yields the smallest asymptotic behavior of p) is δ ∼ 1/3, which gives us optimal alphabetsize p = m3/2+ν , for any positive constant ν. This provides an alternative derivation of [9]. The alphabet-size in the above example can be further improved by starting the reductions with a lattice which already has a good density, as shown next. Let Λ = Aln be a Craig’s lattice [15, pp.222-224] of rank m = n, where n + 1 = q is a prime. From [23, Prop. 4.1], a Craig’s lattice is similar to the embedding of the ideal (1 − µp )l Z[µp ] in the cyclotomic field Q(µp ). A concrete realization is 1 Λ = √ σ((1 − µp )l Z[µp ]). p From this, we have Λ∗ ∼ n/2−l An , √ λ1 (Λ) 2l ≥ 1/n (2l−1)/2n V (Λ) (n − 1) √ λ1 (Λ∗ ) n − 2l ≥ . and ∗ 1/n V (Λ ) (n − 1)(n−2l−1)/2n Following [15, p. 224]’s suggestion, we consider Craig’s lattices with parameter l = ⌊n/2 log(n + 1)⌉ so that, for sufficiently large n, r r  λ1 (Λ) 2π n + o(1) ≥ log n 2πe V (Λ)1/n and √ λ1 (Λ∗ ) ≥ e + o(1). ∗ 1/n V (Λ ) From Banaszczyk’s transference bound [24]: √ τ (Λ) n √ ≤ . 1/n 2 e + o(1) V (Λ) Therefore, using a natural reduction, conditions (i) and (ii) in Proposition 1 become p p p ≥ c1 ( log n)1/δ and p ≥ c2 (n log n)1+ν , for some constants c1 , c2 and any positive ν. We can further optimize the rate by equalizing the coefficients from where we get log log n . (23) δ∼ 2 log n + log log n ⌊n/2(n+1)⌉ Corollary 4. Let Λ = An and let φp be a natural reduction, as described in Example 2. Let ε > 0, n sufficiently large and let the rate be as in (23). There exists a code C with parameters   p n, δn, O((n log n)1+ν ) , for any positive ν, such that Λp (C) has packing density arbitrarily close to (1 − ε)/2m−1 . We close this subsection with a comment on the absolute family size of a reduction. If the set of all (n, k, p) codes is considered, then the search space for a dense lattice is given by the Gaussian binomial: hni k p = k−1 Y i=1 pn − pi ∼ pk(n−k) . pk − pi (24) Plugging the bounds for p in Proposition 1 gives an upper bound on the exhaustive search complexity. On Table 1 we provide a comparison of the parameters of some constructions in the literature in terms of rank of the base lattice Λ, code parameters, alphabet-size and log of the family-size (contrary to a statement in [13], [14], the complexity of Rush’s construction is exp(cn2 log n) rather than exp(n log n), and therefore the gains of averaging over double-circulant codes/cyclotomic lattices are even higher than the ones stated). B. Packing Efficiency A cruder measure of goodness, which is suitable for coding applications, is the packing efficiency [25]. Define ρeff (Λ) = (V (Λ)/Vm )1/m as the radius of a ball whose volume is V (Λ). The Minkowski bound can be rephrased in terms of packing efficiency, as 1 ρ(Λ) ≥ . (25) ρeff (Λ) 2 A “packing-good” family of lattices is such that its packing efficiency is arbitrarily close to 1/2. As shown in [25, Sec. IV], it is possible to find families with good asymptotic packing efficiency using Loeliger’s construction, provided that p = O(m1/2+β ), for any positive small β. Similarly, we can show that Craig’s lattices constructions can achieve packing efficiency arbitrarily close to 1/2 with alphabet-size p = O((log m)1/2+β ). VII. F INAL D ISCUSSION Applications. As observed by Loeliger [10], random ensembles of lattices are not only good in terms of packing density, but are also sphere-bound achieving when used as infinite constellations for the AWGN channel. Indeed, Rush [9] and Loeliger’s [10] Construction A Z-lattices are ubiquitous in applications to information transmission over Gaussian channels and networks. However, for other communication problems, such as information transmission in the presence of fading and multiple antennas, it is desirable to enrich the lattices with some algebraic (multiplicative) structure. To this purpose, several recent works such as [2], [1], [16], [3] present different constructions that attach a linear code to an algebraic lattice, but, to date, there is no unified analysis of such ensembles. The generalized reductions described here provide a method for establishing the “goodness” of all such constructions at once. It also provides a simple condition to verify if any new construction is “good” (e.g., sphere-bound achieving). This was indeed the initial motivation of the author. Further Perspectives. The framework considered in this paper is used to provide simple alternative (coding-theoretic) proofs 9 Construction Construction A over Z [9], [10] Random double-circulant [13] Cyclotomic lattices [14] Craig’s reduction rank(Λ) m=n m=n m = 2Φ(l), l ∈ N m=n (n, k) (n, δn), δ ∼ 1/3 (n, n/2) (2, 1) log n (n, δn), δ ∼ 2 loglog n+log log n p n3/2 n2 log n 3 l (log l)Φ(l) n(log n)1/2 Log family size n2 log n n log n m log m n2 log log n Table 1. Parameters of different effective families contaning dense lattices. The rates δ are up to lower order terms, and the log family-sizes up to constants and lower order terms. Φ(l) denotes Euler’s totient function. and improvements on previous refinements on the best packing density. It not only implies the existence of dense lattices, but also of structured lattices, with the structured inherited from the underlying reduction. The question whether it is possible to improve on the cn log log n/2n−1 asymptotic behavior of cyclotomic fields by specializing the reductions (or the family of codes) appropriately is still open. Furthermore, all known lower bounds on ∆n are of the form ∆n ≥ 2−n(1+ε(n)) , with ε(n) = O(log n/n), which improves only marginally on the Minkowski-Hlawka lower bound. According to Gruber [26, p. 388], Hlawka believed that no essential improvement can be made, probably meaning that the exponent 2 is optimal. Nevertheless, the best known upper bound on ∆n , due to Kabatianskii and Leveshenstein, is of the form C −n , where C ≈ 1.51. Closing this gap is a long-standing open problem. ACKNOWLEDGMENTS The author would like to thank Cong Ling for his constant enthusiasm on the topic and for his suggestions, as well as both reviewers for pointing out inaccuracies in the first version of the manuscript. He also acknowledges Sueli Costa and JeanClaude Belfiore for fruitful discussions and for hosting him at University of Campinas and at Télécom Paristech, where part of this work was developed. This work was supported in part by FAPESP (fellowship 2014/20602-8). R EFERENCES [1] W. Kositwattanarerk, S. S. Ong, and F. Oggier. Construction A of Lattices Over Number Fields and Block Fading (Wiretap) Coding. IEEE Transactions on Information Theory, 61(5):2273–2282, May 2015. [2] Y.-C. Huang, K. R. Narayanan, and P.-C. Wang. Adaptive compute-andforward with lattice codes over algebraic integers. arXiv/1501.07740, 2015. [3] A. Campello, C. Ling, and J. C. Belfiore. Algebraic lattice codes achieve the capacity of the compound block-fading channel. In IEEE International Symposium on Information Theory (ISIT), pages 910–914, July 2016. [4] Y. C. Huang. Lattice index codes from algebraic number fields. IEEE Transactions on Information Theory, 63(4):2098–2112, April 2017. [5] J. W. S. Cassels. An Introduction to the Geometry of Numbers. SpringerVerlag, 1997. [6] P. M. Gruber and C. G. Lekkerkerker. Geometry of Numbers. NorthHolland, 1987. [7] C. L. Siegel. A Mean Value Theorem in Geometry of Numbers. Annals of Mathematics, 46(2):340–347, 1945. [8] C. A. Rogers. Packing and Covering. Cambridge University Press, March 1964. [9] J. A. Rush. A lower bound on packing density. Inventiones mathematicae, 98(3):499–509, 1989. [10] H.-A. Loeliger. Averaging bounds for lattices and linear codes. IEEE Transactions on Information Theory, 43(6):1767–1773, Nov 1997. [11] S. Vance. Improved sphere packing lower bounds from hurwitz lattices. Advances in Mathematics, 227(5):2144 – 2156, 2011. [12] A. Venkatesh. A note on sphere packings in high dimension. International Mathematics Research Notices, 2012. [13] P. Gaborit and G. Zémor. On the construction of dense lattices with a given automorphisms group. Ann. Inst. Fourier (Grenoble), 57(4):1051– 1062, 2007. [14] P. Moustrou. On the density of cyclotomic lattices constructed from codes. International Journal of Number Theory, 13(05):1261–1274, 2017. [15] J. H. Conway and N. J. A. Sloane. Sphere-packings, lattices, and groups. Springer-Verlag, New York, NY, USA, 1998. [16] R. Vehkalahti, W. Kositwattanarerk, and F. Oggier. Constructions A of lattices from number fields and division algebras. In IEEE International Symposium on Information Theory (ISIT), pages 2326–2330, June 2014. [17] C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehle. Semantically Secure Lattice Codes for the Gaussian Wiretap Channel. IEEE Transactions on Information Theory, 60(10):6399–6416, Oct 2014. [18] I. Stewart and D. Tall. Algebraic Number Theory and Fermat’s Last Theorem. CRC Press, 3rd edition, 2001. [19] F. Oggier. Introduction to Algebraic Number Theory. Lecture notes available on the author’s website http://www1.spms.ntu.edu.sg/ frederique/AA11.pdf, accessed on 26/07/2017. [20] J. Neukirch. Algebraic Number Theory, volume 322 of Grundlehren der mathematischen Wissenschaften. Springer-Verlag Berlin Heidelberg, 1999. [21] P. Autissier. Variétés abéliennes et théorème de Minkowski-Hlawka. Manuscripta Mathematica, 149(3):275–281, 2016. [22] J Voight. The arithmetic of quaternion algebras. 2017, (book available online https://math.dartmouth.edu/ jvoight/quat-book.pdf), accessed on 26/07/2017. [23] C. Bachoc and C. Batut. Étude algorithmique de réseaux construits avec la forme trace. Experiment. Math., 1(3):183–190, 1992. [24] W. Banaszczyk. New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen, 296(1):625–635, 1993. [25] U. Erez, S. Litsyn, and R. Zamir. Lattices which are good for (almost) everything. IEEE Transactions on Information Theory, 51(10):3401– 3416, Oct 2005. [26] P. Gruber. Convex and Discrete Geometry. Springer Berlin Heidelberg, 2007.
7cs.IT
Twenty (simple) questions arXiv:1611.01655v3 [cs.DM] 25 Apr 2017 Yuval Dagan, Yuval Filmus, Ariel Gabizon, and Shay Moran April 26, 2017 Abstract A basic combinatorial interpretation of Shannon’s entropy function is via the “20 questions” game. This cooperative game is played by two players, Alice and Bob: Alice picks a distribution π over the numbers {1, . . . , n}, and announces it to Bob. She then chooses a number x according to π, and Bob attempts to identify x using as few Yes/No queries as possible, on average. An optimal strategy for the “20 questions” game is given by a Huffman code for π: Bob’s questions reveal the codeword for x bit by bit. This strategy finds x using fewer than H(π) + 1 questions on average. However, the questions asked by Bob could be arbitrary. In this paper, we investigate the following question: Are there restricted sets of questions that match the performance of Huffman codes, either exactly or approximately? Our first main result shows that for every distribution π, Bob has a strategy that uses only questions of the form “x < c?” and “x = c?”, and uncovers x using at most H(π) + 1 questions on average, matching the performance of Huffman codes in this sense. We also give a natural set of O(rn1/r ) questions that achieve a performance of at most H(π) + r, and show that Ω(rn1/r ) questions are required to achieve such a guarantee. Our second main result gives a set Q of 1.25n+o(n) questions such that for every distribution π, Bob can implement an optimal strategy for π using only questions from Q. We also show that 1.25n−o(n) questions are needed, for infinitely many n. If we allow a small slack of r over the optimal strategy, then roughly (rn)Θ(1/r) questions are necessary and sufficient. 1 Introduction A basic combinatorial and operational interpretation of Shannon’s entropy function, which is often taught in introductory courses on information theory, is via the “20 questions” game (see for example the well-known textbook [7]). This game is played between two players, Alice and Bob: Alice picks a distribution π over a (finite) set of objects X, and announces it to Bob. Alice then chooses an object x according to π, and Bob attempts to identify the object using as few Yes/No queries as possible, on average.What questions should Bob ask? An optimal strategy for Bob is to compute a Huffman code for π, and then follow the corresponding decision tree: his first query, for example, asks whether x lies in the left subtree of the root. While this strategy minimizes the expected number of queries, the queries themselves could be arbitrarily complex; already for the first question, Huffman’s algorithm draws from an exponentially large reservoir of potential queries (see Theorem 5.3 for more details). Therefore, it is natural to consider variants of this game in which the set of queries used is restricted; for example, it is plausible that Alice and Bob would prefer to use queries that (i) can be communicated efficiently (using as few bits as possible), and (ii) can be tested efficiently (i.e. there is an efficient encoding scheme for elements of X and a fast algorithm that given x ∈ X and a query q as input, determines whether x satisfies the query q). 1 We summarize this with the following meta-question, which guides this work: Are there “nice” sets of queries Q such that for any distribution, there is a “high quality” strategy that uses only queries from Q? Formalizing this question depends on how “nice” and “high quality” are quantified. We consider two different benchmarks for sets of queries: 1. An information-theoretical benchmark: A set of queries Q has redundancy r if for every distribution π there is a strategy using only queries from Q that finds x with at most H(π)+r queries on average when x is drawn according to π. 2. A combinatorial benchmark: A set of queries Q is r-optimal (or has prolixity r) if for every distribution π there is a strategy using queries from Q that finds x with at most Opt(π) + r queries on average when x is drawn according to π, where Opt(π) is the expected number of queries asked by an optimal strategy for π (e.g. a Huffman tree). Given a certain redundancy or prolixity, we will be interested in sets of questions achieving that performance that (i) are as small as possible, and (ii) allow efficient construction of high quality strategies which achieve the target performance. In some cases we will settle for only one of these properties, and leave the other as an open question. Information-theoretical benchmark. Let π be a distribution over X. A basic result in information theory is that every algorithm that reveals an unknown element x drawn according to π (in short, x ∼ π) using Yes/No questions must make at least H(π) queries on average. Moreover, there are algorithms that make at most H(π) + 1 queries on average, such as Huffman coding and Shannon–Fano coding. However, these algorithms may potentially use arbitrary queries. Are there restricted sets of queries that match the performance of H(π) + 1 queries on average, for every distribution π? Consider the setting in which X is linearly ordered (say X = [n], with its natural ordering: 1 < · · · < n). Gilbert and Moore [14], in a result that paved the way to arithmetic coding, showed that two-way comparison queries (“x < c?”) almost fit the bill: they achieve a performance of at most H(π) + 2 queries on average. Our first main result shows that the optimal performance of H(π) + 1 can be achieved by allowing also equality queries (“x = c?”): Theorem (restatement of Theorem 3.1). For every distribution π there is a strategy that uses only comparison and equality queries which finds x drawn from π with at most H(π) + 1 queries on average. Moreover, this strategy can be computed in time O(n log n). In a sense, this result gives an affirmative answer to our main question above. The set of comparison and equality queries (first suggested by Spuler [30]) arguably qualifies as “nice”: linearly ordered universes appear in many natural and practical settings (numbers, dates, names, IDs) in which comparison and equality queries can be implemented efficiently. Moreover, from a communication complexity perspective, Bob can communicate a comparison/equality query using just log2 n + 1 bits (since there are just 2n such queries). This is an exponential improvement over the Ω(n) bits he would need to communicate had he used Huffman coding. We extend this result to the case where X is a set of vectors of length r, ~x = (x1 , . . . , xr ), by showing that there is a strategy using entry-wise comparisons (“xi < c?”) and entry-wise equalities (“xi = c?”) that achieves redundancy r: Theorem (restatement of Theorem 4.1). Let X be the set of vectors of length r over a linearly ordered universe. For every distribution π there is a strategy that uses only entry-wise comparison queries and entry-wise equality queries and finds ~x ∼ π with at most H(π) + r queries. 2 The theorem is proved by applying the algorithm of the preceding theorem to uncover the vector ~x entry by entry. As a corollary, we are able to determine almost exactly the minimum size of a set of queries that achieves redundancy r ≥ 1. In more detail, let uH (n, r) denote the minimum size of a set of queries Q such that for every distribution π on [n] there is a strategy using only queries from Q that finds x with at most H(π) + r queries on average, when x is drawn according to π. Corollary (Theorem 4.1). For every n, r ∈ N, 1 1/r rn ≤ uH (n, r) ≤ 2rn1/r . e Obtaining this tight estimate of uH (n, r) = Θ(rn1/r ) hinges on adding equality queries; had we used only entry-wise comparison queries and the Gilbert–Moore algorithm instead, the resulting upper bound would have been uH (n, r) = O rn2/r , which is quadratically worse than the truth. Combinatorial benchmark. The analytical properties of the entropy function make H(π) a standard benchmark for the average number of bits needed to describe an element x drawn from a known distribution π, and so it is natural to use it as a benchmark for the average number of queries needed to find x when it is drawn according to π. However, there is a conceptually simpler, and arguably more natural, benchmark: Opt(π) — the average number of queries that are used by a best strategy for π (several might exist), such as one generated by Huffman’s algorithm. Can the optimal performance of Huffman codes be matched exactly? Can it be achieved without using all possible queries? Our second main result answers this in the affirmative: Theorem (restatement of Theorem 5.2 and Theorem 5.3). For every n there is a set Q of 1.25n+o(n) queries such that for every distribution over [n], there is a strategy using only queries from Q which matches the performance of the optimal (unrestricted) strategy exactly. Furthermore, for infinitely many n, at least 1.25n−o(n) queries are required to achieve this feat. One drawback of our construction is that it is randomized. Thus, we do not consider it particularly “efficient” nor “natural”. It is interesting to find an explicit set Q that achieves this bound. Our best explicit construction is: Theorem (restatement of Theorem 5.5). For every n there is an explicit set Q of O(2n/2 ) queries such that for every distribution over [n], there is a strategy using only queries from Q which matches the performance of the optimal (unrestricted) strategy exactly. Moreover, we can compute this strategy in time O(n2 ). It is natural to ask in this setting how small can a set of queries be if it is r-optimal; that is, if it uses at most Opt(π) + r questions on average when the secret element is drawn according to π, for small r > 0. Let uOpt (n, r) denote the minimum size of a set of queries Q such that for every distribution π on [n] there is a strategy using only queries from Q that finds x with at most Opt(π)+r queries on average when x is drawn from π. We show that for any fixed r > 0, significant savings can be achieved: Theorem (restatement of Theorem 6.1). For all r ∈ (0, 1): 1 16 (r · n) 4r . uOpt (n, r) . (r · n) r . Instead of the exponential number of questions needed to match Huffman’s algorithm exactly, for fixed r > 0 an r-optimal set of questions has polynomial size. In this case the upper bound is achieved by an explicit set of queries Qr . We also present an efficient randomized algorithm for computing an r-optimal strategy that uses queries from Qr . 3 Related work The “20 questions” game is the starting point of combinatorial search theory [18, 1, 3]. Combinatorial search theory considers many different variants of the game, such as several unknown elements, non-adaptive queries, non-binary queries, and a non-truthful Alice [28, 29, 2, 9]. Both average-case and worst-case complexity measures are of interest. An important topic in combinatorial search theory is combinatorial group testing [10, 11]. We are unaware of any prior work which has considered the quantities uH (n, r) or uOpt (n, r). However, several particular sets of questions have been analyzed in the literature from the perspective of redundancy and prolixity: Huffman codes [13, 17, 5, 24, 21, 23], binary search trees [14, 26, 27, 15], and comparison-based sorting algorithms [12, 25]. 2 Preliminaries Notation We use log n for the base 2 logarithm of n and [n] to denote the set {1, . . . , n}. Throughout the document, we will consider probability distributions over the set Xn = {x1 , . . . , xn } of size n. In some cases, we will think of this set as ordered: x1 ≺ · · · ≺ xn . If π is a probability distribution over Xn , we will denote the probability of xi by πi , and the probability of a set S ⊆ Xn by π(S). Information theory We use H(π) to denote the base 2 entropy of a distribution π and D(πkµ) to denote the Kullback–Leibler divergence. The binary entropy function h(p) is the entropy of a Bernoulli random variable with success probability p. When Y is a Bernoulli random variable, the chain rule takes the following form: H(X, Y ) = h(Pr[Y = 1]) + Pr[Y = 0]H(X|Y = 0) + Pr[Y = 1]H(X|Y = 1). We call this the Bernoulli chain rule. Decision trees In this paper we consider the task of revealing a secret element x from Xn by using Yes/No questions. Such a strategy will be called a decision tree or an algorithm. A decision tree is a binary tree in which the internal nodes are labeled by subsets of Xn (which we call questions or queries), each internal node has two outgoing edges labeled Yes (belongs to the question set) and No (doesn’t belong to the question set), and the leaves are labeled by distinct elements of Xn . The depth of an element xi in a decision tree T , denoted T (xi ), is the number of edges in the unique path from the root to the unique leaf labeled xi (if any). Decision trees can be thought of as annotated prefix codes: the code of an element xi is the concatenation of the labels of the edges leading to it. The mapping can also be used in the other direction: each binary prefix code of cardinality n corresponds to a unique decision tree over Xn . Given a set Q ⊆ 2Xn (a set of allowed questions), a decision tree using Q is one in which all questions belong to Q. A decision tree is valid for a distribution µ if its leaves are labeled by elements of the support of µ, and each element in the support appears as the label of some leaf. Given a distribution µ and a decision tree T valid for µ, the cost (or query complexity) P of T on µ, labeled T (µ), is the average number of questions asked on a random element, T (µ) = ni=1 µi T (xi ). Given a set Q of allowed questions and a distribution µ, the optimal cost of µ with respect to Q, denoted c(Q, µ), is the minimal cost of a valid decision tree for µ using Q. Dyadic distributions and Huffman’s algorithm Huffman’s algorithm [16] finds the optimal cost of an unrestricted decision tree for a given distribution: Opt(µ) = c(2Xn , µ). 4 We call a decision tree with this cost a Huffman tree or an optimal decision tree for µ. More generally, a decision tree is r-optimal for µ if its cost is at most Opt(µ) + r. It will be useful to consider this definition from a different point of view. Say that a distribution is dyadic if the probability of every element is either 0 or of the form 2−d for some integer d. We can associate with each decision tree T a distribution τ on the leaves of T given by τi = 2−T (xi ) . This gives a correspondence between decision trees and dyadic distributions. In the language of dyadic distributions, Huffman’s algorithm solves the following optimization problem: n X 1 [H(µ) + D(µkτ )] . min Opt(µ) = min µi log = τ dyadic τ dyadic τi supp(τ )=supp(µ) i=1 supp(τ )=supp(µ) In other words, computing Opt(µ) amounts to minimizing D(µkτ ), and thus to “rounding” µ to a dyadic distribution. We call τ a Huffman distribution for µ. The following classical inequality shows that Opt(µ) is very close to the entropy of µ: H(µ) ≤ Opt(µ) < H(µ) + 1. The lower bound follows from the non-negativity of the Kullback–Leibler divergence; it is tight exactly when µ is dyadic. The upper bound from the Shannon–Fano code, which corresponds to the dyadic sub-distribution τi = 2−⌈log µi ⌉ (in which the probabilities could sum to less than 1). Redundancy and prolixity We measure the quality of sets of questions by comparing the cost of decision trees using them to the entropy (the difference is known as redundancy) and to the cost of optimal decision trees (for the difference we coin the term prolixity). In more detail, the redundancy of a decision tree T for a distribution µ is T (µ) − H(µ), and its prolixity is T (µ) − Opt(µ). Given a set of questions Q, the redundancy r H (Q, µ) and prolixity r Opt (Q, µ) of a distribution µ are the best redundancy and prolixity achievable using questions from Q: r H (Q, µ) = c(Q, µ) − H(µ), r Opt (Q, µ) = c(Q, µ) − Opt(µ). The redundancy of a set of questions Q, denoted r H (Q), is the supremum of r H (Q, µ) over all distributions µ over Xn . The prolixity r Opt (Q) of Q is defined similarly. These quantities are closely related, as the inequality H(µ) ≤ Opt(µ) < H(µ) + 1 implies: r Opt (Q) ≤ r H (Q) ≤ r Opt (Q) + 1. A set of questions Q is optimal if r Opt (Q) = 0, and r-optimal if r Opt (Q) ≤ r. The parameters uH (n, r) and uOpt (n, r) Our main object of study in this paper are the parameters uH (n, r) and uOpt (n, r). The parameter uH (n, r) is the cardinality of the minimal set of questions Q ⊆ 2Xn such that r H (Q) ≤ r. Similarly, the parameter uOpt (n, r) is the cardinality of the minimal set of questions Q such that r Opt (Q) ≤ r. These quantities are closely related: uOpt (n, r) ≤ uH (n, r) ≤ uOpt (n, r − 1). 5 A useful lemma The following simple lemma will be used several times in the rest of the paper. Lemma 2.1. Let p1 ≥ . . . ≥ pn be a non-increasing list of numbers of the form P pi = 2−ai (for Pn −a −a integer ai ), and let P a ≤ a1 be an integer. If i=1 pi ≥ 2 then for some m we have m i=1 pi = 2 . P n n If furthermore i=1 pi is a multiple of 2−a then for some ℓ we have i=ℓ pi = 2−a . P −a Proof. Let m be the maximalP index such that m i=1 pi ≤ 2 . If m = n then we are done, so m suppose that m < n. Let S = i=1 pi . We would like to show that S = 2−a . P am+1 −ai The condition p1 ≤ · · · ≤ pn implies that am+1 ≥ · · · ≥ a1 , and so k := 2am+1 S = m i=1 2 P m+1 a −a a a −a is an integer. By assumption k ≤ 2 m+1 whereas k+1 = 2 m+1 i=1 pi > 2 m+1 . Since 2am+1 −a is itself an integer (since am+1 ≥ a1 ≥ a), we conclude that k = 2am+1 −a , and so S = 2−a . To prove the furthermore part, notice that by repeated applications of the of the lemma we can partition [n] into intervals whose probabilities are 2−a . The last such interval provides the required index ℓ. 3 Comparisons and equality tests Let π be a distribution over Xn = {x1 , . . . , xn }. A fundamental result in information theory is that the entropy of a distribution π captures the average number of queries needed to identify a random x ∼ π. More specifically, every algorithm asks at least H(π) questions in expectation, and there are algorithms that ask at most H(π) + 1 questions on average (such as Huffman coding and Shannon–Fano coding). However, these algorithms may potentially use arbitrary questions. In this section we are interested in the setting where Xn is linearly ordered: x1 ≺ x2 ≺ · · · ≺ xn . We wish to use questions that are compatible with the ordering. Perhaps the most natural question in this setting is a comparison query; namely a question of the form “x ≺ xi ?”. Gilbert and Moore [14] showed that there exists an algorithm that uses at most H(π) + 2 comparisons. Is this tight? Can comparison queries achieve the benchmark of H(π) + 1? A simple argument shows that their result is tight: let n = 3, and let π be a distribution such that π(x1 ) = ǫ/2, π(x2 ) = 1 − ǫ, π(x3 ) = ǫ/2,  for some small ǫ. Note that H(π) = O(ǫ log 1/ǫ ), and therefore any algorithm with redundancy 1 must use the query “x = x2 ?” as its first question. This is impossible if we only allow comparison queries (see Lemma 4.2.1 for a more detailed and general argument). In fact, this shows that any set of questions that achieves redundancy 1 must include all equality queries. So, we need to at least add all equality queries. Is it enough? Do comparison and equality queries achieve redundancy of at most 1? Our main result in this section gives an affirmative answer to this question: (n) (n) Theorem 3.1. Let Q= = {{xi } : 1 ≤ i ≤ n} and Q≺ = {{x1 , . . . , xi } : 1 ≤ i ≤ n − 1}. In (n) (n) other words, Q= consists of the questions “x = xi ?” for i ∈ {1, . . . , n}, and Q≺ consists of the questions “x ≺ xi ?” for i ∈ {2, . . . , n}. (Recall that x is the secret element.) (n) (n) For all n, r H (Q≺ ∪ Q= ) = 1. We prove the theorem by modifying the weight-balancing algorithm of Rissanen [27], which uses only comparison queries and achieves redundancy 2 (as shown by Horibe [15]). The original weight-balancing algorithm is perhaps the first algorithm that comes to mind: it asks the most balanced comparison query (the one that splits the distribution into two parts whose probability is as equal as possible), and recurses according to the answer. 6 Our modified algorithm, Algorithm At , first checks whether the probability of the most probable element xmax exceeds the threshold t. If so, it asks the question “x = xmax ?”. Otherwise, it proceeds as in the weight-balancing algorithm. The choice t = 0.3 results in an algorithm whose redundancy is at most 1. While a naive implementation of Algorithm At takes time O(n) to determine the next query, this can be improved to O(log n), given O(n) preprocessing time. Moreover, the entire strategy can be computed in time O(n log n). The interested reader can find the complete details in [8]. 3.1 Algorithm At Let π be a distribution over Xn . Let xmax denote the most probable element, and let πmax denote its probability. Let xmid denote a point xi that minimizes |π({x : x ≺ xi }) − 1/2| over i ∈ [n]. We call xmid the middle1 of π. Note that the query “x ≺ xmid ?” is the most balanced query among all queries of the form “x ≺ xi ?”. Let A ⊆ {x1 , . . . , xn }. We use πA to denote π(A); i.e. the probability of A. Specifically, we use π≺xi , πxi , π6=xi to denote πA when A is {x : x ≺ xi }, {x : x  xi }, {x : x 6= xi }. We use π|A to denote the restriction of π to A; i.e., the distribution derived by conditioning π on A. Specifically, we use π|≺xi , π|xi , π|6=xi to denote π|A when A is {x : x ≺ xi }, {x : x  xi }, {x : x 6= xi }. Algorithm At . Given a threshold t ∈ (0, 1), Algorithm At takes as input a distribution π over Xn and a secret element x, and determines x using only comparison and equality queries, in the following recursive fashion: 1. If π(xi ) = 1 for some element xi , then output xi . 2. If πmax ≥ t then ask whether x = xmax , and either output xmax , or continue with π|6=xmax . 3. If πmax < t, ask whether x ≺ xmid , and continue with either π|≺xmid or π|xmid . (When recursing on a domain D, we identify D with X|D| .) ⊳ The weight balancing algorithm of Rissanen [27] is the special case t = 1; in this case no equality queries are needed, and the resulting redundancy is 2, as shown by Horibe [15]. We will show that for a certain range of values of t (for example, t = 0.3), Algorithm At achieves redundancy at most 1, thus proving Theorem 3.1. Recall that At (π) is the cost of At on π, and let Rt (π) := At (π)−H(π)−1. It is more convenient to present the proof in terms of Rt (π) rather than in terms of the redundancy. Our goal, stated in these terms, is showing that there exists some t for which Rt (π) ≤ 0 for all distributions π. We next observe two simple properties of the algorithm At . The proof of Theorem 3.1 relies only on these properties. The first property is a recursive definition of Rt that is convenient to induct on. See Figure 1 for a pictorial illustration. Lemma 3.1.1. Let π be a distribution over Xn . Then   −1 Rt (π) = 1 − h(πmax ) − πmax + (1 − πmax )Rt (π|6=xmax )   1 − h(π≺xmid ) + π≺xmid Rt (π|≺xmid ) + πxmid Rt (π|xmid ) 1 Note that one of {xmid , xmid−1 } is a median. 7 if πmax = 1, if πmax ∈ [t, 1), if πmax ∈ (0, t). “x 6= xmax ?” “x ≺ xmid ?” πmax πxmid π≺xmid 1 − h(πxmid ) xmax 1 − h(π6=xmax ) 1 − πmax Rt (π|=xmax ) = −1 Rt (π|6=xmax ) Rt (π|xmid ) Rt (π|≺xmid ) (a) πmax ∈ (0, t) (b) πmax ∈ [t, 1) Figure 1: Recursive definition of Rt Proof. If πmax = 1 then At (π) = 0 and H(π) = 0, so Rt (π) = −1. If πmax ∈ [t, 1) then Rt (π) = At (π) − H(π) − 1 i h i i h h = 1 + (1 − πmax )At (π|6=xmax ) − h(πmax ) + (1 − πmax )H(π|6=xmax ) − πmax + (1 − πmax ) i h = 1 − h(πmax ) − πmax + (1 − πmax ) At (π|6=xmax ) − H(π|6=xmax ) − 1 = 1 − h(πmax ) − πmax + (1 − πmax )Rt (π6=xmax ). If πmax ∈ (0, t) then Rt (π) = At (π) − H(π) − 1 h i = 1 + π≺xmid At (π|≺xmid ) + πxmid At (π|xmid ) i h h i − h(π≺xmid ) + π≺xmid H(π|≺xmid ) + πxmid H(π|xmid ) − π≺xmid + πxmid h i h i = 1 − h(π≺xmid ) + π≺xmid At (π|≺xmid ) − H(π|≺xmid ) − 1 + πxmid At (π|xmid ) − H(π|xmid ) − 1 = 1 − h(π≺xmid ) + π≺xmid Rt (π|≺xmid ) + πxmid Rt (π|xmid ). The second property is that whenever At uses a comparison query (i.e. when πmax < t), then this question is balanced: Lemma 3.1.2. Let π be a distribution over Xn . Then π≺xmid , πxmid ∈ [ 1−π2max , 1+π2max ]. Proof. By the definition of xmid , it suffices to show that there exists some j with π≺j ∈ [ 1−π2max , 1+π2max ]. Indeed, for all j, π≺j+1 −π≺j = πj ≤ πmax , and therefore, if j is the maximum element with π≺j < 12 (possibly j = 0), then either π≺j or π≺j+1 are in [ 1−π2max , 1+π2max ]. 3.2 Game Gt We will use the properties described in Lemma 3.1.2 to bound Rt (π). Since this involves quantifying over all distributions π, it is convenient to introduce a game that simulates At on a distribution 8 π. The game involves one player, Alice, who we think of as an adversary that chooses the input distribution π (in fact, she only chooses πmax ), and wins a revenue of Rt (π) (thus, her objective is to maximize the redundancy). This reduces our goal to showing that Alice’s optimum revenue is nonpositive. The definition of the game is tailored to the properties stated in Lemma 3.1.1 and Lemma 3.1.2. We first introduce Gt , and then relate it to the redundancy of At (see Lemma 3.3.1 below). Game Gt . Let t ≤ 31 , and let f, s : (0, 1] → R be f (x) := 1 − h(x) − x and s(x) := 1 − h(x). The game Gt consists of one player called Alice, whose objective is to maximize her revenue. The game Gt begins at an initial state p ∈ (0, 1], and proceeds as follows. 1. If p ∈ [t, 1], the game ends with revenue f (p).  2p 2p  , 1−p and recursively plays Gt with initial 2. If p ∈ (0, t), then Alice chooses a state2 p′ ∈ 1+p ′ ′ state p . Let r denote her revenue in the game that begins at p′ . Alice’s final revenue is   p p s ′ + ′ · r′. ⊳ p p Note that given any initial state p and a strategy for Alice, the game Gt always terminates: indeed, if p = p0 , p1 , p2 , . . . is the sequence of states chosen by Alice, then as long as pi < t, it holds 2pi 2pi > 1+1/3 = 32 pi (the second inequality is since pi < t ≤ 13 ). So the sequence of that pi+1 ≥ 1+p i states grows at an exponential rate, which means that for ℓ = O(log(1/p0 )), the state pℓ exceeds the threshold t and the game terminates. For p ∈ (0, 1], let rt (p) denote the supremum of Alice’s revenue in Gt when the initial state is p, the supremum ranging over all possible strategies for Alice. Our next step is using the game Gt to prove Theorem 3.1: We will show that t = 0.3 satisfies: (i) rt (p) ≤ 0 for all p ∈ (0, 1], and (ii) Rt (π) ≤ rt (πmax ) for all π. Note that (i) and (ii) imply Theorem 3.1. Before establishing (i) and (ii), we state and prove three simple lemmas regarding Gt that are useful to this end. The first lemma will be used in the proof of Lemma 3.3.1, which shows that if rt (p) ≤ 0 for all p ∈ (0, 1], then Rt (π) ≤ rt (πmax ). Its proof follows directly from the definition of rt .  2p 2p  , 1−p : Lemma 3.2.1. For all p < t and all p′ ∈ 1+p   p p + ′ · rt (p′ ). rt (p) ≥ s ′ p p The next two lemmas will be used in the proof of Lemma 3.3.2, which shows that rt (p) ≤ 0 for all p ∈ (0, 1] when t = 0.3. The first one gives a tighter estimate on the growth of the sequence of states: Lemma 3.2.2. Let p0 , p1 , . . . , pk be the sequence of states chosen by Alice. For every i ≤ k − 1: pk−1−i < 2 Note that p′ ∈ (0, 1], since p < t ≤ 1 3 implies that  2i (1 t . − t) + t 2p , 2p 1+p 1−p 9  ⊆ (0, 1]. Proof. We prove the bound by induction on i. The case i = 0 follows from pk−1 being a non-final state, and thereforepk−1 < t as required. Assume now that i > 0. By the of Gt it follows  definition pk−1−(i−1)  pk−1−(i−1) 2pk−1−i  2p , , which implies that p ∈ that pk−1−(i−1) ∈ 1+pk−1−i k−1−i 2+pk−1−(i−1) , 2−pk−1−(i−1) . k−1−i 1−pk−1−i Therefore, pk−1−(i−1) pk−1−i ≤ 2 − pk−1−(i−1)  t/ 2i−1 (1 − t) + t  (by induction hypothesis on i − 1) < 2 − t/ 2i−1 (1 − t) + t t = i . 2 (1 − t) + t The second lemma gives a somewhat more explicit form of the revenue of Gt : Lemma 3.2.3. Let p0 , p1 , . . . , pk be the sequence of states chosen by Alice. Let r(p0 , . . . , pk ) denote the revenue obtained by choosing these states. Then   k−1 X p0 pi p0 r(p0 , . . . , pk ) = s + f (pk ). pi pi+1 pk i=0 Proof. We prove the formula by induction on k. If k = 0 then pk ≥ t and r(pk ) = f (pk ) = ppk0 f (pk ). When k ≥ 1:   p0 p0 · r(p1 , . . . , pk ) (by definition of Gt ) + r(p0 , . . . , pk ) = s p1 p1     k−1  p0 p0 pi p0 X p1 p1 = s · s (by induction hypothesis) + + f (pk ) p0 p1 p1 p pi+1 pk i=1 i   k−1 X pi p0 p0 s + f (pk ). = pi pi+1 pk i=0 3.3 Relating At to Gt Next, we relate the revenue in Gt to the redundancy of At by linking rt and Rt . We first reduce the Theorem 3.1 to showing that there exists some t ∈ (0, 1] such that rt (p) ≤ 0 for all p ∈ (0, 1] (Lemma 3.3.1), and then show that t = 0.3 satisfies this condition (Lemma 3.3.2). Lemma 3.3.1. Let t be such that rt (p) ≤ 0 for all p ∈ (0, 1]. For every distribution π, Rt (π) ≤ rt (πmax ). In particular, such t satisfies Rt (π) ≤ 0 for all π. Proof. We proceed by induction on the size of supp(π) = {xi : π(xi ) 6= 0}. If supp(π) = 1 then πmax = 1, and therefore Rt (π) = −1, rt (πmax ) = 0, and indeed Rt (π) ≤ rt (πmax ). Assume now that supp(π) = k > 1. Since k > 1, it follows that πmax < 1. There are two cases, according to whether πmax ∈ (0, t) or πmax ∈ [t, 1). If πmax ∈ (0, t) then At asks whether x ≺ xmid , and continues accordingly with π|≺xmid or π|xmid . Let σ := π|≺xmid and τ := π|xmid . By Lemma 3.1.1: Rt (π) = 1 − h(π≺xmid ) + π≺xmid Rt (σ) + πxmid Rt (τ ) ≤ 1 − h(π≺xmid ) + π≺xmid rt (σmax ) + πxmid rt (τmax ) 10 (since πmax ∈ (0, t)) (by induction hypothesis) Without loss of generality, assume that xmax ≺ xmid . Therefore σmax = πmax /π≺xmid , and by Lemma 3.1.2:   2πmax 2πmax σmax ∈ , . (1) 1 + πmax 1 − πmax Thus, Rt (π) ≤ 1 − h(π≺xmid ) + π≺xmid rt (σmax )   πmax πmax rt (σmax ) =1−h + σmax σmax   πmax πmax =s rt (σmax ) + σmax σmax ≤ rt (πmax ). (since rt (τmax ) ≤ 0) (σmax = πmax π≺xmid ) (by definition of s) (by (1) and Lemma 3.2.1) The analysis when πmax ∈ [t, 1) is very similar. In this case At asks whether x = xmax , and continues with π|6=xmax if x 6= xmax . Let σ := π|≤xmax . By Lemma 3.1.1, Rt (π) = 1 − h(πmax ) − πmax + (1 − πmax )Rt (σ) ≤ 1 − h(πmax ) − πmax + (1 − πmax )rt (σmax ) (since πmax ∈ (t, 1)) (by induction hypothesis) ≤ 1 − h(πmax ) − πmax (since rt (σmax ) ≤ 0) = f (πmax ) (by definition of f ) (by definition of rt , since πmax ≥ t) = rt (πmax ). The following lemma shows that t = 0.3 satisfies rt (p) ≤ 0 for all p ∈ (0, 1], completing the proof of Theorem 3.1. It uses some technical results, proved below in Lemma 3.3.3. Lemma 3.3.2. Let t = 0.3. Then rt (p) ≤ 0 for all p ∈ (0, 1]. Proof. Let p ∈ (0, 1]. We consider two cases: (i) p ≥ t, and (ii) p < t. In each case we derive a constraint on t that suffices for ensuring that rt (p) ≤ 0, and conclude the proof by showing that t = 0.3 satisfies both constraints. Consider the case t ≤ p. Here rt (p) = f (p) = 1 − h(p) − p, and calculation shows that f (p) is non-positive on [0.23, 1]; therefore, rt (p) ≤ 0 for all p ≥ t, as long as t ≥ 0.23. Consider the case p < t. Here, we are not aware of an explicit formula for rt (p); instead, we derive the following upper bound, for all p < t: ∞ rt (p) X S ≤ p n=0  t n 2 (1 − t) + t where    2t  , + max F (t), F 1−t  (2)  1+x f (x) 2 S(x) = , F (x) = . x x With (2) in hand we are done: indeed, calculation shows that the right hand side of (2) is nonpositive in some neighborhood of 0.3 (e.g. it is −0.0312 when t = 0.3, it is −0.0899 when t = 0.294); thus, as these values of t also satisfy the constraint from (i), this finishes the proof. s 11 It remains to prove (2). Let p = p0 , p1 , p2 , . . . , pk be a sequence  of states  chosen by Alice. It P∞ r(p0 ,...,pk ) t 2t ≤ n=0 S 2n (1−t)+t + max F (t), F 1−t . By Lemma 3.2.3: suffices to show that p0   k−1 X p0 pi p0 r(p0 , . . . , pk ) = s + f (pk ) p pi+1 pk i=0 i   k−1 X p0 1 + pi p0 ≤ s + f (pk ) pi 2 pk i=0 = p0 k−1 X i=0  S(pi ) + F (pk ) , i 1+pi where in the second line we used that pi+1 ∈ [ 1−p 2 , 2 ], and the fact that s(x) = 1 − h(x) is symmetric around x = 0.5 and increases with |x − 0.5|. Therefore, pi k−1 r(p0 , . . . , pk ) X S(pi ) + F (pk ) ≤ p0 i=0  k−1  X t S ≤ + F (pk ) 2i (1 − t) + t i=0    ∞  2t  X t , + max F (t), F S ≤ 2i (1 − t) + t 1−t i=0 where in the second last inequality we used that pk−1−i < t 2i (1−t)+t (Lemma 3.2.2) and that S(x) 2t ) and that is monotone (Lemma 3.3.3 below), and in the last inequality we used that pk ∈ [t, 1−t F (x) is convex (Lemma 3.3.3 below). The following technical lemma completes the proof of Lemma 3.3.2. Lemma 3.3.3. The function S(x) = convex. ) 1−h( 1+x 2 x is monotone, and the function F (x) = 1−h(x)−x x is Proof. The function h( 1−x 2 ) is equal to its Maclaurin series for x ∈ (−1, +1): ∞ 1 + x X log2 e =1− · x2k . h 2 2k(2k − 1) k=1 Therefore, S(x) = ∞ X k=1 and F (x) = ∞ X k=1 log2 e · x2k−1 , 2k(2k − 1) log2 e (1 − 2x)2k  − 1. · 2k(2k − 1) x Now, each of the functions x2k−1 is monotone, and each of the functions (0, ∞): its second derivative is (1−2x)2k x is convex on 2(1 − 2x)2k−2 (1 + 4(k − 1)x + 4(k − 1)(2k − 1)x2 ) > 0. x3 Therefore, S(x) is monotone as a non-negative combination of monotone functions, and F (x) is convex as a non-negative combination of convex functions. 12 4 Information theoretical benchmark — Shannon’s entropy In this section we study the minimum number of questions that achieve redundancy of at most r, for a fixed r ≥ 1. Note that r = 1 is the optimal redundancy: the distribution π on X2 given by π1 = 1 − ǫ, π2 = ǫ has redundancy 1 − Õ(ǫ) (that is, 1 − O(ǫ log(1/ǫ)) even without restricting the set of allowed questions. In the previous section we have shown that the optimal redundancy of r = 1 can be achieved with just 2n comparison and equality queries (in fact, as we show below, there are only 2n − 3 of these queries). It is natural to ask how small the number of questions can be if we allow for a larger r. Note that at least log n questions are necessary to achieve any finite redundancy. Indeed, a smaller set of questions is not capable of specifying all elements even if all questions are being asked. The main result of this section is that the minimum number of questions that are sufficient for achieving redundancy r is roughly r · n1/⌊r⌋ : Theorem 4.1. For every r ≥ 1 and n ∈ N, 1 ⌊r⌋n1/⌊r⌋ ≤ uH (n, r) ≤ 2⌊r⌋n1/⌊r⌋ . e  In particular, uH (n, r) = Θ ⌊r⌋n1/⌊r⌋ . 4.1 Upper bound The upper bound in Theorem 4.1 is based on the following corollary of Theorem 3.1: Theorem 4.1.1. Let Y be a linearly ordered set, and let Z = Y k (we don’t think of Z as ordered). For any distribution π on Z there is an algorithm that uses only questions of the form (i) “~xi ≺ y?” and (ii) “~xi = y?”, where i ∈ [k] and y ∈ Y , whose cost is at most H(π) + k. Proof. Let Z1 Z2 . . . Zk ∼ π. Consider the algorithm which determines Z1 , . . . , Zk in order, where Zi is determined by applying the algorithm from Theorem 3.1 on “Zi |Z1 . . . Zi−1 ”, which is the conditional distribution of Zi given the known values of Z1 , . . . , Zi−1 . The expected number of queries is at most    H(Z1 ) + 1 + H(Z2 |Z1 ) + 1 + · · · + H(Zk |Z1 . . . Zk−1 ) + 1 = H(Z1 . . . Zk ) + k, using the chain rule. We use this theorem to construct a set of questions of size at most 2⌊r⌋n1/⌊r⌋ that achieves redundancy r for any distribution over Xn .  ⌊r⌋ Note that n ≤ n1/⌊r⌋ . Therefore every element x ∈ Xn can be represented by a vector  ⌊r⌋ . Let Q be the set containing all questions of the form (i) “~xi = y?” and ~x ∈ 1, . . . , ⌈n1/⌊r⌋ ⌉ (ii) “~xi ≺ y?”. By Theorem 4.1.1, r(Q) = ⌊r⌋. The following questions from Q are redundant, and can be removed from Q without increasing its redundancy: (i) “~xi ≺ 1?” (corresponds to the empty set and therefore provides no information), (ii) “~xi ≺ 2?” (equivalent to the question “~xi = 1?”), and (iii) “~xi ≺ ⌈n1/⌊r⌋ ⌉?” (equivalent to the question “~xi = ⌈n1/⌊r⌋ ⌉?”). The number of remaining questions is       ⌊r⌋ · 2 n1/⌊r⌋ − 3 ≤ 2⌊r⌋ · n1/⌊r⌋ . This proves the upper bound in Theorem 4.1. 13 4.2 Lower bound The crux of the proof of the lower bound in Theorem 4.1 is that if Q is a set of questions whose redundancy is at most r then every x ∈ Xn can be identified by at most ⌊r⌋ questions from Q. We say that the questions q1 , . . . , qT identify x if for every y 6= x there is some i ≤ T such that qi (x) 6= qi (y). Define t(n, r) to be the minimum cardinality of a set Q of questions such that every x ∈ X has at most r questions in Q that identify it. The quantity t(n, r) can be thought of as a non-deterministic version of u(n, r): it is the minimal size of a set of questions so that every element can be “verified” using at most r questions. The lower bound on u(n, r) follows from Lemma 4.2.1 and Lemma 4.2.2 below. Lemma 4.2.1. For all n, r, u(n, r) ≥ t(n, ⌊r⌋). Proof. It suffices to show that for every set of questions Q with redundancy at most r, every x ∈ X has at most ⌊r⌋ questions in Q that identify it. Consider the distribution π given by π(x) = 1 − ǫ and π(y) = ǫ/(n − 1) for y 6= x. Thus H(π) = Õ(ǫ). Consider an algorithm for π with redundancy r that uses only questions from Q. Let T be the number of questions it uses to find x. The cost of the algorithm is at least (1 − ǫ)T , ǫ )r. For small enough ǫ > 0, and so (1 − ǫ)T ≤ H(π) + r = Õ(ǫ) + r, implying T ≤ Õ(ǫ) + (1 + 1−ǫ the right-hand side is smaller than ⌊r⌋ + 1, and so T ≤ ⌊r⌋. Lemma 4.2.1 says that in order to lower bound u(n, r), it suffices to lower bound t(n, ⌊r⌋), which is easier to handle. For example, the following straightforward argument shows that t(n, R) ≥ 1 1/R , for every R, n ∈ N. Assume Q is a set of questions of size u(n, R) so that every x is 2e Rn identified by at most R questions. This implies an encoding (i.e. a one-to-one mapping) of x ∈ Xn by the R questions identifying it, and by the bits indicating whether x satisfies each of these questions. Therefore   |Q| R  2e|Q| R , n≤ 2 ≤ R ≤R k m for all m, k. This implies that t(n, ⌊r⌋) ≥ where in the last inequality we used that ≤k ≤ em k 1 1 1/⌊r⌋ 1/⌊r⌋ . The constant 2e in front of ⌊r⌋n can be increased to 1e , using an algebraic argument: 2e ⌊r⌋n Lemma 4.2.2. For all n, R ∈ N: 1 R · n1/R . e Proof. We use the so-called polynomial method. Let Q be a set of questions such that each x ∈ X can be identified by atmost R queries. For each x ∈ X, let ux be the |Q|-dimensional vector ux = q1 (x), . . . , q|Q| (x) , and let U = {ux : x ∈ X} ⊆ {0, 1}|Q| . We will show that every function F : U → F2 can be represented as a multilinear polynomial of degree at most R in |Q| variables. Since the dimension over F2 of all such functions is n, whereas the dimension of the space of all |Q|  multilinear polynomials of degree at most R is ≤R , the bound follows:    |Q| e|Q| R 1 n≤ ≤ =⇒ n ≥ R · n1/R . ≤R R e t(n, R) ≥ It is enough to show that for any ux ∈ U , the corresponding “delta function” δx : U → F2 , defined as δx (ux ) = 1 and δx (v) = 0 for ux 6= v ∈ U , can be represented as a polynomial of degree at most d. Suppose that qi1 , . . . , qiT are T ≤ R questions that identify x. Consider the polynomial P (y1 , . . . , y|Q| ) = (yi1 − qi1 (x) + 1) · · · (yir − qir (x) + 1). 14 Clearly P (ux ) = 1. On the other hand, if P (uy ) = 1 then qij (y) = qij (x) for all j, showing that y = x. So P = δx , completing the proof. Our proof of the lower bound in Theorem 4.1 is based on t(n, R), which is the minimum cardinality of a set of queries such that each element can be identified by at most R questions. This quantity is closely related to witness codes [22, 6]; see [8] for more details. 5 Combinatorial benchmark — Huffman codes Section 3 shows that the optimal redundancy, namely 1, can be achieved using only O(n) questions. However, it is natural to ask for an instance-optimal algorithm? That is, we are looking for a set of questions which matches the performance of minimum redundancy codes such as Huffman codes. Let us repeat the definition of an optimal set of questions that is central in this section. Definition 5.1. A set Q of subsets of Xn is an optimal set of questions over Xn if for all distributions µ on Xn , c(Q, µ) = Opt(µ). Using the above definition, uOpt (n, 0) is equal to the minimal size of an optimal set of questions over Xn . Perhaps surprisingly, the trivial upper bound of 2n−1 on uOpt (n, 0) can be exponentially improved: Theorem 5.2. We have uOpt (n, 0) ≤ 1.25n+o(n) . We prove a similar lower bound, which is almost tight for infinitely many n: Theorem 5.3. For n of the form n = 5 · 2m , √ uOpt (n, 0) ≥ 1.25n /O( n). For all n, √ uOpt (n, 0) ≥ 1.232n /O( n). Corollary 5.4. We have lim sup n→∞ log uOpt (n, 0) = log 1.25. n Unfortunately, the construction in Theorem 5.2 is not explicit. A different construction, which √ n uses O( 2 ) questions, is not only explicit, but can also be implemented efficiently: Theorem 5.5. Consider the set of questions Q = {A ⊆ Xn : A ⊆ X⌈n/2⌉ or A ⊇ X⌈n/2⌉ }. The set Q consists of 2⌈n/2⌉ + 2⌊n/2⌋ questions and satisfies the following properties: 1. There is an indexing scheme Q = {Qq : q ∈ {0, 1}⌈n/2⌉+1 } such that given an index q and an element xi ∈ Xn , we can decide whether xi ∈ Qq in time O(n). 2. Given a distribution π, we can construct an optimal decision tree for π using Q in time O(n2 ). 3. Given a distribution π, we can implement an optimal decision tree for π in an online fashion in time O(n) per question, after O(n log n) preprocessing. 15 Section organization. Section 5.1 shows that a set of questions is optimal if and only if it is a dyadic hitter, that is, contains a question splitting every non-constant dyadic distribution into two equal halves. Section 5.2 discusses a relation to hitting sets for maximal antichains, and proves Theorem 5.5. Section 5.3 shows that the optimal size of a dyadic hitter is controlled by the minimum value of another parameter, the maximum relative density. We upper bound the minimum value in Section 5.4, thus proving Theorem 5.3, and lower bound it in Section 5.5, thus proving Theorem 5.2. 5.1 Reduction to dyadic hitters The purpose of this subsection is to give a convenient combinatorial characterization of optimal sets of questions. Before presenting this characterization, we show that in this context it suffices to look at dyadic distributions. Lemma 5.1.1. A set Q of questions over Xn is optimal if and only if c(Q, µ) = Opt(µ) for all dyadic distributions µ. Proof. Suppose that Q is optimal for all dyadic distributions, and let π be an arbitrary distribution over Xn . Let µ be a dyadic distribution such that Opt(π) = n X πi log i=1 1 . µi By assumption, Q is optimal for µ. Let T be an optimal decision tree for µ using questions from Q only, and let τ be the corresponding dyadic distribution, given by τi = 2−T (xi ) (recall that T (xi ) is the depth of xi ). Since τ minimizes T (µ) = H(µ) + D(µkτ ) over dyadic distributions, necessarily τ = µ. Thus n n X X 1 1 πi log = T (π) = πi log = Opt(π), τi µi i=1 i=1 showing that Q is optimal for µ. Given a dyadic distribution µ on Xn , we will be particularly interested in the collection of subsets of Xn that have probability exactly half under µ. Definition 5.1.2 (Dyadic hitters). Let µ be a non-constant dyadic distribution. A set A ⊆ Xn splits µ if µ(A) = 1/2. We denote the collection of all sets splitting µ by Spl(µ). We call a set of the form Spl(µ) a dyadic set. We call a set of questions Q a dyadic hitter in Xn if it intersects Spl(µ) for all non-constant dyadic distributions µ. (Lemma 2.1 implies that Spl(µ) is always non-empty.) A dyadic hitter is precisely the object we are interested in: Lemma 5.1.3. A set Q of subsets of Xn is an optimal set of questions if and only if it is a dyadic hitter in Xn . Proof. Let Q be a dyadic hitter in Xn . We prove by induction on 1 ≤ m ≤ n that for a dyadic distribution µ on Xn with support size m, c(Q, µ) = H(µ). Since Opt(µ) = H(µ), Lemma 5.1.1 implies that Q is an optimal set of questions. The base case, m = 1, is trivial. Suppose therefore that µ is a dyadic distribution whose support has size m > 1. In particular, µ is not constant, and so Q contains some set S ∈ Spl(µ). Let α = µ|S and β = µ|S , and note that α, β are both dyadic. The induction hypothesis shows 16 that c(Q, α) = H(α) and c(Q, β) = H(β). A decision tree which first queries S and then uses the implied algorithms for α and β has cost 1 1 1 + H(α) + H(β) = h(µ(S)) + µ(S)H(µ|S ) + µ(S)H(µ|S ) = H(µ), 2 2 using the Bernoulli chain rule; here µ|S is the restriction of µ to the elements in S. Conversely, suppose that Q is not a dyadic hitter, and let µ be a non-constant dyadic distribution such that Spl(µ) is disjoint from Q. Let T be any decision tree for µ using Q, and let S be its first question. The cost of T is at least 1 + µ(S)H(µ|S ) + µ(S)H(µ|S ) > h(µ(S)) + µ(S)H(µ|S ) + µ(S)H(µ|S ) = H(µ), since µ(S) 6= 21 . Thus c(Q, µ) > Opt(µ), and so Q is not an optimal set of questions. 5.2 Dyadic sets as antichains There is a surprising connection between dyadic hitters and hitting sets for maximal antichains. We start by defining the latter: Definition 5.2.1. A fibre in Xn is a subset of 2Xn which intersects every maximal antichain in Xn . Fibres were defined by Lonc and Rival [20], who also gave a simple construction, via cones: Definition 5.2.2. The cone C(S) of a set S consists of all subsets and all supersets of S. Any cone C(S) intersects any maximal antichain A, since otherwise A ∪ {S} is also an antichain. By choosing S of size ⌊n/2⌋, we obtain a fibre of size 2⌊n/2⌋ + 2⌈n/2⌉ − 1 = Θ(2n/2 ). Our goal now is to show that every fibre is a dyadic hitter: Theorem 5.2.3. every fibre is a dyadic hitter. This shows that every cone is a dyadic hitter, and allows us to give a simple algorithm for constructing an optimal decision tree using any cone. We start with a simple technical lemma which will also be used in Section 5.4: Definition 5.2.4. Let µ be a dyadic distribution over Xn . The tail of µ is the largest set of elements T ⊆ Xn such that for some a ≥ 1, (i) The elements in T have probabilities 2−a−1 , 2−a−2 , . . . , 2−a−(|T |−1) , 2−a−(|T |−1) . (ii) Every element not in T has probability at least 2−a . Lemma 5.2.5. Suppose that µ is a non-constant dyadic distribution with non-empty tail T . Every set in Spl(µ) either contains T or is disjoint from T . Proof. The proof is by induction on |T |. If |T | = 2 then there exist an integer a ≥ 1 and two elements, without loss of generality x1 , x2 , of probability 2−a−1 , such that all other elements have probability at least 2−a . Suppose that S ∈ Spl(µ) contains exactly one of x1 , x2 . Then 2a−1 = X xi ∈S X 2a µ(xi ) = xi ∈S\{x1 ,x2 } 17 1 2a µ(xi ) + . 2 However, the left-hand side is an integer while the right-hand side is not. We conclude that S must contain either both of x1 , x2 or none of them. For the induction step, let the elements in the tail T of µ have probabilities 2−a−1 , 2−a−2 , . . . , −a−(|T |−1) , 2−a−(|T |−1) . Without loss of generality, suppose that x 2 n−1 , xn are the elements whose −a−(|T |−1) probability is 2 . The same argument as before shows that every dyadic set in Spl(µ) must contain either both of xn−1 , xn or neither. Form a new dyadic distribution ν on Xn−1 by merging the elements xn−1 , xn into xn−1 , and note that Spl(µ) can be obtained from Spl(ν) by replacing xn−1 with xn−1 , xn . The distribution ν has tail T ′ = T \ {xn }, and so by induction, every set in Spl(ν) either contains T ′ or is disjoint from T ′ . This implies that every set in Spl(µ) either contains T or is disjoint from T . The first step in proving Theorem 5.2.3 is a reduction to dyadic distributions having full support: Lemma 5.2.6. A set of questions is a dyadic hitter in Xn if and only if it intersects Spl(µ) for all non-constant full-support dyadic distributions µ on Xn . Proof. A dyadic hitter clearly intersects Spl(µ) for all non-constant full-support dyadic distributions on Xn . For the other direction, suppose that Q is a set of questions that intersects Spl(µ) for every non-constant full-support dyadic distribution µ. Let ν be a non-constant dyadic distribution on Xn which doesn’t have full support. Let xmin be an element in the support of ν with minimal probability, which we denote νmin . Arrange the elements in supp(ν) in some arbitrary order xi1 , . . . , xim . Consider the distribution µ given by: • µ(xi ) = ν(xi ) if xi ∈ supp(µ) and xi 6= xmin . • µ(xmin ) = νmin /2. • µ(xij ) = νmin /2j+1 for j < m. • µ(xim ) = νmin /2m . In short, we have replaced ν(xmin ) = νmin with a tail xmin , xi1 , . . . , xim of the same total probability. It is not hard to check that µ is a non-constant dyadic distribution having full support on Xn . We complete the proof by showing that Q intersects Spl(ν). By assumption, Q intersects Spl(µ), say at a set S. Lemma 5.2.5 shows that S either contains all of {xmin } ∪ supp(ν), or none of these elements. In both cases, ν(S) = µ(S) = 1/2, and so Q intersects Spl(ν). We complete the proof of Theorem 5.2.3 by showing that dyadic sets corresponding to fullsupport distributions are maximal antichains: Lemma 5.2.7. Let µ be a non-constant dyadic distribution over Xn with full support, and let D = Spl(µ). Then D is a maximal antichain which is closed under complementation (i.e. A ∈ D =⇒ X \ A ∈ D). Proof. (i) That D is closed under complementation follows since if A ∈ D then µ(X \ A) = 1 − µ(A) = 1/2. (ii) That D is an antichain follows since if A strictly contains B then µ(A) > µ(B) (because µ has full support). (iii) It remains to show that D is maximal. By (i) it suffices to show that every B with µ(B) > 1/2 contains some A ∈ D. This follows from applying Lemma 2.1 on the probabilities of the elements in B. 18 Cones allow us to prove Theorem 5.5: Proof of Theorem 5.5. Let S = {x1 , . . . , x⌊n/2⌋ }. The set of questions Q is the cone C(S), whose size is 2⌊n/2⌋ + 2⌈n/2⌉ − 1 < 2⌈n/2⌉+1 . An efficient indexing scheme for Q divides the index into a bit b, signifying whether the set is a subset of S or a superset of S, and ⌊n/2⌋ bits (in the first case) or ⌈n/2⌉ bits (in the second case) for specifying the subset or superset. To prove the other two parts, we first solve an easier question. Suppose that µ is a non-constant dyadic distribution whose sorted order is known. We show how to find a set in Spl(µ) ∩ Q in time O(n). If µ(S) = 1/2 then S ∈ Spl(µ). If µ(S) > 1/2, go over the elements in S in non-decreasing order. According to Lemma 2.1, some prefix will sum to 1/2 exactly. If µ(S) < 1/2, we do the same with S, and then complement the result. Suppose now that π is a non-constant distribution. We can find a Huffman distribution µ for π and compute the sorted order of π in time O(n log n). The second and third part now follow as in the proof of Lemma 5.1.3. 5.3 Reduction to maximum relative density Our lower bound on the size of a dyadic hitter, proved in the following subsection, will be along the following lines. For appropriate values of n, we describe a dyadic distribution µ, all of whose splitters have a certain size i or n − i. Moreover, only a ρ fraction of sets of size i split µ. We then consider all possible permutations of µ. Each set of size i splits a ρ fraction of these, and so any dyadic hitter must contain at least 1/ρ sets. This lower bound argument prompts the definition of maximum relative density (MRD), which corresponds to the parameter ρ above; in the general case we will also need to optimize over i. We think of the MRD as a property of dyadic sets rather than dyadic distributions; indeed, the concept of MRD makes sense for any collection of subsets of Xn . If a dyadic set has MRD ρ then any dyadic hitter must contain at least 1/ρ questions, due to the argument outlined above. Conversely, using the probabilistic method we will show that roughly 1/ρmin (n) questions suffice, where ρmin (n) is the minimum MRD of a dyadic set on Xn . Definition 5.3.1 (Maximum relative density). Let D be a collection of subsets of Xn . For 0 ≤ i ≤ n, let  S ∈ D : |S| = i  . ρi (D) := n i We define the maximum relative density (MRD) of D, denoted ρ(D), as ρ(D) := max i∈{1,...,n−1} ρi (D). We define ρmin (n) to be the minimum of ρ(D) over all dyadic sets. That is, ρmin (n) is the smallest possible maximum relative density of a set of the form Spl(µ). The following theorem shows that uOpt (n, 0) is controlled by ρmin (n), up to polynomial factors. Theorem 5.3.1. Fix an integer n, and denote M := 1 ρmin (n) . Then M ≤ uOpt (n, 0) ≤ n2 log n · M. 19 Proof. Note first that according to Lemma 5.1.3, uOpt (n, 0) is equal to the minimal size of a dyadic hitter in Xn , and thus it suffices to lower- and upper-bound this size. Let σ be a uniformly random permutation on Xn . If S is any set of size i then σ −1 (S) is a uniformly random set of size i, and so ρi (D) = Pr σ∈Sym(Xn ) [σ −1 (S) ∈ D] = Pr [S ∈ σ(D)]. σ∈Sym(Xn ) (Here Sym(Xn ) is the group of permutations of Xn .) Fix a dyadic set D on Xn with ρ(D) = ρmin (n). The formula for ρi (D) implies that for any subset S of Xn (of any size), Pr σ∈Sym(Xn ) [S ∈ σ(D)] ≤ ρmin (n). Let Q be a collection of subsets of Xn with |Q| < M . A union bound shows that Pr [Q ∩ σ(D) 6= ∅] ≤ |Q|ρmin (n) < 1. σ∈Sym(Xn ) Thus, there exists a permutation σ such that Q ∩ σ(D) = ∅. Since σ(D) is also a dyadic set, this shows that Q is not a dyadic hitter. We deduce that any dyadic hitter must contain at least M questions. For the upper bound on uOpt (n, 0), construct a set of subsets Q containing, for each i ∈ {1, . . . , n − 1}, M n log n uniformly chosen sets S ⊆ Xn of size i. We show that with positive probability, Q is a dyadic hitter. Fix any dyadic set D, and let i ∈ {1, . . . , n − 1} be such that ρi (D) = ρ(D) ≥ ρmin (n). The probability that a random set of size i doesn’t belong to D is at most 1 − ρ(D) ≤ 1 − ρmin (n). Therefore the probability that Q is disjoint from D is at most (1 − ρmin (n))M n log n ≤ e−ρmin (n)M n log n = e−n log n < n−n . As we show below in Claim 5.3.2, there are at most nn non-constant dyadic distributions, and so a union bound implies that with positive probability, Q is indeed a dyadic hitter. In order to complete the proof of Theorem 5.3.1, we bound the number of non-constant dyadic distributions: Claim 5.3.2. There are at most nn non-constant dyadic distributions on Xn . Proof. Recall that dyadic distributions correspond to decision trees in which an element of probability 2−ℓ is a leaf at depth ℓ. Clearly the maximal depth of a leaf is n − 1, and so the probability of each element in a non-constant dyadic distribution is one of the n values 0, 2−1 , . . . , 2−(n−1) . The claim immediately follows. Krenn and Wagner [19] showed that the number of full-support dyadic distributions on Xn is asymptotic to αγ n−1 n!, where α ≈ 0.296 and γ ≈ 1.193, implying that the number of dyadic distributions on Xn is asymptotic to αe1/γ γ n−1 n!. Boyd [4] showed that the number of monotone full-support dyadic distributions on Xn is asymptotic to βλn , where β ≈ 0.142 and λ ≈ 1.794, implying that the number of monotone dyadic distributions on Xn is asymptotic to β(1 + λ)n . The proof of Theorem 5.3.1 made use of two properties of dyadic sets: 1. Any permutation of a dyadic set is a dyadic set. 20 2. There are en O(1) dyadic sets. If F is any collection of subsets of 2Xn satisfying the first property then the proof of Theorem 5.3.1 generalizes to show that the minimal size U of a hitting set for F satisfies M ≤ U ≤ M n log |F|, 5.4 where M = 1 minD∈F ρ(D) . Upper bounding ρmin (n) Theorem 5.3 will ultimately follow from the following lemma, by way of Theorem 5.3.1: Lemma 5.4.1. Fix 0 < β ≤ 1/2. There exists an infinite sequence of positive integers n (namely, √ 2a those of the form ⌊ 2β ⌋ for integer a) such that some dyadic set D in Xn satisfies ρ(D) ≤ O( n)2−(h(β)−2β)n . Proof. We prove the lemma under the simplifying assumption that 1/β is an integer (our most important application of the lemma has β := 1/5). Extending the argument for general β is straightforward and left to the reader. 2a , for a positive integer a. Note that for n of this form, Let n be an integer of the form 2β a−1 βn = 2 is a power of two. Let t = βn, and construct a dyadic distribution µ on Xn as follows: 1. For i ∈ [2t − 1], µ(xi ) = 2−a = 1 2t . 2. For i ∈ [n − 1] \ [2t − 1], µ(xi ) = µ(xi−1 )/2 = 2−(a+i−2t+1) . 3. µ(xn ) = µ(xn−1 ). The corresponding decision tree is obtained by taking a complete binary tree of depth a and replacing one of the leaves by a “path” of length n − 2a ; see Figure 2. Alternatively, in the terminology of Definition 5.2.4 we form µ by taking the uniform distribution on X2t and replacing x2t with a tail on x2t , . . . , xn . We claim that D := Spl(µ) contains only two types of sets: 1. Subsets of size t of X2t−1 . 2. Subsets of size n − t containing t − 1 elements of X2t−1 and all the elements x2t , . . . , xn . It is immediate that any such set S is in D. On the other hand, Lemma 5.2.5 shows that every set S ∈ D either contains the tail x2t , . . . , xn or is disjoint from it. If S is disjoint from the tail then it must be of the first form, and if S contains the tail then it must be of the second form. √ n Using the estimate βn ≥ 2h(β)n /O( n) (see for example [31]), we see that 2t−1 √ √ 22t 22t ρt (D) = ρn−t (D) = nt  ≤ n  ≤ O( n) h(β)n = O( n)2(2β−h(β))n . 2 t βn For i ∈ {1, . . . , n − 1} \ {t, n − t} we have ρi (D) = 0. Thus indeed √ ρ(D) ≤ O( n)2(2β−h(β))n . Theorem 5.3 can now be easily derived. The first step is determining the optimal value of β: Claim 5.4.2. We have max 2h(β)−2β = 1.25, β∈[0,1] and the maximum is attained (uniquely) at β = 1/5. 21 Complete binary tree on 2βn vertices Path of length (1 − 2β)n Figure 2: The hard distribution used to prove Lemma 5.4.1, in decision tree form Proof. Let f (β) = h(β) − 2β. Calculation shows that the derivative f ′ (β) is equal to   1−β ′ f (β) = log − 2, β which is decreasing for 0 < β < 1 and vanishes at β = 1/5. Thus f (β) achieves a unique maximum over β ∈ (0, 1) at β = 1/5, where 2f (1/5) = 2h(1/5)−2·1/5 = 1.25. Proof of Theorem 5.3: a 2 for a Proof. Let β := 1/5. Claim 5.4.2 shows that 2−(2β−h(β)) = 1.25. Fix any n of the form n = 2β positive integer a. It follows from Lemma 5.4.1 together with the first inequality in Theorem 5.3.1 √ that uOpt (n, 0) ≥ 1.25n /O( n). 2a for a positive integer a and 1/4 ≤ β ≤ 1/2. A general n can be written in the form n = 2β Lemma 5.4.1 and Theorem 5.3.1 show that for any integer ℓ ≥ 0, ℓ )−2β/2ℓ ]n uOpt (n, 0) ≥ 2[h(β/2 √ /O( n). Calculation shows that when β ≤ β0 ≈ 0.27052059413118146, this is maximized at ℓ = 0, and √ otherwise this is maximized at ℓ = 1. Denote the resulting lower bound by L(β)n /O( n), the minimum of L(β) is attained at β0 , at which point its value is L(β0 ) ≈ 1.23214280723432. 5.5 Lower bounding ρmin (n) We will derive Theorem 5.2 from the following lemma: 22 Lemma 5.5.1. For every non-constant dyadic distribution µ there exists 0 < β < 1 such that ρ(Spl(µ)) ≥ 2(2β−h(β))n = 2(2β−h(β))n−o(n) . √ O( n)O(log n) Proof. Assume without loss of generality that the probabilities in µ are non-increasing: µ1 ≥ µ2 ≥ · · · ≥ µn . The idea is to find a partition of Xn of the form Xn = γ [ i=1 (Di ∪ Ei ) which satisfies the following properties: 1. Di consists of elements having the same probability pi . 2. If Di has an even number of elements then Ei = ∅. 3. If Di has an odd number of elements then µ(Ei ) = pi . 4. γ = O(log n). (In fact, γ = o(n/ log n) would suffice.) We will show later how to construct such a partition. The conditions imply that µ(Di ∪ Ei ) is an even integer multiple of pi , say µ(Di ∪ Ei ) = 2ci pi . It is not hard to check that ci = ⌈|Di |/2⌉. Given such a partition, we show how to lower bound theS maximum relative density of Spl(µ). If Si ⊆ Di is a set of size ci for each i ∈ [γ] then the set S = i Si splits µ: µ(S) = γ X i=1 Defining c = is Pγ i=1 ci , i=1 we see that each such set S contains c elements, and the number of such sets  γ  Y |Di | i=1 using the estimate γ 1X 1 ci pi = µ(Di ∪ Ei ) = . 2 2 ci  γ Y 22c 22ci √ = ≥ √ O(log n) , O( n) O( n) i=1 m ⌈m/2⌉  =Θ 22⌈m/2⌉ √ m ! , which follows from Stirling’s approximation. In order to obtain an estimate on the maximum relative density of Spl(µ), we use the following n 3 folklore upper bound on c :   n ≤ 2h(c/n)n . c 3 Here is a quick proof: Let Y be a uniformly random subset of Xn of size c, and let Yi indicate the event xi ∈ Y . Then log nc = H(Y ) ≤ nH(Y1 ) = nh(c/n). 23 We conclude that the maximum relative density of Spl(µ) is at least Qγ |Di | 22c−h(c/n)n i=1 ci  . ρ(µ) ≥ ρc (µ) ≥ ≥ √ n O( n)O(log n) c To obtain the expression in the statement of the lemma, take β := c/n. We now show how to construct the partition of Xn . We first explain the idea behind the construction, and then provide full details; the reader who is interested only in the construction itself can skip ahead. Proof idea Let q1 , . . . , qγ be the different probabilities of elements in µ. We would like to put all elements of probability qi in the set Di , but there are two difficulties: 1. There might be an odd number of elements whose probability is qi . 2. There might be too many distinct probabilities, that is, γ could be too large. (We need γ = o(n/ log n) for the argument to work.) The second difficulty is easy to solve: we let D1 = {x1 }, and use Lemma 2.1 to find an index ℓ such that µ(E1 ) := µ({xℓ , . . . , xn }) = µ1 . A simple argument shows that all remaining elements have probability at least µ1 /n, and so the number of remaining distinct probabilities is O(log n). (The reader should observe the resemblance between E1 and the tail of the hard distribution constructed in Lemma 5.4.1.) Lemma 2.1 also allows us to resolve the first difficulty. The idea is as follows. Suppose that the current set under construction, Di , has an odd number of elements, each of probability qi . We use Lemma 2.1 to find a set of elements whose total probability is qi , and put them in Ei . Detailed proof Let N be the maximal index such that µN > 0. Since µ is non-constant, µ1 ≤ 1/2, and so Lemma 2.1 proves the existence of an index M such that µ({xM +1 , . . . , xN }) = µ1 (we use the furthermore part of the lemma, and M = ℓ − 1). We take D1 := {x1 }, E1 := {xM +1 , . . . , xn }. Thus µ(D1 ) = µ(E1 ) = µ1 , and so µ({x2 , . . . , xM }) = 1 − 2µ1 (possibly M = 1, in which case the construction is complete). By construction nµM > µ(E1 ) = µ1 , and so µM < µ1 /n. In particular, the number of distinct probabilities among µ2 , . . . , µM is at most log n. This will guarantee that γ ≤ log n + 1, as will be evident from the construction. The construction now proceeds in steps. At step i, we construct the sets Di and Ei , given the set of available elements {xαi , . . . , xM }, where possibly αi = M + 1; in the latter case, we have completed the construction. We will maintain the invariant that µ({xαi , . . . , xM }) is an even multiple of µαi ; initially α2 := 2, and µ({xαi , . . . , xM }) = (1/µ1 − 2)µ1 is indeed an even multiple of µ2 . Let βi be the maximal index such that µβi = µαi (possibly βi = αi ). We define Di := {xαi , . . . , xβi }. Suppose first that |Di | is even. In this case we define Ei := ∅, and αi+1 := βi + 1. Note that µ({xαi+1 , . . . , xM }) = µ({xαi , . . . , xM }) − |Di |µαi , 24 and so the invariant is maintained. Suppose next that |Di | is odd. In this case µ({xβi +1 , . . . , xM }) ≥ xαi , since µ({xβi +1 , . . . , xM }) is an odd multiple of µαi . Therefore we can use Lemma 2.1 to find an index γi such that µ({xβi +1 , . . . , xγi }) = µαi . We take Ei := {xβi +1 , . . . , xγi } and αi+1 := γi + 1. Note that µ({xαi+1 , . . . , xM }) = µ({xαi , . . . , xM }) − (|Di | + 1)µαi , and so the invariant is maintained. The construction eventually terminates, say after step γ. The construction ensures that µα2 > µα3 > · · · > µαγ . Since there are at most log n distinct probabilities among the elements {xα2 , . . . , xM }, γ ≤ log n + 1, completing the proof. Theorem 5.2 follows immediately from the second inequality in Theorem 5.3.1 together with the following lemma: Lemma 5.5.2. Fix an integer n and let D be a dyadic set in Xn . Then ρ(D) ≥ 1.25−n−o(n) , and thus ρmin (n) ≥ 1.25−n−o(n) . Proof. Fix a dyadic set D in Xn . Lemma 5.5.1 implies that there exists 0 < β < 1 such that ρ(D) ≥ 2(2β−h(β))n−o(n) . Using Claim 5.4.2 we have 22β−h(β) ≥ 54 , and so ρ(D) ≥ (4/5)n · 2−o(n) = 1.25−n−o(n) . 6 Combinatorial benchmark with prolixity In the previous section we studied the minimum size of a set Q of questions with the property that for every distribution, there is an optimal decision tree using only questions from Q. In this section we relax this requirement by allowing the cost to be slightly worse than the optimal cost. More formally, recall that uOpt (n, r) is the minimum size of a set of questions Q such that for every distribution π there exists a decision tree that uses only questions from Q with cost at most Opt(π) + r. In a sense, uOpt (n, r) is an extension of uH (n, r) for r ∈ (0, 1): indeed, uH (n, r) is not defined for r < 1 since for some distributions π there is no decision tree with cost less than H(π) + 1 (see Section 3). Moreover, Opt(π), which is the benchmark used by uOpt (n, r), is precisely the optimal cost, whereas H(π), the benchmark used by uH (n, r) is a convex surrogate of Opt(π). We focus here on the range r ∈ (0, 1). We prove the following bounds on uOpt (n, r), establishing that uOpt (n, r) ≈ (r · n)Θ(1/r) . Theorem 6.1. For all r ∈ (0, 1), and for all n > 1/r: 16 1 1 (r · n) 4r ≤ uOpt (n, r) ≤ n2 (3r · n) r . n As a corollary, we get that the threshold of exponentiality is 1/n: 25 Corollary 6.2. If r = ω(1/n) then uOpt (n, r) = 2o(n) . Conversely, if r = O(1/n) then uOpt (n, r) = 2Ω(n) . For larger r, the following theorem is a simple corollary of Theorem 4.1 and the bound uOpt (n, r) ≤ uH (n, r) ≤ uOpt (n, r − 1): Theorem 6.3. For every r ≥ 1 and n ∈ N, 1 ⌊r + 1⌋n1/⌊r+1⌋ ≤ uOpt (n, r) ≤ 2⌊r⌋n1/⌊r⌋ . e Theorem 6.1 is implied by the following lower and upper bounds, which provide better bounds when r ∈ (0, 1) is a negative power of 2. Theorem 6.4 (Lower bound). For every r of the form 1/2k , where k ≥ 1 is an integer, and n > 2k : 1 uOpt (n, r) ≥ (r · n) 2r −1 . Theorem 6.5 (Upper bound). For every r of the form 4/2k , where k ≥ 3 is an integer, and n > 2k : uOpt (n, r + r 2 ) ≤ n2 4 3e r · n r. 4 These results imply Theorem 6.1, due to the monotonicity of uOpt (n, r), as follows. Let r ∈ (0, 1). For the lower bound, pick the smallest t ≥ r of the form 1/2k . Note that t ≤ 2r, and thus: 1 1 1 1 uOpt (n, r) ≥ uOpt (n, t) ≥ (t · n) 2t −1 ≥ (r · n) 4r −1 ≥ (r · n) 4r . n For the upper bound, pick the largest t of the form 4/2k , k ≥ 3 such that t + t2 ≤ r. Note that t ≥ r/4 (since s = r/2 satisfies s + s2 ≤ 2s ≤ r), and thus uOpt (n, r) ≤ uOpt (n, t + t2 ) ≤ n2 6.1 4 16 3e t · n t ≤ n2 (3r · n) r . 4 Lower bound Pick a sufficiently small δ > 0 (as we will soon see, δ < r 2 suffices), and consider a distribution µ with 2k − 1 “heavy” elements (this many elements exist since n > 1/r), each of probability 21−δ k −1 , k and n − (2 − 1) “light” elements with total probability of δ. Recall that a decision tree is r-optimal if its cost is at most Opt(µ) + r. The proof proceeds by showing that if T is an r-optimal tree, then the first question in T has the following properties: (i) it separates the heavy elements to two sets of almost equal sizes (2k−1 and 2k−1 − 1), and (ii) it does not distinguish between the light elements.  The result then follows since there are 2kn−1 such distributions σ (the number of ways to choose  k−1 the light elements), and each question can serve as a first question to at most n−(22k−1 −1) of them. To establish these properties, we first prove a more general result (cf. Lemma 5.2.5): Lemma 6.1.1.  Let µ be a distribution over a finite set X, and let A ⊆ X be such that for every x∈ / A, µ {x} > µ(A) + ǫ. Then every decision tree T which is ǫ-optimal with respect to µ has a subtree T ′ whose set of leaves is A. 26 x x y a′ y a′′ (a) Original tree a′ a′′ (b) Transformed tree   Figure 3: The transformation in Lemma 6.1.1. The cost decreases by µ {x} − µ {a′ , a′′ } > ǫ. Proof. By induction on |A|. The case |A| = 1 follows since any leaf is a subtree. Assume |A| > 1. Let T be a decision tree which is ǫ-optimal with respect to µ. Let x, y be two siblings of maximal depth. Note that it suffices to show that x, y ∈ A, since then, merging x, y to a new element z with µ({z}) = µ({x}) + µ({y}) and applying the induction hypothesis yields that A ∪ {z} \ {x, y} is the set of leaves of a subtree of T with x, y removed. This finishes the proof since x, y are the children of z. It remains to show that x, y ∈ A. Let d denote the depth of x and y. Assume toward contradiction that x ∈ / A. Pick a′ , a′′ ∈ A, with depths d′ , d′′ (this is possible since |A| > 1). If d′ < d or ′′ d < d then replacing a′ with x or a′′ with x improves the cost of T by more than ǫ, contradicting its optimality. Therefore, it must be that d′ = d′′ = d, and we perform the following transformation (see Figure 3): the parent of x and y becomes a leaf with label x (decreasing the depth of x by 1), y takes the place of a′ (the depth of y does not change), and a′′ becomes aninternal node with two children labeled by a′ , a′′ (increasing the depths of a′ , a′′ by 1). Since µ {x} − µ {a′ , a′′ } > ǫ, this transformation improves the cost of T by more than ǫ, contradicting its ǫ-optimality. Corollary 6.1.2. Let µ be a distribution over X, and let A ⊆ X be such that for every x ∈ / A,  µ {x} > µ(A). Then every optimal tree T with respect to µ has a subtree T ′ whose set of leaves is A. Property (ii) follows from Lemma 6.1.1, which implies that if δ is sufficiently small then all light elements are clustered together as the leaves of some subtree. Indeed, by Lemma 6.1.1, this happens if the probability of a single heavy element (which is 21−δ k −1 ) exceeds the total probability of all light elements (which is δ) by at least r. A simple calculation shows that setting δ smaller than r 2 suffices. We summarize this in the following claim: Claim 6.1.3 (light elements). Every r-optimal tree has a subtree whose set of leaves is the set of light elements. The next claim concerns the other property: Claim 6.1.4 (heavy elements). In every r-optimal decision tree, the first question partitions the heavy elements into a set of size 2k−1 and a set of size 2k−1 − 1. 27 Proof. When k = 2, it suffices to prove that an r-optimal decision tree cannot have a first question which separates the heavy elements from the light elements. Indeed, the heavy elements in such a tree reside at depths 2, 3, 3. Exchanging one of the heavy elements at depth 2 with the subtree consisting of all light elements (which is at depth 1) decreases the cost by 21−δ k −1 − δ > r, showing that the tree wasn’t r-optimal. Suppose that some r-optimal decision tree T contradicts the statement of the claim, for some k ≥ 3. The first question in T leads to two subtrees T1 , T2 , one of which (say T1 ) contains at least 2k−1 + 1 heavy elements, and the other (say T2 ) contain at most 2k−1 − 2. One of the subtrees also contains a subtree T ′ whose leaves are all the light elements. For the sake of the argument, we replace the subtree T ′ with a new element y. We claim that T1 contains an internal node v at depth D(v) ≥ k − 1 which has at least two heavy descendants. To see this, first remove y if it is present in T1 , by replacing its parent by its sibling. The possibly modified tree T1′ contains at least 2k−1 + 1 leaves, and in particular some leaf at depth at least k. Its parent v has depth at least k − 1 and at least two heavy descendants, in both T1′ and T1 . In contrast, T2 contains at least two leaves (since 2k−1 − 2 ≥ 2), and the two shallowest ones must have depth at most k − 2. At least one of these is some heavy element xℓ . Exchanging v and xℓ results in a tree T ∗ whose cost c(T ∗ ) is at most c(T ∗ ) ≤ c(T ) + (D(v) − D(xℓ ))(2 − 1) 1−δ 1−δ ≤ c(T ∗ ) − k < c(T ) − r, k 2 −1 2 −1 contradicting the assumption that T is r-optimal. (That tion 21−δ k −1 > δ + r.) 1−δ 2k −1 > r follows from the earlier assump- By the above claims, there are two types of first questions for µ, depending on which of the two subtrees of the root contains the light elements: • Type 1: questions that split the elements into a part with 2k−1 elements, and a part with n − 2k−1 elements. • Type 2: questions that split the elements into a part with 2k−1 − 1 elements, and a part with n − (2k−1 − 1) elements. If we identify a question with its smaller part (i.e. the part of size 2k−1 or the part of size 2k−1 − 1), we deduce that any set of questions with redundancy r must contain a family F such that (i) every set in F has size 2k−1 or 2k−1 − 1, and (ii) for every set of size n − (2k − 1), there exists some set in F that is disjoint from it. It remains to show that any such family F is large. Indeed, there are 2kn−1 sets of size n − (2k − 1), and since every set in F has size at least k−1 −1) n−(2k−1 −1) = of them. Thus 2k−1 − 1, it is disjoint from at most n−(2 k 2k−1 n−(2 −1) |F| ≥ 6.2 n  2k −1 n−(2k−1 −1) 2k−1 = 1 n 2k−1 −1 n(n − 1) · · · (n − (2k−1 − 1) + 1) ≥ = (r · n) 2r −1 . (2k − 1)(2k − 2) · · · (2k−1 + 1) 2k Upper bound The set of questions. In order to describe the set of queries it is convenient to assign a cyclic order on Xn : x1 ≺ x2 ≺ · · · ≺ xn ≺ x1 ≺ · · · . The set of questions Q consists of all cyclic intervals, 28 with up to 2k elements added or removed. Since r = 4 · 2−k , the number of questions is plainly at most   4 2 n 2k 2 3e r , n r · n 3 ≤ n 2k 4  d using the inequality nd ≤ en . d High level of the proof. Let π be an arbitrary distribution on Xn , and let r ∈ (0, 1) be of the form 4 · 2−k , with k ≥ 3. Let µ be a Huffman distribution for π; we remind the reader that µ is a dyadic distribution corresponding to some optimal decision tree for π. We construct a decision tree T that uses only queries from Q, with cost T (π) ≤ Opt(π) + r + r 2 = X π(x) log x∈Xn 1 + r + r2. µ(x) The construction is randomized: we describe a randomized decision tree TR (‘R’ denotes the randomness that determines the tree) which uses queries from Q and has the property that for every x ∈ Xn , the expected number of queries TR uses to find x satisfies the inequality E[TR (x)] ≤ log R 1 + r + r2, µ(x) (3) where TR (x) is the depth of x. This implies the existence of a deterministic tree with cost Opt(µ) + r + r 2 : indeed, when x ∼ µ, the expected cost of TR is E [TR (x)] ≤ x∼π;R X x∈Xn   1 + r + r 2 = Opt(π) + r + r 2 . π(x) µ(x) Since the randomness of the tree is independent from the randomness of π, it follows that there is a choice of R such that the cost of the (deterministic) decision tree TR is at most Opt(π) + r + r 2 . The randomized decision tree. The randomized decision tree maintains a dyadic sub-distribution µ(i) that is being updated after each query. A dyadic sub-distribution is a measure on Xn such P (i) (i) (i) that (i) µ (x) is either 0 or a power of 2, and (ii) µ (Xn ) = x∈Xn µ (x) ≤ 1. A natural (i) interpretation of µ (x) is as a dyadic sub-estimate of the probability that x is the secret element, conditioned on the answers to the first i queries. The analysis hinges on the following properties: 1. µ(0) = µ,  2. µ(i) (x) ∈ 2µ(i−1) (x), µ(i−1) (x), 0 for all x ∈ Xn , 3. if x is the secret element then almost always µ(i) (x) is doubled; that is, µ(i) (x) > 0 for all i, and the expected number of i’s for which µ(i) (x) = µ(i−1) (x) is at most r + r 2 . These properties imply (3), which implies Theorem 6.5. Next, we describe the randomized decision tree and establish these properties. The algorithm distinguishes between light and heavy elements. An element x ∈ Xn is light if µ(i) (x) < 2−k . Otherwise it is heavy. The algorithm is based on the following win-win-win situation: (i) If the total mass of the heavy elements is at least 1/2 then by Lemma 2.1, there is a set I of heavy elements whose mass is exactly 1/2. Since the number of heavy elements is at most 2k , 29 the algorithm can ask whether x ∈ I and recurse by doubling the sub-probabilities of the elements that are consistent with the answer (and setting the others to zero). (ii) Otherwise, the mass of the heavy elements is less than 1/2. If the mass of the light elements is also less than 1/2 (this could happen since µ(i) is a sub-distribution), then we ask whether x is a heavy element or a light element, and accordingly recurse with either the heavy or the light elements, with their sub-probabilities doubled (in this case the “true” probabilities conditioned on the answers become larger than the sub-probabilities). (iii) The final case is when the mass of the light elements is larger than 1/2. In this case we query a random cyclic interval of light elements of mass ≈ 1/2, and recurse; there are two light elements in the recursion whose sub-probability is not doubled (the probabilities of the rest are doubled). Elements whose probability is not doubled occur only in case (iii). The randomized decision tree: formal description. The algorithm gets as input a subset y1 , . . . , ym of Xn whose order is induced by that of Xn , and a dyadic sub-distribution q1 , . . . , qm . Initially, the input is x1 , . . . , xn , and qi = µi . We say that an element is heavy is qi ≥ 2−k ; otherwise it is light. There are at most 2k heavy elements. The questions asked by the algorithm are cyclic intervals in y1 , . . . , ym , with some heavy elements added or removed. Since each cyclic interval in y1 , . . . , ym corresponds to a (not necessarily unique) cyclic interval in Xn (possibly including elements outside of y1 , . . . , ym ), these questions belong to Q. Algorithm TR . 1. If m = 1, return y1 . Otherwise, continue to Step 2. 2. If the total mass of heavy elements is at least 1/2 then find (using Lemma 2.1) a subset I whose mass is exactly 1/2, and ask whether x ∈ I. Recurse with either {2qi : yi ∈ I} or {2qi : yi ∈ / I}, according to the answer. Otherwise, continue to Step 3. 3. Let S be the set of all light elements, and let σ be their total mass. If σ ≤ 1/2 then ask whether x ∈ S, and recurse with either {2qi : yi ∈ S} or {2qi : yi ∈ / S}, according to the answer. Otherwise, continue to Step 4. 4. Arrange all light elements according to their cyclic order on a circle of circumference σ, by assigning each light element xi an arc Ai of length qi of the circle. Pick an arc of length 1/2 uniformly at random (e.g. by picking uniformly a point on the circle and taking an arc of length 1/2 directed clockwise from it), which we call the window. Let K ⊆ S consist of all light elements whose midpoints are contained in the window, and let B consist of the light elements whose arcs are cut by the boundary of the window (so |B| ≤ 2); we call these elements boundary elements. Ask whether x ∈ K; note that K is a cyclic interval in y1 , . . . , ym with some heavy elements removed. If x ∈ K, recurse with {2qi : yi ∈ K \ B} ∪ {qi : yi ∈ K ∩ B}. The sum of these dyadic probabilities is at most 1 since the window contains at least qi /2 of the arc Ai for each yi ∈ K ∩ B. If x ∈ / K, recurse with {2qi : yi ∈ K \ B} ∪ {qi : yi ∈ K ∩ B}. As in the preceding case, the total mass of light elements in the recursion is at most 2(σ − 1/2) (since the complement of the window contains at least qi /2 of the arc Ai for each yi ∈ K ∩ B), and the total mass of heavy elements is 2(1 − σ), for a total of at most (2σ − 1) + (2 − 2σ) = 1. ⊳ 30 Analysis. We now finish the proof by establishing the three properties of the randomized decision tree that are stated above. The first two properties follow immediately from the description of the algorithm, and it thus remains to establish the third property. Fix some x ∈ Xn , and let d ∈ N be such that µ(x) = 2−d . We need to show that the expected number of questions that are asked when the secret element is x is at most d + r + r 2 . Let q = q (i) denote the sub-probability of x after the i’th question; note that q ∈ {2−j : j ≤ d}. Lemma 6.2.1. If q ≥ 2−k then q doubles (that is, q (i+1) = 2q (i) ). Otherwise, the expected number 1 . of questions until q doubles is at most 1−4q Proof. From the description of the algorithm, it is clear that the only case in which the subprobability of x is not doubled is when x is one of the two boundary elements in Step 4. This only happens when x is a light element (i.e. q < 2−k ). The probability that x is one of the boundary elements is at most 2q/σ ≤ 4q, where σ ≥ 1/2 is the total mass of light elements: indeed, the probability that a given endpoint of the window lies inside the arc corresponding to q is q/σ, since each endpoint is distributed uniformly on the circle of circumference σ. It follows that the distribution of the number of questions that pass until q doubles is dominated by the geometric distribution with failure probability 4q, and so the expected number of questions 1 . until q doubles is at most 1−4q The desired bound on the expected number of questions needed to find x follows from Lemma 6.2.1: as long as q, the sub-probability associated with x, is smaller than 2−k , it takes an expected number 1 questions until it doubles. Once q ≥ 2−k , it doubles after every question. Thus, by linearity of 1−4q of expectation, the expected total number of questions is at most: k+ d X j=k+1 d X 1 [1 + 4 · 2−j + 2(4 · 2−j )2 ] <k+ 1 − 4 · 2−j j=k+1 =d+ d X [4 · 2−j + 2(4 · 2−j )2 ] j=k+1 2 < d + 4 · 2−k + (4 · 2−k )2 3 1 < log + r + r2. µ(x) 7 Open questions Our work suggests many open questions, some of which are: 1. The main results of Section 5 show that when n = 5 · 2m , uOpt (n, 0) = 1.25n±o(n) . We conjecture that there exists a function G : [1, 2] → R such that for n = α2m , uOpt (n, 0) = G(α)n±o(n) . Our results show that 1.232 ≤ G(α) ≤ 1.25 and that G(1.25) = 1.25. What is the function G? 2. Theorem 5.2 constructs an optimal set of questions of size 1.25n+o(n) , but this set is not explicit. √ n In contrast, Theorem 5.5 constructs explicitly an optimal set of questions of size O( 2 ), which furthermore supports efficient indexing and efficient construction of optimal strategies. Can we construct such an explicit set of optimal size 1.25n+o(n) ? 31 3. The results of Section 3 show that n ≤ uH (n, 1) ≤ 2n − 3. We conjecture that the limit H exists. What is the value of β? β = limn→∞ u (n,1) n An interesting suggestion for future research is to generalize the entire theory to d-way questions. References [1] Rudolf Ahlswede and Ingo Wegener. Search problems. John Wiley & Sons, Inc., New York, 1987. [2] Javad A. Aslam and Aditi Dhagat. Searching in the presence of linearly bounded errors. In Proceedings of the twenty-third annual ACM symposium on Theory of computing (STOC ’91), pages 486–493, 1991. [3] Harout Aydinian, Ferdinando Cicalese, and Christian Deppe, editors. Information Theory, Combinatorics, and Search Theory. Springer-Verlag Berlin Heidelberg, 2013. [4] David W. Boyd. The asymptotic number of solutions of a diophantine equation from coding theory. Journal of Combinatorial Theory, Series A, 18:210–215, 1975. [5] Renato M. Capocelli, Raffaele Giancarlo, and Indeer Jeet Taneja. Bounds on the redundancy of Huffman codes. IEEE Transactions on Information Theory, IT-32(6):854–857, 1986. [6] Gérard Cohen, Hugues Randriam, and Gilles Zémor. Witness sets. In Coding Theory and Applications (ICMCTA 2008), volume 5228 of LNCS. Springer, 2008. [7] Thomas M. Cover and Joy A. Thomas. Elements of information theory (2. ed.). Wiley, 2006. [8] Yuval Dagan. Twenty questions game using restricted sets of questions. Master’s thesis, 2017. [9] Aditi Dhagat, Peter Gács, and Peter Winkler. On playing “twenty questions” with a liar. In Proceedings of 3rd Symposium on Discrete Algorithms (SODA’92), pages 16–22, 1992. [10] Robert Dorfman. The detection of defective members of large populations. The Annals of Mathematical Statistics, 14(4):436–440, 1943. [11] Ding-Zhu Du and Frank K. Hwang. Combinatorial Group Testing and Its Applications, volume 12 of Series on Applied Mathematics. World Scientific, 2nd edition, 1999. [12] Michael L. Fredman. How good is the information theory bound in sorting? Computer Science, 1(4):355–361, 1976. Theoretical [13] Robert G. Gallager. Variations on a theme by Huffman. IEEE Transactions on Information Theory, IT-24(6):668–674, 1978. [14] E. N. Gilbert and E. F. Moore. Variable-length binary encodings. Bell System Technical Journal, 38:933–967, 1959. [15] Yasuichi Horibe. An improved bound for weight-balanced tree. Information and Control, 34(2):148–151, 1977. [16] David A. Huffman. A method for the construction of minimum-redundancy codes. In Proceedings of the I.R.E., pages 1098–1103, 1952. 32 [17] Ottar Johnsen. On the redundancy of binary Huffman codes. IEEE Transactions on Information Theory, IT-26(2):220–222, 1980. [18] Gyula O. H. Katona. Combinatorial search problems. In J. N. Srivastava et al., editor, A Survery of Combinatorial Theory. North-Holland Publishing Company, 1973. [19] Daniel Krenn and Stephan Wagner. Compositions into powers of b: asymptotic enumeration and parameters. Algorithmica, 75(4):606–631, August 2016. [20] Zbigniew Lonc and Ivan Rival. Chains, antichains, and fibres. Journal of Combinatorial Theory, Series A, 44:207–228, 1987. [21] Dietrich Manstetten. Tight bounds on the redundancy of Huffman codes. IEEE Transactions on Information Theory, IT-38(1):144–151, 1992. [22] Roy Meshulam. On families of faces in discrete cubes. Graphs and Combinatorics, 8:287–289, 1992. [23] Soheil Mohajer, Payam Pakzad, and Ali Kakhbod. Tight bounds on the redundancy of Huffman codes. In Information Theory Workshop (ITW ’06), pages 131–135, 2006. [24] Bruce L. Montgomery and Julia Abrahams. On the redundancy of optimal binary prefixcondition codes for finite and infinite sources. IEEE Transactions on Information Theory, IT-33(1):156–160, 1987. [25] Shay Moran and Amir Yehudayoff. A note on average-case sorting. Order, 33(1):23–28, 2016. [26] Narao Nakatsu. Bounds on the redundancy of binary alphabetical codes. IEEE Transactions on Information Theory, IT-37(4):1225–1229, 1991. [27] Jorma Rissanen. Bounds for weight balanced trees. IBM Journal of Research and Development, 17:101–105, 1973. [28] Ronald L. Rivest, Albert R. Meyer, Daniel J. Kleitman, Karl Winklmann, and Joel Spencer. Coping with errors in binary search procedures. Journal of Computer and System Sciences, 20:396–404, 1980. [29] Joel Spencer and Peter Winkler. Three thresholds for a liar. Combinatorics, Probability and Computing, 1(1):81–93, 1992. [30] David Spuler. Optimal search trees using two-way key comparisons. Acta Informatica, 31:729– 740, 1994. [31] Neal Young. Reverse Chernoff bound. Theoretical Computer Science Stack Exchange, 2012. URL:http://cstheory.stackexchange.com/q/14476 (version: 2012-11-26). 33
8cs.DS
arXiv:1801.08267v1 [cs.CV] 25 Jan 2018 Visual Weather Temperature Prediction Wei-Ta Chu National Chung Cheng University Kai-Chia Ho National Chung Cheng University [email protected] [email protected] Ali Borji Center for Research in Computer Vision, University of Central Florida [email protected] Abstract In this paper, we attempt to employ convolutional recurrent neural networks for weather temperature estimation using only image data. We study ambient temperature estimation based on deep neural networks in two scenarios a) estimating temperature of a single outdoor image, and b) predicting temperature of the last image in an image sequence. In the first scenario, visual features are extracted by a convolutional neural network trained on a large-scale image dataset. We demonstrate that promising performance can be obtained, and analyze how volume of training data influences performance. In the second scenario, we consider the temporal evolution of visual appearance, and construct a recurrent neural network to predict the temperature of the last image in a given image sequence. We obtain better prediction accuracy compared to the state-of-the-art models. Further, we investigate how performance varies when information is extracted from different scene regions, and when images are captured in different daytime hours. Our approach further reinforces the idea of using only visual information for cost efficient weather prediction in the future. 1. Introduction Visual attributes of images have been heavily studied for years. Most previous works have been focused on recognizing “explicit visual attributes” in images, such as object’s texture and color distributions [4], and semantic categories [10]. With the advance of computer vision and machine learning technologies, more and more works have been proposed to study discovering “subtle attributes” in images. These subtle attributes may not be well-formulated in explicit forms, but are usually recognizable by human beings. For example, Lu et al. [13] proposed a method to recognize whether an image was cap- tured on a sunny day or on a cloudy day. Hays and Efros [6] proposed to estimate geographic information from a single image (a.k.a IM2GPS). Recent research has demonstrated that deep learning approaches are effective for recognizing painting styles [11][2]. Among various subtle attributes, weather properties of images have attracted increasing attention. The earliest investigation of the relationship between vision and weather conditions dates back to early 2000s [16]. Thanks to the development of more advanced visual analysis and deep learning methods, a new wave of works studying the correlation between visual appearance and ambient temperature or other weather properties has recently emerged [5][20]. Inspired by these works, here we mainly focus on ambient temperature prediction from a single image or a sequence of images. We will investigate different deep learning approaches and demonstrate that the state-of-the-art performance can be obtained. Given an outdoor image, we aim to estimate ambient temperature based on visual information extracted from the image. We consider two application scenarios. The first one regards estimating the temperature of any given image regardless of temporal changes in the weather. In this case, only visual information extracted from the image is used. The second scenario is when several images of the same location over time are available and the goal is to “forecast” the temperature in the near future. In the first scenario, we extract visual features using a convolutional neural network (CNN), followed by a regression layer outputting the estimated temperature. In the second scenario, we also extract features using CNNs, but further consider temporal evolution by recruiting a long-short term memory (LSTM) network, which outputs the the estimated temperature of the last image in the given image sequence. Our contributions in this work are as follows. • We introduce a CNN-based approach to do temperature prediction for a single image and achieve promis- Figure 1. Sample scene images from the SkyFinder dataset [15], all captured at 11 am. ing prediction performance. • We introduce a recurrent neural network (RNN) to forecast temperature of the last image in a given image sequence. To the best of our knowledge, this is the first deep model considering temporal evolution of appearance for temperature prediction. We show that our RNN-based model outperforms existing approaches. • We provide a comprehensive analysis of images captured in different scenes. Interesting discussions are provided on the basis of various experimental settings and their corresponding results. 2. Related Works As a pioneering work studying visual manifestations of different weather conditions, Narasimhan and Nayar [16] firstly discussed the relationship between visual appearance and weather conditions. Since then several works have been proposed to target the weather type classification task (i.e., for weather types such as sunny, cloudy, foggy, snowy, and rainy). Roser and Moosmann [17] analyzed the images captured by the camera mounted on vehicles, and constructed an SVM classifier to categorize images into clear, light rain, and heavy rain weather conditions. In [13], five weather features including sky, shadow, reflection, contrast, and haze were extracted, and a collaborative learning framework was proposed to classify images into sunny or cloudy. In [3], a random forest classifier was proposed to integrate various types of visual features and classify images into one of five weather conditions including sunny, cloudy, snowy, rainy, or foggy. In addition to weather condition classification, more weather properties have also been investigated. Jacobs and his colleagues [9] initiated a project for collecting outdoor scene images captured by static webcams over a long period of time. The collected images form the Archive of Many Outdoor Scene (AMOS) dataset [9]. Based on the AMOS dataset, they proposed that webcams installed across the earth can be viewed as image sensors and can enable us to understand weather patterns and variations over time [8]. More specifically, they adopted principal component analysis and canonical correlation analysis to predict wind velocity and vapor pressure from a sequence of images. Recently, Laffont et al. [12] estimated scene attributes like lighting, weather conditions, and seasons for images captured by webcams based on a set of regressors. Glasner et al. [5] studied the correlation between pixel intensity/camera motion and temperature and found a moderate correlation. With this observation, a regression model considering pixel intensity was constructed to predict temperature. Following the discussion in [5], Volokitin et al. [19] showed that, with appropriate fine tuning, deep features can be promising for temperature prediction. Zhou et al. [20] proposed a selective comparison learning scheme and showed that the state-of-the-art temperature prediction performance can be obtained by a CNN-based approach. In this work, we aim at predicting temperature from a single image, as well as forecasting the temperature of the last image in a given image sequence. Deep learning approaches will be developed to consider temporal evolution of visual appearance, and promising performance will be shown. Compared with [5], [19], and [20], we particularly advocate the importance of modeling temporal evolution with designed deep networks. 3. Data Collection and Processing 3.1. Datasets Two tasks are considered in this work. One is predicting temperature from a single image, and another is predicting the temperature of the last image in an image sequence. These two tasks are proceeded based on two datasets. For the first task, the SkyFinder dataset [15] consisting of a large scale webcam images annotated with sky regions is adopted. This dataset contains roughly 90,000 labeled outdoor images captured by 53 cameras in a wide range of weather and illumination conditions. By filtering out unlinked data and data without temperature information, we finally retain images captured by 44 cameras in the experiments. Currently, for each camera, only the images captured around 11am on each day are selected. Such selection decreases sunlight variations due to capturing at different time instants on a day. Finally, we are left with 35,417 images in total. We denote this image set as Dataset 1 in what follows. Fig. 1 shows five sample images from this set. For the second task, the scene images mentioned in the Glasner dataset [5] are used as the seed. The Glasner dataset consists of images continuously captured by 10 cameras in 10 different environments for two consecutive years. Figure 2 shows snapshots of 3 environments (3 for each). These cameras are in fact a small subset of the AMOS dataset [9], classes, represented as a 70D vector. Each dimension in this vector corresponds to a specific degree. That is, the first dimension encodes −20◦ C, the second dimension encodes −19◦ C, and so on. Given an image, we attempt to classify it into one of the 70 classes. We utilize two ways to encode class labels as follows. • One-hot encoding: Only the dimension representing the correct temperature is set to 1, and other dimensions are set to 0. For example, the 70D label vector y = (0, 0, 1, 0, ..., 0) denotes that the corresponding image has temperature of −18◦ C. • Local distribution encoding (LDE): Motivated by [1], for the image with temperature corresponding to the ith dimension, we set the value tj of the jth dimension of the label vector by a Gaussian distribution tj = Figure 2. Sample scenes from Dataset 2. First two rows correspond to the same environments in different seasons (Jan. & Aug.). and from each of these ten cameras, the Glasner dataset only contains one image captured closest to 11am local time on each day. To build the proposed model, we need more data for training and testing. Therefore, according to the camera IDs mentioned in the Glasner dataset, we collect the entire set of its corresponding images from the AMOS dataset. In addition, according to the geographical information and the timestamp associated with each image, we obtain the temperature of each image from the cli-MATE website1 . Overall, we collect 53,378 images from 9 cameras2 in total. We denote this dataset as Dataset 2 in what follows. The first two rows of Fig. 2 shows two different image sequences from the same scene in Dataset 2. The first row shows images captured on Jan. 12, Jan. 13, and Jan. 14, while the second row shows images captured on Aug. 14, Aug. 15, and Aug. 16. We see that visual appearance of images captured at the same scene may drastically vary due to climate changes. In addition, we clearly observe the temporal continuity of images captured on consecutive days. The third and fourth rows of Fig. 2 show two more image sequences captured at different scenes. 3.2. Label Encoding Regardless of the temperature prediction task (i.e., for a single image or an image sequence), we formulate temperature estimation as a classification problem. We divide the considered temperature range (−20◦ C to 49◦ C) into 70 1 http://mrcc.isws.illinois.edu/CLIMATE/ 2 One camera’s information is incorrect, and we could not successfully collect the corresponding temperature values (j − i)2 1 √ exp( ). 2σ 2 σ 2π (1) We will compare two encoding schemes in the evaluation section. 4. Proposed Methods This section presents details of the proposed models for temperature prediction. We are interested in predicting the temperature for a given still image as well as predicting the temperature of a location from temperature data of the same location at the same time on previous days (i.e., next day prediction). 4.1. Temperature Estimation from a Single Image To estimate ambient temperature of a given outdoor image, we construct a convolutional neural network (CNN) trained from scratch based on the SkyFinder dataset. Table 1 shows detailed configurations of our CNN architecture. There are totally 4 convolutional layers, followed by 4 fully-connected layers. The model’s output is a 70D vector indicating the probabilities of different temperatures (i.e., classes). To train the model, the activation function of each layer is ReLU, the loss function is cross entropy, the optimization algorithm is Adam, and learning rate is 0.001. Different batch sizes are tested to achieve the best performance for different experimental settings. 80% of the SkyFinder dataset is used for training, and the remaining 20% is used for testing. We do not use a validation set and train the network for 90 epochs. 4.2. Temperature Estimation from a Sequence of Images Given an image sequence I1 , I2 , ..., In captured at the same scene, and assuming that the corresponding temperature values of the first n − 1 images, i.e., t1 , t2 , ..., tn−1 Table 1. Detailed configurations of the convolutional neural network. Conv2D(32, 3, 3) Conv2D(64, 3, 3) Dense(512) Dense(70) Conv2D(32, 3, 3) MaxPooling2D(2, 2) Conv2D(64, 3, 3) MaxPooling2D(2, 2) Flatten Dropout(0.5) Softmax Dropout(0.25) Dropout(0.25) 5. Empirical Evaluation 5.1. Implementation Details Figure 3. Structure of the proposed LSTM network for temperature prediction. are available, we would like to predict the temperature tn of the image In . In addition to the visual information of In , temporal evolution of the visual appearance of I1 to In−1 may provide information regarding future temperatures. Therefore, we construct a long-short term memory network (LSTM) [7] to successively propagate visual information over time to predict temperature. Fig. 3 shows the model structure. Each image in the sequence is first fed to a CNN to extract visual features. This CNN has the same structure as mentioned in in Sec. 4.1, without the last softmax layer. The extracted feature vector of the image Ii is then fed to an LSTM layer, which not only processes the current input, but also considers the information propagated from the intermediate result for the image Ii−1 . Similarly, the intermediate result for the image Ii will be sent to the LSTM layer for processing the image Ii+1 . The output of the LSTM layer would be input to an embedding layer that transforms the input vector into a 70D vector y i indicating the probabilities of different temperatures. To train the RNN, the loss function is defined as the mean square error between the ground truth and the predicted vector. That is, n X L= ky i − ti k2 . (2) i=1 Fig. 3 shows that information is only propagated from I1 to In . In addition to this forward propagation scheme, we also try to construct a bi-directional LSTM model to consider both forward propagation and backward propagation. Detailed performance comparison will be shown later. To estimate ambient temperature of a single image, the CNN model mentioned in Sec. 4.1 is constructed based on 80% of the images in Dataset 1, while the remaining 20% of the images are used for testing. We repeat this process five times with the five-fold cross validation scheme, and report the average estimation error. In this task, the standard deviation σ mentioned in the LDE scheme is empirically set as 3.5. More details for predicting the temperature of the last image of an image sequence are provided as follows. For a (t) (t) (t) camera, let I08 , I09 , ..., I17 denote the images with timestamps closest to 8am, 9am, ..., 17pm, on day t. To train the RNN mentioned in Sec. 4.2, we select a sequence consisting of n images that were captured around the same time (t) (t+1) (t+n−1) on n consecutive days, like (I08 , I08 , ..., I08 ) and (t) (t+1) (t+n−1) (I15 , I15 , ..., I15 ). We always keep images captured closest to 11am as the testing data, and exclude them in the training data set. The training image sequences collected from all cameras are put together to be the generic training dataset, and the (generic) RNN is trained based on it. In this task, the standard deviation σ mentioned in the LDE scheme is empirically set as 4. (t) (t+1) (t+n−1) Given a test image sequence (I11 , I11 , ..., I11 ), assuming that we have known the temperature values of (t) (t+1) (t+n−2) (I11 , I11 , ..., I11 ), we would like to predict the (t+n−1) temperature values of I11 . In our experiments, we found that the best performance can be obtained when n is set as three. That is, given the images captured on day t and day t + 1, we predict the temperature of the image captured on day t + 2. 5.2. Performance of Temperature Estimation for Single Images Similar to [5], [19], and [20], we evaluate the prediction performance based on the root mean squared error, RMSE, between the estimated temperature and the ground truth. The dataset used in [5], [19], and [20] is relatively small, i.e., images captured by ten cameras, and from each day Table 2. Root mean square errors when different percentages of data in Dataset 1 used during training. Avg. RMSE 20% 5.34 40% 4.86 60% 4.55 80% 4.28 Table 3. Temperature estimation errors, in terms of RMSE, for each of the 9 scenes in the Glasner dataset. Method ↓ \ Scene → Local Regression [5] LR Temporal Win. [5] Global Ridge Reg. [5] CNN [5] Fine-tuned VGG-16 [19] Selective Comparison Learning [20] Our CNN (LDE) Our CNN (one hot) (a) 6.85 7.52 18.16 8.55 7.79 6.26 4.38 6.28 (b) 7.24 6.86 5.74 5.59 4.87 4.57 3.79 5.48 (c) 6.03 5.82 35.02 5.96 5.03 4.92 4.34 5.78 only one image is selected. This may impede the development of a robust model. For example, in [5], the authors report that the CNN-based approach does not work very well, but in [19], the authors show that more promising performance can be obtained by appropriately fine-tuning a pretrained CNN model, i.e., VGG-16 [18]. Volume of training data. In this evaluation, we first focus on studying how the volume of training data influences temperature estimation performance, based on a larger-scale dataset, i.e., Dataset 1. We train 4 CNN models on 20%, 40%, 60%, and 80% of the data in Dataset 1, respectively, and use the same remaining 20% of data for testing. As shown in Table 2, unsurprisingly more training data yield better performance. Performance comparison. To fairly compare our CNN model with existing works, we train the proposed CNN model on the Glasner dataset. Note that volume of the Glasner dataset is smaller than Dataset 1. Table 3 shows comprehensive performance comparison, where ten cameras in the Glasner dataset are referred to as scenes (a)-(j). We find that results of [19] are superior to [5], which demonstrates fine-tuning a deep model yields performance gain. Comparing our CNN (with the LDE scheme) with [19], our CNN is much simpler than VGG-16 and achieves even better results. The performance gain might be due to the LDE scheme, which may provide more flexibility to model temperature fluctuation. To verify this, we show performance obtained by our CNN model with the one-hot encoding scheme in the last row of Table 3. By comparing the last two rows, we clearly see the benefits brought by the LDE scheme. Performance of the work in [20] remains the best. A two-stream network was proposed to take an image pair captured at the same place and on the same day as input. Each network stream extracts features from one image, and estimates the temperature of each image. To train this two-stream network, in addition to the softmax losses given by each stream, a ranking loss representing the temperature difference between two images is jointly considered. Our CNN model with LDE fares on par with [20] but is much simpler. Further, the idea of ranking loss can be integrated in our model to make performance gain in the future. (d) 4.53 4.23 11.37 6.17 4.45 3.80 4.60 6.69 (e) 5.77 5.39 43.51 7.30 4.22 3.98 4.47 6.36 (f) 3.19 2.77 3.84 2.90 3.14 2.53 5.83 7.69 (g) 7.63 7.35 5.54 8.48 6.61 5.20 5.36 6.78 (h) 5.09 5.22 13.86 4.88 4.72 3.95 3.73 6.02 (i) 3.68 3.67 3.41 2.93 2.70 2.48 2.81 3.25 (j) 7.77 7.85 8.91 7.12 6.01 5.81 6.47 7.54 Avg. 5.78 5.67 14.94 5.99 4.96 4.35 4.58 6.19 Table 4. Root mean square errors when different lengths of image sequences are used. Avg. RMSE n=2 2.97 n=3 2.82 n=4 2.95 n=5 2.87 n=6 2.86 n=7 2.98 5.3. Performance of Temperature Estimation for Image Sequences Length of the image sequence. We first evaluate estimation performance when different lengths of image sequences are used for training and testing, and show the average RMSEs in Table 4. As can be seen, the best estimation performance can be obtained when n is set as 3. That is, we estimate the temperature of the day t + 2 based on day t + 1 and day t. This result is not surprising because this setting appropriately considers information of previous days, and prevents blunt updates when too many days are considered. Therefore, we set n = 3 in the subsequent experiments. Performance comparison. Table 5 shows performance of the proposed single LSTM and bidirectional LSTM, and compares performance with the state of the art methods. Previously only the frequency decomposition method proposed in [5] takes temporal evolution into account. Note that the data used in [5] are from the Glasner dataset. Our LSTM models are trained and tested on Dataset 2 that is also from the Glasner dataset but includes much more images to capture temporal evolution. We discarded scene (d) as its data have errors in the geographical information and we could not access corresponding temperature information. As can be seen from Table 5, excluding camera (d), the RNN-based approach achieves better performance over eight of the nine scenes3 . The proposed RNN-based approach outperforms the state of the art. The frequency decomposition method attempts to model the temporal evolution of the entire year, while we consider local temporal evolution and achieve much better performance. The structure shown in Fig. 3 shows that the LSTM model works based on features extracted by the CNN de3 The average RMSE of the frequency decomposition method is calculated based on ten scenes, while that of our LSTM-based methods is calculated based on nine scenes. Table 5. Temperature estimation errors (in terms of RMSE) for each scene in the Glasner dataset. Method ↓ \ Scene → Freq. Decom. [5] Our single LSTM Our bidirectional LSTM Handcrafted + our bi-LSTM (a) 5.05 6.01 7.09 10.84 (b) 6.15 2.32 2.54 6.60 (c) 4.61 2.53 2.49 11.79 signed like Table 1. To demonstrate the influence of the CNN, we replace the CNN features by a handcrafted feature, say Gabor wavelet texture feature [14], and train a bidirectional LSTM based on it. The performance obtained based on the handcrafted features is shown in the last row of Table 5. The average RMSE is 8.93, which is much higher than 2.80 and evidently demonstrates the effectiveness of CNN features. Overall, Table 5 shows that temporal evolution of visual appearance provides rich information in estimating ambient temperature, and yields substantially better estimation performance. To our knowledge, this result is the first work considering temporal evolution by a deep neural network to do ambient temperature estimation. Sky only vs. ground only. The results shown in Table 5 are obtained when visual information is extracted from the entire image. Intuitively, one may think that the sky region provides more information in estimating weather properties. This is why the works [13] and [3] extracted cloud features from the sky region to do weather condition classification. On the other hand, the first two rows of Fig. 2 show that ground appearance sometimes provides important clues regarding temperature, e.g., whenever there is snow on the ground, it is colder. To quantify the influences of sky and ground regions on temperature estimation, first we manually segment the sky region for each scene. Then, the minimum bounding box of the sky region is fed to the proposed bidirectional LSTM model to obtain the performance yielded by sky-only information. We also feed the minimum bounding box of the ground region to obtain corresponding performance. Fig. 4 shows samples of one scene, where the top row shows the original scene image and the corresponding sky mask, and the bottom row shows the minimum bounding boxes of the sky region and the ground region, respectively. Notice that because the sky region is irregular, the minimum bounding box may include parts of the ground, and vice versa. Table 6 shows performance variations when visual information is extracted from different regions of the images in image sequences. Comparing the performance yielded by sky only with ground only, we found that in fact the ground region provides more information for temperature estimation. Visual variations in the sky region may just represent texture of cloud and intensity, and provide relatively fewer clues for estimating temperature. According to this exper- (d) 4.10 – – – (e) 5.27 2.26 1.93 8.91 (f) 2.51 2.46 2.61 11.71 (g) 4.51 2.93 2.36 7.93 (h) 4.50 2.04 1.89 9.47 (i) 2.81 1.62 1.57 3.50 (j) 5.16 3.02 2.93 9.58 Avg. 4.47 2.80 2.82 8.93 Figure 4. Top row: one sample scene image (left), and the corresponding mask of the sky region (right). Bottom row: the minimum bounding box of the sky region (left), and the minimum bounding box of the ground region (right). Table 6. Root mean square errors when visual information is extracted from different regions. Avg. RMSE Sky only 3.42 Ground only 2.93 Entire Image 2.82 iment, we see that the best performance can be obtained when the entire image is considered. This conforms to the setting of previous works [5] and [20]. Variations of different daytime hours. As mentioned in Sec. 5.1, only the image sequences captured at 11am are tested to obtain performance shown above. The main reason to use such setting is to align the settings of [5] and [20] to make a fair comparison. Besides, we are interested in whether image sequences captured in different daytime hours would yield performance variations. To show this, we respectively use image sequences at h as the testing data, and the remaining is used for training. The hour h is from 8am to 17pm. Fig. 5 shows variations of average RMSEs for image sequences captured in different daytime hours. Interestingly, the variation is significant when images captured in different daytime hours are processed. The best performance is obtained for images captured at 11 pm, which conforms to the selection of [5] and [20]. On the other hand, estimation errors at 8pm and 17am are much larger than others. This may be because the sunlight is maximal around the noon, and more robust visual information can be extracted. Sample predictions. Fig. 6 shows ground truth temperatures (red curve) and the estimated temperatures (blue curve) of images captured at 11am by the camera (f) mentioned in Table 5 over two years (Jan. 2013 to Dec. 2014). Figure 5. Variations of average RMSEs for image sequences captured in different daytime hours. Basically, we see that two curves correlate well with each other, conforming to the promising performance shown in Table 5. We also clearly observe the trend of climate change, i.e., higher temperature in July and August, and lower temperature in January and February. Fig. 7 and Fig. 8 show “successful estimation cases” and “failure estimation cases”, respectively. Looking only at one image may not allow us to figure out why temperature of some images are easier to estimate, and some are not. After a deeper inspection, we found that usually the failure cases occur when the temperature values of consecutive days fluctuate significantly. This is expectable. We also found some ground truths are obviously incorrect, e.g., a snowy scene has the truth temperature of 42◦ C. These errors need to be fixed manually in the future to elaborate more robust performance evaluation. It is interesting to know what visual clues are more important in temperature prediction. To get some insights for this issue, we take all images captured closest to 11am by a camera, and divide each image into non-overlapping 5 × 5 block. Based on pixels’ RGB colors in blocks corresponding to the same position, e.g., the ith block in images captured on the first day, the second day, and so on, we calculate the standard deviations of R, G, and B, and then average these three standard deviations as a value ρ. The value ρ is then normalized into the range from 0 to 255 by ρ − minρ ρ̂ = × 255, where maxρ and minρ are the maxρ − minρ maximum ρ’s and minimum ρ’s of all blocks. Finally, we visualize the value ρ̂ of each block. A block with a larger ρ̂ value indicates higher color variations on different days, and probably conveys more information in predicting temperature. Fig. 9 shows the visualization results corresponding to the scenes shown in Fig. 7. We see that, for the first scene, blocks on tree leaves are more salient, and may be more informative in temperature prediction. For the second scene, blocks on some parts of building facades are more salient. Figure 6. Ground truth temperatures and the estimated temperatures of images captured at 11am by the camera (f) over two years. Figure 7. Sample images of “successful cases”. For the left image, the truth temperature is 19◦ C, and the proposed bidirectional LSTM model estimates it as 19◦ C. For the right image, the truth temperature and the estimated one are 10◦ C and 11◦ C, respectively. Figure 8. Samples image of “failure cases”. For the left image, the truth temperature and the estimated one are 21◦ C and 38◦ C, respectively. For the right image, the truth temperature and the estimated one are 13◦ C and 21◦ C, respectively. Figure 9. Saliency maps showing the importance of different pixels on temperature prediction. These results are similar to the discussion mentioned in [5], and could be interesting clues for future studies. 6. Conclusion and Discussion In this work, we present deep models to estimate ambient temperature of a single image or the last image in an image sequence. For the first task, we verify that the CNNbased approach is promising, and when more training data is available better performance can be obtained. For the second task, we consider temporal evolution of visual appearance, and propose an RNN-based approach to “forecast” the temperature of the last image. State-of-the-art performance can be obtained by the proposed method. We also discuss how performance varies when information is just extracted from the sky region or from the ground region, and how performance varies when images captured in different daytime hours are processed. In the future, more weather properties like humidity and wind speed may be estimated by the proposed methods. Furthermore, we can investigate which region in a scene provides more clues in temperature estimation, based on the currently emerged attention networks. Exploring the relationship between weather properties and vision would be interesting in a wide range of works and applications. Acknowledgement This work was partially supported by the Ministry of Science and Technology of Taiwan under the grant MOST 1052628-E-194-001-MY2 and MOST 106-3114-E-002-009. References [1] G. Antipov, M. Baccouche, S.-A. Berrania, and J.-L. Dugelay. Effective training of convolutional neural networks for face-based gender and age prediction. Pattern Recognition, 72:15–26, 2017. [2] W.-T. Chu and Y.-L. Wu. Deep correlation features for image style classification. In Proceedings of ACM International Conference on Multimedia, pages 402–406, 2016. [3] W.-T. Chu, X.-Y. Zheng, and D.-S. Ding. Camera as weather sensor: Estimating weather information from single images. Journal of Visual Communication and Image Representation, 46:233–249, 2017. [4] V. Ferrari and A. Zisserman. Learning visual attributes. In Proceedings of Advances in Neural Information Processing Systems, pages 433–440, 2007. [5] D. Glasner, P. Fua, T. Zickler, and L. Zelnik-Manor. Hot or not: Exploring correlations between appearance and temperature. In Proceedings of IEEE International Conference on Computer Vision, 2015. [6] J. Hays and A.Efros. Im2gps: Estimating geographic information from a single image. In Proceedings of IEEE International Conference on Computer Vision and Patten Recognition, 2008. [7] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Computation, 9(8):1735–1780, 1997. [8] N. Jacobs, W. Burgin, R. Speyer, D. Ross, and R. Pless. Adventures in archiving and using three years of webcam images. In Proceedings of IEEE CVPR Workshop on Internet Vision, pages 39–46, 2009. [9] N. Jacobs, N. Roman, and R. Pless. Consistent temporal variations in many outdoor scenes. In Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, 2007. [10] D. Jayaraman, F. Sha, and K. Grauman. Decorrelating semantic visual attributes by resisting the urge to share. In Proceedings of IEEE International Conference on Computer Vision and Patten Recognition, 2014. [11] S. Karayev, M. Trentacoste, H. Han, A. Agarwala, T. Darrell, A. Hertzmann, and H. Winnemoeller. Recognizing image style. In Proceedings of British Machine Vision Conference, 2014. [12] P. Laffont, Z. Ren, X. Tao, C. Qian, and J. Hays. Transient attributes for high-level understanding and editing of outdoor scenes. ACM Transactions on Graphics (Proceedings of SIGGRAPH 2014), 33(4), 2014. [13] C. Lu, D. Lin, J. Jia, and C.-K. Tang. Two-class weather classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 39(12):2510–2524, 2017. [14] B. Manjunath and W. Ma. Texture features for browsing and retrieval of image data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 18(8):837–842, 1996. [15] R. P. Mihail, S. Workman, Z. Bessinger, and N. Jacobs. Sky segmentation in the wild: An empirical study. In Proceedings of IEEE Winter Conference on Applications of Computer Vision, pages 1–6, 2016. [16] S. Narasimhan and S. Nayar. Vision and atmosphere. International Journal of Computer Vision, 48(3):233–354, 2002. [17] M. Roser and F. Moosmann. Classification of weather situations on single color images. In Proceedings of IEEE Intelligent Vehicles Symposium, pages 798–803, 2008. [18] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. In arXiv preprint arXiv:1409.1556, 2014. [19] A. Volokitin, R. Timofte, and L. Van Gool. Deep features or not: Temperature and time prediction in outdoor scenes. In Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition Workshop, pages 63– 71, 2016. [20] H.-Y. Zhou, B.-B. Gao, and J. Wu. Sunrise or sunset: Selective comparison learning for subtle attribute recognition. In Proceedings of British Machine Vision Conference, 2017.
1cs.CV
Higher-Order Program Verification via HFL Model Checking arXiv:1710.08614v2 [cs.PL] 28 Feb 2018 Naoki Kobayashi, Takeshi Tsukada, and Keiichi Watanabe The University of Tokyo Abstract. There are two kinds of higher-order extensions of model checking: HORS model checking and HFL model checking. Whilst the former has been applied to automated verification of higher-order functional programs, applications of the latter have not been well studied. In the present paper, we show that various verification problems for functional programs, including may/must-reachability, trace properties, and linear-time temporal properties (and their negations), can be naturally reduced to (extended) HFL model checking. The reductions yield a sound and complete logical characterization of those program properties. Compared with the previous approaches based on HORS model checking, our approach provides a more uniform, streamlined method for higher-order program verification.1 1 Introduction There are two kinds of higher-order extensions of model checking in the literature: HORS model checking [18, 34] and HFL model checking [46]. The former is concerned about whether the tree generated by a given higher-order tree grammar called a higher-order recursion scheme (HORS) satisfies the property expressed by a given modal µ-calculus formula (or a tree automaton), and the latter is concerned about whether a given finite state system satisfies the property expressed by a given formula of higher-order modal fixpoint logic (HFL), a higher-order extension of the modal µ-calculus. Whilst HORS model checking has been applied to automated verification of higher-order functional programs [19, 20, 25, 28, 35, 45, 47], there have been few studies on applications of HFL model checking to program/system verification. Despite that HFL has been introduced more than 10 years ago, we are only aware of applications to assume-guarantee reasoning [46] and process equivalence checking [30]. In the present paper, we show that various verification problems for higherorder functional programs can actually be reduced to (extended) HFL model checking in a rather natural manner. We briefly explain the idea of our reduction below.2 We translate a program to an HFL formula that says “the program has a valid behavior” (where the validity of a behavior depends on each verification 1 2 A shorter version of this article is published in Proceedings of ESOP 2018. In this section, we use only a fragment of HFL that can be expressed in the modal µ-calculus. Some familiarity with the modal µ-calculus [27] would help. problem). Thus, a program is actually mapped to a property, and a program property is mapped to a system to be verified; this has been partially inspired by the recent work of Kobayashi et al. [21], where HORS model checking problems have been translated to HFL model checking problems by switching the roles of models and properties. For example, consider a simple program fragment read(x); close(x) that reads and then closes a file (pointer) x. The transition system in Figure 1 shows a valid access protocol to read-only files. Then, the property that a read operation is allowed in the current state can be expressed by a formula of the form hreadiϕ, which says that the current state has a read-transition, after which ϕ is satisfied. Thus, the program read(x); close(x) being valid is expressed as hreadihcloseitrue,3 which is indeed satisfied by the initial state q0 of the transition system in Figure 1. Here, we have just replaced the operations read and close of the program with the corresponding modal operators hreadi and hclosei. We can also naturally deal with branches and recursions. For example, consider the program close(x)(read(x); close(x)), where e1 e2 represents a non-deterministic choice between e1 and e2 . Then the property that the program always accesses x in a valid manner can be expressed by (hcloseitrue) ∧ (hreadihcloseitrue). Note that we have just replaced the non-deterministic branch with the logical conjunction, as we wish here to require that the program’s behavior is valid in both branches. We can also deal with conditional branches if HFL is extended with predicates; if b then close(x) else (read(x); close(x)) can be translated to (b ⇒ hcloseitrue) ∧ (¬b ⇒ hreadihcloseitrue). Let us also consider the recursive function f defined by: f x = close(x)(read(x); read(x); f x), Then, the program f x being valid can be represented by using a (greatest) fixpoint formula: νF.(hcloseitrue) ∧ (hreadihreadiF). If the state q0 satisfies this formula (which is indeed the case), then we know that all the file accesses made by f x are valid. So far, we have used only the modal µ-calculus formulas. If we wish to express the validity of higher-order programs, we need HFL formulas; such examples are given later. We generalize the above idea and formalize reductions from various classes of verification problems for simply-typed higher-order functional programs with recursion, integers and non-determinism – including verification of may/must-reachability, trace properties, and linear-time temporal properties (and their negations) – to (extended) HFL model checking where HFL is extended with integer predicates, and prove soundness and completeness of the reductions. Extended HFL model checking problems obtained by the reductions are (necessarily) undecidable in general, but for finite-data programs (i.e., 3 Here, for the sake of simplicity, we assume that we are interested in the usage of the single file pointer x, so that the name x can be ignored in HFL formulas; usage of multiple files can be tracked by using the technique of [19]. 2 read ?>=< 89:; q0 t close ?>=< q1 4 89:; Fig. 1. File access protocol programs that consist of only functions and data from finite data domains such as Booleans), the reductions yield pure HFL model checking problems, which are decidable [46]. Our reductions provide sound and complete logical characterizations of a wide range of program properties mentioned above. Nice properties of the logical characterizations include: (i) (like verification conditions for Hoare triples,) once the logical characterization is obtained as an HFL formula, purely logical reasoning can be used to prove or disprove it (without further referring to the program semantics); for that purpose, one may use theorem provers with various degrees of automation, ranging from interactive ones like Coq, semiautomated ones requiring some annotations, to fully automated ones (though the latter two are yet to be implemented), (ii) (unlike the standard verification condition generation for Hoare triples using invariant annotations) the logical characterization can automatically be computed, without any annotations,4 (iii) standard logical reasoning can be applied based on the semantics of formulas; for example, co-induction and induction can be used for proving ν- and µ-formulas respectively, and (iv) thanks to the completeness, the set of program properties characterizable by HFL formula is closed under negations; for example, from a formula characterizing may-reachability, one can obtain a formula characterizing non-reachability by just taking the De Morgan dual. Compared with previous approaches based on HORS model checking [20, 25, 28, 35, 41], our approach based on (extended) HFL model checking provides more uniform, streamlined methods for higher-order program verification. HORS model checking provides sound and complete verification methods for finite-data programs [19, 20], but for infinite-data programs, other techniques such as predicate abstraction [25] and program transformation [29, 33] had to be combined to obtain sound (but incomplete) reductions to HORS model checking. Furthermore, the techniques were different for each of program properties, such as reachability [25], termination [29], non-termination [28], fair termination [33], and fair non-termination [47]. In contrast, our reductions are sound and complete even for infinite-data programs. Although the obtained HFL model checking problems are undecidable in general, the reductions allow us to treat various program properties uniformly; all the verifications are boiled down to the issue of how to prove µ- and ν-formulas (and as remarked above, we can 4 This does not mean that invariant discovery is unnecessary; invariant discovery is just postponed to the later phase of discharging verification conditions, so that it can be uniformly performed among various verification problems. 3 use induction and co-induction to deal with them). Technically, our reduction to HFL model checking may actually be considered an extension of HORS model checking in the following sense. HORS model checking algorithms [23, 34] usually consist of two phases, one for computing a kind of higher-order “procedure summaries” in the form of variable profiles [34] or intersection types [23], and the other for nested least/greatest fixpoint computations. Our reduction from program verification to extended HFL model checking (the reduction given in Section 7, in particular) can be regarded as an extension of the first phase to deal with infinite data domains, where the problem for the second phase is expressed in the form of extended HFL model checking: see Appendix H for more details. The rest of this paper is structured as follows. Section 2 introduces HFL extended with integer predicates and defines the HFL model checking problem. Section 3 informally demonstrates some examples of reductions from program verification problems to HFL model checking. Section 4 introduces a functional language used to formally discuss the reductions in later sections. Sections 5, 6, and 7 consider may/must-reachability, trace properties, and temporal properties respectively, and present (sound and complete) reductions from verification of those properties to HFL model checking. Section 8 discusses related work, and Section 9 concludes the paper. Proofs are found in Appendices. 2 (Extended) HFL In this section, we introduce an extension of higher-order modal fixpoint logic (HFL) [46] with integer predicates (which we call HFLZ ; we often drop the subscript and just write HFL, as in Section 1), and define the HFLZ model checking problem. The set of integers can actually be replaced by another infinite set X of data (like the set of natural numbers or the set of finite trees) to yield HFLX . 2.1 Syntax For a map f , we write dom( f ) and codom( f ) for the domain and codomain of f respectively. We write Z for the set of integers, ranged over by the meta-variable n below. We assume a set Pred of primitive predicates on integers, ranged over by p. We write arity(p) for the arity of p. We assume that Pred contains standard integer predicates such as = and <, and also assume that, for each predicate p ∈ Pred, there also exists a predicate ¬p ∈ Pred such that, for any integers n1 , . . . , nk , p(n1 , . . . , nk ) holds if and only if ¬p(n1 , . . . , nk ) does not hold; thus, ¬p(n1 , . . . , nk ) should be parsed as (¬p)(n1, . . . , nk ), but can semantically be interpreted as ¬(p(n1 , . . . , nk )). The syntax of HFLZ formulas is given by: ϕ (formulas) ::= n | ϕ1 op ϕ2 | true | false | p(ϕ1 , . . . , ϕk ) | ϕ1 ∨ ϕ2 | ϕ1 ∧ ϕ2 | X | haiϕ | [a]ϕ | µXτ .ϕ | νXτ .ϕ | λX : σ.ϕ | ϕ1 ϕ2 τ (types) ::= • | σ → τ σ (extended types) ::= τ | int 4 Here, op ranges over a set of binary operations on integers, such as +, and X ranges over a denumerable set of variables. We have extended the original HFL [46] with integer expressions (n and ϕ1 op ϕ2 ), and atomic formulas p(ϕ1 , . . . , ϕk ) on integers (here, the arguments of integer operations or predicates will be restricted to integer expressions by the type system introduced below). Following [21], we have omitted negations, as any formula can be transformed to an equivalent negation-free formula [32]. We explain the meaning of each formula informally; the formal semantics is given in Section 2.2. Like modal µ-calculus [11, 27], each formula expresses a property of a labeled transition system. The first line of the syntax of formulas consists of the standard constructs of predicate logics. On the second line, as in the standard modal µ-calculus, haiϕ means that there exists an a-labeled transition to a state that satisfies ϕ. The formula [a]ϕ means that after any a-labeled transition, ϕ is satisfied. The formulas µXτ .ϕ and νXτ .ϕ represent the least and greatest fixpoints respectively (the least and greatest X that X = ϕ) respectively; unlike the modal µ-calculus, X may range over not only propositional variables but also higher-order predicate variables (of type τ). The λ-abstractions λX : σ.ϕ and applications ϕ1 ϕ2 are used to manipulate higher-order predicates. We often omit type annotations in µXτ .ϕ, νXτ .ϕ and λX : σ.ϕ, and just write µX.ϕ, νX.ϕ and λX.ϕ. Example 1. Consider ϕab ϕ where ϕab = µX•→• .λY : •.Y ∨ hai(X(hbiY)). We can expand the formula as follows: ϕab ϕ = (λY. • .Y ∨ hai(ϕab(hbiY)))ϕ = ϕ ∨ hai(ϕab(hbiϕ)) = ϕ ∨ hai(hbiϕ ∨ hai(ϕab(hbihbiϕ))) = · · · , and obtain ϕ ∨ (haihbiϕ) ∨ (haihaihbihbiϕ) ∨ · · ·. Thus, the formula means that there is a transition sequence of the form an bn for some n ≥ 0 that leads to a state satisfying ϕ. Following [21], we exclude out unmeaningful formulas such as (haitrue) + 1 by using a simple type system.5 The types •, int, and σ → τ describe propositions, integers, and (monotonic) functions from σ to τ, respectively. Note that the integer type int may occur only in an argument position; this restriction is required to ensure that least and greatest fixpoints are well-defined. The typing rules for formulas are given in Figure 2. In the figure, ∆ denotes a type environment, which is a finite map from variables to (extended) types. Below we consider only well-typed formulas, i.e., formulas ϕ such that ∆ ⊢H ϕ : τ for some ∆ and τ. 2.2 Semantics and HFLZ Model Checking We now define the formal semantics of HFLZ formulas. A labeled transition system (LTS) is a quadruple L = (U, A, −→, sinit), where U is a finite set of states, A is a 5 The original type system of [46] was more complex due to the presence of negations. 5 ∆ ⊢H n : int ∆ ⊢H ϕi : int for each i ∈ {1, 2} ∆ ⊢H ϕ1 op ϕ2 : int (HT-Int) ∆ ⊢H ϕi : • for each i ∈ {1, 2} (HT-Op) ∆ ⊢ H ϕ1 ∧ ϕ2 : • ∆ ⊢H ϕ : • ∆ ⊢H haiϕ : • ∆ ⊢H ϕ : • (HT-True) ∆ ⊢H true : • ∆ ⊢H [a]ϕ : • ∆, X : τ ⊢H ϕ : τ (HT-False) ∆ ⊢H false : • arity(p) = k ∆ ⊢H ϕi : int for each i ∈ {1, . . . , k} ∆ ⊢H µXτ . ϕ : τ ∆, X : τ ⊢H ϕ : τ ∆ ⊢H p(ϕ1 , . . . , ϕk ) : • ∆ ⊢H νXτ . ϕ : τ ∆, X : σ ⊢H ϕ : τ ∆, X : σ ⊢H X : σ ∆ ⊢H ϕi : • for each i ∈ {1, 2} (HT-Pred) (HT-Var) ∆ ⊢H λX : σ. ϕ : σ → τ ∆ ⊢ H ϕ1 : σ → τ ∆ ⊢ H ϕ2 : σ (HT-Or) ∆ ⊢ H ϕ1 ∨ ϕ2 : • ∆ ⊢ H ϕ1 ϕ2 : τ (HT-And) (HT-Some) (HT-All) (HT-Mu) (HT-Nu) (HT-Abs) (HT-App) Fig. 2. Typing Rules for HFLZ Formulas finite set of actions, −→ ⊆ U × A× U is a labeled transition relation, and sinit ∈ U a is the initial state. We write s1 −→ s2 when (s1 , a, s2 ) ∈ −→. For an LTS L = (U, A, −→, sinit) and an extended type σ, we define the partially ordered set (DL,σ , ⊑L,σ) inductively by: DL,• = 2U ⊑L,• =⊆ DL,int = Z ⊑L,int= {(n, n) | n ∈ Z} DL,σ→τ = { f ∈ DL,σ → DL,τ | ∀x, y.(x ⊑L,σ y ⇒ f x ⊑L,τ f y)} ⊑L,σ→τ = {( f, g) | ∀x ∈ DL,σ . f (x) ⊑L,τ g(x)} Note that (DL,τ , ⊑L,τ ) forms a complete lattice (but (DL,int, ⊑L,int) does not). We write ⊥L,τ and ⊤L,τ for the least and greatest elements of DL,τ (which are λe x.∅ and λe x.U) respectively. We sometimes omit the subscript L below. Let ~∆L be the set of functions (called valuations) that maps X to an element of DL,σ for each X : σ ∈ ∆. For an HFL formula ϕ such that ∆ ⊢H ϕ : σ, we define ~∆ ⊢H ϕ : σL as a map from ~∆L to Dσ , by induction on the derivation6 of ∆ ⊢H ϕ : σ, as follows. ~∆ ⊢H n : intL (ρ) = n ~∆ ⊢H true : •L (ρ) = U ~∆ ⊢H false : •L (ρ) = ∅ ~∆ ⊢H ϕ1 op ϕ2 : intL (ρ) = (~∆ ⊢H ϕ1 : intL (ρ))~op(~∆ ⊢H ϕ2 : intL (ρ)) ~∆ ⊢H p(ϕ1 , . . . , ϕk ) : •L (ρ) = ( U if (~∆ ⊢H ϕ1 : intL (ρ), . . . , ~∆ ⊢H ϕk : intL (ρ)) ∈ ~p ∅ otherwise ~∆, X : σ ⊢H X : σL (ρ) = ρ(X) ~∆ ⊢H ϕ1 ∨ ϕ2 : •L (ρ) = ~∆ ⊢H ϕ1 : •L (ρ) ∪ ~∆ ⊢H ϕ2 : •L (ρ) ~∆ ⊢H ϕ1 ∧ ϕ2 : •L (ρ) = ~∆ ⊢H ϕ1 : •L (ρ) ∩ ~∆ ⊢H ϕ2 : •L (ρ) 6 Note that the derivation of each judgment ∆ ⊢H ϕ : σ is unique if there is any. 6 a ~∆ ⊢H haiϕ : •L (ρ) = {s | ∃s′ ∈ ~∆ ⊢H ϕ : •L (ρ). s −→ s′ } a ~∆ ⊢H [a]ϕ : •L (ρ) = {s | ∀s′ ∈ U. (s −→ s′ implies s′ ∈ ~∆ ⊢H ϕ : •L (ρ))} ~∆ ⊢H µXτ .ϕ : τL (ρ) = lfpL,τ (~∆ ⊢H λX : τ. ϕ : τ → τL (ρ)) ~∆ ⊢H νXτ .ϕ : τL (ρ) = gfpL,τ (~∆ ⊢H λX : τ. ϕ : τ → τL (ρ)) ~∆ ⊢H λX : σ. ϕ : σ → τL (ρ) = {(v, ~∆, X : σ ⊢H ϕ : τL (ρ[X 7→ v])) | v ∈ DL,σ } ~∆ ⊢H ϕ1 ϕ2 : τL (ρ) = ~∆ ⊢H ϕ1 : σ → τL (ρ)(~∆ ⊢H ϕ2 : σL (ρ)) Here, ~op denotes the binary function on integers represented by op and ~p denotes the k-ary relation on integers represented by p. The least/greatest fixpoint operators lfpL,τ and gfpL,τ are defined by: F  lfpL,τ ( f ) = L,τ {x ∈ DL,τ | f (x) ⊑L,τ x} gfpL,τ ( f ) = L,τ {x ∈ DL,τ | x ⊑L,τ f (x)} F  Here, L,τ and L,τ respectively denote the least upper bound and the greatest lower bound with respect to ⊑L,τ . We often omit the subscript L and write ~∆ ⊢H ϕ : σ for ~∆ ⊢H ϕ : σL . For a closed formula, i.e., a formula well-typed under the empty type environment ∅, we often write ~ϕL or just ~ϕ for ~∅ ⊢H ϕ : σL (∅). Example 2. For the LTS Lfile in Figure 1, we have: ~νX• .(hcloseitrue ∧ hreadiX) = gfpL,• (λx ∈ DL,• .~X : • ⊢ hcloseitrue ∧ hreadiX : •({X 7→ x})) = {q0 }. In fact, x = {q0 } ∈ DL,• satisfies the equation: ~X : • ⊢ hcloseitrue ∧ hreadiX : •L ({X 7→ x}) = x, and x = {q0 } ∈ DL,• is the greatest such element. Consider the LTS L1 in Figure 3 and ϕab (hcitrue) where ϕab is the one introduced in Example 1. Then, ~ϕab (hcitrue)L1 = {q0 , q2 }. Consider the formula ϕ2 = ϕeven (hcitrue) 0, where ϕeven is: νX•→• .λY : •.λZ : int.(even(Z) ∧ Y) ∨ hai(X (hbiY) (Z + 1)). Here, even ∈ Pred is a unary predicate on integers such that even(n) if and only if n is even. Then, ϕ2 denotes the set of states from which there is a transition sequence of the form a2n b2n to a state where a c-labeled transition is possible. Thus, ~ϕ2 L1 = {q2 }. 89:; ?>=< q0 a * 89:; ?>=< b q1 j q2 c Fig. 3. LTS L1 7 * ?>=< 89:; Definition 1 (HFLZ model checking). For a closed formula ϕ of type •, we write L, s |= ϕ if s ∈ ~ϕL , and write L |= ϕ if sinit ∈ ~ϕL . HFLZ model checking is the problem of, given L and ϕ, deciding whether L |= ϕ holds. The HFLZ model checking problem is undecidable, due to the presence of integers; in fact, the semantic domain DL,σ is not finite for σ that contains int. The undecidability is obtained as a corollary of the soundness and completeness of the reduction from the may-reachability problem to HFL model checking discussed in Section 5. For the fragment of pure HFL (i.e., HFLZ without integers, which we write HFL∅ below), the model checking problem is decidable [46]. ? The order of an HFLZ model checking problem L |= ϕ is the highest order of types of subformulas of ϕ, where the order of a type is defined by: order(•) = order(int) = 0 and order(σ → τ) = max(order(σ)+1, order(τ)). The complexity of order-k HFL∅ model checking is k-EXPTIME complete [1], but polynomial time in the size of HFL formulas under the assumption that the other parameters (the size of LTS and the largest size of types used in formulas) are fixed [21]. Remark 1. Though we do not have quantifiers on integers as primitives, we can encode them using fixpoint operators. Given a formula ϕ : int → •, we can express ∃x:int.ϕ(x) and ∀x:int.ϕ(x) by (µXint→• .λx:int.ϕ(x)∨X(x−1)∨X(x+1))0 and (νXint→• .λx : int.ϕ(x) ∧ X(x − 1) ∧ X(x + 1))0 respectively. 2.3 HES As in [21], we often write an HFLZ formula as a sequence of fixpoint equations, called a hierarchical equation system (HES). Definition 2. An (extended) hierarchical equation system (HES) is a pair (E, ϕ) where E is a sequence of fixpoint equations, of the form: X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn . Here, αi ∈ {µ, ν}. We assume that X1 : τ1 , . . . , Xn : τn ⊢H ϕi : τi holds for each i ∈ {1, . . . , n}, and that ϕ1 , . . . , ϕn , ϕ do not contain any fixpoint operators. The HES Φ = (E, ϕ) represents the HFLZ formula toHFL(E, ϕ) defined inductively by: toHFL(ǫ, ϕ) = ϕ toHFL(E; Xτ =α ϕ′ , ϕ) = toHFL([αXτ .ϕ′ /X]E, [αXτ .ϕ′ /X]ϕ) Conversely, every HFLZ formula can be easily converted to an equivalent HES. In the rest of the paper, we often represent an HFLZ formula in the form of HES, and just call it an HFLZ formula. We write ~Φ for ~toHFL(Φ). An HES (X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn , ϕ) can be normalized to (X0τ0 =ν ϕ; X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn , X0 ) where τ0 is the type of ϕ. Thus, we sometimes call just a sequence of equations X0τ0 =ν ϕ; X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn an HES, with the understanding that “the main formula” is the first variable X0 . Also, we often write Xτ x1 · · · xk =α ϕ for the equation Xτ =α λx1 . · · · λxk .ϕ. We often omit type annotations and just write X =α ϕ for Xτ =α ϕ. 8 Example 3. The formula ϕ2 = ϕab (hcitrue) in Example 2 is expressed as the following HES:   X =µ λY : •.Y ∨ hai(X(hbiY)), X (hcitrue) . The formula νX.µY.hbiX ∨ haiY (which means that the current state has a transition sequence of the form (a∗ b)ω ) is expressed as the following HES:   (X =ν Y; Y =µ hbiX ∨ haiY), X .   Note that the order of the equations matters. (Y =µ hbiX ∨ haiY); X =ν Y, X represents the HFLZ formula νX.µY.hbiνX.Y ∨ haiY ≡ µY.hbiY ∨ haiY, which is equivalent to false. 3 Warming Up To help readers get more familiar with HFLZ and the idea of reductions, we give here some variations of the examples of verification of file-accessing programs in Section 1, which are instances of the “resource usage verification problem” [16]. General reductions will be discussed in Sections 5–7, after the target language is set up in Section 4. Consider the following OCaml-like program, which uses exceptions. let readex x = read x; (if * then () else raise Eof) in let rec f x = readex x; f x in let d = open_in "foo" in try f d with Eof -> close d Here, * represents a non-deterministic boolean value. The function readex reads the file pointer x, and then non-deterministically raises an end-of-file (Eof) exception. The main expression (on the third line) first opens file “foo”, calls f to read the file repeatedly, and closes the file upon an end-of-file exception. Suppose, as in the example of Section 1, we wish to verify that the file “foo” is accessed following the protocol in Figure 1. First, we can remove exceptions by representing an exception handler as a special continuation [6]: let readex x h k = read x; (if * then k() else h()) in let rec f x h k = readex x h (fun _ -> f x h k) in let d = open_in "foo" in f d (fun _ -> close d) (fun _ -> ()) Here, we have added to each function two parameters h and k, which represent an exception handler and a (normal) continuation respectively. Let Φ be (E, F true (λr.hcloseitrue) (λr.true)) where E is: Readex x h k =ν hreadi(k true ∧ h true); F x h k =ν Readex x h (λr.F x h k). 9 Here, we have just replaced read/close operations with the modal operators hreadi and hclosei, non-deterministic choice with a logical conjunction, and the unit value ( ) with true. Then, Lfile |= Φ if and only if the program performs only valid accesses to the file (e.g., it does not access the file after a close operation), where Lfile is the LTS shown in Figure 1. The correctness of the reduction can be informally understood by observing that there is a close correspondence between reductions of the program and those of the HFL formula above, and when the program reaches a read command read x, the corresponding formula is of the form hreadi · · ·, meaning that the read operation is valid in the current state; a similar condition holds also for close operations. We will present a general translation and prove its correctness in Section 6. Let us consider another example, which uses integers: let rec f y x k = if y=0 then (close x; k()) else (read x; f (y-1) x k) in let d = open_in "foo" in f n d (fun _ -> ()) Here, n is an integer constant. The function f reads x y times, and then calls the continuation k. Let L′file be the LTS obtained by adding to Lfile a new state q2 and end the transition q1 −→ q2 (which intuitively means that a program is allowed to terminate in the state q1 ), and let Φ′ be (E′ , F n true (λr.henditrue)) where E′ is: F y x k =µ (y = 0 ⇒ hclosei(k true)) ∧ (y , 0 ⇒ hreadi(F (y − 1) x k)). Here, p(ϕ1 , . . . , ϕk ) ⇒ ϕ is an abbreviation of ¬p(ϕ1 , . . . , ϕk ) ∨ ϕ. Then, L′file |= Φ′ if and only if (i) the program performs only valid accesses to the file, (ii) it eventually terminates, and (iii) the file is closed when the program terminates. Notice the use of µ instead of ν above; by using µ, we can express liveness properties. The property L′file |= Φ′ indeed holds for n ≥ 0, but not for n < 0. In fact, F n x k is equivalent to false for n < 0, and hreadin hclosei(k true) for n ≥ 0. 4 Target Language This section sets up, as the target of program verification, a call-by-name7 higherorder functional language extended with events. The language is essentially the same as the one used by Watanabe et al. [47] for discussing fair non-termination. 4.1 Syntax and Typing We assume a finite set Ev of names called events, ranged over by a, and a denumerable set of variables, ranged over by x, y, . . .. Events are used to express temporal properties of programs. We write e x (e t, resp.) for a sequence of variables (terms, resp.), and write |e x| for the length of the sequence. 7 Call-by-value programs can be handled by applying the CPS transformation before applying the reductions to HFL model checking. 10 x1 = A program is a pair (D, t) consisting of a set D of function definitions { f1 e xn = tn } and a term t. The set of terms, ranged over by t, is defined by: t1 , . . . , fn e t ::= ( ) | x | n | t1 op t2 | event a; t | if p(t′1 , . . . , t′k ) then t1 else t2 | t1 t2 | t1 t2 . Here, n and p range over the sets of integers and integer predicates as in HFL formulas. The expression event a; t raises an event a, and then evaluates t. Events are used to encode program properties of interest. For example, an assertion assert(b) can be expressed as if b then ( ) else (event fail; Ω), where fail is an event that expresses an assertion failure and Ω is a non-terminating term. If program termination is of interest, one can insert “event end” to every termination point and check whether an end event occurs. The expression t1 t2 evaluates t1 or t2 in a non-deterministic manner; it can be used to model, e.g., unknown inputs from an environment. We use the meta-variable P for programs. When xn = tn }, we write funs(P) for { f1 , . . . , fn } x1 = t1 , . . . , fn e P = (D, t) with D = { f1 e (i.e., the set of function names defined in P). Using λ-abstractions, we sometimes write f = λe x.t for the function definition f e x = t. We also regard D as a map from function names to terms, and write dom(D) for { f1 , . . . , fn } and D( fi ) for λe xi .ti . Any program (D, t) can be normalized to (D ∪ {main = t}, main) where main is a name for the “main” function. We sometimes write just D for a program (D, main), with the understanding that D contains a definition of main. We restrict the syntax of expressions using a type system. The set of simple types, ranged over by κ, is defined by: κ ::= ⋆ | η → κ η ::= κ | int. The types ⋆, int, and η → κ describe the unit value, integers, and functions from η to κ respectively. Note that int is allowed to occur only in argument positions. We defer typing rules to Appendix A, as they are standard, except that we require that the righthand side of each function definition must have type ⋆; this restriction, as well as the restriction that int occurs only in argument positions, does not lose generality, as those conditions can be ensured by applying CPS transformation. We consider below only well-typed programs. 4.2 Operational Semantics ℓ We define the labeled transition relation t −→D t′ , where ℓ is either ǫ or an event name, as the least relation closed under the rules in Figure 4. We implicitly assume that the program (D, t) is well-typed, and this assumption is maintained throughout reductions by the standard type preservation property (which we omit to prove). In the rules for if-expressions, ~t′i  represents the integer value denoted by t′i ; note that the well-typedness of (D, t) guarantees that t′i must be arithmetic expressions consisting of integers and integer operations; thus, ~t′i  is well defined. We often omit the subscript D when it is clear from the context. 11 |e x| = |e t| fe x=u∈D a ǫ (~t′1 , . . . , ~t′k ) ∈ ~p ǫ fe t −→D [e t/e x]u event a; t −→D t if p(t′1 , . . . , t′k ) then t1 else t2 −→D t1 (~t′1 , . . . , ~t′k ) < ~p i ∈ {1, 2} ǫ ǫ if p(t′1 , . . . , t′k ) then t1 else t2 −→D t2 t1 t2 −→D ti Fig. 4. Labeled Transition Semantics ℓ1 ···ℓk ℓ1 ℓk We write t −→ ∗D t′ if t −→D · · · −→D t′ . Here, ǫ is treated as an empty sequence; ab a ǫ ǫ b thus, for example, we write t −→∗D t′ if t −→D −→D −→D −→D t′ . For a program P = (D, t0), we define the set Traces(P)(⊆ Ev∗ ∪ Evω ) of traces by: ℓi Traces(D, t0 ) = {ℓ0 · · · ℓn−1 ∈ ({ǫ} ∪ Ev)∗ | ∀i ∈ {0, . . . , n − 1}.ti −→D ti+1 } ℓi ∪{ℓ0 ℓ1 · · · ∈ ({ǫ} ∪ Ev)ω | ∀i ∈ ω.ti −→D ti+1 }. Note that since the label ǫ is regarded as an empty sequence, ℓ0 ℓ1 ℓ2 = aa if ℓ0 = ℓ2 = a and ℓ1 = ǫ, and an element of ({ǫ} ∪ Ev)ω is regarded as that of Ev∗ ∪ Evω . We write FinTraces(P) and InfTraces(P) for Traces(P) ∩ Ev∗ and Traces(P) ∩ Evω respectively. The set of full traces FullTraces(D, t0)(⊆ Ev∗ ∪ Evω ) is defined as: ℓi {ℓ0 · · · ℓn−1 ∈ ({ǫ} ∪ Ev)∗ | tn = ( ) ∧ ∀i ∈ {0, . . . , n − 1}.ti −→D ti+1 } ℓi ∪{ℓ0 ℓ1 · · · ∈ ({ǫ} ∪ Ev)ω | ∀i ∈ ω.ti −→D ti+1 }. Example 4. The last example in Section 1 is modeled as Pfile = (D, f ( )), where D = { f x = (event close; ( ))(event read; event read; f x)}. We have: Traces(P) = {readn | n ≥ 0} ∪ {read2n close | n ≥ 0} ∪ {readω } FinTraces(P) = {readn | n ≥ 0} ∪ {read2n close | n ≥ 0} InfTraces(P) = {readω } FullTraces(P) = {read2n close | n ≥ 0} ∪ {readω }. 5 May/Must-Reachability Verification Here we consider the following problems: – May-reachability: “Given a program P and an event a, may P raise a?” – Must-reachability: “Given a program P and an event a, must P raise a?” Since we are interested in a particular event a, we restrict here the event set Ev to a singleton set of the form {a}. Then, the may-reachability is formalized as ? a ∈ Traces(P), whereas the must-reachability is formalized as “does every trace in FullTraces(P) contain a?” We encode both problems into the validity of HFLZ formulas (without any modal operators hai or [a]), or the HFLZ model checking 12 of those formulas against a trivial model (which consists of a single state without any transitions). Since our reductions are sound and complete, the characterizations of their negations –non-reachability and may-non-reachability– can also be obtained immediately. Although these are the simplest classes of properties among those discussed in Sections 5–7, they are already large enough to accommodate many program properties discussed in the literature, including lack of assertion failures/uncaught exceptions [25] (which can be characterized as nonreachability; recall the encoding of assertions in Section 4), termination [29, 31] (characterized as must-reachability), and non-termination [28] (characterized as may-non-reachability). 5.1 May-Reachability As in the examples in Section 3, we translate a program to a formula that says “the program may raise an event a” in a compositional manner. For example, event a; t can be translated to true (since the event will surely be raised immediately), and t1 t2 can be translated to t†1 ∨t†2 where t†i is the result of the translation of ti (since only one of t1 and t2 needs to raise an event). Definition 3. Let P = (D, t) be a program. ΦP,may is the HES (D†may , t†may ), where D†may and t†may are defined by:   † xn =µ tn †may x1 =µ t1 †may ; · · · ; fn e xn = tn } may = f1 e x1 = t1 , . . . , fn e { f1 e ( )†may = false x†may = x n†may = n (t1 op t2 )†may = t1 †may op t2 †may †may ′ ′ = (if p(t1 , . . . , tk ) then t1 else t2 ) (p(t′1 †may , . . . , t′k †may ) ∧ t1 †may ) ∨ (¬p(t′1†may , . . . , t′k †may ) ∧ t2 †may ) (event a; t)†may = true (t1 t2 )†may = t1 †may t2 †may (t1 t2 )†may = t1 †may ∨ t2 †may . Note that, in the definition of D†may , the order of function definitions in D does not matter (i.e., the resulting HES is unique up to the semantic equality), since all the fixpoint variables are bound by µ. Example 5. Consider the program: Ploop = ({loop x = loop x}, loop(event a; ( ))). It is translated to the HES Φloop = (loop x =µ loop x, loop(true)). Since loop ≡ µloop.λx.loop x is equivalent to λx.false, Φloop is equivalent to false. In fact, Ploop never raises an event a (recall that our language is call-by-name). Example 6. Consider the program Psum = (Dsum , main) where Dsum is: main = sum n (λr.assert(r ≥ n)) sum x k = if x = 0 then k 0 else sum (x − 1) (λr.k(x + r)) Here, n is some integer constant, and assert(b) is the macro introduced in Section 4. We have used λ-abstractions for the sake of readability. The function sum 13 is a CPS version of a function that computes the summation of integers from 1 to x. The main function computes the sum r = 1 + · · · + n, and asserts r ≥ n. It is translated to the HES ΦP2 ,may = (Esum , main) where Esum is: main =µ sum n (λr.(r ≥ n ∧ false) ∨ (r < n ∧ true)); sum x k =µ (x = 0 ∧ k 0) ∨ (x , 0 ∧ sum (x − 1) (λr.k(x + r))). Here, n is treated as a constant. Since the shape of the formula does not depend on the value of n, the property “an assertion failure may occur for some n” can be expressed by ∃n.ΦP2 ,may . Thanks to the completeness of the encoding (Theorem 1 below), the lack of assertion failures can be characterized by ∀n.Φ, where Φ is the De Morgan dual of the above HES: main =ν sum n (λr.(r < n ∨ true) ∧ (r ≥ n ∨ false)) sum x k =ν (x , 0 ∨ k 0) ∧ (x = 0 ∨ sum (x − 1) (λr.k(x + r))). ⊔ ⊓ The following theorem states that ΦP,may is a complete characterization of the may-reachability of P. Theorem 1. Let P be a program. Then, a ∈ Traces(P) if and only if L0 |= ΦP,may for L0 = ({s⋆ }, ∅, ∅, s⋆). To prove the theorem, we first show the theorem for recursion-free programs and then lift it to arbitrary programs by using the continuity of functions represented in the fixpoint-free fragment of HFLZ formulas. To show that the theorem holds for recursion-free programs, See Appendix B.1 for a concrete proof. 5.2 Must-Reachability The characterization of must-reachability can be obtained by an easy modification of the characterization of may-reachability: we just need to replace branches with logical conjunction. Definition 4. Let P = (D, t) be a program. ΦP,must is the HES (D†must , t†must ), where D†must and t†must are defined by:   † xn =µ tn †must x1 =µ t1 †must ; · · · ; fn e xn = tn } must = f1 e x1 = t1 , . . . , fn e { f1 e ( )†must = false x†must = x n†must = n (t1 op t2 )†must = t1 †must op t2 †must †must ′ ′ (if p(t1 , . . . , tk ) then t1 else t2 ) = (p(t′1 †must , . . . , t′k †must ) ⇒ t1 †must ) ∧ (¬p(t′1 †must , . . . , t′k †must ) ⇒ t2 †must ) (event a; t)†must = true (t1 t2 )†must = t1 †must t2 †must (t1 t2 )†must = t1 †must ∧ t2 †must . Here, p(ϕ1 , . . . , ϕk ) ⇒ ϕ is a shorthand for ¬p(ϕ1 , . . . , ϕk ) ∨ ϕ. Example 7. Consider Ploop = (D, loop m n) where D is: loop x y = if x ≤ 0 ∨ y ≤ 0 then (event end; ( )) else (loop (x − 1) (y ∗ y))(loop x (y − 1)) 14 Here, the event end is used to signal the termination of the program. The function loop non-deterministically updates the values of x and y until either x or y becomes non-positive. The must-termination of the program is characterized by ΦPloop,must = (E, loop m n) where E is: loop x y =µ (x ≤ 0 ∨ y ≤ 0 ⇒ true) ∧(¬(x ≤ 0 ∨ y ≤ 0) ⇒ (loop (x − 1) (y ∗ y)) ∧ (loop x (y − 1))). We write Musta (P) if every π ∈ FullTraces(P) contains a. The following theorem, which can be proved in a manner similar to Theorem 1, guarantees that ΦP,must is indeed a sound and complete characterization of the must-reachability. Theorem 2. Let P be a program. Then, Musta (P) if and only if L0 |= ΦP,must for L0 = ({s⋆ }, ∅, ∅, s⋆). The proof is given in Appendix B.2. 6 Trace Properties Here we consider the verification problem: “Given a (non-ω) regular language L and a program P, does every finite event sequence of P belong to L? (i.e. ? FinTraces(P) ⊆ L)” and reduce it to an HFLZ model checking problem. The verification of file-accessing programs considered in Section 3 may be considered an instance of the problem.8 Here we assume that the language L is closed under the prefix operation; this does not lose generality because FinTraces(P) is also closed under the prefix operation. We write AL = (Q, Σ, δ, q0 , F) for the minimal, deterministic automaton with no dead states (hence the transition function δ may be partial). Since L is prefix-closed and the automaton is minimal, w ∈ L if and only if δ̂(q0 , w) is defined (where δ̂ is defined by: δ̂(q, ǫ) = q and δ̂(q, aw) = δ̂(δ(q, a), w)). We use the corresponding LTS LL = (Q, Σ, {(q, a, q′) | δ(q, a) = q′ }, q0 ) as the model of the reduced HFLZ model checking problem. Given the LTS LL above, whether an event sequence a1 · · · ak belongs ? to L can be expressed as LL |= ha1 i · · · hak itrue. Whether all the event sequences in {a j,1 · · · a j,k j | j ∈ {1, . . . , n}} belong to L can be expressed as ? V LL |= j∈{1,...,n} ha j,1 i · · · ha j,k j itrue. We can lift these translations for event sequences to the translation from a program (which can be considered a description of a set of event sequences) to an HFLZ formula, as follows. 8 The last example in Section 3 is actually a combination with the must-reachability problem. 15 Definition 5. Let P = (D, t) be a program. ΦP,path is the HES (D†path , t†path ), where D†path and t†path are defined by:   † xn =ν tn †path x1 =ν t1 †path ; · · · ; fn e xn = tn } path = f1 e x1 = t1 , . . . , fn e { f1 e ( )†path = true x†path = x n†path = n (t1 op t2 )†path = t1 †path op t2 †path †path ′ ′ (if p(t1 , . . . , tk ) then t1 else t2 ) = †path ′ †path ′ †path (p(t1 , . . . , tk ) ⇒ t1 ) ∧ (¬p(t′1 †path , . . . , t′k †path ) ⇒ t2 †path ) (event a; t)†path = hait†path (t1 t2 )†path = t1 †path t2 †path (t1 t2 )†path = t1 †path ∧ t2 †path . Example 8. The last program discussed in Section 3 is modeled as P2 = (D2 , f m g), where m is an integer constant and D2 consists of: f y k = if y = 0 then (event close; k ( )) else (event read; f (y − 1) k) g r = event end; ( ) Here, we have modeled accesses to the file, and termination as events. Then, ΦP2 ,path = (EP2 ,path , f m g) where EP2 ,path is:9 f n k =ν (n = 0 ⇒ hclosei(k true)) ∧ (n , 0 ⇒ hreadi( f (n − 1) k)) g r =ν henditrue. Let L be the prefix-closure of read∗ · close · end. Then LL is L′file in Section 3, and FinTraces(P2 )⊆L can be verified by checking LL |=ΦP2 ,path . ⊔ ⊓ Theorem 3. Let P be a program and L be a regular, prefix-closed language. Then, FinTraces(P) ⊆ L if and only if LL |= ΦP,path . As in Section 5, we first prove the theorem for programs in normal form, and then lift it to recursion-free programs by using the preservation of the semantics of HFLZ formulas by reductions, and further to arbitrary programs by using the (co-)continuity of the functions represented by fixpoint-free HFLZ formulas. The proof is given in Appendix C. 7 Linear-Time Temporal Properties This section considers the following problem: “Given a program P and an ωregular word language L, does InfTraces(P)∩L = ∅ hold?” From the viewpoint of program verification, L represents the set of “bad” behaviors. This can be considered an extension of the problems considered in the previous sections.10 9 10 Unlike in Section 3, the variables are bound by ν since we are not concerned with the termination property here. Note that finite traces can be turned into infinite ones by inserting a dummy event for every function call and replacing each occurrence of the unit value ( ) with loop( ) where loop x = event dummy; loop x. 16 b ?>=< qa j 4 89:; b * ?>=< 89:; t qb a a Fig. 5. LTS for (a∗ b)ω The reduction to HFL model checking is more involved than those in the previous sections. To see the difficulty, consider the program P0 : { f = if c then (event a; f ) else (event b; f )},  f , where c is some boolean expression. Let L be the complement of (a∗ b)ω , i.e., the set of infinite sequences that contain only finitely many b’s. Following Section 6 (and noting that InfTraces(P)∩L = ∅ is equivalent to InfTraces(P) ⊆ (a∗ b)ω in this case), one may be tempted to prepare an LTS like the one in Figure 5 (which corresponds to the transition function of a (parity) word automaton accepting (a∗ b)ω ), and translate the program to an HES ΦP0 of the form: f =α (c ⇒ hai f ) ∧ (¬c ⇒ hbi f ),  f , where α is µ or ν. However, such a translation would not work. If c = true, then InfTraces(P0 ) = aω , hence InfTraces(P0 ) ∩ L , ∅; thus, α should be µ for ΦP0 to be unsatisfied. If c = false, however, InfTraces(P0 ) = bω , hence InfTraces(P0 ) ∩ L = ∅; thus, α must be ν for ΦP0 to be satisfied. The example above suggests that we actually need to distinguish between the two occurrences of f in the body of f ’s definition. Note that in the then- and else-clauses respectively, f is called after different events a and b. This difference is important, since we are interested in whether b occurs infinitely often. We thus duplicate f , and replace the program with the following program Pdup : ({ fb = if c then (event a; fa ) else (event b; fb ), fa = if c then (event a; fa ) else (event b; fb )}, fb ). For checking InfTraces(P0 ) ∩ L = ∅, it is now sufficient to check that fb is recursively called infinitely often. We can thus obtain the following HES: (( fb =ν (c ⇒ hai fa ) ∧ (¬c ⇒ hbi fb ); fa =µ (c ⇒ hai fa ) ∧ (¬c ⇒ hbi fb )), fb ). Note that fb and fa are bound by ν and µ respectively, reflecting the fact that b should occur infinitely often, but a need not. If c = true, the formula is equivalent to ν fb .haiµ fa .hai fa , which is false. If c = false, then the formula is equivalent to ν fb .hbi fb , which is satisfied by by the LTS in Figure 5. The general translation is more involved due to the presence of higher-order functions, but, as in the example above, the overall translation consists of two 17 steps. We first replicate functions according to what events may occur between ? two recursive calls, and reduce the problem InfTraces(P) ∩ L = ∅ to a problem of analyzing which functions are recursively called infinitely often, which we call a call-sequence analysis. We can then reduce the call-sequence analysis to HFL model checking in a rather straightforward manner (though the proof of the correctness is non-trivial). The resulting HFL formula actually does not contain modal operators.11 So, as in Section 5, the resulting problem is the validity checking of HFL formulas without modal operators. In the rest of this section, we first introduce the call-sequence analysis problem and its reduction to HFL model checking in Section 7.1. We then show how ? to reduce the temporal verification problem InfTraces(P) ∩ L = ∅ to an instance of the call-sequence analysis problem in Section 7.2. 7.1 Call-sequence analysis We define the call-sequence analysis and reduce it to an HFL model-checking problem. As mentioned above, in the call-sequence analysis, we are interested in analyzing which functions are recursively called infinitely often. Here, we say e ℓ ǫ t, where f e x = tf ∈ D that g is recursively called from f , if f e s −→D [e s/e x]t f −→∗D g e and g “originates from” t f (a more formal definition will be given in Definition 6 below). For example, consider the following program Papp , which is a twisted version of Pdup above. ({app h x = h x, fb x = if x > 0 then (event a; app fa (x − 1)) else (event b; app fb 5), fa x = if x > 0 then (event a; app fa (x − 1)) else (event b; app fb 5)}, fb 5). a ǫ Then fa is “recursively called” from fb in fb 5 −→∗D app fa 4 −→∗D fa 4 (and so is app). We are interested in infinite chains of recursive calls f0 f1 f2 · · ·, and which functions may occur infinitely often in each chain. For instance, the program above has the unique infinite chain ( fb fa5 )ω , in which both fa and fb occur infinitely often. (Besides the infinite chain, the program has finite chains like fb app; note that the chain cannot be extended further, as the body of app does not have any occurrence of recursive functions: app, fa and fb .) We define the notion of “recursive calls” and call-sequences formally below. s) be a proDefinition 6 (recursive call relation, call sequences). Let P = (D, f1 e gram, with D = { fi x̃i = ui }1≤i≤n . We define D♯ := D ∪ { fi♯ x̃ = ui }1≤i≤n where f1♯ , . . . , fn♯ are fresh symbols. (Thus, D♯ has two copies of each function symbol, one of which is marked by ♯.) For the terms e ti and e t j that do not contain marked symbols, we write ti fi e 11 tj D fje e ℓ t′j and (ii) e t j is obtained by erasing if (i) [e ti /e xi ][ f1♯ / f1 , . . . , fn♯ / fn ]ui −→∗D♯ f j♯ e In the example above, we can actually remove hai and hbi, as information about events has been taken into account when f was duplicated. 18 all the marks in e t′j . We write Callseq(P) for the set of (possibly infinite) sequences of function symbols: s { f1 g1 g2 · · · | f1 e t1 D g1 e t2 D g2 e D · · · }. We write InfCallseq(P) for the subset of Callseq(P) consisting of infinite sequences, i.e., Callseq(P) ∩ { f1 , . . . , fn }ω . For example, for Papp above, Callseq(P) is the prefix closure of {( fb fa5 )ω } ∪ {s · app | s is a non-empty finite prefix of ( fb fa5 )ω }, and InfCallseq(P) is the singleton set {( fb fa5 )ω }. Definition 7 (Call-sequence analysis). A priority assignment for a program P is a function Ω : funs(P) → N from the set of function symbols of P to the set N of natural numbers. We write |=csa (P, Ω) if every infinite call-sequence g0 g1 g2 · · · ∈ InfCallseq(P) satisfies the parity condition w.r.t. Ω, i.e., the largest number occurring infinitely often in Ω(g0 )Ω(g1 )Ω(g2 ) . . . is even. Call-sequence analysis is the problem of, given a program P with a priority assignment Ω, deciding whether |=csa (P, Ω) holds. For example, for Papp and the priority assignment Ωapp = {app 7→ 3, fa 7→ 1, fb 7→ 2}, |=csa (Papp , Ωapp ) holds. The call-sequence analysis can naturally be reduced to HFL model checking against the trivial LTS L0 = ({s⋆ }, ∅, ∅, s⋆) (or validity checking). Definition 8. Let P = (D, t) be a program and Ω be a priority assignment for P. The HES Φ(P,Ω),csa is (D†csa , t†csa ), where D†csa and t†csa are defined by:   † xn =αn tn †csa x1 =α1 t1 †csa ; · · · ; fn e xn = tn } csa = f1 e x1 = t1 , . . . , fn e { f1 e ( )†csa = true x†csa = x n†csa = n (t1 op t2 )†csa = t1 †csa op t2 †csa (if p(t′1 , . . . , t′k ) then t1 else t2 )†csa = (p(t′1 †csa , . . . , t′k †csa ) ⇒ t1 †csa ) ∧ (¬p(t′1†csa , . . . , t′k †csa ) ⇒ t2 †csa ) (event a; t)†csa = t†csa (t1 t2 )†csa = t1 †csa ∧ t2 †csa . (t1 t2 )†csa = t1 †csa t2 †csa Here, we assume that Ω( fi ) ≥ Ω( fi+1 ) for each i ∈ {1, . . . , n − 1}, and αi = ν if Ω( fi ) is even and µ otherwise. The following theorem states the soundness and completeness of the reduction. See Appendix E.3 for a proof. Theorem 4. Let P be a program and Ω be a priority assignment for P. Then |=csa (P, Ω) if and only if L0 |= Φ(P,Ω),csa . Example 9. For Papp and Ωapp above, (Papp , Ωapp )†csa = (E, fb 5), where: E is: app h x =µ h x; fb x =ν (x > 0 ⇒ app fa (x − 1)) ∧ (x ≤ 0 ⇒ app fb 5); fa x =µ (x > 0 ⇒ app fa (x − 1)) ∧ (x ≤ 0 ⇒ app fb 5). Note that L0 |= (Papp , Ωapp )†csa holds. 19 7.2 From temporal verification to call-sequence analysis This subsection shows a reduction from the temporal verification problem ? ? InfTraces(P) ∩ L = ∅ to a call-sequence analysis problem |=csa (P′ , Ω). For the sake of simplicity, we assume without loss of generality12 that every program P = (D, t) in this section is non-terminating and every infinite reduction sequence produces infinite events, so that FullTraces(P) = InfTraces(P) holds. We also assume that the ω-regular language L for the temporal verification problem is specified by using a non-deterministic, parity word automaton [11]. We recall the definition of non-deterministic, parity word automata below. Definition 9 (Parity automaton). A non-deterministic parity word automaton (NPW)13 is a quintuple A = (Q, Σ, δ, qI , Ω) where (i) Q is a finite set of states; (ii) Σ is a finite alphabet; (iii) δ, called a transition function, is a total map from Q × Σ to 2Q ; (iv) qI ∈ Q is the initial state; and (v) Ω ∈ Q → N is the priority function. A run of A on an ω-word a0 a1 · · · ∈ Σω is an infinite sequence of states ρ = ρ(0)ρ(1) · · · ∈ Qω such that (i) ρ(0) = qI , and (ii) ρ(i + 1) ∈ δ(ρ(i), ai ) for each i ∈ ω. An ω-word w ∈ Σω is accepted by A if, there exists a run ρ of A on w such that max{Ω(q) | q ∈ Inf(ρ)} is even, where Inf(ρ) is the set of states that occur infinitely often in ρ. We write L(A) for the set of ω-words accepted by A. For technical convenience, we assume below that δ(q, a) , ∅ for every q ∈ Q and a ∈ Σ; this does not lose generality since if δ(q, a) = ∅, we can introduce a new “dead” state qdead (with priority 1) and change δ(q, a) to {qdead }. Given a parity automaton A, we refer to each component of A by QA , ΣA , δA , qI,A and ΩA . Example 10. Consider the automaton Aab = ({qa , qb }, {a, b}, δ, qa, Ω), where δ is as given in Figure 5, Ω(qa ) = 0, and Ω(qb ) = 1. Then, L(Aab ) = (a∗ b)ω = (a∗ b)∗ aω . The goal of this subsection is, given a program P and a parity word automaton A, to construct another program P′ and a priority assignment Ω for P′ , such that InfTraces(P) ∩ L(A) = ∅ if and only if |=csa (P′ , Ω). Note that a necessary and sufficient condition for InfTraces(P) ∩ L(A) = ∅ is that no trace in InfTraces(P) has a run whose priority sequence satisfies the parity condition; in other words, for every sequence in InfTraces(P), and 12 13 As noted at the beginning of this section, every finite trace can be turned into an infinite trace by inserting (fresh) dummy events. Then, InfTraces(P) ∩ L = ∅ holds if and only if InfTraces(P′ )∩L′ = ∅, where P′ is the program obtained from P by inserting dummy events, and L′ is the set of all event sequences obtained by inserting dummy events into a sequence in L. Note that non-deterministic Büchi automata may be viewed as instances of nondeterministic parity word automata, where there are only two priorities 1 and 2, and accepting and non-accepting states have priorities 2 and 1 respectively. We also note that the classes of deterministic parity, non-deteterministic parity, and non-deteterministic Büchi word automata accept the same class of ω-regular languages; here we opt for non-deteterministic parity word automata, because the translations from the others to NPW are trivial but the other directions may blow up the size of automata. 20 for every run for the sequence, the largest priority that occurs in the associated priority sequence is odd. As explained at the beginning of this section, we reduce this condition to a call sequence analysis problem by appropriately duplicating functions in a given program. For example, recall the program P0 :  { f = if c then (event a; f ) else (event b; f )}, f . It is translated to P′0 : ({ fb = if c then (event a; fa ) else (event b; fb ), fa = if c then (event a; fa ) else (event b; fb )}, fb ), where c is some (closed) boolean expression. Since the largest priorities encountered before calling fa and fb (since the last recursive call) respectively are 0 and 1, we assign those priorities plus 1 (to flip odd/even-ness) to fa and fb respectively. Then, the problem of InfTraces(P0 ) ∩ L(A) = ∅ is reduced to |=csa (P′0 , { fa 7→ 1, fb 7→ 2}). Note here that the priorities of fa and fb represent summaries of the priorities (plus one) that occur in the run of the automaton until fa and fb are respectively called since the last recursive call; thus, the largest priority of states that occur infinitely often in the run for an infinite trace is equivalent to the largest priority that occurs infinitely often in the sequence of summaries (Ω( f1 ) − 1)(Ω( f2 ) − 1)(Ω( f3 ) − 1) · · · computed from a corresponding call sequence f1 f2 f3 · · ·. Due to the presence of higher-order functions, the general reduction is more complicated than the example above. First, we need to replicate not only function symbols, but also arguments. For example, consider the following variation P1 of P0 above:  {g k = if c then (event a; k) else (event b; k), f = g f }, f . Here, we have just made the calls to f indirect, by preparing the function g. Obviously, the two calls to k in the body of g must be distinguished from each other, since different priorities are encountered before the calls. Thus, we duplicate the argument k, and obtain the following program P′1 : ({g ka kb = if c then (event a; ka ) else (event b; kb ), fa = g fa fb , fb = g fa fb }, fa ). Then, for the priority assignment Ω = { fa 7→ 1, fb 7→ 2, g 7→ 1}, InfTraces(P1 ) ∩ L(Aab ) = ∅ if and only if |=csa (P′1 , Ω). Secondly, we need to take into account not only the priorities of states visited by A, but also the states themselves. For example, if we have a function definition f h = h(event a; f h), the largest priority encountered before f is recursively called in the body of f depends on the priorities encountered inside h, and also the state of A when h uses the argument event a; f (because the state after the a event depends on the previous state in general). We, therefore, use intersection types (a la Kobayashi and Ong’s intersection types for HORS model checking [23]) to represent summary information on how each function traverses states of the automaton, and replicate 21 each function and its arguments for each type. We thus formalize the translation as an intersection-type-based program transformation; related transformation techniques are found in [8, 12, 13, 22, 42]. Definition 10. Let A = (Q, Σ, δ, qI , Ω) be a non-deterministic parity word automaton. Let q and m range over Q and the set codom(Ω) of priorities respectively. The set TypesA of intersection types, ranged over by θ, is defined by: V θ ::= q | ρ → θ ρ ::= int | 1≤i≤k (θi , mi ) V We assume a certain total order < on TypesA × N, and require that in 1≤i≤k (θi , mi ), (θi , mi ) < (θ j , m j ) holds for each i < j. V We often write (θ1 , m1 ) ∧ · · · ∧ (θk , mk ) for 1≤i≤k (θi , mi ), and ⊤ when k = 0. Intuitively, the type q describes expressions of simple type ⋆, which may be evaluated when the automaton A is in the state q (here, we have in mind an execution of the product of a program and the automaton, where the V latter takes events produced by the program and changes its states). The type ( 1≤i≤k (θi , mi )) → θ describes functions that take an argument, use it according to types θ1 , . . . , θk , and return a value of type θ. Furthermore, the part mi describes that the argument may be used as a value of type θi only when the largest priority visited since the function is called is mi . For example, given the automaton in Example 10, the function λx.(event a; x) may have types (qa , 0) → qa and (qa , 0) → qb , because the body may be executed from state qa or qb (thus, the return type may be any of them), but x is used only when the automaton is in state qa and the largest priority visited is 1. In contrast, λx.(event b; x) have types (qb , 1) → qa and (qb , 1) → qb . Using the intersection types above, we shall define a type-based transformation relation of the form Γ ⊢A t : θ ⇒ t′ , where t and t′ are the source and target terms of the transformation, and Γ, called an intersection type environment, is a finite set of type bindings of the form x : int or x : (θ, m, m′). We allow multiple type bindings for a variable x except for x : int (i.e. if x : int ∈ Γ, then this must be the unique type binding for x in Γ). The binding x : (θ, m, m′) means that x should be used as a value of type θ when the largest priority visited is m; m′ is auxiliary information used to record the largest priority encountered so far. The transformation relation Γ ⊢A t : θ ⇒ t′ is inductively defined by the rules in Figure 6. (For technical convenience, we have extended terms with λ-abstractions; they may occur only at top-level function definitions.) In the figure, [k] denotes the set {i ∈ N | 1 ≤ i ≤ k}. The operation Γ ↑ m used in the figure is defined by: Γ ↑ m = {x : int | x : int ∈ Γ} ∪ {x : (θ, m1 , max(m2 , m)) | x : (θ, m1 , m2 ) ∈ Γ} The operation is applied when the priority m is encountered, in which case the largest priority encountered is updated accordingly. The key rules are IT-Var, IT-Event, IT-App, and IT-Abs. In IT-Var, the variable x is replicated for each type; in the target of the translation, xθ,m and xθ′ ,m′ are treated as different variables if 22 (IT-Unit) Γ ⊢A ( ) : q ⇒ ( ) Γ, x : int ⊢A x : int ⇒ xint (IT-VarInt) Γ, x : (θ, m, m) ⊢A x : θ ⇒ xθ,m (IT-Var) (IT-Int) Γ ⊢A n : int ⇒ n Γ ⊢A t1 : int ⇒ t′1 Γ ⊢A t2 : int ⇒ t′2 Γ ⊢A t1 op t2 : int ⇒ t′1 op t′2 (IT-Op) Γ ⊢A ti : int ⇒ t′i (for each i ∈ [k]) Γ ⊢A tk+1 : q ⇒ t′k+1 Γ ⊢A tk+2 : q ⇒ t′k+2 e e t = t1 , . . . , tk t′ = t′1 , . . . , t′k Γ ⊢A t1 : q ⇒ t′1 Γ ⊢A t2 : q ⇒ t′2 Γ ⊢A t1 t2 : q ⇒ t′1 t′2 (IT-AppInt) Γ ⊢A t1 t2 : θ ⇒ t′1 t′2 V Γ ⊢A t1 : 1≤i≤k (θi , mi ) → θ ⇒ t′1 Γ ↑ mi ⊢A t2 : θi ⇒ t′2,i (for each i ∈ [k]) Γ ⊢A t1 t2 : θ ⇒ t′1 t′2,1 . . . t′2,k Γ, x : int ⊢A t : θ ⇒ t′ (IT-If) Γ ⊢A if p(e t) then tk+1 else tk+2 : q ⇒ if p(e t′ ) then t′k+1 else t′k+2 δA (q, a) = {q1 , . . . , qk } Γ ↑ ΩA (qi ) ⊢A t : qi ⇒ t′i (for each i ∈ [k]) (IT-NonDet) Γ ⊢A t1 : int → θ ⇒ t′1 Γ ⊢A t2 : int ⇒ t′2 (IT-App) x < dom(Γ) Γ ⊢A λx.t : int → θ ⇒ λxint .t′ (IT-AbsInt) Γ ∪ {x : (θi , mi , 0) | i ∈ [k]} ⊢A t : θ′ ⇒ t′ x < dom(Γ) V Γ ⊢A λx.t : 1≤i≤k (θi , mi ) → θ′ ⇒ λxθ1 ,m1 . . . xθk ,mk .t′ (IT-Abs) Γ ⊢A (event a; t) : q ⇒ (event a; t′1  · · · t′k ) (IT-Event) Fig. 6. Type-based Transformation Rules for Terms (θ, m) , (θ′ , m′ ). The rule IT-Event reflects the state change caused by the event a to the type and the type environment. Since the state change may be nondeterministic, we transform t for each of the next states q1 , . . . , qn , and combine the resulting terms with non-deterministic choice. The rule IT-App and IT-Abs replicates function arguments for each type. In addition, in IT-App, the operation Γ ↑ mi reflects the fact that t2 is used as a value of type θi after the priority mi is encountered. The other rules just transform terms in a compositional manner. If target terms are ignored, the entire rules are close to those of Kobayashi and Ong’s type system for HORS model checking [23]. We now define the transformation for programs. A top-level type environment Ξ is a finite set of type bindings of the form x : (θ, m). Like intersection type environments, Ξ may have more than one binding for each variable. We write Ξ ⊢A t : θ to mean {x : (θ, m, 0) | x : (θ, m) ∈ Ξ} ⊢A t : θ. For a set D of function definitions, we write Ξ ⊢A D ⇒ D′ if dom(D′ ) = { fθ,m | f : (θ, m) ∈ Ξ } and Ξ ⊢A D( f ) : θ ⇒ D′ ( fθ,m ) for every f : (θ, m) ∈ Ξ. For a program P = (D, t), we write Ξ ⊢A P ⇒ (P′ , Ω′ ) if P′ = (D′ , t′ ), Ξ ⊢A D ⇒ D′ and Ξ ⊢A t : qI ⇒ t′ , with Ω′ ( fθ,m ) = m + 1 for each fθ,m ∈ dom(D′ ). We just write ⊢A P ⇒ (P′ , Ω′ ) if Ξ ⊢A P ⇒ (P′ , Ω′ ) holds for some Ξ. 23 Example 11. Consider the automaton Aab in Example 10, and the program P2 = (D2 , f 5) where D2 consists of the following function definitions: g k = (event a; k)(event b; k), f x = if x > 0 then g ( f (x − 1)) else (event b; f 5). Let Ξ be: g : ((qa , 0) ∧ (qb , 1) → qa , 0), g : ((qa , 0) ∧ (qb , 1) → qb , 0), f : (int → qa , 0), f : (int → qb , 1) Then, Ξ ⊢A P1 ⇒ ((D′2 , fint→qa ,0 5), Ω) where: D′2 = {g(qa ,0)∧(qb ,1)→qa ,0 kqa ,0 kqb ,1 = t g , g(qa ,0)∧(qb ,1)→qb ,0 kqa ,0 kqb ,1 = t g , fint→qa ,0 xint = t f,qa , fint→qb ,1 xint = t f,qb } t g = (event a; kqa ,0 )(event b; kqb ,1 ), t f,q = if xint > 0 then g(qa ,0)∧(qb ,1)→q,0 ( fint→qa ,0 (xint − 1)) ( fint→qb ,1 (xint − 1)) else (event b; fint→qb ,1 5), (for each q ∈ {qa , qb }) Ω = {g(qa ,0)∧(qb ,1)→qa ,0 7→ 1, g(qa ,0)∧(qb ,1)→qb ,0 7→ 1, fint→qa ,0 7→ 1, fint→qb ,1 7→ 2}. Appendix F shows how t g and t f are derived. Notice that f , g, and the arguments of g have been duplicated. Furthermore, whenever fθ,m is called, the largest priority that has been encountered since the last recursive call is m. For example, in the then-clause of fint→qa ,0 , fint→qb ,1 (x−1) may be called through g(qa ,0)∧(qb ,1)→qa ,0 . Since g(qa ,0)∧(qb ,1)→qa ,0 uses the second argument only after an event b, the largest priority encountered is 1. This property is important for the correctness of our reduction. The following theorem claims the soundness and completeness of our reduction. See Appendix E for a proof. Theorem 5. Let P be a program and A be a parity automaton. Suppose that Ξ ⊢A P ⇒ (P′ , Ω). Then InfTraces(P) ∩ L(A) = ∅ if and only if |=csa (P′ , Ω). Furthermore, one can effectively find an appropriate transformation. Theorem 6. For every P and A, one can effectively construct Ξ, P′ and Ω such that Ξ ⊢A P ⇒ (P′ , Ω). See Appendix E.5 for a proof sketch. A proof of the above theorem is given in Appendix E.5. The proof also implies that the reduction from temporal property verification to call-sequence analysis can be performed in polynomial time. Combined with the reduction from call-sequence analysis to HFL model checking, we have thus obtained a polynomial-time reduction from the temporal ? verification problem InfTraces(P) ⊆ L(A) to HFL model checking. 24 8 Related Work As mentioned in Section 1, our reduction from program verification problems to HFL model checking problems has been partially inspired by the translation of Kobayashi et al. [21] from HORS model checking to HFL model checking. As in their translation (and unlike in previous applications of HFL model checking [30, 46]), our translation switches the roles of properties and models (or programs) to be verified. Although a combination of their translation with Kobayashi’s reduction from program verification to HORS model checking [19, 20] yields an (indirect) translation from finite-data programs to pure HFL model checking problems, the combination does not work for infinite-data programs. In contrast, our translation is sound and complete even for infinite-data programs. Among the translations in Sections 5–7, the translation in Section 7.2 shares some similarity to their translation, in that functions and their arguments are replicated for each priority. The actual translations are however quite different; ours is type-directed and optimized for a given automaton, whereas their translation is not. This difference comes from the difference of the goals: the goal of [21] was to clarify the relationship between HORS and HFL, hence their translation was designed to be independent of an automaton. The proof of the correctness of our translation in Section 7 is much more involved (cf. Appendix D and E), due to the need for dealing with integers. Whilst the proof of [21] could reuse the type-based characterization of HORS model checking [23], we had to generalize arguments in both [23] and [21] to work on infinite-data programs. Lange et al. [30] have shown that various process equivalence checking problems (such as bisimulation and trace equivalence) can be reduced to (pure) HFL model checking problems. The idea of their reduction is quite different from ours. They reduce processes to LTSs, whereas we reduce programs to HFL formulas. Major approaches to automated or semi-automated higher-order program verification have been HORS model checking [19, 20, 25, 29, 33, 35, 47], (refinement) type systems [15, 26, 36, 39, 40, 43, 45, 50], Horn clause solving [2, 7], and their combinations. As already discussed in Section 1, compared with the HORS model checking approach, our new approach provides more uniform, streamlined methods. Whilst the HORS model checking approach is for fully automated verification, our approach enables various degrees of automation: after verification problems are automatically translated to HFLZ formulas, one can prove them (i) interactively using a proof assistant like Coq (see Appendix G), (ii) semi-automatically, by letting users provide hints for induction/co-induction and discharging the rest of proof obligations by (some extension of) an SMT solver, or (iii) fully automatically by recasting the techniques used in the HORSbased approach; for example, to deal with the ν-only fragment of HFLZ , we can reuse the technique of predicate abstraction [25]. For a more technical comparison between the HORS-based approach and our HFL-based approach, see Appendix H. 25 As for type-based approaches [15, 26, 36, 39, 40, 43, 45, 50], most of the refinement type systems are (i) restricted to safety properties, and/or (ii) incomplete. A notable exception is the recent work of Unno et al. [44], which provides a relatively complete type system for the classes of properties discussed in Section 5. Our approach deals with a wider class of properties (cf. Sections 6 and 7). Their “relative completeness” property relies on Godel coding of functions, which cannot be exploited in practice. The reductions from program verification to Horn clause solving have recently been advocated [2–4] or used [36, 43] (via refinement type inference problems) by a number of researchers. Since Horn clauses can be expressed in a fragment of HFL without modal operators, fixpoint alternations (between ν and µ), and higher-order predicates, our reductions to HFL model checking may be viewed as extensions of those approaches. Higher-order predicates and fixpoints over them allowed us to provide sound and complete characterizations of properties of higher-order programs for a wider class of properties. Bjørner et al. [4] proposed an alternative approach to obtaining a complete characterization of safety properties, which defunctionalizes higher-order programs by using algebraic data types and then reduces the problems to (first-order) Horn clauses. A disadvantage of that approach is that control flow information of higher-order programs is also encoded into algebraic data types; hence even for finite-data higher-order programs, the Horn clauses obtained by the reduction belong to an undecidable fragment. In contrast, our reductions yield pure HFL model checking problems for finite-data programs. Burn et al. [7] have recently advocated the use of higher-order (constrained) Horn clauses for verification of safety properties (i.e., which correspond to the negation of may-reachability properties discussed in Section 5.1 of the present paper) of higher-order programs. They interpret recursion using the least fixpoint semantics, so their higher-order Horn clauses roughly corresponds to a fragment of the HFLZ without modal operators and fixpoint alternations. They have not shown a general, concrete reduction from safety property verification to higher-order Horn clause solving. The characterization of the reachability problems in Section 5 in terms of formulas without modal operators is a reminiscent of predicate transformers [9, 14] used for computing the weakest preconditions of imperative programs. In particular, [5] and [14] respectively used least fixpoints to express weakest preconditions for while-loops and recursions. 9 Conclusion We have shown that various verification problems for higher-order functional programs can be naturally reduced to (extended) HFL model checking problems. In all the reductions, a program is mapped to an HFL formula expressing the property that the behavior of the program is correct. For developing verification tools for higher-order functional programs, our reductions allow us to focus on the development of (automated or semi-automated) HFLZ model checking tools (or, even more simply, theorem provers for HFLZ without modal operators, 26 as the reductions of Section 5 and 7 yield HFL formulas without modal operators). To this end, we have developed a prototype model checker for pure HFL (without integers), which will be reported in a separate paper. Work is under way to develop HFLZ model checkers by recasting the techniques [25, 28, 29, 47] developed for the HORS-based approach, which, together with the reductions presented in this paper, would yield fully automated verification tools. We have also started building a Coq library for interactively proving HFLZ formulas, as briefly discussed in Appendix G. As a final remark, although one may fear that our reductions may map program verification problems to “harder” problems due to the expressive power of HFLZ , it is actually not the case at least for the classes of problems in Section 5 and 6, which use the only alternation-free fragment of HFLZ . The model checking problems for µ-only or ν-only HFLZ are semi-decidable and co-semi-decidable respectively, like the source verification problems of may/must-reachability and their negations of closed programs. Acknowledgment We would like to thank anonymous referees for useful comments. This work was supported by JSPS KAKENHI Grant Number JP15H05706 and JP16K16004. References 1. Axelsson, R., Lange, M., Somla, R.: The complexity of model checking higher-order fixpoint logic. Logical Methods in Computer Science 3(2) (2007) 2. Bjørner, N., Gurfinkel, A., McMillan, K.L., Rybalchenko, A.: Horn clause solvers for program verification. In: Fields of Logic and Computation II - Essays Dedicated to Yuri Gurevich on the Occasion of His 75th Birthday. LNCS, vol. 9300, pp. 24–51. Springer (2015) 3. Bjørner, N., McMillan, K.L., Rybalchenko, A.: Program verification as satisfiability modulo theories. In: SMT 2012. EPiC Series in Computing, vol. 20, pp. 3–11. EasyChair (2012) 4. Bjørner, N., McMillan, K.L., Rybalchenko, A.: Higher-order program verification as satisfiability modulo theories with algebraic data-types. CoRR abs/1306.5264 (2013) 5. Blass, A., Gurevich, Y.: Existential fixed-point logic. In: Computation Theory and Logic, In Memory of Dieter Rödding. LNCS, vol. 270, pp. 20–36. Springer (1987) 6. Blume, M., Acar, U.A., Chae, W.: Exception handlers as extensible cases. In: Proceedings of APLAS 2008. LNCS, vol. 5356, pp. 273–289. Springer (2008) 7. Burn, T.C., Ong, C.L., Ramsay, S.J.: Higher-order constrained horn clauses for verification. PACMPL 2(POPL), 11:1–11:28 (2018) 8. Carayol, A., Serre, O.: Collapsible pushdown automata and labeled recursion schemes: Equivalence, safety and effective selection. In: LICS 2012. pp. 165–174. IEEE (2012) 9. Dijkstra, E.W.: Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM 18(8), 453–457 (1975) 10. Filliâtre, J.C., Paskevich, A.: Why3 — where programs meet provers. In: Felleisen, M., Gardner, P. (eds.) Proceedings of ESOP 2013. LNCS, vol. 7792, pp. 125–128. Springer (2013) 27 11. Grädel, E., Thomas, W., Wilke, T. (eds.): Automata, Logics, and Infinite Games: A Guide to Current Research, LNCS, vol. 2500. Springer (2002) 12. Grellois, C., Melliès, P.: Relational semantics of linear logic and higher-order model checking. In: Proceedings of CSL 2015. LIPIcs, vol. 41, pp. 260–276 (2015) 13. Haddad, A.: Model checking and functional program transformations. In: Proceedings of FSTTCS 2013. LIPIcs, vol. 24, pp. 115–126 (2013) 14. Hesselink, W.H.: Predicate-transformer semantics of general recursion. Acta Inf. 26(4), 309–332 (1989) 15. Hofmann, M., Chen, W.: Abstract interpretation from Büchi automata. In: Proceedings of CSL-LICS ’14. pp. 51:1–51:10. ACM (2014) 16. Igarashi, A., Kobayashi, N.: Resource usage analysis. ACM Trans. Prog. Lang. Syst. 27(2), 264–313 (2005) 17. Jurdzinski, M.: Small progress measures for solving parity games. In: Proceeding of STACS 2000. LNCS, vol. 1770, pp. 290–301. Springer (2000) 18. Knapik, T., Niwinski, D., Urzyczyn, P.: Higher-order pushdown trees are easy. In: FoSSaCS 2002. LNCS, vol. 2303, pp. 205–222. Springer (2002) 19. Kobayashi, N.: Types and higher-order recursion schemes for verification of higherorder programs. In: Proceedings of POPL. pp. 416–428. ACM Press (2009) 20. Kobayashi, N.: Model checking higher-order programs. Journal of the ACM 60(3) (2013) 21. Kobayashi, N., Lozes, É., Bruse, F.: On the relationship between higher-order recursion schemes and higher-order fixpoint logic. In: Proceedings of POPL 2017. pp. 246–259 (2017) 22. Kobayashi, N., Matsuda, K., Shinohara, A., Yaguchi, K.: Functional programs as compressed data. Higher-Order and Symbolic Computation (2013) 23. Kobayashi, N., Ong, C.H.L.: A type system equivalent to the modal mu-calculus model checking of higher-order recursion schemes. In: Proceedings of LICS 2009. pp. 179–188 (2009) 24. Kobayashi, N., Ong, C.H.L.: A type system equivalent to the modal mu-calculus model checking of higher-order recursion schemes. http://www-kb.is.s.u-tokyo. ac.jp/˜koba/tmp/lics09-full.pdf. A longer version of [23] (2012) 25. Kobayashi, N., Sato, R., Unno, H.: Predicate abstraction and CEGAR for higher-order model checking. In: Proc. of PLDI. pp. 222–233. ACM Press (2011) 26. Koskinen, E., Terauchi, T.: Local temporal reasoning. In: Proceedings of CSL-LICS ’14. pp. 59:1–59:10. ACM (2014) 27. Kozen, D.: Results on the propositional µ-calculus. Theor. Comput. Sci. 27, 333–354 (1983) 28. Kuwahara, T., Sato, R., Unno, H., Kobayashi, N.: Predicate abstraction and CEGAR for disproving termination of higher-order functional programs. In: Proceedings of CAV 2015. LNCS, vol. 9207, pp. 287–303. Springer (2015) 29. Kuwahara, T., Terauchi, T., Unno, H., Kobayashi, N.: Automatic termination verification for higher-order functional programs. In: Proceedings of ESOP 2014. Lecture Notes in Computer Science, vol. 8410, pp. 392–411. Springer (2014) 30. Lange, M., Lozes, É., Guzmán, M.V.: Model-checking process equivalences. Theor. Comput. Sci. 560, 326–347 (2014) 31. Ledesma-Garza, R., Rybalchenko, A.: Binary reachability analysis of higher order functional programs. In: SAS 2012. LNCS, vol. 7460, pp. 388–404. Springer (2012) 32. Lozes, É.: A type-directed negation elimination. In: Proceedings FICS 2015. EPTCS, vol. 191, pp. 132–142 (2015) 33. Murase, A., Terauchi, T., Kobayashi, N., Sato, R., Unno, H.: Temporal verification of higher-order functional programs. In: Proceedings of POPL 2016. pp. 57–68 (2016) 28 34. Ong, C.H.L.: On model-checking trees generated by higher-order recursion schemes. In: LICS 2006. pp. 81–90. IEEE Computer Society Press (2006) 35. Ong, C.H.L., Ramsay, S.: Verifying higher-order programs with pattern-matching algebraic data types. In: Proceedings of POPL. pp. 587–598. ACM Press (2011) 36. Rondon, P.M., Kawaguchi, M., Jhala, R.: Liquid types. In: PLDI 2008. pp. 159–169 (2008) 37. Salvati, S., Walukiewicz, I.: Krivine machines and higher-order schemes. Information and Computation 239(Supplement C), 340 – 355 (2014), http://www. sciencedirect.com/science/article/pii/S0890540114000984 38. Sangiorgi, D.: Introduction to Bisimulation and Coinduction. Cambridge University Press (2012) 39. Skalka, C., Smith, S.F., Horn, D.V.: Types and trace effects of higher order programs. J. Funct. Program. 18(2), 179–249 (2008) 40. Terauchi, T.: Dependent types from counterexamples. In: Proceedings of POPL. pp. 119–130. ACM (2010) 41. Tobita, Y., Tsukada, T., Kobayashi, N.: Exact flow analysis by higher-order model checking. In: Proceedings of FLOPS 2012. LNCS, vol. 7294, pp. 275–289. Springer (2012) 42. Tsukada, T., Ong, C.L.: Compositional higher-order model checking via ω-regular games over böhm trees. In: Proceedings of CSL-LICS ’14. pp. 78:1–78:10. ACM (2014) 43. Unno, H., Kobayashi, N.: Dependent type inference with interpolants. In: PPDP 2009. pp. 277–288. ACM (2009) 44. Unno, H., Satake, Y., Terauchi, T.: Relatively complete refinement type system for verification of higher-order non-deterministic programs. PACMPL 2(POPL), 12:1– 12:29 (2018) 45. Unno, H., Terauchi, T., Kobayashi, N.: Automating relatively complete verification of higher-order functional programs. In: POPL 2013. pp. 75–86. ACM (2013) 46. Viswanathan, M., Viswanathan, R.: A higher order modal fixed point logic. In: CONCUR. Lecture Notes in Computer Science, vol. 3170, pp. 512–528. Springer (2004) 47. Watanabe, K., Sato, R., Tsukada, T., Kobayashi, N.: Automatically disproving fair termination of higher-order functional programs. In: Proceedings of ICFP 2016. pp. 243–255. ACM (2016) 48. Winskel, G.: The Formal Semantics of Programming Languages: An Introduction. The MIT Press (1993) 49. Winskel, G.: Prime algebraicity. Theor. Comput. Sci. 410(41), 4160–4168 (2009) 50. Zhu, H., Nori, A.V., Jagannathan, S.: Learning refinement types. In: Proceedings of ICFP 2015. pp. 400–411. ACM (2015) 29 Appendix A Typing Rules for Programs The type judgments for expressions and programs are of the form K ⊢ t : η and K ⊢ P, where K is a finite map from variables to types. The typing rules are shown in Figure 7. We write ⊢ P if K ⊢ P for some K . K ⊢ () : ⋆ (LT-Unit) K, x : η ⊢ x : η K ⊢ n : int K ⊢ t1 : int (LT-Var) arity(p) = k K ⊢ t′i : int for each i ∈ {1, . . . , k} K ⊢ t j : ⋆ for each j ∈ {1, 2} K ⊢ if p(t′1 , . . . , t′k ) then t1 else t2 : ⋆ (LT-Int) K ⊢ t1 : η → κ K ⊢ t2 : η K ⊢ t1 t2 : κ K ⊢ t2 : int K ⊢ t1 : ⋆ K ⊢ t1 op t2 : int (LT-If) (LT-App) K ⊢ t2 : ⋆ K ⊢ t1 t2 : ⋆ (LT-Op) (LT-NonDet) K ⊢t:⋆ K ⊢ event a; t : ⋆ (LT-Ev) K = f1 : κ1 , . . . , fn : κn K ⊢t:⋆ K,e xi : e η i ⊢ ti : ⋆ κi = e ηi → ⋆ for each i ∈ {1, . . . , n} xn = tn }, t) x1 = t1 , . . . , fn e K ⊢ ({ f1 e (LT-Prog) Fig. 7. Typing Rules for Expressions and Programs B Proofs for Section 5 B.1 Proofs for Section 5.1 To prove the theorem, we define the reduction relation t −→D t′ as given in Figure 8. It differs from the labeled transition semantics in that  and event a; · · · are not eliminated; this semantics is more convenient for establishing the relationship between a program and a corresponding HFLZ formula. It should be clear that a ∈ Traces(D, t) if and only if t −→∗D E[event a; t′ ] for some t′ . We shall first prove the theorem for recursion-free programs. Here, a program P = (D, t) is recursion-free if the transitive closure of the relation {( fi , f j ) ∈ dom(D) × dom(D) | f j occurs in D( fi )} is irreflexive. To this end, we prepare a few lemmas. The following lemma says that the semantics of HFLZ formulas is preserved by reductions of the corresponding programs. 30 E(evaluation contexts) ::= [ ] | Et | tE | event a; E fe x=u∈D |e x| = |e t| E[ f e t] −→D E[[e t/e x]u] (R-Fun) E[if (~t′1 , . . . , ~t′k ) < ~p ′ p(t1 , . . . , t′k ) then t1 else t2 ] −→D E[t2 ] (R-IfF) (~t′1 , . . . , ~t′k ) ∈ ~p E[if p(t′1 , . . . , t′k ) then t1 else t2 ] −→D E[t1 ] (R-IfT) Fig. 8. Reduction Semantics Lemma 1. Let (D, t) be a program and L be an LTS. If t −→D t′ , then ~(D, t)†may L = ~(D, t′ )†may L . xn = tn }, and (F1 , . . . , Fn ) be the least fixpoint of x1 = t1 , . . . , fn e Proof. Let D = { f1 e λ(X1 , . . . , Xn ).(~λe x1 .t1 †may ({ f1 7→ X1 , . . . , fn 7→ Xn }), . . . , ~λe xn .tn †may ({ f1 7→ X1 , . . . , fn 7→ Xn })). By the Bekić property, ~(D, t)†may  = ~t†may ({ f1 7→ F1 , . . . , fn 7→ Fn }). Thus, it suffices to show that t −→D t′ implies ~t†may (ρ) = ~t′ †may (ρ) for ρ = { f1 7→ F1 , . . . , fn 7→ Fn }. We show it by case analysis on the rule used for deriving t −→D t′ . s] and t′ = E[[e s/e xi ]ti ]. Since (F1 , . . . , Fn ) is a – Case R-Fun: In this case, t = E[ fi e fixpoint, we have: s(ρ) = Fi (~e s(ρ)) ~ fi e = ~λe xi .ti (ρ)(~e s(ρ)) = ~[e s/e xi ]ti (ρ) Thus, we have ~t†may (ρ) = ~t′ †may (ρ) as required. – Case R-IfT: In this case, t = E[if p(s′1 , . . . , s′k ) then s1 else s2 ] and t′ = E[s1 ] with (~s′1 , . . . , ~s′k ) ∈ ~p. Thus, t†may = E†may [(p(s′1 , . . . , s′k ) ∧ s1 †may ) ∨ (¬p(s′1 , . . . , s′k ) ∧ s2 †may )]. Since (~s′1 , . . . , ~s′k ) ∈ ~p, (~s′1 , . . . , ~s′k ) < ~¬p. Thus, ~t†may (ρ) = ~E†may [(true ∧ s1 †may ) ∨ (false ∧ s2 †may )](ρ) = ~E†may [s1 †may ](ρ). We have thus ~t†may (ρ) = ~t′ †may (ρ) as required. – Case R-IfF: Similar to the above case. ⊔ ⊓ The following lemma says that Theorem 1 holds for programs in normal form. Lemma 2. Let (D, t) be a program and t −→ 6 D . Then, L0 |= (D, t)†may if and only if ′ t = E[event a; t ] for some evaluation context E and t′ . Proof. The proof proceeds by induction on the structure of t. By the condition t −→ 6 D and the (implicit) assumption that ⊢ (D, t), t is generated by the following grammar: t ::= ( ) | event a; t′ | t1 t2 . 31 – Case t = ( ): The result follows immediately, as t is not of the form E[event a; t′ ], and t†may = false. – Case t = event a; t′ : The result follows immediately, as t is of the form E[event a; t′ ], and t†may = true. – Case t1 t2 : Because (t1 t2 )†may = t1 †may ∨ t2 †may , L0 |= (D, t)†may if and only if L0 |= (D, ti )†may for some i ∈ {1, 2}. By the induction hypothesis, the latter is equivalent to the property that ti is of the form E[event a; t′ ] for some i ∈ {1, 2}, which is equivalent to the property that t is of the form E′ [event a; t′ ]. ⊔ ⊓ The following lemma says that Theorem 1 holds for recursion-free programs; this is an immediate corollary of Lemmas 1 and 2, and the strong normalization property of the simply-typed λ-calculus. Lemma 3. Let P be a recursion-free program. Then, a ∈ Traces(P) if and only if L0 |= ΦP,may for L0 = ({s⋆ }, ∅, ∅, s⋆). Proof. Since P = (D, t0) is recursion-free, there exists a finite, normalizing reduction sequence t0 −→∗D t −→ 6 D . We show the required property by induction on the length n of this reduction sequence. – Case n = 0: Since t0 −→ 6 D , a ∈ Traces(P) if and only if t0 = E[event a; t] for some E and t. Thus, the result follows immediately from Lemma 2. – Case n > 0: In this case, t0 −→D t1 −→∗D t. By the induction hypothesis, a ∈ Traces(D, t1 ) if and only if L0 |= Φ(D,t1 ),may . Thus, by the definition of the reduction semantics and Lemma 1, a ∈ Traces(D, t0 ) if and only if a ∈ Traces(D, t1 ), if and only if L0 |= Φ(D,t1 ),may , if and only if L0 |= Φ(D,t0 ),may . ⊔ ⊓ To prove Theorem 1 for arbitrary programs, we use the fact that the semantics † of P†may may be approximated by P(i) may , where P(i) is the recursion-free program obtained by unfolding recursion functions i times (a more formal definition will be given later). To guarantee the correctness of this finite approximation, we need to introduce a slightly non-standard notion of (ω-)continuous functions below. Definition 11. For an LTS L = (U, A, −→, sinit) and a type σ, the set of continuous elements ContL,σ ⊆ DL,σ and the equivalence relation =cont,L,σ ⊆ ContL,σ × ContL,σ are defined by induction on σ as follows. ContL,• = DL,• ContL,int = DL,int ContL,σ→τ = { f ∈ DL,σ→τ | ∀x1 , x2 ∈ ContL,σ .(x1 =cont,L,σ x2 ⇒ f (x1 ) =cont,L,τ f (x2 )) F F ∧∀{yi }i∈ω ∈ ContL,σ (↑ω) . f ( i∈ω yi ) =cont,L,τ i∈ω f (yi )}. =cont,L,• = {(x, x) | x ∈ ContL,• } =cont,L,int = {(x, x) | x ∈ ContL,int } =cont,L,σ→τ = {( f1 , f2 ) | f1 , f2 ∈ ContL,σ→τ ∧∀x1 , x2 ∈ ContL,σ .(x1 =cont,L,σ x2 ⇒ f1 (x1 ) =cont,L,τ f2 (x2 )}. Here, ContL,σ (↑ω) denotes the set of increasing infinite sequences a0 ⊑ a1 ⊑ a2 ⊑ · · · consisting of elements of ContL,σ . We just write =cont for =cont,L,σ when L and σ are clear from the context. 32 Remark 2. Note that we require that a continuous function returns a continuous element only if its argument is. To see the need for this requirement, consider an LTS with a singleton state set {s}, and the function: f = λx : ((int → •) → •).λy : (int → •).x y. One may expect that f is continuous in the usual sense (i.e., f preserves the limit), but for the function g defined by ( {s} if s ∈ p(n) for every n ≥ 0 , g(p) = ∅ otherwise f (g) is not continuous. In fact, let pi be {(n, {s}) | 0 ≤ n ≤ i} ∪ {(n, ∅) | n < 0 ∨ n > i}. Then f (g)(pi ) = ∅ for every i but f (g)(⊔i∈ω pi ) = {s}. The (non-continuous) function g above can be expressed by (νX.λn.λp.(p(n) ∧ (X (n + 1) p)))0. ⊔ ⊓ (↑ω) and xi =cont,L,σ yi for each i ∈ ω, then Lemma 4. If {xF i }i∈ω , {yi }i∈ω ∈ ContL,σ F y . x = i i cont,L,σ i∈ω i∈ω Proof. The proof proceeds by induction on σ. The base case, where σ = • or σ = int, is trivial, as ContL,σ = DL,σ and =cont,L,σ is the identity relation. F Let us consider the induction step, where σ = σ1 → τ. We first check that i∈ω xi ∈ ContL,σ . To this end, suppose z1 =cont,L,σ1 z2 . By the continuity of xi and the assumption z1 =cont,L,σF z2 , we have xi z1F =cont,L,τ xi z2 for each i. By the induction 1 hypothesis, we have i∈ω (xi z1 ) =cont,L,τ i∈ω (xi z2 ). Therefore, we have: G G G G (xi z1 ) =cont,L,τ ( xi )z1 = (xi z2 ) = ( xi )z2 i∈ω i∈ω i∈ω i∈ω F as required. To check the second condition for i∈ω xi ∈ ContL,σ , suppose that F F F F {zi }i∈ω ∈ ContL,σ1 (↑ω) . We need to show ( i∈ω xi )( j∈ω z j ) =cont,L,τ j∈ω (( i∈ω xi )z j ). By the continuity of xi and the induction hypothesis, we have indeed: F F F F ( i∈ω xi )( j∈ω z j ) = i∈ω (xi ( j∈ω z j )) F F F F F F =cont,L,τ i∈ω ( j∈ω (xi z j )) = j∈ω ( i∈ω (xi z j )) = j∈ω (( i∈ω xi )z j ). F F Thus, we have proved i∈ω xi ∈ ContL,σ . The proof of i∈ω yi ∈ ContL,σ is the same. F F It remains to check that z =cont,L,σ1 w implies ( i∈ω xi )z =cont,L,τ ( i∈ω yi )w. Suppose z =cont,L,σ1 w. Then we have: F F F F ( i∈ω xi )z = i∈ω (xi z) =cont,L,τ i∈ω (yi w) = ( i∈ω yi )w. as required. Note that xi z =cont,L,τ yi w follows from the assumptions xi =cont,L,σ yi and and then we have applied the induction hypothesis to obtain F z =cont,L,σ1 w, F ⊔ i∈ω (yi w). This completes the proof for the induction step. ⊓ i∈ω (xi z) =cont,L,τ The following lemma guarantees the continuity of the functions expressed by fixpoint-free HFLZ formulas. Lemma 5 (continuity of fixpoint-free functions). Let L be an LTS. If ϕ is a closed, fixpoint-free HFLZ formula of type τ, then ~ϕ ∈ ContL,τ . 33 Proof. We write ~∆cont for the set of valuations: {ρ ∈ ~∆ | ρ( f ) ∈ ContL,σ for each f : σ ∈ ∆}, and =cont,L,∆ for: {(ρ1 , ρ2 ) ∈ ~∆cont × ~∆cont | ρ1 (x) =cont,L,σ ρ2 (x) for every x : σ ∈ ∆}. We show the following property by induction on the derivation of ∆ ⊢ ϕ : σ: If ϕ is fixpoint-free and ∆ ⊢ ϕ : σ, then (i) ρ1 =cont,L,∆ ρ2 imply ~∆ ⊢ ϕ : σ(ρ1 ) =cont,L,σ ~∆ ⊢ ϕ : σ(ρ2 ). (ii) For any increasing sequence of valuations ρ0 ⊑ ρ1 ⊑ ρ2 ⊑F· · · such that ρi ∈ ~∆cont for each i ∈ ω, ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) =cont,L,σ i∈ω ~∆ ⊢ ϕ : σ(ρi ). Then, the lemma would follow as a special case, where ∆ = ∅. We perform case analysis on the last rule used for deriving ∆ ⊢ ϕ : σ. We discuss only the main cases; the other cases are similar or straightforward. – Case HT-Var: In this case, ϕ = X and ∆ = ∆′ , X : σ. The condition (i) follows immediately by: ~∆ ⊢ ϕ : σ(ρ1 ) = ρ1 (X) =cont,L,σ ρ2 (X) = ~∆ ⊢ ϕ : σ(ρ2 ). To see (ii), suppose ρ0 ⊑ ρ1 ⊑ ρ2 ⊑ · · ·, with ρi ∈ ~∆cont for each i ∈ ω. Then, we have ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) = (⊔i∈ω ρi )(X) = ⊔i∈ω (ρi (X)) = ⊔i∈ω (~∆ ⊢ ϕ : σ(ρi )). By Lemma 4, ⊔i∈ω (ρi (X)) ∈ ContL,σ . We have thus ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) =cont,L,σ ⊔i∈ω (~∆ ⊢ ϕ : σ(ρi )) as required. – Case HT-Some: In this case, ϕ = haiϕ′ with ∆ ⊢ ϕ : • and σ = •. The condition (i) is trivial since ContL,• = DL,• . We also have the condition (ii) by: a ~∆ ⊢ haiϕ′ : σ(⊔i∈ω ρi ) = {s | ∃s′ ∈ ~∆ ⊢H ϕ′ : •(⊔i∈ω ρi ). s −→ s′ } a = {s | ∃s′ ∈ ⊔i∈ω (~∆ ⊢H ϕ′ : •(ρi )). s −→ s′ } (by induction hypothesis) a ′ ′ ′ = ⊔i∈ω {s | ∃s ∈ ~∆ ⊢H ϕ : •(ρi ). s −→ s } = ⊔i∈ω ~∆ ⊢H haiϕ′ : •(ρi ). – Case HT-All: In this case, ϕ = [a]ϕ′ with ∆ ⊢ ϕ : • and σ = •. The condition (i) is trivial. The condition (ii) follows by: a ~∆ ⊢ [a]ϕ′ : σ(⊔i∈ω ρi ) = {s | ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ~∆ ⊢H ϕ′ : •(⊔i∈ω ρi )} a = {s | ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ⊔i∈ω (~∆ ⊢H ϕ′ : •(ρi ))} (by induction hypothesis) a = ⊔i∈ω {s | ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ~∆ ⊢H ϕ′ : •(ρi )} (*) = ⊔i∈ω ~∆ ⊢H [a]ϕ′ : •(ρi ). a To see the direction ⊆ in step (*), suppose ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ⊔i∈ω (~∆ ⊢H a ϕ′ : •(ρi )) holds. Since U is finite, the set {s′ | s −→ s′ } is a finite set {s1 , . . . , sk }. For each j ∈ {1, . . . , k}, there exists i j such that s j ∈ ~∆ ⊢H ϕ′ : •(ρi j ). Let i′ = max(i1 , . . . , ik ). Then we have s′ ∈ ~∆ ⊢H ϕ′ : •(ρi′ ) for every 34 a s′ ∈ {s1 , . . . , sk }. We have thus ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ~∆ ⊢H ϕ′ : •(ρi′ ), which implies s belongs to the set in the righthand side of (*). a To see the converse (i.e., ⊇), suppose ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ~∆ ⊢H ϕ′ : •(ρi ) a for some i ∈ ω. Then, ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ⊔i∈ω (~∆ ⊢H ϕ′ : •(ρi )) follows immediately. – Case HT-Abs: In this case, ϕ = λX : σ1 .ϕ′ , with ∆, X : σ1 ⊢ ϕ′ : τ and σ = σ1 → τ. To prove the condition (i), suppose ρ1 =cont,L,∆ ρ2 . Let f j = ~∆ ⊢ λX : σ1 .ϕ′ : σ1 → τ(ρ j ) for j ∈ {1, 2}. We first check f j ∈ ContL,σ1 →τ . Suppose x1 =cont,L,σ1 x2 . Then, by the induction hypothesis, we have f j x1 = ~∆, X:σ1 ⊢ ϕ′ : τ(ρ j {X 7→ x1 }) =cont,L,τ ~∆, X:σ1 ⊢ ϕ′ : τ(ρ j {X 7→ x2 }) = f j x2 . To check the second condition for f j ∈ ContL,σ , let {yi }i∈ω ∈ ContL,σ1 (↑ω) . Then we have: f j (⊔i∈ω yi ) = ~∆, X : σ1 ⊢ ϕ′ : τ(ρ j {X 7→ ⊔i∈ω yi }) = ~∆, X : σ1 ⊢ ϕ′ : τ(⊔i∈ω (ρ j {X 7→ yi })) =cont ⊔i∈ω ~∆, X : σ1 ⊢ ϕ′ : τ(ρ j {X 7→ yi }) (by the induction hypothesis) = ⊔i∈ω f j (yi ) as required. To show f1 =cont,L,σ1→τ f2 , assume again that x1 =cont,L,σ1 x2 . Then, ρ1 {X 7→ x1 } =cont,∆,X:σ1 ρ2 {X 7→ x2 }. Therefore, by the induction hypothesis, we have f1 (x) = ~∆, X:σ1 ⊢ ϕ′ : τ(ρ1 {X 7→ x1 }) =cont,L,τ ~∆, X:σ1 ⊢ ϕ′ : τ(ρ2 {X 7→ x2 }) = f2 (x). This completes the proof of the condition (i). To prove the condition (ii), suppose ρ0 ⊑ ρ1 ⊑ ρ2 ⊑ · · · with ρi ∈ ~∆cont for each i ∈ ω. We need to show ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) =cont,L,σ ⊔i∈ω ~∆ ⊢ ϕ : σ(ρi ). We first check that both sides of the equality belong to ContL,σ . By Lemma 4, ⊔i∈ω ρi ∈ ~∆cont . Thus, by the condition (i) (where we set both ρ1 and ρ2 to ⊔i∈ω ρi ), we have ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) =cont,L,σ ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ), which implies ~∆ ⊢ ϕ : σ(⊔i∈ω ρi ) ∈ ContL,σ . For the righthand side, by the condition (i), we have ~∆ ⊢ ϕ : σ(ρi ) ∈ ContL,σ for each i. By Lemma 4, we have ⊔i∈ω ~∆ ⊢ ϕ : σ(ρi ) as required. It remains to check that x =cont,L,σ1 y implies ~∆ ⊢ ϕ : σ(⊔i∈ω ρi )(x) =cont,L,τ ⊔i∈ω ~∆ ⊢ ϕ : σ(ρi )(y). Suppose x =cont,L,σ1 y. Then we have ~∆ ⊢ ϕ : σ(⊔i∈ω ρi )(x) = ~∆, X : σ1 ⊢ ϕ′ : σ((⊔i∈ω ρi ){X 7→ x}) = ~∆, X : σ1 ⊢ ϕ′ : σ(⊔i∈ω (ρi {X 7→ x})) =cont ~∆, X : σ1 ⊢ ϕ′ : σ(⊔i∈ω (ρi {X 7→ y})) (by the induction hypothesis, (i)) =cont ⊔i∈ω ~∆, X : σ1 ⊢ ϕ′ : σ(ρi {X 7→ y}) (by the induction hypothesis, (ii)) = ⊔i∈ω ~∆ ⊢ ϕ : σ(ρi )(y) as required. 35 – Case HT-App: In this case, ϕ = ϕ1 ϕ2 and σ = τ, with ∆ ⊢ ϕ1 : σ2 → τ, ∆ ⊢ ϕ2 : σ2 . The condition (i) follows immediately from the induction hypothesis. To prove the condition (ii), suppose ρ0 ⊑ ρ1 ⊑ ρ2 ⊑ · · · with ρi ∈ ~∆cont for each i ∈ ω. Then we have ~∆ ⊢ ϕ1 ϕ2 : τ(⊔i∈ω ρi ) = ~∆ ⊢ ϕ1 : σ2 → τ(⊔i∈ω ρi )~∆ ⊢ ϕ2 : σ2 (⊔i∈ω ρi ) =cont (⊔i∈ω ~∆ ⊢ ϕ1 : σ2 → τ(ρi ))(⊔ j∈ω ~∆ ⊢ ϕ2 : σ2 (ρ j )) (by the induction hypothesis) = ⊔i∈ω (~∆ ⊢ ϕ1 : σ2 → τ(ρi )(⊔ j∈ω ~∆ ⊢ ϕ2 : σ2 (ρ j )) =cont ⊔i∈ω ⊔ j∈ω (~∆ ⊢ ϕ1 : σ2 → τ(ρi )(~∆ ⊢ ϕ2 : σ2 (ρ j )) (by the continuity of ~∆ ⊢ ϕ1 : σ2 → τ(ρi ) and Lemma 4) = ⊔i∈ω (~∆ ⊢ ϕ1 : σ2 → τ(ρi )(~∆ ⊢ ϕ2 : σ2 (ρi )) = ⊔i∈ω (~∆ ⊢ ϕ1 ϕ2 : τ(ρi ) as required. ⊔ ⊓ The following is an immediate corollary of the lemma above (see, e.g., [38]). Lemma 6 (fixpointF of continuous functions). Let L be an LTS. If f ∈ ContL,τ→τ , then lfpτ ( f ) =cont,L,τ i∈ω f i (⊥L,τ ). F F Proof. By the continuity of f , we have f ( i∈ω f i (⊥L,τ )) =cont,L,τ i∈ω f i (⊥L,τ ). Thus, F by (transfinite) induction, we have f β (⊥) =cont,L,τ i∈ω f i (⊥L,τ ). for every ordinal β ≥ ω. Since lfpτ ( f ) = f β (⊥) for some ordinal β [38], we have the required result. The detail of the transfinite induction is given as follows. For a given ordinal number β, let us define f β (⊥L,τ ) by transfinite induction. IfFβ = β′ + 1, then ′ ′ f β (⊥L,τ ) = f ( f β (⊥L,τ )). If β is a limit ordinal, then f β (⊥L,τ ) = β′ <β f β (⊥L,τ ). We prove that f ω (⊥L,τ ) =cont f β (⊥L,τ ) for every β > ω by transfinite induction. We have proved the claim for β = ω + 1, i.e. f ω (⊥L,τ ) =cont f ω+1 (⊥L,τ ). ′ – If β = β′ + 1, by the induction hypothesis, f ω (⊥L,τ ) =cont f β . Since f is continuous, ′ f β (⊥L,τ ) = f ( f β (⊥L,τ )) =cont f ( f ω (⊥L,τ )) =cont f ω (⊥L,τ ). – Assume that β is a limit ordinal and τ = σ1 → · · · → σk → •. Assume also xi =cont,L,σi yi for each 1 ≤ i ≤ k. By the induction hypothesis, for every β′ < β, we have ′ f β (⊥L,τ ) =cont f ω (⊥L,τ ) and thus ′ f β (⊥L,τ ) x1 . . . xk =cont f ω (⊥L,τ ) y1 . . . yk . Since =cont on ContL,• is the standard equivalence =, for every β′ < β, we have ′ f β (⊥L,τ ) x1 . . . xk = f ω (⊥L,τ ) y1 . . . yk . 36 Since the limit of a function is defined pointwise,    G ′ G ′  β   x1 . . . xk = ( f β (⊥L,τ ) x1 . . . xk ) f (⊥ ) L,τ   β′ <β β′ <β G = ( f ω (⊥L,τ ) y1 . . . yk ) β′ <β = f ω (⊥L,τ ) y1 . . . yk . Thus, we have f β (⊥L,τ ) =cont f ω . Since lfpτ ( f ) = f β (⊥L,τ ) for some ordinal β, we have G f i (⊥L,τ ) = f ω (⊥L,τ ) =cont f β (⊥L,τ ) = lfpτ ( f ) i∈ω ⊔ ⊓ as required. We are now ready to prove Theorem 1. Below we extend continuous functions to those on tuples, and make use of Bekić property between a simultaneous recursive definition of multiple functions and a sequence of recursive definitions; see, e.g., [48], Chapter 10. Proof (of Theorem 1). Given a program P = (D, t) with D = { f1 xe1 = t1 , . . . , fn xen = (i) (i) tn }, we write P(i) for the recursion-free program (D(i) , [ f1 / f1 , . . . , fn / fn ]t) where: (j+1) (j) (j) e D(i) = { fk xk = [ f1 / f1 , . . . , fn / fn ]tk | j ∈ {1, . . . , i − 1}, k ∈ {1, . . . , n}} (0) ∪{ fk e xk = ( ) | k ∈ {1, . . . , n}}. Then, we obtain the required result as follows. L0 |= ΦP,may ⇔ s⋆ ∈ ~t†may ({( f1 , . . . , fn ) 7→ lfp(λ( f1 , . . . , fn ).(λe x1 .~t1 †may , . . . , λxen .~tn †may ))}) (Bekić property) ⇔ s⋆ ∈ ~t†may ({( f , . . . , f ) → 7 1 n F x1 .∅, . . . , λxen .∅)}) x1 .~t1 †may , . . . , λxen .~tn †may ))i (λe i∈ω (λ( f1 , . . . , fn ).(λe (Lemmas 5 and 6) ⇔ s⋆ ∈ ~t†may ({( f1 , . . . , fn ) 7→ x1 .∅, . . . , λxen .∅)}) (λ( f1 , . . . , fn ).(λe x1 .~t1 †may , . . . , λxen .~tn †may ))i (λe for some i (Lemmas 5) ⇔ L0 |= ΦP(i) ,may for some i (by the definition of P(i) ) (i) ⇔ a ∈ Traces(P ) for some i (Lemma 3) ⇔ a ∈ Traces(P) ⊔ ⊓ B.2 Proofs for Section 5.2 We first prepare lemmas corresponding to Lemmas 1–3. 37 Lemma 7. Let (D, t) be a program. If t −→D t′ , then ~(D, t)†must  = ~(D, t′ )†must . ⊔ ⊓ Proof. Almost the same as the proof of Lemma 1. †must Lemma 8. Let (D, t) be a program and t −→ 6 D . Then, L0 |= (D, t) if and only if t is of the form C[event a; t1 , . . . , event a; tk ], where C is a (multi-hole) context generated by the syntax: C ::= [ ]i | C1 C2 . Proof. The proof proceeds by induction on the structure of t. By the condition t −→ 6 D , t is generated by the following grammar: t ::= ( ) | event a; t′ | t1 t2 . – Case t = ( ): The result follows immediately, as t is not of the form C[event a; t1 , . . . , event a; tk ] and t†must = false. – Case t = event a; t′ : The result follows immediately, as t is of the form C[event a; t1 , . . . , event a; tk ] (where C = [ ]1 and k = 1) and t†must = true. – Case t1 t2 : Because (t1 t2 )†must = t1 †must ∧ t2 †must , L0 |= (D, t)†must if and only if L0 |= (D, ti )†must for each i ∈ {1, 2}. By the induction hypothesis, the latter is equivalent to the property that ti is of the form Ci [event a; ti,1 , . . . , event a; ti,ki ] for each i ∈ {1, 2}, which is equivalent to the property that t is of the form C[event a; t1 , . . . , event a; tk ] (where C = C1 C2 ). ⊔ ⊓ Lemma 9. Let P be a recursion-free program. Then, Musta (P) if and only if L0 |= ΦP,must for L0 = ({sinit}, ∅, ∅, sinit). Proof. Since P = (D, t0) is recursion-free, there exists a finite, normalizing reduction sequence t0 −→∗D t −→ 6 D . We show the required property by induction on the length n of this reduction sequence. – Case n = 0: Since t0 −→ 6 D , the result follows immediately from Lemma 8. – Case n > 0: In this case, t0 −→D t1 −→∗P t. Thus, by the induction hypothesis, the definition of the reduction semantics and Lemma 7, Musta (D, t0) if and only if Musta (D, t1 ), if and only if L0 |= Φ(D,t1 ),must , if and only if L0 |= Φ(D,t0 ),must . Proof (Theorem 2). Let P(i) be the the recursion-free program defined in the proof of Theorem 1. Then, we obtain the required result as follows. L0 |= ΦP,must ⇔ s⋆ ∈ ~t†must ({( f1 , . . . , fn ) 7→ lfp(λ( f1 , . . . , fn ).(λe x1 .~t1 †must , . . . , λxen .~tn †must ))}) (Bekić property) ⇔ s⋆ ∈ ~t†must ({( f , . . . , f ) → 7 n F 1 x1 .∅, . . . , λxen .∅)}) x1 .~t1 †must , . . . , λxen .~tn †must ))i (λe i∈ω (λ( f1 , . . . , fn ).(λe ((Lemmas 5 and 6) ⇔ s⋆ ∈ ~t†must ({( f1 , . . . , fn ) 7→ x1 .∅, . . . , λxen .∅)}) for some i (λ( f1 , . . . , fn ).(λe x1 .~t1 †must , . . . , λxen .~tn †must ))i (λe ⇔ L0 |= ΦP(i) ,must for some i (by the definition of P(i) ) (i) ⇔ Musta (P ) for some i (Lemma 9) ⇔ Musta (P). 38 ⊔ ⊓ C Proofs for Section 6 We first modify the reduction semantics in Figure 8 by adding the following rule for distributing events with respect to : E[event a; (t1 t2 )] −→D E[(event a; t1 )(event a; t2 )] (R-Dist) We write −→D,dist for this modified version of the reduction relation. We call an evaluation context event-free if it is generated only by the following syntax: E ::= [ ] | Et | tE. Lemma 10. Let P = (D, t) be a program such that t−→ 6 D,dist. Then, FinTraces(P) ⊆ L if and only if LL |= ΦP,path . Proof. Since t−→ 6 D,dist, t must be of the form: i∈{1,...,m} (event ai,1 ; · · · event ai,ni ; ( )) (where i∈{1,...,m} ti denotes a combination of t1 , . . . , tm with ). Thus, FinTraces(P) ⊆ L ⇔ ai,1 · · · ai,ni ∈ L for every i ∈ {1, . . . , m} ⇔ LL |= hai,1 i · · · hai,ni itrue for every i ∈ {1, . . . , m} ⇔ LL |= ΦP,path (by the construction of LL ) (by the definition of ΦP,path ). ⊔ ⊓ Lemma 11. Let (D, t) be a program, and L be a prefix-closed regular language. If t −→D,dist t′ , then ~(D, t)†path LL = ~(D, t′ )†path LL . xn = tn }, and (F1 , . . . , Fn ) be the greatest fixpoint x1 = t1 , . . . , fn e Proof. Let D = { f1 e of λ(X1 , . . . , Xn ).(~λe x1 .t1 †path LL ({ f1 7→ X1 , . . . , fn 7→ Xn }), . . . , ~λe xn .tn †path LL ({ f1 7→ X1 , . . . , fn 7→ Xn })). By the Bekić property, ~(D, t)†path LL = ~t†path LL ({ f1 7→ F1 , . . . , fn 7→ Fn }). Thus, it suffices to show that t −→D t′ implies ~t†path LL (ρ) = ~t′ †path LL (ρ) for ρ = { f1 7→ F1 , . . . , fn 7→ Fn }. We show it by case analysis on the rule used for deriving t −→D,dist t′ . t] and t′ = E[[e t/e xi ]s] with D( fi ) = λe xi .s. – Case R-Fun: In this case, t = E[ fi e Since (F1 , . . . , Fn ) is a fixpoint, we have: tLL (ρ) = Fi (~e tLL (ρ) ~ fi e = ~λe xi .sLL (ρ)(~e tLL (ρ)) = ~[e t/e xi ]sLL (ρ) Thus, we have ~t†path LL (ρ) = ~t′ †path LL (ρ) as required. 39 – Case R-IfT: In this case, t = E[if p(t′1 , . . . , t′k ) then t1 else t2 ] and t′ = E[t1 ] with (~t′1 LL , . . . , ~t′k LL ) ∈ ~p. Thus,t†path = (p(t′1 , . . . , t′k ) ⇒ t1 †path ) ∧ (¬p(t′1 , . . . , t′k ) ⇒ t2 †path ). Since (~t′1 LL , . . . , ~t′k LL ) ∈ ~p, (~t′1 LL , . . . , ~t′k LL ) < ~¬p. Thus, ~(if p(t′1 , . . . , t′k ) then t1 else t2 )†path LL (ρ) = ~(true ⇒ t1 †path ) ∧ (false ⇒ t2 †path )LL (ρ) = ~t1 †path LL (ρ). We have, therefore, ~t†path LL (ρ) = ~t′ †path LL (ρ) as required. – Case R-IfF: Similar to the above case. – Case R-Dist: In this case, t = E[event a; (t1 t2 )] and t′ = E[(event a; t1 )(event a; t2 )]. Thus, it suffices to show that ~(event a; (t1 t2 ))†path LL (ρ) = ~((event a; t1 )(event a; t2 ))†path LL (ρ). We have: (event a; (t1 t2 ))†path = hai(t1†path ∧ t2 †path ) ((event a; t1 )(event a; t2 ))†path = (hait1†path ) ∧ (hait2 †path ) Since LL has at most one a-transition from each state, both formulas are equivalent, i.e., ~(event a; (t1 t2 ))†path LL (ρ) = ~((event a; t1 )(event a; t2 ))†path LL (ρ). ⊔ ⊓ Lemma 12. Let P be a recursion-free program and L be a regular, prefix-closed language. Then, FinTraces(P) ⊆ L if and only if LL |= ΦP,path . Proof. Since P = (D, t0 ) is recursion-free, there exists a finite, normalizing reduction sequence t0 −→∗D,dist t−→ 6 D,dist. We show the required property by induction on the length n of this reduction sequence. The base case follows immediately from Lemma 10. For the induction step (where n > 0), we have: t0 −→D t1 −→∗D t. By the induction hypothesis, FinTraces(D, t1 ) ⊆ L if and only if LL |= Φ(D,t1 ),path . Thus, by the definition of the reduction semantics and Lemma 11, FinTraces(D, t0 ) ⊆ L, if and only if FinTraces(D, t1 ) ⊆ L, if and only if LL |= Φ(D,t1 ),path , if and only if LL |= Φ(D,t0 ),path . ⊔ ⊓ To prove Theorem 3, we introduce the (slightly non-standard) notion of cocontinuity, which is dual of the continuity in Definition 11. Definition 12. For an LTS L = (U, A, −→, sinit) and a type σ, the set of cocontinuous elements CocontL,σ ⊆ DL,σ and the equivalence relation =cocont,L,σ⊆ CocontL,σ × CocontL,σ are defined by induction on σ as follows. CocontL,• = DL,• CocontL,int = DL,int CocontL,σ→τ = { f ∈ DL,σ→τ | ∀x1 , x2 ∈ CocontL,σ .(x1 =cocont,L,σ x2 ⇒ f (x1 ) =cocont,L,τ f (x2 ))   ∧∀{yi }i∈ω ∈ CocontL,σ (↓ω) . f ( i∈ω yi ) =cocont,L,τ i∈ω f (yi )}. =cocont,L,• = {(x, x) | x ∈ CocontL,• } =cocont,L,int = {(x, x) | x ∈ CocontL,int} =cocont,L,σ→τ = {( f1 , f2 ) | f1 , f2 ∈ CocontL,σ→τ ∧ ∀x1 , x2 ∈ CocontL,σ .x1 =cocont,L,σ x2 ⇒ f1 (x1 ) =cocont,L,τ f2 (x2 )}. Here, CocontL,σ (↓ω) denotes the set of decreasing infinite sequences a0 ⊒ a1 ⊒ a2 ⊒ · · · consisting of elements of CocontL,σ . We just write =cocont for =cocont,L,σ when L and σ are clear from the context. 40 The following lemma is analogous to Lemma 5. Lemma 13 (cocontinuity of fixpoint-free functions). Let L be an LTS. If ϕ is a closed, fixpoint-free HFL formula of type τ, then ~ϕL ∈ CocontL,τ . Proof. The proof is almost the same as that of Lemma 5. We write ~∆cocont for the set of valuations: {ρ ∈ ~∆L | ρ( f ) ∈ CocontL,σ for each f : σ ∈ ∆}. We show the following property by induction on the derivation of ∆ ⊢ ϕ : σ: If ϕ is fixpoint-free and ∆ ⊢ ϕ : σ, then (i) ~∆ ⊢ ϕ : σL (ρ) ∈ CocontL,σ for every ρ ∈ ~∆cocont ; and (ii) For any decreasing sequence of interpretations ρ0 ⊒ρ1 ⊒ ρ2 ⊒ · · · such  that ρi ∈ ~∆cont for each i ∈ ω, ~∆ ⊢ ϕ : σL ( i∈ω ρi ) =cocont i∈ω ~∆ ⊢ ϕ : σL (ρi ). Then, the lemma will follow as a special case, where ∆ = ∅. We perform case analysis on the last rule used for deriving ∆ ⊢ ϕ : σ. We discuss only two cases below, as the proof is almost the same as the corresponding proof for Lemma 5. – Case HT-Some: In this case, ϕ = haiϕ′ with ∆ ⊢ ϕ : • and σ = •. The condition (i) is trivial since CocontL,• = DL,• . We also have the condition (ii) by:   a ~∆ ⊢ haiϕ′ : σL ( i∈ω ρi ) = {s | ∃s′ ∈ ~∆ ⊢H ϕ′ : •L ( i∈ω ρi ). s −→ s′ }  a = {s | ∃s′ ∈ i∈ω (~∆ ⊢H ϕ′ : •L (ρi )). s −→ s′ } (by induction hypothesis)  a = i∈ω {s | ∃s′ ∈ ~∆ ⊢H ϕ′ : •L (ρi ). s −→ s′ } (*) = i∈ω ~∆ ⊢H haiϕ′ : •L (ρi ).  ′ The step (*) is obtained as follows. Suppose ∃s′ ∈ i∈ω .~∆ ⊢H ϕ :  a •L (ρi ). s −→ s′ . Since i∈ω .~∆ ⊢H ϕ′ : •L (ρi ) ⊆ ~∆ ⊢H ϕ′ : •L (ρi ) for a every i, we have ∃s′ ∈ ~∆ ⊢H ϕ′ : •L (ρi ). s −→ s′ for every i; hence we have s∈  i∈ω {s a | ∃s′ ∈ ~∆ ⊢H ϕ′ : •L (ρi ). s −→ s′ }. Conversely, suppose s∈  i∈ω {s a | ∃s′ ∈ ~∆ ⊢H ϕ′ : •L (ρi ). s −→ s′ }, a i.e., for every i, Si = {s′ ∈ ~∆ ⊢H ϕ′ : •L (ρi ) | s −→ s′ } must be non-empty. T a Since the set {s′ | s −→ s′ } is finite, and Si decreases monotonically, i∈ω Si must be non-empty. Thus, we have ∃s′ ∈  i∈ω ~∆ a ⊢H ϕ′ : •L (ρi ). s −→ s′ , as required. 41 – Case HT-All: In this case, ϕ = [a]ϕ′ with ∆ ⊢ ϕ : • and σ = •. The condition (i) is trivial. The condition (ii) follows by:   a ~∆ ⊢ [a]ϕ′ : σL ( i∈ω ρi ) = {s | ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ ~∆ ⊢H ϕ′ : •L ( i∈ω ρi )}  a = {s | ∀s′ ∈ U.s −→ s′ ⇒ s′ ∈ i∈ω (~∆ ⊢H ϕ′ : •L (ρi ))} (by induction hypothesis)  a ′ ′ ′ ′ = i∈ω {s | ∀s ∈ U.s −→ s ⇒ s ∈ ~∆ ⊢H ϕ : •L (ρi )} = i∈ω ~∆ ⊢H [a]ϕ′ : •L (ρi ). ⊔ ⊓ The following lemma states a standard property of cocontinuous functions [38], which can be proved in the same manner as Lemma 6. Lemma 14 (fixpoint of cocontinuous functions). Let L be an LTS. If f ∈  CocontL,τ→τ , then gfpτ ( f ) =cocont,L,τ i∈ω f i (⊤L,τ ). Proof (Proof of Theorem 3). The result follows by: LL 6|= ΦP,path ⇔ q0 < ~t†path LL ({( f1 , . . . , fn ) 7→ gfp(λ( f1 , . . . , fn ).(λe x1 .~t1 †path LL , . . . , λxen .~tn †path LL ))}) (Bekić property) †path ⇔ q0< ~t LL ({( f1 , . . . , fn ) 7→ x1 .Q, . . . , λxen .Q)}) x1 .~t1 †path LL , . . . , λxen .~tn †path LL ))i (λe i∈ω (λ( f1 , . . . , fn ).(λe (Lemmas 13 and 14) ⇔ q0 < ~t†path LL ({( f1 , . . . , fn ) 7→ x1 .Q, . . . , λxen .Q)}) (λ( f1 , . . . , fn ).(λe x1 .~t1 †path LL , . . . , λxen .~tn †path LL ))i (λe for some i (Lemma 13) ⇔ LL 6|= ΦP(i) ,path for some i ⇔ Traces(P(i) ) * L for some i (Lemma 12) ⇔ Traces(P) * L ⊔ ⊓ D Game-based characterization of HES Fix an LTS L and let E = (X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn ). The goal of this section is to construct a parity game GL,E characterizing the semantic interpretation of the HES E (or equivalently (E, X1 )) over the LTS L. The game-based characterization will be used to prove some results in Section 7. D.1 Preliminary: Parity Game A parity game G is a tuple (VP , VO , E, Ω) where – VP and VO are disjoint sets of Proponent and Opponent nodes, respectively, – E ⊆ (VP ∪ VO ) × (VP ∪ VO ) is the set of edges, and – Ω : (VP ∪ VO ) → N is a priority function whose image is bounded. 42 We write V for VP ∪ VO . A play of a parity game is a (finite or infinite) sequence v1 v2 . . . of nodes in V such that (vi , vi+1 ) ∈ E for every i. We write · for the concatenation operation. An infinite play v1 v2 . . . is said to satisfy the parity condition if max Inf(Ω(v1 )Ω(v2 ) . . . ) is even, where Inf(m1 m2 · · · ) is the set of numbers that occur infinitely often in m1 m2 · · ·. A play is maximal if either – it is a finite sequence v1 · · · vn and the last node vn has no successor (i.e., {v | (vn , v) ∈ E} = ∅), or – it is infinite. A maximal play is P-winning (or simply winning) if either – it is finite and the last node is of Opponent, or – it is infinite and satisfies the parity condition. Let S : V ∗ VP ⇀ V be a partial function that respects E in the sense that (vk , S(v1 . . . vk )) ∈ E (if S(v1 . . . vk ) is defined). A play v1 v2 . . . vk is said to conform with S if, for every 1 ≤ i < k with vi ∈ VP , S(v1 . . . vi ) is defined and S(v1 . . . vi ) = vi+1 . An infinite play conforms with S if so does every finite prefix of the play. The partial function S is a P-strategy on V0 ⊆ V (or simply a strategy on V0 ) if it is defined on every play that conforms with S, starts from a node in V0 and ends with a node in VP . A strategy is P-winning on V0 ⊆ V (or simply winning on V0 ) if every maximal play that conforms with the strategy and starts from V0 is P-winning. We say that Proponent wins the game G on V0 ⊆ V if there exists a P-winning strategy of G on V0 . An O-strategy and an O-winning strategy is defined similarly. A strategy S is memoryless if S(v1 . . . vk ) = f (vk ) for some f : VP → V. We shall consider only games of limited shape, which we call bipartite games. A game is bipartite if E ⊆ (VP × VO ) ∪ (VO × VP ) and Ω(vO ) = 0 for every vO ∈ VO . Parity progress measure [17] is a useful tool to show that a strategy is winning. We give a modified version of the definition, applicable only to bipartite games. Definition 13 (Parity progress measure). Let γ be an ordinal number. Given (β1 , . . . , βn ), (β′1 , . . . , β′n ) ∈ γn , we write (β1 , . . . , βn ) ≥ j (β′1 , . . . , β′n ) if (β1 , . . . , βn− j+1 ) ≥ (β′1 , . . . , β′n− j+1 ) by the lexicographic ordering. The strict inequality > j ( j = 1, . . . , n) is defined by an analogous way. Let G be a bipartite parity game and S be a strategy of G on V0 . Let n be the maximum priority in G. A (partial) mapping ̟ : VO ⇀ γn is a parity progress measure of S on V0 if it satisfies the following condition: For every finite play ṽ · vO · vP · v′O (vO , v′O ∈ VO and vP ∈ VP ) that starts from V0 and conforms with the strategy S, both ̟(vO ) and ̟(v′O ) are defined and ̟(vO ) ≥Ω(vP ) ̟(v′O ). Furthermore if Ω(vP ) is odd, then ̟(vO ) >Ω(vP ) ̟(v′O ). Lemma 15 ([17]). Let G be a bipartite parity game and S be a strategy of G on V0 ⊆ V. If there exists a parity progress measure of S on V0 , then S is a winning strategy on V0 . 43 Proof. Let ̟ be a parity progress measure of S on V0 . We prove by contradiction. Assume an infinite play v1 v2 . . . that conforms S, starts from V0 and violates the parity condition. Assume that v1 ∈ VO ; the other case can be proved similarly. Since G is bipartite, vi ∈ VO if and only if i is odd. Furthermore Ω(vi ) = 0 for every odd i. Let ℓ = max Inf(Ω(v1 )Ω(v2 ) . . . ). Then there exists an even number k such that, for every even number i ≥ k, we have Ω(vi ) ≤ ℓ. By definition, ̟(vi−1 ) ≥Ω(vi ) ̟(vi+1 ) for every even i. Since j1 ≤ j2 implies (≥ j1 ) ⊆ (≥ j2 ), we have ̟(vi−1 ) ≥ℓ ̟(vi+1 ) for every even i ≥ k. Hence we have an infinite decreasing chain ̟(vk−1 ) ≥ℓ ̟(vk+1 ) ≥ℓ ̟(vk+3 ) ≥ℓ · · ·. Furthermore this inequality is strict if Ω(vi ) = ℓ because ℓ is odd. Since {i | i ≥ k, Ω(vi ) = ℓ} is infinite, we have an infinite strictly decreasing chain, a contradiction. ⊔ ⊓ D.2 Preliminary: Complete-Prime Algebraic Lattice W Definition 14. Let (A, ≤) be a complete lattice. For U ⊆ A, we write U for the least upper bound W of U in A. An element p ∈ A is a complete prime if (1) p , ⊥, and (2) p ≤ U implies p ≤ x for some x W ∈ U (for every U ⊆ A). A complete lattice is complete-prime algebraic [49] if x = { p ≤ x | p : complete prime } for every x. The following is a basic property about complete-prime algebraic lattices, which will be used later. Lemma 16. Let (A, ≤) be a complete prime algebraic lattice, and x, y ∈ A. Then the followings are equivalent. (i) x ≤ y. (ii) p ≤ x implies p ≤ y for every complete prime p. (iii) p  y implies p  x for every complete prime p. Proof. (i) implies (ii): Trivial from the fact p ≤ x ≤ y implies p ≤ y. (ii) implies (i): Assume (ii). Then, {p | p ≤ x, p: complete prime} ⊆ {p | p ≤ y, p: complete prime}. W W Since A is complete-prime algebraic, x = {p | p ≤ x, p: complete prime} ≤ {p | p ≤ y, p: complete prime} = y. (iii) is just a contraposition of (ii). ⊔ ⊓ Let (A, ≤) be a complete lattice and f : A → A be a monotone function. We write ⊥A for the least element of A. Then A has the least fixed point of f , which can be computed by iterative application of f to ⊥A as follows. Let γ be an ordinal number greater than the cardinality of A. We define a family {ai }i<γ of elements in A by: _ a0 := ⊥A aβ+1 := f (aβ ) aβ := aβ′ (if β is a limit ordinal). β′ <β Then aγ is the least fixed point of f . We shall write aβ as f β (⊥A ). Lemma 17. Let (A, ≤) be a complete lattice and f : A → A be a monotone function. For every complete prime p ∈ A, the minimum ordinal β such that p ≤ f β (⊥) is a successor ordinal. 44 Proof.WAssume that the minimum ordinal β is a limit ordinal. By definition, ′ p ≤ β′ <β f β (⊥). Since p is a complete prime, there exists β′ < β such that ′ p ≤ f β (⊥). Hence β is not the minimum, a contradiction. ⊔ ⊓ Lemma 18. Let L be an LTS. Then (DL,τ , ⊑L,τ) is complete-prime algebraic for every τ. Proof. If τ = •, then DL,τ = 2U is ordered by the set inclusion and the complete primes are singleton sets { q } (q ∈ U). For function types, DL,σ→τ is the set of monotone functions ordered by the pointwise ordering. Given an element d ∈ DL,σ and a complete prime p ∈ DL,τ , consider the function fd,p defined by    p (if d ≤ x) fd,p (x) =   ⊥ (otherwise). These functions are complete primes of DL,σ→τ . It is not difficult to see that every element is the least upper bound of a subset of complete primes. ⊔ ⊓ D.3 Parity Game for HES Let E = (X1τ1 =α1 ϕ1 ; · · · ; Xnτn =αn ϕn ) be an HES (with “the main formula” X1 ) and L be an LTS. Definition 15 (Parity game for HES). The parity game GL,E is defined by the following data: VP := { (p, Xi) | p ∈ DL,τi , p: complete prime } VO := { (x1 , . . . , xn ) | x1 ∈ DL,τ1 , . . . , xn ∈ DL,τn } E := { ((p, Xi), (x1 , . . . , xn )) | p ⊑ ~ϕi ([X1 7→ x1 , . . . , Xn 7→ xn ]) } ∪ { ((x1, . . . , xn ), (p, Xi)) | p ⊑ xi , p: complete prime }. The priority of the opponent node is 0; the priority of node (p, Xi ) is 2(n − i) if αi = ν and 2(n − i) + 1 if αi = µ. The parity game defined above is analogous to the typability game for HES defined by [21]. A position (p, Xi ) ∈ VP represents the state where Proponent tries to show that p ⊑ ~(E, Xi ). To show p ⊑ ~(E, Xi ), Proponent picks a valuation ρ = [X1 7→ x1 , . . . , Xn 7→ xn ] such that p ⊑ ~ϕi (ρ) indeed holds. A position (x1 , . . . , xn ) ∈ VO represents such a valuation, and Opponent challenges Proponent’s assumption that ρ = [X1 7→ x1 , . . . , Xn 7→ xn ] is a valid valuation, i.e., xi ⊑ ~(E, Xi ) holds for each i. To this end, Opponent chooses i, picks a complete prime p such that p ⊑ xi , and asks why p ⊑ ~(E, Xi ) holds, as represented by the edge ((x1 , . . . , xn ), (p, Xi)). (Note that Lemma 18 implies that xi ⊑ ~(E, Xi ) if and only if p ⊑ ~(E, Xi ) for every complete prime such that p ⊑ xi ; therefore, it is sufficient for Opponent to consider only complete primes.) As in the typability game for HES defined by [21], a play may continue indefinitely, in which case, the winner is determined by the largest priority of (p, Xi ) visited infinitely often. 45 The goal of this section is to show that p ⊑ ~EL if and only if Proponent wins GL,E on (p, X1 ) (Theorem 7 given at the end of this subsection). We start from an alternative description of the interpretation of an HES. Let us define the family {ϑi }i=1,...,n of substitutions by induction on n − i as follows: ϑn := (the identity substitution) ϑi := [Xi+1 7→ αi+1 Xi+1 .(ϑi+1 ϕi+1 )] ◦ ϑi+1 (if i < n). The family {ψi }i=1,...,n of formulas is defined by ψi := αi Xi .(ϑi ϕi ). Then ϑi = [Xi+1 7→ ψi+1 ] ◦ ϑi+1 . The substitution ϑi maps Xi+1 , . . . , Xn to closed formulas and thus ϑi ϕ j ( j ≤ i) is a formula with free variables X1 , . . . , Xi . The formula ψi has free variables X1 , . . . , Xi−1 . In particular, ψ1 = toHFL(E, X1 ). Given 1 ≤ i ≤ j ≤ n and dk ∈ DL,τk (1 ≤ k ≤ n), let us define fi, j (d1 , . . . , d j ) := ~ϑ j ϕi ([X1 7→ d1 , . . . , X j 7→ d j ]) gi (d1 , . . . , di−1 ) := ~ψi ([X1 7→ d1 , . . . , Xi−1 7→ di−1 ]). Lemma 19. We have fi,n (d1 , . . . , dn ) = ~ϕi ([X1 7→ d1 , . . . , Xn 7→ dn ]) fi, j (d1 , . . . , d j ) = fi, j+1 (d1 , . . . , d j , g j+1 (d1 , . . . , d j )) (if j < n) gi (d1 , . . . , di−1 ) = αi y. fi,i (d1 , . . . , di−1 , y). g1 ( ) = ~E. Proof. By induction on n − i. For each i, the claim is proved by induction on the structure of formulas ϕi . The last claim follows from the fact that ψ1 = toHFL(E, X1 ) and: g1 ( ) = α1 y. f1,1 (y) = α1 y.~ϑ1 ϕ1 ([X1 7→ y]) = ~α1 X1 .ϑ1 ϕ1  = ~ψ1 . ⊔ ⊓ We first prove the following lemma, which implies that the game-based characterization is complete, i.e., that p ⊑ ~EL only if Proponent wins GL,E on (p, X1 ). Lemma 20. Let (d1 , . . . , dn ) be an opponent node. If d j ⊑ g j (d1 , . . . , d j−1 ) for every j ∈ {1, . . . , n}, then Proponent wins GL,E on (d1 , . . . , dn ). Proof. Let (⋆) be the following condition on O-nodes (d1 , . . . , dn ): d j ⊑ g j (d1 , . . . , d j−1 ) for every j ∈ {1, . . . , n}. Let V0 = {(d1 , . . . , dn ) ∈ VO | (d1 , . . . , dn ) satisfies (⋆)}. Let us first define a strategy S of GL,E on V0 . It is defined for plays of the form e v · (d1 , . . . , dn ) · (p, Xi ) where (d1 , . . . , dn ) ∈ V0 . The next node is determined by the last two nodes as follows. 46 – Case αi = ν: Then the next node is (d1 , . . . , di−1 , ci , ci+1 , . . . , cn ) where c j = g j (d1 , . . . , di−1 , ci , ci+1 , . . . , c j−1 ) for j ≥ i. By the assumption di ⊑ gi (d1 , . . . , di−1 ) and Lemma 19, p ⊑ di ⊑ gi (d1 , . . . , di−1 ) = νy. fi,i (d1 , . . . , di−1 , y) = fi,i (d1 , . . . , di−1 , νy. fi,i (d1 , . . . , di−1 , y)) = fi,i (d1 , . . . , di−1 , gi (d1 , . . . , di−1 )) = fi,i (d1 , . . . , di−1 , ci ) = fi,i+1 (d1 , . . . , di−1 , ci , gi+1 (d1 , . . . , di−1 , ci )) = fi,i+1 (d1 , . . . , di−1 , ci , ci+1 ) .. . = fi,n (d1 , . . . , di−1 , ci , ci+1 , . . . , cn ) = ~ϕi ([X1 7→ d1 , . . . , Xi−1 7→ di−1 , Xi 7→ ci , . . . , Xn 7→ cn ]). – Case αi = µ: Then the next node is (d1 , . . . , di−1 , e, ci+1 , . . . , cn ) where c j = g j (d1 , . . . , di−1 , e, ci+1 , . . . , c j−1 ) for j > i and e is defined as follows. By the condition (⋆) and Lemma 19, di ⊑ gi (d1 , . . . , di−1 ) = µy. fi,i (d1 , . . . , di−1 , y) and thus di ⊑ (λy. fi,i (d1 , . . . , di−1 , y))β (⊥) for some ordinal β. By the definition of edges of GL,E , we have p ⊑ di and thus p ⊑ (λy. fi,i (d1 , . . . , di−1 , y))β (⊥) for some β. Consider the minimum ordinal among those satisfying this condition; let β0 be this ordinal. Since p is complete prime, β0 is a successor ordinal by Lemma 17, i.e. β0 = β′0 + 1 for some β′0 . Then we define e = ′ (λy. fi,i (x1 , . . . , xi−1 , y))β (⊥). Now we have p ⊑ (λy. fi,i (d1 , . . . , di−1 , y))(e) = fi,i (d1 , . . . , di−1 , e) = fi,i+1 (d1 , . . . , di−1 , e, gi+1 (d1 , . . . , di−1 , e)) = fi,i+1 (d1 , . . . , di−1 , e, ci+1 ) .. . = fi,n (d1 , . . . , di−1 , e, ci+1 , . . . , cn ) = ~ϕi ([X1 7→ d1 , . . . , Xi−1 7→ di−1 , Xi 7→ e, Xi+1 7→ ci+1 , . . . , Xn 7→ cn ]). 47 It is not difficult to see that S is indeed a strategy on V0 . We prove that S is winning by giving a parity progress measure of S on V0 . Let γ be an ordinal greater than the cardinality of DL,τℓ for every ℓ ∈ {1, . . . , n}. The (partial) mapping VO ∋ (d1 , . . . , dn ) 7→ (β1 , . . . , βn ) ∈ γn is defined by:    min{β < γ | di ≤ (λy. fi,i (d1 , . . . , di−1 , y))β (⊥)} (if αi = µ) βi :=   0 (if αi = ν). This is well-defined on V0 . It is not difficult to see that this mapping is a parity progress measure of the strategy S. ⊔ ⊓ Next, we prepare lemmas used for proving that the game-based characterization is sound, i.e., that existence of a winning strategy of GL,E on (p, X1 ) implies p ⊑ ~EL . We first prove this result for a specific class of strategies, which we call stable strategies. Then we show that every winning strategy can be transformed to a stable one. Definition 16 (Stable strategy). A strategy S of GL,E is stable if for every play e v · (d1 , . . . , dn ) · (p, Xi ) · (c1 , . . . , cn ) that conforms with S, one has d1 = c1 , . . . , di−1 = ci−1 and di ⊒ ci . An important property of a stable winning strategy is as follows. 1 ,...,dℓ for the subgame of Lemma 21. Given d1 ∈ DL,τ1 , . . . , dℓ ∈ DL,τℓ , we write GdL,E GL,E consisting of nodes { (p, Xi ) ∈ VP | ℓ < i } ∪ { (d1 , . . . , dℓ , cℓ+1 , . . . , cn ) | cℓ+1 ∈ DL,τℓ+1 , . . . , cn = DL,τn }. If a stable strategy S wins on an opponent node (d1 , . . . , dn ), then its restriction is a 1 ,...,dℓ winning strategy of the subgame GdL,E on (d1 , . . . , dn ). 1 ,...,dℓ . Since Proof. It suffices to show that S does not get stuck in the subgame GdL,E proponent nodes are restricted to (p, Xi ) with ℓ < i, by the definition of stability, S does not change the first ℓ components. ⊔ ⊓ Lemma 22. Let S be a stable winning strategy of GL,E on V0 ⊆ V. For every 1 ≤ j ≤ n, we have the following propositions: – (P j ): For every 1 ≤ i ≤ j, if ṽ · (p, Xi ) · (d1 , . . . , dn ) conforms with S and starts from V0 , then p ⊑ fi, j (d1 , . . . , d j ). – (Q j ): If e v · (p, X j ) · (d1 , . . . , dn ) conforms with S and starts from V0 , then p ⊑ g j (d1 , . . . , d j−1 ). Proof. By induction on the order Pn < Qn < Pn−1 < Qn−1 < · · · < P1 < Q1 . Let S be a stable winning strategy of GL,E on V0 ⊆ V. (Pn ) By the definition of the game GL,E and Lemma 19, we have p ⊑ ~ϕi ([X1 7→ d1 , . . . , Xn 7→ dn ]) = fi,n (d1 , . . . , dn ). 48 (P j with j < n) We first show that d j+1 ⊑ g j+1 (d1 , . . . , d j ). Since DL,τ j+1 is complete-prime algebraic, it suffices to show q ⊑ g j+1 (d1 , . . . , d j ) for every complete prime q ⊑ d j+1 . Given a complete prime q ⊑ d j+1 , ṽ · (p, Xi ) · (d1 , . . . , dn ) · (q, X j+1 ) is a valid play that conforms with S. Let (c1 , . . . , cn ) = S( ṽ · (p, Xi ) · (d1 , . . . , dn ) · (q, X j+1 ) ). Since S is stable, d1 = c1 , . . . , d j = c j . By the induction hypothesis, q ⊑ gi+1 (c1 , . . . , c j ) = gi+1 (d1 , . . . , d j ). Since q ⊑ d j+1 is an arbitrary complete prime, we conclude that d j+1 ⊑ g j+1 (d1 , . . . , d j ). Then by Lemma 19, we have p ⊑ fi, j+1 (d1 , . . . , d j , d j+1 ) ⊑ fi, j+1 (d1 , . . . , d j , g j+1 (d1 , . . . , d j )) = fi, j (d1 , . . . , d j ), where the first inequality follows from the induction hypothesis and the second from d j+1 ⊑ g j+1 (d1 , . . . , d j ) and monotonicity of fi, j+1 . (Q j with α j = ν) For every complete prime q ⊑ d j , we have a play ṽ · (p, Xi ) · (d1 , . . . , dn ) · (q, X j ) that conforms with S. Let (cq,1 , . . . , cq,n ) = S( ṽ · (p, Xi ) · (d1 , . . . , dn ) · (q, X j ) ). Since S is stable, d1 = cq,1 , . . . , d j−1 = cq, j−1 and d j ⊒ cq, j . By the induction hypothesis and monotonicity of f j, j , we have q ⊑ f j, j (cq,1 , . . . , cq, j−1 , cq, j ) ⊑ f j, j (d1 , . . . , d j−1 , d j ). Since the complete prime q ⊑ d j is arbitrary and DL,E is complete-prime algebraic, we have G q ⊑ f j, j (d1 , . . . , d j−1 , d j ). dj = q⊑d j Hence d j is a prefixed point of λy. f j, j (d1 , . . . , d j−1 , y). So d j ⊑ νy. f j, j (d1 , . . . , d j−1 , y). By the induction hypothesis and Lemma 19, we have p ⊑ f j, j (d1 , . . . , d j−1 , d j ) ⊑ f j, j (d1 , . . . , d j−1 , νy. f j, j (d1 , . . . , d j−1 , y)) = νy. f j, j (d1 , . . . , d j−1 , y) = g j (d1 , . . . , d j ). (Q j with α j = µ) Let ṽ · (p, X j) · (d1, . . . , dn ) be a play that conforms with S and starts from V0 . Given opponent nodes O1 , O2 ∈ VO , we write O1 ≻ O2 if there exists a play of the form e v · (p, X j ) · e v1 · O1 · e v2 · O2 49 that conforms with S such that every proponent node in e v1 or e v2 is of the form (q, X j ). Every play of the form ṽ · (p, X j ) · (d1 , . . . , dn ) · (p1 , X j ) · (c1,1 , . . . , c1,n ) · (p2 , X j ) · (c2,1 , . . . , c2,n ) . . . that conforms with S eventually terminates because S is a winning strategy and the priority of (pi , X j ) is odd (recall that opponent node Oi has priority 0). Hence the relation ≻ defined above is well-founded. We prove the following claim by induction on the well-founded relation ≻: Let ṽ · (p, X j) · (d1 , . . . , dn ) · ṽ1 · (c1 , . . . , cn ) be a play that conforms with S and starts from V0 . Suppose that every proponent node in ṽ1 is of the form (q, X j ). Then c j ⊑ µy. f j, j (d1 , . . . , d j−1 , y). It suffices to show that q ⊑ µy. f j, j (d1 , . . . , d j−1 , y) for every complete prime q ⊑ c j . Consider the play ṽ · (p, X j ) · (d1 , . . . , dn ) · ṽ1 · (c1 , . . . , cn ) · (q, X j ) · (c′1 , . . . , c′n ) that conforms with S and starts from V0 . Because S is stable and ṽ1 does not contain a node of the form (r, Xk ) with k < j, we have d1 = c1 = c′1 , . . . , d j−1 = c j−1 = c′j−1 . By the induction hypothesis of the above claim, c′j ⊑ µy. f j, j (d1 , . . . , d j−1 , y). By the induction hypothesis of the lemma, q ⊑ f j, j (c′1 , . . . , c′j−1 , c′j ). Hence q ⊑ f j, j (c′1 , . . . , c′j−1 , c′j ) ⊑ f j, j (c′1 , . . . , c′j−1 , µy. f j, j (d1 , . . . , d j−1 , y)) ⊑ f j, j (d1 , . . . , d j−1 , µy. f j, j (d1 , . . . , d j−1 , y)) = µy. f j, j (d1 , . . . , d j−1 , y). So q ⊑ µy. f j, j (d1 , . . . , d j−1 , y) for every complete prime q ⊑ c j and thus c j ⊑ µy. f j, j (d1 , . . . , d j−1 , y)). By the same argument, we have d j ⊑ µy. f j, j (d1 , . . . , d j−1 , y). This completes the proof of the above claim. By the induction hypothesis, the above claim and Lemma 19, we have p ⊑ f j, j (d1 , . . . , d j−1 , d j ) (induction hypothesis) ⊑ f j, j (d1 , . . . , d j−1 , µy. f j, j (d1 , . . . , d j−1 , y)) ⊑ µy. f j, j (d1 , . . . , d j−1 , y) = g j (d1 , . . . , d j−1 ) (the above claim) (Lemma 19). ⊔ ⊓ Lemma 23. If there exists a winning strategy of GL,E on an Opponent node (d1, . . . , dn ), there exists a stable winning strategy on a node (d′1 , . . . , d′n ) with d1 ⊑ d′1 , . . . , dn ⊑ d′n . Proof. Let S be a winning strategy on the node (d1 , . . . , dn ). Since GL,E is a parity game, we can assume without loss of generality that S is memoryless. Given 50 nodes v and v′ of the game and j ∈ { 1, . . . , n }, we say v′ is reachable from v following S if there exists a play vv1 . . . vℓ v′ that conforms with S. We say that v′ is j-reachable from v following S if furthermore, for every proponent node (p, Xi ) in v1 . . . vk , we have j < i. For every k = 1, . . . , n, let G d′k = dk ⊔ { ek | (e1 , . . . , en ) is reachable from (d1 , . . . , dn ) following S }. Obviously di ⊑ d′i . Let S′ be a partial function V ∗ VP ⇀ V defined by where c′k = G e v · (c1 , . . . , cn ) · (q, X j ) 7→ (c1 , . . . , c j−1 , c′j , . . . , c′n ) { ek | (e1 , . . . , en ) is j-reachable from (q, X j ) following S }. We show that S′ is indeed a strategy on (d′1 , . . . , d′n ). Let v0 = (d′1 , . . . , d′n ) and assume that v0 v1 . . . vℓ (ℓ > 0) is a play that conforms with S′ and ends with an opponent node vℓ ∈ VO (hence ℓ > 0 is even). Let vℓ = (c1 , . . . , cn ). We first prove that for every k = 1, . . . n, G ck ⊒ { ek | (e1 , . . . , en ) is k-reachable from vℓ−1 following S } by induction on ℓ > 0. Let vℓ−1 = (p, X j ). – If k ≥ j, then by the definition of S′ , G ck = { ek | (e1 , . . . , en ) is j-reachable from (p, X j ) following S } G ⊒ { ek | (e1 , . . . , en ) is k-reachable from (p, X j ) following S } because the k-reachable set is a subset of the j-reachable set. – If k < j, then ck is the k-th component of vℓ−2 by the definition of S′ . • If ℓ = 2, then G { ek | (e1 , . . . , en ) is reachable from (d1 , . . . , dn ) following S } ck = d′k = dk ⊔ G ⊒ { ek | (e1 , . . . , en ) is k-reachable from v1 following S } since v1 is reachable from (d1 , . . . , dn ) following S. • Assume that ℓ > 2. By the induction hypothesis for the subsequence v0 v1 . . . vℓ−2 , we have G ck ⊒ { ek | (e1 , . . . , en ) is k-reachable from vℓ−3 following S } G ⊒ { ek | (e1 , . . . , en ) is k-reachable from vℓ−1 following S } since vℓ−1 is k-reachable from vℓ−3 following S. 51 Let v0 · v1 · · · · · vℓ · (p, Xi ) be a play that conforms with S′ and starts from v0 = (d′1 , . . . , d′n ). Let (c1 , . . . , cn ) = S′ (v0 · v1 · · · · · vℓ · (p, Xi )) and (e1 , . . . , en ) = S( (p, Xi ) ). Since (e1 , . . . , en ) is reachable from (p, Xi ) following S, the above claim shows that em ⊑ cm for every 1 ≤ m ≤ n. Since p ⊑ ~ϕi ([X1 7→ e1 , . . . , Xn 7→ en ]), we have p ⊑ ~ϕi ([X1 7→ c1 , . . . , Xn 7→ cn ]). Hence S′ is indeed a strategy. By definition and the above claim, it is easy to see that S′ is a stable strategy. We show that the strategy S′ is winning on (d′1 , . . . , d′n ). Assume that v0 v1 . . . be an infinite play that conforms with S′ and starts from (d′1 , . . . , d′n ). Let j be the minimum index of variables appearing infinitely often in the play. Then the play can be split into e0 · (p1 , X j ) · w e1 · (c1,1 , . . . , c1,n ) · (p2 , X j ) · w e2 · (c2,1 , . . . , c2,n ) · (p3 , X j ) · . . . w where w̃k is a (possible empty) sequence of nodes, which furthermore consists of VO ∪ { (q, Xℓ ) | j < ℓ } if k ≥ 1. For every m = 1, 2, . . ., we have cm, j = G { e j | (e1 , . . . , en ) is j-reachable from (pm , X j ) following S } em . By the defsince j-th component of opponent nodes is unchanged during w inition of edges of the game, pm+1 ⊑ cm, j . Since pm+1 is a complete prime, there exists (e1 , . . . , en ) that is j-reachable from (pm , X j ) following S and such that e′m pm+1 ⊑ e j . By definition of j-reachability, there exists a sequence of nodes w ′ ′ e e such that (pm , X j ) · wm · (pm+1 , X j ) conforms with S. Furthermore wm consists of VO ∪ { (q, Xℓ ) | j < ℓ } if k ≥ 1. It is easy to see that (p1 , X j ) is reachable from v′0 = (d1 , . . . , dn ) following S. Hence we have a sequence e′0 · (p1 , X j ) · w e′1 · (p2 , X j ) · w e′2 · . . . v′0 · w that conforms with S and starts from v′0 = (d1 , . . . , dn ). Since S is winning on v′0 , this sequence satisfies the parity condition, i.e. the priority of X j is even. Hence the original play, which conforms with S′ , also satisfies the parity condition. ⊓ ⊔ We are now ready to prove soundness and completeness of the type-based characterization. Theorem 7. p ⊑ ~EL if and only if Proponent wins GL,E on (p, X1 ). Proof. (⇒) By Lemma 20, Proponent wins GL,E on (p, ⊥, . . . , ⊥). Since (p, ⊥, . . . , ⊥)· (p, X1 ) is a valid play, Proponent also wins on (p, X1 ). (⇐) If Proponent wins on (p, X1), then Proponent also wins on (q, X1 ) for every q ⊑ p. Hence Proponent wins on (p, ⊥, . . . , ⊥). By Lemma 23, we have a stable winning strategy S of GL,E on (d1 , . . . , dn ) with p ⊑ d1 . Then (d1 , . . . , dn ) · (p, X1 ) is a play that conforms with S and starts from (d1 , . . . , dn ). Hence, by Lemma 22, p ⊑ g1 (). By Lemma 19, we have g1 () = ~EL . Therefore, we have p ⊑ ~EL as required. ⊔ ⊓ 52 D.4 The Opposite Parity Game This subsection defines a game in which Proponent tries to disprove p ⊑ ~EL by giving an upper-bound ~EL ⊑ q. A similar construction can be found in Salvati and Walukiewicz [37]; our construction can be seen as an infinite variant of them. We first define the notion of complete coprimes, which is the dual of complete primes. Definition 17 (Complete coprime). Let (A, ≤) be a complete lattice.VAn element p ∈ A is a complete coprime if (1) p , ⊤ and (2) for every U ⊆ A, if ( x∈U x) ≤ p, then x ≤ p for some x ∈ U. Lemma 24. If (A, ≤) is complete-prime algebraic, then for every x ∈ A, V x = { p | x ≤ p, p: complete coprime }. V Proof. Obviously x ≤ { p | x ≤ p, p: complete coprime }. We show that x ≥ V { p | x ≤ p, p: complete coprime }. Since (A, ≤) is complete-prime algebraic, by Lemma 16, it suffices to show that, for every complete prime q such that q  x, V we have q  { p | x ≤ p, p: complete coprime }, i.e., there exists a complete coprime p ≥ x such that q  p. Let q be a complete prime such that q  x. We show that W p = { q′ | q  q′ , q′ : complete prime } is indeed a complete coprime p ≥ x such W that q  p. We first check q  p. If it were the case that q ≤ p, then q ≤ p = { q′ | q  q′ , q′ : complete prime }, which would imply q ≤ q′ for some q′ with q  q′ (as q is a complete prime), a contradiction. It remains toV check that p is a complete coprime. Since q  p, we have p , ⊤. Suppose that y∈U y ≤ p. If q ≤ y for every y ∈ U, then q ≤ p, a contradiction. Hence q  y for some y ∈ U. Now W y = { q′′ | q′′ ≤ y, q′′ : complete prime } W ′′ ≤ { q | q  q′′ , q′′ : complete prime } = p. Here the second inequality comes from the fact that q′′ ≤ y implies q  q′′ ; in fact, if q′′ ≤ y and q ≤ q′′ , then q ≤ q′′ ≤ y, hence a contradiction. ⊔ ⊓ Definition 18 (Opposite parity game). The parity game GL,E is defined by the following data: VP := { (p, Xi) | p ∈ DL,τi , p: complete coprime } VO := { (d1 , . . . , dn ) | d1 ∈ DL,τ1 , . . . , dn ∈ DL,τn } E := { ((p, Xi), (d1 , . . . , dn )) | p ⊒ ~ϕi ([X1 7→ d1 , . . . , Xn 7→ dn ]) } ∪ { ((d1, . . . , dn ), (p, Xi)) | p ⊒ di , p: complete coprime }. The priority of the opponent node is 0; the priority of node (p, Xi ) is 2(n − i) + 1 if αi = ν and 2(n − i) + 2 if αi = µ. 53 The game GL,E is obtained by replacing complete primes with complete coprimes and ⊑ with ⊒. The position (p, Xi ) is the state where Proponent ties to show that ~(E, Xi ) ⊑ p; to this end, Proponent picks a valuation [X1 7→ d1 , . . . , Xn 7→ dn ] such that (p ⊒ ~ϕi ([X1 7→ d1 , . . . , Xn 7→ dn ]). Opponent challenges the validity of the valuation [X1 7→ d1 , . . . , Xn 7→ dn ], by picking i and a complete coprime p′ such that p′ ⊒ di , and asking why ~(E, Xi ) ⊑ p′ holds. Lemma 25. If Proponent wins GL,E on (p, Xi ) (where p is a complete coprime), then for every complete prime p′ ∈ DL,τi such that p′ @ p, Opponent wins GL,E on (p′ , Xi ). Proof. Let S be a P-winning strategy of GL,E on (p, Xi ) (where p is a complete coprime). We can assume without loss of generality that S is memoryless. Let p′ ∈ DL,τi be a complete prime such that p′ @ p. Let (q, X j ) be a Proponent node in GL,E and (q′ , X j′ ) be a Proponent node in GL,E . We say that (q, X j ) is inconsistent with (q′ , X j′ ) if j = j′ and q′ @ q. Similarly, given Opponent nodes (d1 , . . . , dn ) in GL,E and (d′1 , . . . , d′n ) in GL,E , those nodes are inconsistent if d′j @ d j for some 1 ≤ j ≤ n. Let (p′ , Xi ) · v′1 · v′2 · · · · · v′k be a play of GL,E . This play is admissible (with respect to S) if there exists a play (p, Xi ) · v1 · v2 · · · · · vk of GL,E that conforms with S such that v j is inconsistent with v′j for every j ∈ {1, . . . , k}. For each admissible play (p′ , Xi ) · v′1 · v′2 · · · · · v′k of GL,E , we choose such a play (p, Xi ) · v1 · v2 · · · · · vk of GL,E . Suppose that our choice satisfies the following property: If (p, Xi )·v1 ·v2 ·· · ··vk is the chosen play corresponding to (p′ , Xi )·v′1 ·v′2 ·· · ·· v′k , then (p, Xi ) ·v1 ·v2 ·· · ··vk−1 is the chosen play for (p′ , Xi ) ·v′1 ·v′2 ·· · ··v′k−1 . (A way to achieve this is to introduce a well-ordering on nodes of GL,E and to choose the minimum play w.r.t. the lexicographic ordering from those that satisfy the requirement.) We define an Opponent strategy S for GL,E defined on admissible plays starting from (p′ , Xi ). Let (p′ , Xi ) · v′1 · v′2 · · · · · v′k · (d′1 , . . . , d′n ) be an admissible play of GL,E . Let (p, Xi ) · v1 · v2 · · · · · vk · (d1 , . . . , dn ) be the chosen play of GL,E corresponding to the above play. So v j and v′j are inconsistent for every j ∈ {1, . . . , k} and (d1 , . . . , dn ) is inconsistent with (d′1 , . . . , d′n ). By definition, d′ℓ @ dℓ for some 1 ≤ ℓ ≤ n. Since DL,τℓ is complete-prime algebraic, by Lemma 24, F d′ℓ = { q′ ∈ DL,τℓ | q′ ⊑ d′ℓ , q′ : complete prime } and dℓ =  { q ∈ DL,τℓ | dℓ ⊑ q, q: complete coprime }. 54 Hence d′ℓ @ dℓ implies that there exist a complete prime q′ ⊑ d′ℓ and a complete coprime dℓ ⊑ q such that q′ @ q. The Opponent strategy S chooses (q′ , Xℓ ) as the next node in GL,E . We show that S is indeed an O-strategy of GL,E on (p′ , Xi ). It suffices to show that every play (p′ , Xi ) · v′1 · · · · · v′k that conforms with the Opponent strategy S is admissible. If k = 0, the play is obviously admissible. Let (p′ , Xi ) · v′1 · · · · · v′k be a play that conforms with S and assume that it is admissible. If v′k is an Opponent node, the next node v′k+1 is determined by S and then (p′ , Xi ) · v′1 · · · · · v′k · v′k+1 is admissible by the definition of S. Consider the case that v′k = (p′k , Xik ) is an Proponent node. Since this play is admissible, we have the chosen play (p, Xi ) · v1 · v2 · · · · · vk of GL,E corresponding to the above play. Then v j and v′j are inconsistent for every j = 1, . . . , k. Since vk is inconsistent with v′k , vk = (pk , Xik ) with p′k @ pk . Let v′k+1 = (d′1 , . . . , d′n ) be an arbitrary Opponent node in GL,E such that (vk , vk+1 ) is valid in GL,E. Let vk+1 = (d1 , . . . , dn ) be the Opponent node in GL,E determined by S. By definition of edges, p′k ⊑ ~ϕi ([X1 7→ d′1 , . . . , Xn 7→ d′n ]) and ~ϕi ([X1 7→ d1 , . . . , Xn 7→ dn ]) ⊑ pk . Since ~ϕi  is monotone, d′j ⊑ d j for every j = 1, . . . , n would imply p′k ⊑ pk , a contradiction. Hence d′j @ d j for some 1 ≤ j ≤ n, that means, (d′1 , . . . , d′n ) is inconsistent with (d1 , . . . , dn ). Therefore the play (p, Xi ) · v1 · v2 · · · · · vk · (d′1 , . . . , d′n ) is admissible for every choice of (d′1 , . . . , d′n ). So S is defined for every play that conforms with S and starts from (p′ , Xi ). We show that S is O-winning. As S does not get stuck, it suffices to show that every infinite play following S does not satisfy the parity condition. Assume an infinite play (p′ , Xi ) · v′1 · (p′1 , Xi′1 ) · v′2 · (p′2 , Xi′2 ) · · · · · v′ℓ · (p′ℓ , Xi′ℓ ) · . . . following S. By the definition of S, every finite prefix of the play is admissible. Let (p′ , Xi ) · vk,1 · · · · · vk,k be the chosen play for the prefix of the above play of length k. Then, by the assumption on the choice, the choice of each node does not depend on the length of the prefix, i.e. vk,i = vk′ ,i for every i ≥ 1 and k, k′ ≥ i. Hence the above infinite play is “admissible” in the sense that there exists an infinite play in GL,E (p, Xi ) · v1 · (p1 , Xi1 ) · v2 · (p2 , Xi2 ) · · · · · vℓ · (pℓ , Xiℓ ) · . . . that conforms with S and such that (pℓ , Xiℓ ) and (p′ℓ , Xi′ℓ ) are inconsistent for every ℓ. Hence iℓ = i′ℓ for every ℓ. Because (priority of (pℓ , Xiℓ ) in GL,E ) = (priority of (p′ℓ , Xiℓ ) in GL,E ) + 1, the latter play satisfies the parity condition if and only if the former play does not satisfy the parity condition. Since S is a winning strategy, we conclude that the former play does not satisfy the parity condition. ⊔ ⊓ 55 E Proof for Section 7 E.1 Some definitions Here we introduce some notions and notations, which are useful in proofs of results of Section 7. Definition 19 (Choice sequences). Let π be an infinite sequence consisting of L and R, called a choice sequence. We define a reduction relation for pairs of terms and choice sequences by ǫ ǫ (t1 t2 ; Lπ) −→D (t1 ; π) (t1 t2 ; Rπ) −→D (t2 ; π) ℓ ℓ and (u; π) −→D (u′ ; π) if u , u1 u2 and u −→D u′ . We sometimes omit labels ℓ and just write (u; π)−→D (u′ ; π) for (u; π) −→D (u′ ; π). A choice sequence resolves nondeterminism of a program P; a reduction sequence is completely determined by its initial term, its length and a choice sequence. We write −→kD for the k-step reduction relation. If (t0 , π0 ) −→D (t1 , π1 ) −→D · · · −→D (tk , πk ), then we write π0 t0 −→D t1 −→D · · · −→D tk and say that the reduction sequence t0 −→D t1 −→D · · · −→D tk follows π0 . We introduce a slightly more elaborate notion of the recursive call relation below. Note that the relation f e t Dg e u in Definition 6 coincides with f e t Dg e u redefined below. Definition 20 (Recursive call relation, call sequences). Let P = (D, main) be ♯ xi = ui }1≤i≤n . We define D♯ := D ∪ { fi x̃ = ui }1≤i≤n where a program, with D = { fi e f1♯ , . . . , fn♯ are fresh symbols. So D♯ has two copies of each function symbol, one of which is marked. For the terms e ti and e t j that do not contain marked symbols, we write k+1 ′ t j ; π ) if ti ; π) D ( f j e ( fi e ♯ ♯ ′ ♯ ([e ti /e xi ][ f1 / f1 , . . . , fn / fn ]ui ; π) −→kD♯ ( f j e t j ; π′ ) (then e t j is obtained by erasing all the marks in e t′j ). If there exists a (finite or infinite) sequence ( f s̃; π) k2 k1 D (g1 ũ1 ; π1 ) k2 D (g2 ũ2 ; π2 ) k3 D · · ·, then we write π f s̃ k1 D k3 g1 ũ1 D g2 ũ2 D · · · and call it a call sequence of f s̃ following π. We often omit the number k j of steps and the choice sequence π. Given a program P = (D, main), the set of call sequences of P is a subset of (finite or infinite) sequences of function symbols u2 D · · · }. u1 D g2 e defined by Callseq(P) := { main g1 g2 · · · | main D g1 e k ti ; π) −→kD t j ; π′ ) implies ( fi e ti ; π) Note that by the definition above, ( fi e D ( fje t j ; π′ ). We write t♯ for the term obtained by marking all function symbols in ( fje t, i.e. [ f1♯ / f1 , . . . , fn♯ / fn ]t. 56 E.2 Existence of a unique infinite call-sequence Let P = (D, main) be a program and ℓ1 π ℓ2 main −→D t1 −→D · · · be the infinite reduction sequence following π. This subsection proves that there exists a unique infinite call-sequence π f ũ D g1 ũ1 D g2 ũ2 D ··· of this reduction sequence. Lemma 26. Let P = (D, main) be a program and π ∈ {L, R}ω be a choice sequence. Suppose we have an infinite reduction sequence π main −→D t1 −→D t2 −→D . . . . Then there exists an infinite call-sequence π main D g1 ũ1 D g2 ũ2 D ··· . Proof. Kobayashi and Ong [24, Appendix B] have proved a similar result for simply-typed programs without integers. We remove integers from D as follows: – First, replace each conditional branching if p(t′1 , . . . , t′k ) then t1 else t2 with the nondeterministic branching t1 t2 . – Then replace each integer expression with the unit value. Let us write D′ for the resulting function definitions. Then there exists a choice π′ such that π′ main −→D′ t′1 −→D′ t′2 −→D′ · · · and, for every i ≥ 1, t′i is obtained from ti by the above translation. By the result of Kobayashi and Ong, this sequence has an infinite call-sequence. This call-sequence can be transformed into a call-sequence of the original reduction sequence. ⊔ ⊓ We prove uniqueness. v; π′ ). Given an occurrence of g in f e u, we Suppose that ( f e u; π) −→kD (g e ′ e′ write f u for the term obtained by replacing the occurrence of g with g♯ . We say that the head-occurrence g in g e v is a copy of the occurrence of g in f e u if (f′ e u′ ; π) −→kD♯ (g♯ e v′ ; π). An occurrence of h in f e u is an ancestor of the headoccurrence of g in g e v if e1 ; π1 ) (f e u; π) −→kD0 (h1 w k1 D e2 ; π2 ) (h2 w k2 D ... kℓ D eℓ ; πℓ ) = (g e v; π′ ) (hℓ w P where ℓ ≥ 1, k = ℓj=0 k j and h1 is a copy of the occurrence of h in f e u (hence h1 = h as function symbols). It is not difficult to see that, given a reduction sequence (f e u; π) −→kD (g e v; π′ ), there exists a unique ancestor of g in f e u. 57 Lemma 27. For every term t and choice sequence π ∈ {L, R}ω, there exists at most one infinite call-sequence of t following π. Proof. Let π t0 −→D t1 −→D t2 −→D · · · be the infinite reduction sequence following π. In this proof, we shall consider only sequences following π and hence we shall omit π . Assume that there exist difference infinite call-sequences, say, t0 D g1 ũ1 D ··· D gk ũk D h1 ṽ1 D h2 ṽ2 D ··· t0 D g1 ũ1 D ··· D gk ũk D k1 w̃1 D k2 w̃2 D ··· and where h1 and k1 are different. Since both call sequences are infinite, the reduction sequence has infinite switching of the sequence, i.e. the reduction sequence must be of the following form: t0 −→∗D hi1 ṽi1 −→∗D k j1 w̃ j1 −→∗D hi2 ṽi2 −→∗D k j2 w̃ j2 −→∗D · · · . Since hi1 is not an ancestor of k j1 , an ancestor of k j1 must appear in ṽi1 , say, in the ℓ1 -th argument vi1 ,ℓ1 . Since k j1 appears in the reduction sequence, vi1 ,ℓ1 must have a head occurrence and the reduction sequence is of the form t0 −→∗D hi1 ṽi1 −→∗D vi1 ,ℓ1 s̃1 −→∗D k j1 w̃ j1 −→∗D hi2 ṽi2 −→∗D · · · . Since hi1 is an ancestor of hi2 , there is no ancestor of hi2 in ṽi1 , in particular, in vi1 ,ℓ1 . So an ancestor of hi2 must appear in s̃1 , say, s1,ℓ2 , and the reduction sequence is of the form t0 −→∗D hi1 ṽi1 −→∗D vi1 ,ℓ1 s̃1 −→∗D s1,ℓ2 s̃2 −→∗D hi2 ṽi2 −→∗D k j2 w̃ j2 −→∗D · · · . Since an ancestor of k j2 appears in vi1 ,ℓ1 , there is no ancestor in s̃1 , in particular, in s1,ℓ2 . Hence there is an ancestor of k j2 in s̃2 , say, s2,ℓ3 , and the reduction sequence is t0 −→∗D hi1 ṽi1 −→∗D vi1 ,ℓ1 s̃1 −→∗D s1,ℓ2 s̃2 −→∗D s2,ℓ3 s̃3 −→∗D k j2 w̃ j2 −→∗D hi3 ṽi3 −→∗D · · · . By repeatedly applying the above argument, we have the following decomposition of the reduction sequence: t0 −→∗D hi1 ṽi1 −→∗D vi1 ,ℓ1 s̃1 −→∗D s1,ℓ2 s̃2 −→∗D s2,ℓ3 s̃3 −→∗D s3,ℓ4 s̃4 −→∗D s4,ℓ5 s̃5 −→∗D · · · . Then the order of sm,ℓm is greater than sm+1,ℓm+1 for every m since sm+1,ℓm+1 is an argument of sm,ℓm . This contradicts the assumption that the program D is simply typed. ⊔ ⊓ Corollary 1. Let P = (D, main) be a program and π main −→D t1 −→D · · · be the infinite reduction sequence following π. Then there exists a unique infinite call-sequence of this reduction sequence, i.e. π main D g1 ũ1 58 D g2 ũ2 D ··· . E.3 Proof of Theorem 4 Let L0 = ({s⋆ }, ∅, ∅, s⋆) be the transition system with one state and no transition. This section shows that given a program P = (D, main) with priority Ω, |=csa (P, Ω) holds if and only if L0 |= Φ(P,Ω),csa . Without loss of generality, we assume below that P is of the form (D, main); note that, if P = (D, t), then we can replace it with (D ∪ {main = t}, main). Fix a program P = (D, main) with priority Ω. Suppose that D = { f1 x̃1 = t1 , . . . , fn x̃n = tn } and let κi be the simple type of fi . We can assume without loss of generality that main = f1 and that Ω( fi ) ≥ Ω( f j ) if i ≤ j. Let    2(n − i) Ω′ ( fi ) =   2(n − i) + 1 (if Ω( fi ) is even) (if Ω( fi ) is odd). The priority assignments Ω and Ω′ are equivalent in the sense that an infinite sequence g1 g2 . . . of function symbols satisfies the parity condition with respect to Ω if and only if so does to Ω′ . Hence we can assume without loss of generality that 2(n − i) ≤ Ω( fi ) ≤ 2(n − i) + 1. Given a type κ (resp. η) of the target language, we define a type κ†csa (resp. η†csa ) for HFLs as follows: ⋆†csa := • (η → κ)†csa := η†csa → κ†csa int†csa := int. Simply (−)†csa replaces ⋆ with •. The operation (−)†csa is pointwise extended for type environments by: (x1 : η1 , . . . , xℓ : ηℓ )†csa = x1 : η1 †csa , . . . , xℓ : ηℓ †csa Given an LTS L, let us define DL,κ := DL,κ†csa . Definition 21 (Semantic interpretation of a program). Let K ⊢ t :κ. A valuation of K is a mapping ρ such that dom(ρ) = dom(K ) and ρ(x) ∈ DL,K (x) for each x ∈ dom(K ). The set of valuations of K is ordered by the point-wise ordering. The interpretation of a type judgment K ⊢ t : η is a (monotonic) function from the valuations of K to DL,κ inductively defined by: ~K ⊢ ( ) : ⋆(ρ) := {s⋆ } ~K ⊢ x : κ(ρ) := ρ(x) ~K ⊢ n : int(ρ) := n ~K ⊢ t1 op t2 : int(ρ) := (~K ⊢ t1 : int(ρ))~op(~K ⊢ t2 : int(ρ))   ~K ⊢ t1 : ⋆(ρ) (if (~t′ (ρ), . . . , ~t′ (ρ)) ∈ ~p)  1 k ~K ⊢ if p(t′1 , . . . , t′k ) then t1 else t2 : ⋆(ρ) :=  ~K ⊢ t : ⋆(ρ) (if (~t′ (ρ), . . . , ~t′ (ρ)) < ~p)  2 1 k ~K ⊢ event a; t : ⋆(ρ) := ~K ⊢ t : ⋆(ρ) ~K ⊢ t1 t2 : κ(ρ) := (~K ⊢ t1 : η → κ(ρ))(~K ⊢ t2 : η(ρ)) ~K ⊢ t1 t2 : ⋆(ρ) := ~K ⊢ t1 : ⋆(ρ) ⊓ ~K ⊢ t2 : ⋆(ρ) ~K ⊢ λx.t : η → κ(ρ) := {(d, ~K , x : η ⊢ t : κ(ρ[x 7→ d])) | d ∈ DL,η }. 59 We often write just ~t for ~K ⊢ t : η (on the assumption that the simple type environment for t is implicitly determined). Lemma 28. ~K ⊢ t : ηL0 ([x1 7→ d1 , . . . , xn 7→ dn ]) = ~K †csa ⊢ t†csa : η†csa L0 ([x1 7→ d1 , . . . , xn 7→ dn ]). Proof. By induction on the structure of t. ⊔ ⊓ Completeness We show that |=csa (P, Ω) implies L0 |= Φ(P,Ω),csa . We use gamebased characterization of L0 |= Φ(P,Ω),csa . Definition 22 (Parity game for a program). The parity game GL,(P,Ω) is defined as follows: VP := { (p, fi ) | p ∈ DL,κi , p: complete prime } VO := { (d1 , . . . , dn ) | d1 ∈ DL,κ1 , . . . , dn ∈ DL,κn } E := { ((p, fi ), (d1, . . . , dn )) | p ⊑ ~λx̃i .ti ([ f1 7→ d1 , . . . , fn 7→ dn ]) } ∪ { ((d1, . . . , dn ), (p, fi )) | p ⊑ di , p: complete prime }. The priority of (d1 , . . . , dn ) is 0 and that of (p, fi ) is the priority Ω( fi ) of fi . Corollary 2. GL0 ,(P,Ω) is isomorphic to GL0 ,Φ(P,Ω),csa , i.e. there exists a bijection of nodes that preserves the owner and the priority of each node. Proof. The bijection on nodes is given by (d1 , . . . , dn ) ↔ (d1 , . . . , dn ) and (p, fi ) ↔ (p, fi ). This bijection preserves edges because of Lemma 28. ⊔ ⊓ We define a strategy of GL0 ,(P,Ω) on ({s⋆ }, f1 ) by inspecting the reduction sequences of P. The technique used here is the same as [23]. In this construction, we need to track occurrences of a function symbol or a term in a reduction sequence. This can be achieved by marking symbols and terms if needed as in Definition 6. In the sequel, we shall not introduce explicit marking and use the convention that, if the same metavariable appears in a reduction sequence (e.g. f u −→∗ u e v), then the first one is the origin of all others. The occurrence of t in t u1 . . . uk (k ≥ 0) is called a head occurrence. Given a head occurrence of t of a term reachable from main (i.e. main −→∗D t ũ for some ũ), we assign an element dt,ũ ∈ DL0 ,κ where κ is the simple type of t by induction on the order of κ. – Case e u is empty: Then t : ⋆ and we define dt,ǫ = {s⋆ }. – Case t ũ = t u1 . . . uk : Note that the order of u j (1 ≤ j ≤ k) is less than that of t. For every 1 ≤ j ≤ k, we define e j as follows. • Case u j : int: Then e j = ~u j . (Note that u j has no free variable and no function symbol.) • Case u j : κ: Let e j be the element defined by G ej = { du j ,ṽ | t ũ −→∗D u j ṽ }. 60 Then dt,ũ is the function defined by    {s⋆ } (if e j ⊑ x j for all j ∈ {1, . . . , k}) dt,ũ (x1 , . . . , xk ) :=   { } (otherwise). Note that dt,ũ is the minimum function such that dt,ũ (e1 , . . . , ek ) = {s⋆ }. Let θ = [s1 /x1 , . . . , sk /xk ] and assume main −→∗D (θt0 ) ũ. We define a mapping from function symbols and variables to elements of their semantic domains as follows. – For a function symbol fi : ρt0 ,ũ,θ ( fi ) = G { d fi ,ṽ | (θt0 )e u −→∗D fi ṽ, fi originates from t0 } – For a variable xi : int: ρt0 ,ũ,θ (xi ) = ~si  – For a variable xi : κ: G ρt0 ,ũ,θ (xi ) = { dsi,ṽ | (θt0 )e u −→∗D si ṽ, si originates from θ(xi ) }. Lemma 29. Let θ = [s1 /x1 , . . . , sk /xk ] and assume main −→∗D (θt0 ) ũ. Let v be an arithmetic expression (i.e. a term of type int) appearing in t0 . Then ~θv = ~v(ρt0 ,ũ,θ ). Proof. By induction on v. – Case v = xi : Then ~θxi  = ~si  = ρt0 ,ũ,θ (xi ) = ~xi (ρt0 ,ũ,θ ). – Case v = v1 opv2 : By the induction hypothesis, ~θv j  = ~v j (ρt0 ,ũ,θ ) for j = 1, 2. Then ~θ(v1 op v2 ) = ~θv1 ~op~θv2  = ~v1 (ρt0 ,ũ,θ )~op~v2 (ρt0 ,ũ,θ ) = ~v1 op v2 (ρt0 ,ũ,θ ). ⊔ ⊓ Lemma 30. Let θ = [s1 /x1 , . . . , sk /xk ] and assume main −→∗D (θt0 ) ũ. Then dθt0 ,ũ ⊑ ~t0 (ρt0 ,ũ,θ ). Proof. By induction on the structure of t0 . – Case t0 = ( ): Then ~t0  = {s⋆ } = d( ),ǫ . – Case t0 = xi for some 1 ≤ i ≤ k: Then (θt0 )ũ = si ũ. By definition, dsi ,ũ = ρt0 ,ũ,θ (xi ). – Case t0 = fi : Then (θt0 )ũ = fi ũ. Since this occurrence of fi originates from t0 , we have d fi ,ũ = ρt0 ,ũ,θ ( fi ). – Case t0 = n or t0 = t1 op t2 : Never occurs because the type of t0 must be of the form η1 → · · · → ηℓ → ⋆. 61 – Case t0 = if p(t′1 , . . . , t′k ) then t1 else t2 : Then ũ is an empty sequence. Assume that (~θt′1 , . . . , ~θt′k ) ∈ ~p. The other case can be proved in a similar manner. Then we have θt0 −→D θt1 . By definition, dθt0 ,ǫ = dθt1 ,ǫ = {s⋆ }. Here, −→+D is the transitive closure of −→D . Since every reduction sequence θt0 −→+D s ṽ can be factored into θt0 −→D θt1 −→∗D s ṽ, we have ρt0,ǫ,θ = ρt1 ,ǫ,θ . By the induction hypothesis, {s⋆ } ⊑ ~t1 (ρt1 ,ǫ,θ ). Hence {s⋆ } ⊑ ~t1 (ρt0 ,ǫ,θ ). By Lemma 29, ~θt′j  = ~t′j (ρt0 ,ũ,θ ) for every j = 1, . . . , k. Hence (~θt′1 , . . . , ~θt′k ) ∈ ~p implies (~t′1 (ρt0 ,ũ,θ ), . . . , ~t′k (ρt0 ,ũ,θ )) ∈ ~p. By definition, ~t0 (ρt0 ,ũ,θ ) = ~t1 (ρt0 ,ũ,θ ) ⊒ {s⋆ }. – Case t0 = event a; t: Then t0 has type ⋆ and ũ is the empty sequence. We have θt0 = event a; (θt). Since every reduction sequence θt0 −→+D s ṽ can be factored into θt0 −→D θt −→∗D s ṽ, we have ρt0 ,ǫ,θ = ρt,ǫ,θ . By definition, dθt0 ,ǫ = dθt,ǫ = {s⋆ } and ~t0 (ρt0 ,ǫ,θ ) = ~t(ρt0 ,ǫ,θ ) = ~t(ρt,ǫ,θ ). By the induction hypothesis, dθt,ǫ ⊑ ~t(ρt,ǫ,θ ). Hence dθt0 ,ǫ ⊑ ~t0 (ρt0 ,ǫ,θ ). – Case t0 = t1 t2 : Suppose that (θt1 )(θt2 )ũ −→∗D (θt2 ) ṽ. We first show that ρt2 ,ṽ,θ (x) ⊑ ρt1 t2 ,ũ,θ (x) for every x ∈ { f1 , . . . , fn } ∪ {x1 , . . . , xk }. • Case x = xi : int: Then ρt2 ,ṽ,θ (xi ) = ρt1 t2 ,ũ,θ (xi ) = ~si . • Case x = xi : κ: Then G ρt2 ,ṽ,θ (xi ) = { dsi ,w̃ | (θt2 ) ṽ −→∗D si w̃, si originates from θ(xi ) } G ⊑ { dsi ,w̃ | (θ(t1 t2 )) ũ −→∗D si w̃, si originates from θ(xi ) } = ρt1 t2 ,ũ,θ (xi ) because (θt2 ) ṽ −→∗D si w̃ (where si originates from θxi ) implies (θ(t1 t2 )) ũ −→∗D (θt2 )ṽ −→∗D si w̃ (where si originates from θxi ). • Case x = fi : G ρt2 ,ṽ,θ ( fi ) = { d fi ,w̃ | (θt2 ) ṽ −→∗D fi w̃, fi originates from t2 } G ⊑ { d fi ,w̃ | (θ(t1 t2 )) ũ −→∗D fi w̃, fi originates from t1 t2 } = ρt1 t2 ,ũ,θ ( fi ) because (θt2 ) ṽ −→∗D fi w̃ (where fi originates from t2 ) implies (θ(t1 t2 )) ũ −→∗D (θt2 )ṽ −→∗D fi w̃ (where fi originates from t1 t2 ). It is easy to see that ρt1 ,(θt2 ) ũ,θ ⊑ ρt1 t2 ,ũ,θ . By the induction hypothesis, dθt1 ,(θt2 ) ũ ⊑ ~t1 (ρt1 ,(θt2 ) ũ,θ ) ⊑ ~t1 (ρt1 t2 ,ũ,θ ). By the definition of dθt1 ,(θt2 ) ũ , G  {dθt2 ,ṽ | (θt1 ) (θt2 ) ũ −→∗D (θt2 )ṽ} = d(θt1 ) (θt2 ), ũ . dθt1 ,(θt2 ) ũ By the induction hypothesis, for every reduction sequence (θt1 ) (θt2 ) ũ −→∗D (θt2 )ṽ, we have dθt2 ,ṽ ⊑ ~t2 (ρt2 ,ṽ,θ ). Since ρt2 ,ṽ,θ (x) ⊑ ρt1 t2 ,ũ,θ (x) for every x, we have dθt2 ,ṽ ⊑ ~t2 (ρt2 ,ṽ,θ ) ⊑ ~t2 (ρt1 t2 ,ũ,θ ). 62 Because the reduction sequence (θt1 ) (θt2) ũ −→∗D (θt2 )ṽ is arbitrary, G  {dθt2 ,ṽ | (θt1 ) (θt2 ) ũ −→∗D (θt2 )ṽ} ⊑ ~t2 (ρt1 t2 ,ũ,θ ). Therefore, by monotonicity, G {dθt2 ,ṽ | (θt1 ) (θt2 ) ũ −→∗D (θt2 )ṽ}   ⊑ ~t1 (ρt1 t2 ,ũ,θ ) ~t2 (ρt1 t2 ,ũ,θ ) d(θt1 ) (θt2 ), ũ = dθt1 ,(θt2 ) ũ  = ~t1 t2 (ρt1 t2 ,ũ,θ ). – Case t0 = t1 t2 : Then ũ = ǫ. We have θt0 −→D θt1 and θt0 −→D θt2 . By the definition of dθt1 ,ǫ and the induction hypothesis, {s⋆ } = dθt1 ,ǫ ⊑ ~t1 (ρt1 ,ǫ,θ ). Similarly {s⋆ } = dθt2 ,ǫ ⊑ ~t2 (ρt2 ,ǫ,θ ). Because θt0 −→D θt1 , we have ρt1 ,ǫ,θ ⊑ ρt0 ,ǫ,θ . Similarly ρt2 ,ǫ,θ ⊑ ρt0 ,ǫ,θ . By monotonicity of interpretation, {s⋆ } = dθt1 ,ǫ ⊑ ~t1 (ρt1 ,ǫ,θ ) ⊑ ~t1 (ρt0 ,ǫ,θ ) and {s⋆ } = dθt2 ,ǫ ⊑ ~t2 (ρt2 ,ǫ,θ ) ⊑ ~t2 (ρt0 ,ǫ,θ ). Hence {s⋆ } ⊑ ~t1 (ρt0 ,ǫ,θ ) ⊓ ~t2 (ρt0 ,ǫ,θ ) = ~t0 (ρt0 ,ǫ,θ ). ⊔ ⊓ The strategy SP of GL0 ,P on ({s⋆ }, main) is defined as follows. Each play in the domain of SP ({s⋆ }, main) · O1 · (p1 , g1 ) · O2 · · · · · Ok · (pk , gk ) is associated with a call-sequence main m1 D g1 ũ1 m2 D g2 ũ2 m3 D ... mk−1 D gk−1 ũk−1 mk D gk ũk such that p j ⊑ d g j ,ũ j for every j = 1, 2, . . . , k. Let ξi be the finite sequence over mi {L, R} describing the choice made during gi−1 ũi−1 D gi ũi (where g0 ũ0 = main). The canonical associated call-sequence of the play is the minimum one ordered by the lexicographic ordering on (m1 , ξ1 , m2 , ξ2 , . . . , mk , ξk ). Assume that the above call-sequence is canonical. The next step of this reduction sequence is [ũk /x̃k ]t if (gk e xk = t) ∈ D. Let ϑ = [ũk /x̃k ]. In this situation, the strategy SP chooses (ρt,ǫ,ϑ ( f1 ), . . . , ρt,ǫ,ϑ ( fn )) as the next node. This is a valid choice, i.e.: 63 Lemma 31. pk ⊑ ~D(gk )([ f1 7→ ρt,ǫ,ϑ ( f1 ), . . . , fn 7→ ρt,ǫ,ϑ ( fn )]). Proof. By Lemma 30, we have: dϑt,ǫ = {s⋆ } ⊑ ~t(ρt,ǫ,ϑ ) = (~λe xk .t([ f1 7→ ρt,ǫ,ϑ ( f1 ), . . . , fn 7→ ρt,ǫ,ϑ ( fn )]))(ρt,ǫ,ϑ(e xk )). By definition, d gk ,ũk is the least element such that d gk ,ũk (ρt,ǫ,ϑ (e xk )) = {s⋆ }. Therefore d gk ,ũk ⊑ ~λe xk .t([ f1 7→ ρt,ǫ,ϑ ( f1 ), . . . , fn 7→ ρt,ǫ,ϑ ( fn )]). Since pk ⊑ d gk ,ũk , we have pk ⊑ d gk ,ũk ⊑ ~λx̃k .t([ f1 7→ ρt,ǫ,ϑ ( f1 ), . . . , fn 7→ ρt,ǫ,ϑ ( fn )]). ⊔ ⊓ Now we have a play ({s⋆ }, main) · O1 · (p1 , g1 ) · O2 · · · · · Ok · (pk , gk ) · (ρt,ǫ,θ ( f1 ), . . . , ρt,ǫ,θ ( fn )) associated with the call-sequence main m1 D g1 ũ1 m2 D g2 ũ2 m3 D ... mk−1 D gk−1 ũk−1 mk D gk ũk Let (pk+1 , gk+1 ) be the next opponent move. By definition of the game, G pk+1 ⊑ ρt,ǫ,θ (gk+1 ) = { d gk+1 ,ṽ | θt −→∗D gk+1 ṽ, gk+1 originates from t }. This can be more simply written as pk+1 ⊑ ρt,ǫ,θ (gk+1 ) = G { d gk+1 ,ṽ | gk e uk gk+1 e v }. Since pk+1 is a complete prime, pk+1 ⊑ d gk+1 ,ṽ for some ṽ with gk e uk we have an associated call-sequence main m1 D g1 ũ1 m2 D g2 ũ2 m3 D ... mk−1 D gk−1 ũk−1 mk D gk ũk gk+1 e v. Then mk+1 D gk+1 ũk+1 of ({s⋆ }, main) · O1 · (p1 , g1 ) · O2 · · · · · Ok · (pk , gk ) · (ρt,ǫ,θ ( f1 ), . . . , ρt,ǫ,θ ( fn )) · (pk+1 , gk+1 ). Lemma 32. SP is a winning strategy of GL0 ,(P,Ω) on ({s⋆ }, main) if every infinite call-sequence of P satisfies the parity condition. Proof. The above argument shows that SP is a strategy of GL0,(P,Ω) on ({s⋆ }, main). We prove that it is winning. Assume an infinite play ({s⋆ }, main) · v1 · (p1 , g1 ) · v2 · (p2 , g2 ) · . . . 64 that conforms with SP and starts from ({s⋆ }, main). Then each odd-length prefix is associated with the canonical call-sequence πk main mk,1 D uk,1 g1 e mk,2 D uk,2 g2 e mk,3 D ... mk,k D gk e uk,k . mk,i uk,i−1 D Let ξk,i be the sequence of {L, R} describing the choice made during gi−1 e ui . By the definitions of SP and canonical call-sequence (which is the minimum gi e with respect to the lexicographic ordering on (mk,1 , ξk,1 , . . . , mk,k , ξk,k )), a prefix of the canonical call-sequence is the canonical call-sequence of the prefix. In other words, kk,i = kk′ ,i and ξk,i = ξk′ ,i for every i ≥ 1 and k, k′ ≤ i. Let us write ki for ki,i = ki+1,i = · · · and e ui for e ui,i = e ui+1,i = · · ·. Let π = ξ1,1 ξ2,2 ξ3,3 . . .. Then we have π main m1 D u1 g1 e m2 D u2 g2 e m3 D .... Since every infinite call-sequence satisfies the parity condition, the infinite play is P-winning. ⊔ ⊓ Soundness The proof of soundness (i.e. L0 |= Φ(P,Ω),csa implies |=csa (P, Ω)) can be given in a manner similar to the proof of completeness. To show the contraposition, assume that there exists an infinite call-sequence that violates the parity condition. Let π be the choice of this call-sequence. We construct a strategy SP,π of the opposite game GL0 ,Φ(P,Ω),csa by inspecting the reduction sequence. Then, by Lemma 25, there is no winning strategy for GL0 ,Φ(P,Ω),csa , which implies L0 6|= Φ(P,Ω),csa by Theorem 7. Definition 23 (Opposite parity game for a program). The parity game GL,(P,Ω) is defined as follows: VP := { (p, fi ) | p ∈ DL,κi , p: complete coprime } VO := { (d1 , . . . , dn ) | d1 ∈ DL,κ1 , . . . , dn ∈ DL,κn } E := { ((p, fi ), (d1, . . . , dn )) | p ⊒ ~λx̃i .ti ([ f1 7→ d1 , . . . , fn 7→ dn ]) } ∪ { ((d1, . . . , dn ), (p, fi )) | p ⊒ di , p: complete coprime }. The priority of (d1 , . . . , dn ) is 0 and that of (p, fi ) is Ω( fi ) + 1. Corollary 3. GL0 ,(P,Ω) is isomorphic to GL0 ,Φ(P,Ω),csa , i.e. there exists a bijection of nodes that preserves the owner and the priority of each node. Proof. The bijection on nodes is given by (d1 , . . . , dn ) ↔ (d1 , . . . , dn ) and (p, fi ) ↔ (p, fi ). This bijection preserves edges because of Lemma 28. ⊔ ⊓ Let π0 ∈ {L, R}ω. Given a head occurrence of t of a term reachable from main following π0 (i.e. (main; π0 ) −→∗D (t ũ; π) for some ũ), we assign an element d¯t,ũ,π ∈ DL0 ,κ where κ is the simple type of t by induction on the order of κ. – Case e u is empty: Then t : ⋆ and we define d¯t,ǫ,π = { }. 65 – Case e u = u1 . . . uk : Then t ũ = t u1 . . . uk . Note that the order of u j (1 ≤ j ≤ k) is less than that of t. For every 1 ≤ j ≤ k, we define ē j as follows. • Case u j : int: Then ē j = ~u j . (Note that u j has no free variable and no function symbol.) • Case u j : κ: Let ē j be the element defined by  ē j = { d¯u j ,ṽ,π′ | (t ũ; π) −→∗D (u j ṽ; π′ ) }. (By the convention, u j in the right-hand side originates from the j-th argument of t.) Then d¯t,ũ,π is the function defined by    (if x̄ j ⊑ ē j for all j ∈ {1, . . . , k}) { } d¯t,ũ,π (x1 , . . . , xk ) :=   {s⋆ } (otherwise). Note that d¯t,ũ,π is the maximum function such that d¯t,ũ,π (ē1 , . . . , ēk ) = { }. Let θ = [s1 /x1 , . . . , sk /xk ] and assume (main; π0 ) −→∗D ((θt0 ) ũ; π). We define a mapping from function symbols and variables to elements of their semantic domains as follows. – For a function symbol fi :  ρ̄t0 ,ũ,θ,π ( fi ) = { d¯fi,ṽ,π′ | ((θt0 )e u; π) −→∗D ( fi ṽ; π′ ), fi originates from t0 } – For a variable xi : int: ρ̄t0 ,ũ,θ,π (xi ) = ~si  – For a variable xi : κ:  ρ̄t0 ,ũ,θ,π (xi ) = { d¯si,ṽ,π′ | ((θt0 )e u; π) −→∗D (si ṽ; π′ ), si originates from θ(xi ) }. Lemma 33. Let θ = [s1 /x1 , . . . , sk /xk ] and assume (main, π0 ) −→∗D ((θt0 ) ũ; π). Let v be an arithmetic expression (i.e. a term of type int) appearing in t0 . Then ~θv = ~v(ρ̄t0 ,ũ,θ,π). Proof. Similar to the proof of Lemma 29. ⊔ ⊓ Lemma 34. Let θ = [s1 /x1 , . . . , sk /xk ] and π0 ∈ {L, R}ω. Assume that the unique reduction sequence starting from (main; π0 ) does not terminate and that (main; π0 ) −→∗D ((θt0 ) ũ, π). Then d¯θt0 ,ũ,π ⊒ ~t0 (ρ̄t0 ,ũ,θ,π ). Proof. By induction on the structure of t0 . – Case t0 = ( ): This case never occurs since the reduction sequence does not terminate. – Case t0 = xi for some 1 ≤ i ≤ k: Then (θt0 )ũ = si ũ. By definition, d¯si ,ũ,π = ρ̄t0 ,ũ,θ,π (xi ). 66 – Case t0 = fi : Then (θt0 )ũ = fi ũ. Since this occurrence of fi originates from t0 , we have d¯fi ,ũ,π ⊒ ρ̄t0 ,ũ,θ,π ( fi ). – Case t0 = n or t1 op t2 : Never occurs because the type of t0 must be of the form η1 → · · · → ηℓ → ⋆. – Case t0 = if p(t′1 , . . . , t′k ) then t1 else t2 : Then ũ is the empty sequence. Assume that (~θt′1 , . . . , ~θt′k ) ∈ ~p. The other case can be proved by a similar way. Then we have (θt0 ; π) −→D (θt1 ; π). By definition, d¯θt0 ,ǫ,π = d¯θt1 ,ǫ,π = { }. Since every reduction sequence (θt0 ; π) −→+D (s ṽ; π′ ) can be factored into (θt0 ; π) −→D (θt1 ; π) −→∗D (s ṽ; π′ ), we have ρ̄t0 ,ǫ,θ,π = ρ̄t1 ,ǫ,θ,π. By the induction hypothesis, { } ⊒ ~t1 (ρ̄t1 ,ǫ,θ,π). Hence { } ⊒ ~t1 (ρ̄t0 ,ǫ,θ,π ). By Lemma 33, ~θt′j  = ~t′j (ρ̄t0 ,ũ,θ,π ) for every j = 1, . . . , k. Hence (~θt′1 , . . . , ~θt′k ) ∈ ~p implies (~t′1 (ρ̄t0 ,ũ,θ,π ), . . . , ~t′k (ρ̄t0 ,ũ,θ,π )) ∈ ~p. By definition, ~t0 (ρ̄t0 ,ũ,θ,π ) = ~t1 (ρ̄t0 ,ũ,θ,π ) ⊑ { }. – Case t0 = event a; t: Then t0 has type ⋆ and ũ is the empty sequence. We have θt0 = event a; (θt). Since every reduction sequence (θt0 ; π) −→+D (s ṽ; π′ ) can be factored into (θt0 ; π) −→D (θt; π) −→∗D (s ṽ; π′ ), we have ρ̄t0 ,ǫ,θ,π = ρ̄t,ǫ,θ,π . By definition, d¯θt0 ,ǫ,π = d¯θt,ǫ,π = { } and ~t0 (ρ̄t0 ,ǫ,θ,π ) = ~t(ρ̄t0 ,ǫ,θ,π ) = ~t(ρ̄t,ǫ,θ ). By the induction hypothesis, d¯θt,ǫ,π ⊒ ~t(ρ̄t,ǫ,θ,π ). Hence d¯θt0 ,ǫ,π ⊒ ~t0 (ρ̄t0 ,ǫ,θ,π ). – Case t0 = t1 t2 : Suppose that ((θt1 )(θt2 )ũ; π) −→∗D ((θt2 ) ṽ; π′ ). We first show that ρ̄t2 ,ṽ,θ,π′ (x) ⊒ ρ̄t1 t2 ,ũ,θ,π (x) for every x ∈ { f1 , . . . , fn } ∪ {x1 , . . . , xk }. • Case x = xi : int: Then ρ̄t2 ,ṽ,θ,π′ (xi ) = ρ̄t1 t2 ,ũ,θ,π (xi ) = ~si . • Case x = xi : κ: Then  { d¯si,w̃,π′′ | ((θt2 ) ṽ; π′ ) −→∗D (si w̃; π′′ ), si originates from θ(xi ) } ρ̄t2 ,ṽ,θ,π′ (xi ) =  ⊒ { d¯si,w̃,π′′ | ((θ(t1 t2 )) ũ; π) −→∗D (si w̃; π′′ ), si originates from θ(xi ) } = ρ̄t1 t2 ,ũ,θ,π (xi ) because ((θt2 ) ṽ; π′ ) −→∗D (si w̃; π′′ ) (where si originates from θ(xi )) implies ((θ(t1 t2 )) ũ; π) −→∗D ((θt2 )ṽ; π′ ) −→∗D (si w̃; π′′ ) (where si originates from θ(xi )). • Case x = fi :  { d¯fi,w̃,π′′ | ((θt2 ) ṽ; π′ ) −→∗D ( fi w̃; π′′ ), fi originates from t2 } ρ̄t2 ,ṽ,θ,π′ ( fi ) =  ⊒ { d¯fi,w̃,π′′ | ((θ(t1 t2 )) ũ; π) −→∗D ( fi w̃; π′′ ), fi originates from t1 t2 } = ρ̄t1 t2 ,ũ,θ,π ( fi ) because ((θt2 ) ṽ; π′ ) −→∗D ( fi w̃; π′′ ) (where fi originates from t2 ) implies ((θ(t1 t2 )) ũ; π) −→∗D ((θt2 )ṽ; π′ ) −→∗D ( fi w̃; π′′ ) (where fi originates from t1 t2 ). It is easy to see that ρ̄t1 ,(θt2 ) ũ,θ,π ⊒ ρ̄t1 t2 ,ũ,θ,π . By the induction hypothesis, d¯θt1 ,(θt2 ) ũ,π ⊒ ~t1 (ρ̄t1 ,(θt2 ) ũ,θ,π ) ⊒ ~t1 (ρ̄t1 t2 ,ũ,θ,π ). 67 By the definition of d¯θt1 ,(θt2 ) ũ,π ,   {d¯θt2 ,ṽ,π′ | ((θt1 ) (θt2 ) ũ; π) −→∗D ((θt2 )ṽ; π′ )} = d¯(θt1 ) (θt2 ), ũ,π . d¯θt1 ,(θt2 ) ũ,π By the induction hypothesis, for every reduction sequence ((θt1 ) (θt2 ) ũ; π) −→∗D ((θt2 )ṽ; π′ ), we have d¯θt2 ,ṽ,π′ ⊒ ~t2 (ρ̄t2 ,ṽ,θ,π′ ). Since ρ̄t2 ,ṽ,θ,π′ (x) ⊒ ρ̄t1 t2 ,ũ,θ,π′ (x) for every x, we have d¯θt2 ,ṽ,π′ ⊒ ~t2 (ρ̄t2 ,ṽ,θ,π′ ) ⊒ ~t2 (ρ̄t1 t2 ,ũ,θ,π ). Because the reduction sequence ((θt1 ) (θt2 ) ũ; π) −→∗D ((θt2 )ṽ; π) is arbitrary,   {d¯θt2 ,ṽ,π′ | ((θt1 ) (θt2 ) ũ; π) −→∗D ((θt2 )ṽ; π′ )} ⊒ ~t2 (ρ̄t1 t2 ,ũ,θ,π ). Therefore, by monotonicity of interpretation,   d¯(θt1 )(θt2 ), ũ,π = d¯θt1 ,(θt2 ) ũ,π {d¯θt2 ,ṽ,π′ | ((θt1 ) (θt2) ũ; π) −→∗D ((θt2 )ṽ; π′ )}   ⊒ ~t1 (ρ̄t1 t2 ,ũ,θ,π) ~t2 (ρ̄t1 t2 ,ũ,θ,π ) = ~t1 t2 (ρ̄t1 t2 ,ũ,θ,π ). – Case t0 = t1 t2 : Then ũ = ǫ. Assume that π = Lπ′ ; the other case can be proved similarly. Then we have (θt0 ; π) −→D (θt1 ; π′ ). By the definition of d¯θt1 ,ǫ,π′ and the induction hypothesis, { } = d¯θt1 ,ǫ,π′ ⊒ ~t1 (ρ̄t1 ,ǫ,θ,π′ ). Because (θt0 ; π) −→D (θt1 ; π′ ), we have ρ̄t1 ,ǫ,θ,π′ ⊒ ρ̄t0 ,ǫ,θ,π. By monotonicity of interpretation, { } = d¯θt1 ,ǫ,π′ ⊒ ~t1 (ρ̄t1 ,ǫ,θ,π′ ) ⊒ ~t1 (ρ̄t0 ,ǫ,θ,π). Hence { } ⊒ ~t1 (ρ̄t0 ,ǫ,θ,π ) ⊓ ~t2 (ρ̄t0 ,ǫ,θ,π) = ~t0 (ρ̄t0 ,ǫ,θ,π ). ⊔ ⊓ The strategy SP,π0 of GL0 ,P on ({s⋆ }, main) is defined as follows. Each play in the domain of S ({s⋆ }, main) · O1 · (p1 , g1 ) · O2 · · · · · Ok · (pk , gk ) is associated with a call-sequence (main; π0 ) m1 D (g1 ũ1 ; π1 ) m2 D (g2 ũ2 ; π2 ) m3 D ... mk−1 D (gk−1 ũk−1 ; πk−1 ) mk D (gk ũk ; πk ) such that p j ⊒ d¯g j ,ũ j for every j = 1, 2, . . . , k. The canonical associated call-sequence of the play is the minimum one ordered by the lexicographic ordering of reduction steps (m1 , m2 , . . . , mk ). Assume that the above call-sequence is canonical. The next step of this reduction sequence is ([ũk /x̃k ]t; πk ) if (gk e xk = t) ∈ D. Let ϑ = [ũk /x̃k ]. In this situation, the strategy SP,π chooses (ρ̄t,ǫ,ϑ,πk ( f1 ), . . . , ρ̄t,ǫ,ϑ,πk ( fn )) as the next node. This is a valid choice, i.e.: 68 Lemma 35. pk ⊒ ~D(gk )([ f1 7→ ρ̄t,ǫ,ϑ,πk ( f1 ), . . . , fn 7→ ρ̄t,ǫ,ϑ,πk ( fn )]). Proof. By Lemma 34, we have: d¯ϑt,ǫ,πk = { } ⊒ ~t(ρ̄t,ǫ,ϑ,πk ) = ~λe xk .t([ f1 7→ ρ̄t,ǫ,ϑ,πk ( f1 ), . . . , fn 7→ ρ̄t,ǫ,ϑ,πk ( fn )])(ρ̄t,ǫ,ϑ,π(e xk )). By definition, d¯gk ,ũk ,πk is the greatest element such that d¯gk ,ũk ,πk (ρ̄t,ǫ,ϑ,π (e xk )) = { }. Therefore d¯gk ,ũk ⊒ ~λe xk .t([ f1 7→ ρ̄t,ǫ,ϑ,πk ( f1 ), . . . , fn 7→ ρ̄t,ǫ,ϑ,πk ( fn )]). Since pk ⊒ d¯gk ,ũk ,πk , we have pk ⊒ d¯gk ,ũk ,πk ⊒ ~λx̃k .t([ f1 7→ ρ̄t,ǫ,ϑ,πk ( f1 ), . . . , fn 7→ ρ̄t,ǫ,ϑ,πk ( fn )]). ⊔ ⊓ Now we have a play ({s⋆ }, main) · O1 · (p1 , g1 ) · O2 · · · · · Ok · (pk , gk ) · (ρ̄t,ǫ,θ,πk ( f1 ), . . . , ρ̄t,ǫ,θ,πk ( fn )) associated with the call sequence (main; π0 ) m1 D (g1 ũ1 ; π1 ) m2 D (g2 ũ2 ; π2 ) m3 D ... mk−1 D (gk−1 ũk−1 ; πk−1 ) mk D (gk ũk ; πk ) Let (pk+1 , gk+1 ) be the next opponent move. By definition of the game,  pk+1 ⊒ ρ̄t,ǫ,θ,π (gk+1 ) = { d¯gk+1 ,ṽ,π | (θt; πk ) −→∗P (gk+1 ṽ; π), gk+1 originates from t }  = { d¯gk+1 ,ṽ,π | (gk ũk ; πk ) D (gk+1 ṽ; π) }. Since pk+1 is a complete coprime, pk+1 ⊒ d¯gk+1 ,ṽ,π for some ṽ and π with (gk ũk ; πk ) D (gk+1 ṽ; π). Hence we have an associated call-sequence (main; π0 ) m1 D (g1 ũ1 ; π1 ) m2 D (g2 ũ2 ; π2 ) m3 D ... mk D (gk ũk ; πk ) mk+1 (gk+1 ũ; π) of ({s⋆ }, main)·O1 ·(p1 , g1 )·O2 ·· · ··Ok ·(pk , gk )·(ρ̄t,ǫ,θ,πk ( f1 ), . . . , ρ̄t,ǫ,θ,πk ( fn ))·(pk+1 , gk+1 ) as desired. Lemma 36. If the (unique) call sequence following π0 does not satisfy the parity condition, then SP,π0 is an winning strategy of GL0 ,(P,Ω) on ({}, main). Proof. The above argument shows that SP,π0 is a strategy of GL0 ,(P,Ω) on ({}, main). We prove that this is winning. Assume an infinite play ({}, main) · v1 · (p1 , g1 ) · v2 · (p2 , g2 ) · . . . 69 that conforms with SP,π and starts from ({s⋆ }, main). Then each odd-length prefix is associated with the canonical call-sequence (main; π0 ) km,1 D um,1 ; πm,1 ) (g1 e km,2 D um,2 ; πm,2 ) (g2 e km,3 D ... km,m D um,m ; πm,m ). (gm e By the definitions of SP,π0 and canonical call-sequence (which is the minimum with respect to the lexicographic ordering on (km,1 , . . . , km,m )), a prefix of the canonical call-sequence is the canonical call-sequence of the prefix. In other words, km,i = km′ ,i for every i ≥ 1 and m, m′ ≥ i. Since the reduction sequence is completely determined by a choice π0 , the initial term main and the number of steps, we have πm,i = πm′ ,i for every i ≥ 1 and m, m′ ≥ i. Let us write ki for ki,i = ki+1,i = · · ·, e ui for e ui,i = e ui+1,i = · · · and πi for πi,i = πi+1,i = · · ·. Now we have an infinite call-sequence π0 main k1 D u1 g1 e k2 D u2 g2 e k3 D ... following π0 . By Corollary 1, this is the unique call-sequence following π0 . Hence, by the assumption, this infinite call-sequence does not satisfy the parity condition. This means that this play is P-winning (recall the definition of the priorities of GL0 ,(P,Ω) ). ⊔ ⊓ Proof (Proof of Theorem 4). We prove the following result: |=csa (P, Ω) if and only if L0 |= Φ(P,Ω),csa . (⇒) Suppose that |=csa (P, Ω). Then by Lemma 32, there exists a winning strategy of GL0 ,(P,Ω) on ({s⋆ }, main). Then by Corollary 2, there also exists a winning strategy of GL0 ,Φ(P,Ω),csa on ({s⋆ }, main). By Theorem 7, this implies s⋆ ∈ ~Φ(P,Ω),csa . By definition, L0 |= Φ(P,Ω),csa . (⇐) We prove the contraposition. Suppose that |=csa (P, Ω) does not hold. Then there exist a choice π0 and an infinite call-sequence following π0 that does not satisfy the parity condition. Then by Lemma 36, SP,π0 is a winning strategy of GL0 ,(P,Ω) on ({}, main). By Corollary 3, there also exists a winning strategy of GL0 ,Φ(P,Ω),csa on ({}, main). Then by Lemma 25, Opponent wins GL0 ,Φ(P,Ω),csa on ({s⋆ }, main). Hence by Theorem 7, s⋆ < ~Φ(P,Ω),csa . ⊔ ⊓ E.4 Proof of Theorem 5 Assume a total order on the set of states of the automaton A, fixed in the sequel. Recall (IT-Event) rule in Fig. 6: δ(q, a) = {q1 , . . . , qn } Γ ↑ Ω(qi ) ⊢A t : qi ⇒ t′i (for each i ∈ {1, . . . , n}) Γ ⊢A (event a; t) : q ⇒ (event a; t′1  · · · t′n ) (IT-Event) Since the order of t′1 , . . . , t′n is not important, we can assume without loss of generality that q1 < q2 < · · · < qn holds for every instance of the above rule used in a derivation. 70 Here we prove Theorem 5 for the translation using the following rule IT-Event’ instead of IT-Event. δ(q, a) = {q1 , . . . , qn } Γ ↑ Ω(qi ) ⊢A t : qi ⇒ t′i q1 < q2 < · · · < qn (for each i ∈ {1, . . . , n}) Γ ⊢A (event a; t) : q ⇒ (event a; t′1  · · · t′n ) (IT-Event’) V Notations Given an intersection type ρ = 1≤i≤k (θi , mi ) and a variable x, we abbreviate the sequence xθ1 ,m1 xθ2 ,m2 . . . xθk ,mk as dup(x, ρ). For ρ = int, we write dup(x, ρ) for xint. V For an intersection type ρ = 1≤i≤k (θi , mi ), we write [x : ρ] for the intersection type environment {x : (θi , mi , 0) | 1 ≤ i ≤ k}. If ρ = int, [x : ρ] means {x : int}. Similarly, for a top-level environment Ξ, we write [Ξ] to mean {x : (θ, m, 0) | x : (θ, m) ∈ Ξ}. Given an intersection type environment Γ, we write Γ♯ for {x♯ : (θ, m, m′) | x : (θ, m, m′) ∈ Γ} ∪ {x♯ : int | x : int ∈ Γ}. Similarly, for a top-level environment Ξ, we write Ξ♯ for {x♯ : (θ, m) | x : (θ, m) ∈ Ξ}. For an intersection type environment Γ and a top-level environment Ξ, we write Γ ⊳ Ξ if f : (θ, m) ∈ Ξ for each ( f : (θ, m, m′ )) ∈ Γ. Modified type-based translation Given programs P and P′ with Ξ ⊢A P ⇒ (P′ , Ω), the first step to prove Theorem 5 is to compare reduction sequences of P and P′ . There is a little gap between reduction sequences of P and P′ since a reduction sequence of P′ expresses a reduction sequence of P together with a run of A over the events generated by the reduction sequence of P. In particular a nondeterministic branch in t′ comes from either – a non-deterministic branch t1 t2 in P, or – non-determinism of the transition rule of the automaton A. To fill the gap, we shall distinguish between the two kinds of non-deterministic branches, by using ◦ for the latter. Formally let us introduce a new binary construct ◦ to the syntax of terms. Here we use the convention that  and ◦ are right associative, i.e. t1 t2 t3 (resp. t1 ◦ t2 ◦ t3 ) means t1 (t2 t3 ) (resp. t1 ◦ (t2 ◦ t3 )). The operational behavior of ◦ is the same as that of , i.e., ǫ ǫ (t1 ◦ t2 ; Lπ) −→D (t1 ; π) (t1 ◦ t2 ; Rπ) −→D (t2 ; π) where π ∈ {L, R}ω is a choice sequence. Hence we have a ((event a; (t1 ◦ . . . ◦ tn )); R . . . R Lπ) −→∗D (ti ; π) |{z} i−1 for 1 ≤ i < n and a ((event a; (t1 ◦ . . . ◦ tn )); R . . . R π) −→∗D (tn ; π). |{z} n−1 71 δ(q, a) = {q1 , . . . , qn } (q1 < q2 < · · · < qn ) Γ ↑ Ω(qi ) ⊢A t : qi ⇛ t′i (for each i ∈ {1, . . . , n}) Γ ⊢A (event a; t) : q ⇛ (event a; t′1 ◦ · · · ◦ t′n ) (IT-Event-Alt) Fig. 9. Modified type-based transformation rules. Other rules are obtained by replacing ⇒ with ⇛ in the rules in Figure 6 except for (IT-Event). Definition 24 (Modified type-based transformation). The modified type-based transformation judgment Γ ⊢A t : θ ⇛ t′ is a quadruple where t is a term without ◦ and t′ is a term possibly having ◦. The modified type-based transformation relation is defined by the rules in Fig. 9. The translation ⊢A P ⇛ (P′ , Ω) of programs is defined in the same way as ⊢A P ⇒ (P′ , Ω). The next lemma establishes the connection between the original and modified transformations. Given a program P′ with ◦, we write [/◦]P′ for the program obtained by replacing ◦ with . Lemma 37. If Ξ ⊢A P ⇛ (P′ , Ω), then Ξ ⊢A P ⇒ ([/◦]P′, Ω). Conversely, if Ξ ⊢A P ⇒ (P′ , Ω), then there exists P′′ such that Ξ ⊢A P ⇛ (P′′ , Ω) and P′ = [/◦]P′′ . ⊔ ⊓ Proof. Straightforward induction. Suppose that Ξ ⊢A P ⇛ (P′ , Ω). Since P′ simulates both P and the automaton A, an infinite reduction sequence of P′ induces a pair of an infinite event sequence e ℓ and a run R of A over e ℓ. Definition 25 (Induced event sequence and run). Let D′ be a function definition e ℓ,R (s′ , π′ , q′ ), meaning that the possibly containing ◦. The reduction relation (s, π, q) −→N D′ N-step reduction following π from s to s′ generates events e ℓ associated with a run qR ending with q′ , is defined by the following rules. ǫ ′ ′ (s, π) −→N D′ (s , π ) ǫ,ǫ (s, π, q) −→N (s′ , π′ , q) D′ δ(q, a) = {q1 , . . . , qn } (q1 < q2 < · · · < qn ) e ℓ,R (si , π, qi ) −→N (s′ , π′ , q′ ) D′ ae ℓ,qi R (event a; (s1 ◦ . . . ◦ sn ), R . . . R Lπ, q) −→ N+i+1 (s′ , π′ , q′ ) D′ |{z} i−1 δ(q, a) = {q1 , . . . , qn } (q1 < q2 < · · · < qn ) e ℓ,R (sn , π, qn ) −→N (s′ , π′ , q′ ) D′ ae ℓ,qn R (s′ , π′ , q′ ) (event a; (s1 ◦ . . . ◦ sn ), R . . . R π, q) −→ N+n D′ |{z} n−1 72 e ℓ1 ,R1 e ℓ2 ,R2 1 2 If (s0 , π0 , q0 ) −→N (s1 , π1 , q1 ) −→N . . ., we write π0 D′ D′ e ℓ1 ,R1 If the number of steps (resp. π) is not important, we write as π e ℓ,R e ℓ2 ,R2 1 2 (s0 , q0 ) −→N (s1 , q1 ) −→N . . .. D′ D′ e ℓ,R (s, q) −→∗D′ (s′ , q′ ) e ℓ,R (resp. (s, q)−→N (s′ , q′ )). Other notations such as (s, q)−→∗D′ (s′ , q′ ) are defined similarly. D′ e ℓ,R It is easy to show that, if (s, q) −→∗D′ (s′ , q′ ), then qR is a run of A over e ℓ. Obviously π e ℓ,R e ℓ (s, q) −→∗D′ (s′ , q′ ) implies π s −→∗D′ s′ . As proved later in e ℓ Lemma 41, the converse also holds: Given state q and s −→∗D′ s′ (with a mild e ℓ,R condition), there exist R and q′ such that (s, q) −→∗D′ (s′ , q′ ). Basic properties of the type system and transformation We prove Weakening Lemma and Substitution Lemma. Lemma 38 (Weakening). If Γ ⊢A t : θ ⇛ t′ and Γ ⊆ Γ′ , then Γ′ ⊢A t : θ ⇛ t′ . Proof. Straightforward induction on structure of the derivations. We discuss only one case below. – Case for IT-Event-Alt: Then we have θ=q δ(q, a) = {q1 , . . . , qn } t = event a; s t′ = event a; (s′1 ◦ . . . ◦ s′n ) ∀i ∈ {1, . . . , n}.Γ ↑ Ω(qi ) ⊢A s : θ ⇛ s′i . Since Γ ⊆ Γ′ , for each i ∈ {1, . . . , n}, we have Γ ↑ Ω(qi ) ⊆ Γ′ ↑ Ω(qi ). By the induction hypothesis, ∀i ∈ {1, . . . , n}.Γ′ ↑ Ω(qi ) ⊢A s : θ ⇛ s′i . By using IT-Event-Alt, we obtain Γ′ ⊢A t : θ ⇛ t′ . ⊔ ⊓ In order to simplify the statement V of the substitution lemma, we introduce the following abbreviation. For ρ = 1≤i≤l (θi , mi ), we write Γ ⊢A t : ρ ⇛ e s def ⇔ ∀i ∈ {1, . . . , l}.Γ ↑ mi ⊢A t : θi ⇛ si . where e s = s1 s2 . . . sl . If ρ = int, the judgment Γ ⊢A t : ρ ⇛ e s has the obvious meaning (in this case, e s is of length 1). By using this notation, the application rule can be simply written as Γ ⊢A t1 : ρ → θ ⇛ t′1 Γ ⊢A t 2 : ρ ⇛ e t′2 Γ ⊢A t1 t2 : θ ⇛ t′1 e t′2 73 Lemma 39 (Substitution). Assume that Γ ⊢A u : ρ ⇛ e u′ ((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ⊢A t : θ ⇛ t′ (x < dom(Γ)). Then (Γ ↑ n) ∪ Γ′ ⊢A [u/x]t : θ ⇛ [e u′ /dup(x, ρ)]t′. Proof. The proof proceeds by induction on the derivation of ((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ⊢A t : θ ⇛ t′ , with case analysis on the last rule used. – Case for IT-Var: The V case where t , x is trivial. Assume that t = x. The type ρ is either int or 1≤i≤l (θi , mi ). The former case is easy; we prove the latter case. V Assume that ρ = 1≤i≤l (θi , mi ). Since ((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ⊢A x : θ ⇛ t′ , there exists k ∈ {1, . . . , l} such that θ = θk , t′ = xθk ,mk and n = mk . By the assumption Γ ⊢A u : ρ ⇛ e u′ , we have Γ ↑ mk ⊢A u : θk ⇛ u′k . Since [u/x]x = u ′ and [e u /dup(x, ρ)]xθk,mk = u′k , we have Γ ↑ mk ⊢A [u/x]x : θk ⇛ [ue′ /dup(x, ρ)]xθk,mk . By Weakening (Lemma 38), we have (Γ ↑ mk ) ∪ Γ′ ⊢A [u/x]x : θk ⇛ [ue′ /dup(x, ρ)]xθk,mk . as required. – Case for IT-Event-Alt: Then t = event a; t1 and we have θ=q δ(q, a) = {q1 , . . . , qk } q1 < q2 < · · · < qk ′ t = event a; (t′1 ◦ . . . ◦ t′k ) ∀j ∈ {1, . . . , k}.(((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ) ↑ Ω(q j ) ⊢A t1 : q j ⇛ t′j . For each j ∈ {1, . . . , k}, we have (((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ) ↑ Ω(q j ) = ((Γ ∪ [x : ρ]) ↑ n ↑ Ω(q j )) ∪ (Γ′ ↑ Ω(q j )) ((Γ ↑ n) ∪ Γ′ ) ↑ Ω(q j ) = (Γ ↑ n ↑ Ω(q j )) ∪ (Γ′ ↑ Ω(q j )). Thus, one can apply the induction hypotheses, obtaining ∀j ∈ {1, . . . , k}.((Γ ↑ n) ∪ Γ′ ) ↑ Ω(q j ) ⊢A [u/x]t1 : q j ⇛ [ue′ /dup(x, ρ)]t′j. By using IT-Event-Alt, we have the following as required: (Γ ↑ n) ∪ Γ′ ⊢A [u/x](event a; t1 ) : q ⇛ [ue′ /dup(x, ρ)](event a; (t′1 ◦ . . . ◦ t′k )). 74 – Case for IT-App: Then t = t1 t2 and we have t′ = t′1 t′2,1 . . . t′2,k ((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ⊢A t1 : ^ (θ′j , m′j ) → θ ⇛ t′1 1≤ j≤k ∀j ∈ {1, . . . , k}.(((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ) ↑ m′j ⊢A t2 : θ′j ⇛ t′2, j . By the induction hypothesis, we have ^ (Γ ↑ n) ∪ Γ′ ⊢A [u/x]t1 : (θ′j , m′j ) → θ ⇛ [ue′ /dup(x, ρ)]t′1 1≤ j≤k ′ ∀j ∈ {1, . . . , k}.((Γ ↑ n) ∪ Γ ) ↑ m′j By using IT-App, we obtain: ⊢A [u/x]t2 : θ′j ⇛ [ue′ /dup(x, ρ)]t′2, j. (Γ ↑ n) ∪ Γ′ ⊢A [u/x](t1 t2 ) : θ ⇛ [ue′ /dup(x, ρ)](t′1 t′2,1 . . . t′2,k ) as required. – Case for IT-Abs: Then t = λy.s and we have ^ θ= (θ′j , m′j ) → θ′0 t′ = λyθ′1 ,m′1 . . . yθ′k ,m′k .s′ 1≤ j≤k ((Γ ∪ [x : ρ]) ↑ n) ∪ Γ′ ∪ [y : y < dom((Γ ∪ [x : ρ]) ↑ n) ^ (θ′j , m′j )] ⊢A s : θ′0 ⇛ s′ 1≤ j≤k By the induction hypothesis, we have ^ (Γ ↑ n) ∪ Γ′ ∪ [y : (θ′j , m′j )] ⊢A [u/x]s : θ′0 ⇛ [ue′ /dup(x, ρ)]s′. 1≤ j≤k By using IT-Abs, we obtain: ^ (Γ ↑ n) ∪ Γ′ ⊢A [u/x]λy.s : (θ′j , m′j ) → θ′0 ⇛ [ue′ /dup(x, ρ)]λyθ′1,m′1 . . . yθ′k ,m′k .s′ 1≤ j≤k as required. ⊔ ⊓ Simulations in both directions Given Ξ ⊢A P ⇛ (P′ , Ω), we show that the following two data are equivalent: 1. A reduction sequence of P together with a run of A over the generated event sequence. 2. A reduction sequence of P′ . We first prove the direction (1) ⇒ (2). Lemma 40. Assume 75 – Ξ ⊢A D ⇛ D ′ , – Γ ⊢A t : q ⇛ s, – Γ ⊳ Ξ, and e ℓ – t −→∗D t′ . Let qR be an arbitrary run of A over e ℓ and q′ be the last state of qR. Then there exist a ′ ′ term s and a type environment Γ ⊳ Ξ such that e ℓ,R (s, q) −→∗D′ (s′ , q′ ) and Γ′ ⊢A t′ : q′ ⇛ s′ . e ℓ Proof. By induction on the length of the reduction sequence t −→∗D t′ . The claim trivially holds if the length is 0; we assume that the length is not 0. The proof proceeds by case analysis on the shape of t. e ℓ – Case t = event a; t1 : Then the reduction sequence t −→∗D t′ is of the form e ℓ′ a event a; t1 −→D t1 −→∗D t′ with e ℓ = aℓe′ . Since the last rule used to derive Γ ⊢A t : q ⇛ s is IT-Event-Alt, we have: δ(q, a) = {q1 , . . . , qk } ∀i ∈ {1, . . . , k}.Γ ↑ Ω(qi ) ⊢A t1 : qi ⇛ si (q1 < q2 < · · · < qk ) s = event a; (s1 ◦ . . . ◦ sk ). Since qR is a run over e ℓ = ae ℓ′ , it must be of the form qR = qqi R′ for some 1 ≤ i ≤ k, where qi R′ is a run over e ℓ′ . By applying the induction hypothesis e ℓ′ to t1 −→∗D t′ , there exists s′ such that e ℓ′ ,R′ Γ′ ⊢A t′ : q′ ⇛ s′ (si , qi ) −→∗D′ (s′ , q′ ) for some Γ′ ⊳ Ξ. Then we have a,qi e ℓ′ ,R′ (event a; (s1 ◦ . . . ◦ sk ), q) −→∗D′ (si , qi ) −→∗D′ s′ . ǫ e ℓ – Case t = t1 t2 : Suppose that the reduction sequence is t −→D t1 −→∗D t′ ; the ǫ e ℓ case that t −→D t2 −→∗D t′ can be proved similarly. Since the last rule used to derive Γ ⊢A t : q ⇛ s is IT-NonDet, we have: s = s1 s2 Γ ⊢A t1 : q ⇛ s1 76 Γ ⊢A t2 : q ⇛ s2 e ℓ By applying the induction hypothesis to t1 −→∗D t′ , we have s′ such that e ℓ,R Γ′ ⊢A t′ : q′ ⇛ s′ (s1 , q) −→∗D′ (s′ , q′ ) for some Γ′ ⊳ Ξ. Then e ℓ,R ǫ,ǫ (s1 s2 , q) −→∗D′ (s1 , q) −→∗D′ (s′ , q′ ). – Case t = if p(t1 , . . . , tn ) then tn+1 else tn+2 : Suppose (~t1 , . . . , ~tn ) ∈ ~p. e ℓ ǫ Then the reduction sequence is t −→D tn+1 −→∗D t′ . Since the last rule used to derive Γ ⊢A t : q ⇛ s is IT-IF, we have: s = if p(s1 , . . . , sn ) then sn+1 else sn+2 ∀i ∈ {1, . . . , n}.Γ ⊢A ti : int ⇛ si Γ ⊢A tn+1 : q ⇛ sn+1 Γ ⊢A tn+2 : q ⇛ sn+2 By the well-typedness of the program, for every i ∈ {1, . . . , n}, ti consists of only integers and integer operations. Thus, we have ~ti  = ~si  for each ǫ i ∈ {1, . . . , n} and s −→D′ sn+1 . e ℓ By applying the induction hypothesis to tn+1 −→∗D t′ , we have e ℓ,R (sn+1 , q) −→∗D′ (s′ , q′ ) Γ′ ⊢A t′ : q′ ⇛ s′ for some Γ′ ⊳ Ξ and s′ . Then e ℓ,R ǫ,ǫ (s, q) −→∗D′ (sn+1 , q) −→∗D′ (s′ , q′ ). The case where (~t1 , . . . , ~tn ) < ~p is similar. – Case t = f t1 . . . tn : Suppose D( f ) = λx1 . . . xn .t0 . In this case, the reduction e ℓ ǫ sequence is t −→D [t1 /x1 ] . . . [tn /xn ]t0 −→∗D t′ . Since Γ ⊢A t : q ⇛ s, we have f : (θ, m, m) ∈ Γ such that θ = ρ1 → . . . ρn → q ∀i ∈ {1, . . . , n}. Γ ⊢A ti : ρi ⇛ e si s1 . . . e sn . s = fθ,m e Since Ξ ⊢A D ⇛ D′ , we have D′ ( fθ,m ) = λdup(x1 , ρ1 ) . . . dup(xn , ρn ).s0 [Ξ] ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ] ⊢A t0 : q ⇛ s0 By using Weakening (Lemma 38), we have ∀i ∈ {1, . . . , n}. [Ξ] ∪ Γ ⊢A ti : ρi ⇛ e si [Ξ] ∪ Γ ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ] ⊢A t0 : q ⇛ s0 77 Since ([Ξ] ∪ Γ ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ]) ↑ 0 = [Ξ] ∪ Γ ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ], by using Substitution Lemma 39 repeatedly, we have [Ξ] ∪ Γ ⊢A [t1 /x1 ] . . . [tn /xn ]t0 : q ⇛ [e s1 /dup(x1 , ρ1 )] . . . [e sn /dup(xn , ρn )]s0 . Since ([Ξ] ∪ Γ) ⊳ Ξ, we can apply the induction hypothesis to e ℓ [t1 /x1 ] . . . [tn /xn ]t0 −→∗D t′ ; we have e ℓ,R ′ ′ ′ (s′′ , q) −→N D′ (s , q ) Γ′ ⊢A t′ : q′ ⇛ s′ for some Γ′ ⊳ Ξ and s′ , where s′′ = [e s1 /dup(x1 , ρ1 )] . . . [e sn /dup(xn , ρn )]s0 . e ℓ,R ǫ,ǫ We have (s, q) −→∗D′ (s′′ , q) −→∗D′ (s′ , q′ ) as desired. ⊔ ⊓ An infinite analogue of this lemma can be obtained as a corollary. Corollary 4. Assume Ξ ⊢A D ⇛ D ′ Γ ⊢A t0 : q0 ⇛ s0 Γ⊳Ξ and an infinite reduction sequence ℓ1 ℓ1 ℓ2 t0 −→D t1 −→D t2 −→D · · · generating an infinite event sequence e ℓ = ℓ1 ℓ2 · · ·. Let q0 R be an infinite run of A over e the infinite sequence ℓ. Then there exist {(qi , Ri , si )}i∈ω such that ℓ1 ,R1 ℓ2 ,R2 ℓ3 ,R3 (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ (s2 , q2 ) −→∗D′ · · · and R = R1 R2 . . .. Proof. By using Lemma 40, one can construct by induction on i > 0 a family {(qi , Ri , si , Γi )}i∈ω that satisfies ℓi ,Ri (si−1 , qi−1 )−→∗D′ (si , qi ) Γi ⊳Ξ Γi ⊢A ti :qi ⇛ si R1 R2 . . . Ri is a prefix of R. Since the length of R1 R2 . . . Ri is equivalent to that of ℓ1 ℓ2 . . . ℓi , the sequence R1 R2 . . . is indeed an infinite sequence and thus equivalent to R. ⊔ ⊓ We show the converse in a bit stronger form. 78 Lemma 41. Assume Ξ ⊢A D ⇛ D ′ Γ1 ⊳ Ξ Γ2 ⊳ Ξ♯ Γ1 ∪ Γ2 ⊢A t : q ⇛ s e ℓ (s, π) −→N (s′ , π′ ) D′♯ where t does not contain λ-abstraction and s′ is not of the form s′1 ◦ s′2 . Then there exist a run qR over e ℓ and a state q′ such that e ℓ,R (s, π, q) −→N (s′ , π′ , q′ ) D′♯ Furthermore there exist a term t′ and a type environment Γ′1 such that Γ′1 ⊳ Ξ Γ′1 ∪ (Γ2 ↑ max(Ω(R))) ⊢A t′ : q′ ⇛ s′ e ℓ t −→∗D♯ t′ . Proof. By induction on the length of the reduction sequence. The claim trivially holds if the length is 0. Assume that the length is greater than 0. The proof proceeds by case analysis on the shape of s. By the assumption e ℓ s −→∗D′♯ s′ , it suffices to consider only the cases where the shape of s matches the lefthand side of a transition rule. – Case s = event a; s0 : By the shape of s, the last rule used on the derivation of Γ ∪ Γ′ ⊢A t : q ⇛ s is either IT-Event-Alt or IT-App (IT-Abs is not applicable since t is assumed to have no abstraction). By induction on the derivation, one can prove that t = (event a; t0 ) t1 . . . tk for some k. By the simple-type system, one cannot apply event a; t0 to a term; hence k = 0 (i.e. t = event a; t0 ) and the last rule used on the derivation is IT-Event-Alt. Then we have: δ(q, a) = {q1 , . . . , qn } (q1 < q2 < · · · < qn ) ∀i ∈ {1, . . . , n}.(Γ1 ∪ Γ2 ) ↑ Ω(qi ) ⊢A t0 : qi ⇛ si s0 = (s1 ◦ . . . ◦ sl ) Recall that s is not of the form s′1 ◦ s′2 ; hence the reduction sequence ′ e ℓ (s, π) −→N (s′ , π′ ) D′♯ must be of the form e ℓ′ a (s, π) −→kD′♯ (si , π′′ ) −→N−k (s′ , π′ ) D′♯ where k = i + 1 if i < n and k = i if i = n. By the induction hypothesis, there exist a run qi R′ over ℓ′ , a term t′ and a type environment Γ′ with Γ′1 ⊳ Ξ such that e ℓ′ ,R′ (si , π′′ , qi ) −→N−k (s′ , π′ , q′ ) D′♯ and Γ′1 ∪ (Γ2 ↑ ΩA (qi ) ↑ max(ΩA (R′ ))) ⊢A t′ : q′ ⇛ s′ . We have (Γ2 ↑ ΩA (qi ) ↑ max(ΩA (R′ ))) = (Γ2 ↑ max(ΩA (qi R′ ))) and a,qi e ℓ′ ,R′ (s, π, q) −→kD′♯ (si , π′′ , qi ) −→N−k (s′ , π′ , q′ ). By construction, qqi R′ is a run over D′♯ ae ℓ′ . 79 – Case s = s1 s2 : As with the previous case, the last rule used on the derivation is IT-NonDet. Then we have (Γ1 ∪ Γ2 ) ⊢A t1 : q ⇛ s1 (Γ1 ∪ Γ2 ) ⊢A t2 : q ⇛ s2 t = t1 t2 Suppose π = Lπ′′ ; the other case can be proved by a similar way. Then the e ℓ reduction sequence (s, π) −→N (s′ , π′ ) must be of the form D′♯ e ℓ ǫ (s, π) −→D′♯ (s1 , π′′ ) −→N−1 (s′ , π′ ). D′♯ Hence, by applying the induction hypothesis to Γ1 ∪ Γ2 ⊢A t1 : q ⇛ s1 , we obtain the desired result. – Case s = if p(s1 , . . . , sn ) then sn+1 else sn+2 : As with the previous cases, the last rule used on the derivation is IT-If. Hence we have t = if p(t1 , . . . , tn ) then tn+1 else tn+2 ∀i ∈ {1, . . . , n}.Γ1 ∪ Γ2 ⊢A ti : int ⇛ si Γ1 ∪ Γ2 ⊢A tn+1 : q ⇛ sn+1 Γ1 ∪ Γ2 ⊢A tn+2 : q ⇛ sn+2 Recall that the result type of a function cannot be the integer type in our language. This implies that ti (1 ≤ i ≤ n) consists only of constants and numerical operations, and thus ti = si for every 1 ≤ i ≤ n. Suppose that (~s1 , . . . , ~sn ) = (~t1 , . . . , ~tn ) ∈ ~p. Then the reduction e ℓ (s′ , π′ ) must be of the form sequence (s, π) −→N D′♯ e ℓ ǫ (s, π) −→D′♯ (sn+1 , π) −→N−1 (s′ , π′ ). D′♯ We obtain the desired result by applying the induction hypothesis to Γ1 ∪ ǫ Γ2 ⊢A tn+1 : q ⇛ sn+1 ; the corresponding reduction sequence is t −→D♯ e ℓ tn+1 −→∗D♯ t′ . The case that (~s1 , . . . , ~sn ) < ~p can be proved similarly. – Case s = g s1 . . . sn with g ∈ dom(D′ ): By the shape of s, the last rule used on the derivation is IT-App or IT-AppInt. By induction on the derivation, we s′1 . . . e s′k and have t = f t1 . . . tk for some k. Then s = fθ,m e f : (θ, m, m) ∈ Γ1 θ = ρ1 → . . . ρk → q ∀i ∈ {1, . . . , k}. Γ1 ∪ Γ2 ⊢A ti : ρi ⇛ e s′i . Assume that D( f ) = λx1 . . . xk .tbody and D′ ( fθ,m ) = λy1 . . . yn .sbody . Since Ξ ⊢A D ⇛ D′ and f : (θ, m, m) ∈ Γ1 ⊳ Ξ, we have [Ξ] ⊢A λx1 . . . xk .tbody : θ ⇛ λy1 . . . yn .sbody . Hence y1 . . . yn = dup(x1 , ρ1 ) . . . dup(xk , ρk ) and [Ξ] ∪ [x1 : ρ1 ] ∪ · · · ∪ [xk : ρk ] ⊢A tbody : q ⇛ sbody . 80 By using Weakening (Lemma 38) and Substitution Lemma (Lemma 39) repeatedly, we have [Ξ] ∪ Γ1 ∪ Γ2 ⊢A [t1 /x1 ] . . . [tk /xk ]tbody : q ⇛ [ue1 /dup(x1 , ρ1 )] . . . [uek /dup(xk , ρk )]sbody . e ℓ The reduction sequence (s, π) −→N (s′ , π′ ) must be of the form D′♯ e ℓ ǫ (s, π) −→D′♯ ([ue1 /dup(x1 , ρ1 )] . . . [uek /dup(xk , ρk )]sbody , π) −→N−1 (s′ , π′ ). D′♯ By applying the induction hypothesis to the above judgment, we ǫ complete the proof; the corresponding reduction sequence is t −→D♯ e ℓ [t1 /x1 ] . . . [tk /xk ]tbody −→∗D♯ t′ where t′ is the term obtained by the induction hypothesis. – Case s = g♯ s1 . . . sn with g ∈ dom(D′ ): Similar to the above case. ⊔ ⊓ Corollary 5. Assume Ξ ⊢A D ⇛ D ′ Γ⊳Ξ Γ ⊢A t0 : q0 ⇛ s0 and an infinite reduction sequence ℓ1 ℓ2 ℓ3 1 2 3 (s0 , π0 ) −→N (s1 , π1 ) −→N (s2 , π2 ) −→N ··· . D′ D′ D′ Suppose that, for every i, si is not of the form si1 ◦ si2 . Then there exist {(qi , Ri , ti )}i∈ω such that ℓ1 ,R1 1 ℓ2 ,R2 2 ℓ3 ,R3 3 (s0 , π0 , q0 ) −→N (s1 , π1 , q1 ) −→N (s2 , π2 , q2 ) −→N ··· D′ D′ D′ and ℓ1 ℓ2 ℓ3 t0 −→∗D t1 −→∗D t2 −→∗D · · · . Furthermore q0 R1 R2 . . . is an infinite run of A over ℓ1 ℓ2 . . .. Proof. By using Lemma 41, one can define a family {(qi , Ri , ti , Γi )}i∈ω that satisfies ℓi ,Ri i (si−1 , πi−1 , qi−1 ) −→N (si , πi , qi ) D′♯ Γi ⊳ Ξ Γi ⊢A ti : qi ⇛ si e ℓ ti−1 −→∗D♯ ti by induction on i > 0. Since t0 and s0 do not contain marked symbols as well as the bodies of function definitions in D and D′ , ti and si dose not have marked ℓi ,Ri e ℓ i symbols for every i. Hence (si−1 , πi−1 , qi−1 ) −→N (s , πi , qi ) and ti−1 −→∗D ti for every D′ i i > 0. Furthermore q0 R1 . . . Ri is a run over ℓ1 . . . ℓi for every i. Hence the infinite sequence q0 R1 R2 . . . is an infinite run over ℓ1 ℓ2 . . .. So {(qi , Ri , ti )}i∈ω satisfies the requirements. ⊔ ⊓ 81 Lemma 42. Assume that Ξ ⊢A P ⇛ (P′ , Ω). Let P = (main, D) and P′ = (main′ , D′ ). The following conditions are equivalent. 1. ∃e ℓ ∈ InfTraces(P).∃R : run of A over e ℓ. maxInf(ΩA (R)) is even. 2. There exist π and an infinite reduction sequence ℓ1 ,R1 ℓ2 ,R2 (main′ , qI ) = (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ · · · π such that R1 R2 · · · is an infinite sequence and maxInf(ΩA (R1 R2 · · · )) is even. Proof. ((1) ⇒ (2)) Assume an infinite reduction sequence ℓ1 π ℓ3 ℓ2 main = t0 −→D t1 −→D t2 −→D · · · and an infinite run qI R of A over ℓ1 ℓ2 . . . (here we implicitly assume that ℓ1 ℓ2 . . . is an infinite sequence). Since Ξ ⊢A P ⇛ (P′ , Ω), we have [Ξ] ⊢A main : qI ⇛ main′ . Then by Corollary 4, there exist {(qi , Ri , si )}i∈ω such that ℓ1 ,R1 ℓ2 ,R2 ℓ3 ,R3 (main′ , qI ) = (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ (s2 , q2 ) −→∗D′ · · · and R = R1 R2 . . .. Then maxInf(ΩA (R1 R2 · · · )) = maxInf(ΩA (qI R1 R2 · · · )) = maxInf(ΩA (R)) is even by the assumption. ((2) ⇒ (1)) Assume an infinite reduction sequence π ℓ1 ,R1 ℓ2 ,R2 (main′ , qI ) = (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ · · · such that R1 R2 · · · is an infinite sequence and maxInf(ΩA (R1 R2 · · · )) is even. By Corollary 5, there exists {ti }i such that ℓ1 ℓ2 main −→∗D t1 −→∗D · · · . By construction, R = qI R1 R2 · · · is an infinite run over ℓ1 ℓ2 · · ·. Since R is infinite by the assumption, ℓ1 ℓ2 · · · is also infinite. Then maxInf(ΩA (R)) = maxInf(ΩA (qI R1 R2 · · · )) = maxInf(ΩA (R1 R2 · · · )) is even by the assumption. ⊔ ⊓ Lemma 43. Assume that Ξ ⊢A D ⇛ D ′ Γ0 ⊳ Ξ Γ0 ⊢A t : q ⇛ ge s (ge s; π) e ℓ,R e ′ ′ and (ge s, π, q) −→N D′ (hθ,m u, π , q ). Then m = max(Ω(R)). Proof. Since Γ0 ⊢A t : q ⇛ ge s, there exist θ0 and m0 such that t = f t1 . . . tn e s =e s1 . . . e sn f : (θ0 , m0 , m0 ) ∈ Γ0 θ0 = ρ1 → · · · → ρn → q ∀i ∈ {1, . . . , n}. Γ0 ⊢A ti : ρi ⇛ e si . 82 N D′ u; π′ ) (hθ,m e Suppose D( f ) = λx1 . . . xn .t0 . Since Ξ ⊢A D ⇛ D′ , we have D′ ( fθ0 ,m0 ) = λe x1 . . . e xn .s0 [Ξ] ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ] ⊢A t0 : q ⇛ s0 where e xi = dup(xi , ρi ) for each i ∈ {1, . . . , n}. By easy induction on the structure of the derivation, we have [Ξ] ∪ [Ξ♯ ] ∪ [x1 : ρ1 ] ∪ · · · ∪ [xn : ρn ] ⊢A t♯0 : q ⇛ s♯0 . By using Weakening (Lemma 38) and Substitution Lemma (Lemma 39), we have [Ξ] ∪ [Ξ♯ ] ∪ Γ0 ⊢A [t1 /x1 ] . . . [tn /xn ]t♯0 : q ⇛ [e s1 /e x1 ] . . . [e sn /e xn ]s♯0 . Now, by the definition of call sequence, we have e ℓ ([e s1 /e x1 ] . . . [e sn /e xn ]s♯0 , π) −→N−1 (h♯θ,m ue′ , π′ ). D′♯ By Lemma 41, there exist R′ , t′ and Γ′ ⊳ Ξ such that e and ′ ℓ,R ([e s1 /e x1 ] . . . [e sn /e xn ]s♯0 , π, q) −→N−1 (h♯θ,m ue′ , π′ , q′ ) D′♯ Γ′ ∪ ([Ξ♯ ] ↑ max(ΩA (R′ ))) ⊢A t′ : q′ ⇛ h♯θ,m ue′ where q′ is the last state in R′ . e ℓ,R e ′ ′ By (ge s, π, q) −→N D′ (hθ,m u, π , q ), we have e ℓ,R ǫ,ǫ u, π′ , q′ ). s1 /e x1 ] . . . [e sn /e xn ]s0 , π, q) −→N−1 (ge s, π, q) −→D′ ([e D′ (hθ,m e Since the mark does not affect the induced run of the automaton, we have e ℓ,R ′′ ′ ′ ([e s1 /e x1 ] . . . [e sn /e xn ]s♯0 , π, q) −→N−1 D′ (s , π , q ) u except for marks). Comparing this for some s′′ (which is equivalent to hθ,m e reduction sequence with e ′ ℓ,R ([e s1 /e x1 ] . . . [e sn /e xn ]s♯0 , π, q) −→N−1 (h♯θ,m ue′ , π′ , q′ ) D′♯ given above, we conclude that s′′ = h♯θ,m ue′ and R = R′ . Thus Γ′ ∪ ([Ξ♯ ] ↑ max(Ω(R))) ⊢A t′ : q′ ⇛ h♯θ,m ue′ . Hence h♯ : (θ, m, m) ∈ ([Ξ♯] ↑ max(Ω(R))) and thus m = max(Ω(R)) by definition of [Ξ♯ ]. ⊔ ⊓ 83 Lemma 44. Assume that Ξ ⊢A P ⇛ (P′ , Ω). Let P = (main, D) and P′ = (main′ , D′ ). For each choice sequence π ∈ {L, R}ω, the following conditions are equivalent. 1. There exists an infinite reduction sequence π ℓ1 ,R1 ℓ2 ,R2 (main′ , qI ) = (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ · · · such that R1 R2 · · · is an infinite sequence and maxInf(ΩA (R1 R2 · · · )) is even. 2. There exists an infinite call-sequence π main′ = g0θ0 ,m0 ũ0 k0 D′ g1θ1 ,m1 ũ1 k1 D′ g2θ2 ,m2 ũ2 k2 D′ ··· . such that maxInf(Ω(e g)) is odd. Proof. ((1) ⇒ (2)) Assume an infinite reduction sequence π ℓ1 ,R1 ℓ2 ,R2 (main′ , qI ) = (s0 , q0 ) −→∗D′ (s1 , q1 ) −→∗D′ · · · . By Corollary 1, we have a (unique) infinite call-sequence π main′ = g0θ0 ,m0 ũ0 k0 D′ g1θ1 ,m1 ũ1 k1 D′ g2θ2 ,m2 ũ2 k2 D′ ··· . So the given reduction sequence can be rewritten as π e ℓ1′ ,R′1 e ℓ3′ ,R′3 e ℓ2′ ,R′2 (main, qI ) = (g0θ0 ,m0 ũ0 , q′0 ) −→kD0′ (g1θ1 ,m1 ũ1 , q′1 ) −→kD1′ (g2θ2,m2 ũ2 , q′2 ) −→kD2′ · · · . Note that R1 R2 · · · = R′1 R′2 . . .. By Lemma 43, mi = max(ΩA (R′i )). Since maxInf(ΩA (R1 R2 · · · )) is even, maxInf(Ω(e g)) = maxInf(m1 + 1, m2 + 1, . . . ) = maxInf(max(ΩA (R′1 )) + 1, max(Ω(R′2 )) + 1, . . . ) = maxInf(max(ΩA (R′1 )), max(ΩA (R′2 )), . . . ) + 1 = maxInf(ΩA (R′1 R′2 . . . )) + 1 = maxInf(ΩA (R1 R2 . . . )) + 1 is odd. ((2) ⇒ (1)) Assume an infinite call-sequence π main′ = g0θ0 ,m0 ũ0 k0 D′ g1θ1 ,m1 ũ1 k1 D′ g2θ2 ,m2 ũ2 k2 D′ ··· . This is an infinite reduction sequence π e ℓ2 e ℓ1 e ℓ3 main′ = g0θ0 ,m0 ũ0 −→kD0′ g1θ1 ,m1 ũ1 −→kD1′ g2θ2 ,m2 ũ2 −→kD2′ · · · . 84 ℓ2 . . . is an infinite sequence. Then by By the assumption on the program, e ℓ1 e Corollary 5, π e ℓ1 ,R1 e ℓ2 ,R2 e ℓ3 ,R3 (main′ , q0 ) = (g0θ0 ,m0 ũ0 , q0 ) −→kD0′ (g1θ1 ,m1 ũ1 , q1 ) −→kD1′ (g2θ2 ,m2 ũ2 , q2 ) −→kD2′ · · · for some {(qi , Ri )}i . By Lemma 43, mi = max(ΩA (Ri )). Hence maxInf(ΩA (R1 R2 . . . )) = maxInf(max(ΩA (R1 )), max(ΩA (R2 )), . . . ) = maxInf(m1 m2 . . . ) = maxInf(Ω(e g)) − 1 Since maxInf(Ω(e g)) is odd, maxInf(ΩA (R1 R2 . . . )) is even. The sequence R1 R2 . . . e is infinite since ℓ1 e ℓ2 . . . is. ⊔ ⊓ Proof of Theorem 5 Assume that Ξ ⊢A P ⇒ (P0 , Ω). Then by Lemma 37, there exists P1 such that Ξ ⊢A P ⇛ (P1 , Ω) and P0 = [/◦]P1. Obviously |=csa (P1 , Ω) if and only if |=csa (P0 , Ω). Let P1 = (D1 , main1 ). We prove the lemma by establishing the equivalence of the following propositions: 1. InfTraces(P) ∩ L(A) , ∅. 2. ∃e ℓ ∈ InfTraces(P).∃R : run of A over e ℓ. maxInf(ΩA (R)) is even. 3. There exist π and an infinite reduction sequence π ℓ1 ,R1 ℓ2 ,R2 (main1 , qI ) = (s0 , q0 ) −→∗D1 (s1 , q1 ) −→∗D1 · · · such that R1 R2 · · · is an infinite sequence and maxInf(ΩA (R1 R2 · · · )) is even. 4. There exist π and an infinite call-sequence π main1 = g0θ0 ,m0 ũ0 k0 D1 g1θ1 ,m1 ũ1 k1 D1 g2θ2 ,m2 ũ2 k2 D1 ··· . such that maxInf(Ω(e g)) is odd. 5. ¬(|=csa (P1 , Ω)). 6. ¬(|=csa (P0 , Ω)). (1) ⇔ (2): By definition. (2) ⇔ (3): By Lemma 42. (3) ⇔ (4): By Lemma 44. (4) ⇔ (5): By definition (5) ⇔ (6): Obvious. E.5 Proof of Theorem 6 Here we provide a proof of Theorem 6. The proof also implies that the reduction from the temporal verification to HFLZ model checking can be performed in polynomial time. 85 For each simple type η, we define the set Θη of canonical intersection types by: Θ⋆ = {q | q ∈ QA } Θint = {int} Θint→κ = {int → θ | θ ∈ Θκ } V Θκ1 →κ2 = { {(θ1 , m) | θ1 ∈ Θκ1 , m ∈ {0, . . . , M}} → θ2 | θ2 ∈ Θκ2 } Here, M is the largest priority used in A. Note that, for any simple type κ (, int), the size of the set Θη is |Q|. For a simple type environment K , we define the canonical type environment ΓK ,m as: {x : int | x : int ∈ K } ∪ {x : (θ, m′ , m) | x : κ ∈ K , θ ∈ Θκ , m′ ∈ {0, . . . , M}}. Lemma 45. Suppose K ⊢ t : η. Then, for any m ∈ {0, . . . , M} and θ ∈ Θη , there exists t′ such that ΓK ,m ⊢A t : θ ⇒ t′ . Furthermore, t′ can be effectively constructed. Proof. The proof proceeds by induction on the derivation of K ⊢ t : η, with case analysis on the last rule used. – Case LT-Unit: In this case, t = ( ) and η = ⋆. By rule IT-Unit, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = ( ). – Case LT-Var: In this case, t = x and K = K ′ , x : θ. If η = int, then θ = int and ΓK ,m = ΓK ′ ,m , x : int. By rule IT-VarInt, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = xint, as required. If η , int, then ΓK ,m = ΓK ′ ,m ∪ {x : (θ′ , m′ , m) | θ′ ∈ Θη , m′ ∈ {0, . . . , M}} ∋ x : (θ, m, m). Therefore, by rule IT-Var, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = xθ,m , as required. – Case LT-Int: In this case, t = n and η = int. By rule IT-Int, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = n, as required. – Case LT-Op: In this case, t = t1 op t2 and θ = int, with K ⊢ ti : int for each i ∈ {1, 2}. By the induction hypothesis, there exists t′i such that ΓK ,m ⊢A ti : θ ⇒ t′i for each i. By rule IT-Op, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = t′1 op t′2 , as required. – Case LT-Ev: In this case, t = event a; t1 and η = ⋆, with K ⊢ t1 : ⋆ and θ = q ∈ QA . Let δA (q, a) = {q1 , . . . , qn } and mi = max(m, ΩA (qi )). By the induction hypothesis, we have ΓK ,mi ⊢A t1 : qi ⇒ t′i for each i ∈ {1, . . . , n}. Since ΓK ,mi = ΓK ,m ↑ ΩA (qi ), by applying rule IT-Event, we obtain ΓK ,m ⊢A t : θ ⇒ t′ for t′ = event a; (t′1  · · · t′n ), as required. – Case LT-If: In this case, t = if p(t1 , . . . , tk ) then tk+1 else tk+2 and η = ⋆, with (i) K ⊢ ti : int for each i ∈ {1, . . . , k}, (ii) K ⊢ ti : ⋆ for each i ∈ {k+1, k+2}, and (iii) θ = q ∈ QA . By the induction hypothesis, we have: ΓK ,m ⊢A ti : int ⇒ t′i for each i ∈ {1, . . . , k}, and ΓK ,m ⊢A ti : θ ⇒ t′i for each i ∈ {k+1, k+2}. Thus, by rule IT-If, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = if p(t′1 , . . . , t′k ) then t′k+1 else t′k+2 as required. – Case LT-App: In this case, t = t1 t2 with K ⊢ t1 : η2 → η and K ⊢ t2 : η2 . Let {(θ1 , m1 ), . .V . , (θk , mk )} = Θη2 × {0, . . . , M} with (θ1 , m1 ) < · · · < (θk , mk ), and let θ′ be 1≤i≤k (θi , mi ) → θ. By the induction hypothesis, we have ΓK ,m ⊢A t1 : θ′ ⇒ t′1 and ΓK ,m ↑ mi ⊢A t2 : θi ⇒ t′2,i for each i ∈ {1, . . . , k}. Thus, by rule IT-App, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = t′1 t′2,1 · · · t′2,k as required. 86 – Case LT-NonDet: In this case, t = t1 t2 and η = ⋆, with K ⊢ ti : ⋆ for each i ∈ {1, 2}. By the assumption θ ∈ Θη , θ ∈ QA . By the induction hypothesis, we have ΓK ,m ⊢A ti : θ ⇒ t′i for each i. By rule IT-NonDet, we have ΓK ,m ⊢A t : θ ⇒ t′ for t′ = t′1 t′2 as required. ⊔ ⊓ Theorem 6 is an immediate corollary of the lemma above. Proof (Theorem 6). Let P = ({ f1 = t1 , . . . , fn = tn }, t), and K be a simple type environment for P, i.e., K ⊢ P. Let Ξ be: { fi : (θ, m) | i ∈ {1, . . . , n}, θ ∈ ΘK ( fi ) }. For each fi : (θ, m) ∈ Ξ, let t′i,θ and t′ be the terms given by Lemma 45, such that ΓK ,0 ⊢A ti : θ ⇒ ti,θ and ΓK ,0 ⊢A t : qI ⇒ t′ . Let P′ be: ({ fi,θ,m = t′i,θ | fi : (θ, m) ∈ Ξ}, t′), and Ω be { fi,θ,m 7→ m + 1 | fi : (θ, m) ∈ Ξ}. Then Ξ ⊢A P ⇒ (P′ , Ω) holds, and Ξ, P′ , Ω can be effectively constructed as described above. ⊓ ⊔ Any program P = ({ f1 = t1 , . . . , fn = tn }, t) can be normalized (with an at most polynomial blow-up of the size), so that each of ti and t is one of the following forms: – – – – () y (z1 x1,1 · · · x1,ℓ1 ) · · · (zk xk,1 · · · xk,ℓk ) event a; (y x1 · · · xk ) if p(t1 , . . . , tk ) then (y x1 · · · xk ) else (y′ x′1 · · · x′k′ ) where k, k′ , ℓi may be 0. The normalization can be performed by adding auxiliary functions: See [20], Section 4.3 for a similar normalization. For a normalized program P, the size of P′ obtained by the transformation in the proof above is polynomial in the size of P and |QA |. Furthermore, P′ and Ω can be constructed in polynomial time. Thus, the whole reduction from temporal property verification to call-sequence analysis (hence also to HFLZ model checking) can be performed in polynomial time. F An Example of the Translation of Section 7 Here we show derivation trees for the translation in Example 11. The body of g is translated as follows (where we omit irrelevant type bindings), where Γ0 = k : (qa , 0, 0), k : (qb , 1, 0). k : (qa , 0, 0), k : (qb , 1, 0) ⊢A k : qa ⇒ kqa ,0 k : (qa , 0, 1), k : (qb , 1, 1) ⊢A k : qb ⇒ kqb ,1 Γ0 ⊢A (event a; k) : qa ⇒ (event a; kqa ,0 ) Γ0 ⊢A (event b; k) : qa ⇒ (event a; kqb ,1 ) Γ0 ⊢A (event a; k)(event b; k) : qa ⇒ (event a; kqa ,0 )(event b; kqb ,1 ) 87 The body of f is translated as follows. Γ1 , x : int ⊢A x : int ⇒ xint Γ1 , x : int ⊢A 0 : int ⇒ 0 π1 π2 Γ1 , x : int ⊢A if x > 0 then g ( f (x − 1)) else (event b; f 5) : qa ⇒ t f,qa Here, Γ1 is: g : ((qa , 0) ∧ (qb , 1) → qa , 0, 0), g : ((qa , 0) ∧ (qb , 1) → qb , 0, 0), f : (int → qa , 0, 0), f : (int → qb , 1, 0) and π1 and π2 are: Γ1 , x : int ⊢A g : (qa , 0) ∧ (qb , 1) → qa ⇒ g(qa ,0)∧(qb ,1)→qa ,0 π1 = π3 π4 Γ1 , x : int ⊢A g ( f (x − 1)) : qa ⇒ g(qa ,0)∧(qb ,1)→qa ,0 ( fint→qa ,0 (xint − 1)) ( fint→qb ,1 (xint − 1)) π2 = Γ1 ↑ 1, x : int ⊢A f : int → qb ⇒ fint→qb ,1 Γ1 ↑ 1, x : int ⊢A 5 : int ⇒ 5 Γ1 ↑ 1, x : int ⊢A f 5 : qa ⇒ fint→qb ,1 5 Γ1 , x : int ⊢A event b; f 5 : qa ⇒ event b; fint→qb ,1 5 π3 = π4 = G Γ1 ↑ 0, x : int ⊢A f : int → qa ⇒ fint→qa ,0 ··· Γ1 ↑ 0, x : int ⊢A x − 1 : int ⇒ xint − 1 Γ1 ↑ 0, x : int ⊢A f (x − 1) : qa ⇒ fint→qa ,0 (xint − 1) Γ1 ↑ 1, x : int ⊢A f : int → qb ⇒ fint→qb ,1 ··· Γ1 ↑ 1, x : int ⊢A x − 1 : int ⇒ xint − 1 Γ1 ↑ 1, x : int ⊢A f (x − 1) : qb ⇒ fint→qb ,1 (xint − 1) Proving HFLZ formulas in Coq Given program verification problems, the reductions presented in Sections 5–7 yield HFLZ model checking problems, which may be thought as a kind of “verification conditions” (like those for Hoare triples). Though we plan to develop automated/semi-automated tools for discharging the “verification conditions”, we demonstrate here that it is also possible to use an interactive theorem prover to do so. Here we use Coq proof assistant, and consider HFLNat (HFL extended with natural numbers) instead of HFLZ . Let us consider the termination of the following program: let sum n k = if n<=0 then k 0 else sum (n-1) (fun r -> k(n+r)) in sum m (fun r->()) 88 Here, we assume m ranges over the set natural numbers. The translation in Section 5.2 yields the following HFLNat formulas. (µsum.λn.λk.(n ≤ 0 ⇒ k 0) ∧ (n > 0 ⇒ sum (n − 1) λr.k(n + r))) m (λr.true). The goal is to prove that for every m, the formula is satisfied by the trivial model L0 = ({s⋆ }, ∅, ∅, s⋆). In order to avoid the clumsy issue of representing variable bindings in Coq, we represent the semantics of the above formula in Coq. The following definitions correspond to those of DL,τ in Section 2. (* syntax of simple types: "arint t" and "ar t1 t2" represent nat->t and t1->t2 respectively *) Inductive ty: Set := o: ty | arint: ty -> ty | ar: ty -> ty -> ty. (* definition of semantic domains, minus the monotonicity condition *) Fixpoint dom (t:ty): Type := match t with o => Prop | arint t’ => nat -> dom t’ | ar t1 t2 => (dom t1) -> (dom t2) end. Here, we use Prop as the semantic domain DL0 ,• = {∅, {s⋆}} and represent {s⋆ } as a proposition True. Above, we have deliberately omitted the monotonicity condition, which is separately defined by induction on simple types, as follows. Fixpoint ord (t:ty) {struct t}: dom t -> dom t -> Prop := match t with o => fun x: dom o => fun y: dom o => (x -> y) | arint t’ => fun x: dom (arint t’) => fun y: dom (arint t’) => forall z:nat, ord t’ (x z) (y z) | ar t1 t2 => fun x: dom (ar t1 t2) => fun y: dom (ar t1 t2) => forall z w:dom t1, ord t1 z z -> ord t1 w w -> ord t1 z w -> ord t2 (x z) (y w) end. Definition mono (t: ty) (f:dom t) := ord t f f. 89 Here, ord τ corresponds to ⊑L0 ,τ in Section 2,14 and the monotonicity condition on f is expressed as the reflexivity condition ord τ f f . We can then state the claim that the sum program is terminating for every m as the following theorem: Definition sumt := arint (ar (arint o) o). Definition sumgen := fun sum: dom sumt => fun n:nat=> fun k:nat->Prop => (n<=0 -> k 0) /\ (n>0 -> sum (n-1) (fun r:nat=>k(r+n))). Theorem sum_is_terminating: forall sum: dom sumt, forall FPsum: (* sum is a fixpoint of sumgen *) (forall n:nat, forall k:nat->Prop, sum n k <-> sumgen sum n k), forall LFPsum: (* sum is the least fixpoint of sumgen *) (forall x:dom sumt, mono sumt x -> ord sumt (sumgen x) x -> ord sumt sum x), forall m:nat, sum m (fun r:nat => True). (* can be automatically generated up to this point *) Proof. (* this part should be filled by a user *) ... Qed. Here, sumgen is the semantics of the argument of the µ-operator (i.e., λsum.λn.λk.(n ≤ 0 ⇒ k 0) ∧ (n > 0 ⇒ sum (n − 1) λr.k(n + r))), and the first three “forall ...” assumes that sum is the least fixpoint of it, and the last line says that sum m λx.True is equivalent to True for every m. Note that except the proof (the part “...”), all the above script can be automatically generated based on the development in the paper (like Why3[10], but without any invariant annotations). The following is a proof of the above theorem. Proof. intros. (* apply induction on m *) induction m; apply FPsum; unfold sumgen; simpl;auto. split; auto. omega. (* induction step *) 14 Note, however, that since dom t may be inhabited by non-monotonic functions, “ord τ” is not reflexive. 90 assert (m-0=m); try omega. rewrite H; auto. Qed. More examples are found at http://www-kb.is.s.u-tokyo.ac.jp/˜koba/ papers/hfl_in_coq.zip. The Coq proofs for some of those examples are much longer. For each example, however, there are only a few places where human insights are required (like “induction m” above). We, therefore, expect that the proofs can be significantly shortened by preparing appropriate libraries. H HORS- vs HFL-based Approaches to Program Verification In this section, we provide a more detailed comparison between our new HFLbased approach and HORS-based approaches [19, 20, 25, 29, 33, 35, 47] to program verification. Some familiarity with HORS-based approaches may be required to fully understand the comparison. HORS model checking algorithms [23, 34] usually consist of two phases, one for computing a kind of higher-order “procedure summaries” in the form of variable profiles [34] or intersection types [23] (that summarize which states are visited between two function calls), and the other for solving games, which consists in nested least/greatest fixpoint computations. In the case of finite-data programs, the combination of the two phases provides a sound and complete verification algorithm [23, 34]. To deal with infinite-data programs, however, the HORS-based approaches [19, 20, 25, 29, 33, 35, 47] had to apply various transformations to map verification problems to HORS model checking problems in a sound but incomplete manner (incompleteness is inevitable because, in the presence of values from infinite data domains, the former is undecidable whereas the latter is decidable), as illustrated on the lefthand side of Figure 10. A problem about this approach is that the second phase of HORS model checking – nested least/greatest fixpoint computations – actually does not help much to solve the original problem, because least fixpoint computations are required for proving liveness (such as termination), but the liveness of infinite-data programs usually depends on properties about infinite data domains such as “there is no infinite decreasing sequence of natural numbers,” which are not available after the transformations to HORS. For this reason, the previous techniques for proving termination [29] and fair termination [33] used HORS model checking only as a backend of a safety property checker, where only greatest fixpoint computations are performed in the second phase; reasoning about liveness was performed during the transformation to HORS model checking. As shown on the righthand side of Figure 10, in our new HFL-based approach, we have extended the first phase of HORS model checking – the computation of higher-order procedure summaries – to deal with infinite data programs, and moved it up front; we then formalized the remaining problems as HFL model checking problems. That can be viewed as the essence of the reduction in Section 7, and the reductions in Sections 5 and 6 are those for degenerate cases. Advantages of the new approach include: (i) necessary information on 91 fair termination verification problems for arbitrary Z-regular (linear-time) properties termination problem-specific transformations fair non-termination non-termination safety computing higherorder summaries (for infinite-data programs) predicate abstractions HFLZ model checking (nested fixpoint computations over infinite data domains) computing higherorder summaries game solving (nested fixpoint computations over finite data domains) HORS model checking Fig. 10. Comparison between HORS- and HFL-based approaches. In the HORS-based approaches (shown on the lefthand side), there are actually some feedback loops (due to counterexample-guided abstraction refinement, etc.), which are omitted. The right hand side shows the approach based on the reduction in Section 7. In the reductions in Section 5 and 6, the first phase is optimized for degenerate cases. 92 infinite data is available in the second phase of least/greatest computations (cf. the discussion above on the HORS-based approach), and (ii) various verification problems boil down to the issue of how to prove least/greatest fixpoint formulas; thus we can reuse and share the techniques developed for different verification problems. The price to pay is that the first phase (especially a proof of its correctness) is technically more involved, because now we need to deal with infinite-data programs instead of HORS’s (which are essentially finitedata functional programs). That explains long proofs in Appendices (especially Appendix D and E). 93
6cs.PL
Hybrid models of the cell cycle molecular machinery Vincent Noel IRMAR UMR 6625, University of Rennes 1, Rennes, France Dima Grigoriev CNRS, Mathématiques, Université de Lille, 59655, Villeneuve d’Ascq, France Sergei Vakulenko Saint Petersburg State University of Technology and Design, St.Petersburg, Russia Ovidiu Radulescu DIMNP UMR CNRS 5235, University of Montpellier 2, Montpellier, France Piecewise smooth hybrid systems, involving continuous and discrete variables, are suitable models for describing the multiscale regulatory machinery of the biological cells. In hybrid models, the discrete variables can switch on and off some molecular interactions, simulating cell progression through a series of functioning modes. The advancement through the cell cycle is the archetype of such an organized sequence of events. We present an approach, inspired from tropical geometry ideas, allowing to reduce, hybridize and analyse cell cycle models consisting of polynomial or rational ordinary differential equations. 1 Introduction Hybrid systems are widely used in automatic control theory to cope with situations arising when a finitestate machine is coupled to mechanisms that can be modeled by differential equations [13]. It is the case of robots, plant controllers, computer disk drives, automated highway systems, flight control, etc. The general behavior of such systems is to pass from one type of smooth dynamics (mode) described by one set of differential equations to another smooth dynamics (mode) described by another set of differential equations. The command of the modes can be performed by changing one or several discrete variables. The mode change can be accompanied or not by jumps (discontinuities) of the trajectories. Depending on how the discrete variables are changed, there may be several types of hybrid systems: switched systems [22], multivalued differential automata [26], piecewise smooth systems [9]. Notice that in the last case, the mode changes when the trajectory attains some smooth manifolds. In these examples, the changes of discrete variables and the evolution of continuous variables are deterministic. The class of hybrid systems can be extended by considering stochastic dynamics of both continuous and discrete variables, leading to piece-wise deterministic processes, switched diffusions or diffusions with jumps [19, 6, 5, 23, 4]. Hybrid, differential, or stochastic Petri nets provide equivalent descriptions of the dynamics and were also used in this context [7]. The use of hybrid models in systems biology can be justified by the temporal and spatial multiscaleness of biological processes, and by the need to combine qualitative and quantitative approaches to study dynamics of cell regulatory networks. Furthermore, hybrid modelling offers a good compromise between realistic description of mechanisms of regulation and possibility of testing the model in terms of state reachability and temporal logics [12, 14]. Threshold dynamics of gene regulatory networks [2, 20] or of excitable signaling systems [28] has been modelled by piecewise-linear and piecewiseaffine models. These models have relatively simple structure and can, in certain cases, be identified from Ezio Bartocci and Luca Bortolussi (Eds.): HSB 2012 EPTCS 92, 2012, pp. 88–105, doi:10.4204/EPTCS.92.7 V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 89 data [18, 8].Some methods were proposed for computing the set of reachable states of piecewise affine models [3]. Among the applications of hybrid modeling, one of the most important is the cell cycle regulation. The machinery of the cell cycle, leading to cell division and proliferation, combines slow growth, spatiotemporal re-organisation of the cell, and rapid changes of regulatory proteins concentrations induced by post-translational modifications. The advancement through the cell cycle is a well defined sequence of stages, separated by checkpoint transitions. This justifies hybrid modelling approaches, such as Tyson’s hybrid model of the mammalian cell cycle [24]. This model is based on a Boolean automaton whose discrete transitions trigger changes of kinetic parameters in a set of ODEs. The model has been used to reproduce flow cytometry data. Instead of building the hybrid model from scratch, another strategy is to identify hybrid models from experimental or artificial time series [16, 17, 1]. The resulting cell cycle hybrid models can be used for hypothesis testing, as they are or as parts of larger, integrated models. In this paper we develop ideas first introduced in [15]. We discuss how a given model of the cell cycle, based on ODEs, can be hybridized. The hybridization, based on a tropical geometry heuristics, unravels commonalities of cell cycle models. These systems combine quasi-equilibrium states, represented by slow invariant manifolds and excitability, represented by rapid transitions to and from these manifolds. With respect to [15] we introduce several new concepts and provide rigorous justification of the procedures. Two general hybridization procedures called tropicalizations are introduced in section 2. The tropicalized dynamics is guaranteed to be a good approximation for polynomial or rational systems with well separated terms and that satisfy a condition called permanency. In subsection 2.2 we introduce the tropical equilibration as a method to test permanency. In section 3 we apply these methods to a cell cycle biochemical network model. 2 Tropical geometry and hybridization 2.1 General settings In chemical kinetics, the reagent concentrations satisfy ordinary differential equations: dxi = Fi (x), 1 ≤ i ≤ n. dt (1) Rather generally, the rates are rational functions of the concentrations and read Fi (x) = Pi (x)/Qi (x), (2) where Pi(x) = ∑α ∈Ai ai,α xα , Qi (x) = ∑β ∈Bi bi,β xβ , are multivariate polynomials. Here xα = x1α1 x2α2 . . . xαn n , β β β xβ = x1 1 x2 2 . . . xn n , ai,α , bi,β , are nonzero real numbers, and Ai , Bi are finite subsets of Nn . Special case are represented by Fi (x) = Pi+ (x) − Pi− (x), (3) α ± where Pi+ (x), Pi− (x) are Laurent polynomials with positive coefficients, Pi± (x) = ∑α ∈A±i a± i,α x , ai,α > n 0, A± i are finite subsets of Z . In multiscale biochemical systems, the various monomials of the Laurent polynomials have different orders, and at a given time, there is only one or a few dominating terms. Therefore, it could make sense to replace Laurent polynomials with positive real coefficients ∑α ∈A aα xα , by max-plus polynomials maxα ∈A {log(aα )+ < log(x), α >}. Hybrid models of the cell cycle 90 This heuristic can be used to associate a piecewise-smooth hybrid model to the system of rational ODEs (1), in two different ways. The first method was proposed in [15] and can be applied to any rational ODE system defined by (1),(2): Definition 2.1 We call complete tropicalization of the smooth ODE system (1),(2) the following piecewisesmooth system: dxi = DomPi (x)/DomQi (x), (4) dt where Dom{ai,α xα }α ∈Ai = sign(ai,αmax )exp[maxα ∈Ai {log(|ai,α |)+ < u, α >}]. u = (logx1 , . . . , logxn ), and ai,αmax , αmax ∈ Ai denote the coefficient of the monomial for which the maximum is attained. In simple words, Dom renders the monomial of largest absolute value, with its sign. The second method,proposed in [21], applies to the systems (1),(3). Definition 2.2 We call two terms tropicalization of the smooth ODE system (1),(3) the following piecewisesmooth system: dxi = DomPi+ (x) − DomPi−(x), (5) dt The two-terms tropicalization was used in [21] to analyse the dependence of steady states on the model parameters. The complete tropicalization was used for the study of the model dynamics and for the model reduction [15]. For both tropicalization methods, for each occurrence of the Dom operator, one can introduce a tropical manifold, defined as the subset of Rn where the maximum in Dom is attained by at least two terms. For instance, for n = 2, such tropical manifold is made of points, segments connecting these points, and half-lines. The tropical manifolds in such an arrangement decompose the space into sectors, inside which one monomial dominates all the others in the definition of the reagent rates. The study of this arrangement give hints on the possible steady states and attractors, as well as on their bifurcations. 2.2 Justification of the tropicalization and some estimates In the general case, the tropicalization heuristic is difficult to justify by rigorous estimates, however, this is possible in some cases. We state here some results in this direction. To simplify, let us consider the class of polynomial systems, corresponding to mass action law chemical kinetics: dxi = Pi (x, ε ) = dt M ∑ Mi j (x, ε ), Mi j = Pi j (ε )xαi j (6) j=1 where αi j are multi-indices, and ε is a small parameter. So, the right hand side of (6) is a sum of monomials. We suppose that coefficients Pi j have different orders in ε : Pi j (ε ) = ε bi j P̄i j , (7) where bi j 6= bi′ j′ for (i, j) 6= (i′ , j′ ). We also suppose that the cone R> = {x : xi ≥ 0} is invariant under dynamics (6) and initial data are positive: xi (0) > δ > 0. The terms (7) can have different signs, the ones with P̄i j > 0 are production terms, and those with P̄i j < 0 are degradation terms. V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 91 From the biochemical point of view, the choice (7) is justified by the fact that biochemical processes have many, well separated timescales. Furthermore, we are interested in biochemical circuits that can function in a stable way. More precisely, we use the permanency concept, borrowed from ecology (the Lotka -Volterra model, see for instance [25]). Definition 2.3 The system (6) is permanent, if there are two constants C− > 0 and C+ > 0, and a function T0 , such that C− < xi (t) < C+ , f or all t > T0 (x(0)) and f or every i. (8) We assume that C± and T0 are uniform in (do not depend on) ε as ε → 0. For permanent systems, we can obtain some results justifying the two procedures of tropicalization. Proposition 2.4 Assume that system (6) is permanent. Let x, x̂ be the solutions to the Cauchy problem for (6) and (4) (or (5)), respectively, with the same initial data: x(0) = x̂(0). Then the difference y(t) = x(t) − x̂(t) satisfies the estimate |y(t)| < C1 ε γ exp(bt), γ > 0, (9) where the positive constants C1 , b are uniform in ε . If the original system (6) is structurally stable in the domain ΩC− ,C+ = {x : C− < |x| < C+ }, then the corresponding tropical systems (4) and (5) are also permanent and there is an orbital topological equivalence x̄ = hε (x) between the trajectories x(t) and x̄(t) of the corresponding Cauchy problems. The homeomorphism hε is close to the identity as ε → 0. The proof of the estimate (9) follows immediately by the Gronwall lemma. The second assertion follows directly from the definition of structural stability. Permanency property is not easy to check. In the case of systems (6) we can make a renormalization xi = ε ai x̄i (10) and suppose that (8) holds for x̄i with Ci± uniform in ε . We seek for renormalization exponents ai such that only a few terms dominate all the others, for each i-th equation (6) as ε → 0. Let us denote the number of terms with minimum degree in ε for i-th equation as mi . Naturally, 1 ≤ mi ≤ Mi . After renormalization, we remove all small terms that have smaller orders in ε as ε → 0. We can call this procedure tropical removing. The system obtained can be named tropically truncated system. Let us denote αli j the l th coefficient of the multi-index α~i j . If all mi = 1 then we have the following truncated system d x̄i i j(i) = ε µi Fi (x̄), Fi = pi j(i) x̄α , (11) dt where n µi = γi j(i) ∑ αl i j(i) al (12) f or all j 6= j(i). (13) l=1 and n µi > γi j ∑ αli j al l=1 Hybrid models of the cell cycle 92 If all mi = 2, in order to find possible renormalization exponents ai , it is necessary to resolve a family of linear programming problem. Each problem is defined by a set of pairs ( j(i), k(i)) such that j(i) 6= k(i). We define µi by n µi = γi j(i) + ∑ αl i j(i) l=1 n al = γik(i) + ∑ αl ik(i) al (14) f or all j 6= j(i), k(i). (15) l=1 and obtain the system of the following inequalities n µi ≥ γi j + ∑ αli j al l=1 The following straightforward lemma gives a necessary condition of permanency of the system (6). Lemma 2.5 Assume a tropically truncated system is permanent. Then, for each i ∈ {1, . . . , n}, the i-th equation of this system contains at least two terms. The terms should have different signs for coefficients pi j , i.e., one term should be a production one, while another term should be a degradation term. We call “tropical equilibration”, the condition in Lemma 2.5. This condition means that permanency is acquired only if at least two terms of different signs have the maximal order, for each equation of the system (6). This idea is not new, and can be traced back to Newton. The tropical equilibration condition can be used to determine the renormalization exponents, by the following algorithm. Step 1. For each i let us choose a pair ( j(i), k(i)) such that j, i ∈ {1, . . . , mi } and j < k. The sign of the corresponding terms should be different. Step 2. We resolve the linear system of algebraic equations n γi j(i) − γik(i) = − ∑ αl l=1 i j(i) n al + ∑ αl ik(i) al , (16) l=1 for al , together with the inequalities (15). Notice that although that Step 2 has polynomial complexity, the tropical equilibration problem has an exponential number of choices at Step 1. Assume that, as a result of this procedure, we obtain the system d x̄i = ε µi (Fi+ (x̄) − Fi− (x̄)), dt ij Fi± = pi j± x̄α± . (17) One can expect that, in a ”generic” case1 , all µi are mutually different, namely 0 = µ1 < µ2 < ... < µn−1 < µn . (18) We can now state a sufficient condition for permanency. Let us consider the first equation (17) with i = 1 and let us denote y = x̄1 , z = (x̄2 , ..., x̄n )tr . In this notation, the first equation becomes dy = f (y) = b1 (z)yβ1 − b2 (z)yβ2 , dt b1 , b2 > 0, βi ∈ R. (19) Since µ2 > 0, one has that z(t) is a slow function of time and thus we can suppose that bi are constants (this step can be rendered rigorous by using the concept of invariant manifold and methods from [11]). 1 supposing that multi-indices α ~i j are chosen uniformly, by generic we understand almost always except for cases of vanishing probability, see also [10] V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 93 The permanency property can be then checked in an elementary way. All rest points of (19) are roots of f . If f > 0, y(t) is an increasing time function and if f < 0, y(t) is a decreasing time function. A single root y1 of f within (0, +∞) is given by y1 = b2 d , b1 d= 1 . β1 − β2 (20) These properties entail the following result: Lemma 2.6 Equation 19 has the permanence property if and only if 0 < β1 < β2 , i β1 < β2 < 0, ii or or β1 < 0, β2 > 0. iii For fixed z, in these cases we have y(t, z) → y0 , as t → ∞. The generic situation described by the conditions (18) lead to trivial “chain-like” relaxation towards a point attractor, provided that we have permanency at each step. This result is the nonlinear analogue of the similar result that monomolecular networks with total separation relax as chains and can only have stable point attractors [10]. The following theorem describes a less trivial situation, when limit cycles are possible. Theorem 2.7 Assume 0 = µ1 < µ2 < ... < µn−1 ≤ µn holds. If the procedure, described above, leads to the permanency property at each step, where i = 1, 2, ..., n − 2, and the last two equations have a globally attracting hyperbolic rest point or globally attracting hyperbolic limit cycle, then the tropically truncated system is permanent and has an attractor of the same type. Moreover, for sufficiently small ε the initial system also is permanent for initial data from some appropriate domain Wε ,a,A and has an analogous attracting hyperbolic rest point (limit cycle) close to the attractor of the truncated system. If the rest point (cycle) is not globally attracting, then we can say nothing on permanency but, for sufficiently small ε , the initial system still has an analogous attracting hyperbolic rest point (limit cycle) close to the attractor of truncated system and the same topological structure. Finally, let us note that tropical equilibrations with permanency imply the existence of invariant manifolds. This allows to reduce the number of variables of the model while preserving good accuracy in the description of the dynamics. The following Lemma is useful in this aspect. Lemma 2.8 Consider the system dy = f (y) = b1 (z)yβ1 − b2 (z)yβ2 , dt dz = λ F(y, z), dt b1 , b2 > 0, βi ∈ R. (21) (22) Hybrid models of the cell cycle 94 where z ∈ Rm , λ > 0 is a parameter and the function F enjoys the following properties. This function lies in an Hölder class F ∈ C1+r , r > 0, and the corresponding norms are uniformly bounded in Ω = (0, +∞) ×W , for some open domain W ⊂ Rm : |F|C1+r (Ω ) < C2 . Assume one of conditions i, ii, iii of Lemma 2.6 holds. We also suppose that bi are smooth functions of z for all z such that |z| > δ0 > 0. Assume that z ∈ W implies |z| > δ0 . Then, for sufficiently small λ < λ0 (C2 , b1 , b2 , β1 , β2 , δ ) equations (21), (23) have a locally invariant and locally attracting manifold y = Y (z, λ ), Y ∈ C1+r (W ), (23) and Y has the asymptotics Y (z, λ ) = y1 (z) + Ỹ , where Ỹ ∈ C1+r (W ), |Ỹ (z, λ )|C1+r (W ) < Cs λ s , s > 0. (24) (25) Proof. The proof is standard, follows from Theorems in [11], Ch. 9. 3 A paradigmatic cell cycle model and its tropicalization 3.1 Description of the model We study here the cell cycle model proposed by Tyson [27]. This model mimics the interplay between cyclin and cyclin dependent kinase cdc2 (forming the maturation promoting factor MPF complex) during the progression of the cell cycle. The model demonstrates that this biochemical system can function as an oscillator, or converge to a steady state with large MPF concentration, or behave as an excitable switch. The three regimes can be associated to early embryos rapid division, metaphase arrest of unfertilized eggs, and growth controlled division of somatic cells, respectively. This model takes into account autocatalytic activity of MPF (positive feed-back). It can be described as a nonlinear cycle of biochemical reactions and corresponds to the following set of differential equations: y′1 = ε −3 k9 y2 − ε −6k8 y1 + k6 y3 , y′3 = ε 2 k4′ y4 + ε −2 k4 y4 y23 − k6 y3 , y′5 = ε 2 k1 − ε −2 k3 y2 y5 , y′2 = ε −6 k8 y1 − ε −3k9 y2 − ε −2k3 y2 y5 , y′4 = −ε 2 k4′ y4 − ε −2k4 y4 y23 + ε −2 k3 y2 y5 , (26) Here ki > 0 are rate constants, yi , i ∈ [1, 5] are concentrations of cdc2, p-cdc2 (phosphorylated kinase), cyclin-p:cdc2 complex (active MPF), cyclin-p:cdc2-p complex (inactive MPF), and cyclin, respectively. With respect to the original model we have introduced a small parameter ε > 0 to cope with the order of the rate constants (ε = 0.1 in the original model). The system (26) has the conservation law y1 (t) + y2 (t) + y3 (t) + y4 (t) = 1, where the value 1 (total initial concentration of kinase cdc2) was chosen by convenience. (27) V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 95 3.2 Tropical equilibrations and model reduction Let us apply the tropical equilibration principle. To this aim, we renormalize the variables, yi = ε ai ȳi . (28) Let us substitute these relations into the system of equations. As a result, we obtain ȳ′1 = ε −3+a2 −a1 k9 ȳ2 − ε −6 k8 y1 + k6 ε a3 −a1 ȳ3 , ȳ′3 = ε 2+a4 −a3 k4′ ȳ4 + ε −2+a3+a4 k4 ȳ4 ȳ23 − k6 ȳ3 , ȳ′5 = ε 2−a5 k1 − ε −2+a2 k3 ȳ2 ȳ5 . ȳ′2 = ε −6+a1 −a2 k8 ȳ1 − ε −3 k9 ȳ2 − ε −2+a5 k3 ȳ2 ȳ5 , ȳ′4 = −ε 2 k4′ ȳ4 − ε −2+2a3 k4 ȳ4 ȳ23 + ε −2+a2+a5 −a4 k3 ȳ2 ȳ5 , (29) The system (29) has the conservation law ε a1 ȳ1 (t) + ε a2 ȳ2 (t) + ε a3 ȳ3 (t) + ε a4 ȳ4 (t) = 1. (30) In order to compute the exponents ai we use tropical equilibrations together with the conservation law (30). There are 24 variants of tropical equilibrations. To our surprise, there is only one solution for the exponents values. We can show that all possible equilibrations of the variables y3 , y4 and y5 uniquely set the values of two exponents, a3 = 2, a4 = 0. Let us consider the variants with respect to the equilibrations of the variables y1 and y2 . Denoting by Ti the ith term in the equation, we have the following situations: 1) In eq. for ȳ1 : T 1 = T 2, T 3 <= T 1, In eq. for ȳ2 : T 1 = T 2, T 3 <= T 1. 2) In eq. for ȳ1 : T 1 = T 2, T 3 <= T 1, In eq. for ȳ2 : T 1 = T 3, T 2 <= T 3. 3) In eq. for ȳ1 : T 2 = T 3, T 1 <= T 2, In eq. for ȳ2 : T 1 = T 2, T 3 <= T 1. 4) In eq. for ȳ1 : T 2 = T 3, T 1 <= T 2, In eq. for ȳ2 : T 1 = T 3, T 2 <= T 1. In the variant 1 (Case I) the tropical equilibrations do not fix the values of the exponent a5 and we get a1 = 7 − a5 , a2 = 4 − a5 , a3 = 2, a4 = 0, a5 ≥ −1. (31) In the variants 2,3,4 (Case II) the exponents are uniquely determined from equilibrations and we obtain a1 = 8, a2 = 5, a3 = 2, a4 = 0, a5 = −1. (32) However, (32) and the conservation law (30) are incompatible, therefore, the case II can be rejected. In the case I the conservation law takes the form ε 7−a5 ȳ1 (t) + ε 4−a5 ȳ2 (t) + ȳ4 (t) = 1 + o(1), as ε → 0. Assuming that ȳ2 (0) = O(1) and ȳ4 6= 1 (it is reasonable, since it is a ”generic case”), we obtain a5 = 4. Thus, the only possible situation is variant 1 (Case I) and the corresponding set of exponents is: a1 = 3, a2 = 0, a3 = 2, a4 = 0, a5 = 4. (33) Let us note that the terms T 1 and T 2 in the equations for the variables y1 , y2 correspond to direct and reverse rates of a phosphorylation/dephosphorylation cycle transforming y1 into y2 and back. Thus, biochemically, (Case I) corresponds to the quasi-equilibrium of this cycle. Furthermore, the equilibration of all the variables leads to the exponents (31). In this case, 2 + a4 − a3 = −2 + a3 + a4 = 0, 2 = −2 + 2a3 = −2 + a2 + a5 − a4 , meaning that the tropical equilibrations of the variables y3 , y4 are triple (in each equation, all three terms have the same order). Hybrid models of the cell cycle 96 We finally obtain the following renormalized system ȳ′1 = ε −6 (k9 ȳ2 − k8 ȳ1 ) + k6 ε −1 ȳ3 , ȳ′3 ȳ′5 = k4′ ȳ4 + k4 ȳ4 y23 − k6 ȳ3 , = ε −2 (k1 − k3 ȳ2 ȳ5 ). ȳ′2 = ε −3 (k8 ȳ1 − k9 ȳ2 ) − ε 2 k3 ȳ2 ȳ5 , ȳ′4 = ε 2 (−k4′ ȳ4 − k4 ȳ4 ȳ23 + k3 ȳ2 ȳ5 ), (34) The structure of the system (34) emphasizes the multiple time scales of the model. The fastest variables are in order y1 , then y2 and y5 . The variables y3 and y4 are slow. Assume that (35) ȳ2 > δ > 0. This important assumption ensures the existence of an invariant manifold and will be justified, a posteriori. Then, from the last equation (34) we obtain the relation ȳ2 ȳ5 = k1 /k3 + O(ε 2 ), which represents the equation of an invariant manifold. In turn, this relation leads to the following equations for ȳ3 , ȳ4 ȳ′3 = k4′ ȳ4 + k4 ȳ4 ȳ23 − k6 ȳ3 , ȳ′4 = ε 2 (−k4′ ȳ4 − k4 ȳ4 ȳ23 + k1 ). (36) A second invariant manifold equation is defined by the equation ȳ1 = k8−1 (k9 ȳ2 + k6 ε 5 ȳ3 ). (37) Remind that ȳ3 is a slow variable. Then, for ȳ2 we have ȳ′2 = ε 2 (k6 ȳ3 − k1 ). (38) System (36) represents a two-dimensional reduced model of the initial five-dimensional system. This result shows that tropical equilibrations can be used for model reduction. The solutions of (36) either tend to the stable equilibrium ȳ4 = k1 , ′ k4 + k4 (k1 /k6 )2 ȳ3 = k1 /k6 , (39) or, if this equilibrium is unstable, to a limit cycle. Based on the general Theorem 2.7 we can assert the following: Theorem 3.1 Assume (35) holds with δ > 0. If the shorted system (36) has a stable hyperbolic limit cycle, then, under above conditions, for sufficiently small ε the five component system (26) also has a stable limit cycle. If the shorted system (36) has a stable hyperbolic equilibrium, then, under above conditions, for sufficiently small ε the five component system (26) also has a stable hyperbolic equilibrium. We have studied the system (36) analytically and numerically. The numerical simulations confirm the criteria of cycle existence both for small ε and for ε = O(1). For small epsilon the cycle has a singular structure. The amplitude of ȳ3 and the cycle period increase in ε , approximatively, as ε −2 (the assertion about period is natural since the rate of ȳ4 is O(ε 2 )). V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 97 Hyperbolicity can be straightforwardly checked for the rest point (39), by computing the eigenvalues of the linearized system. Denote by Y = (ȳ3 , ȳ4 ). When the rest point Y 0 = (ȳ03 , ȳ04 ) is hyperbolic and stable we have the following estimate |Y (t) −Y 0 | < C1 exp(−c1 ε 2t) (40) with some C1 , c1 > 0 holds. Integrating (38) for ȳ2 over interval [0, τ ] gives |ȳ2 (τ ) − ȳ2 (0)| < ε 2C1 c−1 1 = o(1) (41) uniformly in τ > 0 as ε → 0. This yields that ȳ2 (t) > δ if ȳ2 (0) > 2δ and therefore, ȳ2 (t) does not go to zero for large t, justifying the estimate (35) needed for the existence of an invariant manifold. The case of a limit cycle is discussed in the next subsection. 3.3 Singular limit cycle and hybrid dynamics Up to this point, the tropical ideas were used for reducing the dynamics of the model. In this section we show that the tropicalization heuristic is well adapted for decomposing the limit cycle into slow and fast modes, providing a hybrid description of the dynamics. Let us note that in a hybrid, excitable system, it is possible that not all variables are equilibrated. Also, the system can have more than two different equilibrations and associated invariant manifolds, and jump from one invariant manifold to another during the dynamics. Let us consider that the variables y1 , y2 , y5 are equilibrated as above, but now, only one among the variables y3 or y4 are equilibrated. We have four situations: 1) In eq. for ȳ3 : T 1 = T 3, T 2 <= T 1, 2) In eq. for ȳ3 : T 2 = T 3, T 1 <= T 2, 3) In eq. for ȳ4 : T 1 = T 3, T 2 <= T 1, 4) In eq. for ȳ4 : T 2 = T 3, T 1 <= T 2. Combined with the conservation law condition (30), variants 1 and 2 lead to the same triple tropical equilibration as before (Case I) and exponents (33). We denote the corresponding invariant manifold M1 . The renormalized equations are the same as (36). Variant 3 can be rejected by the general permanency criterion given by Lemma 2.6. Variant 4 (Case III) satisfies the permanency criterion and leads to a1 = 3, a2 = 0, a3 = 0, a4 = 4, a5 = 4. (42) This corresponds to a double equilibration (two equal terms) of the variable y4 , the variable y3 being not equilibrated. We denote the corresponding invariant manifold M2 . The renormalized equations read ỹ′3 = ε 6 k4′ ỹ4 + ε 2 k4 ỹ4 ỹ23 − k6 ỹ3 , ỹ′4 = −ε 2 k4′ ỹ4 + ε −2 (−k4 ỹ4 ỹ23 + k1 ). (43) We can provide a hybrid description of the cell cycle, by decomposing the periodic orbit into three modes (Fig.1). The first mode is the slowest and has the longest duration. It consists in the dynamics on the slow invariant manifold M1 at low values of y3 , and can be described by the algebraic-differential system ỹ′3 = ε 2 k1 − k6 ỹ3 , k4′ ỹ4 + k4 ỹ′4 ỹ23 − k6 ỹ3 = 0 (part between O1 and O of the orbit in Fig1c)). The exit from the invariant manifold M1 occurs at a critical point (point O). The next slowest mode corresponds to the decrease of y3 (part between O2 and O1 of the orbit in Fig1c)) and can be described by two terms truncated system ỹ′4 = ε −2 (k1 − k4 ỹ4 ỹ23 ), ỹ′3 = −k6 ỹ3 . Finally, there is a fast mode, corresponding to the fast increase of ỹ3 (part between O and O2 of the orbit in Fig1c)) and described by the truncated system ỹ′4 = −ε 2 k4 ỹ4 ỹ23 , ỹ′3 = ε −2 k4 ỹ4 ỹ23 . One can notice (Fig1c)) that this hybrid approximation is very accurate Hybrid models of the cell cycle 98 for small ε . At a distance from the tropical manifold, the hybrid orbit coincides with the one generated by the two terms or by the complete tropicalization. However, close to the tropical manifold, the two term and the complete tropicalization are less accurate than the hybrid approximation described above. Below we state rigorous estimates describing the slow movement on M1 and the fast jump towards M2 . The two terms description of the dynamics on M2 is a direct consequence of the Proposition 2.4 and Lemmas 2.6,2.8. To simplify notation, we rewrite the system (36) for y3 , y4 as x′ ′ = y = y + yx2 − k0 x, (44) ε 2 (−y − yx2 + k1 ). (45) We can obtain such a presentation by a linear variable change. Let us define the functions q k02 − k02 − 4y2 X (y) = , 2y q k02 + k02 − 4y2 , X+ (y) = 2y and the points y0 = k0 /2, x0 = X (y0 ) = 1. Lemma 3.2 Solutions of (44), (45) with initial data x(0), y(0) such that 0 < δ0 < x(0) < X+ (y0 ) − δ0 , 0 < y(0) < y0 − δ0 , (46) where δ0 is a small positive number independent on ε , satisfy |x(t) − X (y(t))| < C1 (ε + exp(−c1 δ0 t)), t < T0 (x(0), y(0), ε ) (47) this estimate holds while y(t) < y0 − δ2 , δ2 > 0. (48) Let us find some estimates of solutions at y = y0 , x = x0 . Our goal is to prove that at this point x(t) starts to increase sharply. After this, the terms ±yx2 play the main role in the equations (44),(45), and the other terms can be removed while the x-component is big. Let us introduce new variables u, v by x − x0 = v, u = y − y0 . For u, v one obtains v′ = k0 2 v + u(1 + (1 + v)2 ), 2 k0 + u)(1 + (1 + v)2 ) + k1 )) = ε 2 g(u, v). 2 Let us consider for this system the Cauchy problem with initial data u′ = ε 2 (−( v(0) = v0 , u(0) = u0 . (49) (50) (51) V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 99 Lemma 3.3 Consider the Cauchy problem (49), (50) and (51) under assumptions that u0 = κ > 0, |v0 | < δ5 , and k1 > k0 , (52) where δ0 , δ5 are small enough (but independent on ε ). Let A be a large positive number independent of ε . Then within some interval t ∈ (τ0 (δ5 , k0 , k1 , A), τ1 (δ5 , k0 , k1 , A)) one has u(t) > 0, v(t) ≥ A, v(τ0 ) = A. (53) This result can be reinforced. Actually, x(t) attains values of the order O(ε −2 ). Lemma 3.4 Assume x(t1 ) = A >> 1, Then for σ , A such that and t such that 4 y(t1 ) ≥ k0 /2. (54) 1 x(t) ≥ (A−1 − σ t)−1 , 2 (55) y(t) ≥ σ , (56) σ A > 2k0 , σ > k0 exp(−2σ −1 ), 1 (A−1 − σ t) ≥ ε 2 . 2 (57) (58) Conclusion We showed that tropical ideas can be usefully employed to reduce and hybridize polynomial or rational dynamical systems occurring in modelling the molecular machinery of the cell cycle. The main idea consists in keeping only the dominant monomial terms in the right hand side of the ordinary differential equations. Depending on the position in phase space, one should keep one, two, or more such terms. The places where two or more monomial terms are equal form the so-called tropical manifolds. The one term approximation is valid far from the tropical manifolds, whereas close to tropical manifolds several dominating terms of opposite signs can equilibrate each other. These “tropical equilibrations” of the dominating terms slow down the dynamics and produce attractive invariant manifolds. The possible applications of this method are multiple. Generally, the method can be used to obtain simplified models. In the example studied here, we have started with a five variables model, that has been reduced to two variables and hybridized. The modes of the hybrid model have the simple structure of monomial differential or differential-algebraic equations. Two general methods that we called complete and two terms tropicalizations provide description of the modes and of the mode changes. However, these general procedures may lead to inaccurate approximations when the full model does not satisfy permanency globally. In such cases, more thorough analysis is needed. We have shown that the model of embryonic cell cycle has essentially three modes with different timescales, namely slow accumulation of cyclin, rapid activation of MPF and intermediately rapid degradation of cyclin and inactivation of MPF. 100 Hybrid models of the cell cycle Figure 1: Limit cycle behavior of the paradigmatic cell cycle model from [27]. (a) The three main processes during the embryonic cell cycle are, in order of the timescales, fast increase of y3 (active MPF, triggering mitosis), slower decrease of y3 and very slow increase of y4 (inactive MPF). (b) Two invariant manifolds corresponding to the two slow processes are close to the tropical manifolds (blue lines) and result from equilibration of the variables (equilibration of y4 corresponds to M2 and equilibration of y3 corresponds to M1 ). (c) A three modes hybrid approximation of the cell cycle (in red) compared to the original limit cycle (black crosses). V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 101 The fastest mode is described by monomial ODEs, whereas the less fast modes correspond to tropical equilibrations and are described by differential-algebraic equations. Several improvements and developments are needed in order to apply these methods at a larger scale. The computation of tropical equilibrations suffers from combinatorial explosion. However, for the biochemical network used as working example, the number of solutions seems to be very small compared to the large combinatorics of monomial terms. There is hope, that once formulated in constraint logic programming, the problem of equilibrations could be efficiently computed in practice as a constraint satisfaction problem. Also, effective methods are needed to compute the transitions between modes. The main difficulty here is related to walls (segments of the tropical manifolds) crossing. Near walls, two or more terms are dominant. When these terms are equilibrated, orbits remain close to the walls and are contained in invariant manifolds. The complete or two terms tropicalizations provide general heuristic for mode transitions. These approximations mail fail close to walls. For instance, as we showed in a previous paper [15], the complete tropicalization predicts sliding modes that evolve on the wall and stay thus close to orbits of the full system. However, these sliding modes can be too long, leaving the wall when the orbits of the full system are already far away. In order to get an accurate description of the behavior near such walls we had to compute invariant manifolds. Although this is generally much simpler than integrating the full set of equations, it could become difficult for tropical equilibrations involving more than two terms. Future work will be dedicated to developing general methods for this problem. References [1] R. Alfieri, E. Bartocci, E. Merelli & L. Milanesi (2011): Modeling the cell cycle: From deterministic models to hybrid systems. Biosystems 105, pp. 34–40, doi:10.1016/j.biosystems.2011.03.002. [2] V. Baldazzi, P.T. Monteiro, M. Page, D. Ropers, J. Geiselmann & H. Jong (2011): Qualitative Analysis of Genetic Regulatory Networks in Bacteria. Understanding the Dynamics of Biological Systems, pp. 111–130, doi:10.1007/978-1-4419-7964-3_6. [3] G. Batt, H. De Jong, M. Page & J. Geiselmann (2008): Symbolic reachability analysis of genetic regulatory networks using discrete abstractions. Automatica 44(4), pp. 982–989, doi:10.1016/j.automatica.2007. 08.004. [4] L. Bortolussi & A. Policriti (2011): (Hybrid) automata and (stochastic) programs. The hybrid automata lattice of a stochastic program. Journal of Logic and Computation, doi:10.1093/logcom/exr045. [5] A. Crudu, A. Debussche, A. Muller & O. Radulescu (to appear, Arxiv preprint arXiv:1101.1431): Convergence of stochastic gene networks to hybrid piecewise deterministic processes. Annals of Applied Probability. [6] A. Crudu, A. Debussche & O. Radulescu (2009): Hybrid stochastic simplifications for multiscale gene networks. BMC Systems Biology 3(1), p. 89, doi:10.1186/1752-0509-3-89. [7] R. David & H. Alla (2008): Discrete, continuous, and hybrid Petri nets. IEEE Control Systems 28, pp. 81–84, doi:10.1109/MCS.2008.920445. [8] S. Drulhe, G. Ferrari-Trecate & H. de Jong (2008): The switching threshold reconstruction problem for piecewise-affine models of genetic regulatory networks. IEEE Transactions on Automatic Control 53, pp. 153–165, doi:10.1109/TAC.2007.911326. [9] A.F. Filippov & FM Arscott (1988): Differential equations with discontinuous righthand sides. 18, Springer. [10] AN Gorban & O. Radulescu (2008): Dynamic and static limitation in reaction networks, revisited . In David West Guy B. Marin & Gregory S. Yablonsky, editors: Advances in Chemical Engineering - Mathematics in Chemical Kinetics and Engineering, Advances in Chemical Engineering 34, Elsevier, pp. 103–173, doi:10.1016/S0065-2377(08)00002-1. Hybrid models of the cell cycle 102 [11] D. Henry (1981): Geometric theory of semilinear parabolic problems. Lecture Notes in Mathematics 840. [12] P. Lincoln & A. Tiwari (2004): Symbolic systems biology: Hybrid modeling and analysis of biological networks. Hybrid Systems: Computation and Control, pp. 147–165, doi:10.1007/978-3-540-24743-2_44. [13] A.S. Matveev & A.V. Savkin (2000): Qualitative theory of hybrid dynamical systems. Birkhauser. [14] B. Mishra (2009): Intelligently deciphering unintelligible designs: algorithmic algebraic model checking in systems biology. Journal of The Royal Society Interface 6(36), pp. 575–597, doi:10.1098/rsif.2008. 0546. [15] V. Noel, D. Grigoriev, S. Vakulenko & O. Radulescu (2012): Tropical geometries and dynamics of biochemical networks. Application to hybrid cell cycle models. Electronic Notes in Theoretical Computer Science 284, pp. 75–91, doi:10.1016/j.entcs.2012.05.016. [16] V. Noel, S. Vakulenko & O. Radulescu (2010): Piecewise smooth hybrid systems as models for networks in molecular biology. In: Proceedings of JOBIM 2010, Jobim, Montpellier. [17] V. Noel, S. Vakulenko & O. Radulescu (2011): Algorithm for identification of piecewise smooth hybrid systems: application to eukaryotic cell cycle regulation. Lecture Notes in Computer Science 6833, pp. 225– 236, doi:10.1007/978-3-642-23038-7_20. [18] R. Porreca, S. Drulhe, H. Jong & G. Ferrari-Trecate (2008): Structural identification of piecewise-linear models of genetic regulatory networks. Journal of Computational Biology 15(10), pp. 1365–1380, doi:10. 1089/cmb.2008.0109. [19] O. Radulescu, A. Muller & A. Crudu (2007): Théorèmes limites pour des processus de Markov à sauts. Synthèse des resultats et applications en biologie moleculaire. Technique et Science Informatique 26, pp. 443–469, doi:10.3166/tsi.26.443-469. [20] D. Ropers, V. Baldazzi & H. de Jong (2011): Model reduction using piecewise-linear approximations preserves dynamic properties of the carbon starvation response in Escherichia coli. IEEE/ACM Transactions on Computational Biology and Bioinformatics 8(1), pp. 166–181, doi:10.1109/TCBB.2009.49. [21] M.A. Savageau, P.M.B.M. Coelho, R.A. Fasani, D.A. Tolla & A. Salvador (2009): Phenotypes and tolerances in the design space of biochemical systems. Proceedings of the National Academy of Sciences 106(16), p. 6435, doi:10.1073/pnas.0809869106. [22] R. Shorten, F. Wirth, O. Mason, K. Wulff & C. King (2007): Stability Criteria for Switched and Hybrid Systems. SIAM Review 49(4), pp. 545–592, doi:10.1137/05063516X. [23] A. Singh & J.P. Hespanha (2010): Stochastic hybrid systems for studying biochemical processes. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 368(1930), pp. 4995–5011, doi:10.1098/rsta.2010.0211. [24] R. Singhania, R.M. Sramkoski, J.W. Jacobberger & J.J. Tyson (2011): A hybrid model of mammalian cell cycle regulation. PLoS computational biology 7(2), p. e1001077, doi:10.1371/journal.pcbi.1001077. [25] Y. Takeuchi (1996): Global dynamical properties of Lotka-Volterra systems. World Scientific, Singapore. [26] L. Tavernini (1987): Differential automata and their discrete simulators. Nonlinear Anal. Theory Methods Applic. 11(6), pp. 665–683, doi:10.1016/0362-546X(87)90034-4. [27] J.J. Tyson (1991): Modeling the cell division cycle: cdc2 and cyclin interactions. Proceedings of the National Academy of Sciences of the United States of America 88(16), p. 7328, doi:10.1073/pnas.88.16.7328. [28] P. Ye, E. Entcheva, SA Smolka & R. Grosu (2008): Modelling excitable cells using cycle-linear hybrid automata. Systems Biology, IET 2(1), pp. 24–32, doi:10.1049/iet-syb:20070001. 5 Appendix: proofs Proof of Lemma 3.2 Let us consider the equation x′ = y(0) + y(0)x2 − k0 x = f0 (x). (59) V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 103 One observes that f (x) < −δ4 < 0, x ∈ (X (y(0)) + δ0 , X+ (y0 ) − δ0 ), f (x) > δ4 , x ∈ (δ0 , X (y0 ) − δ0 ), and f ′ (x)|x=X(y0 ) < −δ5 < 0. √ k2 + k02 −4y(0)2 Therefore, if 0 < x(0) < 0 2y(0) − δ0 , then the solution x(t) attains a small δ - neighborhood of X (y(0)) within a bounded time interval T1 (δ , δ0 , δ4 ): |x(t, x0 , y0 ) − X (y(0))| < δ , t = T1 (δ , δ0 , δ4 ). Within a small δ - neighborhood of X (y(0) we set u = x − X (y(0)) and then we can rewrite (59) as follows : u′ = −κ u + h(u), |h(u)| < C1 u2 , u(T1 ) = δ . (60) where κ > 0 is independent of δ . Then, if δ is small enough, we have that u(t) < δ for all t > T1 and |u(t)| < C(T0 ) exp(−κ t/2), t > T0 . Let us compare now the solution x(t) of (59) and the corresponding solution x̄(t, x0 , y0 ) of (44) with the same initial data. For x(t) − x(0) = w one has, since y(t) − y(0) < C(T0 )ε 2 on any bounded interval t ∈ [0, T0 ], wt = a(t)w + ε 2 g(x,t, w), 0 < t ≤ T0 . with a smooth function g, a(t) is bounded function. Now the Gronwall inequality implies |w(t)| < C2 (T0 )ε 2 , t ∈ [0, T0 ]. Therefore, one has |x̄(t, x0 , y0 ) − X (y(t))| < δ , t = T2 (δ , δ0 , δ4 ). Since the function X (y) defines a smooth, locally attracting (for y < y0 ) invariant manifold, this proves our assertion. One can prove this in another, elementary way. Let us define u = x̄ − X (y). Then u′ = −κ (t)u + h(u) + O(ε ), |h(u)| < C1 u2 , u(T1 ) = δ , (61) where κ (t) > κ0 while y < y0 − δ0 . Again one has u(t) < 2δ for t > T1 (while y < y0 − δ0 ). Thus, u′ ≤ − κ0 u + O(ε ) 2 that entails the need estimate 47. Proof of Lemma 3.3 Let us consider the Cauchy problem w′ = k0 2 w , 2 w(0) = v0 = v(0) It is clear, by the comparison principle, that v(t) ≥ w(t) (62) Hybrid models of the cell cycle 104 while u(t) > 0. Consequently, the assertion w(τ0 ) = A proves the lemma. Let us prove first that if δ6 is small enough (but independent on ε ), for some t = τ1 we have v(τ1 ) = δ6 . (63) Without loss of generality, we assume that v(t) < δ6 , 0 < t < τ1 , v(τ1 ) = δ6 . (64) Let δ6 > 0 be small enough such that − k0 (1 + (1 + δ6 )2 ) + k1 > 0. 2 (65) Such a choice of δ6 is possible due to (52). Assume u(t) ≥ 0 within some time interval [0, τ2 ], and u(τ2 ) = 0 for some τ2 < τ1 . Since u(0) = 0, we have τ2 > 0. We can suppose without loss of generality that τ2 is the first moment, where u(τ2 ) = 0. Then u′ (τ2 ) ≤ 0. But then we obtain a contradiction with (65) at t = τ2 , since the right hand side of this equation is positive at this time moment. Therefore, we have shown that u(t) > 0 for all t from [0, τ1 ] if v(t) < δ6 for such t. Then v(t) ≥ w(t) on this time interval. The function w can be found, and an easy computation gives w(t) = (w−1 (0) − 2k0−1t)−1 ) = (u0 − 2k0−1t). (66) Assume that v(t) < δ6 for all t. Then (66) holds for all t, but w(τ1 ) > δ6 for some τ1 . We have obtained a contradiction, thus (63) is proved. Let us prove that v(t) = A. Let us consider an interval [t1 , T ] such that |v(t)| < A, v(t1 ) = δ6 . t ∈ [t1 , T ], (67) Then (65) implies u′ ≤ ε 2 (( k0 + |u|)(1 + (1 + A)2 ) + k1 )), 2 (68) that gives, by the Gronwall lemma, u(t) < C2 u(0) exp(C1 (A)ε 2t). Within interval (t1 , T ] one has then u(t) < C4 κ , t ∈ [0, T ]. (69) (70) and, therefore, v′ ≥ k0 2 v −C4 κ , 2 t ∈ [0, T ]. (71) Suppose that C4 κ < k0 δ6 . 8 Then (71) entails v′ ≥ k0 v, 4 t ∈ [0, T ], (72) V. Noel, D. Grigoriev, S. Vakulenko, & O. Radulescu 105 This gives k0 (t − t1 )). 4 This leads to a contradiction for T large enough (however, let us remark that T is uniform in ε ). Proof of Lemma 3.4 Remark: to satisfy (57) it suffices to set σ = 2k0 A−1 with a large A. Suppose that either the estimate (55) (case A) or the second estimate (56) (case B) is violated at some T but the both inequalities hold for all t1 ≤ t < T . We can set t1 = 0. Let us consider the case A. Since (56) hold, one has x′ ≥ σ x2 , x(0) = A, t ∈ [0, T ]. v(t) ≥ δ6 exp( This implies x′ /x2 = (−1/x)′ ≥ σ , x(0) = A. Thus, x ≥ (A−1 − σ t)−1 . For t = T this result gives a contradiction with (55). Let us consider the case B. Since (55) hold, one has y′ (t) ≤ −ε 2 (y(A−1 − σ t)−1 − k1 ), y(0) = k0 /2, t ∈ [0, T ]. Z t (1 + (A−1 − σ s)−2 )ds)d τ . This implies y(t) ≤ k0 exp(−ε 2 2 Z t 0 (1 + (A−1 − σ s)−2 )ds) + ε 2 k1 0 exp(−ε 2 Z t τ for t ∈ [0, T ]. Notice Z 0 τ t (1 + (A−1 − σ s)−2 )ds = t − τ + σ −1((A−1 − σ t)−1 − (A−1 − σ τ )−1). k0 (−2/σ ). Under condition (57) Thus, for sufficiently small ε , taking into account (58) one has y(T ) ≤ exp this result gives a contradiction with (56). Proof of Theorem 2.7 i Suppose that the tropically truncated system (TTS) has a globally attracting compact invariant set A . Let be Π be an open neighborhood of this set. We can choose this neighborhood as a box that contains A . Then, for all initial data x(0), the corresponding trajectory x(t), x(0) lies in Π for all t > T0 (x0 , Π ). Therefore, our TTS is permanent. Here we do not use that the cycle (rest point) is hyperbolic. ii Permanency of the initial system follows from hyperbolicity of A . Hyperbolic sets are persistent (structurally stable) (Ruelle 1989). Since this set is globally attracting, all TTS is structurally stable (as a dynamical system). This implies that the initial system has a hyperbolic attractor close to A , since initial system is a small perturbation of TTC in Π . iii If the set A is only locally attracting, the last assertion of Theorem follows from persistency of hyperbolic sets.
5cs.CE
A Small-Order-Polynomial-Sized Linear Program for Solving the Traveling Salesman Problem Moustapha Diaby OPIM Department; University of Connecticut; Storrs, CT 06268 [email protected] arXiv:1610.00353v2 [cs.DS] 4 Oct 2016 Mark H. Karwan Department of Industrial and Systems Engineering; SUNY at Buffalo; Amherst, NY 14260 [email protected] Lei Sun Praxair, Inc.; Tonawanda, NY 14150 [email protected] Abstract. We present a polynomial-sized linear program (LP) for the n-city TSP drawing upon “complex 9 8 5 flow” modeling ideas by the first two authors who used an O(n ) × O(n ) model*. Here we have only O(n ) 4 variables and O(n ) constraints. We do not model explicit cycles of the cities, and our modeling does not involve the city-to-city variables-based, traditional TSP polytope referred to in the literature as “The TSP Polytope.” Optimal TSP objective value and tours are achieved by solving our proposed LP. In the case of a unique optimum, the integral solution representing the optimal tour is obtained using any LP solver (solution algorithm). In the case of alternate optima, an LP solver (e.g., an interior-point solver) may stop with a fractional (interior-point) solution, which (we prove) is a convex combination of alternate optimal TSP tours. In such cases, one of the optimal tours can be trivially retrieved from the solution using a simple iterative elimination procedure we propose. We have solved over a million problems with up to 27 cities using the barrier methods of CPLEX, consistently obtaining all integer solutions. Since LP is polynomially solvable and we have a model which is of polynomial size in n, the paper is thus offering (although, incidentally) a proof of the equality of the computational complexity classes “P ” and “N P ”. The non-applicability and numerical refutations of existing negative extended formulations results (such as Braun et. al. (2015)∗∗ and Fiorini et al. (2015)∗∗∗ in particular) are briefly discussed in an appendix. Keywords: Linear Programming; Combinatorial Optimization; Traveling Salesman Problem; TSP; Computational Complexity. *: Advances in Combinatorial Optimization: Linear Programming Formulation of the Traveling Salesman and Other Hard Combinatorial Optimization Problems (World Scientific, January 2016). **: Braun, G., S. Fiorini, S. Pokutta, and D. Steurer (2015). Approximation Limits of Linear Programs (Beyond Hierarchies). Mathematics of Operations Research 40:3, pp. 756-772.. ***: Fiorini, S., S. Massar, S. Pokutta, H.R. Tiwary, and R. de Wolf (2015). Exponential Lower Bounds for Polytopes in Combinatorial Optimization. Journal of the ACM 62:2, Article No. 17. 1 Introduction The traveling salesman problem (TSP), with its many variants, is one of the most widely studied problems in Operations Research. A good review of natural formulations which have been proposed for the more general (asymmetric) version is given in Öncan et al. (2009). These formulations all 1 use the ‘traditional’ city-to-city modeling variables plus additional variables which are introduced in order to enforce the subtour elimination constraints and to tighten the bounds of the corresponding linear programming (LP) relaxation. Here we will introduce a new modeling approach based on the work of Diaby (2007) and Diaby and Karwan (2016a). Those authors developed a generalized framework for formulating hard combinatorial optimization problems (COPs) as polynomial-sized linear programs. The perspective they adopted was that many of the well-known hard combinatorial optimization problems (starting with the TSP) could be modeled as Assignment Problems (APs) with side/complicating-constraints (see Diaby (2010a, b, c)). Their overall idea for the TSP was to use a flow perspective over an AP-based graph with nodes representing (city, time-of-travel) pairs, and arcs representing travel legs. The novel feature in their modeling was to have variables representing doublets and triplets of travel legs, thereby “building” enough information into the modeling variables themselves that the enforcement of the “complicating constraints” could be done implicitly by simply setting appropriate variables to zero in the model. This led to an O(n9 )-variables, O(n8 )-constraints model. Using a similar modeling philosophy in this self-contained paper, we propose a simplified model with O(n5 ) variables and O(n4 ) constraints. Where Diaby (2007) and Diaby and Karwan (2016a) used doublets and triplets of arcs, we employ only combinations comprising a node (a “dot”) and an arc (a “dash”) of the AP-based graph in defining our flow variables. That is, whereas Diaby (2007) and Diaby and Karwan (2016a) respectively used three “dashes,” we accomplish the optimization task with a “dot” and a “dash” only. Unlike in Diaby (2007) and Diaby and Karwan (2016a), in the overall polytope of this new model, not all extreme points are integer. We show that a projection of the model onto the space of one of its classes of variables is integral. Hence, by expressing TSP tour costs in terms of the variables being projected to only, the proposed LP always finds an optimal TSP tour. Since LP is polynomially solvable (e.g. Bazaraa, M.S., J.J. Jarvis and H.D. Sherali (2010)), and we have a model which has polynomial size in n, we are thus offering a new proof of the equality of the computational complexity classes “P ” and “N P ” (see Garey, M.R. and D.S. Johnson (1979) for a treatise on computational complexity). The plan of this paper is as follows. We discuss a path representation of TSP tours in section 2. Section 3 develops our LP model of the path representations using the “complex flow” variables which we introduce. Special characteristics of the model structure are discussed in section 4. Problem size and our computational experiments are discussed in section 5. Finally, conclusions are discussed in section 6, and the non-applicability of existing negative extended formulations (EF) results for the “standard” TSP polytope and our software implementation of the model in this paper (which will be made publicly available) are described in Appendices A and B, respectively. 2 Path representation of TSP tours We will begin this section with statements of our basic assumptions and notation for the TSP parameters. Then, we will develop the path representation which serves as the foundation for the developments in the remainder of the paper. Assumption 1 We assume without loss of generality (w.l.o.g.) that: 1. The number of cities is greater than 5; 2. The TSP graph is complete; (Arcs on which travel is not permitted can be handled in the optimization model by associating large (“Big-M ”) costs to them.) 2 3. City “0” has been designated as the starting and ending point of the travels. Definition 2 We refer to the order in which a given city is visited after city 0 in a given TSP tour as the “time-of-travel” of that city in that TSP tour. In other words, if city i is the rth city to be visited after city 0 in a given TSP tour, then we will say that the time-of-travel of city i in the given tour is r. Notation 3 (General Notation) 1. n : Total number of cities (including the starting city); 2. ∀i, j ∈ Ω := {0, . . . , n − 1}, ci,j : Cost of travel from city i to j; 3. m := n − 1 (Number of cities to sequence); 4. M := {1, . . . , m} = {1, . . . , n − 1} (Set of cities to sequence); 5. S := {1, . . . , m} = {1, . . . , n − 1} (Index set for the times-of-travel ); 6. Ext(·): Set of extreme points of (·). Our overall approach consists of formulating the TSP as a generalized flow problem over the APbased digraph illustrated in Figure 1. We refer to this graph as the “TSP Flow Graph (TSPFG).” The nodes of the TSPFG correspond to (city, time-of-travel ) pairs. The arcs of the graph link nodes at consecutive times-of-travel and represent travel legs. The graph notation is formalized below. Notation 4 (TSPFG formalisms) 1. ∀r ∈ S, Nr := M = {1, . . . , m} (Set of cities that can be visited at time r); 2. N := {(i, r) : r ∈ S, i ∈ Nr } (Set of nodes of the TSPFG. We will, henceforth, write (i, r) ((i, r) ∈ N ) as [i, r] in order to distinguish it from other doublets); 3. ∀r ∈ S, ∀i ∈ Nr ,   ∅ if r = m Fr (i) :=  Nr+1 \{i} otherwise (Forward star of node [i, r] of the TSPFG); 4. ∀r ∈ S, ∀i ∈ Nr ,   ∅ if r = 1 Br (i) :=  Nr−1 \{i} otherwise (Backward star of node [i, r] of the TSPFG); 5. A : {(i, r, j), r ∈ R, i ∈ Nr , j ∈ Fr (i)} (Set of arcs of the TSPFG. We will, henceforth, write (i, r, j) ((i, r, j) ∈ A) as [i, r, j] in order to distinguish it from other triplets); 3 Figure 1: Illustration of the TSP Flow Graph 6. R := {1, . . . , m − 1} = {1, . . . , n − 2} (Set of stages of the TSPFG which have nodes with positive out-degrees). Remark 5 It follows directly from the definitions in Notations 4.3-4.5 that: ∀(i, j) ∈ M 2 , ∀r ∈ R, [i, r, j] ∈ A =⇒ i 6= j. That is, no arc in the TSPFG connects a city with itself between consecutive times-of-travel, as illustrated in Figure 2 below. Definition 6 (“stages,” “levels,” “TSP paths”) 1. We refer to the set of nodes of the TSPFG corresponding to a city as a “level” of the graph. (The set of levels is denoted M in Notation 3.4); 2. We refer to the nodes of the TSPFG corresponding to a given time-of-travel of the TSP as a “stage” of the graph. (The set of stages is denoted S in Notation 3.5); 3. We refer to a path of the TSPFG that includes exactly one node of each level of the graph as a “TSP path.” A TSP path is illustrated in Figure 2. Theorem 7 There exists a one-to-one correspondence between TSP paths (of the TSPFG) and TSP tours. Proof. Trivial, since each level, i, of the TSPFG can be visited only once, and the number of levels is equal to the number of stages. 4 Figure 2: Illustration of “TSP paths” of the TSPFG 3 Mathematical programming model of TSP paths We will first state the LP model. Then, we will illustrate each its classes of variables and constraints and provide further intuition on the modeling approach. Finally, we will discuss the objective function. 3.1 Modeling Variables Notation 8 (Modeling variables) 1. ∀[i, r, j] ∈ A, we define a variable y[i,r,j] . Variable y[i,r,j] may be interpreted as the amount of flow in the TSP FG that traverses arc [i, r, j] in a given (feasible) solution to our LP model (to be stated); 2. ∀[i, r] ∈ N , ∀[j, s, k] ∈ A, we define a variable x[i,r][j,s,k] . Variable x[i,r][j,s,k] may be interpreted as the amount of flow in the TSP FG that traverses both, node [i, r] and arc [j, s, k] in a given (feasible) solution to our LP model (to be stated). Hence, our modeling variables respectively are comprised of an arc (for the y-variables), and a combination of an arc and a node (a “dash” and a “dot”) of the TSPFG, as illustrated in Figure 3 below. 3.2 Model Constraints Our Linear Programming (LP) model of TSP paths consists of the five main classes of constraints described below. We will subsequently fully explain each of these and the objective function. 5 Figure 3: Illustration of the modeling variables 3.2.1 Statement of the constraints • Initial Flow m X m m X X x[i,1][j,2,k] = 1. (1) i=1 j=1 k=1 / j6=i k∈{i,j} • Mass Balance/Generalized Kirchhoff Equations (GKEs) x[i,r][i,r,j] − m X x[i,r][j,r+1,k] = 0; k=1 k∈{i,j} / ∀i, j = 1, . . . , m : i 6= j; m X x[i,r][j,r−1,i] − ∀r = 1, . . . , m − 2. (2) x[i,r][k,r−2,j] = 0; k=1 k∈{i,j} / ∀i, j = 1, . . . , m : i 6= j; m X x[i,r][k,r−1,i] − k=1 k6=i ∀i = 1, . . . , m; m X ∀r = 3, . . . , m. (3) x[i,r][i,r,k] = 0; k=1 k6=i ∀r = 2, . . . , m − 1. (4) 6 m X m X x[i,r][k,p−1,u] − k=1 k∈{i,u} / x[i,r][u,p,k] = 0; ∀i, u = 1, . . . , m : i 6= u; k=1 k∈{i,u} / ∀r = 1, . . . , m; ∀p = 2, . . . , m − 1 : p ∈ / {r − 1, r, r + 1}. (5) • Node-pair Reciprocities x[i,r][k,r+1,j] − x[j,r+2][i,r,k] = 0 ∀i, j, k = 1, . . . , m : i 6= j 6= k; m X m X x[i,r][k,s−1,j] − k=1:k∈{i,j} / ∀r = 1, . . . , m − 2. (6) x[j,s][i,r,k] = 0 k=1:k∈{i,j} / ∀i, j = 1, . . . , m : i 6= j; ∀r = 1, . . . , m − 2; ∀s = r + 3, . . . , m. (7) • Flow Consistencies y[i,r,j] − x[i,r][i,r,j] = 0; ∀i, j = 1, . . . , m : i 6= j; ∀r = 1, . . . , m − 1. (8) ∀r = 1, . . . , m − 1. (9) y[i,r,j] − x[j,r+1][i,r,j] = 0; ∀i, j = 1, . . . , m : i 6= j; • Visit Requirements for Arcs m X y[i,r,j] − x[k,s][i,r,j] = 0; k=1 k∈{i,j} / ∀i, j = 1, . . . , m : i 6= j; y[i,r,j] − m X ∀r = 1, . . . , m − 1; ∀s = 1, . . . , m : s ∈ / {r, r + 1}. (10) x[u,s][i,r,j] = 0; s=1 s∈{r,r+1} / ∀i, j, u = 1, . . . , m : i 6= j 6= u; ∀r = 1, . . . , m − 1. (11) • Visit Requirements for Nodes   m−1 r−2 X m X X    x + x + x + [i,r][u,r−1,i] [i,r][i,r,u] [i,r][u,p,k]   p=1 p=r+1 k=1 k∈{i,u} / m X x[i,r][k,p,u] k=1 k∈{i,u} /   r−2 X m m−1 m X X X   − x − x − x − x[i,r][l,q,1] = 0; [i,r][1,r−1,i] [i,r][i,r,1] [i,r][1,q,l]   q=1 q=r+1 l=1 l∈{1,i} / ∀i, u = 2, . . . , m : i 6= u; ∀r = 1, . . . , m. 7 l=1 l∈{1,i} / (12)   r−2 X m X p=1 k=2 k∈{1,u} /    m−1 X   x[1,r][u,p,k]  + x[1,r][u,r−1,1] + x[1,r][1,r,u] + p=r+1 m X x[1,r][k,p,u] k=2 k∈{1,u} /   r−2 X m m−1 m X X X − x[1,r][2,q,l]  − x[1,r][2,r−1,1] − x[1,r][1,r,2] − x[1,r][l,q,2] = 0; q=1 l=3 q=r+1 l=3 ∀u = 3, . . . , m; ∀r = 1, . . . , m. (13) • Implicit Zeros y[i,r,j] = 0 if (i = j); ∀i, j = 1, . . . , m; x[i,r][j,s,k] = 0 ∀r = 1, . . . , m − 1. (14) if ((i = k) or (j = k) or (s = r and i 6= j) or (s = r − 1 and i 6= k)) ; ∀i, j, k = 1, . . . , m; ∀r, s = 1, . . . , m. (15) • Nonnegativities y[i,r,j] ≥ 0; ∀i, j = 1, ..., m; ∀r = 1, ..., m − 1. x[i,r][j,s,k] ≥ 0; ∀i, j, k = 1, ..., m; ∀r = 1, ..., m; ∀s = 1, ..., m − 1. (16) (17) The overall logic of the model is described in eight steps below. 1. We have a model built over an Assignment flow graph. Constraint (1) creates an initial flow in x. 2. Constraints (2)-(5) are a set of Kirchoff Equations in x, keeping flow moving across stages in a connected and “balanced” mannner, as illustrated in Figure 4 below. For p > r, flow that nodes [i, r] and [u, p] have in common must leave [i, r],and enter and leave [u, p], and then leave [u, p] (via some arcs at stages (p − 1) and (p + 1),respectively) in a balanced manner. In a similar way, for p > r, flow which is “destined” to [u, p] must enter and leave [i, r] (via some arcs at stages (r − 1) and (r + 1),respectively) in a blance manner, before entering [u, p]. 3. Constraints (6)-(7) stipulate that each pair of assignments induced by a y-variable elicits a “flow in = flow out” condition over a set of arcs (via the x-variables) for the nodes comprising the variable. These are illustrated in Figures 5 and 6. 8 Figure 4: Illustrations of the GKE/Mass Balance Constraints 4. Constraints (8) and (9), together, ensure that flow on a given arc, [i, r, j], is “recognized” in the same way when viewed from either the tail node, [i, r], or the head node, [j, r + 1], of the arc. This is illustrated in Figure 7 below. 5. Each set of consecutive assignment pairs must “visit” each stage via constraints (10). Figure 8 below illustrates this condition, which is that the total amount of flow a given arc, [i, r, j], has in common with nodes at a given stage, s, is the the same for all s. (In other words, the sum of x-variables involving nodes at stage s and arc [i, r, j] equals the flow from node [i, r] to node [j, r + 1] (y-variable ) for all s). Also, flow traversing a given arc, [i, r, j], must “visit” (i.e., share value with) each level of the flow graph (city of the TSP) via constraints (11). This is illustrated in Figure 9. 6. A given node, [i, r], must share the same amount of flow with every level, u, of the TSPFG. 9 Figure 5: Illustration of Reciprocity Constraints (6) Constraints (12) enforce this condition for the case in which i 6= 1 by setting the total amount of flow shared with each u ∈ / {1, i} equal to the total amount of flow shared with level “1”. When i = 1, the condition is enforced by constraints (13) in which the total amount of flow shared with each u ∈ / {1, 2} is set equal to the total amount of flow shared with level “2”. These are illustrated in Figures 10 and 11. 7. Constraints (14)-(15) are used to restrict variables which by themselves would imply repeating a level (city) or a stage, or flow which is “broken” (by not “going out” of the node into which it “came in” at a stage involved in the variable). We call these “implicit zeros.” In implementation, these variables are just not created. 8. Finally, constraints (16) and (17) are the usual nonnegativity constraints. 3.2.2 Intuition behind the model A non-mathematical intuition for the idea of our modeling approach (to be formally described in the remainder of this paper) may be gained through the following observation. Assume that no part of a flow which traverses a given arc of the TSPFG can subsequently “re-visit” either of the levels (cities) of the graph that are involved in that arc. Then, flow can propagate forward through the graph, only in a “pattern” that consists of a convex combination of TSP paths. That is, we will show that each positive variable must lie on a TSP path. An x-variable being positive may be interpreted as a “communication” between the corresponding node and arc. The constraints are such that a node which has positive flow through it is made to “communicate” with pairs of nodes which are at consecutive stages at different parts of the network (through the x-variables) only along paths which are TSP paths of the network. As a result, feasible solutions of our proposed model are such that the total flow on each arc is a convex combination of flows along TSP paths 10 Figure 6: Illustrations of Reciprocity Constraints (7) only. This does not mean that every feasible solution to the model is a convex combination of flows along TSP paths only. The reason for this is that the model (the Overall Polytope) also has non-integral extreme points, due to the fact that the “pattern” of the y-variables may not be consistent with a single realization of the x-variables. We will show that the “flow pattern” of the y-variables is sufficient for being able to solve any TSP as a LP by utilizing an appropriate cost function which involves the y-variables only. 3.3 Objective Function Our developments to follow in the remainder of this paper show that our approach is guaranted to correctly solve the TSP only when the travel costs are captured through the y-variables only. The reason for this is that our developments only show the integrality of the y-Polytope. Many variations of the objective function may be possible. The simplest one is used here placing the cost of traveling from city i to city j on the y-variables representing the total flows on the arcs. Two additional terms are added to account for node 0 being the starting and ending point of the travels. This is accomplished by adding the cost from node 0 to the first and last arcs chosen, connecting cities at stages 1 and 2 and cities at stages m − 1 and m, respectively. The objective function we use is as follows: min m X m m−2 m X m m X m X XX X (c0i + cij )y[i,1,j] + cij y[i,r,j] + (cij + cj0 )y[i,m−1,j] i=1 j=1 4 r=2 i=1 j=1 i=1 j=1 Model structure Notation 9 11 (18) Figure 7: Illustration of the Flow Consistency Constraints 1. We denote the number of x-variables and y-variables in (1)-(17) by ξx and ξy , respectively. 2. We denote the polytope by (1)-(17)  induced    by Q, and refer  to it as the “Overall (LP) x x Polytope.” (i.e., Q := ∈ Rξx +ξy : satisfies (1)-(17) is referred to as the “Overall y y (LP) Polytope.”) 3. We denote the projection of Q onto the space of the  y-variables  by “Y ,” and  refer to it as the x “y-Polytope.” In other words, we refer to Y := y ∈ Rξy : ∃x ∈ Rξx : ∈Q as the y “y-Polytope.” Our objective in this section is to show that the y-Polytope is integral with extreme points corresponding to TSP tours. Note that this integrality does not imply the integrality of the Overall Polytope, even though the converse is true. The proof requires some preliminary notions and results which we will first discuss.   x Definition 10 Let ∈ Q. y 1. For (r, s) ∈ R2 : s > r, we say that a set of nodes at consecutive stages of the TSPFG, {ir , . . . , is }, (or the set of arcs, {[ir , r, ir+1 ], . . . , [is−1 , s − 1, is }, linking them in the TSPFG) is a “(r-to-s) TSP walk (of y)” if ir , . . . , is are pairwise distinct and yip ,p,ip+1 > 0 for p = 1, . . . , m − 1. 2. We refer to a TSP walk of y which spans the set of stages of the TSPFG as a “TSP path (of y)” (since, clearly, every such spanning TSP walk of y corresponds to exactly one TSP path of the TSPFG). 12 Figure 8: Illustrations of the “Column Visit” Requirements for the Arcs   x Remark 11 Let ∈ Q. By definitions 6 and 10.2 above, every TSP path of y corresponds to y exactly one TSP tour.   x Theorem 12 V := ∈ Q : ∃(i1 , . . . , im ) ∈ M m : ∀(p, q) ∈ R2 : p 6= q, (ip 6= iq ; and y  yip ,p,ip+1 = 1, p = 1, . . . , m − 1 ⊆ Ext(Q). Proof. We have: 1= = = m X m m X X i=1 j=1 k=1 / j6=i k∈{i,j} m m m XX X i=1 j=1 k=1 / j6=i k∈{i,j} m X m X x[i,1][j,2,k] (Using (1)) x[i,1][j,s,k] ∀s ∈ R y[j,s,k] ∀s ∈ R (Using (2)-(5) recursively) (Using (8)-(10)). j=1 k=1 k6=j 13 (19) Figure 9: Illustration of the “Row Visit” Requirements for the Arcs (19) and the nonnegativity constraints (16)-(17) imply:   x ∈ V =⇒ y  1 if j and k are the levels included in the existentially-quantified set    of the theorem for stages s and s + 1 (i.e., if j = is and k = is+1 ); ∀s ∈ R, y[j,s,k] =    0 otherwise. (20) (20) implies:   x ∈ V =⇒ y ∈ {0, 1}ξy . y (21) It is easy to verify that:    x ξy ∈ Q and y ∈ {0, 1} =⇒ x ∈ {0, 1}ξx . y (21) and (22) imply:     x x ∈ V =⇒ ∈ {0, 1}ξx +ξy . y y (22) (23) Clearly, 0 and 1 (respectively) cannot be represented as non-trivial convex combinations ofnumbers  x on the interval [0, 1]. It follows from the combination of this with (22) and (23) that a given ∈V y cannot be represented as a convex combination of other points of Q. 14 Figure 10: Illustration of the “Row Visit” Requirement for Node (i, r), When i > 1.   x Theorem 12 shows that even though a TSP path for ∈ Q is defined in terms of conditions y on y only, its (mathematical) correspondence to an extreme point of Q is preserved. Our  aim  in x this section is to show that each extreme point of the y-Polytope (Y ) is a TSP path for a ∈Q y (and therefore, corresponds to a TSP path of the TSPFG (and therefore, to a TSP tour)). Note that, as we have indicated above, the integrality of Y does not imply that of Q. The reason for this is that an extreme point of Q may project to a non-extreme point of Y . A conceptual illustration of this fact is given in Figure 12. Remark 13 An observation which can be made from Figure 12 is that the y-component of any point of “Q” (in the figure) must be a convex combination of the extreme points of “Y ” (in the figure). The y-components of “C”, “D”, “E”, and “F” in particular, must respectively be convex combinations of “A” and “H”. Hence, as can be also seen from the figure, provided the objective function in an LP over “Q” (in the figure) is expressed in terms of the y-variables only, at least one the extreme points of “Y ” (either “A” or “H” (or both) in the figure) must be optimal. In this way, for our purposes in this paper, the integrality of the projection of the Overall Polytope onto the space of a class of its variables happens to be sufficient for the optimizatin problem at hand. This sufficiency is the consequence of the combination of the fact that the projection is integral with the fact that it is possible to correctly capture TSP tour costs using the variables being “projected to” only in our modeling. The following notation is needed in order to develop the subsequent three lemmas (Lemmas 15-17) which establish some “connectivity” conditions between a node and an arc of the TSPFG which share flow in our model (through the x-variables). Lemma 17 is the “main” lemma (among the three) and shows the existence of a TSP walk for every (node, arc) pair of the TSPFG which share flow. Lemmas 15 and 16 provide the foundation for the induction used in proving Lemma 17.   x Notation 14 Let ∈ Q. We define the following: y 15 Figure 11: Illustration of the “Row Visit” Requirement for Node (i, r), When i = 1.   1. ∀ ((i, r), [j, s, k]) ∈ N , A : s > r; x[i,r][j,s,k] > 0 ,  (a) Uirjsk := u ∈ M : x[u,s−1][j,s,k] > 0 ;  (b) Virjsk := v ∈ M : x[i,r][v,s−1,j] > 0 .   2. ∀ ((i, r), [j, s, k]) ∈ N , A : s < r; x[i,r][j,s,k] > 0 ,  (a) U irjsk := u ∈ M : x[u,s+2][j,s,k] > 0 ;  (b) V irjsk := v ∈ M : x[i,r][k,s+1,v] > 0 .   x Lemma 15 Let ∈ Q. Then, the following is true: y ∀(i, r) ∈ N , ∀[j, s, k] ∈ A : s > r + 1,  x[i,r][j,s,k] > 0 ⇒ Uirjsk ∩ Virjsk 6= ∅ . Proof. Assume Uirjsk ∩ Virjsk = ∅. (24) 16 Figure 12: General Illustration of a Non-Integral Polytope Projecting to an Integral Polytope Then, we have: y[j,s,k] = m X x[u,s−1][j,s,k] (Using (10)) u=1 u∈{j,k} / = m X x[u,s−1][j,s,k] (Using (24) and the definitions in Notation 14) u∈Uirjsk X = x[u,r][j,s,k] (Using (24), (14)-(15), and applying (2)-(5) recursively) u∈(M \{i,j,k})  <  X x[u,r][j,s,k]  + x[i,r][j,s,k] = u∈(M \{i,j,k}) X x[u,r][j,s,k] u∈(M \{j,k}) (Since x[i,r][j,s,k] > 0 by assumption). (25) contradicts (8)-(10). Hence, we must have: Uirjsk ∩ Virjsk 6= ∅.   x Lemma 16 Let ∈ Q. Then, the following is true: y ∀(i, r) ∈ N , ∀[j, s, k] ∈ A : (s < r − 1) ,  x[i,r][j,s,k] > 0 ⇒ U irjsk ∩ V irjsk 6= ∅ . 17 (25) Proof. Assume U irjsk ∩ V irjsk = ∅. (26) Then, we have: m X y[j,s,k] = x[u,s+2][j,s,k] (Using (10)) u=1 u∈{j,k} / X = x[u,s+2][j,s,k] (Using (26) and the definitions in Notation 14) u∈U irjsk X = x[u,r][j,s,k] (Using (26) and (14)-(15), and applying (2)-(5) recursively) u∈(M \{i,j,k})   X < X x[u,r][j,s,k]  + x[i,r][j,s,k] = u∈(M \{i,j,k}) x[u,r][j,s,k] u∈(M \{j,k}) (Since x[i,r][j,s,k] > 0 by assumption). (27) (27) contradicts (8)-(10). Hence, we must have: U irjsk ∩ V irjsk 6= ∅.   x Lemma 17 Let ∈ Q. Then, the following are true: y 1. ∀(r, s) ∈ R2 : r ≤ s < m, x[ir ,r][is ,s,is+1 ] > 0 ⇒ ∃(it , t = r, . . . , s + 1) ∈ M s−r+2 :   ∀(p, q) ∈ {ir , . . . , is+1 }2 : p 6= q, ip 6= iq ; and yip ,p,ip+1 > 0, p = r, . . . , s . 2. ∀(r, s) ∈ R2 : s < r, x[ir ,r][is ,s,is+1 ] > 0 ⇒ ∃(it , t = s, . . . , r) ∈ M r−s+1 :   ∀(p, q) ∈ {is , . . . , ir }2 : p 6= q, ip 6= iq ; and yip ,p,ip+1 > 0, p = s, . . . , r − 1 . Proof. Observe that because of constraints (6)-(9), the two statements of the lemma are equivalent. Hence, it is suffucient to prove only one of the two statements. We will provide the proof for statement 1. Case 1: s = r. (8) and (14)-(15) =⇒:  x[ir ,r][ir ,r,ir+1 ] > 0 =⇒ ir 6= ir+1 , and y[ir ,r,ir+1 ] > 0 (28) Statement 1 of the lemma for this case follows from (28) directly. Case 2: s = r + 1. (10) and (14)-(15) =⇒:  x[ir ,r][ir+1 ,r+1,ir+2 ] > 0 =⇒ ir 6= ir+1 6= ir+2 and y[ir+1 ,r+1,ir+2 ] > 0 . 18 (29) Also, (6) implies: x[ir ,r][ir+1 ,r+1,ir+2 ] > 0 =⇒ x[ir+2 ,r+2][ir ,r,ir+1 ] > 0. (30) Using (10), we have: x[ir+2 ,r+2][ir ,r,ir+1 ] > 0 =⇒ y[ir ,r,ir+1 ] > 0. (31) Statement 1 of the lemma for this case follows from (29)-(31) directly. Case 3: s ≥ r + 2. The proof for this case is inductive. We will show that if the theorem holds for (r, r + δ) ∈ R2 , then the lemma must also hold for (r, r + δ + 1) ∈ R2 (where 1 ≤ δ ≤ m − r − 1). Assume that, for a given δ, we have the following: (a)∀(r, r + δ) ∈ R2 : r + δ < m, x[ir ,r][ir+δ ,r+δ,ir+δ+1 ] > 0 ⇒ ∃(ir+1 , . . . , ir+δ−1 ) ∈ M δ−1 : yip ,p,ip+1  ∀(p, q) ∈ {r, . . . , r + δ + 1}2 : p 6= q, ip 6= iq ;  > 0 for p = r, . . . , r + δ ; and (b)(ir , ir+δ+1 , ir+δ+2 ) ∈ M 3 are such that x[ir ,r][ir+δ+1 ,r+δ+1,ir+δ+2 ] > 0. (32) (33) We will show that there must exist a r-to-(r + δ + 2) TSP walk of y. Using (2), (5), (7), (10), and (14)-(15), (33) implies: (a) ir 6= ir+δ+1 6= ir+δ+2 ; (34) (b) y[ir+δ+1 ,r+δ+1,ir+δ+2 ] > 0; (35) (c) L := Uir ,r,ir+δ+1 ,r+δ+1,ir+δ+2 ∩ Vir ,r,ir+δ+1 ,r+δ+1,ir+δ+2 6= ∅; (36) (d) K := {k ∈ M : x[ir+δ,i (37) r+δ+2 ,r+δ+2][ir ,r,k] > 0} = 6 ∅; and (d) ∀k ∈ K, Lk := U ir+δ+2 ,r+δ+2,ir ,r,k ∩ V ir+δ+2 ,r+δ+2,ir ,r,k 6= ∅ (38) From “Case 2” and the definitions in Notation 14, we must have: ∀ur+δ ∈ L, ∃(ur+1 , . . . , ur+δ−1 ) ∈ M δ−1 : p 6= q, up 6= uq ) ; and yup ,p,up+1 ∀(p, q) ∈ {r, . . . , r + δ + 1}2 :  > 0 for p = r, . . . , r + δ . (Where ir and ir+δ+1 have been relabled as ur and ur+δ+1 , respectively). Similarly, we must also have: [ ∀vr+1 ∈ Lk , ∃(vr+2 , . . . , vr+δ ) ∈ M δ−1 : (39) ∀(p, q) ∈ {r + 1, . . . , r + δ + 2}2 : k∈K p 6= q, vp 6= vq ) ; and yvp ,p,vp+1 > 0 for p = r + 1, . . . , r + δ + 1  and ir+δ+2 have been relabled as vr+δ+1 and vr+δ+2 , respectively). 19 . (Where ir+δ+1 (40) Conclusion. By (11)-(12), at least one of the r − to − (r + δ + 1) TSP walks specified in (39) and one of the (r + 1) − to − (r + δ + 2) TSP walks specified in (40) must overlap in their components between stages (r + 1) and (r + δ + 1). (If not, constraints (11)-(13) would be violated for nodes ir and ir+δ+2 , and arc [ir+δ+1 , r + δ + 1, ir+δ+2 ] when r = 1 and δ = m − 3, in particular.) Statement 1 of the lemma follows from this directly. We will now discuss some topological properties of Q and Y which will be needed in order to prove our main result, which is the integrality of Y . Definition 18 Let λ be a scalar on the interval (0, 1].      x x ξ +ξ x y e λ := 1. We refer to Q ∈R : satisfies (41), and (2)-(17) as the “λ-scaled Overy y all Polytope,” where (41) is specified as: m X m m X X x(i,1)(j,2,k) = λ. (41) i=1 j=1 k=1 / j6=i k∈{i,j} e λ onto the space of the y-variables as the “λ-scaled y-Polytope,” 2. We refer to the projection of Q      x ξ ξ y x e e e and denote it by Yλ . In other words, we refer to Yλ := y ∈ R : ∃x ∈ R : ∈ Qλ y as the “λ-scaled y-Polytope.” Lemma 19 ∀(λ, µ) ∈ (0, 1]2 : λ 6= µ, e λ and Q e µ are homeomorphic; 1. Q 2. Yeλ and Yeµ are homeomorphic. Proof. e λ and Q e µ are homeomorphic. 1. Q It is easy to see (by observing the result of the multiplication of each of the constraints of Q by a (same) constant, for example) that:     x x eα . ∀α ∈ (0, 1], ∈ Q ⇐⇒ α · ∈Q (42) y y Hence, the point-to-point mapping     x x e α with hα hα : Q −→ Q =α· y y (43) is bijective. Also, clearly, ∀α ∈ (0, 1], hα is bicontinuous (see Gamelin and Greene (1999, pp. 26-27), or Panik (1993, pp. 267-268)). Hence, ∀α ∈ (0, 1], hα is a homeomorphism (see Gamelin and Greene (1999, pp. 27, 67), or Panik (1993, pp. 253-257)). The homeomorphism e λ and Q e µ follows directly from the equivalence property of homeomorphisms (since between Q e λ and Q e µ are respectively homeomorphic to Q). Q 20 2. Yeλ and Yeµ are homeomorphic. Clearly, the conditions expressed in (42)-(43) are applicable to the y-component vector of   x ∈ Q. The lemma follows from this, in a similar way as for Part (1) of the proof above. y A direct result of the combination of Lemmas 17 and 19 is the following. Corollary 20 ∀λ ∈ (0, 1], y ∈ Yeλ =⇒ There exists at least one TSP path of y. (44) Notation 21 ∀λ ∈ (0, 1], ∀y ∈ Yeλ , define: 1. Πλ (y) : Set of TSP paths of y; 2. Tλ (y) := {1, . . . , |Π(y)|} (Index set associated with Π(y));  3. ∀t ∈ Tλ (y), Pλ,t (y) := [iλ,t,k , k, iλ,t,k+1 ] ∈ A, k = 1, . . . , m − 1 (tth TSP path of y); 4. ∀t ∈ Tλ (y), w bλ,t (y) : Characteristic vector of Pλ,t (y) (w bλ,t (y) is obtained by setting the y-variable for each arc involved in Pλ,t (y) to “1”, and setting the y-variable for each arc not involved in Pλ,t (y) to “0”.). We have the following results. Lemma 22 Let λ ∈ (0, 1] and y ∈ Yeλ . Then, the following is true: ∀t ∈ Tλ (y), ∃ε ∈ (0, 1] : (y − ε · w bλ,t (y)) ∈ Yeλ−ε ∪ {0}. Proof. From (42) in the proof of Lemma 19 and the fact that w bλ,t (y) is a point of Y , we must have: ∀t ∈ Tλ (y), (λ · w bλ,t (y)) ∈ Yeλ . (45) By the convexity of Yeλ , (45) implies: D E ∀t ∈ Tλ (y), ∃ α ∈ (0, 1], y ∈ Yeλ ∪ {0} : hy = (α · (λ · w bλ,t (y)) + (1 − α) · y)i . (46) From (46), we have: ∀t ∈ Tλ (y), α = 1 =⇒ (1 − α) · y = y − λ · w bλ,t (y) = 0. (47) Hence, it suffices to set ε = 1 in order for the lemma to hold when y = λ · w bλ,t (y). Now, consider t ∈ Tλ (y) : y 6= λ · w bλ,t (y). Using (46), we have: D E ∃ α ∈ (0, 1), y ∈ Yeλ : hy − α · (λ · w bλ,t (y)) = (1 − α) · yi . (48) Letting αλ = ε, we get from (48) that: ∀t ∈ Tλ (y) : y 6= λ · w bλ,t (y), (y − ε · w bλ,t (y)) ∈ Yeλ(1−α) = Yeλ−ε . The lemma follows directly from the combination of (47) and (49). Our main result for this section will now be discussed. 21 (49) Theorem 23 The y-Polytope is integral with each extreme point corresponding to a TSP path of a point of Y . In other words, every extreme point of Y is integral and corresponds to a TSP path of a point of Y . Proof. Let λ ∈ (0, 1], y ∈ Yeλ . ∀t ∈ Tλ (y), let: n o fλt ,t (y t ) := max ε ∈ (0, 1] : (y − ε · w bλ,t (y)) ∈ Yeλ−ε ∪ {0} (50) Then, clearly, from Lemma 22, we must have: ∀t ∈ Tλ (y), fλt ,t (y t ) > 0. (51) Now, consider the “Iterative Elimination (IE)” procedure below: Step 0 (Initialization) (0.1) : set λ1 = 1 (0.2) : set y 1 = y (0.4) : set t = 1 Step 1 (Iterative step) (1.1) : choose a (arbitrary) TSP path of y t , P (1.2) : set Pλt ,t (y t ) = P (1.3) : compute fλt ,t (y t ); (Using (50)) (1.4) : compute y t+1 = y t − fλt ,t (y t ) · w bλt ,t (y t ); Step 2 (Stopping criterion) (2.1) : If y t+1 = 0, stop (2.2) : Otherwise: - compute λt+1 = λt − fλt ,t (y t ) - set t = t + 1 - go to Step 1. (Using Notation 21) Table 1: Summary of the “Iterative Elimination (IE)” procedure Clearly, it follows directly from the combination of (51) and Lemma 22 above that this procedure must stop. Letting the number of iterations of the procedure when it stops be ν, we must have:  ν  P   fλt ,t (y t ) = λ1 = 1; and  (i) t=1 ν  P   fλt ,t (y t ) · w bλt ,t (y t )  (ii) y = y 1 = (52) t=1 Also, clearly, we have: fλt ,t (y t ) > 0 for t = 1, . . . , ν. (53) It follows from the combination of the Minkowski-Weyl Theorem (Minskowski (1910); Weyl (1935); see also Rockafellar (1997, pp.153-172)) that (52)-(53) imply that every extreme point of Y is the characteristic vector of a TSP path of a point of Y . The theorem follows from this directly. 22 Corollary 24 The optimization model comprised of Objective Function (18) and Constraints (1)(17) correctly solves the TSP.   x Proof. For ∈ Q, write Objective Function (18) as ct · y. Denote the value of the optimizay  ∗   x x ∗ tion problem by V and let be an optimal solution. Clearly, ∈ Q implies that y is a ∗ y y convex combination of extreme points of Y . Hence, there must Pp exist p (p ≥ 1) extreme points of Y, yb1 , . . . , ybp , and scalars α1 , . . . , αp (αi ∈ (0, 1], i = 1 . . . , p; i=1 αi = 1) such that the following are true: ∗ t ∗ V =c ·y = p X αi ct · ybi  (54) i=1 = ct · ybi ∀i = 1, . . . , p. (Since we must have V∗ ≤ ct · ybi for all i.) (55) Now, by Theorem 23, each ybi (i = 1, . . . , p) in (54)-(55) corresponds to a TSP path of a point of Y, and therefore (by Theorem 7 and Remark 11) to a TSP tour. Remark 25 Clearly, because of Theorem 23, any off-the-shelf, standard LP solver can be used in order to solve our model. When the TSP at hand has a unique optimum, then any solver would stop with that optimum. On the other hand, when there are multiple optima and an interior-point method is used (or, perhaps, due to numerical issues), the solution obtained may be a convex combination of those optima. In such a case, formal procedures exist, which can be used in order to obtain a vertex optimum (which, according to Theorem 23, would correspond to exactly one of the optimal tours of the TSP at hand). In particular, the “Normal Perturbation” approach of Mangasarian (1984) can be used in order to perturb the LP costs, and thereby “make” the LP into one in which one of the alternate optima becomes the unique optimum. A polynomial-time interior-point method which stops at a vertex solution only (see Wright (1997; pp. 137-157) could be used also, perhaps in combination with the Normal Pertubation approach. In our substantial emprical testing (to be described in the next section), we used a heuristic implementation of the IE procedure described in the proof of Theorem 23 above. In all cases, this heuristic implementation was successful at “retrieving” at least one of the optimal TSP tours comprising the solution. Example 26 We illustrate Theorem 23 and Remark 25 using a 8-city TSP we solved using the barrier method of CPLEX without crossover and thus stopping on a face, as follows: • Travel costs: 23 • Optimal solution obtained: – Solution Value: 281.000. – Postive y-variables: • TSP tours “retrieved” using the IE procedure-based heuristic: 24 • Illustration on the TSPFG:  5 Model size and empirical testing We have run over a million test problems using the interior point (barrier) methods of CPLEX. In all of the cases with multiple optima, our heuristic implementation of the Iterative Elimination procedure described above (in the proof of Theorem 23) was sufficient in “retrieving” at least one of the optimal TSP tours comprising the final LP solution obtained. The optimal TSP tour lengths were also verified by using the Miller-Tucker-Zemlin (1960) model and solving the corresponding integer program using CPLEX. Through our empirical experimentations we found that either constraints (11) or constraints (12) (but not both at the same time) could be left out of the model 25 and still have it solve correctly. Since, the number of the constraints (12) is much smaller than that of constraints (11), we only used constraints (12) in all of the computational experiments we are reporting in this paper. We solved the problems using the CPLEX option of barrier without crossover as it results in much faster solution times, the reason being that even if we stop on a face our iterative procedure is much faster than having CPLEX use crossover and try to get to a vertex. The figures below represent problems solved on a Dell Precision Tower 5810 XCTO Base (210-ACQM)—-64GB (4x16GB) 2133MHz DDR4 RDIMM ECC (370-ABWB) —Integrated Intel AHCI chipset SATA controller (6 x 6.0Gb/s) SW RAID 0/1/5/10 (403-BBGV). Table 2 shows the size and solutions times of problems with 7 to 22 cities. (Although, not reported in this poaper, using a higher-memory (but slower) computer, we were able to solve problems as large as 27 cities.) Each of the times shown in Table 2 is the average of five (5) problems. These problems were symmetric euclidean distance based randomly generated problems. In detail, we used a 100 by 100 grid and modified the distances to between 90%-110% of their true values and rounded distances to be integer. Similar results were obtained using exact euclidean distances, using uniform distributions for distances, and choices of symmetric/asymmetric/integer or non-integer values. Table 2: Problem size and solution time Figures 13 and 14 below graphically display the increase in the number of variables as n (the number of cities) ranges from 7 to 22. Figure 15 shows how the number of constraints grows with respect to the number of variables. While the complexity order of size of the model is O(n5 ), we found that a regression equation using a polynomial of order n3 fits the model size with coefficients of determination which are close to 1.000 (greater that 0.999, to be more precise). This is likely due to the many “implicit zero” variables in the model. We also note that the number of constraints grows more slowly than the number of variables as can be seen in Figure 15. We certainly recognize that while this model is not computationally competitive with other approaches, it does provide motivation to explore other models/algorithms with the knowledge that the complexity classes “P ” and “N P ” are equal. Also, further research may uncover ways to streamline the proposed LP, enough to make it practical. 26 Figure 13: Graph of the number of variables versus the number of cities Figure 14: Graph of the number of constraints versus the number of cities 27 Figure 15: Graph of the number of constraints versus the number of variables The model presented here can be modified in many ways. For example, clearly, a straightforward alternate model could be obtained by substituting out the y-variables, resulting in a model described in x-variable space only. What we have shown here is the model we found easiest to describe and understand. 6 Conclusions We have presented a polynomial-sized linear program for the n-city TSP drawing upon “complex flow modeling” ideas. We used an Assignment problem-based abstraction of tours not employing the traditional city-to-city variables of the standard TSP formulation. Integer solutions were obtained in the case of unique optima, and a simple iterative procedure was used to obtain one or more of the optimal TSP routes in the case of alternate optima. We have solved more than one million problems with up to 27 cities using the barrier methods of CPLEX, consistently obtaining all integer solutions, consistent with our theoretical developments. Our work complements our earlier affirmation resolving the important “P versus N P ” question. It accomplishes this with a much smaller model than that developed previously by the first two authors. Paraphrasing/quoting from Diaby and Karwan (2016a), we conclude: ‘Our developments (and their incidental consequence of “P = N P ”) remove the exponential shift in complexity, but do not suggest a collapse of the “continuum of difficulty,” nor any change in the sequence along that continuum. In other words, our developments do not imply (or suggest) that all of the problems in the NP class have become equally “easy” to solve in practice. The suggestion is that, in theory, for NP problems, the “continuum of difficulty” actually ranges from low-degree-polynomial time complexity to increasingly-higher-degree-polynomial time complexities. However, from a theoretical perspective, we believe that these results make it necessary to reframe the computational complexity question away from: “Does there exist a polynomial algorithm for Problem X?” to (perhaps): What is the smallest-dimensional space in which Problem X has a polynomial algorithm?’ 28 References [1] Bazaraa, M.S., J.J. Jarvis and H.D. Sherali (2010). Linear Programming and Network Flows. Wiley, New York, NY. [2] Beachy, J.A. and W.D. Blair (2006). Abstract Algebra. Waveland Press, Inc., Long Grove, IL. [3] Braun, G., S. Fiorini, S. Pokutta, and D. Steurer (2015). Approximation Limits of Linear Programs (Beyond Hierarchies). Mathematics of Operations Research 40:3, pp. 756–772. [4] Diaby, M. (2007). The traveling salesman problem: A linear programming formulation. WSEAS Transactions on Mathematics 6:6, pp. 745–754. [5] Diaby, M. (2010a). Linear programming formulation of the multi-depot multiple traveling salesman problem with differentiated travel costs. In D. Davendra (ed.), Traveling Salesman Problem, Theory and Applications. InTech, New York, NY, pp. 257–282. [6] Diaby, M. (2010b). Linear programming formulation of the set partitioning problem. International Journal of Operational Research 8:4, pp. 399–427. [7] Diaby, M. (2010c). Linear programming formulation of the vertex coloring problem. International Journal of Mathematics in Operational Research 2:3, pp. 259–289. [8] Diaby, M. and M.H. Karwan (2016a). Advances in Combinatorial Optimization: Linear Programming Formulations of the Traveling Salesman and Other Hard Combinatorial Optimization Problems. World Scientific Publishing, Singapore. [9] Diaby, M. and M.H. Karwan (2016b). “Limits to the scope of applicability of extended formulations,” International Journal of Mathematics in Operational Research (Forthcoming). [10] Fiorini, S., S. Massar, S. Pokutta, H.R. Tiwary, and R. de Wolf (2011). Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Bounds. Unpublished (Available at: http://arxiv.org/pdf/1111.0837.pdf). [11] Fiorini, S., S. Massar, S. Pokutta, H.R. Tiwary, and R. de Wolf (2012). Linear vs. Semidefinite Extended Formulations: Exponential Separation and Strong Bounds. Proceedings of the 44 th ACM Symposium on the Theory of Computing (STOC ’12 ), New York, NY, pp. 95-106. [12] Fiorini, S., S. Massar, S. Pokutta, H.R. Tiwary, and R. de Wolf (2015). Exponential Lower Bounds for Polytopes in Combinatorial Optimization. Journal of the ACM 62:2, Article No. 17. [13] Gamelin, T.W. and R.E. Greene (1999). Introduction to Topology. Dover Publications, Inc., Mineola, NY. [14] Garey, M.R. and D.S. Johnson (1979). Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman and Company, New York, NY. [15] Lawler, E.L., J.K. Lenstra, A.H.G. Rinnooy Kan, and D.B. Shmoys (1985), eds. The Traveling Salesman Problem: A Guided Tour of Combinatorial Optimization (Wiley, New York). 29 [16] Mangasarian, O.L. (1984). Normal solutions of linear programs. Mathematical Programming Study 22, pp. 206–216. [17] Miller, C.E., A.W. Tucker and R.A. Zemlin (1960). Integer programming formulations and traveling salesman problems. Journal of the Association for Computing Machinery 7:4, pp. 326–329. [18] Minkowski, H. (1910). Geometrie der Zahlen. Teubner, Leipzig. [19] Öncan, T., K. Altinel and G, Laporte (2009). A comparative analysis of several asymmetric traveling salesman problem formulations. Computers & Operations Research 36:3, pp. 637–654. [20] Panik, M.J. (1993). Fundamentals of Convex Analysis. Kluwer Academic Publishers, Boston, MA. [21] Rockaffelar, R. T. (1997). Convex Analysis. Princeton University Press. [22] Weyl, H. (1935). Elementare Theorie der konvexen Polyheder. Commentarii Math. Helvetici 7, pp. 290-306. [23] Wright, S.J. (1997). Primal-Dual Interior-Point Methods. SIAM. [24] Yannakakis, M. (1991). Expressing combinatorial optimization problems by linear programming. Journal of Computer and System Sciences 43:3, pp. 441-466. [25] Yannakakis, M. (2013). Private Email Communications. 30 Appendix A: Non-applicability of developments for “The TSP Polytope.” Our model does not require the city-to-city traditional variables that are used in describing the standard TSP Polytope (i.e., “The TSP Polytope”; see Lawler et al. (1985), or Diaby and Karwan (2016a; 2016b) for exact definition). Hence, our modeling does not involve “The TSP Polytope,” and hence, extended formulations developments which pertain to that polytope and those for other hard combinatorial problems (such as Yannakakis (1991), or Fiorini et al. (2011; 2012; 2015), in particular), do not apply/cannot be applied to the developments in this paper. The reasons for this are fully detailed in Diaby and Karwan (2016a) and Diaby and Karwan (2016b), respectively, but will be briefly overviewed in this section. Pertaining to the Fiorini et al. (2011; 2012; 2015) developments in particular, as shown in Diaby and Karwan (2016a) and Diaby and Karwan (2016b), respectively, the existence of a linear transformation between the descriptive variables of two polytopes does not necessarily imply extension relations between the external descriptions of the polytopes from which valid/meaningful inferences can be made. This important subtlety was demonstrated in Diaby and Karwan (2016a and 2016b, respectively), and illustrated using polyopes consisting of single points (i.e., of dimension zero). In this section, we present a numerical example involving polytopes of dimensions greater than zero. A.1. Alternate abstraction of the TSP Optimization Problem Theorem 27 Consider the TSP defined on the set of cities Ω := {0, . . . , n − 1}. Assume city “0” has been designated as the starting and ending point of the travels. For the sake of greater clarity, let M := Ω\{0} be the set of the remaining cities to be sequenced, and S := {1, . . . , m}, the index set of the travel legs to cities “1” through “n − 1” (where m := n − 1). Then, there exists a one-to-one correspondence between TSP tours and extreme points of ( ) X X 2 wi,t = 1 ∀i ∈ M ; wi,t = 1 ∀t ∈ S; w ≥ 0 . AP := w ∈ R(n−1) : t∈S i∈M Proof. Using the assumption that city “0” is the starting and ending point of travel, it is trivial to construct a unique TSP tour from a given extreme point of AP, and vice versa (i.e., it is trivial to construct a unique extreme point of AP from a given TSP tour). Example 28 We illustrate some of the differences between the city-stage Assignment-based modeling of this paper and the traditional (city-to-city) modeling which induces the standard TSP polytope (i.e., “The TSP polytope”) using a 6-city problem with node set {0, 1, 2, 3, 4, 5}. • Assignment Problem representation of TSP tours: 31 • Illustration of the Assignment Problem representation on the TSP Graph: • Illustration of the standard (city-to-city) representation on the TSP Graph: 32 Remark 29 1. It is not possible to make the city-to-stage Assignment representation induce TSP tours per se by adding a “dummy” city to the set of TSP cities and using it as the starting and ending point of the travels. The reason for this is that the cycle then obtained would not necessarily be a cycle in the actual TSP cities, as the begining and ending cities in that sequence may be different. Hence, the city-to-stage Assignment representation and the traditional (city-to-city) representation of TSP tours cannot be made to become equivalent using constraints expressed in the city-to-stage variables only. In other words, the equivalence (i.e., “making” the cityto-stage Assignment representation induce TSP tours per se) cannot be done mathematically while preserving the (“nice”) AP structure. 2. As concerns the extended formulations “barriers” works (Yannakakis (1991); Fiorini et al. (2011; 2012; 2015)), it is important to observe that AP is also a TSP polytope, since a oneto-one correspondence can be established between its extreme points and TSP tours, and that its mathematical charateristics are unrelated to those of “The TSP Polytope.” According to the Minkowski-Weyl Theorem (Minskowski (1910); Weyl (1935); see also Rockafellar (1997, pp.153-172)), every polytope can be equivalently described as the intersection of hyperplanes (H-representation/external description) or as a convex combination of (a finite number of) vertices (V-representation/internal description). “The TSP Polytope” is easy to state in terms of its V-representation. However, no polynomial-sized H-representation of it is known. On the other hand, the H-representation of AP is well-known to be of (low-degree) polynomial size (see Burkard et al. (2009)), and it is trivial to state its V-representation also. The vertices of AP are Assignment Problem solutions, whereas the vertices of “The TSP Polytope” are Hamiltonian cycles. Hence, even though the extreme points of AP and those of “The TSP Polytope” respectively correspond to TSP tours, the two sets of extreme points are different kinds of mathematical objects, with unrelated mathematical characterizations, and there does not exist any a priori mathematical relation between the two polytopes. In other words, AP and “The TSP Polytope” are simply alternate abstractions of TSP tours. 33 Or, put another way, AP is (simply) an alternate TSP polytope from “The TSP Polytope”, and vice versa (i.e., that the “The TSP Polytope” is (simply) an alternate TSP polytope from AP ). 3. As illustrated in Example 28 and also in the first point above, we do not attempt to induce TSP tours per se in this paper. Instead, we develop a higher-dimensional reformulation of city-to-stage Assignment representation, “building” enough information in the modeling variables themselves that the “judicious manipulation” of the costs called for in order to “complete” the abstraction from an overall optimization point-of-view is possible. Hence, we “side-step” (altogether) the issue of having to derive linear constraints that induce explicit TSP tours (which is at the crux of the difficulty in developing an H-description of “The TSP polytope”). In other words, we do not deal with the issue of describing “The TSP polytope” in this paper. Rather we simply perform a reformulation of the city-to-stage Assignment representation discussed above in a higher-dimensional space. Clearly, since we are not modeling cycles/TSP tours per se, this approach can become a complete abstraction of the overall TSP optimization problem only if a proper/judicious objective function to apply to the reformulated-AP solutions can be developed. Note that the issue of a proper objective function to apply in “The TSP polytope” (traditional) modeling approach is a trivial one. 4. Somewhat more philosophically, the most fundamental subtlety to grasp may be the fact that there exists no a priori mathematical relationship (projective or otherwise) between our proposed AP-based model and “The TSP polytope.” The associations which can be made between the two conceptualizations are cognitive only, and not “mathematical” a priori. This can be seen, for example, by considering the fact that one could not infer the existence of a (TSP) node “0” from the statement of our constraints only, as indicated in Example 28 above. From a general/common-sense perspective, if the addition of something changes conditions for what was added to, then whatever was added cannot have been “redundant,” since that would be a contradiction of the definition of the term “redundant.” In the context of this paper in particular, the extended formulations relationships that can be created through additions of redundant variables and constraints to our model can be degenerate ones only, from which it is not possible to make any meaningful inference (see Diaby and Karwan (2016a) and Diaby and Karwan (2016b), respectively, for formal developments of these).  A.2. Non-applicability of the Fiorini et al. (2015) results Extended formulations (EFs) have been the dominant theory which has been used in deciding on the validity of proposed LP models for hard combinatorial problems. All of the developments are predicated on the model being evaluated projecting to the “natural” polytope of the specific problem at hand. For the TSP that polytope is the one stated in terms of the natural, standard city-to-city variables, and is referred to in the literature as “The TSP Polytope.” We show in Diaby and Karwan (2016a) that the generalized version of the model proposed in this paper is not symmetric. Hence, among other reasons, the results in the seminal Yannakakis (1991)) work are not applicable to the model in this paper. Our developments in Diaby and Karwan (2016a and 2016b, respectively) specifically show the non-applicability of the Fiorini et al. (2011; 2012) developments to models which do not involve the variables of “The TSP Polytope” in general, and provide counter-examples using zero-dimensional polytopes (i.e., singletons) for convenience. In the latest version of their papers, Fiorini et al. (Fiorini et al. (2015)) stipulate that the polytopes 34 considered must have dimensions greater than zero. The objective of this section is to show that the counter-examples shown in Diaby and Karwan (2016a and 2016b, respectively) for the Fiorini et al. (2011; 2012) developments remain valid for the Fiorini et al. (2015) work. We do this by exhibiting polytopes of dimensions greater than zero which refute key foundation results in Fiorini et al. (2015). For convenience, we will start with a statement of the standard definition of an “extended formulation” as well as those of the alternate definitions used Fiorini et al. (2015). Then, we will discuss our numerical example. The discussions to follow apply to the developments in Braun et al. (2015) as well, since those developments are based on the same notions of extended formulations, “slack matrices”, and “extension complexity”, in particular. Definition 30 (“Standard EF Definition”) An extended formulation for a polytope X ⊆ Rp is a polyhedron U = {(x, w) ∈ Rp+q : Gx + Hw ≤ g} the projection, ϕx (U ) := {x ∈ Rp : (∃w ∈ Rq : (x, w) ∈ U )}, of which onto x-space is equal to X (where G ∈ Rm×p , H ∈ Rm×q , and g ∈ Rm ) (Yannakakis (1991)). Definition 31 (“Fiorini et al. Definition #1”) A polyhedron U = {(x, w) ∈ Rp+q : Gx + Hw ≤ g} is an extended formulation of a polytope X ⊆ Rp if there exists a linear map π : Rp+q −→ Rp such that X is the image of U under π (i.e., X = π(U ); where G ∈ Rm×p , H ∈ Rm×q , and g ∈ Rm ) (see Fiorini et al (2015; p. 17:3, lines 20-21; p. 17:9, lines 22-23)). Definition 32 (“Fiorini et al. Definition #2”) An extended formulation of a polytope X ⊆ Rp is a linear system U = {(x, w) ∈ Rp+q : Gx + Hw ≤ g} such that x ∈ X if and only if there exists w ∈ Rq such that (x, w) ∈ U. (In other words, U is an EF of X if (x ∈ X ⇐⇒ (∃ w ∈ Rq : (x, w) ∈ U ))) (where G ∈ Rm×p , H ∈ Rm×q , and g ∈ Rm ) (see Fiorini et al. (2015; p. 17:2, last paragraph; p. 17:9, line 20-21)). Our numerical example will now be discussed. Example 33 :Let x ∈ R3 and w ∈R be disjoint vectors of variables. Let X be a polytope in the   w space of x, and U, a polytope in the space of , with: x     8 12   X := Conv   10  ,  15   , and (56)   6 9    w U := ∈ R4 : 2 ≤ 0 · x + w ≤ 3 (57) x We now discuss some key results of Fiorini et al. (2015) which are refuted by X and U. 1. Refutation of the validity of Definition 31. (a) Note that the following is true for X and U :      w x ∈ X < ∃w ∈R : ∈U . x 35 (58) For example,        w 22.5   22.5   ∃w ∈R :     −50  ∈ X  .   −50  ∈ U  ; 100 100 (59) Hence, U is not an extended formulation of X according to Definition 32. (b) Observe that the following is also true for X and U :  X=         4 0 0 0 w w x ∈R3 : x = A · , ∈U , where A=  5 0 0 0  . x x 3 0 0 0 (60) In other words, X is the image of U under the linear map A. Hence, U is an extended formulation of X according to Definition 31. (c) It follows from (a) and (b) above, that Definitions 31 and 32 are in contradiction of each other with respect to X and U . Hence X and U are a refutation of the validity of Definition 31 (since it is easy to verify the equivalence of Definition 32 to Definition 30, which is the “standard” definition). 2. Refutation of “Theorem 3” (p.17:10) of Fiorini et al. (2015). The proof of the theorem (“Theorem 3”) hinges on Definition 32. The specific statement in Fiorini et al. (2015; p. 17:10, lines 26-28) is: “...Because Ax ≤ b ⇐⇒ ∃y : E = x + F = y = g = , E ≤ x + F ≤ y = g = , (61) each inequality in Ax ≤ bis valid for all points of Q. ...” The equivalent of (61) in terms of X and U is:   w x ∈ X ⇐⇒ ∃w ∈R : ∈ U. x (62) Clearly, (62) is not true, as we have illustrated in Part (1.a) above. Hence, the proof of “Theorem 3” (and therefore, “Theorem 3”) of Fiorini et al. (2015) is refuted by X and U . 3. Refutation of “Lemma 9” (p. 17:13-17:14) of Fiorini et al. (2015). The first part of the lemma is stated (in Fiorini et al. (2015)) thus: “Lemma 9. Let P, Q, and F be polytopes. Then, the following hold: (i) if F is an extension of P, then xc(F) ≥ xc(P);. . . ” The proof of this is stated as follows: “Proof. The first part is obvious because every extension of F is in particular an extension of P. . . . ” 36 The notation “xc(·)” stands for “extension complexity of (·),” which is defined as (p. 17:9, lines 24-25 of Fiorini et al. (2015)): “...the extension complexity of P is the minimum size (i.e., the number of inequalities) of an EF of P.” The refutation of these for X (as shown in (56) above) and U (as shown in (57) above) is as follows. As shown in Part (1) above, U is an extension of X according to Definition 31 (which is central in Fiorini et al. (2015)). This means that U is an extended formulation of every one of the infinitely-many possible H-descriptions of X. This would be true in particular for the H-description below for X:   x ∈R3 :                  −5x1 + 4x2 ≤ 0;                  3x − 5x = 0;   2 3         3x1 − 4x3 ≤ 0; X := . (63)               8 ≤ x ≤ 12; 1                 10 ≤ x ≤ 15; 2               6 ≤ x3 ≤ 9 Clearly, however, we have that: xc(U )  xc(X). (64) Hence, X and U are a refutation of “Lemma 9” of Fiorini et al. (2015), being that U is the extension, and X, the projection, according to definitions used in Fiorini et al. (2015).  According to Fiorini et al. (2015; p. 17:7, Section 1.4, first sentence; p. 17:11, lines 6-11; p. 17:14, lines 5-6; p.17:16, lines 13-14 after the “Fig. 4”), their “Theorem 3” and “Lemma 9” play pivotal, foundational roles in the rest of their developments. Hence, we believe we have offered a simple-yet-complete refutation of their developements when polytopes are described in terms of disjoint sets of variables, as is the case for the model in this paper in relation to “The TSP Polytope.” Hence, no part of the Fiorini et al. (2015) developments is applicable to the model developed in this paper. 37 A.3. Meaning of the existence of a linear transformation We will now provide some insights into the correct meaning/consequence of the existence of an affine map establishing a one-to-one correspondence between two polytopes that are stated in disjoint variable spaces, as brought to our attention in private e-mails by Yannakakis (2013). The linear map stipulated in Fiorini et al. (2012; 2015) in particular, is a special case of the affine map. In the case of polytopes stated in disjoint variable spaces, if the constraints expressing the affine transformation are redundant for each of the models/polytopes, the implication is that one model can be used in an “auxiliary” way, in order to solve the optimization problem over the other model, without any reference to/knowledge of the H-description of that other model. This is shown in Remark 34 below. Remark 34 • Let: – x ∈ Rp and y ∈ Rq be disjoint vectors of variables; – X := {x ∈ Rp : Ax ≤ a}; – L := {(x, y) ∈ Rp+q : Bx + Cy = b}; – Y := {y ∈ Rq : Dy ≤ d}; (Where: A ∈ Rk×p ; a ∈ Rk ; B ∈ Rm×p ; C ∈ Rm×q ; b ∈ Rm ; D ∈ Rl×q , d ∈ Rl ). • If B T B is nonsingular, then L can be re-written in the form: L = {(x, y) ∈ Rp+q : x = Cy + b}. (Where: C := −(B T B)−1 B T C, and b := (B T B)−1 B T b). (65) Hence, the linear map stipulated in Definition 31 is simply a special case of L in which b = 0 and B T B is nonsingular. • Assume that: – L 6= ∅ exists, with constraints that are redundant for X and Y , respectively; – the non-negativity requirements for x and y are included in the constraint sets of X and Y , respectively; and that: – B T B is nonsingular. (This is equivalent to assuming that the more general (affine map) version of the linear map stipulated in Definition 31 exists.) • Then, the optimization problem: Problem LP 1 : 38 Minimize: αT x Subject To: (x, y) ∈ L; y ∈ Y (where α ∈ Rp ). is equivalent to the smaller linear program: Problem LP 2 : Minimize: Subject To:  αT C y + αT b y∈Y (where α ∈ Rp ). • Hence, if L is the graph of a one-to-one correspondence between the points of X and the points of Y (see Beachy and Blair (2006, pp. 47-59)), then, the optimization of any linear function of x over X can be done by first using Problem LP 2 in order to get an optimal y, and then using Graph L to “retrieve” the corresponding x. Note that the second term of the objective function of Problem LP 2 can be ignored in the optimization process of Problem LP 2 , since that term is a constant. Hence, if L is derived from knowledge of the V-representation of X only, then this would mean that the H-representation of X is not involved in the “two-step” solution process (of using Problem LP 2 and then Graph L), but rather, that only the V-representation of X is involved.  Hence, the existence of a linear map between points of the model in this paper and points of “The TSP Polytope” would simply imply that our model can be used in an “auxiliary” way, in order to solve the TSP optimization problem without any reference to/knowledge of the H-description of “The TSP Polytope” since, as we have discussed above, our modeling is independent of the traditional variables of “The TSP Polytope” and the linear map could only be inferred from our knowledge of the V-description of “The TSP Polytope.” Hence, there does not exist any meaningful extension relationship between our constraint sets and an H-description of “The TSP Polytope.” Hence, the developments of Fiorini et al. (2012; 2015) in particular, which are predicated on the existence of such a linear map, are not applicable to the developments in this paper. Also, with respect to the developments in Fiorini et al. (2015) specifically, note that the Boolean Satisfiability Problem can be formulated, in a straightforward manner, as a linear program using the more generalized, generic version of the model in this paper developed in Diaby and Karwan (2016a). 39 Appendix B: Software Implementation • General Description and Interface A software package, TSP LP Solver, has been submitted as supplementary files to this paper. TSP LP Solver builds linear programming (LP) models for the traveling salesman problem and calls CPLEX to solve them as LPs. The interface has been designed to run multiple replications of the chosen problem and run control settings at a time. With this tool, users can: (1) randomly generate or read a TSP cost matrix in multiple ways; (2) directly solve the TSP or only build the LP models; (3) adjust CPLEX settings for different tests; (4) show solutions (optimal objective, variables, routes) in different formats. The MTZ model is available for the purposes of verifying the correctness of the solutions obtained using our LP model. It is solved as an Integer Program, and only its objective function value is displayed. A screenshot of the TSP LP Solver is shown in Figure 16. Figure 16: First Screen of the TSP LP Solver • Requirements TSP LP Solver is written in C# with .NET framework 4 and calls CPLEX 12.5 to solve models. For those with CPLEX 12.5, all functions in this program are available. For those with different 40 versions of CPLEX, problems may happen when calling CPLEX to solve. If so, users need to adjust references in the source code to rebuild the program. Users who do not wish to use CPLEX or to modify the source code can choose the Model Only button in order to build a .lp file (no requirement to use CPLEX) which they can then solve using the software of their choice. • Data There are two ways to input data to the solver: randomly generate and read cost data from files. For either way, users can check “Export all replications in XML format” to export cost files in XML format for every replication. Randomly generating data supports the testing of multiple replications of a problem in a single run. Users input # of Cities (number of cities) and # of Replications. Cost values are generated based on either Euclidean distances or uniformly distributed random numbers. If the Euclidean distance option is chosen, the program will first randomly generate coordinates within a (0, 100) x (0, 100) square plane, and then randomly generate costs within the given percentage range of Euclidean distances. If (absolute) interval limits is chosen, the program will directly randomly generate costs within the given range, not based on Euclidean distances. Other options include whether the cost matrix is asymmetric or not (checked or unchecked), whether the cost matrix is integer or not (checked or unchecked), and whether the triangle inequality holds or is not required (checked or unchecked). Reading cost files supports XML and CSV formats as input file formats. The required data format can be found in the attached Sample.xml and Sample.csv. The XML data format follows the classic TSPLIB. • Modelers and Solvers – Modeler Settings If the Model Only button is chosen, the program will build an .lp file without the requirement to use CPLEX. If the Miller-Tucker-Zemlin (MTZ) model is chosen to be solved, the program will call CPLEX to build and solve the model and display the optimal objective value for reference. If the N5 LP model is chosen to be solved, the program will call CPLEX to build and solve the model and display the solution time, optimal objective value and other solution information depending on which are chosen among the show y solutions, show x solutions and show routes options. – CPLEX Settings If users have the correct CPLEX version on their machines, they can adjust CPLEX parameters with this tool and solve the model with different algorithmic settings. For details of each adjustable parameter, please refer to a CPLEX Parameters Reference from IBM. • Results All output files are located in the “Results” subfolder of the folder containing the TSP LP Solver executable (“TSPsolvers.exe”), including the XML cost files, .lp files and solution text files. 41 The solution text file is named as “Tests on #-node random cases.txt” for randomly generated problems and ”Tests on given cost files.txt” for tests with reading cost files. This file may include the MTZ objective value, along with the N5 LP model objective value, solution time, number of variables, number of constraints, values of the non-zero y variables, values of the non-zero x variables, and optimal routes. The optimal routes are retrieved using our iterative elimination procedure. In the case that many alternate optimal TSP routes are involved in the solution (e.g. when a non-crossover interior-point method stops on a face due to alternate optima), the program will display all or a subset of these routes for reference. If it is desired that all of the alternate optimal routes in the solution be always displayed, users need to adjust the source code. We provide two versions of the iterative elimination in the source code: SplitRoutesByY() is a greedytype implementation; EnumerSplitByY() involves an enumeration scheme for “tracing” the TSP paths through the y-variables with positive values in the solution. EnumerSplitByY() is more robust to avoid failure due to numerical issues, but is time-consuming. Besides these two methods, users can also apply perturbation means (Mangasarian, 1984) to make one the alternate optima the unique LP optimum, or a polynomial-time interior-point method which stops at a vertex optimum such as described in Wright (1997). If any one of the following two cases is found, the program will create XML cost files for records for further analysis: (1) MTZ and N5 LP models result in different optimal objective values (this has never happened in our more than 1 million tests); (2) There are many optimal routes and the program only displays a subset of them. 42
8cs.DS
Maximizing the Weighted Number of Spanning Trees: arXiv:1604.01116v2 [cs.DS] 12 Apr 2016 Near-t-Optimal Graphs∗ Kasra Khosoussi† Gaurav S. Sukhatme‡ Shoudong Huang† Gamini Dissanayake† March 12, 2018 Abstract Designing well-connected graphs is a fundamental problem that frequently arises in various contexts across science and engineering. The weighted number of spanning trees, as a connectivity measure, emerges in numerous problems and plays a key role in, e.g., network reliability under random edge failure, estimation over networks and D-optimal experimental designs. This paper tackles the open problem of designing graphs with the maximum weighted number of spanning trees under various constraints. We reveal several new structures, such as the log-submodularity of the weighted number of spanning trees in connected graphs. We then exploit these structures and design a pair of efficient approximation algorithms with performance guarantees and near-optimality certificates. Our results can be readily applied to a wide verity of applications involving graph synthesis and graph sparsification scenarios. ∗ Working paper. [email protected] – https://kasra.github.io for Autonomous Systems (CAS), University of Technology Sydney. ‡ Department of Computer Science, University of Southern California. † Centre Contents 1 Introduction 3 2 Background 3 2.1 2.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Matrix-Tree Theorems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4 3 Tree-Connectivity 5 4 ESP: Edge Selection Problem 7 4.1 4.2 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Exhaustive Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 8 4.3 4.4 Greedy Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Convex Relaxation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 10 4.5 Certifying Near-Optimality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.6 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 5 Beyond k-ESP+ 5.1 5.2 13 Matroid Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.1.1 Greedy Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 14 5.1.2 Convex Relaxation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dual of k-ESP+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 15 5.2.1 5.2.2 Greedy Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Convex Relaxation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 16 5.2.3 Certifying Near-Optimality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 6 Conclusion 17 A Proofs 20 1 Introduction Various graph connectivity measures have been studied and used in different contexts. Among them are the combinatorial measures, such as vertex/edge-connectivity, as well as spectral notions, like algebraic connectivity [10]. As a connectivity measure, the number of spanning trees (sometimes referred to as graph complexity or tree-connectivity) stands out in this list since despite its combinatorial origin, it can also be characterized solely based on the spectrum of graph Laplacian. It has been shown that tree-connectivity is associated with D-optimal (determinant-optimal) experimental designs [8, 6, 1, 26]. The number of spanning trees also appears in the study of all-terminal network reliability under (i.i.d.) random edge failure (defined as the probability of network being connected) [16, 30]. In particular, it has been proved that for a given number of edges and vertices, the uniformly-most reliable network, upon existence, must have the maximum number of spanning trees [3, 22, 4]. The graph with the maximum number of spanning trees among a finite set of graphs (e.g., graphs with n vertices and m edges) is called t-optimal. The problem of identifying toptimal graphs under a (n, m) constraint remains open and has been solved only for specific pairs of (n, m); see, e.g., [27, 6, 15, 25]. We prove that the (weighted) number of spanning trees in connected graphs can be posed as a monotone log-submodular function. This structure enables us to design a complementary greedy-convex pair of approximate algorithms to synthesize near-t-optimal graphs under several constraints with approximation guarantees and near-optimality certificates. Notation Throughout this paper, bold lower-case and upper-case letters are reserved for real vectors and matrices, respectively. The standard basis for Rn is denoted by {eni }ni=1 , and en0 is defined to be the zero n-vector. For any n ∈ N, [n] denotes the set N≤n = {1, 2, . . . , n}. Sets are shown by upper-case letters. |X | denotes the  cardinality of set X . For any finite set W, W k is the set of all k-subsets of W. The eigenvalues of symmetric matrix M are denoted by λ1 (M) ≤ · · · ≤ λn (M). 1, I and 0 denote the vector of all ones, identity and zero matrix with appropriate sizes, respectively. S1 ≻ S2 means S1 − S2 is positive-definite. The Euclidean norm is denoted by k · k. diag(Wi )ki=1 is the block-diagonal matrix with matrices (Wi )ki=1 as blocks on its main diagonal. For any graph G, E(G) denotes the edge set of G. Finally, Sn≥0 and Sn>0 denote the set of symmetric positive semidefinite and symmetric positive definite matrices in Rn×n , respectively. 2 2.1 Background Preliminaries Let G = (V, E) be an undirected graph over V = [n] and with |E| = m edges. By assigning a positive weight to each edge of the graph through w : E → R>0 , we obtain Gw = (V, E, w). To shorten our notation let us define wuv , w(u, v) = w(v, u). As it will become clear shortly, without loss of generality we can assume G is a simple graph since (i) loops do not affect the number of spanning trees, and (ii) parallel edges can be replaced by a single edge whose weight is the sum of the weights of the parallel edges. W , diag (w(e1 ), . . . , w(em )) denotes the weight matrix in which ei ∈ E is the ith edge. The degree of vertex v ∈ V in G is denoted by deg(v). Let à be the incidence matrix of G after assigning arbitrary orientations 3 to its edges. The Laplacian matrix of G is defined as L̃ , ÃÃ⊤ . For an arbitrary choice of v0 ∈ V , let A ∈ {−1, 0, 1}(n−1)×m be the matrix obtained by removing the row that corresponds to v0 from Ã. We call A the reduced incidence matrix of G after anchoring v0 . The reduced Laplacian matrix of G is defined as L , AA⊤ . L is also known as the Dirichlet or grounded Laplacian matrix of G. Note that L can also be obtained by removing the row and column associated to the anchor from the graph Laplacian matrix. A is full column rank and consequently L is positive definite, iff G is connected. For weighted graphs, AWA⊤ is the reduced weighted Laplacian of Gw . Note that this is a natural generalization of L, and will reduce to its unweighted counterpart if all weights are equal to one (i.e., W = I). The reduced (weighted) Laplacian matrix can be decomposed into the (weighted) sum of elementary reduced Laplacian matrices: L= X w(u, v)Luv (1) {u,v}∈E in which Luv , auv a⊤ uv and auv = eu − ev is the corresponding column of A. 2.2 Matrix-Tree Theorems The spanning trees of G are spanning subgraphs of G that are also trees. Let TG and t(G) , |TG | denote the set of all spanning trees of G and its number of spanning trees, respectively. Let Tn and Kn be, respectively, an arbitrary tree and the complete graph with n vertices. The following statements hold. 1. t(G) ≥ 0, and t(G) = 0 iff G is disconnected, 2. t(Tn ) = 1, 3. t(Kn ) = nn−2 (Cayley’s formula), 4. if G is connected, then t(Tn ) ≤ t(G) ≤ t(Kn ), 5. if G1 is a spanning subgraph of G2 , then t(G1 ) ≤ t(G2 ). Therefore t(G) is a sensible measure of graph connectivity. The following theorem by Kirchhoff provides an expression for computing t(G). Theorem 2.1 (Matrix-Tree Theorem [10]). Let LG and L̃G be, respectively, the reduced Laplacian and the Laplacian matrix of any simple undirected graph G after anchoring an arbitrary vertex out of its n vertices. The following statements hold. 1. t(G) = det(LG ), 2. t(G) = 1 n Qn i=2 λi (L̃G ).1 The matrix-tree theorem can be naturally generalized to weighted graphs, where each spanning tree is “counted” according to its value defined below. 1 Recall that the Laplacian matrix of any connected graph has a zero eigenvalue with multiplicity one (see, e.g., [10]). 4 Definition 2.1. Suppose G = (V, E, w) is a weighted graph with a non-negative weight function. The value of each spanning tree of G is measured by the following function, Vw : TG → R≥0 Y w(e). T 7→ (2) (3) e∈ E(T ) Furthermore, we define the weighted number of trees as tw (G) , P T ∈ TG Vw (T ). Theorem 2.2 (Weighted Matrix-Tree Theorem [20]). For every simple weighted graph G = (V, E, w) with w : E → R>0 we have tw (G) = det AWA⊤ . Note that Theorem 2.2 reduces to Theorem 2.1 if w(e) = 1 for all e ∈ E. Therefore, in the rest of this paper we focus our attention mainly on weighted graphs. Definition 2.2. The weighted tree-connectivity of graph G is formally defined as τw (G) , 3 Tree-Connectivity  log tw (G) 0 if tw (G) > 0, (4) otherwise. Definition 3.1. Consider an arbitrary simple undirected graph G◦ . Let pi be the probability assigned to the ith edge, and p be the stacked vector of probabilities. G ∼ G(G◦ , p) indicates that 1. G is a spanning subgraph of G◦ . 2. The ith edge of G◦ appears in G with probability pi , independent of other edges. The naive procedure for computing the expected weighted number of spanning trees in such random graphs involves a summation over exponentially many terms. Theorem 3.1 offers an efficient and intuitive way of computing this expectation in terms of G◦ and p. Theorem 3.1. For any G(G◦ , p) and w : E(Kn ) → R>0 ,   EG∼G(G◦ ,p) tw (G) = twp (G◦ ), (5) where wp (ei ) , pi w(ei ) for all ei ∈ E(G◦ ). Note that this expectation can now be computed in O(n3 ) time for general G◦ . Lemma 3.1. Let G+ be the graph obtained by adding {u, v} ∈ / E with weight wuv to G = (V, E, w). Let LG be the reduced Laplacian matrix and auv be the corresponding column of the reduced incidence matrix of G after anchoring an arbitrary vertex. If G is connected, τw (G+ ) = τw (G) + log(1 + wuv ∆G uv ), ⊤ −1 where ∆G uv , auv LG auv . 5 (6) Lemma 3.2. Similar to Lemma 3.1, let G− be the graph obtained by removing {p, q} ∈ E with weight wpq from E. If G is connected, τw (G− ) = τw (G) + log(1 − wpq ∆G pq ). (7) n o Corollary 3.2. Define TGuv , T ∈ TG : {u, v} ∈ E(T ) . Then we have uv uv ∆G uv = |TG |/|TG | = |TG |/t(G). (8) Similarly, for weighted graphs we have wuv ∆G uv P = P T ∈TGuv Vw (T ) T ∈ TG Vw (T ) = P T ∈TGuv Vw (T ) tw (G) . (9) Lemmas 3.1 and 3.2 imply that wuv ∆G uv determines the change in tree-connectivity after adding or removing an edge. This term is known as the effective resistance between u and v. If G is an electrical circuit where each edge represents a resistor with a conductance equal to its weight, then wuv ∆G uv is equal to the electrical resistance across u and v. The effective resistance also emerges as a key factor in various other contexts; see, e.g., [9, 2, 19]. Note that although we derived ∆G uv using the reduced graph Laplacian, it is more common to define the effective resistance using the pseudoinverse of graph Laplacian L̃G [9]. Now, on a seemingly unrelated note, we turn our attention to structures associated to tree-connectivity when seen as a set function. Definition 3.2. Let V be a set of n ≥ 2 vertices. Denote by GE the graph (V, E) for any E ∈ E(Kn ). For any w : 2E(Kn ) → R>0 define treen,w : 2E(Kn ) → R≥0 E 7→ tw (GE ), (10) log treen,w : 2E(Kn ) → R E 7→ τw (GE ). (11) Definition 3.3 (Tree-Connectivity Gain). Suppose a connected base graph (V, Einit ) with n ≥ 2 vertices and an arbitrary positive weight function w : E(Kn ) → R>0 are given. Define logTGn,w : 2E(Kn) → R≥0 E 7→ log treen,w (E ∪ Einit ) − log treen,w (Einit ). Definition 3.4. Suppose W is a finite set. For any ξ : 2W → R, 1. ξ is called normalized iff ξ(∅) = 0. 2. ξ is called monotone if ξ(B) ≥ ξ(A) for every A and B s.t. A ⊆ B ⊆ W. 6 (12) 3. ξ is called submodular iff for every A and B s.t. A ⊆ B ⊆ W and ∀s ∈ W \ B we have, ξ(A ∪ {s}) − ξ(A) ≥ ξ(B ∪ {s}) − ξ(B). (13) 4. ξ is called supermodular iff −ξ is submodular. 5. ξ is called log-submodular iff ξ is positive and log ξ is submodular. Theorem 3.3. treen,w is normalized, monotone and supermodular. Theorem 3.4. logTGn,w is normalized, monotone and submodular. Corollary 3.5 follows directly from Theorems 3.1, 3.3 and 3.4. Corollary 3.5. The expected weighted number of spanning trees in random graphs is normalized, monotone and supermodular when seen as a set function similar to treen,w . Moreover, the expected weighted number of spanning trees can be posed as a log-submodular function similar to logTGn,w . ESP: Edge Selection Problem 4 4.1 Problem Definition Suppose a connected base graph is given. The edge selection problem (ESP) is a combinatorial optimization problem whose goal is to pick the optimal k-set of edges from a given candidate set of new edges such that the weighted number of spanning trees after adding those edges to the base graph is maximized. Problem 4.1 (ESP). Let Ginit = (V, Einit , w) be a given connected graph where w : E(Kn ) → R>0 . Consider the following scenarios. 1. k-ESP+ : For some M+ ⊆ E(Kn ) \ Einit , maximize + tw (GEinit ∪E ) subject to |E| = k. maximize tw (GEinit \E ) E⊆M (14) 2. k-ESP− : For some M− ⊆ Einit , E⊆M− subject to (15) |E| = k. Remark 1. It is easy to see that every instance of k-ESP− can be expressed as an instance of d-ESP+ problem for a different base graph, some d and a candidate set M+ (and vice versa). Remark 2. The open problem of identifying t-optimal graphs among all graphs with n vertices and m edges [4] is an instance of k-ESP+ with k = m, Einit = ∅ and M+ = E(Kn ). Remarks 1 and 2 ensure that any algorithm designed for solving k-ESP+ carries over to the other forms of ESP. Therefore, although many graph sparsification and edge pruning scenarios can be naturally stated as a k-ESP− , in the rest of this paper we focus our attention mainly on k-ESP+ . 7 4.2 Exhaustive Search The brute force algorithm for solving k-ESP+ requires computing the weighted tree-connectivity of every k-subset of the candidate set. tw (G) can be computed by performing a Cholesky decomposition on the reduced weighted Laplacian matrix which requires O(n3 ) time in general. This time may significantly reduce for sparse graphs. Let c , |M+ |. For k = O(1), the time complexity of the brute force algorithm is O(ck n3 ). If c = O(n2 ), this complexity becomes O(n2k+3 ), which clearly is not scalable beyond k ≥ 3. Moreover, for k = α · c (α < 1) the time complexity of exhaustive search becomes exponential in c. To address this problem, in the rest of this section with propose two efficient approximation algorithms with performance guarantees by exploiting the inherent structures of tree-connectivity. 4.3 Greedy Algorithm For any n ≥ 2, w : E(Kn ) → R>0 , connected (V, Einit ), and M+ ⊆ E(Kn ) define + ϕ : 2M → R≥0 E 7→ logTGn,w (E) (16) (17) Note that ϕ is essentially logTGn,w restricted to M+ . Therefore, Corollary 4.1 readily follows from Theorem 3.4. Corollary 4.1. ϕ is normalized, monotone and submodular. Consequently, k-ESP+ can be expressed as the problem of maximizing a normalized monotone submodular function subject to a cardinality constraint, i.e., maximize ϕ(E) subject to |E| = k. E⊆M+ (18) Maximizing an arbitrary monotone submodular function subject to a cardinality constraint can be NPhard in general (see e.g., the Maximum Coverage problem [13]). Therefore it is reasonable to look for reliable approximation algorithms. In this section we study the greedy algorithm described in Algorithm 1. Theorem 4.2 guarantees that Algorithm 1 is a constant-factor approximation algorithm for k-ESP+ with a factor of (1 − 1/e) ≈ 0.63. Theorem 4.2 (Nemhauser et al. [23]). The greedy algorithm attains at least (1 − 1/e)f ⋆ , where f ⋆ is the maximum of any normalized monotone submodular function subject to a cardinality constraint.2 Remark 3. Recall that ϕ is normalized by log treen,w (Einit ), and therefore reflects the tree-connectivity gain achieved by adding k new edges to the original graph (V, Einit , w). In order to avoid any confusion, from now on we denote the optimum value of (18) by OPTϕ , and use OPT to refer to the maximum achievable tree-connectivity in k-ESP+ . Note that, OPTϕ = OPT − log treen,w (Einit ). (19) 2 A generalized version of Theorem 4.2 [17] states that after ℓ ≥ k steps, the greedy algorithm is guaranteed to achieve at least (1 − e−ℓ/k )fk⋆ , where fk⋆ is the maximum of f (A) subject to |A| = k. 8 Algorithm 1 Greedy Edge Selection 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 31: 32: function GreedyESP(Linit , M+ , k) E←∅ L ← Linit C ←Cholesky(L) while |E| < k do e⋆uv ← BestEdge(M+ \ E, C) E ← E ∪ {e⋆ } auv ← eu − ev L ← L + w(e⋆uv )auv a⊤ uv p C ← CholeskyUpdate(C, w(e⋆uv )auv ) end while return E end function ⊲ Rank-one update function BestEdge(M, C) m←0 for all e ∈ M do we ← w(e) ∆e ← Reff(e, C) if we ∆e > m then e⋆ ← e m ← we ∆e end if end for return e⋆ end function ⊲ Maximum value ⊲ Parallelizable loop function Reff(euv , C) auv ← eu − ev // solve Cxuv = auv xuv ← ForwardSolver(C, auv ) ∆uv ← kxuv k2 return ∆uv end function ⊲ Effective Resistance ⊲ Lower Triangular Let Egreedy be the set of edges picked by Algorithm 1. Define ϕgreedy , ϕ(Egreedy ). Then, according to Theorem 4.2, ϕgreedy ≥ (1 − 1/e) OPTϕ and therefore, log treen,w (Egreedy ∪ Einit ) ≥ (1 − 1/e) OPT + 1/e log treen,w (Einit ). (20) Algorithm 1 starts with an empty set of edges, and in each round picks the edge that maximizes the weighted tree-connectivity of the graph, until the cardinality requirement is met. Hence now we need a procedure for finding the edge that maximizes the weighted tree-connectivity. An efficient strategy is to use −1 Lemma 3.1 and pick the edge with the highest effective resistance wuv ∆uv . To compute ∆uv = a⊤ auv , we uv L first compute the Cholesky factor of the reduced weighted Laplacian matrix of the current graph L = CC⊤ . Next, we note that ∆uv = kxuv k2 where xuv is the solution of the triangular system Cxuv = auv . xuv can be computed by forward substitution in O(n2 ) time. The time complexity of each round is dominated by the 9 O(n3 ) time required for computing the Cholesky factor C. In the ith round, Algorithm 1 has to compute c−i effective resistances where c = |M+ |. For k = α · c (α < 1), evaluating effective resistances takes O(c2 n2 ) time. If k = O(1), this time reduces to O(c n2 ). Also, note that upon computing the Cholesky factor once in each round, xuv ’s can be computed in parallel by solving Cxuv = auv for different values of auv (see line #16 in Algorithm 1). We can avoid the O(k n3 ) time spent on repetitive Cholesky factorization by factorizing Linit once, followed by k − 1 rank-one updates, each of which takes O(n2 ) time. Therefore, the total time complexity of Algorithm 1 for k = O(1) and k = α · c will be O(n3 + c n2 ) and O(n3 + c2 n2 ), respectively. In the worst case of M+ = E(Kn ), c = O(n2 ) and therefore we get O(n4 ) and O(n6 ), respectively, for k = O(1) and k = α · c. Finally, note that for sparse graphs this complexity drops significantly given a sufficiently good fill-reducing permutation for the reduced weighted graph Laplacian. 4.4 Convex Relaxation Now we take a different approach and design an efficient approximation algorithm for k-ESP+ by means of convex relaxation. We begin by assigning an auxiliary variable 0 ≤ πi ≤ 1 to each candidate edge ei ∈ M+ . Let π , [π1 π2 . . . πc ]⊤ be the stacked vector of auxiliary variables in which c = |M+ |. Let G = (V, Einit , w) be the given base graph. Define L(π; G, M+ ) , X Lei + ei ∈Einit X ej ∈M πj Lej = AW′A⊤ , (21) + where Lek is the corresponding reduced elementary weighted Laplacian, A is the reduced incidence matrix of (V, Einit ∪ M+ ), and W′ , diag(w′ (e1 ), . . . , w′ (es )) in which s , |Einit | + |M+ | and,  π w(e ) i i w′ (ei ) , w(ei ) ei ∈ M+ , ei ∈ / M+ . (22) Lemma 4.1. L(π) is positive definite iff (V, Einit ∪ M+ ) is connected. Note that every k-subset of M+ is optimal for k-ESP+ if (V, Einit ∪ M+ ) is not connected. Therefore, if we ignore this degenerate case, we can safely assume that L(π; G, M+ ) is positive definite. With a slight abuse of notation, from now on we drop the parameters from L(π; G, M+ ) and use L(π) whenever G and M+ are clear from the context. Now consider the following optimization problem over π. maximize log det L(π) π subject to kπk0 = k, (P1 ) 0 ≤ πi ≤ 1, ∀i ∈ [c]. P1 is equivalent to our former definition of k-ESP+ . The auxiliary variables act as selectors: the ith candidate edge is selected iff πi = 1. The objective function rewards strong weighted tree-connectivity. The combinatorial difficulty of ESP here is embodied in the non-convex ℓ0 -norm constraint. It is easy to see that 10 at the optimal solution, auxiliary variables take binary values. Therefore P1 can also be expressed as maximize log det L(π) π subject to (P′1 ) kπk1 = k, πi ∈ {0, 1}, ∀i ∈ [c]. A natural choice for relaxing P′1 is to replace πi ∈ {0, 1} with 0 ≤ πi ≤ 1, i.e., maximize log det L(π) π subject to (P2 ) kπk1 = k, 0 ≤ πi ≤ 1, ∀i ∈ [c]. The feasible set of P2 contains that of P1 (or, equivalently, P′1 ), and therefore the optimum value of P2 is an upper bound for the optimum of P1 (or, equivalently, P′1 ). Note that the ℓ1 -norm here is identical to Pc i=1 πi . P2 is a convex optimization problem since the objective function (tree-connectivity) is concave and the constraints are linear and affine in π. In fact, P2 is an instance of the MAXDET problem [29] subject to additional affine constraints on π. It is worth noting that P2 can be reached also by relaxing the non-convex Pc ℓ0 -norm constraint in P1 by a convex ℓ1 -norm constraint (essentially i=1 πi = k). Furthermore, P2 is also closely related to a ℓ1 -regularalized instance of MAXDET, maximize π subject to log det L(π) − λ kπk1 (P3 ) 0 ≤ πi ≤ 1, ∀i ∈ [c]. This problem is a penalized form of P2 ; these two problems are equivalent for some positive value of λ. Problem P3 is also a convex optimization problem for non-negative λ. The ℓ1 -norm in P3 encourages sparser π, while the log-determinant rewards stronger tree-connectivity. The penalty coefficient λ is a parameter that specifies the desired degree of sparsity, i.e., larger λ yields a sparser vector of selectors π. Problem P2 (and P3 ) can be solved efficiently using interior-point methods [5]. After finding a globally optimal solution π ⋆ for the relaxed problem P2 , we ultimately need to map it into a feasible π for P1 , i.e., picking k edges from the candidate set M+ . First note that if π⋆ ∈ {0, 1}c, it means that π⋆ is already an optimal solution for k-ESP+ and P1 . However, in the more likely case of π ⋆ containing fractional values, we need a rounding procedure to set k auxiliary variables to one and others to zero. The most intuitive choice is to pick the k edges with the largest πi⋆ ’s. Another (approximate) rounding strategy (and a justification for picking the k largest πi⋆ ) emerges from interpreting πi as the probability of selecting the ith candidate edge. Theorem 4.3 provides a new interesting way of interpreting the convex relaxation of P1 by P2 . Theorem 4.3. Define E• , Einit ∪ M+ and G• , (V, E• , w). Let π • = [π1 . . . πs ]⊤ ∈ (0, 1]s such that s , |Einit | + |M+ | and πi = 1 if ei ∈ Einit . Then we have   EH∼G(G• ,π• ) tw (H) = det L(π),   X EH∼G(G• ,π• ) |E(H)| − |Einit | = πi = kπk1 . ei ∈M+ 11 (23) (24) Note that (23) and (24) appear in the objective function and the constraints of P2 , respectively. Thus P2 can be rewritten as maximize π subject to   EH∼G(G• ,π• ) tw (H)   EH∼G(G• ,π• ) |E(H)| = k + |Einit |, (P′2 ) 0 ≤ πi ≤ 1, ∀i ∈ [s]. This offers a new narrative: the objective in P2 is to find the optimal probabilities π ⋆ for sampling edges from M+ such that the weighted number of spanning trees is maximized in expectation, while the expected number of newly selected edges is equal to k. In other words, P2 can be seen as a convex relaxation of P1 at the expense of maximizing the objective and satisfying the constraint, both in expectation. This new interpretation motivates an approximate randomized rounding procedure that picks ei ∈ M+ with probability πi⋆ . According to Theorem 4.3, this randomized rounding scheme, in average, attains det L(π ⋆ ) by picking k new edges in average. Theorem 4.4. For any 0 < ǫ < 1 and δ > 0,    P |E ⋆ | < (1 − ǫ)k < exp −ǫ2 k/2 ,    P |E ⋆ | > (1 + δ)k < exp −δ 2 k/3 , (25) (26) where E ⋆ is the set of selected edges by the randomized rounding scheme defined above. Theorem 4.4 ensures that the probability of the events in which the aforementioned randomized rounding strategy picks too many/few edges (compared to k) decay exponentially. Note that this new narrative offers another intuitive justification for deterministically picking the k edges with largest πi⋆ ’s. Finally, we believe that Theorems 4.3 and 4.4 can potentially be used as building blocks to design new randomized rounding schemes. 4.5 Certifying Near-Optimality The proposed approximation algorithms also provide a posteriori lower and upper bounds for the maximum achievable tree-connectivity in ESP. Let Egreedy , Ecvx be the solutions returned by the greedy ⋆ and convex3 approximation algorithms, respectively. Let τcvx be the optimum value of P2 and define τinit , log treen,w (Einit ), τcvx , log treen,w (Ecvx ∪ Einit ) and τgreedy , log treen,w (Egreedy ∪ Einit ). Corollary 4.5. max −1 where ζ , (1 − 1/e) n o o n ⋆ τgreedy , τcvx ≤ OPT ≤ min ζτgreedy + (1 − ζ)τinit , τcvx (27) ≈ 1.58.4 Corollary 4.5 can be used as a tool to asses the quality of any suboptimal design. Let A be anoarbitrary n + ⋆ k-subset of M and τA = log treen,w (A ∪ Einit ). Define U , min ζτgreedy + (1 − ζ)τinit , τcvx . U can be computed by running the proposed greedy and convex approximation algorithms. From Corollary 4.5 it readily follows that OPT − τA ≤ U − τA and OPT/τA ≤ U/τA . Therefore, although we may not have 3 Picking the k edges with the largest πi⋆ ’s from the solution of P2 . recall that the leftmost term in (27) is bounded from below by the expression given in (20). 4 Furthermore, 12 53 52 51 110 90 80 49 150 70 150 160 165 170 Number of Edges 175 180 (a) Varying |E| for k = 5 and |V | = 20 τgreedy τcvx ⋆ τcvx 115 100 50 155 120 τgreedy τcvx ⋆ τcvx Tree−Connectivity 120 OPT τgreedy τcvx ⋆ τcvx Tree−Connectivity Tree−Connectivity 54 110 105 100 95 200 250 Number of Edges 300 (b) Varying |E| for k = 5 and |V | = 50 90 0 20 40 60 80 100 k (c) Varying k for |V | = 50 and |E| = 200 ⋆ . Figure 1: ESP on randomly generated graphs. Recall that according to Corollary 4.5, τgreedy ≤ OPT ≤ τcvx direct access to OPT, we can still certify the near-optimality of any design such as A whose δ , U − τA is sufficiently small. 4.6 Numerical Results We implemented Algorithm 1 in MATLAB. Problem P2 is modelled using CVX [12, 11] and YALMIP [18], and solved using SDPT3 [28]. Figure 1 illustrates the performance of our approximate solutions to k-ESP+ in randomly generated graphs. The search space in these experiments is M+ = E(Kn ) \ Einit . Figures 1a and 1b show tree-connectivity as a function of number of randomly generated edges for a fixed k = 5 and, respectively, |V | = 20 and |V | = 50. Our results indicate that both algorithms exhibit remarkable performances for k = 5. Note that computing OPT by exhaustive search is only feasible in small instances such as Figure 1a. Nevertheless, computing the exact OPT is not crucial for evaluating our approximate ⋆ algorithms, as it is tightly bounded in [τgreedy , τcvx ] as predicted by Corollary 4.5 (i.e., between each black · and green ×). Figure 1c shows the results obtained for varying k. The optimality gap for τcvx gradually grows as the planning horizon k increases. Our greedy algorithm, however, still yields a near-optimal approximation. 5 5.1 Beyond k-ESP+ Matroid Constraints Recall that ϕ is monotone. Therefore, except the degenerate case of (V, Einit ∪ M+ ) not being connected, replacing the cardinality constraint |E| = k in k-ESP+ with an inequality constraint |E| ≤ k does not affect the set of optimal solutions. Consider the uniform matroid [24] defined as (M+ , IU ) where  IU , A ⊆ M+ : |A| ≤ k . The inequality cardinality constraint can be expressed as E ∈ IU . + + Definition 5.1 (Partition Matroid). Let M+ 1 , . . . , Mℓ be a partition for M . Assign an integer (budget) 13 + 0 ≤ ki ≤ |M+ i | to each Mi . Define o n | ≤ k for i ∈ [ℓ] . IP , A ⊆ M+ : |A ∩ M+ i i The pair (M+ , IP ) is called a partition matroid. Now let us consider ESP under a partition matroid constraint; i.e., maximize ϕ(E) (28) subject to E ∈ IP . Note that k-ESP+ is a special case of this problem with ℓ = 1 and k1 = k. Now, by choosing different partitions for M+ and different budgets ki we can model a wide variety of graph synthesis problems. For example consider the following extension of k-ESP+ , maximize E⊆M+ ,|E|≤k subject to ϕ(E) (29) deg(v) ≤ d. n o + Define M+ , e ∈ M : v ∈ e . Now note that the constraints in (29) can be expressed as a partition v + matroid with two blocks: (i) Mv with a budget of k1 = d, and (ii) M+ \ M+ v with a budget of k2 = k − d. 5.1.1 Greedy Algorithm Theorem 5.1 (Fisher et al. [7]). The greedy algorithm attains at least (1/2)f ⋆ , where f ⋆ is the maximum of any normalized monotone submodular function subject to a matroid constraint. According to Theorem 5.1, a slightly modified version of Algorithm 1, that abides by the matroid constraint while greedily choosing the next best edge, yields a 12 -approximation [7, 17]. 5.1.2 Convex Relaxation The proposed convex relaxation of k-ESP+ can be modified to handle a partition matroid constraint. First note that (28) can be expressed as maximize π subject to log det L(π) X πi ≤ kj , ∀j ∈ [ℓ] ei ∈M+ j πi ∈ {0, 1}, ∀i ∈ [c]. 14 (P4 ) Relaxing the binary constraints on πi ’s yields maximize log det L(π) X πi ≤ kj , ∀j ∈ [ℓ] π subject to ei ∈M+ j (P5 ) 0 ≤ πi ≤ 1, ∀i ∈ [c]. P5 is a convex optimization problem and, as before, can be solved efficiently using interior-point methods. A simple rounding strategy for the solution of P5 is to pick the edges in M+ i that are associated to the ki largest πj⋆ ’s (for i ∈ [ℓ]). Moreover, the bounds in (27) (with ζ = 2) and Theorem 4.3 can also be readily generalized to handle partition matroid constraints. In particular, the optimum value of P5 gives an upper bound for the optimum value of P4 . Also, similar to Theorem 4.3, P5 can be interpreted as maximizing the expected value of the weighted number of spanning trees such that the expected number of new edges sampled from M+ i is at most ki , for i ∈ [ℓ]. 5.2 Dual of k-ESP+ The dual of k-ESP+ aims to identify and select the minimal set of new edges from a candidate set M+ such that the resulting tree-connectivity gain is at least 0 ≤ δ ≤ ϕ(M+ ) for some given δ; i.e., minimize |E| subject to ϕ(E) ≥ δ. E⊆M+ 5.2.1 (30) Greedy Algorithm The greedy algorithm for approximating the solution of (30) is outlined in Algorithm 2. The only difference between Algorithm 1 and Algorithm 2 is that the latter terminates when the δ-bound is achieved (or, alternatively, when there are no more edges left in M+ , which indicates an empty feasible set). Wolsey [31] proves several upper bounds for the ratio between the objective value achieved by the greedy algorithm and the optimum value of the following class of problems, minimize |A| subject to φ(A) ≥ φ0 , A⊆W (31) in which φ : 2W → R is an arbitrary monotone submodular function and φ0 ≤ φ(W). Note that our problem (30) is special case of (31), and therefore (some of) the bounds proved by Wolsey [31, Theorem 1] also hold for Algorithm 2. Theorem 5.2 (Wolsey [31]). Let kOPT and kgreedy be the global minimum of (30) and the objective value achieved by Algorithm 2, respectively. Also, let Ẽgreedy be the set formed by Algorithm 2 one step before termination. Then kgreedy ≤ γ kOPT in which γ , 1 + log   δ . δ − ϕ(Ẽgreedy ) 15 (32) Algorithm 2 Greedy Dual Edge Selection 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: function GreedyDualESP(Linit , M+ , δ) E←∅ L ← Linit C ←Cholesky(L) while (log det L < δ) ∧ (E 6= M+ ) do e⋆uv ← BestEdge(M+ \ E, C) E ← E ∪ {e⋆ } auv ← eu − ev L ← L + w(e⋆uv )auv a⊤ uv p C ← CholeskyUpdate(C, w(e⋆uv )auv ) end while return E end function ⊲ Rank-one update The upper bound given above and some of the other bounds in [31] are a posteriori in the sense that they can be computed only after running the greedy algorithm. 5.2.2 Convex Relaxation Let τinit , log det L(0). The dual problem can be expressed as minimize π c X πi i=1 subject to (D1 ) log det L(π) ≥ δ + τinit , πi ∈ {0, 1}, ∀i ∈ [c]. The combinatorial difficulty of the dual formulation of ESP is manifested in the binary constraints of D1 . Relaxing these constraints into 0 ≤ πi ≤ 1 yields the following convex optimization problem, minimize π c X πi i=1 subject to (D2 ) log det L(π) ≥ δ + τinit , 0 ≤ πi ≤ 1, ∀i ∈ [c]. D2 can be solved efficiently using interior-point methods. Let π ⋆ be the minimizer of D2 . ⋆ c ⋆ Pc i=1 πi⋆ is a lower bound for the optimum value of the dual ESP D1 . If π ∈ {0, 1} , π is also a globally optimal solution for D1 . Otherwise we need a rounding scheme to map π ⋆ into a feasible (suboptimal) solution for D1 . A simple deterministic rounding strategy is the following. - Step 1. Sort the edges in M+ according to π⋆ in descending order. - Step 2. Pick edges from the sorted list until log det L(π) ≥ δ + τinit . 16 Theorem 4.3 allows us to interpret D2 as finding the optimal sampling probabilities π⋆ that minimizes the expected number of new edges such that the expected weighted number of spanning trees is at least exp(δ + τinit ); i.e.,   minimize EH∼G(G• ,π• ) |E(H)| , π   (D′2 ) subject to EH∼G(G• ,π• ) tw (H) ≥ exp(δ + τinit ), 0 ≤ πi ≤ 1, ∀i ∈ [s], in which G(G• , π • ) is defined in Theorem 4.3. This narrative suggests a randomized rounding scheme in which ei ∈ M+ is selected with probability πi⋆ . The expected number of selected edges by this procedure is Pc ⋆ i=1 πi . 5.2.3 Certifying Near-Optimality Corollary 5.3. Define ζ ∗ , 1/γ where γ is the approximation factor given by Theorem 5.2. Let kcvx be the number of new edges selected by the deterministic rounding procedure described above.  ∗ max ζ kgreedy , c lX i=1 πi⋆ m o n ≤ kOPT ≤ min kgreedy , kcvx . (33) As we did before for k-ESP+ , the lower bound provided by Corollary 5.3 can be used to construct an upper bound n for the gap lbetween kmo OPT and any (feasible) suboptimal design with an objective value of kA . Pc ⋆ ∗ . L can be computed by running Algorithm 2 and solving the convex Let L , max ζ kgreedy , i=1 πi optimization problem D2 . Consequently, kA − kOPT ≤ kA − L and kA /kOPT ≤ kA /L. 6 Conclusion We studied the problem of designing near-t-optimal graphs under several types of constraints and formulations. Several new structures were revealed and exploited to design efficient approximation algorithms. In particular, we proved that the weighted number of spanning trees in connected graphs can be posed as a monotone log-submodular function of the edge set. Our approximation algorithms can find near-optimal solutions with performance guarantees. They also provide a posteriori near-optimality certificates for arbitrary designs. Our results can be readily applied to a wide verity of applications involving graph synthesis and graph sparsification scenarios. References [1] Rosemary A Bailey and Peter J Cameron. Combinatorics of optimal designs. Surveys in Combinatorics, 365:19–73, 2009. 3 [2] Prabir Barooah and Joao P Hespanha. Estimation on graphs from relative measurements. Control Systems, IEEE, 27(4):57–74, 2007. 6 17 [3] Douglas Bauer, Francis T Boesch, Charles Suffel, and R Van Slyke. On the validity of a reduction of reliable network design to a graph extremal problem. Circuits and Systems, IEEE Transactions on, 34 (12):1579–1581, 1987. 3 [4] Francis T Boesch, Appajosyula Satyanarayana, and Charles L Suffel. A survey of some network reliability analysis and synthesis results. Networks, 54(2):99–107, 2009. 3, 7 [5] Stephen Boyd and Lieven Vandenberghe. Convex optimization. Cambridge university press, 2004. 11 [6] Ching-Shui Cheng. Maximizing the total number of spanning trees in a graph: two related problems in graph theory and optimum design theory. Journal of Combinatorial Theory, Series B, 31(2):240–248, 1981. 3 [7] Marshall L Fisher, George L Nemhauser, and Laurence A Wolsey. An analysis of approximations for maximizing submodular set functionsII. Springer, 1978. 14 [8] N Gaffke. D-optimal block designs with at most six varieties. Journal of Statistical Planning and Inference, 6(2):183–200, 1982. 3 [9] Arpita Ghosh, Stephen Boyd, and Amin Saberi. Minimizing effective resistance of a graph. SIAM review, 50(1):37–66, 2008. 6 [10] Chris Godsil and Gordon Royle. Algebraic graph theory. Graduate Texts in Mathematics Series. Springer London, Limited, 2001. ISBN 9780387952413. 3, 4 [11] Michael Grant and Stephen Boyd. Graph implementations for nonsmooth convex programs. In V. Blondel, S. Boyd, and H. Kimura, editors, Recent Advances in Learning and Control, Lecture Notes in Control and Information Sciences, pages 95–110. Springer-Verlag Limited, 2008. http://stanford.edu/~boyd/graph_dcp.html. 13 [12] Michael Grant and Stephen Boyd. CVX: Matlab software for disciplined convex programming, version 2.1. http://cvxr.com/cvx, March 2014. 13 [13] Dorit S Hochbaum. Approximation algorithms for NP-hard problems. PWS Publishing Co., 1996. 8 [14] Siddharth Joshi and Stephen Boyd. Sensor selection via convex optimization. Signal Processing, IEEE Transactions on, 57(2):451–462, 2009. 23 [15] Alexander K Kelmans. On graphs with the maximum number of spanning trees. Random Structures & Algorithms, 9(1-2):177–192, 1996. 3 [16] Alexander K Kelmans and BN Kimelfeld. Multiplicative submodularity of a matrix’s principal minor as a function of the set of its rows and some combinatorial applications. Discrete Mathematics, 44(1): 113–116, 1983. 3 [17] Andreas Krause and Daniel Golovin. Submodular function maximization. Tractability: Practical Approaches to Hard Problems, 3:19, 2012. 8, 14 18 [18] Johan Löfberg. Yalmip : A toolbox for modeling and optimization in MATLAB. In Proceedings of the CACSD Conference, Taipei, Taiwan, 2004. URL http://users.isy.liu.se/johanl/yalmip. 13 [19] László Lovász. Random walks on graphs: A survey. Combinatorics, Paul Erdős is eighty, 2(1):1–46, 1993. 6 [20] Mehran Mesbahi and Magnus Egerstedt. Graph theoretic methods in multiagent networks. Princeton University Press, 2010. 5 [21] Carl D Meyer. Matrix analysis and applied linear algebra. SIAM, 2000. 20 [22] Wendy Myrvold. Reliable network synthesis: Some recent developments. In Proceedings of International Conference on Graph Theory, Combinatorics, Algorithms, and Applications, 1996. 3 [23] George L Nemhauser, Laurence A Wolsey, and Marshall L Fisher. An analysis of approximations for maximizing submodular set functions - I. Mathematical Programming, 14(1):265–294, 1978. 8 [24] James G Oxley. Matroid theory, volume 3. Oxford university press, 2006. 13 [25] Louis Petingi and Jose Rodriguez. A new technique for the characterization of graphs with a maximum number of spanning trees. Discrete mathematics, 244(1):351–373, 2002. 3 [26] Friedrich Pukelsheim. Optimal design of experiments, volume 50. SIAM, 1993. 3 [27] DR Shier. Maximizing the number of spanning trees in a graph with n nodes and m edges. Journal Research National Bureau of Standards, Section B, 78:193–196, 1974. 3 [28] Reha H Tütüncü, Kim C Toh, and Michael J Todd. Solving semidefinite-quadratic-linear programs using sdpt3. Mathematical programming, 95(2):189–217, 2003. 13 [29] Lieven Vandenberghe, Stephen Boyd, and Shao-Po Wu. Determinant maximization with linear matrix inequality constraints. SIAM journal on matrix analysis and applications, 19(2):499–533, 1998. 11 [30] Guy Weichenberg, Vincent WS Chan, and Muriel Médard. High-reliability topological architectures for networks under stress. Selected Areas in Communications, IEEE Journal on, 22(9):1830–1845, 2004. 3 [31] Laurence A Wolsey. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4):385–393, 1982. 15, 16 19 A Proofs Lemma A.1. For any M ∈ Sn>0 and N ∈ Sn>0 , M  N iff N−1  M−1 . Proof. Due to symmetry it suffices to prove that M  N ⇒ N−1  M−1 . Multiplying both sides of M  N 1 1 1 1 1 by N− 2 from left and right results in N− 2 MN− 2 − I  0. Therefore the eigenvalues of N− 2 MN− 2 , which 1 1 1 1 are the same as the eigenvalues of M 2 N−1 M 2 ,5 are at least 1. Therefore M 2 N−1 M 2 − I  0. Multiplying 1 both sides by M− 2 from left and right proves the lemma. Lemma A.2 (Matrix Determinant Lemma). For any non-singular M ∈ Rn×n and c, d ∈ Rn , det(M + cd⊤ ) = (1 + d⊤ M−1 c) det M. (34) Proof. See e.g., [21]. w w Lemma A.3. Let G1 be a spanning subgraph of G2 . For any w : E(K) → R≥0 , Lw G2  LG1 in which LG is the reduced weighted Laplacian matrix of G when its edges are weighted by w. Proof. From the definition of the reduced weighted Laplacian matrix we have, w Lw G2 − LG1 = X wuv auv a⊤ uv  0. (35) {u,v}∈E(G2 )\E(G1 ) Proof of Theorem 3.1. Define the following indicator function,  1 T ∈ T , G 1TG (T ) , 0 T ∈ / TG , (36) in which TG denotes the set of spanning trees of G. Now note that, hX i   EG∼G(G◦ ,p) tw (G) = EG∼G(G◦ ,p) 1TG (T )Vw (T ) (37) T ∈TG◦ = X EG∼G(G◦ ,p) T ∈TG◦ = h i 1TG (T )Vw (T ) (38) i X h P T ∈ TG Vw (T ) (39) Vp (T )Vw (T ) (40) T ∈TG◦ = X T ∈TG◦ = X Vwp (T ) (41) T ∈TG◦ = twp (G◦ ). 5 Recall that MN and NM have the same spectrum. 20 (42) Here we have used the fact the P[T ∈ TG ] is equal to the probability of existence of every edge of T in G, which is equal to Vp (T ). Proof of Lemma 3.1. Note that LG+ = LG + wuv auv a⊤ uv . Taking the determinant, applying Lemma A.2 and taking the log concludes the proof. Proof of Lemma 3.2. The proof is similar to the proof of Lemma 3.1. Proof of Theorem 3.3. First recall that Vw (T ) is positive for any T by definition. 1. Normalized: treen,w (∅) = 0 by definition. 2. Monotone: Let G , (V, E ∪ {e}). Denote by TGe the set of spanning trees of G that contain e. treen,w (E ∪ {e}) = Vw (T ) = X Vw (T ) + treen,w (E) ≥ treen,w (E). Vw (T ) + T ∈TGe T ∈ TG = X X X Vw (T ) (43) T∈ / TGe (44) T ∈TGe 3. Supermodular: treen,w is supermodular iff for all E1 ⊆ E2 ⊆ E(Kn ) and all e ∈ E(Kn ) \ E2 , treen,w (E2 ∪ {e}) − treen,w (E2 ) ≥ treen,w (E1 ∪ {e}) − treen,w (E1 ). (45) Define G1 , (V, E1 ) and G2 , (V, E2 ). As we showed in (44), treen,w (E1 ∪ {e}) − treen,w (E1 ) = X Vw (T ), X Vw (T ). T ∈T treen,w (E2 ∪ {e}) − treen,w (E2 ) = T ∈T Therefore we need to show that TGe2 . P T ∈TGe 2 Vw (T ) ≥ P T ∈TGe 1 (46) e G1 (47) e G2 Vw (T ). This inequality holds since TGe1 ⊆ Proof of Theorem 3.4. 1. Normalized: By definition logTGn,w (∅) = log treen,w (Einit ) − log treen,w (Einit ) = 0. 2. Monotone: We need to show that logTGn,w (E ∪ {e}) ≥ logTGn,w (E). This is equivalent to showing that, log treen,w (Einit ∪ E ∪ {e}) ≥ log treen,w (Einit ∪ E). (48) Now note that (V, Einit ∪ E) is connected since (V, Einit ) was assumed to be connected. Therefore we can apply Lemma 3.1 on the LHS of (48); i.e., log treen,w (Einit ∪ E ∪ {e}) = log treen,w (Einit ∪ E) + log(1 + we ∆e ). 21 (49) Therefore it sufficies to show that log(1 + we ∆e ) is non-negative. Since (V, Einit ) is connected, L is −1 positive definite. Consequently we ∆e = we a⊤ ae > 0 and hence log(1 + we ∆e ) > 0. e L 3. Submodular: logTGn,w is submodular iff for all E1 ⊆ E2 ⊆ E(Kn ) and all e ∈ E(Kn ) \ E2 , logTGn,w (E1 ∪ {e}) − logTGn,w (E1 ) ≥ logTGn,w (E2 ∪ {e}) − logTGn,w (E2 ). (50) After canceling log treen,w (Einit ) we need to show that, log treen,w (E1 ∪Einit ∪{e})−log treen,w (E1 ∪Einit ) ≥ log treen,w (E2 ∪Einit ∪{e})−log treen,w (E2 ∪Einit ). (51) / Einit . To shorten If e ∈ Einit , both sides of (51) become zero. Hence we can safely assume that e ∈ ∗ our notation let us define Ei , Ei ∪ Einit for i = 1, 2. Therefore (51) can be rewritten as, log treen,w (E1∗ ∪ {e}) − log treen,w (E1∗ ) ≥ log treen,w (E2∗ ∪ {e}) − log treen,w (E2∗ ). (52) Recall that by assumption (V, Einit ) is connected. Thus (V, Ei∗ ) is connected for i = 1, 2, and we can apply Lemma 3.1 on both sides of (52). After doing so we have to show that G2 1 log(1 + we ∆G e ) ≥ log(1 + we ∆e ) (53) G2 1 where Gi , (V, Ei ∪ Einit , w) for i = 1, 2. It is easy to see that (53) holds iff ∆G e ≥ ∆e . Now note that −1 −1 ⊤ 2 ∆eG1 − ∆G e = ae (LG1 − LG2 ) ae ≥ 0 (54) −1 since LG2  LG1 (G1 is a spanning subgraph of G2 ), and therefore according to Lemma A.1 L−1 G1  LG2 . Proof of Theorem 4.3. First note that (23) directly follows from Theorem 3.1 since L(π) is the reduced weighted Laplacian matrix of G• after scaling its edge weights by the sampling probabilities π1 , . . . , πs . To prove (24) consider the following indicator function,  1 e ∈ E(H), 1E(H) (e) = 0 e ∈ / E(H). 22 (55) Now note that 1E(H) (ei ) ∼ Bern(πi ) for i = 1, . . . , s. Therefore, s hX i   EH∼G(G• ,π • ) |E(H)| = EH∼G(G• ,π• ) 1E(H) (ei ) (56) i=1 = = s X i=1 s X EH∼G(G• ,π• ) h i 1E(H) (ei ) (57) πi (58) i=1 = X πi + X 1 (59) ej ∈Einit ei ∈M+ = kπk1 + |Einit |. (60) Proof of Theorem 4.4. This theoreom is a direct application of Chernoff bounds for Poisson trials of independently sampling edges from M+ with probabilities specified by π⋆ . Generalizing Theorems 3.1 and 4.3 The following theorem generalizes Theorem 3.1 (and, consequently, Theorem 4.3). Theorem A.1 provides a similar interpretation for the convex relaxation approach designed by Joshi and Boyd [14] for the sensor selection problem with linear measurement models. n Theorem A.1. Let {(yi , zi )}m i=1 be a collection of m pairs of vectors in R such that m ≥ n. Furthermore, let s1 , . . . , sm be a collection of m independent random variables such that si ∼ Bern(pi ) for some pi ∈ [0, 1]. Then we have, E si ∼Bern(pi ) ∀i∈[m] Proof. Let Sn , have [m] n  h det m X si yi z⊤ i i=1 ! i = det pi yi z⊤ i i=1 ! . (61) be the set of all n-subsets of [m]. According to the Cauchy-Binet (C-B) formula we E si ∼Bern(pi ) ∀i∈[m] h det m X i=1 si yi z⊤ i ! i C-B = E si ∼Bern(pi ) ∀i∈[m] = X Q∈Sn Now note that |Q| = n and rank(yi z⊤ i ) = 1. Therefore det Thus for every Q ∈ Sn , det m X X i∈Q si yi z⊤ i ! si yi z⊤ i Q∈Sn X i∈Q ! h X si yi z⊤ i ! h X E si ∼Bern(pi ) ∀i∈[m] det det ⊤ i∈Q si yi zi P i∈Q  i (62) i . (63) is non-zero iff si = 1 for all i ∈ Q.   Q ⊤ d , det P with probability pQ , i∈Q pi , Q i∈Q yi zi = 0 with probability 1 − pQ . 23 (64) Taking the expectation yields E si ∼Bern(pi ) ∀i∈[m] h det X si yi z⊤ i i∈Q ! i = pQ dQ . (65) Replacing (65) in (63) results in E si ∼Bern(pi ) ∀i∈[m] h det m X i=1 si yi z⊤ i ! i = X Q∈Sn pQ dQ = X Noting that the RHS in (66) is the Cauchy-Binet expansion of det 24 det Q∈S X i∈Q Pm i=1 pi yi z⊤ i ! .  concludes the proof. pi yi z⊤ i (66)
8cs.DS
arXiv:1604.07736v1 [math.GR] 26 Apr 2016 BOUNDARY ACTION OF AUTOMATON GROUPS WITHOUT SINGULAR POINTS AND WANG TILINGS DANIELE D’ANGELI, THIBAULT GODIN, INES KLIMANN, MATTHIEU PICANTIN, AND EMANUELE RODARO Abstract. We study automaton groups without singular points, that is, points in the boundary for which the map that associates to each point its stabilizer, is not continuous. This is motivated by the problem of finding examples of infinite bireversible automaton groups with all trivial stabilizers in the boundary, raised by Grigorchuk and Savchuk. We show that, in general, the set of singular points has measure zero. Then we focus our attention on several classes of automata. We characterize those contracting automata generating groups without singular points, and apply this characterization to the Basilica group. We prove that potential examples of reversible automata generating infinite groups without singular points are necessarily bireversible. Then we provide some necessary conditions for such examples to exist, and study some dynamical properties of their Schreier graphs in the boundary. Finally we relate some of those automata with aperiodic tilings of the discrete plane via Wang tilings. This has a series of consequences from the algorithmic and dynamical points of view, and is related to a problem of Gromov regarding the searching for examples of CAT(0) complexes whose fundamental groups are not hyperbolic and contain no subgroup isomorphic to Z2 . Contents 1. Introduction 2. Preliminaries 2.1. Mealy automata 2.2. Automaton groups 3. The considered classes 3.1. Contracting automata 3.2. (Bi)reversible automata 3.3. Automata with sink 4. Topological properties of the action on the boundary 4.1. Action on the boundary 4.2. Singular points 4.3. The contracting case 4.4. The bireversible case 5. Commuting pairs and dynamics on the boundary 5.1. Commuting pairs 5.2. The reversible-invertible case 6. Dynamics and Wang tilings 6.1. Wang tiles vs cross-diagrams 6.2. Commuting pairs on a restricted stateset 6.3. Aperiodic tilings and singular points 7. Some open problems References 2 3 3 5 6 6 7 9 10 10 11 13 17 18 19 20 26 26 29 34 38 38 Date: March 17, 2018. Key words and phrases. automaton groups, singular points, critical points, Schreier graphs, boundary continuity, Wang tilings, commuting pairs, helix graphs. 1 2 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO 1. Introduction The motivation comes from the study of the dynamical system (G, ∂T, µ) given by the measure µ preserving action of a group G on the boundary ∂T of a rooted tree T . By considering one orbit of this action (i.e. a Schreier graph), one may ask if it is possible to recover the information about the original dynamics in terms of the information contained in a typical orbit. This problem may be rephrased as follows: what conditions have to be imposed on the dynamical system (G, ∂T, µ) in order to guarantee that, for a typical point ξ ∈ ∂T , this dynamical system is isomorphic to the system (G, StabhM i (ξ), ν), for some measure ν concentrated on the closure StabhM i (ξ)? (Problem 8.2 in [15]). This problem has been studied by Y. Vorobets in the special case of the Grigorchuk group [36]. He showed that for this group it is possible to reconstruct the action of the general dynamical system on the boundary starting from the study of one orbit. His method uses the study of the map St that associates to any point in the boundary of the tree its stabilizer subgroup in the automaton group. Motivated by these ideas, we examine the dynamical and algorithmic implications of the continuity of the map St in the context of automaton groups, and how some combinatorial properties of the generating automaton reflect into the continuity of this map. In particular, we focus our attention on several classes of Mealy automata: the contracting case (see [25]), the reversible case, the bireversible case, and finally the case of automata with a sink-state which is accessible from every state (henceforth denoted by Sa ). We first show that, in general, the measure of the set of the points in which St is not continuous (henceforth called singular points) is zero. In the bireversible case singular points are exactly points with non-trivial stabilizers. This reproves the well known fact that bireversible automata give rise to essentially free actions on the boundary [32, Corollary 2.10]. Driven by these facts and the question raised by Grigorchuk and Savchuk in [16] regarding the existence of singular points for the action of a bireversible automaton generating an infinite group, we generalize the previous open problem into the study of examples of automaton groups without singular points. In the case of contracting groups we provide a characterization for such automata in terms of languages recognized by Büchi automata that we call stable automata. In the examples that we present, we show that the situations may be very different. For instance, in contrast with the Hanoi Towers group case, we show that the Basilica group has no singular points. In both the class of reversible invertible automata and the class Sa , by using the notion of helix graph, we reduce this problem to the existence of certain pairs of words, called commuting pairs, that is, two words, one on the stateset the other one on the alphabet, that commute with respect to the induced actions. Using this fact we prove a series of results. For instance, it turns out that the existence of singular points is always guaranteed for the reversible invertible automata that are not bireversible. This shows that, in the class of reversible invertible automata, the core of the problem of finding examples of group automata without singular points is reduced to the class of bireversible automata. We present some necessary conditions for such examples to exist. For instance, the generated group is necessarily fully positive, that is, it is defined by relators that do not contain negative occurrences of the generators. Furthermore, we prove that if a bireversible automaton generates an infinite non-torsion group, then having all stabilizers in the boundary that are BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 3 torsion groups (like in the situation of not having singular elements) is equivalent to have in the dual automaton all Schreier graphs in the boundary which are either finite, or acyclic multigraphs (just considering the edges without their inverse). The study of commuting pairs also leads to a connection with periodic tessellations of the discrete plane using Wang tilings, and it is also related to the so-called Gromov’s problem (the reader is referred to the paper [21] for more details). This connection has been pointed out to us by I. Bondarenko [5]. Using the helix graph one can easily show that any automaton group has a commuting pair, whence the associated tileset has always a periodic tiling. However this commuting pair may involve a trivial word. For instance in the class Sa there is always a trivial commuting pair involving the sink-state. This fact leads to the notions of non-elementary commuting pair and reduced tileset of an automaton group. Using a result by [23] we first show that the problem of finding non-elementary commuting pairs is undecidable. Further, the notion of non-elementary commuting pair is strictly related to the existence of periodic singular points in the boundary. From this connection, we start a study of the relationship between non-periodic tessellations of the discrete plane, and algebraic and dynamical properties of the associated automaton group. Indeed, we first provide conditions for the associated reduced tileset to tile the discrete plane. Then, we pinpoint the algebraic and dynamical properties that an automaton group from Sa has to possess so that the associated reduced tileset generates just aperiodic tilings. Finally, we characterize the existence of aperiodic tilings à la Kari-Papasoglu with some properties of the group generated by an automaton and its set of singular points. 2. Preliminaries 2.1. Mealy automata. We first start with some vocabulary on words, then introduce our main tool — Mealy automata. Let Q be a finite set, as usual, Qn , Q≤n , Q<n , Q≥n , Q∗ , and Qω denote respectively the set of words of length n, of length less than or equal to n, of length less than n, of length greater than or equal to n, of finite length, and the set of right-infinite words on Q . For two words u, v ∈ Q∗ with u = vv ′ (u = v ′ v) for some v ′ ∈ Q∗ , we say that v is a prefix (suffix ), denoted by v ≤p u (respectively, v ≤s u). If ξ = x1 x2 · · · ∈ Qω , then ξ[n] = xn is the n-th letter of ξ, and ξ[: n] = x1 · · · xn its initial prefix of length n. Similarly, for m ≤ n we denote by ξ[m : n] = xm · · · xn the factor of ξ of length n − m + 1 between the m-th and the n-th letter of ξ, and by ξ[m :] = xm xm+1 · · · its tail. Two infinite sequences ξ, η ∈ Qω are said to be cofinal (written ξ ∝ η) if there exists an integer k such that ξ[k :] = η[k :]. By Q̃ = Q ∪ Q−1 we denote the involutive set where Q−1 is the set of formal inverses of Q. The operator −1 : Q → Q−1 sending q 7→ q −1 is extended to an e ∗ through involution on the free monoid Q e ∗ ). 1−1 = 1, (q −1 )−1 = q, (uv)−1 = v −1 u−1 (q ∈ Q; u, v ∈ Q e ∗ generated by the relation set {(qq −1 , 1) | q ∈ Q}. e Let ∼ be the congruence on Q ∗ ∗ e e The quotient FQ = Q / ∼ is the free group on Q, and let σ : Q → FQ be the e ∗ may be compactly canonical homomorphism. The set of all reduced words on Q 4 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO written as RQ = Q̃∗ r [ Q̃∗ qq −1 Q̃∗ . q∈Q̃ e ∗ , we denote by u ∈ RQ the (unique) reduced word ∼-equivalent For each u ∈ Q to u. With a slight abuse in the notation we often identify the elements of FQ with their reduced representatives, i.e. σ(u) = u; this clearly extends to subsets e∗ . σ(L) = L for L ⊆ Q A Mealy automaton is a tuple M = (Q, Σ, ·, ◦) where Q and Σ are finite set respectively called the stateset and the alphabet, and · , ◦ are functions from Q × Σ to, respectively, Q and Σ called the transition and the production function. This automaton can be seen as a complete, deterministic, letter-to-letter transducer with same input and output alphabet or, following [10], as a labelled digraph. The graphical representation is standard (see Fig. 2 for instance) and one displays transitions as follows: a|b q −−→ p ∈ M ⇐⇒ q·a = p, q◦a = b . It can be seen that the stateset Q and the alphabet Σ play a symmetric role, hence we can define a new Mealy automaton: the dual of the automaton M = (Q, Σ, ·, ◦) q|p is the automaton dM = (Σ, Q, ◦, ·) where we have the transition a−−→b whenever a|b q −−→p is a transition in M (see Fig. 2). a|q◦a For each automaton transition q −−→ q·a, we associate the cross-transition depicted in the following way: a q·a, q q◦a see also Fig. 1. If the functions (Σ → Σ : a 7→ q◦a)q∈Q are permutations the automaton is said to be invertible. On the other hand, when the functions (Q → Q : q 7→ q·a)a∈Σ are permutations the automaton is called reversible. Note that when an automaton is reversible its dual is reversible and the other way around. Mealy automata that are both invertible and reversible are called reversible invertible automata, or RIautomata for short. Other classes of automata will be described in Section 3. ◦ A Mealy automaton M = (Q, Σ, ·, ◦) defines inductively an action Q y Σ∗ of Q on Σ∗ by q◦(a1 · · · an ) = (q◦a1 ) ((q·a1 )◦(a2 · · · an )) , that can also be depicted by a cross-diagram by gluing cross-transitions (see Glasner and Mozes [13], or [1]) representing the action of a word of states on a word of letters (or vice-versa): a2 · · · an a1 (q·a1 )·(a2 · · · an ) . q·a1 q q◦a1 (q·a1 )◦(a2 · · · an ) BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 5 · In a dual way, this Mealy automaton defines also an action Q∗ x Σ. Both actions naturally extend to words, respectively in Q∗ and Σ∗ with the convention hg◦a = h◦(g◦a) and g·ab = (g·a)·b . In addition to these descriptions of a Mealy automaton, we are going to use another visualization, the helix graphs (introduced in [1]). The helix graph Hn,k of a Mealy automaton M = graph with nodes Qn × Σk and  (Q, Σ, ·, ◦) is thendirected k arcs (u, v) −→ u·v, u◦v for all (u, v) ∈ Q × Σ (see Fig. 1). 1 0 0|1 1|0 y x y x 1 0 1|1 0|0 x x x, 0 x, 1 y y, 0 y, 1 0 1 y x y 0 1 Figure 1. The Mealy automaton L generating the lamplighter group, the set of its cross-transitions, and its helix graph H1,1 (L). ◦ 2.2. Automaton groups. From the algebraic point of view, the action Q∗ y Σ∗ gives rise to a semigroup hM i+ generated by the endomorphisms q ∈ Q of the regular rooted tree identified with Σ∗ defined by q : u 7→ q◦u for u ∈ Σ∗ . Groups generated by invertible automata play an important role in group theory (for more details we refer the reader to [25]). In this framework all the maps q : u 7→ q◦u, q ∈ Q, are automorphisms of the regular rooted tree Σ∗ , and the group generated by these automorphisms is denoted by hM i (with identity 1). Note that ◦ · ◦ the actions Q∗ y Σ∗ and Q∗ x Σ∗ extend naturally to the actions hM i y Σ∗ · and hM i x Σ∗ , respectively. There is a natural way to factorize these actions using the wreath product [25, 3]. Let M = (Q, Σ, ·, ◦) be an invertible Mealy automaton. The inverse of the automorphism q is denoted by q −1 ∈ Q−1 = {q −1 : q ∈ Q}. There is an explicit way to express the actions of the inverses by considering the inverse automaton M −1 havb|a a|b ing Q−1 as stateset, and a transition q −1 −−→p−1 whenever q −−→p is a transition in M (see Fig. 2). 1|0 0|1 1|0 y x 1|1 0|1 −1 x|y y x −1 1|1 y|x 0 1 0|0 0|0 x|x L L−1 dL y|y Figure 2. The lamplighter automaton L, its inverse automaton L−1 , and its dual automaton dL. The action of the group hM i on Σ∗ , in case M is invertible (or of the semigroup hM i+ in a more general case), may be naturally extended on the boundary Σω of the tree. 6 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO This action gives rise to the so-called orbital graph. In general, given a finitely generated semigroup S, with set of generators Q, that acts on the left of a set X ◦ according to S y X, if π : Q∗ → S denotes the canonical map, then the orbital graph Γ(S, Q, X) is defined as the Q-digraph with set of vertices X, and there is a an edge x−−→y whenever π(a) ◦ x = y. When we want to pinpoint the connected component containing the element y ∈ X we use the shorter notation Γ(S, Q, X, y) instead of (Γ(S, Q, X), y). Note that in the realm of groups, this notion corresponds to the notion of Schreier graph. In particular for an invertible Mealy automaton M = (Q, Σ, ·, ◦) and a word v ∈ Σ∗ ⊔ Σω , if StabhM i (v) = {g ∈ hM i : g◦v = v} e corresponds to the is the stabilizer of v, the Schreier graph Sch(StabhM i (v), Q) connected component pinpointed by v of the orbital graph: e ≃ Γ(hM i, Q, e Σ∗ ⊔ Σω , v) . Sch(StabhM i (v), Q) This simply corresponds to consider the orbit of v as the vertex set and the edges given by the action of the generators of the group (in our context the state of the generating automaton). Henceforth, when the automaton group is clear from the context we will use the e more compact notation Sch(v) when we deal with Sch(StabhM i (v), Q). 3. The considered classes Throughout the paper we focus mainly on four classes of automata: contracting automata, reversible automata, bireversible automata, and automata with a sink. 3.1. Contracting automata. The notion of contracting automata has been introduced by V. Nekrashevych in [25]. For a Mealy automaton M = (Q, Σ, ·, ◦), the group hM i is said to be contracting if there exists a finite set ℵ ⊂ hM i such that, for any g ∈ hM i there exists an integer n = n(g) such that g·v ∈ ℵ, for any v ∈ Σ≥n . The set ℵ is called a nucleus of hM i. Graphically it means that, from any element of the group, a long enough path leads to the nucleus. This enables the construction of a finite automaton Mℵ with stateset ℵ, alphabet Σ, a|g◦a and transitions g −−−−→g·a. By extension, an automaton generating a contracting group is said to be contracting itself. Examples of such automata are depicted on Fig. 3 and 4. Note that if the contracting automaton M has a sink-state, this state necessarily belongs to ℵ. The importance of the notion of contracting automata refers to the beautiful and surprising connection with complex dynamics established by V. Nekrashevych [25]. With every contracting group one may associate a topological space called limit space, that is encoded by the set of left-infinite words on Σ modulo the equivalence relation given by the action of the nucleus, i.e., two left infinite sequences ξ = · · · ξn ξn−1 · · · ξ1 and η = · · · ηn ηn−1 · · · η1 are equivalent if for any n ≥ 1 there exists gn ∈ ℵ satisfying gn ◦ξn ξn−1 · · · ξ1 = ηn ηn−1 · · · η1 . It turns out that the iterated monodromy group IMG(f ) of a post-singularly finite rational function is contracting and its limit space is homeomorphic to the Julia set of f . This discovery puts in strict relation the dynamics of the map f and the algebraic properties of IMG(f ). As an example, this powerful correspondence has allowed L. Bartholdi BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 7 and V. Nekrashevych to solve a classical problem in complex dynamics, the so-called Hubbard Twisted Rabbit Problem by using algebraic methods [2]. a 2|2 0|0 1|1 a 0|1 0|1 0|2 1|0 1|1 b 0|0, 1|1, 2|2 b 2|0 1 2|1 1|2 1|0 1 c 1|1, 0|0 0|0 Figure 3. The contracting automata generating the Basilica group (on the left) and the Hanoi Towers group H (3) (on the right). 3.2. (Bi)reversible automata. The classes of reversible and bireversible Mealy automata are also interesting. We recall that a Mealy automaton is reversible whenever each input letter induces a permutation of the stateset, i.e. simultanea|b a|c ous transitions q −−→p and q ′ −−→p are forbidden. In the context of groups, we are especially interested in reversible invertible automata (called henceforward RIautomata). Moreover such a reversible automaton is bireversible if in addition each output leta|b ter induces a permutation of the stateset, i.e. simultaneous transitions q −−→p and ′ c|b q −−→p are also forbidden. In this case it is necessarily invertible. An interesting feature of an RI-automaton is that the dual of such an automaton is still reversible and invertible. The following lemma, which will be useful later, may be easily deduced from [32] or [10, Theorem 2]. Lemma 3.1. Let M be an RI-automaton with hM i ≃ FQ /N . Then, the following facts hold: (i) if g ∈ Q∗ is such that g·a ∈ N for some a ∈ Σ∗ , then g ∈ N ; (ii) let g, g ′ , g ′′ ∈ Q∗ with g·a = g ′ for some a ∈ Σ∗ , then there is a h ∈ Q∗ satisfying (hg)·a = g ′′ g ′ . e in (i). Furthermore, if M is bireversible then Q can be replaced by Q Proof. Let us prove point (i). First note that any state reachable from a state in N also belongs to N . Indeed let g ′ ∈ N and a′ , b′ ∈ Σ∗ , we have: a′ g ′ b′ ′ g ·a a ′ ′ b′ 8 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO So for any word b′ ∈ Σ∗ , g ′ ◦a′ b′ = a′ b′ , hence (g ′ ·a′ )◦b′ = b′ , i.e., g ′ ·a′ ∈ N . Let g ′ = g·a ∈ N . By the reversibility of the automaton there is an a′ ∈ Σ∗ such that g ′ ·a′ = g and we can conclude that g belongs to N . Property (ii) follows by observing that by reversibility there is an h ∈ Q∗ such that h·(g◦a) = g ′′ holds (remember that the words in Q∗ are written from right to left). In terms of cross-diagramms we obtain: a g ′ = g·a g g◦a h . ′′ g = h·(g◦a) The last statement follows by applying (i) to M ⊔ M −1 that is reversible by the bireversibility of M .  The structure of the groups generated by reversible or bireversible automata is far from being understood. For instance, for a long time the only known examples of groups generated by bireversible automata were finite, free, or free products of finite groups [34, 35, 25]. Recently examples of bireversible automata generating non-finitely presented groups have been exhibited in [7] and in [22, 29]. In this regard, we now provide an embedding result of any group generated by a bireversible automaton whose dual does not generate a free group, into the outer automorphism group of a free group of infinite rank. This fact may give some extra insight on the kind of groups that are generated considering bireversibility. Proposition 3.2. Let M be a bireversible automaton such that hM i is infinite and hdM i is not free. Then, there is a monomorphism φ : hM i ֒→ Out(F∞ ). Proof. Let M = (Q, Σ, ·, ◦). By [8, Theorem 4], if−1we−1 consider the enriched automaa |b a|b ton M − obtained from M by adding the edge p −−→ q for any edge q −−→p of M , then hM − i ≃ hM i. By [10, Theorem 2] we may express the group hdM i as the ◦ e ∗. quotient FΣ /N where N is the maximal subset invariant under the action Q y Σ We may regard N as a normal subgroup of the free group FΣ , in particular note that [FΣ : N ] < ∞ if and only if hdM i is finite, and so hM i is also finite [25, 30]. Therefore, [FΣ : N ] = ∞, whence N ≃ F∞ , since N is free by Nielsen’s theorem. Let us first prove that there is an embedding hM i ֒→ Aut(N ). By the stability ◦ e ∗ and the invertibility of M − , we have that for any of N under the action Q y Σ g ∈ hM i the map ψg : n 7→ g◦n for n ∈ N is a bijection of N that is also a homoe ∗ and n ∈ N . Hence, ψg ∈ Aut(N ). morphism since w·n = w holds for any w ∈ Q Furthermore, the map φ : hM i → Aut(N ) that sends g to ψg is a homomorphism since equality ψg′ g = ψg′ ◦ψg holds. This map is also injective. Indeed, assume that ψg1 = ψg2 for some g1 , g2 ∈ hM i. Since N is normal, then for any u ∈ Σ∗ there is a reduced element n ∈ N such that u is a prefix of n (take a suitable conjugate of a reduced non-trivial element of N ). Hence, ψg1 = ψg2 implies that g1 ◦u = g2 ◦u for any u ∈ Σ∗ , hence g1 = g2 . Hence we get the claim φ : hM i ֒→ Aut(N ). We now show that each automorphism ψg is not inner. Indeed, assume contrary to our claim, that ψg (n) = unu−1 , n ∈ N , for some reduced non-empty element u ∈ N . BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 9 Then, for any n ∈ N there is an integer ℓ(n) such that g ℓ(n) ◦n = n, whence we have n = ψgℓ(n) (n) = ψgℓ(n) (n) = uℓ(n) nu−ℓ(n) from which we get nuℓ(n) = uℓ(n) n. We consider the subgroup generated by n and uℓ(n) . By Nielsen’s theorem this subgroup is free, and so both n and uℓ(n) belongs to the same cyclic subgroup hhi for some h ∈ N . In particular, there is e ∗ common to both u and n. However, since n ∈ N a non-empty prefix h′ ∈ Σ e ∗ appears is arbitrary and N is normal by the same argument above each u ∈ Σ ′ as a prefix of some non-trivial reduced element n ∈ N , a contradiction. Hence, φ : hM i ֒→ Out(N ) ≃ Out(F∞ ).  Unfortunately, the condition of having a free group of infinite rank appears to be mandatory in Proposition 3.2. Indeed, the next proposition shows that the embedding of an automaton group generated by a bireversible automaton into the group of length preserving automorphisms of the free group Fm for some 1 < m < ∞, characterizes finite groups. In what follows we call an element ψ ∈ Aut(Fm ) length preserving if given any w ∈ Fm one has |w| = |ψ(w)|. We denote by Autℓp (Fm ) the subgroup of Aut(Fm ) formed by the length preserving automorphisms. Proposition 3.3. Let M be a bireversible automaton. There is a monomorphism φ : hM i ֒→ Autℓp (Fm ) if and only if hM i is finite. Proof. Let M = (Q, Σ, ·, ◦). Suppose hM i finite and let N be the maximal invariant ◦ e ∗ (as in Proposition 3.2), then [FΣ : N ] < ∞ and so subset for the action Q y Σ N ≃ Fm for some m. We proceed as in the proof of the previous proposition to show that φ : hM i → Autℓp (Fm ) is a monomorphism. Conversely, let consider an embedding φ : hM i ֒→ Autℓp (Fm ) for some m, and let R = {x1 , . . . , xm } be minimal set of generators of Fm . For any g ∈ hM i, let ψg be the corresponding automorphism in Autℓp (Fm ). Since R is finite and the automorphisms preserve the length, the set [ ψg (xi ) Ω= g∈hM i,i=1,...,m is clearly finite. Further, there is a natural homomorphism of hM i into Sym(Ω). Let us prove that it is actually a monomorphism. Indeed, let g 6= g ′ in hM i. Then ψg 6= ψg′ holds in Autℓp (Fm ). Since R is a generating set, then ψg (xik ) 6= ψg′ (xik ) for some xik ∈ R. We deduce hM i ֒→ Sym(Ω), and so hM i is finite.  For similar results that link automaton groups defined by bireversible Mealy automata and the group of automorphisms of a free group, the reader is referred to [24]. 3.3. Automata with sink. In the complement of the class of the RI-automata there is another interesting class that, in some sense, represents the opposite case: the class Sa of all the invertible Mealy automata with a sink-state e which is accessible from every state (the index “a” standing for accessible). We recall that a sink-state of a Mealy automaton is a special state e such that e·a = e and e◦a = a for any a ∈ A. Note that in this setting the sink-state is unique. The reason we require that the sink-state is accessible from every state will be clear 10 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO in Section 6. This class is rather broad and it contains many known classes of Mealy automata like automata with polynomial state activity [31]. Furthermore, in [10, Proposition 6] it is shown that this class is essentially formed by those automata for which every element g in the generated group has a g-regular element in the boundary (for the notion of g-regular element see for instance [26]). Moreover, this class is also included into the broader class of synchronizing automata for which some results on automaton groups can be found in [9]. The connection with synchronizing automata will also be crucial in Section 6 in characterizing automata whose associated set of reduced tiles do not tile the plane. In [8] the problem of finding free groups generated by automata in Sa is tackled. Indeed,until recently, all known free automaton groups were generated by bireversible automata. This led to the question whether or not it is possible to generate a free group by means of automata with a sink-state. In [8] a series of examples of automata from Sa generating free groups is exhibited. However, in this case the resulting free groups do not act transitively on the corresponding tree, so this leaves open the question of finding a free group generated by an automaton from Sa acting transitively on the rooted tree. This problem is also connected with the interesting combinatorial notion of fragile word introduced in [8]. 4. Topological properties of the action on the boundary In this section we describe some topological properties of the action of an automaton group on the boundary of a rooted tree. In particular, we consider the problem of continuity of the map that associates with any point in the boundary the corresponding Schreier graph. We prove that the set of those points where this function is not continuous has zero measure. Moreover, we provide a characterization of contracting automata whose action on the boundary is continuous everywhere. In the reversible case, we prove that examples of automata generating groups with all continuous points in the boundary are necessarily bireversible, and in this case, this condition may be rephrased in terms of triviality of the stabilizers in the boundary. 4.1. Action on the boundary. Let M = (Q, Σ, ·, ◦) be an invertible automaton e denote and Sub(hM i) denote the space of all subgroups of hM i and let Sch(hM i, Q) the space of marked Schreier graphs of hM i (i.e. Schreier graphs in which we have chosen a special vertex, the marked vertex) contained in the space of all marked labeled graphs and put ∂T = Σω . Both spaces may be endowed with a natural topology (also induced by an opportune metric). We endow the space Sub(hM i) with the Tikhonov topology of the space {0, 1}hM i in such a way that any subgroup H may be identified with its characteristic function. Given a finite subset F of hM i the F −neighborhood of a subgroup H contains all subgroups K such that H ∩ F = K ∩ F . Roughly speaking we say that two subgroups H and K of hM i are close if they share many elements. On the other hand, two marked Schreier graphs Sch(ξ) and Sch(η) are close when the subgraphs given by the balls of large radius around ξ and η are isomorphic, and two points ξ and η in ∂T are close if they share a long common prefix. Notice that in our notation, Sch(ξ) corresponds BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 11 e Σ∗ ⊔ Σω , ξ). to the graph Γ(hM i, Q, Vorobets studied the map F : ∂T −→ Sch(hM i, S) e ξ 7−→ Sch(StabhM i (ξ), Q) in the case where M is the Grigorchuk automaton [36]. His results may be summarized as follows: the closure F (∂T ) of the image of the boundary of the binary tree into the space of marked labeled Schreier graphs consists of a countable set of points (the one-ended boundary graphs) and another component containing all two-ended Schreier graphs. The Grigorchuk group acts on the compact component given by F (∂T ) without these isolated points by shifting the marked vertex of the graph and such action is minimal (every orbit is dense) and uniquely ergodic (there is a unique Borel probability measure on this set that is invariant under the action of the group). 4.2. Singular points. Let M = (Q, Σ, ·, ◦) invertible. We define the map St : Σω −→ Sub(hM i) ξ 7−→ StabhM i (ξ). The neighborhood stabilizer Stab0hM i (ξ) of ξ is the set of all g ∈ hM i that fix the point ξ together with its neighborhood (that may depend on g). One may check that Stab0hM i (ξ) is a normal subgroup of StabhM i (ξ). A point ξ ∈ Σω is called singular if the map St is not continuous at ξ. The set of singular points is denoted by κ. The following lemma clarifies the connection between the continuity of the map St and the dynamics in the boundary. Lemma 4.1. [36, Lemma 5.4] St is continuous at the point ξ if and only if the stabilizer of ξ under the action coincides with its neighborhood stabilizer, i.e.: ξ ∈ κ ⇐⇒ Stab0hM i (ξ) 6= StabhM i (ξ) . The following lemma characterizes continuous points in terms of restrictions. Lemma 4.2. Let M be an invertible automaton and let ξ be an element in Σω . The following are equivalent. (i) ξ is not singular; (ii) St is continuous at ξ; (iii) For any g ∈ StabhM i (ξ) there exists n such that g·ξ[: n] = 1; Proof. (i)⇔(ii), (iii)⇒(ii), follow from definition. (ii)⇒(iii). Let us prove ¬(iii)⇒¬(ii). Suppose that there exists g ∈ StabhM i (ξ) such that g·ξ[: n] 6= 1 for all n ≥ 0. Then we can find, for any n, a letter xn ∈ Σ such that (g·ξ[: n])◦xn = x′n 6= xn . Hence if we put ζn = ξ[: n]xn ξ[n + 2 :] ∈ Σω we get g◦ζn = g◦ξ[: n]xn ξ[n + 2 :] = ξ[: n]x′n ξ ′ 6= ξ. Hence, since we can construct a ζn in any neigbourhood of ξ, Stab0hM i (v ω ) 6= StabhM i (v ω ), and St is not continuous.  Moreover we can characterize continuous points by looking only to periodic points Lemma 4.3. Let M be an invertible automaton. The following are equivalent. 12 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO (i) There is no singular point in Σω ; (ii) There is no singular periodic point in Σω . Proof. (i) ⇒ (ii) is obvious, let us prove the converse, by contraposition. Assume that St is not continuous at some ξ ∈ Σω and let g ∈ StabhM i (ξ) r Stab0hM i (ξ). If there exists k such that g·ξ[: k] = 1 then g stabilizes some neighborhood U of ξ and is contained in Stab0hM i (ξ). Hence, for any n ≥ 1, g·ξ[: n] is a non-trivial element in hM i. The set { g·ξ[: k], k ∈ N } is finite, this implies that there exist m and n such that n > m > 0 and g ′ := g·ξ[: m] = g·ξ[: n] 6= 1. Therefore g ′ ·ξ[m + 1 : n] = g ′ and g ′ ◦ξ[m + 1 : n] = ξ[m + 1 : n]. Put v = ξ[m + 1 : n]: g ′ ∈ StabhM i (v ω ). In order to prove that g ′ 6∈ Stab0hM i (ξ) we notice that, since g ′ is not trivial, there exists w ∈ Σ∗ such that g ′ ◦w = w′ 6= w. Consider the sequence wk := v k wv ω for k ≥ 0. Clearly, for any neighborhood U of v ω there exists n such that wn ∈ U . But g ′ ◦wn = g ′ ◦v n (g ′ ·v n )◦(wv ω ) = v n w′ v ′ 6= wn for some v ′ ∈ Σω . Therefore g ′ ∈ StabhM i (v ω ) 6= Stab0hM i (v ω ).  In the following theorem we prove that the measure of the set κ of singular points is zero. For the sake of completeness we recall that a subset of a topological space X is nowhere dense if its closure has an empty interior. A subset is meager in X if it is a union of countably many nowhere dense subsets. A Baire space, as Σω with the usual topology, cannot be given by the countable union of disjoint nowhere dense sets. In general the notion of nowhere dense and meager set do not coincide with the notion of zero-measure. In [36] it is proven that κ is meager. e ∗ , denote by Fix(u) the set consisting in the vertices ξ ∈ Σω fixed by Given u ∈ Q the action of u. If w ∈ Σk is an element stabilized by u we write w ∈ Fixk (u). By using the ideas developed in [20] we are able to give the following characterization. Theorem 4.4. For any invertible automaton, the set measure zero. κ of singular points has Proof. The proof is heavily based on the ideas contained in Proposition 4.1 and e ∗ , k ≥ 1, consider the following sets: Theorem 4.2 of [20]. For u ∈ Q χ(u) = {ξ ∈ Σω : ξ ∈ Fix(u) and π(u·ξ[: j]) 6= 1  χk (u) = w ∈ Σk : w ∈ Fixk (u) and π(u·ξ[: j]) 6= 1 By Lemma 4.2, the set of singular points is [ χ(u). κ= ∀j ≥ 0} , 0≤j≤k . e∗ u∈Q e ∗ . Since Let us prove µ(χ(u)) = 0, for any u ∈ Q \ χ(u) = (χk (u)Σω ) , k≥1 we get: |χk (u)| . k→∞ k→∞ |Σ|k We now show that this limit is 0. Indeed, as proved below, there is an integer p such that µ(χ(u)) = lim µ(χk (u)Σω ) = lim (Ek ) |χpk (u)| ≤ (|Σ|p − 1)k , for all k ≥ 1 . BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 13 e i : π(v) 6= 1}. Since H|u| is finite, there is an integer p such that Let Hi = {v ∈ Q no element of H|u| induces the identity on Σp : take it for Equation (Ek ). Use an induction on k ≥ 1. For k = 1: χp (u) ⊆ Σp and Fixp (u) 6= Σp by the choice of p. Suppose that |χp(k−1) (u)| ≤ (|Σ|p − 1)k−1 . Since u·h ∈ H|u| for any h ∈ χp(k−1) (u), there is a v ∈ Σp that is not fixed by u·h, whence |χp·k (u)| ≤ |χp(k−1) (u)|(|Σ|p − 1) ≤ (|Σ|p − 1)k .  4.3. The contracting case. The property of being contracting allows us to characterize the set κ of singular points in terms of a language recognized by an automaton. Let M = (Q, Σ, ·, ◦) be a Mealy automaton. We define its stable automaton as the automaton B(M ) on infinite words where for a ∈ Σ we have: a q −−→p ∈ B(M ) ⇐⇒ a|a q −−→p ∈ M . Given a Büchi acceptance condition (i.e. a set of states that has to be visited infinity often), such an automaton recognizes a language of right-infinite words (see for instance [33]). See Figs. 4 and 5. Theorem 4.5. Let M be a invertible automaton admitting a finite nucleus automaton N . Then the set κ of singular points is included in the set of word cofinal with a word in the language recognized by the Büchi automaton B(N ) with every state but the sink-state accepting. Conversely any word recognized by B(N ) is singular. In particular if the language B(N ) is empty then κ = ∅. Proof. Let e be the sink-state of the nucleus and suppose that there exists ξ ∈ Σω such that St is not continuous on ξ. From Lemma 4.2 it follows that there exists g ∈ StabhM i (ξ) such that g·ξ[: k] 6= e for every k > 0. Since hM i is contracting there exists gn ∈ N such that gn = g·ξ[: n] ∈ N . Notice that gn+k := g·ξ[: n + k] = gn ·ξ[n + 1 : n + k] ∈ N r {e} and gn+k ◦ξ[n + k] = ξ[n + k]. Since B(N ) has the same set of states as N and admits a transition exactly when g◦i = i holds, there is an infinite path ξ[n + k] ξ[n + 1] ξ[n] gn −−→gn+1 −−→ · · · gn+k −−→ · · · that avoids e. Furthermore since the stateset is finite there is a state that is infinitely visited, hence the run is accepted by B(N ). To prove that ξ is cofinal to a word recognized by B(N ) notice that since ξ[n :] is recognized and N is finite, there exists an integer m such that g·ξ[: m] = gm+1 belongs to a strongly connected component C of N . Hence, by reading transition in C backward, we can extend ξ[m :] on ′ the left to obtain a word ξ ′ = ξ ′ [1] · · · ξ ′ [m − 1]ξ[m :] and a sequence g ′ , g1′ , . . . , gm ′ ′ ′ ′ ′ of elements of C such that there exist g ·ξ [: k] = gk+1 for k ≤ m, g ·ξ [: m] = gm+1 and g ′ ◦ξ ′ [: k] = ξ. Then B(N ) recognizes ξ ′ , and the points ξ ′ and ξ are cofinal. ik i1 On the other hand if a run g1 −−→g 2 · · · gk −−→gk+1 · · · is accepted by B(N ) then it is infinite and it does not visit e (since it is a sink, i.e. an absorbing state). Hence g1 stabilizes ξ = i1 i2 · · · and satisfies π(g1 ) 6= 1. So by Lemma 4.2, St is not continuous.  Notice that if ξ ∈ Σω is singular, so is each element of its orbit. Indeed if g◦ξ = ξ with g 6= 1 then we have hgh−1 ◦(h◦ξ) = h◦ξ with hgh−1 6= 1 for all h ∈ hM i. So the previous characterization is exact when the set of words cofinal to a word in the language B(N ) coincide with the orbit of words in the language B(N ). 14 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO In particular this occurs for self-replicating automata. A Mealy automaton is called self-replicating (also called fractal ) whenever for any word u ∈ Σ∗ and any g ∈ hM i, there exists h ∈ StabhM i (u) satisfying h·u = g. Proposition 4.6. Let M be a contracting, self-replicating Mealy automaton. Then κ is the set of words cofinal to a word in the language recognized by B(N ). Proof. The first inclusion comes directly from Theorem 4.5. For the other one, let ξ be recognized by B(M ) and uξ[n :] be cofinal to ξ. Since ξ[n :] is recognized by B(N ) it is singular. So there exists g ∈ hM i satisfying g◦ξ[n :] = ξ[n :] with g·ξ[n : n + k] 6= 1 for all k ≥ 0. Now, since M is self-replicating there exists h ∈ hM i satisfying the following cross diagram: u h ξ[n :] h·u = g u ξ[n :] Hence uξ is singular.  Note that, despite of these strong requirements, the class of contracting and selfreplicating automata is wide. It contains in particular the Grigorchuk automaton, the Hanoi Tower automaton or the basilica automaton. One can notice that all states in a connected component have same type (accepting or rejecting). In that case the automaton is said to be weak Büchi [27]. It follows that the language of B(N ) is closed and regular. It is also (infinite) suffix closed. Moreover we get informations about the topology of the border F (∂T ). Proposition 4.7. Let M be a Mealy automaton and a be a letter in its alphabet. If there exists a state q such that q◦a = a and q·a = q, and p·a 6= p for p 6= q ∈ Q, then F (aω ) = Sch(aω ) is an isolated point in the closure of F (∂T ). Proof. Recall that two rooted graphs are close if they have balls of large radius around the roots that are isomorphic. Let us prove StabhM i (aω ) 6= Stab0hM i (aω ). The Schreier graph associated with aω contains a loop rooted at aω and labeled by q. Any other element in ∂T that is not cofinal to aω , contains at some position a letter other than a, so that it is not fixed by q. This implies that F (aω ) is isolated, since no other graph contains a loop labeled by q. The same argument works for the vertices of the orbit of aω , that are the only ones having at finite distance a vertex with a loop labeled by q.  Note that this is still true when one consider words on Σk instead of single letters. We now apply the previous characterizations to two examples of contracting, self-replicating automata, namely the Basilica automaton et the Hanoi Towers automaton. The Basilica group, introduced in [18], is generated by the automorphisms a and b having the following self-similar form: a = (b, 1), b = (a, 1)(01), where (01) denotes the nontrivial permutation of the symmetric group on {0, 1, 2} and, with a slightly abuse of notation, 1 denotes the sink-state (see Fig. 3). In Fig. 4 the nucleus automaton associated with this group is presented. Since the stable automaton accepts no infinite word we obtain: BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 15 0|1 ba−1 ab−1 ba−1 ab−1 1|0 b 0|0 1|0 1|1 0|1 a 1|0 0|1 1|1 1 1|1, 0|0 a−1 1|0 0|1 1 b 0|0 1 0 1 a b−1 a−1 1, 0 0 b−1 Figure 4. The nucleus automaton (on the left) and the stable automaton (on the right), associated with the Basilica automaton. Corollary 4.8. For the Basilica group, the set κ of singular points is empty. We now consider the case of the Hanoi Towers group H (3) (see Fig. 3) introduced in [17]. This group is generated by the automorphisms of the ternary rooted tree having the following self-similar form: a = (1, 1, a)(01) b = (1, b, 1)(02), and c = (c, 1, 1)(12), where (01), (02), and (12) are elements of the symmetric group on {0, 1, 2}. Observe that a, b, c are involutions. Corollary 4.9. For the Hanoi Towers group H (3) , the set κ of singular points is a countable set consisting of the (disjoint union of the) orbits of the three points 0ω , 1ω , and 2ω . Moreover F (iω ) = Sch(iω ) is an isolated point in the closure of F (∂T ) for i ∈ {0, 1, 2}. 2 1 a 0, 1, 2 b 1 c 0 Figure 5. The stable automaton B(H (3) ) for the Hanoi Towers automaton. 16 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO Since Sch (iω ) is isolated in F (∂T ) for i ∈ {0, 1, 2}, one can ask about the behaviour of the sequence of Schreier graphs of finite words converging to iω . It turns out that this sequence is converging, but the limit is not a Schreier graph for the Hanoi Towers group.  Let ηni n∈N , i = 0, 1, 2 be a sequence of elements of Σ∗ , such that |ηni | = n, converging to iω . Recall that Sch(iω ) contains only one loop rooted at iω . Let Υi , i = 0, 1, 2 be the graph obtained from Sch(iω ) as follows: (1) Take two copies of Sch(iω ) and let gi ∈ {a, b, c} be the label of the loop at iω . (2) Erase the loop at iω in each copy of Sch(iω ). (3) Join the two copies by an edge labeled gi and connecting the vertices iω of each copy and choose one of these iω as marked vertex. c c 02k−1 0α 02k−1 1α b b a a 2k 0α a 2k 1α c c 12k−1 0α 12k−1 1α b b c 02ω b a a 2ω c 12ω b Figure 6. Part of the (finite) Schreier graphs in the Hanoi Towers group H (3) of 2k 0α (above) and of the (infinite) Schreier graph of 2ω (below). See proof of Theorem 4.10. Theorem 4.10. F (ηni ) converges to Υi for i ∈ {0, 1, 2} as n → ∞. BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 17  Proof. Let zni n∈N be a sequence of natural numbers such that zni is the position of the first letter in ηni different from i. It comes from the structure of finite Schreier graphs of H (3) (see Fig. 6) that the balls of radius zni − 1 in Υi rooted at iω , and in Sch(ηni ) rooted at ηni are isomorphic. Since zni goes to infinity as n does, we have the assertion.  It can be shown that the infinite Schreier graphs of the Hanoi Tower group are all one ended, see [6]. Hence, since Υi is clearly two ended it follows that it is not an infinite Schreier graph of H (3) . More precisely there is no ξ ∈ ∂T = Σω such that the orbital Schreier graph Sch(ξ) is isomorphic to Υi , even if the graph is considered non marked. 0|0 d0 0|0 1|1 b 0|0 1|1 c0 1|1 d1 1|1 c1 1|1 0|0 a 0|0 0|1 1|0 1 Figure 7. A twisted version of the Grigorchuk automaton. Note that Grigorchuk automaton can be twisted in order to obtain a contracting automaton generating a fractal group with non countable κ, see Fig 7. However one can ask if there exist minimal automata where two singular points have isomorphic Shreier graphs, see Problem 2. 4.4. The bireversible case. In this section, we focus on the bireversible case. We start with the following alternative result which shows that, in the class of bireversible automata, the problem of finding examples with all continuous points in the boundary is equivalent to look for automata with all trivial stabilizers in the boundary. Proposition 4.11. Let M be a bireversible automaton. For any ξ ∈ Σω , we have: ξ ∈ κ ⇔ StabhM i (ξ) 6= {1}. Proof. Let g ∈ StabhM i (ξ). We have only two possibilities: either there exists n ≥ 1 such that g·ξ[: n] = 1, or for every n ≥ 1 one has g·ξ[: n] 6= 1. In the first case, since M is bireversible we may apply Lemma 3.1, which implies g = 1. On the other hand, suppose g·ξ[: n] = gn ∈ hM i r {1}. We have already remarked that St : ∂T −→ Sub(hM i) is not continuous at ξ if Stab0hM i (ξ) 6= StabhM i (ξ). Since gn 6= 1, for every n there exists wn ∈ Σ∗ such that gn ◦wn 6= wn . Let η (n) := ξ[: n]wn ξ[n + |wn | + 1 :] ∈ Σω . Notice that η (n) → ξ, so that for every 18 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO neighborhood U of ξ there exists k = kU ≥ 1 such that η (k) ∈ U . By hypothesis g ∈ StabhM i (ξ) and g·η (k) [: k] = g·ξ[: k] = gk . The sequence η (n) converges to ξ since they have the same prefix of length n, so given U we find k such that η (k) ∈ U . We have g◦η (k) = g◦ξ[: k] ((g·η[: k])◦wk ξ[n + |wn | + 1 :]) = ξ[: k](gk ◦wk ) ((gk ·wk )◦ξ[n + |wn | + 1 :]) 6= η (k) . This implies that Stab0hM i (x) 6= StabhM i (x), which means x ∈ κ.  We recall that the action of hM i on Σω is essentially free if µ({x ∈ Σω : StabhM i (x) 6= {1}}) = 0, where µ is the uniform measure on Σω (see [15]). One may prove that groups generated by bireversible automata give rise to essentially free actions on Σω [32]. Equivalently, this fact may be deduced by Proposition 4.11 and Lemma 4.2. The next proposition characterizes in terms of Schreier graphs those automaton groups having all trivial stabilizers in the boundary, which by the previous proposition are those with κ = ∅. Proposition 4.12. Let M be a bireversible automaton. The set κ of singular points is empty if and only if any two words in a same orbit cannot be cofinal. Proof. First, suppose that there exist ξ ∈ Σω and 1 6= g ∈ hM i such that η := g◦ξ ∝ ξ. Let us prove that there is an element of Σω whose stabilizer is not trivial. Since η ∝ ξ, then there exists N > 0 such that ξ[N :] = η[N :]. Since M is bireversible, from Lemma 3.1 gk := g·ξ[: k − 1] 6= 1 for any k. Since g◦ξ = η, one gets gk ◦ξ[k :] = (g·ξ[: k − 1])◦ξ[k :] = η[k :]. In particular, for k = N we get gN ◦ξ[N :] = gN ◦η[N :] = η[N :] = ξ[N :]. This implies that ξ ′ := ξ[N :] is stabilized by gN 6= 1 and so it is a boundary point with a non-trivial stabilizer, so it is a singular point. On the other hand, let hM i admit a boundary point ξ with a non-trivial stabilizer. Then, there exists 1 6= g ∈ hM i such that g·ξ = g. Since g 6= 1 and M is bireversible, there exist v ∈ Σ∗ and f ∈ Q∗ , such that f ◦v 6= v and f ·v = g. Hence vξ and f ◦(vξ) are two distinct cofinal words.  5. Commuting pairs and dynamics on the boundary Theorem 4.4 from Section 4 states that the set κ of all singular points has measure zero. In this section we are interested in seeking for examples of automata with κ = ∅. Note that by Proposition 4.11, in the bireversible case this property is equivalent to have all trivial stabilizers in the boundary [16]. On the other hand, no example of such dynamics is known in this class (which seems to be the most difficult case), unless the generated group is finite. In this section we focus our attention on the class of reversible invertible automata. BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 19 5.1. Commuting pairs. Given an automaton M = (Q, Σ, ·, ◦), we say that v ∈ Σ∗ , u ∈ Q∗ commute whenever u·v = u and u◦v = v ; in this case we say that (u, v) is a commuting pair. The previous definition considers words v ∈ Σ∗ , u ∈ Q∗ . However, we may consider commuting pairs in M ⊔ M −1 = e Σ, ·, ◦). The importance of commuting pairs stems in the connection with the (Q, stabilizers of periodic points on the boundary. For example a classical way to prove that an automaton is not contracting has an interpretation in terms of commuting pairs: if there exists a commuting pair (u, v) such that u has infinite order then the automaton cannot be contracting [11]. We put ∗ Stab+ hM i (ξ) := StabhM i+ (ξ) = π(Q ) ∩ StabhM i (ξ) as the set of “positive” stabilizers. We have the following proposition that clarifies the connection between commuting pairs and stabilizers. e ∗ (u ∈ Q∗ ) Proposition 5.1. Let M be an invertible automaton. If v ∈ Σ∗ , u ∈ Q + ω ω commute, then π(u) ∈ StabhM i (v ) (respectively, StabhM i (v )). e ∗ (π(u) ∈ Q∗ ) such that π(u) ∈ StabhM i (v ω ) Conversely, for any v ∈ Σ∗ , π(u) ∈ Q ω j n (respectively, u ∈ Stab+ hM i (v )) then there are integers n, j ≥ 1 such that u·v , v commute. Moreover if M is an RI-automaton then one can take j = 0, i.e. u, v n commute. Proof. The first statement follows from u◦v i = v i , u·v i = u, for all i ≥ 1, i.e. ω ∗ π(u) ∈ StabhM i (v ω ) (π(u) ∈ Stab+ hM i (v ) in case u ∈ Q ). On the other hand, since the stateset is finite there exists k such that, ∀j ≥ k, u·v j is in the strongly connected component of u·v k . Then by strong connectivity there exist n and j ≥ k such that (u·v j )·v n = u·v j . Moreover (u·v j )◦v n = v n , hence (u·v j , v n ) is a commuting pair. In particular if M is in addition reversible then every connected component is in fact strongly connected, hence one can choose j = 0.  ek,n . The following proposition The helix graph of M ⊔ M −1 is denoted by H gives a way to build all pairs of commuting pairs by looking at the “labels” of the cycles of the helix graphs. Lemma 5.2. Let M be an invertible automaton. Let (u0 , v0 )−−→(u1 , v1 )−−→ · · · −−→(um , vm )−−→(u0 , v0 ) e k,n ). Let u = um · · · u0 and v = v0 · · · vm , then be a cycle in the helix graph Hk,n (H u, v commute. e ∗ ) there is a helix graph Conversely, for any commuting pair v ∈ Σ∗ , u ∈ Q∗ (u ∈ Q ek,n ) such that (u, v)−−→(u, v). Hk,n (H e k ), v0 ∈ Σn there is a path Furthermore, for any u0 ∈ Qk (u0 ∈ Q (u0 , v0 )−−→(u1 , v1 )−−→ · · · −−→(uℓ , vℓ )−−→ · · · −−→(uℓ , vℓ ) ek,n ), for some ℓ ≥ 0. in the helix graph Hk,n (H Proof. From the definition of the helix graph we get: (um · · · u0 )◦(v0 · · · vm ) = v0 · · · vm , (um · · · u0 )·(v0 · · · vm ) = um · · · u0 20 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO that is, u, v commute. On the other hand, if u·v = u and u◦v = v, then the path (u, v)−−→(u, v) is a cycle in Hk,n for k = |u|, n = |v|. The last statement is a consequence of the determinism of an automaton and the fact that any pair (u, v) has out-degree one, i.e., for (u, v) there is exactly one pair (u′ , v ′ ) such that (u, v)−−→(u′ , v ′ ) is an edge in the helix graph.  5.2. The reversible-invertible case. In this section we prove that those examples of RI-automata having all continuous points (for the map St) in the boundary (if any) are located in the class of bireversible automata. In other words an RIautomaton where the set of singular points is empty is necessarily bireversible. We also show a series of equivalences and connections with the property of having all trivial stabilizers in the boundary. Examples of RI-automata with the aforementioned property are strictly related to a particular class of groups. Given a group G presented by hX|Ri, we say that G is fully positive whenever R ⊆ X ∗ , and for any x ∈ X there is a word u ∈ R such that x is a prefix of u. Note that the last property is equivalent to the fact that each x−1 ∈ X −1 may be expressed as a positive element ux ∈ X ∗ . These groups have the following alternative (apparently stronger) definition. e ∗ → G be Proposition 5.3. Let G be a group presented by hX|Ri, and let π : X the natural map. The following are equivalent. (i) G is fully positive; (ii) For any u ∈ X ∗ there is v ∈ X ∗ such that π(uv) = 1 in G; (iii) For any u ∈ X ∗ there is v ∈ X ∗ such that π(vu) = 1 in G. Proof. (ii)⇒(i). Follows by substituting every negative occurrence of a generator in a relator by a positive word. (i)⇒(ii). Let us prove the statement by induction on the length |u|. The case |u| = 1 follows from the fact that G is fully positive. Therefore, suppose that the statement holds for |u| < n and let us prove it for |u| = n. Consider any u = au′ ∈ X n with |u′ | = n − 1, for some u′ ∈ X ∗ and a ∈ X. By the induction hypothesis there is v ′ ∈ X ∗ such that π(u′ v ′ ) = 1. By the definition there is a defining relation ah ∈ R starting with a ∈ X. Take v = uv ′ h ∈ X ∗ , then it is easy to check that π(uv ′ h) = π(v) = 1 holds. Equivalence (ii)⇔(iii) follows by conjugation.  Note that all torsion groups are fully positive. The following lemma is a direct consequence of Proposition 15 in [10]. Lemma 5.4. Let M = (Q, Σ, ·, ◦) be an invertible automaton. Then, for any ξ ∈ Σω and π(u) ∈ Stab+ hM i (ξ) (π(u) ∈ StabhM i (ξ)) there exist i > j ≥ 1 such that + π(u·ξ[: j]) ∈ StabhM i (ξ[j : i]ω ) (respectively, π(u·ξ[: j]) ∈ StabhM i (ξ[j : i]ω )). Proof. Let π(u) ∈ Stab+ hM i (ξ), then we have u◦ξ[: n] = ξ[: n] for all n ≥ 1. Furthermore, by the finiteness of Q|u| , and since {u·ξ[: k]}k>0 is infinite, there are two indices i > j ≥ 1 such that u·ξ[: i] = u·ξ[: j]. From which it follows that (u·ξ[: j])◦(ξ[j : i]ω ) = ξ[j : i]ω ω i.e., π(u·ξ[: j]) ∈ Stab+ hM i (ξ[j : i] ). The general case π(u) ∈ StabhM i (ξ) is treated analogously considering M ⊔ M −1 instead of M .  BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 21 From which we derive the two following consequences. We have the following theorem. Theorem 5.5. Let M = (Q, Σ, ·, ◦) be an RI-automaton such that, for all ξ ∈ Σω , Stab+ hM i (ξ) contains only torsion elements. Then hM i is fully positive. ω ∗ Proof. In particular, Stab+ hM i (v ) contains only torsion elements for all v ∈ Σ . ∗ Take any arbitrary u0 ∈ Q , we show that there is a relation having u0 as a suffix, whence the statement follows by Proposition 5.3. By Lemma 5.2 there is path (u0 , v0 ) −→ · · · −→ (uℓ , vℓ ) −→ (uℓ+1 , vℓ+1 ) −→ · · · −→ (uℓ+k , vℓ+k ) = (uℓ , vℓ ) in the helix graph H|u0 |,n for some v0 ∈ Σn , ℓ ≥ 0. Since we have a loop around the vertex (uℓ , vℓ ), by Lemma 5.2 u = uℓ+1 · · · uℓ+k and v = vℓ+1 · · · vℓ+k are a ω m commuting pair. Proposition 5.1 implies π(u) ∈ Stab+ hM i (v ), thus π(u ) = 1 for some m ≥ 1. Hence uℓ is the suffix of some relation. Since u0 and uℓ belong to the same connected component, by using Lemma 3.1, we get a relation ending with u0 .  ω Note that, in particular, if Stab+ hM i (ξ) = {1} for all ξ ∈ Σ , then hM i is fully positive. Here are two very similar results on stabilizers. One when stabilizers are trivial, the other when they contain only torsion elements. Proposition 5.6. Let M = (Q, Σ, ·, ◦) be an RI-automaton. The following are equivalent. ω (i) Stab+ hM i (ξ) = {1} for all ξ ∈ Σ ; + ω (ii) StabhM i (v ) = {1} for all v ∈ Σ∗ ; (iii) StabhM i (v ω ) = {1} for all v ∈ Σ∗ ; (iv) StabhM i (ξ) = {1} for all ξ ∈ Σω . Proof. (i)⇔(ii). The implication is trivial. Let us look at the reciprocal implication: let π(u) ∈ Stab+ hM i (ξ). By Lemma 5.4, there are integers i > j ≥ 1 such that π(u·ξ[: + j]) ∈ StabhM i (ξ[j : i]ω ), which is trivial by hypothesis. Hence π(u·ξ[: j]) = 1, and so, by reversibility and Lemma 3.1, π(u) = 1. (ii)⇔(iii). The converse (iii)⇒(ii) is trivial. Conversely, if (ii) holds, then by e we can Theorem 5.5 we have that hM i is fully positive. Therefore, for any u ∈ Q + ∗ + construct a word u ∈ Q such that π(u ) = π(u). The result follows. (iii)⇔(iv) follows from [10, Proposition 15].  Proposition 5.7. Let M = (Q, Σ, ·, ◦) be an RI-automaton. The following are equivalent. ω (i) Stab+ hM i (ξ) is formed by torsion elements, for all ξ ∈ Σ ; + ω (ii) StabhM i (v ) is formed by torsion elements for all v ∈ Σ∗ ; (iii) StabhM i (v ω ) is a torsion group for all v ∈ Σ∗ ; Furthermore, if M is bireversible, following is also equivalent: (iv) StabhM i (ξ) is a torsion group for all ξ ∈ Σω . Proof. (i)⇔(ii). The implication is trivial. Let us look at the reciprocal implication: let π(u) ∈ Stab+ hM i (ξ). By Lemma 5.4, there are integers i > j ≥ 1 such that ω π(u·ξ[: j]) ∈ Stab+ hM i (ξ[j : i] ), which contains only torsion elements by hypothesis. 22 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO Hence, there is an integer ℓ ≥ 1 such that π (u·ξ[: j])ℓ π(u) ∈ Stab+ hM i (ξ) the following equality:  = 1. Further, since (u·ξ[: j])ℓ = uℓ ·ξ[: j] holds for any j ≥ 1.  Thus, by Lemma 3.1, we deduce π(u) = 1 and we get π(uℓ ) = π (u·ξ[: j])ℓ = 1, i.e., π(u) is torsion. (ii)⇔(iii). The proof is similar as the one in Proposition 5.6. In the bireversible case, the implication (iv)⇒(iii) is trivial, while the converse is proven similarly to Proposition 5.6. Take π(u) ∈ StabhM i (ξ). By Lemma 5.4, there are integers i > j ≥ 1 such that π(u·ξ[: j]) ∈ StabhM i (ξ[j : i]ω ). Since ω the group Stab  hM i (ξ[j : i] ) is torsion, then there is an integer ℓ ≥ 1 such ℓthat ℓ π (u·ξ[: j]) = 1. Hence, by the bireversibility and Lemma 3.1, we get π(u ) =  π(uℓ ·ξ[: j]) = π (u·ξ[: j])ℓ = 1. In particular, note that the previous propositions imply the existence of a nontrivial “positive” stabilizer whenever the action on the boundary for an RI-automaton has at least one non-trivial stabilizer. Let M = (Q, Σ, ·, ◦) be an invertible automaton, and let hM i = FQ /N . The set of “positive relations” of hM i is P(M ) = Q+ ∩ ψ −1 (N ) e ∗ → FQ is the canonical homomorphism. Note that P(M ) = ∅ implies where ψ : Q + that hM i is torsion-free and therefore infinite. ω ∗ Lemma 5.8. If P(M ) = ∅, then Stab+ hM i (v ) 6= {1} for some v ∈ Σ . Proof. Let (u0 , v0 ) −→ · · · −→ (uℓ , vℓ ) −→ (u0 , v0 ) be a cycle in the helix graph H1,1 . Then by Lemma 5.2 (u0 . . . uℓ , v0 . . . vℓ ) is a ω commuting pair. Hence π(u0 . . . uℓ ) ∈ Stab+ hM i ((v0 . . . vℓ ) ), and since P(M ) = ∅, + ω we conclude StabhM i ((v0 · · · vℓ ) ) 6= {1}.  The next theorem shows that either hM i or hdM i may have all trivial stabilizers in the boundary. We first recall the following proposition. Proposition 5.9. [8, Corollary 5] Let M = (Q,   Σ, ·, ◦) be an RI-automaton with hM i infinite. Then the index hM i : StabhM i (y ω ) is infinite for all y ∈ Σ∗ , if and only if P(dM ) = ∅. The following simple proposition is technical: Proposition 5.10. Let M = (Q, Σ, ·, ◦) be an RI-automaton with hM i infinite. ω ∗ If Stab+ hM i (y ) = {1} for all y ∈ Σ , we have P(dM ) = ∅. ω ∗ Proof. Suppose Stab+ hM i (y ) = {1} for all y ∈ Σ . Let us prove   hM i : StabhM i (y ω ) = ∞   for all y ∈ Σ∗ . Indeed, if hM i : StabhM i (y ω ) < ∞ for some y ∈ Σ∗ , then the following property holds:   ω k (1) ∃k ≤ hM i : StabhM i (y ω ) such that ∀g ∈ Stab+ hM i (y ) : g = 1 . In particular, by Proposition 5.3 we get that hM i is fully positive. We claim that every element of hM i is torsion. Indeed, since hM i is fully positive we have that BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 23 e ∗, for any q ∈ Q there is a uq ∈ Q∗ such that π(q −1 ) = π(uq ). Now take any w ∈ Q −1 −1 by substituting each negative occurrence q ∈ Q appearing in w with uq , we obtain a “positive” word w b ∈ Q∗ such that π(w) b = π(w). Thus, by (1) we have: π(w)k = π(w) b k = π(w bk ) = 1, that is, hM i is torsion. Being a residually finite group with uniformly bounded torsion, we deduce from [37,  38] that hM i is finite, a contradiction. Hence, we obtain hM i : StabhM i (y ω ) = ∞ for all y ∈ Σ∗ , and so, by Proposition 5.9, ω P(dM ) = ∅. In particular, by Corollary 5.8, P(dM ) = ∅ implies Stab+ D (z ) 6= {1} ∗ for some z ∈ Q , hence the last statement holds.  The latter admits a partial converse in the case where there exists an aperiodic element in hM i: Proposition 5.11. Let M be a RI Mealy automaton. If hM i is not torsion and P(dM ) 6= ∅ then ∃y ∈ Σ∗ , Stab+ hM i (y) 6= {1} e ∗ such that π(u) is aperiodic. Since P(dM ) is not empty there Proof. Let u ∈ Q e )|u|,|v| , there is a path exists y such that σ(y) = 1. Then in the helix graph H(M (u, y) −→ (u, y1 ) −→ · · · −→ (u, yk ) −→ (u, yk+1 ) −→ · · · −→ (u, yℓ ) −→ (u, yk ) . Hence ul−k and yk · · · yl commutes. Then π(ul−k ) ∈ StabhM i ((yk · · · yl )ω ) and π(ul−k ) 6= 1. We conclude using Prop. 5.6.  Theorem 5.12. Let M = (Q, Σ, ·, ◦) be an RI-automaton with hM i infinite. We + ω ∗ ω have either Stab+ hM i (y ) 6= {1} for some y ∈ Σ , or StabhdM i (z ) 6= {1} for ∗ some z ∈ Q . Now, we focus on the possible consequences of being bireversible or not. We first recall the following proposition. Proposition 5.13. [8, 14] Let M be an RI-automaton. If M does not contain a bireversible connected component, then P(M ) = ∅. From which we have the following proposition. Proposition 5.14. Let M = (Q, Σ, ·, ◦) be a non bireversible RI-automaton. Then ∗ ω Stab+ hM i (v ) 6= {1} for some v ∈ Σ . Furthermore, the set κ of singular points is not empty. Proof. The first statement follows by applying Proposition 5.13 and Corollary 5.8 to a non bireversible component of M . Let us prove the last claim of the proposition. ω We show that St is actually not continuous at v ω . Indeed, let π(u) ∈ Stab+ hM i (v ) with π(u) 6= 1, for some u ∈ Q∗ . If St were continuous at v ω then, by Lemma 4.3, π(u·v j ) = 1 for some j ≥ 1. Thus, by Lemma 3.1, we get π(u) = 1, a contradiction.  As an immediate consequence of the previous proposition we obtain the following result. Corollary 5.15. If there exists an RI-automaton M generating a group without singular points, then necessarily M is bireversible. 24 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO Let us have a look at the case of bireversible automata without singular points. Proposition 5.16. Let M = (Q, Σ, ·, ◦) be a bireversible automaton with hM i infinite and no singular points. Then for any u ∈ Q∗ the following are equivalent: (i) the Schreier graph centered at uω is finite; (ii) there is an integer ℓ > 0 such that π(uℓ ) = 1; (iii) Stab+ (uω ) 6= {1}. hd M i Proof. Recall that, for bireversible automata M , having no singular points is equivω ∗ alent to Stab+ hM i (v ) = {1} for all v ∈ Σ , by Propositions 5.7 and 4.11. (i)⇔(ii) follows from [8, Theorem 6]. e ∗ → hdM i is (iii)⇒(ii): Let v ∈ Σ∗ such that σ(v) ∈ Stab+ (v ω ), where σ : Σ hd M i the natural map. By Proposition 5.1 there is an integer ℓ > 0 such that v and uℓ ℓ ω commute, hence π(uℓ ) ∈ Stab+ hM i (v ) = {1}, i.e., π(u ) = 1. (i)⇒(iii): If the Schreier graph centered at uω is finite, then, for any v ∈ Σ∗ we get σ(v k ) ∈ StabhdM i (uω ) for k = [hdM i : StabhdM i (uω )]. Furthermore, σ(v k ) 6= 1 (uω ) 6= {1}. since, by Proposition 5.10, P(dM ) = ∅, whence Stab+  hdM i The equivalence (ii)⇐⇒(iii) of Prop. 5.16 links being torsion and having nontrivial stabilizers. We name it for future references in this paper: (TS) ℓ ω ∀u ∈ Σ∗ we have Stab+ hM i (u ) 6= {1} ⇐⇒ σ(u ) = 1 , for some ℓ ≥ 1 . We recall that an acyclic multidigraph is a multidigraph without cycles. We have the following geometrical description in terms of some algebraic conditions. Proposition 5.17. Let M be an RI-automaton. If P(M ) = ∅ and (TS) then the orbital graphs Γ(hM i, Q, Σω , v ω ) of periodic points v ω for v ∈ Σ∗ , are either finite or acyclic multidigraphs. Proof. Suppose that both P(M ) = ∅ and Condition (TS) hold. Let u ∈ Σ∗ . By [8, Lemma 2] it follows that every vertex of Γ(hM i, Q, Σω , uω ) is a periodic point hω ω for some h ∈ Σ∗ . Assume that there exists h ∈ Σ∗ such that Stab+ hM i (h ) 6= {1}, ω ω then by condition (TS) and [8, Theorem 6], Γ(hM i, Q, Σ , h ) is finite and so is Γ(hM i, Q, Σω , uω ). ω ω Otherwise, Stab+ hM i (p) = {1} for each vertex p of Γ(hM i, Q, Σ , u ). Thus, by condition P(M ) = ∅, we deduce that, for any vertex p of Γ(hM i, Q, Σω , uω ) there is v no cycle p−−→p for any v ∈ Q∗ , i.e., Γ(hM i, Q, Σω , uω ) is an acyclic multidigraph.  Note that the converse of the previous proposition holds if one assumes the existence of an infinite orbital graph rooted at some periodic point. Gathering Theorem 5.12 and the equivalence (TS), we obtain the following corollary, and so by Proposition 5.17 a description of the Schreier graphs of the dual in the case hM i has no singular points. Corollary 5.18. Let M be a bireversible automaton with hdM i infinite and no singular points in the dual: ∀ξ ∈ Qω , StabhdM i (ξ) = {1}. Then (TS) holds. We can now obtain a lower bound on the growth of the Schreier graphs pointed at periodic points. BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 25 Proposition 5.19. Let M be a bireversible automaton with hM i infinite and no singular points. Then for any u ∈ Q∗ with π(u) aperiodic, we have h i ∀m ≥ 1, hdM i : StabhdM i (um ) > log|Σ| (m). Proof. Fix some u ∈ Q∗ with π(u) aperiodic. We claim that for any v ∈ Σ∗ , (um ) r {1}, then m < |Σ||v| . For 0 ≤ i < m, we have if σ(v) ∈ Stab+ hdM i σ(ui ◦v) ∈ Stab+ (u). By the reversibility of M , there is an integer k ≤ |Σ||v| hdM i such that uk ◦v = v. If m ≥ |Σ||v| , then k ≤ m and σ(v) ∈ Stab+ (uω ), hdM i contradicting Corollary 5.18. Therefore, m < |Σ||v| . In particular, taking any a ∈ Σ, we get that there is an integer j ≤ [hdM i : StabhdM i (um )] such that σ(aj ) ∈ StabhdM i (um ), from which we obtain h i hdM i : StabhdM i (um ) ≥ j > log|Σ| (m) and this concludes the proof.  We obtain the following geometrical characterization. Theorem 5.20. Let M be a bireversible automaton with hM i infinite, with at least one aperiodic element. The following are equivalent. (i) StabhM i (ξ) is a torsion group, for all ξ ∈ Σω ; (ii) P(dM ) = ∅ and (TS) hold. (iii) the orbital graphs Γ(hdM i, Σ, Qω , v ω ) of periodic points are either finite or acyclic multidigraphs. Proof. (i)⇒(ii): From (i), the subgroup StabhM i (y ω ) is torsion for any y ∈ Σ∗ . Let  us prove P(dM ) = ∅. Assume hM i : StabhM i (y ω ) < ∞ for some y ∈ Σ∗ . Then, the subgroup \ g StabhM i (y ω )g −1 N= g∈hM i is a finite index torsion normal subgroup of hM i. Thus, since hM i/N isfinite, the  group hM i is torsion, a contradiction. We deduce hM i : StabhM i (y ω ) = ∞ for all y ∈ Σ∗ , whence by Proposition 5.9, P(dM ) = ∅. Now, to prove (TS) we essentially repeat the proof of the equivalence (iii)⇔(ii) of Proposition 5.16; the only point where the torsion hypothesis is used, is in the implication (iii)⇒(ii), while the other parts may be repeat “verbatim”. ω ∗ (ii)⇒(i): By Proposition 5.7 it is enough to prove that Stab+ hM i (y ), y ∈ Σ , are ω ∗ ∗ formed by torsion elements. Thus, let π(u) ∈ Stab+ hM i (y ) for some u ∈ Q , y ∈ Σ . n By Proposition 5.1, u, y is a commuting pair for some integer n ≥ 1, and by the same proposition σ(y n ) ∈ StabhdM i (uω ). Therefore, since P(dM ) = ∅, we find Stab+ (uω ) 6= {1}, whence π(uℓ ) = 1, by Proposition 5.16, i.e. π(u) is torsion. hdM i (ii)⇒(iii): Direct by Proposition 5.17. (iii)⇒(ii): Orbital graphs Γ(hdM i, Σ, Qω , v ω ), v ∈ Q∗ cannot be all finite. Indeed, if v ∈ Q∗ , the connected components of its powers have sizes bounded by the size of Γ(hdM i, Σ, Qω , v ω ). Thus, by [22, Proposition 7] π(v) is of finite order. And therefore, hM i is torsion, which contradicts the fact that hM i has an aperiodic element. Hence there is an infinite (acyclic by hypothesis) orbital graph Γ(hdM i, Σ, Qω , hω ), for some h ∈ Q∗ . Now, if P(dM ) 6= ∅, there is a non-trivial cycle hω −−→hω in 26 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO the previous acyclic multidigraph, which is impossible. Finally, let us show (TS): in fact, when the orbital graph is finite, then both sides of the equivalence are true, otherwise neither of the sides holds. Let u ∈ Q∗ . If Γ(hdM i, Σ, Qω , uω ) is finite, then clearly Stab+ (uω ) 6= {1} hdM i holds and, by the previous argument, π(u) is of finite order. On the other hand, if Γ(hdM i, Σ, Qω , uω ) is infinite, then π(u) is aperiodic according to [22, Proposition 7]. Further, by hypothesis, the infinite orbital graph Γ(hdM i, Σ, Qω , uω ) is acyclic, whence Stab+  (uω ) = {1}, and this concludes the proof. hdM i In this section we have constructed tools to find singular points, especially in the case of bireversible automata. It is still unknown whether there exists examples of infinite groups generated by RI automata without singular point. In particular we connected singular points with helix graphs and we proved that search can be narrow down to fully positive groups (Theorem 5.5). We also discuss the connection between the existence of non-trivial stabilizer of a group generated by a RI-automaton and the stabilizers of its dual (Theorem 5.12). This analysis shows that the possible existence of a RI automaton generating a group with all trivial stabilizers can be restricted to the class of bireversible. However evidences suggest that if G, generated by a RI automaton is infinite then it admits at least a non-trivial boundary. stabilizers. 6. Dynamics and Wang tilings There is an interesting connection between commuting pairs and Wang tilings observed by I. Bondarenko [5]. Given a Mealy automaton, one may associate a set of Wang tiles reflecting the action of the automaton on the stateset and the alphabet. The existence of periodic tilings corresponds to the notion of commuting words that generate elements of the stabilizers of infinite periodic words. Note that this problem – called the domino problem – is undecidable in general [4, 21]. In this section we prove that the domino problem is decidable for some family of tilesets linked to Mealy automata. On the other hand, we show that the problem of determining whether or not an automaton has commuting words on a restricted stateset is undecidable. 6.1. Wang tiles vs cross-diagrams. We recall that a Wang tile is a unit square tile with a color on each edge. Formally, it is a quadruple t = (tw , ts , te , tn ) ∈ C 4 where C is a finite set of colors (see Fig. 8 for a typical depiction of a Wang tile). A tileset is a finite set T of Wang tiles, and for each t ∈ T and d ∈ {n, s, e, w}, we tn tw te ts Figure 8. A Wang tile. put td for the color of the edge in the d-side. Given a tileset T , a tiling of the discrete plane is a map f : Z2 → T that associates to each point in the discrete plane a tile from T such that adjacent tiles share the same color on their common edge, BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 27 i.e., for any (x, y) ∈ Z2 , f (x, y)e = f (x + 1, y)w and f (x, y)n = f (x, y + 1)s . For a rectangle [x, x′ ] × [y, y ′ ] ⊆ Z2 , and d ∈ {n, s, e, w} we denote by f ([x, x′ ] × [y, y ′ ])d the word in C ∗ labelling the d-side of the square. For instance for d = w we have: f ([x, x′ ] × [y, y ′ ])w = f (x, y)w f (x, y + 1)w · · · f (x, y ′ )w . This notion extends naturally for rectangles of the form [x, ∞] × [y, ∞] ⊆ Z2 . A tiling f is periodic if there exists a periodicity vector v ∈ Z2 such that f (t + v) = f (t) for t ∈ Z2 . A tiling is bi-periodic if there are two linearly independent vectors v1 , v2 for which f is periodic. It is a well known fact belonging to the folklore that a tileset admits a periodic tiling if and only if it admits a bi-periodic tiling if and only if it admits vertical and horizontal periods. In case f : Z2 → T is a periodic tiling with a vertical period py and a horizontal period px , a fundamental domain of f is given by the square [0, px − 1] × [0, py − 1]. Following [23] we say that the tileset T is cd-deterministic with (c, d) ∈ {(e, n), (e, s), (w, n), (w, s)} if each tile t ∈ T is uniquely determined by its pair (tc , td ) of colors. Whenever T is cd-deterministic for each (c, d) ∈ {(e, n), (e, s), (w, n), (w, s)}, we say that T is 4-way deterministic. There is a natural way to associate to a Mealy automaton M = (Q, Σ, ·, ◦) a a|b tileset T (M ): for each transition q −−→p we associate the Wang tile (q, a, p, b) with colors on C = Q ⊔ Σ, see Figure 9. This point of view is just a reformulation of the cross-diagram defined previously (and is completely different from the one in [12]). The following lemma links properties of the automaton M with properties of the associated Wang tileset T (M ). v′ u v u v ′ ∈T ⇔ u′ ∈ M u ⇔ v|v ′ u−−→u′ ∈ M v′ Figure 9. Tileset T (M ) associated with an automaton M . Lemma 6.1. [5] The tileset associated to a Mealy automaton is necessarily wsdeterministic. Furthermore, for a Mealy automaton M we have the following. • T (M ) is es-deterministic if and only if M is reversible; • T (M ) is wn-deterministic if and only if M is invertible; • T (M ) is 4-way deterministic if and only if M is bireversible. There is a clear correspondence between tilings and cross diagrams, as illustrated in Figure 10. This easily extends to infinite words. The following proposition links periodicity of a tiling and existence of a commuting pair for a Mealy automaton. Proposition 6.2. Let M = (Q, Σ, ·, ◦) be an automaton. The following are equivalent. (i) T (M ) admits a periodic tiling; (ii) M admits a commuting pair: v ∈ Σ+ , u ∈ Q+ with u◦v = v, u·v = u. 28 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO ′ v1 ′ v2 uk ... .. . .. . .. . .. . v1 v2 ... u1 ... u1 u′k .. . vℓ v1 vℓ′ ... uk u′1 vℓ .. . .. . ⇔ u′1 v1′ u′k vℓ′ u1 · · · uk ·v1 · · · vℓ = v1′ · · · vℓ′ ⇔ u1 · · · uk ◦v1 · · · vℓ = u′1 · · · u′k Figure 10. Correspondence between partial tilings, diagrams and actions of the automaton. cross- Proof. If T (M ) admits a periodic tiling, then there is a bi-periodic tiling f : Z2 → T (M ) with horizontal and vertical periods px , py , respectively. Therefore, the fundamental domain [0, px − 1] × [0, py − 1] pinpoints a rectangle in the tiling f with colors given by the string f ([0, px − 1] × [0, py − 1])n = f ([0, px − 1] × [0, py − 1])s = v ∈ Σ∗ in both the south and north edge and f ([0, px − 1] × [0, py − 1])w = f ([0, px − 1] × [0, py − 1])e = u ∈ Q∗ in both the west and east edge. Hence, by Figure 10: u◦v = v, u·v = u. On the other hand, if there is a commuting pair u ∈ Q∗ , v ∈ Σ∗ such that u◦v = v, u·v = u then by Figure 10 there is a partial tiling f : [0, |v| − 1] × [0, |u| − 1] → T (M ) with f ([0, |u| − 1] × [0, |v| − 1])n = f ([0, |u| − 1] × [0, |v| − 1])s = u, f ([0, |u| − 1] × [0, |v| − 1])w = f ([0, |u| − 1] × [0, |v| − 1])e = v. This tiling extends naturally to a bi-periodic tiling f : Z2 → T (M ) of the whole discrete plane.  As a consequence we obtain a decidability result for the domino problem with particular sets of tilesets. Starting from the tileset T we construct a letter-to-letter transducer M (T ) = (Q, Σ·, ◦) in a natural way as follows: Let Q = ∪t∈T {tw , te }, Σ = ∪t∈T {ts , tn }, and ts |tn transitions given by tw −−→te ∈ M (T ) whenever (tw , ts , te , tn ) ∈ T . Note that in general M (T ) is not a Mealy automaton – we will deal with these cases in the next section. However when it is indeed a Mealy automaton the following holds: Corollary 6.3. Let T be a Wang tileset. If M (T ) = (Q, Σ, ·, ◦) is a Mealy automaton then T tiles the plane periodically, in an effective way. BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 29 Proof. It is decidable if M (T ) is a Mealy automaton in time O(|Q||Σ|). Now construct the helix graph H1,1 (once again in time O(|Q||Σ|)). Since the stateset and the alphabet are finite, and each pair (u, v) ∈ H1,1 has exactly one successor, there exists a cycle (u0 , v0 )−−→(u1 , v1 )−−→ · · · −−→(um , vm )−−→(u0 , v0 ) in H1,1 . Hence by Lemma 5.2 there is a commuting pair (u, v) ∈ Q+ × Σ+ , so by Proposition 6.2, T tiles periodically the plane.  6.2. Commuting pairs on a restricted stateset. With Corollary 6.3, we have seen that each tileset T (M ) associated with a Mealy automaton M = (Q, Σ, ·, ◦) admits a periodic tiling. However (u, v) could commute because the word u acts like the identity, i.e. π(u) = 1; so this commuting pair will not help us to find singular points, and we may want to avoid it. In this spirit we now consider commuting pair on a restricted stateset, that is commuting pair in Q′∗ × Σ∗ , with Q′ Q. We now consider an automaton M = (Q, Σ, ·, ◦) and a subset Q′ Q. We consider the restricted tileset T (M , Q′ ) formed by the tiles of T (M ) whose colors are in the set Q′ ∪Σ. Note that T (M , Q′ ) is the tileset associated with the (partial) automaton obtained from M by erasing all the transitions to or from states in Q r Q′ . In particular when the automaton has a sink-state1 e, we define non-elementary commuting pairs, that are commuting pairs restricted to the stateset Q r {e}, and the non-elementary tileset T (M , Q r {e}) will be denoted by T (M ). We have the following proposition. Proposition 6.4. Let M be a Mealy automaton with a sink-state. Then M admits a non-elementary commuting pair if and only if T (M ) has a periodic tiling. Proof. The proof is similar to the one presented in Proposition 6.2. Indeed if e were to appear in the cross diagramm, then since it a sink it will stay present every step after, preventing the tiling to by periodic: ∀u ∈ Q∗ eQ∗ , ∀v ∈ Σ∗ , u·v ∈ Q∗ eQ∗ .  This raises the problem of finding restricted commuting pairs, since we can no longer apply Corollary 6.3. We obtain the following decision problem: RESTRICTED COMMUTING PAIRS: • Input: M = (Q, Σ, ·, ◦), Q′ Q. • Output: Does M have commuting pairs restricted to the stateset Q′ ? It turns out that this problem is undecidable. To prove this we are going to reduce a known undecidable problem to it, namely the existence of a periodic tiling for a 4-way deterministic tileset (see [23]). For the reduction from the periodic 4-way deterministic problem to our problem we show that, given a 4-way deterministic tileset, a periodic tiling can be determined from a non-trivial commuting pair of some Mealy automaton. 1One can recognize trivial states in linear time (note that we can also find trivial components through minimization, with cost O( |Σ||Q| log |Q| ), see [3]). In the following we assume that the automaton has at most one sink-state, which we denote e. 30 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO a 1 1|2 2|3 a 1 2 b 1|2 2|3 3 =⇒ b 3 a b 1 a a b 2 b 2|2 3|1 2 a =⇒ 3|1 1|1 2|2 3|3 b 2|2 3|1 1|3 e Figure 11. Construction of an invertible Mealy automaton from a 4-way deterministic tileset. Let T be a 4-way deterministic tileset. We build M (T ) as in Corollary 6.3. This transducer is not in general complete, however, we may add an extra sink-state e and extra transitions to this sink-state in order to make the automaton complete and invertible. We call MS (T ) the invertible automaton associated with T . Since the extra transitions go to the sink-state it is clear that T = T (MS (T )). We are now in position to prove the following result. Theorem 6.5. The problem RESTRICTED COMMUTING PAIRS is undecidable. Proof. We prove that a particular instance of RESTRICTED COMMUTING PAIRS is undecidable: NON-ELEMENTARY COMMUTING PAIRS: • Input: M a Mealy automaton with a sink-state. • Output: Does M have non-elementary commuting pairs? By [23] checking whether a 4-way deterministic tileset admits a periodic tiling is undecidable. By Proposition 6.4 checking whether T admits a periodic tiling is equivalent to check whether MS (T ) has a non-elementary commuting pair, hence NON-ELEMENTARY COMMUTING PAIRS is undecidable, and so is RESTRICTED COMMUTING PAIRS.  Note that in this context we deal with inverses of Q, and it is not difficult to e ∗ may generate non-elementary commuting pair. check that reduced words u ∈ Q Hence, in this context a non-elementary pair of commuting words is a pair of words ∗ u ∈ Q^ r {e} , v ∈ Σ∗ such that u is reduced and u, v commute. Proposition 6.6. With the above notation. Let M ∈ Sa . The following are equivalent. (i) v ω is a singular point, v ∈ Σ∗ ; ∗ (ii) there is a non-elementary commuting pair u ∈ Q^ r {e} , v ∈ Σ∗ with π(u) 6= 1. Proof. (i)⇒(ii) If v ω ∈ κ then the map St is not continuous at vω if and only if ∗ StabhM i (v ω ) 6= Stab0hM i (v ω ). This implies that there exists u ∈ Q^ r {e} satisfy0 ω ω k ing π(u) ∈ StabhM i (v ) r StabhM i (v ). Note that π(u·v ) 6= 1 for any k ≥ 0 (from Lemma 4.2). Since |u| is finite, there exist n > m > 0 such that u·v m = u·v n . Then ∗ um := u·v m and v n−m form a non-elementary commuting pair with um ∈ Q^ r {e} . ∗ (ii)⇒(i) Let u ∈ Q^ r {e} , v ∈ Σ∗ be a non-elementary commuting pair. Since BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 31 π(u) 6= 1, there is a word w ∈ Σ∗ such that u◦w 6= w. Consider the sequence wn := v n wv ω and proceed as in the proof of Lemma 4.3 to show that π(u) ∈ StabhM i (v ω ) r Stab0hM i (v ω ).  Remark 6.7. Note that Proposition 4.11 implies that Proposition 6.6 holds also for bireversible automata. As we have already noted, the tileset T (M ) associated with a Mealy automaton M always admits a periodic tiling, however, in case we consider automata from Sa , it is interesting, and useful for the sequel, to understand when the nonelementary tileset of T (M ) tiles the discrete plane. We need first the following lemma regarding inverse X-digraphs, that are digraph Γ with edges labelled by a a−1 element of X, such that if p−−→q is an edge of Γ, so is q −−→p (involutive), for e there is exactly one edge starting from v any vertex v ∈ Γ and any label x ∈ X, and labelled with x. In inverse digraph the natural quasimetric d is symmetric and so it is a distance. e Note that an inverse X-digraph has in- and out-degree |X|. Lemma 6.8. Let Γ be an infinite connected inverse X-digraph, |X| < ∞, and let e ω such that v be a vertex of Γ. Then there is a right-infinite word θ ∈ X lim d(v, vi ) = ∞ , i→∞ θ[:i] where vi is defined by v −−→vi . Proof. Since Γ is an inverse digraph it is symmetric. Consider Γ the non-directed a a−1 graph obtained by gluing edges p−−→q and q −−→p in Γ. Note that the distances in Γ and in Γ are the same and we will denote both of them by d(., .). Since Γ has finite degree, is infinite and connected, we can apply König’s lemma that claims that Γ contains an infinitely long simple path (that is, a path with no repeated vertices). Let ν = v1 · · · vi · · · denote such a path and θ the associated infinite word. Since Γ is connected there exists a path from any vertex v to v1 : let k = d(v, v1 ). Since the graph Γ has bounded degree, the ball Bk (v) of radius k centred in v is finite and since ν is simple there is an index ik for which vj ∈ / Bk (v) for j ≥ ik . The same holds for arbitrary large k, which concludes the proof.  Consider the map λ from the set of edges of Sch(ξ) to the integers, that associate q to each edge f = η −−→η ′ the integer ( min{n : q·η[: n] = e} if ∃m : q·η[: m] = e λ(f ) = ∞ otherwise. Let d(η, η ′ ) denote the usual metric on Sch(ξ). Since Sch(ξ) is a regular digraph e for each integer n we consider the set of edges that admit with finite out-degree Q at least one vertex inside the ball of radius n centered at ξ: q Bξ→(n) = {η −−→η ′ : d(ξ, η) ≤ n ∨ d(ξ, η ′ ) ≤ n} . Note that Bξ→(n) is clearly finite and we may define  ψξ (n) = max λ(f ) : f ∈ Bξ→(n) ∧ λ(f ) < ∞ . n o We remark that λ(f ) : f ∈ Bξ→(n) ∧ λ(f ) < ∞ is non-empty in view of the exise tence of the trivial edges of type η −−→η. Thus, ψξ is a monotonically increasing 32 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO function. We have thus two cases: either limn→∞ ψξ (n) = ∞, or limn→∞ ψξ (n) = ℓ for some ℓ ≥ 1. The following proposition provides sufficient conditions on the dynamics of the boundary for the non-elementary tileset to tile the discrete plane. Proposition 6.9. Let M = (Q, Σ, ·, ◦) ∈ Sa . If there is a point ξ ∈ Σω whose Schreier graph Sch(ξ) is infinite and such that limn→∞ ψξ (n) = ℓ for some integer ℓ ≥ 1, then T (M ) tiles the discrete plane. Conversely, if T (M ) admits just aperiodic tilings, then there is an infinite Schreier graph Sch(ξ) for some ξ ∈ Σω . Proof. It belongs to the folklore that a tileset tiles the whole discrete plane if and only if it tiles the first quadrant of the discrete plane (see for instance [28]). Let us prove that there is a tiling f : [1, ∞] × [1, ∞] → T (M ) of the first quadrant. First there is a tiling h : [1, ∞] × [1, ∞] → T (M ) of the first quadrant such that, putting η = h ([1, ∞] × [1, ∞])s and σ = h ([1, ∞] × [1, ∞])w , we have: (1) σ is not cofinal with eω , and (2) if σ[j] 6= e, for some j ≥ 1, then σ[j]·(σ[: j − 1]◦η[: i]) 6= e for all i ≥ 1. e σ θ words eω or e free ξ η ℓ Figure 12. Construction of a non-elementary tilling when limn→∞ ψξ (n) = ℓ. Intuitively, the last property means that if the west edge of the leftmost tile of a band is not colored by e, then also none of the west and east edges of all in this band are colored by e. Indeed, since e is a sink, if the west edge of the leftmost tile of a band is colored by e, then clearly all the west and east edges of the all the tiles in this band are colored by e as well, see Fig. 12. Let us first find a tiling fulfilling Condition 2: If there exists an element q ∈ Q of infinite order, take q ω as σ and some word of infinite orbit under the action of q as η. Otherwise, since Sch(ξ) is infinite we may find, by Lemma 6.8, a right-infinite path starting at ξ and e ω such that limi→∞ d(ξ, θ[: i]◦ξ) = ∞. labelled by some right-infinite word θ ∈ Q Since every element of Q has finite order we may remplace each negative occurence of a letter by the suitable power of this letter, hence without loss of generality we can suppose θ ∈ Qω . By Figure 10 consider the tiling h : [1, ∞] × [1, ∞] → T (M ) associated with ξ, θ, i.e., such that ξ = h ([1, ∞] × [1, ∞])s , θ = h ([1, ∞] × [1, ∞])w . BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 33 Since limn→∞ ψξ (n) = ℓ, then for any vertex ξ ′ of Sch(ξ) and q ∈ Q the following property: (2) if q·ξ ′ [: i] 6= e for all 1 ≤ i ≤ ℓ, then q·ξ ′ [: i] 6= e for all i ≥ ℓ holds. Since e is a sink-state, Equation (2) can be written equivalently: (2) if q·ξ ′ [: ℓ] 6= e, then q·ξ ′ [: i] 6= e for all i ≥ ℓ . Let us restrict the tiling h to the quadrant [ℓ, ∞] × [1, ∞]. Take η = h([ℓ, ∞] × [1, ∞])s = ξ[ℓ :] , σ = h([ℓ, ∞] × [1, ∞])w = θ·ξ[: ℓ − 1] . Property 2 is obtained from Equation (2). Let us prove now Property 1. Two elements ξ ′ , ξ ′′ ∈ Σω are m-cofinal if ξ ′ [m :] = ξ ′′ [m :]. Note that for fixed ξ ′ ∈ Σω and m ≥ 1, the number of vertices ξ ′′ that are m-cofinal with ξ ′ is finite. Suppose that σ is cofinal with eω : σ = σ[: k]eω for some k ≥ 1. Hence the sequence (σ[: i]◦η)i is ultimately constant. But σ[: i]◦η is the suffix of θ[: i]◦ξ, whence the set {θ[: k + j]◦ξ : j ≥ 1} formed ℓ-cofinal vertices is finite. Which contradicts limi→∞ d(ξ, θ[: i]◦ξ) = ∞, and σ cannot be cofinite with eω . Whence we have obtained a tiling of the first quadrant with σ and η as west and south borders respectively, and such that, for all i, either σ[i]·η = eω or σ[i]·η contains no e. We now obtain a tiling in T (M ) by deleting those line eω . Let us prove the converse in our proposition. Let ξ = f ([1, ∞] × [1, ∞])s , θ = f ([1, ∞] × [1, ∞])w where f : Z × Z → T (M ) is an aperiodic tiling. Since f is aperiodic, we get θ[: i]◦ξ 6= θ[: j]◦ξ for i 6= j (since periodicity in one direction is equivalent to periodicity in both directions). Therefore, {θ[: i]◦ξ : i ≥ 0} is infinite and Sch(ξ) as well.  We recall that an automaton M = (Q, Σ, ·) is synchronizing whenever there is a word w ∈ Σ∗ such that q·w = p·w for any q, p ∈ Q. A Mealy automaton M = (Q, Σ, ·, ◦) is synchronizing whenever (Q, Σ, ·) is synchronizing. The set of synchronizing words is denoted by Syn(M ). Note that an automaton in Sa is always synchronizing. For further details on synchronizing automata and some connections with automaton groups see [9]. The next proposition characterizes automata in Sa whose set of reduced tiles does not tile the discrete plane in terms of a stability property regarding synchronization. Consider the prefix-closed language N SynQ (v) = {u ∈ Q<|v|−1 | ∀j ≤ |u|, u[: j]◦v ∈ / Syn(M )} . and the property Maximal non Synchronizing : there exists an integer m such that, for all v ∈ Σm , any u maximum in N SynQ (v) for the prefix relation satisfies uq◦v ∈ Syn(M ), for all q ∈ Q. Proposition 6.10. Let M = (Q, Σ, ·, ◦) ∈ Sa . Then T (M ) does not tile the discrete plane if and only if property Maximal non Synchronizing holds for M . 34 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO Proof. Suppose that T (M ) does not tile the discrete plane. Hence there exists an integer m such that T (M ) cannot tile a square of size m. Let v ∈ Σm and u ∈ N SynQ (v). First suppose |u| < m − 2: if for some q ∈ Q we have uq◦v ∈ / Syn(M ) then uq ∈ N SynQ (v), hence u cannot be maximal. Now suppose |u| = m − 2: if uq◦v ∈ / Syn(M ), for some q ∈ Q, then there is a q ′ ∈ Q ′ such that q ·(uq◦v)[: j] 6= e for all j ≤ m. Hence, by Figure 10 there is a tiling of the square of size m associated with the two words v, uqq ′ , a contradiction. Conversely, if T (M ) tiles a square f : [1, m] × [1, m] → T (M ), then if we put h = f ([1, m] × [1, m])s , v = f ([1, m] × [1, m])w we get that v[: j]◦h ∈ / Syn(M ) for all j ≤ m − 1. In particular, u = v[: m − 2] is maximal in N SynQ (v). However, (uv[m − 1])◦h = v[: m − 1]◦h ∈ / Syn(M ), hence the condition of the statement is not satisfied.  6.3. Aperiodic tilings and singular points. In Subsection 5.2 we have seen that RI-automata, with empty set of singular points are necessarily bireversible with all trivial stabilizers in the boundary (see Corollary 5.15 and Proposition 4.11). Furthermore, Corollary 5.8 implies that if a bireversible automaton M has no positive relations, then it must have a non-trivial stabilizer in the boundary. In particular, for the class of bireversible automata it is not possible to have simultaneously no positive relations and no singular points. This fact no longer holds in the class Sa : there exist automata in Sa without positive relations and with no singular points. However, we need some precaution in defining the set of “positive relations” for an automaton M ∈ Sa . Indeed, for such an automaton, the set P(M ) is always non-empty since the sink-state e acts like the identity. In order to characterize tilings without non-trivial commuting pairs, we need to define a special set of relations that are in some sense non elementary. Such relations intuitively correspond to words with the property that some of their restrictions do not become the trivial word. For w ∈ Q∗ , |w|e denotes the number of occurrences of the letter e in w. The set E(M ) of the non-elementary relations is defined by: E(M ) = {u ∈ (Q r {e})∗ : π(u) = 1, ∃v ∈ Σ∗ , |u·v n |e < |u|, ∀n ≥ 1} . By a compactness argument note that the complement of the non-elementary relations, the set of elementary relations, may be described as the set of words u ∈ (Q r {e})∗ with π(u) = 1, such that there exists some n ≥ 1 for which u·v = e|v| for every v ∈ Σ≥n . Geometrically, automata in the class Sa with no singular points and whose eventual relations are elementary relations, possess helix graphs with a particular shape, as proved in Proposition 6.11. We say that the helix graph Hk,n of an automaton M ∈ Sa is singular whenever each connected component of Hk,n has a unique cycle which is necessarily of the form (ek , v)−−→(ek , v) for some v ∈ Σn . Proposition 6.11. Let M ∈ Sa . The following are equivalent: (i) for any ξ ∈ Σω , g ∈ Stab+ hM i(ξ), there is n ≥ 1 with g·ξ[: n] = 1 and E(M ) = ∅; ω n (ii) for any v ∈ Σ∗ , g ∈ Stab+ hM i(v ), there is n ≥ 1 with g·v = 1 and E(M ) = ∅; (iii) for any k, n ≥ 1, the helix graph Hk,n is singular; (iv) there is no non-elementary pair of commuting words. BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 35 Proof. (i)⇒(ii). Trivial. (ii)⇒(iii). Suppose that Hk,n is not singular for some k, n ≥ 1. Therefore, by Lemma 5.2 there is a commuting pair u ∈ Q∗ r {e}∗, v ∈ Σ∗ . As e acts like the identity, by erasing the (potential) occurrences of e in u, we obtain a word u′ ∈ ω (Q r {e})∗ such that u′ , v commutes. Hence Lemma 5.2 implies π(u′ ) ∈ Stab+ G (v ). ′ ′ ′ If π(u ) = 1, then, since u , v commutes, u ∈ E(M ) 6= ∅. Otherwise, we have π(u′ )·v n = π(u′ ) 6= 1 for all n ≥ 1. (iii)⇒(iv). If there is a non-elementary commuting pair u ∈ (Q r {e})∗ , v ∈ Σ∗ , then by Lemma 5.2 the helix graph H|u|,|v| contains the loop (u, v)−−→(u, v), i.e., H|u|,|v| is not singular. (iv)⇒(i). If E(M ) 6= ∅, then for any u ∈ E(M ), by definition, there exists v ∈ Σ∗ satisfying |u·v n |e < |u|, ∀n ≥ 1. By a compactness argument, there exists some m ≥ 1 with |u·v m |e = |u·v m+k |e for every k ≥ 0. Moreover, there exist indices i > j ≥ m satisfying u·v j = u·v i . As e acts like the identity, by erasing the (potential) occurrences of e in u, we obtain a word u′ ∈ (Qr{e})∗ such that u′ , v i−j is a non-elementary pair of commuting words. ω Thus, we may assume E(M ) = ∅. Now suppose g ∈ Stab+ hM i (ξ) for some ξ ∈ Σ ∗ with g·ξ[: n] 6= 1 for all n ≥ 1. Hence, there are some word u ∈ (Qr{e}) such that π(u) = g and some indices i > j ≥ 1 such that if we put u′ = u·ξ[: j] ∈ (Q r {e})∗ , then u′ , ξ[j + 1 : i] is a non-elementary commuting pair.  Note that the previous proposition provides necessary conditions on M ∈ Sa for tilings of T (M ) of the discrete plane to be aperiodic. As a result of Theorem 6.5 we immediately obtain the following undecidability result of checking the previous “continuity” condition. Theorem 6.12. Given an automaton M ∈ Sa , it is undecidable whether for any ξ ∈ Σω , g ∈ Stab+ G (ξ), there exists n ≥ 1 with g·ξ[: n] = 1 and E(M ) = ∅. Moreover, by Proposition 6.11, taking the aperiodic 4-way deterministic tileset T described in [21] and the associated automaton M ∈ Sa with T = T (M ) we get that M actually satisfies the “continuity” conditions described in Proposition 6.11. The same paper raised the problem to determining the existence of an aperiodic reflection-closed tileset. A tileset T with colored oriented edges is closed under reflection if for each tile in T the reflection of this tile along a horizontal or vertical line also belongs to T . Kari and Papasoglu considered the following tiling rule: a tiling of the plane, using tiles from a tileset T which is closed under reflection, is said to be valid if two adjacent tiles meet along an edge with the same color and orientation and two tiles that are the reflection of each other are never adjacent. In the following, such a tiling will be called of Kari-Papasoglu type. If we consider only the horizontal (vertical) symmetry we say that T is hreflection-closed (respectively, v-reflection-closed) tileset. Note that if T is hreflection-closed, then it is ws-deterministic (es-deterministic) if and only if it is wndeterministic (respectively, en-deterministic). Similarly, if T is v-reflection-closed, then it is ws-deterministic (wn-deterministic) if and only if it is es-deterministic (respectively, en-deterministic). Hence, if T is reflection-closed and xy-deterministic for some (x, y) ∈ {(e, n), (e, s), (w, n), (w, s)}, then T is necessarily 4-way deterministic. In [21] the authors raised the problem of finding a 4-way deterministic tileset which is valid, aperiodic and reflection-closed. Such a tileset would give an 36 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO example of a CAT(0) complex whose fundamental group is not hyperbolic and does not contain a subgroup isomorphic to Z2 , see [19, 21]. In this setting we can prove a statement analogous to Proposition 6.11. We will prove that the search for aperiodic h-reflection-closed tilesets that are ws- and wn-deterministic is related to the search for automata in the class Sa whose set κ of singular points is empty and which are elementary-free, in the following sense. First we need an analogous to Proposition 6.10 for h-reflexion-closed tilings (resp. 4-way deterministic tilings). Let us define the prefix-reduced relation: we say that e is smaller than u′ ∈ Q e for the prefix-reduced relation if u ≤p u′ holds and both u∈Q u and u′ are reduced. We define a property that will serve for the characterization of Kari-Papasoglu type tilings: an automaton M = (Q, Σ, ·, ◦) ∈ Sa satisfies property h-Maximal non Synchronizing (resp. 4-way Maximal non Synchronizing ) if m ), any g there exists an integer m such that, for all v ∈ Σm (resp. reduced v ∈ Σ ∗ f maximum in N Syn e (v) for the prefix-reduced relation satisfies reduced u ∈ Q Q e uq◦v ∈ Syn(M ) for all q ∈ Q. Proposition 6.13. Let M = (Q, Σ, ·, ◦) ∈ Sa . Then T admits an h-reflexionclosed tiling (4-way deterministic tiling) if and only if property h-Maximal non Synchronizing (resp. 4-way Maximal non Synchronizing ) does not hold. Proof. Similar to the proof of Proposition 6.10, but avoiding patterns xx−1 that are not allowed in the Kari-Papasoglu type tilings.  A group generated by an automaton in the class Sa is said to be elementary-free if the only relations that it contains are words whose restrictions become eventually all trivial, i.e. the set of its relations may be described as the set of words u ∈ ∗ (Q^ r {e}) with π(u) = 1, such that there exists an n ≥ 1 for which u·v = ekv for every v ∈ Σ≥n and some integer kv such that |kv | ≤ |v|. ek,n of an automaton M ∈ Sa is In this context, we say that a helix graph H strongly-singular whenever any cycle (u, v)−−→(u′ , v ′ )−−→ · · · −−→(u, v) implies ∗ g or π(u) = 1. We have the following proposition analogous to Propoeither u ∈ {e} sition 6.11. Proposition 6.14. Let M ∈ Sa . The following are equivalent: (i) hM i is elementary-free and the set κ of singular points is empty; (ii) hM i is elementary-free and for any v ∈ Σ∗ , g ∈ StabhM i (v ω ), there is n ≥ 1 with g·v ω [: n] = 1; ek,n is strongly-singular; (iii) for any k, n ≥ 1, the helix graph H ∗ (iv) there is no non-elementary pair u ∈ (Q^ r {e}) , v ∈ Σ∗ of commuting words. Proof. (i)Equivalence ⇔(ii) follows from Lemma 4.2. Equivalence (ii)⇔(iii) may be proven in an analogous way as in Proposition 6.11. Equivalence (i)⇔(iv) is a consequence of Proposition 6.6.  e ∗ , in what follows we consider this acNote that hM i also acts naturally on Σ tion. Following [8], we say that a point ξ ∈ Σω is essentially non-trivial when lim |ξ[: n]| →n→∞ +∞. Moreover we say that a helix graph is essentially-singular BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 37 helix whenever, if (u, v)−−→(u′ , v ′ )−−→ · · · −−→(u, v) is a cycle, then v ω is es∗ sentially non-trivial and either u ∈ g {e} , or π(u) = 1. We have the following proposition analogous to Proposition 6.11: Proposition 6.15. Let M ∈ Sa . The following are equivalent: (i) hM i is elementary-free and the set of essentially non-trivial singular points is empty; f∗ such that v ω is essentially (ii) hM i is elementary-free and for any v ∈ Σ ω non-trivial, g ∈ StabhM i (v ), there is n ≥ 1 with g·v ω [: n] = 1; ek,n is essentially singular; (iii) for any k, n ≥ 1, the helix graph H ∗ f∗ of commuting (iv) there is no non-elementary pair u ∈ (Q^ r {e}) , v ∈ Σ words. Proof. Similar to the proof of Prop. 6.14.  Putting together all the previous results we may characterize aperiodic h-reflectionclosed tilesets (resp. h-reflection-closed tilesets). Theorem 6.16. With the above notation. The following are equivalent: (i) there is a ws- and wn-deterministic tileset T which is h-reflection-closed (resp. a 4-way deterministic which is h- and v-reflection-closed) that tiles the discrete plane with aperiodic tilings of Kari-Papasoglu type; (ii) there is an automaton M ∈ Sa such that hM i is elementary-free, the set of singular points (resp. essentially non-trivial singular points) is empty, and, in the automaton B obtained from M ⊔ M −1 identifying the two sinks e and e−1 , property h-Maximal non Synchronizing (resp. 4-way Maximal non Synchronizing ) does not hold. Proof. If T is h-reflection-closed, we may fix a direction and divide the colors of the vertical edges of T into two distinct and disjoint sets Q ⊔ Q−1 , while we put for Σ the set of colors of the horizontal edges of the tiles in T . Note that, for e a, b ∈ Σ, the corresponding horizontally reflected tile each tile (q, a, p, b), q, p ∈ Q, is (q −1 , a, p−1 , b). The partition Q ⊔ Q−1 induces a partition T + ⊔ T − on T in the obvious way. Consider an associated automaton M ∈ Sa such that T (M ) = T + (as in Section 5). Note that T (M ⊔ M −1 ) = T . Conversely, to any automaton M ∈ Sa , the tileset T (M ⊔ M −1 ) is ws- and wn-deterministic, and it is h-reflection-closed. By an argument very similar to the proof of Propositions 6.2 and 6.4, it is not difficult to see that, in the previous cor∗ respondence, M has a non-elementary pair u ∈ (Q^ r {e}) , v ∈ Σ∗ of commuting words where u is non-trivial and reduced if and only if the corresponding tileset T (M ⊔ M −1 ) admits a periodic tiling (in the sense of Kari-Papasoglu). Hence, the equivalence in the statement follows from Proposition 6.13 for the existence of a tiling of Kari-Papasoglu type and Proposition 6.14 for its aperiodicity. The proof for the 4-way case is similar and uses Proposition 6.15.  The last theorem gives a characterization of specific Wang tilings in the language of Mealy automata. This is another motivation to further explore this connection. 38 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO 7. Some open problems Problem 1. Let M ∈ Sa be an automaton generating a free group. Is it always the case that there is a point in the boundary whose Schreier graph is infinite? Problem 2. Given that M is minimized, can two singular points have isomorphic infinite Schreier Graphs? Problem 3. Given a Mealy automaton M , is it decidable whether P(M ) = ∅? Problem 4. Are there interesting classes of automata where the non-elementary commuting pair is decidable? References [1] A. Akhavi, I. Klimann, S. Lombardy, J. Mairesse, and M. Picantin. On the finiteness problem for automaton (semi)groups. International Journal of Algebra and Computation, 22(6):1–26, 2012. [2] L. Bartholdi and V. Nekrashevych. Thurston equivalence of topological polynomials. Acta Mathematica, 197(1):1–51, 2006. [3] L. Bartholdi and P. V. Silva. Groups defined by automata. In J.-É. Pin, editor, AutoMathA Handbook. European Mathematical Society, to appear. http://arxiv.org/abs/1012.1531. [4] R. Berger. The undecidability of the domino problem. Memoirs of the American Mathematical Society, 66:72, 1966. [5] I. Bondarenko. private communication. [6] I. Bondarenko, D. D’Angeli, and T. Nagnibeda. Ends of schreier graphs and cut-points of limit spaces of self-similar groups. http://arxiv.org/abs/1601.07587. [7] I. Bondarenko, D. D’Angeli, and E. Rodaro. The lamplighter group z3 ≀ z generated by a bireversible automaton. Communications in Algebra, to appear. http://arxiv.org/abs/1502.07981. [8] D. D’Angeli and E. Rodaro. Freeness of automaton groups vs boundary dynamics. http://arxiv.org/abs/1502.07981. [9] D. D’Angeli and E. Rodaro. Groups and semigroups defined by colorings of synchronizing automata. International Journal of Algebra and Computation, 24(6):773–793, 2014. [10] D. D’Angeli and E. Rodaro. A geometric approach to (semi)-groups defined by automata via dual transducers. Geometriae Dedicata, 174:375–400, 2015. [11] N. Davis, M. Elder, and L. Reeves. Non-contracting groups generated by (3, 2)-automata. Algebra and Discrete Mathematics, 17(1):20–32, 2014. [12] P. Gillibert. The finiteness problem for automaton semigroups is undecidable. International Journal of Algebra and Computation, 24-1:1–9, 2014. [13] Y. Glasner and S. Mozes. Automata and square complexes. Geometriae Dedicata, 111:43–64, 2005. [14] Th. Godin, I. Klimann, and M. Picantin. On torsion-free semigroups generated by invertible reversible Mealy automata. In Language and automata theory and applications, volume 8977 of Lecture Notes in Comput. Sci., pages 328–339. Springer, Cham, 2015. [15] R. I. Grigorchuk. Some topics of the dynamics of group actions on rooted trees. The Proceedings of the Steklov Institute of Math., 273:1–118, 2011. [16] R. I. Grigorchuk and D. Savchuk. Self-similar groups acting essentially freely on the boundary of the binary rooted tree. In Group theory, combinatorics, and computing, volume 611 of Contemp. Math., pages 9–48. Amer. Math. Soc., Providence, RI, 2014. [17] R. I. Grigorchuk and Z. Šuniḱ. Asymptotic aspects of Schreier graphs and Hanoi Towers groups. Comptes Rendus Mathématique. Académie des Sciences. Paris, 342(8):545–550, 2006. [18] R. I. Grigorchuk and A. Żuk. On a torsion-free weakly branch group defined by a three state automaton. International Journal of Algebra and Computation, 12(1-2):223–246, 2002. International Conference on Geometric and Combinatorial Methods in Group Theory and Semigroup Theory (Lincoln, NE, 2000). [19] M. Gromov. Hyperbolic manifolds, groups and actions. In Riemann surfaces and related topics: Proceedings of the 1978 Stony Brook Conference (State Univ. New York, Stony BOUNDARY ACTION OF AUTOM. GROUPS W/O SINGULAR POINTS & WANG TILINGS 39 [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] Brook, N.Y., 1978), volume 97 of Ann. of Math. Stud., pages 183–213. Princeton Univ. Press, Princeton, N.J., 1981. M. Kambites, P. V. Silva, and B. Steinberg. The spectra of lamplighter groups and Cayley machines. Geometriae Dedicata, 120:193–227, 2006. J. Kari and P. Papasoglu. Deterministic aperiodic tile sets. Geometric and Functional Analysis, 9(2):353–369, 1999. I. Klimann, M. Picantin, and D. Savchuk. A connected 3-state reversible mealy automaton cannot generate an infinite burnside group. In Developments in Language Theory - 19th International Conference, DLT 2015, Liverpool, UK, July 27-30, 2015, Proceedings., pages 313–325, 2015. B. Le Gloannec. The 4-way deterministic periodic domino problem is undecidable. https://hal.archives-ouvertes.fr/hal-00985482, 2014. O. Macedońska, V. Nekrashevych, and V. Sushchansky. Commensurators of groups and reversible automata. Dopovı̄dı̄ Natsı̄onal′ noı̈ Akademı̄ı̈ Nauk Ukraı̈ni. Matematika. Prirodoznavstvo. Tekhnı̄chnı̄ Nauki, 12:36–39, 2000. V. Nekrashevych. Self-similar groups, volume 117 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2005. V. Nekrashevych. Free subgroups in groups acting on rooted trees. Groups, Geometry, and Dynamics, 4(4):847–862, 2010. D. Perrin and J.-É. Pin. Infinite words : automata, semigroups, logic and games. Pure and applied mathematics. Academic, London, San Diego (Calif.), 2004. R. M. Robinson. Undecidability and nonperiodicity for tilings of the plane. Invent. Math., 12:177–209, 1971. D. Savchuk and S. Sidki. Affine automorphisms of rooted trees. Geometriae Dedicata, to appear. http://arxiv.org/abs/1502.07981. D. Savchuk and Y. Vorobets. Automata generating free products of groups of order 2. Journal of Algebra, 336:53–66, 2011. S. Sidki. Automorphisms of one-rooted trees: growth, circuit structure, and acyclicity. Journal of Mathematical Sciences (New York), 100(1):1925–1943, 2000. Algebra, 12. B. Steinberg, M. Vorobets, and Y. Vorobets. Automata over a binary alphabet generating free groups of even rank. International Journal of Algebra and Computation, 21(1-2):329–354, 2011. W. Thomas. Automata on infinite objects. In Handbook of theoretical computer science, Vol. B, pages 133–191. Elsevier, Amsterdam, 1990. M. Vorobets and Y. Vorobets. On a free group of transformations defined by an automaton. Geometriae Dedicata, 124:237–249, 2007. M. Vorobets and Y. Vorobets. On a series of finite automata defining free transformation groups. Groups, Geometry, and Dynamics, 4(2):377–405, 2010. Y. Vorobets. Notes on the Schreier graphs of the Grigorchuk group. In Dynamical systems and group actions, volume 567 of Contemp. Math., pages 221–248. Amer. Math. Soc., Providence, RI, 2012. E. I. Zel′ manov. Solution of the restricted Burnside problem for groups of odd exponent. Izvestiya Akademii Nauk SSSR. Seriya Matematicheskaya, 54-1:42–59, 221, 1990. E. I. Zel′ manov. Solution of the restricted Burnside problem for 2-groups. Matematicheskiı̆ Sbornik, 182-4:568–592, 1991. 40 D. D’ANGELI, TH. GODIN, I. KLIMANN, M. PICANTIN, AND E. RODARO Institut für Diskrete Mathematik, Technische Universität Graz, Steyrergasse 30, 8010 Graz, Austria. E-mail address: [email protected] IRIF, UMR 8243 Université Paris Diderot & CNRS, Bâtiment Sophie Germain, 75205 Paris Cedex 13, France. E-mail address: [email protected] IRIF, UMR 8243 Université Paris Diderot & CNRS, Bâtiment Sophie Germain, 75205 Paris Cedex 13, France. E-mail address: [email protected] IRIF, UMR 8243 Université Paris Diderot & CNRS, Bâtiment Sophie Germain, 75205 Paris Cedex 13, France. E-mail address: [email protected] Department of mathematics, Politecnico di Milano, Piazza Leonardo da Vinci, 32, 20133 Milano, Italy E-mail address: [email protected]
4math.GR
Packrat Parsing: Simple, Powerful, Lazy, Linear Time Functional Pearl Bryan Ford arXiv:cs/0603077v1 [cs.DS] 18 Mar 2006 Massachusetts Institute of Technology Cambridge, MA [email protected] Abstract 1 Introduction Packrat parsing is a novel technique for implementing parsers in a lazy functional programming language. A packrat parser provides the power and flexibility of top-down parsing with backtracking and unlimited lookahead, but nevertheless guarantees linear parse time. Any language defined by an LL(k) or LR(k) grammar can be recognized by a packrat parser, in addition to many languages that conventional linear-time algorithms do not support. This additional power simplifies the handling of common syntactic idioms such as the widespread but troublesome longest-match rule, enables the use of sophisticated disambiguation strategies such as syntactic and semantic predicates, provides better grammar composition properties, and allows lexical analysis to be integrated seamlessly into parsing. Yet despite its power, packrat parsing shares the same simplicity and elegance as recursive descent parsing; in fact converting a backtracking recursive descent parser into a linear-time packrat parser often involves only a fairly straightforward structural change. This paper describes packrat parsing informally with emphasis on its use in practical applications, and explores its advantages and disadvantages with respect to the more conventional alternatives. There are many ways to implement a parser in a functional programming language. The simplest and most direct approach is top-down or recursive descent parsing, in which the components of a language grammar are translated more-or-less directly into a set of mutually recursive functions. Top-down parsers can in turn be divided into two categories. Predictive parsers attempt to predict what type of language construct to expect at a given point by “looking ahead” a limited number of symbols in the input stream. Backtracking parsers instead make decisions speculatively by trying different alternatives in succession: if one alternative fails to match, then the parser “backtracks” to the original input position and tries another. Predictive parsers are fast and guarantee lineartime parsing, while backtracking parsers are both conceptually simpler and more powerful but can exhibit exponential runtime. Categories and Subject Descriptors D.3.4 [Programming Languages]: Processors—Parsing; D.1.1 [Programming Techniques]: Applicative (Functional) Programming; F.4.2 [Mathematical Logic and Formal Languages]: Grammars and Other Rewriting Systems—Parsing General Terms This paper presents a top-down parsing strategy that sidesteps the choice between prediction and backtracking. Packrat parsing provides the simplicity, elegance, and generality of the backtracking model, but eliminates the risk of super-linear parse time, by saving all intermediate parsing results as they are computed and ensuring that no result is evaluated more than once. The theoretical foundations of this algorithm were worked out in the 1970s [3, 4], but the linear-time version was apparently never put in practice due to the limited memory sizes of computers at that time. However, on modern machines the storage cost of this algorithm is reasonable for many applications. Furthermore, this specialized form of memoization can be implemented very elegantly and efficiently in modern lazy functional programming languages, requiring no hash tables or other explicit lookup structures. This marriage of a classic but neglected linear-time parsing algorithm with modern functional programming is the primary technical contribution of this paper. Languages, Algorithms, Design, Performance Haskell, memoization, top-down parsing, backtracking, lexical analysis, scannerless parsing, parser combinators Packrat parsing is unusually powerful despite its linear time guarantee. A packrat parser can easily be constructed for any language described by an LL(k) or LR(k) grammar, as well as for many languages that require unlimited lookahead and therefore are not LR. This flexibility eliminates many of the troublesome restrictions imposed by parser generators of the YACC lineage. Packrat parsers are also much simpler to construct than bottom-up LR parsers, making it practical to build them by hand. This paper explores the manual construction approach, although automatic construction of packrat parsers is a promising direction for future work. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ICFP’02, October 4-6, 2002, Pittsburgh, Pennsylvania, USA. Copyright 2002 ACM 1-58113-487-8/02/0010 ...$5.00 A packrat parser can directly and efficiently implement common disambiguation rules such as longest-match, followed-by, and notfollowed-by, which are difficult to express unambiguously in a context-free grammar or implement in conventional linear-time Keywords Additive ← Multitive ‘+’ Additive | Multitive Multitive ← Primary ‘*’ Multitive | Primary Primary ← ‘(’ Additive ‘)’ | Decimal Decimal ← ‘0’ | . . . | ‘9’ Figure 1. Grammar for a trivial language parsers. For example, recognizing identifiers or numbers during lexical analysis, parsing if-then-else statements in C-like languages, and handling do, let, and lambda expressions in Haskell inherently involve longest-match disambiguation. Packrat parsers are also more easily and naturally composable than LR parsers, making them a more suitable substrate for dynamic or extensible syntax [1]. Finally, both lexical and hierarchical analysis can be seamlessly integrated into a single unified packrat parser, and lexical and hierarchical language features can even be blended together, so as to handle string literals with embedded expressions or literate comments with structured document markup, for example. The main disadvantage of packrat parsing is its space consumption. Although its asymptotic worst-case bound is the same as those of conventional algorithms—linear in the size of the input—its space utilization is directly proportional to input size rather than maximum recursion depth, which may differ by orders of magnitude. However, for many applications such as modern optimizing compilers, the storage cost of a pacrkat parser is likely to be no greater than the cost of subsequent processing stages. This cost may therefore be a reasonable tradeoff for the power and flexibility of linear-time parsing with unlimited lookahead. The rest of this paper explores packrat parsing with the aim of providing a pragmatic sense of how to implement it and when it is useful. Basic familiarity with context-free grammars and top-down parsing is assumed. For brevity and clarity of presentation, only small excerpts of example code are included in the text. However, all of the examples described in this paper are available, as complete and working Haskell code, at: http://pdos.lcs.mit.edu/˜baford/packrat/icfp02 The paper is organized as follows. Section 2 introduces packrat parsing and describes how it works, using conventional recursive descent parsing as a starting point. Section 3 presents useful extensions to the basic algorithm, such as support for left recursion, lexical analysis, and monadic parsing. Section 4 explores in more detail the recognition power of packrat parsers in comparison with conventional linear-time parsers. Section 5 discusses the three main practical limitations of packrat parsing: determinism, statelessness, and space consumption. Section 6 presents some experimental results to demonstrate the practicality of packrat parsing for real languages. Section 7 discusses related work, Section 8 points out directions for future exploration, and Section 9 concludes. 2 Building a Parser Packrat parsing is essentially a top-down parsing strategy, and as such packrat parsers are closely related to recursive descent parsers. For this reason, we will first build a recursive descent parser for a trivial language and then convert it into a packrat parser. 2.1 Recursive Descent Parsing Consider the standard approach for constructing a recursive descent parser for a grammar such as the trivial arithmetic expression lan- guage shown in Figure 1. We define four functions, one for each of the nonterminals on the left-hand sides of the rules. Each function takes takes the string to be parsed, attempts to recognize some prefix of the input string as a derivation of the corresponding nonterminal, and returns either a “success” or “failure” result. On success, the function returns the remainder of the input string immediately following the part that was recognized, along with some semantic value computed from the recognized part. Each function can recursively call itself and the other functions in order to recognize the nonterminals appearing on the right-hand sides of its corresponding grammar rules. To implement this parser in Haskell, we first need a type describing the result of a parsing function: data Result v = Parsed v String | NoParse In order to make this type generic for different parse functions producing different kinds of semantic values, the Result type takes a type parameter v representing the type of the associated semantic value. A success result is built with the Parsed constructor and contains a semantic value (of type v) and the remainder of the input text (of type String). A failure result is represented by the simple value NoParse. In this particular parser, each of the four parse functions takes a String and produces a Result with a semantic value of type Int: pAdditive pMultitive pPrimary pDecimal :: :: :: :: String String String String -> -> -> -> Result Result Result Result Int Int Int Int The definitions of these functions have the following general structure, directly reflecting the mutual recursion expressed by the grammar in Figure 1: pAdditive pMultitive pPrimary pDecimal s s s s = = = = ... (calls itself and pMultitive) ... ... (calls itself and pPrimary) ... ... (calls pAdditive and pDecimal) ... ... For example, the pAdditive function can be coded as follows, using only primitive Haskell pattern matching constructs: -- Parse an additive-precedence expression pAdditive :: String -> Result Int pAdditive s = alt1 where -- Additive <- Multitive ’+’ Additive alt1 = case pMultitive s of Parsed vleft s’ -> case s’ of (’+’:s’’) -> case pAdditive s’’ of Parsed vright s’’’ -> Parsed (vleft + vright) s’’’ _ -> alt2 _ -> alt2 _ -> alt2 -- Additive <- Multitive alt2 = case pMultitive s of Parsed v s’ -> Parsed v s’ NoParse -> NoParse To compute the result of pAdditive, we first compute the value of alt1, representing the first alternative for this grammar rule. This alternative in turn calls pMultitive to recognize a multiplicativeprecedence expression. If pMultitive succeeds, it returns the semantic value vleft of that expression and the remaining input s’ following the recognized portion of input. We then check for a ‘+’ operator at position s’, which if successful produces the string s’’ representing the remaining input after the ‘+’ operator. Finally, we recursively call pAdditive itself to recognize another additiveprecedence expression at position s’’, which if successful yields the right-hand-side result vright and the final remainder string s’’’. If all three of these matches were successful, then we return as the result of the initial call to pAdditive the semantic value of the addition, vleft + vright, along with the final remainder string s’’’. If any of these matches failed, we fall back on alt2, the second alternative, which merely attempts to recognize a single multiplicative-precedence expression at the original input position s and returns that result verbatim, whether success or failure. The other three parsing functions are constructed similarly, in direct correspondence with the grammar. Of course, there are easier and more concise ways to write these parsing functions, using an appropriate library of helper functions or combinators. These techniques will be discussed later in Section 3.3, but for clarity we will stick to simple pattern matching for now. 2.2 Backtracking Versus Prediction The parser developed above is a backtracking parser. If alt1 in the pAdditive function fails, for example, then the parser effectively “backtracks” to the original input position, starting over with the original input string s in the second alternative alt2, regardless of whether the first alternative failed to match during its first, second, or third stage. Notice that if the input s consists of only a single multiplicative expression, then the pMultitive function will be called twice on the same string: once in the first alternative, which will fail while trying to match a nonexistent ‘+’ operator, and then again while successfully applying the second alternative. This backtracking and redundant evaluation of parsing functions can lead to parse times that grow exponentially with the size of the input, and this is the principal reason why a “naive” backtracking strategy such as the one above is never used in realistic parsers for inputs of substantial size. The standard strategy for making top-down parsers practical is to design them so that they can “predict” which of several alternative rules to apply before actually making any recursive calls. In this way it can be guaranteed that parse functions are never called redundantly and that any input can be parsed in linear time. For example, although the grammar in Figure 1 is not directly suitable for a predictive parser, it can be converted into an LL(1) grammar, suitable for prediction with one lookahead token, by “left-factoring” the Additive and Multitive nonterminals as follows: Additive AdditiveSuffix Multitive MultitiveSuffix ← ← ← ← Multitive AdditiveSuffix ‘+’ Additive | ε Primary MultitiveSuffix ‘*’ Multitive | ε Now the decision between the two alternatives for AdditiveSuffix can be made before making any recursive calls simply by checking whether the next input character is a ‘+’. However, because the prediction mechanism only has “raw” input tokens (characters in this case) to work with, and must itself operate in constant time, the class of grammars that can be parsed predictively is very restrictive. Care must also be taken to keep the prediction mechanism consistent with the grammar, which can be difficult to do manu- column C1 C2 C3 C4 C5 C6 pAdditive (7,C7) (4,C7) pMultitive (3,C5) (4,C7) (3,C5) (4,C7) (3,C5) (4,C7) ? pPrimary pDecimal input ’2’ ’*’ ’(’ ’3’ ’+’ ’4’ C7 C8 ’)’ (end) Figure 2. Matrix of parsing results for string ‘2*(3+4)’ ally and highly sensitive to global properties of the language. For example, the prediction mechanism for MultitiveSuffix would have to be adjusted if a higher-precedence exponentiation operator ‘**’ was added to the language; otherwise the exponentiation operator would falsely trigger the predictor for multiplication expressions and cause the parser to fail on valid input. Some top-down parsers use prediction for most decisions but fall back on full backtracking when more flexibility is needed. This strategy often yields a good combination of flexibility and performance in practice, but it still suffers the additional complexity of prediction, and it requires the parser designer to be intimately aware of where prediction can be used and when backtracking is required. 2.3 Tabular Top-Down Parsing As pointed out by Birman and Ullman [4], a backtracking top-down parser of the kind presented in Section 2.1 can be made to operate in linear time without the added complexity or constraints of prediction. The basic reason the backtracking parser can take super-linear time is because of redundant calls to the same parse function on the same input substring, and these redundant calls can be eliminated through memoization. Each parse function in the example is dependent only on its single parameter, the input string. Whenever a parse function makes a recursive call to itself or to another parse function, it always supplies either the same input string it was given (e.g., for the call by pAdditive to pMultitive), or a suffix of the original input string (e.g., for the recursive call by pAdditive to itself after matching a ‘+’ operator). If the input string is of length n, then there are only n + 1 distinct suffixes that might be used in these recursive calls, counting the original input string itself and the empty string. Since there are only four parse functions, there are at most 4(n + 1) distinct intermediate results that the parsing process might require. We can avoid computing any of these intermediate results multiple times by storing them in a table. The table has one row for each of the four parse functions and one column for each distinct position in the input string. We fill the table with the results of each parse function for each input position, starting at the right end of the input string and working towards the left, column by column. Within each column, we start from the bottommost cell and work upwards. By the time we compute the result for a given cell, the results of all would-be recursive calls in the corresponding parse function will already have been computed and recorded elsewhere in the table; we merely need to look up and use the appropriate results. Figure 2 illustrates a partially-completed result table for the input string ‘2*(3+4)’. For brevity, Parsed results are indicated as (v,c), where v is the semantic value and c is the column number at which the associated remainder suffix begins. Columns are labeled C1, C2, and so on, to avoid confusion with the integer semantic values. NoParse results are indicated with an X in the cell. The next cell to be filled is the one for pPrimary at column C3, indicated with a circled question mark. The rule for Primary expressions has two alternatives: a parenthesized Additive expression or a Decimal digit. If we try the alternatives in the order expressed in the grammar, pPrimary will first check for a parenthesized Additive expression. To do so, pPrimary first attempts to match an opening ‘(’ in column C3, which succeeds and yields as its remainder string the input suffix starting at column C4, namely ‘3+4)’. In the simple recursive-descent parser pPrimary would now recursively call pAdditive on this remainder string. However, because we have the table we can simply look up the result for pAdditive at column C4 in the table, which is (7,C7). This entry indicates a semantic value of 7—the result of the addition expression ‘3+4’—and a remainder suffix of ‘)’ starting in column C7. Since this match is a success, pPrimary finally attempts to match the closing parenthesis at position C7, which succeeds and yields the empty string C8 as the remainder. The result entered for pPrimary at column C3 is thus (7,C8). Although for a long input string and a complex grammar this result table may be large, it only grows linearly with the size of the input assuming the grammar has a fixed number of nonterminals. Furthermore, as long as the grammar uses only the standard operators of Backus-Naur Form [2], only a fixed number of previouslyrecorded cells in the matrix need to be accessed in order to compute each new result. Therefore, assuming table lookup occurs in constant time, the parsing process as a whole completes in linear time. Due to the “forward pointers” embedded in the results table, the computation of a given result may examine cells that are widely spaced in the matrix. For example, computing the result for pPrimary at C3 above made use of results from columns C3, C4, and C7. This ability to skip ahead arbitrary distances while making parsing decisions is the source of the algorithm’s unlimited lookahead capability, and this capability makes the algorithm more powerful than linear-time predictive parsers or LR parsers. 2.4 Packrat Parsing An obvious practical problem with the tabular right-to-left parsing algorithm above is that it computes many results that are never needed. An additional inconvenience is that we must carefully determine the order in which the results for a particular column are computed, so that parsing functions such as pAdditive and pMultitive that depend on other results from the same column will work correctly. Packrat parsing is essentially a lazy version of the tabular algorithm that solves both of these problems. A packrat parser computes results only as they are needed, in the same order as the original recursive descent parser would. However, once a result is computed for the first time, it is stored for future use by subsequent calls. A non-strict functional programming language such as Haskell provides an ideal implementation platform for a packrat parser. In fact, packrat parsing in Haskell is particularly efficient because it does not require arrays or any other explicit lookup structures other than the language’s ordinary algebraic data types. First we will need a new type to represent a single column of the parsing result matrix, which we will call Derivs (“derivations”). This type is merely a tuple with one component for each nonterminal in the grammar. Each component’s type is the result type of the corresponding parse function. The Derivs type also contains one additional component, which we will call dvChar, to represent “raw” characters of the input string as if they were themselves the results of some parsing function. The Derivs type for our example parser can be conveniently declared in Haskell as follows: data Derivs = Derivs { dvAdditive dvMultitive dvPrimary dvDecimal dvChar :: :: :: :: :: Result Result Result Result Result Int, Int, Int, Int, Char} This Haskell syntax declares the type Derivs to have a single constructor, also named Derivs, with five components of the specified types. The declaration also automatically creates a corresponding data-accessor function for each component: dvAdditive can be used as a function of type Derivs → Result Int, which extracts the first component of a Derivs tuple, and so on. Next we modify the Result type so that the “remainder” component of a success result is not a plain String, but is instead an instance of Derivs: data Result v = Parsed v Derivs | NoParse The Derivs and Result types are now mutually recursive: the success results in one Derivs instance act as links to other Derivs instances. These result values in fact provide the only linkage we need between different columns in the matrix of parsing results. Now we modify the original recursive-descent parsing functions so that each takes a Derivs instead of a String as its parameter: pAdditive pMultitive pPrimary pDecimal :: :: :: :: Derivs Derivs Derivs Derivs -> -> -> -> Result Result Result Result Int Int Int Int Wherever one of the original parse functions examined input characters directly, the new parse function instead refers to the dvChar component of the Derivs object. Wherever one of the original functions made a recursive call to itself or another parse function, in order to match a nonterminal in the grammar, the new parse function instead instead uses the Derivs accessor function corresponding to that nonterminal. Sequences of terminals and nonterminals are matched by following chains of success results through multiple Derivs instances. For example, the new pAdditive function uses the dvMultitive, dvChar, and dvAdditive accessors as follows, without making any direct recursive calls: -- Parse an additive-precedence expression pAdditive :: Derivs -> Result Int pAdditive d = alt1 where -- Additive <- Multitive ’+’ Additive alt1 = case dvMultitive d of Parsed vleft d’ -> case dvChar d’ of Parsed ’+’ d’’ -> case dvAdditive d’’ of Parsed vright d’’’ -> Parsed (vleft + vright) d’’’ _ -> alt2 _ -> alt2 _ -> alt2 -- Additive <- Multitive alt2 = dvMultitive d Finally, we create a special “top-level” function, parse, to produce instances of the Derivs type and “tie up” the recursion between all of the individual parsing functions: -- Create a result matrix for an input string parse :: String -> Derivs parse s = d where d = Derivs add mult prim dec chr add = pAdditive d mult = pMultitive d prim = pPrimary d dec = pDecimal d chr = case s of (c:s’) -> Parsed c (parse s’) [] -> NoParse The “magic” of the packrat parser is in this doubly-recursive function. The first level of recursion is produced by the parse function’s reference to itself within the case statement. This relatively conventional form of recursion is used to iterate over the input string one character at a time, producing one Derivs instance for each input position. The final Derivs instance, representing the empty string, is assigned a dvChar result of NoParse, which effectively terminates the list of columns in the result matrix. The second level of recursion is via the symbol d. This identifier names the Derivs instance to be constructed and returned by the parse function, but it is also the parameter to each of the individual parsing functions. These parsing functions, in turn, produce the rest of the components forming this very Derivs object. This form of data recursion of course works only in a non-strict language, which allow some components of an object to be accessed before other parts of the same object are available. For example, in any Derivs instance created by the above function, the dvChar component can be accessed before any of the other components of the tuple are available. Attempting to access the dvDecimal component of this tuple will cause pDecimal to be invoked, which in turn uses the dvChar component but does not require any of the other “higher-level” components. Accessing the dvPrimary component will similarly invoke pPrimary, which may access dvChar and dvAdditive. Although in the latter case pPrimary is accessing a “higher-level” component, doing so does not create a cyclic dependency in this case because it only ever invokes dvAdditive on a different Derivs object from the one it was called with: namely the one for the position following the opening parenthesis. Every component of every Derivs object produced by parse can be lazily evaluated in this fashion. Figure 3 illustrates the data structure produced by the parser for the example input text ‘2*(3+4)’, as it would appear in memory under a modern functional evaluator after fully reducing every cell. Each vertical column represents a Derivs instance with its five Result components. For results of the form ‘Parsed v d’, the semantic value v is shown in the appropriate cell, along with an arrow representing the “remainder” pointer leading to another Derivs instance in the matrix. In any modern lazy language implementation that properly preserves sharing relationships during evaluation, the arrows in the diagram will literally correspond to pointers in the heap, and a given cell in the structure will never be evaluated twice. Shaded boxes represent cells that would never be evaluated at all in dvAdditive 14 7 7 ’4’ dvMultitive 14 7 3 4 dvPrimary 2 7 3 4 dvDecimal 2 dvChar ’2’ 4 3 ’*’ ’(’ ’3’ ’+’ ’4’ ’)’ Figure 3. Illustration of Derivs data structure produced by parsing the string ‘2*(3+4)’ the likely case that the dvAdditive result in the leftmost column is the only value ultimately needed by the application. This illustration should make it clear why this algorithm can run in O(n) time under a lazy evaluator for an input string of length n. The top-level parse function is the only function that creates instances of the Derivs type, and it always creates exactly n + 1 instances. The parse functions only access entries in this structure instead of making direct calls to each other, and each function examines at most a fixed number of other cells while computing a given result. Since the lazy evaluator ensures that each cell is evaluated at most once, the critical memoization property is provided and linear parse time is guaranteed, even though the order in which these results are evaluated is likely to be completely different from the tabular, right-to-left, bottom-to-top algorithm presented earlier. 3 Extending the Algorithm The previous section provided the basic principles and tools required to create a packrat parser, but building parsers for real applications involves many additional details, some of which are affected by the packrat parsing paradigm. In this section we will explore some of the more important practical issues, while incrementally building on the example packrat parser developed above. We first examine the annoying but straightforward problem of left recursion. Next we address the issue of lexical analysis, seamlessly integrating this task into the packrat parser. Finally, we explore the use of monadic combinators to express packrat parsers more concisely. 3.1 Left Recursion One limitation packrat parsing shares with other top-down schemes is that it does not directly support left recursion. For example, suppose we wanted to add a subtraction operator to the above example and have addition and subtraction be properly left-associative. A natural approach would be to modify the grammar rules for Additive expressions as follows, and to change the parser accordingly: Additive ← | | Additive ‘+’ Multitive Additive ‘-’ Multitive Multitive In a recursive descent parser for this grammar, the pAdditive function would recursively invoke itself with the same input it was provided, and therefore would get into an infinite recursion cycle. In a packrat parser for this grammar, pAdditive would attempt to access the dvAdditive component of its own Derivs tuple—the same component it is supposed to compute—and thus would create a circular data dependency. In either case the parser fails, although the packrat parser’s failure mode might be viewed as slightly “friendlier” since modern lazy evaluators often detect circular data dependencies at run-time but cannot detect infinite recursion. Fortunately, a left-recursive grammar can always be rewritten into an equivalent right-recursive one [2], and the desired leftassociative semantic behavior is easily reconstructed using higherorder functions as intermediate parser results. For example, to make Additive expressions left-associative in the example parser, we can split this rule into two nonterminals, Additive and AdditiveSuffix. The pAdditive function recognizes a single Multitive expression followed by an AdditiveSuffix: pAdditive :: Derivs -> Result Int pAdditive d = case dvMultitive d of Parsed vl d’ -> case dvAdditiveSuffix d’ of Parsed suf d’’ -> Parsed (suf vl) d’’ _ -> NoParse _ -> NoParse The pAdditiveSuffix function collects infix operators and righthand-side operands, and builds a semantic value of type ‘Int → Int’, which takes a left-hand-side operand and produces a result: pAdditiveSuffix :: Derivs -> Result (Int -> Int) pAdditiveSuffix d = alt1 where -- AdditiveSuffix <- ’+’ Multitive AdditiveSuffix alt1 = case dvChar d of Parsed ’+’ d’ -> case dvMultitive d’ of Parsed vr d’’ -> case dvAdditiveSuffix d’’ of Parsed suf d’’’ -> Parsed (\vl -> suf (vl + vr)) d’’’ _ -> alt2 _ -> alt2 _ -> alt2 -- AdditiveSuffix <- <empty> alt3 = Parsed (\v -> v) d 3.2 Integrated Lexical Analysis Traditional parsing algorithms usually assume that the “raw” input text has already been partially digested by a separate lexical analyzer into a stream of tokens. The parser then treats these tokens as atomic units even though each may represent multiple consecutive input characters. This separation is usually necessary because conventional linear-time parsers can only use primitive terminals in their lookahead decisions and cannot refer to higher-level nonterminals. This limitation was explained in Section 2.2 for predictive top-down parsers, but bottom-up LR parsers also depend on a similar token-based lookahead mechanism sharing the same problem. If a parser can only use atomic tokens in its lookahead decisions, then parsing becomes much easier if those tokens represent whole keywords, identifiers, and literals rather than raw characters. Packrat parsing suffers from no such lookahead limitation, however. Because a packrat parser reflects a true backtracking model, decisions between alternatives in one parsing function can depend on complete results produced by other parsing functions. For this reason, lexical analysis can be integrated seamlessly into a packrat parser with no special treatment. To extend the packrat parser example with “real” lexical analysis, we add some new nonterminals to the Derivs type: data Derivs = Derivs { -- Expressions dvAdditive :: Result Int, ... -- Lexical tokens dvDigits :: Result dvDigit :: Result dvSymbol :: Result dvWhitespace :: Result (Int, Int), Int, Char, (), -- Raw input dvChar :: Result Char} The pWhitespace parse function consumes any whitespace that may separate lexical tokens: pWhitespace :: Derivs -> Result () pWhitespace d = case dvChar d of Parsed c d’ -> if isSpace c then pWhitespace d’ else Parsed () d _ -> Parsed () d In a more complete language, this function might have the task of eating comments as well. Since the full power of packrat parsing is available for lexical analysis, comments could have a complex hierarchical structure of their own, such as nesting or markups for literate programming. Since syntax recognition is not broken into a unidirectional pipeline, lexical constructs can even refer “upwards” to higher-level syntactic elements. For example, a language’s syntax could allow identifiers or code fragments embedded within comments to be demarked so the parser can find and analyze them as actual expressions or statements, making intelligent software engineering tools more effective. Similarly, escape sequences in string literals could contain generic expressions representing static or dynamic substitutions. The pWhitespace example also illustrates how commonplace longest-match disambiguation rules can be easily implemented in a packrat parser, even though they are difficult to express in a pure context-free grammar. More sophisticated decision and disambiguation strategies are easy to implement as well, including general syntactic predicates [14], which influence parsing decisions based on syntactic lookahead information without actually consuming input text. For example, the useful followed-by and notfollowed-by rules allow a parsing alternative to be used only if the text matched by that alternative is (or is not) followed by text matching some other arbitrary nonterminal. Syntactic predicates of this kind require unlimited lookahead in general and are therefore outside the capabilities of most other linear-time parsing algorithms. Continuing with the lexical analysis example, the function pSymbol recognizes “operator tokens” consisting of an operator character followed by optional whitespace: -- Parse an operator followed by optional whitespace pSymbol :: Derivs -> Result Char pSymbol d = case dvChar d of Parsed c d’ -> if c ‘elem‘ "+-*/%()" then case dvWhitespace d’ of Parsed _ d’’ -> Parsed c d’’ _ -> NoParse else NoParse _ -> NoParse Now we modify the higher-level parse functions for expressions to use dvSymbol instead of dvChar to scan for operators and parentheses. For example, pPrimary can be implemented as follows: and simple aliases cannot be assigned type classes. We must instead wrap the parsing functions with a “real” user-defined type: newtype Parser v = Parser (Derivs -> Result v) -- Parse a primary expression pPrimary :: Derivs -> Result Int pPrimary d = alt1 where -- Primary <- ’(’ Additive ’)’ alt1 = case dvSymbol d of Parsed ’(’ d’ -> case dvAdditive d’ of Parsed v d’’ -> case dvSymbol d’’ of Parsed ’)’ d’’’ -> Parsed v d’’’ _ -> alt2 _ -> alt2 _ -> alt2 We can now implement Haskell’s standard sequencing (>>=), result-producing (return), and error-producing combinators: instance Monad Parser where (Parser p1) >>= f2 = Parser pre where pre d = post (p1 d) post (Parsed v d’) = p2 d’ where Parser p2 = f2 v post (NoParse) = NoParse return x = Parser (\d -> Parsed x d) fail msg = Parser (\d -> NoParse) -- Primary <- Decimal alt2 = dvDecimal d This function demonstrates how parsing decisions can depend not only on the existence of a match at a given position for a nonterminal such as Symbol, but also on the semantic value associated with that nonterminal. In this case, even though all symbol tokens are parsed together and treated uniformly by pSymbol, other rules such as pPrimary can still distinguish between particular symbols. In a more sophisticated language with multi-character operators, identifiers, and reserved words, the semantic values produced by the token parsers might be of type String instead of Char, but these values can be matched in the same way. Such dependencies of syntax on semantic values, known as semantic predicates [14], provide an extremely powerful and useful capability in practice. As with syntactic predicates, semantic predicates require unlimited lookahead in general and cannot be implemented by conventional parsing algorithms without giving up their linear time guarantee. 3.3 Monadic Packrat Parsing A popular method of constructing parsers in functional languages such as Haskell is using monadic combinators [11, 13]. Unfortunately, the monadic approach usually comes with a performance penalty, and with packrat parsing this tradeoff presents a difficult choice. Implementing a packrat parser as described so far assumes that the set of nonterminals and their corresponding result types is known statically, so that they can be bound together in a single fixed tuple to form the Derivs type. Constructing entire packrat parsers dynamically from other packrat parsers via combinators would require making the Derivs type a dynamic lookup structure, associating a variable set of nonterminals with corresponding results. This approach would be much slower and less space-efficient. A more practical strategy, which provides most of the convenience of combinators with a less significant performance penalty, is to use monads to define the individual parsing functions comprising a packrat parser, while keeping the Derivs type and the “top-level” recursion statically implemented as described earlier. Since we would like our combinators to build the parse functions we need directly, the obvious method would be to make the combinators work with a simple type alias: Finally, for parsing we need an alternation combinator: (<|>) :: Parser v -> Parser v -> Parser v (Parser p1) <|> (Parser p2) = Parser pre where pre d = post d (p1 d) post d NoParse = p2 d post d r = r With these combinators in addition to a trivial one to recognize specific characters, the pAdditive function in the original packrat parser example can be written as follows: Parser pAdditive = (do vleft <- Parser dvMultitive char ’+’ vright <- Parser dvAdditive return (vleft + vright)) <|> (do Parser dvMultitive) It is tempting to build additional combinators for higher-level idioms such as repetition and infix expressions. However, using iterative combinators within packrat parsing functions violates the assumption that each cell in the result matrix can be computed in constant time once the results from any other cells it depends on are available. Iterative combinators effectively create “hidden” recursion whose intermediate results are not memoized in the result matrix, potentially making the parser run in super-linear time. This problem is not necessarily serious in practice, as the results in Section 6 will show, but it should be taken into account when using iterative combinators. The on-line examples for this paper include a full-featured monadic combinator library that can be used to build large packrat parsers conveniently. This library is substantially inspired by PARSEC [13], though the packrat parsing combinators are much simpler since they do not have to implement lexical analysis as a separate phase or implement the one-token-lookahead prediction mechanism used by traditional top-down parsers. The full combinator library provides a variety of “safe” constant-time combinators, as well as a few “dangerous” iterative ones, which are convenient but not necessary to construct parsers. The combinator library can be used simultaneously by multiple parsers with different Derivs types, and supports user-friendly error detection and reporting. type Parser v = Derivs -> Result v 4 Comparison with LL and LR Parsing Unfortunately, in order to take advantage of Haskell’s useful do syntax, the combinators must use a type of the special class Monad, Whereas the previous sections have served as a tutorial on how to construct a packrat parser, for the remaining sections we turn to S R A P the issue of when packrat parsing is useful in practice. This section informally explores the language recognition power of packrat parsing in more depth, and clarifies its relationship to traditional linear-time algorithms such as LL(k) and LR(k). Although LR parsing is commonly seen as “more powerful” than limited-lookahead top-down or LL parsing, the class of languages these parsers can recognize is the same [3]. As Pepper points out [17], LR parsing can be viewed simply as LL parsing with the grammar rewritten so as to eliminate left recursion and to delay all important parsing decisions as long as possible. The result is that LR provides more flexibility in the way grammars can be expressed, but no actual additional recognition power. For this reason, we will treat LL and LR parsers here as being essentially equivalent. 4.1 Lookahead The most critical practical difference between packrat parsing and LL/LR parsing is the lookahead mechanism. A packrat parser’s decisions at any point can be based on all the text up to the end of the input string. Although the computation of an individual result in the parsing matrix can only perform a constant number of “basic operations,” these basic operations include following forward pointers in the parsing matrix, each of which can skip over a large amount of text at once. Therefore, while LL and LR parsers can only look ahead a constant number of terminals in the input, packrat parsers can look ahead a constant number of terminals and nonterminals in any combination. This ability for parsing decisions to take arbitrary nonterminals into account is what gives packrat parsing its unlimited lookahead capability. To illustrate the difference in language recognition power, the following grammar is not LR(k) for any k, but is not a problem for a packrat parser: S A B ← ← ← A|B xAy|xzy xByy|xzyy Once an LR parser has encountered the ‘z’ and the first following ‘y’ in a string in the above language, it must decide immediately whether to start reducing via nonterminal A or B, but there is no way for it to make this decision until as many ‘y’s have been encountered as there were ‘x’s on the left-hand side. A packrat parser, on the other hand, essentially operates in a speculative fashion, producing derivations for nonterminals A and B in parallel while scanning the input. The ultimate decision between A and B is effectively delayed until the entire input string has been parsed, where the decision is merely a matter of checking which nonterminal has a success result at that position. Mirroring the above grammar left to right does not change the situation, making it clear that the difference is not merely some side-effect of the fact that LR scans the input left-to-right whereas packrat parsing seems to operate in reverse. 4.2 Grammar Composition The limitations of LR parsing due to fixed lookahead are frequently felt when designing parsers for practical languages, and many of these limitations stem from the fact that LL and LR grammars are not cleanly composable. For example, the following grammar represents a simple language with expressions and assignment, which only allows simple identifiers on the left side of an assignment: ← ← ← ← R | ID ‘=’ R A | A EQ A | A NE A P | P ‘+’ P | P ‘-’ P ID | ‘(’ R ‘)’ If the symbols ID, EQ, and NE are terminals—i.e., atomic tokens produced by a separate lexical analysis phase—then an LR(1) parser has no trouble with this grammar. However, if we try to integrate this tokenization into the parser itself with the following simple rules, the grammar is no longer LR(1): ID EQ NE ← ← ← ’a’ | ’a’ ID ’=’ ’=’ ’!’ ’=’ The problem is that after scanning an identifier, an LR parser must decide immediately whether it is a primary expression or the lefthand side of an assignment, based only on the immediately following token. But if this token is an ‘=’, the parser has no way of knowing whether it is an assignment operator or the first half of an ‘==’ operator. In this particular case the grammar could be parsed by an LR(2) parser. In practice LR(k) and even LALR(k) parsers are uncommon for k > 1. Recently developed extensions to the traditional left-to-right parsing algorithms improve the situation somewhat [18, 16, 15], but they still cannot provide unrestricted lookahead capability while maintaining the linear time guarantee. Even when lexical analysis is separated from parsing, the limitations of LR parsers often surface in other practical situations, frequently as a result of seemingly innocuous changes to an evolving grammar. For example, suppose we want to add simple array indexing to the language above, so that array indexing operators can appear on either the left or right side of an assignment. One possible approach is to add a new nonterminal, L, to represent left-side or “lvalue” expressions, and incorporate the array indexing operator into both types of expressions as shown below: S R A P L ← ← ← ← ← R | L ‘=’ R A | A EQ A | A NE A P | P ‘+’ P | P ‘-’ P ID | ‘(’ R ‘)’ | P ‘[’ A ‘]’ ID | ‘(’ L ‘)’ | L ‘[’ A ‘]’ Even if the ID, EQ, and NE symbols are again treated as terminals, this grammar is not LR(k) for any k, because after the parser sees an identifier it must immediately decide whether it is part of a P or L expression, but it has no way of knowing this until any following array indexing operators have been fully parsed. Again, a packrat parser has no trouble with this grammar because it effectively evaluates the P and L alternatives “in parallel” and has complete derivations to work with (or the knowledge of their absence) by the time the critical decision needs to be made. In general, grammars for packrat parsers are composable because the lookahead a packrat parser uses to make decisions between alternatives can take account of arbitrary nonterminals, such as EQ in the first example or P and L in the second. Because a packrat parser does not give “primitive” syntactic constructs (terminals) any special significance as an LL or LR parser does, any terminal or fixed sequence of terminals appearing in a grammar can be substituted with a nonterminal without “breaking” the parser. This substitution capability gives packrat parsing greater composition flexibility. 4.3 Recognition Limitations Given that a packrat parser can recognize a broader class of languages in linear time than either LL(k) or LR(k) algorithms, what kinds of grammars can’t a packrat parser recognize? Though the precise theoretical capabilities of the algorithm have not been thoroughly characterized, the following trivial and unambiguous context-free grammar provides an example that proves just as troublesome for a packrat parser as for an LL or LR parser: S ← xSx|x The problem with this grammar for both kinds of parsers is that, while scanning a string of ‘x’s—left-to-right in the LR case or rightto-left in the packrat case—the algorithm would somehow have to “know” in advance where the middle of the string is so that it can apply the second alternative at that position and then “build outwards” using the first alternative for the rest of the input stream. But since the stream is completely homogeneous, there is no way for the parser to find the middle until the entire input has been parsed. This grammar therefore provides an example, albeit contrived, requiring a more general, non-linear-time CFG parsing algorithm. 5 Practical Issues and Limitations Although packrat parsing is powerful and efficient enough for many applications, there are three main issues that can make it inappropriate in some situations. First, packrat parsing is useful only to construct deterministic parsers: parsers that can produce at most one result. Second, a packrat parser depends for its efficiency on being mostly or completely stateless. Finally, due to its reliance on memoization, packrat parsing is inherently space-intensive. These three issues are discussed in this section. 5.1 Deterministic Parsing An important assumption we have made so far is that each of the mutually recursive parsing functions from which a packrat parser is built will deterministically return at most one result. If there are any ambiguities in the grammar the parser is built from, then the parsing functions must be able to resolve them locally. In the example parsers developed in this paper, multiple alternatives have always been implicitly disambiguated by the order in which they are tested: the first alternative to match successfully is the one used, independent of whether any other alternatives may also match. This behavior is both easy to implement and useful for performing longestmatch and other forms of explicit local disambiguation. A parsing function could even try all of the possible alternatives and produce a failure result if more than one alternative matches. What parsing functions in a packrat parser cannot do is return multiple results to be used in parallel or disambiguated later by some global strategy. In languages designed for machine consumption, the requirement that multiple matching alternatives be disambiguated locally is not much of a problem in practice because ambiguity is usually undesirable in the first place, and localized disambiguation rules are preferred over global ones because they are easier for humans to understand. However, for parsing natural languages or other grammars in which global ambiguity is expected, packrat parsing is less likely to be useful. Although a classic nondeterministic top-down parser in which the parse functions return lists of results [23, 8] could be memoized in a similar way, the resulting parser would not be linear time, and would likely be comparable to existing tabular algorithms for ambiguous context-free grammars [3, 20]. Since nondeterministic parsing is equivalent in computational complexity to boolean matrix multiplication [12], a linear-time solution to this more general problem is unlikely to be found. 5.2 Stateless Parsing A second limitation of packrat parsing is that it is fundamentally geared toward stateless parsing. A packrat parser’s memoization system assumes that the parsing function for each nonterminal depends only on the input string, and not on any other information accumulated during the parsing process. Although pure context-free grammars are by definition stateless, many practical languages require a notion of state while parsing and thus are not really context-free. For example, C and C++ require the parser to build a table of type names incrementally as types are declared, because the parser must be able to distinguish type names from other identifiers in order to parse subsequent text correctly. Traditional top-down (LL) and bottom-up (LR) parsers have little trouble maintaining state while parsing. Since they perform only a single left-to-right scan of the input and never look ahead more than one or at most a few tokens, nothing is “lost” when a state change occurs. A packrat parser, in contrast, depends on statelessness for the efficiency of its unlimited lookahead capability. Although a stateful packrat parser can be constructed, the parser must start building a new result matrix each time the parsing state changes. For this reason, stateful packrat parsing may be impractical if state changes occur frequently. For more details on packrat parsing with state, please refer to my master’s thesis [9]. 5.3 Space Consumption Probably the most striking characteristic of a packrat parser is the fact that it literally squirrels away everything it has ever computed about the input text, including the entire input text itself. For this reason packrat parsing always has storage requirements equal to some possibly substantial constant multiple of the input size. In contrast, LL(k), LR(k), and simple backtracking parsers can be designed so that space consumption grows only with the maximum nesting depth of the syntactic constructs appearing in the input, which in practice is often orders of magnitude smaller than the total size of the text. Although LL(k) and LR(k) parsers for any nonregular language still have linear space requirements in the worst case, this “average-case” difference can be important in practice. One way to reduce the space requirements of the derivations structure, especially in parsers for grammars with many nonterminals, is by splitting up the Derivs type into multiple levels. For example, suppose the nonterminals of a language can be grouped into several broad categories, such as lexical tokens, expressions, statements, and declarations. Then the Derivs tuple itself might have only four components in addition to dvChar, one for each of these nonterminal categories. Each of these components is in turn a tuple containing the results for all of the nonterminals in that category. For the majority of the Derivs instances, representing character positions “between tokens,” none of the components representing the categories of nonterminals will ever be evaluated, and so only the small top-level object and the unevaluated closures for its components occupy space. Even for Derivs instances corresponding to the beginning of a token, often the results from only one or two categories will be needed depending on what kind of language construct is located at that position. On the other hand, for parsing complex modern programming languages in which the source code is usually written by humans and the top priority is the power and expressiveness of the language, the space cost of packrat parsing is probably reasonable. Standard programming practice involves breaking up large programs into modules of manageable size that can be independently compiled, and the main memory sizes of modern machines leave at least three orders of magnitude in “headroom” for expansion of a typical 10– 100KB source file during parsing. Even when parsing larger source files, the working set may still be relatively small due to the strong structural locality properties of realistic languages. Finally, since the entire derivations structure can be thrown away after parsing is complete, the parser’s space consumption is likely to be irrelevant if its result is fed into some other complex computation, such as a global optimizer, that requires as much space as the packrat parser used. Section 6 will present evidence that this space consumption can be reasonable in practice. 6 Performance Results Although a detailed empirical analysis of packrat parsing is outside the scope of this paper, it is helpful to have some idea of how a packrat parser is likely to behave in practice before committing to a new and unfamiliar parsing paradigm. For this reason, this section presents a few experimental results with realistic packrat parsers running on real source files. For more detailed results, please refer to my master’s thesis [9]. 6.1 Space Efficiency The first set of tests measure the space efficiency of a packrat parser for the Java1 programming language. I chose Java for this experiment because it has a rich and complex grammar, but nevertheless adopts a fairly clean syntactic paradigm, not requiring the parser to keep state about declared types as C and C++ parsers do, or to perform special processing between lexical and hierarchical analysis as Haskell’s layout scheme requires. The experiment uses two different versions of this Java parser. Apart from a trivial preprocessing stage to canonicalize line breaks and Java’s Unicode escape sequences, lexical analysis for both parsers is fully integrated as described in Section 3.2. One parser uses monadic combinators in its lexical analysis functions, while the other parser relies only on primitive pattern matching. Both parsers use monadic combinators to construct all higher-level parsing functions. Both parsers also use the technique described in Section 5.3 of splitting the Derivs tuple into two levels, in order to increase modularity and reduce space consumption. The parsers were compiled with the Glasgow Haskell Compiler2 version 5.04, with optimization and profiling enabled. GHC’s heap profiling system was used to measure live heap utilization, which excludes unused heap space and collectible garbage when samples are taken. 1 Java is a trademark of Sun Microsystems, Inc. 2 http://www.haskell.org/ghc/ 100 Monadic parser and scanner Monadic parser, pattern-matching scanner 80 Maximum heap size (MB) Even with such optimizations a packrat parser can consume many times more working storage than the size of the original input text. For this reason there are some application areas in which packrat parsing is probably not the best choice. For example, for parsing XML streams, which have a fairly simple structure but often encode large amounts of relatively flat, machine-generated data, the power and flexibility of packrat parsing is not needed and its storage cost would not be justified. Avg. 695:1 60 40 Avg. 301:1 20 0 0 20000 40000 60000 80000 Source file size (bytes) 100000 120000 140000 Figure 4. Maximum heap size versus input size The test suite consists of 60 unmodified Java source files from the Cryptix library3 , chosen because it includes a substantial number of relatively large Java source files. (Java source files are small on average because the compilation model encourages programmers to place each class definition in a separate file.) Figure 4 shows a plot of each parser’s maximum live heap size against the size of the input files being parsed. Because some of the smaller source files were parsed so quickly that garbage collection never occurred and the heap profiling mechanism did not yield any samples, the plot includes only 45 data points for the fully monadic parser, and 31 data points for the hybrid parser using direct pattern matching for lexical analysis. Averaged across the test suite, the fully monadic parser uses 695 bytes of live heap per byte of input, while the hybrid parser uses only 301 bytes of heap per input byte. These results are encouraging: although packrat parsing can consume a substantial amount of space, a typical modern machine with 128MB or more of RAM should have no trouble parsing source files up to 100-200KB. Furthermore, even though both parsers use some iterative monadic combinators, which can break the linear time and space guarantee in theory, the space consumption of the parsers nevertheless appears to grow fairly linearly. The use of monadic combinators clearly has a substantial penalty in terms of space efficiency. Modifying the parser to use direct pattern matching alone may yield further improvement, though the degree is difficult to predict since the cost of lexical analysis often dominates the rest of the parser. The lexical analysis portion of the hybrid parser is about twice as long as the equivalent portion of the monadic parser, suggesting that writing packrat parsers with pattern matching alone is somewhat more cumbersome but not unreasonable when efficiency is important. 6.2 Parsing Performance The second experiment measures the absolute execution time of the two packrat parsers. For this test the parsers were compiled by GHC 5.04 with optimization but without profiling, and timed on a 1.28GHz AMD Athlon processor running Linux 2.4.17. For this test I only used the 28 source files in the test suite that were larger than 10KB, because the smaller files were parsed so quickly that the Linux time command did not yield adequate precision. Figure 5 shows the resulting execution time plotted against source file size. On these inputs the fully monadic parser averaged 25.0 Kbytes 3 http://www.cryptix.org/ 6 Monadic parser and scanner Monadic parser, pattern-matching scanner Execution time (seconds) 5 Avg. 25.0Kbps 4 3 Avg. 49.8Kbps 2 1 0 0 20000 40000 60000 80000 Source file size (bytes) 100000 120000 140000 Figure 5. Execution time versus input size per second with a standard deviation of 8.6 KB/s, while the hybrid parser averaged 49.8 KB/s with a standard deviation of 16 KB/s. In order to provide a legitimate performance comparison between packrat parsing and more traditional linear-time algorithms, I converted a freely available YACC grammar for Java [5] into a grammar for Happy4 , an LR parser generator for Haskell. Unfortunately, GHC was unable to compile the 230KB Haskell source file resulting from this grammar, even without optimization and on a machine with 1GB of RAM. (This difficulty incidentally lends credibility to the earlier suggestion that, in modern compilers, the temporary storage cost of a packrat parser is likely to be exceeded by the storage cost of subsequent stages.) Nevertheless, the generated LR parser worked under the Haskell interpreter Hugs.5 Therefore, to provide a rough performance comparison, I ran five of the larger Java sources through the LR and packrat parsers under Hugs using an 80MB heap. For fairness, I only compared the LR parser against the slower, fully monadic packrat parser, because the LR parser uses a monadic lexical analyzer derived from the latter packrat parser. The lexical analysis performance should therefore be comparable and only the parsing algorithm is of primary importance. Under Hugs, the LR parser consistently performs approximately twice the number of reductions and allocates 55% more total heap storage. (I could not find a way to profile live heap utilization under Hugs instead of total allocation.) The difference in real execution time varied widely however: the LR parser took almost twice as long on smaller files but performed about the same on the largest ones. One probable reason for this variance is the effects of garbage collection. Since a running packrat parser will naturally have a much higher ratio of live data to garbage than an LR parser over time, and garbage collection both increases in overhead cost and decreases in effectiveness (i.e., frees less space) when there is more live data, garbage collection is likely to penalize a packrat parser more than an LR parser as the size of the source file increases. Still, it is encouraging that the packrat parser was able to outperform the LR parser on all but the largest Java source files. 7 Related Work This section briefly relates packrat parsing to relevant prior work. For a more detailed analysis of packrat parsing in comparison with other algorithms please refer to my master’s thesis [9]. 4 http://www.haskell.org/happy 5 http://www.haskell.org/hugs Birman and Ullman [4] first developed the formal properties of deterministic parsing algorithms with backtracking. This work was refined by Aho and Ullman [3] and classified as “top-down limited backtrack parsing,” in reference to the restriction that each parsing function can produce at most one result and hence backtracking is localized. They showed this kind of parser, formally known as a Generalized Top-Down Parsing Language (GTDPL) parser, to be quite powerful. A GTDPL parser can simulate any push-down automaton and thus recognize any LL or LR language, and it can even recognize some languages that are not context free. Nevertheless, all “failures” such as those caused by left recursion can be detected and eliminated from a GTDPL grammar, ensuring that the algorithm is well-behaved. Birman and Ullman also pointed out the possibility of constructing linear-time GTDPL parsers through tabulation of results, but this linear-time algorithm was apparently never put into practice, no doubt because main memories were much more limited at the time and compilers had to operate as streaming “filters” that could run in near-constant space. Adams [1] recently resurrected GTDPL parsing as a component of a modular language prototyping framework, after recognizing its superior composability in comparison with LR algorithms. In addition, many practical top-down parsing libraries and toolkits, including the popular ANTLR [15] and the PARSEC combinator library for Haskell [13], provide similar limited backtracking capabilities which the parser designer can invoke selectively in order to overcome the limitations of predictive parsing. However, all of these parsers implement backtracking in the traditional recursive-descent fashion without memoization, creating the danger of exponential worst-case parse time, and thereby making it impractical to rely on backtracking as a substitute for prediction or to integrate lexical analysis with parsing. The only prior known linear-time parsing algorithm that effectively supports integrated lexical analysis, or “scannerless parsing,” is the NSLR(1) algorithm originally created by Tai [19] and put into practice for this purpose by Salomon and Cormack [18]. This algorithm extends the traditional LR class of algorithms by adding limited support for making lookahead decisions based on nonterminals. The relative power of packrat parsing with respect to NSLR(1) is unclear: packrat parsing is less restrictive of rightward lookahead, but NSLR(1) can also take leftward context into account. In practice, NSLR(1) is probably more space-efficient, but packrat parsing is simpler and cleaner. Other recent scannerless parsers [22, 21] forsake linear-time deterministic algorithms in favor of more general but slower ambiguity-tolerant CFG parsing. 8 Future Work While the results presented here demonstrate the power and practicality of packrat parsing, more experimentation is needed to evaluate its flexibility, performance, and space consumption on a wider variety of languages. For example, languages that rely extensively on parser state, such as C and C++, as well as layout-sensitive languages such as ML and Haskell, may prove more difficult for a packrat parser to handle efficiently. On the other hand, the syntax of a practical language is usually designed with a particular parsing technology in mind. For this reason, an equally compelling question is what new syntax design possibilities are created by the “free” unlimited lookahead and unrestricted grammar composition capabilities of packrat parsing. Section 3.2 suggested a few simple extensions that depend on integrated lexical analysis, but packrat parsing may be even more useful in languages with extensible syntax [7] where grammar composition flexibility is important. Although packrat parsing is simple enough to implement by hand in a lazy functional language, there would still be practical benefit in a grammar compiler along the lines of YACC in the C world or Happy [10] and Mı́mico [6] in the Haskell world. In addition to the parsing functions themselves, the grammar compiler could automatically generate the static “derivations” tuple type and the top-level recursive “tie-up” function, eliminating the problems of monadic representation discussed in Section 3.3. The compiler could also reduce iterative notations such as the popular ‘+’ and ‘*’ repetition operators into a low-level grammar that uses only primitive constant-time operations, preserving the linear parse time guarantee. Finally, the compiler could rewrite left-recursive rules to make it easier to express left-associative constructs in the grammar. One practical area in which packrat parsing may have difficulty and warrants further study is in parsing interactive streams. For example, the “read-eval-print” loops in language interpreters often expect the parser to detect at the end of each line whether or not more input is needed to finish the current statement, and this requirement violates the packrat algorithm’s assumption that the entire input stream is available up-front. A similar open question is under what conditions packrat parsing may be suitable for parsing infinite streams. 9 Conclusion Packrat parsing is a simple and elegant method of converting a backtracking recursive descent parser implemented in a non-strict functional programming language into a linear-time parser, without giving up the power of unlimited lookahead. The algorithm relies for its simplicity on the ability of non-strict functional languages to express recursive data structures with complex dependencies directly, and it relies on lazy evaluation for its practical efficiency. A packrat parser can recognize any language that conventional deterministic linear-time algorithms can and many that they can’t, providing better composition properties and allowing lexical analysis to be integrated with parsing. The primary limitations of the algorithm are that it only supports deterministic parsing, and its considerable (though asymptotically linear) storage requirements. Acknowledgments I wish to thank my advisor Frans Kaashoek, my colleagues Chuck Blake and Russ Cox, and the anonymous reviewers for many helpful comments and suggestions. 10 References [1] Stephen Robert Adams. Modular Grammars for Programming Language Prototyping. PhD thesis, University of Southampton, 1991. [2] Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986. [3] Alfred V. Aho and Jeffrey D. Ullman. The Theory of Parsing, Translation and Compiling - Vol. I: Parsing. Prentice Hall, Englewood Cliffs, N.J., 1972. [4] Alexander Birman and Jeffrey D. Ullman. Parsing algorithms with backtrack. Information and Control, 23(1):1–34, Aug 1973. [5] Dmitri Bronnikov. Free Yacc-able Java(tm) grammar, 1998. http://home.inreach.com/bronikov/grammars/java.html. [6] Carlos Camarão and Lucı́lia Figueiredo. A monadic combinator compiler compiler. In 5th Brazilian Symposium on Programming Languages, Curitiba – PR – Brazil, May 2001. Universidade Federal do Paraná. [7] Luca Cardelli, Florian Matthes, and Martı́n Abadi. Extensible syntax with lexical scoping. Technical Report 121, Digital Systems Research Center, 1994. [8] Jeroen Fokker. Functional parsers. In Advanced Functional Programming, pages 1–23, 1995. [9] Bryan Ford. Packrat parsing: a practical linear-time algorithm with backtracking. Master’s thesis, Massachusetts Institute of Technology, Sep 2002. [10] Andy Gill and Simon Marlow. Happy: The parser generator for Haskell. http://www.haskell.org/happy. [11] Graham Hutton and Erik Meijer. Monadic parsing in Haskell. Journal of Functional Programming, 8(4):437–444, Jul 1998. [12] Lillian Lee. Fast context-free grammar parsing requires fast boolean matrix multiplication. Journal of the ACM, 2002. To appear. [13] Daan Leijen. Parsec, a fast combinator parser. http://www.cs.uu.nl/˜daan. [14] Terence J. Parr and Russell W. Quong. Adding semantic and syntactic predicates to LL(k): pred-LL(k). In Computational Complexity, pages 263–277, 1994. [15] Terence J. Parr and Russell W. Quong. ANTLR: A predicatedLL(k) parser generator. Software Practice and Experience, 25(7):789–810, 1995. [16] Terence John Parr. Obtaining practical variants of LL(k) and LR(k) for k > 1 by splitting the atomic k-tuple. PhD thesis, Purdue University, Apr 1993. [17] Peter Pepper. LR parsing = grammar transformation + LL parsing: Making LR parsing more understandable and more efficient. Technical Report 99-5, TU Berlin, Apr 1999. [18] Daniel J. Salomon and Gordon V. Cormack. Scannerless NSLR(1) parsing of programming languages. In Proceedings of the ACM SIGPLAN’89 Conference on Programming Language Design and Implementation (PLDI), pages 170–178, Jul 1989. [19] Kuo-Chung Tai. Noncanonical SLR(1) grammars. ACM Transactions on Programming Languages and Systems, 1(2):295–320, Oct 1979. [20] Masaru Tomita. Efficient parsing for natural language. Kluwer Academic Publishers, 1985. [21] M.G.J. van den Brand, J. Scheerder, J.J. Vinju, and E. Visser. Disambiguation filters for scannerless generalized LR parsers. In Compiler Construction, 2002. [22] Eelco Visser. Scannerless generalized-LR parsing. Technical Report P9707, Programming Research Group, University of Amsterdam, 1997. [23] Philip Wadler. How to replace failure by a list of successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages. In Functional Programming Languages and Computer Architecture, pages 113– 128, 1985.
6cs.PL
Lambda-lifting and CPS conversion in an imperative language Gabriel Kerneis Juliusz Chroboczek Université Paris Diderot, PPS, Paris, France arXiv:1202.3247v1 [cs.PL] 15 Feb 2012 February 2012 Abstract This paper is a companion technical report to the article “Continuation-Passing C: from threads to events through continuations”. It contains the complete version of the proofs of correctness of lambda-lifting and CPS-conversion presented in the article. Contents 1 Introduction 2 2 Lambda-lifting in an imperative language 2.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Naive reduction rules . . . . . . . . . . . . . . . . . . . . 2.1.2 Lambda-lifting . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 Correctness condition . . . . . . . . . . . . . . . . . . . 2.2 Optimised reduction rules . . . . . . . . . . . . . . . . . . . . . 2.2.1 Minimal stores . . . . . . . . . . . . . . . . . . . . . . . 2.2.2 Compact closures . . . . . . . . . . . . . . . . . . . . . . 2.2.3 Optimised reduction rules . . . . . . . . . . . . . . . . . 2.3 Equivalence of optimised and naive reduction rules . . . . . . . 2.3.1 Optimised and intermediate reduction rules equivalence 2.3.2 Intermediate and naive reduction rules equivalence . . . 2.4 Correctness of lambda-lifting . . . . . . . . . . . . . . . . . . . 2.4.1 Strengthened hypotheses . . . . . . . . . . . . . . . . . . 2.4.2 Overview of the proof . . . . . . . . . . . . . . . . . . . 2.4.3 Rewriting lemmas . . . . . . . . . . . . . . . . . . . . . 2.4.4 Aliasing lemmas . . . . . . . . . . . . . . . . . . . . . . 2.4.5 Proof of correctness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 3 4 5 6 6 6 7 7 8 13 21 21 22 23 26 27 3 CPS conversion 3.1 CPS-convertible form . . . . . . . 3.2 Early evaluation . . . . . . . . . 3.3 Small-step reduction . . . . . . . 3.4 CPS terms . . . . . . . . . . . . . 3.5 Correctess of the CPS-conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 32 33 35 36 37 . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Introduction This paper is a companion technical report to the article “Continuation-Passing C: from threads to events through continuations” [4]. It contains the complete version of the proofs presented in the article. It does not, however, give any background or motivation for our work: please refer to the original article. 2 Lambda-lifting in an imperative language To prove the correctness of lambda-lifting in an imperative, call-by-value language when functions are called in tail position, we do not reason directly on CPC programs, because the semantics of C is too broad and complex for our purposes. The CPC translator leaves most parts of converted programs intact, transforming only control structures and function calls. Therefore, we define a simple language with restricted values, expressions and terms, that captures the features we are most interested in (Section 2.1). The reduction rules for this language (Section 2.1.1) use a simplified memory model without pointers and enforce that local variables are not accessed outside of their scope, as ensured by our boxing pass. This is necessary since lambda-lifting is not correct in general in the presence of extruded variables. It turns out that the “naive” reduction rules defined in Section 2.1.1 do not provide strong enough invariants to prove this correctness theorem by induction, mostly because we represent memory with a store that is not invariant with respect to lambda-lifting. Therefore, in Section 2.2, we define an equivalent, “optimised” set of reduction rules which enforces more regular stores and closures. The proof of correctness is then carried out in Section 2.4 using these optimised rules. We first define the invariants needed for the proof and formulate a strengthened version of the correctness theorem (Theorem 2.28, Section 2.4.1). A comprehensive overview of the proof is then given in Section 2.4.2. The proof is fully detailed in Section 2.4.5, with the help of a number of lemmas to keep the main proof shorter (Sections 2.4.3 and 2.4.4). The main limitation of this proof is that Theorems 2.9 and 2.28 are implications, not equivalences: we do not prove that if a term does not reduce, it will not reduce once lifted. For instance, this proof does not ensure that lambda-lifting does not break infinite loops. 2.1 Definitions In this section, we define the terms (Definition 2.1), the reduction rules (Section 2.1.1) and the lambda-lifting transformation itself (Section 2.1.2) for our small imperative language. With these preliminary definitions, we are then able to characterise liftable parameters (Definition 2.8) and state the main correctness theorem (Theorem 2.9, Section 2.1.3). Definition 2.1 (Values, expression and terms). Values are either boolean and integer constants or 1, a special value for functions returning void. v ::= 1 | true | false | n ∈ N Expressions are either values or variables. We deliberately omit arithmetic and boolean operators, with the sole concern of avoiding boring cases in the proofs. e ::= v | x | ... 2 Terms are consist of assignments, conditionals, sequences, recursive functions definitions and calls. T ::= e | x := T | if T then T else T | T ; T | letrec f (x1 . . . xn ) = T in T | f (T, . . . , T ) Our language focuses on the essential details affected by the transformations: recursive functions, conditionals and memory accesses. Loops, for instance, are ignored because they can be expressed in terms of recursive calls and conditional jumps — and that is, in fact, how the splitting pass translates them. Since lambda-lifting happens after the splitting pass, our language need to include inner functions (although they are not part of the C language), but it can safely exclude goto statements. 2.1.1 Naive reduction rules Environments and stores Handling inner functions requires explicit closures in the reduction rules. We need environments, written ρ, to bind variables to locations, and a store, written s, to bind locations to values. Environments and stores are partial functions, equipped with a single operator which extends and modifies a partial function: · + {· 7→ ·}. Definition 2.2. The modification (or extension) f ′ of a partial function f , written f ′ = f +{x 7→ y}, is defined as follows: ( y when t = x f ′ (t) = f (t) otherwise dom(f ′ ) = dom(f ) ∪ {x} Definition 2.3 (Environments of variables and functions). Environments of variables are defined inductively by ρ ::= ε | (x, l) · ρ, i.e. the empty domain function and ρ + {x 7→ l} (respectively). Environments of functions associate function names to closures: F : {f, g, h, . . . } → {[λx1 . . . xn .T, ρ, F ]}. Note that although we have a notion of locations, which correspond roughly to memory addresses in C, there is no way to copy, change or otherwise manipulate a location directly in the syntax of our language. This is on purpose, since adding this possibility would make lambdalifting incorrect: it translates the fact, ensured by the boxing pass in the CPC translator, that there are no extruded variables in the lifted terms. Reduction rules We use classical big-step reduction rules for our language (Figure 1, p. 4). In the (call) rule, we need to introduce fresh locations for the parameters of the called function. This means that we must choose locations that are not already in use, in particular in the environments ρ′ and F . To express this choice, we define two ancillary functions, Env and Loc, to extract the environments and locations contained in the closures of a given environment of functions F . 3 (val) ρ s v −−−→ v (var) s ρ x = l ∈ dom s ρ x s −−−→ s l s F ρ ′ a s −−−→ v s ρ ρ a −−−→ true (if-t.) s′ F b s′ ρ −−−→ v F ρ ′′ F ρ ′′ a ; b s −−−→ v ′ s F ρ ρ ′ b s −−−→ v ′ s F (seq) ′ x := a s −−−→ 1 s +{l7→v} s ′ a s −−−→ v s ρ x = l ∈ dom s′ F (assign) F F s′′ ρ s a −−−→ false ′ ρ ′′ c s −−−→ v s F ρ F (if-f.) ′′ if a then b else c s −−−→ v s s′ ′′ if a then b else c s −−−→ v s F F ρ ′ b s −−−− → vs ′ F (letrec) F ′ = F + {f 7→ [λx1 . . . xn .a, ρ, F ]} ρ ′ letrec f (x1 . . . xn ) = a in b s −−−→ v s F F f = [λx1 . . . xn .b, ρ′ , F ′ ] ∀i, aisi (call) ρ −−−→ F ρ′′ = (x1 , l1 ) · . . . · (xn , ln ) s vi i+1 b sn+1 +{li 7→vi } li fresh and distinct ρ′′ ·ρ′ ′ −−−− −−−−−−−→ v s ′ F +{f 7→F f } f (a1 . . . an ) s1 ρ −−−→ v s′ F Figure 1: “Naive” reduction rules Definition 2.4 (Set of environments, set of locations). [ Env(F ) = {ρ, ρ′ | [λx1 . . . xn .M, ρ, F ′ ] ∈ Im(F ), ρ′ ∈ Env(F ′ )} Loc(F ) = [ {Im(ρ) | ρ ∈ Env(F )} A location l is said to appear in F iff l ∈ Loc(F ). These functions allow us to define fresh locations. Definition 2.5 (Fresh location). In the (call) rule, a location is fresh when: – l∈ / dom(sn+1 ), i.e. l is not already used in the store before the body of f is evaluated, and – l doesn’t appear in F ′ + {f 7→ F f }, i.e. l will not interfere with locations captured in the environment of functions. Note that the second condition implies in particular that l does not appear in either F or ρ′ . 2.1.2 Lambda-lifting Lambda-lifting can be split into two parts: parameter lifting and block floating[2]. We will focus only on the first part here, since the second one is trivial. Parameter lifting consists in adding a free variable as a parameter of every inner function where it appears free. This step is repeated until every variable is bound in every function, and closed functions can safely be floated to top-level. Note that although the transformation is called lambda-lifting, we do not focus on a single function and try to lift all of its free variables; on the contrary, we define the lifting of a single free parameter x in every possible function. 4 Smart lambda-lifting algorithms strive to minimize the number of lifted variables. Such is not our concern in this proof: parameters are lifted in every function where they might potentially be free. Definition 2.6 (Parameter lifting in a term). Assume that x is defined as a parameter of a given function g, and that every inner function in g is called hi (for some i ∈ N). Also assume that function parameters are unique before lambda-lifting. Then the lifted form (M )∗ of the term M with respect to x is defined inductively as follows: (1)∗ = 1 (n)∗ = n (true)∗ = true (f alse)∗ = f alse (y)∗ = y and (y := a)∗ = y := (a)∗ (even if y = x) (a ; b)∗ = (a)∗ ; (b)∗ (if a then b else c)∗ = if (a)∗ then (b)∗ else (c)∗ ( letrec f (x1 . . . xn x) = (a)∗ in (b)∗ if f = hi (letrec f (x1 . . . xn ) = a in b)∗ = letrec f (x1 . . . xn ) = (a)∗ in (b)∗ otherwise ( f ((a1 )∗ , . . . , (an )∗ , x) if f = hi for some i (f (a1 . . . an ))∗ = f ((a1 )∗ , . . . , (an )∗ ) otherwise 2.1.3 Correctness condition We show that parameter lifting is correct for variables defined in functions whose inner functions are called exclusively in tail position. We call these variables liftable parameters. We first define tail positions as usual [1]: Definition 2.7 (Tail position). Tail positions are defined inductively as follows: 1. M and N are in tail position in if P then M else N . 2. N is in tail position in N and M ; N and letrec f (x1 . . . xn ) = M in N . A parameter x defined in a function g is liftable if every inner function in g is called exclusively in tail position. Definition 2.8 (Liftable parameter). A parameter x is liftable in M when: – x is defined as the parameter of a function g, – inner functions in g, named hi , are called exclusively in tail position in g or in one of the hi . Our main theorem states that performing parameter-lifting on a liftable parameter preserves the reduction: Theorem 2.9 (Correctness of lambda-lifting). If x is a liftable parameter in M , then ε ε ε ′ ∃t, M ε −−−→ v t implies ∃t′ , (M )∗ −−−→ v t . ε ε Note that the resulting store t′ changes because lambda-lifting introduces new variables, hence new locations in the store, and changes the values associated with lifted variables; Section 2.4 is devoted to the proof of this theorem. To maintain invariants during the proof, we need to use an equivalent, “optimised” set of reduction rules; it is introduced in the next section. 5 2.2 Optimised reduction rules The naive reduction rules (Section 2.1.1) are not well-suited to prove the correctness of lambdalifting. Indeed, the proof is by induction and requires a number of invariants on the structure of stores and environments. Rather than having a dozen of lemmas to ensure these invariants during the proof of correctness, we translate them as constraints in the reduction rules. To this end, we introduce two optimisations — minimal stores (Section 2.2.1) and compact closures (Section 2.2.2) — which lead to the definition of an optimised set of reduction rules (Figure 2, Section 2.2.3). The equivalence between optimised and naive reduction rules is shown in Section 2.3. 2.2.1 Minimal stores In the naive reduction rules, the store grows faster when reducing lifted terms, because each function call adds to the store as many locations as it has function parameters. This yields stores of different sizes when reducing the original and the lifted term, and that difference cannot be accounted for locally, at the rule level. Consider for instance the simplest possible case of lambda-lifting: letrec g(x) = (letrec h() = x in h()) in g(1) letrec g(x) = (letrec h(y) = y in h(x)) in g(1) (original) (lifted) At the end of the reduction, the store for the original term is {lx 7→ 1} whereas the store for the lifted term is {lx 7→ 1; ly 7→ 1}. More complex terms would yield even larger stores, with many out-of-date copies of lifted variables. To keep the store under control, we need to get rid of useless variables as soon as possible during the reduction. It is safe to remove a variable x from the store once we are certain that it will never be used again, i.e. as soon as the term in tail position in the function which defines x has been evaluated. This mechanism is analogous to the deallocation of a stack frame when a function returns. To track the variables whose location can be safely reclaimed after the reduction of some term M , we introduce split environments. Split environments are written ρT |ρ, where ρT is called the tail environment and ρ the non-tail one; only the variables belonging to the tail environment may be safely reclaimed. The reduction rules build environments so that a variable x belongs to ρT if and only if the term M is in tail position in the current function f and x is a parameter of f . In that case, it is safe to discard the locations associated to all of the parameters of f , including x, after M has been reduced because we are sure that the evaluation of f is completed (and there are no first-class functions in the language to keep references on variables beyond their scope of definition). We also define a cleaning operator, · \ ·, to remove a set of variables from the store. Definition 2.10 (Cleaning of a store). The store s cleaned with respect to the variables in ρ, written s \ ρ, is defined as s \ ρ = s|dom(s)\Im(ρ) . 2.2.2 Compact closures Another source of complexity with the naive reduction rules is the inclusion of useless variables in closures. It is safe to remove from the environments of variables contained in closures the variables that are also parameters of the function: when the function is called, and the environment restored, these variables will be hidden by the freshly instantiated parameters. 6 This is typically what happens to lifted parameters: they are free variables, captured in the closure when the function is defined, but these captured values will never be used since calling the function adds fresh parameters with the same names. We introduce compact closures in the optimised reduction rules to avoid dealing with this hiding mechanism in the proof of lambda-lifting. A compact closure is a closure that does not capture any variable which would be hidden when the closure is called because of function parameters having the same name. Definition 2.11 (Compact closure and environment). A closure [λx1 . . . xn .M, ρ, F ] is compact if ∀i, xi ∈ / dom(ρ) and F is compact. An environment is compact if it contains only compact closures. We define a canonical mapping from any environment F to a compact environment F∗ , restricting the domains of every closure in F . Definition 2.12 (Canonical compact environment). The canonical compact environment F∗ is the unique environment with the same domain as F such that 2.2.3 ∀f ∈ dom(F ), F f = [λx1 . . . xn .M, ρ, F ′ ]   implies F∗ f = λx1 . . . xn .M, ρ|dom(ρ)\{x1 ...xn } , F ′ ∗ . Optimised reduction rules Combining both optimisations yields the optimised reduction rules (Figure 2, p. 8), used Section 2.4 for the proof of lambda-lifting. We ensure minimal stores by cleaning them in the (val), (var) and (assign) rules, which correspond to tail positions; split environments are introduced in the (call) rule to distinguish fresh parameters, to be cleaned, from captured variables, which are preserved. Tail positions are tracked in every rule through split environments, to avoid cleaning variables too early, in a non-tail branch. We also build compact closures in the (letrec) rule by removing the parameters of f from the captured environment ρ′ . Theorem 2.13 (Equivalence between naive and optimised reduction rules). Optimised and naive reduction rules are equivalent: every reduction in one set of rules yields the same result in the other. It is necessary, however, to take care of locations left in the store by the naive reduction: ε|ε M ε ====⇒ v ε ε iff ε ∃s, M ε −−−→ v s ε We prove this theorem in Section 2.3. 2.3 Equivalence of optimised and naive reduction rules This section is devoted to the proof of equivalence between the optimised naive reduction rules (Theorem 2.13). To clarify the proof, we introduce intermediate reduction rules (Figure 3, p. 9), with only one of the two optimisations: minimal stores, but not compact closures. The proof then consists in proving that optimised and intermediate rules are equivalent (Lemma 2.15 and Lemma 2.16, Section 2.3.1), then that naive and intermediate rules are equivalent (Lemma 2.21 and Lemma 2.22, Section 2.3.2). Lemma 2.22 Lemma 2.15 Lemma 2.21 Lemma 2.16 Naive rules −========= − Intermediate rules −========= − Optimised rules 7 (val) (var) ρT |ρ s v =====⇒ v ρT · ρ x = l ∈ dom s ρT |ρ s\ρT x s =====⇒ s l s\ρT F s |ρT ·ρ a =====⇒ v s′ ρT · ρ x = l ∈ dom s F (assign) F ρT |ρ |ρT ·ρ s a =====⇒ true s′ b F (if-t.) s′ ρT |ρ =====⇒ v F ρT |ρ s if a then b else c =====⇒ v ρT |ρ ′′ F s′′ |ρT ·ρ s a =====⇒ false s′ ′ ρT |ρ ′′ c s =====⇒ v s F (if-f.) s′′ s F ρT |ρ ′′ if a then b else c =====⇒ v s F F ρT |ρ s b ====′=⇒ v s′ F ′ (letrec) ′′ F a ; b s =====⇒ v ′ s F |ρT ·ρ ρT |ρ ′ b s =====⇒ v ′ s F (seq) ′ x := a s =====⇒ 1 s +{l7→v}\ρT s ′ a =====⇒ v s ′ F ′ = F + {f 7→ [λx1 . . . xn .a, ρ′ , F ]} ρ = ρT · ρ|dom(ρT ·ρ)\{x1 ...xn } ρT |ρ ′ letrec f (x1 . . . xn ) = a in b s =====⇒ v s F F f = [λx1 . . . xn .b, ρ′ , F ′ ] ∀i, aisi (call) |ρT ·ρ =====⇒ F ρ′′ = (x1 , l1 ) · . . . · (xn , ln ) s vi i+1 b f (a1 . . . an ) sn+1 +{li 7→vi } li fresh and distinct ρ′′ |ρ′ ′ ==== =======⇒ v s ′ F +{f 7→F f } s1 ρT |ρ =====⇒ v s′ \ρT F Figure 2: Optimised reduction rules 2.3.1 Optimised and intermediate reduction rules equivalence In this section, we show that optimised and intermediate reduction rules are equivalent: Lemma 2.15 Intermediate rules −========= − Optimised rules Lemma 2.16 We must therefore show that it is correct to use compact closures in the optimised reduction rules. Compact closures carry the implicit idea that some variables can be safely discarded from the environments when we know for sure that they will be hidden. The following lemma formalises this intuition. Lemma 2.14 (Hidden variables elimination). ρT ·(x,l)|ρ ′ ∀l, l′ , M s ≡≡≡≡≡≡≡≡⇛ v s iff ′ ∀l, l′ , M s ========⇒ v s F ′ F F ρT ·(x,l)|ρ ρT ·(x,l)|(x,l′ )·ρ M s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s iff ρT ·(x,l)|(x,l′ )·ρ ′ M s ============⇒ v s F Moreover, both derivations have the same height. Proof. The exact same proof holds for both intermediate and optimised reduction rules. By induction on the structure of the derivation. The proof relies solely on the fact that ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ. 8 (val) (var) ρT |ρ ρT · ρ x = l ∈ dom s ρT |ρ v s ≡≡≡≡≡⇛ v s\ρT x s ≡≡≡≡≡⇛ s l s\ρT F |ρT ·ρ ′ a s ≡≡≡≡≡⇛ v s |ρT ·ρ ′′ a ; b s ≡≡≡≡≡⇛ v ′ s F F ′ ρT |ρ ′ |ρT ·ρ ′′ F F ρT |ρ ′ if a then b else c s ≡≡≡≡≡⇛ v s F ρT |ρ F ρT |ρ ′ b s ≡≡≡≡≡⇛ v s (letrec) F′ F ′ = F + {f 7→ [λx1 . . . xn .a, ρ, F ]} ρT |ρ ′ letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡⇛ v s F F f = [λx1 . . . xn .b, ρ′ , F ′ ] |ρT ·ρ ∀i, aisi ≡≡≡≡≡⇛ F (call) ρ′′ = (x1 , l1 ) · . . . · (xn , ln ) li fresh and distinct ρ′′ |ρ′ s vi i+1 ′ b sn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v s F ′ +{f 7→F ρT |ρ f} ′ f (a1 . . . an ) s1 ≡≡≡≡≡⇛ v s \ρT F Figure 3: Intermediate reduction rules (seq) ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ. So, |ρT ·(x,l)·(x,l′ )·ρ |ρT ·(x,l)·ρ ′ a s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s ′ iff a s ≡≡≡≡≡≡≡≡≡⇛ v s F F Moreover, by the induction hypotheses, ′ ρT ·(x,l)|(x,l′ )·ρ ′′ ′ b s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v ′ s ρT ·(x,l)|ρ ′′ iff b s ≡≡≡≡≡≡≡≡⇛ v ′ s F F Hence, ρT ·(x,l)|(x,l′ )·ρ ρT ·(x,l)|ρ ′′ a ; b s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v ′ s ′′ iff a ; b s ≡≡≡≡≡≡≡≡⇛ v ′ s F F The other cases are similar. ρT ·(x,l)|ρ (val) v s ≡≡≡≡≡≡≡≡⇛ v s\ρT ·(x,l) F (var) iff ρT ·(x,l)|(x,l′ )·ρ v s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s\ρT ·(x,l) F ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ so, with l′′ = ρT · (x, l) · ρ y, ρT ·(x,l)|ρ ′′ if a then b else c s ≡≡≡≡≡⇛ v s F ρ′ = ρT · ρ ′′ c s ≡≡≡≡≡⇛ v s F (if-f.) ′′ ρT |ρ ′ a s ≡≡≡≡≡⇛ false s b s ≡≡≡≡≡⇛ v s a s ≡≡≡≡≡⇛ true s (if-t.) ′′ F ρT |ρ ′ x := a s ≡≡≡≡≡⇛ 1 s +{l7→v}\ρT |ρT ·ρ ρT |ρ ′ b s ≡≡≡≡≡⇛ v ′ s F (seq) ρT |ρ ′ a s ≡≡≡≡≡⇛ v s ρT · ρ x = l ∈ dom s′ F (assign) F y s ≡≡≡≡≡≡≡≡⇛ s l′′ s\ρT ·(x,l) ρT ·(x,l)|(x,l′ )·ρ y s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ s l′′ s\ρT ·(x,l) iff F F 9 (assign) ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ. So, |ρT ·(x,l)·(x,l′ )·ρ |ρT ·(x,l)·ρ ′ ′ iff a s ≡≡≡≡≡≡≡≡≡⇛ v s a s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s F F Hence, with l′′ = ρT · (x, l) · ρ y, ρT ·(x,l)|ρ ′ y := a s ≡≡≡≡≡≡≡≡⇛ 1 s +{l ′′ 7→v}\ρT ·(x,l) F ρT ·(x,l)|(x,l′ )·ρ ′ y := a s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ 1 s +{l iff ′′ 7→v}\ρT ·(x,l) F (if-true) and (if-false) are proved similarly to (seq). (letrec) ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ = ρ′ . Moreover, by the induction hypotheses, ρT ·(x,l)|(x,l′ )·ρ ρT ·(x,l)|ρ ′ ′ iff b s ≡≡≡≡≡≡≡≡⇛ v s b s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s F′ F′ Hence, ρT ·(x,l)|(x,l′ )·ρ ′ letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s iff F ρT ·(x,l)|ρ ′ letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡≡≡≡⇛ v s F (call) ρT · (x, l) · ρ = ρT · (x, l) · (x, l′ ) · ρ. So, |ρT ·(x,l)·(x,l′ )·ρ |ρT ·(x,l)·ρ s s iff aisi ≡≡≡≡≡≡≡≡≡⇛ vi i+1 ∀i, aisi ≡≡≡≡≡≡≡≡≡≡≡≡⇛ vi i+1 F F Hence, ρT ·(x,l)|(x,l′ )·ρ ′ f (a1 . . . an ) s1 ≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s \ρT ·(x,l) iff ρT ·(x,l)|ρ ′ f (a1 . . . an ) s1 ≡≡≡≡≡≡≡≡⇛ v s \ρT ·(x,l) . F F Now we can show the required lemmas and prove the equivalence between the intermediate and optimised reduction rules. Lemma 2.15 (Intermediate implies optimised). ρT |ρ ρT |ρ ′ ′ If M s ≡≡≡≡≡⇛ v s then M s =====⇒ v s . F∗ F Proof. By induction on the structure of the derivation. The interesting cases are (letrec) and (call), where compact environments are respectively built and used. (letrec) By the induction hypotheses, ρT |ρ ′ b s ==== =⇒ v s ′ F ∗ Since we defined canonical compact environments so as to match exactly the way compact environments are built in the optimised reduction rules, the constraints of the (letrec) rule are fulfilled: F ′ ∗ = F∗ + {f 7→ [λx1 . . . xn .a, ρ′ , F∗ ]}, hence: ρT |ρ ′ letrec f (x1 . . . xn ) = a in b s =====⇒ v s F∗ 10 (call) By the induction hypotheses, |ρT ·ρ s ∀i, aisi =====⇒ vi i+1 F∗ and ρ′′ |ρ′ ′ b sn+1 +{li 7→vi } ====′=========⇒ v s (F +{f 7→F f })∗ Lemma 2.14 allows to remove hidden variables, which leads to ρ′′ |ρ′| dom(ρ′ )\{x ′ ...xn } ======1====⇒ v s b sn+1 +{li 7→vi } ====== ′ (F +{f 7→F f })∗ Besides, i h F∗ f = λx1 . . . xn .b, ρ′| dom(ρ′ )\{x1 ...xn } , F ′ ∗ and (F ′ + {f 7→ F f })∗ = F ′ ∗ + {f 7→ F∗ f } Hence ρT |ρ ′ f (a1 . . . an ) s1 =====⇒ v s \ρT . F∗ ρT |ρ (val) v s =====⇒ v s\ρT F∗ (var) ρT |ρ x s =====⇒ s l s\ρT F∗ |ρT ·ρ ′ (assign) By the induction hypotheses, a s =====⇒ v s . Hence, F∗ ρT |ρ ′ x := a s =====⇒ 1 s +{l7→v}\ρT F∗ (seq) By the induction hypotheses, |ρT ·ρ ′ ρT |ρ ′ a s =====⇒ v s ′′ b s =====⇒ v ′ s F∗ F∗ Hence, ρT |ρ ′′ a ; b s =====⇒ v ′ s F∗ (if-true) and (if-false) are proved similarly to (seq). Lemma 2.16 (Optimised implies intermediate). ρT |ρ ρT |ρ ′ ′ If M s =====⇒ v s then ∀G such that G∗ = F , M s ≡≡≡≡≡⇛ v s . F G Proof. First note that, since G∗ = F , F is necessarily compact. By induction on the structure of the derivation. The interesting cases are (letrec) and (call), where non-compact environments are respectively built and used. 11 (letrec) Let G such as G∗ = F . Remember that ρ′ = ρT · ρ|dom(ρT ·ρ)\{x1 ...xn } . Let G ′ = G + {f 7→ [λx1 . . . xn .a, ρT · ρ, F ]} which leads, since F is compact (F∗ = F ), to G ′ ∗ = F + {f 7→ [λx1 . . . xn .a, ρ′ , F ]} = F′ By the induction hypotheses, ρT |ρ ′ b s ≡≡≡≡≡⇛ v s G′ Hence, ρT |ρ ′ letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡⇛ v s G (call) Let G such as G∗ = F . By the induction hypotheses, |ρT ·ρ s ∀i, aisi ≡≡≡≡≡⇛ vi i+1 G Moreover, since G∗ f = F f , G f = [λx1 . . . xn .b, (xi , li ) · . . . · (xj , lj )ρ′ , G ′ ] where G ′ ∗ = F ′ , and the li are some locations stripped out when compacting G to get F . By the induction hypotheses, ρ′′ |ρ′ ′ b sn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v s G ′ +{f 7→G Lemma 2.14 leads to f} ρ′′ |(xi ,li )·...·(xj ,lj )ρ′ ′ b sn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡⇛ v s G ′ +{f 7→G f } Hence, ρT |ρ ′ f (a1 . . . an ) s1 ≡≡≡≡≡⇛ v s \ρT . G ρT |ρ ′ (val) ∀G such as G∗ = F , v s ≡≡≡≡≡⇛ v s G (var) ρT |ρ ∀G such as G∗ = F , x s ≡≡≡≡≡⇛ s l s\ρT G |ρT ·ρ ′ (assign) Let G such as G∗ = F . By the induction hypotheses, a s ≡≡≡≡≡⇛ v s . Hence, G ρT |ρ ′ x := a s ≡≡≡≡≡⇛ 1 s +{l7→v}\ρT G 12 (seq) Let G such as G∗ = F . By the induction hypotheses, |ρT ·ρ ′ ρT |ρ ′ ′′ a s ≡≡≡≡≡⇛ v s b s ≡≡≡≡≡⇛ v ′ s G G Hence ρT |ρ ′′ a ; b s ≡≡≡≡≡⇛ v ′ s G (if-true) and (if-false) are proved similarly to (seq). 2.3.2 Intermediate and naive reduction rules equivalence In this section, we show that the naive and intermediate reduction rules are equivalent: Lemma 2.22 Naive rules −========= − Intermediate rules Lemma 2.21 We must therefore show that it is correct to use minimal stores in the intermediate reduction rules. We first define a partial order on stores: Definition 2.17 (Store extension). s ⊑ s′ s′ |dom(s) = s iff Property 2.18. Store extension (⊑) is a partial order over stores. The following operations preserve this order: · \ ρ and · + {l 7→ v}, for some given ρ, l and v. Proof. Immediate when considering the stores as function graphs: ⊑ is the inclusion, · \ ρ a relative complement, and · + {l 7→ v} a disjoint union (preceded by · \ (l, v ′ ) when l is already bound to some v ′ ). Before we prove that using minimal stores is equivalent to using full stores, we need an alphaconversion lemma, which allows us to rename locations in the store, provided the new location does not already appear in the store or the environments. It is used when choosing a fresh location for the (call) rule in proofs by induction. ρT |ρ ′ Lemma 2.19 (Alpha-conversion). If M s ≡≡≡≡≡⇛ v s then, for all l, for all l′ appearing neither F in s nor in F nor in ρ · ρT , ′ ρT [l′ /l]|ρ[l′ /l] ′ ′ M s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s [l /l] . F [l′ /l] Moreover, both derivations have the same height. Proof. By induction on the height of the derivation. For the (call) case, we must ensure that the fresh locations li do not clash with l′ . In case they do, we conclude by applying the induction hypotheses twice: first to rename the clashing li into a fresh li′ , then to rename l into l′ . Two preliminary elementary remarks. First, provided l′ appears neither in ρ or ρT , nor in s, (s \ ρ)[l′ /l] = (s[l′ /l]) \ (ρ[l′ /l]) and (ρT · ρ)[l′ /l] = ρT [l′ /l] · ρ[l′ /l]. 13 ρT |ρ ′ Moreover, if M s ≡≡≡≡≡⇛ v s , then dom(s′ ) = dom(s) \ ρT (straightforward by induction). F This leads to: ρT = ε ⇒ dom(s′ ) = dom(s). By induction on the height of the derivation, because the induction hypothesis must be applied twice in the case of the (call) rule. (call) ∀i, dom(si ) = dom(si+1 ). Thus, ∀i, l′ ∈ / dom(si ). This leads, by the induction hypotheses, to s [l′ /l] ∀i, ai i |(ρT ·ρ)[l′ /l] s ≡≡≡≡≡≡≡≡≡⇛ vi i+1 [l′ /l] F [l′ /l] F Moreover , F ′ is part of F . As a result, since l′ does not appear in F , it does not appear in F ′ , nor in F ′ + {f 7→ F f }. It does not appear in ρ′ either (since ρ′ is part of F ′ ). On the other hand, there might be some j such that lj = l′ , so l′ might appear in ρ′′ . In that case, we apply the induction hypotheses a first time to rename lj in some lj′ 6= l′ . One can chose lj′ such that it does not appear in sn+1 , F ′ + {f 7→ F f } nor in ρ′′ · ρ. As a result, lj′ is fresh. Since lj is fresh too, and does not appear in dom(s′ ) (because of our preliminary remarks), this leads to a mere substitution in ρ′′ : ρ′′ [l′j /lj ]|ρ′ ′ ′ b sn+1 +{li [lj /lj ]7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v s F ′ +{f 7→F f} Once this (potentially) disturbing lj has been renamed (we ignore it in the rest of the proof), we apply the induction hypotheses a second time to rename l to l′ : ρ′′ [l′ /l]|ρ′ [l′ /l] ′ ′ ′ b (sn+1 +{li 7→vi })[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s [l /l] F ′ +{f 7→F f} Now, (sn+1 + {li 7→ vi })[l′ /l] = sn+1 [l′ /l] + {li 7→ vi }. Moreover, F [l′ /l] f = [λx1 . . . xn .b, ρ′ [l′ /l], F ′ [l′ /l]] and (F ′ + {f 7→ F f })[l′ /l] = F ′ [l′ /l] + {f 7→ F [l′ /l] f } Finally, ρ′′ [l′ /l] = ρ′′ . Hence: ρT [l′ /l]|ρ[l′ /l] ′ ′ ′ ′ f (a1 . . . an ) s1 [l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s [l /l]\ρT [l /l] . F [l′ /l] ′ ρT [l′ /l]|ρ[l′ /l] ′ ′ (val) v s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s[l /l]\ρT [l /l] F [l′ /] (var) s[l′ /l](ρT [l′ /l] · ρ[l′ /l] x) = s(ρT · ρ x) = v implies ′ ρT [l′ /l]|ρ[l′ /l] ′ ′ x s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s[l /l]\ρT [l /l] F [l′ /] 14 (assign) By the induction hypotheses, |(ρT ·ρ)[l′ /l] ′ ′ ′ a s[l /l] ≡≡≡≡≡≡≡≡≡⇛ v s [l /] F [l′ /] Let s′′ = s′ + {ρT · ρ x 7→ v}. Then, s′ [l′ /l] + {(ρT · ρ)[l′ /l] x 7→ v} = s′′ [l′ /l] Hence ρT [l′ /l]|ρ[l′ /l] ′ ′′ x := a s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ 1 s [l′ /l]\ρT [l′ /l] F [l′ /] (seq) By the induction hypotheses, |(ρT ·ρ)[l′ /l] ′ ′ ′ a s[l /l] ≡≡≡≡≡≡≡≡≡⇛ v s [l /l] F [l′ /] Besides, dom(s′ ) = dom(s), therefore l′ ∈ / dom(s′ ). Then, by the induction hypotheses, ′ ρT [l′ /l]|ρ[l′ /l] ′ ′′ b s [l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v ′ s [l′ /l] F [l′ /] Hence ′ ρT [l′ /l]|ρ[l′ /l] ′′ a ; b s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v ′ s [l′ /l] F [l′ /] (if-true) and (if-false) are proved similarly to (seq). (letrec) Since l′ appears neither in ρ′ nor in F , it does not appear in F ′ either. By the induction hypotheses, ρT [l′ /l]|ρ[l′ /l] ′ ′ ′ b s[l /l] ≡≡≡≡≡≡≡≡≡≡≡⇛ v s [l /l] F ′ [l′ /l] Moreover, F ′ [l′ /l] = F [l′ /l] + {f 7→ [λx1 . . . xn .a, ρ′ [l′ /l], F ]} Hence ρT [l′ /l]|ρ[l′ /l] ′ letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡≡≡≡≡≡≡⇛ v s F [l′ /] To prove that using minimal stores is correct, we need to extend them so as to recover the full stores of naive reduction. The following lemma shows that extending a store before an (intermediate) reduction extends the resulting store too: Lemma 2.20 (Extending a store in a derivation). ρT |ρ ρT |ρ ′ ′ Given the reduction M s ≡≡≡≡≡⇛ v s , then ∀t ⊒ s, ∃t′ ⊒ s′ , M t ≡≡≡≡≡⇛ v t . F F Moreover, both derivations have the same height. Proof. By induction on the height of the derivation. The most interesting case is (call), which requires alpha-converting a location (hence the induction on the height rather than the structure of the derivation). (var), (val) and (assign) are straightforward by the induction hypotheses and Property 2.18; (seq), (if-true), (if-false) and (letrec) are straightforward by the induction hypotheses. 15 (call) Let t1 ⊒ s1 . By the induction hypotheses, |ρT ·ρ ∃t2 ⊒ s2 , a1t1 ≡≡≡≡≡⇛ v1t2 F |ρT ·ρ t ∃ti+1 ⊒ si+1 , aiti ≡≡≡≡≡⇛ vi i+1 F |ρT ·ρ ∃tn+1 ⊒ sn+1 , antn ≡≡≡≡≡⇛ vntn+1 F The locations li might belong to dom(tn+1 ) and thus not be fresh. By alpha-conversion (Lemma 2.19), we chose fresh li′ (not in Im(ρ′ ) and dom(s′ )) such that (l′i ,vi )|ρ′ ′ ′ b sn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v s F ′ +{f 7→F By Property 2.18, tn+1 + {li′ 7→ vi } ⊒ sn+1 + {li′ f} 7→ vi }. By the induction hypotheses, (l′i ,vi )|ρ′ ′ ′ ∃t′ ⊒ s′ , b tn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v t F ′ +{f 7→F ′ f} ′ Moreover, t \ ρT ⊒ s \ ρT . Hence, ρT |ρ ′ f (a1 . . . an ) t1 ≡≡≡≡≡⇛ v t \ρT . F (var) ρT |ρ Let t ⊒ s. v t ≡≡≡≡≡⇛ v t\ρT and ∃t′ = t \ ρT ⊒ s \ ρT = s′ (Property 2.18). F ρT |ρ (val) Let t ⊒ s. x t ≡≡≡≡≡⇛ t l t\ρT and ∃t′ = t \ ρT ⊒ s \ ρT = s′ (Property 2.18). Moreover, F t l = s l because l ∈ dom(s) and t|dom(s) = s. (assign) Let t ⊒ s. By the induction hypotheses, |ρT ·ρ ′ ∃t′ ⊒ s′ , a t ≡≡≡≡≡⇛ v t F Hence, ρT |ρ ′ x := a t ≡≡≡≡≡⇛ 1 t +{l7→v}\ρT F concludes, since t′ + {l 7→ v} \ ρT ⊒ t′ + {l 7→ v} \ ρT (Property 2.18). (seq) Let t ⊒ s. By the induction hypotheses, |ρT ·ρ ′ ∃t′ ⊒ s′ , a t ≡≡≡≡≡⇛ v t F ′ ρT |ρ ′′ ∃t′′ ⊒ s′′ , b t ≡≡≡≡≡⇛ v ′ t F Hence, ρT |ρ ′′ ∃t′′ ⊒ s′′ , a ; b t ≡≡≡≡≡⇛ v ′ t F 16 (if-true) and (if-false) are proved similarly to (seq). (letrec) Let t ⊒ s. By the induction hypotheses, ρT |ρ ′ ∃t′ ⊒ s′ , b s ≡≡≡≡≡⇛ v s F′ Hence, ρT |ρ ′ ∃t′ ⊒ s′ , letrec f (x1 . . . xn ) = a in b s ≡≡≡≡≡⇛ v t F Now we can show the required lemmas and prove the equivalence between the intermediate and naive reduction rules. Lemma 2.21 (Intermediate implies naive). ρT |ρ ρT ·ρ ′ ′ If M s ≡≡≡≡≡⇛ v s then ∃t′ ⊒ s′ , M s −−−−−→ v t . F F Proof. By induction on the height of the derivation, because some stores are modified during the proof. The interesting cases are (seq) and (call), where Lemma 2.20 is used to extend intermediary stores. Other cases are straightforward by Property 2.18 and the induction hypotheses. (seq) By the induction hypotheses, ρ ′ ∃t′ ⊒ s′ , a s −−−→ v t . F Moreover, ρT |ρ ′ ′′ b s ≡≡≡≡≡⇛ v ′ s . F Since t′ ⊒ s′ , Lemma 2.20 leads to: ′ ρT |ρ ∃t ⊒ s′′ , b t ≡≡≡≡≡⇛ v ′ t F and the height of the derivation is preserved. By the induction hypotheses, ρ ′ ′′ ∃t′′ ⊒ t, b t −−−→ v ′ t F Hence, since ⊑ is transitive (Property 2.18), ρ ′′ ∃t′′ ⊒ s′′ , a ; b s −−−→ v ′ t . F (call) Similarly to the (seq) case, we apply the induction hypotheses and Lemma 2.20: ρ ∃t2 ⊒ s2 , a1s1 −−−→ v1t2 (Induction) F |ρT ·ρ t′ ∃t′i+1 ⊒ si+1 , aiti ≡≡≡≡≡⇛ vi i+1 (Lemma 2.20) F ρ t ∃ti+1 ⊒ t′i+1 ⊒ si+1 , aiti −−−→ vi i+1 F |ρT ·ρ t′ ∃t′n+1 ⊒ sn+1 , antn ≡≡≡≡≡⇛ vnn+1 (Induction) (Lemma 2.20) F ρ ∃tn+1 ⊒ t′n+1 ⊒ sn+1 , antn −−−→ vntn+1 F 17 (Induction) The locations li might belong to dom(tn+1 ) and thus not be fresh. By alpha-conversion (Lemma 2.19), we choose a set of fresh li′ (not in Im(ρ′ ) and dom(s′ )) such that (l′i ,vi )|ρ′ ′ ′ b sn+1 +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v s . F ′ +{f 7→F f } By Property 2.18, tn+1 + {li′ 7→ vi } ⊒ sn+1 + {li′ 7→ vi }. Lemma 2.20 leads to, ′ ∃t ⊒ s , b tn+1 +{l′i 7→vi } (l′i ,vi )|ρ′ ≡≡≡≡≡≡≡≡≡≡≡⇛ v t . F ′ +{f 7→F f } By the induction hypotheses, (l′ ,vi )·ρ′ ′ ′ −i−−−−−−→ v t . ∃t′ ⊒ t ⊒ s′ , b tn+1 +{li 7→vi } −−−− ′ F +{f 7→F f } Moreover, t′ \ ρT ⊒ s′ \ ρT . Hence, ρ ′ f (a1 . . . an ) s1 −−−→ v t \ρT . F ρ ′ (val) v s −−−→ v t with t′ = s ⊒ s \ ρT = s′ . F (var) ρ ′′ x s −−−→ s l s with t′ = s ⊒ s \ ρT = s′ . F (assign) By the induction hypotheses, ρ ′ ∃s′′ ⊒ s′ , a s −−−→ v t F Hence, ρ ′ x := a s −−−→ 1 t +{l7→v} F concludes since t′ + {l 7→ v} ⊒ s′ + {l 7→ v} (Property 2.18). (if-true) and (if-false) are proved similarly to (seq). (letrec) By the induction hypotheses, ρ ′ ∃t′ ⊒ s′ , b s −−−− → vs . ′ F Hence, ρ ′ ∃t′ ⊒ s′ , letrec f (x1 . . . xn ) = a in b s −−−→ v t . F The proof of the converse property — i.e. if a term reduces in the naive reduction rules, it reduces in the intermediate reduction rules too — is more complex because the naive reduction rules provide very weak invariants about stores and environments. For that reason, we add an hypothesis to ensure that every location appearing in the environments ρ, ρT and F also appears in the store s: Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(s). Moreover, since stores are often larger in the naive reduction rules than in the intermediate ones, we need to generalise the induction hypothesis. 18 Lemma 2.22 (Naive implies intermediate). Assume Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(s). Then, ′ ρT ·ρ M s −−−−−→ v s implies F ∀t ⊑ s such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t), ρT |ρ ′ M t ≡≡≡≡≡⇛ v s |dom(t)\Im(ρT ) . F Proof. By induction on the structure of the derivation. (val) Let t ⊑ s. Then t \ ρT = s|dom(t)\Im(ρT ) because s|dom(t) = t ′ because s′ = s = s |dom(t)\Im(ρT ) Hence, ρT |ρ v t ≡≡≡≡≡⇛ v t\ρT . F (var) Let t ⊑ s such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t). Note that l ∈ Im(ρT · ρ) ⊂ dom(t) implies t l = s l. Then, t \ ρT = s|dom(t)\Im(ρT ) = s′ |dom(t)\Im(ρT ) because s|dom(t) = t because s′ = s Hence, ρT |ρ x t ≡≡≡≡≡⇛ t l t\ρT . F (assign) Let t ⊑ s such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t). By the induction hypotheses, since Im(ε) = ∅, |ρT ·ρ ′ a t ≡≡≡≡≡⇛ v s |dom(t) F Note that l ∈ Im(ρT · ρ) ⊂ dom(t) implies l ∈ dom(s′ |dom(t) ). Then (s′ |dom(t) + {l 7→ v}) \ ρT = (s′ + {l 7→ v})|dom(t) \ ρT because l ∈ dom(s′ |dom(t) ) ′ = (s + {l 7→ v})|dom(t)\Im(ρT ) Hence, ρT |ρ ′ x := a s ≡≡≡≡≡⇛ 1 (s |dom(t) +{l7→v})\ρT . F (seq) Let t ⊑ s such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t). By the induction hypotheses, since Im(ε) = ∅, |ρT ·ρ ′ a t ≡≡≡≡≡⇛ v s |dom(t) F Moreover, s′ |dom(t) ⊑ s′ and Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(s′ |dom(t) ) = dom(t). By the induction hypotheses, this leads to: ′ ρT |ρ b s |dom(t) ≡≡≡≡≡⇛ v ′ s′′ |dom(s′ | dom(t) )\Im(ρT ) F 19 . Hence, with dom(s′ |dom(t) ) = dom(t), ρT |ρ ′′ a ; b t ≡≡≡≡≡⇛ v ′ s |dom(t)\Im(ρT ) . F (if-true) and (if-false) are proved similarly to (seq). (letrec) Let t ⊑ s such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t). Loc(F ′ ) = Loc(F ) ∪ Im(ρT · ρ) implies Im(ρT · ρ) ∪ Loc(F ′ ) ⊂ dom(t). Then, by the induction hypotheses, ρT |ρ ′ b t ≡≡≡≡≡⇛ v s |dom(t)\Im(ρT ) . F′ Hence, ρT |ρ ′ letrec f (x1 . . . xn ) = a in b t ≡≡≡≡≡⇛ v s |dom(t)\Im(ρT ) . F (call) Let t ⊑ s1 such that Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(t). Note the following equalities: s1 |dom(t) = t s2 |dom(t) ⊑ s2 Im(ρT · ρ) ∪ Loc(F ) ⊂ dom(s2 |dom(t) ) = dom(t) s3 |dom(s2 |dom(t) ) = s3 |dom(t) By the induction hypotheses, they yield: |ρT ·ρ s2 |dom(t) a1t ≡≡≡≡≡⇛ v1 F s2 |dom(t) a2 |ρT ·ρ s3 |dom(t) ≡≡≡≡≡⇛ v1 F si |dom(t) ∀i, ai |ρT ·ρ si+1 |dom(t) ≡≡≡≡≡⇛ vi F Moreover, sn+1 |dom(t) ⊑ sn+1 implies sn+1 |dom(t) + {li 7→ vi } ⊑ sn+1 + {li 7→ vi } (Property 2.18) and: Im(ρ′′ · ρ′ ) ∪ Loc(F ′ + {f 7→ F f }) = Im(ρ′′ ) ∪ (Im(ρ′ ) ∪ Loc(F ′ )) ⊂ {li } ∪ Loc(F ) ⊂ {li } ∪ dom(t) ⊂ dom(sn+1 |dom(t) + {li 7→ vi }) Then, by the induction hypotheses, ρ′′ |ρ′ b sn+1 |dom(t) +{li 7→vi } ≡≡≡≡≡≡≡≡≡≡≡⇛ v F ′ +{f 7→F f} 20 s′ |dom(sn+1 | ′′ dom(t) +{li 7→vi })\Im(ρ ) Finally, s′ |dom(sn+1 |dom(t) +{li 7→vi })\Im(ρ′′ ) \ ρT = s′ |dom(t)∪{li }\{li } \ ρT = s′ |dom(t) \ ρT = (s′ \ ρT )|dom(t)\Im(ρT ) (by definition of · \ ·) Hence, ρT |ρ ′ f (a1 . . . an ) t ≡≡≡≡≡⇛ v (s \ρT )|dom(t)\Im(ρT ) . F 2.4 Correctness of lambda-lifting In this section, we prove the correctness of lambda-lifting (Theorem 2.9, p. 5) by induction on the height of the optimised reduction. Section 2.4.1 defines stronger invariants and rewords the correctness theorem with them. Section 2.4.2 gives an overview of the proof. Sections 2.4.3 and 2.4.4 prove a few lemmas needed for the proof. Section 2.4.5 contains the actual proof of correctness. 2.4.1 Strengthened hypotheses We need strong induction hypotheses to ensure that key invariants about stores and environments hold at every step. For that purpose, we define aliasing-free environments, in which locations may not be referenced by more than one variable, and local positions. They yield a strengthened version of liftable parameters (Definition 2.25). We then define lifted environments (Definition 2.26) to mirror the effect of lambda-lifting in lifted terms captured in closures, and finally reformulate the correctness of lambda-lifting in Theorem 2.28 with hypotheses strong enough to be provable directly by induction. Definition 2.23 (Aliasing). A set of environments E is aliasing-free when: ∀ρ, ρ′ ∈ E, ∀x ∈ dom(ρ), ∀y ∈ dom(ρ′ ), ρ x = ρ′ y ⇒ x = y. By extension, an environment of functions F is aliasing-free when Env(F ) is aliasing-free. The notion of aliasing-free environments is not an artifact of our small language, but translates a fundamental property of the C semantics: distinct function parameters or local variables are always bound to distinct memory locations (Section 6.2.2, paragraph 6 in ISO/IEC 9899 [3]). A local position is any position in a term except inner functions. Local positions are used to distinguish functions defined directly in a term from deeper nested functions, because we need to enforce Invariant 3 (Definition 2.25) on the former only. Definition 2.24 (Local position). Local positions are defined inductively as follows: 1. M is in local position in M , x := M , M ; M , if M then M else M and f (M, . . . , M ). 2. N is in local position in letrec f (x1 . . . xn ) = M in N . We extend the notion of liftable parameter (Definition 2.8, p. 5) to enforce invariants on stores and environments. Definition 2.25 (Extended liftability). The parameter x is liftable in (M, F , ρT , ρ) when: 1. x is defined as the parameter of a function g, either in M or in F , 2. in both M and F , inner functions in g, named hi , are defined and called exclusively: (a) in tail position in g, or (b) in tail position in some hj (with possibly i = j), or 21 3. 4. 5. 6. (c) in tail position in M , for all f defined in local position in M , x ∈ dom(ρT · ρ) ⇔ ∃i, f = hi , moreover, if hi is called in tail position in M , then x ∈ dom(ρT ), in F , x appears necessarily and exclusively in the environments of the hi ’s closures, F contains only compact closures and Env(F ) ∪ {ρ, ρT } is aliasing-free. We also extend the definition of lambda-lifting (Definition 2.6, p. 5) to environments, in order to reflect changes in lambda-lifted parameters captured in closures. Definition 2.26 (Lifted form of an environment). If F f = [λx1 . . . xn .b, ρ′ , F ′ ] then (  ′ λx1 . . . xn x. (b)∗ , ρ |dom(ρ′ )\{x} , (F ′ )∗ (F )∗ f = [λx1 . . . xn . (b)∗ , ρ′ , (F ′ )∗ ] when f = hi for some i otherwise Lifted environments are defined such that a liftable parameter never appears in them. This property will be useful during the proof of correctness. Lemma 2.27. If x is a liftable parameter in (M, F , ρT , ρ), then x does not appear in (F )∗ . Proof. Since x is liftable in (M, F , ρT , ρ), it appears exclusively in the environments of hi . By definition, it is removed when building (F )∗ . These invariants and definitions lead to a correctness theorem with stronger hypotheses. Theorem 2.28 (Correctness of lambda-lifting). If x is a liftable parameter in (M, F , ρT , ρ), then ρT |ρ ρT |ρ ′ ′ M s =====⇒ v s implies (M )∗s =====⇒ v s F (F )∗ Since naive and optimised reductions rules are equivalent (Theorem 2.13, p. 7), the proof of Theorem 2.9 (p. 5) is a direct corollary of this theorem. Corollary 2.29. If x is a liftable parameter in M , then ε ε ε ′ ∃t, M ε −−−→ v t implies ∃t′ , (M )∗ −−−→ v t . ε 2.4.2 ε Overview of the proof With the enhanced liftability definition, we have invariants strong enough to perform a proof by induction of the correctness theorem. This proof is detailed in Section 2.4.5. The proof is not by structural induction but by induction on the height of the derivation. This is necessary because, even with the stronger invariants, we cannot apply the induction hypotheses directly to the premises in the case of the (call) rule: we have to change the stores and environments, which means rewriting the whole derivation tree, before using the induction hypotheses. To deal with this most difficult case, we distinguish between calling one of the lifted functions (f = hi ) and calling another function (either g, where x is defined, or any other function outside of g). Only the former requires rewriting; the latter follows directly from the induction hypotheses. In the (call) rule with f = hi , issues arise when reducing the body b of the lifted function. During this reduction, indeed, the store contains a new location l′ bound by the environment to the lifted variable x, but also contains the location l which contains the original value of x. Our 22 goal is to show that the reduction of b implies the reduction of (b)∗ , with store and environments fulfilling the constraints of the (call) rule. To obtain the reduction of the lifted body (b)∗ , we modify the reduction of b in a series of steps, using several lemmas: – the location l of the free variable x is moved to the tail environment (Lemma 2.30); – the resulting reduction meets the induction hypotheses, which we apply to obtain the reduction of the lifted body (b)∗ ; – however, this reduction does not meet the constraints of the optimised reduction rules because the location l is not fresh: we rename it to a fresh location l′ to hold the lifted variable (Lemma 2.31); – finally, since we renamed l to l′ , we need to reintroduce a location l to hold the original value of x (Lemmas 2.32 and 2.33). The rewriting lemmas used in the (call) case are shown in Section 2.4.3. For every other case, the proof consists in checking thoroughly that the induction hypotheses apply, in particular that x is liftable in the premises. These verifications consist in checking Invariants 3 to 6 of the extended liftability definition (Definition 2.25) — Invariants 1 and 2 are obvious enough not to be detailed. To keep the main proof as compact as possible, the most difficult cases of liftability, related to aliasing, are proven in some preliminary lemmas (Section 2.4.4). One last issue arises during the induction when one of the premises does not contain the lifted variable x. In that case, the invariants do not hold, since they assume the presence of x. But it turns out that in this very case, the lifting function is the identity (since there is no variable to lift) and lambda-lifting is trivially correct. 2.4.3 Rewriting lemmas Calling a lifted function has an impact on the resulting store: new locations are introduced for the lifted parameters and the earlier locations, which are not modified anymore, are hidden. Because of these changes, the induction hypotheses do not apply directly in the case of the (call) rule for a lifted function hi . We use the following four lemmas to obtain, through several rewriting steps, a reduction of lifted terms meeting the induction hypotheses. – Lemma 2.30 shows that moving a variable from the non-tail environment ρ to the tail environment ρT does not change the result, but restricts the domain of the store. It is used transform the original free variable x (in the non-tail environment) to its lifted copy (which is a parameter of hi , hence in the tail environment). – Lemma 2.31 handles alpha-conversion in stores and is used when choosing a fresh location. – Lemmas 2.32 and 2.33 finally add into the store and the environment a fresh location, bound to an arbitrary value. It is used to reintroduce the location containing the original value of x, after it has been alpha-converted to l′ . ρT |(x,l)·ρ ′ Lemma 2.30 (Switching to tail environment). If M s ========⇒ v s and x ∈ / dom(ρT ) then F ρT ·(x,l)|ρ ′ M s ========⇒ v s |dom(s′ )\{l} . Moreover, both derivations have the same height. F Proof. By induction on the structure of the derivation. For the (val), (var), (assign) and (call) cases, we use the fact that s \ ρT · (x, l) = s′ |dom(s′ )\{l} when s′ = s \ ρT . ρT ·(x,l)|ρ (val) v s ========⇒ v s\ρT ·(x,l) and s \ ρT · (x, l) = s′ |dom(s′ )\{l} with s′ = s \ ρT . F 23 (var) ρT ·(x,l)|ρ y s ========⇒ s l′ s\ρT ·(x,l) and s \ ρT · (x, l) = s′ |dom(s′ )\{l} , with l′ = ρT · (x, l) · ρ y and s ′ = s \ ρT . F |ρT ·(x,l)·ρ ρT ·(x,l)|ρ ′ ′ ′ (assign) By hypothesis, a s =========⇒ v s hence y := a s ========⇒ 1 s +{l 7→v}\ρT ·(x,l) and F F s′ + {l′ 7→ v} \ ρT · (x, l) = s′ |dom(s′ )\{l} with l′ = ρT · (x, l) · ρ y and s′ = s′ + {l′ 7→ v} \ ρT . |ρT ·(x,l)·ρ ′ ′ ρT ·(x,l)|ρ (seq) By hypothesis, a s =========⇒ v s and, by the induction hypotheses, b s ========⇒ ′′ vs F |dom(s′′ )\{l} F hence ρT ·(x,l)|ρ ′′ a ; b s ========⇒ v s |dom(s′′ )\{l} F . (if-true) and (if-false) are proved similarly to (seq). (letrec) By the induction hypotheses, ρT ·(x,l)|ρ ′ b s ====== ==⇒ v s |dom(s′ )\{l} ′ F hence ρT ·(x,l)|ρ ′ letrec f (x1 . . . xn ) = a in b s ========⇒ v s |dom(s′ )\{l} F (call) The hypotheses do not change, and the conclusion becomes: ρT ·(x,l)|ρ ′ f (a1 . . . an ) s1 ========⇒ v s \ρT ·(x,l) F as expected, since s′ \ ρT · (x, l) = s′′ |dom(s′′ )\{l} with s′′ = s′ \ ρT ρT |ρ ′ Lemma 2.31 (Alpha-conversion). If M s =====⇒ v s then, for all l, for all l′ appearing neither F in s nor in F nor in ρ · ρT , ′ ρT [l′ /l]|ρ[l′ /l] ′ ′ M s[l /l] ======= ====⇒ v s [l /l] ′ F [l /l] Moreover, both derivations have the same height. Proof. See Lemma 2.19, p. 2.19. ρT |ρ ′ Lemma 2.32 (Spurious location in store). If M s =====⇒ v s and k does not appear in either F ρT |ρ ′ s, F or ρT · ρ, then, for all value u, M s+{k7→u} =====⇒ v s +{k7→u} . Moreover, both derivations F have the same height. Proof. By induction on the height of the derivation. The key idea is to add (k, u) to every store in the derivation tree. A collision might occur in the (call) rule, if there is some j such that lj = k. In that case, we need to rename lj to some fresh variable lj′ 6= k (by alpha-conversion) before applying the induction hypotheses. 24 (call) By the induction hypotheses, s +{k7→u} ∀i, ai i |ρT ·ρ s =====⇒ vi i+1 +{k7→u} F Because k does not appear in F , k∈ / Loc(F ′ + {f 7→ F f }) ⊂ Loc(F ) For the same reason, it does not appear in ρ′ . On the other hand, there might be a j such that lj = k, so k might appear in ρ′′ . In that case, we rename lj in some fresh lj′ 6= k, appearing in neither sn+1 , nor F ′ or ρ′′ · ρ′ (Lemma 2.31). After this alpha-conversion, k does not appear in either ρ′′ · ρ′ , F ′ + {f 7→ F f }, or sn+1 + {li 7→ vi }. By the induction hypotheses, ρ′′ |ρ′ ′ b sn+1 +{li 7→vi }+{k7→u} ==== =======⇒ v s +{k7→u} ′ F +{f 7→F f } Moreover, s′ + {k 7→ u} \ ρT = s′ \ ρT + {k 7→ u} (since k does not appear in ρT ). Hence ρT |ρ ′ f (a1 . . . an ) s1 +{k7→u} =====⇒ v s +{k7→u}\ρT . F ρT |ρ (val) v s+{k7→u} =====⇒ v s+{k7→u}\ρT and s + {k 7→ u} \ ρT = s \ ρT + {k 7→ u} since k does not appear in ρT . (var) F ρT |ρ x s+{k7→u} =====⇒ (s + {k 7→ u}) l s+{k7→u}\ρT , with s + {k 7→ u} \ ρT = s \ ρT + {k 7→ u} F since k does not appear in ρT , and (s + {k 7→ u}) l = s l since k 6= l (k does not appear in s). |ρT ·ρ ′ (assign) By the induction hypotheses, a s+{k7→u} =====⇒ v s +{k7→u} . And k 6= l (since k does F not appear in s) then s′ + {k 7→ u} + {l 7→ v} = s′ + {l 7→ v} + {k 7→ u}. Moreover, k does not appear in ρT then s′ + {l 7→ v} + {k 7→ u} \ ρT = s′ + {l 7→ v} \ ρT + {k 7→ u}. Hence ρT |ρ ′ x := a s+{k7→u} =====⇒ 1 s +{l7→v}\ρT +{k7→u} F (seq) By the induction hypotheses, |ρT ·ρ ′ a s+{k7→u} =====⇒ true s +{k7→u} F ′ ρT |ρ ′′ b s +{k7→u} =====⇒ v ′ s +{k7→u} F Hence ρT |ρ ′′ a ; b s+{k7→u} =====⇒ v ′ s F (if-true) and (if-false) are proved similarly to (seq). 25 +{k7→u} (letrec) The location k does not appear in F ′ , because it does not appear in either F or ρ′ ⊂ ρT · ρ (F ′ = F + {f 7→ [λx1 . . . xn .a, ρ′ , F ]}). Then, by the induction hypotheses, ρT |ρ ′ b s+{k7→u} ====′=⇒ v s +{k7→u} F Hence ρT |ρ ′ letrec f (x1 . . . xn ) = a in b s+{k7→u} =====⇒ v s +{k7→u} . F Lemma 2.33 (Spurious variable in environments). ρT ·(x,l)|ρ ′ ∀l, l′ , M s ========⇒ v s F iff ρT ·(x,l)|(x,l′ )·ρ ′ M s ============⇒ v s F Moreover, both derivations have the same height. Proof. See Lemma 2.14, p. 2.14. 2.4.4 Aliasing lemmas We need three lemmas to show that environments remain aliasing-free during the proof by induction in Section 2.4.5. The first lemma states that concatenating two environments in an aliasing-free set yields an aliasing-free set. The other two prove that the aliasing invariant (Invariant 6, Definition 2.25) holds in the context of the (call) and (letrec) rules, respectively. Lemma 2.34 (Concatenation). If E ∪ {ρ, ρ′ } is aliasing-free then E ∪ {ρ · ρ′ } is aliasing-free. Proof. By exhaustive check of cases. We want to prove ∀ρ1 , ρ2 ∈ E ∪ {ρ · ρ′ }, ∀x ∈ dom(ρ1 ), ∀y ∈ dom(ρ2 ), ρ1 x = ρ2 y ⇒ x = y. given that ∀ρ1 , ρ2 ∈ E ∪ {ρ, ρ′ }, ∀x ∈ dom(ρ1 ), ∀y ∈ dom(ρ2 ), ρ1 x = ρ2 y ⇒ x = y. If ρ1 ∈ E and ρ2 ∈ E, immediate. If ρ1 ∈ {ρ · ρ′ }, ρ1 x = ρ x or ρ′ x. This is the same for ρ2 . Then ρ1 x = ρ2 y is equivalent to ρ x = ρ′ y (or some other combination, depending on x, y, ρ1 and ρ2 ) which leads to the expected result. Lemma 2.35 (Aliasing in (call) rule). Assume that, in a (call) rule, – F f = [λx1 . . . xn .b, ρ′ , F ′ ], – Env(F ) is aliasing-free, and – ρ′′ = (x1 , l1 ) · . . . · (xn , ln ), with fresh and distinct locations li . Then Env(F ′ + {f 7→ F f }) ∪ {ρ′ , ρ′′ } is also aliasing-free. Proof. Let E = Env(F ′ + {f 7→ F f }) ∪ {ρ′ }. We know that E ⊂ Env(F ) so E is aliasing-free We want to show that adding fresh and distinct locations from ρ′′ preserves this lack of freedom. More precisely, we want to show that ∀ρ1 , ρ2 ∈ E ∪ {ρ′′ }, ∀x ∈ dom(ρ1 ), ∀y ∈ dom(ρ2 ), ρ1 x = ρ2 y ⇒ x = y given that ∀ρ1 , ρ2 ∈ E, ∀x ∈ dom(ρ1 ), ∀y ∈ dom(ρ2 ), ρ1 x = ρ2 y ⇒ x = y. We reason by checking of all cases. If ρ1 ∈ E and ρ2 ∈ E, immediate. If ρ1 = ρ2 = ρ′′ then ρ′′ x = ρ′′ y ⇒ x = y holds because the locations of ρ′′ are distinct. If ρ1 = ρ′′ and ρ2 ∈ E then ρ1 x = ρ2 y ⇒ x = y holds because ρ1 x 6= ρ2 y (by freshness hypothesis). 26 Lemma 2.36 (Aliasing in (letrec) rule). If Env(F ) ∪ {ρ, ρT } is aliasing free, then, for all xi , Env(F ) ∪ {ρ, ρT } ∪ {ρT · ρ |dom(ρT ·ρ)\{x1 ...xn } } is aliasing free. Proof. Let E = Env(F ) ∪ {ρ, ρT } and ρ′′ = ρT · ρ|dom(ρT ·ρ)\{x1 ...xn } . Adding ρ′′ , a restricted concatenation of ρT and ρ, to E preserves aliasing freedom, as in the proof of Lemma 2.34. If ρ1 ∈ E and ρ2 ∈ E, immediate. If ρ1 ∈ {ρ′′ }, ρ1 x = ρ x or ρ′ x. This is the same for ρ2 . Then ρ1 x = ρ2 y is equivalent to ρ x = ρ′ y (or some other combination, depending on x, y, ρ1 and ρ2 ) which leads to the expected result. 2.4.5 Proof of correctness We finally show Theorem 2.28. Theorem 2.28. If x is a liftable parameter in (M, F , ρT , ρ), then ρT |ρ ′ s ρT |ρ ′ M s =====⇒ v s implies (M )∗ =====⇒ v s F (F )∗ Assume that x is a liftable parameter in (M, F , ρT , ρ). The proof is by induction on the height ρT |ρ ′ of the reduction of M s =====⇒ v s . To keep the proof readable, we detail only the non-trivial F cases when checking the invariants of Definition 2.25 to ensure that the induction hypotheses hold. (call) — first case First, we consider the most interesting case where there exists i such that f = hi . The variable x is a liftable parameter in (hi (a1 . . . an ), F , ρT , ρ) hence in (ai , F , ε, ρT · ρ) too. Indeed, the invariants of Definition 2.25 hold: – Invariant 3: By definition of a local position, every f defined in local position in ai is in local position in hi (a1 . . . an ), hence the expected property by the induction hypotheses. – Invariant 4: Immediate since the premise does not hold : since the ai are not in tail position in hi (a1 . . . an ), they cannot feature calls to hi (by Invariant 2). – Invariant 6: Lemma 2.34, p. 26. The other invariants hold trivially. By the induction hypotheses, we get (ai )∗ si |ρT ·ρ s =====⇒ vi i+1 . (F )∗ By definition of lifting, (hi (a1 . . . an ))∗ = hi ((a1 )∗ , . . . , (an )∗ , x). But x is not a liftable parameter in (b, F ′ , ρ′′ , ρ′ ) since the Invariant 4 might be broken: x ∈ / dom(ρ′′ ) (x is not a parameter of hi ) but hj might appear in tail position in b. On the other hand, we have x ∈ dom(ρ′ ): since, by hypothesis, x is a liftable parameter in (hi (a1 . . . an ), F , ρT , ρ), it appears necessarily in the environments of the closures of the hi , such as ρ′ . This allows us to split ρ′ into two parts: ρ′ = (x, l) · ρ′′′ . It is then possible to move (x, l) to the tail environment, according to Lemma 2.30: ρ′′ (x,l)|ρ′′′ ′ b sn+1 +{li 7→vi } ==== =======⇒ v s |dom(s′ )\{l} ′ F +{f 7→F f } This rewriting ensures that x is a liftable parameter in (b, F ′ + {f 7→ F f }, ρ′′ · (x, l), ρ′′′ ). Indeed, the invariants of Definition 2.25 hold: 27 – Invariant 3: Every function defined in local position in b is an inner function in hi so, by Invariant 2, it is one of the hi and x ∈ dom(ρ′′ · (x, l) · ρ′′′ ). – Invariant 4: Immediate since x ∈ dom(ρ′′ · (x, l) · ρ′′′ ). – Invariant 5: Immediate since F ′ is included in F . – Invariant 6: Immediate for the compact closures. Aliasing freedom is guaranteed by Lemma 2.35 (p. 26). The other invariants hold trivially. By the induction hypotheses, ρ′′ (x,l)|ρ′′′ ′ (b)∗sn+1 +{li 7→vi } ===== ========⇒ v s |dom(s′ )\{l} ′ (F +{f 7→F f })∗ The l location is not fresh: it must be rewritten into a fresh location, since x is now a parameter of hi . Let l′ be a location appearing in neither (F ′ + {f 7→ F f })∗ , nor sn+1 + {li 7→ vi } or ρ′′ · ρT ′ . Then l′ is a fresh location, which is to act as l in the reduction of (b)∗ . We will show that, after the reduction, l′ is not in the store (just like l before the lambdalifting). In the meantime, the value associated to l does not change (since l′ is modified instead of l). Lemma 2.27 implies that x does not appear in the environments of (F )∗ , so it does not appear in the environments of (F ′ + {f 7→ F f })∗ ⊂ (F )∗ either. As a consequence, lack of aliasing implies by Definition 2.23 that the label l, associated to x, does not appear in (F ′ + {f 7→ F f })∗ either, so (F ′ + {f 7→ F f })∗ [l′ /l] = (F ′ + {f 7→ F f })∗ . Moreover, l does not appear in s′ |dom(s′ )\{l} . By alpha-conversion (Lemma 2.31, since l′ does not appear in the store or the environments of the reduction, we rename l to l′ : s (b)∗ n+1 [l′ /l]+{li 7→vi } ρ′′ (x,l′ )|ρ′′′ ′ ===== ========⇒ v s |dom(s′ )\{l} . ′ (F +{f 7→F f })∗ We want now to reintroduce l. Let vx = sn+1 l. The location l does not appear in sn+1 [l′ /l] + {li 7→ vi }, (F ′ + {f 7→ F f })∗ , or ρ′′ (x, l′ ) · ρ′′′ . Thus, by Lemma 2.32, s (b)∗ n+1 [l′ /l]+{li 7→vi }+{l7→vx } ρ′′ (x,l′ )|ρ′′′ ′ ===== ========⇒ v s |dom(s′ )\{l} +{l7→vx } . ′ (F +{f 7→F f })∗ Since sn+1 [l′ /l] + {li 7→ vi } + {l 7→ vx } = sn+1 [l′ /l] + {l 7→ vx } + {li 7→ vi } = sn+1 + {l′ 7→ vx } + {li 7→ vi } = sn+1 + {li 7→ vi } + {l′ 7→ vx } because ∀i, l 6= li because vx = sn+1 l because ∀i, l′ 6= li and s′ |dom(s′ )\{l} + {l 7→ vx } = s′ + {l 7→ vx }, we finish the rewriting by Lemma 2.33, s (b)∗ n+1 +{li 7→vi }+{l′ 7→vx } ρ′′ (x,l′ )|(x,l)·ρ′′′ ====′=========⇒ v (F +{f 7→F f })∗ 28 s′ +{l7→vx } . Hence the result: (F )∗ hi = [λx1 . . . xn x. (b)∗ , ρ′ , (F ′ )∗ ] ρ = (x1 , l1 ) · . . . · (xn , ln )(x, ρT x) l′ and li fresh and distinct ′′ si ∀i, (ai )∗ (x)∗ (call) sn+1 |ρT ·ρ s =====⇒ vxsn+1 (b)∗ n+1 (F )∗ |ρT ·ρ s =====⇒ vi i+1 (F )∗ +{li 7→vi }+{l′ 7→vx } (hi (a1 . . . an ))∗ ρ′′ (x,l′ )|ρ′ ====′=========⇒ v s′ +{l7→vx } (F +{f 7→F f })∗ s1 ρT |ρ =====⇒ v s′ +{l7→vx }\ρT (F )∗ Since l ∈ dom(ρT ) (because x is a liftable parameter in (hi (a1 . . . an ), F , ρT , ρ)), the extraneous location is reclaimed as expected: s′ + {l 7→ vx } \ ρT = s′ \ ρT . (call) — second case We now consider the case where f is not one of the hi . The variable x is a liftable parameter in (f (a1 . . . an ), F , ρT , ρ) hence in (ai , F , ε, ρT · ρ) too. Indeed, the invariants of Definition 2.25 hold: – Invariant 3: By definition of a local position, every f defined in local position in ai is in local position in f (a1 . . . an ), hence the expected property by the induction hypotheses. – Invariant 4: Immediate since the premise does not hold : the ai are not in tail position in f (a1 . . . an ) so they cannot feature calls to hi (by Invariant 2:). – Invariant 6: Lemma 2.34, p. 26. The other invariants hold trivially. By the induction hypotheses, we get (ai )∗ si |ρT ·ρ s =====⇒ vi i+1 , (F )∗ and, by Definition 2.6, (f (a1 . . . an ))∗ = f ((a1 )∗ , . . . , (an )∗ ). If x is not defined in b or F , then ()∗ is the identity function and can trivially be applied to the reduction of b. Otherwise, x is a liftable parameter in (b, F ′ + {f 7→ F f }, ρ′′ , ρ′ ). Indeed, the invariants of Definition 2.25 hold. Assume that x is defined as a parameter of some function g, in either b or F : – Invariant 3: We have to distinguish the cases where f = g (with x ∈ dom(ρ′′ )) and f 6= g (with x ∈ / dom(ρ′′ ) and x ∈ / dom(ρ′ )). In both cases, the result is immediate by the induction hypotheses. – Invariant 4: If f 6= g, the premise cannot hold (by the induction hypotheses, Invariant 2). If f = g, x ∈ dom(ρ′′ ) (by the induction hypotheses, Invariant 2). – Invariant 5: Immediate since F ′ is included in F . – Invariant 6: Immediate for the compact closures. Aliasing freedom is guaranteed by Lemma 2.35 (p. 26). The other invariants hold trivially. By the induction hypotheses, s (b)∗ n+1 +{li 7→vi } ρ′′ |ρ′ ′ ====′=========⇒ v s (F +{f 7→F f })∗ 29 hence: (F )∗ f = [λx1 . . . xn . (b)∗ , ρ′ , (F ′ )∗ ] ∀i, (ai )∗ (call) si |ρT ·ρ =====⇒ (F )∗ ρ′′ = (x1 , l1 ) · . . . · (xn , ln ) s vi i+1 s +{l 7→v } (b)∗ n+1 i i ρT |ρ li fresh and distinct ρ′′ |ρ′ ′ ====′=========⇒ v s (F +{f 7→F f })∗ ′ (f (a1 . . . an ))∗ s1 =====⇒ v s \ρT (F )∗ (letrec) The parameter x is a liftable in (letrec f (x1 . . . xn ) = a in b, F , ρT , ρ) so x is a liftable parameter in (b, F ′ , ρT , ρ) too. Indeed, the invariants of Definition 2.25 hold: – Invariants 3 and 4: Immediate by the induction hypotheses and definition of tail and local positions. – Invariant 5: By the induction hypotheses, Invariant 3 (x is to appear in the new closure if and only if f = hi ). – Invariant 6: Lemma 2.36 (p. 27). The other invariants hold trivially. By the induction hypotheses, we get s ρT |ρ ′ (b)∗ ====′==⇒ v s . (F )∗ If f 6= hi , (letrec f (x1 . . . xn ) = a in b)∗ = letrec f (x1 . . . xn ) = (a)∗ in (b)∗ hence, by definition of (F ′ )∗ , s ρT |ρ ′ (b)∗ ====′==⇒ v s (letrec) ρ′ = ρT · ρ|dom(ρT ·ρ)\{x1 ...xn } (F )∗ (F ′ )∗ = (F )∗ +{f 7→ [λx1 . . . xn . (a)∗ , ρ′ , F ]} s ρT |ρ ′ (letrec f (x1 . . . xn ) = a in b)∗ =====⇒ v s (F )∗ On the other hand, if f = hi , (letrec f (x1 . . . xn ) = a in b)∗ = letrec f (x1 . . . xn x) = (a)∗ in (b)∗ hence, by definition of (F ′ )∗ , s ρT |ρ ′ (b)∗ ====′==⇒ v s (letrec) ρ′ = ρT · ρ|dom(ρT ·ρ)\{x1 ...xn x} (F )∗ (F ′ )∗ = (F )∗ +{hi 7→ [λx1 . . . xn x. (a)∗ , ρ′ , F ]} ρT |ρ (F )∗ (val) (v)∗ = v so ′ (letrec hi (x1 . . . xn ) = a in b)∗ s =====⇒ v s (val) s ρT |ρ (v)∗ =====⇒ v s\ρT (F )∗ 30 (var) (y)∗ = y so (var) ρT · ρ y = l ∈ dom s ρT |ρ s (y)∗ =====⇒ s l s\ρT (F )∗ (assign) The parameter x is liftable in (y := a, F , ρT , ρ) so in (a, F , ε, ρT · ρ) too. Indeed, the invariants of Definition 2.25 hold: – Invariant 6: Lemma 2.34, p. 26. The other invariants hold trivially. By the induction hypotheses, we get |ρT ·ρ ′ (a)∗ s =====⇒ v s . (F )∗ Moreover (y := a)∗ = y := (a)∗ , so : |ρT ·ρ ′ (a)∗ s =====⇒ v s (assign) ρT · ρ y = l ∈ dom s′ (F )∗ ρT |ρ ′ s (y := a)∗ =====⇒ 1 s +{l7→v}\ρT (F )∗ (seq) The parameter x is liftable in (a ; b, F , ρT , ρ). If x is not defined in a or F , then ()∗ is the identity function and can trivially be applied to the reduction of a. Otherwise, x is a liftable parameter in (a, F , ε, ρT · ρ). Indeed, the invariants of Definition 2.25 hold: – Invariant 6: Lemma 2.34, p. 26. The other invariants hold trivially. If x is not defined in b or F , then ()∗ is the identity function and can trivially be applied to the reduction of b. Otherwise, x is a liftable parameter in (b, F , ρT , ρ). Indeed, the invariants of Definition 2.25 hold trivially. s |ρT ·ρ ′ By the induction hypotheses, we get (a)∗ =====⇒ v s and (b)∗ s′ (F )∗ Moreover, (a ; b)∗ = (a)∗ ; (b)∗ , hence: s |ρT ·ρ ′ (a)∗ =====⇒ v s (seq) (b)∗ (F )∗ s s′ ρT |ρ ρT |ρ (F )∗ ′′ (a ; b)∗ =====⇒ v ′ s (F )∗ (if-true) and (if-false) are proved similarly to (seq). 31 ′′ =====⇒ v ′ s ρT |ρ ′′ =====⇒ v ′ s . (F )∗ 3 CPS conversion In this section, we prove the correctness of the CPS-conversion performed by the CPC translator. This conversion is defined only on a subset of C programs that we call CPS-convertible terms (Section 3.1). We first show that the early evaluation of function parameters in CPS-convertible terms is correct (Section 3.2). To simplify the proof of correctness of CPS-conversion, we then introduce small-step reduction rules featuring contexts and early evaluation (Section 3.3). In Section 3.4, we define CPS terms, with the push and invoke operators to build and execute continuations, and the associated reduction rules. Since the syntax of CPS-terms does not ensure a correct reduction, we also define well-formed CPS-terms, which are the image of CPS-convertible terms by CPS-conversion. The proof of correctness of CPS-conversion is finally carried out in Section 3.5. It consists merely in checking that the reduction rules for CPS-convertible terms and well-formed CPS-terms execute in lock-step. 3.1 CPS-convertible form CPS conversion is not defined for every C function; instead, we restrict ourselves to a subset of functions, which we call the CPS-convertible subset. The CPS-convertible form restricts the calls to cps functions to make it straightforward to capture their continuation. In CPS-convertible form, a call to a cps function f is either in tail position, or followed by a tail call to another cps function whose parameters are non-shared variables that cannot be modified by f. In the C language, we define the CPS-convertible form as follows: Definition 3.1 (CPS-convertible form). A function h is in CPS-convertible form if every call to a cps function that it contains matches one of the following patterns, where both f and g are cps functions, e1 , ..., en are any C expressions and x, y1 , ..., yn are distinct, non-shared variables: return f(e1 , ..., en ); (1) x = f(e1 , ..., en ); return g(x, y1 , ..., yn ); f(e1 , ..., en ); return g(x, y1 , ..., yn ); (2) (3) f(e1 , ..., en ); return; f(e1 , ..., en ); g(x, y1 , ..., yn ); return; (4) (5) x = f(e1 , ..., en ); g(x, y1 , ..., yn ); return; (6) Note the use of return to explicitly mark calls in tail position. The forms (3) to (6) are only necessary to handle the cases where f and g return void; in the rest of the proof, we ignore these cases that are a syntactical detail of the C language, and focus on the essential cases (1) and (2). To prove the correctness of CPS-conversion, we need to express this definition in our small imperative language. This is done by defining CPS-convertible terms, which are a subset of the terms introduced in Definition 2.1 (Section 2.1). A program in CPS-convertible form consists of a set of mutually-recursive functions with no free variables, the body of each of which is a CPS-convertible term. A CPS-convertible term has two parts: the head and the tail. The head is a (possibly empty) sequence of assignments, possibly embedded within conditional statements. The tail is a (possibly empty) sequence of function calls in a highly restricted form: their parameters are (side-effect free) expressions, except possibly for the last one, which can be another function call of the same form. Values and expressions are left unchanged. 32 Definition 3.2 (CPS-convertible terms). v ::= 1 | true | false | n ∈ N expr ::= v | x | . . . F ::=f (expr, . . . , expr) | f (expr, . . . , expr, F ) Q ::=ǫ | Q ; F T ::= expr | x := expr ; T | if e then T else T | Q (values) (expressions) (nested function calls) (tail) (head) The essential property of CPS-convertible terms, which makes their CPS conversion immediate to perform, is the guarantee that there is no cps call outside of the tails. It makes continuations easy to represent as a series of function calls (tails) and separates them clearly from imperative blocks (heads), which are not modified by the CPC translator. The tails are a generalisation of Definition 3.1, which will be useful for the proof of correctness of CPS-conversion. Note that x = f(e1 , ..., en ); return g(x, y1 , ..., yn ) is represented by g(f (e1 . . . en ), y1 . . . yn ): this translation is correct because, contrary to C, our language guarantees a left-to-right evaluation of function parameters. Also noteworthy are the facts that: – there is no letrec construct anymore since every function is defined at top-level, – assignments, conditions and function parameters of f are restricted to expressions, to ensure that function calls only appear in tail position, – there is no need to forbid shared variables in the parameters of g because they are ruled out of our language by design. 3.2 Early evaluation In this section, we prove that correctness of early evaluation, ie. evaluating the expressions expr before F when reducing f (expr, . . . , expr, F ) in a tail. This result is necessary to show the correctness of the CPS-conversion, because function parameters are evaluated before any function call when building continuations. The reduction rules may be simplified somewhat for CPS-convertible terms. We do not need to keep an explicit environment of functions since there are no inner functions any more; for the same reason, the (letrec) rule disappears. Instead, we use a constant environment F holding every function used in the reduced term M . To account for the absence of free variables, the closures in F need not carry an environment. As a result, in the (call) rule, ρ′ = ε and F ′ = F . Early evaluation is correct for lifted terms because a lifted term can never modify the variables that are not in its environment, since it cannot access them through closures. Lemma 3.3. Let M be a lambda-lifted term. Then, ρ ′ M s −−−→ v s F implies s|dom(s)\Im(ρ) = s′ |dom(s)\Im(ρ) . Proof. By induction on the structure of the reduction. The key points are the use of ρ′ = ε in the (call) case, and the absence of (letrec) rules. (val) and (var) Trivial (s = s′ ). 33 (assign) By the induction hypotheses, s|dom(s)\Im(ρ) = s′ |dom(s)\Im(ρ) and l ∈ Im(ρ), hence s|dom(s)\Im(ρ) = (s′ + {l 7→ v})|dom(s)\Im(ρ) . (seq) By the induction hypotheses, s|dom(s)\Im(ρ) = s′ |dom(s)\Im(ρ) and s′ |dom(s′ )\Im(ρ) = s′′ |dom(s′ )\Im(ρ) . Since, dom(s) ⊂ dom(s′ ), the second equality can be restricted to s′ |dom(s)\Im(ρ) = s′′ |dom(s)\Im(ρ) . Hence, s|dom(s)\Im(ρ) = s′′ |dom(s)\Im(ρ) . (if-true) and (if-false) are proved similarly to (seq). (letrec) doesn’t occur since M is lambda-lifted. (call) By the induction hypotheses, (sn+1 + {li 7→ vi })|dom(sn+1 +{li 7→vi })\Im(ρ′′ ·ρ′ ) = s′ |dom(sn+1 +{li 7→vi })\Im(ρ′′ ·ρ′ ) Since ρ′ = ε, Im(ρ′′ ) = {li } and dom(sn+1 ) ∩ {li } = ∅ (by freshness), (sn+1 + {li 7→ vi })|dom(sn+1 ) = s′ |dom(sn+1 ) so sn+1 = s′ |dom(sn+1 ) . Since dom(s) \ Im(ρ) ⊂ dom(s) ⊂ dom(sn+1 ), sn+1 |dom(s)\Im(ρ) = s′ |dom(s)\Im(ρ) . Finally, we can prove similarly to the (seq) case that s|dom(s)\Im(ρ) = sn+1 |dom(s)\Im(ρ) . Hence, s|dom(s)\Im(ρ) = s′ |dom(s)\Im(ρ) . As a consequence, a tail of function calls cannot modify the current store, only extend it with the parameters of the called functions. Corollary 3.4. For every tail Q, ρ ′ Q s −−−→ v s implies s ⊑ s′ . F 34 Proof. We prove the corollary by induction on the structure of a tail. First remember that store extension (written ⊑) is a partial order over stores (Property 2.18), defined in Section 2.3.2 as follows: s ⊑ s′ iff s′ |dom(s) = s. The case ǫ is trivial. The case Q ; F is immediate by induction ((seq) rule), since ⊑ is transitive. Similarly, it is pretty clear that f (expr, . . . , expr, F ) follows by induction and transitivity from f (expr, . . . , expr) ((call) rule). We focus on this last case. Lemma 3.3 implies: (sn+1 + {li 7→ vi })|dom(sn+1 +{li 7→vi })\Im(ρ′′ ·ρ′ ) = s′ |dom(sn+1 +{li 7→vi })\Im(ρ′′ ·ρ′ ) . Since ρ′ = ε, Im(ρ′′ ) = {li } and dom(sn+1 ) ∩ {li } = ∅ (by freshness), (sn+1 + {li 7→ vi })|dom(sn+1 ) = s′ |dom(sn+1 ) so sn+1 = s′ |dom(sn+1 ) . The evaluation of expr parameters do not change the store: sn+1 = s. The expected result follows: s = s′ |dom(s) , hence s ⊑ s′ . This leads to the correctness of early evaluation. ρ ′ ρ ′ Theorem 3.5 (Early evaluation). For every tail Q, Q s −−−→ v s implies Q[x\s(ρ x)] s −−−→ v s F F (provided x ∈ dom(ρ) and ρ x ∈ dom(s)). Proof. Immediate induction on the structure of tails and expressions: Corollary 3.4 implies that s ⊑ s′′ and ρ x ∈ dom(s) ensures that s(ρ x) = s′′ (ρ x) in the relevant cases (namely the (seq) rule for Q ; F and the (call) rule for f (expr, . . . , expr, F )). 3.3 Small-step reduction We define the semantics of CPS-convertible terms through a set of small-step reduction rules. We distinguish three kinds of reductions: →T to reduce the head of terms, →Q to reduce the tail, and →e to evaluate expressions. These rules describe a stack machine with a store σ to keep the value of variables. Since free and shared variables have been eliminated in earlier passes, there is a direct correspondence at any point in the program between variable names and locations, with no need to dynamically maintain an extra environment. We use contexts as a compact representation for stacks. The head rules →T reduce triples made of a term, a context and a store: hT, C[ ], σi. The tail rules →Q , which merely unfold tails with no need of a store, reduce couples of a tail and a context: hQ, C[ ], i. The expression rules do not need context to reduce, thus operating on couples made of an expression and a store: he, σi. Contexts Contexts are sequences of function calls. In those sequences, function parameters shall be already evaluated: constant expressions are allowed, but not variables. As a special case, the last parameter might be a “hole” instead, written ⊖, to be filled with the return value of the next, nested function. Definition 3.6 (Contexts). Contexts are defined inductively: C ::= [ ] | C[[ ] ; f (v, . . . , v)] | C[[ ] ; f (v, . . . , v, ⊖)] 35 Definition 3.7 (CPS-convertible reduction rules). hx := expr ; T, C[ ], σi →T hT, C[ ], σ[x 7→ v]i when hexpr, σi hif expr then T1 else T2 , C[ ], σi →T hT1 , C[ ], σi →⋆e when hexpr, σi hif expr then T1 else T2 , C[ ], σi →T hT2 , C[ ], σi →⋆e when hexpr, σi →⋆e (7) v (8) true (9) false hexpr, C[[ ] ; f (v1 , . . . , vn )], σi →T hǫ, C[[ ] ; f (v1 , . . . , vn )]i hexpr, C[[ ] ; f (v1 , . . . , vn , ⊖)], σi →T hǫ, C[[ ] ; f (v1 , . . . , vn , v)]i (10) (11) when hexpr, σi →⋆e v hexpr, [ ], σi →T v when hexpr, σi →⋆e v hQ, C[ ], σi →T hQ[xi \ σ xi ], C[ ]i for every xi in dom(σ) hQ ; f (v1 , . . . , vn ), C[ ]i →Q hQ, C[[ ] ; f (v1 , . . . , vn )]i hQ ; f (v1 , . . . , vn , F ), C[ ]i →Q hQ ; F, C[[ ] ; f (v1 , . . . , vn , ⊖)]i hǫ, C[[ ] ; f (v1 , . . . , vn )]i →Q hT, C[ ], σi (12) (13) (14) (15) when f (x1 , . . . , xn ) = T and σ = {xi 7→ vi } We do not detail the rules for →e , which simply looks for variables in σ and evaluates arithmetical and boolean operators. Early evaluation Note that Rule 12 evaluates every function parameter in a tail before the evaluation of the tail itself. This is precisely the early evaluation process described above, which is correct by Theorem 3.5. We introduce early evaluation directly in the reduction rules rather than using it as a lemma to simplify the proof of correctess of the CPS-conversion. 3.4 CPS terms Unlike classical CPS conversion techniques [5], our CPS terms are not continuations, but a procedure which builds and executes the continuation of a term. Construction is performed by push, which adds a function to the current continuation, and execution by invoke, which calls the first function of the continuation, optionally passing it the return value of the current function. Definition 3.8 (CPS terms). v ::= 1 | true | false | n ∈ N (values) expr ::= v | x | . . . (expressions) Q ::= invoke | push f (expr, . . . , expr) ; Q | push f (expr, . . . , expr, ⊡) ; Q (tail) T ::= invoke expr | x := expr ; T | if e then T else T | Q (head) Continuations and reduction rules A continuation is a sequence of function calls to be performed, with already evaluated parameters. We write · for appending a function to a continuation, and ⊡ for a “hole”, i.e. an unknown parameter. 36 Definition 3.9 (Continuations). C ::= ε | f (v, . . . , v) · C | f (v, . . . , v, ⊡) · C The reduction rules for CPS terms are isomorphic to the rules for CPS-convertible terms, except that they use continuations instead of contexts. Definition 3.10 (CPS reduction rules). hx := expr ; T, C, σi →T hT, C, σ[x 7→ v]i when hexpr, σi →⋆e v (16) hif expr then T1 else T2 , C, σi →T hT1 , C, σi if hexpr, σi →⋆e true (17) hif expr then T1 else T2 , C, σi →T hT2 , C, σi if hexpr, σi →⋆e false (18) hinvoke expr, f (v1 , . . . , vn ) · C, σi →T hinvoke, f (v1 , . . . , vn ) · Ci hinvoke expr, f (v1 , . . . , vn , ⊡) · C, σi →T hinvoke, f (v1 , . . . , vn , v) · Ci (19) (20) when hexpr, σi →⋆e v hinvoke expr, ε, σi →T v when hexpr, σi →⋆e v hQ, C, σi →T hQ[xi \ σ xi ], Ci for every xi in dom(σ) (21) hpush f (v1 , . . . , vn ) ; Q, Ci →Q hQ, f (v1 , . . . , vn ) · Ci (22) hpush f (v1 , . . . , vn , ⊡) ; Q, Ci →Q hQ, f (v1 , . . . , vn , ⊡) · Ci (23) hinvoke, f (v1 , . . . , vn ) · Ci →Q hT, C, σi when f (x1 , . . . , xn ) = T and σ = {xi 7→ vi } (24) Well-formed terms Not all CPS term will lead to a correct reduction. If we push a function expecting the result of another function and invoke it immediately, the reduction blocks: hpush f (v1 , . . . , vn , ⊡) ; invoke, C, σi → hinvoke, f (v1 , . . . , vn , ⊡) · C, σi 6→ Well-formed terms avoid this behaviour. Definition 3.11 (Well-formed term). A continuation queue is well-formed if it does not end with: push f (expr, . . . , expr, ⊡) ; invoke . A term is well-formed if every continuation queue in this term is well-formed. 3.5 Correctess of the CPS-conversion We define the CPS conversion as a mapping from CPS-convertible terms to CPS terms. 37 Definition 3.12 (CPS conversion). (Q ; f (expr, . . . , expr))N = push f (expr, . . . , expr) ; QN (Q ; f (expr, . . . , expr, F ))N = push f (expr, . . . , expr, ⊡) ; (Q ; F )N ǫN = invoke (x := expr ; T )N = x := expr ; T N (if expr then T1 else T2 )N = if expr then T1N else T2N expr N = invoke expr In the rest of this section, we prove that this mapping yields an isomorphism between the reduction rules of CPS-convertible terms and well-formed CPS terms, whence the correctness of our CPS conversion (Theorem 3.17). We first prove two lemmas to show that N yields only well-formed CPS terms. This leads to a third lemma to show that N is a bijection between CPS-convertible terms and well-formed CPS terms. CPS-convertible terms have been carefully designed to make CPS conversion as simple as possible. Accordingly, the following three proofs, while long and tedious, are fairly trivial. Lemma 3.13. Let Q be a continuation queue. Then QN is well-formed. Proof. By induction on the structure of a tail. ǫN = invoke and (ǫ ; f (expr, . . . , expr))N = push f (expr, . . . , expr) ; invoke are well-formed by definition. ((Q ; F ) ; f (expr, . . . , expr))N = push f (expr, . . . , expr) ; (Q ; F )N and (Q ; f (expr, . . . , expr, F ))N = push f (expr, . . . , expr, ⊡) ; (Q ; F )N are well-formed by induction. Lemma 3.14. Let T be a CPS-convertible term. Then T N is well-formed. Proof. Induction on the structure of T , using the above lemma. Lemma 3.15. The terms. N relation is a bijection between CPS-convertible terms and well-formed CPS Proof. Consider the following mapping from well-formed CPS terms to CPS-convertible terms: (push f (expr, . . . , expr) ; Q)H = QH ; f (expr, . . . , expr) (push f (expr, . . . , expr, ⊡) ; Q)H = Q′ ; f (expr, . . . , expr, F ) with QH = Q′ ; F H invoke = ǫ (x := expr ; T )H = x := expr ; T H if expr then T1 else T2H = if expr then T1H else T2H (invoke expr)H = expr (*) The existence of Q′ is guaranteed by well-formedness: 38 (*) – ∀T, T H = ǫ ⇒ T = invoke (by disjunction on the definition of H ), – here, Q 6= invoke because (push f (expr, . . . , expr, ⊡) ; Q) is well-formed, – hence QH 6= ǫ. One checks easily that (T H )N = T and (T N )H = T . To conclude the proof of isomorphism, we also need an (obviously bijective) mapping from contexts to continuations: Definition 3.16 (Conversion of contexts). ([ ])△ = ε (C[[ ] ; f (v1 , . . . , vn )])△ = f (v1 , . . . , vn ) · C with (C[ ])△ = C (C[[ ] ; f (v1 , . . . , vn , ⊖)])△ = f (v1 , . . . , vn , ⊡) · C with (C[ ])△ = C The correctness theorem follows: Theorem 3.17 (Correctness of CPS conversion). The N and △ mappings are two bijections, the inverses of which are written H and ▽ . They yield an isomorphism between reduction rules of CPS-convertible terms and CPS terms. Proof. Lemma 3.15 ensures that N is a bijection between CPS-convertible terms and well-formed CPS terms. Moreover, △ is an obvious bijection between contexts and continuations. To complete the proof, we only need to apply N , △ , H and ▽ to CPS-convertible terms, contexts, well-formed CPS terms and continuations (respectively) in every reduction rule and check that we get a valid rule in the dual reduction system. The result is summarized in Figure 4. 39 hx := expr ; T, C[ ], σi →T hT, C[ ], σ[x 7→ v]i ⇔ hx := expr ; T, C, σi →T hT, C, σ[x 7→ v]i when hexpr, σi →⋆e v hif expr then T1 else T2 , C[ ], σi →T hT1 , C[ ], σi ⇔ hif expr then T1 else T2 , C, σi →T hT1 , C, σi if hexpr, σi →⋆e true hif expr then T1 else T2 , C[ ], σi →T hT2 , C[ ], σi ⇔ hif expr then T1 else T2 , C, σi →T hT2 , C, σi if hexpr, σi →⋆e false hexpr, C[[ ] ; f (v1 , . . . , vn )], σi →T hǫ, C[[ ] ; f (v1 , . . . , vn )]i hexpr, C[[ ] ; f (v1 , . . . , vn , ⊖)], σi →T hǫ, C[[ ] ; f (v1 , . . . , vn , v)]i ⇔ hinvoke expr, f (v1 , . . . , vn ) · C, σi →T hinvoke, f (v1 , . . . , vn ) · Ci ⇔ hinvoke expr, f (v1 , . . . , vn , ⊡) · C, σi →T hinvoke, f (v1 , . . . , vn , v) · Ci when hexpr, σi →⋆e v 40 hexpr, [ ], σi →T v ⇔ hQ, C[ ], σi →T hQ[xi \ σ xi ], C[ ]i hQ ; f (v1 , . . . , vn ), C[ ]i →Q hQ, C[[ ] ; f (v1 , . . . , vn )]i ⇔ hQ, C, σi →T hQ[xi \ σ xi ], Ci for every xi in dom(σ) ⇔ hpush f (v1 , . . . , vn ) ; Q, Ci →Q hQ, f (v1 , . . . , vn ) · Ci hQ ; f (v1 , . . . , vn , F ), C[ ]i →Q hQ ; F, C[[ ] ; f (v1 , . . . , vn , ⊖)]i ⇔ hǫ, C[[ ] ; f (v1 , . . . , vn )]i →Q hT, C[ ], σi hinvoke expr, ε, σi →T v when hexpr, σi →⋆e v ⇔ hpush f (v1 , . . . , vn , ⊡) ; Q′ , Ci →Q hQ′ , f (v1 , . . . , vn , ⊡) · Ci when Q′ = (Q ; F )N hinvoke, f (v1 , . . . , vn ) · Ci →Q hT, C, σi when f (x1 , . . . , xn ) = T and σ = {xi 7→ vi } Figure 4: Isomorphism between reduction rules References [1] William D. Clinger. Proper tail recursion and space efficiency. In Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation, PLDI ’98, pages 174–185, New York, NY, USA, 1998. ACM. [2] Olivier Danvy and Ulrik Schultz. Lambda-lifting in quadratic time. In Functional and Logic Programming, volume 2441 of Lecture Notes in Computer Science, pages 134–151. SpringerVerlag, Berlin, Germany, 2002. [3] International Organization for Standardization. ISO/IEC 9899:1999 “Programming Languages – C”, December 1999. [4] Gabriel Kerneis and Juliusz Chroboczek. Continuation-Passing C: from threads to events through continuations. January 2012. Submitted for publication. [5] G. D. Plotkin. Call-by-name, call-by-value and the lambda-calculus. Theoretical Computer Science, 1(2):125–159, December 1975. 41
6cs.PL
Analyzing Adaptive Cache Replacement Strategies Mario E. Consuegra2 , Wendy A. Martinez1 , Giri Narasimhan1 , Raju Rangaswami1 , Leo Shao1 , and Giuseppe Vietri1 arXiv:1503.07624v2 [cs.DS] 24 Apr 2017 1 School of Computing and Information Sciences, Florida International University, Miami, FL 33199, USA. {walem001,giri,raju,gviet001}@fiu.edu 2 Google Inc., Kirkland, WA, USA. April 25, 2017 Abstract Adaptive Replacement Cache (Arc) and CLOCK with Adaptive Replacement (Car) are state-of-theart “adaptive” cache replacement algorithms invented to improve on the shortcomings of classical cache replacement policies such as Lru, Lfu and Clock. By separating out items that have been accessed only once and items that have been accessed more frequently, both Arc and Car are able to control the harmful effect of single-access items flooding the cache and pushing out more frequently accessed items. Both Arc and Car have been shown to outperform their classical and popular counterparts in practice. Both algorithms are complex, yet popular. Even though they can be treated as online algorithms with an “adaptive” twist, a theoretical proof of the competitiveness of Arc and Car remained unsolved for over a decade. We show that the competitiveness ratio of Car (and Arc) has a lower bound of N + 1 (where N is the size of the cache) and an upper bound of 18N (4N for Arc). If the size of cache offered to Arc or Car is larger than the one provided to Opt, then we show improved competitiveness ratios. The important implication of the above results are that no “pathological” worst-case request sequences exist that could deteriorate the performance of Arc and Car by more than a constant factor as compared to Lru. 1 Introduction Megiddo and Modha [MM03,MM04] engineered an amazing cache replacement algorithm that was self-tuning and called it Adaptive Replacement Cache or Arc. Later, Bansal and Modha [BM04] designed another algorithm called Clock with Adaptive Replacement (Car). Extensive experimentation suggested that Arc and Car showed substantial improvements over previously known cache replacement algorithms, including the well-known Least Recently Used or Lru and Clock. On the theoretical side, the seminal work of Sleator and Tarjan [ST85] showed that Lru can be analyzed using the theory of online algorithms. They showed that Lru has a competitiveness ratio of N (where N is the size of the cache). More surprisingly, they also showed that with no prefetching, no online algorithm for cache replacement could achieve a competitiveness ratio less than N , suggesting that under this measure, Lru is optimal. In other words, there exist worst-case request sequences that would prevent any algorithm from being better than N -competitive. While these results are significant, they highlight the difference between theory and practice. Sleator and Tarjan’s techniques analyze online algorithms in terms of their worst-case behavior (i.e., over all possible inputs), which means that other algorithms with poorer competitiveness ratios could perform better in practice. Another way to state this is that the results assume an oblivious adversary who designs inputs for the online algorithms in a way that make them perform as poorly as possible. The upper bound on performance ratio merely guarantees that no surprises are in store, i.e., there is no input designed by an adversary that can make the algorithm perform poorly. 1 Given a fixed size cache, the cache replacement problem is that of deciding which data item to evict from the cache in order to make room for a newly requested data item with the objective of maximizing cache hits in the future. The cache replacement problem has been referred to as a fundamental and practically important online problem in computer science (see Irani and Karlin [Hoc97], Chapter 13) and a “fundamental metaphor in modern computing” [MM04]. The Lru algorithm was considered the most optimal page replacement policy for a long time, but it had the drawback of not being “scan-resistant”, i.e., items used only once could pollute the cache and diminish its performance. Furthermore, Lru is difficult to implement efficiently, since moving an accessed item to the front of the queue is an expensive operation, first requiring locating the item, and then requiring data moves that could lead to unacceptable cache contention if it is to be implemented consistently and correctly. The Clock algorithm was invented by Frank Corbató in 1968 as an efficient one-bit approximation to Lru with minimum overhead [Cor68] and continues to be used in MVS, Unix, Linux, and Windows operating systems [Fri99]. Like Lru, Clock is also not scan-resistant because it puts too much emphasis on “recency” of access and pays no attention to “frequency” of access. So there are sequences in which many other algorithms can have significantly less cost than the theoretically optimal Lru. Since then, many other cache replacement strategies have been developed and have been showed to be better than Lru in practice. These are discussed below in Section 2. An important development in this area was the invention of adaptive algorithms. While regular “online” algorithms are usually designed to respond to input requests in an optimal manner, these selftuning algorithms are capable of adapting to changes in the request sequence caused by changes in the workloads. Megiddo and Modha’s Arc [MM03] is a self-tuning algorithm that is a hybrid of Lfu and Lru. Bansal and Modha’s Car is an adaptivehybrid of Lfu and Clock [BM04]. Experiments show that Arc and Car outperform Lru and Clock for many benchmark data sets [BM04]. Versions of Arc have been deployed in commercial systems such as the IBM DS6000/DS8000, Sun Microsystems’s ZFS, and in PostgreSQL. Unfortunately, no theoretical analysis of the adaptive algorithms, Arc and Car, exist in the literature. The main open question that remained unanswered was whether or not there exist “pathological” request sequences that could force Arc or Car to perform poorly. In this document we show that these two algorithms are O(N )-competitive, suggesting that they are not much worse than the optimal Lru. We also prove a surprising lower bound on the competitiveness that is larger than N . The main contributions of this paper are as follows: 1. For completeness, we provide proofs that Lru and Clock are N -competitive. 2. We prove a lower bound on the competitiveness of Arc and Car of N + 1, proving that there are request sequences where they cannot outperform Lru and Clock. 3. We show that Arc is 4N -competitive. 4. We show that Car is 18N -competitive. 5. We obtain precise bounds for the competitiveness of all four algorithms when the sizes of the caches maintained by them are different from that maintained by Opt. 6. We show that if the size of the cache is twice that of the one allowed for the optimal offline algorithm, then the competitiveness ratio drops to a small constant. We use the method of potential functions to analyze the algorithms. However, the main challenges in solving these problems is that of carefully designing the potential function for the analysis. We discuss the role of the adaptive parameter in the potential function. The contributions of this paper are summarized in Table 1. In this table, N is the size of the cache maintained by the algorithm, while NO is the size of the cache maintained by Opt. The table provides lower bounds (LB) and upper bounds (UB) on the competitiveness ratio when the cache sizes are equal, i.e., N = NO ; it also provides upper bounds when they are not equal. 2 Algorithm Lru Arc Clock Car Compet. Ratio LB N N +1 N N +1 Compet. Ratio UB N 4N N 18N Compet. Ratio UB w/ Unequal Sizes N/(N − NO + 1) 12N/(N − NO + 1) N/(N − NO + 1) 18N/(N − NO + 1) [Ref] [ST85] This paper This paper This paper Table 1: Summary of Results After providing relevant background on cache replacement algorithms in Section 2, we discuss the lower bounds on the competitiveness ratios of Arc and Car in Section 3. Next we prove upper bounds on the competitiveness ratios of Lru, Clock, Arc, and Car in Section 4. Concluding remarks can be found in Section 5. 2 Previous Work on Cache Replacement Strategies Below we give brief descriptions of the four algorithms being discussed in this paper, after which we mention a large collection of other closely related cache replacement algorithms. The Lru Algorithm: Lru evicts the least recently used entry. It tends to perform well when there are many items that are requested more than once in a relatively short period of time, and performs poorly on “scans”. Lru is expensive to implement because it requires a queue with move-to-front operations whenever a page is requested. The Clock Algorithm: On the other hand, Clock was designed as an efficient approximation of Lru, which it achieves by avoiding the move-to-front operation. Clock’s cache is organized as a single “circular” list, instead of a queue. The algorithm maintains a pointer to the “head” of the list. The item immediately counterclockwise to it is the “tail” of the list. Each item is associated with a “mark” bit. Some of the pages in the cache are marked, and the rest are unmarked. When a page hit occurs that page is marked, but the contents of the cache remain unchanged. When a page fault occurs, in order to make room for the requested page, the head page is evicted if the page is unmarked. If the head page is marked, the page is unmarked and the head is moved forward clockwise, making the previous head as the tail of the list. After a page is evicted, the requested page is unmarked and placed at the tail of the list. Clock is inexpensive to implement, but is not scan-resistant like Lru. The Arc Algorithm To facilitate our discussion, we briefly describe the Arc algorithm. As mentioned before, it combines ideas of recency and frequency. Arc’s cache is organized into a “main” part (of size N ) and a “history” part (of size N ). The main part is further divided into two lists, T1 and T2 , both maintained as LRU lists (i.e., sorted by “recency”). T1 focuses on “recency” because it contains pages with short-term utility. Consequently, when an item is accessed for the first time from the disk, it is brought into T1 . Items “graduate” to T2 when they are accessed more than once. Thus, T2 deals with “frequency” and stores items with potential for long-term utility. Additionally, Arc maintains a history of N more items, consisting of B1 , i.e., items that have been recently deleted from T1 , and B2 , i.e., items that have been recently deleted from T2 . History lists are also organized in the order of recency of access. The unique feature of Arc is its self-tuning capability, which makes it scan-resistant. Based on a self-tuning parameter, p, the size of T1 may grow or shrink relative to the size of T2 . The details of the algorithm are fairly complex and non-intuitive. Detailed pseudocode for Arc (Figure 4 from [MM03]) is provided in the Appendix for convenience. It is worth noting that Arc is considered a “universal” algorithm in the sense that it does not use any a priori knowledge of its input, nor does it do any offline tuning. Furthermore, Arc is continuously adapting, since adaptation can potentially happen at every step. 3 It must be noted that our results on Arc assume the “learning rate”, δ, to be equal to 1, while the Arc algorithm as presented by Megiddo and Modha recommended a “faster” learning rate based on experiments on real data. The learning rate is the rate at which the adaptive parameter p is changed as and when needed. The Car Algorithm Inspired by Arc, Car’s cache is organized into two main lists, T1 and T2 , and two history lists, B1 and B2 . Inspired by Clock, both T1 and T2 are organized as “circular” lists, with each item associated with a mark bit. The history lists, B1 and B2 are maintained as simple FIFO lists. We let t1 , t2 , b1 , b2 denote the sizes of T1 , T2 , B1 , B2 , respectively. Also, let t := t1 + t2 . Let lists L1 (and L2 , resp.) be the list of size ℓ1 (ℓ2 , resp.) obtained by concatenating list B1 to the end of “linearized” T1 (concatenating B2 to the tail of T2 , resp.). Note that circular lists are linearized from head to tail. We let T10 and T20 (T11 and T21 , resp.) denote the sequence of unmarked (marked, resp.) pages in T1 and T2 , respectively. The following invariants are maintained by Car for the lists: 1. 0 ≤ t1 + t2 ≤ N 2. 0 ≤ ℓ1 = t1 + b1 ≤ N 3. 0 ≤ ℓ1 + ℓ2 = t1 + t2 + b1 + b2 ≤ 2N 4. t1 + t2 < N =⇒ b1 + b2 = 0 5. t1 + t2 + b1 + b2 ≥ N =⇒ t1 + t2 = N 6. Once t1 + t2 = N and/or ℓ1 + ℓ2 = 2N , they remain true from that point onwards. Car maintains an adaptive parameter p, which it uses as a target for t1 , the size of list T1 . Consequently, N − p is the target for t2 . Using this guiding principle, it decides whether to evict an item from T1 or T2 in the event that a miss requires one of the pages to be replaced. The replacement policy can be summarized into two main points: 1. If the number of items in T1 (barring the marked items at the head of the list) exceeds the target size, p, then evict an unmarked page from T1 , else evict an unmarked page from T2 . 2. If ℓ1 = t1 + b1 = N , then evict a history page from B1 , else evict a history page from B2 . Since the details of the algorithm are complex, the actual pseudocode is provided (Figure 2 from [BM04]) in the Appendix. Other Cache Replacement Algorithms The DuelingClock algorithm [JIPP10] is like Clock but keeps the clock hand at the newest page rather than the oldest one, which allows it to be scan-resistant. More recent algorithms try to improve over Lru by implementing multiple cache levels and leveraging history. In [OOW93] the Lru-K algorithm was introduced. Briefly, the Lru-K algorithm estimates interarrival times from observed requests, and favors retaining pages with shorter interarrival times. Experiments have shown Lru-2 performs better than Lru, and that Lru-K does not show increase in performance over Lru2 [OOW93], but has a higher implementation overhead. It was also argued that Lru-K is optimal under the independence reference model (IRM) among all algorithms A that have limited knowledge of the K most recent references to a page and no knowledge of the future [OOW93]. In essence, the Lru-K algorithm tries to efficiently approximate Least Frequently Used (Lfu) cache replacement algorithm. As K becomes larger, it gets closer and closer to Lfu. It has been argued that Lfu cannot adapt well to changing workloads because it may replace currently “hot” blocks instead of “cold” blocks that had been “hot” in the past. Lfu is implemented as a heap and takes O(log N ) time per request. Another cache replacement algorithm is Lirs [JZ02]. The Lirs algorithm evicts the page with the largest IRR (inter-reference recency). It attempts to keep a small (≈ 1%) portion of the cache for HIR (high inter-reference) pages, and a large (≈ 99%) portion of the cache for LIR (low inter-reference) pages. The Clock-Pro algorithm approximates Lirs efficiently using Clock [JCZ05]. The 2q [JS94] algorithm 4 is scan-resistant. It keeps a FIFO buffer A1 of pages that have been accessed once and a main Lru buffer Am of pages accessed more than once. 2q admits only hot pages to the main buffer. The buffer A1 is divided into a main component that keeps the pages in A1 that still reside in cache, and a history component that remembers pages that have been evicted after one access. The relative sizes of the main and history components are tunable parameters. 2q has time complexity of O(1). Another algorithm that tries to bridge the gap between recency and frequency is Lrfu [LCK+ 01]. This is a hybrid of Lru and Lfu and is adaptive to changes in workload. The time complexity ranges from O(1) for Lru to O(log n) for Lfu. 3 Lower Bounds on Competitiveness Ratio for Arc and Car This section presents our results on the lower bounds for Arc and Car. We also show that the adaptive parameter is critical to both Arc and Car by showing that their non-adaptive versions have an unbounded competitiveness ratio. 3.1 Lower Bound for Arc First, we show a lower bound on the competitiveness ratio for Arc. Theorem 1. The competitiveness ratio of Algorithm Arc has a lower bound of N + 1. Proof. We show that we can generate an unbounded request sequence that causes N + 1 page faults on Arc for every page fault on Opt. The sequence only involves 2N + 1 pages denoted by 1, . . . , 2N + 1. Our example, will take the contents of the cache managed by Arc from configurations 1 through configuration 5, which are shown in Table 2. Note that configuration 1 and configuration 5 are essentially the same to the extent that the value of p is 0 in both, and the number of pages in each of the four parts of the cache are identical. Configuration 1 2 3 4 5 p 0 0 0 1 0 T1 ∅ 2N + 1 ∅ ∅ ∅ T2 1, . . . , N 2, . . . , N 2, . . . , N, 1 3, . . . , N, 1, 2N + 1 1, 2N + 1, 2, . . . , N − 1 B1 ∅ ∅ 2N + 1 ∅ ∅ B2 N + 1, . . . , 2N N + 2, . . . , 2N, 1 N + 2, . . . , 2N N + 2, . . . , 2N, 2 N + 2, . . . , 2N, N Table 2: Example for Lower Bound on Arc’s competitiveness We note that we can obtain configuration 1 from an empty cache with the following request sequence: 2N, 2N, 2N − 1, 2N − 1, . . . , 2, 2, 1, 1. Consider the first half of the above request sequence, which contains a total of 4N requests to 2N new pages, each page requested twice in succession. The first time a page is requested from the first N new pages, it will be put in T1 . The second time the page is requested, it will get moved to T2 . In the second half, if a page not in Arc is requested, Replace will be called, which will move a page from T2 to B2 , and the new page will be placed in T1 . When the same page is requested again, it simply gets moved to T2 . The value of p remains unchanged in this process. It is clear that we get Configuration 1 as a result of the request sequence. We design our request sequence by following the steps below. 1. Make one request to a page 2N + 1 not in Arc. We will assume that this is a brand new page and therefore also causes a fault for Opt and for Arc. The page 2N + 1 will go into T1 and a page in T2 will be demoted to B2 . The contents of Arc is given by Configuration 2 in Table 2. 2. Request any page in B2 . This decreases the value of p but since p is zero it will remain unchanged. Since the size of T1 is more than p Arc will call Replace, which will act on T1 , hence 2N + 1 will be demoted to B1 . Upon requesting page 1 in B2 , we get Configuration 3 in Table 2. 5 3. The next step is to request 2N + 1 again, which will move to T2 , p is increased and a page in T2 is demoted to B2 . Configuration 4 reflects the contents of the cache at this stage. 4. Finally we make N − 2 requests to any pages from B2 . By requesting the pages 2, 3, . . . , N , we end up in Configuration 5 from Table 2. The steps outlined above cause N + 1 page faults for Arc and at most one page fault for Opt. Since we are back to the initial configuration we can repeat this process over again. This concludes the proof that the competitiveness ratio of Arc is at least N + 1. 3.2 Lower Bound for Car Now we prove a similar lower bound for Car. Theorem 2. The competitiveness ratio of Algorithm Car has a lower bound of N + 1. Proof. We show that we can generate an infinite request sequence that causes N + 1 page faults in Car for every page fault on Opt. The sequence only involves 2N + 1 pages denoted by 1, . . . , 2N + 1. Our example, will take the contents of the cache managed by Car from configurations 1 through N + 2 as shown in Table 3. Note that a superscript of 1 on any page in T1 ∪ T2 indicates that it is marked. All others are unmarked. Also note that configuration 1 and configuration N + 2 are essentially the same upon relabeling. First, we show that configuration 1 is attainable, by showing that it can be reached from an empty cache. This is formalized in the following lemma. Lemma 1. We can obtain configuration 1 starting from an empty cache with the following request sequence: 2N, 2N, 2N − 1, 2N − 1, . . . , 2, 2, 1, 1. Proof. The first half of the above request sequence calls each of the N pages 2N, 2N − 1, . . . , N + 1 twice in succession. The first time they are called, they are moved into T1 unmarked. The second time the same page is called it gets marked, but remains in T1 . At the end of the first half, all the N pages requested end up in T1 and are all marked. The next call to new page N , will trigger a call to Replace, which will move all the marked pages in T1 to T2 leaving them unmarked. It will also move one page from T2 to B2 . Finally, the requested page N will be moved to T1 and left unmarked. When requested again, it simply gets marked. When the next page, i.e., N − 1 is requested, it moves marked page N to T2 , moves one more page from T2 to B2 . As the rest of the pages from the request sequences are requested, the previous requested page gets moved to T2 , which in turn demotes one of its pages to B2 . At the end of the process, we get a marked page 1 in T1 . Pages 2, . . . , N are in T2 , unmarked, and pages N + 1, . . . , 2N end up in B2 . This is exactly what we need for configuration 1. Continuing on the proof of Theorem 2, we show what happens when, starting from configuration 1, Car processes the following request sequence. Page 2N + 1: A page in T2 is demoted to B2 , which loses a page; the marked page from T1 is moved to T2 and the new page is moved into T1 . MRU page in B2 : This should have decremented p but remains unchanged since it is already zero. Since the size of T1 is more than p Car will call Replace and 2N + 1 will be demoted to B1 , resulting in configuration 3 in Table 3. Page 2N + 1: It will move to T2 , p is increased and a page in T2 is demoted to B2 . See configuration 4 in Table 3. MRU page from B2 , repeat N − 2 times: It results in configuration N + 2 in Table 3. 6 Config. 1 2 3 4 5 ... N +2 p 0 0 0 1 0 0 0 B1 ∅ ∅ 2N + 1 ∅ ∅ ... ∅ T1 11 2N + 1 ∅ ∅ ∅ ... ∅ T2 2, . . . , N 1, . . . , N − 1 N, 1, . . . , N − 1 2N + 1, N, 1, . . . , N − 2 N − 1, 2N + 1, N, 1, . . . , N − 3 ... 2, . . . , N − 1, 2N + 1, N B2 N + 1, . . . , 2N N, . . . , 2N − 1 N + 1, . . . , 2N − 1 N − 1, N + 1, . . . , 2N − 1 N − 2, N + 1, . . . , 2N − 1 ... 1, N + 1, . . . , 2N − 1 Table 3: Example for Lower Bound on Car’s competitiveness The request sequence detailed above generates N + 1 faults for Car while only N different pages are requested. Thus, Opt could limit itself to at most one fault in this stretch. Opt will fault once during each stretch if the next page is picked to be one that is farthest used in the future. Repeating the above steps an unbounded number of times with appropriate relabeling proves that the competitiveness ratio of Car is lower bounded by N + 1. 3.3 Non-Adaptive Arc and Car are not Competitive It is particularly interesting to note that the non-adaptive version of Car and Arc (called Fixed Replacement cache) [MM03] are not competitive. The following two theorems prove that the competitiveness ratios can be unbounded in this case. Theorem 3. Algorithm Car with fixed p is not competitive. Proof. Suppose that algorithm Car has p fixed instead of being adaptive and 0 < p < N − 1. Recall that p is the target size of T1 and N − p is the target size of T2 . We design a request sequence such that with less than N pages we can generate an infinite number of page faults for Car. The sequence is described as follows: Step 1: Fill up T2 with N − p unmarked pages as described above in the proof of Theorem 2. Step 2: Request the MRU page in B2 . The requested page goes to the tail of T2 as an unmarked page. Since the size of T2 is greater than p we discard the head of T2 . Step 3: Request the MRU page in B2 which is actually the page discarded in Step 2 from T2 . This step is similar to Step 2 and we can continue to repeat this infinitely often, since the page that moves from B2 to T2 get’s unmarked and the page that moves from T2 to B2 goes to MRU. Therefore, we can cycle infinitely many times through N − p + 1 pages triggering an infinite number of faults, while Opt can avoid faults altogether during the cycle. Theorem 4. Algorithm Arc with fixed p is not competitive. Proof. Suppose that algorithm Arc has p fixed instead of being adaptive and 0 < p < N . Recall that p is the target size of T1 and N − p is the target size of T2 . We design a request sequence such that with less than N pages we can generate an infinite number of page faults for Arc. The first step is to fill up T2 (size of T2 = N − p). Next we request the MRU page in B2 . Every time we request a page from B2 , it goes into the top of T2 and thus it increases the size of T2 beyond its target size. It follows that Arc will call Replace and move a page from T2 to the MRU position in B2 . If the MRU page from B2 is repeatedly requested, we will cycle through N − p pages, every time incurring a page fault for Arc, while Opt can avoid faults altogether during the cycle. 7 4 4.1 Analyzing Lru using potential functions The generic approach The standard approach used here is as follows. First, we define a carefully crafted potential function, Φ. As per the strategy of analyzing competitiveness ratios suggested by Sleator and Tarjan [ST85], we then try to show the following inequality: CA + ∆Φ ≤ f (N ) · CO + g(N ), (1) where CA and CO are the costs incurred by the algorithm and by Opt, respectively, ∆Φ is the change in potential, f (N ) is some function of N , the size of the cache. In all of our proofs, we assume that the work involves simultaneously maintaining Opt’s cache as well as the algorithm’s cache. So we can break down the work into two steps, one where only Opt serves and one where only the algorithm serves. When only Opt serves, there are 2 cases: first when Opt has a hit and next when Opt has a miss. Next, we consider the cases when the algorithm serves, once when it has a hit and once when it has a miss. In each case, our goal is to prove the inequality (1) mentioned above, which establishes that f (N ) is the competitiveness ratio of algorithm A. There may be an additive term of g(N ) which is a function of the misses needed to get to some initial configuration for the cache. 4.2 Analyzing Lru using potential functions Assuming that the size of cache given to the competing Opt algorithm is NO ≤ N , the following result was proved by Sleator and Tarjan [ST85] (Theorem 6) for Lru.  N -competitive. Theorem 5. [ST85] Algorithm Lru is N −N O +1 Here we present a complete proof of this well-known result because we believe it is instructive for the other proofs in this paper. Proof. While this was not used in the proof in Sleator and Tarjan [ST85], a potential function that will facilitate the proof of the above theorem is: Φ= P r(x) , NL − NO + 1 x∈D (2) where D is the list of items in Lru’s cache but not in Opt’s cache, and r(x) is the rank of item x in Lru’s list with the understanding that the LRU item has rank 1, while the MRU item has rank equal to the size of the cache [Alb96]. We now show the following inequality: CA + ∆Φ ≤  N · CO + O(N ), N − NO + 1 (3) where CA and CO are the costs incurred by the algorithm and by Opt, respectively, ∆Φ is the change in potential, f (N ) is some function of N , the size of the cache. We assume that the work involves simultaneously maintaining Opt’s cache as well as Lru’s cache. So we can break down the work of Lru into two steps, one where only Opt serves and one where only Lru serves. When only Opt serves, there are 2 cases: first when Opt has a hit and next when Opt has a miss. In either case, the cost for Lru is 0, since only Opt is serving. When Opt has a hit, the cost for Opt is also 0. Furthermore, since Lru’s cache remains untouched, and no changes take place in the contents of Opt’s cache, the ranks of the items in Lru remain unchanged. Thus, ∆Φ = 0. Therefore, the inequality in (3) is trivially satisfied in this case. 8 When Opt has a miss, CO = 1, as before. The item evicted by Opt can contribute the rank of that item NL to increase at most by NL , making the increase in potential function to be bounded by NL −N . Thus, O +1 the inequality in (3) is satisfied. Next, we consider the step where Lru serves the request. As with Opt, when Lru is serving, the cost for Opt is 0. We again consider two cases: first when Lru has a hit and next when Lru has a miss. When Lru has a hit, the cost for Lru is 0. The contents of Lru’s cache may change. The item that was accessed is moved to the MRU position. However, this item is already in Opt’s cache and therefore cannot contribute to a change in potential. Several other items may move down in the cache, thus contributing to a decrease in potential of at most (N − 1). In the worst, case the increase in potential is at most 0. Therefore, the inequality in (3) is again satisfied. Finally, we consider the case when Lru has a miss. As before, CL = 1. Following the previous arguments, an item would be brought into MRU (which is already present in Opt’s cache), a bunch of items may be demoted in rank, and the Lru item will be evicted. The only action that can contribute to an increase is caused by the item that is brought into the MRU location. However, this item is already present in Opt’s cache, and hence cannot contribute to an increase. All the demotions and eviction can only decrease the potential function. Note that before the missed item is brought into Lru’s cache, the contents of Lru’s and Opt’s cache agree in at most NO − 1 items, since Opt just finished serving the request and the item that caused the miss is already in Opt’s cache. Thus there are at least NL − NO + 1 items that contribute their ranks to the potential function. These items either get demoted in rank or get evicted. Either way, the potential function will reduce by a minimum value of NL − NO + 1, although it could more if there are more items that are in Lru and that are not in Opt’s cache. Thus the total change in potential has to be at most NL − NO + 1, and we have CL + ∆Φ ≤ 1 − (NL − NO + 1) NL ≤0= · CO . (NL − NO + 1) NL − NO + 1 Summarizing the costs, we have the following: Step CL ∆Φ Opt Serves Request Opt has a hit 0 0 Opt has a miss 0 ≤ NL Lru Serves Request Lru has a hit 0 ≤0 Lru has a miss 1 ≤ NL − NO + 1 CO 0 1 0 0 The analysis of Lru states that if the sizes of Lru’s and Opt’s caches are NL and NO respectively, and NL if NL ≥ NO , then the competitiveness ratio of Lru is NL −N . Thus Lru is 2-competitive if the size of O +1 Lru’s cache is roughly twice that of Opt’s cache. 4.3 Analyzing the competitiveness of Clock Our result on the competitiveness of Clock is formalized in the following theorem. While this result appears to be known, we have not been able to locate a full proof and we believe this is of value. We therefore present it for the sake of completeness.  N Theorem 6. Algorithm Clock is N −N -competitive. O +1 Proof. Let M0 denote the subsequence of unmarked pages in Clock, ordered counterclockwise from head to tail. Let M1 denote the subsequence of marked pages in Clock, ordered counterclockwise from head to tail. Let q be any page in Clock’s cache. Let P 0 [q] denote the position of an unmarked page q in the 9 ordered sequence M0 , and let P 1 [q] denote the position of a marked page q in M1 . Finally, let R[q] denote the rank of page q defined as follows: R[q] = ( P 0 [q] if q is unmarked, P 1 [q] + |M0 | otherwise. (4) Thus, if q is an unmarked page at the head, then R[q] = 1. By the above definition, the following lemmas are obvious. Lemma 2. If q is any page in Clock’s cache, then R[q] ≤ N . Lemma 3. If a marked page q at the head of Clock’s cache is unmarked and moved to the tail, then R[q] does not change in the process. Let D be the set of pages that are in the cache maintained by Clock, but not in the cache maintained by Opt. We define the potential function as follows: Φ= X R[q] (5) q∈D We prove one more useful lemma about the ranks as defined above. Lemma 4. If an unmarked page at the head of Clock’s cache is evicted from Clock’s cache, and if there is at least one page in D, then Φ decreases by at least 1 in the process. . Proof. All pages, marked or unmarked, will move down by at least one position (reducing the rank of each by at least 1). The decrease in potential for at least one page that is in D will contribute to Φ, guaranteeing that ∆Φ ≤ −1. Let CClock and COpt be the costs incurred by the algorithms Clock and Opt, and let S = σ1 , σ2 , . . . , σm be an arbitrary request sequence. Let S ′ denote the initial subsequence of requests that take place prior to the cache becoming full. Note that exactly N faults are incurred in S ′ , after which the cache remains full. Let S ′′ be the subsequence of S that comes after S ′ . Let CClock and COpt be the cost incurred by the algorithms Clock and Opt respectively. We will prove that for every individual request, σ ∈ S ′′ : CClock (σ) + ∆Φ ≤ N ∗ COpt (σ) (6) As before, we assume that request σ is processed in two distinct steps: first when Opt services the page request and, next when Clock services the request. We will show that inequality (6) is satisfied for both the steps. When only Opt acts in this step, Cclock = 0. If Opt does not fault on this request, then COP T = 0. No change occurs to the contents of the cache maintained by Opt as well as Clock, and the clock hand does not move. Thus, ∆Φ = 0, satisfying inequality 6. If Opt faults on request σ, then COP T = 1 and CClock = 0. The contents of the cache maintained by Opt does change, which could affect the potential function. The potential could increase due to the eviction of a page in Opt. Since by Lemma 2 the rank of the evicted page cannot exceed N , the potential will change by at most N . Thus, inequality 6 is satisfied. Next we consider what happens when Clock services the request. For this case COP T = 0. If Clock does not fault, then Cclock = 0 and the requested page may change from an unmarked status to a marked one. However, since the page is already in the cache maintained by Opt it is not in D and is therefore not considered for the potential function calculations in 5. Thus, inequality 6 is satisfied. 10 Finally, we consider the case when Clock faults, in which case CClock = 1 and COpt = 0. To satisfy inequality 6, ∆Φ needs to be less or equal to -1. When Clock has a miss, if the head page happens to be marked, then Clock will repeatedly unmark the marked head page, moving it to the tail position, until an unmarked head page is encountered. The unmarked head page is then evicted. Each time a marked head page becomes an unmarked tail page, by Lemma 3 its rank does not change. When finally an unmarked head page is evicted, we know that there is at least one page in Opt’s cache that is not in Clock’s cache (i.e., the page that caused the fault). Since there are N pages in the cache maintained by Clock, at least one of those pages is guaranteed not to be part of the cache maintained by Opt. Since there is at least one page in D, by Lemma 4 it is clear that evicting an unmarked head page will decrease the potential function by at least one, which will pay for the Clock’s page fault. We have therefore showed that for every request σ, inequality 6 is satisfied. Since there can be at most N faults for the requests in S ′ , summing up the above inequality for all requests, σ ∈ S, we get CClock (S) ≤ N ∗ COpt (S) + N. This completes the proof of the theorem and the competitiveness analysis of the Clock algorithm. 4.4 Analyzing the Competitiveness of ARC In this paper, we prove two different upper bounds for the competitiveness of Arc. These two proofs use very different potential function. The first one allows for the sizes of the caches maintained by Arc and Opt to be different, while the second one does not allow for it, but provides a tighter bound. We provide both results below. Our first result on the competitiveness of Arc is formalized in the following theorem:  12N Theorem 7. Algorithm Arc is N −N -competitive. O +1 Proof. Let PX [q] be the position of page q in an arbitrary ordered sequence of pages X. When the set is obvious, we will drop the subscript and denote PX [q] simply by P [q]. The set of history pages T1 , T2 , B1 , and B2 will be treated as an ordered sequence of pages ordered from its LRU position to its MRU position. Let Opt and Car be the set of main pages stored in the caches for algorithms Opt and Arc respectively. Let D = Arc \ Opt. As before, we associate each page with a rank value R[q], which is defined as follows:  2PB1 [q]    2P [q] B2 R[q] =  4P T1 [q] + 2b1    4PT2 [q] + 2b2 if if if if q q q q ∈ B1 ∈ B2 ∈ T1 ∈ T2 (7) Finally, we define the potential function as follows: Φ = p + 2t1 + 2 P R[q]  − 3|Arc| N − NO + 1 q∈D (8) The initial value of Φ is 0. If the following inequality (9) is true for any request σ, where ∆Φ is the change in potential caused by serving the request, then when summed over all requests, it proves Theorem 7. CArc (σ) + ∆Φ ≤ 12N COpt (σ) . N − NO + 1 (9) As before, we assume that request σ is processed in two distinct steps: first when Opt serves and, next when Arc serves. We will show that inequality (9) is satisfied for each of the two steps. 11 Step 1: Opt serves request σ Since only Opt acts in this step, CArc = 0, and T1 ∪ T2 does not change. There are two possible cases: either Opt faults on σ or it does not. If Opt does not fault on this request, then it is easy to see that COpt = 0 and ∆Φ = 0, thus satisfying inequality (9). If Opt faults on request σ, then COpt = 1 and some page q, is evicted from the cache maintained by Opt will belong to D after this step and thus its rank will contribute to the potential function, which will increase by two times the rank of q. The maximal positive change in potential will occur when q is the MRU page of either T1 or T2 . In this case the rank of q is given by: R[q] = 4P [q] + b1 (R[q] = 4P [q] + b2 ). The maximum possible values for each of the terms P [q] and b1 will be N , hence the maximum possible rank of 12N q will be 4N + 2N = 6N . Therefore resulting potential change is at most N −N . O +1 Step 2: Arc serves request σ We break down the analysis into four cases. Case 2.1 deals with the case when Arc finds the page in its cache. The other three cases assume that Arc faults on this request because the item is not in T1 ∪T2 . Cases 2.2 and 2.3 assume that the missing page is found recorded in the history in lists B1 and B2 , respectively. Case 2.4 assumes that the missing page is not recorded in history. Case 2.1: Arc has a page hit Clearly, the page was found in T1 ∪ T2 , and CArc = 0. We consider the change of each of terms in the potential function individually. 1. As per the algorithm, p can only change when the page is found in history. (See lines 3 through 10 of Arc(x).) Since the page is not found in Arc’s history, ∆p = 0. 2. If the hit happens in T1 , the page will move to the top of T2 (See line 2 of Arc(x).), which will result in a decrease in t1 . If the hit happens in T2 , the size of t1 will remain the same. The overall change in t1 will be 0. 3. Since Opt has already served the page, the page is in Opt’s cache. Therefore, even if the page’s rank could change when moved from T1 to MRU position of T2 , this rank will not affect the potential since the page is not in D. We, therefore, conclude that ∆Φ = 0, satisfying inequality (9). Next we will analyze the 3 cases when the requested page is not in Arc’s cache. Since CArc = 1, the change in potential must be ≤ −1 in each case in order for inequality (9) to be satisfied. Case 2.2: Arc has a page miss and the missing page is in B1 We consider the two cases, first when Replace moves an item from T1 to B1 and second when it moves an item from T2 to B2 . 1. Case 1: We consider the change in potential function by analyzing each of the 3 terms. • Value of p will either increase by 1 or stay the same in case p = N , we will account for the worst case which is when ∆p = 1. • A new page is being added to MRU of T2 , and Replace is taking the LRU page of T1 to B1 , then 2∆t1 = −2. • The page that moved from B1 to T2 is not in D, therefore the change in its rank will P not affect the potential, the other pages will could only decrease their rank, meaning that 2∆ q∈D R[q] ≤ 0. Since p increases by at most 1 and t1 decreases by at least 2 the total change in potential is at most -1. 2. Case 2: Once again. we consider the change in potential function by analyzing each of the three terms. • Value of p will either increase by 1 or stay the same in case p = N , we will account for the worst case which is when ∆p = 1. 12 • A new page is added to MRU of T2 , and Replace moves the LRU page of T2 to B2 . Thus, there is no change in T1 . • The page that moved from B1 to T2 is not in D, therefore the change in its rank will not affect the potential. Since t1 + t2 = N , it is guaranteed that at least N − NO + 1 pages are not in Opt. For the pages that are in T1 , their ranks will decrease by at least 2 since b1 decreases by 1, and for the pages in T2 their ranks will decrease by at least 2 as well since b2 increasesPby 1 but the LRU R[q] page in T2 will move to B2 , reducing P [q] for all the pages in T2 . The term 2 N q∈D −NO +1 decreases by at least -4. P R[q] Since p increases by at most 1 and 2 N q∈D −NO +1 decreases by at least -4 the total change in potential is at most -3. Case 2.3: Arc has a page miss and the missing page is in B2 When the missing page is in B2 , Arc makes a call to Replace (Line 5) and then executes Lines 18-19. Thus, p is decremented except if it is already equal to 0. We consider two sub cases: ∆p ≤ −1 and ∆p = 0. ∆p ≤ −1: As in Case 2.2, the call to Replace has no effect on t1 . Replace will not increment the rank using a similar analysis as in 2.2 and change in p will at least be -1. The change in the potential function is at most -1. ∆p = 0: Unlike the sub case above when p decreases by 1, the change in p cannot guarantee the required reduction in the potential. We therefore need a tighter argument. We know that there is a call to Replace. Two cases arise and are discussed below. • Replace moves an item in T1 to B1 : Since the LRU page of T1 is moved to the MRU position of B1 , 2∆t1 = −2 and there is no movement of a page in D that could increase the rank. Therefore the total change in the potential function is at most -2. • Replace moves an item in T2 to B2 : p = 0 indicates that T2 has N pages, therefore is guarantee that at least N − NO + 1 pages will not be part of Opt, contributing to the change in potential. The page being moved from T2 to B2 will decrease it’s rank by at least 2, and the rest of the pages in T2 will move down one position (P [q] will decrease by 1) while B2 will remain the same, resulting in a change in the potential function of at most -4. Thus, in each case the potential function decreased by at most -2. Case 2.4: Arc has a page miss and the missing page is not in B1 ∪ B2 1. t1 + b1 = N ; t1 < N ; The LRU page in B1 is evicted. Assume Replace moves a page from T1 to B1 and a new page is brought into T1 (∆t1 = 0, ∆b1 = 0, ∆t2 = 0, ∆b2 = 0). • The term p is not affected. • The term t1 is not affected. • Since t1 + b1 = N , at least N − No + 1 pages in T1 ∪ B1 are not in Opt. If the page is in B1 \ Opt then its rank decreases by 2; if the page is in T1 \ Opt its rank decreases by 4. 2. t1 + b1 = N ; t1 < N ; The LRU page in B1 is evicted. Assume Replace moves a page from T2 to B2 and a new page is brought into T1 (∆t1 = 1, ∆b1 = −1, ∆t2 = 1, ∆b2 = 1). • The term p is not affected. • The term t1 is increased by 1. 13 • Since t1 + t2 = N , at least N − No + 1 pages in T1 ∪ T2 that are not in Opt. If a page, q, is in T1 \ Opt then its rank decreases by 2 (∆R[q] = ∆4 ∗ P [q] + ∆2 ∗ b2 = −2); if the page, q, is in T2 \ Opt its rank decreases by 2 (∆R[q] = ∆4 ∗ P [q] + ∆2 ∗ b2 = −2). 3. t1 + b1 < N ; t1 + t2 + b1 + b2 = 2N ; Assume that the LRU page in B2 is evicted and Replace moves a page from T1 to B1 and a new page is brought into T1 (∆t1 = 0, ∆b1 = 1, ∆t2 = 0, ∆b2 = −1). • The term p is not affected. • The term t1 is not affected. • Here we used the fact that t2 + b2 > N , then at least N − No + 1 pages in T2 ∪B2 are not in Opt. If a page, q, is in T2 \Opt then its rank decreases by 2 (∆R[q] = ∆4∗P [q]+∆2∗b2 = 4∗(0)+2(−1) = −2); if the page, q, is in B2 \ Opt its rank decreases by 2 (∆R[q] = ∆2 ∗ P [q] = 2 ∗ (−1) = −2). 4. t1 + b1 < N ; t1 + t2 + b1 + b2 = 2N ; Assume that the LRU page in B2 is evicted and Replace moves a page from T2 to B2 and a new page is brought into T1 (∆t1 = 1, ∆b1 = 0, ∆t2 = 1, ∆b2 = 0). • The term p is not affected. • The term t1 is increased by 1. • Here we used the fact that t2 + b2 > N , then at least N − No + 1 pages in T2 ∪B2 are not in Opt. If a page, q, is in T2 \Opt then its rank decreases by 2 (∆R[q] = ∆4∗P [q]+∆2∗b2 = 4∗(0)+2(−1) = −2); if the page, q, is in B2 \ Opt its rank decreases by 2 (∆R[q] = ∆2 ∗ P [q] = 2 ∗ (−1) = −2). 5. t1 + b1 < N ; t1 + t2 + b1 + b2 < 2N ; In this case, no pages are evicted from history. Assume that Replace moves a page from T1 to B1 and a new page is brought into T1 (∆t1 = 0, ∆b1 = 1, ∆t2 = 0, ∆b2 = 0) • The term p is not affected. • The term t1 is increased by 1. • Here we cannot say that the rank decreases. Hence the rank term is at most 0. • The term |Arc| increases by 1. 6. t1 + b1 < N ; t1 + t2 + b1 + b2 < 2N ; In this case, no pages are evicted from history. Assume Replace moves a page from T2 to B2 and a new page is brought into T1 (∆t1 = 1, ∆b1 = 0, ∆t2 = −1, ∆b2 = 1) • The term p is not affected. • The term t1 is not affected. • Here we cannot say that the rank decreases. Hence the rank term is at most 0. • The term |Arc| increases by 1. Wrapping up the proof of Theorem 7: Combining the four cases (2.1 through 2.4) proves that inequality (9) is satisfied when Arc serves request σ. This completes the proof of Theorem 7, establishing that the upper bound on the competitiveness of Arc is 12N for the cases where the sizes of Opt and Arc are the same. By analyzing cases where the size of Arc is greater than Opt we can observe that since Arc 12N the greater the size of Arc’s cache relative to the size of Opt’s cache, smaller will be the will be N −N O +1 competitiveness of Arc. 14 4.5 Alternative Analysis of Competitiveness of Arc Below, we prove an improved upper bound on the competitiveness ratio of Arc. As seen below, the potential function is considerably different. Let CA and CO be the costs incurred by the algorithms Arc and Opt. We start with some notation and definitions. If X is the set of pages in a cache, then let M RU (X) and LRU (X) be the most recently and least recently used pages from X. Let M RUk (X) and LRUk (X) be the k most recently and k least recently used pages from X. Let lists L1 (and L2 ) be the lists obtained by concatenating lists T1 and B1 (T2 and B2 , resp.). Let list L be obtained by concatenating lists L1 and L2 . We let ℓ1 , ℓ2 , t1 , t2 , b1 , b2 denote the sizes of L1 , L2 , T1 , T2 , B1 , B2 , respectively. Finally, let t := t1 + t2 and ℓ := ℓ1 + ℓ2 . At any instant of time during the parallel simulation of Opt and Arc, and for any list X, we let M RUk (X) be denoted by T OP (X), where k is the largest integer such that all pages of M RUk (X) are also in the cache maintained by OPT. We let L′1 , L′2 , T1′ , T2′ denote the T OP s of L1 , L2 , T1 , T2 , respectively, with sizes ℓ′1 , ℓ′2 , t′1 , t′2 , respectively. We let b′1 and b′2 denote the sizes of the B1′ = L′1 ∩ B1 and B2′ = L′2 ∩ B2 , respectively. Note that if b′1 > 0 (b′2 > 0, resp.), then all of T1 (T2 , resp.) is in Opt. Finally, we let ℓ′ := ℓ′1 + ℓ′2 . The Arc algorithm ensures that 0 ≤ t ≤ N , 0 ≤ ℓ ≤ 2N and 0 ≤ ℓ1 ≤ N , thus making 0 ≤ ℓ2 ≤ 2N . We assume that algorithm X being analyzed is provided an arbitrary request sequence σ = σ1 , σ2 , . . . , σm . We define the potential function as follows: Φ = p − (b′1 + 2 · t′1 + 3 · b′2 + 4 · t′2 ). (10) The main result of this section is the following theorem: Theorem 8. Algorithm ARC is 4N -competitive. We say that the cache is full if t = N and either t1 + b1 = N or t2 + b2 ≥ N . We will prove the above theorem by proving the following inequality for any request σ that is requested after the cache is full: CA (σ) + ∆Φ ≤ 4N · CO (σ) + 2N, (11) where ∆X represents the change in any quantity X. Summing up the above inequality for all requests would prove the theorem as long as the number of faults prior to the cache becoming full is bounded by the additive term 2N . We make the following useful observation about a full cache. Lemma 5. When the request sequence requests the N -th distinct page, we have t = N , and this remains an invariant from that point onward. No items are discarded from the cache (main or history) until either t1 + b1 = N or ℓ1 + ℓ2 = 2N . By the time the request sequence requests the 2N -th distinct page, we have either t1 + b1 = N or ℓ1 + ℓ2 = 2N . Proof. Once the request sequence requests the N -th distinct page, it is obvious that we will have t = N , since until then, no item is evicted from T1 ∪ T2 ∪ B1 ∪ B2 . (Note that Replace only moves items from the main part to the history, i.e., from T1 ∪ T2 to B1 ∪ B2 .) Also, until then, p does not change. From that point forward, the algorithm never evicts any item from T1 ∪ T2 without replacing it with some other item. Thus, t = N is an invariant once it is satisfied. The history remains empty until the main cache is filled, i.e., t = N. From the pseudocode it is clear that items are discarded from the cache in statements 14, 17, and 21; no discards happen from the cache until either t1 + b1 = N (statement 12) or ℓ1 + ℓ2 = 2N (statement 20). If ℓ1 + ℓ2 = 2N is reached, since t1 + b1 ≤ N , we are guaranteed that t2 + b2 ≥ N and b1 + b2 = N , both of which will remain true from that point onward. Thus, by the time the 2N -th distinct page is requested, we have reached either t1 + b1 = N or ℓ1 + ℓ2 = 2N . We assume that request σ is processed in two distinct steps: first when Opt services the page request and, next when Arc services the request. We will show that inequality (11) is satisfied for each of the two steps. 15 Step 1: Opt services request σ Since only Opt acts in this step, CA = 0, and the contents of Arc’s cache does not change. There are two possible cases: either Opt faults on σ or it does not. Assume that page x is requested on request σ. If Opt does not fault on this request, then CO = 0. Since the contents of the cache maintained by Opt does not change, and neither do the lists L1 and L2 , we have ∆Φ = 0, and CA (σ) + ∆Φ ≤ 4N · CO (σ) ≤ 0. If Opt faults on request σ, then CO = 1. The contents of the cache maintained by Opt does change, which will affect the potential function. Opt will bring in page x into its cache. Assume that it evicts page y from its cache. The entry of page x into Opt’s cache can only decrease the potential function. The exit of page y from Opt’s cache can increase the potential function by at most 4N . The reason is as follows. Since the sum of b′1 , b′2 , t′1 , t′2 cannot exceed the size of Opt’s cache, we have 0 ≤ b′1 + t′1 + b′2 + t′2 ≤ N . Since b′1 + 2t′1 + 3b′2 + 4t′2 ≤ 4(b′1 + t′1 + b′2 + t′2 ), the left hand side cannot decrease by more than 4N . Thus, CA (σ) + ∆Φ1 ≤ 4N , proving inequality (11). Step 2: Arc services request σ There are four possible cases, which correspond to the four cases in Arc’s replacement algorithm. Case 1 deals with the case when Arc finds the page in its cache. The other three cases assume that Arc faults on this request because the item is not in T1 ∪ T2 . Cases 2 and 3 assume that the missing page is found recorded in the history in lists B1 and B2 , respectively. Case 4 assumes that the missing page is not recorded in history. Case I: Arc has a page hit. Clearly, CA = 0. We consider several subcases. In each case, the requested page will be moved to M RU (T2 ) while shifting other pages in T2 down. Case I.1 If the requested page is in T1′ , the move of this page from T1′ to T2′ implies ∆t′1 = −1; ∆t′2 = +1 and ∆Φ = −(2 · ∆t′1 + 4 · ∆t′2 ) = −2. Case I.2 If the requested page is in T2′ , the move of this page to M RU (T2 ) does not change the set of items in T2′ . Thus, ∆t′1 = ∆t′2 = 0 and ∆Φ = 0. Case I.3 If the requested page is in T1 − T1′ , then ∆t′1 = 0; ∆t′2 = +1 and ∆Φ = −4. One subtle point to note is that moving x from T1 − T1′ could potentially increase t′1 if the following conditions are met: x is located just below T1′ in T1 , it is not in Opt’s cache, and the items in T1 immediately below it are in Opt. However, x is already in Opt’s cache and there must be some item above it in T1 that is not in Opt. Case I.4 If the requested page is in T2 − T2′ , then ∆t′2 = +1 and ∆Φ = −4. The subtle point mentioned in Case I.3 also applies here. Next we will analyze the three cases when the requested page is not in Arc’s cache. Since CA = 1, the change in potential must be at most -1 in order for inequality (11) to be satisfied. We make the following useful observations in the form of lemmas. Lemma 6. If Arc has a miss and if the page is not in Arc’s history, we have ℓ′ = t′1 + t′2 + b′1 + b′2 < N . Consequently, we also have ℓ′1 < N and ℓ′2 < N . Proof. Since Opt has just finished serving the request, the page is present in the cache maintained by Opt just before Arc starts to service the request. If Arc has a miss, there is at least one page in the cache maintained by Opt that is not present in the cache maintained by Arc, implying that l′ < N . By definition, ℓ′ = ℓ′1 + ℓ′2 = t′1 + t′2 + b′1 + b′2 . Thus, the lemma holds. Lemma 7. A call to procedure Replace either causes an element to be moved from T1 to B1 or from T2 to B2 . In either case, the change in potential due to Replace, denoted by ∆ΦR , has an upper bound of 1. 16 Proof. Procedure Replace is only called when Arc has a page miss. Clearly, it causes an item to be moved from T1 to B1 or from T2 to B2 . If that item is in T1′ (or T2′ ), then T1 = T1′ (T2 = T2′ , resp.) and the moved item becomes part of B1′ (B2′ , resp.). Because the coefficients of b′1 and t′1 (b′2 and t′2 , resp.) differ by 1, we have ∆ΦR = +1. On the other hand, if that element is in T1 − T1′ (T2 − T2′ , resp.), then B1′ (B2′ , resp.) was empty before the move and remains empty after the move, and thus, ∆ΦR = 0. Lemma 8. On an Arc miss after phase P (0), if T1 = T1′ then the Replace step will not move a page from T2′ to B2 . On the other hand, if T2 = T2′ then Replace will not move a page from T1′ to B1 . Proof. In an attempt to prove by contradiction, let us assume that T1 = T1′ and T2 = T2′ are simultaneously true and Arc has a miss. By Lemma 5, we know that after phase, we have t = t1 + t2 = N , which by our assumption means that t′1 + t′2 = N ; this is impossible by Lemma 6. Thus, if T1 = T1′ , then T2 6= T2′ . Consequently, if LRU (T2 ) is moved to B2 , this item cannot be from T2′ . By a symmetric argument, if T2′ = T2 , then T1 6= T1′ , and LRU (T1 ) is not in T1′ . Case II: Arc has a miss and the missing page is in B1 Note that in this case the value of p will change by +1, unless its value equals N , in which case it has no change. Thus ∆p ≤ 1. If the missing item is in B1′ , then ∆b′1 = −1 and ∆t′2 = +1. Adding the change due to Replace, we get ∆Φ ≤ 1 − (∆b′1 + 4 · ∆t′2 ) + ∆ΦR ≤ −1 If the missing item is in B1 − B1′ , then we have ∆t′2 = 1 and ∆b′1 = 0. Thus, we have ∆Φ ≤ 1 − (∆b′1 + 4 · ∆t′2 ) + ∆ΦR ≤ −2 Case III: Arc has a miss and the missing page is in B2 . Note that in this case the value of p will change by -1, if its value was positive, otherwise it has no change. Thus ∆p ≤ 0. If the requested item is in B2′ , then ∆t′2 = 1, and ∆b′2 = −1. Thus, we have ∆Φ = ∆p − (3 · ∆b′2 + 4 · ∆t′2 ) + ∆ΦR ≤ 0 But this is not good enough since we need the potential change to be at most -1. When ∆p = −1, then we get the required inequality ∆Φ ≤ −1. Clearly, the difficulty is when ∆p = 0, which happens when p = 0. Since the missing item is from b′2 , it implies that B2′ is non-empty and T2′ = T2 . By Lemma 8 above, there must be at least one item in T1 − T1′ , which means that means that t1 > 0. As per the algorithm, since T1 is non-empty and p = 0, we are guaranteed to replace LRU (T1 ), and not an element from T1′ . Therefore, Replace will leave t′1 and b′1 unchanged, implying that ∆ΦR = 0. Thus, we have ∆Φ = ∆p − (3 · ∆b′2 + 4 · ∆t′2 ) + ∆ΦR ≤ −1 If the requested item is from B2 − B2′ , then ∆t′2 = 1, and ∆b′2 = 0. Thus, we have ∆Φ ≤ ∆p − (4 · ∆t′2 ) + ∆ΦR ≤ −3 Case IV: Arc has a miss and the missing page is not in B1 ∪ B2 17 We consider two cases. First, when ℓ1 = N , Arc will evict the LRU (L1 ). Since by Lemma 6, ℓ′1 < N , we know that for this case, b′1 remains unchanged at 0 and ∆t′1 = +1. Thus, ∆Φ ≤ ≤ −(2 · ∆t′1 ) + ∆ΦR −1 On the other hand, if ℓ1 < N , then Arc will evict the LRU (L2 ). Again, if the cache is full (i.e., t1 + t2 = N and ℓ1 + ℓ2 = 2N ), then we know that ℓ2 > N , which means that L′2 6= L2 and LRU (L2 ) is not in L′2 . Thus, deletion of LRU (L2 ) = LRU (B2 ) will not affect b′2 or any of the other quantities in the potential function. Then comes the Replace step, for which a bound has been proved earlier. Finally, a new item is brought in and placed in M RU (T1 ). Thus ∆t′1 ≤ 1. Putting it all together, we have ∆Φ ≤ −(2 · ∆t′1 ) + ∆ΦR ≤ −1 Wrapping up the proof of Theorem 8 Tying it all up, we have shown that inequality (11) holds for every request made after the cache is full, i.e., CA (σ) + ∆Φ ≤ 4N · CO (σ). If we assume that the caches started empty, then the initial potential is 0, while the final potential can be at most 4N . Thus, we have CA (σ) ≤ 4N · CO (σ) + 4N, thus proving Theorem 8. 4.6 Analyzing the Competitiveness of CAR Next, we analyze the competitiveness of Car. The main result of this section is the following: Theorem 9. Algorithm Car is 18N -competitive. Proof. Let PX [q] be the position of page q in an arbitrary ordered sequence of pages X. When the set is obvious, we will drop the subscript and denote PX [q] simply by P [q]. The set of history pages B1 and B2 will be treated as an ordered sequence of pages ordered from its LRU position to its MRU position. The set of main pages T10 (resp., T20 , T11 , and T21 ) will be treated as an ordered sequence of unmarked (resp., unmarked, marked, and marked) pages in T1 (resp, T2 , T1 , and T2 ) ordered from head to tail. Let Opt and Car be the set of (main and history) pages stored in the caches for algorithms Opt and Car respectively. Let D = (T1 ∪ T2 ∪ B1 ∪ B2 ) \ Opt. Thus D consists of pages in Car but not in Opt. We associate each page with a rank value R[q], which is defined as follows:  PB1 [q]      PB2 [q]    2P 0 [q] + b 1 T1 R[q] =  0 2P [q] + b 2  T2    3N + 2PT11 [q] + b1    3N + 2PT21 [q] + b2 if if if if if if q q q q q q ∈ B1 ∈ B2 ∈ T10 ∈ T20 ∈ T11 ∈ T21 (12) Finally, we define the potential function as follows: Φ= X  1 (p + 2(b1 + t1 ) + 3 R[q]) N − NO + 1 q∈D 18 (13) The initial value of Φ is 0. If the following inequality (14) is true for any request σ, where ∆Φ is the change in potential caused by serving the request, then when summed over all requests, it proves Theorem 9. CCar (σ) + ∆Φ ≤  18N COpt (σ). N − NO + 1 (14) As before, we assume that request σ is processed in two distinct steps: first when Opt serves and, next when Car serves. We will show that inequality (14) is satisfied for each of the two steps. Step 1: Opt serves request σ Since only Opt acts in this step, CCar = 0, and T1 ∪ T2 does not change. There are two possible cases: either Opt faults on σ or it does not. If Opt does not fault on this request, then it is easy to see that COpt = 0 and ∆Φ = 0, thus satisfying inequality (14). If Opt faults on request σ, then COpt = 1 and some page, q, is evicted from the cache maintained by Opt. If q is maintained by Car then it follows that q will belong to D after this step and thus its rank will contribute to the potential function, which will increase by three times the rank of q. The maximal positive change in potential will occur when q is the marked head page in T2 . In this case the rank of q is given by: R[q] = 3N + 2P [q] + b2 . The maximal possible values for each of the terms P [q] and b2 will be N , hence the maximum possible rank of q will be 3N + 2N + N = 6N . Therefore resulting potential change is at most 3(6N ) = 18N . Step 2: Car serves request σ We break down the analysis into four cases. Case 2.1 deals with the case when Car finds the page in its cache. The other three cases assume that Car faults on this request because the item is not in T1 ∪T2 . Cases 2.2 and 2.3 assume that the missing page is found recorded in the history in lists B1 and B2 , respectively. Case 2.4 assumes that the missing page is not recorded in history. Case 2.1: Car has a page hit Clearly, the page was found in T1 ∪ T2 , and CCar = 0. We consider the change of each of terms in the potential function individually. 1. As per the algorithm, p can only change when the page is found in history. (See lines 14 through 20 of Car(x).) Since the page is not found in Car’s history, ∆p = 0. 2. Neither the cache nor the history lists maintained by Car will change. Thus, the contribution to the second term in Φ, i.e., 2(b1 + t1 ) does not change. 3. Since Opt has already served the page, the page is in Opt’s cache. Therefore, even if the page gets marked during this hit, its rank value does not change. Thus, the contribution to the last term in Φ, also remains unchanged. We, therefore, conclude that ∆Φ = 0, satisfying inequality (14). Next we will analyze the three cases when the requested page is not in Car’s cache. Since CCar = 1, the change in potential must be at most −1 in each case in order for inequality (14) to be satisfied. Before tackling the three cases, the following lemmas (9 and 10) Pare useful for understanding the potential change caused by the last term in the potential function, i.e., q∈D R[q]. It is worth pointing out that a call to Replace moves either an item from T1 to B1 or from T2 to B2 , which is exactly the premise of Lemma 9 below. Lemma 9. When a page is moved from T1 to B1 (or from T2 to B2 ) its rank decreases by at least 1. Proof. Let q be any page in T1 . In order for q to be moved from T1 to B1 it must have been unmarked and located at the head of T1 . Since PT1 [q] = 1, the rank of q prior to the move must have been R[q] = 2PT1 [q] + b1 = b1 + 2, where b1 is the size of B1 prior to moving q. 19 After q is moved to the MRU position of B1 , R[q] = PB1 [q] = b1 + 1. Thus its rank decreased by 1. The arguments for the move from T2 to B2 are identical with the appropriate changes in subscripts. P Lemma 10. When Car has a page miss, the term q∈D R[q] in the potential function Φ cannot increase. Proof. We examine the rank change based on the original location of the page(s) whose ranks changed and in each case show that the rank change is never positive. Wherever appropriate we have provided references to line numbers in Pseudocode Car(x) from Appendix. Case A: q ∈ B1 ∪ B2 The rank of q ∈ B1 , which is simply its position in B1 , can change in one of three different ways. 1. Some page x less recently used than q (i.e., PB1 [x] < PB1 [q]) was evicted (Line 7). In this case, it is clear that PB1 [q] decreases by at least 1. 2. The page q is the requested page and is moved to T2 (Line 16). In this case, q ∈ Opt and hence its rank cannot affect the potential function. 3. Some page x is added to MRU of B1 (Line 27). Since pages are ordered from LRU to MRU, the added page cannot affect the rank of q. Using identical arguments for q ∈ B2 , we conclude that a miss will not increase the rank of any page in B1 ∪ B2 . Case B: q ∈ T10 ∪ T20 The rank of page q ∈ T10 , defined as R[q] = 2PT10 [q] + b1 , may be affected in four different ways. 1. If page q is the head of T1 and gets moved to B1 (Line 27), by lemma 9, the change in rank of q is at most −1. 2. If an unmarked page x is added to the tail of T1 (Line 13), then since the ordering is from head to tail, it does not affect the position of page q. Since there was no change in b1 , it is clear that the change in R[q] is 0. 3. If the unmarked page x 6= q at the head of T1 is marked and moved to tail of T2 (Line 29), then P [q] decreases by at least 1. Since the content of B1 is unchanged, the change in R[q] = 2P [q] + b1 is at most -2. 4. If the unmarked page x 6= q at the head of T1 is moved to B1 (Line 29), then P [q] decreases by at least 1, and b1 increases by 1. Hence the change in R[q] = 2P [q] + b1 is at most -1. The arguments are identical for q ∈ T20 . In each case, we have shown that a miss will not increase the rank of any page in T10 ∪ T20 . Case C: q ∈ T11 The rank of page q ∈ T11 , defined as R[q] = 3N + 2PT11 [q] + b1 , may be affected in four different ways. 1. If an unmarked page x is added to the tail of T1 (Line 13), then since the ordering is from head to tail, it does not affect the position of page q. Since there was no change in b1 , it is clear that the change in R[q] is 0. 2. If the unmarked page x 6= q at the head of T1 is marked and moved to tail of T2 (Line 29), then P [q] decreases by at least 1. Since B1 is unchanged, the change in R[q] = 3N + 2P [q] + b1 is at most -2. 3. If the unmarked page x 6= q at the head of T1 is moved to B1 (Line 29), then P [q] decreases by at least 1, and b1 increases by 1. Hence the change in R[q] = 3N + 2P [q] + b1 is at most -1. 20 4. Next, we consider the case when the marked page q is the head of T1 and gets unmarked and moved to T2 (Line 29). Prior to the move, the rank of q is given by R[q] = 3N + 2PT11 [q] + b1 . Since B1 could be empty, we know that R[q] ≥ 3N + 2. After page q is unmarked and moved to T2 , its rank is given by R[q] = 2PT20 [q] + b2 . Since P [q] ≤ N and b2 ≤ N , we know that the new R[q] ≤ 3N . Thus, the rank of page q does not increase. In each case, we have shown that a miss will not increase the rank of any page in T11 . Case D: q ∈ T21 The rank of page q ∈ T21 , defined as R[q] = 3N + 2PT21 [q] + b2 , may be affected in four different ways. 1. If an unmarked page x is added to the tail of T2 (Lines 16, 19, or 29), and if b2 does not change, it is once again clear that the change in R[q] is 0. 2. If a marked page x 6= q at the head of T2 gets unmarked and moved to the tail of T2 (Line 36), the position of q will decrease by 1 and there is no change in b2 . Thus R[q] changes by at most -2. 3. If an unmarked page x at the head of T2 is moved to B2 (Line 34), P [q] decreases by 1 and b2 increases by 1. Thus R[q] changes by at most -1. 4. Finally, we consider the case when the marked page q is the head of T2 and gets unmarked and moved to the tail of T2 (Line 36). Prior to the move, the rank of q is given by R[q] = 3N + 2PT21 [q] + b2 . Even if B2 is empty, we know that R[q] ≥ 3N + 2. After page q is unmarked and moved to T2 , its rank is given by R[q] = 2PT20 [q] + b2 . Since P [q] ≤ N and b2 ≤ N , we know that the new R[q] ≤ 3N . Thus, the rank of page q does not increase. In each case, we have shown that a miss will not increase the rank of any page in T21 . The four cases (A through D) together complete the proof of Lemma 10. We continue with the remaining cases for the proof of Theorem 9. Case 2.2: Car has a page miss and the missing page is in B1 We consider the change in the potential function (defined in Eq. 13) by analyzing each of its three terms. 1. Value of p increases by 1, except when it is equal to N , in which case it remains unchanged. (See Line 15.) Thus, the first term increases by at most 1. 2. The call to Replace has no effect on the value of (t1 + b1 ) because an item is moved either from T1 to B1 or from T2 to B2 . Since the requested page in B1 is moved to T2 , (t1 + b1 ) decreases by 1. 3. By Lemma 10, we already know that the last term increases by at most 0. Since p increases by at most 1 and the term 2(t1 +b1 ) decreases by at least 2, the total change in the potential function, is at most -1. Case 2.3: Car has a page miss and the missing page is in B2 When the missing page is in B2 , Car makes a call to Replace (Line 5) and then executes Lines 18-19. Thus, p is decremented except if it is already equal to 0. We consider two subcases: ∆p < 0 and ∆p = 0. ∆p < 0: As in Case 2.2, the call to Replace has no effect on (t1 + b1 ). Since, Lines 18-19 do not affect T1 ∪ B1 , the second term does not change. By Lemma 10, we know that the last term increases by at most 0. Since ∆p ≤ −1, the total change in the potential function, ∆p + ∆2(t1 + b1 ) is at most -1. 21 ∆p = 0: Unlike the subcase above when p decreases by 1, the change in p cannot guarantee the required reduction in the potential. We therefore need a tighter argument. We know that there is a call to Replace. Three cases arise and are discussed below. • If T1 is empty, then T2 must have N pages, at least one of which must be in D. Also, Replace must act on T2 , eventually evicting an unmarked page from head of T2 , causing the rank of any page from T2 \ Opt to decrease by 1. • If T1 is not empty and has at least one page from D, then the condition in Line 24 passes and Replace must act on T1 , eventually evicting an unmarked page from head of T1 , causing the rank of at least one page from T1 \ Opt to decrease by 1. • Finally, if T1 is not empty and all its pages are in Opt, then T2 must have a page q ∈ D. Since the requested page x was found in B2 and is moved to the tail of T2 , even though the position of q in T2 does not change, b2 decreased by 1 and consequently the rank of q decreases by 1. Thus, in each case, even though neither p nor the quantity (t1 + b1 ) changed, the third term involving ranks, and consequently, the potential function decreased by at least 3. The following two lemmas are useful for Case 2.4, when the missing page is not in T1 ∪ T2 ∪ B1 ∪ B2 . Lemma 11. We make two claims: 1. If t1 + b1 = N and the LRU page of B1 is evicted from the cache on Line 7, then decrease by at least one. 2. If t2 + b2 > N , and the LRU page of B2 , is evicted from the cache on Line 9, then decrease by at least one. P q∈D P q∈D R[q] will R[q] will Proof. We tacke the first claim. Assume that y is the LRU page of B1 that is being evicted on Line 7. Then Car must have had a page miss on x 6∈ B1 ∪ B2 , and the requested page x is added to the tail of T1 . Since t1 + b1 = N , there is at least one page q ∈ T1 ∪ B1 that is not in Opt’s cache and whose rank contributes to the potential function. First, we assume that q ∈ T1 \ Opt, whose rank is given by: R[q] = 2 ∗ P [q] + b1 . For each of the three cases, we show that the potential function does decrease by at least 1. • If Replace acts on T1 and the unmarked head of T1 , different from q, is moved to B1 then the size of B1 remains the same (because a page gets added to B1 while another page is evicted) but the position of q in T1 decreases by one. Therefore R[q] decreases by 2. • If Replace acts on T1 and q itself is moved to B1 then by Lemma 9, R[q] decreases by at least 1. • If Replace acts on T2 , then we use the fact that a page is evicted from B1 , and the b1 term in R[q] must decrease by 1. Next, we assume that q ∈ B1 \ Opt. Since LRU (B1 ) is evicted, the position of the page q will decrease by one. Thus R[q] = PB1 [q] must decrease by at least 1, completing the proof of the first claim in the lemma. The proof of the second claim is very similar and only requires appropriate changes to the subscripts. Next we tackle the last case in the proof of Theorem 9. Case 2.4: Car has a page miss and the missing page is not in B1 ∪ B2 We assume that Car’s cache is full (i.e., l1 + l2 = 2N ). We consider two cases below – first, if l1 = N and the next when l1 < N . If l1 = t1 + b1 = N , Car will call Replace, evict LRU (B1 ) and then add the requested page to the tail of T1 . Below, we analyze the changes to the three terms in the potential function. • Since p is not affected, the first term does not change. • Since a page is added to T1 and a page is evicted from B1 , the net change in the second term is 0. • Since the conditions of Lemma 11 apply, the total rank will decrease by at least 1. 22 Adding up all the changes, we conclude that the potential function decreases by at least 3. If l1 < N , Car will call Replace, evict LRU (B2 ) and then add a page to the tail of T1 . As above, we analyze the changes to the three terms in the potential function. • Since p is not affected, the first term does not change. • A page is added to T1 and a page is evicted from B2 hence (t1 + b1 ) increases by 1. • Since l2 > N , the conditions of Lemma 11 apply, the total rank will decrease by at least 1. Adding up all the changes, we conclude that the potential function decreases by at least 1, thus completing Case 2.4. Wrapping up the proof of Theorem 9: Combining the four cases (2.1 through 2.4) proves that inequality (14) is satisfied when Car serves request σ. This completes the proof of Theorem 9, establishing that the upper bound on the competitiveness of Car is 18N . 5 Conclusions and Future Work Adaptive algorithms are tremendously important in situations where inputs are infinite online sequences and no single optimal algorithm exists for all inputs. Thus, different portions of the input sequence require different algorithms to provide optimal responses. Consequently, it is incumbent upon the algorithm to sense changes in the nature of the input sequence and adapt to these changes. Unfortunately, these algorithms are harder to analyze. We present the analysis of two important adaptive algorithms called Arc and Car and show that they are competitive along with proving good lower bounds on the competitiveness ratios. Two important open questions remain unanswered. Given that there is a gap between the lower and upper bounds on the competitiveness ratios of the two adaptive algorithms, Arc and Car, what is the true ratio? More importantly, is there an “expected” competitiveness ratio for request sequences that come from real applications? The second question would help explain why Arc and Car perform better in practice than Lru and Clock, respectively. Acknowledgments This work was partly supported by two NSF Grants (CNS-1018262 and CNS-1563883) and the NSF Graduate Research Fellowship (DGE-1038321). We are grateful to Kirk Pruhs for suggesting enhancing our results with the assumption of unequal cache sizes. 23 References [Alb96] S. Albers. Competitive online algorithms. Technical report, BRICS Lecture Series, Computer Science Department, University of Aarhus, 1996. [BM04] S. Bansal and D. S. Modha. CAR: CLOCK with adaptive replacement. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies, FAST ’04, pages 187–200, Berkeley, CA, USA, 2004. USENIX Association. [Cor68] F. J. Corbato. A paging experiment with the MULTICS system. Technical report, DTIC Document, 1968. [Fri99] M. B. Friedman. Windows NT page replacement policies. In Proceedings of the Intl. CMG Conference, pages 234–244, 1999. [Hoc97] D. S. Hochbaum, editor. Approximation algorithms for NP-hard problems. PWS Publishing Co., Boston, MA, USA, 1997. [JCZ05] S. Jiang, F. Chen, and X. Zhang. CLOCK-Pro: An effective improvement of the CLOCK replacement. In USENIX Annual Technical Conference, General Track, pages 323–336, 2005. [JIPP10] A. Janapsatya, A. Ignjatovic, J. Peddersen, and S. Parameswaran. Dueling CLOCK: adaptive cache replacement policy based on the CLOCK algorithm. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2010, pages 920–925. IEEE, 2010. [JS94] T. Johnson and D. Shasha. 2Q: A low overhead high performance buffer management replacement algorithm. In Proc. of VLDB, pages 297–306, 1994. [JZ02] S. Jiang and X. Zhang. LIRS: An efficient low inter-reference recency set replacement policy to improve buffer cache performance. In Proc. ACM Sigmetrics Conf., pages 297–306. ACM Press, 2002. [LCK+ 01] D. Lee, J. Choi, J. H. Kim, S. H. Noh, S. L. Min, Y. Cho, and C. S. Kim. LRFU: A spectrum of policies that subsumes the least recently used and least frequently used policies. IEEE Trans. Comput., 50(12):1352–1361, December 2001. [MM03] N. Megiddo and D. S. Modha. ARC: A self-tuning, low overhead replacement cache. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies, FAST ’03, pages 115–130, Berkeley, CA, USA, 2003. USENIX Association. [MM04] N. Megiddo and D. S. Modha. Outperforming LRU with an adaptive replacement cache algorithm. IEEE Computer, 37(4):58–65, 2004. [OOW93] E. J. O’Neil, P. E. O’Neil, and G. Weikum. The LRU-K page replacement algorithm for database disk buffering. SIGMOD Rec., 22(2):297–306, June 1993. [ST85] D. D. Sleator and R. E. Tarjan. Amortized efficiency of list update and paging rules. Commun. ACM, 28(2):202–208, February 1985. 24 6 Appendix We reproduce the pseudocode for Arc and Car below. Pseudocode: Arc(x) INPUT: The requested page x INITIALIZATION: Set p = 0 and set lists T1 , B1 , T2 , and B2 to empty 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: if (x is in T1 ∪ T2 ) then Move x to the top of T2 else if (x is in B1 ) then Adaptation: Update p = min{p + 1, N } Replace() Fetch x and move to the top of T2 else if (x is in B2 ) then Adaptation: Update: p = max{p − 1, 0} Replace() Fetch x and move to the top of T2 else if (t1 + b1 = N ) then if (t1 < N ) then Discard LRU item in B1 Replace() else Discard LRU page in T1 and remove from cache end if else if ((t1 + b1 < N ) and (t1 + t2 + b1 + b2 ≥ N )) then if (t1 + t2 + b1 + b2 = 2N ) then Discard LRU item in B2 end if Replace() end if Fetch x and move to the top of T1 end if Replace() 26: if ((t1 ≥ 1) and ((x ∈ B2 and t1 = p) or (t1 > p))) then 27: Discard LRU page in T1 and insert as MRU history item in B1 28: else 29: Discard LRU page in T2 and insert as MRU history item in B2 30: end if 25 ⊲ cache hit ⊲ cache history hit ⊲ learning rate = 1 ⊲ make space in T1 or T2 ⊲ cache history hit ⊲ learning rate = 1 ⊲ make space in T1 or T2 ⊲ cache and history miss ⊲ make space in T1 or T2 ⊲ make space in T1 or T2 Pseudocode: Car(x) INPUT: The requested page x INITIALIZATION: Set p = 0 and set lists T1 , B1 , T2 , and B2 to empty 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: if (x is in T1 ∪ T2 ) then ⊲ cache hit Mark page x else ⊲ cache miss if (t1 + t2 = N ) then ⊲ cache full, replace a page from cache Replace() ⊲ make space in T1 or T2 if ((x 6∈ B1 ∪ B2 ) and (t1 + b1 = N )) then Discard LRU page in B1 else if ((x 6∈ B1 ∪ B2 ) and (t1 + t2 + b1 + b2 = 2N )) then Discard LRU page in B2 . end if end if if (x 6∈ B1 ∪ B2 ) then ⊲ cache miss Insert x at the tail of T1 ; Unmark page x else if (x ∈ B1 ) then ⊲ cache history hit Adaptation: Update p = min{p + 1, N } ⊲ learning rate = 1 Move x to the tail of T2 ; Unmark page x else ⊲ cache history hit Adaptation: Update: p = max{p − 1, 0} ⊲ learning rate = 1 Move x to the tail of T2 ; Unmark page x end if end if Replace() 22: found = false 23: repeat 24: if (t1 ≥ max{1, p}) then 25: if (head page in T1 is unmarked) then 26: found = true 27: Discard head page in T1 and insert as MRU history item in B1 28: else 29: Unmark head page in T1 , move page as tail page in T2 , and move head of T1 clockwise 30: end if 31: else 32: if (head page in T2 is unmarked) then 33: found = true 34: Discard head page in T2 and insert as MRU history item in B2 35: else 36: Unmark head page in T2 , and move head of T2 clockwise 37: end if 38: end if 39: until (found) 26
8cs.DS
arXiv:1712.01542v1 [math.RA] 5 Dec 2017 CAPABLE LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO OVER AN ARBITRARY FIELD PEYMAN NIROOMAND, FARANGIS JOHARI, AND MOHSEN PARVIZI Abstract. In this paper, we classify all capable nilpotent Lie algebras with the derived subalgebra of dimension 2 over an arbitrary field. Moreover, the explicit structure of such Lie algebras of class 3 is given. 1. Introduction and Motivation The concept of capability was introduced by P. Hall in [9]. Recall that a group G is called capable if there exists some group E such that G ∼ = E/Z(E), where Z(E) denotes the center of E. There are some fundamental known results concerning capability of p-groups. For instance, in [3, Corollary 4.16], it is shown the only capable extra-special p-groups (the p-groups with Z(G) = G′ and |G′ | = p) are those of order p3 and exponent p. In the case that G′ = Z(G) and Z(G) is elementary abelian p-group of rank 2, Heineken in [11] proved that the capable ones has order at most p7 . By some results due to Lazard, we may associate a p-group to a Lie algebra. Therefore some results of Lie algebras and p-groups have similarities in the structure. But in this way not every thing are the same and there are differences between groups and Lie algebras, so that most of time the proofs are different. Similar to the concept of the capability for groups, a Lie algebra is called capable provided that L∼ = H/Z(H) for a Lie algebra H. Beyl et al. in [3] introduced the epicenter Z ∗ (G) of a group G that plays an important role in the capability of G. The analogous notion of the epicenter, Z ∗ (L) for a Lie algebra L was defined in [19]. It is shown that L is capable if and only if Z ∗ (L) = 0. Another notion having relation to the capability is the concept of exterior square of Lie algebras, L ∧ L, which was introduced in [6]. Our approach is on the concept of the exterior center Z ∧ (L), the set of all elements l of L for which l ∧l′ = 0L∧L for all l′ ∈ L. Niroomand et al. in [17] showed Z ∧ (L) = Z ∗ (L) for any finite dimensional Lie algebra L. In [17], the last two authors obtained the structure of a capable nilpotent Lie algebra L when dim L2 ≤ 1. It developed the result of [3, Corollary 4.16] for groups to the class of Lie algebras. Recall that from [18], a Lie algebra H is called generalized Heisenberg of rank n if H 2 = Z(H) and dim H 2 = n. If n = 1, then H is a Heisenberg Lie algebra that is more well-known. Such algebras are odd dimension and have the presentation H(m) ∼ = ha1 , b1 , . . . , am , bm , z [al , bl ] = z, 1 ≤ l ≤ mi. Date: December 6, 2017. Key words and phrases. Capability, Schur multiplier, generalized Heisenberg Lie algebras, stem Lie algebras. Mathematics Subject Classification 2010. Primary 17B30; Secondary 17B05, 17B99. 1 2 P. NIROOMAND, F. JOHARI, AND M. PARVIZI Recently, Niroomand et al. in [18] proved the capable generalized Heisenberg Lie algebras of rank 2 have dimension at most 7 over a filed of characteristic not equal to 2. They developed the result of Heineken [11] for groups to the area of Lie algebras. They also characterized the structure of all capable nilpotent Lie algebras of class two when dim L2 = 2. In virtue of the recent results in [18], in this paper we intend to classify the structure of all capable nilpotent Lie algebras of class two with the derived subalgebra of dimension 2 over an arbitrary filed. Furthermore, we determine the structure of all nilpotent Lie algebras of class 3 with the derived subalgebra of dimension 2 and then we specify which one of them are capable. 2. Preliminaries All Lie algebras in this paper are finite dimensional. The Schur multiplier of a Lie algebra L, M(L), is defined as M(L) ∼ = F/R and F = R ∩ F 2 /[R, F ] where L ∼ is a free Lie algebra. It can be shown that the Lie algebra M(L) is abelian and independent of the choice of the free Lie algebra F (see [1, 2, 4, 10, 13, 14, 15, 16, 17] for more information on this topics). Throughout the paper ⊗ used to denote the operator of usual tensor product of algebras. For a Lie algebra L, we denote the factor Lie algebra L/L2 by L(ab) . Also we denote an abelian Lie algebra of dimension n by A(n). The following proposition plays a key role in detecting the capability of Lie algebras. Proposition 2.1. Let L be a finite dimensional Lie algebra with a central ideal I. Then (i) dim(M(L)) ≥ dim(M(L/I)) − dim(L2 ∩ I), (ii) dim(M(L)) = dim(M(L/I)) − dim(L2 ∩ I) if and only if I ⊆ Z ∗ (L). Proof. The result follows from [19, Proposition 4.1(iii) and Theorem 4.4 ].  The following lemma from [19] is a useful instrument in the next investigations. Lemma 2.2. Let I be an ideal of a Lie algebras L such that L/I is capable. Then Z ∗ (L) ⊆ I. The next corollary shows that the epicenter of a Lie algebra is contained in its derived subalgebra. Corollary 2.3. Let L be a finite dimensional non-abelian nilpotent Lie algebra. Then Z ∗ (L) ⊆ L2 . Proof. Since dim L/L2 ≥ 2, L/L2 is capable, using [17, Theorem 3.3]. Therefore the result follows by Lemma 2.2.  We need the notion of a central product of Lie algebras, it is defined as follows. Definition 2.4. The Lie algebra L is a central product of A and B, if L = A + B, where A and B are ideals of L such that [A, B] = 0 and A ∩ B ⊆ Z(L). We denote the central product of two Lie algebras A and B by A ∔ B. The Heisenberg Lie algebra can be presented in terms of central products. Lemma 2.5. [12, Lemma 3.3] Let L be a Heisenberg Lie algebra of dimension 2m + 1. Then L is central products of its ideals Bj for all 1 ≤ j ≤ m such that Bj is the Heisenberg Lie algebra of dimension 3. LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO 3 It is not an easy matter to determine the capability of a central product in general. The next result gives the answer in a particular case. Proposition 2.6. [18, Proposition 2.2] Let L be a Lie algebra such that L = A ∔ B with A2 ∩ B 2 6= 0. Then A2 ∩ B 2 ⊆ Z ∧ (L) and so L is non-capable. Following [18, Propositions 2.4 and 2.6], for determining the capable nilpotent Lie algebras of class 2 with the derived subalgebra of dimension 2, it is enough to consider a generalized Heisenberg Lie algebra H when 5 ≤ dim H ≤ 7. Throughout the paper multiplication tables with respect to a fixed basis with trivial products of the form [x, y] = 0 omitted, when x, y belongs to the Lie algebra. Nilpotent Lie algebras of dimension at most 5 can be described uniformly over all fields in [5, 7, 8]. For the dimension 6, 7 over an algebraic closed filed the structure are known in [5, 7, 8]. Using notation and terminology of [5, 7, 8], we list the generalized Heisenberg Lie algebras of rank two of dimension at most 6 and 7 over field of characteristic 2 and characteristic different 2, respectively. Recall that in a field F of characteristic 2, ω denotes a fixed element from F \ {x2 + x|x ∈ F}. Theorem 2.7. Let H be a generalized Heisenberg Lie algebra of rank 2. Then (i) over a field F of characteristic 2, the list of the isomorphism types of generalized Heisenberg Lie algebras of dimension at most 6 are the fol(2) lowing: L5,8 = hx1 , . . . , x5 [x1 , x2 ] = x4 , [x1 , x3 ] = x5 i and L6,7 (η) = hx1 , . . . , x6 |[x1 , x2 ] = x5 , [x1 , x3 ] = x6 , [x2 , x4 ] = ηx6 , [x3 , x4 ] = x5 + x6 i where η ∈ {0, ω}, (ii) over a field F of characteristic different from 2, the list of the isomorphism types of generalized Heisenberg Lie algebras of dimension at most 7 are L5,8 = hx1 , . . . , x5 [x1 , x2 ] = x4 , [x1 , x3 ] = x5 i, L6,22 (ǫ) = hx1 , . . . , x6 [x1 , x2 ] = x5 = [x3 , x4 ], [x1 , x3 ] = x6 , [x2 , x4 ] = ǫx6 i, ∗ where ǫ ∈ F/(∼) and char F 6= 2, L1 = 27A = hx1 , . . . , x7 [x1 , x2 ] = x6 = [x3 , x4 ], [x1 , x5 ] = x7 = [x2 , x3 ]i, L2 = 27B = hx1 , . . . , x7 [x1 , x2 ] = x6 , [x1 , x4 ] = x7 = [x3 , x5 ]i. 3. capable generalized Heisenberg Lie algebras of rank two Here, we are going to determine the structures of capable generalized Heisenberg Lie algebras of rank two. By [18, Proposition 2.6], generalized Heisenberg Lie algebras with the derived subalgebra of dimension 2 are capable if their dimension lies between 5 and 7. According to Theorem 2.7, we have the presentation of all capable generalized Heisenberg Lie algebras of rank two over a filed F with char F 6= 2. But when char F = 2 the structure of them is unknown. Therefore, at first we intend to find the structure of them on an arbitrary filed and then we determine which ones are capable. Theorem 3.1. Let L be a 7-dimensional generalized Heisenberg Lie algebra over a filed F with char F = 2 of rank two. Then L ∼ = hx1 , . . . , x7 [x1 , x2 ] = x6 = [x3 , x4 ], [x1 , x5 ] = x7 = [x2 , x3 ]i or L ∼ = hx1 , . . . , x7 [x1 , x2 ] = x6 , [x1 , x4 ] = x7 = [x3 , x5 ]i. 4 P. NIROOMAND, F. JOHARI, AND M. PARVIZI Proof. Let L2 = hz1 i ⊕ hz2 i. By [17, Theorem 3.6], we have L/hz2 i ∼ = H(2) ⊕ A(1) or L/hz2 i ∼ = H(1) ⊕ A(3). First suppose that L/hz2 i ∼ = H(2) ⊕ A(1). There exist two ideals I1 /hz2 i and I2 /hz2 i of L/hz2 i such that I1 /hz2 i ∼ = H(2) and I2 /hz2 i ∼ = A(1). Clearly, L = I1 + I2 , I1 ∩ I2 = hz2 i, [I1 , I2 ] ⊆ hz2 i and [L, I2 ] ⊆ hz2 i. Thus I1 /hz2 i = hx1 + hz2 i, y1 + hz2 i, x2 + hz2 i, y2 + hz2 i, z1 + hz2 i|[x1 , y1 ] + hz2 i = [x2 , y2 ] + hz2 i = z1 + hz2 ii and I2 = hqi ⊕ hz2 i ∼ = A(2) for some q ∈ L. Hence the set {x1 , y1 , x2 , y2 , z1 , z2 , q} is a basis of L and [x1 , y1 ] = z1 + α1 z2 , [x2 , y2 ] = z1 + α2 z2 , [x1 , y2 ] = α3 z2 , [x1 , x2 ] = α4 z2 , [x2 , y1 ] = α5 z2 , [y1 , y2 ] = α6 z2 , [x1 , q] = α7 z2 , [y1 , q] = α8 z2 , [x2 , q] = α9 z2 , [y2 , q] = α10 z2 . By changing variable, we assume that α1 = α2 = 0. Since q ∈ / L2 = Z(L) = hz1 i⊕hz2 i, q is not central. Thus [L, I2 ] = [hqi, I2 ] = hz2 i. Without loss of generality, assume that α7 6= 0. By [17, Theorem 3.6], we have L/hz1 i ∼ = H(2) ⊕ A(1) or L/hz1 i ∼ = H(2) ⊕ A(1). There exist two = H(1) ⊕ A(3). First suppose that L/hz1 i ∼ ideals I3 /hz1 i and I4 /hz1 i of L/hz1 i such that ∼ H(2) and I4 /hz1 i = ∼ A(1). I3 /hz1 i = Clearly, L = I3 + I4 and [I3 , I4 ] ⊆ hz1 i. We claim that q, x1 ∈ I3 and [x2 , q] = [y1 , q] = [y2 , q] = [x1 , x2 ] = [x1 , y2 ] = 0. Let a+hz1 i ∈ I3 /hz1 i and I4 /hz1 i = hb+hz1 ii such that q+hz1 i = (a+hz1 i)+(αb+hz1 i). If a + hz1 i = 0, then since [L, I2 ] = [hqi, I2 ] = hz2 i, we have [hqi, L] ∈ hz1 i ∩ hz2 i = 0. So q ∈ Z(L) = L2 = hz1 i ⊕ hz2 i. It is a contradiction. Thus q − a − αb ∈ hz1 i and a + hz1 i 6= 0. We have a = η1 x1 + η2 x2 + η3 y1 + η4 y2 + η5 z1 + η6 z2 + η7 q, αb = η1′ x1 + η2′ x2 + η3′ y1 + η4′ y2 + η5′ z1 + η6′ z2 + η7′ q, and so q = a + αb + γz1 = η1 x1 + η2 x2 + η3 y1 + η4 y2 + η5 z1 + η6 z2 + η7 q+ η1′ x1 + η2′ x2 + η3′ y1 + η4′ y2 + η5′ z1 + η6′ z2 + η7′ q + γz1 . Since the set {x1 , y1 , x2 , y2 , z1 , z2 , q} is linearly independent and L is a Lie algebra on filed over characteristic two, η1 = η1′ , η2 = η2′ , η3 = η3′ , η4 = η4′ , η5 = −η5′ −γ, η6 = η6′ , η7 = 1 − η7′ . Thus q + hz1 i = a + hz1 i + αb + hz1 i = (η1 + η1′ )x1 + (η2 + η2′ )x2 + (η3 + η3′ )y1 + (η4 + η4′ )y2 + (η6 + η6′ )z2 + (η7 + η7′ )q + hz1 i. We conclude that q + hz1 i = (η7 + η7′ )q + hz1 i so η7 6= 0 or η7′ 6= 0. Since q + hz1 i ∈ / I4 /hz1 i, we have η7 6= 0 and η7′ = 0. Thus q + hz1 i ∈ I3 /hz1 i. Hence q ∈ I3 . Now, we prove that x1 ∈ I3 . By contrary, assume that x1 ∈ / I3 . We may assume that x1 + hz1 i = a1 + hz1 i + α′ b + hz1 i, where a1 + hz1 i ∈ I3 /hz1 i and I4 /hz1 i = hb + hz1 ii. Now, if a1 + hz1 i = 0, then x1 + hz1 i = α′ b + hz1i ∈ I3 /hz1 i and so [q, x1 ] + hz1 i = 0. Since [q, x1 ] = z2 , we have [q, x1 ] ∈ hz1 i ∩ hz2 i = 0 and hence [q, x1 ] = 0. It is a contradiction. Thus a1 + hz1 i = 6 0 and x1 − a1 − α′ b ∈ hz1 i. Taking into account the LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO 5 basis of L, we can write a1 = β1 x1 + β2 x2 + β3 y1 + β4 y2 + β5 z1 + β6 z2 + β7 q and α′ b = β1′ x1 + β2′ x2 + β3′ y1 + β4′ y2 + β5′ z1 + β6′ z2 + β7′ q. Therefore x1 = a1 + α′ b + γz1 = (β1 + β1′ )x1 + (β2 + β2′ )x2 + (β3 + β3′ )y1 + (β4 + β4′ )y2 + (β5 + β5′ )z1 + (β6 + β6′ )z2 + (β7 + β7′ )q. Now, since the set {x1 , y1 , x2 , y2 , z1 , z2 , q} is linearly independent and the characteristic of the field is 2, we have β1 = 1 − β1′ , β2 = β2′ , β3 = β3′ , β4 = β4′ , β5 = β5′ + γ, β6 = β6′ and β7 = β7′ . Now we have x1 + hz1 i = a1 + hz1 i + α′ b + hz1 i = (β1 +β1′ )x1 +(β2 +β2′ )x2 +(β3 +β3′ )y1 +(β4 +β4′ )y2 +(β6 +β6′ )z2 +(β7 +β7′ )q +hz1 i = (β1 + β1′ )x1 + hz1 i. Therefore β1 6= 0 or β1′ 6= 0. But x1 + hz1 i ∈ / I4 /hz1 i and hence β1 6= 0 and β1′ = 0 which implies x1 + hz1 i ∈ I3 /hz1 i. Thus x1 ∈ I3 . Now, we want to show [x1 , x2 ] = [x2 , q] = [y2 , q] = [y1 , q] = [x1 , y2 ] = 0. By contrary, let α9 6= 0. Using the same procedure as used in the previous step, we can show x2 ∈ I3 . Because I3 /hz1 i ∼ = H(2), we have [x2 , q] + hz1 i = 0 and so [x2 , q] ∈ hz1 i ∩ hz2 i = 0 which is a contradiction. Similarly, one can show that each of the mentioned brackets vanishes. Here, we want to prove that exactly one of the brackets [x2 , y1 ] or [y1 , y2 ] vanish. Note that the case [x2 , y1 ] = [y1 , y2 ] = 0 leads to L/hz1 i ∼ = H(1) ⊕ A(3) which is a contradiction since L/hz1 i ∼ = H(2) ⊕ A(1). Now, without loss of generality, assume that [y1 , y2 ] 6= 0. Using the same process, we may prove [x2 , y1 ] = 0 and y1 , y2 ∈ I3 and x2 ∈ I4 . Thus L = hx1 , y1 , x2 , y2 , z1 , z2 , q|[y1 , y2 ] = z2 = [x1 , q], [x1 , y1 ] = z1 = [x2 , y2 ]i. Similarly if either L/hz2 i ∼ = H(2) ⊕ A(1) and L/hz1 i ∼ = H(1) ⊕ A(3) or ∼ ∼ L/hz2 i = H(1) ⊕ A(3) and L/hz1 i = H(1) ⊕ A(3), then L ∼ = hx1 , . . . , x7 [x1 , x2 ] = x6 , [x1 , x4 ] = x7 = [x3 , x5 ]i. The result follows.  Corollary 3.2. Let L be a 7-dimensional generalized Heisenberg Lie algebra over any filed F. Then L ∼ = hx1 , . . . , x7 [x1 , x2 ] = x6 = [x3 , x4 ], [x1 , x5 ] = x7 = [x2 , x3 ]i ∼ = L1 or L ∼ = L2 . = hx1 , . . . , x7 [x1 , x2 ] = x6 , [x1 , x4 ] = x7 = [x3 , x5 ]i ∼  Proof. The result follows from Theorems 2.7 (ii) and 3.1. The following result gives the Schur multipliers of Lie algebras L6,22 (ǫ) and It helps to determine the capability of these Lie algebras in the next proposition. (2) L6,7 (η). (2) Proposition 3.3. The Schur multiplier of Lie algebras L6,22 (ǫ) and L6,7 (η) are abelian Lie algebras of dimension 8. Proof. Using the method of Hardy and Stitzinger in [10], we can obtain that in both cases, the dimension of the Schur multipliers are 8.  In the characterizing of capable generalized Heisenberg Lie algebra of rank two of dimension 6 in [18, Theorem 2.12], the Lie algebra L6,22 (ǫ) is missing. Here, we improve this result as bellow. (2) Proposition 3.4. L6,22 (ǫ) and L6,7 (η) are capable. Proof. Let L ∼ = L6,22 (ǫ) is capable. Then by using Theorem 2.7, we have L6,22 (ǫ)2 = Z(L6,22 (ǫ)) = hx5 i ⊕ hx6 i. By Proposition 2.1 (ii) and [19, Corollary 4.6], it is enough to show that dim M(L6,22 (ǫ)/hxi i) − 1 < dim M(L6,22 (ǫ)) for i = 5, 6. Clearly, L6,22 (ǫ)/hxi i ∼ = H(2) or L6,22 (ǫ)/hxi i ∼ = H(1) ⊕ A(2) for i = 5, 6, by using [17, Theorem 3.6]. Thus for i = 5, 6, we have dim M(L6,22 (ǫ)/hxi i) = 5 or 8, by [17, Lemma 2.6 and Theorem 2.7]. Since dim M(L6,22 (ǫ)) = 8, by Proposition 3.3, 6 P. NIROOMAND, F. JOHARI, AND M. PARVIZI we conclude that dim M(L6,22 (ǫ)/hxi i) − 1 < dim M(L6,22 (ǫ)) for i = 5, 6. (2) Therefore L6,22 (ǫ) is capable. By a similar way, we can see that L6,7 (η) is also capable. The proof is completed.  The next result is useful. Lemma 3.5. [18, Lemma 2.11] L5,8 and L1 are capable while L2 is not. We are ready to summarize our results to show that which ones of generalized Heisenberg Lie algebras of rank 2 is capable. Theorem 3.6. Let H be an n-dimensional generalized Heisenberg Lie algebra of rank 2. Then H is capable if and only if H is isomorphic to one of Lie algebras (2) L5,8 , L6,22 (ǫ), L6,7 (η) or L1 . Proof. Let H be capable. Then [18, Proposition 2.6] implies 5 ≤ dim H ≤ 7. Using Corollary 3.2 and Theorem 2.7, H is isomorphic to one of Lie algebras (2) L5,8 , L6,22 (ǫ), L6,7 (η), L1 or L2 . By Proposition 3.4 and Lemma 3.5, all of them are capable while L2 is non-capable. The converse is held by Proposition 3.4 and Lemma 3.5.  4. Stem nilpotent Lie algebras of class 3 with the derived subalgebra of dimension 2 We know that every nilpotent Lie algebra with the derived subalgebra of dimension 2 is of class two and three. In this section, we are going to obtain the structure of stem Lie algebras of class 3 with the derived subalgebra of dimension 2. Then we determine which of them is capable. Moreover, we show that all such Lie algebras of dimension greater than 6 are unicentral. Recall that an n-dimensional nilpotent Lie algebra L is said to be nilpotent of maximal class if the class of L is n − 1. If L is of maximal class, then dim(L/L2 ) = 2, Zi (L) = Ln−i and dim(Lj /Lj+1 ) = 1 for all 0 ≤ i ≤ n − 1 and 2 ≤ j ≤ n − 1 (see [4] for more information). From [8], the only Lie algebra of maximal class of dimension 4 is isomorphic to L4,3 = hx1 , . . . , x4 |[x1 , x2 ] = x3 , [x1 , x3 ] = x4 i. We say a Lie algebra L is a semidirect sum of an ideal I and a subalgebra K if L = I + K, I ∩ K = 0. The semidirect sum of an ideal I and a subalgebra K is denoted by K ⋉ I. Let cl(L) denotes the nilpotency class of a Lie algebra L. The following two lemmas characterize the structure of all stem Lie algebras L of dimensions 5 and 6, when cl(L) = 3 and dim L2 = 2. Lemma 4.1. Let L be a nilpotent stem Lie algebra of dimension 5 such that dim L2 = 2 and cl(L) = 3. Then ∼ L5,5 = hx1 , . . . , x5 |[x1 , x2 ] = x3 , [x1 , x3 ] = x5 , [x2 , x4 ] = x5 i. L= Moreover, L5,5 = I ⋊ hx4 i, where I = hx1 , x2 , x3 , x5 |[x1 , x2 ] = x3 , [x1 , x3 ] = x5 i ∼ = L4,3 , and [I, hx4 i] = hx5 i. LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO 7 Proof. By the classification of 5-dimensional nilpotent Lie algebras in [8], we get L∼ = L5,5 . It is easy to check that L5,5 = I⋊hx4 i such that I = hx1 , x2 , x3 , x5 |[x1 , x2 ] = x3 , [x1 , x3 ] = x5 i ∼  = L4,3 and [I, hx4 i] = hx5 i. Lemma 4.2. Let L be a nilpotent stem Lie algebra of dimension 6 such that dim L2 = 2 and cl(L) = 3. Then L ∼ = L6,10 = hx1 , . . . , x6 |[x1 , x2 ] = x3 , [x1 , x3 ] = x6 , [x4 , x5 ] = x6 i. Moreover, L6,10 = I ∔ hx4 , x5 , x6 |[x4 , x5 ] = x6 i = I ∔ K such that I = hx1 , x2 , x3 , x6 |[x1 , x2 ] = x3 , [x1 , x3 ] = x6 i ∼ = L4,3 and K = hx4 , x5 , x6 |[x4 , x5 ] = x6 i ∼ = H(1). Proof. By the classification of 6-dimensional nilpotent Lie algebras in [8], we get L∼ = L6,10 . Clearly Z(L) = hx6 i and L6,10 = I+K, where I = hx1 , x2 , x3 , x6 |[x1 , x2 ] = x3 , [x1 , x3 ] = x6 i ∼ = L4,3 and K = hx4 , x5 , x6 |[x4 , x5 ] = x6 i ∼ = H(1). Since I ∩ K = hx6 i = Z(I) = Z(L) and [I, K] = 0, we can see L6,10 = I ∔ K.  The following proposition is an useful instrument in the next. Proposition 4.3. Let L be an n-dimensional nilpotent stem Lie algebra of class 3 (n ≥ 5) and dim L2 = 2 such that L = I + K, where I and K are two subalgebras of L, I ∼ = L4,3 is the maximal class Lie algebra of dimension 4 and [I, K] ⊆ Z(I) = Z(L). Then (i) If K is a non-trivial abelian Lie algebra such that K ∩ I = 0, then [I, K] = Z(L) and K ∼ = A(1). Moreover, L = I ⋊ K ∼ = L5,5 . (ii) Assume dim K 2 = 1 and I ∩ K = K 2 = Z(L). (a) If K 2 = Z(K), then L = I ∔ K, where n = 2m + 4. Moreover, for m = 1, we have L = I ∔ K ∼ = L6,10 , where K ∼ = H(1). For m ≥ 2, we ∼ have L = I ∔ K = I1 ∔ I2 , where I1 ∼ = H(m − 1). = L6,10 and I2 ∼ (b) If K 2 6= Z(K), then L = (I ⋊A)∔K, where K ∼ = H(m) and A ∼ = A(1), [I, A] = Z(L) = Z(I) = K 2 and n = 2m + 5. Moreover, I ⋊ A ∼ = L5,5 . Proof. (i) We have [I, K] ⊆ Z(I) = Z(L), so I is an ideal of L. Since K ∩I = 0 and I ∼ = L4,3 , dim K = dim L − dim I = n − 4 and so L = I ⋊ K, where K ∼ = A(n − 4). We claim that [I, K] = Z(I). By contrary, assume that [I, K] = 0. Since K is abelian, we have K ⊆ Z(I) = Z(L) ⊆ I. Now I∩K 6= 0, so we have a contradiction. Thus [I, K] = Z(I) = Z(L). We know that I is a Lie algebra of maximal class of dimension 4 so Z(I) = Z(L) = I 3 . We also have dim L2 = dim I 2 = 2. Therefore L2 = I 2 . We claim that K∼ = A(1). First assume that n = 5. Lemma 4.1 implies L ∼ = I ⋊K ∼ = L5,5 and since I ∼ = L4,3 , we have I = hx1 , . . . , x4 |[x1 , x2 ] = x3 , [x1 , x3 ] = x4 i and Ln−4 Z(I) = hx4 i = I 3 . Now let n ≥ 6 and K = i=1 hzi i. In this case we show that K ∩ I 6= 0, which is a contradiction. So this case does not occur. By using Jacobian identity, for all 1 ≤ i ≤ n − 4, we have [zi , x3 ] = [zi , [x1 , x2 ]] = [zi , x1 , x2 ] + [x2 , zi , x1 ] = 0 since [zi , x1 ] and [x2 , zi ] are central. Thus [zi , x3 ] = 0 for all 1 ≤ i ≤ n − 4. Now, let [zi , x1 ] = αi x4 with αi 6= 0. Putting zi′ = zi + αi x3 , we have ′ [zi , x1 ] = [zi + αi x3 , x1 ] = [zi , x1 ] + αi [x3 , x1 ] = αi x4 − αi x4 = 0. So we also obtain [zi′ , x3 ] = 0. Thus [zi′ , x3 ] = [zi′ , x1 ] = 0 for all i, 1 ≤ i ≤ n − 4. Now let [zi′ , x2 ] = αx4 and [zj′ , x2 ] = βx4 , in which α 6= 0 and β 6= 0 for i 6= j and fixed i, j. Put di = βzi′ − αzj′ . We have [di , x2 ] = [βzi′ − αzj′ , x2 ] = 8 P. NIROOMAND, F. JOHARI, AND M. PARVIZI βαx4 −βαx4 = 0 and so [di , x2 ] = 0. On the other hand, [di , x1 ] = [di , x2 ] = [di , x3 ] = 0. Therefore [di , I] = 0 and hence di ∈ Z(L) = Z(I) = hx4 i. Since di = βzi′ − αzj′ = β(zi − αi x3 ) − α(zj − αj x3 ) = βzi − αzj + (ααj − βαi )x3 ∈ Z(I) so 0 6= βzi − αzj ∈ K ∩ I = 0, which is a contradiction. Thus n = 5, K ∼ = A(1) and L = I ⋊ hz1 i and [x2 , z1 ] = x4 , as required. Considering the classification of nilpotent Lie algebras of dimension 5 with dim L2 = 2 given in [8] and Lemma 4.1, we should have L ∼ = L5,5 . (ii) Since I ∩ K = K 2 = Z(L) = Z(I) ∼ = A(1), dim(K) = dim(L) − dim(I) + dim(I ∩ K) = n − 4 + 1 = n − 3. We know that dim K 2 = 1, so [17, Theorem 3.6] implies K ∼ = H(m) and A ∼ = A(n − 2m − 4). If = K1 ⊕ A, in which K1 ∼ ∼ A = 0, then K = H(m). Since I ∩K = K 2 = Z(L) = Z(I) = Z(K) ∼ = A(1), dim(K) = dim(L) − dim(I) + dim(I ∩ K) = n − 4 + 1 = n − 3. Now since 2m + 1 = dim(K) = n − 3, we have n = 2m + 4. We are going to show that [I, K] = 0. In fact, we show that there exists I1 ∼ = L3,4 and K2 ∼ = H(m) with [I1 , K2 ] = 0 and L = I1 ∔ K2 . First let m = 1. We have dim L = 6 and K = hx, y, x4 |[x, y] = x4 i, since K ∼ = H(1). By looking the classification of nilpotent Lie algebras of dimension 6 with dim L2 = 2 given in [5] and Lemma 4.2, we should have L ∼ = L6,10 . Now, let m ≥ 2 and H(m) = ha1 , b1 , . . . , am , bm , z [al , bl ] = z, 1 ≤ l ≤ mi. Lemma 2.5 implies that H(m) = T1 ∔ . . . ∔ Tm , in which Ti ∼ = H(1) for all 1 ≤ i ≤ m. With the same procedure as case in (i) and changing the variables we can see that [Ti , I] = 0 for all i, 1 ≤ i ≤ m. So [I, K] = 0 and hence L = I ∔ K. Since m ≥ 2, we have L = (I ∔ T1 ) ∔ (T2 ∔ . . . ∔ Tm ) such that I ∔ T1 ∼ = L6,10 and T2 ∔ . . . ∔ Tm ∼ = H(m − 1), as required. The case (a) is completed. Now, let A 6= 0 and so n 6= 2m − 4. Thus L = I + (K1 ⊕ A) such that [I, K] ⊆ Z(L) = Z(I). We are going to show that A ∼ = A(1), [I, K1 ] = 0 and [I, A] = Z(I) = Z(L). Similar to the part (ii), we can see that [I, K1 ] = 0. We claim that [I, A] 6= 0. By contrary, let [A, K1 ] = [I, A] = 0 and so A ⊆ Z(L) = Z(I). Since A ∩ I = 0, we have A = 0, which is a contradiction. So we have [I, A] = Z(L). We claim that dim A = 1. Let dim A ≥ 2. Similar to the proof of the part (i), we have [a1 , x1 ] = [a2 , x1 ] = [a1 , x3 ] = [a2 , x3 ] = 0 where a1 , a2 ∈ A and a1 6= a2 . Now let [a1 , x2 ] = αx4 and [a2 , x2 ] = βx4 such that α 6= 0 and β 6= 0. Putting a′1 = βa1 − αa2 . We have [a′1 , x2 ] = [βa1 − αa2 , x2 ] = βαx4 − βαx4 = 0 and so [a′1 , x2 ] = 0. Hence [a′1 , x1 ] = [a′1 , x2 ] = [a′1 , x3 ] = 0. Therefore [a′1 , I] = 0 and hence a′1 ∈ Z(L) = Z(I) = hx4 i = K12 . So a′1 ∈ K1 and since K1 ∩ A = 0, we have a contradiction. Hence A ∼ = A(1) and so n = 2m + 5. Thus L = (I ⋊ A) ∔ K1 such that [I, A] = Z(L) = Z(I). By part (i), we have I ⋊ A ∼ = L5,5 . The case (b) is completed. The result follows.  We need the following lemma for the next investigation. Lemma 4.4. [20, Lemma 1] Let L be a nilpotent Lie algebra and H be a subalgebra of L such that L2 = H 2 + L3 . Then Li = H i for all i ≥ 2. Moreover, H is an ideal of L. LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO 9 In the following, we determine the central factor of all stem Lie algebras T such that cl(T ) = 3 and dim T 2 = 2. Lemma 4.5. Let T be an n-dimensional stem Lie algebra such that cl(T ) = 3 and dim T 2 = 2. Then Z(T ) = T 3 ∼ = A(1) and T /Z(T ) ∼ = H(1) ⊕ A(n − 4). Proof. Since T is stem, we have A(1) ∼ = A(1). = T 3 ⊆ Z(T ) $ T 2 . Thus Z(T ) = T 3 ∼ 2 ∼ This follows T /Z(T ) = A(1). Since T /Z(T ) is capable, [17, Theorem 3.6] implies that T /Z(T ) ∼  = H(1) ⊕ A(n − 4). It completes the proof. In the following theorem, we determine the structure of all stem Lie algebras of class 3 with the derived subalgebra of dimension 2. Theorem 4.6. Let T be an n-dimensional stem Lie algebra such that cl(T ) = 3 and dim T 2 = 2. Then one of the following holds (a) T ∼ = L4,3 . (b) T ∼ =I ⋊K ∼ = L5,5 where K ∼ = A(1), I ∼ = L4,3 and Z2 (T ) = Z2 (I) ⋊ K. ∼ ∼ (c) T = I ∔I1 , where I1 = H(m), Z2 (T ) = Z2 (I)+I1 , I ∼ = L4,3 and n = 2m+4. Moreover if m ≥ 2, then L ∼ = H(m − 1), if m = 1, = L6,10 ∔ I2 , where I2 ∼ then L ∼ = L6,10 . (d) T ∼ = H(m), K ∼ = A(1), I ∼ = L4,3 , = L5,5 ∔ I1 , where I1 ∼ = (I ⋊ K) ∔ I1 ∼ Z2 (T ) = (Z2 (I) ⋊ K) ∔ I1 and n = 2m + 5. Moreover, in the cases (b), (c) and (d), Z(T ) = Z(I) = I12 = [I, K]. Proof. Since cl(T ) = 3, we have dim T ≥ 4. If dim T = 4, then T must be a Lie algebra of maximal class and hence T ∼ = L4,3 . Assume that dim T ≥ 5. We have T /Z(T ) ∼ = A(1), by Lemma 4.5. There exist = H(1) ⊕ A(n − 4) and Z(T ) = T 3 ∼ ideals I1 /Z(T ) and I2 /Z(T ) of T /Z(T ) such that I1 /Z(T ) ∼ = H(1) and I2 /Z(T ) ∼ = A(n − 4).  2 2 2 Since T /Z(T ) = I1 +Z(T ) /Z(T ), we have T = I12 +Z(T ) and Z(T ) = T 3 . Using Lemma 4.4, we have T 2 = I12 and so cl(T ) = cl(I1 ) = 3. Hence I1 is a Lie algebra of maximal class and since dim I1 = 4, we have I1 ∼ = L4,3 . Now, Z(T ) = Z(I1 ) because Z(T ) ∩ I1 ⊆ Z(I1 ) and dim Z(T ) = 1. Since Z(T ) ⊆ I1 ∩ I2 ⊆ Z(T ), we have I1 ∩ I2 = Z(T ) = Z(I1 ). Now we are going to determine the structure of I2 . We have I2 /Z(T ) ∼ = A(n − 4) so I22 ⊆ Z(T ) ∼ = A(1), and hence cl(I2 ) ≤ 2 and [I1 , I2 ] ⊆ I1 ∩ I2 = Z(T ) = Z(I1 ) ∼ = A(1). We have dim T /Z(T ) ≥ 4 and so dim I2 ≥ 2. Let cl(I2 ) = 1. Therefore [I1 , I2 ] = I1 ∩ I2 = Z(T ), otherwise [I1 , I2 ] = 0 and since I2 is abelian, I2 ⊆ Z(T ) ∼ = A(1). It is a contradiction, since dim I2 ≥ 2. Hence I2 = Z(T ) ⊕ A, where A ∼ = A(n − 4) and [I1 , I2 ] = Z(T ). Now Z(T ) ⊆ I1 , A ∩ I1 = 0 and I1 ∩ I2 = Z(T ) so T = I1 + I2 = I1 + Z(T ) + A = I1 ⋊ A. Using the proof of Proposition 4.3 (i), we have T ∼ = I1 ⋊K ∼ = L5,5 in which K ∼ = A(1) and [K, I1 ] = Z(T ). This is the case (b). Now, let cl(I2 ) = 2. Since I22 = I1 ∩ I2 = Z(T ) = Z(I1 ) ∼ = A(1), by [17, Theorem 3.6], we have I2 ∼ = H(m) ⊕ A(n − 2m − 4). First assume that A(n − 2m − 4) = 0. Then n = 2m − 4 and I2 ∼ = H(m). Using Proposition 4.3 (ii)(a), we can similarly prove [I1 , I2 ] = 0 and T = I1 ∔ I2 where I2 ∼ = H(m). This is the case (c). Now, let A(n − 2m − 4) 6= 0. Then n 6= 2m − 4 and hence T = I1 + (K ⊕ A) where K ∼ = H(m) and A ∼ = A(n − 2m − 4) and [I1 , K ⊕ A] ⊆ Z(T ) = Z(I1 ). Similar to the case (c), we have [I1 , K] = 0. Now we claim that [I1 , A] = Z(T ) ∼ = A(1). Let [I1 , A] = 0. Since [K, A] = 0, we have A ⊆ Z(T ) = Z(I1 ) = Z(K) = K 2 ∼ = A(1). It is a contradiction, 10 P. NIROOMAND, F. JOHARI, AND M. PARVIZI since A ∩ K = 0. Therefore [I1 , A] = Z(T ) and hence T ∼ = (I1 ⋊ A) ∔ K where A∼ = A(n − 2m − 4) and [I1 , A] = Z(T ) = Z(I1 ). Similar to the case (b), one can obtain that A ∼ = A(1), so n − 2m − 4 = 1, n = 2m + 5 and [I1 , A] = Z(T ). So T = (I1 ⋊ A) ∔ K in which A ∼ = A(1) and [I1 , A] = Z(T ). This is the case (d). Now, we have Z2 (T )/Z(T ) = Z(T /Z(T )) = Z(I1 /Z(T )) ⊕ I2 /Z(T ) and Z(T ) = Z(I1 ) also Z(I1 /Z(T )) = I12 /Z(T ), so Z2 (T )/Z(T ) = I12 /Z(T ) ⊕ I2 /Z(T ). Since I1 is maximal class of dimension 4, we have Z2 (T ) = Z2 (I1 ) + I2 = I12 + I2 . The result follows.  In the following theorem, we classify all non-capable stem Lie algebras of class 3 with the derived subalgebra of dimension 2. Theorem 4.7. Let T be an n-dimensional stem Lie algebra such that cl(T ) = dim T 2 = 2 and n ≥ 6. Then T ∼ = (I ⋊ K) ∔ H or T ∼ = I ∔ H such that H ∼ ∼ H(m), K = A(1), I = L4,3 and [K, I] = Z(T ) = Z(I) = H 2 . Moreover, T non-capable. 3, ∼ = is Proof. By Theorem 4.6 (c) and (d), we obtain (I ⋊ A) ∔ H or I ∔ H such that H ∼ = H(m), A ∼ = A(1), I ∼ = L4,3 and [A, I] = Z(T ) = Z(I) = H 2 . By using Proposition 2.6, T is non-capable. The result follows.  The capable stem Lie algebras of class 3 with the derived subalgebra of dimension 2 are characterized as following. Lemma 4.8. L4,3 and L5,5 are capable. Proof. From [8], let L5,7 = hx1 , . . . , x5 |[x1 , x2 ] = x3 , [x1 , x3 ] = x4 , [x1 , x4 ] = x5 i and L6,13 = hx1 , . . . , x6 |[x1 , x2 ] = x3 , [x1 , x3 ] = x5 , [x2 , x4 ] = x5 , [x1 , x5 ] = x6 , [x3 , x4 ] = x6 i. We have Z(L5,7 ) = hx5 i and Z(L6,13 ) = hx6 i, so L5,7 /hx5 i ∼ = L4,3 and L6,13 /hx6 i ∼  = L5,5 . Thus L4,3 and L5,5 are capable. We are in a position to characterize the capability of an n-dimensional stem Lie algebra T such that cl(T ) = 3 and dim T 2 = 2. Theorem 4.9. Let T be an n-dimensional stem Lie algebra such that cl(T ) = 3 and dim T 2 = 2. Then T is capable if and only if T ∼ = L5,5 . = L4,3 or T ∼ Proof. Let T be capable. By Theorems 4.6, 4.7 and Lemma 4.8, T is isomorphic to L4,3 or L5,5 . The converse holds by Lemma 4.8.  The next theorem gives a necessary and sufficient condition for detecting the capability of stem Lie algebras of class 3 with the derived subalgebra of dimension 2. Theorem 4.10. Let T be an n-dimensional stem Lie algebra such that cl(T ) = 3 and dim T 2 = 2. Then T is capable if and only if 3 ≤ dim(T /Z(T )) ≤ 4. Proof. The result follows from Lemma 4.5 and Theorem 4.9.  Recall that a Lie algebra L is called unicentral if Z ∗ (L) = Z(L). Corollary 4.11. Let T be an n-dimensional stem Lie algebra such that cl(T ) = 3 and dim T 2 = 2. Then T is non-capable if and only if n ≥ 6. Moreover, T is unicentral. Proof. The result follows from Theorems 4.7 and 4.9.  LIE ALGEBRAS WITH THE DERIVED SUBALGEBRA OF DIMENSION TWO 11 5. Nilpotent Lie Algebras with the derived subalgebra of dimension two In this section, we are going to determine all capable nilpotent Lie algebras with the derived subalgebra of dimension 2. At first we show that every finite dimensional nilpotent Lie algebra of class 3 with derived subalgebra of dimension 2 can be considered as a direct sum of a non-abelian stem Lie algebra of class 3 and an abelian Lie algebra. The following result shows that the capability of the direct product of a non-abelian Lie algebra and an abelian Lie algebra depends only on the capability of its nonabelian factor. Theorem 5.1. Let L be a finite dimensional nilpotent Lie algebra of class 3 and dim L2 = 2. Then L = T ⊕ A such that Z(T ) = L2 ∩ Z(L) = L3 = T 3 and Z ∗ (L) = Z ∗ (T ), where A is an abelian Lie algebra. Proof. By using [12, Proposition 3.1], L = T ⊕ A such that Z(T ) = L2 ∩ Z(L) and Z ∗ (L) = Z ∗ (T ), where A is an abelian Lie algebra. Since T is stem, Lemma 4.5 implies Z(T ) = T 3 , as required.  In the following theorem, all capable nilpotent Lie algebras of class 2 with the derived subalgebra of dimension 2 are classified. Theorem 5.2. Let L be an n-dimensional nilpotent Lie algebra of nilpotency class 2 and dim L2 = 2. Then L is capable if and only if L ∼ = = L5,8 ⊕ A(n − 5), L ∼ (2) ∼ ∼ L6,22 (ǫ) ⊕ A(n − 6), L = L6,7 (η) ⊕ A(n − 6) or L = L1 ⊕ A(n − 7). Proof. This is immediately obtained from [18, Propositions 2.4 and 2.6] and Theorem 3.6.  We are ready to determine all capable Lie algebras of class 3 when its derived subalgebra is of dimension 2. Theorem 5.3. Let L be an n-dimensional Lie algebra such that cl(L) = 3 and dim L2 = 2. Then L is capable if and only if L ∼ = L4,3 ⊕ A(n − 4) or L ∼ = L5,5 ⊕ A(n − 5). ∼ T ⊕ A, where A is an abelian Lie algebra and Proof. Theorem 5.1 implies L = ∼ A(1) and Z ∗ (L) = Z ∗ (T ). Now the result follows Z(T ) = T 2 ∩ Z(L) = L3 = T 3 = from Theorem 4.9.  The following result is obtained from Theorems 4.10 and 5.3. Corollary 5.4. Let L be a finite dimensional Lie algebra of class 3 and dim L2 = 2. Then L is capable if and only if 3 ≤ dim(L/Z(L)) ≤ 4. We summarize all results to classify all capable nilpotent Lie algebras with the derived subalgebra of dimension at most two. Theorem 5.5. Let L be an n-dimensional nilpotent Lie algebra with dim L2 ≤ 2. Then L is capable is if and only if L is isomorphic to one the following Lie algebras. (i) If dim L2 = 0, then L ∼ = A(n) and n > 1. (ii) If dim L2 = 1, then L ∼ = H(1) ⊕ A(n − 3). (2) 2 (iii) If dim L = 2 and cl(L) = 2, then L ∼ = L5,8 ⊕ A(n − 5), L = L6,7 (η) ⊕ A(n − ∼ ∼ 6), L = L6,22 (ǫ) ⊕ A(n − 6), or L = L1 ⊕ A(n − 7). 12 P. NIROOMAND, F. JOHARI, AND M. PARVIZI (iv) If dim L2 = 2 and cl(L) = 3, then L ∼ = L4,3 ⊕A(n−4) or L ∼ = L5,5 ⊕A(n−5). Proof. The result follows from [17, Theorems 3.3 and 3.6], Theorems 5.2 and 5.3.  References [1] P. Batten, K. Moneyhun, E. Stitzinger, On characterizing nilpotent Lie algebras by their multipliers. Comm. Algebra 24 (1996) 4319-4330. [2] P. Batten, E. Stitzinger, On covers of Lie algebras, Comm. Algebra 24 (1996) 4301-4317. [3] F. R. Beyl, U. Felgner, and P. Schmid, On groups occurring as center factor groups, J. Algebra 61 (1970) 161-177. [4] L. Bosko, On Schur multiplier of Lie algebras and groups of maximal class, Internat. J. Algebra Comput. 20 (2010) 807-821. [5] S. Cicalò, W. A. de Graaf, C. Schneider, Six-dimensional nilpotent Lie algebras, Linear Algebra Appl. 436 (2012), no. 1, 163-189. [6] G. Ellis, A non-abelian tensor product of Lie algebras, Glasg. Math. J. 39 (1991) 101-120. [7] M. P. Gong, Classification of nilpotent Lie Algebras of dimension 7 (over Algebraically closed fields and R), A thesis in Waterloo, Ontario, Canada, 1998. [8] W. A. de Graaf, Classification of 6-dimensional nilpotent Lie algebras over fields of characteristic not 2, Algebra 309 (2007) 640-653. [9] P. Hall, The classification of prime power groups, J. Reine Angew. Math. 182, (1940) 130-141. [10] P. Hardy, E. Stitzinger, On characterizing nilpotent Lie algebras by their multipliers t(L) = 3; 4; 5; 6; Comm. Algebra, 1998, 26(11), 3527-3539. [11] H. Heineken, Nilpotent groups of class 2 that can appear as central quotient groups, Rend. Sem. Mat. Univ. Padova 84 (1990), 241-248. [12] F. Johari, M. Parvizi, P. Niroomand, Capability and Schur multiplier of a pair of Lie algebras, J. Geometry Phys 114 (2017), 184-196. [13] K. Moneyhun, Isoclinisms in Lie algebras. Algebras Groups Geom. 11 (1994) 9-22. [14] P. Niroomand, F. G. Russo, A note on the Schur multiplier of a nilpotent Lie algebra, Comm. Algebra 39 (2011) 1293-1297. [15] P. Niroomand, F. G. Russo, A restriction on the Schur multiplier of nilpotent Lie algebras, Electron. J. Linear Algebra 22 (2011) 1-9. [16] P. Niroomand, On the dimension of the Schur multiplier of nilpotent Lie algebras, Cent. Eur. J. Math. 9 (2011) 57-64. [17] P. Niroomand, M. Parvizi, F. G. Russo, Some criteria for detecting capable Lie algebras, J. Algebra 384 (2013) 36-44. [18] P. Niroomand, F. Johari, M. Parvizi, On the capability and Schur multiplier of nilpotent Lie algebra of class two, Proc. Amer. Math. Soc. 144 (2016), 4157-4168. [19] A. R. Salemkar, V. Alamian and H. Mohammadzadeh, Some properties of the Schur multiplier and covers of Lie Algebras, Comm. Algebra 36 (2008) 697-707. [20] L. M. Zack, Nilpotent Lie algebras with a small second derived quotient, Comm. Algebra, 36 (2008) 460-4619. School of Mathematics and Computer Science, Damghan University, Damghan, Iran E-mail address: p [email protected], [email protected] Department of Pure Mathematics, Ferdowsi University of Mashhad, Mashhad, Iran E-mail address: [email protected], [email protected] Department of Pure Mathematics, Ferdowsi University of Mashhad, Mashhad, Iran E-mail address: [email protected]
0math.AC
arXiv:1701.07097v1 [math.RT] 24 Jan 2017 THE BRAUER TREES OF UNIPOTENT BLOCKS DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Abstract. In this paper we complete the determination of the Brauer trees of unipotent blocks (with cyclic defect groups) of finite groups of Lie type. These trees were conjectured by the first author in [19]. As a consequence, the Brauer trees of principal ℓ-blocks of finite groups are known for ℓ > 71. Contents 1. Introduction 2. Notation 3. Modular representations and geometry 3.1. Deligne–Lusztig varieties 3.1.1. Unipotent blocks 3.1.2. Harish-Chandra induction and restriction 3.1.3. Complex of cohomology and Frobenius action 3.1.4. Simple modules in the cohomology of Deligne–Lusztig varieties 3.2. Compactifications 3.3. Steinberg representation 3.4. Coxeter orbits 3.5. Generic theory 3.5.1. Reflection data 3.5.2. d-Harish-Chandra theory 4. Unipotent blocks with cyclic defect groups 4.1. Blocks with cyclic defect groups 4.1.1. Brauer trees and folding 4.1.2. Brauer tree of a block with cyclic defect 4.1.3. Folding 4.2. Structure of unipotent blocks with cyclic defect groups 4.2.1. Centre 4.2.2. Local subgroups and characters 2 5 6 6 6 7 9 10 11 13 14 15 15 16 16 16 17 17 18 18 18 20 Date: January 26, 2017. The first author is supported by a Royal Society Research Fellowship. The second author gratefully acknowledges financial support by the ANR, Project No ANR-16-CE40-0010-01. The third author is partly supported by the NSF (grant DMS-1161999) and by a grant from the Simons Foundation (#376202). 1 2 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER 4.2.3. Genericity 4.2.4. Determination of the trees 4.3. Properties of the trees 4.3.1. Harish-Chandra branches 4.3.2. Real stem 4.3.3. Exceptional vertex 4.3.4. Stable equivalence 4.3.5. Coxeter orbits 4.4. Summary of the algebraic methods 5. Determination of the trees 5.1. Groups of type E7 5.1.1. d = 14 5.1.2. d = 9 5.1.3. d = 10 5.2. Groups of type E8 5.2.1. d = 9 5.2.2. d = 12 5.2.3. d = 18 5.2.4. d = 15 5.2.5. d = 20 5.2.6. d = 24 5.3. Other exceptional groups 5.3.1. E6 (q), 2 E6 (q), F4 (q) and G2 (q) 5.3.2. 2 B2 (q 2 ) and 2 G2 (q 2 ) 5.3.3. 2 F4 (q 2 ) Appendix A. Brauer trees for E7 (q) and E8 (q) References 21 22 24 24 25 26 27 27 31 31 32 32 33 34 34 34 35 35 39 41 45 48 48 48 48 52 58 1. Introduction A basic problem in the modular representation theory of finite groups is to determine decomposition matrices. Ever since the theory of blocks with cyclic defect groups that originated with Brauer [5] and was extended by Dade [21], the prospect of determining all Brauer trees associated to finite groups was a fundamental challenge in modular representation theory. Those trees determine the decomposition matrix as well as the Morita equivalence class of the block. In 1984, Feit [32, Theorem 1.1] proved that, up to unfolding — broadly speaking, taking a graph consisting of several copies of a given Brauer tree and then identifying all exceptional vertices – the collection of Brauer trees of all finite groups coincides with that of the quasisimple groups. THE BRAUER TREES OF UNIPOTENT BLOCKS 3 For alternating groups and their double covers, the Brauer trees are known [61], and for all but the two largest sporadic groups all Brauer trees are known (see [50] for most of the trees). The remaining quasisimple groups, indeed the ‘majority’ of quasisimple groups, are groups of Lie type G(q): if ℓ is a prime dividing |G(q)| then either ℓ ∤ q or ℓ | q — in the latter case, for there to be an ℓ-block with cyclic defect group we must have that G/Z(G) = PSL2 (ℓ) and the Brauer tree is a line. Thus the major outstanding problem is to determine the Brauer trees of ℓ-blocks of groups of Lie type when ℓ ∤ q. Here we make substantial progress on this problem by constructing the trees for the unipotent blocks of G(q). We determine in particular the trees occurring in principal blocks. Our main theorem is the following. Theorem 1.1. Let G be a finite group of Lie type and let ℓ be a prime distinct from the defining characteristic. If B is a unipotent ℓ-block of G with cyclic defect groups then the planar-embedded Brauer tree of B is known. Furthermore, the labelling of the vertices by unipotent characters in terms of Lusztig’s parametrization is known. Theorem 1.1 has the following corollary. Corollary 1.2. Let G be a finite group with cyclic Sylow ℓ-subgroups. If ℓ 6= 29, 41, 47, 59, 71, then the (unparametrized) Brauer tree of the principal ℓ-block of G is known. Conjecturally, every block of a finite group of Lie type is Morita equivalent to a unipotent block. This would extend the previous corollary to all blocks with cyclic defect groups of all finite groups (for ℓ > 71 so that no sporadic groups are involved). Non-unipotent blocks with cyclic defect are currently under investigation by the first author and Radha Kessar. A basic method to determine decomposition matrices of finite groups is to induce projective modules from proper subgroups. In the case of modular representations of finite groups of Lie type in non-defining characteristic, Harish-Chandra induction from standard Levi subgroups has similarly been a very useful tool to produce projective modules. Here, we introduce a new method, based on the construction, via Deligne–Lusztig induction, of bounded complexes of projective modules with few non-zero cohomology groups. This is powerful enough to allow us to determine the decomposition matrices of all unipotent blocks with cyclic defect groups of finite groups of Lie type. In [30], the second and third authors used Deligne–Lusztig varieties associated to Coxeter elements to analyse representations modulo ℓ, where the order d of q modulo ℓ is the Coxeter number. Here, we consider cases where that order is not the Coxeter number, but we use nevertheless the geometry of Coxeter Deligne–Lusztig varieties, as they are the best understood, and have certain remarkable properties not shared by other Deligne–Lusztig varieties. 4 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Our main result is the proof of the first author’s conjecture [19], in the case of blocks with cyclic defect groups. That conjecture is about the existence of a perverse equivalence with a specific perversity function. Using the algorithm that determines the Brauer tree from the perversity function [17], the first author had proposed conjectural Brauer trees and proved that his conjecture held in many cases. We complete here the proof of that conjecture. The methods we use for determining the Brauer trees are a combination of standard arguments and more recent methods developed in [28, 29, 30]. We start with the subtrees corresponding to various Harish-Chandra series, giving a disjoint union of lines providing a first approximation of the tree. The difficulty lies in connecting those lines with edges labelled by cuspidal modules. Many possibilities can be ruled out by looking at the degrees of the characters and of some of their tensor products. These algebraic methods have proved to be efficient for determining most of the Brauer trees of unipotent blocks (see for instance [48, 49]), but were not sufficient for groups of type E7 and E8 . We overcome this problem by using the mod-ℓ cohomology of Deligne–Lusztig varieties and their smooth compactifications. This is done by analysing well-chosen Frobenius eigenspaces on the cohomology complexes of these varieties and extracting • projective covers of cuspidal modules, giving the missing edges in the tree, • Ext-spaces between simple modules, yielding the planar-embedded tree. This strategy requires some control on the torsion part of the cohomology groups, and for that reason we must focus on small-dimensional Deligne–Lusztig varieties only (often associated with Coxeter elements). We briefly describe the structure of the article. Section 3 is devoted to general results on unipotent blocks of modular representations of finite groups of Lie type, using algebraic and geometrical methods. In Section 4, we deal specifically with unipotent blocks with cyclic defect groups. After recalling in §4.1 the basic theory of Brauer trees, we consider in §4.2 the local structure of the blocks. In §4.3, we establish general properties of the trees, and in particular we relate properties of the complex of cohomology of Coxeter Deligne–Lusztig varieties with properties of the Brauer tree. A key result is Lemma 4.20 about certain perfect complexes for blocks with cyclic defect groups with only two non-zero rational cohomology groups. In §5 we complete the determination of the trees, which are collected in the appendix. The most complicated issues arise from differentiating the cuspidal modules E8 [θ] and E8 [θ2 ] when d = 18 (§5.2.3) and ordering cuspidal edges around the Steinberg vertex for d = 20 (§5.2.5). Acknowledgements: We thank Cédric Bonnafé, Frank Lübeck and Jean Michel for some useful discussions, and Gunter Malle for his comments on a preliminary version of the manuscript. THE BRAUER TREES OF UNIPOTENT BLOCKS 5 2. Notation Let R be a commutative ring. Given two elements a and r of R with r prime, we denote by ar the largest power of r that divides a. If M is an R-module and R′ is a commutative R-algebra, we write R′ M = R′ ⊗R M. Let ℓ be a prime number, O the ring of integers of a finite extension K of Qℓ and k its residue field. We assume that K is large enough so that the representations of finite groups considered are absolutely irreducible over K, and the Frobenius eigenvalues on the cohomology groups over K considered are in K. Given a ring A, we denote by A -mod the category of finitely generated A-modules, by A -proj the category of finitely generated projective A-modules and by Irr(A) the set of isomorphism classes of simple A-modules. When A is a finite-dimensional algebra over a field, we identify K0 (A -mod) with Z Irr(A) and we denote by [M] the class of an A-module M. Given two complexes C and C ′ of A-modules, we denote L by Hom•A (C, C ′) = i,j HomA (C i , C ′j ) the total Hom-complex. Let Λ be either k, O or K and let A be a symmetric Λ-algebra: A is finitely generated and free as a Λ-module and A∗ is isomorphic to A as an (A, A)-bimodule. An A-lattice is an A-module that is free of finite rank as a Λ-module. Given M ∈ A -mod, we denote by PM a projective cover of M. We denote by Ω(M) the kernel of a surjective map PM ։ M and we define inductively Ωi (M) = Ω(Ωi−1 (M)) for i ≥ 1, where Ω0 (M) is a minimal submodule of M such that M/Ω0 (M) is projective. Note that Ωi (M) is well defined up to isomorphism. When M is an A-lattice, we define Ω−i (M) as (Ωi (M ∗ )∗ , using the right A-module structure on M ∗ = HomΛ (M, Λ). We denote by Hob (A) and D b (A) the homotopy and derived categories of bounded complexes of finitely generated A-modules. Given a bounded complex of finitely generated A-modules C, there is a complex C red of A-modules, well-defined up to (non-unique) isomorphism, such that that C is homotopy equivalent to C red and C red has no non-zero direct summand that is homotopy equivalent to 0. Suppose that Λ = k. We denote by A -stab the stable category of A -mod, i.e., the additive quotient by the full subcategory of finitely generated projective Amodules. Note that the canonical functor A -mod → D b (A) induces an equivalence from A -stab to the quotient of D b (A) by the thick subcategory of perfect complexes of A-modules, making A -stab into a triangulated category with translation functor Ω−1 . Suppose that Λ = O. We denote by d : K0 (KA) → K0 (kA) the decomposition map. It is characterized by the property d([KM]) = [kM] for an A-lattice M. Let G be a finite group and A = KG. We identify Irr(A) with the set of Kvalued irreducible characters of G. Given χ ∈ Irr(KG), we denotePby bχ the block 1 idempotent of OG that is not in the kernel of χ. We put eG = |G| g∈G g. 6 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Let Q be an ℓ-subgroup of G. We denote by BrQ : P OG -mod → kNG (Q) -mod  the Q Brauer functor: BrQ (M) is the image of M in M/ x∈Q,m∈M O(m − x(m)) . We Q denote by brQ : (OG) → kCG (Q) the algebra morphism that is the resriction of the linear map defined by g 7→ δg∈CG (Q) g. 3. Modular representations and geometry 3.1. Deligne–Lusztig varieties. 3.1.1. Unipotent blocks. Let G be a connected reductive algebraic group defined over an algebraic closure of a finite field of characteristic p, together with an endomorphism F , a power of which is a Frobenius endomorphism. In other words, there exists a positive integer δ such that F δ defines a split Fqδ -structure on G for a certain power q δ of p, where q ∈ R>0 . We will assume that δ is minimal for this property. Given an F -stable closed subgroup H of G, we will denote by H the finite group of fixed points HF . The group G is a finite group of Lie type. We are interested in the modular representation theory of G in non-defining characteristic, so that we shall always work under the assumption ℓ 6= p. Let T ⊂ B be a maximal torus contained in a Borel subgroup of G, both of which are assumed to be F -stable. Let W = NG (T)/T be the Weyl group of G and S be the set of simple reflections of W associated to B. We denote by r = rG the F -semisimple rank of (G, F ), i.e., the number of F -orbits on S. Given w ∈ W , the Deligne–Lusztig variety associated to w is  XG (w) = X(w) = gB ∈ G/B | g −1F (g) ∈ BwB . It is a smooth quasi-projective variety endowed with a left action of G by left multiplication. Let Λ be either K or k. Recall that a simple ΛG-module is unipotent if it is a composition factor of Hic (X(w), Λ) for some w ∈ W and i ≥ 0. We denote by Uch(G) ⊂ Irr(KG) the set of unipotent irreducible KG-modules (up to isomorphism). A unipotent block of OG is a block containing at least one unipotent character. Given P a parabolic subgroup of G with unipotent radical U and an F -stable Levi complement L, we have a Deligne–Lusztig variety YG (L ⊂ P) = {gU ∈ G/U | g −1F (g) ∈ U · F (U)}, a variety with a free left action of G and a free right action of L by multiplication. The Deligne–Lusztig induction is defined by X G RL⊂P : Z Irr(KL) → Z Irr(KG), [M] 7→ (−1)i [Hic (YG (L ⊂ P)) ⊗KL M]. i≥0 G We also write RLG = RL⊂P . We denote by ∗ RG L⊂P : Z Irr(KG) → Z Irr(KL) the G adjoint map. We have RL⊂P (Uch(L)) ⊂ ZUch(G) and ∗ RG L⊂P (Uch(G)) ⊂ ZUch(L). THE BRAUER TREES OF UNIPOTENT BLOCKS 7 Let w ∈ W and let h ∈ G such that h−1 F (h)T = w. The maximal torus L = hTh−1 is F -stable. It is contained in the Borel subgroup P = hBh−1 with unipotent radical U. In that case, the map gU 7→ gUh = gh(h−1 Uh) identifies Y(L ⊂ P) with the variety  YG (w) = Y(w) = gV ∈ G/V | g −1 F (g) ∈ VẇV where V = h−1 Uh is the unipotent radical of B and ẇ = h−1 F (h) ∈ NG (T). Furthermore, there is a morphism of varieties Y(w) → X(w), gV 7→ gB corresponding to the quotient by TwF ≃ L. 3.1.2. Harish-Chandra induction and restriction. Given an F -stable subset I of S, we denote by WI the subgroup of W generated by I and by PI and LI the standard parabolic subgroup and standard Levi subgroup respectively of G corresponding to I. In that case, the maps RLGI and ∗ RG LI are induced by the usual Harish-Chandra induction and restriction functors. A simple ΛG-module V is cuspidal if ∗ RG LI (V ) = 0 for all proper subsets I of S. The following result is due to Lusztig when L is a torus [53, Corollary 2.19]. The same proof applies, using Mackey’s formula for the Deligne–Lusztig restriction to a torus. Proposition 3.1. Let L be an F -stable Levi subgroup of G and ψ an irreducible character of L such that (−1)rG +rL RLG (ψ) is an irreducible character of G. If ψ is cuspidal and L is not contained in a proper F -stable parabolic subgroup of G, then (−1)rG +rL RLG (ψ) is cuspidal. Proof. Let T be a maximal torus contained in a proper F -stable parabolic subgroup P of G. The Mackey formula (see [22, 7.1]) provides a decomposition 1 X ∗ xL x ∗ G G RT RL (ψ) = RT (ψ ). |L| x∈G T⊂x L Let x ∈ G with T ⊂ x L. By assumption, x L * P, hence T lies in the proper F -stable parabolic subgroup x L ∩ P of x L. Since ψ is cuspidal, ψ x is a cuspidal x character of x L, hence ∗ RTL (ψ x ) = 0 by [53, Proposition 2.18]. It follows that ∗ G RT ((−1)rG +rL RLG (ψ)) = 0, hence (−1)rG +rL RLG (ψ) is cuspidal by [53, Proposition 2.18].  Let A = OGb be a block of OG. Let P be an F -stable parabolic subgroup of G with unipotent radical U and an F -stable Levi complement L. Let A′ = OLb′ be a block of OL. We say that A is relatively Harish-Chandra A′ -projective if the multiplication map bOGeU b′ ⊗OL eU b′ OGb → OGb is a split surjection as a morphism of (A, A)-bimodules. 8 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER The first part of the following lemma follows from [24, Proposition 1.11], while the second part is immediate. Lemma 3.2. Let P be an F -stable parabolic subgroup of G with unipotent radical U and an F -stable Levi complement L. Let Q be an ℓ-subgroup of L. Then P ∩ CG (Q)◦ is a parabolic subgroup of CG (Q)◦ with unipotent radical V = U ∩ CG (Q) and Levi complement L ∩ CG (Q)◦ . Given b and b′ , block idempotents of OG and OL respectively, we have an isomorphism of (kCG (Q), kCL (Q))-bimodules Br∆Q (bOGeU b′ ) ≃ brQ (b)kCG (Q)eV brQ (b′ ). ◦ Let D be a defect group of A and let H = CG (D). Assume that H = CG (D). Let λ be the character of H that is trivial on Z(H) and such that brD (b) = bλ . Lemma 3.3. Let P be an F -stable parabolic subgroup of G with unipotent radical U and an F -stable Levi complement L. ′ Assume that D ≤ L and let λ′ be a character of CL (D) such that h∗ RH 6 H∩L (λ), λ i = ′ ′ 0 and such that λ comes from a defect 0 character of CL (D)/Z(D). Let A be the block of OL corresponding to kCL (D)bλ′ . The block A is relatively Harish-Chandra A′ -projective. Proof. Let V be the unipotent radical of H ∩ P and let M = H ∩ L, a Levi complement of V in H ∩ P. Note that D ⊂ M = CL (D). By assumption, the multiplication map bλ k(H/Z(D))eV bλ′ ⊗kM/Z(D) eV bλ′ k(H/Z(D))bλ → k(H/Z(D))bλ is surjective. It follows from Nakayama’s Lemma that the multiplication map bλ kHbλ′ ⊗kM kHbλ′ bλ → kHbλ is also surjective. There is a unique block idempotent b′ with defect group D of kL such that brD (b′ ) = bλ′ . By [10, Theorem 3.2], this is a unipotent block. Since brD (eU ) = eV , the commutativity of the diagram kH ⊗kM kH   can / (kG ⊗kL kG)∆D  mult can / Br∆D (kG ⊗kL kG) (kG)∆D c can Br∆D (mult) /  Br∆D (kG) can O ∼ mult 1 kH shows that the multiplication map induces a surjection Br∆D (bkGeU b′ ⊗kL b′ eU kGb) ։ Br∆D (bkG). We deduce from [1, Lemma A.1] that the multiplication map gives a split surjective morphism of (kGb, kGb)-bimodules bkGeU b′ ⊗kL b′ eU kGb ։ bkG.  THE BRAUER TREES OF UNIPOTENT BLOCKS 9 3.1.3. Complex of cohomology and Frobenius action. Following [30, Theorem 1.14], given a variety X defined over Fqδ with the action of a finite group H, there is a e c (X, O) of O(H × hF δ i)-modules with the following properties: bounded complex RΓ e c (X, O) is well defined up to isomorphism in the quotient of the homotopy • RΓ category of complexes of O(H × hF δ i)-modules by the thick subcategory of complexes whose restriction to OH is homotopic to 0; e c (X, O) are direct summands of finite direct sums of • the terms of ResOH RΓ modules of the form O(H/L), where L is the stabilizer in H of a point of X; e c (X, O) in the derived category of O(H × hF δ i) is the usual • the image of RΓ complex RΓc (X, O). Note that in [30] such a complex was constructed over k instead of O, but the same methods lead to a complex over O. Indeed, note first that there is a bounded complex of O(H × hF δ i)-modules C constructed in [62, §2.5.2], whose restriction to OH has terms that are direct summands of possibly infinite direct sums of modules of the form O(H/L), where L is the stabilizer in L of a point of X. Furthermore, that restriction is homotopy equivalent to a bounded complex whose terms are direct summands of finite direct sums of modules of the form O(H/L), where L is the stabilizer in H of a point of X. One can then proceed as in [30] to construct e c (X, O). RΓ Given λ ∈ k × , we denote by L(λ) the inverse image of λ in O. Given an OhF δ imodule M that is finitely generated as an O-module, we denote by M(λ) = {m ∈ M | ∃λ1 , . . . , λN ∈ L(λ) such that (F δ − λ1 ) · · · (F δ − λN )(m) = 0} the ‘generalized λ-eigenspace mod ℓ’ of F δ . e c (X, k)(λ) in D b (kH) will be denoted by RΓc (X, k)(λ) and we will The image of RΓ refer to it as the generalized λ-eigenspace of F δ on the cohomology complex of X. When ℓ ∤ |TwF |, the stabilizers of points of X(w) under the action of G are ℓ′ e c (X(w), O) are projective. groups and the terms of the complex of OG-modules RΓ Lemma 3.4. Let w ∈ W such that TwF has cyclic Sylow ℓ-subgroups. Given ζ ∈ k × , we have RΓc (X(w), k)(q−δ ζ) ≃ RΓc (X(w), k)(ζ)[2] in kG -stab . Proof. Recall (§3.1.1) that there is a variety Y(w) acted on freely by GF on the left and acted on freely by TwF on the right such that Y(w)/TwF ≃ X(w). We have RΓc (Y(w), k) ⊗LkTwF k ≃ RΓc (X(w), k). Since TwF has cyclic Sylow ℓ-subgroups, there is an exact sequence of kTwF -modules 0 → k → kTwF → kTwF → k → 0. This sequence is equivariant for the action of F δ , where the action is trivial on the rightmost term k, while it is given by multiplication by q δ on the leftmost term k. The exact sequence induces an F δ -equivariant distinguished triangle k → k[2] → 10 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER C in D b (kTwF ), where C is perfect. Applying RΓc (Y(w), k)⊗LkTwF , we obtain a distinguished triangle in D b (kGF ), equivariant for the action of F δ RΓc (X(w), k) → RΓc (X(w), k)[2] → C ′ , where the action of F δ on the middle term is twisted by q δ and C ′ is perfect. The lemma follows by taking generalized ζ-eigenspaces  3.1.4. Simple modules in the cohomology of Deligne–Lusztig varieties. Every simple unipotent kG-module occurs in the cohomology of some Deligne–Lusztig variety X(w) [46, Theorem 3.1]. If w is minimal for the Bruhat order, this module only occurs in middle degree. This will be an important property to compute the cohomology of X(w) over O from the cohomology over K. Let us now recall the precise result [3, Propositions 8.10 and 8.12]. We adapt the result to the varieties X(w). Recall that there is a pairing K0 (kG -proj) × K0 (kG -mod) → Z. The Cartan map K0 (kG -proj) → K0 (kG -mod) is injective and we identify K0 (kG -proj) with its image. Let K0 (kG -mod)vp be the subgroup of K0 (kG -mod) of elements f such that Nf ∈ K0 (kG -proj) for some positive integer N. The pairing above can be extended to a pairing K0 (kG -mod)vp × K0 (kG -mod) → Q. Proposition 3.5. Let M be a simple unipotent kG-module and let w ∈ W . The following properties are equivalent: (a) w is minimal such that RHom•kG (RΓc (X(w), k), M) 6= 0; (b) w is minimal such that RHom•kG (M, RΓc (X(w), k)) 6= 0; (c) w is minimal such that h[RΓc (X(w), k)], [M]i = 6 0. ℓ(w) Assume that w is such a minimal element. We have HomkG (M, Hc (X(w), k)) 6= 0. If ℓ ∤ |TwF |, then HomDb (kG) (RΓc (X(w), k), M[−i]) = HomDb (kG) (M, RΓc (X(w), k)[i]) = 0 for i 6= ℓ(w). Proof. We use the variety Y(w) as in the proof of Lemma 3.4. Let TwF be the ℓ′ subgroup of elements of TwF of order prime to ℓ and X 1 bw = wF t |Tℓ′ | wF t∈Tℓ′ be the principal block idempotent of kTwF . All composition factors of bw kTwF are trivial, hence RΓc (Y(w), k)bw is an extension of N = |TwF |ℓ copies of RΓc (X(w), k). As a consequence, [RΓc (Y(w), k)bw ] = N · [RΓc (X(w), k)], hence [RΓc (X(w), k)] ∈ K0 (kG -mod)vp . We deduce that h[RΓc (X(w), k)], [M]i = 6 0 if and only if h[RΓc (Y(w), k)bw ], [M]i = 6 0. It follows also that an integer r is minimal such that HomDb (kG) (M, RΓc (X(w), k)[r]) 6= 0 if and only if it is minimal such that HomDb (kG) (M, RΓc (Y(w), k)bw [r]) 6= 0. It follows that w is minimal such that RHom•kG (M, RΓc (Y(w), k)bw ) 6= 0 if and only THE BRAUER TREES OF UNIPOTENT BLOCKS 11 if (b) holds. Similarly, w is minimal such that RHom•kG (RΓc (Y(w), k)bw , M) 6= 0 if and only if (a) holds. Note also that the statements above with RΓc (Y(w), k)bw are equivalent to the same statements with RΓc (Y(w), k) since M is unipotent. The equivalence between (a), (b) and (c) follows now from [3, Proposition 8.12]. Suppose that w is minimal with the equivalent properties (a), (b) and (c). It follows from [3, Proposition 8.10] that the cohomology of RHom•kG (M, RΓc (Y(w), k)bw ) is concentrated in degree ℓ(w). The last assertions of the lemma follow.  Proposition 3.5 shows that for a minimal w, if ℓ ∤ |TwF |, then the complex of kGe c (X(w), k)red is isomorphic to a bounded complex of projective modules modules RΓ such that a projective cover PM of M appears only in degree ℓ(w) as a direct summand of a term of this complex. ∼ 3.2. Compactifications. Let S be a set together with a bijection S − → S, s 7−→ s. Given s ∈ S, we put BsB = BsB ∪ B. The generalized Deligne–Lusztig variety associated to a sequence (t1 , . . . , td ) of elements of S ∪ S is X(t1 , . . . , td ) =  (g0 B, . . . , gdB) ∈ (G/B) d+1 gi−1 gi+1 ∈ Bti B for i = 0, . . . d − 1 gd−1 F (g0 ) ∈ Btd B If w = s1 · · · sd is a reduced expression of w ∈ W then X(s1 , . . . , sd ) is isomorphic to X(w) and X(s1 , . . . , sd ) is a smooth compactification of X(w). It will be denoted by X(w) (even though it depends on the choice of a reduced expression of w). Remark 3.6. Proposition 3.5 also holds for X(w) replaced by X(w) (and the assertions for X(w) are equivalent to the ones for X(w)), with the assumption ‘ℓ ∤ |TwF |’ replaced by ‘ℓ ∤ |TvF | for all v ≤ w’ for the last statement. This follows from the fact that RHom•kG (RΓc (X(w), k), M) ≃ RHom•kG (RΓc (X(w), k), M) whenever RHom•kG (RΓc (X(v), k), M) = 0 for all v < w. The cohomology of X(w) over K is known [25]. We provide here some partial information in the modular setting. Proposition 3.7. Let w, w ′ ∈ W . If ℓ ∤ |TvF | for all v ≤ w or for all v ≤ w ′ , then H∗c (X(w) ×G X(w ′ ), O) is torsion-free. Proof. Given w, w ′ ∈ W , Lusztig defined in [55] a decomposition of X(w) × X(w ′) as a disjoint union of locally closed subvarieties Za stable under the diagonal action of G. The quotient by G of each of these varieties has the same cohomology as an affine space. More precisely, given a, there exists:  . 12 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER • a finite group T , isomorphic to TvF for some v ≤ w and to Tv F for some v ′ ≤ w ′ (F -conjugate to v), and a quasi-projective variety Z0 acted on by G × T , where T acts freely, together with a G-equivariant isomorphism ∼ Z0 /T − → Za ; • a quasi-projective variety Z1 acted on freely by G and T , such that RΓc (G\Z1 , O)[2 dim Z1 ] ≃ O; ∼ • a (G×T )-equivariant quasi-isomorphism RΓc (Z0 , O)[2 dim Za ] − → RΓc (Z1 , O)[2 dim Z1 ]. From these properties and [3, Lemma 3.2] we deduce that if T is an ℓ′ -group then ′ RΓc (G\Za , O) ≃ RΓc (G\Z0 , O) ⊗OT O ≃ RΓc (G\Z1 , O) ⊗OT O[2 dim Z1 − 2 dim Za ] ≃ O[−2 dim Za ]. As a consequence, the cohomology groups of X(w) ×G X(w ′ ) are the direct sums of the cohomology groups of the varieties G\Za and the proposition follows.  Proposition 3.8. Let I be an F -stable subset of S such that ℓ ∤ |LI |. If M is a simple kG-module such that ∗ RG LI (M) 6= 0, then M is not a composition factor in ∗ the torsion of Hc (X(w), O) for any w ∈ W . Proof. Let V be a simple kLI -module such that HomkLI (V, ∗ RG LI (M)) 6= 0. Let v ∈ WI be minimal such that V ∗ occurs as a composition factor, or equivalently as a direct summand, of H∗c (XLI (v), k). By Remark 3.6, it follows that V ∗ occurs only ℓ(v) in Hc (XLI (v), k). Since OLI -mod is a hereditary category, it follows that there is a projective OLI -module V ′ such that V ′ ⊗O k ≃ V ∗ and V ′ is a direct summand of RΓc (XLI (v), O). Since a projective cover PM ∗ of M ∗ occurs as a direct summand of RLGI (V ∗ ), we deduce that it occurs as a direct summand of RLGI (RΓc (XLI (v), O)) ≃ RΓc (X(v), O). By Proposition 3.7 applied to X(v) ×G X(w), we deduce that the cohomology of ∗ PM ⊗OG RΓc (X(w), O) is torsion-free, and hence M does not appear as a composition  factor of the torsion of H∗c (X(w), O). Remark 3.9. Note two particular cases of the previous proposition: • if G is an ℓ′ -group then so is every subgroup, therefore H∗c (X(w), O) is torsionfree; • if ℓ ∤ |LI | for all F -stable I ( S, then the torsion in H∗c (X(w), O) is cuspidal. Recall that two elements w, w ′ ∈ W are F -conjugate if there exists v ∈ W such that w ′ = v −1 wF (v). Lemma 3.10. Let Λ be one of k, O and K. Let J be a subset of W such that if w ∈ J and w ′ < w, then w ′ ∈ J and such that given w ∈ W and s ∈ S with l(sw) > l(w) and l(wF (s)) > l(w), then sw ∈ J if and only if wF (s) ∈ J. THE BRAUER TREES OF UNIPOTENT BLOCKS 13 Let Z be a thick subcategory of D b (ΛG) such that RΓc (X(v), Λ) ∈ Z for all elements v ∈ J that are of minimal length in their F -conjugacy class. We have RΓc (X(v), Λ) ∈ Z for all v ∈ J and RΓc (X(w), Λ) ∈ Z for all w ∈ J. Proof. Consider s ∈ S and v, v ′ ∈ W with v = sv ′ F (s) and v 6= v ′ . Assume that ℓ(v) = ℓ(v ′ ), and furthermore that ℓ(sv) < ℓ(v). We have v = sv ′′ where ℓ(v) = ℓ(v ′′ ) + 1 and v ′ = v ′′ F (s). The G-varieties X(v) and X(v ′ ) have the same étale site, hence isomorphic complexes of cohomology [22, Theorem 1.6]. If ℓ(sv) > ℓ(v), then ℓ(vF (s)) < ℓ(v) [51, Lemma 7.2] and v = v ′′ F (s) with ℓ(v) = ℓ(v ′′ ) + 1 and v ′ = sv ′′ . We conclude as above. Assume now that ℓ(v) = ℓ(v ′ ) + 2. It follows from [25, Proposition 3.2.10] that there is a distinguished triangle RΓc (X(sv ′ ), Λ)[−2] ⊕ RΓc (X(sv ′ ), Λ)[−1] → RΓc (X(v), Λ) → RΓc (X(v ′ ), Λ)[−2] . So, if RΓc (X(v ′ ), Λ) ∈ Z and RΓc (X(sv ′ ), Λ) ∈ Z, then RΓc (X(v), Λ) ∈ Z. By [43, 45], any element v ∈ W can be reduced to an element of minimal length in its F -conjugacy class by applying one of the transformations v → v ′ above. Note that if v ∈ J, then v ′ ∈ J. The lemma follows from the discussion above.  3.3. Steinberg representation. We denote by U the unipotent radical of the Borel subgroup B. Let ψ be a regular character of U (see [4, §2.1] ), eψ be the corresponding central idempotent in OU and Γψ = IndG U (eψ OU) be the Gelfand-Graev module. It is a self-dual projective OG-module independent of ψ, up to isomorphism. The projection of Γψ onto the sum of unipotent blocks is indecomposable [46, Theorem 3.2]. Its unique simple quotient Stℓ is called the modular Steinberg representation. It is cuspidal if ℓ ∤ |LI | for all F -stable I ( S [42, Theorem 4.2]. The unipotent part of KΓψ is simple: this is the usual Steinberg representation, which we denote by St. Statement (i) of the proposition below is a result of [27]. Proposition 3.11. Let t1 , . . . , td be elements of S ∪ S.  (i) If ti ∈ S for all i, then Hom•OG Γψ , RΓc (X(t1 , . . . , td ), O) ≃ O[−ℓ(w)] in D b (O), and hence Stℓ does not occur as a composition factor of Hic (X(t1 , . . . , td ), k) for i 6= ℓ(w).  (ii) If ti 6∈S for some i, then Hom•OG Γψ , RΓc (X(t1 , . . . , td ), O) is acyclic, and hence Stℓ does not occur as a composition factor of H∗c (X(t1 , . . . , td ), k). (iii) Stℓ does not occur as a composition factor of the torsion part of H∗c (X(t1 , . . . , td ), O). Proof. (i) follows from [27] when t1 · · · td is reduced, and the general case follows by changing G and F as in [25, Proposition 2.3.3]. Assume now that ti ∈ S for all i. Using the decomposition of X(t1 , . . . , td ) into Deligne–Lusztig varieties associated to sequences of elements of S, we deduce from  the first part of the proposition that the cohomology of Hom•kG kΓψ , RΓc (X(t1 , . . . , td ), k) 14 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER is zero outside degrees 0, . . . , d. Since X(t1 , . . . , td ) is a smooth projective variety and Γψ is self-dual, we deduce that the cohomology is also zero outside the degrees d, . . . , 2d and therefore it is concentrated in  degree d. As a consequence, the cohomology of Hom•OG Γψ , RΓc (X(t1 , . . . , td ), O) is free over O and concentrated in degree d. By [25, Proposition 3.3.15], we have Hom•KG  KΓψ , RΓc (X(t1 , . . . , td ), K) = 0, • and hence HomOG OΓψ , RΓc (X(t1 , . . . , td ), O) = 0. (ii) follows now by induction on the number of i such that ti is in S: if one of the ti is in S, say t1 , we use the distinguished triangle RΓc (X(t1 , t2 , . . . , td ), O) −→ RΓc (X(t1 , t2 , . . . , td ), O) −→ RΓc (X(t2 , . . . , td ), O) and use induction. Note that the assumption that one of the ti is in S ensures that we never reach X(1) = G/B. Note finally that (iii) follows from (i) and (ii).  Proposition 3.12. If ℓ ∤ |LI | for all F -stable I ( S, then K ⊗O Ωr O ≃ St. L Proof. Given i ∈ {1, . . . , r}, let Mi = I RLGI ◦ ∗ RLGI (O), where I runs over F -stable subsets of S such that |I/F | = i. By the Solomon–Tits Theorem [20, Theorem 66.33], there is an exact sequence of OG-modules 0 → M → M 0 → · · · → M r → 0, where KM ≃ St. By assumption, M i is projective for i 6= r, while M r = O. We deduce that M ≃ Ωr O.  3.4. Coxeter orbits. Let s1 , . . . , sr be a set of representatives of F -orbits of simple reflections. The product c = s1 · · · sr is a Coxeter element of (W, F ). Throughout e c (X(c), O) is a this section and §4.3.5, we will assume that ℓ ∤ |TcF |, and hence RΓ bounded complex of finitely generated projective OG-modules. If v ∈ W satisfies ℓ(v) < ℓ(c) then v lies in a proper F -stable parabolic subgroup, forcing Hom•kG (RΓc (X(v), k), M) to be zero for every cuspidal module kG-module M. Therefore Proposition 3.5 has the following corollary for Coxeter elements. Corollary 3.13. Let c be a Coxeter element and M be a cuspidal kG-module. If ℓ ∤ |TcF |, then the cohomology of RHom•kG (RΓc (X(c), k), M) and of RHom•kG (M, RΓc (X(c), k)) vanishes outside degree r. e c (X(c), O) Lemma 3.14. Assume that ℓ ∤ |TcF |. Let C be a direct summand of RΓ b in Ho (OG -mod) such that (i) the torsion part of H∗ (C) is cuspidal, and (ii) Hi (KC) = 0 for i 6= r. Then Hr (C) is a projective OG-module and Hi (C) = 0 for i 6= r. THE BRAUER TREES OF UNIPOTENT BLOCKS 15 Proof. Since r = ℓ(c), the complex C can be chosen, up to isomorphism in Hob (OG -mod), to be complex with projective terms in degrees r, . . . , 2r and zero terms outside those degrees. Let i be maximal such that Hi (C) 6= 0 (or equivalently such that Hi (kC) 6= 0). There is a non-zero map kC −→ Hi (kC)[−i] in D b (kG). From Corollary 3.13 and the assumption (i) we deduce that i = r. It follows that the cohomology of C is concentrated in degree r. Since C is a bounded complex of projective modules, it follows that Hr (C) is projective.  Proposition 3.15. Let I ⊂ S be an F -stable subset and let cI be a Coxeter element of WI . (i) If ℓ ∤ |LI |, then H∗c (X(cI ), O) is torsion-free. (ii) If H∗c (X(cI ), O) is torsion-free, then the torsion of H∗c (X(c), O) is killed by ∗ RG LI . Proof. The first statement follows from [29, Corollary 3.3] using H∗c (X(cI ), O) = RLGI (H∗c (XLI (cI ), O)). ∗ ∗ The image by ∗ RG LI of the torsion of Hc (X(c), O) is the torsion of Hc (UI \ X(c), O). By [54, Corollary 2.10], the variety UI \ X(c) is isomorphic to (Gm )r−rI × XLI (cI ). The second statement follows.  3.5. Generic theory. We recall here constructions of [7, 8, 9], the representation theory part being based on Lusztig’s theory. 3.5.1. Reflection data. Let K = Q(q) and V = K ⊗Z Y , where Y is the cocharacter group of T. We denote by ϕ the finite order automorphism of V induced by the action of q −1 F . Q V dj We denote by |(W, ϕ)| = N dim i=1 (x − ζj ) the polynomial order of (W, ϕ). Here, N is the number of reflections of W and we have fixed a decomposition into a direct sum of (Gm × hϕi)-stable lines L1 ⊕ · · · ⊕ Ldim V of the tangent space at 0 of V /W , so that dj is the weight of the action of Gm on Lj and ζj is the eigenvalue of ϕ on Lj . Recall that there is some combinatorial data associated with W (viewed as a reflection group on V ) and ϕ: • a finite set Uch(W, ϕ); • a map Deg : Uch(W, ϕ) → Q[x]. We endow ZUch(W, ϕ) with a symmetric bilinear form making Uch(W, ϕ) an orthonormal basis. In addition, given W ′ a parabolic subgroup of W and w ∈ W such that ad(w)ϕ(W ′) = W,ϕ ′ W ′ , there is a linear map RW ′ ,ad(w)ϕ : ZUch(W , ad(w)ϕ) → ZUch(W, ϕ). W,ϕ We will denote by ∗ RW,ϕ W ′ ,ad(w)ϕ the adjoint map to RW ′ ,ad(w)ϕ . The data associated with W and ϕ depends only on the class of ϕ in GL(V )/W . The corresponding pair G = (W, W ϕ) is called a reflection datum. A pair L = (W ′ , ad(w)ϕ) as above is called a Levi subdatum of (W, ϕ). We put WL = W ′ . 16 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER There is a bijection ∼ Uch(G) − → Uch(G), χ 7→ χq such that Deg(χ)(q) = χq (1). There is a bijection from the set of W -conjugacy classes of Levi subdata of G to the set of G-conjugacy classes of F -stable Levi subgroups of G. Those bijections have the property that given L an F -stable Levi subgroup of G with associated Levi subdatum L = (W ′ , ad(w)ϕ), we have (RLG (χ))q = RLG (χq ) for all χ ∈ Uch(W, ϕ) (assuming q > 2 if (G, F ) has a component of type 2 E 6 , E7 or E8 , in order for the Mackey formula to be known to hold [2]). 3.5.2. d-Harish-Chandra theory. Let Φ be a cyclotomic polynomial over K, i.e., a prime divisor of X n − 1 in K[X] for some n ≥ 1. Let V ′ be a subspace of V and let w ∈ W such that wϕ stabilizes V ′ and the characteristic polynomial of wϕ acting on V ′ is a power of Φ. Let W ′ = CW (V ′ ). Then (W ′ , ad(w)ϕ) is called a Φ-split Levi subdatum of (W, ϕ). An element χ ∈ Uch(W, ϕ) is Φ-cuspidal if ∗ RG L (χ) = 0 for all proper Φ-split Levi subdata L of G (when G is semisimple, this is equivalent to the requirement that Deg(χ)Φ = |G|Φ ). Given a Φ-cuspidal pair (L, λ), we denote by Uch(G, (L, λ)) the set of χ ∈ Uch(G) such that hRLG (λ), χi = 6 0. We denote by WG (L, λ) = NW (WL )/WL the relative Weyl group. The Φ-Harish-Chandra theory states that: • Uch(G) is the disjoint union of the sets Uch(G, (L, λ)), where (L, λ) runs over W -conjugacy classes of Φ-cuspidal pairs; • there is an isometry ∼ G I(L,λ) : Z Irr(WG (L, λ)) − → ZUch(G, (L, λ)); W (L,λ) G M G • those isometries have the property that RM I(L,λ) = I(L,λ) IndWMG (L,λ) for all Levi subdata M of G containing L. The sets Uch(G, (L, λ)) are called the Φ-blocks of G. The defect of the Φ-block Uch(G, (L, λ)) is the integer i ≥ 0 such that the common value of Deg(χ)Φ for χ ∈ Uch(G, (L, λ)) is Φi (see §4.2.3 for the relation with unipotent ℓ-blocks). 4. Unipotent blocks with cyclic defect groups 4.1. Blocks with cyclic defect groups. We recall some basic facts on blocks with cyclic defect groups (cf. [33] and [32] for the folding). THE BRAUER TREES OF UNIPOTENT BLOCKS 17 4.1.1. Brauer trees and folding. Definition 4.1. A Brauer tree is a planar tree T with at least one edge together with a positive integer m (the ‘multiplicity’) and, if m ≥ 2, the data of a vertex vx , the ‘exceptional vertex’. Note that the data of an isomorphism class of planar trees is the same as the data of a tree together with a cyclic ordering of the vertices containing a given vertex. Let d > 1 be a divisor of m. We define a new Brauer tree ∧d T . It has a vertex ṽx , and the oriented graph (∧d T ) \ {ṽx } is the disjoint union (T \ {vx }) × Z/d of d copies of T \ {vx }. Let l1 , . . . , lr be the edges of T containing vx , in the cyclic ordering. The edges of the tree ∧d T containing ṽx are, in the cyclic ordering, (l1 , 0), . . . , (l1 , d − 1), (l2 , 0), . . . , (l2 , d − 1), . . . , (lr , 0), . . . , (lr , d − 1). Finally, for every i ∈ Z/d, we have an embedding of oriented trees of T in ∧d T given on edges by l 7→ (l, i), on non-exceptional vertices by v 7→ (v, i) and finally vx 7→ ṽx . The multiplicity of ∧d T is m/d. When m6=d, the exceptional vertex of ∧d T is ṽx . There is an automorphism σ of ∧d T given by σ(ṽx ) = ṽx and σ(v, i) = (v, i + 1) for v ∈ T \ {vx }. Let X be the group of automorphisms of ∧d T generated by σ. There is an isomorphism of planar trees ∼ κ : (∧d T )/X − → T, ṽx 7→ vx , X · (v, i) 7→ v for v ∈ T \ {vx }. In particular the Brauer tree T ′ = ∧d T together with the automorphism group X determine T . Remark 4.2. Given another planar embedding T ′ of Λd T compatible with the auto∼ morphism σ above and such that κ induces an isomorphism of planar trees T ′ /X − → ∼ T , then there is an isomorphism of planar trees T ′ − → Λd T compatible with σ. 4.1.2. Brauer tree of a block with cyclic defect. Let H be a finite group and A = bOH be a block of OH. Let D be a defect group of A and let bD be a block idempotent of the Brauer correspondent of b in ONH (D). We assume D is cyclic and non-trivial. Let E = NH (D, bD )/CH (D), a cyclic subgroup of Aut(D) of order e dividing ℓ − 1. When e = 1, the block A is Morita equivalent to OD. We will be discussing Brauer trees only when e > 1, an assumption we make for the remainder of §4.1. We define a Brauer tree T associated to A. We put m = (|D|−1)/e. An irreducible character χ of KA is called non-exceptional if d(χ)6=d(χ′ ) for all χ′ ∈ Irr(KA) for χ′ 6=χ. When m > 1, we denote by χx the sum of the exceptional irreducible characters of KA (those that are not non-exceptional). We define the set of vertices of T as the union of the non-exceptional characters together, when m > 1, with an exceptional vertex corresponding to χx . The set of edges is defined to be Irr(kA). An edge φ has vertices χ and χ′ if χ + χ′ is the character of the projective cover of the simple A-module with Brauer character φ. Note that the tree T has e edges. 18 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER The cyclic ordering of the edges containing a given vertex is defined as follows: the edge φ2 comes immediately after the edge φ1 if Ext1A (L1 , L2 )6=0, where Li is the simple A-module with Brauer character φi . Recall that the full subgraph of T with vertices the real-valued non-exceptional irreducible characters and the exceptional vertex if m > 1 is a line (the ‘real stem’ of the tree). There is an embedding of the tree T in C where the intersection of T with the real line is the real stem and taking duals of irreducible charcters corresponds to reflection with respect to the real line. 4.1.3. Folding. Let H ′ be a finite group containing H as a normal subgroup and let b′ be a block idempotent of OH such that bb′ 6= 0. We put A′ = b′ OH and we denote by T ′ the Brauer tree of A′ , with multiplicity m′ . We assume D is a defect group of b′ . Let bD′ be the block idempotent of ONH ′ (D) that is the Brauer correspondent of b′ and let E ′ = NH ′ (D, b′D )/CH ′ (D), an ℓ′ -subgroup of Aut(D). Note that E is a subgroup of E ′ . Let Hb′ be the stabilizer of b in H ′ . We have Hb′ = HNH ′ (D, b′D ) and there is a Morita equivalence between bOHb′ and b′ OH ′ induced by the bimodule bOH ′ b′ . Suppose that E ′ 6= E, i.e., m′ 6= m, since [E ′ : E] = m/m′ . The group X of 1-dimensional characters of E ′ /E ≃ Hb′ /H acts on Irr(KA′ ) and on Irr(kA′ ) and this induces an action on T ′ , the Brauer tree associated to A′ . The result below is a consequence of [32, proof of Lemma 4.3] (the planar embedding part follows from Remark 4.2). ∼ Proposition 4.3. There is an isomorphism of Brauer trees ∧d T − → T ′ such that (χ, i) maps to a lift of χ, for χ a non-exceptional vertex. The previous proposition shows that the data of T ′ and of the action of X on T determine the tree T (up to parametrization). 4.2. Structure of unipotent blocks with cyclic defect groups. We assume in §4.2 that the simple factors of [G, G] are F -stable. Note that every finite reductive group can be realized as GF for such a G. From now on, we assume that ℓ is an odd prime. 4.2.1. Centre. We show here that a Brauer tree of a unipotent block of a finite reductive group (in non-describing characteristic) is isomorphic to one coming from a simple simply connected algebraic group. Lemma 4.4. Assume that G is simple and simply connected. Let A be a unipotent block of kGF whose image in k(GF /(Z(G)F )ℓ ) has cyclic defect. Then, A has cyclic defect and Z(G)Fℓ = 1. Proof. Since ℓ is odd, it divides |Z(G)F | only in the following cases [59, Corollary 24.13]: THE BRAUER TREES OF UNIPOTENT BLOCKS 19 • (G, F ) = SLn (q), n ≥ 2 and ℓ | (n, q − 1); • (G, F ) = SUn (q), n ≥ 3 and ℓ | (n, q + 1); • (G, F ) = E6 (q) and ℓ | (3, q − 1); • (G, F ) = 2 E 6 (q) and ℓ | (3, q + 1). Let H = GF /(Z(G)F )ℓ . Suppose that the image of A in kH has non-trivial defect groups. Assume that (G, F ) = SLn (q), n ≥ 2 and ℓ | (n, q − 1) or (G, F ) = SUn (q), n ≥ 3 and ℓ | (n, q + 1). In those cases, the only unipotent block A is the principal block [14, Theorem 13], so H has cyclic Sylow ℓ-subgroups: this is impossible. Assume that (G, F ) = E6 (q) and ℓ | (3, q−1). Note that A cannot be the principal block, as H does not have cyclic Sylow 3-subgroups. There is a unique non-principal unipotent block b, and its unipotent characters are the ones in the Harish-Chandra series with Levi subgroup L of type D4 [31, “Données cuspidales 7,8,9”, p.352–353]. Those three unipotent characters are trivial on Z(G)F . It is easily seen that there is no equality between their degrees nor is the sum of two degrees equal the third one. As a consequence, they cannot belong to a block of kH with cyclic defect and inertial index at most 2. The same method (replacing q by −q) shows also that b cannot have cyclic defect when (G, F ) = 2 E 6 (q) and ℓ | (3, q + 1).  Let H be a finite simple group of Lie type. Then there is a simple simply connected reductive algebraic group G endowed with an isogeny F such that H ≃ GF /Z(G)F , unless H is the Tits group, (G, F ) = 2 F4 (2) and we have H = [GF /Z(G)F , GF /Z(G)F ], a subgroup of index 2 of GF /Z(G)F . The previous lemma shows that if the image in kH of a unipotent ℓ-block of kGF has cyclic defect groups, then the block of kGF already has cyclic defect groups. By folding (§4.1.3), the Brauer tree of a unipotent block of OGF determines the Brauer tree of the corresponding block of OH. Proposition 4.5. Let A be a unipotent block of OGF with cyclic defect group D. ◦ ◦ ◦ We have CG (x) = CG (D) and CG (x) = CG (x)F for all non trivial elements x ∈ D. Furthermore, one of the two following statements hold: • D is the Sylow ℓ-subgroup of Z ◦ (G)F and there is a finite subgroup H of G containing [G, G]F such that G = D × H; • |Z(G)F |ℓ = 1, D 6= 1 and A is Morita equivalent to a unipotent block of a simple factor of G/Z(G) with cyclic defect groups isomorphic to D. In particular, Z(G)F /Z ◦ (G)F is an ℓ′ -group. Proof. Let H be a simple factor of [G, G]. Consider a simply connected cover Hsc of H. The restriction of unipotent characters in A to H and then to HFsc are sums of unipotent characters, and the blocks that contain them have a defect group that is cyclic modulo Z(Hsc )F . It follows from Lemma 4.4 that ℓ ∤ Z(Hsc )F , and therefore ℓ ∤ Z(Gsc ), where Gsc is a simply connected cover of [G, G]. Note that 20 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER as a consequence, both (Z(G)/Z ◦ (G))F and (Z(G∗ )/Z ◦ (G∗ ))F are ℓ′ -groups, where G∗ is a Langlands dual of G. Let Gad = G/Z(G). By [16, Theorem 17.7], we have A ≃ OZ(G)Fℓ ⊗ A′ , where ′ A is the unipotent block of Gad containing the unipotent characters of A. Also, D ≃ Z(G)Fℓ × D ′ , where D ′ is a defect group of A′ . So, if ℓ divides |Z(G)F |, then ℓ divides |Z ◦ (G)F |, D ′ = 1 and D is the Sylow ℓ-subgroup of Z(G)F . Otherwise, consider a decomposition Gad = G1 ×· · ·×Gr where the Gi are simple and F -stable factors. There is a corresponding decomposition A′ = A1 ⊗ · · · ⊗ Ar where Ai is a unipotent block of Gi . So, there is a unique i such that Ai does not have trivial defect groups, and A is Morita equivalent to Ai . ◦ Let us now prove the first statement of the proposition. We have CG (x)F = CG (x) by [16, Proposition 13.16]. The block idempotent brx (b) gives a (nilpotent) block of OCG (x) with defect group D. By [10, Theorem 3.2], this is a unipotent block. ◦ We deduce from the other part of the proposition that D ⊂ Z(CG (x))F , and hence ◦ ◦ CG (x) = CG (D).  4.2.2. Local subgroups and characters. Let A be a unipotent block of OG with a non-trivial cyclic defect group D. Let (D, bD ) be a maximal b-subpair as in §4.1.2 and let E = NG (D, bD )/CG (D). Recall that we assume that ℓ is odd. ◦ Let Q be the subgroup of order ℓ of D and let L = CG (Q). ◦ Theorem 4.6. • L = CG (D) is a Levi subgroup of G. • D is the Sylow ℓ-subgroup of Z ◦ (L)F and L = D × H for some subgroup H of L containing [L, L]F . P • There is a (unique) unipotent character λ of L such that RLG (λ) = χ∈Uch(KA) εχ χ for some εχ ∈ {±1}. • We have |Uch(KA)| = |E| and Irr(KA) is the disjoint union of Uch(KA) and of {(−1)rG +rL RLG (λ ⊗ ξ)}ξ∈(Irr(KD)−{1})/E . • If |E| = 6 |D| − 1, then Uch(KA) is the set of non-exceptional characters of A. Proof. Let A′ be the block of OL corresponding to A. This is a unipotent block with defect group D. By Proposition 4.5, we have Q ≤ Z ◦ (L) 6= 1, hence L is a Levi subgroup of G, since it is the centralizer of the torus Z ◦ (L). Also, D is the Sylow ℓ-subgroup of Z ◦ (L)F and L = D × H for some subgroup H of L containing [L, L]F . There is a (unique) unipotent irreducible representation λ in Irr(KA′ ) and Irr(KA′ ) = {λ ⊗ ξ}ξ∈Irr(KD) . Let ξ ∈ Irr(KD) −{1}. The character χξ = (−1)rG +rL RLG (λ ⊗ξ) is irreducible and it depends only on IndD⋊E ξ [23, Theorem 13.25]. Furthermore, χξ = χξ′ implies D ′ ξ ∈ E · ξ. Assume that |E| = 6 |D| − 1. There are at least two W -orbits on the set of non-trivial characters of D, so the χξ for ξ ∈ (Irr(KD) − {1})/E are exceptional THE BRAUER TREES OF UNIPOTENT BLOCKS 21 characters. Since A and A′ have the same number of exceptional characters, we have found all exceptional characters of A. Let χ1 = (−1)rG +rL RLG (λ). We have d(χP 1 ) = d(χξ ) for any ξ ∈ Irr(KD) − {1}. There are integers nχ ∈ Z such that χ1 = ψ∈Uch(KA) nψ ψ. The restriction of the decomposition map to ZUch(KA) is injective, since we have removed exceptional characters (if |E| = 6 |D| − 1, otherwise one character) from Irr(KA). It follows that χ1 is the unique linear combination of unipotent characters of A such that d(χ1 ) = d(ξ) for some ξ ∈ Irr(D) − {1}. On the other hand, this unique solution satisfies nψ = ±1 and the number of unipotent characters in A′ is |E|.  ∼ Remark 4.7. Choose a bijection Irr(KE) − → Uch(KA′ ), φ 7→ χφ . Define I : ∼ Z Irr(KD ⋊ E) − → Z Irr(KA′ ) by I(IndD⋊E ξ) = RLG (ξ) if ξ ∈ Irr(KD) − {1} and D I(φ) = εχφ χφ for φ ∈ Irr(KE). The proof of Theorem 4.6 above shows that I ∼ is an isotypy, with local isometries Ix : Z Irr(KD) − → Z Irr(KA′ ), ξ 7→ λ ⊗ ξ for x ∈ D − {1}. 4.2.3. Genericity. We assume in §4.2.3 that F is a Frobenius endomorphism. Let A be a unipotent block of OG with a non-trivial cyclic defect group D and let ◦ L = CG (D). Let d be the order of q modulo ℓ. Note that ℓ divides Φe (q) if and only if e = dℓj for some j ≥ 0. Broué–Michel [11] and Cabanes–Enguehard [15] showed that under a mild additional assumption on ℓ (for quasisimple groups not of type A, ℓ good is enough), unipotent characters in ℓ-blocks with abelian defect groups are Φd -blocks. We show below that this results holds for ℓ-blocks with cyclic defect groups without assumptions on ℓ. Using the knowledge of generic degrees, the unipotent Φd -blocks with defect 1 for simple G can be easily determined, using for example Chevie [60]. Theorem 4.8. With the notations of §4.2.2, we have the following assertions: • L is a Φd -split Levi subgroup of G; • D has order |Φd (q)|ℓ ; • λ = λq for a unipotent Φd -cuspidal character λ of L and there is a bijection ∼ Uch(G, (L, λ)) − → Uch(KA) given by χ 7→ χq ; • the Φd -block Uch(G, (L, λ)) has defect 1; • if ℓ is a bad prime for G or ℓ = 3 and (G, F ) has type 3 D 4 , then we are in one of the cases listed in Table 1. Proof. By Proposition 4.5, we can assume that G is simple and simply connected. When ℓ is good and different from ℓ = 3 for type 3 D 4 , the theorem is [15]. Otherwise, the result follows from [31, Théorème A], by going through the list of d-cuspidal pairs with ℓ-central defect and checking if the defect groups given in [31, §3.2] are cyclic. We list the unipotent blocks with cyclic defect for ℓ bad in Table 1, following [31, §3.2]. Note that in [31, p.358, No 29], ‘E7 [±ξ]’ should be replaced by ‘φ512,11 , φ512,12 ’.  22 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER (G, F ) ℓ E6 (q) 3 2 E 6 (q) 3 E8 (q) 3, 5 E8 (q) 3, 5 d (L, λ) 2 (A5 (q) · (q − 1), φ321 ) 1 (2 A5 (q) · (q + 1), φ321 ) 1 (E7 (q) · (q − 1), E7 [±i]) 2 (E7 (q) · (q + 1), φ512,11 or φ512,12 ) Table 1. Unipotent blocks with cyclic defect for ℓ bad Broué [6] conjectured that there is a parabolic subgroup P with an F -stable Levi complement L such that bRΓc (YG (L ⊂ P), O) induces a derived equivalence between A and the corresponding block of ONG (D, bD ). In [17], it is conjectured that such an equivalence should be perverse. It is further shown there how the Brauer tree of A could then be combinatorially constructed from the perversity function. The perversity function can be encoded in the data a function π : Uch(KA) → Z that describes the (conjecturally) unique i such that V ∈ Uch(KA) occurs in Hic (YG (L ⊂ P), K). In [19], the first author gave a conjectural description γ of the function π, depending on Φd and not on ℓ (this is defined for Φd -blocks with arbitrary defect). Using this function, and the combinatorial procedure to recover a Brauer tree from a perversity function, [19] associates a generic Brauer tree to a Φd -block of defect 1. This is a planar-embedded tree, together with an exceptional vertex (but no multiplicity) and the non-exceptional vertices are parametrized by the unipotent characters in the given Φd -block. The Brauer tree of A is conjectured in [19] to be obtained from the generic Brauer tree, by associating the appropriate multiplicity if it is greater than 1, and turning the exceptional vertex into a non-exceptional one if the multiplicity is 1. Our main theorem is a proof of that conjecture. Theorem 4.9. Let A be a unipotent ℓ-block with cyclic defect of G. Then the unipotent characters of KA form a unipotent Φd -block and the Brauer tree of A is obtained from the generic Brauer tree of that Φd -block. Corollary 4.10. There is a perverse derived equivalence between A and D ⋊ E with perversity function γ. 4.2.4. Determination of the trees. Let us now discuss the known Brauer trees. The Brauer trees for classical groups were determined by Fong and Srinivasan [35, 36]. The Brauer trees for the following exceptional groups are known: Burkhart [13] for 2 B2 , Shamash [63] for G2 , Geck [38] for 3 D4 , Hiss [47] for 2 G2 and 2 F4 , Hiss– Lübeck [48] for F4 and 2 E6 (building on earlier work on F4 by Wings [65]) and Hiss–Lübeck–Malle [49] for E6 . More recently, the second and third authors determined in [30] the Brauer trees of the principal Φh -block of E7 and E8 for h the Coxeter number, using new geometric THE BRAUER TREES OF UNIPOTENT BLOCKS G 2 d ([L, L], λ) 23 ℓ | |LI | E6 12 E7 E8 9 10 14 9 2 ( A2 (q), φ21 ) E6 D6 (A2 (q), φ3 ) E6 (A2 (q), φ21) E6 (A2 (q), φ13 ) E6 12 (3 D4 (q), 3 D4 [1]) E6 , D7 15 18 (2 A2 (q), φ21 ) E7 20 24 Table 2. Blocks with unknown Brauer tree methods which are also at the heart of this paper. Also, the first author determined in [19] the Brauer trees of several unipotent blocks with cyclic defect of E7 and E8 . We determine the remaining unknown trees. They correspond to certain unipotent blocks of 2 E6 (cf. Remark 5.1), E7 (§5.1) and E8 (§5.2). We list in Table 4.2.4 the group G, the order d of q modulo ℓ and the d-cuspidal pair (when the block is not principal) associated to each of these blocks. We also indicate the type of the minimal proper standard F -stable Levi subgroups LI with ℓ | |LI |. Let us note that the Brauer trees of other blocks of exceptional groups were determined up to choices of fields of character values in each block. Using Lusztig’s parametrization of unipotent characters we can remove this ambiguity by choosing appropriate roots of unity in Qℓ with respect to q. Corollary 4.11. Let G be a finite group with cyclic Sylow ℓ-subgroups. If ℓ 6= 29, 41, 47, 59, 71, then the (unparametrized) Brauer tree of the principal ℓ-block of G is known. Proof. Let G be a finite group with a non-trivial cyclic Sylow ℓ-subgroup. Since the principal block of G is isomorphic to that of G/Oℓ′ (G), we can assume that Oℓ′ (G) = 1. If G has a normal Sylow ℓ-subgroup, then the Brauer tree is a star. So, we assume G does not have a normal Sylow ℓ-subgroup. It follows from the classification of finite simple groups [34, §5] that G has a normal simple subgroup H with G/H a Hall ℓ′ -subgroup of Out(H). If H is an alternating group, the Brauer trees are foldings of those of symmetric groups, which are lines as all characters are real. If H is a sporadic group, then 24 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER the Brauer tree of the principal block of H is known under the assumptions of ℓ, [50, 18]. Assume now H is a finite group of Lie type. If ℓ is the defining characteristic, then H = PSL2 (Fℓ ) and the Brauer tree of the principal block is well known. Otherwise, the Brauer tree is known by Theorem 4.9.  4.3. Properties of the trees. We assume here that G is simple and we denote by A a unipotent block with cyclic defect group D of OG. Let E = NG (D, bD )/CG (D), where (D, bD ) is a maximal A-subpair. We assume |E| > 1. We denote by T the Brauer tree of A. Recall (Theorem 4.6) that its |E| unipotent vertices are nonexceptional. We define the non-unipotent vertex of T to be the one corresponding to the sum of the non-unipotent characters in KA. It is exceptional if |E| = 6 |D| − 1. 4.3.1. Harish-Chandra branches. Let I be an F -stable subset of S and X be a cuspidal simple unipotent KLI -module with central ℓ-defect, i.e., such that (dim X)ℓ = [LI : Z(LI )]ℓ . Since the centre acts trivially on simple unipotent modules, the ℓblock bI of LI containing X has central defect group, and X is the unique unipotent simple module in bI . This yields the following three facts. e such that X ≃ (a) There exists a unique (up to isomorphism) OLI -lattice X e The kLI -module k X e is irreducible. K X. e In particular NG (LI , X) = (b) X is the unique unipotent module that lifts k X. e NG (LI , k X). e then KKer(P ։ X) e has only non-unipotent (c) If P is a projective cover of X, G G e have no irreconstituents, therefore RLI (X) and KKer(RLI (P ) ։ RLGI (X)) ducible constituents in common. Under the properties (a) and (b), Geck showed in [37, 2.6.9] that the endomorphism e is reduction-stable, i.e. algebra EndOG (RLGI (X)) e ≃ EndkG (RG (k X)). e kEndOG (RLGI (X)) LI Property (c) was used by Dipper (see [26, 4.10]) to show that the decomposition e embeds in the decomposition matrix of b. matrix of EndOG (RLGI (X)) It follows from [39] that the full subgraph of T whose vertices are in the HarishChandra series defined by (LI , X) is a union of lines. Note that [39] proves a corresponding result for blocks of Hecke algebras at roots of unity, in characteristic 0. The fact that the tree does not change when reducing modulo ℓ follows from the following two facts: • a symmetric algebra over a discrete valuation ring that is an (indecomposable) Brauer tree algebra over the field of fractions and over the residue field has the same Brauer tree over those two fields; e correspond to blocks of the • the blocks of the Hecke algebra EndOG (RLGI (X)) Hecke algebra in characteristic 0 for a suitable specialization at roots of unity. THE BRAUER TREES OF UNIPOTENT BLOCKS 25 Each such line in T is called a Harish-Chandra branch. In particular, the principal series part of T is the full subgraph whose vertices are in the Harish-Chandra series (T, 1). Proposition 4.12. Let N be an edge of T and let V1 and V2 be its vertices. Let I be a minimal F -stable subset of S such that ∗ RG LI (N) 6= 0. If ℓ ∤ |LI |, then given i ∈ {1, 2}, the F -stable subset I is also minimal with respect to the property that ∗ RG LI (Vi ) 6= 0. Proof. Let M be an OLI -lattice such that KM is simple and N is a quotient of RLGI (M). Note that M is projective, hence it follows by Harish-Chandra theory that KM is cuspidal. Since RLGI (M) is projective, it follows that V1 and V2 are direct summands of KRLGI (M). The proposition follows by Harish-Chandra theory.  Corollary 4.13. Suppose that ℓ ∤ |LI | for all F -stable I ( S. Then the edges that are not in a Harish-Chandra branch are cuspidal. The following result is a weak form of [46, Theorem 3.5]. Proposition 4.14. If St is a vertex of T , then the edge corresponding to Stℓ connects St and the non-unipotent vertex. Proof. Recall that bΓψ is the projective cover of Stℓ . Since St is the unique unipotent component of KΓψ , the proposition follows.  Proposition 4.15. Assume that A is the principal block and ℓ ∤ |LI | for any F stable I ( S. Let L be the full subgraph of T whose vertices are at distance at most r from 1. Then L is a line whose leaves are 1 and St. Proof. The tables in [44, Appendix F] show that the Brauer tree of the principal block of the Hecke algebra EndOG (RTG (O)) is a line with r + 1 vertices, with leaves corresponding to the trivial and sign characters. So, T has a full subgraph L that is a line with r + 1 vertices and with leaves 1 and St. Using Proposition 3.12 and duality, we deduce that all vertices at distance at most r from 1 are in L.  4.3.2. Real stem. Let V be a unipotent irreducible KG-module. Let w ∈ W such that V occurs in Hic (X(w), K). The eigenvalues of F δ on the V -isotypic component of Hic (X(w), K) are of the form λV q δj where λV is a root of unity (depending only on V , not on w nor i), for some j ∈ 21 Z. Note that λV ∗ = λ−1 V . So, the vertices of the real stem of T consist of the non-unipotent vertex and the unipotent vertices corresponding to the V such that λV = ±1. For classical groups, all unipotent characters have this property, and are real valued, and for exceptional groups, the unipotent characters with this property are principal-series characters and D4 -series characters, which are real-valued by [41, Proposition 5.6], and cuspidal characters G[±1], which are rational-valued by [41, Table 1]. 26 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER 4.3.3. Exceptional vertex. By Theorem 4.6, a non-unipotent character is obtained by Deligne–Lusztig induction from an irreducible non-unipotent character. We give here a condition for that character to be cuspidal. Proposition 4.16. Assume that λ is cuspidal and L is not contained in any proper F -stable parabolic subgroup of G. Let P′ be a proper F -stable parabolic subgroup of G with unipotent radical U′ and an F -stable Levi complement L′ . The (OG, OL′ )bimodule bOGeU ′ is projective and its restriction to OG is a direct sum of projective indecomposable A-modules corresponding to edges that do not contain the non-unipotent vertex. In particular, the non-unipotent characters of A are cuspidal. Proof. Let Q be the subgroup of order ℓ of D and let g ∈ G such that Qg ≤ L. Let ∆g Q = {(x, g −1 xg)|x ∈ Q}. We have Br∆g Q (bOGeU ′ ) ≃ Br∆Q (bOGegU ′ g−1 ) = bλ kLeV where V = gU ′ g −1 ∩ L (Lemma 3.2). By assumption, λ is cuspidal and P′ ∩ L is a proper F -stable parabolic subgroup of L, hence bλ kLeV = 0, hence Br∆g Q (bOGeU ′ ) = 0. Since the ((OG) ⊗ (OL′ )opp )-module bOG is a direct sum of indecomposable modules with vertices trivial or containing ∆g Q for some g ∈ G, we deduce that that the (OG, OLI )-bimodule bOGeU ′ is projective. Let ξ ∈ Irr(KD) − {1}. Since ResL[L,L]F (λ ⊗ ξ) = ResL[L,L]F (λ), it follows that λ ⊗ ξ is cuspidal. Theorem 4.6 shows that every non-unipotent character of b is of the form (−1)rG +rL (RLG (λ ⊗ ξ)) for some ξ ∈ Irr(KD) − {1}. Proposition 3.1 shows that such a character is cuspidal.  The assumptions of Proposition 4.16 are satisfied in the following cases: • L = T contains a Sylow Φd -torus of G and d is not a reflection degree of a proper parabolic subgroup of W (e.g. G = E7 (q) and d = 14 or G = E8 (q) and d ∈ {15, 20, 24}). In that case the trivial character of L is cuspidal, and no proper F -stable parabolic subgroup of G can contain a Sylow Φd -torus. • G = E8 (q), d = 12 and ([L, L]F , λ) = (3 D4 (q), 3D4 [1]) or d = 18 and ([L, L]F , λ) = (2 A2 (q), φ21 ). Lemma 4.17. Let w ∈ W and let M be a simple A-module corresponding to an edge containing χexc . If w has minimal length such that RHom•kG (RΓc (X(w), k), M) 6= 0, then ℓ | |TwF |. If ℓ ∤ |TvF | for all v ≤ w, then RHom•kG (RΓc (X(w), k), M) = 0. • Proof. Let M be as in the lemma and w be minimal such that RHom PkG (RΓc (X(w), k), M) 6= wF ℓ(w) 0. Assume that ℓ ∤ |T |. We have (−1) [bRΓc (X(w), k)] = η aη [Pη ], where η runs over the edges of T and aη ∈ Z. By Proposition 3.5 we have aµ > 0 where µ is the edge corresponding to M. Since χexc does not occur in [RΓc (X(w), K)], it follows that there is an edge ν containing χexc such that aν < 0. Let N be the simple A-module corresponding to ν. The complex RHom•kG (RΓc (X(w), k), N) has non-zero cohomology in a degree other than −ℓ(w), hence there is v < w such that THE BRAUER TREES OF UNIPOTENT BLOCKS 27 RHom•kG (RΓc (X(v), k), N) 6= 0 by Proposition 3.5, a contradiction. The lemma follows.  4.3.4. Stable equivalence. Assume in §4.3.4 that δ = 1 and L is a maximal torus of G. This is a Φd -torus. Let w ∈ W be a d-regular element. The next result follows from [30, Corollary 2.11 and its proof]. Proposition 4.18. Let m ∈ {0, . . . , d − 1}. The complex RΓc (X(w), k)(qδm ) is isomorphic in kG -stab to Ω2m k. Remark 4.19. If TvF is an ℓ′ -group for all v < w, then Proposition 4.18 holds with X(w) replaced by X(w). 4.3.5. Coxeter orbits. The following lemma holds for general symmetric O-algebras A such that kA is a Brauer tree algebra. Lemma 4.20. Let C be a bounded complex of finitely generated projective A-modules. Assume that T has a subtree of the form Vt St−1 Vt−1 ❴ ❴ ❴ ❴ ❴ ❴ V2 S1 V1 S0 V0 all of whose vertices are non-exceptional, and: (i) KHi (C) = 0 for i 6∈ {0, −t}, Hi (kC) = 0 for i < −t and KH0 (C) ≃ V0 ; (ii) given an edge M of T , given an integer i < t and given a map f ∈ HomDb (A) (C, M[i]), the induced map from the torsion part of H−i (C) to M vanishes; (iii) letting M be an edge of T that contains Vi , and assuming that M is strictly between Si−1 and Si in the cyclic ordering of edges at Vi (for 0 < i ≤ t − 1) or M 6= S0 (for i = 0), then HomDb (A) (C, M[j]) = 0 for j ∈ {i, i + 1} ∩ {0, . . . , t − 1}; (iv) Si is not a composition factor of the torsion part of H−i+1 (C) for 1 ≤ i ≤ t−1. Then C is homotopy equivalent to δt−1 δ 1 → P S0 → 0 0 → P → PSt−1 −−→ PSt−2 → · · · − where P is a projective A-module in degree −t with KP ≃ KH−t (C) ⊕ Vt and HomA (PSi , PSi−1 ) = Oδi . Furthermore, given i ∈ {0, . . . , t − 2}, the composition factors of the torsion part of H−i (C) correspond to the edges strictly between Si and Si+1 in the cyclic ordering of edges at Vi . If V = KH−t (C) is simple and distinct from Vt−1 , then there is an edge St between V and Vt and P ≃ PSt . Furthermore, the composition factors of the torsion part of H−t+1 (C) correspond to the edges strictly between St−1 and St in the cyclic ordering of edges at Vt . Proof. We can assume that C has no non-zero direct summand homotopic to zero. Since H<−t (kC) = 0, it follows that C <−t = 0. Let m be maximal such that C m 6= 0. Suppose that m > 0. By (i), Hm (C) is a non-zero torsion A-module. Let M be a 28 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER simple quotient of Hm (C). Assumption (ii) gives a contradiction. We deduce that m = 0. Let M be a simple quotient of C 0 such that V0 occurs in KPM . By (iii), we have ∼ M ≃ S0 . It follows that there is an isomorphism PS0 ⊕ Q − → C 0 such that the composite map KQ → KC 0 → KH0 (C) vanishes. Let N be the image of PS0 in H0 (C). Suppose that there is a simple quotient M of H0 (C) vanishing on N. Then M is a quotient of the torsion part of H0 (C) and the composite map Q → H0 (C) → M is non-zero. We deduce that this map induces a non-zero map from the torsion part of H0 (C) to M, which contradicts (ii). Given 1 ≤ i ≤ t − 1, fix δi : PSi → PSi−1 such that HomA (PSi , PSi−1 ) = Oδi . We put δ0 = 0 : PS0 → 0. We prove by induction on i ∈ {0, . . . , t − 1} that δi 0 → C −i → C −i+1 → · · · is isomorphic to the complex 0 → PSi − → PSi−1 → · · · → δ 1 P S1 − → PS0 → 0, where PS0 is in degree 0. This holds for i = 0 and we assume now this holds for some i ≤ t − 2. We have dim HomkA (kPSi+1 , kPSi ) = 1 and we denote by N be the image of a non-zero map PSi+1 → PSi . It is contained in k ker δi . Let M be a composition factor of (k ker δi )/N. If i = 0, then the edge corresponding to M contains V0 and M6≃S0 or it contains V1 and is strictly between S0 and S1 in the cyclic ordering of edges at V1 . If i > 0, then the edge corresponding to M contains Vi and is strictly between Si−1 and Si in the cyclic ordering of edges at Vi or it contains Vi+1 and is strictly between Si and Si+1 in the cyclic ordering of edges at Vi+1 . By (iii), PM is not a direct summand of C −i−1 . It follows from ∼ (iv) that there is an isomorphism PSi+1 ⊕ Q − → C −i−1 such that the composition Q → C −i−1 → C −i vanishes. Let M be a simple quotient of Q. Then M occurs as a quotient of H −i−1(C), which is torsion by (i). So (ii) gives a contradiction. We deduce that C −i−1 ≃ PSi+1 and the differential kC −i−1 → kC −i is not zero. This shows that the induction statement holds for i + 1. We deduce that C is isomorphic to δt−1 δ 1 → P S0 → 0 0 → P → PSt−1 −−→ PSt−2 → · · · → PS1 − for some projective A-module P in degree −t. We have [KP ] = (−1)t [KC] + [KPSt−1 ]−[KPSt−2 ]+· · ·+(−1)t [PS0 ] = [KH−t (C)]+[Vt ], hence KP ≃ KH−t (C)⊕Vt . If V = KH−t (C) is simple, then KP ≃ V ⊕Vt , hence P ≃ PSt where St is the edge containing V and Vt . The last statement follows from the fact that the differential kP → kPSt−1 is non-zero.  e c (X(c), O) that have The following theorem deals with direct summands of RΓ exactly two non-zero cohomology groups over K. Extra assumptions on the block are needed here. e c (X(c), O) Theorem 4.21. Assume that ℓ ∤ |TcF |. Let C be a direct summand of bRΓ b ′ in Ho (OG -mod). Suppose that there are r ≥ r and t > 0 such that THE BRAUER TREES OF UNIPOTENT BLOCKS 29 (i) the torsion part in H∗ (C) is cuspidal, ′ ′ (ii) Hi (KC) = 0 for i6∈{r ′ , r ′ + t} and V0 = Hr +t (KC) and V ′ = Hr (KC) are simple KG-modules, and (iii) T has a subgraph with non-exceptional vertices and non-cuspidal edges Vt St−1 Vt−1 ❴ ❴ ❴ ❴ ❴ ❴ V2 S1 S1 V1 S0 V0 S0 V1 V0 is a connected component of such that Vt−1 ❴ ❴ ❴ ❴ ❴ ❴ V2 the subgraph of T obtained by removing the edge St−1 and all cuspidal edges. Then: • there is an edge St between Vt and V ′ and C is homotopy equivalent to C ′ = 0 −→ PSt −→ PSt−1 −→ · · · −→ PS0 −→ 0 with PSt in degree r ′ ; • the complex C ′ is, up to isomorphism, the unique complex such that the differential PSi → PSi−1 generates the O-module Hom(PSi , PSi−1 ) for 1 ≤ i ≤ t; ′ • the composition factors of the torsion part of Hr +t−i (C) correspond to the edges strictly between Si and Si+1 in the cyclic ordering of edges at Vi+1 (for 0 ≤ i ≤ t − 1). In particular, the edges between St−1 and St around Vt are also cuspidal. Proof. We apply Lemma 4.20 to C[r ′ + t]. Assumptions (i), (ii) and (iv) of the lemma follow from the assumptions of the theorem. By Corollary 3.13, we have HomDb (A) (C, M[i]) = 0 for i > r and M cuspidal. If M is simple non-cuspidal and not in {S0 , . . . , St−1 }, then M does not occur as a composition factor of Hi (kC) for i > r ′ . This shows that Assumption (iii) of the lemma holds. The theorem follows.  Assumption (iii) in Theorem 4.21 may look rather difficult to check if only part of the tree is known. However, it will be satisfied for most of the Brauer trees we will consider, thanks to the following proposition. Proposition 4.22. Let V be a simple unipotent KA-module. Assume that • ℓ ∤ |TcF |, • V is leaf of T , i.e. V remains irreducible after ℓ-reduction, • the Harish-Chandra branch of V has at least t edges, and • ℓ ∤ |LI | for all F -stable subsets I ( S. Then assumptions (i) and (iii) in Theorem 4.21 are satisfied. Proof. Assumption (i) is satisfied by Proposition 3.15, while assumption (iii) is satisfied by Corollary 4.13.  30 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Bringing Theorem 4.21, Corollary 4.22 and Propositions 4.15 and 3.11(iii) together, we have the following special case. Corollary 4.23. Let b be the block idempotent of the principal block of OG. Assume that ℓ ∤ |TcF |. Assume that • KHi (bRΓc (X(c), O)(qr ) ) = 0 for i 6∈ {r, r+2r} and V = KHr (bRΓc (X(c), O)(qr ) ) is simple, and • ℓ ∤ |LI | for all F -stable subsets I ( S. Let T ′ be the full subgraph of T with vertices at distance at most r + 1 of the trivial character. The real stem of T ′ is a line with leaves 1 and the non-unipotent vertex, and the edge Stℓ has vertices St and the non-unipotent vertex. Any non-real vertex of T ′ is connected to St by an edge. Furthermore, V is non-real and the edge connecting V and St comes between the one connecting St to a unipotent vertex and Stℓ in the cyclic ordering of edges at St. V Stℓ St k 1 V By Remark 3.9, the previous results have a counterpart for the compactification. Proposition 4.24. Assume that ℓ ∤ |TvF | for all v ≤ c. Then Lemma 3.14, Theorem 4.21, Proposition 4.22 and Corollary 4.23 hold with X(c) instead of X(c). Remark 4.25. We have |TcF | = (q + 1)(q 6 − q 3 + 1) = Φ2 (q)Φ18 (q) for G simple of type E7 (q), and |TcF | = q 8 + q 7 − q 5 − q 4 − q 3 + q + 1 = Φ30 (q) for G simple of type E8 (q). In particular, when ℓ is good and d ∈ / {2, h}, the condition ℓ ∤ |TcF | will always be satisfied for E7 (q) and E8 (q). Remark 4.26. We can easily read off the cohomology of a complex C as in Theorem 4.21 from the Brauer tree. As a consequence of Theorem 4.9, one can check that the cohomology of C is concentrated in degrees r and r + t (and irreducible in degree r + t), and is torsion-free. Other calculations in §5 give a strong evidence that the cohomology of a variety associated to a Coxeter element is always torsion-free. By [4] this holds for groups of type A. Such a statement does not hold for more 2ℓ(w)−1 general Deligne–Lusztig varieties: if Hc (X(w), K) = 0 and ℓ divides |TwF |, then 2ℓ(w)−1 Hc (X(w), k) = H1 (X(w), k)∗ is non-zero since the connected Galois covering Y(ẇ) ։ X(w) yields non-trivial connected abelian ℓ-coverings. Therefore by the THE BRAUER TREES OF UNIPOTENT BLOCKS 31 2ℓ(w)−1 universal coefficient theorem, Hc (X(w), O) is a torsion module. However, one can ask whether the property ℓ ∤ |TwF | forces the cohomology to be torsion-free (see also Proposition 3.8). 4.4. Summary of the algebraic methods. We summarize here some facts and arguments about Brauer trees that we shall use throughout §5. We consider a unipotent block with a cyclic defect group and non-trivial automizer. We also assume that the block is real (this is the case for all the unipotent blocks we will consider). (Parity) The distance between two unipotent vertices is even if and only if they degrees are congruent modulo ℓ. (Real stem) The collection of unipotent vertices V with λV = ±1, together with the non-unipotent vertex, form a subgraph of the Brauer tree in the shape of a line, called the real stem. Taking duals of characters corresponds to a reflection of the tree in the real stem. (Hecke) The union of the full subgraphs of T obtained by considering unipotent characters in a given Harish-Chandra series is a collection of lines, which is known. (Degree) The dimension of the simple module corresponding to an edge is the alternating sum of the degrees of the vertices in a minimal path from the edge to a leaf. This dimension is a positive integer, and this can be used to show that certain configurations are not possible. Broadly speaking, the effect of this condition is to force the degrees of the unipotent characters, as polynomials in q, to increase towards the non-unipotent node. (Steinberg) The vertices of the edge Stℓ are St and the non-unipotent vertex. If the proper standard Levi subgroups of G are ℓ′ -groups, then the full subgraph of T whose vertices are at distance at most r from 1 is a line whose leaves are 1 and St and the edge Stℓ is cuspidal. Our strategy is to first study the ‘mod-ℓ generalized eigenspaces’ of F on the complex of cohomology of a Coxeter Deligne–Lusztig variety (or its compactification), for those eigenvalues corresponding to unipotent cuspidal KG-modules. This gives information about the location of the corresponding vertex with respect to the real stem. A second step is required if there are cuspidal unipotent KG-modules in the block that do not occur in the cohomology of a Coxeter Deligne–Lusztig variety. In that case, we consider the eigenspaces in the complex of cohomology of a Deligne–Lusztig variety associated to a d-regular element, which is minimal for the property that this module occurs in the cohomology. 5. Determination of the trees We now determine the Brauer trees of the blocks from Table 4.2.4. The edges corresponding to cuspidal simple modules will be drawn as double lines. 32 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Throughout this section, A denotes a block of OG with cyclic defect and b is the corresponding block idempotent. 5.1. Groups of type E7 . For groups of type E7 , we need to consider the principal Φd -blocks for d = 9, 14 and the Φ10 -block corresponding to the d-cuspidal pair (2 A2 (q).(q 5 + 1), φ21 ). 5.1.1. d = 14. In that case, the proper Levi subgroups of G are ℓ′ -groups. Let us determine the Brauer tree of the principal Φ14 -block of E7 (q). Using (Hecke), (Degree) and (Steinberg) arguments, we obtain the real stem as shown in Figure 11 (see the Appendix). The difficult part is to locate the two complex conjugate e c (X(c), O)(−1) be the generalized ‘−1 cuspidal unipotent characters. Let C = bRΓ (mod ℓ)-eigenspace’ of F . By [54, Table 7.3], we have KC ≃ (E7 [i])[−7] ⊕ K[−14], where E7 [i] is defined as the unipotent cuspidal KG-module that appears with an eigenvalue of F congruent to −1 modulo ℓ in H7c (X(c), K). Corollary 4.23 shows that E7 [i] is connected to St and that it is the first edge coming after the edge S6 in the cyclic ordering of edges containing St. This completes the determination of the tree. Let us describe more explicitely the minimal representative of the complex C. Let k = S0 , S1 , . . . , S6 be the non-cuspidal modules forming the path from the characters 1 to St in the tree (see Figure 1). E7 [i] St φ27,37 S6 φ105,26 S5 φ189,17 S4 φ189,10 S3 φ105,5 S2 φ27,2 S1 1 S0 E7 [−i] Figure 1. Right-hand side of the Brauer tree of the principal Φ14 block of E7 (q) THE BRAUER TREES OF UNIPOTENT BLOCKS 33 e c (X(c), k)red is given as follows: The complex bRΓ (−1) E7 [i] S6 Stℓ E7 [i] S5 S4 k E [−i] S5 −→ S6 S4 −→ S5 S3 −→ · · · −→ S1 −→ 0. 0 −→ 7 −→ Stℓ S6 E7 [−i] S5 S4 k S6 E7 [i] Remark 5.1. This argument applies to many other trees, especially to those associated to the principal Φd -block when d is the largest degree of W distinct from the Coxeter number (in that case the assumptions on ℓ in Proposition 4.22 are satisfied). This shows for example that the Brauer tree of the principal Φ12 -block of 2 E6 (q) given in [48] is valid without any restriction on q. It is also worth mentioning that it gives not only the planar embedding but also the labelling of the vertices with respect to Lusztig’s classification of unipotent characters (in terms of eigenvalues of Frobenius). In the previous example Ext1kG (E7 [i], Stℓ ) 6= 0 whereas Ext1kG (E7 [−i], Stℓ ) = 0. 5.1.2. d = 9. Let θ ∈ O be the unique third root of unity with image q 3 in k. It follows from Lemma 3.3 that A is Harish-Chandra projective relatively to the principal block of E6 (q), hence A has no cuspidal simple modules. The real stem gives most of the Brauer tree of the principal ℓ-block (see Figure 9). It remains to locate the pairs of complex conjugate characters {E6 [θ]ε , E6 [θ2 ]ε } and {E6 [θ]1 , E6 [θ2 ]1 }. To this end we use the homological information contained in the cohomology of the Coxeter variety X(c). Let I be a proper subset of S. If LI is not a group of type E6 , then LI is an ℓ′ -group and the cohomology of X(cI ) is torsion-free by [29, Proposition 3.1]. This remains true when LI has type E6 . Lemma 5.2. If q has order 9 modulo ℓ, the cohomology of the Coxeter variety in a simple group of type E6 is torsion-free. Proof. Denote by X the Coxeter variety of E6 (q). By Proposition 3.15, the torsion of H∗c (X, O) is cuspidal. Let λ ∈ k × and let Cλ = RΓc (X, O)(λ) . Assume that λ 6∈ {1, q 6}. The cohomology of H∗ (KCλ ) is an irreducible module V corresponding to a block idempotent bλ of defect zero. If V is cuspidal, then it occurs in degree 6 in H∗ (KCλ ), hence H∗ (Cλ ) is torsionfree by Lemma 3.14. If V is not cuspidal, then H∗ (bλ Cλ ) has no torsion. On the other hand, H∗ ((1 − bλ )Cλ ) is torsion and cuspidal, hence 0 by Lemma 3.14. Assume now that λ = 1. We have H6 (KC1 ) = St ⊕E6 [θ2 ] and Hi (KC1 ) = 0 for i 6= 6, so H∗ (C1 ) is torsion-free by Lemma 3.14 (so, St + E6 [θ2 ] is a projective character of E6 (q), as was shown in [49]). Assume finally that λ = q 6 . We have H6 (KCλ ) = E6 [θ], H12 (KCλ ) = 1 and Hi (KCλ ) = 0 for i 6∈ {6, 12}. Corollary 4.23 shows that H∗ (Cλ ) is torsion-free.  34 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER From this lemma together with Proposition 3.15, we deduce that the torsion of H∗c (X(c), O) is cuspidal, hence the principal block part of H∗c (X(c), O) is torsion-free. In particular, the complexes Dλ = bRΓc (X(c), O)(λ) for λ ∈ {q 6 , q 7 } have no torsion in their cohomology. We have KDq6 ≃ E6 [θ]ε [−7] ⊕ φ7,1 [−13], KDq7 ≃ E6 [θ]1 [−8] ⊕ 1[−14]. Theorem 4.21 gives the planar-embedded Brauer tree as shown in Figure 9. 5.1.3. d = 10. For the Φ10 -block the situation is similar: there is a unique proper F -stable subset I of S such that LI is not an ℓ′ -group. This Levi subgroup LI has type D6 . Since the Coxeter number of D6 is 10, [29, Theorem] asserts that H∗c (XLI (cI ), O) is torsion-free. Let E7 [i] be the unipotent cuspidal KG-module that appears with eigenvalue congruent to q 6 modulo ℓ in H7c (X(c), K). Theorem 4.21 e c (X(c), k)(q6 ) gives the planar-embedded Brauer tree as shown applied to C = bRΓ in Figure 10. 5.2. Groups of type E8 . The blocks we need to consider are: • the three Φ9 -blocks associated to the d-cuspidal pairs (A2 .(q 6 + q 3 + 1), φ) for φ = φ3 , φ21 and φ13 ; • the Φ12 -block associated to the d-cuspidal pair (3 D4 (q).(q 4 + q 2 + 1), 3 D4 [1]); • the Φ18 -block associated to the d-cuspidal pair (2 A2 (q).(q 6 − q 3 + 1), φ21); • the principal Φd -blocks for d = 15, 20 and 24. In those cases, the proper Levi subgroups of G are ℓ′ -groups. 5.2.1. d = 9. There are three unipotent blocks with non-trivial cyclic defect. Let θ be the third root of unity in O× with image q 3 in k. The real stem is given by Figure 9, where we have given the correspondence with vertices of the E7 tree. For each of the three trees, there are two pairs of complex conjugate characters that need to be located, namely: (1) {E6 [θ]φ1,0 , E6 [θ2 ]φ1,0 } and {E6 [θ]φ′′1,3 , E6 [θ2 ]φ′′1,3 } for the block b1 associated to the d-cuspidal pair (A2 , φ3 ); (2) {E6 [θ]φ2,1 , E6 [θ2 ]φ2,1 } and {E6 [θ]φ2,2 , E6 [θ2 ]φ2,2 } for the block b2 associated to the d-cuspidal pair (A2 , φ21 ); (3) {E6 [θ]φ1,6 , E6 [θ2 ]φ1,6 } and {E6 [θ]φ′1,3 , E6 [θ2 ]φ′1,3 } for the block b3 associated to the d-cuspidal pair (A2 , φ13 ). To this end we again use the cohomology of the Coxeter variety X(c), which we first show to be torsion-free on each block bi . Lemma 3.3 shows that all three unipotent blocks are Harish-Chandra projective relative to the principal block of E6 (q). By Lemma 5.2, the cohomology of the Coxeter variety of E6 is torsion-free. Therefore by Proposition 3.15 the cohomology of X(c), cut by the sum of the bi , is torsion-free. THE BRAUER TREES OF UNIPOTENT BLOCKS 35 We can now use the same argument as for the principal Φ9 -block of E7 : Theorem 4.21 shows that the part of the tree to the right of the non-unipotent node in Figure 9 is correct. We consider the standard Levi subgroup LI of semisimple type E7 and we use the Harish-Chandra induction of the isomorphism E6 [θ]1 ≃ Ω7 O in OLI -mod. It gives E6 [θ]1 ⊕ E6 [θ]φ2,1 ⊕ E6 [θ]φ2,2 ⊕ E6 [θ]φ′1,3 ≃ Ω7 (O ⊕ φ8,1 ⊕ φ35,2 ⊕ φ112,3 ) in OG-stab. By cutting by each bi and using the information above (on the part of the tree to the right of the non-unipotent node) we get E6 [θ]φ2,2 ≃ Ω7 φ35,2 and E6 [θ]φ′1,3 ≃ Ω7 φ112,3 . The same procedure starting with the isomorphism E6 [θ]ε ≃ Ω7 φ7,1 yields E6 [θ]φ′′1,3 ≃ Ω7 φ160,7 . This completes the determination of the three planar-embedded trees. 5.2.2. d = 12. Let θ ∈ O× be the third root of unity with image q 4 in k. The real stem is as given in Figure 12, therefore knowing the tree amounts to locating the cuspidal character E8 [−θ2 ]. e c (X(c), O)(q6 ) . The non-cuspidal simple A-modules are in the prinLet C = bRΓ cipal series, hence they cannot occur in the torsion of H∗c (X(c), O). It follows that Assumption (i) of Theorem 4.21 is satisfied. Assumption (iii) follows from the knowledge of the real stem of the tree. Finally, Assumption (ii) follows from the decomposition bH∗c (X(c), K)(q6 ) ≃ E8 [−θ2 ][−8] ⊕ φ28,8 [−14]. Theorem 4.21 shows that Figure 12 gives the correct planar-embedded Brauer tree. 5.2.3. d = 18. Let θ ∈ O× be the third root of unity congruent to q 6 modulo ℓ. The real stem is as in Figure 14. • Step 1: position of E8 [−θ2 ]. The only proper standard F -stable Levi subgroup LI with ℓ | |LI | has type E7 . It follows from Proposition 4.16 that bRLGI (M) is projective for any M ∈ OLI -mod. Since 18 is the Coxeter number of E7 , [29, §4.3] shows that the cohomology of the perfect complex bRΓc (X(cI ), O) is torsion-free. It follows from Proposition 3.15 that the torsion of bH∗c (X(c), O) is cuspidal. Since bKH∗c (X(c), O)(q7 ) = (E8 [−θ2 ])[−8] ⊕ φ8,1 [−15], Proposition 4.22 and Theorem 4.21 show that there is an edge between φ35,74 and E8 [−θ2 ], and that edge comes between the edges φ35,74 −−− φ300,44 and φ35,74 −−− φ8,91 in the cyclic ordering of edges around φ35,74 . • Step 2: E8 [θ] is connected to the non-unipotent node. From the Brauer tree of the principal Φ18 -block given in [19], we know that Ω12 k lifts to an OG-lattice of character E6 [θ]1 . Now, if E8 [θ] is not connected to the non-unipotent node, then Ω12 φ8,1 lifts to an OG-lattice of character D4,φ′′1,12 or φ8,91 depending on whether E8 [θ] is connected to the D4 -series or the principal series. 36 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Since the degree of φ8,1 ⊗ E6 [θ]1 is smaller than that of φ8,91 and of D4,φ′′1,12 , we obtain a contradiction. This proves that E8 [θ] and E8 [θ2 ] are connected to the nonunipotent node, and we obtain the planar-embedded Brauer tree up to swapping these two characters (see Figure 14). • Step 3: description of bRΓc (X(c), O)(q) . e c (X(c), O)red . Its cohomology over K is given by Let C = bRΓ (q) ⊕14 ⊕10 ⊕4 KC ≃ (φ⊕7 8,1 ⊕ φ35,2 ⊕ φ300,8 ⊕ φ840,13 )[−2] ⊕ (E8 [−θ])[−8]. Corollary 3.13 (or rather its analogue for compactifications, which holds since ℓ ∤ TvF for all v ≤ c, see also Remark 3.6) shows that the terms of C are projective and do not involve the projective cover of a cuspidal module, except possibly in degree 8. The character of KC shows that only the projective cover of E8 [−θ] can occur, and it occurs once in degree 8. In addition, the torsion of the cohomology of C must be cuspidal by Proposition 3.8 (there are no modules lying in an E7 -series in b). Let i < 2 be minimal such that Hi (kC) 6= 0. Then Hi (kC) is cuspidal and (kC)i contains an injective hull of Hi (kC), a contradiction. So, Hi (kC) = 0 for i < 2. Let P0 , . . . , P7 be the projective indecomposable modules lying in the principal series of A, with [P0 ] = φ8,1 + φ35,2 and Hom(Pi , Pi+1 ) 6= 0 for 0 ≤ i < 7, so that [P7 ] = φ35,74 + φ8,91 . It follows from Lemma 4.20 that (5.1) C ≃ 0 → P → P2 → · · · → P6 → PE8 [−θ] → 0 where P ≃ P0⊕7 ⊕ P1⊕7 ⊕ P2⊕4 is in degree 2. • Step 4: the torsion part of bRΓc (X(w), O)(q) is cuspidal. Let w ∈ W be the unique (up to conjugation) element of minimal length for which E8 [θ] occurs in H∗c (X(w)). Here ℓ(w) = 14. Let us consider R = bRΓc (X(w), O)(q) . Using the trace formula (see [25, Corollaire 3.3.8]), we find that ⊕6 ⊕3 2 KR ≃ (φ⊕4 8,1 ⊕ φ35,2 ⊕ φ300,8 ⊕ φ840,13 )[−2] ⊕ (E8 [θ ])[−14]. By Proposition 3.8, the torsion-part of the cohomology in R is either cuspidal or in an E7 -series. Since there are no modules in E7 -series in A, we deduce that the torsion part is cuspidal. In particular, if j = 4, 5, 6 then Hom•kG (Pj , kR) ≃ 0, and if j = 0, . . . , 3 the cohomology of Hom•kG (Pj , kR) vanishes outside degree 2. Note that Hom•kG (Pj , kR) ≃ Pj ⊗kG kR where Pj is viewed as a right kG-module via the anti-automorphism g 7→ g −1 of G, since Pj is self-dual. • Step 5: E8 [−θ2 ] is not a composition factor of H∗ (kR). Let C ′ be the cone of the canonical map PE8 [−θ] [−8] → kC. By (5.1) it is homotopic to a complex involving only projective modules in the principal series. Tensoring by kR gives a distinguished triangle PE8 [−θ] [−8] ⊗kG kR → kC ⊗kG kR → C ′ ⊗kG kR . THE BRAUER TREES OF UNIPOTENT BLOCKS 37 From the explicit representative of C ′ and step 4 above we know that the cohomology of C ′ ⊗kG kR vanishes outside the degrees 4, 5 and 6. Proposition 3.7 shows that the cohomology of kC ⊗kG kR vanishes outside degree 4. The previous distinguished triangle shows that the cohomology of PE8 [−θ] ⊗kG kR vanishes outside the degrees −4, . . . , −1. Since Hi (kR) = 0 for i < 0 this proves that E8 [−θ2 ] is not a composition factor of H∗ (kR). • Step 6: E8 [−θ] is not a composition factor of Hi (kR) for i 6= 6, 7, 8. The same method as in Step 5 with D = bRΓc (X(c), O)(q7 ) ≃ C ∗ [−16] and D ′ = Cone(kD → PE8 [−θ2 ] [−8]) yields a distinguished triangle kD ⊗kG kR → PE8 [−θ2 ] [−8] ⊗kG kR → D ′ ⊗kG kR . Here kD ⊗kG R has non-zero cohomology only in degree 16 by Proposition 3.7. As for D ′ ⊗kG kR, its cohomology vanishes outside the degrees 14, 15 and 16, and we deduce from the distinguished triangle that E8 [−θ] is not a composition factor of Hi (kR) for i 6= 6, 7, 8. If v < w and ℓ | |TvF |, then v is conjugate to cI , the Coxeter element of type E7 . Since bRΓc (X(cI ), O) is perfect, it follows from Lemma 3.10 that bRΓc (X(v), O) is perfect for all v < w. • Step 7: given v < w, the complex bRΓc (X(v), k) is quasi-isomorphic to a bounded complex of projective modules whose indecomposable summands correspond to edges that do not contain the non-unipotent vertex. Consider v < w. If v is not conjugate to a Coxeter element cI of E7 , then ℓ ∤ |TvF | and bRΓc (X(v), k) is perfect and quasi-isomorphic to a bounded complex of projective modules whose indecomposable summands correspond to edges that do not contain the non-unipotent vertex by Lemma 4.17. If v = cI , the perfectness has been shown in Step 1 and the second part holds, because the edges that contain the non-unipotent vertex are cuspidal. We deduce that the statement of Step 7 holds for all v < w by Lemma 3.10. • Step 8: H>14 (R) = 0. Steps 4, 5 and 6 show that the composition factors of Hi (kR) for i > 14 are cuspidal modules M corresponding to an edge containing the non-unipotent vertex. Let M be a simple module corresponding to an edge containing the non-unipotent vertex. Step 7 shows that the canonical map RΓ(X(w), k) → RΓ(X(w), k) induces an isomorphism RHom•kG (RΓ(X(w), k), M) ≃ RHom•kG (RΓ(X(w), k), M). Let M0 = Hi0 (kR) be the non-zero cohomology group of kR of largest degree. We have HomDb (kG) (RΓ(X(w), k), M0 [−i0 ]) 6= 0. Since RΓ(X(w), k) has a representative with terms in degrees 0, . . . , ℓ(w) = 14, we deduce from the previous isomorphism that i0 ≤ 14. 38 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER • Step 9: E8 [θ] and E8 [θ2 ] do not occur as composition factors of the torsion part of H∗ (R) and E8 [θ2 ] is a direct summand of H14 (kR). Step 7 shows that E8 [θ] and E8 [θ2 ] are not composition factors of H∗c (X(v), k) for v < w. It follows that if M is any of the simple modules E8 [θ] or E8 [θ2 ], then the canonical map H∗c (X(w), k) → H∗c (X(w), k) induces an isomorphism (5.2)   ∼ HomkG PM , Hic (X(w), k) → HomkG PM , Hic (X(w), k) . Since Hic (X(w), k) = 0 for i < 14, we deduce that E8 [θ] and E8 [θ2 ] do not occur as composition factors of Hic (X(w), k) for i < 14. By Poincarà c duality and the isomorphism (5.2), it follows that E8 [θ] and E8 [θ2 ] cannot occur as composition factors of Hic (X(w), k) for i > 14. On the other hand, E8 [θ] does not occur in [KRΓc (X(w), O)(q) ] (nor does χexc ), hence E8 [θ] does not occur as a composition 14 2 factor of H14 c (X(w), k)(q) or Hc (X(w), k)(q) . Similarly, E8 [θ ] occurs with multiplic14 ity 1 as a composition factor of H14 c (X(w), k)(q) and of Hc (X(w), k)(q) . Proposition 3.5 shows that E8 [θ2 ] is actually a submodule of H14 c (X(w), k)(q) and hence of 14 14 Hc (X(w), k)(q) by (5.2). Since KHc (X(w), O)(q) = E8 [θ2 ], it follows that E8 [θ2 ] is a quotient of H14 c (X(w), k)(q) , hence it is a direct summand. • Step 10: (E8 [θ2 ])[−14] is a direct summand of kR in D b (kG). Let Z be the cone of the canonical map RΓc (X(w), k)(q) → RΓc (X(w), k)(q) . Step 7 shows that Z can be chosen (up to isomorphism in D b (kG)) to be a bounded complex of projective modules that do not involve edges containing the non-unipotent vertex. The complex kR is quasi-isomorphic to the cone D ′ of a map Z[−1] → bRΓc (X(w), k)(q) , hence to the truncation τ ≤14 (D ′ ), a complex N with N i = 0 for i < 0 and i > 14 and with N i a direct sum of projective modules corresponding to edges that do not contain the non-unipotent vertex for i ≤ 13. Note that E8 [θ] and E8 [θ2 ] are not composition factors of N 13 , hence E8 [θ] is not a composition factor of N 14 while E8 [θ2 ] is a composition factor of N 14 with multiplicity 1 (see Step 9 above). Consider a non-zero morphism PE8 [θ2 ] → N 14 and let U be its image. Since E8 [θ2 ] is a direct summand of H14 (N), it follows that the image of U in H14 (N) is E8 [θ2 ]. On the other hand, the simple modules corresponding to edges containing the non-unipotent vertex but not E8 [θ] nor E8 [θ2 ] are not quotients of N 13 , hence U ≃ E8 [θ2 ] embeds in H14 (N). It follows that U[−14] is a direct summand of N. • Step 11: RΓc (X(w), O)(q−2 ) ≃ V [−14], where V is an OG-lattice such that the simple factors of KV are in the D4 -series. Let R′ = RΓc (X(w), O)(q−2) . We have KHi (R′ ) = 0 for i 6= 14 and the simple factors of KH14 (R′ ) are in the D4 -series. As in Step 4, one shows that the torsion of RΓc (X(w), O)(q−2 ) is cuspidal. We show as in Steps 5 and 6 that E8 [−θ] and E8 [−θ2 ] are not composition factors of H∗ (kR′ ). Furthermore, H>14 (R′ ) = 0 as in Step 8. Proceeding as in Step 8, one sees that the canonical map RΓc (X(w), k) → THE BRAUER TREES OF UNIPOTENT BLOCKS 39 RΓc (X(w), k) induces an isomorphism RHom•kG (M, RΓc (X(w), k)) ≃ RHom•kG (M, RΓc (X(w), k)). Let i0 be minimal such that Hi0 (kR′ ) 6= 0, and suppose that i0 < 14. Then Hi0 (kR′ ) is cuspidal and HomDb (kG) (Hi0 (kR′ ), RΓc (X(w), k)[i0 ]) ≃ RHomDb (kG) (Hi0 (kR′ ), RΓc (X(w), k)[i0 ]) 6= 0. This contradicts the fact that RΓc (X(w), k) has no cohomology in degrees less than 14. Thus, Hi (kR′ ) = 0 for i 6= 14. • Step 12: conclusion. Lemma 3.4 shows that RΓc (X(w), k)(q−2 ) ≃ RΓc (X(w), k)(q) [6] in kG -stab. By Step 11, we deduce that kV has a direct summand isomorphic to Ω−6 (E8 [θ2 ]) in kG -stab. If the Brauer tree is not the one given in Figure 14 (i.e., E8 [θ] and E8 [θ2 ] need to be swapped), then Ω−6 (E8 [θ2 ]) is the reduction of a lattice in φ300,44 , which cannot be a direct summand of kV . We deduce that the planar-embedded tree is as shown in Figure 14. Remark 5.3. We use the determination of the tree to obtain a character-theoretic statement that will be needed in the study of the case d = 15. The Brauer tree of the principal Φ18 -block of G is given in [30, Remark 3.11]. In particular, E6 [θ2 ]1 ≃ Ω24 k. Since Ω24 φ8,1 ≃ E8 [θ2 ], we deduce that φ8,1 ⊗ E6 [θ2 ]1 is isomorphic to E8 [θ2 ] plus a projective OG-module P . If E8 [θ] occurs in the character of P , then the non-unipotent vertex occurs as well. As the degree of the non-unipotent vertex is larger than the degree of φ8,1 ⊗ E6 [θ2 ]1 , we obtain a contradiction. So, the character of E8 [θ] is not a constituent of φ8,1 ⊗ E6 [θ2 ]1 . 5.2.4. d = 15. Choose the roots of unity θ of order 3 and ζ of order 5 so that θ = q 5 and ζ = q 3 in k. The real stem is known and comprises the principal series characters in the principal ℓ-block. A (Hecke) argument also gives the two subtrees consisting of characters in the E6 [θ]-series and the E6 [θ2 ]-series as shown in Figure 13. Except for the two characters E8 [θ] and E8 [θ2 ], each Harish-Chandra series lying in the principal Φ15 -block has a character which appears in the cohomology of the Coxeter variety. The generalized (λ)-eigenspaces on the cohomology of the Coxeter variety are given by bH∗c (X(c), K)(q8 ) ≃ E6 [θ]ε [−8] ⊕ K[−16], bH∗c (X(c), K)(q10 ) ≃ (E8 [ζ 2 ])[−8] ⊕ E6 [θ]1 [−10], bH∗c (X(c), K)(q7 ) ≃ (E8 [ζ])[−8] ⊕ φ8,1 [−15]. Corollary 4.23 applied to λ = q 8 shows that there is an edge between St and E6 [θ]ε , and this edge comes between the one containing φ84,64 and Stℓ in the cyclic ordering of edges around St. Only cuspidal characters remain to be located, and since they have a larger degree than E6 [θ]1 , we deduce that E6 [θ]1 remains irreducible modulo ℓ. 40 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER From Proposition 4.22 and Theorem 4.21 applied to C = bRΓc (X(c), O)(q10 ) , we deduce that there is an edge between E8 [ζ 2 ] and E6 [θ]ε . Similarly, using C = bRΓc (X(c), O)(q7 ) , we deduce that there is an edge between φ112,63 and E8 [ζ], and this edge comes between the one containing φ1400,37 and the one containing φ8,91 in the cyclic ordering of edges around φ112,63 . Consequently, the trees in Figures 2 and 3 are subtrees of the Brauer tree T (although as of yet we cannot fix the planar embedding around E6 [θ]ε ). We claim that E8 [θ] and E8 [θ2 ] are not connected to the subtree shown in Figure 2. Let us assume otherwise. By a (Parity) argument, they are not connected to the non-unipotent node. Let w ∈ W be an element of minimal length such that E8 [θ2 ] appears in the cohomology of X(w) (we have ℓ(w) = 14). We have [bH∗c (X(w), K)q2 ] = [E8 [θ2 ]] + [φ8,91 ] = ([φ8,91 ] + [χexc ]) − ([St] + [χexc ]) + η, where η = [KP ] and P is a projective bOG-module whose character does not involve χexc . Therefore there is an odd integer i such that HomDb (kG) (RΓc (X(w), k), Stℓ [i]) 6= 6 0 for some 0. Since i 6= 14, it follows from Proposition 3.5 that h[H∗c (X(v), k)], Stℓ i = v < w. One easily checks on the character of H∗c (X(v), K) that this is impossible. As a consequence, E8 [θ] and E8 [θ2 ] are connected to the subtree shown in Figure 3. We next return to the planar embedding of the edges around the node E6 [θ]ε . If the embedding is not as in Figure 2 then Ω−13 k would lift to an OG-lattice of character E6 [θ2 ]1 , and as Ω30 k lifts to φ8,1 , we get that Ω30 k ⊗ Ω−13 k lifts to an OG-lattice with character the sum of the non-unipotent character plus a projective OG-module. The sum of the degrees of the non-unipotent characters is (q 6 − 1)(q 8 − 1)(q 10 − 1)(q 12 − 1)(q 14 − 1)(q 18 − 1)(q 20 − 1)(q 24 − 1)Φ30 . Since this is larger than the degree of E6 [θ2 ]1 ⊗ φ8,1 , we deduce that Ω−13 k does not lift to E6 [θ2 ]1 , and we obtain the planar-embedded Brauer tree as in Figure 2. E6 [θ]1 E8 [ζ 2 ] E6 [θ]φ2,2 E6 [θ]ε St E8 [ζ 3 ] φ84,64 E6 [θ2 ]ε E6 [θ2 ]φ2,2 φ1344,38 φ4096,26 φ5670,18 φ4096,12 φ1344,8 E6 [θ2 ]1 Figure 2. Subtree of the principal Φ15 -block of E8 (q) φ84,4 1 THE BRAUER TREES OF UNIPOTENT BLOCKS 41 E8 [ζ 4 ] φ8,1 φ112,3 φ1400,7 φ4096,11 φ5600,19 φ4096,27 φ1400,37 φ112,63 φ8,91 E8 [ζ] Figure 3. Subtree of the principal Φ15 -block of E8 (q) It remains to locate E8 [θ] and E8 [θ2 ]. If they were not connected to φ8,91 , then Ω k would lift to an OG-lattice of character φ112,63 , although Ω30 k ⊗ Ω−11 k lifts to a lattice of character φ8,1 ⊗ E6 [θ2 ]1 plus a projective module. Since that tensor product has a degree smaller than φ112,63 , we obtain a contradiction. Consequently, we obtain the planar-embedded Brauer tree given in Figure 13, up to swapping E8 [θ] and E8 [θ2 ]. Assume the planar embedded tree shown in Figure 13 is not correct. Then Ω19 k lifts to a lattice of character E8 [θ]. Since Ω30 k ⊗ Ω−11 k lifts to a lattice of character φ8,1 ⊗ E6 [θ2 ]1 , we deduce that E8 [θ] occurs as a constituent of that tensor product, contradicting Remark 5.3. Consequently, the tree in Figure 13 is correct. 19 5.2.5. d = 20. The real stem of the tree is easily determined (see Figure 15). Let i and ζ in O× be the fourth and fifth roots of unity congruent to q 5 and q 4 modulo ℓ respectively. The difficult part is to locate the six cuspidal characters in the block. We have bH∗c (X(c), K)(q8 ) ≃ (E8 [ζ])[−8] ⊕ K[−16], bH∗c (X(c), K)(q16 ) ≃ (E8 [ζ 3 ])[−8] ⊕ D4,1 [−12]. Proposition 4.24 and Corollary 4.23 show that there is an edge connecting E8 [ζ] to St and that this edge comes between the edge containing φ112,63 and the one containing Stℓ in the cyclic ordering of edges containing St. Also, there is no cuspidal edge connected to a principal series character other than St and we have (5.3) bRΓc (X(c), k)(q8 ) ≃ 0 → PE8 [ζ] → P7 → · · · → P0 → 0, where P0 is in degree 16 and P0 , . . . , P7 are projective indecomposable modules labelling the principal series edges from 1 to St. Proposition 4.24 and Theorem 4.21 show that there is an edge connecting E8 [ζ 3] and D4,ε . We now want to locate the characters E8 [i] and E8 [−i]. A (Parity) argument shows that they are not connected to the non-unipotent vertex. The smallest Deligne– Lusztig variety in which they appear is associated to a 24-regular element w of 42 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER length 10. Note that ℓ ∤ |TvF | for all v ≤ w. In particular, the character η = [bH∗c (X(w), K)(1) ] = [St] + [E8 [−i]] is virtually projective. It follows from Lemma 4.17 that χexc +D4,ε does not occur in the decomposition of η in the basis of projective indecomposable. As a consequence, E8 [−i] is not connected by an edge to the D4 series, hence E8 [i] and E8 [−i] are connected to the Steinberg character. We are therefore left with determining the planar embedding around D4,ε and St. Assume that we are in the case shown in Figure 4. Let S0 , . . . , S4 be the E8 [ζ 3 ] D4,φ9,10 D4,ε E8 [ζ 2 ] Figure 4. Wrong planar embedding for the principal Φ20 -block of E8 (q) simple modules labelling the edges from D4,1 to the non-unipotent node so that e c (X(c), k)(q16 ) is given by [PS4 ] = χexc + D4,ε . A minimal representative of bRΓ E8 [ζ 3 ] S3 S3 S2 S1 S0 E8 [ζ 2 ] 2 D = 0 −→ E8 [ζ ] −→ S4 S2 −→ S3 S1 −→ S2 S0 −→ S1 S2 S1 S4 S0 E8 [ζ 3 ] 3 E8 [ζ ] S3 −→ 0, where the cohomology groups (represented by the boxes) are non-zero in degrees 8, 9 and 12 only. A non-zero map PE8 [ζ 2] → PE8 [ζ 3 ] gives a non-zero element of HomDb (kG) (D ∗ [−16], D). Consequently, H16 (D ⊗kG D) 6= 0. We have bRΓc (X(c), K)(q16 ) ⊗KG bRΓc (X(c), K)(q16 ) ≃ K[−24], and Proposition 3.7 shows that the cohomology of bRΓc (X(c), O)(q16 ) ⊗OG bRΓc (X(c), O)(q16 ) is torsion-free, hence Hi (bRΓc (X(c), k)(q16 ) ⊗kG bRΓc (X(c), k)(q16 ) ) = 0 for i 6= 24: this gives a contradiction. We now turn to the four possibilities for the planar embedding around the node labelled by the Steinberg character. We need to rule out the three of them shown in Figure 5. Recall that w denotes a 24-regular element. As in the case of X(c), Proposition 3.8 ensures that the torsion part in the cohomology of bRΓc (X(w), O) THE BRAUER TREES OF UNIPOTENT BLOCKS E8 [−i] E8 [ζ] E8 [ζ] St E8 [i] E8 [i] E8 [ζ] St E8 [ζ 4 ] E8 [ζ 4 ] 43 E8 [−i] St E8 [−i] E8 [ζ 4 ] E8 [i] Figure 5. Wrong planar embeddings for the principal Φ20 -block of E8 (q) e c (X(w), O)(q10 ) is cuspidal. Let C = bRΓ than 0 and greater than 20. We have red , a complex with 0 terms in degrees less KC ≃ E8 [i][−10] ⊕ K[−20]. We will describe completely the complex C, and rule out the wrong planar embeddings. We will proceed in a number of steps. • Step 1: the only non-cuspidal simple module that can appear as a composition factor of H∗ (kC) is K, and it can only appear in H20 (kC). The simple modules Stℓ , E8 [ζ 2] and E8 [ζ 3 ] do not occur as composition factors of H∗ (kC). The first statement follows from the discussion above. As a consequence, we have PSi ⊗kG kC ≃ 0 for i = 0, . . . , 3 and therefore PE8 [ζ 3 ] [−8] ⊗kG kC ≃ bRΓc (X(c), k)(q16 ) ⊗kG kC. The latter is a direct summand of RΓc (X(c) ×G X(w)), which by Proposition 3.7 has no torsion in its cohomology. We deduce that PE8 [ζ 3 ] ⊗kG kC is quasi-isomorphic to zero, which means that E8 [ζ 2 ] does not occur as a composition factor in H∗ (kC). The same result can be shown to hold for E8 [ζ 3], by replacing bRΓc (X(c), k)(q16 ) by (bRΓc (X(c), k)(q16 ) )∗ [−16] ≃ bRΓc (X(c), k)(q4 ) . The statement about Stℓ follows from Proposition 3.11. • Step 2: E8 [ζ 4 ] does not occur as a composition factor of H∗ (kC) and E8 [ζ] does not occur as a composition factor of Hi (kC) for i6∈{12, 13}. We have bRΓc (X(c), k)(1) ⊗kG kC ≃ k[−20] and RΓc (X(c), k)(q8 ) ⊗kG kC ≃ k[−36]. Moreover, Pi ⊗kG kC ≃ 0 for i = 1, . . . , 7 but P0 ⊗kG kC ≃ k[−20], so we obtain from (5.3) a distinguished triangle PE8 [ζ] [−9] ⊗kG kC → k[−36] → k[−36] ∗ Using RΓc (X(c), k)(q12 ) ≃ RΓc (X(c), k)(q8 ) [−16] instead of RΓc (X(c), k)(q8 ) , we obtain a distinguished triangle k[−20] → k[−20] → PE8 [ζ 4] [−7] ⊗kG kC 44 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER The variety X(w) has dimension 10, and therefore its cohomology vanishes outside the degrees 0, . . . , 20. Therefore PE8 [ζ] ⊗kG kC ≃ 0. We also deduce that PE8 [ζ 4] ⊗kG kC is quasi-isomorphic to either 0 or k[−12] ⊕ k[−13]. • Step 3: PS4 , PStℓ and PE8 [−i] and do not occur in C, while PE8 [i] occurs with multiplicity 1 in C (and this is in C 10 ). The statements about PE8 [±i] are clear using Proposition 3.5, while the other two statements follow from Lemma 4.17. We have now enough information to determine C and rule out the planar embeddings given in Figure 5. • Step 4: C i = 0 for i < 10. Let i be the smallest degree for which Hi (C) has non-zero torsion. Assume that i ≤ 10. The cohomology Hi−1 (kC) is cuspidal with socle in {S4 , E8 [i], E8 [−i]}. On the other hand, kC <(i−1) = 0 and the injective hulls of S4 and E8 [±i] do not occur as direct summands of kC i−1 , a contradiction. It follows that Hi (C) = 0 for i < 10 and H10 (C) is torsion-free. So, Hi (kC) = 0 for i < 10, hence (kC)i = 0 for i < 10. • Step 5: We have Hi (C) = 0 for 14 ≤ i ≤ 19 and H20 (C) = O. Lemma 4.20 applied to the stupid truncation C 13 → C 14 → · · · → C 20 (viewed in degrees −7, . . . , 0) shows that C ≃ 0 → C 10 → C 11 → C 12 → C 13 → P6 → P5 → · · · → P1 → P0 → 0, Hi (C) = 0 for 14 ≤ i ≤ 19 and H20 (C) = O. • Step 6: H10 (kC) = E8 [i] and H11 (C) = 0. By the universal coefficient theorem H10 (kC) is an extension of L = Tork1 (H11 (C), k) by kH10 (C) = E8 [i]. Since Ext1 (M, E8 [i]) = 0 for all kG-modules M with composition factors in {S4 , E8 [i], E8 [−i]}, it follows that the kG-module L is a direct summand of H10 (kC), hence C 10 has an injective hull of L as a direct summand of kC 10 . This shows that C 10 = PE8 [i] and L = 0. • Step 7: Ext1 (Stℓ , E8 [i]) = 0. The differential C 10 → C 11 induces an injective map Ω−1 E8 [i] ֒→ C 11 . Since PStℓ is not a direct summand of C 11 , it follows that Stℓ does not occur in the socle of C 11 , hence not in the socle of Ω−1 E8 [i]. This rules out the first possibility of the planar embedding around St in Figure 5. • Step 8: H12 (C) = 0. Let L = Tork1 (H12 (C), k). The kG-module Ω−2 E8 [i] has no composition factors isomorphic to S4 , E8 [i] or E8 [−i], hence Hom(L, Ω−2 E8 [i]). It follows that Ext1 (L, Ω−1 E8 [i]) = 0, hence an injective hull of L is a direct summand of kC 11 , which forces L = 0, hence H12 (C) = 0. • Step 9: C 13 ≃ P7 . We have C 13 ≃ P7 ⊕ R for some projective kG-module R, whose head is in 13 H (kC). It follows from Steps 1-3 that R ≃ PE⊕n for some n ≥ 0. Assume that 8 [ζ] THE BRAUER TREES OF UNIPOTENT BLOCKS 45 n > 0. Since Stℓ does not occur as a composition factor of H13 (kC), it follows that E8 [εi] must occur immediately after E8 [ζ] in the cyclic ordering around St for some ε ∈ {+, −} and PE8 [εi] occurs as a direct summand of C 12 : this is a contradiction. We deduce that C 13 ≃ P7 . • Step 10: conclusion. Assume that the configuration around St is the second one in Figure 5. Then −3 Ω E8 [i] is an extension of S6 by S5 . Since S5 does not occur as a composition factor of H12 (kC), it follows that P5 is a direct summand of C 13 , a contradiction. Assume now the configuration is the third one in Figure 5. The socle of Ω−3 E8 [i] is Stℓ . Since Stℓ does not occur as a composition factor of H12 (kC) and a projective cover does not occur as a direct summand of C 13 , we obtain a contradiction. This concludes the determination of the Brauer tree. Note that now Ω−2 E8 [i] = E8 [ζ], C 12 ≃ PE8 [ζ] and H12 (kC) = 0. In particular, H∗ (C) is torsion-free and C is 0 → PE8 [i] → PE8 [ζ] → PE8 [ζ] → P7 → P6 → · · · → P0 → 0. 5.2.6. d = 24. Suppose that d = 24. Let θ and i be the third and fourth roots of unity in O× such that θ = q 8 and i = q 6 in k. Several Harish-Chandra series lie in the principal Φd -block, and a (Hecke) argument gives the corresponding subtrees, as well as the real stem, as shown in Figure 16. • Step 1: cuspidal modules E8 [−θ] and E8 [−θ2 ]. The two cuspidal characters E8 [−θ] and E8 [−θ2 ] appear in the cohomology of a Coxeter variety X(c). To locate them on the Brauer tree we shall look at the cohomology of a compactification X(c) and proceed as in the beginning of §5.2.5. We have bRΓc (X(c), K)(q8 ) ≃ (E8 [−θ2 ])[−8] ⊕ K[−16]. we deduce from Corollary 4.23 and Theorem 4.21 (see Proposition 4.24) that (5.4) bRΓc (X(c), O)(q8 ) ≃ 0 → PE8 [−θ2 ] → P7 → · · · → P0 → 0, where P1 , . . . , P7 is the unique path of projective covers of non-cuspidal simple modules corresponding to edges from k to St in the Brauer tree, and the tree in Figure 6 is a subtree of T . Furthermore, the only principal series vertex connected by an edge to a non-principal series vertex is St. • Step 2: E6 -series. We now locate the E6 -series characters. By a (Degree) argument, E6 [θ]φ′′1,3 and E6 [θ2 ]φ′′1,3 are not leaves in the tree, so, by a (Parity) argument, must be connected to one of the non-unipotent vertex, D4,φ′′8,9 or D4,φ′8,3 , and they are connected to the same node. Note that E6 [θ±1 ]φ′′1,3 is connected to exactly two characters: E6 [θ±1 ]φ2,2 and the real character above (by a (Parity) argument, it cannot be connected to E8 [±i]). For all q, the degree of  [D4,φ′′8,9 ] − [E6 [θ]φ′′1,3 ] − [E6 [θ]φ2,2 ] + [E6 [θ2 ]φ′′1,3 ] − [E6 [θ2 ]φ2,2 ] 46 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER E8 [−θ] St φ35,74 φ160,55 φ350,38 φ448,25 φ350,14 φ160,7 φ35,2 1 E8 [−θ2 ] Figure 6. Subtree of the principal Φ24 -block of E8 (q) is negative, hence it cannot be the class of a kG-module. As a consequence, E6 [θ±1 ]φ′′1,3 is not connected to D4,φ′′8,9 . The same statement holds for D4,φ′8,3 , hence E6 [θ±1 ]φ′′1,3 is connected to the non-unipotent node. Again, (Parity) and (Degree) arguments show that the characters E8 [±i] are connected to the non-unipotent node, or one of the nodes D4,φ′′8,9 , E6 [θ]φ2,2 or E6 [θ2 ]φ2,2 . Note that, from the subtree constructed so far and that E8 [±i] and E6 [θ±1 ]φ′1,3 have the same parity, they must both be leaves in the tree and so remain irreducible modulo ℓ. Let w ∈ W be a regular element of order 24 and length 10. We have bRΓc (X(w), K)(q11 ) ≃ E8 [i][−10], bRΓc (X(w), K)(q14 ) ≃ E6 [θ]φ′1,3 [−12]. • Step 3: E8 [−θ] and E8 [−θ2 ] do not occur in H∗c (X(w), k)(λ) . Let λ be either q 11 or q 14 . The torsion part in bRΓc (X(w), O)(λ) is cuspidal by Proposition 3.8. Since its character has no composition factor in the principal series we have RΓc (X(w), k)(λ) ⊗kG Pi = 0 for i ∈ {0, . . . , 7}. Using Proposition 3.7 for the variety X(w)×G X(c) together with (5.4) and the dual description of bRΓc (X(c), O)(1) , we deduce that RΓc (X(w), k)(λ) ⊗kG PE8 [−θ] = RΓc (X(w), k)(λ) ⊗kG PE8 [−θ2 ] = 0. This ensures that neither E8 [−θ] nor E8 [−θ2 ] can occur as composition factors of the cohomology of bRΓc (X(w), k)(λ) . • Step 4: bRΓc (X(w), k)(q11 ) and position of E8 [±i]. Let C = bRΓc (X(w), k)(q11 ) and let M = Hi (C) be the non-zero cohomology group with largest degree. Suppose that i > 10. The module M is cuspidal and its composition factors are cuspidal modules different from E8 [−θ] and E8 [−θ2 ]. Proposition 3.5 shows that RHom•kG (RΓc (X(v), k), M) = 0 for all v < w. By the construction of the smooth compactifications, we obtain an isomorphism ∼ RHom•kG (RΓ(X(w), k), M) → RHom•kG (RΓc (X(w), k), M). THE BRAUER TREES OF UNIPOTENT BLOCKS 47 Since RΓ(X(w), k) has a representative with terms in degrees 0, . . . , ℓ(w) = 10, we deduce that HomDb (kG) (RΓc (X(w), k), M[−i]) = 0, which is impossible since C is a direct summand of RΓc (X(w), k) and the map C −→ M[−i] = Hi (C)[−i] is nonzero. This shows that Hj (C) = 0 for j > 10. Using the same argument with the isomorphism ∼ RHom•kG (M, RΓc (X(w), k)) → RHom•kG (M, RΓc (X(w), k)) and the fact that RΓc (X(w), k) has a representative with terms in degrees 10 = ℓ(w), . . . , 2ℓ(w) = 20, we deduce that Hj (C) = 0 for j < 10. Therefore C ≃ H10 (C)[−10]. Now, Proposition 4.18 and Remark 4.19 show that E8 [i] ≃ Ω12 k. We deduce that E8 [±i] are connected to the non-unipotent node and this gives the whole tree as shown in Figure 16, up to swapping the E6 [θ] and the E6 [θ2 ]-series. • Step 5: bRΓc (X(w), k)(q14 ) and conclusion. The previous argument applied to the complex D = bRΓc (X(w), k)(q14 ) shows that the cohomology of D vanishes outside the degrees 10, 11 and 12, and that H12 (D) is a module with simple head isomorphic to E6 [θ]φ′1,3 . The radical of H12 (D) is cuspidal. Since E6 [θ]φ′1,3 has no non-trivial extensions with simple cuspidal modules, we deduce that H12 (D) = E6 [θ]φ′1,3 and H12 c (X(w), O)q 14 is torsion-free. Let us denote the simple modules in the E6 [θ]-series as in Figure 7. There exists E6 [θ]φ′′1,3 S3 E6 [θ]φ2,2 S2 E6 [θ]φ′1,3 S1 Figure 7. Subtree of the principal Φ24 -block of E8 (q) a representative of D of the form D = 0 → X → P ′ ⊕ PS2 → PS1 → 0, where P ′ is a projective module with no cuspidal simple quotient except possibly E8 [−θ] or E8 [−θ2 ] (by Proposition 3.5). Since H11 (D) is a cuspidal module with no composition factor isomorphic to E8 [−θ] or E8 [−θ2 ], we deduce that the representative of D can be chosen so that P ′ = 0. By the universal coefficient theorem, we have H10 (D) ≃ H11 (D). We have H11 (D) = 0 or H11 (D) = S3 . In both cases, we find that X is a module with composition factors S2 and S3 . Proposition 4.18 and Remark 4.19 show that X ≃ Ω18 k in kG -stab. We deduce that Ω18 k lifts to an OG-lattice of character E6 [θ]φ′′1,3 , which gives the planar embedding. 48 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER 5.3. Other exceptional groups. The Brauer trees of unipotent blocks for exceptional groups other than E7 (q) and E8 (q) were determined in [13, 63, 47, 38, 48, 49] (under an assumption on q for one of the blocks in 2 E6 (q)), but only up to choice of field of values in each block. This ambiguity can be removed using Lusztig’s parametrization of unipotent characters. We achieve this by choosing carefully the roots of unity in Qℓ associated with the cuspidal characters, as we did in the previous sections. 5.3.1. E6 (q), 2 E6 (q), F4 (q) and G2 (q). For each of the exceptional groups of type E6 (q), 2 E6 (q), F4 (q) and G2 (q) there are only two blocks with cyclic defect groups whose Brauer trees are not lines. One of the blocks corresponds to the principal Φh -block with h the Coxeter number, and this case was solved in [29]. For the other one, one proceeds exactly as in §5.1.1, where only a pair of conjugate cuspidal characters lies outside the real stem (these characters appear in the cohomology of a Coxeter variety). The planar-embedded Brauer trees can be found in [19]. 5.3.2. 2 B2 (q 2 ) and 2 G2 (q 2 ). For the Suzuki groups 2 B2 (q 2 ) and the Ree groups G2 (q 2 ), the Frobenius eigenvalue corresponding to each unipotent character is known by [12]. It is enough to locate a single non-real character to fix the planar embedding. One can take this character to be a non-real cuspidal character occurring in the cohomology of the Coxeter variety and proceed as before to get the trees given in [19]. Note that for these groups the Coxeter variety is 1-dimensional, therefore its cohomology is torsion-free and Ω2 k is isomophic in kG -stab to the generalized (q 2 )-eigenspace of F 2 in RΓc (X(c), k) (when d is not the Coxeter number). 2 5.3.3. 2 F4 (q 2 ). We now consider the Ree groups 2 F4 (q 2 ), whose Brauer trees have been determined in [47] using the parametrization given in [58], but not using Lusztig’s parametrization. Here, there are three trees that are not lines. One of them corresponds to the case solved in [29], and another one is similar to §5.1.1. The√only block √ which deserves a specific treatment is the principal ℓ-block with ℓ | (q 4 + 2q 3 + q 2 + 2q + 1) (so, q is a 24-th root of unity modulo ℓ). Let η, i and θ be the roots of unity in O congruent to q 15 , q 6 and q 16 modulo ℓ respectively. A (Hecke) argument gives the real stem of the Brauer tree as shown in Figure 8 as well as the two edges for the 2 B2 -series. We consider the two generalized ‘mod- ℓ-eigenspaces’ of F 2 on the cohomology of the Coxeter variety given by  RΓc (X(c), K)(q−2 ) = 2 B2 [η 3 ]ε ⊕ 2 F4 [−θ2 ] [−2], RΓc (X(c), K)(q4 ) = 2 B2 [η 5 ]ε [−2] ⊕ K[−4]. Lemma 3.14 and Proposition 3.15 show that 2 B2 [η 3 ]ε + 2 F4 [−θ2 ] is the character of a projective module P2 F4 [−θ2 ] , hence 2 B2 [η 3 ]ε and 2 F4 [−θ2 ] are connected by an edge. Furthermore, RΓc (X(c), O)(q−2 ) ≃ P2 F4 [−θ2 ] [−2]. THE BRAUER TREES OF UNIPOTENT BLOCKS 49 Corollary 4.23 show that there is no non-real vertex connected to 1 or φ2,3 , that there is an edge S[η 5 ] connecting St and 2 B2 [η 5 ]ε , and, in the cyclic ordering of edges containing St, the edge S[η 5 ] comes after the one containing φ2,3 and before Stℓ . Furthermore, RΓc (X(c), O)(q−2 ) ≃ 0 → PS[η5 ] → P1 → Pk → 0, where Pk is in degree 4 and P1 is projective with character φ2,3 + St. We can now deduce the corresponding complexes of cohomology for X(c). For λ ∈ {q −2 , q 4 } and I an F -stable proper subset of S, we have bRΓc (X(cI ), O)(λ) = 0 unless (Li , F ) has type 2 B2 , in which case the complex has cohomology concentrated in degree 1. In addition, using duality for the case λ ∈ {q 6 , 1}, we find bRΓc (X(c), O)(q−2 ) ≃ 0 → 0 → P2 B2 [η3 ]1 → P2 F4 [−θ2 ] → 0 → 0 → 0, bRΓc (X(c), O)(q6 ) ≃ 0 → 0 → 0 → P2 F4 [−θ] → P2 B2 [η5 ]1 → 0 → 0, bRΓc (X(c), O)(q4 ) ≃ 0 → 0 → P2 B2 [η5 ]1 → PS[η5 ] → P1 → Pk → 0, bRΓc (X(c), O)(1) ≃ 0 → Pk → P1 → PS[η3 ] → P2 B2 [η3 ]1 → 0 → 0, where S[η 3 ] is the edge connecting St and 2 B2 [η 3 ]ε . Since RΓc (X(c) ×G X(c), O) is torsion-free (Proposition 3.7), we deduce that the differentials between non-zero terms of the complexes above cannot be zero. This determines uniquely the four complexes above up to isomorphism. We have bRΓc (X(c), O)(q−2 ) ⊗OG bRΓc (X(c), O)(q4 ) ≃ Hom•kG (0 → PS[η3 ] → P2 B2 [η3 ]1 → 0, 0 → P2 B2 [η3 ]1 → P2 F4 [−θ2 ] → 0)[−3]. By Proposition 3.7, this complex D has homology O concentrated in degree 2. Assume that, in the cyclic ordering of edges containing 2 B2 [η 3 ]ε , the edge containing 2 F4 [−θ2 ] comes after the edge containing 2 B2 [η 3 ]1 but before the edge containing St. Then a non-zero map kPS[η3 ] → kPF4 [−θ2 ] does not factor through kP2 B2 [η3 ]1 : so, it gives rise to a non-zero element of H4 (kD), a contradiction. It follows that the subtree obtained by removing 2 F4 [±i] is given by Figure 8. Let w ∈ W of length 6 such that wF has order 8 and let C = bRΓc (X(w), O)(−1) . It is a perfect complex; the torsion part of its cohomology is cuspidal by Proposition 3.8 and it does not involve Stℓ by Proposition 3.11. In addition, there is a representative of C that involves neither P2 F4IV [−1] nor PStℓ by Lemma 4.17. It follows that 2 F4IV [−1] does not occur as a composition factor of the cohomology of kC. Therefore the possible composition factors in the torsion part of H∗ (C) are the cuspidal simple modules 2 F4 [±i], 2 F4 [−θj ] and S[η m ]. The cohomology of KC is given by KC ≃ (F4 [i])[−6] ⊕ F4 [−θ]⊕3 [−8] ⊕ 2 B2 [η 5 ]⊕5 1 [−9] ⊕ K[−12]. 50 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER Using Proposition 3.7 one can easily compute kC ⊗LkG bRΓc (X(c), k)(λ) for the various eigenvalues λ of F 2 . With the same method as in Steps 1 and 2 of §5.2.5, the cases λ = q −2 , q 6 , q 4 , 1 show that • 2 F4 [−θ] can occur as a composition factor of H∗ (kC) only in degrees 8 or 9, because HomDb (kG (P2 B2 [η5 ]1 , kC[i]) = 0 for i 6= 9; • 2 F4 [−θ2 ] does not occur as a composition factor of H∗ (kC) because HomDb (kG (P2 B2 [η3 ]1 , kC[i]) = 0 for all i; • S[η 3 ] does not occur as a composition factor of H∗ (kC) because HomDb (kG (P2 B2 [η3 ]1 , kC[i]) = HomDb (kG (P1 , kC[i]) = 0 for all i; • S[η 5 ] can occur as a composition factor of H∗ (kC) only in degrees 9, 10 and 11 because HomDb (kG (P1 , kC[i]) = 0 for all i and HomDb (kG (P2 B2 [η5 ]1 , kC[i]) = 0 for i 6= 9. There are five distinct possible planar trees other than the one in Figure 8. One checks that for each of those five bad embeddings, • Ω−3 (2 F4 [i]) and Ω−4 (2 F4 [i]) do not contain 2 F4 [−θ] as a submodule, • Ω−4 (2 F4 [i]) does not contain 2 B2 [η 5 ]1 as a submodule, • Ω−4 (2 F4 [i]), Ω−5 (2 F4 [i]) and Ω−6 (2 F4 [i]) do not contain S[η 5 ] as a submodule, • Ω−7 (2 F4 [i]) does not contain k as a submodule, or • Ω−j (2 F4 [i]) does not contain 2 F4 [i] nor 2 F4 [−i] as a submodule for 1 ≤ j ≤ 6. 6+j Since kH6 (C) ≃ 2 F4 [i], it follows that Extj+1 (kC), kH6 (C)) = 0 for j ≥ 1 kG (H 7 6 and Ext1kG (TorO 1 (k, H (C)), kH (C)) = 0. Let D be the cone of the canonical map 6 kH (C) → kC[6]. We have HomDb (kG) (D, kH6 (C)[1]) = 0, hence kH6 (C) is isomorphic to a direct summand of C. Since C is perfect and 2 F4 [i] is not projective, we have a contradiction. This proves that the tree in Figure 8 is correct. THE BRAUER TREES OF UNIPOTENT BLOCKS 2 2 2 2 2 F4 [i] St 2 2 F4 [−θ] B2 [η 5 ]ε F4IV [−1] B2 [η 3 ]ε F4 [−i] 2 51 B2 [η 5 ]1 φ2,3 1 2 B2 [η 3 ]1 F4 [−θ2 ] Figure 8. Principal ℓ-block of 2 F4 (q 2 ) with ℓ | q 4 + √ 2q 3 + q 2 + √ 2q + 1 E6 [θ2 ]ε φ56,3 φ315,7 φ512,11 φ280,17 φ35,31 St E6 [θ]ε E6 [θ]1 φ7,46 φ56,30 φ315,16 φ512,12 φ280,8 φ35,4 E6 [θ2 ]1 Figure 9. Brauer tree of the principal Φ9 -block of E7 (q) The Φ9 -blocks of E8 (q) have isomorphic trees, with bijection of vertices given as follows. E7 (q) φ7,1 φ56,3 φ315,7 φ512,11 φ280,17 φ35,31 St E6 [θ2 ]ǫ E6 [θ]ǫ E8 (q), (A2, φ3 ) φ160,7 φ1008,9 φ2800,13 φ5600,21 φ4096,27 φ560,47 φ112,63 E6 [θ2 ]φ′′1,3 E6 [θ]φ′′1,3 E8 (q), (A2 , φ21 ) φ35,2 φ700,6 φ2240,10 φ3150,18 φ2240,28 φ700,42 φ35,74 E6 [θ2 ]φ2,2 E6 [θ]φ2,2 E8 (q), (A2 , φ13 ) φ112,3 φ560,5 φ4096,11 φ5600,15 φ2800,25 φ1008,39 φ160,55 E6 [θ2 ]φ′1,3 E6 [θ]φ′1,3 E7 (q) φ7,46 φ56,30 φ315,16 φ512,12 φ280,8 φ35,4 1 E6 [θ2 ]1 E6 [θ]1 E8 (q), (A2 , φ3 ) φ28,68 φ1575,34 φ4096,26 φ3200,22 φ700,16 φ50,8 1 E6 [θ2 ]φ1,0 E6 [θ]φ1,0 E8 (q), (A2, φ21 ) φ8,91 φ400,43 φ1400,29 φ2016,19 φ1400,11 φ400,7 φ8,1 E6 [θ2 ]φ2,1 E6 [θ]φ2,1 E8 (q), (A2 , φ13 ) φ1,120 φ50,56 φ700,28 φ3200,16 φ4096,12 φ1575,10 φ28,8 E6 [θ2 ]φ1,6 E6 [θ]φ1,6 1 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER φ7,1 52 Appendix A. Brauer trees for E7 (q) and E8 (q) E7 [i] φ7,46 φ27,37 φ168,21 φ378,14 φ378,9 φ168,6 φ27,2 φ7,1 Figure 10. Brauer tree of the Φ10 -block of E7 (q) associated to (2 A2 (q).(q 5 + 1), φ21 ) THE BRAUER TREES OF UNIPOTENT BLOCKS E7 [−i] 53 D4,ε1 D4,rε1 D4,rε2 D4,ε2 St 54 E7 [i] φ27,37 φ105,26 φ189,17 φ189,10 φ27,2 φ160,7 φ28,8 E7 [−i] Figure 11. Brauer tree of the principal Φ14 -block of E7 (q) E8 [−θ2 ] E8 [−1] φ28,68 φ160,55 φ300,44 φ840,26 φ1344,19 φ840,14 φ300,8 E8 [−θ] Figure 12. Brauer tree of the Φ12 -block of E8 (q) associated to (3 D4 (q), 3 D4 [1]) 1 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER φ105,5 12,3 E8 [ζ 2 ] φ112,63 φ8,91 E8 [θ] St φ84,64 φ1344,38 φ4096,26 φ5670,18 φ4096,12 φ1344,8 φ84,4 1 E6 [θ2 ]ε E6 [θ2 ]φ2,2 E8 [ζ 3 ] E6 [θ2 ]1 Figure 13. Brauer tree of the principal Φ15 -block of E8 (q) E8 [θ] E8 [−θ2 ] φ8,91 φ35,74 D4,φ′1,12 D4,φ′4,7 D4,φ′6,6 D4,φ′′4,7 D4,φ′′1,12 E8 [θ2 ] φ300,44 φ840,31 φ1134,20 φ840,13 φ300,8 φ35,2 φ8,1 THE BRAUER TREES OF UNIPOTENT BLOCKS E8 [ζ] E6 [θ]1 E6 [θ]ε E8 [ζ 4 ] E8 [θ2 ] φ1400,7 φ4096,11 φ5600,19 φ4096,27 φ1400,37 E6 [θ]φ2,2 E8 [−θ] Figure 14. Brauer tree of the Φ18 -block of E8 (q) associated to (2 A2 (q), φ21 ) 55 56 E8 [ζ 2] D4,φ9,2 D4,φ16,5 D4,φ9,10 D4,ε E8 [ζ 3] E8 [ζ] St E8 [−i] φ112,63 φ567,46 φ1296,33 φ1680,22 φ1296,13 E8 [ζ 4] Figure 15. Brauer tree of the principal Φ20 -block of E8 (q) φ567,6 φ112,3 1 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER D4,1 E8 [i] E6 [θ]φ′1,3 E6 [θ]φ2,2 E6 [θ]φ′′1,3 D4,φ′2,4 D4,φ′8,3 D4,φ12,4 D4,φ′′8,9 D4,φ′′2,16 E8 [i] St E8 [−θ2 ] φ35,74 φ160,55 φ350,38 φ448,25 φ350,14 E6 [θ2 ]φ2,2 E6 [θ2 ]φ′1,3 Figure 16. Brauer tree of the principal Φ24 -block of E8 (q) φ35,2 1 THE BRAUER TREES OF UNIPOTENT BLOCKS E6 [θ2 ]φ′′1,3 E [−i] E [−θ] 8 8 φ160,7 57 58 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER References [1] C. Bonnafé, J.-F.Dat and R. Rouquier, Derived categories and Deligne-Lusztig varieties II. Ann. Math., to appear. [2] C. Bonnafé and J. Michel. Computational proof of the Mackey formula for q > 2. J. Algebra 327 (2011), 506–526. [3] C. Bonnafé and R. Rouquier. Catégories dérivées et variétés de Deligne-Lusztig. Publ. Math. Inst. Hautes Études Sci. 97 (2003), 1–59. [4] C. Bonnafé and R. Rouquier. Coxeter orbits and modular representations. Nagoya Math. J. 183 (2006), 1–34. [5] R. Brauer. Investigations on group characters. Ann. of Math. 42 (1941), 936–958. [6] M. Broué. Isométries parfaites, types de blocs, catégories dérivées. Astérisque 181–182 (1990), 61–92. [7] M. Broué and G. Malle. Théorèmes de Sylow génériques pour les groupes réductifs sur les corps finis. Math. Ann. 292 (1992), 241–262. [8] M. Broué, G. Malle and J. Michel, Generic blocks of finite reductive groups. Astérisque 212 (1993), 7–92. [9] M. Broué, G. Malle and J. Michel. Towards spetses. I. Transform. Groups 4 (1999), 157–218. [10] M. Broué and J. Michel. Blocs et séries de Lusztig dans un groupe réductif fini. J. Reine Angew. Math. 395 (1989), 56–67. [11] M. Broué and J. Michel. Blocs à groupe de défaut abélien. Astérisque 212 (1993), 93–118. [12] O. Brunat. The Shintani descents of Suzuki groups and their consequences. J. Algebra 303 (2006), 869–890. [13] R. Burkhardt. Über die Zerlegungszahlen der Suzukigruppen Sz(q). J. Algebra 59 (1979), 421–433. [14] M. Cabanes and M. Enguehard. Unipotent blocks of finite reductive groups of a given type. Math. Zeitschrift 213 (1993), 479–490. [15] M. Cabanes and M. Enguehard. On unipotent blocks and their ordinary characters. Invent. Math. 117 (1994), 149–164. [16] M. Cabanes and M. Enguehard. Representation theory of finite reductive groups. Cambridge Univ. Press, 2004. [17] J. Chuang and R. Rouquier. Perverse equivalences and Calabi-Yau algebras. In preparation. [18] G. Cooperman, G. Hiß, K. Lux and J. Müller. The Brauer tree of the principal 19-block of the sporadic simple Thompson group. Experiment. Math. 6 (1997), 293–300. [19] D. Craven. Perverse equivalences and Broué’s conjecture II: The cyclic case. submitted. [20] C.W. Curtis and I. Reiner. Methods of representation theory, vol. II. John Wiley, 1987. [21] E. C. Dade. Blocks with cyclic defect groups. Ann. of Math. 84 (1966), 20–48. [22] P. Deligne and G. Lusztig. Duality for representations of a reductive group over a finite field, II. J. Algebra 81 (1983), 540–545. [23] F. Digne and J. Michel. Representations of finite groups of Lie type. Cambridge University Press, 1991. [24] F. Digne and J. Michel. Groupes réductifs non connexes. Ann. Sci. ENS 27 (1994), 345–406. [25] F. Digne, J. Michel and R. Rouquier. Cohomologie des variétés de Deligne-Lusztig. Adv. Math. 209 (2007), 749–822. [26] R. Dipper. On quotient of Hom-functors and representations of finite general linear groups. I. J. Algebra 130 (1990), 20–52. [27] O. Dudas. Deligne-Lusztig restriction of a Gelfand-Graev module. Ann. Sci. Éc. Norm. Supér. 42 (2009), 653–674. [28] O. Dudas. Coxeter Orbits and Brauer trees. Adv. Math. 229 (2012), 3398–3435. THE BRAUER TREES OF UNIPOTENT BLOCKS 59 [29] O. Dudas. Coxeter Orbits and Brauer trees II. Int. Math. Res. Not. 15 (2014), 4100–4123. [30] O. Dudas and R. Rouquier. Coxeter Orbits and Brauer trees III. J. Amer. Math. Soc. 27 (2014), 1117–1145. [31] M. Enguehard. Sur les ℓ-blocs des groupes réductifs finis quand ℓ est mauvais. Journal of Algebra 230 (2000), 334–377. [32] W. Feit. Possible Brauer trees. Illinois J. Math. 28 (1984), 43–56. [33] W. Feit. The representation theory of finite groups. North-Holland, 1982. [34] P. Fong and M. Harris. On perfect isometries and isotypies in finite groups. Invent. Math. 114 (1993), 139–191. [35] P. Fong and B. Srinivasan. Brauer trees in GLn (q). Math. Z. 187 (1984), 81–88. [36] P. Fong and B. Srinivasan. Brauer trees in classical groups. J. Algebra 131 (1990), 179–225. [37] M. Geck. Verallgemeinerte Gelfand–Graev Charaktere und Zerlegungszahlen endlicher Gruppen. Dissertation, Aachen (1990). [38] M. Geck. Generalized Gelfand–Graev characters for Steinberg’s triality groups and their applications. Comm. Algebra 19 (1991), 3249–3269. [39] M. Geck. Brauer trees of Hecke algebras. Comm. Algebra 20 (1992), 2937–2973. [40] M. Geck. Kazhdan-Lusztig cells and decomposition numbers. Represent. Theory 2 (1998), 264–277. [41] M. Geck. Character values, Schur indices and character sheaves. Represent. Theory 7 (2003), 19–55. [42] M. Geck, G. Hiss and G. Malle. Cuspidal unipotent Brauer characters. J. Algebra 168 (1994), 182–220. [43] M. Geck and G. Pfeiffer. On the irreducible characters of Hecke algebras. Adv. Math. 102 (1993), 79–94. [44] M. Geck and G. Pfeiffer. Characters of finite Coxeter groups and Iwahori–Hecke algebras. The Clarendon Press Oxford University Press, 2000. [45] M. Geck and G. Pfeiffer and S. Kim. Minimal length elements in twisted conjugacy classes of finite Coxeter groups. J. Algebra 229 (2000), 570–600. [46] G. Hiss. Regular and semisimple blocks of finite reductive groups. J. London Math. Soc. 41 (1990), 63–68. [47] G. Hiss. The Brauer trees of the Ree groups. Comm. Algebra 19 (1991), 871–888. [48] G. Hiss and F. Lübeck. The Brauer trees of the exceptional Chevalley groups of types F4 and 2 E6 . Arch. Math. (Basel) 70 (1998), 16–21. [49] G. Hiss, F. Lübeck and G. Malle. The Brauer trees of the exceptional Chevalley groups of type E6 . Manuscripta Math. 87 (1995), 131–144. [50] G. Hiss and K. Lux. Brauer trees of sporadic groups. Oxford University Press, 1989. [51] J. E. Humphreys. Reflection groups and Coxeter groups. Cambridge Univ. Press, 1990. [52] M. Linckelmann. Le centre d’un bloc à groupes de défaut cycliques. Comptes Rendus de l’Académie des Sciences 306 (1988), 727–730. [53] G. Lusztig. Representations of finite Chevalley groups. Regional Conf. Series in Math. 39, Amer. Math. Soc. 1978. [54] G. Lusztig. Coxeter orbits and eigenspaces of Frobenius. Invent. Math. 38 (1976), 101–159. [55] G. Lusztig. Homology bases arising from reductive groups over a finite field. In Algebraic groups and their representations (Cambridge, 1997), volume 517 of NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci., pp. 53–72. [56] G. Lusztig. Rationality properties of unipotent representations. J. Algebra 258 (2002), 1–22. [57] G. Lusztig and N. Spaltenstein. Induced unipotent classes. J. London Math. Soc. 19 (1979), 41–52. 60 DAVID A. CRAVEN, OLIVIER DUDAS, AND RAPHAËL ROUQUIER [58] G. Malle. Die unipotenten Charaktere von 2 F4 (q 2 ). Comm. Algebra 18 (1990), 2361–2381. [59] G. Malle and D. Testerman Linear algebraic groups and finite groups of Lie type. Cambridge University Press, 2011. [60] J. Michel. The development version of the CHEVIE package of GAP3. J. Algebra 435 (2015), 308–336. [61] J. Müller. Brauer trees for the Schur cover of the symmetric group. J. Algebra 266 (2003), 427–445. [62] R. Rouquier. Complexes de chaînes étales et courbes de Deligne-Lusztig. J. Algebra 257 (2002), 482–508. [63] J. Shamash. Brauer trees for blocks of cyclic defect in the groups G2 (q) for primes dividing q 2 ± q + 1. J. Algebra 123 (1989), 378–396. [64] H. N. Ward. On Ree’s series of simple groups. Trans. Amer. Math. Soc. 121 (1966), 62–89. [65] E. Wings. Über die unipotenten Charaktere der Gruppen F4 (q). Dissertation, Lehrstuhl D für Mathematik, RWTH Aachen, 1995. School of Mathematics, University of Birmingham, Edgbaston, Birmingham B15 2TT, UK. E-mail address: [email protected] Université Paris Diderot, UFR de Mathématiques, Bâtiment Sophie Germain, 5 rue Thomas Mann, 75205 Paris CEDEX 13, France. E-mail address: [email protected] UCLA Mathematics Department, Los Angeles, CA 90095-1555, USA. E-mail address: [email protected]
4math.GR
Short-term Predictable Power of a Wind Farm via Distributed Control of Wind Generators with Integrated Storage arXiv:1602.04261v1 [cs.SY] 12 Feb 2016 Stefanos Baros1 Abstract— In this paper we introduce a Leader-follower consensus protocol and study its stability properties with and without communication delays. On the practical side, we explore its application on coordinating a group of wind Double-Fed Induction Generators (DFIGs) with integrated storage. To begin with, we establish asymptotic stability of the consensus protocol by employing singular perturbation theory. Subsequently, we establish asymptotic stability of the protocol under communication delays using a Lyapunov-Krasovskii functional. Lastly, we use the proposed protocol to design a methodology that can be adopted by a fleet of state-of-the-art wind generators (WGs). The objective is that the WGs selforganize and control their storage devices such that WF total power output is tracking a reference while equal contribution from each storage device is attained i.e equal power output from each storage. We demonstrate the effectiveness of our results and the corresponding approach via simulations on the IEEE 24-bus RT system. I. I NTRODUCTION According to a US Department of Energy (DOE) study [1], wind generators (WGs) are going to produce one of the largest shares of renewable energy in the future. Specifically, the same study argues that, by 2020, 10% of the US electricity demand is expected to be produced by wind generators, offshore and onshore [1]. Clearly, US stake their renewable energy future on wind generators for meeting their national goals regarding the reduction of the carbon dioxide emissions. A similar status is evident in most of the countries around the world. However, when power systems accommodate high-levels of wind integration they have to face a crucial challenge. That is, to guarantee their stability, their reliability and their dynamical performance which becomes highly dependent on the control methods that are adopted by the various WGs. The problem of coordinating and controlling a group of WGs in order for the WF power output to track a reference had been studied in [2],[3],[4]. The authors in [2] introduced a centralized two-layer constant power control scheme for a WF comprised with wind DFIGs with integrated storage. We emphasize that, wind DFIGs with energy storage are the gold standard on WGs technology, able to offer increased flexibility for short-term scheduling and power output smoothing [5],[6]. On the high-layer [2], the wind farm supervisory controller computed the power references for the low-layer controllers of the DFIGs, where on the low-layer, each DFIG controller generated power equal to the reference using the storage. It is important to underline that centralized control 1 Stefanos Baros is with the ECE department of Carnegie Mellon University, Pittsburgh, PA, 15213 USA e-mail: [email protected] schemes as the one in [2], require communication links from each WG to a central wind farm controller and extensive computations centrally. As a result, centralized approaches are plagued by expensive communication network costs, single-point failures, high computational cost and delays [7]. In the future, the number of large WFs with hundreds of WGs is going to increase all over the world. This prediction rests on the numerous renewable energy national plans around the world that have the expected wind generation dominating the total generation share coming from the renewable energy resources. Nevertheless, in high-wind-integration settings, the disadvantages of using centralized approaches for the coordination and control of large wind farms will become more pronounced. Consider that, with centralized approaches, the performance and the reliability of a WF in providing services can be severely compromised. On the other hand, distributed methods for controlling WFs with state-of-the-art WGs are becoming very appealing due to the reduced communication infrastructure they require, the low computational costs and the increased reliability that characterizes them [7], [4]. In fact, such methods can enable future WFs to perform robustly and reliably toward achieving certain objectives e.g rapidly track a power reference point, providing frequency and inertial response or alleviating intermittency. Distributed approaches for addressing the problem of coordination and control of WGs were studied in [3],[4]. Particularly, in [3], the authors proposed a strategy, based on multi-agent theory, to coordinate the WGs in a microgrid. The total available wind power and the total demand were retrieved in a distributed way, using agents at each bus and two average consensus protocols that were executed in parallel. Subsequently, the total demand and the wind power were used to compute the set points of the WGs. In the same spirit, the authors in [4], derived a distributed controller to regulate the set-points of various WGs. The control objectives for these controllers were to generate a specific total power output and at the same time minimize the fatigue on the wind turbines. In [3],[4] distributed control of DFIGs with no integrated storage is concerned. Also, since regulation of the WGs setpoints was aimed, only control of the Rotor-side-converter (RSC) is studied. In this work, we are focusing on the particular problem of controlling the storage devices of state-of-the-art WGs in a fair-sharing fashion such that the WF total power matches a committed power output, that can be constant or quasi-constant. The only work related to this problem is the work in [2], which considered a centralized approach. We underline that state-of-the-art WGs 1 are expected to be widely deployed in the future. In light of that, deriving new distributed methods for their efficient control and coordination becomes both an emerging and important challenge. (1, 2) 2 A. Our Contributions Motivated by multi-agent systems theory, we make the following contributions toward addressing the problem of distributed coordination and control of state-of-the-art WGs: a) We propose a distributed leader-follower consensus protocol that requires minimal communication links. Using singular perturbation arguments we prove that this protocol converges to its asymptotically stable equilibrium point, under certain conditions. b) Further, we prove that the proposed protocol possesses a delay-independent stability property which induces certain robustness to it with respect to timedelays that usually arise in communication networks c) On the practical side, we adopt the consensus protocol in a WF set-up and show that it can achieve the following objectives. It can effectively coordinate the storage devices of a group of WGs such that the WF total power matches a reference while consensus on the power output of the storage devices is reached. We outline the rest of the paper as follows. In Section II, we provide some preliminares and introduce the leaderfollower consensus protocol. In Section III, stability analysis of the proposed protocol is studied, using singular perturbation arguments. In the same Section, stability analysis under time-delays using Lyapunov-Krasovskii functionals is presented in detail. In Section IV, we apply the proposed protocol in a WF, to address the problem of fair utilization of WGs storage devices for short-term power output tracking. In Section V, we validate our results with simulations on the modified IEEE-RTS 24-bus system. Finally, Section VI concludes the paper. II. P ROBLEM F ORMULATION A. Notation In this paper we use standard notation. We denote by R the set of reals and by C the set of complex numbers. Also, we denote by R+ the set of non-negative real numbers and with R++ the set of positive reals. The m-dimensional Euclidean space is denoted by Rm . We denote vectors and matrices with bold characters. With A ∈ Rm×n we denote a m × n matrix of reals. With A> we denote the transpose of A and with [a]ij the (i, j)-entry of the matrix A. With A  0 (A  0) we denote that the matrix A is positive definite (semidefinite). The spectrum of the matrix A (set of eigenvalues) is denoted by σ(A). A n×n diagonal matrix B is denoted by B = diag[bi ]ni=1 . Define a n-dimensional vector a as a = [ai ]ni=1 . The operator k·k2 denotes the standard Euclidean norm L2 . The maximum value of the vector a is denoted by ā. Similarly the maximum value of a scalar quantity z is given by z̄. With In we denote the n × n identity matrix and the with 0n×1 and 1n×1 a n × 1 column vector of zeros and ones respectively. With x being a variable, we denote its (i 1, i) (n 1, n) i n Fig. 1: Graph G = (V, E) denoting the information exchange between the agents time derivative with ẋ ( dx dt ). The operator Re(·) returns the real part of an imaginary number · ∈ C. B. Leader-Follower Consensus Protocol Consider a set of agents denoted by V , {1, ..., n} and indexed by indexed by i ∈ V. The exchange of information between the agents can be represented as a graph G = (V, E) where V is the set of nodes and n o E , (i, j) | j = i+1, i ∈ V\{n}, j ∈ V\{1} , E ⊆ V×V is the set of edges corresponding to the allowable communication between the agents as shown in Fig. 1. The edge (i, j) denotes information exchange between agent i and agent j. Without loss of generality we assign as leader l the agent l , 1. Observe that, each agent exchanges information with one neighboring agent as shown in Fig. 1. Now, let V̄ denote the set of agents without the leader. In our case, V̄ , {2, ..., n} where V̄ ⊂ V. In the above set-up, consider the case where the agents desire to reach consensus on a relevant state-variable zi , i ∈ V. The only constraint is that the sum of their consensus states has to be z ∗ . For addressing this problem under the above set-up, we propose the following Leader-follower Consensus Protocol [7]. Protocol P1 Leader agent  X  dξh , z∗ − zi , dt i∈V dzl , −kα,l (zl − ξh ) , dt zl , z1 , ξh ∈ R (1a) (1b) zl ∈ R Agent i dzi , −kα,i (zi − zi−1 ) , zi ∈ R, i ∈ V̄ (1c) dt The variables kα,l , kα,i ∈ R++ are the gains of the consensus protocol, ξh is the auxiliary state of the leader agent and zl its consensus state, whereas, zi , ∀i ∈ V̄, the consensus states of all the other agents. Let the following assumption hold. P Assumption 1: The information i∈V̄ zi can be retrieved by the leader agent l. The above information can be obtained by the leader agent through indirect information passing from each agent to the leader (even without direct connection). III. S TABILITY A NALYSIS OF THE L EADER -F OLLOWER C ONSENSUS P ROTOCOL and of the equilibrium point of the slow sub-system, when these systems are considered decoupled from each other. Succeeding that step, we use Theorem 11.4 [8] to directly deduce that a maximum bound ε∗ on the small parameter ε exists under which stability of the full coupled system is guaranteed. The equilibrium point of (2a)-(2c) is: A. Two-time-scales Property In the protocol P1 dynamics a two-time-scales property emerges for certain values of the gains kα,l , kα,i . To prove that, we show that the system given by equations (1a)(1c) attains a standard singular perturbed form [8]. Let the vectors z and z̃ be defined as z , [z2 ... zn ]> , z ∈ Rn−1 z̃ , [zl z> ]> , z̃ ∈ Rn respectively. Then, the following proposition holds. Proposition 1: The protocol P1 given by Eq. (1a)-(1c) acquires a two-time-scales property for ka,l = ka,i  1, ∀i. Proof: Without loss of generality we consider that kα,l = kα,i , ∀i ∈ V̄. Accordingly, we define the time-scale 1 1 = kα,i ∈ R, ∀i ∈ V. With separation parameters as ε = kα,l those, equations (1a)-(1c) become:  X dξh , z∗ − zi ) (2a) dt ξh0 = z ∗ /n (4a) zl0 = ξh0 (4b) zi0 = ξh0 , ∀i ∈ V̄ (4c) Define the consensus subspace as: S , {z̃ ∈ Rn | z̃ = β · 1n×1 , β ∈ R} (5) and let z̃0 denote the equilibrium point of z̃. Notice that, consensus between the agent state-variables zi , i ∈ V can be reached, whenever the next two conditions are satisfied: Condition 1: z̃0 ∈ S Condition 2: z̃0 is asymptotically stable Observing equations (4a)-(4c), we readily have that Con∗ dition 1 is met with β = zn . We are left to establish that Condition 2 is met. For this purpose, we define the augmented variables yl , (zl − ξh ), yi , (zi − ξh ), ψh , (ξh − ξh0 ) that move the equilibrium point (ξh0 , z̃> 0 ) to the origin. Using those, equations (2a)-(2c) become: i∈V dzl ε , −(zl − ξh ) , l , 1 (2b) dt dzi ε , −(zi − zi−1 ) , i ∈ V̄ (2c) dt Then, equations (2a)-(2c) can be written in the next form: dξh , gh dt dz̃ ε , g̃ dt (3a) (3b) where dz̃ dzl dzi dzn > ,[ ... ... ] dt dt Xdt dt gh , (z ∗ − zi ) ∈ R (3c) (3d) i∈V g̃ , −[(zl − ξh )...(zn − zn−1 )]> (3e) n with dz̃ dt , g̃ ∈ R being smooth vector fields and ε the corresponding small positive parameter. The equations (3a),(3b) are in the standard singularly perturbed form with two time scales, namely t and τ = εt . That, completes the proof. B. Asymptotic Stability In this section, we rely on the two-time-scales property stated above and singular perturbation theory for proving asymptotic stability of the equilibrium point of P1 in a compartmental fashion. The above analysis reveals that the slow quasi-steady state is the augmented state-variable ξh of the leader agent l, and the fast boundary-layer states, are the consensus state-variables z̃. We first establish the stability of the equilibrium point of the fast sub-system Slow sub-system X dψh , −nψh − yi dt (6a) i∈V Fast boundary-layer sub-system dyl dψh , −yl − ε , y l , y1 dt dt dyi dψh ε , −(yi − yi−1 ) − ε , ∀i ∈ V̄ dt dt ε (6b) (6c) Define the following vectors; y = [y2 ... yi ... yn ]> , y ∈ Rn−1 and ỹ = [yl y> ]> , ỹ ∈ Rn and let the variable τ = εt denote the fast time-scale. On this time scale, the slow statevariable ψh appears as “frozen” and therefore we can assume h that dψ dτ ≈ 0. Under this approximation, the fast decoupled sub-system becomes: dyl = −yl (7a) dτ dyi = −(yi − yi−1 ), ∀i ∈ V̄ (7b) dτ The following lemma establishes asymptotic stability of the fast sub-system equilibrium point . Lemma 1: The equilibrium point of the system (7a)-(7b), (ỹ0 = 0n×1 ), is asymptotically stable. Proof: In matrix form we have:  dyl     −1 0 · · · 0 0 yl dτ  ..   ..   . . .. ..   ...   . = .  dyn dτ 0 | 0 ··· {z Af 1 −1 yn } Denoting the eigenvalues of Af with λ = [λl λ2 · · · λn ]> and noticing that Af is a lower triangular matrix [9], gives that λ = −1n×1 . That is equivalent to Af being a Hurwitz matrix and to the origin of the system (7a), (7b) being asymptotically stable [8]. That, concludes the proof of Lemma 1. According to Theorem 4.6 [8] the above statements are valid if and only if for any Q  0, ∃P  0 that satisfies: PAf + A> f P = −Q, Q, P ∈ Rn×n (8) with stability certificate the Lyapunov function given by: > Vf = ỹ Pỹ (9) dψh = −nψh (10) dt Lemma 2: The equilibrium point of the slow sub-system (10), (ψh0 = 0), is asymptotically stable. Proof: Take a candidate Lyapunov function as: Vh > 0, ∀ψh ∈ Dψh \ {0} dỹ = A0 ỹ + A1 ỹ(τ − r) dτ (12) where A0 , −In and A1 defined as:  >  0 0 A1 , (n−1)×1 I(n−1) 0(n−1)×1 (13) We construct a Lyapunov-Krasovskii functional [10] as: Z τ > V1 = ỹ(τ ) P1 ỹ(τ ) + ỹ(η)> Q1 ỹ(η)dη (14) τ −r We now turn our focus on the slow time scale t and notice that Lemma 1 establishes limτ →∞ (yl ) = 0, limτ →∞ (yi ) = 0, ∀i ∈ V̄. With these, the slow sub-system (10) can be approximated by: Vh = ψh2 , The time-delayed version of (7a)-(7b) is: (11) Computing its time derivative along the trajectories of the 2 h system in (10) leads to dV dt = −2n(ψh ) with n > 0 and dVh dt < 0, ∀ψh ∈ Dψh \ {0} which finally yields that ψh0 = 0 is asymptotically stable. Lemmas 1, 2 establish asymptotic stability of the equilibrium points of the fast and the slow reduced sub-systems respectively. Nonetheless, asymptotic stability of the full system (6a)-(6c) equilibrium point cannot be seamlessly inferred since the decoupled system dynamics serve as an approximation of the full system dynamics. To grapple with this challenge, we resort to a methodology, described in [8], whose sketch we briefly provide next. To prove asymptotic stability of the equilibrium point of the full system, a candidate Lyapunov function Vc can be first formulated from the linear combination of the Lyapunov functions Vf and Vh . Further, by deriving the time derivative of this composite candidate Lyapunov function along the trajectories of the full system we can impose negative definetess conditions in it. That, will lead a maximum bound ε∗ (Theorem 11.4, [8]) on the small parameter ε which can be interpreted as the maximum value of the time-scale separation ratio for which asymptotic stability of the full system is still assured. C. Delay-Independent Asymptotic Stability In practice, when distributed protocols are implemented, communication delays in the exchange of information arise. In this section, we study the asymptotic stability property of the fast sub-system equilibrium point under a specific type of delays, namely the fixed-time delays. Denoting the delays with r ∈ R+ we emphasize that, while the time-delays can be h arbitrary, the approximation dψ dτ ≈ 0 has to be valid so that the slow state-variable can still be considered as “frozen”. n×n where P1 , Q1 ∈ R and P1 , Q1  0. Direct differentiation with respect to τ yields: dV1 = ỹd> Q̃1 ỹd dτ (15) where  Q̃1 , P1 A0 + A> 0 P1 + Q1 A> 1 P1 P1 A1 −Q1  (16) and ỹd> , (ỹ(τ )> ỹ(τ − r)> ), ỹd ∈ R2n (17) From the Lyapunov-Krasovskii Stability Theorem [10], we have that the delay-independent asymptotic stability of the equilibrium point is guaranteed whenever dV1 < 0, ∀ỹd ∈ D1 \ {0(2n×1) } (18) dτ To prove (18), we introduce the next Lemma. Lemma 3: ∃P1 , Q1  0 diagonal matrices such that for Q̃1 , given by (16), it holds: Q̃1 ≺ 0 (19) Proof: Without loss of generality we take P1 , Q1 to be positive definite diagonal matrices. The Schur complement conditions on the matrix Q̃1 , give that Q̃1 ≺ 0 is equivalent to P1 A0 + A> 0 P1 + Q1 ≺ 0 together with the Schur complement matrix (of Q̃1 ), S1 , satisfying S1 ≺ 0. Performing basic matrix calculations gives: P1 A0 +A> P1 + Q1 =  0 q1 − 2p1 0  0 q − 2pi i    0 0 0 0 ··· ··· .. . · 0 0 0 qn − 2pn      which is negative definite (≺ 0) when: qi − 2pi < 0, ∀i ∈ V The Schur complement is obtained as:  p22 −q1 − 2p2 −q 0 2  p2  0 −qi − 2pi+1i+1 −qi+1  S1 =   0 0 0 0 (20a) ··· ··· .. . ··· 0   0    0  −qn which is negative definite (≺ 0) when: p2i+1 < 0, ∀i ∈ V \ {n} 2pi+1 − qi+1 −qn < 0 (20b) (20c) W F Bus −qi − 2 1 n 3 Restricting P1 , Q1 to be positive definite yields: qi > 0 , ∀i ∈ V (20d) (20e) Now, we have to prove that we can find pi , qi , ∀i ∈ V, that satisfy the inequalities (20a)-(20e) i.e LMI feasibility. Our proof for the LMI feasibility is constructive; we introduce a methodology for finding pi , qi to meet the inequalities. We begin by choosing pi , ∀i ∈ V s.t (20d) holds. Next, choose the qn s.t (20e),(20a) together hold and each qi , ∀i ∈ V \{n} s.t both (20a), (20b) are satisfied. Using this methodology, we can always find pi , qi , ∀i ∈ V that meet the inequalities (20a)-(20e). Hence, the LMI problem in (19) is indeed feasible and we conclude the proof. Theorem 1: The equilibrium point (ỹ0 = 0n×1 ) of the system (12) is delay-independent asymptotically stable. Proof: From Lemma 3 and Lyapunov-Krasovskii Stability Theorem [10] we conclude the proof. Intuitively, Theorem 1 guarantees that the fast consensus state-variables zi , i ∈ V converge to the slow state-variable ξh independently of any time-delays, as long as ψh remains “frozen”. That is of practical interest, since it certifies that the performance of the protocol P1 is robust with respect to time-delays that are inherent in communication channels. IV. WF S HORT- TERM P REDICTABLE P OWER V IA D ISTRIBUTED C ONTROL OF THE WG S In this Section, we apply the proposed protocol for coordinating a group of WGs storage devices in a WF toward achieving a common objective. The group objective is shortterm predictable power from the WF i.e provide constant power or track a reference with load sharing between the WGs. Let the set G , {1, ..., n} denote the WGs with integrated storage. To ease the notation, we simply denote a wind generator of this type by WG and index it by i, where i ∈ G. Without loss of generality we take l , 1. Let Ḡ denote the set of WGs without the leader WG. In our case, Ḡ , {2, ..., n}. In addition, we assume that each WG is an agent and we have WGs exchanging information between each other. Let Pe,i , Pg,i , Pr,i and Pst,i denote the electric power produced by the stator, the grid-side converter (GSC), the rotor-side converter (RSC) and the storage respectively. All these can be seen in Fig.2c. In general, the WFs obtain a reference power output, Pd from a system operator and this corresponds to the WF committed output. The committed power output is obtained as an outcome of a forecasting method and an Economic Dispatch process, conducted by the system operator taking into account local wind conditions. Consider the dynamics of the capacitor that interfaces the Rotor Side Converter (RSC) and the GSC of each WG, as W F Supervisory Controller (a) pi > 0 , ∀i ∈ V 2 1 n 3 (b) Pe,i Gearbox Pg,i Pr,i Capacitor RSC GSC Pst,i Consensus state-variable Energy Storage (c) Fig. 2: a) Physical topology of the WF b) Communication links with integrated storage c) WG (Fig.2c): dVdc,i , (Pr,i + Pst,i − Pg,i ), i ∈ G (21) dt where Cdc,i , Vdc,i ∈ R are the capacitance and the voltage potential of the capacitor respectively. When the storage is inactive, at the equilibrium we have: (Cdc,i Vdc,i ) Pg,i = Pr,i , i ∈ G (22) Taking that into account, we have that the total WF power output is equal to the total available mechanical power that is coming from the wind i.e: X X Pm,i ≈ (Pe,i + Pr,i ) (23) i∈G i∈G P The total mechanical power i∈G Pm,i is highly variable and since it depends on the wind speed conditions, it varies minute by minute. As a result, for a WF we might have that: X X Pm,i ≈ (Pe,i + Pr,i ) < Pd (24) i∈G i∈G The opposite case, where more wind power is available does not pose any problem since the WF can “spill” wind. On the other hand, the reasons for which the WF cannot generate Pd are twofold. Firstly, due to time delays between the time that the system operator conducts the wind forecasting and defines Pd until the time that this set-point is communicated to the WF. In this case, the WF available mean power can actually be less than Pd , making it not possible for the WF to generate the required amount of power. Secondly, due to the continuous wind fluctuations, the WF can only generate Pd on average. Although the WF cannot always extract (from the wind) power equal to Pd , it can generate a total power Pd when the WGs have storage devices, able to contribute. When the storage is active i.e Pst,i > 0 or Pst,i < 0, at the equilibrium of (21), we get: Pst,i = (Pg,i − Pr,i ), i ∈ G (25) The additional flexibility offered by the integrated storage can enable the WGs to actually generate the required Pd , given that the storage devices have stored enough energy. Hence, the WGs can provide short-term predictable power and balance wind intermittency as well. With storage, we have: X (Pe,i + Pr,i + Pst,i ) = Pd (26) i∈G The storage devices can provide or draw the excess power that is required by the WF to meet its committed power output in a short time-scale. That, can be translated into the next condition for the total storage power. Condition 3: X X lim Pst,i = Pd − (Pe,i + Pr,i ) (27) t→∞ i∈G i∈G For the scope of utilizing the available resources efficiently, the storage devices can be controlled such that they contribute equally to the excess power required by the WF to reach Pd . That, is translated into the following condition. Condition 4: lim Pst,i = lim Pst,j , t→∞ t→∞ ∀i, j ∈ G (28) Consider the following definition. Definition 1: Any utilization scenario between the energy storage devices of the WGs for which Conditions 3,4 hold, is called a fair utilization scenario. The problem we seek to address can now be formulated as. Problem 1: To coordinate the energy storages of various state-of-the-art WGs in a completely distributed way i.e each WG exchanges information with only its neighbor-WGs, such that Conditions 3,4 hold. Next, we introduce a methodology based on the Leaderfollower Consensus Protocol P1 to address Problem 1. A. Proposed Methodology In this section, we propose a methodology that addresses Problem 1. In our set-up, the physical and the communication topology of the WF is as shown in Fig. 2a, 2b. Notice that, the communication topology is exactly identical to the one in Fig. 1 with each WG exchanging information with one neighboring WG. Also, the physical topology is in alignment with the communication topology. Using Eq. (25), Condition 4 yields to: Condition 5: lim zi = lim zj , i, j ∈ G t→∞ (29) t→∞ where zi , (Pg,i − Pr,i ), ∀i ∈ G, zi ∈ R. It springs from (29) that, we can pose Problem 1 as a constrained consensus agreement problem. Further, we can address this problem by requiring each WG to exhange its zi information with one of its neighbors according to Fig.2b, until they reach consensus on their zi0 s. In this case, we would ensure that Eq. (29) holds. To realize this process, we propose the protocol given below. Definition 2 (Protocol P2 ): Leader WG   X dξh , Pd − (Pe,i + zi + Pr,i ) , dt i∈G dzl , −kα,l (zl − ξh ), dt zl , z1 ξh ∈ R zl ∈ R (30a) (30b) WG i dzi , −kα,i (zi − zi−1 ) , zi ∈ R, i ∈ Ḡ (30c) dt where ξh is the additional state-variable of the leader WG. P Assumption 2: The information i∈Ḡ (Pe,i + zi + Pg,i ) can be retrieved bythe leader WG.  P By defining z ∗ = Pd − i∈G (Pe,i + Pr,i ) , the Protocol P2 takes the form of the Protocol P1 . Thus, the preceding stability analysis of P1 still applies. Notice that, P2 guarantees that the total power output of the WF will be Pd h since at the equilibrium, equation dξ dt = 0 is identical to (26). Summarizing, the Protocol P2 effectively addresses the Problem 1. To implement P2 the GSC and the storage controllers have to be designed appropriately Fig.2c. We briefly describe how this can be done ommiting the full derivation due to space limitation. The GSC controller for the leader and the rest of the WGs can be designed using equations (30b) and (30c). Besides that, the storage controllers are critical to be designed such that by the time the GSCs reach consensus on the zi0 s, for the storage power, it holds: xi = zi , ∀i ∈ G (31) where xi = Pst,i , ∀i. A storage controller that achieves this objective can be found in our previous work, [11], [12]. As a general guideline, we emphasize that the storage controller has to guarantee that xi is tracking the consensus state zi , regulated by the GSC, in a much faster time-scale than the time-scale of the consensus protocol. This is very important for having: Condition 5 is true ⇒ Condition 4 is true That, results to guaranteed consensus on Pst,i , ∀i ∈ G, whenever consensus on the zi , ∀i ∈ G is reached. P Pd 0.7  18    21    22   0.6  23    17   16   (p:u) 0.5  20    19   3 3.5 0.5 1 4 i2G (Pe;i + Pg;i ) 0.4 0.3  15   0.2  14    13   0.1  11    24    12   1.5 2 2.5 3 3.5 4 4.5 time(s)  3    9    10   (a) Total WF power output  6    4   x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 0.06  5    8   0.04  2    7   (p:u)  1   Fig. 3: Modified IEEE 24-bus RT system Under Scenario 1, the WF dynamics evolve as shown in Fig. 4. More specifically, we observe from Fig. 4a that the total power of the WF is tracking the reference with good transient response i.e no oscillations, no overshoot. Hence, the WF total power output is reaching the committed reference rapidly. Additionally, from Fig. 4b we can see that the power coming from each storage is identical. This, verifies that the storage power outputs reached consensus. Direct comparison of the responses in Fig. 4c and Fig. 4b gives that, the storage power outputs and the consensus states are one-to-one identical to each other. This, verifies the effectiveness of the time-scale-separation-based design of the GSC and storage controllers which we explain as follows. The storage devices continuously generate the power that is required by the GSCs, whereas, the GSCs via the consensus protocol, regulate their power to match the total WF power, 0 -0.02 1 2 3 4 time(s) (b) Storage power of each WG, Pst,i 9h z1 z2 z3 z4 z5 z6 z7 z8 z9 z10 0.06 0.04 (p:u) V. P ERFORMANCE E VALUATION To validate our results, we apply our methodology on the modified IEEE 24-bus RT system. The goal is the WF power output to track a varying reference when is suddenly ordered to and when the available wind power is not sufficient. Also, the storage power outputs are desired to contribute to this power mismatch in an equal-sharing manner. At bus 22 of the 24-bus power grid, we have a WF comprised of 10 WGs where each of them has a storage encapsulated into its scheme Fig.2c. The physical as well as the communication structure of the WF is the same as in Fig.2a, 2b. We verify our proposed methodology, by conducting simulations under the next 2 critical scenarios. • Scenario 1: Step-wise changes on the reference Pd and no time-delays. • Scenario 2: Step-wise changes on the reference Pd and fixed delays r = 5ms. 0.02 0.02 0 -0.02 1 2 3 4 time(s) (c) Consensus state of each WG zi Fig. 4: WF response under Scenario 1 Pd . In the second scenario, we regarded time-delays on the exchange of information between the WGs. The WF response under this scenario can be seen in Fig. 5. It is obvious that the time-delays deteriorated the tracking response, Fig.5a, but the control objectives were still achieved. Specifically, the WF power output was tracking a reference and consensus on the power output of each storage device Fig.5b, was attained. These results verify the time-delay independent stability property of the proposed protocol, proved in Section IIIC. We conclude from the above results that, our proposed methodology is able to coordinate a fleet of WGs such that the total power from a WF is tracking a reference while using the available storage devices efficiently i.e addressing Problem 1. P !d 0.6 0.5 G i∈W of state-of-the-art WGs toward achieving a group objective. In our case the group objective was the WF power output to track a reference using the storage devices contributing in a fairly manner. Finally, we used the IEEE 24-bus RT system to verify our theoretical results and to demonstrate the effectiveness of our proposed methodology. In future work, we would like to explore how our methodology can be advanced such that the WFs can provide more services to the grid e.g frequency and inertial response, with efficient coordination of its available WGs. Pe,i + Pg,i [p.u] 0.4 0.3 0.2 0.1 0 0.5 1 1.5 2 2.5 3 3.5 4 time[s] (a) Total WF power output 20 ×10 -3 Pst,1 Pst,2 Pst,3 Pst,4 Pst,5 Pst,6 Pst,7 Pst,8 Pst,9 Pst,10 15 [p.u] 10 5 0 0.0105 0.01 3.06 3.08 3.1 3.12 3.14 -5 0.5 1 1.5 2 2.5 3 3.5 4 time[s] (b) Storage power of each WG, Pst,i 0.025 ξh z1 z2 z3 z4 z5 z6 z7 z8 z9 z10 0.02 [p.u] 0.015 0.01 0.005 0 0.0112 0.011 0.0108 3.02 3.04 3.06 3.08 3.1 3.12 -0.005 0.5 1 1.5 2 2.5 3 3.5 4 time[s] (c) Consensus state of each WG zi Fig. 5: WF response under Scenario 2 VI. C ONCLUDING R EMARKS AND F UTURE W ORK In this paper, we introduced a Leader-follower Consensus Protocol under a specific communication set-up. We first analyzed and proved its stability properties using singular perturbation arguments. Further, we extended these results by proving that its stability property is not altered under time-delays i.e its stability property is delay-independent. On the practical side, we showed how this protocol can find applications in power grids by proposing a methodology that can be adopted by WFs to address an emerging challenge. In particular the challenge is to coordinate, through appropriate communication and control, the storage devices of a fleet R EFERENCES [1] U.S Deparment of Energy. WindVision: A New Era for Wind Power in the United States. Technical report, U.S Deparment of Energy, March 2015. [2] L.Qu and W.Qiao. Constant Power Control of Dfig Wind Turbines With Supercapacitor Energy Storage. IEEE Transactions on Industry Applications, 47(1):359–367, January/February 2011. [3] W.Zhang, Y.Xu, W.Liu, F.Ferrese, and L.Liu. Fully Distributed Coordination of Multiple DFIGs in a Microgrid for Load Sharing. IEEE Transactions on Smart Grid, 4(2):806–815, June 2013. [4] Biegel B., Madjidian D., Spudic V., Rantzer A., and Stoustrup J. Distributed low-complexity controller for wind power plant in derated operation. In Proceeding of 2013 IEEE International Conference on Control Applications (CCA), pages 146–151. IEEE, August 2013. [5] C.Abbey and G.Joos. Integration of Energy Storage with a DoublyFed Induction Machine for Wind Power Applications. In 35th Annual Power Electronics Specialists Conference, volume 3, pages 1964– 1968. IEEE, June 2004. [6] N.W.Miller. GE Experience with Turbine Integrated Battery Energy Storage. In IEEE PES General Meeting, 2014. [7] H.Xin, Z.Qu, J.Seuss, and A.Maknouninejad. A Self-Organizing Strategy for Power Flow Control of Photovoltaic Generators in a Distribution Network. IEEE Transactions on Power Systems, 26(3):1462– 1473, August 2011. [8] H.K.Khalil. Nonlinear Systems. Prentice Hall, 3rd edition, 2002. [9] R.A. Horn and C.R. Johnson. Matrix Analysis. Cambridge University Press, 2013. [10] Keqin Gu, Vladimir L.Kharitonov, and Jie Chen. Stability of TimeDelay Systems. Springer Science+Business Media,LLC, 2003. [11] S.Baros. A Novel Ectropy-Based Control Scheme for a DFIG Driven by a Wind Turbine with an Integrated Energy Storage. In American Control Conference, July 2015. [12] S.Baros and M. Ilic. Robust Ectropy-based Cooperative Control of a Wind DFIG for Transient Stabilization and Mppt. In IEEE PES General Meeting, July 2015. [13] S.Baros and M.Ilic. Multi-objective Lyapunov-based Control of a STATCOM/BESS. In Innovative Smart Grid Technologies Conference (ISGT),, Feb 2015. [14] R. Olfati Saber, J. A.Fax, and R.M. Murray. Consensus and Cooperation in Networked Multi-Agent Systems. Proceedings of the IEEE, 95(1):215–233, January 2007. [15] A.D.Dominguez Garcia and C.N.Hadjicostis. Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services. In IEEE International Conference on Smart Grid Communications (SmartGridComm), pages 537–542, October 2010. [16] S.Baros and M.Ilic. On Transient Stability and Voltage Regulation Through MIMO Feedback Linearizing Control of Generator and Energy Storage. In American Control Conference, July 2015. [17] W.Qiao. Dynamic Modeling and Control of Doubly Fed Induction Generators Driven by Wind Turbines. In PSCE, 2009, pages 1–8. IEEE, March 2009. [18] C.Abbey and G.Joos. Supercapacitor Energy Storage for Wind Energy Applications. IEEE Transactions on Industry Applications, 43(3):769– 776, May/June 2007. [19] F.A.Bhuiyan and A.Yazdani. Multimode Control of a DFIG-Based Wind-Power Unit for Remote Applications. IEEE Transactions on Power Delivery, 24(4):2079–2089, October 2009.
3cs.SY
Subexponential parameterized algorithms for planar and apex-minor-free graphs via low treewidth pattern covering∗ Fedor V. Fomin† Daniel Lokshtanov‡ arXiv:1604.05999v1 [cs.DS] 20 Apr 2016 Michal Pilipczukk Dániel Marx§ Marcin Pilipczuk¶ Saket Saurabh∗∗ Abstract We prove the following theorem. Given a planar graph G and an integer k, it is possible in polynomial time to randomly sample a subset A of vertices of G with the following properties: √ • A induces a subgraph of G of treewidth O( k log k), and • for every connected subgraph H of G on at√most k vertices, the probability that A covers 2 the whole vertex set of H is at least (2O( k log k) · nO(1) )−1 , where n is the number of vertices of G. Together with standard dynamic programming techniques for graphs of bounded treewidth, this result gives a versatile technique for obtaining (randomized) subexponential parameterized √ 2 algorithms for problems on planar graphs, usually with running time bound 2O( k log k) nO(1) . The technique can be applied to problems expressible as searching for a small, connected pattern with a prescribed property in a large host graph; examples of such problems include Directed k-Path, Weighted k-Path, Vertex Cover Local Search, and Subgraph Isomorphism, among others. Up to this point, it was open whether these problems can be solved in subexponential parameterized time on planar graphs, because they are not amenable to the classic technique of bidimensionality. Furthermore, all our results hold in fact on any class of graphs that exclude a fixed apex graph as a minor, in particular on graphs embeddable in any fixed surface. ∗ The research leading to these results has received funding from the European Research Council under the European Union’s Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreements no. 267959 (F. V. Fomin), no. 280152 (D. Marx), and no. 306992 (S. Saurabh). The work of D. Marx is also supported by Hungarian Scientific Research Fund (OTKA) grant NK105645. The research of Ma. Pilipczuk is supported by Polish National Science Centre grant UMO-2013/09/B/ST6/03136. The research of Mi. Pilipczuk is supported by Polish National Science Centre grant UMO-2013/11/D/ST6/03073. Mi. Pilipczuk is also supported by the Foundation for Polish Science (FNP) via the START stipend programme. Part of the research of F. Fomin, D. Marx, and Ma. Pilipczuk has been done when they were participating in the “Fine-grained complexity and algorithm design” program at the Simons Institute for Theory of Computing in Berkeley. † Department of Informatics, University of Bergen, Norway, [email protected]. ‡ Department of Informatics, University of Bergen, Norway, [email protected]. § Institute for Computer Science and Control, Hungarian Academy of Sciences (MTA SZTAKI), Hungary, [email protected]. ¶ Institute of Informatics, University of Warsaw, Poland, [email protected]. k Institute of Informatics, University of Warsaw, Poland, [email protected]. ∗∗ Institute of Mathematical Sciences, India, [email protected], and Department of Informatics, University of Bergen, Norway, [email protected]. 1 Introduction Most of natural NP-hard problems on graphs remain NP-hard even when the input graph is restricted to be planar. However, it was realized already in the dawn of algorithm design that the planarity of the input can be exploited algorithmically. Using the classic planar separator theorem of Lipton and√Tarjan [24], √ one can design algorithms working in subexponential time, usually of the form O( n) O( n log n) , for a wide variety of problems that behave well with respect to separators; 2 or 2 such running time cannot be achieved on general graph unless the Exponential Time Hypothesis (ETH) fails [22]. From the modern perspective, the planar separator theorem implies that a planar √ graph on n vertices has treewidth O( n), and the obtained tree decomposition can be used to run a Divide&Conquer algorithm or a dynamic programming subroutine. The idea of exploiting short separators plays a crucial role in modern algorithm design on planar graphs and related graph classes, including polynomial-time, approximation, and parameterized algorithmic paradigms. Let us take a closer look at the area of parameterized complexity. While for most parameterized NP-hard problems the exponential dependence on the parameter is the best we can hope for, under ETH, there are plenty of problems admitting subexponential parameterized algorithms when restricted to planar graphs. This was first observed in 2000 by Alber et al. [1], who obtained a subexponential parameterized algorithm √ for deciding whether a given n-vertex planar graph contains O( k) nO(1) . It turned out that the phenomenon is much more gena dominating set of size k in time 2 eral. A robust framework explaining why various problems like Feedback Vertex Set, Vertex Cover, Dominating Set or Longest Path admit subexponential parameterized algorithms on √ √ planar graphs, usually with running times of the form 2O( k) · nO(1) or 2O( k log k) · nO(1) , is provided by the bidimensionality theory of Demaine et al. [10]. Roughly speaking, the idea is to exploit the relation between the treewidth of a planar graph and the size of a grid minor that can be found in it. More√precisely, the following win/win approach is implemented. Either the treewidth of the graph is O( and the problem can be solved using dynamic programming on a tree decomposition, or √ k) √ a c k × c k grid minor can be found, for some large constant c, which immediately implies that we are working with a yes- or with a no-instance of the problem. Furthermore, it turns out that for a large majority of √problems, the running time yielded by bidimensionality are essentially optimal under ETH: no 2o( k) · nO(1) -time algorithm can be expected. We refer to the survey [11], as well as the textbook [7, Chapter 7] for an overview of bidimensionality and its applications. While the requirement that the problem can be solved efficiently on bounded treewidth graphs is usually not restrictive, the assumption that uncovering any large grid minor provides a meaningful insight into the instance considerably limits the applicability of the bidimensionality methodology. Therefore, while bidimensionality can be extended to more general classes, like excluding some fixed graph as a minor [10, 12], map graphs [8], or unit disk graphs [19], there are many problems that are “ε-close” to being bidimensional, and yet their parameterized complexity remains open for years. One example where such √ √ a situation occurs is the Directed Longest Path problem. While the existence of a k × k grid minor in an undirected graph immediately implies the existence of an undirected path on k vertices, the same principle cannot be applied in the directed setting: even if we uncover a large grid minor in the underlying undirected graph, there is no guarantee that a long directed path can be found, because we do not control the orientation of the arcs. Thus, Directed Longest Path can be solved in time 2O(k) nO(1) on general graphs using color coding√[2], but no substantially faster algorithms on planar graphs were known. On the other hand, no 2o( k) · nO(1) -time algorithm on planar graphs can be expected under ETH, which leaves a large gap between the known upper and lower bounds. Closing this embarrassing gap was mentioned as an open problem in [5,15,32,33]. A similar situation happens for Weighted Longest Path, where 1 we are looking for a k-path of minimum weight in an edge-weighted planar graph; the question about the complexity of this problem was raised in [5, 31]. Another example is k-Cycle: deciding whether a given planar graph contains a cycle of length exactly k. While√ the property of admitting a cycle of length at least k is bidimensional, and therefore admits a 2O( k) nO(1) -time algorithm on planar graphs, the technique fails for the variant when we ask for length exactly k. This question was asked in [5]. We will mention more problems with this behavior later on. The theme of “subexponential algorithms beyond bidimensionality” has recently been intensively investigated, with various success. For a number of specific problems such algorithms were found; these include planar variants of Steiner Tree parameterized by the size of the tree [27, 28], Subset TSP [23], or Max Leaf Outbranching [15]. In all these cases, the algorithms were technically very involved and depended heavily on the combinatorics of the problem at hand. A more systematic approach is offered by the work of Dorn et al. [15] and Tazari [32, 33], who obtained “almost” subexponential algorithm for Directed Longest Path on planar, and more generally, apex-minor-free graphs. More precisely, they proved that for any ε > 0, there is δ such that the Directed Longest Path problem is solvable in time O((1 + ε)k · nδ ) on planar directed graphs, and more generally, on directed graphs whose underlying undirected graph excludes a fixed apex graph as a minor. This technique can be extended to other problems that can be characterized as searching for a connected pattern in a large host graph, which suggests that some more robust methodology is hiding just beyond the frontier of our understanding. Main result. In this paper, we introduce a versatile technique for solving such problems in subexponential parameterized time, by proving the following theorem. Theorem 1. Let C be a class of graphs that exclude a fixed apex graph as a minor. Then there exists a randomized polynomial-time algorithm that, given an n-vertex graph G from C and an integer k, samples a vertex subset A ⊆ V (G) with the following properties: √ (P1) The induced subgraph G[A] has treewidth O( k log k). (P2) For every vertex subset X ⊆ V (G) with |X| ≤ k that induces a connected subgraph of G, the √ 2 O( k log k) probability that X is covered by A, that is X ⊆ A, is at least (2 · nO(1) )−1 . Here, by an apex graph we mean a graph that can be made planar by removing one vertex. Note that Theorem 1 in particular applies to planar graphs, and to graphs embeddable in a fixed surface. Applications. Similarly as in the case of bidimensionality, Theorem 1 provides a simple recipe for obtaining subexponential parameterized algorithms: check how fast the considered problem can be solved on graphs of bounded treewidth, and then combine the treewidth-based algorithm with Theorem 1. We now show how Theorem 1 can be used to obtain randomized subexponential parameterized algorithms for a variety of problems on apex-minor-free classes; for these problems, the existence of such algorithms so far was open even for planar graphs. We only list the most interesting examples to showcase possible applications. Directed and weighted paths and cycles. As mentioned earlier, the question about the existence of subexponential parameterized algorithms for Directed Longest Path and Weighted Longest Path on planar graphs was asked in [5, 15, 32, 33]. Let us observe that on a graph of treewidth1 t, both Directed Longest Path and Weighted Longest Path, as well as their different combinations, like finding a maximum or minimum weight directed path or cycle on k vertices, are solvable in time 2O(t log t) nO(1) by the standard dynamic programming; see e.g. [7, Chapter 7]. This running time can be improved to single-exponential time 2O(t) nO(1) [3, 16, 20]. 1 For Directed Longest Path we speak about the treewidth of the underlying undirected graph. 2 In order to obtain a subexponential parameterized algorithm for, say, Directed Longest Path on planar directed graphs, we do the following. Let G be the given planar directed graph, and let U (G) be its underlying undirected graph. Apply the algorithm of Theorem 1 to U (G), √ which in polynomial time samples a subset A ⊆ V (U (G)) such that G[A] has treewidth at most O( k log k), and the prob√ O( k log2 k) · nO(1) )−1 . ability that A covers some directed k-path in G, provided it exists, is at least (2 Then, we verify whether G[A] admits a directed k-path using standard dynamic programming in time √ 2O( k log k) ·nO(1) . Provided directed k-path exists in the graph, algorithm will find one with √ some √ this 2 2 O( k log k) O(1) −1 O( k log k) probability at least (2 ) . Thus, by making 2 ·n · nO(1) independent runs of the algorithm, we√ can reduce the error probability to at most 1/2. All in all, the obtained algorithm 2 runs in time 2O( k log k) · nO(1) and can only report false negatives with probability at most 1/2 Note that in order to apply the dynamic programming algorithm, we need to construct a suitable tree decomposition of G[A]. However, a variety of standard algorithms, e.g., the classic 4-approximation of Robertson and Seymour [30], can be used to construct such an approximate tree decomposition within the same asymptotic running time. Actually, a closer look into the proof of Theorem 1 reveals that the algorithm can construct, within the same running time, a tree decomposition of G[A] certifying the upper bound on its treewidth. Observe that the same approach works also for any apex-minor-free class C, and can be applied also to Weighted Longest Path and k-Cycle. We obtain the following corollary. Corollary 2. Let C be a class of graphs that exclude some fixed apex graph as a minor. Then problems: Weighted Longest Path, k-Cycle, and Directed Longest Path, are all solvable √ 2 O( k log k) in randomized time 2 · nO(1) on graphs from C. In case of Directed Longest Path, we mean that the underlying undirected graph of the input graph belongs to C. Note here that the approach presented above works in the same way for various combinations and extensions of problems in Corollary 2, like weighted, colored, or directed variants, possibly with some constraints on in- and out-degrees, etc. In essence, the only properties that we need is that the sought pattern persists in the subgraph induced by the covering set A, and that it can be efficiently found using dynamic programming on a tree decomposition. To give one more concrete example, Sau and Thilikos in [31] studied the problem of finding a connected k-edge subgraph with all vertices of degree at most some integer ∆; for ∆ = 2 this corresponds to finding a k-path or a k-cycle. For fixed ∆ they gave a subexponential algorithm on (unweighted) graphs excluding some fixed graph as a minor, and asked if the weighted version of this problem can be solved in subexponential parameterized time. Theorem 1 immediately implies that for fixed ∆, the weighted √ 2 O( k log k) · nO(1) on apex-minor-free graphs. variant of the problem is solvable in randomized time 2 Subgraph Isomorphism. Subgraph Isomorphism is a fundamental problem, where we are given two graphs: an n-vertex host graph G and a k-vertex pattern graph P . The task is to decide whether P is isomorphic to a subgraph of G. Eppstein [17] gave an algorithm solving Subgraph Isomorphism on planar graphs in time k O(k) n, which was subsequently improved by Dorn [14] to 2O(k) n. The first implication of our main result for Subgraph Isomorphism concerns the case when the maximum degree of P is bounded by a constant. Matoušek and Thomas [25] proved that if a tree decomposition of the host graph G of width t is given, and the pattern graph P is connected and of maximum degree at most some constant ∆, then deciding whether P is isomorphic to a subgraph of G can be done in time O(k t+1 n). By combining this with Theorem 1 as before, we obtain the following. Corollary 3. Let C be a class of graphs that exclude some fixed apex graph as a minor, and let ∆ be a fixed constant. Then, given a connected graph P with at most k vertices and maximum degree not exceeding ∆, and a graph G ∈ C on n vertices, it is possible to decide whether P is isomorphic √ 2 O( k log k) to a subgraph of G in randomized time 2 · nO(1) . 3 In a very recent, unpublished work, Bodlaender et al. [4] proved that Subgraph Isomorphism on planar graphs cannot be solved in time 2o(n/ log n) unless ETH fails. The lower bound of Bodlaender et al. holds for two very special cases. The first case is when the pattern graph P is a tree and has only one vertex of super-constant degree. Then second case is when P is not connected, but its maximum degree is a constant. Thus, the results of Bodlaender et al. show that both the connectivity and the bounded degree constraints on pattern P in Corollary 3 are necessary to keep the square root dependence on k in the exponent. However, a possibility of solving Subgraph Isomorphism in time 2O(k/ log k) · nO(1) , which is still parameterized subexponential, is not ruled out by the work of Bodlaender et al. Interestingly enough, Bodlaender et al. [4], also give a matching dynamic programming algorithm that can be combined with our theorem. Theorem 4 ( [4]). Let H be a fixed graph, and let us fix any ε > 0. Given a pattern graph P on at most k vertices, and an H-minor-free host graph G of treewidth at most O(k 1−ε ), it is possible to decide whether P is isomorphic to a subgraph of G in time 2O(k/ log k) · nO(1) . We remark that Bodlaender et al. [4] claim only a subexponential exact algorithm with running time 2O(n/ log n) , but the dynamic programming subroutine underlying this result actually gives the stronger algorithmic result as stated above. By combining Theorem 4 with Theorem 1 in the same way as before, we obtain the following. Corollary 5. Let C be a class of graphs that exclude some fixed apex graph as a minor. Then, given a connected graph P with at most k vertices, and a graph G ∈ C on n vertices, it is possible to decide whether P is isomorphic to a subgraph of G in randomized time 2O(k/ log k) · nO(1) . Let us stress here that the lower bounds of Bodlaender et al. [4] show that the running time given by Corollary 5 is tight: no 2o(k/ log k) · nO(1) -time algorithm can be expected under ETH. Local search. Fellows et al. [18] studied the following parameterized local search problem on apexminor-free graphs. In the LS Vertex Cover problem we are given an n-vertex graph G, a vertex cover S in G, and an integer k. The task is to decide whether G contains a vertex cover S 0 , such that |S 0 | < |S| and the Hamming distance |S4S 0 | between sets S and S 0 is at most k. In other words, for a given vertex cover, we ask if there is a smaller vertex cover which is k-close to the given one, in terms of Hamming (edit) distance. Fellows et al. [18] gave an algorithm solving LS Vertex Cover in time 2O(k) · nO(1) on planar graphs. The question whether this can be improved to subexponential parameterized time was raised in [9, 18]. The crux of the approach of Fellows et al. [18] is the following observation. If there is solution to LS Vertex Cover, then there is a solution S 0 , such that S4S 0 induces a connected subgraph in G. Since S4S 0 contains at most k vertices and is connected, √ our Theorem 1 can be used to sample a vertex subset A that induces a subgraph of treewidth O( k log k) and covers S4S 0 with high probability. Thus, by applying the same principle of independent repetition of the algorithm, we basically have search for suitable sets S \ S 0 and S 0 \ S in the subgraph of G induced by A. We should be, however, careful here: there can be edges between A and its complement, and these edges also need to be covered by S 0 , so we cannot just restrict our attention to G[A]. To handle this, we apply the following preprocessing. For every vertex v ∈ A, if v is adjacent to some vertex outside of A that is not included S, then v must be in S and needs also to remain in S 0 . Hence, we delete all such vertices from G[A], and it is easy to see that now the problem boils down to looking for feasible S \ S 0 and S 0 \√ S within the obtained induced subgraph. This can be easily done in time O(t) O(1) 2 ·n , where t ≤ O( k log k) is the treewidth of this subgraph; hence we obtain the following: Corollary 6. Let C be a class of graphs that exclude some fixed apex graph as a minor. Then LS √ 2 O( k log k) · nO(1) . Vertex Cover on graphs from C can be solved in randomized time 2 4 Steiner tree. Steiner Tree is a fundamental network design problem: for a graph G with a prescribed set of terminal vertices S, and an integer k, we ask whether there is a tree on at most k edges that spans all terminal vertices. Pilipczuk et al. [27] gave an algorithm for this problem 2/3 with running time 2O((k log k) ) · n on planar graphs and on graphs of bounded genus. With much √ more additional work, the running time was improved to 2O( k log k) · n in [28]. Again, by combining the standard dynamic programming solving Steiner Tree on graphs of treewidth t in time 2O(t log t) nO(1) , see e.g. [6], with Theorem 1, we immediately obtain the following. Corollary 7. Let C be a class of graphs that exclude some fixed apex√ graph as a minor. Then 2 Steiner Tree on graphs from C can be solved in randomized time 2O( k log k) · nO(1) . Contrary to the much more involved algorithm of Pilipczuk et al. [28], the algorithm above can equally easily handle various variants of the problem. For instance, we can look for a Steiner tree on k edges that minimizes the total weight of the edges, or we can ask for a Steiner out-branching in a directed graph, or we can put additional constraints on vertex degrees in the tree, and so on. Outline. In Section 2 we give an informal overview of the proof of Theorem 1 for the case of planar graphs. We try rather to focus on main intuitions and concepts, than describe technical details necessary for a formal reasoning. Then, in Sections 3 and 4 we recall the standard concepts and introduce auxiliary technical results. The full proof of Theorem 1 is contained in Section 5. We conclude in Section 6 by listing open problems raised by our work. The appendix outlines possible extensions to multiple components of the pattern and arbitrary proper minor-closed graph classes. 2 Overview of the proof of Theorem 1 We now give an informal overview of the proof of Theorem 1 in the case of planar graphs. In fact, the only two properties of planar graphs which are essential to the proof are (a) planar graphs are minor-closed, and (b) they have locally bounded treewidth by a linear function, that is, there exists a constant ctw such that every planar graph of radius k has treewidth at most ctw · k. In fact, for planar graphs one can take ctw = 3 [29], and as shown in [13], the graph classes satisfying both (a) and (b) are exactly graph classes excluding a fixed apex graph as a minor. However, in a planar graph we can rely on some topological intuition, making the presentation more intuitive. In the description we assume familiarity with tree decompositions; see Section 3 for a formal definition. Locally bounded treewidth of planar graphs. As a warm-up, let us revisit a proof that planar graphs have locally bounded treewidth. The considered proof yields a worse constant than ctw = 3, but it is insightful for our argumentation. Let G0 be a graph of radius k, that is, there exists a root vertex r0 such that every vertex of G0 is within distance at most k from r0 . As with most proofs showing that a graph in question has bounded treewidth, we will recursively construct a tree decomposition of bounded width. To this end, we need to carefully define the state of the recursion. We do it as follows: the recursive step aims at decomposing a subgraph G of the input graph G0 , with some chosen set of terminals T ⊆ V (G) on the outer face of G. The terminals T represent connections between G and the rest of G0 . In order to be able to glue back the obtained decompositions from the recursive step, our goal is to provide a tree decomposition of G with T contained in the root bag of the decomposition, so that later we can connect this bag to decompositions of other pieces of the graph that also contain the vertices of T . During the process, we keep the invariant that |T | ≤ 8(k + 2), allowing us to bound the width of the decomposition. Furthermore, the assumption that G0 is of bounded radius projects onto the recursive subinstances by the following invariant: every vertex of G is within distance at most k from some terminal. 5 In the recursive step, if T = V (G), |T | < 8(k + 2), or G is not connected, then we can perform some simple steps that we do not discuss here. The interesting case is when |T | = 8(k + 2). We partition T along the outer face into four parts of size 2(k + 2) each, called north, east, south, and west terminals. We compute minimum vertex cuts between the north and the the south terminals, and between the east and the west terminals. If, in any of these directions, a cut W of size strictly smaller than 2(k + 2) is found, then we can make a divide-and-conquer step: for every connected component D of G − (T ∪ W ) we recurse on the graph G[N [D]] with terminals N (D), obtaining a tree decomposition TD . Finally, we attach all the obtained tree decompositions below a fresh root node with bag T ∪ W , which is of size less than 10(k + 2). The crux is that such a separator W is always present in the graph. Indeed, otherwise there would exist 2(k + 2) disjoint paths between the north and the south terminals and 2(k + 2) disjoint paths between the east and the west terminals. Consider the region bounded by the two middle north-south and the two middle east-west paths: the vertices contained in this region are within distance larger than k from the outer face, on which all terminals lie (see Fig. 1a). This contradicts our invariant. Our recursion. In our case, we use a similar, but much more involved recursion scheme. In the recursive step, we are given a minor G of the input graph G0 , with some light terminals T li ⊆ V (G) on the outer face, and some heavy terminals T he ⊆ V (G)\T li lying anywhere in the graph. As before, the terminals represent connections to the other parts of the graph. We require that the terminals T := T li ∪T he need to be contained in the root bag of the tree decomposition that √is going to be constructed e k), in order to bound the in this recursion step. Moreover, we maintain an invariant that |T | = O( width of the decomposition. The graph G is a minor of the input graph G0 , since we often prefer to contract some edges instead of deleting them; thus we maintain some distance properties of G. In our recursion, the light terminals originate from cutting the graph in a similar fashion as in the proof that planar graphs have locally bounded treewidth, presented above. Hence, we keep the invariant that light terminals lie on the outer face. We sometimes need to cut deeply inside G. The produced terminals are heavy, but every such step corresponds to a significant progress in detecting the pattern, and hence such steps will be rare. In every such step, we artificially provide connectivity of the subinstances through the heavy terminals; this is technical and omitted in this overview. Recall that our goal is to preserve a connected k-vertex pattern from the input graph. Here, the pattern can become disconnected by recursing on subsequent separations, but such cuttings will always be along light terminals. Therefore, we define a pattern in a subinstance (G, T li , T he ) solved in the recursion as a set X ⊆ V (G) of size at most k such that every connected component of G[X] contains a light terminal. Hence, compared to the presented proof of planarity implying √ e k), locally bounded treewidth, we aim at more restricted width of the decomposition, namely O( but we can contract or delete parts of G, as long as the probability of spoiling a fixed, but unknown k-vertex pattern X remains inverse subexponential in k. Clustering. Upon deleting a vertex or an edge, some distance properties that we rely on can be broken. We need the following sampling procedure that partitions the graph into connected components of bounded radii, such that the probability of spoiling a particular pattern is small. Theorem 8. There exists a randomized polynomial-time algorithm that, given a graph G on n > 1 vertices and a positive integer k, returns a vertex subset B ⊆ V (G) with the following properties: (a) The radius of each connected component of G[B] is less than 9k 2 log n. (b) For each vertex subset X ⊆ V (G) of size at most k, the probability that X ⊆ B is at least 1 − k1 . Proof sketch. Start with H := G and iteratively, as long as V (H) 6= ∅, perform the following procedure. Pick arbitrary v ∈ V (H), and choose a radius r as follows. Start with r = 1 and 6 east west north M south (b) (a) M z z (c) (d) z z M M (e) Figure 1: Illustrations for Section 2. (a) The proof that planarity implies locally bounded treewidth. The vertices in the gray area are too far from the terminals. (b) Standard partitioning step. √ The e margin is gray and the islands are separated by dashed lines. The blue separator consists of O( k) islands and vertices of the margin. If the√blue islands are disjoint from the solution, we delete them and e k). (c) The situation if the standard partitioning step cannot obtain a balanced separator of size O( be applied: we have a component of the pattern (green) stretched between a light terminal and a vertex z inside the margin. (d) Chain of z-T li separators: a sparse separator that partitions the pattern in a balanced fashion is highlighted. (e) Contraction of a path Pi (blue) onto its public vertices (blue circles). A significant number of the vertices of the pattern become much closer to the light terminals. iteratively, given current radius r, with probability p := (2k 2 )−1 accept r, and with probability 1 − p increase it by one and continue (i.e., choose r according to the geometric distribution with success probability p). Given an accepted radius r, put all vertices within distance less than r from v into B, and delete from H all vertices within distance at most r from v. Since the procedure performs at most n steps, by union bound the probability of some radius 1 exceeding 9k 2 lg n is at most 2k . Fix a vertex x ∈ V (G). We have x ∈ / B only if at some point x ∈ V (H) and the distance between v and x in H is exactly r when the radius r gets accepted. However, in this case, if the radius r is increased, x is put into B regardless of subsequent random 7 choices. Consequently, for a fixed vertex x ∈ V (G), the probability that x ∈ / B is at most p. By 1 union bound, the probability that X 6⊆ B is at most |X|p, which is at most 2k for |X| ≤ k. Standard divide&conquer step. We would like to apply a similar divide&conquer step as in the presented proof that planar graphs have √ locally bounded treewidth. The problem is that we e can only afford a separator W of size O( k), however the radius of the graph can√be much larger. √ e k) Let us define the margin M to be the set of vertices within distance at most 2000 k lg k = O( from any light terminal. Intuitively, our case should be easy if every vertex of the pattern X is in the margin: we could then just throw away all vertices of G − M and use locally bounded treewidth, as the light terminals lie on the outer face. However, we cannot just branch (guess) whether this is the case: the information that G − M contains a vertex of the pattern is not directly useful. Instead, we make a localized analog of this guess: we identify a relatively compact set of vertices of G − M that prohibit us from making a single step of the recursion sketched above. First, we apply the clustering procedure (Theorem 8) to the graph G − M , so that we can assume that every connected component of G − M , henceforth called an island, is of radius bounded polynomially in k and lg n. Second, we construct an auxiliary graph H by contracting every island C into a single √ √ e k) vertex uC . Note that now in H every vertex is√within distance at most 2000 k lg k + 1 = O( e k). By standard arguments, we can find a balanced from a light terminal. Thus H has treewidth O( √ e k) such that every connected component of separator WH in H, that is, a separator of size O( H − WH , after lifting it back to G by reversing contractions, contains (a) at most |T |/2 terminals from G, and (b) at most |V (G) \ T |/2 non-terminal vertices of G. √ e k) The separator WH√can be similarly lifted to a separator W in G that corresponds to O( e k) islands. Now it is useful to make a guess if some vertex of an island in vertices of M and O( W (i.e., a vertex of W \ M ) belongs to the solution: if this is not the case, we can delete the whole W \ M from the graph, and apply the procedure recursively to connected components √ of G − W ; if e k) components this is the case, the area to search for such a vertex of the pattern is limited to O( of radius polynomial in k and lg n. Therefore, with some probability q we decide to assume that W \ M contains a vertex of the pattern, and with the remaining probability 1 − q we decide that this is not the case.√In the latter case, we remove W \ M from the graph, and recurse using W ∩ M , e k), as a separator; see Fig. 1b. The fact that every connected component of which has size O( √ e k). G − W contains at most |T |/2 terminals allows us to keep the invariant that |T | = O( Let us now analyze what probability q we can afford. Observe that in every subinstance solved recursively, the number of nonterminal vertices is halved. Thus, every vertex x of the pattern X is contained in G only in O(lg n) subinstances in the whole recursion tree; here we exclude the subinstances where x is a light terminal, because then its treatment is determined by the output specification of the recursive procedure. Consequently, we care about correct choices only in O(k lg n) steps of the recursion. In these steps, we want not to make a mistake during the clustering procedure (1/k failure probability) and to correctly guess that W \ M is disjoint with the pattern, provided this is actually the case (q failure probability). Thus, if we put q = 1/k, then the probability that we succeed in all O(k lg n) steps we care about is inverse-polynomial in n; this is sufficient for our needs. Island with a vertex of the pattern. We are left with the second case, where some island C ⊆ W intersects the pattern. We have q = 1/k probability of guessing correctly that this is the case, and independently we have (1 − 1/k) probability of not making a mistake √ in the clustering step. e The bound on the radii of the islands, as well as the fact that only O( k) islands are contained in W , allow us to localize this vertex of the pattern even closer. Recall that the radius of each island is bounded by 9k 2 lg n. For the rest of this overview we assume that lg n is bounded polynomially in k, and hence the radius of each island is polynomial in k. Intuitively, this is because if, say, we 8 100 100 had lg n > 100 · k 100 , then n > 2100k and with 2100k allowed factor in the running time bound √ e k) O( we can apply a variety of other algorithmic techniques. More formally, we observe that (lg n) √ e is bounded by 2O( k) · no(1) , which is sufficient to make sure that all the experiments whose success √ e k) O( probability depend on lg n succeed simultaneously with probability at least (2 · no(1) )−1 . We first guess (by sampling at random) an island C ⊆ W that contains a vertex of the pattern. Then, we pick an arbitrary vertex z ∈ C, and guess (by sampling at random) the distance d in C between z and the closest vertex of the pattern in C. By contracting all vertices within distance less than d from z, with success probability inverse-polynomial in k, we arrive at the following situation: (see Fig. 1c) we have a vertex z ∈ / M such that either z or a neighbor of z belongs to the pattern X. Chain of separators. Hence, one of the components of G[X] is stretched across the margin M , between a light terminal on the outer face and the vertex z inside the margin. Our idea now is to use this information to cut X in a balanced fashion. Note that we have already introduced an inverse-polynomial in k multiplicative factor in the success probability. Hence, to maintain the overall inverse-subexponential dependency on k in the success probability, we should aim at √ e k). a progress that will allow us to bound the number of such steps by O( li Unfortunately, it √ is not obvious how to find such a separation. It is naive to hope for a z-T e k), and a larger separator seems useless, if there is only one. However, we can separator of size O( aim at a Baker-style argument: if we find a chain of p pairwise disjoint z-T li separators C1 , C2 , . . . , Cp (see Fig. 1d), we could guess a “sparse one”, and separate along it. Since the separators are pairwise disjoint, there exists a “sparse” separator Ci with at most k/p vertices of the pattern. On the other hand, since the pattern contains a component stretched from z to a light terminal, every Ci intersects the pattern. If we omit the first and the last p/4 separators, and look for a sparse separator in between with at most 2k/p by means of guessing only 2k/p vertices of X. If all separators are of size bounded e 2/3 ) O(k polynomially in k, the optimal choice is p ∼ k 2/3 , which leads to success probability . √ inverse in 2 However, we can apply a bit smarter counting argument. Take p = 120 k lg k. Look at Cp/2 and assume that at most half of the vertices of X lie on the side of Cp/2 with separators Ci for i < p/2; the other case is symmetric. The crucial observation is the following: there exists √ an index i ≤ p/2 such that if |Ci ∩ X| = α then Ci partitions X into two parts of size at least α k/10 each. Indeed, otherwise we have that for every i ≤ p/2 it holds that 10 X |X ∩ Ci | ≥ √ · |X ∩ Cj |. k j<i √ √ S S This implies |X ∩ j≤i Cj | ≥ (1 + 10/ k)i , and |X ∩ j≤p/2 Cj | > k for p = 120 k lg k. Hence, we guess (by sampling at random) such an index i, the value of α = |X ∩ Ci |, and the set −O(α) we partition X ∩ Ci . If the size of Ci is bounded polynomially √ in k, with success probability k the pattern into two parts of size at least α k/10 each. A simple amortization argument shows √ e k) − O( that all these guessings incur only the promised 2 multiplicative factor in the overall success probability. Furthermore, as such a step creates α heavy terminals, it can be easily seen that the √ e k). total number of heavy terminals will never grow beyond O( However, the above argumentation assumes we are given such a chain of separators Ci : they are not only pairwise disjoint, but also of size polynomial in k. Let us now inspect how to find them. Duality. In the warm-up proof of planar graphs having locally bounded treewidth, the separator W is obtained from the classic Menger’s maximum flow/minimum cut duality. Here, we aim at a 9 chain of separators, but we require that their sizes are polynomial in k. It turns out that we can find such a chain by formulating a maximum flow of minimum cost problem, and extracting the separator chain in question from the optimum solution to its (LP) dual. Theorem 9. There is a polynomial-time algorithm that given a connected graph G, a pair s, t ∈ V (G) of different vertices, and positive integers p, q, outputs one of the following structures in G: (a) A chain (C1 , . . . , Cp ) of (s, t)-separators with |Cj | ≤ 2q for each j ∈ [p]. S (b) A sequence (P1 , . . . , Pq ) of (s, t)-paths with |(V (Pi ) ∩ i0 6=i V (Pi0 )) \ {s, t}| ≤ 4p for each i ∈ [q]. Proof sketch. We formulate the second outcome as a maximum flow of minimum cost problem in an auxiliary graph, where every vertex v ∈ V (G) \ {s, t} is duplicated into two copies: one of cost 0 and capacity 1, and one of cost 1 and infinite capacity. We ask for a minimum-cost flow of size 2q from s to t. If the cost of such flow is at most 2pq, the projection onto G of the cheapest q flow paths gives the second output. Otherwise, we read the desired chain of separators (C1 , . . . , Cp ) as distance layers from s in the graph with distances imposed by the solution to the dual linear program. Since all light terminals lie on the outer face, we can attach an auxiliary √ root vertex r0 adjacent to all light terminals, and apply Theorem 9 to (s, t) = (r0 , z), p = 120 k lg k and q = poly(k). If the algorithm of Theorem 9 returns a chain of separators, we proceed as described before. Thus, we are left with the second output: q = poly(k) nearly-disjoint paths from T li to z. Nearly-disjoint paths. The vertex set of every path Pi can be partitioned into public vertices Pub(Pi ), the ones used √ also by other paths, and the remaining private vertices Prv(Pi ). We have |Pub(Pi )| ≤ 4p = 480 k lg k, and the sets Prv(Pi ) are pairwise disjoint. We can assume q > k, so there exists a path Pi such that Prv(Pi ) is disjoint with the pattern X. By incurring an additional 1/k multiplicative factor in the success probability, we can guess, by sampling at random, such index i. How can we use such a path Pi ? Clearly, we can delete the private vertices of Pi , because they can be assumed not to be used by the patter X. However, we choose a different way: we contract them onto neighboring public vertices along Pi , reducing Pi to a path with vertex set Pub(Pi ). Observe that by this operation the vertex z changes its location in G: from a vertex deeply√inside G, namely not within the margin M , it is moved to a place within distance |Pub(Pi )| ≤ 480 k lg k from the light terminals, which is less than a quarter of the width of the margin; see Fig. 1e. Furthermore, by the connectivity assumptions on the pattern X, the vertex z drags along a number of vertices of X that are close to it. More precisely, √ if Q is a path in G[X] connecting z or a neighbor of z with a light terminal, then the first 500 k lg k vertices on Q are moved from √ being√within distance at least 1500 k lg k from all light terminals, to being within distance at most 1000 k lg k from some light √ terminal. Hence, if we define that a vertex x ∈ X is far if it is within distance larger than 1000 k lg k (i.e., half of the width of the margin) from all light terminals, √ and close otherwise, then by contracting the private vertices of Pi as described above, at least 500 k lg k vertices of k change their status from far to close. By a careful implementation of all separation steps, we can ensure that no close vertex of X √ e k) times. becomes far again. Consequently, we ensure that the above step can happen only O( Since the probability of succeeding in all guessings within this step is inverse-polynomial in k, this √ e incurs only a 2−O( k) multiplicative factor in the overall success probability. This finishes the overview of the proof of Theorem 1. We invite the reader to the next sections for a fully formal proof, which is moreover conducted for an arbitrary apex-minor-free class. 10 3 Preliminaries Notation. We use standard graph notation; see, e.g., [7] for a reference. All graphs considered in this paper are undirected and simple (without loops or multiple edges), unless explicitly stated. For a vertex u of a graph G, by NG (u) = {v : uv ∈ E(G)} and NG [u] = {u} ∪ NG (u) we denote the open and S closed neighborhood of u, respectively. Similarly, for a vertex subset X ⊆ V (G), by NG [X] = u∈X NG [u] and NG (X) = NG [X] \ X we denote the closed and open neighborhood of X, respectively. The subscript is dropped whenever it is clear from the context. For an undirected graph G and an edge uv ∈ E(G), by contracting uv we mean the following operation: remove u and v from the graph, and replace them with a new vertex that is adjacent to exactly those vertices that were neighbors of u or v in G. Note that this definition preserves the simplicity of the graph. By contracting v onto u we mean the operation of contracting the edge uv and renaming the obtained vertex as u. More generally, if X is a subset of vertices with G[X] being connected, and u ∈ / X is such that u has a neighbor in X, then by contracting X onto u we mean the operation of exhaustively contracting a neighbor of u in X onto u up to the point when X becomes empty. Note that due to the connectivity of G[X] such outcome will always be achieved. We say that H is a minor of G if H can be obtained from G by means of vertex deletions, edge deletions, and edge contractions. An apex graph is a graph that can be made planar by removing one of its vertices. For a positive integer k, we denote [k] = {1, . . . , k}. We denote lg x = log2 x. Notation log is used only under the O(·)-notation, where multiplicative constants are hidden anyways. We also denote exp[t] = et , where e is the base of the natural logarithm. Tree decompositions. Let G be an undirected graph. A tree decomposition T of G is a rooted tree T with a bag β(x) ⊆ V (G) associated with each its node x, which satisfies the following conditions: (T1) For each u ∈ V (G) there is some x ∈ V (T ) with u ∈ β(x). (T2) For each uv ∈ E(G) there is some x ∈ V (T ) with {u, v} ⊆ β(x). (T3) For each u ∈ V (G), the node subset {x ∈ V (T ) : u ∈ β(x)} induces a connected subtree of T . The width of a tree decomposition T is maxx∈V (T ) |β(x)| − 1, and the treewidth of G is equal to the minimum possible width of a tree decomposition of G. We assume reader’s familiarity with basic combinatorics of tree decompositions, and hence we often omit a formal verification that some constructed object is indeed a tree decomposition of some graph. The following fact about the existence of balanced separators in graphs of bounded treewidth is well-known, see e.g. [7, Lemma 7.19]. Lemma 10. Let G be a graph of treewidth at most t and let w : V (G) → R≥0 be a nonnegative weight function on vertices of G. Then there exists a subset of vertices X ⊆ V (G) of size at most t + 1 such that for every connected component C of G − X the following holds: w(V (C)) ≤ w(V (G))/2, where w(A) = P u∈A w(u) for any vertex subset A. Locally bounded treewidth and apex-minor-freeness. For the whole proof we fix a class C of graphs that satisfies the following properties: (a) C is closed under taking minors. 11 (b) C has locally bounded treewidth. That is, there exists a function f : N → N such that any connected graph G from C of radius r has treewidth bounded by f (r). Demaine and Hajiaghayi [13] proved that any class C that satisfies properties (a) and (b) is actually apex-minor-free. More precisely, there exists some apex graph H such that no graph from C admits H as a minor. However, Grohe [21] proved that every apex-minor-free class of graphs has locally bounded treewidth, where moreover the function f is linear. As observed by Demaine and Hajiaghayi [13], these fact combined yield the following. Proposition 11. If a class of graphs C satisfies properties (a) and (b), then there is a constant ctw such that for every connected graph G from C of radius r, the treewidth of G is bounded by ctw · r. The results of Grohe [21] in particular show that if C is a class of graphs that exclude a fixed apex graph as a minor, then the closure of C under taking minors satisfies properties (a) and (b), and hence also the property implied by Proposition 11. Hence, it suffices to prove Theorem 1 for any graph class C that satisfies properties (a) and (b). From now on, we fix the constant ctw yielded by Proposition 11 for the class C. To avoid corner cases, we assume without loss of generality that ctw ≥ 10. 4 Auxiliary tools In this section we introduce auxiliary technical tools that will be needed in the proof: a clustering procedure that reduces the radius of the graph, and a duality result concerning almost disjoint paths and chains of separators between a pair of vertices. 4.1 Clustering procedure The following result was stated as Theorem 8 in Section 2. Theorem 12. There exists a randomized polynomial-time algorithm that, given a graph G on n > 1 vertices and a positive integer k, returns a vertex subset B ⊆ V (G) with the following properties: (a) The radius of each connected component of G[B] is less than 9k 2 lg n. (b) For each vertex subset X ⊆ V (G) of size at most k, the probability that X ⊆ B is at least 1 − k1 . Proof. Consider the following iterative procedure which constructs a set B0 . We start with V0 = V (G). In the step i, given a set Vi−1 ⊆ V (G), we terminate the procedure if Vi−1 = ∅. Otherwise we pick an arbitrary vertex vi ∈ Vi−1 and we randomly select a radius ri according to the geometric distribution with success probability p := 2k12 . Given vi and ri , we insert BallG[Vi−1 ] (vi , ri − 1) into B0 and define Vi := Vi−1 \ BallG[Vi−1 ] (vi , ri ). That is, we delete from the graph vertices within distance at most ri from vi in G[Vi−1 ], and put the vertices within distance less than ri into B0 . Finally, at the end of the procedure, if any of the selected radii ri is larger than 9k 2 lg n, we return B = ∅, and otherwise we return B = B0 . Clearly, the procedure runs in polynomial time, as at every step at least the vertex vi is removed from Vi−1 , and hence at most n iterations are executed. For the radii of the connected components of G[B0 ], note that the fact that we insert into B0 vertices within distance less than ri from vi , but delete from Vi vertices within distance at most ri from vi , ensures that at every step i of the iteration we have NG [B0 ] ∩ Vi = ∅. Consequently, BallG[Vi−1 ] (vi , ri − 1) induces a connected component of G[B0 ], and is of radius less than ri . Since we return B = ∅ instead of B = B0 if any of the selected radii ri exceeds 9k 2 lg n, the upper bound on the radii of the connected components of G[B] follows. 12 It remains to argue that any fixed k-vertex subset X ⊆ V (G) survives in B with high probability. First, note that for fixed i we have that P(ri > 9k 2 lg n) ≤ (1 − p)9k 2 lg n ≤ e−4.5 lg n < n−3 < 1 ; 2kn here, we use the fact that p = 2k12 and the inequality 1 − x ≤ e−x . Thus, as there are at most n 1 iterations, with probability less than 2k the algorithm returns B = ∅ because of some ri exceeding 2 the limit of 9k lg n. Second, we analyze the probability that X ⊆ B0 . Let us fix some x ∈ X. The only moment where the vertex x could be deleted from the graph, but not put into B0 , is when x is within distance exactly ri from the vertex vi in an iteration i. It is now useful to think of the choice of ri in the iteration i as follows: we start with ri := 1 and then, iteratively, with probability p accept the current radius, and with probability 1 − p increase the radius ri by one and repeat. However, in the aforementioned interpretation of the geometric distribution, when ri = distG[Vi−1 ] (vi , x), with probability p the radius ri is accepted (and x is deleted but not put in B0 ), but with probability (1 − p) the radius ri is increased, and the vertex x is included in the ball BallG[Vi−1 ] (vi , ri − 1) ⊆ B0 . Consequently, the probability that a fixed vertex x ∈ X is not put into B0 is at most p. By the union bound, we infer that 1 1 the probability that X 6⊆ B0 is at most kp = 2k . Together with the 2k upper bound on the probability 2 that the maximum radius among ri exceeds 9k lg n, which results in putting B = ∅ instead of B = B0 , we have that the probability that X 6⊆ B is at most k1 . This concludes the proof. 4.2 Duality We start with a few standard definitions. Definition 13. For a graph H and its vertex u, by reach(u, H) we denote the set of vertices of H reachable from u in H. Suppose G is a connected graph, and s, t are its different vertices. An (s, t)-separator is a subset C of vertices of G such that s, t ∈ / C and t ∈ / reach(s, G − C). An (s, t)-separator is minimal if no its proper subset is also an (s, t)-separator. Definition 14. A sequence (C1 , C2 , . . . , Ck ) of minimal (s, t)-separators is called an (s, t)-separator chain if all of them are pairwise disjoint and for each 1 ≤ j < j 0 ≤ k, the following holds: Cj ⊆ reach(s, G − Cj 0 ) and Cj 0 ⊆ reach(t, G − Cj ). We now state and prove the main duality result, that is, Theorem 9 from Section 2. Theorem 15. There is a polynomial-time algorithm that given a connected graph G, a pair s, t ∈ V (G) of different vertices, and positive integers p, q, outputs one of the following structures in G: (a) An (s, t)-separator chain (C1 , . . . , Cp ) with |Cj | ≤ 2q for each j ∈ [p]. S (b) A sequence (P1 , . . . , Pq ) of (s, t)-paths with |(V (Pi ) ∩ i0 6=i V (Pi0 )) \ {s, t}| ≤ 4p for each i ∈ [q]. Proof. Our approach is as follows: we formulate the second output as a min-cost max-flow problem in an auxiliary graph H. If the cost of the computed flow is not too large, a simple averaging argument yields the desired paths Pi from the flow paths. If the cost is large, we look at the dual of the min-cost max-flow problem, expressed as a linear program, which is in fact a distance LP. Then we read the separators Ci as layers of distance from the vertex s. Let us now proceed with formal argumentation. We define a graph H as follows. Starting with H := G, we replace every vertex v ∈ V (G) \ {s, t} with two copies v0 and v1 : the copy v0 has capacity 1 and cost 0, while the copy v1 has infinite 13 capacity and cost 1. The vertex s is a source of size 2q and cost 0, and the vertex t is a sink of size 2q and cost 0. The edges of H are defined naturally: every edge uv of G gives rise to up to four edges in H, between the copies of u and the copies of v. In the graph H, we ask for a minimum-cost vertex-capacitated flow from s to t of size 2q. Clearly, such a flow exists for connected graphs G, as every vertex v1 is of infinite capacity. Since all the costs and capacities are integral or infinite, in polynomial time we can find a minimum-cost solution that 0 that carry unit flow each. Let C be the total cost of this decomposes into 2q flow paths P10 , P20 , . . . , P2q 0 flow. Every path Pi induces a walk Pi in G: whenever Pi0 traverses a vertex v0 or v1 , the path Pi traverses the corresponding vertex v. By shortcutting if necessary, we may assume that each Pi is a path. In this proof, we consider every path P from s to t (either in G or in H) as oriented from s towards t; thus, the notions of a predecessor/successor on P or the relation of lying before/after on P are well-defined. Let us define the cost of a path Pi , denoted c(Pi ), as the number of internal vertices that Pi shares with other paths. That is, [ c(Pi ) := |(V (Pi ) ∩ V (Pj )) \ {s, t}|. j6=i Observe that, due to the capacity constraints, if a vertex v ∈ / {s, t} lies on h > 1 paths Pi1 , Pi2 , . . . , Pih , then all but one of the paths Pi0j have to use the vertex v1 , inducing total cost h − 1 for the minimumcost flow. Since h − 1 ≥ h/2 for h > 1, it follows that 2q X c(Pi ) ≤ 2C. i=1 P We infer that if C ≤ 2pq, then 2q i=1 c(Pi ) ≤ 4pq. A standard averaging argument now shows that for at least q paths Pi we have c(Pi ) ≤ 4p. This yields the second desired output. Thus we are left with the case when C > 2pq. Our goal is to find a separator chain suitable as the first desired output. To this end, we formulate the discussed minimum-cost flow problem as a linear program, and we analyze its dual. The precise formulations can be found in Figures 2 and 3. In the dual formulation, the value ya − ys can be interpreted as a distance of a from s, where traveling through a vertex v1 costs 1 and traveling through a vertex v0 costs zv . The goal Pis to maximize the distance from s to t with weight 2q, while paying as little as possible in the sum v∈V (G)\{s,t} zv . Let {zv : v ∈ V (G); ya : a ∈ V (H)} be an optimum solution to the dual LP. Since the primal program is a minimum-cost flow problem with integral coefficients, in polynomial time we can find such values zv and ya that are additionally integral. Observe that the dual is invariant under adding a constant to every variable ya ; hence, we can assume ys = 0. Since traveling through a vertex v1 incurs distance 1, and v0 is a twin of v1 , the optimum solution never uses values zv greater than 1; hence, zv ∈ {0, 1} for every v ∈ V (G) \ {s, t}. On one hand, C, as the optimum value of both the primal and the dual LP, is assumed to be larger than 2pq. On the other hand, we have that zv ≥ 0 for every v ∈ V (G) \ {s, t}. We infer that 2q(yt − ys ) ≥ C > 2pq, and hence yt > p. We define for every 1 ≤ j ≤ p the set Cj = {v ∈ V (G) : zv = 1 ∧ yv0 = j}. We claim that C1 , C2 , . . . , Cp is the desired separator chain. Clearly, the sets are pairwise disjoint and do not contain neither s nor t. We now show that they form a separator chain. 14 X min X f (v1 , a) v∈V (G)\{s,t} a∈NH (v1 ) s.t. X f (a, b) − f (b, a) = 0 ∀ a ∈ V (H) \ {s, t} b∈NH (a) X f (s, a) − f (a, s) = 2q a∈NH (s) X f (t, a) − f (a, t) = −2q a∈NH (t) X f (v0 , a) ≤ 1 ∀ v ∈ V (G) \ {s, t} a∈NH (v0 ) f (a, b) ≥ 0 ∀ ab ∈ E(H) Figure 2: The minimum-cost flow problem used in the proof of Theorem 15. In the flow problem, the variables f (a, b) correspond to the amount of flow pushed from a to b along an edge ab. max 2q(yt − ys ) − X zv v∈V (G)\{s,t} s.t. yv0 ≤ ya + zv ∀ v ∈ V (G) \ {s, t}, a ∈ NH (v0 ) yv1 ≤ ya + 1 ∀ v ∈ V (G) \ {s, t}, a ∈ NH (v1 ) ys ≤ ya ∀ a ∈ NH (s) yt ≤ ya ∀ a ∈ NH (t) zv ≥ 0 ∀ v ∈ V (G) \ {s, t} Figure 3: The dual of the minimum-cost flow problem from Figure 2, used in the proof of Theorem 15. Claim 16. For each 1 ≤ j ≤ p, the set Cj is an (s, t)-separator. Proof. Consider a path P from s to t. Let P 0 be the corresponding path in H that traverses a vertex v0 whenever v ∈ V (G)\{s, t} lies on P . Since zv ∈ {0, 1} for every v ∈ V (G)\{s, t}, we have yb ≤ ya +1 for every ab ∈ E(H). As yt > p, there exists a vertex b on P 0 with yb = j; let b be the first such vertex and let a be its predecessor on P 0 . Note that b 6= s as ys = 0 and b 6= t as yt > p, hence b = v0 for some v ∈ V (G) \ {s, t}. Since b is the first vertex on P 0 with yb = j, we have ya = j − 1, and, consequently, zv = 1. Thus v ∈ Cj . Since the choice of P is arbitrary, Cj is an (s, t)-separator, as desired. y Consider a path Pi0 . By complementary slackness conditions, whenever the path Pi0 traverses an edge ab ∈ E(H) from a to b, the corresponding distance inequality of the dual LP is tight: yb = ya + 1 if b = v1 for some v, yb = ya + zv if b = v0 , and yb = ya if b = s or b = t. Thus, Pi0 is a shortest path from s to t in the graph H with vertex weights 0 for s, t, zv for every v0 and 1 for every v1 . In particular, always ya ≤ yb ≤ ya + 1 for b being a successor of a on Pi0 . 15 Claim 17. For each 1 ≤ j ≤ p and each 1 ≤ i ≤ 2q, we have that |V (Pi ) ∩ V (Cj )| = 1. Proof. We first prove that the cardinality of this intersection is at most 1. Assume b ∈ Pi0 such that b = v0 or b = v1 for some v ∈ Cj and let a be the predecessor of b on Pi0 . Since zv = 1, we have yb = ya + 1 = j, that is, b must be the first vertex on Pi0 with yb = j. Consequently, there exists at most one vertex b on Pi0 that projects to a vertex of Cj in G, which proves that |V (Pi ) ∩ V (Cj )| ≤ 1. To prove the converse inequality, we show that the projection onto G of the first vertex b on 0 Pi such that yb = j belongs to Cj . First, observe that such a vertex b exists since ys = 0, yt > p, and yb ≤ ya + 1 for every ab ∈ E(H). Let b = v0 or b = v1 for some v ∈ V (G) \ {s, t}; we claim that zv = 1, yv0 = j, and hence v ∈ Cj . If b = v0 , the claim is immediate as yb = ya +1 for the predecessor a of b on Pi0 . By contradiction, let us assume b = v1 but zv = 0. Then by replacing b = v1 with v0 on Pi0 we obtain a shorter path from s to t in H, contradiction to the fact that Pi0 is a shortest path from s to t. Thus zv = 1 and, consequently, yv0 = yv1 = ya + 1, so v belongs to Cj , as claimed. y Let us denote the unique vertex of V (Pi ) ∩ V (Cj ) as wi,j . Note that wi,j and wi0 ,j may coincide for different indices i, i0 . By the complementary slackness conditions again, if zv = 1 for a vertex v ∈ V (G) \ {s, t}, then there exists a flow path Pi0 that passes through v0 . Consequently, for every 1 ≤ j ≤ p and every v ∈ Cj , there exists a flow path Pi0 that passes through v0 . It follows that v = wi,j , and thus Cj = {wi,j : 1 ≤ i ≤ 2q}. In particular, we have |Cj | ≤ 2q for every 1 ≤ j ≤ p. Moreover, since each vertex of Cj lies on some path Pi , and is the unique vertex of V (Pi ) ∩ V (Cj ), we infer the Cj is a minimal separator. We are left with verifying the inclusion of reachability sets. Since Pi0 is a shortest path from s to t in H, we have that the vertex wi,j lies before the vertex wi,j 0 on the path Pi , whenever j < j 0 . As the separators Cj and Cj 0 respectively consist only of vertices wi,j and wi,j 0 , already the reachability within paths Pi certifies that that Cj ⊆ reach(s, G − Cj 0 ) and Cj 0 ⊆ reach(t, G − Cj ) for every 1 ≤ j < j 0 ≤ p, as requested. This concludes the proof of the theorem. 5 Proof of the main result In this section we give a formal proof of our main result, i.e. Theorem 1. Throughout the proof we assume that k ≥ max(10, 2ctw ), because otherwise the result is trivial: as k is bounded by a constant, we can just sample k vertices of the graph uniformly and independently at random, and return them as A. Hence, we may assume that k ≥ 10 and lg k ≥ ctw . 5.1 Recursive scheme and potentials Let G0 ∈ C be the input graph, and let k be the requested upper bound on the sizes of patterns X that we need to cover. The algorithm constructs the set A by means of a recursive procedure that roughly partitions the graph into smaller and smaller pieces, at each point making some random decisions. For the analysis, we fix some pattern X, that is, a subset X of vertices such that G[X] is connected and |X| ≤ k. Recall that our goal is to construct A in such a manner that the probability √ 2 O( k log k) that X is covered by A is at least the inverse of 2 · nO(1) . The steps taken by the algorithm obviously will not depend on X, but at each random step we argue about the success probability: the probability that the taken decision is compliant with the target pattern X, i.e., leads to its coverage. As usual with recursive algorithms, we need to consider a more general problem, which will be supplied with a few potential measures. Formally, an instance of the general problem is a tuple consisting of: (i) A connected graph G that is a minor of the original graph G0 ; hence in particular G ∈ C. 16 (ii) A specified vertex r ∈ V (G) called the root. (iii) Two disjoint vertex subsets T li , T he ⊆ V (G), called light terminals and heavy terminals, respectively. We require that the root vertex is a light terminal, that is, r ∈ T li . By T := T li ∪ T he we will denote the sets of terminals. (iv) A subset of non-terminals R ⊆ V (G) \ T , called ghost vertices. (v) A nonnegative integer λ, called the credit. Intuitively, terminals represent the boundary via which the currently considered piece communicates with the rest of the original graph, whereas ghost vertices represent maximal connected parts of the original graph lying outside of the currently considered piece, each contracted to one vertex. The reader can think of ghost vertices as emulation of hyperedges on their neighborhoods, or rather as emulation of the torso operation that would turn their neighborhoods into cliques. This torso operation cannot be performed directly because of the necessity of staying within class C, and therefore we resort to introducing ghost vertices. In the course of the algorithm, we shall maintain the following invariants: (a) Every light terminal is at distance at most 3 from the root. √ (b) It holds that |T | ≤ 16014ctw k lg k + λ. We say that a subset X ⊆ V (G) \ R is a pattern in instance I if (i) The root r is contained in X; (ii) Every vertex of X can be reached from r by a path that traverses only vertices of X ∪ R. √ (iii) |X| ≤ k − 10 k · λ. In particular, every pattern has at most k vertices, but we may consider only smaller patterns if the credit is positive. Note that the ghost vertices provide free connectivity for the pattern. For a graph G equipped with ghost vertices R, by GhRi we define the graph obtained from G by eliminating each ghost vertex, that is, removing it and turning its neighborhood into a clique. Note that GhRi does not necessarily belong to C. For two vertices x, y in G, we define the distance function distG (x, y) as the distance between x and y as the minimum possible number of non-ghost vertices on a path connecting x and y, minus 1. In other words, when a graph is equipped with ghost vertices, nonghost vertices have cost 1 of traversing them, whereas ghost vertices have cost 0. Note that if x and y are non-ghost vertices, then distG (x, y) is equal to the (normal) distance between x and y in GhRi. For an instance I, we define the subset FarI (X) of far vertices as follows: √ FarI (X) := {u ∈ X : distG (u, r0 ) > 1000 k lg k}. If a vertex of X is not far, it is said to be close. Obviously, by invariant (a) we have that no far vertex is a light terminal, that is, FarI (X) ∩ T li = ∅. For a pattern X, we define the following potentials. Pattern potential ΠI (X) := |X \ T li | Graph potential ΓI := |V (G) \ (T li ∪ R)| Distance potential ΦI (X) := |FarI (X)| 17 We drop the subscript I whenever the instance I is clear from the context. Our goal in the general problem is to compute a subset of non-ghost vertices A ⊆ V (G) \ R with the following properties: (1) It holds √ that T li ⊆ A, and the graph G[A] admits a tree decomposition of width at most 24022ctw k lg k, where T ∩ A is contained in the root bag. (2) For every pattern X in instance I, we require that     lg k + lg lg n 1 c2 Π(X) lg Γ √ P(X ⊆ A) ≥ exp −c1 · · (Π(X) lg Π(X) + Φ(X)) · 1 − , k k for some constants c1 , c2 , where n is the total number of vertices of the graph. (1) The constants c1 , c2 will be fixed while explaining the proof; actually, we will fix c1 = 2 and c2 = 2. For convenience, by LB(n, Π(X), Γ, Φ(X)) we denote the right-hand side of (1), regarded as a function of the potentials and the number of vertices n. Note that both X and A reside in the graph with the ghost vertices removed. The intuition is that ghost vertices do not belong to the piece of the graph that we are currently decomposing, but we cannot forget about them completely because they provide connectivity for the pattern. Applying the general problem. We now argue that an algorithm for the problem stated above implies the result claimed in Theorem 1. For this, we need the following simple claim. Claim 18. The following holds: √ 2 k lg k lg lg n √ Proof. The left hand size is equal to (lg n) √ (lg n) k lg k √ ≤2 k lg k . ≤k k lg2 k · no(1) Suppose first that n ≤ 2k . Then √ k lg k √ =2 k lg2 k . Suppose second that n > 2k . Then √ (lg n) k lg k √ ≤ (lg n) lg n lg lg n Hence in both cases we are done. √ =2 lg n·(lg lg n)2 = no(1) . y In order to obtain an algorithm as stated in Theorem 1, we can sample one vertex r of the input graph G0 , define G to be the connected component of G0 that contains r, and apply the algorithm for the general problem to the instance I0 := (G, r, {r}, ∅, ∅, 0). Fix some subset X ⊆ V (G0 ) with G0 [X] being connected and |X| ≤ k. Conditioned on the event that r ∈ X, which happens with probability at least 1/|V (G0 )|, the algorithm for the general problem returns a suitable subset A that covers X with probability lower bounded by LB(n, ΠI0 (X), ΓI0 , ΦI0 (X)), where n = |V (G)|. Observe that ΠI0 (X) ≤ k, ΦI0 (X) ≤ k and ΓI0 ≤ n. Thus, we have that  h i  √ 1 c2 ·k lg n P(X ⊆ A) ≥ exp −c1 k lg k(lg k + lg lg n) · 1 − k   √ √ 2 2 ≥ exp −c1 k lg k − c1 k lg k lg lg n − · c2 k lg n k h i √ ≥ exp −2c1 k lg2 k − o(lg n) − 2c2 lg n h √ i−1 2 = 2O( k log k) · nO(1) . 18 Here, the second inequality follows from the fact that 1 − x ≥ e−2x for x ∈ [0, 1/2], which can be checked by simple differentiation. The third inequality follows from Claim 18. Together with the 1/n probability that indeed r ∈ X, we obtain the success probability as required in Theorem 1. 5.2 Solving the general problem We now proceed to the description of the recursive procedure for the general problem. Throughout the description we fix the considered instance I0 = (G, r, T li , T he , R, 0) and denote n = |V (G)|. We assume that I0 satisfies the invariants stated in the previous section. Moreover, we will assume the following: (a) Ghost vertices are pairwise non-adjacent and no ghost vertex is adjacent to the root. √ (b) It holds that λ ≤ k/10. (c) There is at least one vertex that is neither a terminal nor a ghost vertex. (d) We restrict our attention only to patterns X for which it holds that ΠI0 (X) > 0. Note that assumption (b), together with the invariant about the number of terminals, in particular √ implies that |T | ≤ 16015ctw k lg k. We now explain how the assumptions above can be guaranteed. For (a), observe that whenever two ghost vertices are adjacent, we can contract the edge connecting them without changing the family of patterns in the instance, or any of its potentials. The same happens when a ghost vertex is adjacent to the root: we can contract it onto the root. Hence, whenever (a) is not satisfied, we can just apply these operations exhaustively, and work further on the instance obtained in this manner. √ For (b), observe that if the credit exceeds k/10 in any considered instance, then the upper bound on the sizes of considered patterns becomes negative, and the instance of the general problem may be solved trivially by returning A = T with a trivial tree decomposition consisting of one root √ node with bag equal to A. This decomposition has width at most |T | ≤ 16014ctw k lg k +λ; however, we so far do not have any concrete upper bound on λ. Nevertheless, it will be the case √ throughout the algorithm that we will apply the algorithm only to instances √ with credit at most k/5. √Hence, √ it is the case that this decomposition has width at most 16014ctw k lg k + k/5 < 24022ctw k lg k. For (c), observe that in this case we may again just output A = T with a trivial tree decomposition consisting of√one root node with bag √ equal to A. Again, this decomposition has width at most |T | ≤ 16014ctw k lg k + λ < 24022ctw k lg k. This provides the base case for our recursion. Finally, for (d), if ΠI0 (X) = 0, then every vertex of X is a light terminal, so in particular X ⊆ T li . Hence, whatever choice the algorithm does, as long as it outputs a vertex subset A that contains T li , we will have that X ⊆ A with probability 1. Therefore, we can focus only on the case when ΠI0 (X) is positive. Having these assumptions in place, let us define √ M := {u ∈ V (G) : distG (r, u) ≤ 2000 k lg k}. Obviously, M can be computed in linear time using a breadth-first search from r (here we need a trivial modification to traverse ghost vertices at cost 0). Every connected component of G−M will be called an island. Note that, by the definition of M , every vertex of an island that neighbors some vertex of M cannot be a ghost vertex. Hence, in particular every island contains some non-ghost vertex. The first step of the algorithm is to apply the clustering procedure of Theorem 12 for parameter k to all the islands. More precisely, we apply the algorithm of Theorem 12 to the graph K := (G − M )hR \ M i, that is, to G − M with all the ghost vertices eliminated. This algorithm works in randomized polynomial time, and returns a subset B 0 ⊆ V (K) with the following properties: 19 • each connected component of K[B 0 ] has radius at most 9k 2 lg n, and • with probability at least 1 − 1/k we have that X \ M is contained in B 0 . Now define B to be B 0 extended by adding all ghost vertices of R \ M that have at least one neighbor in B 0 . Then each connected component of G[B] has radius at most 9k 2 lg n, computed according to the distance measure distG that treats ghost vertices as traversed for free. Moreover, with probability at least 1 − 1/k we have that X \ M ⊆ B. We henceforth assume that this event happens, i.e., indeed X ⊆ M ∪ B, keeping in mind the multiplicative factor of 1 − 1/k in the success probability. Thus, we can restrict ourselves to the graph G0 defined as the connected component of G[M ∪ B] that contains r; indeed, since each vertex of X can be reached from r using only ghost vertices and other vertices of X, by the construction of B it must be entirely contained in this connected 0 component. Note that G[M ] is connected by √ definition, so M ⊆ V (G ). Observe that as we remove only vertices at distance larger than 2000 k lg k from r in G, every vertex of X that was close or far, remains close or far respectively. These observations are formalized in the following claim, whose proof follows as explained above. Claim 19. Consider a new instance I = (G0 , r, T li ∩ V (G0 ), T he ∩ V (G0 ), R ∩ V (G0 ), λ). Provided X ⊆ M ∪ B, X remains a pattern in I0 and FarI (X) = FarI0 (X). From now on we focus on the instance I. Observe that, by the claim above, the following holds: ΓI0 ≥ ΓI , ΠI0 (X) = ΠI (X), ΦI0 (X) = ΦI (X), so this restriction can only lower the potentials and make a better lower bound on the success probability. By slightly abusing the notation, we redefine the islands to be the connected components of G0 − M . Also, if in I there is no non-ghost, non-terminal vertex, then we conclude by outputting A = T . Hence from now on we assume that I has a non-ghost, non-terminal vertex, which in particular implies that ΓI > 0. Construct an auxiliary graph H from G0 by contracting each island C ∈ cc(G0 − M ) into a single (non-ghost) vertex uC ; let I = {uC : C ∈ cc(G0 − M )}. By ι : V (G0 ) → V (H) we denote the function that assigns to each vertex of G0 its image under the contraction; i.e., ι is identity on M and ι(V (C)) = {uC } for each island C. Obviously H is a minor of G0 , which in√turn is a subgraph √ of G, and hence H ∈ C. Moreover, each vertex of H is at distance at most 2000 k lg k + 1 ≤ 2001 k lg k from r. Hence, if we measure the distance √ in H normally, without eliminating the ghost vertices, then each vertex is at distance at most 4002 k lg k; this follows from the invariant that no two √ ghost vertices are adjacent. From Proposition 11 we infer that the treewidth of H is at most 4002ctw · k lg k. Define two weight functions w1 (u) and w2 (u) on V (H) as follows. For a vertex u ∈ / I, we put w1 (u) = 1 if u ∈ T and w1 (u) = 0 otherwise. However, if u = uC for some island C, then we put w1 (uC ) = |V (C) ∩ T |. Similarly, for u ∈ / I, we put w2 (u) = 1 if u ∈ V (G) \ (T li ∪ R) and w2 (u) = 0 otherwise, whereas for u = uC , we put w2 (u) = |V (C) \ (T li ∪ R)|. In other words, w1 (u) and w2 (u) are characteristic functions of T and of V (G) \ (T li ∪ R), where all vertices contained in one island C contribute to the weight of the collapsed vertex uC . By applying Lemma 10 √ to these weight functions, √ we infer that there exist sets Z1 and Z2 , each of size at most 4002ctw · k lg k + 1 ≤ 4003ctw · k lg k, such that each connected component of H − Z1 has w1 -weight at most |T |/2, and every connected component of H − Z2 has w2 (u)-weight at most |V (G) \ (T li ∪ R)|/2. We define Z := Z1 ∪ Z2 ∪ {r} ; W := ι−1 (Z). 20 √ √ Clearly, |Z| ≤ 8006ctw k lg k + 1 ≤ 8007ctw k lg k. Also, from the definition of weight functions w1 and w2 , and the properties of Z1 and Z2 , we immediately obtain the following. Claim 20. For each connected component D of G0 − W , we have |V (D) \ (T li ∪ R)| ≤ |V (G) \ (T li ∪ R)|/2 and |V (D) ∩ T | ≤ |T |/2. Let us define Wisl := ι−1 (Z ∩ I); Wnrm := ι−1 (Z \ I). In other words, (Wisl , Wnrm ) is the partition of W with respect to which vertices√are in the islands and which are not. Since ι is identity on M , we have that |Wnrm | ≤ |Z| ≤ 8007ctw k lg k and r ∈ Wnrm . The algorithm now branches into two cases based on a random decision, as follows. With probability 1 − 1/k the algorithm assumes that Wisl is disjoint with the sought pattern X; that is, no island that is contracted onto a vertex of Z intersects X. In the remaining event, which happens with probability 1/k, the algorithm assumes that X intersects some island that is contracted onto a vertex of Z. We now describe what steps are taken next in each of these cases, supposing that the algorithm made a correct assumption. The success probability analysis will be explained at the end of each case. 5.2.1 Case when Wisl is disjoint with the pattern Here, we suppose that the algorithm assumed that Wisl ∩ X = ∅, and that this assumption is correct. Hence, it is safe for the algorithm to restrict attention to the graph G00 := G0 − Wisl . More precisely, it still holds that X is contained in G00 , and that every vertex of X can be reached from r in G00 by a path traversing only vertices of X and ghost vertices; the last claim is because vertices of islands neighboring M have to be non-ghost vertices. Note that since G00 is obtained from G0 only by removing some selection of islands, it still holds that G00 is connected. We will consider the connected components of G0 − W = G00 − Wnrm ; let CC := cc(G00 − Wnrm ) be their set. Consider any D ∈ CC. By Claim 20 we have that √ |V (D) ∩ T | ≤ |T |/2 ≤ 8007ctw k lg k + λ; √ the last inequality follows from the invariant that |T | ≤ 16014ctw k lg k + λ. Now, for each component D ∈ CC, we shall construct an instance ID = (GD , r, TDli , TDhe , RD , λ). We begin by defining the graph GD , which will be constructed from G00 by a series of contractions. Define VD = NG00 [V (D)] ∪ {r}, and consider the connected components of graph G00 − VD . For each component Q ∈ cc(G00 − VD ) that contains a neighbor of the root vertex r, contract the whole Q onto r. For each component Q ∈ cc(G00 − VD ) that has no neighbor of r, contract the whole Q into a new vertex gQ and declare it a ghost vertex. We define GD to be the graph obtained from G00 by applying such contraction for each connected component Q of G00 − VD . Thus, the set RD of ghost vertices in graph GD consists of R ∩ VD , plus we add gQ to RD for each Q ∈ cc(G00 − VD ) that has no neighbor of r. Obviously, GD is still connected and contains the root vertex r. Next, we need to define terminals in the instance ID . For this, create an auxiliary graph L from G00 by contracting every connected component D ∈ CC into a single vertex wD . Obviously, L is connected and r persists in L; we treat L as a graph without any ghost vertices, so all distances 21 are computed normally. Run a breadth-first search (BFS) in L starting from r. For every vertex v ∈ Wnrm , we say that v is charged to component D ∈ CC if the parent of v in the BFS tree exists and is equal to wD . Note that a vertex of Wnrm can be not charged to any component if v = r or the parent of v in the BFS tree also belongs to Wnrm . With this definition, we are ready to define terminals in instance ID . We put: TDli = (T li ∩ VD ) ∪ {v ∈ NG00 (V (D)) \ (T li ∪ R) : v is not charged to D}; TDhe = (T he ∩ V (D)) ∪ {v ∈ NG00 (V (D)) \ (T li ∪ R) : v is charged to D}. In other words, the terminals in the instance ID comprise terminals that were originally in component D, plus we add also all non-ghost vertices from the boundary NG00 (V (D)) as terminals. These new terminals are partitioned into light and heavy depending on whether they are charged to D. From the definition it readily follows that TDli and TDhe are disjoint, as required. Note that each vertex v ∈ Wnrm is charged to at most one component D, so it can be declared as a heavy terminal in at most one instance ID . √ From Claim 20 and the facts that |T | ≤ 16014ctw k lg k + λ and NG00 (V (D)) ⊆ Wnrm , we immediately obtain that √ √ |TD | ≤ |T ∩ VD | + |Wnrm | ≤ |T |/2 + 8007ctw k lg k ≤ 16014ctw k lg k + λ. Hence, invariant (b) is satisfied in the instance ID . We are left with invariant (a), whose satisfaction is proved in a separate claim. Claim 21. In graph GD , every vertex from TDli is at distance at most 3 from r. Proof. Fix some v ∈ TDli . Suppose first that v ∈ T li ∩ VD . Then, by the assumption on invariant (a) holding in the instance I, v was already at distance at most 3 from r in graph√G. During the construction of G00 from G we removed only vertices at distance more than 2000ctw k lg k from r, hence v is still at distance at most 3 from r in G00 . Graph GD was obtained from G00 by means of edge contractions, which can only decrease the distances. Hence, v is at distance at most 3 from r also in GD . Consider now the remaining case when v ∈ NG00 (V (D)) \ (T li ∪ R) ⊆ Wnrm \ (T li ∪ R). If v = r then we are done, so assume otherwise. Let P be the path from r to v in the BFS tree in graph L used for the definition of charging. Since v ∈ TDli , we have that v is not charged to D, and hence the parent of v in this BFS tree is not equal to wD . As wD is a neighbor of v in L, due to v ∈ NG00 (V (D)), this implies that wD cannot lie on path P . Indeed, otherwise we could shortcut path P by using the edge wD v, which contradicts the fact that P is a shortest path from r to v in L (due to using BFS for its construction). Let P 0 be the path P lifted to graph G00 in the following manner: for every vertex wD0 ∈ V (L) visited on P , we replace the visit of this vertex by traversal of an appropriate path within the connected component D0 . Then P 0 is a path from r to v in G00 that does not traverse any vertex of D. Let v 0 be the first vertex on P 0 that belongs to NG00 (V (D)); clearly v 0 is well-defined because v ∈ NG00 (V (D)). Observe that the prefix of P from r to v 0 , excluding v 0 , gets entirely contracted onto r in the construction of GD , so v 0 is a neighbor of r in GD . Finally, consider the suffix of P from v 0 to v. Observe that both v and v 0 are neighbors of wD in the graph L, so since P is a shortest path, we infer that the distance between v 0 and v on P is at most 2. It is now easy to see that the suffix of P 0 between v and v 0 gets contracted to a path of length at most 2 in GD . Hence, we have uncovered a walk of length at most 3 from r to v in GD , which concludes the proof. y 22 Thus, we constructed an instance ID = (GD , r, TDli , TDhe , RD , λ) for every connected component D ∈ CC, and we verified that this instance satisfies the requested invariants. Note that the constructed instances have the same credit λ as the original one. Finally, for the pattern X, we can define its projection XD onto instance ID by simply putting: XD := X ∩ VD . Observe that each vertex of XD can be reached from r in GD by a path that traverses only vertices from XD ∪ RD . This is because it could be reached from r in G00 by some path traversing only X ∪ R, and parts of this path lying outside of VD has been either contracted to edges, or replaced by ghost vertices during the construction of GD from G00 . Therefore, XD is a pattern in ID . We now verify how the potentials behave in instances ID . Claim 22. The following holds: ΠI (X) ≥ X ΠID (XD ) (2) ΓID (3) ΓI /2 ≥ ΓID for each D ∈ CC X ΦI (X) ≥ ΦID (XD ) (4) D∈CC ΓI ≥ X D∈CC (5) D∈CC Proof. Take any vertex u ∈ V (G) \ (T li ∪ R). By the construction of instances ID , and in particular the mentioned fact that each vertex of Wnrm can be declared a heavy terminal in at most one instance ID , it readily follows that there is at most one instance ID for which u ∈ V (GD ) \ (TDli ∪ RD ). From this observation we immediately obtain statements (2) and (3). Statement (5) follows similarly, but one needs to additionally observe the following: GD is obtained from G00 by means of edge contractions that can only decrease the distances from r, so if a vertex u ∈ XD is far in the instance ID , then it was also far in the original instance I. Finally, (4) follows directly from Claim 20. y Thus, Claim 22(4) certifies that the graph potential drops significantly in each new instance. Intuitively, this drop will be responsible for amortizing the (1 − 1/k)2 multiplicative factor in the success probability incurred by the preliminary clustering step, and by the random choice of the assumption on the considered case. Note that, by the assumption that there is at least one non-ghost, non-terminal vertex, we have that ΓI > 0. Hence, by Claim 22, statement (4) in particular, each of the instances ID will have strictly fewer vertices than I. Therefore, we may apply the algorithm recursively to each instance ID . This yields subsets of vertices {AD : D ∈ cc(G00 − Wnrm )} with the following properties: √ • AD ⊇ TDli and GD [AD ] admits a tree decomposition TD of width at most 24022ctw k lg k with TD ∩ AD contained in the root bag. • The probability that XD ⊆ AD is at least LB(nD , ΠID (XD ), ΓID , ΦID (XD )), where nD = |V (GD )|. Let us define now the set A. • First, for every D ∈ CC, we put V (D) ∩ AD into A. 23 • Second, for every v ∈ Wnrm \ R, we put v into A if for every D ∈ CC such that v ∈ NG00 (V (D)) we have v ∈ AD . In particular, if there is no D ∈ CC for which v ∈ NG00 (V (D)), we also include v in A. Observe that for every D ∈ CC, we have A ∩ VD ⊆ AD , but not necessarily A ∩ VD = AD . To get more intuition about the above step, in particular the universal quantification in the second step, let us observe the following. Consider a vertex v ∈ Wnrm \ R. This vertex is a terminal in every instance ID for which v ∈ NG00 (V (D)); it is a heavy terminal in at most one such instance, and a light terminal in all other such instances. If v ∈ TDli , then clearly v ∈ AD ; thus, we have v∈ / A if and only if the (unique) instance ID where v ∈ TDhe exists and, furthermore, v ∈ / AD for this instance. Hence, intuitively, we allow this particular instance ID where v ∈ TDhe to exclude the vertex v from AD if it is deemed necessary; all other instances are required to keep it in the set AD . On the other hand, note that the vertex v in the instance ID where v ∈ TDhe contributes to the potential ΠID (XD ), and does not contribute to this potential in the other instances. We now formally verify that A defined S in this way has the required properties. First, note that every vertex v ∈ Wnrm \ R such that v ∈ / D∈CC NG00 (V (D)) (i.e., the universal quantification in the second step of the construction of the set A is done over an empty set of choices) is included in the set A. This, together with the fact that T li ∩ VD ⊆ TDli ⊆ AD for every D ∈ CC, shows that T li ⊆ A. Moreover, from this and the way we defined A it follows that if XD ⊆ AD for every D ∈ CC, then we have X ⊆ A, as XD = X ∩ VD by definition. We now check that G[A] indeed admits a suitable tree decomposition. √ Claim 23. The subgraph G[A] admits a tree decomposition of width at most 24022ctw k with T ∩ A contained in the root bag. Proof. Create the root node with bag A ∩ (T ∪ (Wnrm \ R)) associated with it. Next, for each D ∈ CC, restrict the decomposition TD to the vertices of A ∩ VD ; that is, remove all the vertices of AD \ (A ∩ VD ) from all the bags, thus constructing a tree decomposition TD0 of GD [A ∩ VD ]. Then, for each D ∈ CC, attach the obtained decomposition TD0 below the root node by making its root a child of the root node. Observe whenever a vertex v ∈ / R is shared between multiple instances ID , we have that v is a vertex of v ∈ Wnrm \ R that is a terminal in all of them (i.e. belongs to TD ), and moreover v ∈ A only if v ∈ AD for every instance ID where v is present. Since the root bag of each TD0 contains A ∩ TD , it is now easy to verify that in this manner we obtain a tree decomposition of G[A]. Observe now that |A ∩ (T ∪ (Wnrm \ R))| ≤ |T ∪ (Wnrm \ R)| ≤ |T | + |Wnrm | √ √ √ ≤ 16014ctw k lg k + λ + 8007ctw k lg k = 24022ctw k lg k; √ here, the last √ inequality follows from the fact that λ ≤ k/10. Since each TD has width at most 24022c √ tw k lg k, it follows that the obtained tree decomposition of G[A] has width at most 24022ctw k lg k. y Finally, we analyze the success probability. For this, we fix c2 := 2. Claim 24. Supposing X ∩Wisl = ∅, the algorithm outputs a set A with X ⊆ A with probability at least LB(n, ΠI (X), ΓI , ΦI (X)). This includes the (1−1/k) probability of success of the preliminary clustering step, and (1 − 1/k) probability that the algorithm makes the correct assumption that X ∩ Wisl = ∅. Proof. The preliminary clustering step is correct (that is, the set of removed vertices is disjoint with X) with probability at least 1 − 1/k. Then, the algorithm makes the correct assumption 24 with probability 1 − 1/k. We have already argued that if XD ⊆ AD for each D ∈ CC, then also X ⊆ A. The event XD ⊆ AD holds with probability at least LB(nD , ΠID (XD ), ΓID , ΦID (XD )), where nD ≤ n is the number of vertices in instance ID . Hence, we have   1 2 Y P(X ⊆ A) ≥ 1 − · LB(nD , ΠID (XD ), ΓID , ΦID (XD )). k (6) D∈CC From Claim 22, equations (2) and (5), and convexity of function t → t lg t we infer the following:     Y lg k + lg lg n lg k + lg lg nD √ √ exp −c1 · · ΠI (X) lg ΠI (X) ≤ exp −c1 · · ΠID (XD ) lg ΠID (XD(7) ) k k D∈CC     Y lg k + lg lg n lg k + lg lg nD √ √ exp −c1 · · Φ(X) ≤ exp −c1 · · Φ(XD ) (8) k k D∈CC To estimate the last factor in each LB(nD , ΠID (XD ), ΓID , ΦID (XD )), we use Claim 22, and equations (2) and (4). Recall that for any D ∈ CC, we have ΓI /2 ≥ ΓID . Hence, if we pick c2 = 2, then we obtain the following: (1 − 1/k)c2 ΠI (X) lg ΓI = (1 − 1/k)c2 ΠI (X) · (1 − 1/k)c2 ΠI (X) lg(ΓI /2) Y ≤ (1 − 1/k)c2 ΠI (X) · (1 − 1/k)c2 ΠID (XD ) lg(ΓI /2) D∈CC ≤ (1 − 1/k) c2 ΠI (X) · Y (1 − 1/k)c2 ΠID (XD ) lg ΓID D∈CC Recall that we assumed that ΠI (X) = ΠI0 > 0. Therefore, this yields: Y (1 − 1/k)c2 ΠI (X) lg ΓI ≤ (1 − 1/k)2 · (1 − 1/k)c2 ΠID (XD ) lg ΓID . (9) D∈CC Putting (6), (7), (8), and (9) together, we obtain that Y P(X ⊆ A) ≥ (1 − 1/k)2 · LB(nD , ΠID (XD ), ΓID , ΦID (XD )) D∈CC  lg k + lg lg n √ · (ΠI (X) lg ΠI (X) + ΦI (X)) · (1 − 1/k)c2 ΠI (X) lg ΓI ≥ exp −c1 · k = LB(ΠI (X), ΓI , ΦI (X)).  This concludes the proof. y Claims 23 and 24 verify that the behaviour of the algorithm is as required, provided X ∩ Wisl = ∅. 5.2.2 Case when Wisl intersects the pattern We are left with describing the steps taken by the algorithm after taking the assumption that Wisl intersects the pattern X; recall that the algorithm takes this decision with probability k1 . Henceforth, we assume that this assumption is correct. 25 First, the algorithm chooses uniformly at random a vertex uC of Z ∩ I, and it assumes that X intersects √ the island C = ι−1 (uC ). Since at least one such island is intersected by X and |Z√ ∩I| ≤ |Z| ≤ 8007ctw k lg k, the algorithm makes a correct choice with probability at least (8007ctw k lg k)−1 ≥ k −7 . Keeping this success probability in mind, from now on we assume that the choice was indeed correct; thus, the algorithm knows one island C about which it can assume that V (C) ∩ X 6= ∅. Recall that, due to the preliminary clustering step, island C has radius bounded by 9k 2 lg n, where the radius is counted w.r.t. the distance measure that regards ghost vertices as traversed for free. Select a non-ghost vertex z of C such that distC (u, z) ≤ 9k 2 lg n for each u ∈ V (C). Let d := inf{distC (z, u) : u ∈ V (C) ∩ X}. Since V (C) ∩ X 6= ∅, we have that 0 ≤ d ≤ dmax , where dmax = inf{distC (z, u) : u ∈ V (C)}, which is not larger than 1 + 9k 2 lg n. The algorithm now samples an integer value between 0 and dmax , and assumes henceforth that the sampled value is equal to d. This assumption holds with probability at least 1/(1 + dmax ) ≥ (10k 2 lg n)−1 . Keeping this success probability in mind, we proceed with the assumption that the algorithm knows the correct value of d. Let S := {u ∈ V (C) \ R : distC (u, z) < max(d, 1)} ∪ {u ∈ V (C) ∩ R : distC (u, z) < max(d, 1) − 1}. That is, S contains all the vertices of C that are at distance less than max(d, 1) from z, but we exclude ghost vertices at distance exactly max(d, 1)−1. From the definition it readily follows that the induced subgraph C[S] contains z and is connected. Construct graph G00 (this graph is different than G00 considered in the previous section) by contracting the whole subgraph G0 [S] onto z; the contracted vertex of G00 will be also denoted as z. Note that if d ≤ 1, then in fact no contraction has been made and G00 = G0 . Observe that, provided the sampled value of d is correct, the set S is disjoint with X (unless d = 0 when S = {z} and no contraction is made). Thus X ⊆ V (G00 ). Moreover, observe that each vertex of X can be still reached from r in G00 by a path that uses only ghost vertices and vertices of X. Indeed, by the definition of S, if S is disjoint with X, then S also does not contain any ghost vertex traversed on the aforementioned path. Hence, X can be still regarded as a pattern in G00 , where the ghost vertices in G00 are inherited from G0 . On the other hand, by the definition of d it follows that some vertex of X is at distance at most 1 from z in G00 (so either z, in case d = 0 and z ∈ X, or a neighbor of z, or a neighbor via one ghost vertex). Also, C is disjoint with M , √ observe that since 00 that is, all vertices of C are at distance larger than 2000 k lg k from r in G , we have the following √ distG00 (r, z) > 2000 k lg k. (10) Now we would like to apply the duality theorem, i.e., Theorem 15. Consider graph L := G00 hR ∩ V (G00 )i (this is a different graph than L considered in the previous section), a pair of vertices (s, t) = (r, z) of L and the following parameters: √ and q = k. p = d120 k lg ke By applying Theorem 15 to these, in polynomial time we can compute one of the following structures: (a) An (r, z)-separator chain (C1 , . . . , Cp ) with |Cj | ≤ 2k for each j ∈ [p]. S (b) A sequence (Q1 , . . . , Qk ) of (s, t)-paths with |(V (Qi ) ∩ i0 6=i V (Qi0 )) \ {s, t}| ≤ 4p for each i ∈ [k]. The behavior of the algorithm now differs depending on which structure has been uncovered. We start with the simpler case when the algorithm of Theorem 15 yielded a sequence of paths. 26 Subcase: a sequence of radial paths. Suppose that the algorithm of Theorem 15 returned a sequence (Q1 , . . . , Qk ) of (r, z)-paths, where each path contains only at most 4p vertices that also belong to other paths, not including z and r. These are paths in graph G00 hR ∩ V (G00 )i, but we can lift then to (r, z)-paths P1 , . . . , Pk in G00 in a natural manner as follows: whenever some Qi traverses an edge obtained from eliminating some vertex g, we replace the usage of this edge by a path of length 2 traversing g. If we obtain a walk in this manner, i.e., some ghost vertex is used more than once, we shortcut the segment of the walk between the visits of this ghost vertex; thus we obtain again a simple path. All in all, we are obtain (r, z)-paths P1 , . . . , Pk in G00 with the following property: for each i ∈ [k], there can be at most 4p non-ghost vertices on Pi that are traversed by some other paths Pi0 for i0 6= i. Note that every ghost vertex √ can be used by many paths. By (10), we have that each Pi has length larger than 2000 k lg k (measured with ghost vertices contributing 0 to the length). For i ∈ [k], define [ [ V (Pi0 ))\(R ∪{r, z}) and Prv(Pi ) = (V (Pi )\ V (Pi0 ))\(R ∪{r, z}). Pub(Pi ) = (V (Pi )∩ i0 6=i i0 6=i We have that |Pub(Pi )| ≤ 4p for all i ∈ [k] and, by definition, sets Prv(Pi ) are pairwise disjoint. Pattern X has at most k vertices, out of which one is equal to r. Hence, there is at least one index i ∈ [k] for which Prv(Pi ) is disjoint with X. The algorithm samples one index i from [k] and assumes henceforth that the sampled index has the property stated above. Note that this holds with probability at least 1/k; keeping this success probability in mind, we proceed with the assumption that the algorithm made a correct choice of i. Now that Prv(Pi ) is assumed to be disjoint with the sought pattern X, we can get rid of it in the following manner. Consider the consecutive vertices of Pi , traversed in the direction from r to z. Let v0 be the last light terminal on Pi ; vertex v0 is well defined because r is a light terminal itself. Let P 0 be the suffix of Pi from v0 to z (both inclusive). Observe that since v0√ , being a light terminal, is at distance at most 3 from r,√whereas z is at distance more than 2000 k lg k from r, √ we have that P 0 has length at most 2000 k lg k − 3 ≥ 1997 k lg k (here, the distance is measured as the number of non-ghost vertices traversed, minus 1). 0 Let v0 , v1 , . . . , v` = z be the vertices of (Pub(P i )∩V (P ))∪{v0 , z} in the order of their appearance √ on P 0 . Then clearly ` ≤ |Pub(Pi )| + 1 ≤ 485 k lg k. For each j = 0, 1, . . . , ` − 1, inspect the segment of P 0 lying between vj and vj+1 . If this segment contains some ghost vertex gj , then contract it entirely onto gj ; in case there are multiple ghost vertices in the segment, select any of them as gj . Otherwise, if there are no ghost vertices within the segment, contract this whole segment onto vertex vj ; see Fig. 4 for a visualization. Observe that, by the definition of v0 , no light terminal gets contracted in this manner. Denote the obtained graph by H; this graph is equipped with a set RH = R ∩ V (H) of ghost vertices naturally inherited from G00 . Since we assume that X is disjoint with Prv(Pi ), no contracted vertex belonged to X. Hence, it can be easily seen that X is still a pattern in H. Observe that H has strictly less vertices than G for the following reason: path P 0 had at least √ 1997√ k lg k non-ghost vertices at the beginning, but after the contraction it got shortened to at most 485 k lg k non-ghost vertices. Observe also that, since v0 is at distance at most √ 3 from r as√a light terminal, we have that the distance between r and z in H is at most 3 + 485 k lg k ≤ 488 k lg k. Define a new instance I 0 = (H, r, THli , THhe , RH , λ) by giving it the same credit λ, and taking li TH = T li and THhe = T he ∩ V (H). Observe here that we use the fact that during the construction of H we did not contract any light terminal, and hence all vertices of T li persist in H. Clearly THli and THhe are disjoint, and observe that invariants (a) and (b) trivially hold for I 0 , because H was obtained 27 z z v3 v3 v2 v2 v0 v1 v1 v0 v0 ≤3 ≤3 r r Figure 4: The contraction procedure applied on the path Pi . Vertices v1 , v2 , . . . , v`−1 are depicted in yellow, and small gray rhombi depict ghost vertices. from G00 by means of edge contractions. Since no contracted vertex belongs to X, we have that ΠI 0 (X) = ΠI (X). (11) √ Observe that during the construction of H we contracted at least 1511 k lg k non-ghost vertices. This means that the total number of vertices that are not ghost or light terminals, strictly decreases, so ΓI 0 < ΓI . (12) This also implies that nH < n, where nH is the number of vertices of H. We are left with analyzing the distance potential, which is factor on which we gain in this step. More precisely, the crucial observation is that the performed contraction significantly reduces the number of far vertices. Claim 25. The following holds: FarI 0 (X) ⊆ FarI (X) and √ |FarI (X) \ FarI 0 (X)| ≥ 511 k lg k. Proof. Observe that each close vertex in I is contained in M , which remains intact in G00 . Moreover, H is obtained from G00 only by means of edge contractions, which can only decrease the distances. Hence, every vertex of X that is close in I, remains close in I 0 . It follows that FarI 0 (X) ⊆ FarI (X). For the second claim, recall that in G00 , there is some vertex z 0 that belongs to X and is at distance √ at most 1 from z (possibly z 0 = z). On the other hand, by (10) we have distG00 (r, z) > 2000 k lg k, √ so distG00 (r, z 0 ) > 1999 to z 0 whose vertices belong to X or R. Since √ k lg k Let P be a path from r √ 0 dist√ G00 (r, z ) > 1999 k lg k, P contains at least 1999 k lg k vertices of X, among which the last 511 k lg k vertices to FarI (X) √ have to belong √ √ for the following reason: their distance from 0r is larger than 1999 k lg k − 511 k lg k > 1000 k lg k, by the triangle√ inequality. However, in I we have that the distance between r and z is shortened to at most 488 k lg k, and hence all of them become close. y 28 It follows that √ ΦI 0 (X) ≤ ΦI 0 (X) − 511 k lg k. (13) Having analyzed the decrease in all the potentials, we are ready to finalize the case. Apply the algorithm recursively to the instance I 0 = (H, r, THli , THhe , RH , λ). As discussed earlier, 0 I satisfies the requested invariants and has strictly fewer vertices, so this recursive call is correctly defined. The application of the algorithm yields a subset A0 of vertices of H with the following properties: √ • A0 ⊇ THli = T li and H[A0 ] admits a tree decomposition T 0 of width at most 24022ctw k lg k with TH ∩ A0 contained in the root bag; • the probability that X ⊆ A0 is at least LB(nH , ΠI 0 (X), ΓI 0 , ΦI 0 (X)). The algorithm returns the set A := A0 ; we now verify that A has all the required properties. Clearly we already have that A = A0 ⊇ THli = T li , so let us check that G[A] admits a suitable tree decomposition. √ Claim 26. The subgraph G[A] admits a tree decomposition of width at most 24022ctw k lg k with A ∩ T contained in the root bag. Proof. We observe that decomposition T := T 0 is suitable. First, it can be easily verified that it is also a tree decomposition of G[A], not only H[A], because G[A] is a graph on the same vertex set as H[A] and every edge of G[A] is also present in H[A]. Second, from the recursive call we have that the root bag of T 0 contains A ∩ TH , but A ∩ TH = A ∩ T , because A contains only vertices that are present in H. Consequently, the root bag of T contains A ∩ T . Finally, from the recursive √ 0 call we obtain that the width of T = T is at most 24022 k lg k. y We are left with analyzing the success probability. For this, we assume c1 ≥ 1. Claim 27. Assume c1 ≥ 1. Supposing X ∩ Wisl = 6 ∅ and the subroutine of Theorem 15 returned a sequence of paths, the algorithm outputs a set A with X ⊆ A with probability at least LB(n, Π(X), Γ, Φ(X)). This includes the (1 − 1/k) probability of success of the preliminary clustering step, the 1/k probability that the algorithm makes the correct assumption that X ∩ Wisl = ∅, the k −7 probability of correctly choosing the island C that intersects the pattern, the (10k 2 lg n)−1 probability of choosing the right distance d, and the 1/k probability of choosing the right path index i. Proof. By the bound on the success probability of the recursive call, and the assumption that k ≥ 10, we have that   1 P(X ⊆ A) ≥ 1− · k −8 · (10k 2 lg n)−1 · LB(n0 , ΠI 0 (X), ΓI 0 , ΦI 0 (X)) k ≥ k −12 · (lg n)−1 · LB(n0 , ΠI 0 (X), ΓI 0 , ΦI 0 (X)). (14) By (11) and the fact that nH < n, we have:     lg k + lg lg nH lg k + lg lg n 0 0 √ √ exp −c1 · · ΠI (X) lg ΠI (X) ≤ exp −c1 · · ΠI (X) lg ΠI (X) . (15) k k By (13) and the facts that c2 ≥ 1 and nH < n, we have     lg k + lg lg n lg k + lg lg nH √ √ · ΦI (X) ≤ exp −c1 · · ΦI 0 (X) · exp −c1 · k k exp [−c1 · 511 lg k(lg k + lg lg n)]   lg k + lg lg nH √ ≤ exp −c1 · · ΦI 0 (X) · k 12 · lg n. k 29 (16) Finally, by (11) and (12) we infer that   1 c2 ΠI (X) lg ΓI 1− k   1 c2 ΠI 0 (X) lg ΓI 0 ≤ 1− . k (17) By multiplying (15), (16), and (17), and applying the obtained bound in (14), we infer that: P(X ⊆ A) ≥ k −12 · (lg n)−1 · LB(n, ΠI (X), ΓI , ΦI (X)) · k 12 · lg n = LB(n, ΠI (X), ΓI , ΦI (X)). This concludes the proof. y Claim 26 ensures that the output of the algorithm has the required properties, whereas Claim 27 yields the sought lower bound on the success probability. Subcase: nested chain of circular separators. In this case, the algorithm of √ Theorem 15 returned an (r, z)-separator chain (C1 , . . . , Cp ) in L = G00 hR ∩ V (G00 )i, where p = d120 k lg ke and |Ci | ≤ 2k for each i ∈ [p]. Obviously, by the definition of L we have that (C1 , . . . , Cp ) is also an (r, z)-separator chain in G00 , and no vertex of any Ci is a ghost vertex. Recall that this means that all separators Ci are pairwise disjoint and reach(r, G00 − Ci ) ⊆ reach(r, G00 − Cj ) whenever 1 ≤ i < j ≤ p. By invariant (a), at most 3 first√separators may include a light terminal, hence after excluding them we are left with at least d117 k lg ke separators without any light terminals. We restrict our attention to these separators. Thus, by slightly abusing√the notation, from now on we work with a (r, z)-separation chain (C1 , . . . , Cp0 ), where p0 = d117 k lg ke such that each Ci is disjoint with T li ∪ R and, in fact, T li ⊆ reach(r, G00 − C1 ). For i ∈ [p0 ], we define the following sets: Viin = reach(r, G00 − Ci ) Viout = V (G00 ) \ (Ci ∪ Viin ). and Thus, (Viin , Ci , Viout ) is a partition of V (G00 ). Without loss of generality we can assume that each separator Ci is inclusion-wise minimal, which implies that each vertex of Ci has a neighbor in Viin and a neighbor in Viout . We now prove that one of the separators Ci has the property that it splits X in a balanced way, relatively to the number of vertices of X it contains. Claim 28. There is an index i ∈ [p0 ] for which the following holds: √ 10 k · |X ∩ Ci | ≤ min(|(X ∩ Viin ) \ T li |, |(X ∩ Viout ) \ T li |). Proof. For i ∈ [p0 ], let ai = |(X ∩ Viin ) \ T li |, and bi = |(X ∩ Viout ) \ T li |, and ci = |X ∩ Ci |. Observe that since all light terminals are within reach(r, G00 −C1 ), for each i ∈ [p0 ] the following holds: X ai ≥ cj ; (18) j<i bi ≥ X cj . (19) j>i Observe that each separator Ci has to contain a vertex of X, because X contains a non-ghost vertex at distance at most 1 from z, and this vertex can be reached from r by a path that uses only ghost 30 vertices and vertices of X. We conclude that ci ≥ 1 for each i ∈ [p0 ]. Consequently, ai ≥ 1 for each i ≥ 2, and bi ≥ 1 for each i ≤ p0 − 1. For the sake of contradiction, suppose that ci > min(ai , bi ) √ 10 k for all i. (20) Obviously, the sequence (ai )i∈[p0 ] is non-decreasing and the sequence (bi )i∈[p0 ] is non-increasing, Let i0 be the smallest index such that ai0 > bi0 ;√possibly i0 = p0 + 1 if the condition ai ≤ bi is satisfied for all i ∈ [p0 ]. We claim that in fact i0 ≤√53 k lg k; suppose otherwise. By assumption (20) and the definition of i0 we have that ci > ai /(10 k) for all i < i0 , . Therefore, by combining this with (18), we obtain that 1 X ai > √ aj 10 k j<i for all i < i0 . Equivalently, X  aj > 1 + j≤i 1 √ 10 k  X · aj . j<i Since a2 ≥ 1, we infer by a trivial induction that X  aj ≥ 1 + j<i 1 √ 10 k i−2 , for all 2 ≤ i < i0 . Therefore, we conclude that   53√k lg k−3 50√k lg k 1 1 1 1 √ · 1+ √ ≥ √ · 1+ √ ai0 −1 > 10 k 10 k 10 k 10 k 1 √ · e5 lg k > k. ≥ 10 k √ This is a contradiction with |X| ≤ k. Hence, we have that indeed i0 ≤ 53 k lg k. By applying a symmetric reasoning for the last separators and numbers bi , instead of the √ first and numbers ai , we obtain that if i1 is the largest index such that ai1 < bi1 , then i1 ≥ 64 k lg k. However, this means that i0 < i1 , which is a contradiction with the fact that sequences (ai )i∈[p0 ] and (bi )i∈[p0 ] are non-increasing and non-decreasing, respectively. y √ Observe that if an index i satisfies the property given by Claim 28, then |X ∩Ci | ≤ k/10. Indeed, otherwise we would have that min(|X ∩ Viin |, |X ∩ Viout |) > k, which is a contradiction with |X| ≤ k. The algorithm performs random sampling as follows: • First, it samples an index i ∈ [p] uniformly at random, and assumes that this index i satisfies the property given by Claim 28. √ • Then, it samples an integer α between 1 and k/10, and assumes that the sampled number α is equal to |X ∩ Ci |. • Finally, the algorithm samples a subset Q ⊆ Ci of size α uniformly at random, and assumes Q to be equal to X ∩ Ci . 31 As |Ci | ≤ 2k, we observe that the assumptions stated above are correct with probability at least   −1 2k 1 10 1 5 · √ · |C | ≥ k · ≥ k −2α−5 , i p α k α where α = |X ∩ Ci |. Keeping this success probability assumption in mind, we proceed further with the supposition that the sampled objects are indeed as assumed. The algorithm now defines two subinstances Iout and Iin as follows. li , T he , R First, we define Iout = (Gout ,√r, Tout out , λ + α); note that the guessed size of Q is added out √ to the credit. Note √ that λ + α ≤ k/10 + k/10, so the instance on which we shall recurse will have credit at most k/5. Define Gout to be the graph constructed as follows: take G00 , and contract the whole subgraph induced by Viin ∪ (Ci \ Q) onto r. Observe that since G00 [Viin ] is connected by definition, and each vertex of Ci has a neighbor in Viin , the contracted subgraph is indeed connected. The ghost vertices are just inherited from the original instance: we put Rout = R ∩ V (Gout ). The li and T he are defined as follows. First, heavy terminals are inhersets of light and heavy terminals Tout out he = T he ∩(V (G ited, but we remove all heavy terminals that reside in Q: we put Tout out )\Q). Second, as li = {r} ∪ Q. Recall that T li ⊆ V in ⊆ V in , so all the light terminals we put r plus the whole set Q: Tout 1 i light terminals of the original instance, apart from r, got contracted onto r during the construction of he and T li defined in this Gout ; this is why we do not need to inherit any of them in Iout . Clearly, √ Tout out manner are disjoint. Note that we have that |T | ≤ |T |+|Q| ≤ 16014c k lg k+λ+|Q| and |Q| = α, out tw √ so we indeed have that |Tout | ≤ 16014ctw k lg k + (λ + α); that is, invariant (b) is satisfied in the new instance. Invariant (a) is also satisfied, because all new light terminals are adjacent to the root r. Finally, we define Xout = X ∩ V (Gout ). Since Gout was obtained from G00 only by contracting some vertices onto the root, it still holds that every vertex of Xout can be reached from r by a path traversing only ghost vertices and vertices of Xout . Observe also that Claim 28 implies that √ at least 10 k · α vertices of X that are not light terminals are contained in Viin . These vertices do not remain in X out , and hence: √ √ √ √ |Xout | ≤ |X| − 10 k · α ≤ k − 10 k · λ − 10 k · α = k − 10 k · (λ + α). Therefore, we conclude that Xout is a pattern in the instance Iout . By applying the algorithm recursively to the instance Iout , we obtain a subset of vertices Aout with the following properties: √ li and G • Aout ⊇ Tout out [Aout ] admits a tree decomposition Tout of width at most 24022ctw k lg k with Aout ∩ Tout contained in the root bag. • The probability that Xout ⊆ Aout is at least LB(nout , ΠIout (Xout ), ΓIout , ΦIout (Xout )), where nout is the number of vertices on Gout . Second, we define Iin = (Gin , √ r, Tinli , Tinhe√ , Rin , λ + α); again the guessed size of Q is added to the credit. Note that, again, λ + α ≤ k/10 + k/10, so the instance on which we shall recurse will have √ credit at most k/5. Graph Gin is constructed from G00 as follows. Inspect the connected components of the graph G00 − (Viin ∪ Q). For each such component D, contract it onto a new vertex gD that is declared to be a ghost vertex. That is, we define Rin to be (R ∩ Viin ) ∪ {gD : D ∈ cc(G00 − (Viin ∪ Q))}. Next, we define the terminal sets Tinli , Tinhe . Recall that T li ⊆ Viin , so all the original light terminals persist in the graph Gin . Hence, the light terminals are defined as simply inherited from the original instance: Tinli = T li . For the heavy terminals, we take all the ones inherited from the original instance, plus we add all vertices of Q explicitly: Tinhe = (T he ∩ V (Gin )) ∪ Q. Note that Tinli and Tinhe are disjoint, because there was no light terminal in Q; that is, Q ∩ T li = ∅. Again, 32 √ we have that |T√ in | ≤ |T | + |Q| ≤ 16014ctw k lg k + λ + |Q| and |Q| = α, so we indeed have that |Tin | ≤ 16014ctw k lg k + (λ + α); that is, invariant (b) is satisfied in the new instance. Invariant (a) is also satisfied, since edge contractions could only have made the light terminals closer to the root. Finally, we take Xin = X ∩ V (Gin ). We observe that each vertex of Xin can be reached from r in Gin by a path that uses only ghost vertices and vertices of Xin . Indeed, there is such a path in G00 , and its parts that lie outside of V (Gin ) must be contained in the connected components of G00 − (Viin ∪ Q), so they can be replaced by the traversal of the ghost vertices into which these connected components are collapsed. Next, from Claim 28 we infer that √ √ √ √ |X in | ≤ |X| − 10 k · α ≤ k − 10 k · λ − 10 k · α = k − 10 k · (λ + α). Hence, we conclude that X in is a pattern in Iin . Again, we apply the algorithm recursively to instance Iin , thus obtaining a subset of vertices Ain with the following properties: √ • Ain ⊇ Tinli and Gin [Ain ] admits a tree decomposition Tin of width at most 24022ctw k lg k with Ain ∩ Tin contained in the root bag. • The probability that Xin ⊆ Ain is at least LB(nin , ΠIin (Xin ), ΓIin , ΦIin (Xin )), where nin is the number of vertices on Gin . Observe that the sets of non-ghost vertices of Gout and Gin are contained in the vertex set of and hence we can treat Aout and Ain also as subsets of non-ghost vertices of G00 . Hence, let us define A := (Aout \ Q) ∪ Ain and declare that the algorithm returns A as the answer. Note that here, again as in the case of Section 5.2.1, we formally allow the instance Iin to exclude the vertices of Q from Ain , since they are heavy terminals there. We now verify that A has the required properties. First, since we have that Tinli = T li , then A ⊇ Ain ⊇ Tinli = T li , so A indeed covers all light terminals. We now check that G[A] admits a suitable tree decomposition. √ Claim 29. The subgraph G[A] admits a tree decomposition of width at most 24022ctw k lg k with A ∩ T contained in the root bag. √ Proof. Construct √the root node and associate with it the bag (T ∪Q)∩A. Since√|T | ≤ 16014ctw k lg k+ λ and λ, |Q| ≤ k/10, it follows that this bag has size at most 16015ctw k lg k. Let us restrict decomposition Tout to the vertex set A ∩ Aout ; that is, remove all vertices of Aout \ A from all bags of 0 of G Tout , thus obtaining a tree decomposition Tout out [Aout ∩ A]. We have that Ain ⊆ A, so there is no 0 as children of the need of restricting decomposition Tin . Finally, attach decompositions Tin and Tout root bag. It can be easily verified that √ in this manner we obtain a tree decomposition of G[A], and its width is clearly at most 24022ctw k lg k. Finally, the root bag contains A ∩ T by its definition. y G00 , We are left with estimating the success probability. Before we proceed with the final calculation, let us analyze each of the potentials. Note that graphs Gin and Gout intersect only at Q ∪ {r}, and each vertex of Q is a heavy terminal in Iin and a light terminal in Iout . This observation will be crucial in the forthcoming analysis. Recall also that Q, as a subset of Ci , contains no original light terminal, i.e., Q ∩ T li = ∅. Firstly, in Iout we contracted all vertices of Viin ∪ (Ci \ Q), and in Iin we contracted all vertices of out Vi ∪ (Ci \ Q). Among the vertices shared by the instances, being {r} ∪ Q, r is a light terminal in both instances, whereas the vertices of Q are heavy terminals only in Iin . From this it immediately follows that ΓI ≥ ΓIout + ΓIin . (21) 33 Observe that both Gout and Gin are constructed from G by means of edge contractions only, which can only decrease the distances from r. Hence, a vertex of X that was close in the original instance I, remains close in the instance Iin or Iout to which it belongs. The vertices of Q are adjacent to the root in Iout , and hence none of them can be a far vertex of Xout . Hence it follows that ΦI (X) ≥ ΦIout (Xout ) + ΦIin (Xin ). (22) Finally, the vertices of Q—shared among the instance—are declared light terminals in Iin , and hence the same analysis yields that ΠI (X) ≥ ΠIout (Xout ) + ΠIin (Xin ). (23) We now perform a finer analysis of the behaviour of potential Π. For this, we use Claim 28 as follows. Claim 30. The following holds: √ ΠI (X) lg ΠI (X) ≥ ΠIout (Xout ) lg ΠIout (Xout ) + ΠIin (Xin ) lg ΠIin (Xin ) + 10 k · α. (24) Proof. Observe that ΠIout (Xout ) = |(X ∩ Viout ) \ T li |; ΠIin (Xin ) = |(X ∩ Viin ) \ T li | + |X ∩ Ci |. Thus we have ΠIout (Xout ) + ΠIin (Xin ) = |(X ∩ Viout ) \ T li | + |(X ∩ Viin ) \ T li | + |X ∩ Ci | = |X \ T li | = ΠI (X). (25) Suppose first that ΠIout (Xout ) ≤ ΠIin (Xin ); the second case is symmetric. Combining this with (25) yields the following: ΠIout (Xout ) ≤ ΠI (X)/2 and ΠIin (Xin ) ≤ ΠI (X). By Claim 28, we infer that √ 10 k · α ≤ |(X ∩ Viout ) \ T li | ≤ ΠIout (Xout ). Putting all these together, we observe that: ΠI (X) lg ΠI (X) ≥ ΠIout (Xout ) lg ΠI (X) + ΠIin (Xin ) lg ΠI (X) ≥ ΠIout (Xout ) · (1 + lg ΠIout (Xout )) + ΠIin (Xin ) lg ΠIin (Xin ) ≥ ΠIout (Xout ) lg ΠIout (Xout ) + ΠIin (Xin ) lg ΠIin (Xin ) + ΠIout (Xout ) √ ≥ ΠIout (Xout ) lg ΠIout (Xout ) + ΠIin (Xin ) lg ΠIin (Xin ) + 10 k · α. This is exactly the claimed inequality. As mentioned before, the case when ΠIout (Xout ) ≥ ΠIin (Xin ) is symmetric. y Finally, we can proceed with the final success probability analysis. For this, we can take any c1 ≥ 2. Claim 31. Assume c1 ≥ 2. Supposing X ∩Wisl = 6 ∅ and the subroutine of Theorem 15 returned a separator chain, the algorithm outputs a set A with X ⊆ A with probability at least LB(n, Π(X), Γ, Φ(X)). This includes the (1−1/k) probability of success of the preliminary clustering step, the 1/k probability that the algorithm makes the correct assumption that X ∩ Wisl = ∅, the k −7 probability of correctly choosing the island C that intersects the pattern, the (102 lg n)−1 probability of choosing the right distance d, and k −2α−5 probability of correctly sampling the i, α, and set Q. 34 Proof. We denote by nin and nout the numbers of vertices in Gin and Gout , respectively; note that nin , nout ≤ n. From the probability of the success of recursive calls, we infer that   1 · k −8 · (10k 2 lg n)−1 · k −2α−5 · P(X ⊆ A) ≥ 1− k LB(nout , ΠIout (Xout ), ΓIout , ΦIout (Xout )) · LB(nin , ΠIin (Xin ), ΓIin , ΦIin (Xin )) ≥ k −2α−17 · (lg n)−1 · LB(nout , ΠIout (Xout ), ΓIout , ΦIout (Xout )) · LB(nin , ΠIin (Xin ), ΓIin , ΦIin (Xin )) (26) From (21) and (23) we infer that   1 c2 ΠI (X) lg ΓI 1− k ≤     1 c2 ΠIout (Xout ) lg ΓIout 1 c2 ΠIin (Xin ) lg ΓIin 1− · 1− . k k Similarly, from (22) and the fact that nin , nout ≤ n, we infer that:     lg k + lg lg nout lg k + lg lg n √ √ · ΦI (X) ≤ exp −c1 · · ΦIout (Xout ) · exp −c1 · k k   lg k + lg lg nin √ exp −c1 · · ΦIout (Xin ) . k (27) (28) Finally, from Claim 30 we have that     lg k + lg lg n lg k + lg lg nout √ √ exp −c1 · · ΠI (X) lg ΠI (X) ≤ exp −c1 · · ΠIout (Xout ) lg ΠIout (Xout ) · k k   lg k + lg lg nin √ · ΠIin (Xin ) lg ΠIin (Xin ) · exp −c1 · k   √ lg k + lg lg n √ exp −c1 · · 10α k . (29) k Let us analyze the last factor of the right hand side of (29), keeping in mind that c1 ≥ 2.   √ lg k + lg lg n √ exp −c1 · · 10α k = exp [−c1 · 10α · lg k − c1 · 10α · lg lg n] k ≤ k −20α · (lg n)−1 ≤ k −2α−17 · (lg n)−1 . (30) Finally, by plugging (27), (28), (29), and (30) into (26) with LB function expanded, and recognizing the expression LB(n, Π(X), Γ, Φ(X)), we obtain P(X ⊆ A) ≥ LB(n, Π(X), Γ, Φ(X)), which is exactly what we needed to prove. y Claim 29 ensures that the output of the algorithm has the required properties, whereas Claim 31 yields the sought lower bound on the success probability. 35 6 Conclusions In this work we have laid foundations for a new tool for obtaining subexponential parameterized algorithms for problems on planar graphs, and more generally on graphs that exclude a fixed apex graph as a minor. The technique is applicable to problems that can be expressed as searching for a small, connected pattern in a large host graph. Using the new approach, we designed, in a generic manner, a number of subexponential parameterized algorithms for problems for which the existence of such algorithms was open. We believe, however, that this work provides only the basics of a new methodology for the design of parameterized algorithms on planar and apex-minor-free graphs. This methodology goes beyond the paradigm of bidimensionality and is yet to be developed. An immediate question raised by our work is whether the technique can be derandomized. Note that our main result, Theorem 1, immediately yields the following combinatorial statement. Theorem 32. Let C be a class of graphs that exclude a fixed apex graph as a minor. Suppose G is an n-vertex graph from C and k is a positive integer. Then there exists a family F of subsets of vertices G, with the following properties satisfied: √ (P1) For each A ∈ F, the treewidth of G[A] is at most O( k log k). (P2) For each vertex subset X ⊆ V (G) such that G[X] is connected and |X| ≤ k, there exists some A ∈ F for which X ⊆ A. √ (P3) It holds that |F| ≤ 2O( √ k log2 k) · nO(1) . 2 Proof. Let f (n, k) ∈ 2O( k log k) ·nO(1) be the inverse of the lower bound on the success probability of the algorithm of Theorem 1. Repeat the algorithm of Theorem 1 f (n, k) · 2k ln n times, and consider the list of obtained vertex subsets as a candidate for F. Let us fix some X ⊆ V (G) such that |X| ≤ k and G[X] is connected, and consider the probability that there is some A ∈ F for which X ⊆ A. For one particular run of the algorithm of Theorem 1, this holds with probability at least f (n, k)−1 . As the runs are independent, the probability that no element of F covers X is upper bounded by  1− 1 f (n, k) f (n,k)·2k ln n ≤ e−2k ln n = n−2k . As the number of k-vertex subsets of V (G) is upper bounded by nk , we infer that the expected value of the number of sets X for which there is no element of F covering them, is upper bounded by n−k < 1. Hence, there is a run of the described experiment for which this number is zero; this run yields the desired family F. The above proof of Theorem 32 gives only a randomized algorithm constructing a family F that indeed covers all small patterns with high probability. We conjecture that the algorithm can be derandomized; is, that the family whose existence is asserted by Theorem 32 can be computed √ that 2 O( k log k) in time 2 · nO(1) . So far we are able to derandomize most of the components of the algorithm, primarily using standard constructions based on splitters and perfect hash families [26]. However, one part of the reasoning with which we still struggle is the clustering step (Theorem 12). Q1. Is it possible to construct a family with properties described in Theorem 32 in √ c deterministic time 2O( k log k) · nO(1) , for some constant c? In Appendix A we attempt to generalize our technique to the case when the pattern is disconnected, and when the class only excludes some fixed (but arbitrary) graph H as a minor. In the 36 case of disconnected patterns, we were able to prove a suitable generalization of Theorem 1, however the success probability of the algorithm depends inverse-exponentially on number of connected components of the pattern. In the case of general H-minor-free classes, we needed to assume that the pattern admits a spanning tree of constant maximum degree. So far we do not see any reason for any of these constraints to be necessary. Q2. Is it possible to prove Theorem 1 without the assumption that the subgraph induced by X has to be connected? Q3. Is it possible to prove Theorem 1 only under the assumption that all graphs from C exclude some fixed (but arbitrary) graph H as a minor? Our next question concerns local search problems in the spirit of the LS Vertex Cover problem considered in Section 1. Apart from this problem, Fellows et al. [18] designed FPT algorithms also for the local search for a number of other problems on apex-minor-free classes, including LS Dominating Set and its distance-d generalization. Here, we are given a dominating set S in a graph G from some apex-minor-free class C, and we ask whether there exists a strictly smaller dominating set S 0 that is at Hamming distance at most k from S. Again, the approach of Fellows et al. [18] is based on the observation that if there is some solution, then there is also a solution S 0 such that S4S 0 can be connected using at most k additional vertices. Thus, we need to search for a connected pattern of size 2k, instead of k, in which suitable sets S \S 0 and S 0 \S are to be found. Unfortunately, now the preprocessing step fails: vertices outside A may require to be dominated from within A, which poses additional constraints that are not visible in the graph G[A] only. Hence, we cannot just focus on the graph G[A]. Observe, however, that the whole reasoning would go through if A covered not just S4S 0 , but also its neighborhood. More generally, if the considered problem concerns domination at distance d, then we should cover the distance-d neighborhood of S4S 0 . This motivates the following question. Q4. Fix some positive constant d. Is it possible to prove a stronger version of Theorem 1, where the sampled set A is required to cover the whole distance-d neighborhood of the set X with the same asymptotic lower bound on the success probability? Finally, so far we do not know whether the connectivity condition in Theorem 5 is necessary. Q5. Is it possible to solve Subgraph Isomorphism on planar graphs in time 2O(k/ log k) ·nO(1) , even without the assumption that the pattern graph is connected? Note that a positive answer to Q2 implies a positive answer here as well, as the algorithm of Theorem 4 does not require the pattern graph to be connected. Acknowledgements. The authors thank Felix Reidl, Fernando Sánchez Villaamil, Somnath Sikdar, and Yngve Villanger for some preliminary discussions on the topic of this paper. References [1] J. Alber, H. L. Bodlaender, H. Fernau, T. Kloks, and R. Niedermeier. Fixed parameter algorithms for dominating set and related problems on planar graphs. Algorithmica, 33(4):461–493, 2002. [2] N. Alon, R. Yuster, and U. Zwick. Color-coding. J. ACM, 42(4):844–856, 1995. [3] H. L. Bodlaender, M. Cygan, S. Kratsch, and J. Nederlof. Deterministic single exponential time algorithms for connectivity problems parameterized by treewidth. Inf. Comput., 243:86–111, 2015. [4] H. L. Bodlaender, J. Nederlof, and T. van der Zanden. Private communication, see also slides at http://www.lorentzcenter.nl/lc/web/2015/701/presentations/Bodlaender.pdf. [5] G. Borradaile, P. Klein, D. Marx, and C. Mathieu. Algorithms for Optimization Problems in Planar Graphs (Dagstuhl Seminar 13421). Dagstuhl Reports, 3(10):36–57, 2014. 37 [6] M. Chimani, P. Mutzel, and B. Zey. Improved Steiner tree algorithms for bounded treewidth. J. Discrete Algorithms, 16:67–78, 2012. [7] M. Cygan, F. V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk, M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer, 2015. [8] E. D. Demaine, F. V. Fomin, M. Hajiaghayi, and D. M. Thilikos. Fixed-parameter algorithms for (k, r)-center in planar graphs and map graphs. ACM Transactions on Algorithms, 1(1):33–47, 2005. [9] E. D. Demaine, F. V. Fomin, M. Hajiaghayi, and D. M. Thilikos. Bidimensional Structures: Algorithms, Combinatorics and Logic (Dagstuhl Seminar 13121). Dagstuhl Reports, 3(3):51–74, 2013. [10] E. D. Demaine, F. V. Fomin, M. T. Hajiaghayi, and D. M. Thilikos. Subexponential parameterized algorithms on bounded-genus graphs and H-minor-free graphs. J. ACM, 52(6):866–893, 2005. [11] E. D. Demaine and M. Hajiaghayi. The bidimensionality theory and its algorithmic applications. Comput. J., 51(3):292–302, 2008. [12] E. D. Demaine and M. Hajiaghayi. Linearity of grid minors in treewidth with applications through bidimensionality. Combinatorica, 28(1):19–36, 2008. [13] E. D. Demaine and M. T. Hajiaghayi. Equivalence of local treewidth and linear local treewidth and its algorithmic applications. In Proceedings of the 15th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2004, pages 840–849. SIAM, 2004. [14] F. Dorn. Planar Subgraph Isomorphism revisited. In Proceedings of the 27th International Symposium on Theoretical Aspects of Computer Science, STACS 2010, volume 5 of Leibniz International Proceedings in Informatics (LIPIcs), pages 263–274, Dagstuhl, Germany, 2010. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik. [15] F. Dorn, F. V. Fomin, D. Lokshtanov, V. Raman, and S. Saurabh. Beyond bidimensionality: Parameterized subexponential algorithms on directed graphs. Information and Computation, 233:60–70, 2013. [16] F. Dorn, F. V. Fomin, and D. M. Thilikos. Catalan structures and dynamic programming in H-minor-free graphs. J. Computer and System Sciences, 78(5):1606–1622, 2012. [17] D. Eppstein. Subgraph isomorphism in planar graphs and related problems. J. Graph Algorithms and Applications, 3:1–27, 1999. [18] M. R. Fellows, F. V. Fomin, D. Lokshtanov, F. A. Rosamond, S. Saurabh, and Y. Villanger. Local search: Is brute-force avoidable? J. Comput. Syst. Sci., 78(3):707–719, 2012. [19] F. V. Fomin, D. Lokshtanov, and S. Saurabh. Bidimensionality and geometric graphs. In Proceedings of the 22nd Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, pages 1563–1575. SIAM, 2012. [20] F. V. Fomin, D. Lokshtanov, and S. Saurabh. Efficient computation of representative sets with applications in parameterized and exact algorithms. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, pages 142–151. SIAM, 2014. [21] M. Grohe. Local tree-width, excluded minors, and approximation algorithms. Combinatorica, 23(4):613–632, 2003. [22] R. Impagliazzo and R. Paturi. On the complexity of k-SAT. J. Computer and System Sciences, 62(2):367–375, 2001. [23] P. N. Klein and D. Marx. A subexponential parameterized algorithm for subset TSP on planar graphs. In Proceedings of the 24th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, pages 1812–1830. SIAM, 2014. [24] R. J. Lipton and R. E. Tarjan. Applications of a planar separator theorem. SIAM J. Computing, 9:615–627, 1980. [25] J. Matoušek and R. Thomas. On the complexity of finding iso- and other morphisms for partial k-trees. Discrete Mathematics, 108(1-3):343–364, 1992. [26] M. Naor, L. J. Schulman, and A. Srinivasan. Splitters and near-optimal derandomization. In Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science, FOCS 1995, pages 182–191. IEEE, 1995. [27] M. Pilipczuk, M. Pilipczuk, P. Sankowski, and E. J. van Leeuwen. Subexponential-time parameterized algorithm for steiner tree on planar graphs. In Proceedings of the 30th International Symposium on Theoretical Aspects of Computer Science, STACS 2013, volume 20 of Leibniz International Proceedings in Informatics (LIPIcs), pages 353–364, Dagstuhl, Germany, 2013. Schloss Dagstuhl–Leibniz-Zentrum 38 fuer Informatik. [28] M. Pilipczuk, M. Pilipczuk, P. Sankowski, and E. J. van Leeuwen. Network sparsification for Steiner problems on planar and bounded-genus graphs. In Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2014, pages 276–285. IEEE Computer Society, 2014. [29] N. Robertson and P. D. Seymour. Graph minors. III. Planar tree-width. J. Combinatorial Theory Ser. B, 36:49–64, 1984. [30] N. Robertson and P. D. Seymour. Graph minors. XIII. The disjoint paths problem. J. Combinatorial Theory Ser. B, 63(1):65–110, 1995. [31] I. Sau and D. M. Thilikos. Subexponential parameterized algorithms for degree-constrained subgraph problems on planar graphs. J. Discrete Algorithms, 8(3):330–338, 2010. [32] S. Tazari. Algorithmic graph minor theory: approximation, parameterized complexity, and practical aspects. PhD thesis, Humboldt University of Berlin, 2010. [33] S. Tazari. Faster approximation schemes and parameterized algorithms on (odd-)H-minor-free graphs. Theor. Comput. Sci., 417:95–107, 2012. 39 A Extension to multiple components of the pattern and to Hminor-free graphs In this section we develop the following extension of Theorem 1 for graph classes excluding a fixed minor, at the cost of a bound on the maximum degree of the pattern. By a proper minor-closed graph class we mean a graph class that is minor-closed and does not contain all graphs. Theorem 33. Let C be a proper minor-closed graph class, and let ∆ be a fixed constant. Then there exists a randomized polynomial-time algorithm that, given an n-vertex graph G from C and an integer k, samples a vertex subset A ⊆ V (G) with the following properties: √ • The induced subgraph G[A] has treewidth O( k log k). • For every vertex subset X ⊆ V (G) with |X| ≤ k such that G[X] is connected and has a spanning tree of degree ∆, the probability that X is covered by A, that is X ⊆ A, √ maximum 2 k log k) O(1) O( ·n )−1 . is at least (2 To see why the above assumption seems necessary with our techniques, let us look at the following example. Let G be a graph that contains a universal vertex v0 (i.e., adjacent to all vertices of V (G) \ {v0 }) such that G − v0 is planar. It is easy to see that, since G − v0 is K5 -minor-free, we have that G is K6 -minor-free. Let H be a connected pattern in G: a connected subgraph on k vertices. If H contains v0 , then H − v0 is a not necessarily connected pattern (subgraph) of G − v0 . Hence, finding a connected k-vertex pattern in G boils down to finding a not necessarily connected (k − 1)-vertex pattern in G − v0 . However, if we bound the maximum degree of the pattern, the (k − 1)-vertex pattern H − v0 in the graph G − v0 has bounded number of connected components, making the situation much more similar to the connected planar (or apex-minor-free) case. We do not know how to handle arbitrary disconnected patterns (subgraphs) with our techniques. As we show √ in this section, we are able to do it in a limited fashion, namely we can handle up to roughly k/ lg k connected components without increasing the asymptotic bound in the exponential factor in the success probability. The proof of the following generalization of Theorem 1 is described in Section A.1. Theorem 34. Let C be a class of graphs that exclude a fixed apex graph as a minor. Then there exists a randomized polynomial-time algorithm that, given an n-vertex graph G from C and an integer k, samples a vertex subset A ⊆ V (G) with the following properties: √ • The induced subgraph G[A] has treewidth O( k log k). √ • For every vertex subset X ⊆ V (G) with |X| ≤ k such that G[X] has O( k/ log k) connected the probability that X is covered by A, that is X ⊆ A, is at least √ components, 2 O( k log k) O(1) −1 (2 ·n ) . After proving Theorem 34, in Section A.2 we show how to use this extension for a bounded number of connected components in order to handle connected patterns in graph classes excluding a fixed minor. To this end, we use the Robertson-Seymour decomposition theorem that provides a tree decomposition for any graph that exclude a fixed minor. Roughly speaking, in this decomposition every bag corresponds to a graph almost embeddable into a fixed surface, and every adhesion (intersection of neighboring bags) has bounded size. By a result of Grohe [21], one can delete a bounded number of vertices from an almost embeddable graph to get an apex-minor-free graph. If the pattern we are looking for is connected and has bounded degree, deleting a bounded number of vertices can split it only into a bounded number of connected components. Thus, the algorithm 40 for graph classes excluding a fixed minor boils down to an application of either Theorem 34 or a simple Baker-style argument to every bag, after turning it into an apex-minor-free graph. A.1 Extension to bounded number of components In this section we prove Theorem 34, that is, we extend Theorem 1 to handle bounded number of connected components of the pattern. We describe it as a series of modifications to the proof of Theorem 1 from Section 5. As in Section 5, in a recursive step we are given an instance I consisting of a minor G of the input graph G0 , a root r ∈ V (G), two disjoint sets of light and heavy terminals T li , T he ⊆ V (G) with r ∈ T li , a set R ⊆ V (G) \ T of ghost vertices representing connectivity in other parts of the input graph, and credit λ. We maintain the same invariants regarding terminals: every light terminal √ is within distance at most 3 from the root, and the number of terminals is bounded by 16014ctw k lg k + λ. The first significant difference is with regards to the definition of a pattern. We start with the following definition. Definition 35. Let X ⊆ V (G) \ R be a set of vertices. Two vertices x, y ∈ X are connected if they belong to the same connected component of G[X ∪ R]. A component of the set X is an equivalence class in the relation of being connected (i.e., a set of vertices from X from a connected component of G[X ∪ R] that contains at least one vertex of X). A component Y is rooted if it contains a vertex within distance at most 3 from the root, and free otherwise. For a set X ⊆ V (G) \ R in an instance I, we introduce the following component potential as the fourth potential: Component potential ΛI (X) := number of free components of X. We can now formally define a pattern. A set X ⊆ V (G) \ R is a pattern if r ∈ X and √ √ |X| ≤ k − 10 k · λ − 486 k lg k · ΛI (X). That is, we drop the assumption of the connectivity of X (possibly with help of some ghost vertices), but every free component imposes a penalty on the allowed size of the pattern. Note that every pattern contains at least one rooted component (the one containing the root r), and an arbitrary number of free components. A.1.1 Potentials Let us now proceed to the description of the potentials. Apart from introducing the component potential, we extend the set of far vertices: every vertex in a free component is far, regardless of its distance from the root r. √ FarI (X) := {u ∈ X : distG (u, r) > 1000 k lg k or u is in a free component} As before, every vertex of the pattern that is not far is called close. Intuitively, every free component of the pattern decreases the success probability of the algorithm by a factor inverse-quasipolynomial in k and lg n. Formally, we define c LB(n, Π(X), Γ, Φ(X), Λ(X)) :=    lg n lg k 2 LB(n, Π(X), Γ, Φ(X)) · exp −c3 · Λ(X) · lg k(lg k + lg lg n) + √ k 41 for some constant c3 that will be determined later in this section. Here, again, n denotes the total number of vertices of the graph, and we omit the subscript I whenever the instance is clear from the context. Our goal is to compute a subset of non-ghost vertices A ⊆ V (G) \ R with the following properties: (1) It holds √ that T li ⊆ A, and the graph G[A] admits a tree decomposition of width at most 24022ctw k lg k, where T ∩ A is contained in the root bag. (2) For every pattern X in instance I, we require that c P(X ⊆ A) ≥ LB(n, Π(X), Γ, Φ(X), Λ(X)). A.1.2 (31) Operations on the instance One of the crucial property of the algorithm of Section 5 is that it modifies the input graph in a limited fashion. Namely, every subinstance is created by means of the following operations: 1. Edge contraction. Furthermore, if one of the contracted vertices is a ghost vertex, the new vertex remains a ghost vertex or the contraction is made onto the root. 2. Other modifications such√as vertex/edge deletion/addition, but only involving vertices within distance larger than 2000 k lg k from r, and not involving vertices in the pattern X nor ghost vertices essential for the connectivity relation within the pattern (assuming that the algorithm made correct random choices). The analysis of Section 5 used the above properties to ensure that the algorithm never turns a close vertex into a far vertex, assuming that the algorithm makes correct random choices. Here, we observe that neither of the above modifications can create a new component. Furthermore, a component that is rooted remains rooted, and a vertex belonging to a rooted component remains in a rooted component. As a result, these modifications cannot turn a close vertex into a far vertex under the new definition of the far vertices, nor create a new free component. In particular, whenever we construct a pattern in a subinstance by projecting the original pattern in √ the natural way, the projection remains a pattern in the new instance. This is because the 486 k lg k · Λ(X) penalty in the upper bound on the size of the pattern does not increase. A.1.3 Solving the general problem First, note that we can make the same assumptions (a)–(d) as in Section 5. The general structure and the main steps of the algorithm are the same as in √ Section 5: we define the margin M to be the set of vertices of G within distance at most 2000 k lg k from the root r, and apply the clustering procedure to the graph (G − M )hR \ M i. Note that the clustering procedure does not use the assumption of the connectivity of the pattern. Thus, we can assume that every island — every connected component of G − M — has radius at most 9k 2 lg n (where ghost vertices are traversed for free), at the cost of a (1 − 1/k) multiplicative factor in the success probability. By slightly abusing the notation, we redefine G to be the graph obtained from the clustering procedure; this graph was named G0 in Section 5. By the same arguments as in Section 5, by locally bounded treewidth we obtain sets Z and W ⊆ V (G) with the following properties: (1) Z consists of a selection of vertices of M and islands of G − M , and we have that r ∈ Z; √ (2) |Z| ≤ 8007ctw k lg k; 42 (3) W consists of vertices of Z ∩ M , denoted Wnrm , and the vertices that belong to the islands contained in Z, denoted Wisl ; (4) every connected component of G − W contains at most |T |/2 terminals and at most |V (G) \ (T li ∪ R)|/2 vertices that are neither light terminals nor ghost vertices. As before, we randomly select a branch we pursue: with probability (1 − 1/k) we assume that the pattern is disjoint with Wisl , and with the remaining probability 1/k we assume otherwise. Thus, we have two cases: when Wisl is assumed to be disjoint with the pattern, and when we suppose that Wisl intersects the pattern. A.1.4 Case when Wisl is disjoint with the pattern The crux in this case is to observe that nothing new happens, mostly because the argumentation of Section 5.2.1 does not rely on the connectivity of the pattern. That is, we argue that the algorithm as described in Section 5 works also in our setting. Recall that in this case we first delete Wisl from G; let the obtained graph be named G00 , as in Section 5. Then recurse into instances ID created for every connected component D of G − W = G00 − Wnrm , defined as in Section 5. In the instance ID we look for pattern XD := X ∩ VD , where VD = NG00 [D] ∪ {r}. We denote by CC the set of connected components of G − W . We now need to analyze the behavior of the free components in the process of recursion. We start with the following observation that follows directly from the discussion of Section A.1.2. Claim 36. Let Y be a component of X in I, and let D ∈ CC be such that Y ∩ VD 6= ∅. Then Y ∩ VD is contained in a single component of XD in ID . Second, we observe that the rooted components cannot give rise to any new free components. Claim 37. Let Y be a rooted component of X in I, and let D ∈ CC be such that Y ∩ VD = 6 ∅. Then Y ∩ VD is contained in a rooted component of XD in ID . Proof. Let w be a vertex of Y that is within distance at most 3 from the root r. By the definition of a component, there exists a path P in G00 [Y ∪R] between w and a vertex v ∈ Y ∩VD such that no vertex of P −{v} belongs to VD , except for possibly a neighbor v 0 of v on P if v 0 is a ghost vertex in NG00 (D). Consequently, in the process of construction of ID , the path P − {v} is contracted either onto the root or onto a ghost vertex. As the distance between w and r is at most three in G (hence also in G00 ), and ghost vertices are traversed for free in our distance measure, we have that v is within distance at most 3 from the root in ID . Consequently, Y ∩ VD is contained in a rooted component of ID . y Third, we observe that a free component cannot split into multiple free components. Claim 38. Let Y be a free component of X in I. Then there exists a component D0 ∈ CC such that for every D ∈ CC such that D 6= D0 and Y ∩ VD = 6 ∅, the set Y ∩ VD is contained in a rooted component of XD in ID . Proof. We say that a component D ∈ CC is touched if Y ∩ VD = 6 ∅. We consider all paths in G00 between the root r and a vertex w ∈ NG00 [D] for a touched component D, and pick Q0 to be a shortest such path. Let w ∈ NG00 [D0 ] be the second endpoint of Q0 , where D0 is a touched component. By the minimality of Q0 , no vertex of Q0 − {w} belongs to NG00 [D] for a touched component D. Let Q1 be a shortest path between w and a vertex v ∈ Y ∩ VD0 with all internal vertices in D0 ; such a path exists by the connectivity of G00 [D0 ], and by the minimality of Q1 no vertex of Q1 − {v} belongs to Y . 43 Consider a touched component D ∈ CC different than D0 . By the definition of a component, there exists a path Q2 in G00 [Y ∪ R] between v and a vertex u ∈ Y ∩ VD such that no vertex of Q2 −{u} belongs to VD , except for possibly a neighbor u0 of u on Q2 that is a ghost vertex in NG00 (D). Observe that from the walk being the concatenation of the paths Q0 , Q1 , and Q2 , only the root r and the vertices w, u, and u0 may potentially belong to VD . Consequently, in ID , the vertex u is within distance at most 2 from the root (recall that u0 is a ghost vertex if it belongs to VD ). We infer that Y ∩ VD is contained in a rooted component of XD in ID . This finishes the proof of the claim. y Claims 36–38 justify the following. Claim 39. The following holds: ΛI (X) ≥ X ΛID (XD ). (32) D∈CC Furthermore, Claims 36–38 ensure that a close vertex of X in I cannot become a far vertex in any of the instances ID . Consequently, the potential analysis of Claim 22 holds also in our case. Using Claim 39, the following claim follows along the same lines as Claim 24, finishing the analysis of this subcase. Claim 40. Supposing X ∩ Wisl = ∅, the algorithm outputs a set A with X ⊆ A with probability c at least LB(n, ΠI (X), ΓI , ΦI (X), ΛI (X)). This includes the (1 − 1/k) probability of success of the preliminary clustering step, and (1 − 1/k) probability that the algorithm makes the correct assumption that X ∩ Wisl = ∅. A.1.5 Case when Wisl intersects the pattern Just as in Section 5, in the second case we (a) guess (by sampling at random) the island uC ∈ Z for which C intersects the pattern, (b) take z to be a non-ghost vertex of C that is at distance at most 9k 2 lg n from all vertices of C within C, (c) guess (by sampling at random) the distance d from z to the pattern within the island C, and (d) contract the vertices of C within distance less than d from z onto z. In step (d), we perform the same distinction as in Section 5 between non-ghost vertices (for which we use distance less than max(d, 1)) and ghost vertices (for which we use distance less than max(d, 1)−1). As a result, by incurring a multiplicative factor 1 · |Z|−1 · (10k 2 lg n)−1 ≥ k −11 (lg n)−1 k √ in the success probability, we can assume that we have a vertex z ∈ / R with distG (r, z) > 2000 k lg k such that there exists a vertex of the pattern within distance at most 1 from z. By slightly abusing the notation, G denotes the graph after the modifications. In this case, as before, we apply the duality theorem (Theorem 15) to the graph GhRi, pair of vertices (s, t) = (r, z), and parameters: √ p = d120 k lg ke and q = k. The further behavior of the algorithm, as well as its analysis, depends on the output of the duality theorem. Thus, we need to consider two subcases: either the duality theorem returns a family of paths or a nested chain of circular separators. 44 Subcase: a sequence of radial paths. Following the argumentation of Section 5, in this section we are working with the following objects: √ • A vertex z ∈ V (G) \ R with distG (z, r) > 2000 k lg k, such that some vertex of X is within distance at most 1 from z. • A sequence P1 , P2 , . . . , Pk of (r, z)-paths in G, such that for every i ∈ [k] the set V (Pi ) can be partitioned as as V (Pi ) = {r, z} ] (V (Pi ) ∩ R) ] Pub(Pi ) ] Prv(Pi ), √ where the sets Prv(Pi ) are pairwise disjoint and |Pub(Pi )| ≤ 480 k lg k. The success probability so far in this case is at least k −11 (lg n)−1 . As in Section 5, we randomly pick an index i ∈ [k] and assume further that X ∩ Prv(Pi ) = ∅. Such an index i exists as |X| ≤ k, the sets Prv(Pi ) are pairwise disjoint, and r ∈ X but r ∈ / Prv(Pi ) for every i. Hence, the success probability of this step is at least 1/k. We reduce Pi in the same way as in Section 5. Let v0 be the last light terminal on Pi (it exists as r is a light terminal), let P 0 be the suffix of Pi from v0 to z, and let v0 , v1 , . . . , v` = z be the vertices of (Pub(Pi ) ∩ V (P 0 )) ∪ {v0 , z} in the order of their appearance on P 0 . For every 0 ≤ j < `, we inspect the segment of P 0 between vj and vj+1 . If this segment contains some ghost vertex gj , then contract it entirely onto gj ; if there is more than one ghost vertex, choose an arbitrary one as gj . Otherwise, if there are no ghost vertices on the segment, contract the whole segment onto vertex vj . Let H be the resulting graph, and construct the instance I 0 as in√ Section 5. We have √ ` ≤ |Pub(Pi )| + 1 ≤ 485 k lg k and distG (r, v0 ) ≤ 3, thus distH (r, z) ≤ 488 k lg k. However, the proof of Claim 25 fails if the vertex of the pattern within distance at most 1 from z belongs to a free component. The crux here is that if this is the case, then we can turn this free component into close by adding {v0 , v1 , . . . , v` } to the pattern X, providing a gain in the potential Λ(X). Let X 0 := X ∪ {v0 , v1 , . . . , v` }. Claim 41. We have FarI 0 (X) ⊆ FarI (X) and ΛI 0 (X) ≤ ΛI (X). Furthermore, one of the following holds: √ • |FarI (X) \ FarI 0 (X)| ≥ 511 k lg k, or • X 0 is a pattern in I 0 and ΛI 0 (X 0 ) < ΛI (X). Proof. The first part of the claim follows directly from the discussion of Section A.1.2 and the fact H is created from G by means of edge contractions, in the same manner as in Section 5. For the second part, let v ∈ X be a vertex within distance at most 1 from z in G (possibly v = z). If v belongs to a rooted component of X in I, the analysis of Claim 25 remains valid. That is, G[X ∪ R] contains √ a path P from v to a vertex w that is within distance at most 3 from the root, and the first 511 k lg k vertices of X of this path belong to FarI (X). These vertices become close √ in H, as distH (r, v0 ) ≤ 488 k lg k. Hence, we are left with the case when v belongs to some free component Y of X in I. The crucial observation is that in H, the vertex v belongs to a rooted component of X 0 , as v0 ∈ T li (and thus is within distance at most 3 from the root) and v0 , v1 , . . . , v` is a path in H. By the discussion in Section A.1.2, no new free component is created in I 0 , while Y stops to be free and becomes part 45 of a rooted component in I 0 . Hence, ΛI 0 (X 0 ) < ΛI (X). Furthermore, |X 0 | ≤ (` + 1) + |X|   √ √ √ ≤ 486 k lg k + k − 10 k · λ − 486 k lg k · ΛI (X) √ √ ≤ k − 10 k · λ − 486 k lg k · ΛI 0 (X 0 ). Consequently, X 0 is a pattern in I 0 , and the claim is proven. y The potential gains in Claim 41 allow us to conclude with the analog of Claim 27. For its proof, we need the following estimate. Claim 42. For every x, y > 0 it holds that (x + y) lg(x + y) − x lg x ≤ y(2 + lg(x + y)). Proof. We have (x + y) lg(x + y) − x lg x = y lg(x + y) + x lg(1 + y/x) ≤ y lg(x + y) + 2y, where in the last inequality we have used the fact that lg(1 + t) ≤ 2t for every t > 0. y Claim 43. Assume c1 ≥ 1 and c3 is sufficiently large. Supposing X ∩ Wisl 6= ∅ and the subroutine of Theorem 15 returned a sequence of paths, the algorithm outputs a set A with X ⊆ A with c probability at least LB(n, Π(X), Γ, Φ(X), Λ(X)). This includes the (1 − 1/k) probability of success of the preliminary clustering step, the 1/k probability that the algorithm makes the correct assumption that X ∩ Wisl = ∅, the k −7 probability of correctly choosing the vertex z, the (10k 2 lg n)−1 probability of choosing the right distance d, and the 1/k probability of choosing the right path index i. Proof. The proof follows the same lines as the proof of Claim 27. Note that we have ΛI 0 (X) ≤ ΛI (X) and ΦI 0 (X) ≤ ΦI (X). If the first option of Claim 41 happens (i.e., the drop in the potential Φ(X)), then the analysis is the same as in Claim 27. It remains to analyze the second case. Note that here we need to focus on all potentials, as we will analyze pattern X 0 in the instance I 0 . √ 0 Since |X \ X| ≤ 486 k lg k, we have (using Claim 42 and |X 0 | ≤ k for the first inequality): √ √ ΠI 0 (X 0 ) lg ΠI 0 (X 0 ) − ΠI (X) lg ΠI (X) ≤ 486 k lg k · (2 + lg k) ≤ 972 k lg2 k √ ΦI 0 (X 0 ) − ΦI (X) ≤ 486 k lg k √ ΠI 0 (X 0 ) lg ΓI 0 − ΠI (X) lg ΓI ≤ 486 k lg k lg n ΛI 0 (X 0 ) − ΛI (X) ≤ −1. Thus, a straightforward computation shows that c 0 , ΠI 0 (X 0 ), ΓI 0 , ΦI 0 (X 0 ), ΛI 0 (X 0 ))   LB(n ≥ exp −1458 · c1 · lg2 k(lg k + lg lg n) · c LB(n, ΠI (X), ΓI , ΦI (X), ΛI (X)) √   1 c2 ·486 k lg k lg n 1− · k    lg k lg n 2 √ exp c3 lg k(lg k + lg lg n) + . k For sufficiently large c3 , namely c3 ≥ 1458 · c1 + 486 lg e · c2 + 12, the right hand side in the inequality above is at least k 12 lg n, required to offset the success probability of the random choices, similarly as in the proof of Claim 27. This finishes the proof of the claim and the analysis of this subcase. y 46 Subcase: nested chain of circular separators. Following the argumentation of Section 5, in this section we are working with the following objects: √ • A vertex z ∈ V (G) \ R with distG (z, r) > 2000 k lg k, such that some vertex of X is within at most distance 1 from z. • An (r, z)-separator chain (C1 , . . . , Cp ) in GhRi with |Cj | ≤ 2k for each j ∈ [p], where √ p = d120 k lg ke. The success probability so far in this case is at least k −11 (lg n)−1 . As in Section 5, we treat (C1 , . . . , Cp ) as √ a separator chain in G, and drop the first three separators. In this manner, we can assume p ≥ d117 k lg ke, every Ci is disjoint with T li ∪ R, and all vertices within distance at most 3 from the root, including all light terminals, are in reach(r, G−Ci ) for every i. Recall √ that in this case the algorithm of Section 5 samples an index i ∈ [p], an integer α between 1 and k/10, and a set Q ⊆ Ci of size α. The intuition is that we hope for Q = Ci ∩ X, and Ci being a sparse separator in the sense of Claim 28. In our case, we additionally allow the value α = 0 in the above sampling, and whenever there exists an index i ∈ [p] with Ci ∩ X = ∅, we require from the algorithm to sample such an index i and sample α = 0. If no such index exists, the analysis of the algorithm of Section 5 remains applicable: √ √ Claim−128 still −1 holds, and only the probability of choosing the correct α drops from ( k/10) to (1+ k/10) ; however, in both cases it is at least k −1 , and the total probability of making correct random choices is at least k −2α−5 , as in Section 5. Furthermore, we have the following with regards to the potential Λ(X): Claim 44. If for every separator Ci we have Ci ∩ X 6= ∅, and the algorithm made correct random choices, then the following holds: ΛI (X) ≥ ΛIin (Xin ) + ΛIout (Xout ). Proof. Let Y be a component of X in ID . As discussed in Section A.1.2, Y ∩ Xin is either empty or contained in a single component Yin of Xin in Iin . Similarly, Y ∩ Xout is empty or contained in a single connected component Yout of Xout in Iout . We show that if Y is a rooted component of X in I, then both Yin and Yout are rooted in their respective instances if they exist, and if Y is free, then at most one of these components is free. We first note that if Y ∩ Ci 6= ∅, then Yout exists and is rooted, as all vertices of X ∩ Ci are neighbors of the root in Iout . Assume first that Y is a rooted component of I. Then Yin is a rooted component of Iin , as Iin is created from I by edge contractions only. Furthermore, if Y ∩ Ci = ∅, then Y ∩ Xout = ∅, and otherwise as discussed above Yout is a rooted component of Iout . Now assume that Y is a free component of I. If Y ∩ Ci = ∅, then Y ∩ Xin or Y ∩ Xout is empty. Otherwise, as already discussed, Yout is a rooted component of Iout . This finishes the proof of the claim. y Thus, we are left with the case when there exists a separator Ci that is disjoint with X, and we assume that the algorithm correctly guessed such an index i and guessed α = 0. The probability of making a correct choice is at least √ 1 · (1 + k/10)−1 ≥ k −5 = k −2α−5 . p 47 Recall that for i ∈ [p] we defined the following partition V (G) = Viin ] Ci ] Viout : Viin = reach(r, G − Ci ) and Viout = V (G) \ (Ci ∪ Viin ). The intuition is as follows: since Ci ∩ X = ∅ and Ci does not contain any ghost terminal, we can independently recurse on Viin and Viout . In Viin , we need to replace the components of G − Viin with ghost vertices to keep the potentials bounded. On the other hand, Viout does not contain any vertex within distance at most 3 from the root, and thus every vertex of the pattern X in Viout is in a free component and thus far. Hence, we can freely choose a new root in this subcase: by proclaiming z the new root, we make the component containing a vertex of X within distance 1 from z close, making a gain in the Λ(X) potential. Let us now proceed with formal argumentation. The algorithm defines two subinstances Iout and Iin as follows. The instance Iin is defined in the same way as in Section 5 for α = 0 and Q = ∅. That is, we take Iin = (Gin , r, Tinli , Tinhe , Rin , λ). Graph Gin is constructed from G as follows. Inspect the connected components of the graph G − Viin . For each such component D, contract it onto a new vertex gD that is declared to be a ghost vertex. That is, we define Rin to be (R ∩ Viin ) ∪ {gD : D ∈ cc(G − Viin )}. For the terminal sets Tinli , Tinhe , recall that T li ⊆ Viin , so all the original light terminals persist in the graph Gin . Thus we take Tinli = T li . For the heavy terminals, we inherit them: Tinhe = T he ∩V (Gin ). Finally, we take Xin = X ∩ V (Gin ). By the same arguments as in Section 5, Iin is a valid instance with pattern Xin . li , T he , R Second, we define Iout = (Gout , z, Tout out , λ); that is, we take the vertex z to be the out new root in the instance Iout . Recall that Viout does not contain any light terminal. We define li = {z}, T he = T he ∩ V out , and R out Gout = G[Viout ], Tout out = R ∩ Vi . In other words, we inherit out i all terminals and ghost vertices from I, and additionally proclaim z the root and a light terminal. Since r ∈ T li , we have |T | ≥ |Tout | and, consequently, Iout is a valid instance. Finally, we take Xout = (X ∩ Viout ) ∪ {z}. Note that |Xout | ≤ |X|, as r ∈ X \ Xout . Since Ci ∩ (X ∪ R) = ∅, every component of X in I lies either entirely in Viin or entirely in Viout . Furthermore, since every vertex within distance at most 3 from the root is in Viin , every component of X lying in Viout is free, and, consequently, all vertices of Viout ∩ X are far. Let x ∈ X be a vertex within distance at most 1 from z; clearly, x ∈ Viout . The component Y of X in I containing x is free, but Y ∪ {z} is contained in a rooted component of Xout in Iout . This, together with the discussion of Section A.1.2 applied to the instance Iin , proves the following claim. Claim 45. The following holds: ΠI (X) ≥ ΠIin (Xin ) + ΠIout (Xout ) ΓI ≥ ΓIin + ΓIout ΦI (X) ≥ ΦIin (Xin ) + ΦIout (Xout ) ΛI (X) ≥ 1 + ΛIin (Xin ) + ΛIout (Xout ). In particular, the last inequality of Claim 45 shows that Xout is a pattern in Iout . We apply the algorithm recursively to instances Iin and Iout , obtaining sets Ain and Aout . We have T li = Tinli ⊆ Ain and z ∈ Aout . We take A := Ain ∪ Aout . Clearly, T li ⊆ A.√ The fact that G[A] admits a tree decomposition of width at most 24022ctw k lg k with A ∩ T in the root bag is straightforward: since Ain and Aout are separated by Ci , there are no edges between these two sets, and we can just take a root bag A ∩ T , and attach as children the decompositions of G[Ain ] and G[Aout ]. We are left with analyzing the success probability. All the necessary observations have already been made in Claim 45, so we can conclude with the following claim. 48 Claim 46. Assume c1 ≥ 2 and c3 ≥ 17. Supposing X ∩ Wisl = 6 ∅ and the subroutine of Theorem 15 returned a separator chain, the algorithm outputs a set A with X ⊆ A with probability at least c Π(X), Γ, Φ(X), Λ(X)). This includes the (1−1/k) probability of success of the preliminary clusLB(n, tering step, the 1/k probability that the algorithm makes the correct assumption that X ∩Wisl = ∅, the k −7 probability of correctly choosing the island C that intersects the pattern, the (10k 2 lg n)−1 probability of choosing the right distance d, and k −2α−5 probability of correctly sampling the i, α, and set Q. Proof. The case α > 0 has been already discussed, and is the same as in Section 5, with the help of Claim 44 to control the split of the potential Λ(X). For α = 0, Claim 45 ensures that c in , ΠI (Xin ), ΓI , ΦI (Xin ), ΛI (Xin )) · LB(n c out , ΠI (Xout ), ΓI , ΦI (Xout ), ΛI (Xout )) LB(n out out out out in in in in   2 c ≥ LB(n, ΠI (X), ΓI , ΦI (X), ΛI (X)) · exp c3 lg k(lg k + lg lg n) . Hence,   1 P(X ⊆ A) ≥ 1− · k −8 · (10k 2 lg n)−1 · k −5 · k c out , ΠI (Xout ), ΓI , ΦI (Xout ), ΛI (Xout )) · LB(n out out out out c LB(nin , ΠIin (Xin ), ΓIin , ΦIin (Xin ), ΛIin (Xin ))   c ≥ k −17 · (lg n)−1 · exp c3 lg2 k(lg k + lg lg n) · LB(n, ΠI (X), ΓI , ΦI (X), ΛI (X)) c ≥ LB(n, ΠI (X), ΓI , ΦI (X), ΛI (X)) This finishes the proof of the claim and concludes the description of the third and last subcase. A.1.6 y Wrap-up: a multiple-component version of Theorem 1 Let us now take a step back and use the developed recursive algorithm to obtain a multiple-component version of Theorem 1, namely Theorem 34, following the lines of the reasoning of Section 5.1. Assume we are given an n-vertex graph G0 from a minor closed graph class C that excludes some apex graph, and we are looking for a pattern X ⊆ V (G) of size k such that G[X] has d connected components. Similarly as in Section 5.1, we can guess (by sampling at random) one vertex x ∈ X and create an instance I of our recursive problem with G = G0 , r0 = x, T li = {x}, and T he = R = ∅. Since G[X] has d connected components, we have ΛI (X) ≤ d − 1. However, X may not be a pattern in I due to the size penalty incurred by multiple connected √ components. Instead, provided we assume that d ≤ c · k/ lg k for some constant c ≥ 1, we can recursive subproblem with the parameter k 0 := (105 · c)3 k = O(k). Then, as √ invoke the 2/3 √ αk lg(αk) ≤ α k lg k for every k ≥ 10 and α ≥ 105 , we have: √ k 0 − d · 486 · k 0 lg k 0 ≥ (105 · c)3 k − 486 · 1010 c3 k > k ≥ |X|. Consequently, X is a pattern in I for the parameter k 0 = O(k). Let us now look at the contribution of the term including the potential ΛI (X) into the success probability. Using the estimate on LB(n, Π(X), Γ, Φ(X)) from Section 5.1, we obtain that c LB(n, Π(X), Γ, Φ(X), Λ(X)) =   lg n lg k 0 2 0 0 = LB(n, Π(X), Γ, Φ(X)) · exp −c3 · Λ(X) · lg k (lg k + lg lg n) + √ k0  √ 2 −1 h √ i ≥ 2O( k lg k) nO(1) · exp −c3 · c · k 0 lg k 0 (lg k 0 + lg lg n) + lg n  √ 2 −1 ≥ 2O( k lg k) nO(1) .  49 Note that we used Claim 18 in the last inequality. This finishes the proof of Theorem 34. A.2 The excluded minor case Using the multiple-components variant of the previous section, we now prove Theorem 33. Let us fix a graph G and an integer k as in the theorem statement. Furthermore, let X be a pattern in G such that G[X] admits a spanning tree S of maximum degree ∆, for a fixed constant ∆. The Robertson-Seymour decomposition theorem. As announced at the beginning of this section, we use the decomposition theorem of Robertson and Seymour for graphs excluding a fixed minor. To make use of locally bounded treewidth, we will use the variant of Grohe [21]. To formulate this decomposition, we need some notation. Recall that we use a notation T = (T, β) for a tree decomposition, where T is a tree and β : V (T ) → 2V (G) are bags. The set β(t) ∩ β(t0 ) for an edge tt0 ∈ E(T ) is called an adhesion of tt0 . For a node t ∈ V (T ), the torso of the node t, denoted by torso(t), is the graph G[β(t)] with every adhesion β(t) ∩ β(t0 ) for t0 ∈ NT (t) turned into a clique. Recall that we consider rooted tree decompositions; that is, the tree T is rooted in one node. For a non-root node t ∈ V (T ), by parent(t) we denote the parent of t in T . Furthermore, we denote: ( ∅ if t is the root of T σ(t) = β(t) ∩ β(parent(t)) otherwise. We are now ready to formulate the variant of the Robertson-Seymour decomposition of Grohe that we use. Theorem 47 ( [21]). For every proper minor-closed graph class C there exists a constant h and an apex-minor-free graph class C 0 such that the following holds. Given a graph G ∈ C, one can in polynomial time compute a tree decomposition T = (T, β) of G together with a family of sets (Zt )t∈V (T ) such that every adhesion of T has size at most h, and for every t ∈ V (T ) the set Zt is a subset of β(t) of size at most h, and the graph torso(t) − Zt belongs to C 0 . Furthermore, we need the following variant of Baker’s shifting technique. Theorem 48 ( [21]). Let C be a proper minor-closed graph class. Given a graph G ∈ C and an integer `, one can in polynomial time compute a partition of V (G) into ` sets L1 , L2 , . . . , L` , such that for every 1 ≤ i ≤ ` the graph G − Li is of treewidth O(`). The algorithm. Let us now proceed to the description of the algorithm. Given a graph G ∈ C, we compute its tree decomposition T = (T, β) and sets (Zt )t∈V (T ) using Theorem 47. Paying 1/n in the success probability, we guess an arbitrary vertex r ∈ X, and root the decomposition T in a bag tr such that r ∈ β(tr ). By slightly abusing the notation, we proclaim σ(tr ) = {r}. Since we can assume that G is connected, we can henceforth assume that every adhesion is nonempty. For every t ∈ V (T ), we create an instance It = (Gt , rt , Ttli , Tthe , Rt , λt ) of the recursive problem as follows. We first take Gt = torso(t) − Zt . If σ(t) 6⊆ Zt , we define rt to be an arbitrary vertex of σ(t) \ Zt ; otherwise, we create a new vertex rt and make it adjacent to an arbitrary vertex of Gt . We set Ttli = {rt } ∪ (σ(t) \ Zt ), Tthe = ∅, Rt = ∅, and λt = 0. Furthermore, we define Xt◦ = X ∩ β(t) and Xt = (Xt◦ \ Zt ) ∪ {rt }. Note that torso(t)[Xt◦ ] is connected, as G[X] is connected. Furthermore, we claim that torso(t)[Xt◦ ] admits a spanning tree of bounded degree. 50 Claim 49. There exists a spanning tree of torso(t)[Xt◦ ] of maximum degree 2∆. Proof. We construct a connected spanning subgraph St of torso(t)[Xt◦ ] of maximum degree 2∆ as follows. First, we take V (St ) = Xt◦ and E(St ) = E(S)∩E(torso(t)[Xt◦ ]. Second, for every t0 ∈ NT (t), we perform the following operation. Let leg(t, t0 ) be the set of those vertices v ∈ Xt◦ ∩ β(t) ∩ β(t0 ) for which v is incident to an edge uv ∈ E(S) with u ∈ β(t0 ) \ β(t). If |leg(t, t0 )| ≥ 2, we add to E(St ) edges of an arbitrary path on vertex set leg(t, t0 ); such a path exists in torso(t) as the adhesion β(t) ∩ β(t0 ) is turned into a clique. Let us now show that St is connected. To this end, consider a maximal path P in S between two vertices of Xt◦ such that no edge or internal vertex of P belongs to torso(t). Let v1 , v2 be the endpoints of P . By the properties of a tree decomposition, there exists a node t0 ∈ NT (t) such that v1 , v2 ∈ β(t)∩ β(t0 ) and the first and last edges of P are v1 u1 and v2 u2 with u1 , u2 ∈ β(t0 ) \ β(t) (possibly u1 = u2 ). However, then v1 , v2 ∈ leg(t, t0 ), and they remain connected in St . This shows that St is connected. To bound the maximum degree of St , note that for every t0 ∈ NT (t) and every v ∈ leg(t, t0 ), at most two edges incident to v are added to St when considering t0 . These two edges can be charged to the edge vu ∈ E(S) with u ∈ β(t0 ) \ β(t) that certifies that v ∈ leg(t, t0 ). We have vu ∈ E(S) \ E(St ), and every edge vu can be charged at most once. Since S has maximum degree at most ∆ by assumption, the bound on the maximum degree of St follows. y We define k 0 := (105 · ∆h)3 · k = O(k). We will use the machinery of Section A.1, in particular all the potentials, using the parameter k 0 instead of the input parameter k. The reason for this is that we need to pay the penalty in the size of the pattern for multiple connected components of Xt in It . The following claim verifies that it suffices to inflate k by a constant factor. Claim 50. The graph Gt [Xt ] has at most 2∆h + 1 connected components and ΛIt (Xt ) ≤ 2∆h. Furthermore, the set Xt is a pattern in It with respect to the parameter k 0 . Proof. Since the maximum degree of St is at most 2∆ and |Zt | ≤ h, there are at most 2∆h connected components of torso(t)[Xt◦ ]−Zt . Consequently, Gt [Xt ] has at most 2∆h+1 connected components and ΛIt (Xt ) ≤ 2∆h. Then, as √ αk lg(αk) ≤ α2/3 k for every k ≥ 10 and α ≥ 105 , we have: √ k 0 − 486 k 0 lg k 0 · ΛIt (Xt ) ≥ (105 · ∆h)3 k − 486 · (105 · ∆h)2 · 2∆h > 2k ≥ |Xt |. Thus, Xt satisfies the size bound for a pattern in It . y For every node t ∈ V (T ), we are going to look for the pattern Xt in the instance It , using k 0 as the parameter. Observe that the first three potentials partition well between the instances. Claim 51. The following holds, if we measure the potentials with respect to the parameter k 0 : X X X k≥ ΠIt (Xt ) and n≥ ΓIt and k≥ ΦIt (Xt ). t∈V (T ) t∈V (T ) t∈V (T ) Proof. The crucial observation is that for an edge between t and parent(t) in T , every vertex v ∈ σ(t) = β(t) ∩ β(parent(t)) is either in Zt or a light terminal in It . Consequently, every vertex v ∈ V (G) is present but not a light terminal in at most one instance It . y 51 However, the potentials ΛIt (Xt ) do not behave as nicely as the other potentials in Claim 51: they are bounded by 2∆h by Claim 50, but may be positive in Ω(k) instances. Thus, we cannot afford to apply the algorithm of the previous section to every instance It separately. Instead, for every instance It , we make a random choice. With probability 1/k, we proclaim It interesting and apply the recursive algorithm to It (that belongs to an apex-minor-free graph class C 0 promised by Theorem 47), obtaining a set At ⊆ (β(t) \ Zt ) ∪ {rt } such that Gt [At ] is of treewidth √ √ 0 0 O( k lg k ) = O( k lg k). Furthermore, note that σ(t) ⊆ At ∪ Zt . With the remaining probability, we proclaim It standard, and proceed √ as follows. First, we apply the algorithm of Theorem 48 to the graph Gt with ` := dc3 k 0 lg k 0 e obtaining a partition Lt1 , Lt2 , . . . , Lt` . Second, we pick a random index 1 ≤ it ≤ `. Third, we √set At := (V (Gt ) \ Ltit ) ∪ {rt } ∪ (σ(t) \ Zt ). Note that in this case also Gt [At ] has treewidth O( k lg k) as √ ` = O( k lg k) and |σ(t)| ≤ h = O(1). Furthermore, we have again σ(t) ⊆ At ∪ Zt . We define [ (At ∪ Zt ) \ (σ(t) ∪ {rt }). A := {r} ∪ t∈V (T ) We claim that A satisfies the desired properties. The treewidth bound is easy. √ Claim 52. G[A] is of treewidth O( k lg k). Proof. √ Since |Zt | ≤ h = O(1) for every t ∈ V (T ), we have that torso(t)[At ∪ Zt ] is of treewidth O( k lg k). Since σ(t) ⊆ At ∪ Zt for every t ∈ V (T ), we have that G[A] can be constructed from torso(t)[At ∪ Zt ] by vertex deletions and clique sums along cliques of size at most h, and the claim follows. y Finally, we check the probability that X ⊆ A. To this end, we need the following simple estimate. Claim 53. LetPa, b be positive integers, and a1 , a2 , . . . , ar be integers such that 0 ≤ ai < a for every 1 ≤ i ≤ r and ri=1 ai ≤ b. Then r  Y i=1 1− ai  ≥ a−2b/a−1 . a Proof. We use the following local improvement argument: whenever we have two indices 1 ≤ i < j ≤ r such that ai + aj < a, we can replace ai and aj with ai + aj , since  1− aj  ai + aj ai   1− ≥1− . a a a Thus, we can assume that for every 1 ≤ i < j ≤ r we have that ai + aj ≥ a. In particular, every index i satisfies ai ≥ a/2, apart from at most one. We infer that r ≤ 2b/a + 1. Since 1 − aai ≥ a−1 for each i due to a, ai being integers, the claim follows. y √ Claim 54. The probability that X ⊆ A is at least (2O( k lg2 k) · nO(1) )−1 . Proof. Note that we have the following partition: V (G) = {r} ] ] β(t) \ σ(t). t∈V (T ) By the definition of the set A, we have r ∈ A, and for every t ∈ V (T ) and for every v ∈ β(t) \ σ(t) it holds that v ∈ A if and only if v ∈ At ∪ Zt . Consequently, by the definition of Xt and Gt , if for 52 every t ∈ V (T ) we have Xt ⊆ At , then we have X ⊆ A. In what follows we will argue that with sufficient probability it holds that for every t ∈ V (T ) we have Xt ⊆ At . First, observe that this assertion is clearly true for every node t where Xt ⊆ {rt } ∪ (σ(t) \ Zt ) as both in standard and interesting nodes we have σ(t) ⊆ At ∪ Zt and rt ∈ At . If this is not the case for a node t (i.e., Xt 6⊆ {rt }∪(σ(t)\Zt )), we call the node t touched. Note that we have ΠIt (Xt ) > 0 for a touched node t. Hence, there are k touched nodes. We require that √ at most 0 0 a touched node t is proclaimed interesting√if ΠIt (Xt ) ≥ c3 k lg k , and standard otherwise. Note that Claim 51 implies that we require at most k 0 /(c3 lg k 0 ) nodes to be interesting and at most k nodes√to be standard. Consequently, the probability that we proclaim touched nodes as requested is 2−O( k) . In every standard touched node t we have Xt ⊆ At if Xt ∩ Ltit ⊆ Ttli , as Ttli = {rt } ∪ (σ(t) \ Zt ). We have Xt ∩ Ltit ⊆ Ttli with probability at least 1 − |Xt \ Ttli |/` = 1 − ΠIt (Xt )/`. Recall that √ ` = dc3 k 0 lg k 0 e but ΠIt (Xt ) < ` in a standard node t. Consequently, by Claim 53, the probability that in every standard node we have Xt ⊆ At ∪ {rt } is at most √ 0 `−2k /`−1 = 2−O( k) . √ Let us now consider an interesting node t, that√is, a node t with ΠIt (Xt ) ≥ c3 k 0 lg k 0 . Let Wint be the set of these nodes; note that |Wint | ≤ k 0 /(c3 lg k 0 ). Since Xt is a pattern in It , we c have Xt ⊆ At with probability at least LB(n, ΠIt (Xt ), ΓIt , ΦIt (Xt ), ΛIt (Xt )) (with respect to the 0 parameter k ). By Claims 50 and 51 we have that Y c LB(n, ΠIt (Xt ), ΓIt , ΦIt (Xt ), ΛIt (Xt )) t∈Wint ≤ Y LB(n, ΠIt (Xt ), ΓIt , ΦIt (Xt )) t∈Wint    lg n lg k 0 2 0 0 · exp −c3 · ΛIt (Xt ) · lg k (lg k + lg lg n) + √ k0 t∈Wint −1  √ 2 ≤ 2O( k lg k) nO(1)    lg n lg k 0 · exp −|Wint | · c3 · 2∆h · lg2 k 0 (lg k 0 + lg lg n) + √ k0  √ 2 −1 h √ i ≤ 2O( k lg k) nO(1) · exp −2∆h k 0 lg k 0 (lg k 0 + lg lg n) + lg n  √ 2 −1 ≤ 2O( k lg k) nO(1) . Y Here, we estimated the product of the terms LB(n, ΠIt (Xt ), ΓIt , ΦIt (Xt )) using Claim 51 as in Section 5, and in the last inequality we used Claim 18. y This concludes the proof of Theorem 33. 53
8cs.DS
Training a Fully Convolutional Neural Network to Route Integrated Circuits Kye Okabe † Stanford University arXiv:1706.08948v2 [cs.CV] 11 Sep 2017 Sambhav R. Jain ∗ † Oracle America Abstract We present a deep, fully convolutional neural network that learns to route a circuit layout ‘net’ with appropriate choice of metal tracks and wire class combinations. Inputs to the network are the encoded layouts containing spatial location of pins to be routed. After 15 fully convolutional stages followed by a score comparator, the network outputs 8 layout layers (corresponding to 4 route layers, 3 via layers and an identity-mapped pin layer) which are then decoded to obtain the routed layouts. We formulate this as a binary segmentation problem on a per-pixel per-layer basis, where the network is trained to correctly classify pixels in each layout layer to be ‘on’ or ‘off’. To demonstrate learnability of layout design rules, we train the network on a dataset of 50,000 train and 10,000 validation samples that we generate based on certain pre-defined layout constraints. Precision, recall and F1 score metrics are used to track the training progress. Our network achieves F1 ≈ 97% on the train set and F1 ≈ 92% on the validation set. We use PyTorch for implementing our model. Code is made publicly available1 . 1. Introduction Routing is a complex spatial optimization problem in the physical design of integrated circuits (ICs) that is known to be NP-complete in most cases [20, 15, 10, 22]. The task is to optimally connect circuit segments spanning multiple layout hierarchies and multiple wire classes, while complying to a strict set of design rules dictated by the foundry’s process design kit (PDK). The quality of routing determines circuit performance (frequency), reliability, and can also impact area. Depending on the type of circuit (ASIC / memory / processor), the routing objective may prioritize one over the other, but in general the expectation is to: • • • • Figure 1. Training samples from our dataset. Top row shows input data containing pins for a single net case. Bottom row shows input labels (decoded to 8-bit RGB) containing pins, routes, and vias. Pins are routed using two wire classes (branch-leg). Wire class color coding: M3 =green, M4 =red, M5 =grey, M6 =blue. Formally, a circuit layout consists of several sub-blocks (or cells) with input/output ports (or pins). Connections between pins use channels (or tracks) in several metal layers that run orthogonal to one another, separated by insulating layers with connecting vias. If we treat cells as edges, then a node in a circuit graph corresponds to a net in the layout, which connects the driver’s output pin with the input pin(s) of the receiver(s). Traditionally, when the circuit sizes were tractable, routing was primarily a manual task. However, in the past couple decades with exploding circuit sizes and more than a few billion transistors to be routed, the use of Minimize path delay (resistance/capacitance) Minimize congestion (wire crowding, hot spots) Maximize routability (availability of tracks) Maximize repeatability ∗ Corresponding author: [email protected] equal contribution. 1 Code: https://github.com/sjain-stanford/deep-route † Indicates 1 auto-routers is indispensable. Shrinking technology nodes and more stringent design rules further impact routability. Commercial electronic design automation (EDA) tools try to tackle this non-linear optimization problem using various algorithmic approaches [20] such as (i) exponential algorithms to exhaust the search space for a solution, (ii) heuristic algorithms, (iii) optimal algorithms for special cases of the problem, or (iv) approximation techniques. These approaches are iterative in nature and rely on a continually evolving/changing set of design rules. The routed layouts may further require significant manual effort and fine tuning to improve the non-optimal routes. We explore a learning-based approach wherein we train a deep, fully convolutional network (FCN) to route a layout net while relying on its ability to learn implicit design rules from the training data. In order to demonstrate learnability of layout design rules by the network, we pre-define a set of basic constraints (not specific to any technology node) that are embedded in the ground truth layouts generated for a single net case. The network is trained on our dataset of 50,000 train and 10,000 validation samples. Input data (containing pins) and labels (containing pins and routes) are first encoded on a binary basis per-pixel per-layer (detailed in Section 3), before feeding to the 15 stage FCN. FCN outputs go through a score comparator to give 8-layer encoded layouts (4 route layers, 3 via layers, and 1 pin layer). We decode this to 8-bit RGB for visualization. The various architectural choices of the FCN are covered in depth in Sections 4 and 5. The network shows ability to learn (i) the identity-map for pins, (ii) optimal track locations for routes, (iii) suitable wire class combination, and (iv) via locations. One of the very first ideas of using neural networks for circuit routing came from Green and Noakes [6], who divided the routing task into several stages and combined multiple small back propagation networks to form a complex neural system. They proposed to restrict the routing task to predefined areas and slide the context window to complete routes in sections. This divide and conquer approach helped reduce the complexity of their artificial neural network router. Our work takes inspiration from the recent advances in convolutional neural networks (CNN) [3, 12, 11] which are better suited for visual tasks as they preserve spatial information in the inputs. Similar to [6], we fix the routing window to a predefined layout size, however, in contrast to [6], we develop a single, end-to-end, deep network using convolutions, which holistically learns multiple design rules during training, and is able to route using different wire class combinations, depending on the spatial spread of the pins. To our best knowledge, this is the first attempt at routing a circuit layout net using a convolutional neural network. 3. Dataset Overview. We develop our own dataset owing to the lack of a publicly available layout dataset, and the need to use simplistic design rules to assess learnability by the network (feasibility). In this section we discuss the design choices and constraints used when generating 50,000 layouts for training and 10,000 layouts for validation. Each layout sample contains both data (pins only) and labels (pins, routes, vias) for a single net (see Figure 1). The image is pixelwise binary encoded in 8 layers of the layout, viz. [pin, M3 , V ia3 , M4 , V ia4 , M5 , V ia5 , M6 ]. So each pixel in a given layer is either ’1’ or ’0’, indicating the presence or absence of the layer at that spatial location. Our reasoning behind this encoding scheme is discussed in Section 4.1. Thus training data are stored as tensors of shape N × 1 × H × W , and labels as tensors of shape N × 8 × H × W , where H = W = 32. The layouts were sized 32 × 32 pixels, which we found computationally feasible. We use chunked HDF5 [24] when storing and loading this large dataset to avoid memory bottlenecks. 2. Related Work The task of producing routes using orthogonal layers of parallel channels and vias at intersections is often tackled heuristically, since an optimal solution does not exist for this NP-complete problem [20, 15, 10, 22]. Previous work in this field [27, 17, 2, 26, 25, 28] mostly rely on explicit rule-based algorithms to tackle parts of this complex task. For instance, Zajc et al. [28] proposed using hierarchical algorithms for automatic routing of interconnects in two layer channels. Rivest et al. [17] show a ”greedy” heuristic channel router assuming all pins and wiring sit on a common grid. The other class of routers, which have received attention lately, are objective function based. Alpert et al. [1] proposed a combination of minimum spanning tree (Prim) and shortest path tree (Dijkstra) objectives for performance driven global routing. Constructing routing tree with different objectives was also explored, such as timing objective [21], buffer insertion [13] and wire sizing objective [23], congestion and thermal objective [18, 8]. A completely different objective for diagonal routing as opposed to the orthogonal (Manhattan) routing was also proposed [19]. Design rules. These design rules are fundamental to traditional layout design and do not correspond to any specific technology node. 1. M2n tracks run horizontally. 2. M2n+1 tracks run vertically. 3. Mn contacts Mn+1 through V ian . Design choices. We made the following design choices to reduce the complexity of network implementation. These could be scaled as needed given sufficient resources. 1. Maximum npins = 5. 2. Layout context window = 11µm × 11µm. 2 4.1. Binary Encoding Scheme 3. Total allowed route layers = 4; total via layers = 3. 4. Routes are limited to two wire classes (branch-leg) (e.g. [M3 , M4 ] or [M4 , M5 ] or [M5 , M6 ]). 5. Metal tracks use pixel grid (one track per pixel). 6. Pin layer is lower than all route layers, and routes need not drop vias down to the pin layer. In typical image generation problems such as generative adversarial nets (GAN) [4], at the point of weight initialization, networks are intrinsically capable to generate an arbitrary color at any pixel coordinate. Subsequently through the course of training, meaningful color/coordinate combinations must be learned. The standard 8-bit RGB color gamut has 224 color representations (3 color channels, 8 bits each) which is significantly larger than what we need. Since our data only deals with 8 layout layers (4 route, 3 via, 1 pin) we can immediately set an upper bound on the representation combinations per pixel to 28 . To take advantage of this insight, we choose to encode our data on a binary basis per-pixel per-layer. Hence instead of representing images as tensors of shape 3 × H × W with range: {0 − 255} (8-bit RGB), we encode our dataset as tensors of shape 8×H ×W with a binary range: {0, 1}. By doing so, we are able to formulate this as a layer-wise binary segmentation task, with cross entropy loss on the scores (16 × H × W ) to let the network make a binary decision of the presence of each of the 8 layers at every pixel in the context window H × W . Higher metals normally have less wire resistance per unit length compared to lower metals, due to their large cross sectional area and/or better material properties. However, higher metals also require additional vias to jump up/down to/from higher layers, which adds to the total resistance. As a result, there is a break-even route distance above which a higher metal is preferred. Moreover, for a given layout size, depending on wire performance data there are only a limited set of wire classes which make sense for routing. Using higher or lower wire classes than necessary would be non-optimal. In our case, we use empirical wire and via resistance data2 for four such wire classes (say M3 to M6 ). We select 11µm as the size of the context window as it gave us a balanced dataset among the three wire class combinations, viz. [M3 , M4 ], [M4 , M5 ], [M5 , M6 ]. By defining a context window for routing, we let the possibility open to have it slide over the entire layout to complete routing in segments, similar to [6], but we leave the slide-and-route implementation to future work. 4.2. Network Architecture Figure 2 illustrates our model with the activation volumes after each stage. The FCN has a total of 15 convolutional3 stages (see Section 5 for further explanation on the choice of network depth). All convolutions except the last one are followed by batch normalization (BN) [7] and leaky rectified linear unit (leaky ReLU) [14]. The last convolution stage (L15 ) outputs the scores, hence is not followed by BN and leaky ReLU as they would not affect the relative scores. Encoded inputs to the FCN are tensors of shape N ×1×H×W , where N is the mini-batch size and H = W = 32 (spatial dimensions). The first stage (L1 ) uses 33 × 33 convolution with 16 filters, whereas stages L2 through L15 use 3×3 convolution with 16 filters. We believe the large receptive field at the head of the network allows a fast grasp of the overall pin locations and helps the network learn spatial information better, as will be explored in Section 5. Strides and padding for convolutions are such as to preserve the spatial dimension of the feature maps at each stage. Thus the activations after each stage are of shape N × 16 × 32 × 32, or more generally N × (α.β) × H × W where α is the number of layout layers to be learned, and β is the number of segmentation classes (two in our case). Activations from the last FCN stage (scores) are passed through the score comparator to pick the class with a higher score. Thus scores of shape N × (α.β) × H × W are reduced to layout maps of shape N × α × H × W with each pixel being either ‘1’ or ‘0’ indicating the presence or absence of a layer at that spatial location. For visualization of the routes, we decode the score comparator outputs to 8-bit RGB. Route algorithm. For each layout we first sample (random uniform) npins from {2, 3, 4, 5} and (x, y) co-ordinates for each pin from {0 − 31} (since pixel grid is 32 × 32). For a given pin configuration, the direction with the largest spread of pins is chosen as dominant. The dominant direction uses a branch, while the non-dominant direction uses legs to connect individual pins to the branch. The choice of metals for branch and legs is done so as to optimize the combined wire and via resistance, as explained earlier. From Figure 1, we can qualitatively see that shorter routes use lower metals while longer routes use higher metals. We can also see that a branch is always assigned to the dominant direction, and legs to the other direction. For visualization, the routed layouts are decoded to 8-bit RGB as follows: M3 as green, M4 as red, M5 as grey and M6 as blue. 4. Model Overview. Our proposed model consists of a single, endto-end, deep network using convolutions, which takes pin locations for a net as inputs and generates routes in one of the three wire class combinations, using layout design rules it learns from training data. We first present a binary scheme of encoding the input data in Section 4.1. The FCN model (see Figure 2) and its architectural details are covered in Section 4.2. Then in Sections 4.3 and 4.4 we describe the loss function and the details of training respectively. 2 Not 3 Fully released due to proprietary reasons 3 connected layers or excessively deep layers were avoided. M3 pin Encoded Inputs Nx1x32x32 Range: 0 or 1 L1 Nx16x32x32 L2 L15 (scores) Nx16x32x32 Nx16x32x32 Nx(α.β)xHxW Range: ℝ M4 Via3 M5 M6 Via4 Via5 Score Comparator Nx8x32x32 Nx(α)xHxW Range: 0 or 1 Decoded Outputs Nx3x32x32 Range: 0~255 (8 bit RGB) Fully Convolutional Network (FCN) L1 Conv (F=33, P=16, S=1)  BN  Leaky ReLU L2~14 Conv (F=3, P=1, S=1)  BN  Leaky ReLU L15 Conv (F=3, P=1, S=1) Figure 2. Model overview. The encoded layouts (with pins only) are fed to a 15 stage FCN which performs convolutions while preserving spatial dimensions. The filter size (F), padding (P) and stride (S) used in each stage is indicated. Scores at the end of the FCN are processed by a score comparator to generate the routed layouts (with pins, routes, and vias) which are visualized after decoding to 8-bit RGB. 4.3. Loss Function 4.4. Training and optimization To implement the network objective as a layer-wise binary segmentation task wherein every pixel in every layer is classified into one of the two classes (y = 0 or y = 1), we perform simple but critical reshape operations as follows. At train time, scores from the FCN (tensor) of shape N × (α.β) × H × W are first reshaped to a matrix of shape N.H.W.α × β. The corresponding labels (tensor) of shape N × α × H × W are reshaped to a vector of length N.H.W.α. We then use averaged cross entropy loss (combination of negative log likelihood and softmax) over the predicted score matrix and label vector, to train our model (see Eq. 1). We train the model from scratch, starting with default weight initialization. We use Adam [9] with β1 = 0.9, β2 = 0.999, and  = 1 × 10−8 to train the weights of the FCN components. We experiment with two different minibatch sizes, viz. N = 10 and N = 100 with learning rates of 5 × 10−5 and 5 × 10−4 respectively (see Section 5). A mini-batch of 10 runs in approximately 90ms (∼7.5 min per epoch) and a mini-batch of 100 takes about 600ms (∼5 min per epoch) on a Tesla K80 GPU. We use PyTorch [16] to train and implement the network. L= 1 N.H.W.α ( X ky e − log P β N.H.W.α +λ Sy XXX 5. Experiments F1 score as accuracy metric. Given the nature of our training data which is massively unbalanced towards one class (y = 0), a raw metric comparing pixels of predicted and actual (ground truth) layouts will easily present an unreasonably high pixel-wise accuracy (∼98% in our case) even if the model incorrectly predicts all pixels to be background. We instead use the F1 score metric that uses an equally weighted harmonic mean of precision and recall based confusion matrix. Precision is a measure of true positives among all pixels predicted positive. Recall is a measure of true positives among all pixels ground truth positive. ) eSβ (1) wn2 α×β n α×β Class imbalance. Since a majority of pixels in the input labels are background (y = 0) with very few active pixels (y = 1), we observe that the network quickly learns to classify all pixels as background and struggles to learn further. To mitigate such sparse learning difficulties due to class imbalance, we use weighted cross entropy loss with weights k y=1 = 3 and k y=0 = 1. Regularization. An L2 regularization term was added to the loss to improve generalization.PWe sum over squared weights of 16 convolution filters ( α×β ) from each stage P ( n ) and use a regularization coefficient λ = 1 × 10−5 . ### Pseudocode # tp = true positives, tn = true negatives # fp = false positives, fn = false negatives precision = tp / (tp+fp) recall = tp / (tp+fn) accuracy = (tp+tn) / (tp+tn+fp+fn) f1_score = 2 * (precision*recall) / (precision+recall) 4 Figure 3. First stage experiment. We compare training curves with the first FCN stage using filters of size (i) F=3 (left) and (ii) F=33 (right). Small receptive field at the head of the network prevents the model from learning, as seen from the low train accuracy (F1 ≈ 35%) on the left compared to the one on the right (F1 ≈ 85%) after 200 epochs. Network depth and receptive field. We choose the FCN depth such as to have the overall receptive field of the network cover the entire input image (32 × 32 pixels). Assuming all stages use 3 × 3 unit-strided convolutions, 3 + 2 × (nstages − 1) > 32, we would need at least nstages = 15 to allow the network to learn reasonably well. We observe that reducing the FCN depth below 15 makes it difficult for the model to perfectly overfit (F1 = 100%) even a tiny dataset of 4 train samples. Note that our model uses 33 × 33 convolutions only in the first stage (see Figure 2). Final training with different mini-batches. Taking inspiration from [5], we conduct the final training using two different mini-batch sizes, viz. N = 10 and N = 100. The linear scaling rule [5] suggests adjusting the learning rate linearly as a function of mini-batch size. This makes intuitive sense because we make fewer iterative steps per epoch with a larger mini-batch, hence the step size (learning rate) needs to be proportionally larger. We set the learning rates to 5 × 10−5 and 5 × 10−4 for mini-batches of 10 and 100 respectively, which worked reasonably well in our hyperparameter tuning experiments. To overcome overfitting seen in Figure 3, we now use our complete dataset of 50,000 train and 10,000 validation samples for training. Figure 4 shows the loss and accuracy curves (on both train and validation sets) for the two mini-batches. The overall trends look comparable. With mini-batch of 10 (left plot), the model achieves accuracies F1 ≈ 90% and F1 ≈ 82% on the train and validation sets after 200 epochs, and takes about 45 epochs to reach validation accuracy of 80%. In contrast, with mini-batch of 100 (right plot) the model achieves F1 ≈ 97% and F1 ≈ 92% on the train and validation sets after 200 epochs, and takes only 20 epochs to reach validation accuracy of 80%. Total train time significantly improved from 25 hours (∼7.5 min per epoch) with minibatch of 10 to 16 hours (∼5 min per epoch) with mini-batch of 100, on a Tesla K80 GPU. The curves show good generalization of the model on the validation set with only a small gap (< 5%) between training and validation accuracies. Also included are the precision and recall curves for the second case. Significance of F = 33 in the first FCN stage. As discussed in Section 4.2, we use 33 × 33 convolutional filters in the first FCN stage as we believe this large receptive field at the head of the network helps the model quickly learn the correspondence between spatial spread of pins in the input and crucial route decisions such as wire class combinations, track usage, and branch-leg assignment. To demonstrate the significance of this architecture, we compare two models differing only in their first FCN stages, viz. (i) F = 3, and (ii) F = 33. Rest of the model is unchanged. For this experiment we train the two models on a subset of our dataset (1000 train and 200 validation samples), using mini-batches of 10, learning rate of 5 × 10−5 and regularization strength of 1 × 10−5 . From Figure 3 we see that learning stagnates around F1 = 35% after 200 epochs with F = 3, whereas the model is able to quickly overfit the small dataset fairly well (F1 = 85%) with F = 33. Interestingly, the increasing gap between training and validation accuracies is due to the small dataset size used for this experiment, causing the model to overfit to it. 5 Figure 4. Loss and accuracy curves on training and validation sets from final training. Left shows the case with mini-batch of 10, learning rate of 5 × 10−5 . Right shows the case with mini-batch of 100, learning rate of 5 × 10−4 (linear scaling). Precision and recall curves are included for the second case. Best accuracy was recorded at F1 ≈ 97% on train set and F1 ≈ 92% on validation set within 200 epochs. 6. Results after 191 epochs of training. As seen from the actual (ground truth) and predicted layouts, the network does well in (i) learning the identity mapping for pins, (ii) assigning vias to connect metals in adjacent layers, (iii) identifying the correct wire class combination from the overall pin configuration, and (iv) choosing the optimal track positions for branch and legs. It uses lower metals to route pins that are closer, and higher metals for widespread pins. In some cases, however, the routing is not perfect and the model misses connections or adds routes at undesired locations. We typically notice a higher error rate when layouts have more pins. This could likely be improved if we increase the ratio of training samples in the dataset containing more pins. While there is room for further improvement, the FCN model shows good overall ability to learn the layout design rules intrinsic to the dataset used for training. Future work. Due to the complexity involved in routing real IC layouts, there are several requirements that need to be addressed. A few worth mentioning are (1) routing multiple nets in the presence of previously occupied tracks, (2) using a finer grid of valid metal tracks customized per wire class, (3) training on more complex route configurations such as trunk-branch-leg, (4) adding driver / receiver awareness to pins, (5) adding dedicated pin layers for each wire class, (6) supporting routing of a bigger layout in segments using a sliding context window, (7) integrating timing models for timing-driven routing, (8) training on industry standard layouts after converting to our layer-encoded binary standard. Some of these requirements may be implemented by direct scaling of the model and/or training with dense To gain insight into the learning process, we show a routed net example from the validation set with two pins (see Figure 5). The left image shows the actual routed layout (ground truth), the center and right images show the predicted model outputs after 141 and 151 epochs of training respectively. We first notice that the model grasps orthogonality of adjacent metal layers, assigning M3 (green) to vertical tracks and M4 (red) to horizontal tracks only. Second, the model learns to connect different wire classes using vias at intersections. Third, the model learns to assign a branch to the dominant direction and legs to the non-dominant direction, however since the pins are roughly evenly spaced in either direction, the model attempts a vertical branch and horizontal legs. Eventually (after 10 epochs) it learns a more optimal way by using a horizontal branch and vertical legs to route, thus matching our ground truth expectation. Figure 5. Learning example from the validation set. Left image shows actual layout (ground truth), center and right images show model predicted layouts after 141 and 151 epochs respectively. Figure 6 presents some randomly sampled examples from the training and validation sets, routed by our model 6 Figure 6. Examples from training (top row) and validation (bottom row) datasets showing the actual (ground truth) layouts on the left and the corresponding predicted (model routed) layouts on the right, after 191 epochs of training. The FCN model demonstrates good ability to learn layout design rules intrinsic to the dataset. Wire class color coding: M3 =green, M4 =red, M5 =grey, M6 =blue. datasets containing more design rules of interest. However, it is plausible that other requirements may warrant more sophisticated architectures, possibly combining several neural models to construct a complex neural system to route ICs. defined layout constraints. We then implemented an encoding scheme to efficiently represent inputs to the model. The proposed FCN architecture efficiently learns to route a single net under set design constraints. Our model achieves good performance with training accuracy of F1 ≈ 97% and validation accuracy of F1 ≈ 92% within 200 epochs. 7. Conclusion Inspired by the challenges facing circuit layout routing and optimization, and the recent advances in the field of convolutional neural networks, we introduced a unique approach to routing ICs using deep, fully convolutional networks. To explore learnability of layout design rules by our FCN model, we created our own dataset based on pre- 8. Acknowledgements We thank Nishith Khandwala and Wenbin Huang for helpful comments and discussion. We gratefully acknowledge CS231N staff (Stanford) and Google Cloud for the educational GPU credits used towards this work. 7 References [14] A. L. Maas, A. Y. Hannun, and A. Y. Ng. Rectifier nonlinearities improve neural network acoustic models. In Proc. ICML, volume 30, 2013. [15] R. Pal. Multi-layer Channel Routing Complexity and Algorithms. Complexity and Algorithms. Alpha Science, 2000. [16] Facebook AI Research (FAIR). Pytorch. https:// github.com/pytorch, 2016. [17] R. L. Rivest and C. M. Fiduccia. A ”greedy” channel router. In 19th Design Automation Conference, pages 418– 424, June 1982. [18] D. Roy, P. Ghosal, and N. Das. A thermal and congestion driven global router for 3d integrated circuits. In Students’ Technology Symposium (TechSym), 2014 IEEE, pages 303– 308, Feb 2014. [19] T. Samanta, P. Ghosal, H. Rahaman, and P. Dasgupta. A heuristic method for constructing hexagonal steiner minimal trees for routing in vlsi. In 2006 IEEE International Symposium on Circuits and Systems, pages 4 pp.–, May 2006. [20] N. Sherwani, S. Bhingarde, and A. Panyam. Routing in the Third Dimension: From VLSI Chips to MCMs. IEEE Press Series on Microelectronic Systems. Wiley, 1995. [21] J. Song, C. Jang, K. Cho, S. Go, and J. Chong. Timing driven global router with a pin partition method for 3d stacked integrated circuits. In The 18th IEEE International Symposium on Consumer Electronics (ISCE 2014), pages 1–2, June 2014. [22] T. G. Szymanski. Dogleg channel routing is np-complete. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 4(1):31–41, January 1985. [23] X. Tang, R. Tian, H. Xiang, and D. F. Wong. A new algorithm for routing tree construction with buffer insertion and wire sizing under obstacle constraints. In IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281), pages 49–56, Nov 2001. [24] The HDF Group. Hierarchical data format version 5. http: //www.hdfgroup.org/HDF5, 2000-2010. [25] J. S. Wang and R. C. T. Lee. An efficient channel routing algorithm to yield an optimal solution. IEEE Transactions on Computers, 39(7):957–962, Jul 1990. [26] T. Yoshimura. An efficient channel router. In 21st Design Automation Conference Proceedings, pages 38–44, June 1984. [27] T. Yoshimura and E. S. Kuh. Efficient algorithms for channel routing. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 1(1):25–35, January 1982. [28] B. Zajc, D. Tomasevic, and A. Zemva. Automatic routing of interconnections between cells in integrated circuits. In [1991 Proceedings] 6th Mediterranean Electrotechnical Conference, pages 238–241 vol.1, May 1991. [1] C. J. Alpert, T. C. Hu, J. H. Huang, and A. B. Kahng. A direct combination of the prim and dijkstra constructions for improved performance-driven global routing. In 1993 IEEE International Symposium on Circuits and Systems, pages 1869–1872 vol.3, May 1993. [2] M. Burstein and R. Pelavin. Hierarchical channel router. In 20th Design Automation Conference Proceedings, pages 591–597, June 1983. [3] K. Fukushima. Neocognitron: A self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position. Biological Cybernetics, 36(4):193–202, 1980. [4] I. J. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and Y. Bengio. Generative adversarial nets. In Proceedings of the 27th International Conference on Neural Information Processing Systems, NIPS’14, pages 2672–2680, Cambridge, MA, USA, 2014. MIT Press. [5] P. Goyal, P. Dollár, R. Girshick, P. Noordhuis, L. Wesolowski, A. Kyrola, A. Tulloch, Y. Jia, and K. He. Accurate, large minibatch SGD: Training imagenet in 1 hour. arXiv preprint arXiv:1706.02677, 2017. [6] A. D. P. Green and P. D. Noakes. Neural networks-their use for the routing of integrated circuits. In Proceedings of the 32nd Midwest Symposium on Circuits and Systems,, pages 501–504 vol.1, Aug 1989. [7] S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. In ICML, 2015. [8] A. Ivanov, P. Hallschmid, and Z. Zhou. Local congestion and blockage aware routability analysis using adaptive flexible modeling. In 2016 IEEE International Conference on Electronics, Circuits and Systems (ICECS), pages 438–439, Dec 2016. [9] D. P. Kingma and J. Ba. Adam: A method for stochastic optimization. In Proceedings of the 3rd International Conference on Learning Representations (ICLR), 2014. [10] M. R. Kramer and J. van Leeuwen. Wire-routing is NP-complete. http://www.cs.uu.nl/research/ techreps/repo/CS-1982/1982-04.pdf, 1982. [11] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolutional neural networks. In F. Pereira, C. J. C. Burges, L. Bottou, and K. Q. Weinberger, editors, Advances in Neural Information Processing Systems 25, pages 1097–1105. Curran Associates, Inc., 2012. [12] Y. Lecun, L. D. Jackel, H. A. Eduard, N. Bottou, C. Cartes, J. S. Denker, H. Drucker, E. Sackinger, P. Simard, and V. Vapnik. Learning algorithms for classification: A comparison on handwritten digit recognition. In Neural Networks: The Statistical Mechanics Perspective, pages 261– 276. World Scientific, 1995. [13] J. Lillis, C.-K. Cheng, and T.-T. Y. Lin. Simultaneous routing and buffer insertion for high performance interconnect. In Proceedings of the Sixth Great Lakes Symposium on VLSI, pages 148–153, Mar 1996. 8
1cs.CV